VOLUME 5, ISSUE 5, MAY 2016
Enhanced Audio Steganography using RSA Cryptography and LSB algorithm
Prof. Pankaj Waghralkar, Ms.Durga Solanki, Ms.Sayali Shilamkar, Ms.Priyanka Belekar, Ms.Pooja Chandan
Signature Recognition and Verification System via Neural Network
Sandhya Katiyar, Shubham Agarwal, Shubham Kaushal, Himanshu Vats
Brain Wave Sensor Controlled Mobile Robot Based on EEG
S.Alagammal, M.K.Nagarajan
Mind Controlled Alarm
Vipin Das, Ancy Mathai, JaisyP Jacob, Maria Abraham, Amal Kurian Shajan, Anandu Ashokan
Over View of Cryptographic Algorithms for Information Security
Dr.D.Vimal Kumar, Mrs.J.Divya jose
GIS Based Tourist Management System
Purva Sakharkar, Shailesh Fasale, Pawan Soni, Prof.Ashwini Pansare
Enhanced Vision of HAZY Images Using Improved Depth Estimation and Color Analysis
Priyanka P. Bhadane, Prof. Santosh G. Bari, Prof.Nitin Dawande
Review on Video Watermarking Techniques
Miss. Shital Divekar, Prof. Nitin Dawande, Prof. Suresh Rode
Detection of Diabetic Retinopathy Based on Modified Kernel FUZZY C-Means Clustering
J.Santhiya, D.Sommasundharam
Virtual Mouse
Pranoti Vaidya, Pooja pangavhane, Jyoti Deore, Rakhi Thakare
Prediction of User Browsing Behavior Using Web Log Data
Abhishek Chauhan, Dr.Sandhya Tarar
Intelligent Toll Path System Using GPS and GSM
Anandaraj S, Mohana Arasi M
Maintaining Data Confidentiality Using Attribute Based Secret Sharing
Rohit Dokhe, Pooja Bathe, Apurv Kolte
Avoiding Discontinuity In Vanet Using Store Carry Forward Approach
Sushant Nerkar ,Darpana Dakhode, Mohini Chaudhari
Design of low power Universal Shift Register Using Pipe Logic flip flops
S.A.Sivakumar, R.Sowmya
A Query Approach to Social Influence Maximization
Dr. Prof.A.NBanubakode, Swapnil Magar, HarshalKasle, Ajay Jaiswal, Jason Vijoy
Modern Web Apps using Full Stack Development and Containerization
Mrudula Deore, Mayuri Kambli, Chinmayi Kulkarni, Asst. Prof. Sunil Chaudhari
Predict the Software Program Behavior using Code Change Impact Analysis Tool
Ashwini J. Patil, Prof.Netra Patil
Review of Image Processing Techniques for Optic Cup and Optic Disc Segmentation for Glaucoma Detection
Pratibha Singh, Prof.Rakesh Kumar Singh, Pooja Gupta
Reliable Hop-by-Hop Message Validation in Wireless Sensor Network using Cryptography based Network Model
Navyatha K P, Mrs. Sahanadevi K J
Congestion Control in WBAN in the Field of Heterogeneous Network
Srinidhi .C, Mrs Mangala C N
Observation and Control of Crops over Internet
Nitish Bharti, Shalabh Bade, Vipul Badge, Mr. Manish Narkhede
Development of FPGA based Processing Electronics for Gamma Ray Spectrometer (GRS) and Comparisons between two Different Methods
Parth Jadvani, Mr. Shiv Goyal, Dr. D. Banerjee
ITRP: Instant Time Resource Provisioning Prototype for Adequate Quality of Service
Mrs. Shilpa, Mrs. Chetana Srinivas
FHA-Flood Help and Awareness
Anand R, Jagadish P, Donelson Timung, Sewalee Phukan, Nikita Hakai
Online Identification of Real World Events from Twitter
Prof. R. M. Shete
Gestures in air based home appliance control system
Shubha N R, Bhavana Maishale, Srilakshmi H, Prof.Vasanthi S
Review on: Moving Object Detection Using Temporal Information in Surveillance System
Mrunal Gaikwad, Dr.U.B.Shinde, Prof.K.M.Biradar
Design & Optimization of CNTFET based Domino 1- Bit ALU
Ashish Sharma, Umesh Dutta, Sneha Arora, Vipin Kumar Sharma
Investigation of different recent Selfish node detection mechanism for Mobile Adhoc Networks
T.JohnPaulAntony, Dr.S.P.Victor
Identification of Isolated Upper and Lower Assamese words: A Survey
Mr. Adarsh Pradhan, Jyoti Rekha Saikia
An Exploratory Review of Web Content Mining Techniques and Methods
Narendra Parmar, Dr. Vineet Richhariya, Jay Prakash Maurya
Mobile based application for fake currency detection and recognition
Prof. S.R.Javheri, Shitalpadole, PoojaDeshmukh, ShitalKhade
Implementation and Analysis of Image Denoising Technique
Prachi Kulkarni, Pranjal Kumbhare, Anuja Saxsena, Gouri Pandey
A Brief study on Prediction of load in Cloud Environment
Chandini M.S, Mrs Pushpalatha R, Dr. Ramesh Boraiah
Smart Portable White Revolution System for Dairy Farmers
Arote Pranjal, Honrao Akshata, Patil Kajal, Mrs. S.Y. Sawant
Carbon Nano tubes & Its Application In Medical Field & Communication
Er. Shipra Srivastava, Mohd Maroof Siddiqui, Saifur Rahman, Prof (Dr.) Syed Hasan Saeed, Md Belal Bin Heyat
Implementation of FM0/Manchester Encoding and Systematic Codes on FPGA
Nithiyalakshmi.S, Gopi.B
Brain tumour detection using Image processing and sending tumour information over GSM
Shivakumarswamy G.M., Akshay Patil.V., Chethan T.A., Prajwal B.H., Sagar.V.Hande
Enhanced HIIT Based Recommender Application using Collaborative Filtering and Reinforced Learning
Aditya Khursale, Ankit Singhaniya, Shubham Saykhedkar, Swati Shirke
Implementation of Constructive Induction – A Data Mining Technique in Agro Database for Optimal Solution
Dr. K. S. Rathnamala
Performance Comparison of Conventional and Fuzzy Logic Controller on DC Motor
T.Sathya, R.Premalatha, G.Boopathi Raja, N.Karthikeyan
DICOM Image Compression and Decompression Techniques
Shreya A, Ajay B.N
Prototype Development of an Agricultural Environment Monitoring System Using WSN
Ravindrakumar D. Bhatt, DhartiVyas
USB3.0 Driver Development for Embedded Platforms which Currently support USB2.0
Chintan Vadaliya, Urmil Vyas
Terrorism in the Cyber Space: The New Battlefield
Saumya Gupta, Akhilesh Tiwari
Design of Low Power Double Edge Triggered Comparator For Successive Approximation Register (SAR) ADC
Tino mol J M, R.Sowmya
Fuzzy Partitioning Based Clustering Approach
Nipjyoti Sarma, Adarsh Pradhan, Utpal Barman
Analysis of Specific Absorption Rate (SAR) of Microstrip Patch Antenna for Wireless Applications
Shivalingappa M Baligar, Rajendra Soloni, Dr.Chandrappa D.N
M-Commerce: Risks and Security Issues
Akanksha Srivastav, Ajeet Bhartee
A Methodology for Implementation of Smart Security system using Near Field Body Coupled Communication Technique
Ranganath B, Siddesha K, Kavitha Narayan B M
A Survey of Web Log for Effective Information Retrieval Using Data Mining Techniques
T. Nandhini, Dr. B. Kalpana
Mobile Data Gathering and Dual Data Uploading Using Gateways
Vinay Kumar S Jatteppanavar, Nithin K, Shashidhar B Honnalli, Venkatesh P
Mobile Operated Landrover Using DTMF Technology
K. Poojitha, S.M. Zaheer, G. Bhavani Shankar, P. Manikanta, S. Charan, E. Vinod
Hybrid, Low Cost, Sensor Based Smart Lighting for Rural Areas
Vinutharani A, C.K Vanamala
Health Care Analytics with Hadoop Big Data Processing
V. Kavitha, S. Kannudurai
A Multi-Factor Authentication Scheme Using Attributed Access Control and Message Context
Ayman A.Rahim A.Rahman
A Survey on Isolated Assamese words spoken by Male and Female speakers
Mr. Adarsh Pradhan, Antara Chowdhury
Smart Chemical Plant Control System
M. Rakshitha, T. Kousika, M. Kishore, R. Revathi, V. Ramya
A Comparative Study of DC Motor for Optimal Performance Using LAG Compensator and PID Controller Implemented by MATLAB
Someshwar Dutt Pathak, V.K. Tripathi
Genuine and Incognito Data Sharing with Forward Security
Dr Mohammed Abdul Waheed, Maheshwari Rathod
Credit Card Fraud Detection Using Hybrid approach
Siddhi Dave, Vidhi Sheth, Jay Vala
Result Set On Reconsideration By Weakly Labeled Digital Human Face Images
Dhokchaule Sagar, Patare Swati, Patare Rushikesh, Makahre Priyanka
Obfuscation as a Security Measure in Cloud Computing
Hitendra, Dr. Sandhya Tarar
Design and Analysis of Clock Recovery Circuit in 45nm Technology
Abhinav Singh, Ambikabathi Bakiya
Hybrid Data Forwarding Strategies for Distance – Bounded Routing Protocol in Vehicular Ad-Hoc Network (VANet)
Pooja Polshetwar, V.Padmavathi
Auto Irrigate Based on The Need and Collect Irrigation Data for Data Mining Application
Vikas Gowda K S, Jagadisha N
Assuring Confidentiality with Minimum Data Redundancy in Hybrid Cloud
Mr R. V. Argiddi, Ms Prachi Sontakke
A Review On Robust Digital Watermarking for Coloured Images using SVD and DWT Technique
Priyanka Shah
A Survey Paper on Leach Routing Protocol and Its Variants in Wireless Sensor Network
Vijay kumari, Sunil nandal
Securing Secret Messages: A Review
Anil C., Anuradha S., Arpita V. Murthy, Sridevi S., Guruprasad M. Bhat
Automated Traffic Signals: A Review
Nikhila R., Lekhashree K., Koushik M., Abhishek K.A., Madhukar M
Implementation Diversity and Partial Connection of Routers in Application –Specific Network-On-Chip Synthesis
Komala M, Prathiba.B
An Overview of Transformation Based Remapping and Parallelism for high utilization and energy efficiency in CGRAs
Hema K. Reddy, P. K. Agrawal, Gaurav J. Sawale
Data Mining Technique to Understand Students Learning Experience
Meenakshi Das , Pinky Saikia Dutta
Processing of Real Time Big Data for Machine Learning
Namrata Gawande, Ramdas Gawande
Integrity Auditing and Secure Deduplicating the Data on Cloud Storage
Mr. Lohith Kumar K K, Mr. Ashwin Kumar M
Intrusion detection system to provide security in a network against denial of service (dos) attacks
Amogh Mahesh, Nikhil M,SathyaPramod D S, Ajith L, Neelaja K
Continuous Tense Repetition Detection System
Dr.Shubhangi D C, Bushra Jabeen
Cloud Data Encryption Using RSA,Enabling Multi-Keyword Ranked Search and Achieving Privacy Requirements
Akshatha MS, Renita Tellis
Location Based Smart Services
Neha Bhagwat, Samiksha Bhat, Tejas Shah, Umakant Mali
A Review on Rank Image Tags Using Image Annotation
Shilpa Shree. B, Dr.Chethan H.K
Authorized Data Availability with Secure Deduplication Framework using Hybrid Cloud
Ms. Rajani Sajjan, Ms. Gayatri Chavan, Dr. Vijay Ghorpade
A Web Usage Mined and Web Structured Enriched Web-Page Recommendation Model
Anura Khede, J S Raikwal
Proficient and Amplified Image Revival via Visual immersion and Saliency Ingredient
Mr. Kumkar J.D, Prof. Kapil Vyas
Smart Home Control and Monitor System Using Power of IoT’s
Abhijeet Rajurkar, Onkar Shinde, Vinayak Shinde, Bhushan Waghmode
High Dimensional Object Analysis Using Rough-Set Theory and Grey Relational Clustering Algorithm
Prashant Verma, Yogendra Kumar Jain
Noise Analysis of Common-Drain Amplifier using Stochastic Differential Equation
Dushyant Kumar Shukla
A Query by Example Approach for Retrieving 3D Images Based On Their Visual Similarity
Ms. Meenakshi Srivastava
Clarifying Indexed Lists From Web Databases.
Mr.Jamdar M.P, Prof. Bere S.S.
Performance Evaluation of Spontaneous Wireless Ad Hoc Network
Swapnali D Patil, V.N.Nitnaware
Development of End to End Triage Automation Workflow Tool for Testing
Vidyashree M V, Dr. H D Phaneendra
A study on increasing Wireless Mesh Network performance by routing in advance using cross layer design
Ahmed Alahdal, Dr.G.N.Shinde
Implementation of Page Object Model in Selenium Automation
Nishmitha G.C , Dr. H.D. Phaneendra
Removing Photography Artifacts Using Flash & No-flash Image Pairs
Dr. Prashant R. Deshmukh, Ankita R. Borkar
A Short Survey on Cover Objects for Hidden Communications
Vidya, Abhishek Kajal
Computing Shortest Path for Graph Using FEM Framework
Piyush Kulkarni, Kapil Vyas
An Advanced Technique of Image Matching Using SIFT and SURF
Preeti Mandle, Bharat Pahadiya
Dynamic Backlight Scaling Optimization
P.P.Waghralkar, Suyog Nawale, Jaynish Patil, Pradip Supekar, Harish Karad
Fuzzy Logic in Software Effort Estimation: An Exploration
Archana Srivastava
Image Edge Unmasking by Applying Renovated Ant Colony Optimization Technique
Payal Hooda, Ms Pooja Ahlawat
Denoising of Image Using The LPG-PCA
Dipali D. Sathe, Prof. Dr. K.N. Barbole
Weather Prediction Based on Decision Tree Algorithm Using Data Mining Techniques
Siddharth S. Bhatkande, Roopa G. Hubballi
Word Wise Script Identification in Indian Context
Sugaladevi Choukimath, V S Malemath, Suneel C Shinde
Personalized Recommendation System Using Social Networking and User Interest
Mr. Suryawanshi R. K, Prof. Amrit Priydarshi
A systematic review of Image Based Attendance Analysis
Ivan Bisengimana, Dr. N.J Uke
Real Time Password Authentication System for ATM
Prof.Dr. G.M. Phade, Miss. Achuki Saini, Mr. Fazal Shaikh, Mr. Deepak Sharma
Recipe Recommender Using Hadoop and Collaborative Filtering
RohitMundada, V. S. Malemath
A Case Study of Three Drum Parameter Control in Boiler Using Discrete PID Controller Based on Simulation
Ram Kishan Raikwar, V. K Tripathi
Overview of Microstrip Line Phase Shifter
Arati Arun Bhonkar, Dr. Udaysinh Sutar
Skin Color Segmentation based Face Detection using Multi-Color Space
Rosali Mohanty, M.V Raghunadh
U-shaped Dual-band Microstrip Antenna for WLAN and UWB Applications
Nirali R. Patel, Prof. Mayank A. Ardeshna
Mobile Application for Monitoring Inefficient and Unsafe Driving Behaviour
Onkar Pathare, Navit Dhande, Dipak Shinde, Roshan Pa
Segmentation of Metastasis Brain Images Using Wavelet Transform Based Hybrid Mean Shift Clustering and Region Split Algorithm
P Pedda Sadhu Naik, Dr. T. Venu Gopal
Cloud Based Secured Multi Keyword Ranked Search for Multi-Ownered
Ms. Vanita Gadekar , Dr.Baisa Gunjal
User-Configuration Universal Windows Platform SCADA System Base on I2c Bus Communication
Nahedh lafta obaid, M.Usha
Paradigm Shift of Big-Data Application in Cloud Computing
Ms. Preeti Narooka, Dr. Sunita Chaodhary
Emerging of New Service Oriented Approach Based on Internet of Things
Vedang Ratan Vatsa, Ankit Punia, Deepak Saini
Industrial Market Place Survey and Analytics on Internet of Things
Amol Dande, Ass. Prof. Shaffi K. Pathan
Feature Extraction Techniques for Image Retrieval Using Data Mining and Image Processing Techniques
Preeti Chouhan, Mukesh Tiwari
A Survey of Intelligent Question Answering System Using NLP and Information Retrieval Techniques
Deepa Yogish, Prof. Manjunath T N, Prof. Ravindra S Hegadi
A Review on Remotely Monitoring a Car to Improve its Occupant Safety
Rohan R. Patil, Makarand N. Kakatkar
A Review: Remote Patient Monitoring System
Amol Wanjari, Madan Mali
Enhanced key-generation algorithm using MRMCTT in Data encryption standard algorithm
Bhawana Singh, Rishi Sharma, Kamal Kant Verma, Satendar Kumar
Automatic Ambulance Rescue System
Miss. Bageshree V. Wakhare, Dr. S.R.Ganorkar
Dual Mode Lawn Mower using Sensors and GSM
Asif Iqbal Mulla, Sushanth K J, Mranila P, Mohammed Habib Shaikh, Mohammed Swalin, Mohammed Asfar, Mohammed Yunus Ugrani
A Comparison Between Classification Algorithms on Different Datasets Methodologies using Rapidminer
Ashmeet Singh, R Sathyaraj
Power optimized modified algorithm to increase Network capacity in wireless communications
Jawaharin Basha,Dr. Shah Aqueel Ahmed, Dr.Syed Abdul Sattar
Comparison Between Voltage Domain And Time Domain Adcs-A Review
Deepali D Toraskar , Mahantesh P Mattada, Hansraj Guhilot
Privacy Concealment and Data Security over Outsourced Cloud Environments
Sunit Ranjan Poddar, Ameya Ravindra Sawant, Diksha Pawankumar Jangid, Sanika Sarang Kamtekar, Prof. Mandar Mokashi
echildcare: Innovative SMS and Web-based Alert System to Improve Children’s Health
Atul Kumar Mishra, Parbhat Puri, Anuj Mahajan
Rugged Autonomous Unmanned Ground Vehicle for Precision Agriculture Working Based on Color Navigation Algorithm using Raspberry Pi2
G. Pradeep Kumar, S. Shobana, P. Uma sankari, D. Devamalini, J. Dhanalakshmi
Achieving Trust and Survivability for Mission Effectiveness in Tactical Network using CP-ABE
P. Rajapandian, C. Maleappane Lawrence, G. Siva Kumar
Twin Encryption System: Approach to Self-Changing Encryption and Decryption Key
Suhail Sayeed Bukhari, Meru Prabhat
Detecting and Preventing Black hole and Grey Hole Attacks for Trust Management in Wireless Sensor Networks: A Survey
Mitali Khandelwal, Sachin Upadhyay
Implementation of Diabetes Monitoring System Based on EHR Data Analysis
Sachin B S, Prema N S, Suraj L Kalro, Harshitha, Ranjitha Raj K N
Wireless Signal Transmission using an Android Mobile and FPGA
Prasanna S. Bhoite, Madan B. Mali
Review on Customization of Document Using Content and Query Based Annotation
Kalyani Kute, Prof. R. P. Dahake
Comparison Of Architectures For The Numerically Controlled Oscillator
Shilpa N. K, S. Sowndeswari, C.V. Ravishankar
Improved Authentication System for Android Smartphone
Shrabani Medhi, Pinky Saikia Dutta
Secure Large File Deduplication Technique Over Distributed Cloud Environment To Store Anonymous User Data
Mr. Mahesh Bhaskar Gunjal, Prof. Rahul L. Paikrao
Implementation of Distributed Programming Environment to support Distributed Object Over Internet
Priyanka Patil, Vidhi Vadgama, Dushali Khadke, Manoj Ubhale
A Route Discovery Scheme For Inter Cluster Routing With Novel Cluster Head Selection
Bharath L J, Komala M
Health-Care Proposal Tool using Big Data Techniques
Utkarsha B, Priyanka C, Dishari S, Aneri P
A Survey on Telemedicine Application in an Embedded System
Swapnila Shinde, R.S. Nipanikar
Smart Power Management System using Wireless Sensor Network
Ms. Rubana P. Shaikh, Dr. R. R. Dube
Survey on Data Aggregation Techniques
Prasad B. Thube, Sachin B. Takale
Smart Card based e-Public Distribution System
Sana A. Qader Perampalli, Dr. R.R. Dube
Advancement in Electric Meter Readings
Prof. Mrs. K. A. Khedikar, Ms. Minakshi Shriniwas Talkokul, Ms. Rohini Venugopal Panicker
An Image and Video Recapture Detection using Acquisition Chains of Edge Profiles
Mr. Vinayak K. Shingote, Prof. Ashish Kumar
A Study on Haze Removal Techniques for Image Processing
Dr. Vinod Shokeen, Sumit Bhardwaj, Neeraj Mishra
Homomorpic Hybrid Encryption for Cloud Computing
Daniya Rao, Deepak Painuli, Kamal Kant Verma
State-of-the-Art Security System With Image Capture and Trigger Mechanism in a Home Environment
Marthy Siva Sai Krishna, G Venkata Pavan Rama Sai Bharadwaj, J.S.H Chakravarthy
Secure Protocol for Replay and Jamming Attack Detection in Wireless Sensor Network
Gaurav S. Deore, Chandrashekhar S. Khasnis, Mrs. U.H.Wanaskar
ANT Colony Based Energy Efficient Multipath Routing
Jaideep Atri, Shuchita Upadhyaya
A Review on Stereo Image Matching Using, Corner Detection Algorithm
Komal Shrirang Changan, Prof. P.G. Chilveri
Performance Analysis of Transparent Relays in 802.16j MMR Network by Implementing Relay Concept using C++ in QualNet Simulator
Bramesh S M, Pranit Raj Verma, Vivek Kumar Vikky, Vivek Kumar Anand
Analyzing network traffic to detect anomaly based intrusion using SVM.
Bhopale Nandkishor G., Sangve Sunil S
A Hierarchical Approach for Optic Disc Detection Using Wavelet Decomposition and Shape Based Pattern Classification
Sharath Kumar P N, Deepak R U, Midhun Raj R S, Dr. Anuja Sathar, Dr. Sahasranamam V, Rajesh Kumar R
Performance Analysis of Solid State Drives
Chhatragun L. Shinde, Shefali P. Sonavane
Road Map Extraction from Satellite Images Using Connected Component Approach
Mudit Shrivastava, Dr. D. M. Bhalerao
Optimization of GRP Protocol in IEEE 802.11g MANET for variable neighbor expiry time
Ruchi Bankar, Anu Sheetal, Harsukhpreet Singh
Security Based Hostile User Detection in Cognitive Radio Networks
Reshma Rajan, Syamesh K G, Anjali Raj, Jeethumol K Joy
Classification of Pseudo Random Numbers Using Support Vector Machine Classifier
Preeti Meena, Malti Bansal
Intelligent Heart Attack Prediction System Using Big Data
Prof. U.H. Wanaskar, Prajakta Ghadge, Vrushali Girmev, Prajakta Deshmukh, Kajal Kokane
Iris Recognition using Gabor Filters Optimized by Genetic Algorithm and Particle Swarm Optimization
Rechu Sharma, Vaneet Mohan
Fault Detection Based on Round Trip Time in WSNs and Trust Value Based Correction
Jeethumol K Joy, Syamesh K G, Reshma Rajan, Saneesh P S
Road Quality & Valley Complexity Analysis Using Android Application
Prof. P. S. Toke, Shweta Maheshwari, Aishwarya Asawale, Aishwarya Dhamale, Nigel Paul
Study of Energy Conservation and Energy Management Techniques to Be Adopted in YIC Campus
Fahad Albukhari
Analysis of Various Issues in Non-Local Means Image Denoising Algorithm
Sonika, Shalini Aggarwal, Pardeep kumar
Effective Phrase-Based Document Indexing for Web Document Clustering
Mr. Patil A.A, Prof. Naidu G.J
Analysis of Search Engine Optimization Algorithm
Mehzabul Hoque Nahid
Solar-Panel Receiver design for Optical Wireless Communications and Simultaneous Energy Harvesting
Sarika Shinde, Prof. Shailesh Jadhav
Evaluation of single underwater image enhancement with CLAHE
Jasneet kaur Babool, Satbir Singh
Framework for Cognitive Radio Systems
Mr. Abdul H. Ansari, Mr Santosh M Tambe
Dynamic Migration of Content Distribution Services for Minimum Cost using AES
Prof. Hema Kumbhar, Nishigandha Rajhans, Lalita Sonawane, Vedika Dhage, Nitesh Vanarase
A Survey on Automatic Detection of Diabetic Retinopathy Exudates from Retinal Fundus Images
Falguni Thakkar, Rajvi Parikh
A Study on Secret Image Hiding in Diverse Color Spaces
G. Germine Mary, M. Mary Shanthi Rani
Carbon: The Futuristic Semiconductor
Priya Chitkara, Deepika Sharma, Dr. Deep Kamal Kaur Randhawa
Personal Cloudlets: Implementing a User-Centric Data Store with Privacy Aware Access Control for Cloud-based Data Platforms
Nauman Birwadkar, Mrs. M.P. Deshmukh, Apoorva Arbooj, Suraj Todkari, Priya Agarwal
System for Reading the Product Labels to Help Blind Persons
Payal V. Gulhane, Vrushali G. Raut
Enhancing Text Mining Using Side Information
Prof. P.S. Toke, Rajat Mutha, Omkar Naidu, Juilee Kulkarni
Adaptive Learning: A Survey
Ms Kavita K Dhalape, Prof. Sachin M Bojewar
Categorization of Web Services Based On QoS Constraint Using Decision Tree Classifier
J. Ghayathri, Dr. S. Pannir Selvam
AgroNutri Android Application
S. Srija, R. Geetha Chanda, S.Lavanya, Dr. M. Kalpana Ph.D
Remote Temperature Monitoring System Using ARM, Arduino and ZigBee
Vijay S. Kale, Madan B. Matsagar, Avinash D. Sonawane, Chandrakant L. Ambekar
Moving Object Detection Based on Background Subtraction & Frame Differencing Technique
Md. Zakir Hussain, Mrs. Ayesha Naaz, Mohd Nayeem Uddin
Design and Implementation of a novel FIR filter based on MCM for improved Power and Delay Efficiency
Puja Sutar, Ramya S.K
Reactor Automation
Priyanka M. Ghorpade, Prof.N.A.Dawande, Prof.A.A.Mulajkar
Survey on Efficient Authentication for Mobile and Pervasive Computing
Mukesh M. Patil, Ass. Prof. Nalini A. Mhetre
ALO Based Robust Cryptographic Scheme
B. Hitesh Linganna, G. Dedeepya, Sk. Ayesha Sultana, T. V. V. Satyanarayana
Image Enhancement for Medical Images Using Improved HSF
Anuradha, Vikram Mutneja
An Overview on Wireless Sensor Networks Technology and Simulation Software’s
Vijay S. Kale, Rohit D. Kulkarni
Comparative Study of Various Task Scheduling Algorithms in Grid Computing
Er. Harkiran Kaur, Er. Mandeep Kaur
Performance Evaluation of Quality Enhancement Methods of Remote Sensing Images by Object Oriented Shadow Detection and Removal
Leethu Lakshmi A L, Jasmine George
Efficient Quality Analysis and Enhancement of MRI Image Using Pre-Processing Techniques
Anusree J, R.S. Moni
Emotion Detection Analysis through Tone of User: A Survey
Ms. Ankita Dutta Chowdhuri, Prof. Sachin Bojewar
Physical Access Control Based on Biometrics and GSM
Diptadeep Addy, Poulami Bala
Techniques to Identify Audio Recording Location
Kiran P Kamble, Manik K Chavan
Privacy Preserving in High Dimensional Data using Randomized and SVD algorithm
Tripti Singh Thakur, Dr. Abha choubey
A Home Security System Using Background Subtraction
Ranjana Thakuria, Hiranya Sarma, Dipankar Nath
Personalized Web Service Recommendation Based on User’s Location and User’s History
Ekta K. Chainani, Prof. Rajeshri R. Shelke
Review: Comparative Study of Gi-Fi Technology with Other Existing Technology
Umalaxmi Sawant, Prof. Shailesh Jadhav
Review on Wi-Vi Technology
Mayuri Dharma Shinde, Prof. Shailesh Jadhav
Cloud Computing Security Applied by Homomorphic Encryption
Santosh Kumar Singh, Dr. P.K. Manjhi, Dr. R.K. Tiwari
A Naïve Breadth First Search Approach Incorporating Parallel Processing Technique For Optimal Network Traversal
Laxmikant Revdikar, Ayush Mittal, Anuj Sharma, Dr. Sunanda Gupta
Message Transformation Designer for Messaging System Using Streaming Transformation for XML (STX)
Ms Rajani M V, Mr Annappa Swamy D R
Face Extraction, Feature Extraction and EDGESIN Face Beautification
Ms. Priyanka Mehra, Prof. A. S. Deshpande
Satellite Image Quality Improvement Using Wavelet Based Enhancement Method
Gauri D. Rode, Prof. V. K. Shandilya
Cell Co-ordination Using Beam forming and Parameters of MIMO
Miss Madhavi Vilas More, Mr. V.D.Shinde
Review on Lane Departure Detection Methods
Geetanjali S. Jadhav , Prof. P. V. Mulmule
A Fast Generative-Judicial Based Hashing Method Using Surf Descriptor
C. Maleappane Lawrence, M. Shanmugham, D. Sabarinathan, T. Banumathi
Surveillance Using CAMshift Tracking
Prof. S.O. Dahad , Rupali R Sonawane
A Practical Approach of Parallel Thinning Algorithm on Numeral Patterns Using Matlab Simulation
Komal Bishnoi, Preeti Gupta
Study of Improved Parallel Thinning Algorithm for Numeral Patterns: A Review
Komal Bishnoi, Preeti Gupta
Significant Big Data Interpretation Using SAMR Scheduling Algorithm
M. Suriya, S. Jeevitha
Buffer Behaviour in Massive MIMO Systems
Ranko Vojinović, Svetlana Furtula
Determination of Electrical and Optical Design Parameters of High-Efficiency OLED
Ipek Atik, O. Faruk Farsakoglu, Nurdal Watsuji , Saban Yilmaz
Mitigation of Cooperative Black Hole Attack and Rushing Attack in MANETS
Gowri S, M/S. Lipsa Dash
A Systematic Review on Existing Data Dictionary
Anshul Mishra, Dr. Devendra Agarwal, Dr. M. H. Khan
Power Quality Enhancement using Distributed Generation Inverters with Active Power Control
N. Rajesh Kumar Gowd, M.MD. Sayeedi Baig, V. Naresh, S. Baba Fakruddin, M. Lokanadha, M. Meena
Finding Secure and Reliable Routing in Densely Distributed Wireless Sensor Networks
Sushmitha S.R, Mrs R Anitha
Revolution Technique To Enhance Cognition of Sensor Nodes in ZigBee Network with Advertisement Packets
Mr. Ravi Kumar Singh, Prof. Amit Saxena
Performance of Spatial Multiplexing by Transmit Antenna Selection using Singular Value Decomposition
Saurabh Kumar Srivastava, Prof. Ashok Kumar, Arjun Kumar
Wireless Mesh Networking Routing Algorithm Based on Inference Model
Monika, Dr. Yashpal Singh
Privacy-Preserving Authentication in Shared Authority Based Cloud Data
Mr. Tamboli Sameer Iqbal, Prof. Amrit Priyadarshi
Intelligent Knowledge Extractor
Pratiksha Patil, Prof. Dr. A.D. Thakare, Kanchan Pawar, Poonam Kshirsagar, Rupa Solapure
To implement CBPGA for Simplified Large Data on Hadoop Map Reduce
Shalini Jain, Prof. Saurabh Kapoor
Survey: Restricted Domain Question Answering System Using Semantic
Aakriti Gupta, Mr. Pranay Chauhan
A Case Study of DC Motor Speed Control with PID Controller through MAT LAB
Shatrughana Prakash Yadav, V.K. Tripathi
Data Anonymization Technique for Privacy Preservation Using MapReduce Framework
Nagajothi .S, Raj Kumar .N
Performance Study of Reed Solomon Code with Effective Error correction and Minimum Area Constraint on FPGA
K. Kumar, A. Lakshminarayanan, V. Krishnakumar, K. Shajudeen
Efficient Way for Multimedia Streaming in Cluster Based Cognitive Radio over Wireless Sensor Network
Ashwini D.R, Dr Nagamani K
Information Cryptical Steganalysis Detection Technique by PSNR and RGB Intensity
Md. Sohel Ansari , Prof. Deepak Jain
User Privacy Preservation in Personalised Web Search
Siva.B, Merlin Shoerio
New Graphic Password Scheme Containing Questions-Background-Pattern and Implementation
Bulganmaa Togookhuu
Abstract
Enhanced Audio Steganography using RSA Cryptography and LSB algorithm
Prof. Pankaj Waghralkar, Ms.Durga Solanki, Ms.Sayali Shilamkar, Ms.Priyanka Belekar, Ms.Pooja Chandan
DOI: 10.17148/IJARCCE.2016.5502
Abstract: Steganography relies on hiding covert message in unsuspected multimedia data and is generally used in secret communication between acknowledged parties. Steganography works by replacing bits of useless or unused data in regular computer files (such as graphics, sound, text, HTML, or even floppy disks) with bits of different, invisible information. This hidden information can be plain text, cipher text, or even images. Audio steganography is a young branch of this discipline. An encoding mechanism is used for embedding the message into the audio file. In this paper we used the 4th Bit LSB method to do it. The quality of the audio file after encoding remains unaffected. A public key cryptographic algorithm, RSA is also used to ensure greater security
Keywords: Steganography, Audio Data Hiding, LSB Algorithm, Cryptography, RSA, EASS.
Abstract
Signature Recognition and Verification System via Neural Network
Sandhya Katiyar, Shubham Agarwal, Shubham Kaushal, Himanshu Vats
DOI: 10.17148/IJARCCE.2016.5503
Abstract: As every person has a unique signature with its specific behavioural property ,signatures are widely accepted bio-metric for authentication and identification of a person , so it is very much necessary to prove the authenticity of signature itself. A huge increase in forgery cases relative to signatures induced a need of efficient �Signature Verification System�. These systems can be online or offline based on type of input taken by the system. This paper represents a brief review on various approaches used in signature verification systems. Before extracting different features from the signature, some pre-processing of the signature is done. In pre-processing, the signature is colour normalized and scaled into a standard format. The algorithm is based on extracting global features like Area, Height, and Width etc. Euclidean Distance model is used while finding match between test signature and signature stored in the database. The algorithm gives good recognition rate. If a query signature is in the acceptance range then it is an authenticated signature else, it is a forged signature.
Keywords: Signature Verification, Forgery Detection, Global Features, Euclidean Distance and Verification Technique, FAR, FRR.
Abstract
Brain Wave Sensor Controlled Mobile Robot Based on EEG
S.Alagammal, M.K.Nagarajan
DOI: 10.17148/IJARCCE.2016.5504
Abstract: This project talked about around a mind controlled Mobile Robot taking into account EEG BCIs are frameworks that can avoid ordinary channels of correspondence (i.e., muscles and observation) to give direct connection and control between the human mind and physical tools by decode various examples of mind action into order little by little. With these charges can be controlled a portable robot. Here, we are dissecting the mind wave signals. Human mind comprises of a huge number of interconnected neurons. The examples of cooperation between these neurons are spoken to as thoughts and excited states. As indicated by the human considerations, this example will be changing which thusly create distinctive electrical waves. A muscle constriction will likewise produce an exceptional electrical sign. All these electrical waves will be detected by the mind wave sensor and it will change over the information into packages and transmit through Bluetooth medium. At that point the directions will send to the flexible robot . This project worked with human mind thought and control flexible robot depends on changing the muscle development with flickering.
Keywords: BCI(Brian Computer Interface),EEG(Electroencephalogram),Brain Wave Sensor, Mobile Robot.
Abstract
Mind Controlled Alarm
Vipin Das, Ancy Mathai, JaisyP Jacob, Maria Abraham, Amal Kurian Shajan, Anandu Ashokan
DOI: 10.17148/IJARCCE.2016.5505
Abstract: In a human brain there are thousands of neurons that interact with each other producing electrical signals. These continuous signals produce a wave which can be measured by using EEG. Concentration value for processing can be obtained from EEG sensor using the arduino micro controller. The main focus of our system is to provide an application based on mind control to people who are paralyzed from neck down and cannot speak and thus catering to their basic needs based on requirement.
Keywords: Electroencephalogram, Arduino, Accelerometer, GSM.
Abstract
Over View of Cryptographic Algorithms for Information Security
Dr.D.Vimal Kumar, Mrs.J.Divya jose
DOI: 10.17148/IJARCCE.2016.5506
Abstract: It is used to ensure that the contents of a message are confidentially transmitted and would not be altered. Network security is most vital component of information security as it refer to all hardware and software function, characteristic, feature, operational procedures, accountability, access control, and administrative and management policy. Cryptography is central to IT security challenges, since it underpins privacy, confidentiality and identity, which to gather provide the fundamental for trusted e-commence and secure communication. There is a board range of Cryptographic algorithms that are used for securing network and presently continuous researcher on the new cryptography algorithm are going on for evolving more advanced techniques for secure communication.
Keywords: Cryptography, plain text, cipher text, encryption, decryption, network security.
Abstract
GIS Based Tourist Management System
Purva Sakharkar, Shailesh Fasale, Pawan Soni, Prof.Ashwini Pansare
DOI: 10.17148/IJARCCE.2016.5507
Abstract: Nowadays, time is considered as valuable as gold. Once time is used sensibly, access to a lot of information is possible. People who want to go sightseeing in different places as tourists may need to have some information about those places. Determining the shortest routes to the tourist places and natural beauties from their accommodation will be both timesaving and economical. Geographical Information System (GIS) technologies provide us with these possibilities. In this study, GIS design and network analysis were carried out by taking advantages of GIS possibilities for tourism. It is likely to carry out some queries by means of Network Analyst in GIS. In this study, results of these directed towards tourism will be presented. This study was carried out in Mumbai district, where there are a lot of historical and tourist places.
Keywords: Android SDK, GIS, Maps, Navigation, Tourist spots.
Abstract
Enhanced Vision of HAZY Images Using Improved Depth Estimation and Color Analysis
Priyanka P. Bhadane, Prof. Santosh G. Bari, Prof.Nitin Dawande
DOI: 10.17148/IJARCCE.2016.5508
Abstract: This paper presents visibility restoration of single hazy images using color analysis and depth estimation with enhanced refined transmission technique. Visibility of outdoor images is often degraded by turbid mediums in poor weather, such as haze, fog, sandstorms, and smoke. Optically, poor visibility in digital images is due to the substantial presence of different atmospheric particles that absorb and scatter light between the digital camera and the captured object. The hazy removal technique divided into three categories such additional information approaches, multiple image approaches, single-image approaches. The first two methods are expense one and high computational complexity. Recently single image approach is used for this dehazing process because of its flexibility and low cost. The restoration model is proposed with utilization of median filter and adaptive gamma correction technique and dark channel prior method. This approach overcomes the problems such as color distortion, artifacts and insufficient depth information. The dark channel prior is to estimate scene depth in a single image and it is estimated through get at least one color channel with very low intensity value regard to the patches of an image. The transmission map will be estimated through atmospheric light estimation. The median filter and adaptive gamma correction are used for enhancing transmission to avoid halo effect problem. Then visibility restoration module utilizes average color difference values and enhanced transmission to restore an image with better quality. Finally the simulated result shows that obtained restored image has better contrast and hazy free scene objects under various weather conditions and the performance measures such as Gaussian distribution function and measure of enhancement are evaluated.
Keywords: Dark Channel Prior, Contrast Enhancement Adaptive intensity transfer function, Adaptive gamma correction, color analysis, visibility image restoration.
Abstract
Review on Video Watermarking Techniques
Miss. Shital Divekar, Prof. Nitin Dawande, Prof. Suresh Rode
DOI: 10.17148/IJARCCE.2016.5509
Abstract: Due to increasing popularity of the internet use of digital multimedia is increased more rapidly. Many websites allows the user to upload and share multimedia objects such as audio, images, and videos. Without adding security information it is impossible to automatically verify the authenticity of the uploaded multimedia objects so the digital watermarking is used to protect the information against the illegal changes in the form of images, videos and audios. A digital watermark is the process of embedding watermark in a noise-tolerant signal such as an audio, video or image data used to identify ownership of the copyright of such signal. The robustness, fidelity, capacity are essential requirements of watermarking techniques so that they can handle several types of image artefacts. This paper gives survey of different watermarking techniques for protecting digital contents.
Keywords: DCT, Watermark, hash value, QIM, Tamper Detection, DWT, RSA, PSNR.
Abstract
Detection of Diabetic Retinopathy Based on Modified Kernel FUZZY C-Means Clustering
J.Santhiya, D.Sommasundharam
DOI: 10.17148/IJARCCE.2016.5510
Abstract: Diabetic retinopathy, also known as diabetic eye diseases which causes severe threat on sight. The detection of such abnormalities in the retina is known as diabetic retinopathy. It might reach to blindness in working age people. Many patients make diagnosis only after the vision is lost and vision loss is a late symptom of diabetic eye disease. By comparing retinal blood vessels with retinal vascular structures in retinal images, we can detect diabetes in early stages. In this paper, vessel segmentation is used to extract retinal image vessels. Morphological processing and modified kernel fuzzy c-means clustering have been used to segment the retinal blood vessels. Smoothing operation is performed to overwhelm the background information using mathematical morphology. After mathematical morphology, the enhanced image is segmented using modified kernel fuzzy c-means clustering algorithm. The proposed methodology is more effective than k- means clustering as it achieved accuracy 96.25%.
Keywords: Blood vessel extraction; Diabetic retinopathy; Modified kernel fuzzy c-means clustering; Mathematical morphology; Retinal image.
Abstract
Virtual Mouse
Pranoti Vaidya, Pooja pangavhane, Jyoti Deore, Rakhi Thakare
DOI: 10.17148/IJARCCE.2016.5511
Abstract: Nowadays most of the mobile devices are using a touch screen technology. However, this technology is still not cheap enough to be used in desktop systems. Creating a virtual human computer interaction device such as mouse using a webcam and computer vision techniques can be an alternative way for the touch screen. In this study, finger tracking based a virtual mouse application has been designed and implemented using a regular webcam. The motivation was to create an object tracking application to interact with the computer, and develop a virtual human computer interaction device.
Keywords: Click event web camera, colour events, HCI, Ubiquitous Computing, Background Subtraction, Skin Detection, HSV Colour Model.
Abstract
Prediction of User Browsing Behavior Using Web Log Data
Abhishek Chauhan, Dr.Sandhya Tarar
DOI: 10.17148/IJARCCE.2016.5512
Abstract: Web usage mining is one of the areas of data mining where it not only deals with the analysis of web data but also discovers frequent patterns from them to improve the web based applications. It consists of three phases preprocessing, pattern discovery and pattern analysis. After the completion of these phases, the user can find interesting and frequent patterns whatever he/she wants to be need with the use of these information for specific needs. In other words, one can say that it deals with the extracting of useful information and find interesting usage patterns from web server, proxy server or web clients. In this paper, combined approach of Ant Colony Optimization and DBSCAN is used to get effective Association Rules to predict the customer�s browsing behavior .Moreover, the aim is to find the user�s behavior with less error rate in prediction.
Keywords: Web mining, Web log, Pattern discovery, Clustering, User�s browsing behavior.
Abstract
Intelligent Toll Path System Using GPS and GSM
Anandaraj S, Mohana Arasi M
DOI: 10.17148/IJARCCE.2016.5513
Abstract: Transportation has emerged as a dominant part of India. Toll plazas play a crucial role in maintaining the road transportation. At present, manual toll collection is most widely used collection method in India. It significantly requires a toll collector or attendant. Due to manual intervention, the processing time at toll plazas is highest. The project has been designed for the automation in toll tax payment using GPS and GSM Technology. Automation of toll plaza has been experimented using combination of PIC Microcontroller, IR transmitter and receiver, Global positioning system, Global system for Mobile. Implementation of automation in toll plaza enhances the monitoring of vehicles that are travelling in predestined routes. This project aims in designing a system, which automatically identifies the vehicle that advance towards the toll plazas and observes the vehicle number and the time of arrival. If matches exist between vehicle data and GPS data, then predetermined amount is automatically taken from the user account. It passes this information to avoid the Traffic congestion at toll plazas and helps in consuming less amount of fuel.
Keywords: IR Transceiver; Global System for Mobile Communication; Global Processing System; Programmable interface Controller 16f877a; Ignition Control;
Abstract
Maintaining Data Confidentiality Using Attribute Based Secret Sharing
Rohit Dokhe, Pooja Bathe, Apurv Kolte
DOI: 10.17148/IJARCCE.2016.5514
Abstract: Despite that existing data sharing systems in untrusted storage propose to encrypt data before sharing, the multiparty access control of encrypted data has become a challenging issue. In this, a secure data sharing based on cipher text-policy attribute-based proxy re-encryption and secret sharing. In order to protect user's sensitive data, this allows users to customize access policies of their data and then outsource encrypted data to the service provider. In this a multiparty access control model, which enables the disseminator to update the access policy of cipher text if their attributes satisfy the existing access policy. Further, a partial decryption construction in which the computation overhead of user is largely reduced by delegating most of the decryption operations to the service provider. It�s also provide check ability on the results returned from the service provider to guarantee the correctness of partial decrypted cipher text. Moreover, in this presents an efficient attribute revocation method that achieves both forward and backward secrecy. The security and performance analysis results indicate that is secure and efficient in untrusted storage.
Keywords: Encrypt, Cipher text, Policy, Re-encryption, Secret sharing.
Abstract
Avoiding Discontinuity In Vanet Using Store Carry Forward Approach
Sushant Nerkar ,Darpana Dakhode, Mohini Chaudhari
DOI: 10.17148/IJARCCE.2016.5515
Abstract: Vehicular ad hoc networks has focused mainly on efficient routing protocol design under conditions where there are relatively large numbers of closely spaced vehicles. A Vehicular Ad Hoc Network (VANET) may exhibit a bipolar behaviour, i.e., the network can either be fully connected or sparsely connected depending on the time of day. In sparse vehicular network there are lot of chances to drop the data packets. So there is necessary to avoid the discontinuity in sending the packets during the sparse vehicular network and depending on the scarcity of vehicles or the market penetration rate of cars using Dedicated Short Range Communication (DSRC) technology. For vehicular safety applications, an ad-hoc routing protocol will be needed like Ad Hoc On-Demand Distance Vector Routing (AODV). It is a challenge to use efficient routing protocols for vehicular ad hoc networks (VANETs) because of their highly dynamic properties an application of opportunistic routing, using a carry-and-forward scheme to solve the forwarding disconnection problem in sparse VANETs.
Keywords: Database Routing, vehicular ad hoc Networks, broadcasting, vehicle traffic modelling.
Abstract
Design of low power Universal Shift Register Using Pipe Logic flip flops
S.A.Sivakumar, R.Sowmya
DOI: 10.17148/IJARCCE.2016.5516
Abstract: Power consumption and area are the important parameters to be considered for designing low power applications. This paper proposes the design of low power universal shift register using pipe logic. Since flip flops are an inherent building block in universal shift register, various flip flops are surveyed and implemented in PIPO shift register. Flip flop using pipe logic is considered based on the comparison of power and area. Finally, a low power universal shift register is designed using pipe logic. The proposed USR is simulated with different clock frequencies ranging from 100 MHz to 500MHz. Simulation of these flip flops and the universal shift register is done using Tanner tool at 180nm technology. Further, the average power and the PDP are improved by 33% and 27% when compared with existing design respectively. So the proposed design is suitable for low power and high performance applications.
Keywords: Flip-flops, Shift register, power, delay, PDP.
Abstract
A Query Approach to Social Influence Maximization
Dr. Prof.A.NBanubakode, Swapnil Magar, HarshalKasle, Ajay Jaiswal, Jason Vijoy
DOI: 10.17148/IJARCCE.2016.5517
Abstract: Influence maximization is introduced to maximize the profit of viral marketing in social networks. Impact amplification is used to augment the benefit of viral promoting in informal organizations. The shortcoming of impact expansion is that it doesn't recognize particular clients from others, regardless of the possibility that a few things can be helpful for the particular clients. For such things, it is a superior system to concentrate on boosting the impact on the particular clients. In this paper, we detail an impact boost issue as question handling to recognize particular clients from others. We formulate an influence maximization problem as query processing to distinguish specific users from others. We show that the query processing problem is NP-hard and its objective function is submodular. We propose an expectation model for the value of the objective function and a fast greedy-based approximation method using the expectation model. For the expectation model, we investigate a relationship of paths between users. For the greedy method, we work out an efficient incremental updating of the marginal gain to our objective function. We propose a desire model for the estimation of the target capacity and a quick covetous based close estimation strategy utilizing the desire model. For the desire model, we explore a relationship of ways between clients. For the covetous technique, we work out a productive incremental overhauling of the negligible addition to our goal capacity. We lead trials to assess the proposed technique with genuine datasets, and contrast the outcomes and those of existing systems that are adjusted to the issue. From our trial results, the proposed strategy is no less than a request of extent speedier than the existing routines by and large while accomplishing high exactness.
Keywords: Graph algorithms, influence maximization, independent cascade model, social networks.
Abstract
Modern Web Apps using Full Stack Development and Containerization
Mrudula Deore, Mayuri Kambli, Chinmayi Kulkarni, Asst. Prof. Sunil Chaudhari
DOI: 10.17148/IJARCCE.2016.5518
Abstract: This paper presents a web application created using technologies like the MEAN stack, Docker, Amazon S3 and Amazon EC2. Where everyone is creating web applications using Java, JavaScript and HTML, MEAN is a fresh and emerging concept that helps building dynamic web applications using only JavaScript and HTML. Docker helps in binding all the dependencies of an application enabling you to build, ship and test applications easily. This paper weighs all the advantages provided by these technologies and presents an architecture formed by creating a Docker image of a MEAN web application which is deployed on EC2 server provided by Amazon.
Keywords: Web Application, MEAN Stack, Docker, AWS.
Abstract
Predict the Software Program Behavior using Code Change Impact Analysis Tool
Ashwini J. Patil, Prof.Netra Patil
DOI: 10.17148/IJARCCE.2016.5519
Abstract: There are large no�s of different Recommendation systems are proposed to enhance programmer efficiency by recommending different files to alter. These systems supply association laws in software alteration records. On the other hand, mining coarse-grained laws using only alter records generates recommendations follows with low accuracy, and capable to generate recommendations after a developer alters a file. In this paper, we have presented the code change impact analysis tool which recognizes different classes of requirements changes which has alike impact levels. By calculating the impact that requirement changes may have the causes of making a requirement alter can be evaluated to further requirement changes with admiration to the predicted attempt to execute the change. By considering the fact we are targeting this �Impact Analysis� tool which will assist software business to predict problems from the code that can occur after carrying out any enhancement. It uses classic data mining algorithms to predict the problems. And cluster algorithm is used to group these predicted problems. With this tool it can reduce maintenance effort and the risk of costly rework. Impact analysis information can be useful for scheduling changes, construction changes, accommodating certain types of software changes, and tracing during the effects of changes.
Keywords: Impact analysis, predict problem, requirement change.
Abstract
Review of Image Processing Techniques for Optic Cup and Optic Disc Segmentation for Glaucoma Detection
Pratibha Singh, Prof.Rakesh Kumar Singh, Pooja Gupta
DOI: 10.17148/IJARCCE.2016.5520
Abstract: The review paper describes various image processing techniques for optic cup and disc segmentation for automatic detection of glaucoma. Glaucoma is the second leading cause of blindness that can damage the eye�s optic nerve, resulting in loss of vision and thereby cause permanent blindness. This disease cannot be cured, hence detecting the disease in time is important. Current diagnosis of glaucoma relies upon examining retinal fundus image using image processing. Optic nerve head assessment in retinal fundus images is a promising method wherein optic cup and optic disc are segmented. The segmented optic disc and optic cup are then used to compute the Cup to Disc Ratio (CDR) for glaucoma screening.
Keywords: Fundus Image, Glaucoma, Optic nerve head, optic cup, optic disc, CDR.
Abstract
Reliable Hop-by-Hop Message Validation in Wireless Sensor Network using Cryptography based Network Model
Navyatha K P, Mrs. Sahanadevi K J
DOI: 10.17148/IJARCCE.2016.5521
Abstract: Message validation is one of the effective ways to thwart the threat of unauthenticated and unwanted messages that are communicated through Wireless Sensor Network (WSN). To overcome this problem, many workers have proposed various models using different techniques like key based cryptosystems using symmetric key or public key cryptosystem. However, most of these mechanisms have limitations due to their high computational and communication overhead, in addition to scalability problem and threat of node compromise. To address these challenges researchers introduced polynomial-based model, though these models also have inherited weakness of the polynomial. To provide a more robust and effective security measure, we are proposing a scalable validation mechanism based on the security model (SM). The proposed system permits any node to transmit unrestricted number of data without undergoing the threshold problem. Further the proposal enables message source privacy. Through simulation trails, it is proved that this system is more efficient than the polynomial based model in terms of computational and communication overhead under similar security stages with additional message source privacy.
Keywords: Cryptography, dataintegrity, Message validation, source privacy, WSN.
Abstract
Congestion Control in WBAN in the Field of Heterogeneous Network
Srinidhi .C, Mrs Mangala C N
DOI: 10.17148/IJARCCE.2016.5522
Abstract: The Wireless Sensor Network (WSN) technology plays a significant role in the present day applications considering energy, security, routing, load balancing, optimization etc. The application of Wireless Body Area Network (WBAN) in recent times has significantly increased the potential of remote healthcare monitoring systems. However, the issues considering the congestion control and the performance of WBAN with respect to energy is still persistent. This paper intends to develop a heterogeneous WBAN network in order to perform congestion control and evaluate the energy efficiency. The control parameters such as distance and the traffic load were also computed which resulted in a more robust analysis on congestion control. Graphs of Cumulative Distribution Function (CDF) vs. traffic load and Probability Density function (PDF) vs. traffic load were given which shows an improved rate in the flow of traffic with respect to congestion control. Evaluation with respect to energy consumption with respect to WBAN nodes is also performed.
Keywords: WSN, WBAN, congestion control, energy efficiency.
Abstract
Observation and Control of Crops over Internet
Nitish Bharti, Shalabh Bade, Vipul Badge, Mr. Manish Narkhede
DOI: 10.17148/IJARCCE.2016.5523
Abstract: India is known as the agricultural country as the main occupation in India is Farming. India is also known for the export of the spices, jute, raw wool and tea. India nearly produces half of the tea combining the whole world�s production.The main and important thing which causes this massive production is the Land quality and features of Indian soil. To maintain this overwhelming production rate the qualities of soil must be preserved at a functional level. The factors that needed to be controlled are listed below and with the help of sensors we are able to measure the different parameters related to soil. Factors affecting productivity of soil are Moisture, Humidity, Temperature and salinity of the soil. By measuring the parameters we can control them to a set point value by limiting the excess and increasing the lacking parameters. The control will be entirely over the internet. The user will be able to decide the appropriate action to be taken and can take decision by controlling the system via the internet.
Keywords: Temperature Sensor, Moisture Sensor, Humidity Sensor, LPC2138, Internet of Things.
Abstract
Development of FPGA based Processing Electronics for Gamma Ray Spectrometer (GRS) and Comparisons between two Different Methods
Parth Jadvani, Mr. Shiv Goyal, Dr. D. Banerjee
DOI: 10.17148/IJARCCE.2016.5524
Abstract: In the instrumentation field, ? rays make their own value because of its high energy nature. The spectroscopy based on ? rays is used in the space exploration programs, nuclear physics, geophysics, medicine & thermonuclear fusion. This paper describes the development of processing electronics & data acquisition system designed for Gamma Ray Spectrometer (GRS) for the future space mission. The surface composition in terms of concentration of major elements is one of the most fundamental information about any planetary body. Gamma ray spectrometer is the mostly used technique to determine the elemental abundances of the elements of the surface and it�s subsurface. High purity Germanium (HPGe) detector is planned to be used in this Gamma Ray Spectrometer. Processing electronics covers the analysis of the analogue data, coming from pulse shaping amplifier. In this analogue data, output of the pulse shaping amplifier is a Gaussian shape pulse, where peak amplitude gives the information of the incoming energy of ? ray. Processing electronics includes event trigger generator, peak detector, ADC & FPGA based setup to generate histogram of ? ray counts. In data acquisition part NI DAQ card & LabVIEW software are used for plotting of the histogram.
Keywords: Filed Programmable Gate Array (FPGA), Analogue to Digital Converter (ADC), Data Aqauisition software (LabVIEW), Data Aqauisition card (NI DAQ card), Gamma Ray Spectrometer (GRS).
Abstract
ITRP: Instant Time Resource Provisioning Prototype for Adequate Quality of Service
Mrs. Shilpa, Mrs. Chetana Srinivas
DOI: 10.17148/IJARCCE.2016.5525
Abstract: In the era of Cloud computing where it utilizes Infrastructure as a Service (IaaS), elasticity has become one of the very essential components for providing better Quality of Services (QoS). The concept of elasticity ensures an effective and dynamic resource allocation during sudden changes of workloads in Virtual Machines (VMs). The current research trends highlight that there are very less efficient virtualized environments for proper task scheduling in the field of cloud computing. Therefore effective resource management/provisioning during overload of jobs in the distributed virtual machines have become one of the most challenging tasks. It can be seen that most of the existing techniques cannot respond rapidly when the work load associated with a particular service amplifies. Most of the exiting trends are found to have inaccuracy in case of taking proper decisions which results problems during resources provisioning in cloud services. In this study an efficient Instant Time Resource Provisioning Prototype (ITRP) has been introduced which increases the scalability of allocating resources during each alteration cycle when work load increases. The performance analysis of the proposed system shows that it achieves very accuracy in achieving speed up for resource provisioning in cloud infrastructures as compare to the existing models.
Keywords: Resource Provisionong , Cloud Computing , Virtual Machines.
Abstract
FHA-Flood Help and Awareness
Anand R, Jagadish P, Donelson Timung, Sewalee Phukan, Nikita Hakai
DOI: 10.17148/IJARCCE.2016.5526
Abstract: Serious disasters have been annually occurring in Japan. For example, in the Great East Japan Earthquake that occurred on March 11, 2011, communication infrastructure was seriously damaged over a wide area. From such a situation, more resilient network infrastructure that does not stop under challenged communication environment is required. In this paper, we propose a Disaster Information System that can flexibly deal with failures of the server group and respond to rapid load change. We construct the disaster information system based on the cloud computing technology. In addition, we develop a dynamic allocation of server resources in accordance with the load change on the system so that it makes possible to take full advantage of the resources in the disaster areas. A significant role of good user interface design is to enhance user experience. Keywords and icons are heavily used in mobile applications because of the limited screen size and small keypad interface. In creating a mobile based crowd sourcing application to motivate citizens to report disaster events and experiences, use of keywords and icons should be intuitive, have high recall and make reporting accurate. This paper discusses the user validation results of user interface design through user experience measured by intuitiveness, recall, and accuracy. Also, by introducing a mobile cloud and DTN protocol, our system can realize rapidly sharing disaster information even though the communication breakdown area occurred.
Keywords: Disaster Information System, Load Change, Disaster Information.
Abstract
Online Identification of Real World Events from Twitter
Prof. R. M. Shete
DOI: 10.17148/IJARCCE.2016.5527
Abstract: Recently the size and popularity of social media is rising. System which extracts the useful information is growingly needed. Social media is using for sharing reviews on real time events by people. So, Public using twitter for posting the massages which are related to the events takes place in real time. Descriptive and collective keywords are used of characterizing the stories and events. Here, the purpose is to distinguish between the real-world events and non event posts. This approach is based on aggregate statistics of topical similar post cluster.
Keywords: Identification of events, Twitter, Features extraction, Clustering, Real world event.
Abstract
Gestures in air based home appliance control system
Shubha N R, Bhavana Maishale, Srilakshmi H, Prof.Vasanthi S
DOI: 10.17148/IJARCCE.2016.5528
Abstract: Our paper is based on developing applications and demonstrating the advance use of accelerometer, till now various applications of accelerometer using tilt has been developed. We start with the design of hand motion sensor using 3 axis accelerometer and I2C protocol based ADC, we will also provide wireless interface so we will have complete freedom to move our hand in air to make various shapes. Various shapes will be associated with different devices. We design device/appliance control system using shapes produced by hand motion in air.
Keywords: accelerometer, I2C protocol, gestures, ADC, wireless interface.
Abstract
Review on: Moving Object Detection Using Temporal Information in Surveillance System
Mrunal Gaikwad, Dr.U.B.Shinde, Prof.K.M.Biradar
DOI: 10.17148/IJARCCE.2016.5529
Abstract: This paper presents automatic moving object detection by using the temporal information method from the capture video. This method is efficient in segmentation which is useful for real time video surveillance and object tracking. Based on the continuous symmetric difference between the adjacent frames full saliency map of current frame is generated .The moving object with higher saliency value is generated for background. The maximum entropy sum method is used for calculating threshold of area. The general common method is extracting the foreground using the Gaussian Mixture Method followed by the shadow. This method is useful for removal of noise the object is detected .In the background the removal of noise is done by pre-processing and Morphological processing.The final image is obtained by the modification of Fuzzy logic. Then the basic function of this detected target is controlled by ARM7 controller which is used to display the presence of human body or animal. Also buzzer is implemented for security purpose. GSM modem interface for providing the massages about the detection of object for security purpose. So in this proposed model we detect the moving object using the time domain information and different applications are operated for security purpose using ARM 7 controller. So in this proposed model we detect the moving object using the time domain information and different applications are operated for security purpose using ARM 7 controller.
Keywords: moving object detection, temporal information, saliency map, frame difference.
Abstract
WAN OPTIMIZATION-a Review
Gurpreet Singh, Lovepreet Singh
DOI: 10.17148/IJARCCE.2016.5530
Abstract: This paper advocate Why there is need of WAN optimization as well as How WAN network gets optimize by using diverse Technologies of different companies. This whole analysis will give a complete framework for setting up a WAN optimizer within the organization. As lot of research has been done to ameliorate the network utilization of WAN (Wide Area Network) and it has achieve substantial success over the LAN (Local Area Network) techniques.
Keywords: WAN, Chatty Protocol, Latency, Riverbed Steelhead Appliance, WOC.
Abstract
Design & Optimization of CNTFET based Domino 1- Bit ALU
Ashish Sharma, Umesh Dutta, Sneha Arora, Vipin Kumar Sharma
DOI: 10.17148/IJARCCE.2016.5531
Abstract: This paper presents a design technique of CNTFET based 1-Bit Arithmetic Logical Unit (ALU) using Domino Logic. Domino Logic offers smaller area and higher speed than Static Logic design. In this paper circuit performance of CNTFET based Domino logic 1-Bit ALU is compared with Static Logic 1-Bit ALU. The simulation results calculated using HSPICE have reported to show 38.6% reduction in delay and 12.8% reduction in area for Domino Logic as compared to Static Logic 1-Bit ALU(Full Adder Logic) at 32nm technology. For Optimization of CNTFET based Domino Logic 1-Bit ALU various parameters like diameter, temperature and pitch are varied at 32nm technology. The proposed Domino Logic 1-Bit ALU(Full Adder Logic) has shown reduction in Power Delay Product by 33.2% at 5nm pitch as compared to Domino logic 1-Bit ALU(Full Adder Logic) at 20nm pitch with CNT diameter at 1.487nm, 27? temperature and a reduction of 94.2% at 1.0179nm CNT diameter and 5nm pitch.
Keywords: ALU, CNTFET, Dynamic Logic, Domino Logic, Full Adder, Static Logic.
Abstract
Investigation of different recent Selfish node detection mechanism for Mobile Adhoc Networks
T.JohnPaulAntony, Dr.S.P.Victor
DOI: 10.17148/IJARCCE.2016.5532
Abstract: Mobile Adhoc Network gain much attention because of its uses in various critical areas such as military exercises, Disaster recovery, Mine site operations, etc. As mobile nodes in MANET are autonomous nodes, each mobile node assist their neighbor nodes for packet forwarding towards intended destination. The cooperation among the mobile nodes ensures the reliable communication in MANET. Some mobile nodes refuse to forward the packet from other nodes due to lack of resources or malicious activity. This kind of nodes is called as selfish nodes. The presence of selfish nodes in the route degrades the overall performance of the network. So, this paper aims to review the various selfish node detection mechanisms. The unique features are inspected and the constraints are discussed.
Keywords: Mobile Adhoc network, Selfish nodes, Malicious, Cooperative communication.
Abstract
Identification of Isolated Upper and Lower Assamese words: A Survey
Mr. Adarsh Pradhan, Jyoti Rekha Saikia
DOI: 10.17148/IJARCCE.2016.5533
Abstract: Communication is the fundamental purpose of speech, i.e., the transmission of messages. Speech is the most common form of interaction between human to human which is very natural and efficient. It conveys the information about words, speaker identity, expression, emotion, gender of the speaker. Now-a-days, both speech and speaker recognition are the two most important research areas. In this paper we try to recognize Assamese spoken words. This paper describes feature extraction technique Linear Predictive Coding (LPC) , Mel Frequency Cepstral Co-efficient (MFCC) and for classification Artificial Neural Network(ANN) are used to recognize Assamese speech samples (words).We create a small database for seven Assamese isolated words which consist of 16 speakers of equal numbers of male and female. Each word is uttered by seventy five times by each speaker.
Keywords: Speech Recognition, LPC, MFCC, DTW, HMM, Neural Network.
Abstract
An Analytical Study On Link Prediction In Social Networks
Nitin Arora
DOI: 10.17148/IJARCCE.2016.5534
Abstract: As a result of exponential growth of social networking sites, huge population on earth is now connected with others through social media and form a global e-society. With every instance of time new relationships are initiate and links are getting established and therefore new nodes are added to any online social network. There is natural yearning among the people for the prediction of new relationship in the society, the imitation of which is also obtainable in e-society. Social analytics is an area which is now a day becoming popular among the researchers due to availability of open repositories containing terabytes of data generated by the social networking portals. Link prediction in social network is one of most popular research problem among the knowledge workers and researchers. In last, decade many empirical models for link predication are proposed. This is a survey paper presenting a comprehensive survey of techniques for link prediction based on their approaches, applications and performance in various kind of electronic social networks.
Keywords: Social Networks, Link prediction, Online Social Network Include at least 4 keywords or phrases.
Abstract
An Exploratory Review of Web Content Mining Techniques and Methods
Narendra Parmar, Dr. Vineet Richhariya, Jay Prakash Maurya
DOI: 10.17148/IJARCCE.2016.5535
Abstract: Web content mining is a branch of web mining which involves the task of searching in the internet, extracting valuable information and filtering related data. It uncovers the useful information from the internet web content, including text, audio, graphics, video and multimedia. Web content mining has become complicated when it has to mine structured, semi-structured, unstructured and multimedia data. Web data extraction is a field of research in web content mining has now become a specialized work for modern internet based business, data science and technology. In this paper, the latest review of web content mining, its properties, significance and importance in data science and data mining is discussed through a theoretical and analytical process. Finally, it is concluded with many future aspects and applications.
Keywords: Web Mining, Web Content Mining, Data Mining, Web Data Analysis.
Abstract
Mobile based application for fake currency detection and recognition
Prof. S.R.Javheri, Shitalpadole, PoojaDeshmukh, ShitalKhade
DOI: 10.17148/IJARCCE.2016.5536
Abstract: Fake cash identification implies discovering fake coin from the monetary standards. With the progression of the advanced managing an account administrations, programmed strategies for paper cash discovery has gotten to be critical in the vast majority of the applications, for example, in computerized teller machines and programmed merchandise vender machines. Pictures are prepared by utilizing different systems of picture handling and further different components are removed from the image.Automatic techniques for banknotes acknowledgment are required in numerous applications, for example, programmed offering products and candy machines, among others. The methodology comprises of various segments including picture preparing, picture division, and trademark extraction, looking at images. Fake notes are an issue of verging on each nation however India has been hit truly hard and has turned into an exceptionally intense issue. Fake notes are an issue of practically every nation except India has been hit truly hard and has turned into an extremely intense issue.
Keywords: Fake currency, Instance retrieval, Currency recognition, text-to-speech, feature Extraction.
Abstract
Implementation and Analysis of Image Denoising Technique
Prachi Kulkarni, Pranjal Kumbhare, Anuja Saxsena, Gouri Pandey
DOI: 10.17148/IJARCCE.2016.5537
Abstract: In this paper, a comparative analysis is performed on four different thresholding algorithms namely, Average filtering, Visu Shrink, Sure Shrink and Adaptive wavelet packet (WP) thresholding function for image de noising. These algorithms are implemented on different test images and for different amounts of noise intensities added to those images, and their performance are evaluated based on parameters like mean square error (MSE), peak signal-to-noise ratio (PSNR). On the basis of experimentally obtained result the best method is proposed. The proposed method applies multilevel WP decomposition to noisy images to obtain the optimal wavelet basis, using Shannon entropy. It selects an adaptive threshold value which is level and sub band dependent based on analyzing the statistical parameters of sub band coefficients. WP transform (WPT) along with optimal wavelet basis (OWB) for image decomposition is used. Next, a thresholding function is used to shrink small coefficients leading to calculate a modified version of dominant coefficients. The modification is done using optimal linear interpolation between each coefficient and the mean value of the corresponding sub band followed by reconstruction of de noised image from the corrected coefficients.
Keywords: Adaptive wavelet packet thresholding; Optimal wavelet basis (OWB) ; Shannon entropy; Wavelet packet transform(WPT),Discrete wavelet transform(DWT).
Abstract
A Brief study on Prediction of load in Cloud Environment
Chandini M.S, Mrs Pushpalatha R, Dr. Ramesh Boraiah
DOI: 10.17148/IJARCCE.2016.5538
Abstract: Cloud computing is a distributed computing environment where huge number of computers are connected with a communication channel such as the Internet. It provides the facility to run an application on many linked computers at the same time.The rapid growth of power demand from business, and Web applications has led to the emergence of cloud-oriented data centers. Load prediction is a significant cost-optimal resource allocation and efficient energy saving approach for a cloud computing environment. Load classification before prediction improves prediction accuracy.With the increasing demand on cloud provisioning instantly developing Vm in the cloud is not possible; it takes several minutes which leads to latency. So, Load prediction can minimize the downtime of the Vm. various load prediction models and the approaches based on the models are listed out in the paper. Methods through which error rate can be found are also described so that the prediction techniques can be well compared. Also the areas that can be worked upon after the successful Load prediction are listed into the paper.
Keywords: Cloud computing, Load balancing Load prediction, prediction accuracy.
Abstract
Smart Portable White Revolution System for Dairy Farmers
Arote Pranjal, Honrao Akshata, Patil Kajal, Mrs. S.Y. Sawant
DOI: 10.17148/IJARCCE.2016.5539
Abstract: Dairy industry is of crucial importance to India. The country is the world�s largest milk producer, accounting for more than 13% of world�s total milk production. It is the world�s largest consumer of dairy products, consuming almost 100% of its own milk production .The proposed system will make the collection , billing procedure from farmer to dairy faster ,more reliable ,more accurate ,more efficient. This system contains a system module installed at the local milk collection centre which includes a farmer verification unit, fat content detection unit, quantity measurement unit. Depending upon the fat content and the quantity of the billing amount will be calculated .This collected data will be shown at the centre to the farmer as well as it will be transmitted to the main dairy using wireless module.
Keywords: RFID module, LCD, RF module, LDR, RTC.
Abstract
Depth Video Coding for 3D video
Shivam S. Agrawal, Sonal K. Jagtap
DOI: 10.17148/IJARCCE.2016.5540
Abstract: With the recent development of 3D multimedia/display technology and the increasing demand for realistic multimedia, 3D video has gained more attention as one of the most dominant video formats with a variety of application such as 3-dimentional TV or Free view point. In 3D video processing, depth video coding is very essential. In depth coding, the object boundaries are hard to compress and severely affect the rendering quality since they are sensitive to coding errors. A depth boundary reconstruction filters is used and utilize it as an in-loop filter to code the depth video. The proposed depth boundary reconstruction filter is useful for efficient depth coding as well as high-quality rendering.
Keywords: Depth video, 2D video, LoG, Sobel Operator.
Abstract
Carbon Nano tubes & Its Application In Medical Field & Communication
Er. Shipra Srivastava, Mohd Maroof Siddiqui, Saifur Rahman, Prof (Dr.) Syed Hasan Saeed, Md Belal Bin Heyat
DOI: 10.17148/IJARCCE.2016.5541
Abstract: Carbon nanotubes (CNTs) was discovered by a Japanese researcher Sumio Iijima in 1991 by arc discharge method. CNTs derived their name from their long, tube-shaped hollow structure. They are made from graphite sheet rolled-up continuous hexagonal mesh & carbon molecules at the apexes of each hexagons. CNTs have diameter in nano meter and useful in many nanotechnology applications. These nano tubes are classified into two group: single walled and multi-walled nano tubes. Different properties of nano tubes like strength, thermal conductivity, stiffness have led into various fields. Physical and chemical properties and characteristics of CNTs are still being researched heavily. Carbon nano tubes have huge applications in miscellaneous fields. The history of nano tubes is just the beginning. Current study of CNTs has given a very promising and bright future ahead.
Keywords: CNTs, single and multi-walled nano tubes, properties of nanotubes, applications.
Abstract
Implementation of FM0/Manchester Encoding and Systematic Codes on FPGA
Nithiyalakshmi.S, Gopi.B
DOI: 10.17148/IJARCCE.2016.5542
Abstract: Software Defined Radio (SDR) is an emerging technology to realize the many applications without using different hardware components. The FM0/Manchester and systematic codes can be combined to achieve high throughput.FM0/Manchester codes can be used to reach the dc balance and enhancing signal reliability. Systematic codes are used to detect and correct the errors. In this code, the code input is embedded into the encoded output. BWA architecture is used in systematic codes, which is implemented using parallel processing unit to achieve high speed. These encoding techniques are combined using mode selection signal. SOLS technique can be used to reduce the number of transistor used in the architecture. This combined architecture can be implemented in VHDL coding using MODELSIM SE 6.2C software. This proposed architecture can be verified using the FPGA (SPARTAN 3E) kit. An experimental result shows less area and high throughput.
Keywords: FM0, Manchester, Software Defined Radio (SDR), Systematic codes, Similarity Oriented Logic Simplification (SOLS), Butter-fly Formed Weighted Accumulator (BWA), Field Programmable Gate Array (FPGA).
Abstract
Brain tumour detection using Image processing and sending tumour information over GSM
Shivakumarswamy G.M., Akshay Patil.V., Chethan T.A., Prajwal B.H., Sagar.V.Hande
DOI: 10.17148/IJARCCE.2016.5543
Abstract: Tumour is an uncontrolled growth of cells in any part of the body. The tumour is of different types and they have different characteristics and different treatment. Brain tumouris one of the dangerous and life threatening disease, but can be operated if detected in the early stages. This project is to implement an efficient and accurate method for detection of brain tumour along with its position and area in the MRI Images of the Brain. MRI scanned image is taken for the entire process as it will not affect the human body. Initially the image is subjected to pre-processing stage to remove the noises present and for image resizing. Then it is subjected to segmentation by using two sophisticated algorithms namely K-Means clustering and Fuzzy C-means segmentation. Next the tumour cells and normal cells are separated and the area of the tumour is calculated. The stage of the tumour is assigned based on the area. Then the stage of the tumour is sent automatically to the registered mobile over the GSM.
Keywords: Brain Tumour, MRI, K means clustering, FCM clustering, Area calculation.
Abstract
Enhanced HIIT Based Recommender Application using Collaborative Filtering and Reinforced Learning
Aditya Khursale, Ankit Singhaniya, Shubham Saykhedkar, Swati Shirke
DOI: 10.17148/IJARCCE.2016.5544
Abstract: Adaptive High Intensity Interval Training is a mobile application (Android) which helps you stay fit in 7-minutes. This application acts as a workout agent and generate list of exercises for you to perform every day, based on your goals. The user provides these goals as a part of input. The goals can be weight gain, weight loss, cardio, etc. Based on this inputs a workout regime is generated that will help you stay fit wherever you are and in whatever time you have. The advantage of AHIIT is that it does not involve owning any equipment and for sure cuts down the cost of hitting the gym. We also get a tailored, guided and helpful workout based on our personal need without the need of a physical trainer.
Keywords: HIIT (High Intensity Interval Training), Collaborative Filtering, Reinforced Learning, Android Application, Adaptive Fitness.
Abstract
Implementation of Constructive Induction – A Data Mining Technique in Agro Database for Optimal Solution
Dr. K. S. Rathnamala
DOI: 10.17148/IJARCCE.2016.5545
Abstract: This research paper is about constructive induction of data mining (DM) which is used to cope with inadequacy of attributes. Constructive induction is a process of learning concept description that represents best hypothesis in the space. Inductive learning algorithms are increasingly being pressed into service, as data mining and knowledge discovery tools, to detect patterns or regularities in large amounts of data. A major limitation of conventional learning algorithm is that the descriptions they build such as decision trees, decision rules and bayesan nets employ only terms selected from among those explicitly provided in the data.
Keywords: Over precision, Attribute Interaction, Irrelevant attribute, Data driven constructive induction systems, SVD (Singular Value Decomposition), Knowledge-Driven constructive induction systems.
Abstract
Performance Comparison of Conventional and Fuzzy Logic Controller on DC Motor
T.Sathya, R.Premalatha, G.Boopathi Raja, N.Karthikeyan
DOI: 10.17148/IJARCCE.2016.5546
Abstract: Fuzzy logic systems have recently been utilized in many control processes due to their ability to model uncertainty. This paper presents the design of a fuzzy control system to control the position of a DC motor. The motor was modeled and converted to a subsystem in Simulink. The entire system has been modeled using MATLAB R2014a Simulink toolbox. The fuzzy control was also designed using the Fuzzy Control Toolbox provided within MATLAB, with each rule consisting of fuzzy sets conditioned to provide appropriate response times with regards to the limitations of the desired motor. First, Proportional-integral-derivative (PID) controller was designed and tuned using a Simulink block instead of conventional tuning methods such as hand-tuning or Ziegler-Nichols frequency response method. Then, the Fuzzy Logic Controller (FLC) was designed. The performance of the proposed system is compared with that of its corresponding conventional Proportional-integral-derivative (PID) controller in terms of several performance measures such as rise time (rp), peak overshoot(Mp) , settling time(ts) and steady state error(ess) and in each case , the proposed scheme shows improved performance over its conventional counterpart.
Keywords: DC Motor, Fuzzy logic, PID, speed control.
Abstract
DICOM Image Compression and Decompression Techniques
Shreya A, Ajay B.N
DOI: 10.17148/IJARCCE.2016.5547
Abstract: The increasing volume of medical data generated by new imaging modalities is causing many issues in the medical field. All these modalities related to patient(s) are saved in a standard format called DICOM. Uploading and retrieving such large volume of medical data to and from the cloud or other databases is becoming very challenging with this digitization. Hence, we propose to develop a DICOM compression and decompression tool that helps in compressing the medical data and hence reduces time in accessing from central databases or cloud. Here, compression includes both reversible and irreversible (lossless and lossy) techniques depending on users Region of Interest. With reversible compression (Lossless), upon decompression, the image is perfectly reconstructed and numerically identical to the original (i.e. the original and decompressed are perfectly correlated). With irreversible compression, data are discarded during compression and cannot be recovered. Upon compression frequency content to which the human eye is insensitive is removed. Upon decompression, the discarded information cannot be recovered, resulting in some reconstruction interpretation.
Keywords: DICOM, compression.
Abstract
Design and Analysis of Access Control and Security Model in E-commerce System
Nikhil Pareek
DOI: 10.17148/IJARCCE.2016.5548
Abstract: E-commerce Security is a division of a data security structure and is mainly applied to the components that have an effect on e-commerce that contain Data security, Computer Security and other wider area of the Information safety structure. E-commerce safety is one of the principle clear security instruments that impact the end client through their day by day instalment collaboration with business. It is the declaration of e-trade assets from unapproved use alteration, affirmation or decimation. The vital E-business procedure is fundamental used for the effective operation and administration of E-trade conduct. One of a procedure is security and access control. Ecommerce must set up common secure access and confidence among the gatherings in e-trade operation by validating customers and implementing safety features. E-business sites must then approve the right of entry to those elements of the site that an individual customer needs to finish his or her specific transactions. In this way, person will be accessible to all assets of an E-trade webpage aside from added individuals' records, limited group information, website admin organization sector. Other security process ensures the asset of an E-business site from dangers, for example, programmer assaults, burglary of passwords or card numbers, and system breakdown.
Keywords: Security measures, E-Commerce Security Issues, Access control, Availability.
Abstract
Prototype Development of an Agricultural Environment Monitoring System Using WSN
Ravindrakumar D. Bhatt, DhartiVyas
DOI: 10.17148/IJARCCE.2016.5549
Abstract: Agriculture is an essential component of societal well-being. Agricultural production influences,and is influenced by, health, water quality and quantity, ecosystems, biodiversity, the economy, and energy use and supply. We can monitor such parameters using wireless sensor networks. In this paper, we discuss how WSN is used in Agricultural environment monitoring. Also we represent a prototype design of Monitoring system based on WSN and web application for data representation of received data from network.
Keywords: Precision agriculture, Component, WSN, STM32f103c8, ESP8266, sensors, WIR-1186M.
Abstract
USB3.0 Driver Development for Embedded Platforms which Currently support USB2.0
Chintan Vadaliya, Urmil Vyas
DOI: 10.17148/IJARCCE.2016.5550
Abstract: Universal Serial Bus 3.0(USB3.0) is the next major revision in USB standards which provides very high data rate between PCs and devices. In this paper we are going to discuss how to enable USB3.0 support for embedded boards which can support Mass Storage Function, HID Function and Video Function. For the development purpose we are using Xilinx Zynq ZC702 Board as an embedded platform in which the new drivers will be loaded. So, in this work the ZC702 Board operates as a mass storage device. Similarly in the case of HID and camera, the ZC702 Board operates as a keyboard and camera device respectively.
Keywords: Universal Serial Bus(USB), Human Interface Device(HID), Mass Storage Device(MSD), Mass Storage Class(MSC), Field-Programmable Gate Array(FPGA), FPGA Mezzanine Connector(FMC).
Abstract
Improved Brain Tumor Detection Technique Using Hybrid Roundness Metric, Region Growing and Cellular Automata Edge Detection
Tanveer Gill
DOI: 10.17148/IJARCCE.2016.5551
Abstract: Brain tumor is one of the most life scowling diseases which need urgent and accurate detection. Various automated techniques have been designed to detect the tumor efficiently from MRI imaging. The aim of this paper is to propose a new and improved method for increasing the efficiency of tumor detection. The proposed technique involves the integration of Hybrid Roundness Metric with the existing techniques of segmentation called Modified Texture Based Region Growing and Cellular Automata Edge Detection. Hybrid Roundness Metric detects the circular objects thereby easing the detection of exact location of tumor. The two segmentation techniques perform well in collaboration but when Hybrid Roundness Metric is implemented along with the above two, results achieved are much more effectual. The detection of tumor is made easier and accurate with the proposed work.
Keywords: MRI; hybrid roundness metric; region growing; edge detection; tumor detection improved efficiency, parameters.
Abstract
Terrorism in the Cyber Space: The New Battlefield
Saumya Gupta, Akhilesh Tiwari
DOI: 10.17148/IJARCCE.2016.5552
Abstract: Terrorism has become a global threat from the past few decades and needs to be controlled from the grass root level to the universal level. Internet technology makes it easy for terrorist groups to communicate with relative anonymity, rapidly and effectively across borders, to an almost illimitable audience. This emerged as a threat to nation�s internal security therefore identification of terrorist groups on cyber space has become essential task in recent times. It is the task of determining associations and predicting the relationships that may exist between terrorist nodes. This has several applications including the recognition of terrorism, drug trafficking, gang related offences, frauds and armed robberies etc. There are two types of warfare in the world of terrorism: Conventional Warfare and Cyber Warfare. Conventional Warfare deals with the terrorism occurring on the four dimensions (land, sea, air & space) whereas Cyber Warfare deals with the 5th dimension i.e. Cyber Space. The use of the Internet space for terrorist purposes creates both challenges and opportunities in the fight against terrorism. This paper is a review on Cyber warfare as it has several benefits over Conventional warfare such as easier identification of crucial nodes & links; law enforcement agencies will get help and support to counter terrorism attacks.
Keywords: Data mining, Social connections, Social network analysis, Investigative data mining, Terrorist network mining, Terrorist using social media, Graph theory.
Abstract
Design of Low Power Double Edge Triggered Comparator For Successive Approximation Register (SAR) ADC
Tino mol J M, R.Sowmya
DOI: 10.17148/IJARCCE.2016.5553
Abstract: High speed analog to digital converters (ADC), sense amplifiers, RFID applications, data receivers with low power and area efficient designs has appealed a wide variety of dynamic comparators. This paper presents design of low power double edge triggered comparator for successive approximation register (SAR) ADC. In this paper a low power double edge triggered comparator is designed for an area efficient and double edge triggered operation for a small delay. The proposed comparator structure consists of a separate cross coupled and input stage for enabling a fast operation over a wide range of common mode and supply voltages. The proposed method has been designed and simulated by using 130nm CMOS technology. The results indicate that in the proposed double edge triggered comparator, area and power consumption are significantly reduced and achieves the high speed of operation.
Keywords: comparator, ADC�s, double edge triggered, SAR.
Abstract
Fuzzy Partitioning Based Clustering Approach
Nipjyoti Sarma, Adarsh Pradhan, Utpal Barman
DOI: 10.17148/IJARCCE.2016.5554
Abstract: Clustering mixed dataset is a very common approach in day to day life. Several algorithms exists for clustering heterogeneous datasets with accuracy. But most of the algorithms are inefficient and unable to cluster only one type of records. Therefore we have designed an algorithm which is efficient as like k means and can also handle mix type and only one type of data in dataset. Our algorithm has been tested on standard dataset to see the performance.
Keywords: Heterogeneous, Fuzzy, Cluster, Centroid, Partition.
Abstract
Analysis of Specific Absorption Rate (SAR) of Microstrip Patch Antenna for Wireless Applications
Shivalingappa M Baligar, Rajendra Soloni, Dr.Chandrappa D.N
DOI: 10.17148/IJARCCE.2016.5555
Abstract: In this paper the Specific Absorption Rate (SAR) of a microstrip antenna is presented which can be used for 4G mobile wireless communications.The proposed antenna geometry describes a inset feed rectangular patch printed over a FR4 substrate of thickness 1.6 mm and Permittivity er = 4.3. The antenna is designed with slot and simulated in CST microwave Studio electromagnetic simulation tool. The simulated antenna shows -25dB of return loss, 69.13MHz bandwidth for 2.3GHz,-30 dB of return loss, 91.55MHz for 3.5GHz and -25 dB of return loss, 102.774MHz for 4.46GHz and VSWR is less than 2. Head model is developed to calculate the SAR value. The head model is kept at a distance of 50 mm from the antenna and SAR is calculated. The SAR value is 0.06399 W/Kg for 10 gram of tissue which is well within the value specified by the FCC. So there is a 96.80 % reduction compared to the value set by FCC.
Keywords: Specific Absorption Rate (SAR), Microstrip patch antenna, Return Loss, FCC.
Abstract
M-Commerce: Risks and Security Issues
Akanksha Srivastav, Ajeet Bhartee
DOI: 10.17148/IJARCCE.2016.5556
Abstract: Mobile commerce is more popular in present time just only because of their mobility. M-commerce is the electronic commerce using mobile device. Here discuss the use of security method for prevention of spy type attacks. M-commerce is spreading at a remarkable speed along with m-commerce popularity the issues concerning the usability of m-commerce is raising which prevent the users from completing basic and common task as general , many users usually do not successfully browse an m-commerce portal, which result in customer dissatisfaction and frustration .additionally ,even experienced user face immune problem. , we propose a lightweight protection conspire that can successfully distinguish these assaults. And here use encryption and decryption algorithms for security purpose.
Keywords: Mobile commerce,Personalization,Flexibility,Dissemination
Abstract
A Methodology for Implementation of Smart Security system using Near Field Body Coupled Communication Technique
Ranganath B, Siddesha K, Kavitha Narayan B M
DOI: 10.17148/IJARCCE.2016.5557
Abstract: The Wireless Body Area Network (WBAN) plays a significant role in the present day applications considering energy, security, routing, load balancing, optimization etc. The applications of WBAN in recent times have significantly increased the potential of security and identification systems. However, the issues considering the identification and authentication, the performance of WBAN with respect to energy are still persistent. The concept of implementing the congruent and ubiquitous systems needs proper synchronization in between various heterogeneous nodes such as Near Field Coupling Communication transceiver network. This paper intends to develop a WBAN network in order to perform the efficient data transmission through human body between a mobile device and highly sensitive frequency detection node based on Frequency Selective Digital Transmission (FSDT) on the generation of unique code and with increase in data rate of potential communication system. The possible applications focused on the implementation of the technology include the efficient person identification system instead of general biometric identification, highly reliable ration dispensing system and secured ATM management.
Keywords: Wireless Body Area Networks (WBAN), Near field Body Coupled Communication (NFBCC), Intra Body Communication, Frequency Selective Digital Transmission (FSDT).
Abstract
A Survey of Web Log for Effective Information Retrieval Using Data Mining Techniques
T. Nandhini, Dr. B. Kalpana
DOI: 10.17148/IJARCCE.2016.5558
Abstract: With the improving communication technology, the people of the world need more information, to gather their information through the web. With the increase number of web user, the web search engines have to provide a better communication mechanism to those people. During their surfing their session may have the timed out with the fixed threshold mechanism. And with the help of the web log it can obtain it back. Hence it is the great problem for the web user. The searching data may arise with the help of the frequently searched items. With the help of these web logs and statistical language modeling, the user can get the relevant data. This paper provides a various technique of web log mechanism and helps the web user to surf more efficiently.
Keywords: WWW, Web Usage Mining, Web Log, Information Retrieval and Association Rules.
Abstract
Mobile Data Gathering and Dual Data Uploading Using Gateways
Vinay Kumar S Jatteppanavar, Nithin K, Shashidhar B Honnalli, Venkatesh P
DOI: 10.17148/IJARCCE.2016.5559
Abstract: In this paper, we are going to propose a three-layer framework for mobile data collection in wireless sensor networks, which includes the sensor layer, cluster head layer, and Data Collector layer. The framework employs distributed load balanced clustering and dual data uploading. The objective is to achieve good scalability, long network lifetime and low data collection latency. At the sensor layer, a distributed load balanced clustering (LBC) algorithm is proposed for sensors to self-organize themselves into clusters. We are going to use clustering algorithm which uses two cluster heads which supports dual data uploading. In the cluster head layer we are going to select two cluster heads and transmit the data to the Data collector layer, which is responsible for sending the data to the base station using gateways. The simulation results show the performance of the system.
Keywords: Data Collection, Clustering, Load Balancing.
Abstract
Mobile Operated Landrover Using DTMF Technology
K. Poojitha, S.M. Zaheer, G. Bhavani Shankar, P. Manikanta, S. Charan, E. Vinod
DOI: 10.17148/IJARCCE.2016.5560
Abstract: In this project, we present the controlling of a Robot using DTMF technique .The robot is controlled by a mobile phone that calls the other mobile phone attached to the robot. In the course of the call, if any button is pressed, the tone corresponding to the button pressed is heard at the other end. This tone is called �Dual Tone Multi Frequency tone (DTMF)�.Using DTMF code, direction of motion of the robot can be controlled by mobile phone. The above system can be used for military purpose as �bomb detector� and as �spy robot� and also for surveillance. The received tone is processed by the microcontroller with the help of DTMF decoder. The microcontroller then transmits the signal to the motor driver ICs to operate the motors & our robot starts moving Conventionally, Wireless-controlled robots use RF circuits, which have the drawbacks of limited working range, limited frequency range and the limited control. Use of a mobile phone for robotic control can overcome these limitations. It provides the advantage of robust control, working range as large as the coverage area of the service provider, no interference with other controllers and up to twelve controls. DTMF assigns a specific frequency (consisting of two separate tones) to each key s that it can easily be identified by the electronic circuit. The signal generated by the DTMF encoder is the direct algebraic submission, in real time of the amplitudes of two sine (cosine) waves of different frequencies, i.e., pressing any button in DTMF will send a tone made by adding 1336 Hz and 770 Hz to the other end of the mobile.
Keywords: Dual Tone Multi Frequency tone (DTMF), Robot, Mobile Operated, Embedded System.
Abstract
Hybrid, Low Cost, Sensor Based Smart Lighting for Rural Areas
Vinutharani A, C.K Vanamala
DOI: 10.17148/IJARCCE.2016.5561
Abstract: Energy is important for the progress of a nation and it has to be saved or conserved. The most challenging task in the worldwide is reducing the energy demand in both residential and industrial sectors. Lighting systems are major source of electricity consumption in the cities and the rural areas. Technologies should be developed to produce energy in most user friendly manner and importance should be given to conserve energy. In the world lighting system consumes major source of electricity and huge amount of energy is wasted. Technologies are developed to use LED is offices, industries houses etc than traditional lights. Already installed lighting systems are outdated and energy inefficient. So in existing market lighting control systems are introduced. Because of high cost and maintenance, CO2 emission, the existing lighting systems are not efficiently applicable to be cooperative world. This paper introduces hybrid, low cost, wireless sensor based, adaptable smart LED lighting system to automatically control and adjust the light intensity to converse energy and to satisfy users. This system combines PIR sensor, light sensor and CO2 sensor to provide low power wireless solution. Communication is using zigbee transmitter and receiver. It also includes the facility of usage of renewable energy sources rather than the conventional power sources. Solar energy is the most importance renewable resource that can be used in case of failure to achieve the maximum efficiently. The paper represents the design and implementation of the proposed system in real time environment and it also focus on user preferences. It helps to provide more electricity to the rural people due to low power consumption.
Keywords: Lighting system, light emitting diode(LED), Sensors, Arduino, Energy saving, PIC16F877a, Zigbee.
Abstract
Health Care Analytics with Hadoop Big Data Processing
V. Kavitha, S. Kannudurai
DOI: 10.17148/IJARCCE.2016.5562
Abstract: Maintaining large amount of data at one system takes long time to access, to reduce this problem use replicas of that data at large number of disks. It reduces our time to access that data. The data in healthcare is increasing rapidly and is expected to increase significantly in coming years. This has different kinds of health data like EHR, genomic, behavioral and public health which can be processed with big data processing. Although many technologies are used for big processing with health care records, which uses predictive analysis however which is not sufficient for all kind of health records. In this paper Fuzzy C-means Clustering Algorithm and ID3 (Iterative Dichotomiser 3) Classification Algorithm which creates centroid-based clustering and builds a decision tree from a fixed set of examples. That helps to maintain all kind of health data with low costs, and Provides right intervention to the right patient at the right time. It�s potentially beneficial for all the components of a healthcare system like provider, payer, patient, and management. This includes that the health care data should be properly analyzed so that which group or gender are attack by the diseases most.
Keywords: Healthcare, Hadoop, big data, clustering, analytics.
Abstract
A Multi-Factor Authentication Scheme Using Attributed Access Control and Message Context
Ayman A.Rahim A.Rahman
DOI: 10.17148/IJARCCE.2016.5563
Abstract: This paper presents an authentication method with different authentication levels. This system is different from other multi-factor authentication methods in that it enhances the levels with an access control. The access control contains attributes of the most authenticated user assigned in structured mode. Each sent message must classify according to its global context. The manager of the system takes this global context and submits it to a context analyser whose responsibility is to deduce lower levels of that global context. Then the manager forwards it to the suitable authenticated user in selected lower levels of the multi-factor scheme.
Keywords: Authentication, Multi-factor Level, Attribute Access Control, Message Context
Abstract
A Survey on Isolated Assamese words spoken by Male and Female speakers
Mr. Adarsh Pradhan, Antara Chowdhury
DOI: 10.17148/IJARCCE.2016.5564
Abstract: Speech is the most usual form of human communication and speech processing has been one of the most stimulating expanses of signal processing. Speech recognition is the process of automatically recognizing the spoken words of person based on information in speech signal. Speech technology and human computer interaction systems have witnessed a steady and significant improvement over the last two decades. Now � a - days, speech technologies are commercially available for an unlimited but exciting range of tasks. Using these technologies machines are able to respond correctly and dependably to human voices, and provide useful and valuable services. Recent research concentrates on developing systems that would be much more robust against unpredictability in environment, speaker and language. Hence today researchers mainly focus on Speech Recognition systems with a large vocabulary that support speaker independent operation with continuous speech in different languages.
Keywords: Speech Recognition; Feature Extraction; MFCC; LPC; ANN; VQ; HMM.
Abstract
Smart Chemical Plant Control System
M. Rakshitha, T. Kousika, M. Kishore, R. Revathi, V. Ramya
DOI: 10.17148/IJARCCE.2016.5565
Abstract: The paper presents a control system to prevent the explosion of chemical plants by measuring parameters and alert the personnel in case of emergency. The proposed system uses raspberry Pi to collaborate the values of parameters such as temperature, pressure and air quality and checks whether the values crosses the threshold value set. In case, if the values cross the value determined then the alert is given as message. Thus, this method shows that the explosion in chemical plants can be controlled thereby preventing the huge damage to the people and the environment around.
Keywords: MQTT (Message queuing telemetry transport).
Abstract
A Comparative Study of DC Motor for Optimal Performance Using LAG Compensator and PID Controller Implemented by MATLAB
Someshwar Dutt Pathak, V.K. Tripathi
DOI: 10.17148/IJARCCE.2016.5566
Abstract: DC motors are used in many industrial and commercial applications require higher performance, reliability, variable speed, easier controlling stability, accuracy, speed and position control of motor is required. In this research paper we have taken an unstable DC motor model and work on LAG compensator and PID controller to obtain a stable model of DC motor for optimal performance. The LAG compensator and PID controller parameter is tested with an actual motor. In this paper is a simulation and experimental investigation of the development of LAG compensator and PID controller by using MATLAB. DC motor system performance are studied by Root Locus plot, Bode plot and step response that contains transient response and steady state response is drawn to analyze the DC motor performance. An optimal model is made for the DC motor and comparative study has done for DC motor for achieving optimal performance specification using LAG compensator and PID controller.
Keywords: DC Motor, MATLAB, LEAD Compensator, LAG Compensator, ON-OFF Controller, PID Controller.
Abstract
Genuine and Incognito Data Sharing with Forward Security
Dr Mohammed Abdul Waheed, Maheshwari Rathod
DOI: 10.17148/IJARCCE.2016.5567
Abstract: With further developments in cloud computing, data sharing has never been easier and a further review on the data sharing provides results which can be advantageous both to the society and individuals. When considering a large number of users, data sharing needs to take into account issues like optimisation, data integrity and secrecy of the data owned. One of the methods to do this is Ring Signature which proves to be promising. The main advantage is that it helps in creating an anonymous and genuine data sharing system. It further provides the owner of the data to anonymously authenticate his/her data which can be further put in cloud for further review later. The disadvantage for the Ring Signature is the expensive certificate verification in the traditional public key infrastructure (PKI). To overcome this disadvantage, Identity-based (ID-based) ring signature can be used which eliminates the process of certificate verification. This paper discusses about enhancing the security of the ID-based ring signature further by providing forward security. Considering a scenario wherein the secret key of a specific user is compromised then what is done is that all the previously generated signatures will still remain valid. By doing this, we eliminate the tedious job of re-authenticating the secret key of the user in question. This proves to be advantageous in cases where there is large scale data sharing. This paper further discusses about increasing the efficiency, security and provides algorithms so as to implement the system and show its practicality.
Keywords: cloud computing, smart grid, Ring signature, Forward Security.
Abstract
Credit Card Fraud Detection Using Hybrid approach
Siddhi Dave, Vidhi Sheth, Jay Vala
DOI: 10.17148/IJARCCE.2016.5568
Abstract: Fast Development in electronic trade has led to increase in the use of credit card payment mode. Frauds related to credit cards are also increase with usage of credit card payment mode. Data mining techniques are used to disclose fraudulent activity in credit card payment mode. Data mining process is to extract information from a dataset and transform it into an understandable structure for future use. Clustering method is used for dividing the objects in such way that objects in same group are more similar to each other than to those in other groups. In this paper, we are using hybrid approach that comprise of k-means clustering and that followed by Distance based techniques that detect outliers from dataset. The experimental results show the comparison of actual dataset accuracy and accuracy of proposed with dataset.
Keywords: Fraud detection, Credit card fraud, clustering, hybrid approach.
Abstract
Result Set On Reconsideration By Weakly Labeled Digital Human Face Images
Dhokchaule Sagar, Patare Swati, Patare Rushikesh, Makahre Priyanka
DOI: 10.17148/IJARCCE.2016.5569
Abstract: A challenge in this system is to perform glossary by exploring the list of comparable facial photos and their weak tag that are much noisy and deficient. On face model, we are using unsupervised face alignment into the Lucas-Kanade image registration approach [3][4]. We are using efficient optimization technique to handle appearance variations. The method is full automatic and can corpe with pose variations and expressions in photos, all in an unsupervised manner. Experiments on a more number of images showed that the approach is efficient.We are using search-based face annotation (SBFA) by mining weak labeled facial photos are freely available on the World Wide Web (WWW). Challenging problem for search-based face annotation technique is how to efficiently perform annotation by the index of similar facial photoss and their no correct labels that are noisy or incomplete. We are developing powerfull optimization techniques to solve the large-scale learning task efficiently. To increase the speed of the proposed system, we also based a clustering-based algorithm this can improve the scalability and performance. We have conducted an extensive set of empirical studies on a large-scale web facial image testbed, in which encouraging results showed that the developed ULR algorithms can boost the performance of the SBFA scheme.
Keywords: Face annotation, content-based image retrieval, machine learning, label refinement, search-based face annotation, weak label.
Abstract
Obfuscation as a Security Measure in Cloud Computing
Hitendra, Dr. Sandhya Tarar
DOI: 10.17148/IJARCCE.2016.5570
Abstract: Encryption being a powerful tool for data security fails in the case of cloud computing which also being a very beneficial technology has a lot of issues, biggest of which is privacy as information is stored on third party resources which can be a danger to it and thus cannot be stored in its natural form. Cloud providers offer resources which clients can use to process their data but encryption makes this data unusable on the provider�s side thus giving the client only a single choice i.e. either security of data or benefits of cloud computing and putting them in a dilemma. This is the main reason clients shy away from using this great technology. In this paper it is discussed how obfuscation which is semi-encrypting of data so that it does not loose its usable form while reducing the privacy risk, is an optimal security measure for cloud computing. Based on a through review of various obfuscation techniques, best technique has been chosen and an algorithm for obfuscation has been proposed in this paper which uses the same technique.
Keywords: Obfuscation, Encryption, Cloud, Security, Privacy.
Abstract
Design and Analysis of Clock Recovery Circuit in 45nm Technology
Abhinav Singh, Ambikabathi Bakiya
DOI: 10.17148/IJARCCE.2016.5571
Abstract: Clock Recovery circuits are used to detect the transition in the received data and generate a periodic recovered clock. These circuits are used in high speed asynchronous communication systems. This paper presents the design of clock recovery circuit using analog pll in 45nm technology. The proposed circuit is designed keeping in mind some basic design goals which are nothing but the expected enhancement in those parameters which reflects the performance and robustness of the circuit. Such as- To shift the frequency from 2Ghz to 3Ghz, increase rise time by 20%, increase the data rate by 25%, To overcome drawbacks of earlier models, to maintain robustness of circuit, reduce area, To build a power efficient circuit. The proposed circuit consist of TSPC-DFF based phase frequency detector/XOR frequency detector, single ended/differential wide swing charge pump, ring VCO, low pass filter, TSPC based frequency divider(DFF based) .
Keywords: Clock recovery circuit, PLL, Phase Frequency detector, VCO, Charge Pump, Frequency Divider.
Abstract
Hybrid Data Forwarding Strategies for Distance – Bounded Routing Protocol in Vehicular Ad-Hoc Network (VANet)
Pooja Polshetwar, V.Padmavathi
DOI: 10.17148/IJARCCE.2016.5573
Abstract: This paper focuses on distance-bounded routing, whose goal is to deliver messages to the destination using proper delivery strategy and by utilizing radio network in necessary condition so minimizing the cost of communication network. Most of the researches emphasize on minimizing the end-to-end delay without focusing on minimizing the usage of radio. The messages can be delivered to the destination by hybrid technique i.e. data mulling (data carried by the vehicle) and packet forwarding (data transmitted through radio network). In this paper we use Euclidian distance relationship to predict the distance between the vehicles. This Euclidian distance between two vehicles is compared with given threshold distance to predict the proper delivery strategy.
Keywords: AODV, Data Forwarding, Mulling, VANET.
Abstract
Auto Irrigate Based on The Need and Collect Irrigation Data for Data Mining Application
Vikas Gowda K S, Jagadisha N
DOI: 10.17148/IJARCCE.2016.5574
Abstract: Agriculture is the backbone of the life cycle. But it�s becoming hard to farmer to effectively farm in their land due to the scarcity of the water. Since water is the crucial part of agriculture, efficient watering will lead to the efficient farming, so it�s a high requirement to irrigate the farm land based on the water need of the crop in order to yield efficient farming, which leads to more profit. And reduce the excess usage of water and save it from being wasted. Nowadays data is major thing running around to derive the conclusion, collecting the farm data will allow one to analyze the collected data and use it for data mining applications to derive the more profitable way of farming.This paper aims at automating the irrigation to the farm land depending on the soil and crop need and it also enable one to collect the environmental data by spending very less budget.
Keywords: efficient farming, data mining applications.
Abstract
Assuring Confidentiality with Minimum Data Redundancy in Hybrid Cloud
Mr R. V. Argiddi, Ms Prachi Sontakke
DOI: 10.17148/IJARCCE.2016.5575
Abstract: Cloud computing as the necessity of the ever-increasing volume of data and its storage, comes with the critical challenge of managing this large amount of data with scalability. A data compression technique called deduplication is used for eliminating the redundant data by deleting the duplicate copies so as to save the cloud space. Apart from data compression, we are also applying the security aspects using convergent encryption with some additional concepts viz., cryptographic tuning and domain separation. Maintaining the authorized access for the user�s confidential data, the concept called �Proof of Ownership� is used for recognizing the respective user along with his access privilege.
Keywords: secure deduplication, convergent encryption, cryptographic tuning, domain separation.
Abstract
A Review On Robust Digital Watermarking for Coloured Images using SVD and DWT Technique
Priyanka Shah
DOI: 10.17148/IJARCCE.2016.5576
Abstract: Watermarking is the method to solve the issue of copyright degradation, yet this must be resolved by keeping a steady Check on the imperceptibility and robustness which incur to be its main objective. In order to get done these objectives the usage of a hybrid transform is adopted in this paper, the idea behind using a hybrid transform is that the cover image is amended in its singular values rather than on the DWT sub bands, then the watermark makes itself vulnerable to vivid attacks.
Keywords: Authentication; copyright protection; robustness; Discrete Wavelet Transform (DWT); Singular Value Decomposition (SVD).
Abstract
A Survey Paper on Leach Routing Protocol and Its Variants in Wireless Sensor Network
Vijay kumari, Sunil nandal
DOI: 10.17148/IJARCCE.2016.5577
Abstract: Wireless sensor network is a non-infrastructure network which contains a number of homogeneous or heterogeneous sensor nodes. These sensor nodes have limited battery power. One of the major factor that we have to consider while designing the WSN routing protocol is efficiently use of energy resources. So minimizing the energy consumption and increasing the lifetime of the network is the major issue in the wireless sensor network. Study shows LEACH is one of energy efficient routing protocol. LEACH is a hierarchical clustering based routing protocol which improve the lifetime of the network by distributing of energy load throughout the whole network. This paper will present a brief detail of LEACH protocol and its variants.
Keywords: wireless sensor network (WSN), Low Energy Adaptive Clustering Hierarchy Protocol (LEACH), Q-LEACH, Network lifetime.
Abstract
Securing Secret Messages: A Review
Anil C., Anuradha S., Arpita V. Murthy, Sridevi S., Guruprasad M. Bhat
DOI: 10.17148/IJARCCE.2016.5578
Abstract: Due to advancements in technology, most of the operations are now being conducted on server/cloud. But this increases the potential threat of data leakage by hackers. Thus, in order to secure the data, many steganographic and cryptographic methods have been proposed. An overview of these systems has been reviewed in this paper.
Keywords: Steganography, Cryptography, Visual Cryptography, AES, DES, Triple DES, TDES, 3DES.
Abstract
Automated Traffic Signals: A Review
Nikhila R., Lekhashree K., Koushik M., Abhishek K.A., Madhukar M
DOI: 10.17148/IJARCCE.2016.5579
Abstract: One of the major problems faced by the people living in well-populated areas is the issue of �Traffic Congestion�. Traffic lights and manual traffic police force have been helpful in managing the traffic. Performing scientific analysis further facilitates to reduce the traffic related issues. This paper discusses about different approaches proposed for traffic analysis and management.
Keywords: Traffic, Road, Lane, Image sensors, Traffic light control.
Abstract
Implementation Diversity and Partial Connection of Routers in Application –Specific Network-On-Chip Synthesis
Komala M, Prathiba.B
DOI: 10.17148/IJARCCE.2016.5580
Abstract: The partial connection and the implementation diversity of routers are exploited. Network on chip has emerged as a promising solution to future System on Chip (SOC). Network on Chip (NOC) topology synthesis determine the connection of the routers. In the existing topology synthesis method consider only a single implementation for each size of the router. To tackle this drawback, we propose a Novel NOC topology synthesis method where the implementation diversity of the routers is exploited to produce optimal topologies in terms of area and or the power consumption. Here the algorithm used produces a single optimised route which reduces the route discovery time, number of hops, and the energy consumption.
Keywords: network on chip (NOC), system on chip (SOC), synthesis, routers.
Abstract
An Overview of Transformation Based Remapping and Parallelism for high utilization and energy efficiency in CGRAs
Hema K. Reddy, P. K. Agrawal, Gaurav J. Sawale
DOI: 10.17148/IJARCCE.2016.5581
No abstract available.
Abstract
Data Mining Technique to Understand Students Learning Experience
Meenakshi Das , Pinky Saikia Dutta
DOI: 10.17148/IJARCCE.2016.5582
Abstract: Social media sites such as Twitter, Facebook, You-tube are very popular sites in higher educational student�s like engineering, medical, pharmacy, trainees and other than students too. It is a platform where one can share their ideas, views and discuss experiences with others in a formal and casual manner. Now a day�s gregarious media provides opportunities for understanding human behavior from the large aggregate data sets that their operation collects. Data Mining is very useful in the field of education, especially while examining students� learning behavior. Student�s informal discussion on social media (Twitter) elucidates their educational experiences, opinions, feelings, mind-set and concerns about the cognition process. Data from such un instrumented environments can provide valuable knowledge to apprise student problem. Examining such data, however, can be arduous. The problem of students� experiences reflected from social media content requires human interpretation. However, the growing scale of data demands automatic data analysis techniques. In this paper we propose a workflow to bridge together both qualitative analysis and large-scale data mining techniques. We fixated on engineering students Twitter posts to understand issues and quandaries in their learning experiences. First a sample is taken from student�s tweets and then qualitative analysis is conducted on the sample which is associated to engineering student�s educational life. It is found that engineering students encounter problems such as heavy learning load, lack of social meeting, sleep deficiency etc. Based on this outcome, Naive Bayes Multi-label Classifier algorithm is applied to categorize tweets presenting student�s problems. This study presents a methodology and result that demonstrate how casual social media data can provide insight into student�s experiences.
Keywords: Data mining, Social networking, Web text analysis, Na�ve bayes, Computer and education.
Abstract
Processing of Real Time Big Data for Machine Learning
Namrata Gawande, Ramdas Gawande
DOI: 10.17148/IJARCCE.2016.5583
Abstract: Assets of real time digital world daily generate massive volume of real-time data (mainly referred to the term �Big Data�), where insight information has a potential significance if collected and aggregated effectively. In today�s era, there is a great deal added to real-time remote sensing Big Data than it seems at first, and extracting the useful information in an efficient manner leads a system toward a major The computational challenges, such as to analyse, aggregate, and store, where data are remotely collected. Keeping in view the above mentioned factors, there is a need for designing a system architecture that welcomes both real time, as well as offline data processing. Therefore, in this paper, we propose real-time Big Data analytical architecture for processing such data environment.
Keywords: Big Data, Hadoop, HDFS, Cloud Computing, data analysis.
Abstract
Integrity Auditing and Secure Deduplicating the Data on Cloud Storage
Mr. Lohith Kumar K K, Mr. Ashwin Kumar M
DOI: 10.17148/IJARCCE.2016.5584
Abstract: As cloud computing is a kind of Internet-based computing technology develops in recent years that provides shared processing assets and information as well as data to computers and other different devices on demand, outsourcing data to cloud service for storage becomes an important trend, which advantages in saving endeavors on substantial data maintenance and administration. The outsourced cloud storage is not completely reliable; it raises some security worries on how to realize data deduplication in cloud while getting integrity auditing. In this work, we study the issue of integrity auditing and secure deduplication of data on cloud storage. Specifically, aiming at accomplishing both data integrity and deduplication in cloud storage, we introduce two secure systems, namely SecCloud and SecCloud+. SecCloud presents an auditing entity with a maintenance of a MapReduce cloud, which helps clients create data tags before uploading a file as well as audit the integrity of data having been put in cloud. Compared with past work, the computation by user in SecCloud is extraordinarily diminished amid the file uploading and auditing phases. SecCloud+ is designed persuaded by the fact that customers always want to encrypt their data before uploading, and enables integrity auditing and secure deduplication on encrypted data.
Keywords: Cloud Storage, outsourcing, data auditing, secure deduplication, SecCloud+.
Abstract
Intrusion detection system to provide security in a network against denial of service (dos) attacks
Amogh Mahesh, Nikhil M,SathyaPramod D S, Ajith L, Neelaja K
DOI: 10.17148/IJARCCE.2016.5585
Abstract: In the era of internet, the network security has become the key foundation for many web applications. Intrusion detection is one which resolves this kind of a problem of internet security. Improperness of intrusion detection system (IDS) has given an opportunity for data mining technique to make several contributions to the field of intrusion detection. In the recent years, many researchers are using data mining technique for building IDS. Here, we propose a new approach by utilizing the data mining techniques such as neuro-fuzzy logic and support vector machine(SVM) helping IDS to attain high detection rate. The proposed technique has four major steps: primarily, k-means clustering is used to generate different training subsets. Then, based on obtained trained data subset, different neuro-fuzzy models are trained. Subsequently, a vector for SVM is formed and in the end, classification using radical SVM is to detect intrusion has happened or not. Experimental results show that out proposed approach do better than BPNN, multiclass SVM and other well-known major methods such as decision tree and Columbia model in terms of sensitivity, specificity and in particular detection accuracy.
Keywords: Intrusion detection system, Fuzzy-Neural networks, Support Vector Machine (SVM), K-means clustering.
Abstract
Continuous Tense Repetition Detection System
Dr.Shubhangi D C, Bushra Jabeen
DOI: 10.17148/IJARCCE.2016.5586
Abstract: Copy discovery is the procedure of recognizing different representations of same genuine substances. Today, copy recognition strategies need to handle ever bigger datasets in ever shorter time. Keeping up the nature of a dataset turns out to be progressively troublesome. We display two novel, dynamic copy identification calculations that fundamentally build the proficiency of discovering copies if the execution time is restricted. They augment the addition of the general procedure inside of the time accessible by reporting most results much sooner than conventional methodologies. These progressive algorithms are used to process over the larger datasets within a shorter period of time. They find the duplicates with greater efficiency even if the execution time is limited. These algorithms yield maximum results of the overall process within the specified period of time much earlier when compared to the traditional approaches. Most of the experimental results reveal that efficiency achieved through progressive algorithms is twice that of the traditional duplicate detection algorithms and bought much improvement upon related work.
Keywords: Sorting, Blocking, Pre-processing, Duplicate detection, Dataset.
Abstract
Cloud Data Encryption Using RSA,Enabling Multi-Keyword Ranked Search and Achieving Privacy Requirements
Akshatha MS, Renita Tellis
DOI: 10.17148/IJARCCE.2016.5587
Abstract: Cloud computing, is also known as on-demand computing, and provides services to customers over the internet. It serves users by allowing them to store and access data from cloud server at anytime, anywhere, using any devices. Users upload their private data on to the cloud which has to be kept a secret. For such secure information storage many go for encryption approach before outsourcing to cloud. An efficient search scheme needs to be used in order to search data over the encrypted cloud. While having a large number of data users, and documents on the cloud, it is essential to give multi-keywords in the search query to get documents only relevant to these keywords in a ranked order. Coordinate matching and inner product similarity are the multi-keyword concepts used to get the relation between the documents and search queries and similarity measures, respectively.
Keywords: Cloud computing, multi-keyword, data privacy, inner product similarity, coordinate matching.
Abstract
Location Based Smart Services
Neha Bhagwat, Samiksha Bhat, Tejas Shah, Umakant Mali
DOI: 10.17148/IJARCCE.2016.5588
Abstract: In today's period everybody is utilizing cellular telephones for correspondence. In the meantime Mobile Providers are likewise giving the assortment of administrations to clients. In endeavour to develop this, we propose GPS construct savvy administrations in light of cell phones. A Location-Based Service (LBS) is a portable registering application that gives data and usefulness to clients in view of their geological location. In this anticipate we are going to actualize location based administrations. These administrations like, Location based reminder, friend finder and notifications about offers will be useful to the general population in everyday life. The proposed innovation permits client to get all the related data about their location in everyday life. The client doesn�t need to give their location as info physically. We show a configuration and usage of a LBS application running on web dynamic android worked handsets utilizing the GPS innovation.
Keywords: LBS, GPS, Google API, Google maps.
Abstract
A Review on Rank Image Tags Using Image Annotation
Shilpa Shree. B, Dr.Chethan H.K
DOI: 10.17148/IJARCCE.2016.5589
Abstract: With the raising in the amount of images in image matching and retrieval in social Media , Image annotation has egressed as an significant research issues due to its practical application .Many social image search engines are based on keyword/tag matching . In this paper , the proposed method combines the prediction models for different tags into a matrix, and casts tag ranking into a matrix recovery problem. It acquaints the matrix trace norm to explicitly control the model complexity, so that a reliable prediction model can be acquired for tag ranking even when the tag space is big.
Keywords: Automatic Image Annotation; Tag Ranking; User Tags; Image Retrieval.
Abstract
Authorized Data Availability with Secure Deduplication Framework using Hybrid Cloud
Ms. Rajani Sajjan, Ms. Gayatri Chavan, Dr. Vijay Ghorpade
DOI: 10.17148/IJARCCE.2016.5590
Abstract: Since the demand for data storage is increasing day by day and by the industry analysis we can say that digital data is increasing gradually, but the storage of redundant data is excess which results in most of the storage used unnecessary to keep identical copies. So the technology de-duplication is introduced to efficiently utilize the cloud storage system. It is one of the important techniques used for eliminating duplicate data copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To maintain confidentiality for the sensitive data while associating deduplication, the encryption technique has been used to encrypt the data before outsourcing to the users. To enhance data security this paper makes the first attempt to formally address the problem of authorized data deduplication for which the differential privileges of users are further deliberated in duplicate check besides the data itself. Security will be analysed in terms of four aspects that is making the data securely available, authorization of duplicate check, maintaining integrity and also to make the data confidential. The usage of hybrid cloud architecture is used which supports large cloud user by efficiently storing their data in the cloud environment by using the combination of both public cloud and private application server, So that it provides the facility to store sensitive data in private application server and less critical data on to the public cloud where huge savings can be made.
Keywords: cloud computing, de-duplication, data availability,data compression, cloud service provider, private application server, public storage server.
Abstract
A Web Usage Mined and Web Structured Enriched Web-Page Recommendation Model
Anura Khede, J S Raikwal
DOI: 10.17148/IJARCCE.2016.5591
Abstract: Web-Page recommendation is of outstanding significance in today�s dynamic world of internet. Intelligent web systems discover useful data using web mining techniques so as to do effective web-page recommendation. The proposed model is based on domain knowledge of web site and integrates web usage and structure mining for enriched connectivity-based recommendations. It is basically a semantic enhanced web page recommendation whose foundation is semantic network (Knowledge map) creation of a website. This network represents domain terms, Web-pages and the relations between them. Each web page has associated PageID which helps to calculate PageHits and the analysis of links between the pages helps to calculate PageRank.The entire topology of the website can be restructured after analysing user�s behaviour through PageHit counts and PageRank and a well-structured website attracts more number of user and this in turn generates a better website ranking in search engine results. A well maintained site architecture can entertain multiple users simultaneously and promotes optimum bandwidth utilization.
Keywords: Recommendation systems, Web usage mining, Web structure mining, Semantic network.
Abstract
Proficient and Amplified Image Revival via Visual immersion and Saliency Ingredient
Mr. Kumkar J.D, Prof. Kapil Vyas
DOI: 10.17148/IJARCCE.2016.5592
Abstract: Partial duplicate image revival plays an ample role in the real world application such as landmark search, copy protection, fake image detection. Users regularly upload images which are partially duplicate images on the domains like social site Facebook, hike and whatsapp etc. The partial image is only part of whole image, and the various kind of transformation like scale, resolution, illumination, and viewpoint. This technique is demanded by various real world applications and this has been motivated towards this research. In object based image retrieval methods we use the complete image as the query. This revival technique is similar to object based image retrieval. This technique is compare with image revival system by using the bag of visual words (BOV). Typically no any spatial information is used to retrieve image, so this approach is not execute in background noise. There is lots of background noise in the images and impossible to perform operation on the large scale database of the images.Two observations are. First, public show various objects through the images which are shared on the web, we also hope that the returned result also focus on the major parts or objects. Regions of interest are only found in salient region of the revival. The similar region in the returned result also identical to the salient region of the images. To filter out the nor-salient region from the image, which able to eliminate the background noise we introduce visual attention analysis technique. We also generate saliency region which having the expected visual contents.
Keywords: Partial duplicate image, Bags of visual words, Visual attention, Saliency feature, visually salient and rich region (VSRR) Query image, Source image, Sparse coding.
Abstract
Smart Home Control and Monitor System Using Power of IoT’s
Abhijeet Rajurkar, Onkar Shinde, Vinayak Shinde, Bhushan Waghmode
DOI: 10.17148/IJARCCE.2016.5593
Abstract: In today�s technological era, the use of modern electronic devices has been increases swiftly with various methods for controlling and monitoring home appliances such as ZigBee, Bluetooth, SMS. With the rapid growth in use of internet, it enables all new approaches to control and monitor smart home remotely. The Internet of Things allows objects to be sensed and controlled remotely across existing network infrastructure, creating opportunities for more direct integration of the physical world into computer-based systems, and resulting in improved efficiency, accuracy and economic benefit; when Internet of Things is augmented with sensors and actuators, the technology becomes an instance of the more general class of cyber-physical systems, which also encompasses technologies such as smart grids, smart homes, intelligent transportation and smart cities. Each thing is uniquely identifiable through its embedded computing system but is able to interoperate within the existing Internet infrastructure. Experts estimate that the IoT will consist of almost 50 billion objects by 2020. Home automation systems are collections of interconnected electronic devices for controlling different types of functions within a house, such as temperature monitoring, light control, fire sensor etc. Smart devices are ideal in providing a user friendly interface in a home automation system, due to their portability and their wide range of capabilities. Proposed system has User Friendly GUI and can be access globally from any device which has internet connectivity.
Keywords: Smart Home, Internet of Things, Home Automation, Remote Control.
Abstract
A Review: Skin Color Segmentation
Sumandeep Kaur
DOI: 10.17148/IJARCCE.2016.5594
Abstract: Skin color segmentationis used to determine whether the color pixel is a skin color or non skin color. Understanding the skin color segmentation which supports to design YCbCr and CIELab algorithm for skin color segmentation which use in various applications such as face detection, human computer interaction, medical x-rays scan, agriculture. In this paper we discuss on face detection algorithms based on skin color. Two color spaces RGB, YCbCr are of main concern. It combined the Crowley and Coutaz (1997) algorithm for RGB and cahi and ngan (1999) algorithm for YCbCr to get a new skin color based face detection algorithm which gives higher accuracy.
Keywords: YCbCr color model, RGB color model, Segmentation, Comparison.
Abstract
High Dimensional Object Analysis Using Rough-Set Theory and Grey Relational Clustering Algorithm
Prashant Verma, Yogendra Kumar Jain
DOI: 10.17148/IJARCCE.2016.5595
Abstract: High dimensional feature selection and data assignment is an important feature for high dimensional object analysis. In this work, we propose a new hybrid approach of combining attribute reduction of the Rough-set theory with Grey relation clustering. Designing clustering becomes increasingly tougher task as the dimensionality of the data set increases. Previously constraint based clustering algorithms that satisfy user specified constraints have been used for high dimensional data sets. Such algorithms suffer from serious limitations and can introduce biases of the user, thus obscuring discovery of clusters and hidden relations in the data set. In this work, we transform the high relevance values into the same class using Grey relation to give an appropriate cluster of information, which we process through Rough set to reduce attributes. We use this approach to analyze the data of plant diversity from North America and find that ground elevation and species numbers can capture the most important attributes of the data set. This analysis of ecological data presents a proof of principal for the novel hybrid approach using Grey relational clustering and Rough set theory.
Keywords: RST, GRA, Rule Generation, High Dimensionality, Indiscernibility (IND).
Abstract
Noise Analysis of Common-Drain Amplifier using Stochastic Differential Equation
Dushyant Kumar Shukla
DOI: 10.17148/IJARCCE.2016.5596
Abstract: In this paper, we analyse the effect of noise in a common-drain amplifier working at high frequencies. Extrinsic noise is analyzed using time domain method employing techniques from stochastic calculus. Stochastic differential equations are used to obtain autocorrelation functions of the output noise voltage and other solution statistics like mean and variance. The analysis leads to important design implications for improved noise characteristics of the common-drain amplifier.
Keywords: common-drain amplifier, noise, stochastic differential equation, mean and variance.
Abstract
A Query by Example Approach for Retrieving 3D Images Based On Their Visual Similarity
Ms. Meenakshi Srivastava
DOI: 10.17148/IJARCCE.2016.5597
Abstract: With the amount of superhighways, a vast amount of data is currently available on the internet. The advances in the methods for processing and coding images, video and audio have led to a wide spectrum of non-traditional forms of data being available across the network. Text, images video and audio data, all perhaps stored in multiple heterogeneous formats, form the core of what is known today as multimedia data. 3D objects are an important multimedia data type with many application possibilities. 3D models can represent complex information, and the problem of content-based searching in large 3D object repositories arises in a number of practical fields. The large amounts of 3 D objects as multimedia data that are being collected in multimedia archives have originated the need for means to search the archives. It is recognized that, unlike text, for which effective content-based retrieval ways are presently used, it is challenging to automatically indexed or search 3D image supported their content. For this, it is necessary to make use of any available description associated with the objects, concerning either the content itself or the context of the objects� production and use. Metadata is getting a fair share of attention in current research on solutions to the querying of multimedia objects. But retrieval of multimedia information on the basis of only keyword or metadata will not solve the problem, in the present manuscript we have proposed a web based multimedia information storage and retrieval model is proposed for the integration of metadata and content. This model is tested on the implementation of a prototype of multimedia information storage and retrieval system based on a relational database. Statistical functions are used on medical images to calculate similarity for storage and retrieval.
Keywords: 3D images, Multimedia, Visual Similarity, Storage and Retrieval.
Abstract
Clarifying Indexed Lists From Web Databases.
Mr.Jamdar M.P, Prof. Bere S.S.
DOI: 10.17148/IJARCCE.2016.5598
Abstract: An extending number of databases have been able to be web accessible through HTML structure based interest interfaces. The data units returned from the essential database are normally encoded into the result pages dynamically for human examining. For the encoded data units to be machine process able, which is key for a few applications, for instance, significant web data gathering and Web connection shopping, they ought to be removed out and consigned imperative names. We need to demonstrate a modified clarification approach that first modifies the data units on a result page into different social affairs such that the data in the same get-together have the same semantic. By then, for each social occasion we clear up it from different points and aggregate the assorted remarks to predict a last remark name for it. A remark wrapper for the request site is therefore manufactured and can be used to remark on new result pages from the same web database. Our tests demonstrate that the proposed system is astoundingly reasonable.
Keywords: Data alignment, data annotation, web database, wrapper generation.
Abstract
Optimization of Intrusion Detection Capability in Wireless Sensor Network
Richa Kumari
DOI: 10.17148/IJARCCE.2016.55100
Abstract: Wireless Sensor Network has most widely used applications ranging from health care to military. Wireless Sensor Networks (WSNs) have many tempting features but due to the lack of any defense mechanism, the security becomes an issue in such networks. To operate WSNs in a secure way, any kind of intrusions should be detected before malicious attackers can harm the network. The intrusion detection system identifies the legitimate attackers in the network area. In this paper we have optimized the intrusion detection capability in a wireless sensor network using Gaussian distribution and uniform distribution method. Furthermore, the performance of Gaussian-distributed WSNs is compared with uniformly distributed WSNs. The effect of various network and system parameters such as sensing range of the sensors, number of sensor deployed, intruder�s starting distance and maximum allowable intrusion distance on the intrusion detection probability of the network has been observed. Hence detection probability can be analytically formulated in a random WSN and an appropriate deployment strategy can thus be selected to determine critical network parameters.
Keywords: Gaussian and uniform distribution, intrusion detection, WSNs.
Abstract
Survey on KNN and Its Variants
Alka Lamba, Dharmender Kumar
DOI: 10.17148/IJARCCE.2016.55101
Abstract: This paper discusses about KNN algorithm and its various modified versions available in formerly done studies. Despite the simplicity of KNN algorithm there are a number of shortcomings in it i.e. high computational cost, large memory requirement, equal-weighted features and in last deciding appropriate value of the input parameter k. Many researchers have proposed modified versions of KNN algorithm to overcome these shortcomings. In this study, we will analyze profoundly these variants of KNN algorithm and their performances.
Keywords: Evolutionary Computing; KNN; lazy learner; metaheuristic; nearest neighbour.
Abstract
Performance Evaluation of Spontaneous Wireless Ad Hoc Network
Swapnali D Patil, V.N.Nitnaware
DOI: 10.17148/IJARCCE.2016.55102
Abstract: Spontaneous wireless network is a scheme consists of ad hoc networking in which devices establish communication with nearby devices with anytime and anywhere without using any backbone network. The notion of ad hoc networks was often associated with communication on combat fields and at the site of a disaster area. It is a self-configured network for that we have to provide some basic services and application. To achieve this, authentication of devices is must. In this paper a secure protocol for spontaneous wireless ad hoc networks which uses an encryption scheme and the trust between users in order to exchange the initial data and to exchange the secret keys that will be used to encrypt the data. The protocol includes all functions needed to operate without any external support. Attacker node may send data which disturb the network. Main focus of paper is describes secure protocol with enhance security for spontaneous wireless ad hoc network.
Keywords: spontaneous network, wireless ad hoc networks, secure protocol, authentication.
Abstract
Development of End to End Triage Automation Workflow Tool for Testing
Vidyashree M V, Dr. H D Phaneendra
DOI: 10.17148/IJARCCE.2016.55103
Abstract: Automation work flow which automates, to at least some degree, a process or processes. It can be process and requires a series of steps to be automated via software. Steps of the process do not require human intervention.Bug triage is a process where tracker issues are screened and prioritised. Auto triage helps in triaging the build without manual effort.
Keywords: Automation testing, Automation workflow, Bug triage, Triaging.
Abstract
A study on increasing Wireless Mesh Network performance by routing in advance using cross layer design
Ahmed Alahdal, Dr.G.N.Shinde
DOI: 10.17148/IJARCCE.2016.55104
Abstract: Wireless Mesh Networks routing standard has not been yet finalized which brought numerous proposals for routing protocols. Regardless the different protocols, the routing process occur at a specific layer called internet layer in TCP/IP, where every packet has to route for its path to destination, therefore an estimated time of milliseconds is to be consumed on every routing process. This paper applies cross layer design to route in advance and prepare a ready path for the packets on the time of its arrival for routing, so the packet saves the time needed on finding its path. The idea is to send a copy of the destination IP address from application layer to the internet layer a head of its time to be delivered for path routing, in order to conduct a routing path for the packet while the original packet along with the original IP address passes the rest of the layers and complete the TCP/IP layering procedure. The work proposes that when a packet reaches the internet layer a routing path should be available and no time is wasted for path routing.
Keywords: WMNs, Cross Layer, Routing Protocols, TCP/IP, Path Routing.
Abstract
Implementation of Page Object Model in Selenium Automation
Nishmitha G.C , Dr. H.D. Phaneendra
DOI: 10.17148/IJARCCE.2016.55105
Abstract: In automation of any UI using Selenium, Too many duplicated code is used. Duplicated code could be caused by duplicated functionality and this will result in duplicated usage of locators. If some locator will change, you have to walk through the whole test code to adjust locators where necessary. By using the page object model we can make non-brittle test code and reduce or eliminate duplicate test code. Beside of that it improves the readability and allows us to create interactive documentation. We can also create tests with less keystroke. An implementation of the page object model can be achieved by separating the abstraction of the test object and the test scripts.
Keywords: Page Object Model, Selenium, Automation Framework, Test NG.
Abstract
Removing Photography Artifacts Using Flash & No-flash Image Pairs
Dr. Prashant R. Deshmukh, Ankita R. Borkar
DOI: 10.17148/IJARCCE.2016.55106
Abstract: In this paper, we are going to take a novel view based on a photography approach in which we are concerning the study of removing Photography Artifacts like removal of glare or the flash hot spot and remove reflection, Highlights caused by glossy surface . so here we are using both Ambient and Flash images to. In this proposed scheme system we are going to focus on different approaches for remove the Photography artifact. We are presenting a novel Weighted Mapping scheme where we compute weighted averaging to remove glare and also introduce techniques like Diffusion tensor, cross diffusion tensors using gradient fields of both ambient and flash image to remove the reflection. We used these tensors to remove reflections in an image We analyze some experimental results that demonstrate the proficiency of algorithms to produce improved quality of flash images having glare and also reflection.
Keywords: Glare, flash, Gradient field, reflection removal, cross Diffusion tensor, high dynamic range.
Abstract
A Short Survey on Cover Objects for Hidden Communications
Vidya, Abhishek Kajal
DOI: 10.17148/IJARCCE.2016.55107
Abstract: In this survey paper we will discuss about the types of the steganography cover objects. Steganography is an art and science of Hide the data in a cover image using some techniques that it remains undetected by the unauthorized access. We hide the data in a manner that the stego image looks like a single entry by any third person. No one has doubt that the image is the stego image. We use some different methods that keep data to be secret. It is a powerful tool for security with which we can keep the data secret behind an object. An object may be Text, Audio, Video, and Image. The factor that affects the steganography methods are PSNR, MSE, SNR, Payload Capacity and Robustness.
Keywords: Steganography, PSNR, MSE, Stego-Image, Stego-Key, Data covering, Data Extraction, Cryptography.
Abstract
Computing Shortest Path for Graph Using FEM Framework
Piyush Kulkarni, Kapil Vyas
DOI: 10.17148/IJARCCE.2016.55108
Abstract: This paper focus on computing shortest path as finding the distance between two vertices in graph or tree. Graph data can use in many domains like a social network and in knowledge graph. This graph search includes sub-graph. The problem of finding the shortest path between two nodes can be solved using the salesman traveling path, minimal spanning tree, and the likewise. The problem occurred with the graph based searching when a graph is too big to fit in memory and for that, it uses the external memory. The disk-based method has some limitations when graph exceeds its size. In this paper, we are analyzing the shortest path for efficient relational approaches to graph search queries. For this, we use three relational operator based-on which we introduce the framework for bridge the gap between graph operation and relational operator. We show the new feature of SQL such as merge statement and windows function to improve the performance of FEM framework. To avoid extra indexing overhead and improve scalability and performance, we propose an edge weight aware graph partitioned schema and design bi-directional restrictive BFS (breadth-first-search). The final experimental results illustrate our relational approach with optimization strategies can achieve high performance and scalability.
Keywords: graph, shortest path, Relational database, graph search queries, graph indexing
Abstract
An Advanced Technique of Image Matching Using SIFT and SURF
Preeti Mandle, Bharat Pahadiya
DOI: 10.17148/IJARCCE.2016.55109
Abstract: Image matching is a method of identifying an image from the already stored images in the database. Feature detection and feature matching are two important stages of the image matching process. This paper explains the improved method of image matching to enhance the performance of two well known images matching methods SIFT and SURF by considering the color information present in the images and provides an algorithm for reducing the matching time. The behaviour of feature detection algorithms is compared by taking one image of different conditions like illumination, scale, rotate, etc. The performance is evaluated and compare the results of SURF with SIFT by using a dataset of five images. SURF algorithm is better than the SIFT algorithm in terms of speed and will give better matching.
Keywords: SIFT, SURF, Feature detection, Image Matching.
Abstract
Dynamic Backlight Scaling Optimization
P.P.Waghralkar, Suyog Nawale, Jaynish Patil, Pradip Supekar, Harish Karad
DOI: 10.17148/IJARCCE.2016.55110
Abstract: With the increasing variety of mobile applications, reducing the energy consumption of mobile devices is a major challenge in sustaining multimedia streaming applications. This paper explores how to minimize the energy consumption of the backlight when displaying a video stream without adversely impacting the user�s visual experience. First, we model the problem as a dynamic backlight scaling optimization problem. Then, we propose algorithms to solve the fundamental problem and prove the optimality in terms of energy savings. Finally, based on the algorithms, we present a cloud-based energy-saving service. We have also developed a prototype implementation integrated with existing video streaming applications to validate the practicability of the approach. The results of experiments conducted to evaluate the efficacy of the proposed approach are very encouraging and show energy savings of 15-49 percent on commercial mobile devices.
Keywords: Energy-efficient optimization, dynamic backlight scaling, multimedia streaming applications, cloud services, mobile devices.
Abstract
Fuzzy Logic in Software Effort Estimation: An Exploration
Archana Srivastava
DOI: 10.17148/IJARCCE.2016.55111
Abstract: The inaccuracy of software cost estimates has for long been a source of frustration to software practitioners and cost estimation researchers. Despite huge efforts to improve this important practice, estimation accuracy is still low. The accuracy of project estimates can have a dramatic impact on profitability. Software development projects are characterized by regularly over running their budgets and rarely meeting deadlines. Effective software estimation is one of the most important software development activities however it is also one of the most difficult tasks to estimate the accurate cost. Estimating is a critical business process, especially at the early stages of the project. This paper discusses & reviews the importance and need for accurate software project estimation and the problems associated with estimation. It also discusses that how uncertainty in software cost estimation can be reduced by using fuzzy logic approach.
Keywords: cost estimations, effort estimation, fuzzy.
Abstract
Image Edge Unmasking by Applying Renovated Ant Colony Optimization Technique
Payal Hooda, Ms Pooja Ahlawat
DOI: 10.17148/IJARCCE.2016.55112
Abstract: Edge detection is a fundamental problem in image analysis. Ant Colony Optimization is also an evolutionary optimization technique, which has been applied to this problem. The proposed ACO-based edge detection algorithm represents the edge pixel position of the image using a pheromone matrix in which the movements of the ants driven by the image�s intensity values are recorded. The RMSE and PSNR Values has been computed of existing algorithm and proposed algorithm with visualization concepts. Series of simulation research demonstrate the feasibility, effectiveness and superior performance of the proposed approach as compared to basic ACO.
Keywords: ACO, Acquaintance, Edges, Pheromone, Shortest path.
Abstract
Denoising of Image Using The LPG-PCA
Dipali D. Sathe, Prof. Dr. K.N. Barbole
DOI: 10.17148/IJARCCE.2016.55113
Abstract: Image processing plays a very important role in image denoising. As most of the applications make use of images in various such as medical field, satellites images, aerial images, space exploring and many more. This image is disturbed by the various factors and hence leads to the noisy image. This leads to the necessity of the image denoising technique. These noisy images mainly include the noise such as Gaussian noise, salt and pepper noise, speckle noise etc. The technique used to Denoised the image is depending on the type of noise it includes and hence it is compulsory to have the knowledge of the noise present in the image. A large number of algorithms has been developed to remove the noise and enhance the image features. This paper gives the description of noise, types of noise and LPG-PCA algorithm that has been used for denoising the image.
Keywords: noise; types of noise; LPG-PCA algorithm.
Abstract
Weather Prediction Based on Decision Tree Algorithm Using Data Mining Techniques
Siddharth S. Bhatkande, Roopa G. Hubballi
DOI: 10.17148/IJARCCE.2016.55114
Abstract: �Weather forecasting is a most important application in meteorology and has been one of the most scientifically and technologically challenging problems around the world�. We investigate the use of data mining techniques in forecasting attributes like maximum temperature, minimum temperature. This was carried out using Decision Tree algorithms and meteorological data collected between 2012 and 2015 from the different cities. Weather prediction approaches are challenged by complex weather phenomena. Weather phenomena have many parameters like maximum temperature, minimum temperature, humidity and wind speed that are impossible to enumerate and measure. On available datasets we apply the Decision Tree Algorithm for deleting the inappropriate data. Generally maximum temperature and minimum temperature are mainly responsible for the weather prediction. On the percentage of these parameters we predict there is a full cold or full hot or snow fall. This paper develop a model using decision tree to predict weather phenomena like full cold, full hot and snow fall which can be a lifesaving information.
Keywords: Weather Prediction, Data Mining, Decision tree, Meteorological Data Sets.
Abstract
Word Wise Script Identification in Indian Context
Sugaladevi Choukimath, V S Malemath, Suneel C Shinde
DOI: 10.17148/IJARCCE.2016.55115
Abstract: Script is a set of symbols and rules used to express or convey the information in a graphic form. Script Identification is one of the challenging steps in the Optical Character Recognition system for multi-script documents. In Indian and Non-Indian context some results have been reported, but research in this field is still emerging. This paper presents study on word wise script Identification which is based on scale Invariant Feature Transform, The system is developed and tested for 500 document images representing English, Hindi, Kannada, Bengali and Gurumukhi scripts. The system is developed includes a feature extractor which is based on scale invariant feature transform and for classification nearest neighbour classifier is used. The method is found to be robust and classification accuracy across five scripts is found to be 97.8%.
Keywords: Script Identification, Image Processing, SIFT, KNN.
Abstract
Personalized Recommendation System Using Social Networking and User Interest
Mr. Suryawanshi R. K, Prof. Amrit Priydarshi
DOI: 10.17148/IJARCCE.2016.55116
Abstract: To find interesting and relevant items or products there is one tool Recommendation System (RS). On the social network site people are interested to share their experience, such as reviews, rating etc. about any items or products, which helps to recommend the items to user interest. In this paper, we discussed importance of Recommendation Systems, various social factors, user interest and methodologies, which influence Personalized Recommendation System. To understand the social networking and user interest can help in creating better models of preference and lead to more effective personalization strategies.
Keywords: Personalized Recommendation System, social network, user interest, matrix factorization.
Abstract
A systematic review of Image Based Attendance Analysis
Ivan Bisengimana, Dr. N.J Uke
DOI: 10.17148/IJARCCE.2016.55117
Abstract: A systematic review of Image Based Attendance Analysis, is an automated face recognition (AFR) technologies that have been faced improvements in performance over the past years, and such technology are now widely used in different area in terms for security and commercial purpose. A face recognition in a real time either for colleges, companies and institution, public or private sector to mark the attendance of their members or relates. Face Recognition is of the real world solution which comes with day to day activities of handling employee�s attendance in any company. The tasks of handling attendance using image based attendance analysis is getting some challenges and some difficulties are tried to be resolved as much as the technology is growing up. This technology come up to replaces the old hectic and time consuming methods of marking attendance where people used the manually system of making attendance using the papers and files where the security and manipulation was hard for management. Face Recognition begins with extracting the coordinates of features such as width of mouth; width of eyes, pupil, and compare the result with the measurements stored in the database and return the closest record which is known as facial metrics. The review of different algorithms have been proposed and implemented and some solutions and output have been addressed.
Keywords: Biometrics, Face Recognition, Face Detection.
Abstract
Real Time Password Authentication System for ATM
Prof.Dr. G.M. Phade, Miss. Achuki Saini, Mr. Fazal Shaikh, Mr. Deepak Sharma
DOI: 10.17148/IJARCCE.2016.55118
Abstract: The existing ATM systems uses one magnetic card & a static PIN. Hence the security of present system is vulnerable as security of such systems can be breached by skimming devices, card trapping etc. The proposed system introduces transaction authentication code (TAC) which is dynamic 4 digit secrete code generated during transaction in addition with static PIN and send it to user�s cell phone no. Here unless entered code by the user as well as generated code is matched the transaction doesn�t get completed. This system is realized using LPC2148 which is a series controller of ARM 7 & peripherals like GSM module & RFID systems. Proposed system is complex and hence provides better security than systems before.
Keywords: ATM, ARM7 LPC2148, TAC, GSM Modem, LCD, RFID Cards and Reader, Keypad.
Abstract
Recipe Recommender Using Hadoop and Collaborative Filtering
RohitMundada, V. S. Malemath
DOI: 10.17148/IJARCCE.2016.55119
Abstract: There is an extensive class of web applications that involve predicting user responses to options. Such a facility is called a recommendation system. In today�s world recommender�s system plays very vital role in recommending user required stuffs from the systems like shopping carts, hotel websites, tours and travels website, social media�s and other entertainment media websites. We aim to build such a distributed recommendation system on top of the Hadoop framework. Since the data to be processed is usually massive and the computational workload will become heavier after adding and then returning rating parameters, optimizations specific to this modified algorithm and also the Hadoop framework will be the major concern of our project. Collaborative filtering algorithm is one of the most popularly used algorithm for recommendations systems, since Collaborative filtering computational complexity is very high thus it is too much time consuming to use this for large scale data. In this paper we implement Collaborative filtering for the map-reduced recipe data in cloud computing, we use Hadoop to process the large recipe data and then use Map-Reduced data to publish the recipe to users and based on the user interest and rating we recommending the recipe items to the users.
Keywords: Collaborative Filtering, Recommender System, Hadoop, Cloud Computing, Map-Reduce.
Abstract
A Case Study of Three Drum Parameter Control in Boiler Using Discrete PID Controller Based on Simulation
Ram Kishan Raikwar, V. K Tripathi
DOI: 10.17148/IJARCCE.2016.55120
Abstract: In the global world, the energy demand increases in a broad level to solve the demand of energy supply. In this field a research program working in a broad level by scientist or knowledgeable engineers. In This methodology of Unified controls for a Power plant is conceived by the consultants and discrete PID contractor to improve the plant efficiency. This is implemented in few projects and various options are also indicated in the methodology. In this paper an attempt has been made to design discrete PID controller for drum parameter control. In the initial stage used in a Boiler by use MATLAB. Comparison of discrete PID controller with conventional controller is also discussed in this paper.
Keywords: Proportional-integral-derivative Controller, Control Algorithm, Conventional Controller.
Abstract
Overview of Microstrip Line Phase Shifter
Arati Arun Bhonkar, Dr. Udaysinh Sutar
DOI: 10.17148/IJARCCE.2016.55121
Abstract: Phase shifter is fundamental element in transmit/receive module of RF frontend. In defence application phase shifters have been widely used in phased array antennas. But commercially they are not used widely due to its costs. Various parameters have been presented in the paper that deals with different types of phase shifter both analog and digital. Insertion loss, return loss and bandwidth are key parameters. Microstrip line, strip line and slotted strip line can be used in commercial applications as they provide lower cost design.
Keywords: Phased array antennas, transmission line phase shifters, transverse electromagnetic (TEM), reflection type, loaded line, switched line, switched network, quadrature hybrid, lange coupler.
Abstract
Skin Color Segmentation based Face Detection using Multi-Color Space
Rosali Mohanty, M.V Raghunadh
DOI: 10.17148/IJARCCE.2016.55122
Abstract: Human face detection plays a very important role in various biometric applications like crowd surveillance, photography, human-computer interaction, tracking, automatic target recognition, artificial intelligence and many other security applications. Varying illumination conditions, color variance, brightness, pose variations affect face detection. So, automatic face detection and recognition is a challenging concept which has attracted much attention due to its many applications in different fields. Face detection still poses a problem and up to now, there is no technique that provides a robust solution to face detection in all situations. There are many techniques for face detection, but skin color based technique is most popular as it is simple, robust and processing color information is much faster than processing any other facial features. So this paper proposes a novel algorithm foe face detection using multi-color space based skin segmentation and region properties. First, skin regions are segmented from an image using a combination of RGB, HSV and YCgCr color models using thresholding concept. Then facial features are used to locate the human face based on knowledge of geometrical properties of human face by testing each segmented skin region. Experimental results are used to show that, our proposed algorithm is robust enough to achieve approximately 96% accuracy and can locate a face in both single and multiple face images. The proposed method has also a good performance on images with complex background and can detect faces of different sizes, poses and expressions under different environmental conditions.
Keywords: face detection, skin color segmentation, RGB, HSV, YCgCr, Sobel edge detector.
Abstract
U-shaped Dual-band Microstrip Antenna for WLAN and UWB Applications
Nirali R. Patel, Prof. Mayank A. Ardeshna
DOI: 10.17148/IJARCCE.2016.55123
Abstract: In this paper a dual-band antenna is designed. Our main objective is to design dual-band antenna so that a single antenna can be used for WLAN and UWB applications simultaneously. The antenna design is consist of a U-shaped patch and a rectangular monopole. The proposed antenna is fed by 50? microstrip line and designed on a FR4 substrate of size 42mm�24mm�1.6mm. This antenna is radiating at 2.45 GHz (WLAN) and 4.3GHz and 7GHz (UWB application). Design results of Return loss S11, VSWR, gain and directivity is shown in this paper. Design results are obtained by a CST Microwave studio.
Keywords: Tri-band, U-shaped, WLAN, UWB, printed antenna.
Abstract
Mobile Application for Monitoring Inefficient and Unsafe Driving Behaviour
Onkar Pathare, Navit Dhande, Dipak Shinde, Roshan Pa
DOI: 10.17148/IJARCCE.2016.55124
Abstract: Many automobile drivers are aware of the driving behaviours and habits that can lead to inefficient and unsafe driving. However, it is often the case that these same drivers unknowingly exhibit these inefficient and unsafe driving behaviours in their everyday driving activity and technical details for evaluation of Real Time Car Monitoring. Above project proposes a practical and economical way to capture / measure / evaluate inefficient, uneconomical and unsafe driving with the details about Performance, Diagnostics (Using DTC), Fuel Consumption & Autonomy and Emission from a Vehicle. The proposed solution consists of a mobile application, running on an Android Smartphone, paired with a compatible OBD-II reader.
Keywords: ERP OBD (On Board Diagnostics), DTC (Diagnostics Trouble Code).
Abstract
Segmentation of Metastasis Brain Images Using Wavelet Transform Based Hybrid Mean Shift Clustering and Region Split Algorithm
P Pedda Sadhu Naik, Dr. T. Venu Gopal
DOI: 10.17148/IJARCCE.2016.55125
Abstract: Segmentation of multiple tumors is highly challenging task in medical field. MRI Imaging is one of the prudent mechanisms to extract the tumor regions and to map the brain for diagnosing. One must need to detect the tumor accurately for the diagnosis; one must detect the tumor accurately and need to calculate the area and volume of the tumor exactly. Here in this paper, we proposed a novel resolution enhancement technique to improve the quality of MR brain image and optimized hybrid mean shift clustering (OHMSC) with region split and merge algorithm to detect the tumor cells from the original MR images and to estimate the tumors from different locations. Simulation results show that the proposed algorithm has performed superior to conventional clustering algorithms such as Fuzzy C-means (FCM), K- Means and even optimized pillar algorithm.
Keywords: Metastasis brain tumor, DWT, SWT, Interpolation, Image Segmentation, FCM, K-means, Optimized pillar algorithm.
Abstract
Software Process Models and Enterprise Resource Planning System
Basem Zughoul
DOI: 10.17148/IJARCCE.2016.55126
Abstract: The field of software engineering is related to the development of building software. The comprehensive systems or Enterprise Resource Planning systems need for systematic development unlike simple programs which can be developed standalone and there may be without any systematic approach. Nowadays, the software industry is an independent market, whereas the world is facing another information technology revolution, which is the biggest and most complex one after the industrial revolution. The increase of the popularity of the internet, WWW and the new developments in mobile computing and artificial intelligence are changing the business requirements and practices. This research deals with a critical and important issue in computer world. It is concerned with the software management processes that examine the area of software development through the software process models, where these models will guide the work and influence the quality of the final software by using several development techniques, which are known as software development life cycle. It represents different development models such as the waterfall, iterative, incremental, spiral and extreme programming. These models have advantages and disadvantages as well. Therefore, the main objective of this research is to represent different models of software development and which of these models can be used to develop ERP systems according to the ERP characteristics to be more adaptive with environment change based on business process concepts.
Keywords: Enterprise Resource Planning, Software Process Model, System Development Life Cycle, Extreme Programming System.
Abstract
Cloud Based Secured Multi Keyword Ranked Search for Multi-Ownered
Ms. Vanita Gadekar , Dr.Baisa Gunjal
DOI: 10.17148/IJARCCE.2016.55127
Abstract: For the purpose of economic saving as well as to achieve flexibility users outsourced their data on public cloud. Before storing data on cloud user wish to apply some security constraints to protect their data form malicious attacks. Therefore they used to refer encryption technique to encode their data and then they will outsource it. Existing systems which refers encryption technique are inefficient as they are having only single keyword search over large document. To the best solution for this inefficiency we proposed multikeyword search strategy for large number of documents. Our multikeyword search technique is efficiently word against the searching of multiple keywords simultaneously. It may be referred as lightweight process of searching. In our system we used two protocols to generate a secret key dynamically as well as for vali user authentication. Our system effectively works for large amount of databases and multiple keyword searching. In our system we provide higher privacy requirements to implement the data security for cloud stored data. Our main contribution in this project is to give backup and restore facility at the user end and mainly we focused on multikeyword searching with ranking approach.
Keywords: ranked keyword search, multiple owners, privacy preserving, dynamic secret key.
Abstract
User-Configuration Universal Windows Platform SCADA System Base on I2c Bus Communication
Nahedh lafta obaid, M.Usha
DOI: 10.17148/IJARCCE.2016.55128
Abstract: The UWP now provides a common app platform available on every device that runs Windows 10, (Devices IoT, Mobile, PC, XBOX, Surface Hub, etc.) Which Are UWP .This means you can create a single app package that can be installed onto a wide range of devices and, with that single app package, the Windows Store provides a unified distribution channel to reach all the device types your app can run on. In this paper will discuss the design and implementation of monitoring and supervisory control system using a windows system platforms from the Windows 10(device IoT), especially after winning support from the Microsoft Company for these (devices IoT) which is belong the universal windows platform (UWP) such as Raspberry Pi2 widows 10 platform as a Master terminal Unit (MTU) and I will discuss the extended of the SCADA system vertically and Horizontally (by using GPIO Pin of the MTU , one type of bus (Modbus , I2C bus , UART) respectively , in case the horizontally extended I will use the Remote Terminal Unit (RTU) design by suing AVR microcontroller family (ATemage328PU) . the IDE will be used to developed the code for the MTU (visual Studio community 2015) and the IED use to developed the code for the RTU ( visual C++/C) also use one of (emulator and Proteus software ) to simulate the code before activation. at the end, the system easily to the configuration as the end user wish because the system User configurable
Keywords: Windows Run Time (WinRT), Universal Windows Platform (WUP), Internet of things (IoT), Master Terminal Unit (MTU), Remote Terminal Unit (RTU), inter-integrated circuit Bus (I2C), integrated Development environments (IDE).
Abstract
Enhancing Authentication and Encryption using Rave and Spectra Protocols
Ritika Gupta
DOI: 10.17148/IJARCCE.2016.55129
Abstract: This paper focuses on two new technologies in the IS sector. The Rave Authentication Protocol acts as the initiator of the Spectra encryption protocol. Both these protocols work seamlessly to authenticate BOTH the sending and receiving parties, and provide a high level of encryption to the passed information. It is to be noted, at the outset, that Spectra is NOT a new keying algorithm. It uses EXISTING CIPHER ALGORITHMS (on the lines of PGP) and runs them through the Key Amplification Engine which amplifies their key strength by as much as 32 times their original key length (For example, an 8-bit key can provide security equivalent to a 256 bit encryption), using the resources of the input key length (in this case resources used would be equivalent to an 8-bit key). Rave and Spectra provide a very dynamic authentication and encryption mechanism which generates a DIFFERENT cipher text EACH TIME using the same keys. This allows these technologies to fit optimally in circumstances which require dynamic information encryption like mobile commerce (Also owing to the speed of the overall encryption process). The technologies are also highly scalable and can accommodate keys of any length and magnify their potential accordingly.
Keywords: Authentication, Cryptanalysis, Challenge- Response, Encryption, stream ciphers, Rave, Spectra, 3-DES, Smart Cards.
Abstract
Paradigm Shift of Big-Data Application in Cloud Computing
Ms. Preeti Narooka, Dr. Sunita Chaodhary
DOI: 10.17148/IJARCCE.2016.55130
Abstract: Big Data and Cloud Computing came before few years ago but their capture all kind of businesses, technologies and each and every people. After few years world can�t think without Cloud Computing and Big Data Applications. Today is the time of combinations of number of technologies and the combined effects of emerging Internet technologies, increased computing power, and fast, pervasive digital communications were spawning new ways to manage talent and assets as well as new thinking about organizational structures. This paper is about Parallel Processing and Distributed Computing concept in Big Data and Cloud Computing Application. And also about how Big Data help Cloud Computing for Processing and vice-verse. The best examples of all above technologies are Hadoop-HDFS for File System or Storing Unstructured Data and Map Reduce is for Processing of the stored Data.
Keywords: Big Data, Cloud Computing, Distributed Computing, distributed Storage, Hadoop, Map Reduce, Parallel Processing.
Abstract
Emerging of New Service Oriented Approach Based on Internet of Things
Vedang Ratan Vatsa, Ankit Punia, Deepak Saini
DOI: 10.17148/IJARCCE.2016.55131
Abstract: The article is seeing essential ideas of the Internet of the Future: Internet administrations, Internet of things and distributed computing. Because of advances in innovation and the fast development of online administrations, informal organizations and versatile applications a noteworthy number of new and imaginative electronic administration models have been presented. There are numerous discourses and meanings of the Web 3.0, a few assets case to work as per that idea definition. Albeit online assets and administrations are having an effect on more conventional method for working together, there are new innovative issues raised by the Internet of Services and Internet of Things angles with their impact on client connections. In this paper likewise assets for Internet of Services clients are clarified. Creator is centered around the relevance of Internet of Services and Internet of Things for the business purposes under the new idea � social web of things as an alternate venture of globalization.
Keywords: Internet of Things; Internet of Services; cloud computing; web 3.0; social web of things.
Abstract
Industrial Market Place Survey and Analytics on Internet of Things
Amol Dande, Ass. Prof. Shaffi K. Pathan
DOI: 10.17148/IJARCCE.2016.55132
Abstract: Advances that will transform life, business, and the global economy �, the Internet of things (IoT) is one of the top three technological advancements of the next decade (together with the mobile internet and the automation of knowledge work). As the Internet of Things begin transforming businesses, economies and society. IoT platforms are emerging as the central backbone in the overall infrastructure. The Internet of Things is such a sweeping concept that it is a challenge to even imagine all the possible ways in which it will affect business, economies, and society. Sensors and actuators embedded in physical objects are linked through wired and wireless networks, often using the same Internet Protocol (IP) that connects the Internet. The idea is that not only your computer and your smart-phone can talk to each other, but also all the things around you. From connected homes and cities to connected cars and machines to devices that track an individual�s behaviour and use the data collected for new kind of services. In this paper we survey on Internet of Things from industrial perspective and analytics. We also survey on different cloud platform released by some industries for the Internet of Things and how 4g LTE is flexible for Internet of Things.
Keywords: Internet of Things, IoT devices, IoT cloud-platform for IoT, Data analytics, 4g LTE.
Abstract
Feature Extraction Techniques for Image Retrieval Using Data Mining and Image Processing Techniques
Preeti Chouhan, Mukesh Tiwari
DOI: 10.17148/IJARCCE.2016.55133
Abstract: Image mining is advancement in the field of data mining, in the domain of Image processing. Image mining is the additional pattern which is quite not clearly visible in the image, association of image data and extraction of hidden data. This field is interrelated and involves Database, Artificial Intelligence, Data Mining, Machine Learning, and Image processing. Image Mining has a lucrative point that without any information of the patterns it can generate all the significant patterns. This writing is done for a research on the data mining techniques and assorted image mining. The term data mining is the extraction of information/ knowledge from a wide database which is further stored in multiple heterogeneous databases. Information/ Knowledge are conveying of message through direct or indirect methods. These methods include clustering, correlation, association and neural network. This thesis provides with a basic informatory review on the applied fields of data mining which is varied into manufacturing, telecommunication, education, fraud detecting and marketing sector. In this method we use texture, dominant colour factors and size of an image. The feature which is used to determine the image texture is called as Gray Level Co-occurrence Matrix (GLCM). The texture, color and such relative features are normalized. Due to the use of the texture and color feature of the attached image due to the shape feature the image retrieval feature will be very sharp. Weighted Euclidean distance of color feature is utilized for the retrieving of features, of similar types of image shape and texture feature.
Keywords: Data Mining, Image Mining, Feature Extraction, Image Retrieval, Association, Clustering, knowledge discovery database, Gray Level Co-occurrence Matrix, centroid, Weighted Euclidean Distance.
Abstract
A Survey of Intelligent Question Answering System Using NLP and Information Retrieval Techniques
Deepa Yogish, Prof. Manjunath T N, Prof. Ravindra S Hegadi
DOI: 10.17148/IJARCCE.2016.55134
Abstract: Day by day users of Internet is increasing for information extraction with precise answer. As Users struggle to get exact information, the demand for automated question answering becomes so necessary to search the answer of their questions meaningfully. This is a ambitious work to provide the accurate answer to the user query. When a user asks any question then user finds many of immaterial and unwanted answers. From these answers users get annoy in searching require answer.(QA) system is an intelligent system, which takes user�s question in natural language (like English), process the question and find the proper result to the user according to question. The QA systems provide a semantic search on the web, which helps the user to get exact result instead of the uncertain and irrelevant data.QA systems, is a promising research area in NLP along with AI and Information Retrieval. In general, question answering system (QAS) has three modules such as question classification, question template matching and answer extraction.
Keywords: Information Retrieval (IR), Natural Language Processing (NLP), Question Answering (QA) System.
Abstract
A Review on Remotely Monitoring a Car to Improve its Occupant Safety
Rohan R. Patil, Makarand N. Kakatkar
DOI: 10.17148/IJARCCE.2016.55135
Abstract: One prefers a car for safe transfer to one�s destination at low cost, with comfort and predictable travel outcome. IoV (Internet of Vehicles) trends have led to many innovations in cars. This review paper presents a new data collection and calibration platform based on existing network infrastructure, Internet, to collect real-time data of vehicles remotely. The in-vehicle device is used to collect real-time OBD (on-board diagnostics) data and monitor other important parameters like alcohol intoxication of driver and seat-belt status that need to be monitored. This information is then received by the central server. The server sends back instructions or alert messages to alert the admin person. This provides information on driving pattern, control strategy, driving cycle, fault and reliability. Minicomputer Raspberry Pi is used as in-vehicle device and programming is done using Python language.
Keywords: alcohol intoxication, internet of vehicles, on-board diagnostics, raspberry pi.
Abstract
A Review: Remote Patient Monitoring System
Amol Wanjari, Madan Mali
DOI: 10.17148/IJARCCE.2016.55136
Abstract: Technology oriented health care environment has become need of today�s generation so there is a need of increasing efficiency of patient�s health care and to make it more technology oriented. The actual meaning of patient monitoring is to continuously monitor number of patients for multi-parameters at a time from a remote place. Patient monitoring not only gives emergency alerts but also provides the necessary input information or data to control directly connected physiological instruments. In the modern age, advance technologies and applications are equally important for health care and also for the betterment of human being. Android based mobiles are the most accessible form of the latest technologies. Mobile technologyis not only useful for medical staff but also for common people for their self-monitoring. Now it is easy to monitor, record, display and transmit the patient�s physical parameters readings from the patient to any place.
Keywords: Android application, database, monitoring system, physical parameters.
Abstract
Enhanced key-generation algorithm using MRMCTT in Data encryption standard algorithm
Bhawana Singh, Rishi Sharma, Kamal Kant Verma, Satendar Kumar
DOI: 10.17148/IJARCCE.2016.55137
Abstract: The Data Encryption Standard is known as a block cipher technique which means a cryptographic key and an algorithm is applied with a block of data simultaneously rather than one bit at a time. To encrypt a plain textmessage, DES groups it into 64-bit blocks. Each block is enciphered using the secret key into a 64-bit cipher text by means of permutation and substitution.The process involves 16 rounds and can run in four different modes, encrypting blocks individually or making each cipher block dependent on all the previous blocks.
Keywords: DES, cipher text, substitution, encryption.
Abstract
Automatic Ambulance Rescue System
Miss. Bageshree V. Wakhare, Dr. S.R.Ganorkar
DOI: 10.17148/IJARCCE.2016.55138
Abstract: Street accidents and traffic overcrowding are one of the major cumbersome tasks in crowded cities. Presently, there is no technology for accident detection. Also the time consumed by the ambulance in reaching the accident location and the intense traffic between accident location and hospital leads to possible loss of victim�s life. Thus we have introduced a new system to limit the loss of life and which automates the detection of accident through sensors provided in the vehicle. This system uses GPS, GSM for communication between ambulance, vehicle and main server. It also uses RF communication for communicating between server and traffic control This will minimize the time of ambulance to reach the nearest hospital. A patient monitoring system in the ambulance will convey the vital parameters of the patient to the nearest hospital. Automatic Ambulance Rescue System (AARS) is totally independent, and is very helpful to save a precious life.
Keywords: AARS, GPS, GSM, Vital Parameters.
Abstract
Dual Mode Lawn Mower using Sensors and GSM
Asif Iqbal Mulla, Sushanth K J, Mranila P, Mohammed Habib Shaikh, Mohammed Swalin, Mohammed Asfar, Mohammed Yunus Ugrani
DOI: 10.17148/IJARCCE.2016.55139
Abstract: This dual mode lawn mower using GSM and sensors is an autonomous lawn mower that will allow user the ability to cut their grass with minimal effort. Unlike other robotic lawn mowers on the market, this design requires no perimeter wires to maintain the robot within the lawn and also with less human effort for the operation. One main advantage of this project work is that it can be used automatically or manually. In the automatic mode of operation, no human effort is required and helps to trim the lawn very efficiently and easily with less time. Through an array of sensors safety takes major consideration in the device, this robot will not only stay on the lawn, it will avoid and detect objects and humans. In manual mode of operation, we make use of DTMF ie, control over the mower using GSM which has a very wide range of network and hence can be used to control the mower. Lawn mower is equipped with solar panel for the battery being charged using renewable source of energy. Electricity can also be used to charge the mower. This design contains a microcontroller AT89S52 belonging to family 8051, multiple sensors, LCD display, motors and blades.
Keywords: GSM, DTMF, BASCOM.
Abstract
A Comparison Between Classification Algorithms on Different Datasets Methodologies using Rapidminer
Ashmeet Singh, R Sathyaraj
DOI: 10.17148/IJARCCE.2016.55140
Abstract: Data Mining techniques are helpful in finding out patterns between data attributes and results in probalistic prediction of the label attribute.The paper discusses different classification techniques on small and large datasets.The two datasets are example datasets used from repository sites depending upon the number of instances.These datasets were applied in different classifier like Random Forest, Naive Bayes and Decision Tree to identify the best classifier for small dataset and large dataset. This paper gives the study and analysis of various methodologies used for prediction Based on the study, Na�ve Bayes is most suitable for small datasets and Decision Tree is suitable for large datasets based on the evaluation done in this paper using various methodologies driven by RapidMiner tool while equating precision, recall and accuracy.
Keywords: Naive Bayes, Random Forest, Decision Tree,RapidMiner tool.
Abstract
Power optimized modified algorithm to increase Network capacity in wireless communications
Jawaharin Basha,Dr. Shah Aqueel Ahmed, Dr.Syed Abdul Sattar
DOI: 10.17148/IJARCCE.2016.55141
Abstract: In this paper an approach is proposed considering the Transmission Rate Adaptation for all 802.11 supporting a collection of transmission rates with reliable decoding of a higher rate demands at higher link quality for power optimized communication. Recent advances in physical layer technologies, e.g., ultra wideband (UWB), multiple-input and multiple-output (MIMO), and cognitive radio (CR), have made profound impact on wireless networks. In this work, CR is considered which a revolution in radio technology is. CR is enabled by recent advances in RF design, signal processing, and communication software.
Keywords: Wireless Network, Cognitive Radio, Network Layer, Link Layer, Physical Layer, BER, SNR.
Abstract
Comparison Between Voltage Domain And Time Domain Adcs-A Review
Deepali D Toraskar , Mahantesh P Mattada, Hansraj Guhilot
DOI: 10.17148/IJARCCE.2016.55142
Abstract: A review of comparison of various types of ADC�s with Time Based ADC. The performance of the analog to digital converters has become very important in signal processing applications. Most important parameters on which their performance depend are: resolution, power consumption, size, conversion time, static performance, dynamic performance, and price. It became very important to understand the functioning and performance before implementing the ADC in the system. This paper discusses and compares the voltage domain ADCs with Time Based ADC�s.
Keywords: Analog-to-digital converters, Time Based ADC, Time to Digital Converter.
Abstract
Privacy Concealment and Data Security over Outsourced Cloud Environments
Sunit Ranjan Poddar, Ameya Ravindra Sawant, Diksha Pawankumar Jangid, Sanika Sarang Kamtekar, Prof. Mandar Mokashi
DOI: 10.17148/IJARCCE.2016.55143
Abstract: In an era of wireless internet, the use of mobile devices and cellphones has reached to a great extent. In this new digital world the availability of data accessibility over internet plays an important role. Dynamic storage systems are preferred for storing huge amount of diverse data. The cloud servers are capable of processing and storing any amount of data required, furthermore the cloud servers are flexible and scalable to great extent. The information on these servers is of huge importance to the data owners and thus require protective strategies. We thus propose a system which consists a group of techniques resulting in providing a secure data storage and data integrity. We have used AES algorithm for encrypting and decrypting the data and digital signatures. We have also used SHA1 for generating hash keys. These hash keys help us support our motive for redundancy checks as well as for maintaining data integrity. Our system also equip de-duplication of user data which promises efficient bandwidth utilization without harming the privacy of the user. Load balancing is another feature that we include in our system for better performance and storage measures. We have used drop boxes to implement our load balancing feature. We strongly believe that the existing systems do not provide the features included in our proposed framework.
Keywords: Data Integrity, Load Balancing, Deduplication, Third Party Auditor.
Abstract
echildcare: Innovative SMS and Web-based Alert System to Improve Children’s Health
Atul Kumar Mishra, Parbhat Puri, Anuj Mahajan
DOI: 10.17148/IJARCCE.2016.55144
Abstract: After the birth, a child has to be given various vaccines for preventing deadly diseases. But the problem is that either the parents are not aware of these vaccines or they don�t remember the proper schedule. With this platform, we are trying to solve problems at the grass root level. The idea of our platform is to register the newborn child to our platform through SMS and then send notifications about the upcoming vaccination schedule based on the Date of birth of the child to the registered mobile number through SMS. The notifications are sent in few days advance as well as on the date of the event. In this way, the parents are aware of the various schemes as well as their proper schedule. In India very large population still doesn�t have access to the internet. The maximum percentage of the population has access to SMS. Also, the chances of a user checking an SMS are much higher than checking an email. Using SMS helps in reaching large population and an instant reachability. Our platform can be used in a wide variety of applications like Healthcare, Birth Registration, collecting essential data, spreading information etc. The proposed platform has been sent as a proposal for Digital India project through mygov.in. Our platform is built using open source technologies and the code is available on GitHub at https://github.com/Parbhat/echildcare. The online repository on GitHub includes the following: � The complete code of echildcare platform for reading and modification. � Features of echildcare platform. � Instructions for setting up the platform on a local machine for development. � Instructions for setting up celery for local development. � End User Instructions.
Keywords: python, Django, celery, RapidSMS, Healthcare, vaccination, Digital India, open source, SMS, child health.
Abstract
Rugged Autonomous Unmanned Ground Vehicle for Precision Agriculture Working Based on Color Navigation Algorithm using Raspberry Pi2
G. Pradeep Kumar, S. Shobana, P. Uma sankari, D. Devamalini, J. Dhanalakshmi
DOI: 10.17148/IJARCCE.2016.55145
Abstract: A Rugged unmanned ground vehicle (UGV) is a robot that operates while in contact with the ground and without an onboard human presence. The autonomous vehicle can be used for several applications where it may be inconvenient, dangerous, or impossible to have a human operator present particularly in mine monitoring, mineral exploration, high radiation places. Generally, the vehicle will have a installed sensors to observe the environment, and will either autonomously make decisions about its behavior or transfer the information to a end user operator at a different location who will control the vehicle through teleportation. To navigate the ground vehicle, lot of researchers are working with RF controlled and tethered controlled system. Few are working in the autonomous vehicle by programming the path. All those control system can be perfectly used for flat and normal surface. Since the programmed path is based on timing that can be used for flat and normal surface. While considering the rugged path particularly agriculture filed or farm, these systems might not work. Because of rugged path the vehicle can get delay while moving, then the entire path navigation will get changed. This problem can be overcome in our proposed work having color based navigation system can be opted for any rugged path like agricultural field and so on.
Keywords: UGV, OS, AGV, RF.
Abstract
Achieving Trust and Survivability for Mission Effectiveness in Tactical Network using CP-ABE
P. Rajapandian, C. Maleappane Lawrence, G. Siva Kumar
DOI: 10.17148/IJARCCE.2016.55146
Abstract: In a military tactical network, maintaining trust among members in a mission group is critical to successful mission completion. However, maintaining high trust among group members in a resource-restricted tactical environment is difficult, which may lead to mission failure or low mission effectiveness. In this paper, we propose a secure data retrieval scheme using CP-ABE. Cipher text-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution to the access control issues for tactical network, where multiple key authorities manage their attributes independently. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the military tactical network.
Keywords: Group trust, tactical network, mission effectiveness, and key authorities.
Abstract
Twin Encryption System: Approach to Self-Changing Encryption and Decryption Key
Suhail Sayeed Bukhari, Meru Prabhat
DOI: 10.17148/IJARCCE.2016.55147
Abstract: Currently all the encryption and decryption methods, in communication depend upon the use of a key, which by itself remains constant and needs a manual interaction to bring forward a change. In order to avoid this problem, we introduced a method which will almost eliminate the need for human element. This concept has been established by developing a key generation system that does not need the key to be constant or pre declared. A type of key that is not only self-changeable but also unique for every message that is being sent. This key will remain applicable to a particular message only for a set period of time. This dual concept of time and uniqueness for every message makes up the Twin Encryption System (TES). TES develops a key based on unique identities of two communicating machines and the current time, which creates a time function that can encrypt and decrypt the file or message without the need for fixing the key and then sharing it.
Keywords: TES, Cryptography, encryption, time-stamp, self-changeable key, Symmetric key, Asymmetric key, security, secure communication.
Abstract
Detecting and Preventing Black hole and Grey Hole Attacks for Trust Management in Wireless Sensor Networks: A Survey
Mitali Khandelwal, Sachin Upadhyay
DOI: 10.17148/IJARCCE.2016.55148
Abstract: The wireless sensor network is one of the most popular network technologies for different applications. A number of applications such as weather monitoring and geo-location tracking are implemented using the WSN technology. Due to this these networks are utilized in critical situations. Therefore, the security in the communicated data is a primary aspect of the network as the performance of the network. Therefore, in this work the wireless sensor network security is investigated and a new secure routing technique is proposed for securing the data transmitted over the network. For providing the security a Trust and Opinion based approach is employed on network. This document provides the formal overview and the solution steps which are required to incorporate with the secure routing.
Keywords:
Abstract
Implementation of Diabetes Monitoring System Based on EHR Data Analysis
Sachin B S, Prema N S, Suraj L Kalro, Harshitha, Ranjitha Raj K N
DOI: 10.17148/IJARCCE.2016.55149
Abstract: This paper demonstrates the framework of a system built to monitor health records for diabetes patients and extracting data on a frequent basis to objectively predict the impending health risks using a version of Bayesian network. The system is deployed on a SaaS cloud service to facilitate secure and convenient collection of data from patients using a mobile application and a web console.
Keywords: Diabetes Mellitus, Data mining, Bayesnet, Support vector, patient monitoring, HER.
Abstract
Wireless Signal Transmission using an Android Mobile and FPGA
Prasanna S. Bhoite, Madan B. Mali
DOI: 10.17148/IJARCCE.2016.55150
Abstract: Today�s networking technology uses wireless systems widely for the Internet of Things (IOT). Exchange of control commands and data between devices can be done using wireless technology although they were initially designed for voice communication systems. In this paper, we present the interfacing of the Bluetooth module with the FPGA board so that the FPGA board can be connected to an android device using the Bluetooth connection. Wireless signal transmission is possible once the FPGA board and an Android mobile are connected. The hardware used for the project include a Bluetooth module interfaced with FPGA board, an Android mobile with Blueterm application installed on it and a LED light connected to the FPGA board to indicate the successful signal transmission. The wireless technology is the most promising and popular technology to control devices remotely hence the work in this paper, with some modification and improvement, can be used to build the efficient remote controlled applications.
Keywords: Avnet LX9 FPGA micro board, Android mobile, Bluetooth HC-05, Remote control, Spartan 6
Abstract
Review on Customization of Document Using Content and Query Based Annotation
Kalyani Kute, Prof. R. P. Dahake
DOI: 10.17148/IJARCCE.2016.55151
Abstract: Many information retrieval algorithms are retrieves the structured and accurate information from large number of databases, are expensive in terms of time and money. Especially when operating on important text that does not contain any instances of the targeted structured information. The alternative approach that provides and also creates the structured metadata using attributes which are feasible by identifying dataset that are likely to contain information of interest or related to search keyword and this information is going to be subsequently useful for querying the database. CADS approach based on the query modules and the metadata using which metadata added and search using the query forms. Also represent the algorithm to identify structured information and extraction of that information. Also useful to improve the search efficiency by using the content search and query search.
Keywords: Meta-data, Annotation, Attribute-value, CADS.
Abstract
Comparison Of Architectures For The Numerically Controlled Oscillator
Shilpa N. K, S. Sowndeswari, C.V. Ravishankar
DOI: 10.17148/IJARCCE.2016.55152
Abstract: Numerically Controlled Oscillators are used in almost all stages of transmitters and receivers regardless of different wireless generations. This paper weighs pros and cons the two well known NCO architectures � the Look Up Table Approach and the CORDIC algorithm.
Keywords: NCO, CORDIC algorithm, Look Up Table.
Abstract
Improved Authentication System for Android Smartphone
Shrabani Medhi, Pinky Saikia Dutta
DOI: 10.17148/IJARCCE.2016.55153
Abstract: The popularity of Smartphone is increasing day by day especially the one using android operating system. Since these devices contain increasing amount of personal information, it is important to have better security system. In this paper we try to see the different aspects that must be kept in mind while enforcing security in android Smartphone. We also discuss and compare the various authentication systems available and present a new improved authentication system that tries to remove the drawbacks present in the current authentication systems.
Keywords: Android, security, authentication lock screen, smart phone, color lock pattern.
Abstract
Secure Large File Deduplication Technique Over Distributed Cloud Environment To Store Anonymous User Data
Mr. Mahesh Bhaskar Gunjal, Prof. Rahul L. Paikrao
DOI: 10.17148/IJARCCE.2016.55154
Abstract: De-duplication is an abbreviated term to remove repeated copies of same data. It is necessary to keep most confidential data that is most susceptible while supporting de-duplication. We proposed data de-duplication system with an improved reliability as well as data confidentiality. We proposed data de-duplication process to reduced or replaced repeated data with same available data on cloud. This mainly results into saving of memory space. Data de-duplication is widely used to backup of data as well as it minimizes network overheads. It keeps only one single physical copy of data. To protect private data we used some secret sharing techniques such as Ramp secret sharing technique. Our model firstly, generates file block and then distribute them on different server. We used SHA-1 algorithm to generate block of data and hash values. Our proposed technique is totally different from existing de-duplication system as our system provides a smart solution for encrypted file duplication along with this; it must able to data secrecy as far as file is concern. To address challenges in unauthorized access, we described some privilege access. Therefore, privilege as well as non-privilege data can manage. Our system can work efficiently to reduced repetition in file level and block level data in distributed system. In this system, as a part of contribution our system will hide user�s identity and trustee server is introduced to authorize the user. Also relative address concept for data blocks is used that keeps block data integrity and encrypted data more secure from cloud or server.
Keywords: De-duplication, distributed storage system, reliability, secret sharing, relative address.
Abstract
Implementation of Distributed Programming Environment to support Distributed Object Over Internet
Priyanka Patil, Vidhi Vadgama, Dushali Khadke, Manoj Ubhale
DOI: 10.17148/IJARCCE.2016.55155
Abstract: With the explosive growth of internet and network services, there is always a proliferation for distributed application that seeks to leverage the power of the internet. Remote method invocation is now increasingly being used in Internet based applications and hence it is important to study the performance parameters of RMI. RMI is the action of invoking a method of a remote interface on a remote object. The three methods of RMI namely General, Activation and Custom Socket Factory are to be evaluated empirically using parameters like Round trip time, Latency and Packets per Unit time. The graph plotted allows us to gain an insight into the performance aspects and other tradeoffs of RMI. The General method deals with invoking any method directly from memory of the remote machine. RMI Activation allows passive objects to be brought into the active state by instantiating it on an as needed basis. Custom socket factory method allows customization of socket depending on the type and amount of data to be transferred over the channel. Search mechanism is also to be implemented in the GUI, which has user-friendly access to the three methods of RMI and displays the results of the evaluation.
Keywords: Compactness, Proliferation, RMI.
Abstract
A Route Discovery Scheme For Inter Cluster Routing With Novel Cluster Head Selection
Bharath L J, Komala M
DOI: 10.17148/IJARCCE.2016.55156
Abstract: Any network should have the capacity to operate in harsh environments despite of the constraints taken in WSNs. Multipath, tree, cluster and hybrid topologies are the collection schemes fail to provide a mobility, traffic and end-end connection. In earlier existing system like CIDT, the cluster head will be selected randomly because of it end-to-end delay, no of live nodes ,no of alive nodes, no of hops will more, in order to overcome this, a Velocity Energy-efficient and Link-aware Cluster-Tree (VELCT) scheme is proposed for the data collection in wireless sensor networks. End-to-end connection, delay, traffic coverage distance, mobility and residual energy can be controlled by the proposed VELCT scheme. Based on the cluster head location, the VELCT builds the Data Collection Tree (DCN). The DCN node doesn�t take part in sensing, however, it simply receives the data packet from the cluster head and delivers it to the destination. By using DCN node, the proposed VELCT scheme reduces the energy exploitation, reduces the end-to-end delay, number of dead nodes traffic, number of hops and residual energy of the nodes will be more in cluster head in WSNs. The main aim of VELCT algorithm is to build a simple tree structure, thereby reducing the energy consumption of the cluster head and avoids frequent cluster formation.
Keywords: WSNs, VELCT, CIDT, DCN, Cluster Head, Sensor Nodes.
Abstract
Health-Care Proposal Tool using Big Data Techniques
Utkarsha B, Priyanka C, Dishari S, Aneri P
DOI: 10.17148/IJARCCE.2016.55157
Abstract: A decision-tree is a structure which can represent any algorithm in a tree or even graph with the nodes and branches with some associated outcome in terms of weight and probability. Basically here, we are using large datasets gathered in clinical records related to a patient�s health care issues and their medical reports to predict his or her future health diagnosis and accordingly recommend the required medication. The recommender tool being implemented in Hadoop framework uses popular classification algorithm named as C4.5. We are trying to improve the performance of the decision-tree algorithm utilizing the appropriate Map-reduce model and forward it to Hadoop framework in addition to bagging method additionally with random-subspaces in ensemble classification in order to improve efficiency and scalability.
Keywords: C4.5, algorithm, decision-tree, ensemble classification, Hadoop framework, Map-reduce, Recommender tool, PHR, HRS.
Abstract
A Survey on Telemedicine Application in an Embedded System
Swapnila Shinde, R.S. Nipanikar
DOI: 10.17148/IJARCCE.2016.55158
Abstract: In rural and remote areas, many people struggle to receive urgent medical treatment, also there is a lack of expert physicians in certain sectors of the health service. We can use telemedicine to provide health care at a distance. It can improve access to medical services in distant rural areas. Nowadays, telemedicine is forming a new structure of health-care services. The healthcare experts in the specialized fields can access or exchange information for diagnosis, treatment and prevention of disease. Telemedicine facilitates the delivery of the medical advice at the right time using new communication technologies for medical purposes. This paper proposes an application of telemedicine using GSM module and PHP.
Keywords: Telemedicine, GSM, Embedded system, PHP.
Abstract
Smart Power Management System using Wireless Sensor Network
Ms. Rubana P. Shaikh, Dr. R. R. Dube
DOI: 10.17148/IJARCCE.2016.55159
Abstract: Intelligent Power Management is the combination of smart sensors and actuators. Proposed system is to design and develop a real time system which will intelligently monitor and control for home appliances. Proposed system monitors the electrical parameters such as voltage, current and subsequently calculates the power consumption of the home appliances that are need to be monitored. The innovation of this system is controlling mechanism implementation. Also the proposed system is a user authentication, economical and easily operable. Due to these intelligent characteristics it become an electricity expense reducer and people friendly. Smart power conservation is a method of controlling home appliances automatically for the convenience of users. Controlling of electrical devices in the home that can be programmed using a main controller or even via cell phone from anywhere in the world.
Keywords: Energy management, home automation, intelligent control system, wireless sensor network, android App.
Abstract
Survey on Data Aggregation Techniques
Prasad B. Thube, Sachin B. Takale
DOI: 10.17148/IJARCCE.2016.55160
Abstract: The wireless sensor node have much application such as forest monitoring, habitat monitoring, security and military, disaster management, etc. Wireless sensor nodes are resource constrained, sensor nodes are small in size and have limited memory, low battery power and limited processing capability. Data aggregation is very important technique is wireless sensor node. Data aggregation eliminates the redundancy data helps to reduce to requirement of store the data and reduce power consumption. This works shows different data aggregation technique and comparative analysis between aggregation techniques.
Keywords: Wireless Sensor node, Data Aggregation, spatial correlation, time aggregation.
Abstract
Smart Card based e-Public Distribution System
Sana A. Qader Perampalli, Dr. R.R. Dube
DOI: 10.17148/IJARCCE.2016.55161
Abstract: The Government of India in an effort to ensure fair supply of food items under PDS to the targeted underprivileged sections as per the eligibility fixed by the Government of India. In spite of the best efforts by Government officials at various levels, there are a few bottle-necks and inconveniences to the targeted citizens in availing the services provided. All these happen because every job in the ration shop involves manual work. Because of intervention of manual work there are lots of illegal activity occurs. As solution to this problem the proposed system proposes a transparent and highly scalable Ration Distribution (Food Distribution) system with biometric authentication. The conventional paper based ration card is replaced by smart card. The system is placed at each ration shop which is connected to the server through web. Every time before ration collection each user has to login into the system. The user need not to pay the cash money as the appropriate balance is deducted from users bank account, so there is no direct involvement of ration shop owner in transaction. The transaction details are send to users mobile. The government can have overall control and monitoring at each ration shop through web. In addition user as well as ration distributor will get SMS based alert about arrival of commodities. As a result, this new e-PDS system can reduce possible human errors and provide accurate information of public distribution system at any point.
Keywords: Fair Price Shop, Public Distribution System, Unique Identity.
Abstract
Advancement in Electric Meter Readings
Prof. Mrs. K. A. Khedikar, Ms. Minakshi Shriniwas Talkokul, Ms. Rohini Venugopal Panicker
DOI: 10.17148/IJARCCE.2016.55162
Abstract: Electricity is one of the basic requirements of human beings, which is widely used for domestic, industrial and agricultural purposes. The basic approach of our project is to utilize telecommunication systems for automated transmission of data to facilitate bill generation. Traditional meter reading for any utility consumption and billing is done by human operator from houses to houses and building to building. This requires huge number of labor operators and long working hour to achieve complete area data reading and billing. Human operator billing are prone to reading error, also has errors while recording what was read and during data entry. Hard to access meters at rural accounts, indoor meters, obstacles. This System will hear by resolve the time consuming process to get readings and generation of bill. In this system, No. of units sends to the MSEB at Schedule date and time. And according to bill is generated and sends to the user�s Email ID.
Keywords: Electricity board, Automatic Meter Reading, Interrupt Request, Communication port, Light-Dependent Resistor (LDR).
Abstract
An Image and Video Recapture Detection using Acquisition Chains of Edge Profiles
Mr. Vinayak K. Shingote, Prof. Ashish Kumar
DOI: 10.17148/IJARCCE.2016.55163
Abstract: Using smart phone and digital technology it�s easy to recapture images and videos from an liquid crystal display (LCD) monitor and from smart phone. Such image and video recapturing activities are a security threat, which allows the forgery images/videos to bypass the current forensic systems. The task of verifying the ownership and history of an image or video is, consequently, more difficult. One approach to detecting an image or video that has been recaptured from an LCD monitor or from smart phone is to search for the presence of aliasing due to the sampling of the monitor or screen pixel grid. In this paper, we show that it is possible to detect recaptured image and video based on feature set of image. By using LCD monitors or smart phone, its add aliasing effect in image, so using features like brightness, contrastness, edge width, blurriness etc., we can identify recaptured image. We find the fact that the edge profiles of single and recaptured images are marked different and we train two alternative dictionaries using the KSVD approach. One dictionary is trained to provide a sparse representation of single captured edges and a second for recaptured edges. Using these two learned dictionaries, we can detect whether a query image has been recaptured with use of Support Vector Machine (SVM). Experiments conducted show that the proposed algorithm is capable of detecting recaptured images and video with a high level of accuracy.
Keywords: Smart Phone, LCD, Aliasing, Edge Profiles, K-SVD, Sparse Representation, SVM.
Abstract
A Study on Haze Removal Techniques for Image Processing
Dr. Vinod Shokeen, Sumit Bhardwaj, Neeraj Mishra
DOI: 10.17148/IJARCCE.2016.55164
Abstract: This paper presents literature survey on various haze removal techniques. Haze causes problems in various computer vision and image processing based applications as it diminishes the scene's visibility. The air light and attenuation are two main phenomena responsible for haze formation .The air light enhance the whiteness in the scene and contrast get reduced by attenuation. Haze removal techniques helps in recovering the contrast and color of the scene. These techniques have found many applications in the area of image processing such as consumer electronics, object detection, outdoor surveillance etc. The aim of the paper is to explore various methods used for efficiently removing haze from digital images. This paper ends up with the short comings of the existing methods.
Keywords: Airlight, Image Dehazing, Contrast enhancement, Dark channel prior, CLAHE, MIX-CLAHE.
Abstract
Homomorpic Hybrid Encryption for Cloud Computing
Daniya Rao, Deepak Painuli, Kamal Kant Verma
DOI: 10.17148/IJARCCE.2016.55165
Abstract: : Cloud Computing is a stretchy, cost-effective, and confirmed delivery platform for providing business or consumer IT services in excess of the Internet. For the best Performance and most excellent security of cloud computing, we proposed homomorphic hybrid encryption technique. With the progress of Cloud Computing, Computer Network and Communication Technology, an immense group of data and information require to be exchanged by public communication networks. High effectiveness and high protection of data transmission become much more vital. In this paper we proposed Homomorphic Encryption technique, ElGamal encryption and Paillier encryption are widely used two algorithms of asymmetric encryption technology. Both are best and top privacy homomorphism, combination of ElGamal and Paillier renewed to hybrid algorithm, which are proficient to secure cloud data since homomorphic encryption allows direct encrypted communication in cloud computing. Here first we are generating key from Pailler cryptosystem then these private and public keys followed by ElGamal for the purpose of encryption/decryption, later Homomorphic encryption is applied for a secure encrypted communication of users in cloud.
Keywords: Include at least 4 keywords or phrases.
Abstract
State-of-the-Art Security System With Image Capture and Trigger Mechanism in a Home Environment
Marthy Siva Sai Krishna, G Venkata Pavan Rama Sai Bharadwaj, J.S.H Chakravarthy
DOI: 10.17148/IJARCCE.2016.55166
Abstract: This paper proposes a modern security system which involves capturing an image of the person at the entrance of an office, a house, an industry or any secure facility for that matter, action can be taken accordingly with a trigger. First, the presence of a person at the entrance is checked with a PIR sensor and if the outcome is positive, an image is captured with a webcam and is sent as an email to the owner/authorised person. That owner checks his phone for email notification on phone (which can be easily implemented these days by adjusting the settings in the email). A triggering statement is sent to the GSM module present in the circuitry at the entrance such that the door can be opened if the person at the entrance is known and if not a message can be displayed with an LCD panel. We have implemented this technique on a home environment.
Keywords: Analog-to-digital converters, Time Based ADC, Time to Digital Converter.
Abstract
Secure Protocol for Replay and Jamming Attack Detection in Wireless Sensor Network
Gaurav S. Deore, Chandrashekhar S. Khasnis, Mrs. U.H.Wanaskar
DOI: 10.17148/IJARCCE.2016.55167
Abstract: In wireless sensor networks, it is elementary to restrict the system access just to trained sensor nodes, while messages from unknowns won�t be sent in the networks. In expansion, the WSNs uses data-centric multi-hop correspondence that thusly, demands the security support to be created at the link layer (increasing the cost of security related operations), instead of being at the application layer, as when all is said in completed networks. The aim of this paper is to explore the security threats and challenges in sensor networks. Motesec is a productive wireless sensor protocol which provides validation by means of CFA, avoids unapproved access to data using MDACP. In this paper, we present the design, usage, and assessment of a secure system access system for wireless sensor networks. Many protocols have been projected for replay attack assurance, however they involve higher storage limit. Because of the sensor node�s constrained storage, the storage condition of these protocols is undesirable. By noticing this limitation, the existing protocols are used just for replay and jamming attack discovery. The proposed system includes the channel based methodology to evacuate replay packets and to minimize storage overhead in replay location. The result demonstrates that proposed methodology consumes a great deal fewer storage and vitality than several methods.
Keywords: Sensor networks, security, Bloom Filter, Replay Attack, Jamming Attack.
Abstract
ANT Colony Based Energy Efficient Multipath Routing
Jaideep Atri, Shuchita Upadhyaya
DOI: 10.17148/IJARCCE.2016.55168
Abstract: Multipath routing in MANET is a way of utilizing multiple alternative paths in the network, which can provide a variety of benefit like preventing delays due to stale routes, increased available bandwidth on different links etc as compared to the protocols like DSR and AODV. In the present paper, the various existing multipath routing techniques for MANET have been elaborated along with their weak zones. This paper also introduces Ant colony based energy efficient multipath routing (ACBEEMR) technique. The ACBEEMR uses pheromone probability function to decide the next node in the network.
Keywords: Multipath, Routing, On demand, Proactive, energy efficient.
Abstract
A Review on Stereo Image Matching Using, Corner Detection Algorithm
Komal Shrirang Changan, Prof. P.G. Chilveri
DOI: 10.17148/IJARCCE.2016.55169
Abstract: In computer vision applications feature detection algorithm plays a very important role. Widely used features in many stereo vision work, are robust against the change of perspective like edge elements, corners, line segments, and curve segments. The major types of stereo image matching are Intensity-based stereo matching and feature-based stereo matching. The intensity based stereo matching requires depth calculation and this might get complex and costly. While the feature based stereo image matching is easier than depth calculation. This review paper describes the method to match stereo image with the help of Harris corner detection algorithm. Algorithm contains Gaussian smoothing filter for noise reduction so that false corners can be avoided. The architecture contains flexible threshold operator for cor-ner detection and it requires less time. The system will be implemented on System Generator to reduce the bulkiness of the system and to maximize the speed of operation.
Keywords: Harris corner detection, stereo matching, Gaussian smoothing, System Generator.
Abstract
Performance Analysis of Transparent Relays in 802.16j MMR Network by Implementing Relay Concept using C++ in QualNet Simulator
Bramesh S M, Pranit Raj Verma, Vivek Kumar Vikky, Vivek Kumar Anand
DOI: 10.17148/IJARCCE.2016.55170
Abstract: Wireless multi-hop relay systems play an important role in upcoming broadband wireless networks like WiMAX. Such relay can be used either to increase a cell�s capacity or expand a cell�s coverage, all at much lower cost compared to the alternative solution of using more Base Stations (BSs). The IEEE 802.16j is an amendment to the IEEE 802.16e standard, which introduces the multi-hop relay concept into existing point to point mode of communication. IEEE 802.16j mobile multi-hop relay (MMR) standard introduces two types of relays, transparent and non-transparent relays. This work has focused on studying the impact of having transparent relay stations on overall system throughput in an MMR WiMAX network and studying the impact of a number of transparent relay stations on overall system throughput in an MMR WiMAX network by implementing a transparent relay station concept in QualNet simulator. Simulation studies have been carried out using the QualNet simulator by considering the throughput as performances metric for constant bit rate (CBR) and variable bit rate (VBR) traffic individually. From the simulation results it is observed that introducing transparent relay stations in the MMR WiMAX network enhance the performance of the network. Furthermore, it was found the performance enhancement exclusively depends on its deployment. Much further work is necessary to realize useful gains from these systems.
Keywords: 802.16j MMR, Transparent Relay, Performance, QualNet.
Abstract
Analyzing network traffic to detect anomaly based intrusion using SVM.
Bhopale Nandkishor G., Sangve Sunil S
DOI: 10.17148/IJARCCE.2016.55171
Abstract: In the growing Era of Information Technology, the use of Internet is the basic need of all, but it also caused new problem called Network Security. To solve these problem Intrusion Detection Systems (IDSs) are used. IDS provide the information related to malicious activities and protect network from vulnerabilities and provide better information security. Intrusion detection system provides security for huge network like Internet. Huge amount of data is transferred on the network these days hence system should analyze and detect the malicious activities. The system should analyze and recognize intrusion in effective way and in less time. The main hurdle in network security is to enhance the intrusion detection system. In this paper we proposed Hybrid anomaly Intrusion Detection System Using Outlier Mining with Support Vector Machine on the basis of TCP transmission control protocol header information and other attributes. Here we are using different approaches from that one is k-mean clustering and another is one-class support vector machine to formulate and model different sessions already presented in the dataset provided by the MIT DARPA 99 dataset. After that we provide the testing set to the model for predicting the attack scenarios of session.
Keywords: IDS,k-means clusterig,one class SVM,outlier minning,TCP.
Abstract
A Hierarchical Approach for Optic Disc Detection Using Wavelet Decomposition and Shape Based Pattern Classification
Sharath Kumar P N, Deepak R U, Midhun Raj R S, Dr. Anuja Sathar, Dr. Sahasranamam V, Rajesh Kumar R
DOI: 10.17148/IJARCCE.2016.55172
Abstract: Optic disc (OD) examination is of significant interest to both ophthalmologists and to image analysts. OD reveals symptoms of various ocular diseases like Glaucoma. For image analysts, optic disc detection although given its brighter intensities and sharp contrast is surprisingly a difficult task given its innumerous variations caused by retinal pathologies and imaging conditions. In this study, we propose a method for automatically detecting OD. The method involves a hierarchical approach where retinal image undergoes five-level wavelet decomposition for coarse OD detection which is followed by shape based classifier for precise OD boundary delineation. The proposed method was evaluated on 5789 images and achieved OD detection accuracy of 97.59%. OD boundary delineation performance was evaluated on a representative sample of 28 images and achieved a performance score of 88.37%. The results demonstrated consistency of the method across different image variations and can be adopted for various CAD applications on retinal images.
Keywords: automated detection, optic disc, wavelet decomposition, pattern classifier.
Abstract
Performance Analysis of Solid State Drives
Chhatragun L. Shinde, Shefali P. Sonavane
DOI: 10.17148/IJARCCE.2016.55173
Abstract: Performance as well as reliability are the important factors to consider while designing and deploying solid state drives (SSD) in storage systems. Instead of directly manufacturing the SSD; first needs to get insight into performance analysis using SSD simulation tools and comparing its results. If obtained results are as comparable with real SSD performance results then that is proper way to proceed for manufacturing the SSD. SSDs have pronounced write-history sensitivity, which implies that they have unique requirements for precisely measuring their performances. Primary objectives of performance measurement are to compare and analyze the read/ write ratios, various workloads, interface, stability and security. DiskSim simulator, FlashSim, VSSIM and SSD player tools are used to evaluate the performance of SSD devices employing a variety of Flash Translation Layer (FTL) schemes. This paper compares the performance of SSD with different parameters. The results of comparison show that write operation is more weighted than the read operation.
Keywords: Flash memory; Storage; SSD; Simulation; Performance.
Abstract
Road Map Extraction from Satellite Images Using Connected Component Approach
Mudit Shrivastava, Dr. D. M. Bhalerao
DOI: 10.17148/IJARCCE.2016.55174
Abstract: The satellite images usually consist of complexity due to presence of several manmade and natural features. Automatic extraction of features from satellite images is a significant analysis for getting an efficient geographical database system and modifying the remote sensing and geographic information system (GIS) areas. We have presented a methodology using image processing and connected component approach for automatic extraction of road network from any high resolution satellite image. Its quite challenging in the areas having complex scenes. There is an algorithm to extract the manmade features from the image and filtering operations are used to correctly extract out the respective feature i.e. the road network from the image. The proposed method follows various steps consisting of Enhancement, Filtering operations, Segmentation etc. The extracted road network can be used for the map creation which shortens the human efforts in creating large scale maps and also it is very efficient in time and cost. The method is simplistic to implement in real time also and can be applied for the real time development in the field of remote sensing and Geographic Information System including rural and urban development.
Keywords: Connected component, Enhancement, Feature extraction, Filtering operations, Road network detection.
Abstract
Optimization of GRP Protocol in IEEE 802.11g MANET for variable neighbor expiry time
Ruchi Bankar, Anu Sheetal, Harsukhpreet Singh
DOI: 10.17148/IJARCCE.2016.55175
Abstract: Mobile ad-hoc network (MANET) provides proficient wireless communication by adopting ad-hoc routing functionality in mobile nodes. The MANET node result in frequent network topology changes, making routing a challenging task. This work is an attempt towards an optimization of geographic routing protocol (GRP) in IEEE 802.11g MANET. The system has been designed and investigated for different network sizes and variable mobile nodes density. To optimize the performance of GRP route information based IEEE 802.11g MANET nodes; the various quality of service (QoS) parameters such as, end-to-end delay, packet delivery ratio, network load, average throughput, number of hops/route,and normalized routing load has been determined using the parameter neighbor expiry time (NET). The simulation results show that with neighbor expiry time of 8, network performance is better from default value for IEEE 802.11g MANET networks.
Keywords: MANET, GRP, NET, OPNET modeler 14.5
Abstract
Security Based Hostile User Detection in Cognitive Radio Networks
Reshma Rajan, Syamesh K G, Anjali Raj, Jeethumol K Joy
DOI: 10.17148/IJARCCE.2016.55176
Abstract: The extensive threats in cognitive radio networks is detection of primary user signal. Cooperation among secondary users swell the performance of the system significantly. In cooperative sensing in hostile environments, intruder nodes send incorrect sensing results to the SBS and make the fusion center erroneously decides about the presence of the primary user. Here we proposed a novel active transmissions based algorithm with ECC for detecting such malicious SUs. This is the ?rst algorithm that can proactively detect malicious SUs, thereby preventing Cognitive Radio Networks from making incorrect sensing decisions. This helps in reducing the interference to Primary Users as well as increases the accuracy of sensing. Elliptic Curve Cryptography (ECC) is used for the security in the CR network. ECC key sizes are shorter than that of RSA keys, the length of the public key and private key is much shorter in elliptic curve cryptosystems. ECC reduces the throughput loss and provides security to the networks.
Keywords: Cognitive radio, cooperative spectrum sensing, Primary User Emulation (PUE), Elliptic curve cryptography (ECC).
Abstract
Classification of Pseudo Random Numbers Using Support Vector Machine Classifier
Preeti Meena, Malti Bansal
DOI: 10.17148/IJARCCE.2016.55177
Abstract: The paper studies about the randomness and its application in the field of cryptography. It is already known to have randomness having applications in the fields of gaming, gambling, statistics etc. But, in applications such as cryptography, randomness has a vital role. As with the use of these random numbers only, a highly secure message can be formed. So, Pseudo Random numbers classification is proposed in this paper so that sources of these random numbers can be classified for the enhancement in the security level. The result shows good accuracy of classification of these random numbers i.e. classified using multi-SVM.
Keywords: Cryptanalysis, Multi-SVM, PRNGs, TRNGs.
Abstract
Intelligent Heart Attack Prediction System Using Big Data
Prof. U.H. Wanaskar, Prajakta Ghadge, Vrushali Girmev, Prajakta Deshmukh, Kajal Kokane
DOI: 10.17148/IJARCCE.2016.55178
Abstract: Main objective is to develop a prototype Intelligent Heart Attack Prediction System with help of Big data and data mining modeling techniques, this system can extract and discover hidden knowledge (relationships and pattern) associated with heart disease from historical heart disease database. It can answer complex queries for diagnosing heart disease and thus assist healthcare practitioners to make efficient clinical decisions which traditional decision support systems can�t do. The healthcare industry collects large amount of big data which are not mined. Using advanced data mining techniques remedies can be provided. Medical diagnosis is regarded as an important but complicated task that needs to be executed accurately and efficiently. By providing effective treatments, it also helps to reduce treatment costs. The automation of this system would be extremely helpful. Therefore, a heart attack prediction system would probably be more beneficial for medical diagnosis system
Keywords: Big data, Data mining, Hadoop, Healthcare, Knowledge-discovery, Risk prediction.
Abstract
Iris Recognition using Gabor Filters Optimized by Genetic Algorithm and Particle Swarm Optimization
Rechu Sharma, Vaneet Mohan
DOI: 10.17148/IJARCCE.2016.55179
Abstract: In this paper, Gabor filters based optimal feature extraction method has been presented for iris recognition system. Later, the Gabor filters resultant iris images will be optimized using particle swarm optimization and Genetic Algorithm optimization technique. Initially in the pre-processing step the image is binarized and normalized to rectangular blocks which are then decomposed by the optimal Gabor filters using HCT. Experimental results show that the performance of the proposed method is encouraging in comparison to the traditional method .This whole simulation is being done in MATLAB 2010a environment with FAR, FRR and accuracy as parameters.
Keywords: Iris Recognition, Genetic Algorithm, Particle Swarm Optimization, Fusion, Gabor Filters.
Abstract
Fault Detection Based on Round Trip Time in WSNs and Trust Value Based Correction
Jeethumol K Joy, Syamesh K G, Reshma Rajan, Saneesh P S
DOI: 10.17148/IJARCCE.2016.55180
Abstract: The Wireless Sensor Networks (WSNs) has many applications in our day today life. With the development of technologies it�s uses also increases. But the chance of sensor node failure also increases. Hence for proper working of the system, detection and correction of such faulty node is essential. This paper deals with faulty node detection based on Round Trip Time.
Keywords: RTT, RTP, WSNs, Trust value.
Abstract
Road Quality & Valley Complexity Analysis Using Android Application
Prof. P. S. Toke, Shweta Maheshwari, Aishwarya Asawale, Aishwarya Dhamale, Nigel Paul
DOI: 10.17148/IJARCCE.2016.55181
Abstract: With the growing speed of technological advancement, Smartphones have become the essential components of our daily performance. Smart phone offers advanced technologies with functionality similar as a personal computer. There are advanced features in smartphones such as internet, GPS and also built-in sensors such as magnetometer, accelerometers which are very typical. In this study, we have created a successful android application, to monitor road surface and complexity of valleys which is accepted by wide user community. The goal is to minimize and manage current accidents on roads with the help of a user-friendly interface. To this purpose, the model formulation for the application includes a three-tiered architecture encompassing: i) a mobile application at user level that processes raw data from the embedded accelerometers and transmits the result of the computation (i.e. a roughness index) together with geographic localization data from GPS to a server; ii) a back-end server running a geographic information system where geo-referenced data are properly aggregated, organized and stored; iii) a graphical front-end based on a cloud platform service for visualization.
Keywords: Road Maintenance; Accelerometer; Road Roughness Condition; GPS; Magnetometer.
Abstract
Study of Energy Conservation and Energy Management Techniques to Be Adopted in YIC Campus
Fahad Albukhari
DOI: 10.17148/IJARCCE.2016.55182
Abstract: In this paper,the scarce energy resources, energy conservation has become an important area worldwide. Energy conserved is energy generated. So many companies are putting efforts in this area. Again with the advent of many non-conventional resources, the energy dependence on conventional resources can also be reduced. The project aims at studying one building in YIC campus so that some suggestions can be put forth for conservation. Again energy audit can be carried out to mark the probable areas for energy savings. Energy management techniques can be suggested which may be in the form of installation of wind mills or solar panels to reduce the energy bill.
Keywords: Energy audit, Energy Conservation, Techniques,YIC
Abstract
Analysis of Various Issues in Non-Local Means Image Denoising Algorithm
Sonika, Shalini Aggarwal, Pardeep kumar
DOI: 10.17148/IJARCCE.2016.55183
Abstract: Denoising is still a fundamental, active and unsolved problem in image processing which affects the various high level computer vision tasks like image segmentation, recognition, and tracking etc. The basic goal of denoising is to estimate the original signal from the noisy observations while preserving the important details such as edges and textures. There is always a trade-off between the noise reduction and preserving the important image details. A wide collection of image denoising techniques have been proposed to deal with the denoising problem, but there is still requirement of improvement in the algorithms to enhance the performance of the algorithms. In recent years, the patch based image denoising algorithms like Non-Local Means (NLM) have drawn much more attention to tackle the denoising problem. This paper highlights the various issues of NLM algorithm and presents a review of significant contributions by the different authors to improve the performance of NLM image denoising algorithm.
Keywords: denoising, Non Local Means algorithm, Gaussian noise, peak signal to noise ratio /P>
Abstract
Effective Phrase-Based Document Indexing for Web Document Clustering
Mr. Patil A.A, Prof. Naidu G.J
DOI: 10.17148/IJARCCE.2016.55184
Abstract: Record grouping procedures generally depend on single term investigation of the report information set, for example, the Vector Space Model. To accomplish more precise record bunching, more educational components including phrases and their weights are especially imperative in such situations. Archive grouping is especially valuable in numerous applications, for example, programmed arrangement of archives, gathering web search tool results, constructing a scientific classification of reports, and others. This paper presents two key parts of effective record grouping. The initial segment is a novel expression based record file demonstrate, the Archive File Chart, which takes into consideration incremental development of an expression based file of the archive set with an accentuation on productivity, as opposed to depending on single-term lists as it were. It gives proficient expression coordinating that is utilized to judge the closeness between archives. The model is adaptable in that it could return to a minimal representation of the vector space model on the off chance that we pick not to record phrases. The second part is an incremental record grouping calculation in light of amplifying the snugness of bunches via precisely watching the pair-wise record comparability appropriation inside bunches. The mix of these two segments makes a hidden model for strong and precise report likeness figuring that prompts quite enhanced results in Web record grouping over customary techniques.
Keywords: Web mining, record similitude, phrase-based indexing, report grouping, archive structure, record list chart, phrase coordinating. /P>
Abstract
Analysis of Search Engine Optimization Algorithm
Mehzabul Hoque Nahid
DOI: 10.17148/IJARCCE.2016.55185
Abstract: SEO stands for �search engine optimization.� It is the process of getting traffic from the free, organic, editorial or natural search results on search engines. The earlier (or higher ranked on the search results page), and more frequently a site appears in the search results list, the more visitors it will receive from the search engine's users, and these visitors can be converted into customers. SEO may target different kinds of search, including image search, local search, video search, academic search, news search and industry-specific vertical search engines. As an Internet marketing strategy, SEO considers how search engines work, what people search for, the actual search terms or keywords typed into search engines and which search engines are preferred by their targeted audience. Optimizing a website may involve editing its content, HTML and associated coding to both increase its relevance to specific keywords and to remove barriers to the indexing activities of search engines. Promoting a site to increase the number of backlinks, or inbound links, is another SEO tactic. As of May 2015, mobile search has finally surpassed desktop search, Google is developing and pushing mobile search as the future in all of its products and many brands are beginning to take a different approach on their internet strategies.
Keywords: SEO, HTML, Factors, Volume, Crawl.
Abstract
Solar-Panel Receiver design for Optical Wireless Communications and Simultaneous Energy Harvesting
Sarika Shinde, Prof. Shailesh Jadhav
DOI: 10.17148/IJARCCE.2016.55186
Abstract: This paper presents a completely different design model from before of an optical wireless communications receiver by using solar panel as a photo detector. Simultaneous data transmission & energy harvesting can be done using proposed system. A modulated light signal can be converted into an electrical signal by using a solar panel which doesn�t require any external power. User can use a generated energy for the system or this energy can also use to prolong the operation time of system. This paper focuses on the parameters which are considered important for the design of system using solar panel applied for simultaneous communication & energy harvesting. This paper describes actual practical implementation of orthogonal frequency division multiplexing (OFDM). Described system can establish a communication link with data rate of 11.84 MBPS for received optical signal.
Keywords: Photodetector, energy harvesting, multi-crystalline silicon solar cells, OFDM.
Abstract
Evaluation of single underwater image enhancement with CLAHE
Jasneet kaur Babool, Satbir Singh
DOI: 10.17148/IJARCCE.2016.55187
Abstract: This paper presents a new method called mixture Contrast Limited Adaptive Histogram Equalization (CLAHE) color models that specifically developed for underwater image enhancement. Firstly, the contrast stretching of RGB algorithm its applied to equalize the color contrast in images. Secondly, the saturation and intensity stretching of HSI is used to increase the true color and solve the problem of lighting. Interactive software has been developed for underwater image enhancement. In this we will be discussing about the degradations due to bad weather such as underwater, underwater small fish, gold fish and underwater apple in an image. The image quality of outdoor screen in the underwater and underwater fish weather condition is usually degraded by the scattering of a light before reaching the camera due to these large quantities of overhanging particles (e.g. underwater, underwater fish, gold fish, apple underwater impurities) in the environment. General contrast enhancement approaches can be applied for image debasing, such as linear or gamma correction, unship-masking, or histogram equalization. As haze is not constant over an image, these techniques cannot be applied globally as they would degrade haze-free regions. Results of the software are presented in this paper.
Keywords: Performance evaluation; Parameters; MSE; PSNR.
Abstract
Framework for Cognitive Radio Systems
Mr. Abdul H. Ansari, Mr Santosh M Tambe
DOI: 10.17148/IJARCCE.2016.55188
Abstract: The proposed system gives the calculation of number of samples and SNR in OFDM and SSB modulation and can calculate available throughput in cognitive radio transmission and normalize minimum sensing time. The system gives appropriate throughput for OFDM and system algorithms suggest better miss detection probability. The aggregate interference is constant in all systems while it changes in opportunistic throughput. Considering a periodic sensing scheme, with uniform channel sensing durations, the detection problems are formulated as joint optimization of the sensing duration and individual detector parameters to maximize the aggregate achievable secondary throughput capacity given some limits on the overall interference imposed on the primary network. Result shows that cognitive radio implemented using orthogonal frequency division multiplexing technique has better performance than using single side band technique.
Keywords: Cognitive radio, multiband sensing-time-adaptive joint detection, nonlinear optimization, periodic sensing, spectrum sensing, throughput maximization, wideband sensing.
Abstract
Dynamic Migration of Content Distribution Services for Minimum Cost using AES
Prof. Hema Kumbhar, Nishigandha Rajhans, Lalita Sonawane, Vedika Dhage, Nitesh Vanarase
DOI: 10.17148/IJARCCE.2016.55189
Abstract: Now a days, cloud computing is most popular network in world. Cloud computing provides resource sharing and online data storage for the end users. The main issue is to best utilize the cloud as well as the application provider�s existing private cloud, to serve volatile requests with service response time guarantee at all times, while incurring the minimum operational cost. Employing Lyapunov optimization techniques, we design a dynamic control algorithm to optimally place contents and dispatch requests in a hybrid cloud infrastructure spanning geo-distributed data centers, which minimizes overall operational cost over time, subject to service response time constraints. Also there are many security issues while migrating the data within the clouds. So, security becomes essential part for the data which is stored on cloud. To solve this issues, the paper presents AES encryption and decryption technique. AES is high secured and fastest technique. This infrastructure guaranteed to secure the information and minimizes the operational cost in cloud server.
Keywords: Cloud computing, Content Distribution, Lyapunov Optimization, Dynamic Migration, AES Algorithm.
Abstract
A Survey on Automatic Detection of Diabetic Retinopathy Exudates from Retinal Fundus Images
Falguni Thakkar, Rajvi Parikh
DOI: 10.17148/IJARCCE.2016.55190
Abstract: Diabetic Retinopathy is the Leading cause of blindness in the ongoing life. It is the major problem in worldwide. Recent health studies estimates that 54 million American have diabetes and most of them don�t know it. WHO reveal that 347 million people have this diabetes worldwide? As many as 25,000 people have lose their vision because of diabetic retinopathy every year. When the retina is damaged due to fluid leaks from blood vessels into the retina is the sign of diabetic retinopathy. In extreme cases, the patient will become blind. Damage to the tiny blood vessels in the retina due to diabetes is named as (DR) Diabetic Retinopathy. It is the dieses for the person who having high blood sugar. Diabetic retinopathy can affect both the eyes of person without any pre sign or symptoms. But Proper screening for diabetic retinopathy will reduce the risk of blindness at earlier stage.
Keywords: Diabetic Retinopathy, Exudates, Retinal funds image.
Abstract
A Study on Secret Image Hiding in Diverse Color Spaces
G. Germine Mary, M. Mary Shanthi Rani
DOI: 10.17148/IJARCCE.2016.55191
Abstract: Visual Cryptography is a special encryption technique to hide information in images in such a way that human visual system can decrypt the secret without any complex computation. In this study Visual Cryptography shares are created in different Color spaces, to hide the given secret. This article aims at finding the best color space to hide an image which gives qualitatively good result in terms of human visual perception and quantitatively good performances measured using standard metrics like Discrete Entropy, Contrast Improvement Index, and Peak Signal-to-Noise Ratio.
Keywords: Visual Cryptography, Secret Sharing, Color Space, YCbCr Color Space, HSV Color space, RGB color space, CMY Color space.
Abstract
Carbon: The Futuristic Semiconductor
Priya Chitkara, Deepika Sharma, Dr. Deep Kamal Kaur Randhawa
DOI: 10.17148/IJARCCE.2016.55192
Abstract: Integrated Circuits form the backbone of all electronic and Computation Systems. Their working is based on the typical properties of semiconductor materials. Presently Silicon is ruling semiconductor but it will not be handle further miniaturization of devices and circuits. Carbon is focus of research for use in nanoelectronics. Carbon belongs to same group as that of Silicon and Germanium in periodic table. This motivation leads to study of various carbon allotropes that may have ability to sustain Moore�s law. In this paper a review has been done of various carbon allotropes and techniques to analyze them.
Keywords: Allotropes, Carbon, Nanoelectronics, Spectroscopy.
Abstract
Personal Cloudlets: Implementing a User-Centric Data Store with Privacy Aware Access Control for Cloud-based Data Platforms
Nauman Birwadkar, Mrs. M.P. Deshmukh, Apoorva Arbooj, Suraj Todkari, Priya Agarwal
DOI: 10.17148/IJARCCE.2016.55193
Abstract: OPENi�s Personal Cloudlets framework as a novel approach to enhancing users control and privacy over their data on a data driven, cloud-based platform. The OPENi concept and the research objectives that influenced the design and implementation of OPENi�s Personal Cloudlet Framework. We outline OPENi�s architecture and describe how through the use of REST based endpoints, object-based access control, OPENiTypes, and stateless JSON Web Token (JWT) it allows users share, reuse, and control access to their data across many mobile applications while maintaining cloud scalability. Furthermore how a number of the Personal Cloudlet Framework�s features enhance a users privacy and control, including: the User Dashboard, the Privacy Preserving Data Aggregator, and the fine grained access control mechanism.
Keywords: Personal Cloudlet, OPENi, Cloud Security, User Centric.
Abstract
System for Reading the Product Labels to Help Blind Persons
Payal V. Gulhane, Vrushali G. Raut
DOI: 10.17148/IJARCCE.2016.55194
Abstract: The paper proposes system gives a strategy to help blind persons by reading the product labels. In this system, one camera is used for capturing the product images. Blind person will only have to show product label in front of the camera, then the camera will capture the image. Raspberry pi 2 is used as a processor to process the image. System extracts the text from image by using SIFT (scale invariant feature transform) features of the image. KNN (k nearest neighbor) algorithm is used for calculating the Euclidean distance. The extracted text present at the output of the processor.
Keywords: KNN (k nearest neighbor), raspberry pi 2, SIFT (scale invariant feature transform).
Abstract
Enhancing Text Mining Using Side Information
Prof. P.S. Toke, Rajat Mutha, Omkar Naidu, Juilee Kulkarni
DOI: 10.17148/IJARCCE.2016.55195
Abstract: One of the widely researched data mining problem in the text domains is Clustering. Classification, document organization, visualization, indexing and collaborative filtering are some of the various applications of this problem. Large amount of information present within documents is in the form of text. We cannot always retrieve data in a refined text format. It also contains a lot of Side Information, int the form of different links in the document, user-access behaviour, and document provenance information from web - logs or other non-textual attributes. Large amount of information may be contained in these attributes for clustering purposes. To estimate the relative information is very difficult and cumbersome in most of the cases, particularly when some of information is noisy data. In such situation, integrating this side information into mining process can be risky, because it might result in either: 1. Addition of noise into the data 2. Improvement of quality of data mining process An ethical way is needed for performing the data mining process, and for maximizing the advantages of the use of this available side information. We are proposing the use of K-means algorithm for improved and efficient clustering of the information in this paper.
Keywords: Information-Retrieval, Text-mining, Clustering, K-means, Side Information.
Abstract
Adaptive Learning: A Survey
Ms Kavita K Dhalape, Prof. Sachin M Bojewar
DOI: 10.17148/IJARCCE.2016.55196
Abstract: Adaptive learning is a much needed requirement to improve the efficiency of recommending an e- learning content. Adaptive learning supports learning content specific to a student�s learning behaviour. Hence, it is very important part of adaptive learning to learn and track the student�s learning path and decide the appropriate learning content which can be recommended to an individual. In This paper a survey has been done to propose mechanisms to implement the adaptive learning efficiently in e-learning.
Keywords: e-learning, learning behaviour, learning path, ontology.
Abstract
Categorization of Web Services Based On QoS Constraint Using Decision Tree Classifier
J. Ghayathri, Dr. S. Pannir Selvam
DOI: 10.17148/IJARCCE.2016.55197
Abstract: The rapid detonation of web services technology in our businesses and day-to-day lives, to satisfy user requirements the composite services are formed by combining selected web services. Web Services are emerging technologies that flows the mechanism of communication between the electronic machines and reuse of component of services over the web. The selection of web services to satisfy the requirements of the consumers and to form the composite service made using Quality of Services (QoS). There is numerous service providers provide web services in the similar context, the web service selection based on QoS classification becomes incredibly essential for the consumer. As the QoS are significant features that decide the accuracy and efficiency of the web services to be selected, they are classified accordingly. In the proposed method based on decision trees the classification of web services has been applied. The modified algorithm of C5 classifier is used to do the classification based on QoS parameters. The confusion matrix is used to compute the accuracy of classification. It gives the higher accuracy in the selection of proper web service as per the need of consumers.
Keywords: Web services, QoS, Decision Tree, Classification and Confusion Matrix.
Abstract
AgroNutri Android Application
S. Srija, R. Geetha Chanda, S.Lavanya, Dr. M. Kalpana Ph.D
DOI: 10.17148/IJARCCE.2016.55198
Abstract: Agriculture is the backbone of India. Farmers need advice to take decision during their farming activities such as land preparation, sowing, irrigation management, fertilizer management, pest management and storage for higher production of crop. Application of required amount of fertilizer at proper time and proper proportion will help in increasing the overall productivity of the farm and also safe guards the soil health and microbial biodiversity. Growing trends in Agricultural Automation has led to a tremendous development of software and applications to foster information dissemination. This paper expresses the idea about the creation of AgroNutri an android application that helps in delivering the crop specific fertilizer quantity to be applied. The idea is to calculate the amount of NPK fertilizers to be applied based on the blanket recommendation of the crop of interest. This application works based on the crop selected by the farmer and that is taken as input, thus providing the farmers with the blanket recommendation of the NPK fertilizers and the amount of Urea, SSP and MOP to be applied.
Keywords: Blanket Recommendation, Urea, SSP, MOP, Agricultural Automation, Soil Nutrient, NPK.
Abstract
Remote Temperature Monitoring System Using ARM, Arduino and ZigBee
Vijay S. Kale, Madan B. Matsagar, Avinash D. Sonawane, Chandrakant L. Ambekar
DOI: 10.17148/IJARCCE.2016.55199
Abstract: Today there is demand to monitor environmental factors almost in all research institutes and the industries. Especially in remote areas where wire communication and mobile network is unavailable such as forests, deserts, mountains etc. The analog data measurement requires manual effort to note readings and there may be a possibility of human error. Such type of systems fails to provide and store precise values of parameters with high accuracy. Analog systems are having drawback of storage / memory. So, there is an requirement to do the remote place environmental parameters monitoring system which is to be accurate, easily operated, simple, small size, cost-effective and light weight. This paper represents the wireless sensor (WS) data communication using LM35, ARM microcontroller, ZigBee module, Arduino, Graphics LCD and PC. Experimental setup includes the heating arrangement of LM35 and transmission of data using ARM microcontroller and ZigBee. Receiver receives the data using Arduino, ZigBee and displays it on GLCD and stores the same in PC for processing. Heating arrangement is used to heat and cool the temperature sensor to study its characteristics.
Keywords: Wireless communication, ARM Microcontroller, Sensor, Personal computer, GLCD, Arduino, ZigBee.
Abstract
Moving Object Detection Based on Background Subtraction & Frame Differencing Technique
Md. Zakir Hussain, Mrs. Ayesha Naaz, Mohd Nayeem Uddin
DOI: 10.17148/IJARCCE.2016.55200
Abstract: In this paper, the Detection of the Moving Object is done based on Background Subtraction & Frame Differencing techniques. A moving object can be detected by employing various methods such as, by taking the difference between two Images. In this paper, detection of a moving object is performed by using two different techniques: a Background Subtraction technique, two frame difference technique; which are implemented in Matlab. The results of these two techniques are then compared in regards with PSNR and observed that the two frame difference technique can detect the region of the moving object effectively, even in a complex background, when compared with the Background Subtraction algorithms. The PSNR of two frame difference is 72.77683 at threshold 20, at the same threshold, PSNR of background subtraction is found to be 72.76551.
Keywords: Moving Object; Frame Difference; Background Subtraction.
Abstract
Design and Implementation of a novel FIR filter based on MCM for improved Power and Delay Efficiency
Puja Sutar, Ramya S.K
DOI: 10.17148/IJARCCE.2016.55201
Abstract: This paper proposes about new FIR filters that are implemented using multiple constant multiplications (MCM). This technique helps in reducing delay and power efficiency. It also helps to reduce area to some extent. All symmetric computations are performed by multipliers as the multipliers functions in symmetric manner. Multiple constant multiplications make use of two techniques common sub-expression (CSE) algorithm and GB algorithm technique to implement the multipliers. In this proposed system we have reduced down the use of number of adders, subtracters, shifters etc. to minimum and these are replaced by use of multipliers for increasing the efficiency of the filters. This paper also describes that the delay and power is reduced by replacing the conventional multipliers by multiple constant multiplications multipliers. Simulation is done by using Xilinx ISE tool suite 14.6 tool. The results obtained in this project are considered with respect to 8-bit inputs.
Keywords: Multiple constant multiplications (MCM), Common sub-expression algorithm (CSE), GB algorithm.
Abstract
Reactor Automation
Priyanka M. Ghorpade, Prof.N.A.Dawande, Prof.A.A.Mulajkar
DOI: 10.17148/IJARCCE.2016.55202
Abstract: In this paper mention different method of temperature control. The main purpose of this work is to control pharmaceutical reactor process & its temperature by analyzing reactor process we conclude that the main thing is temperature control of reactor. In this paper mention different method of temperature control which is used in food, chemical & process industries. In these industries they used different types of method (closed loop control system, proportional control system, proportional-integral-derivative control system,and proportional-integral-derivative control system) as per their application. By studying many paper we conclude that PID control method is most suitable for the temperature control of reactor.
Keywords: PID CONTROLLER, PLC, SCADA.
Abstract
Survey on Efficient Authentication for Mobile and Pervasive Computing
Mukesh M. Patil, Ass. Prof. Nalini A. Mhetre
DOI: 10.17148/IJARCCE.2016.55203
Abstract: In this survey, we endorse new techniques for authenticate the short encrypted messages which can be fulfill the requirements of pervasive applications. With the help of these advantage that the message to be authenticated must also be encrypted, we suggest provably secure authentication codes which can be greater efficient than any message authentication code there are used an inside the literature. The key point of this concept at the back of the proposed techniques is to use the security that help the encryption algorithm would provide to implements the more efficient authentication mechanisms, as opposed to use standalone authentication primitives.
Keywords: Authentication, unconditional security, computational security, universal hash-function families, pervasive computing.
Abstract
ALO Based Robust Cryptographic Scheme
B. Hitesh Linganna, G. Dedeepya, Sk. Ayesha Sultana, T. V. V. Satyanarayana
DOI: 10.17148/IJARCCE.2016.55204
Abstract: Digital communication has become an essential part of infrastructure nowadays, a lot of applications are Internet-based and it is important that communication be made secret. Cryptographic technique is one of the principal means to protect information security. Not only has it to ensure the information confidential, but also provides digital signature, authentication, secret sub-storage, system security and other functions. Therefore, the encryption and decryption solution can ensure the confidentiality of the information, as well as the integrity of information and certainty, to prevent information from tampering, forgery and counterfeiting. As the technology for providing the data to be more secure has changing day by day by increasing the efficiency of the existing systems.In a very proportional way the number of triflers was also being increased day by day to hack the private data.Using public key encryption, it is possible for two users who do not know one another to send secret messages back and forth without having to agree upon and exchange a secret key over an untrusted network. A pair of keys is used to make this communication possible. One key, the public key, is used for encryption and is distributed freely to other users. The other key, the private key, is not shared with other users and can be used for decryption. The keys are different, and one key cannot be determined from the other. In this paper a novel algorithm based on Arithmetic Logic Operation (ALO) is proposed which gives a new logic to the existing systems. The complexity of the proposed algorithm is observed to be less compared to the traditional algorithms.
Keywords: cryptography, encryption, cipher text, ALO, security.
Abstract
Image Enhancement for Medical Images Using Improved HSF
Anuradha, Vikram Mutneja
DOI: 10.17148/IJARCCE.2016.55205
Abstract: Image enhancement involves mainly the borders, edges or sharpens image features such as contrast and reduces ringing artifacts. Increase the images so that the information contained in them can be extracted in a meaningful sense of quality improvement. The biggest difficulty in image enhancement and image enhancement techniques to increase due to a large number of empirical criterion increases and requires interactive processes to achieve satisfactory results. Digital image processing in industrial X-ray image processing such as image enhancement, micro-imaging, remote sensing, and medical image analysis plays an important role in many areas. Improve the image of either a human observer or a philanthropic vision of a computer program such as visual sense or detect targets high-level image analysis, can be a kind of performance.. In the current work we are going to present Improved HSF selection of filter which in addition uses the thresholding of local tiles. We have compared the results with different performance matrices.
Keywords: Image enhancement, HSF, Threshold, Rayleigh CLAHE.
Abstract
An Overview on Wireless Sensor Networks Technology and Simulation Software’s
Vijay S. Kale, Rohit D. Kulkarni
DOI: 10.17148/IJARCCE.2016.55206
No abstract available.
Abstract
Comparative Study of Various Task Scheduling Algorithms in Grid Computing
Er. Harkiran Kaur, Er. Mandeep Kaur
DOI: 10.17148/IJARCCE.2016.55207
No abstract available.
Abstract
Performance Evaluation of Quality Enhancement Methods of Remote Sensing Images by Object Oriented Shadow Detection and Removal
Leethu Lakshmi A L, Jasmine George
DOI: 10.17148/IJARCCE.2016.55208
No abstract available.
Abstract
Efficient Quality Analysis and Enhancement of MRI Image Using Pre-Processing Techniques
Anusree J, R.S. Moni
DOI: 10.17148/IJARCCE.2016.55209
No abstract available.
Abstract
Emotion Detection Analysis through Tone of User: A Survey
Ms. Ankita Dutta Chowdhuri, Prof. Sachin Bojewar
DOI: 10.17148/IJARCCE.2016.55210
Abstract: Emotion detection through voice is a method that provides information regarding the actual emotion of a person irrespective of the words being used in conversation. Here the emotion is detected through the voice as an input instead of text in conversation. In this paper we focus on various techniques proposed by authors to detect the emotion through user�s voice. Estimating the degree of natural emotion through voice corpora by different author�s experimental measures is the main aim of this paper.
Keywords: Acoustic Features, Speech Recognition, Support Vector Machines, Anger.
Abstract
Physical Access Control Based on Biometrics and GSM
Diptadeep Addy, Poulami Bala
DOI: 10.17148/IJARCCE.2016.55211
Abstract: In this current age of 21st century security and privacy has become a major challenge to all of us. Whether it is in the private sector or government agencies, there remains a constant threat on privacy and security. Bank accounts are being hacked, private information being stolen now and then, lump sum amounts of money and valuable documents are changing hands overnight. Technology is changing and evolving constantly over the years. Hackers have become more ruthless in their methods and have been successful to make their entries into any system in the world and steal things. There are many vaults all across the country where important valuables and secret documents are kept, which are important for safety and security of the nation. So to answer these concerns we have proposed an idea where we are going to integrate some biometric features along with GSM communication and build a multi layered security system- 4-layer biometric system. Biometrics has emerged as one of the most convenient, accurate, and cost-effective forms of security. Since Biometric techniques are automated for personal recognition based on physical attributes which include face, fingerprint, hand geometry, handwriting, iris, retina, and voice. Each of the techniques is customized for specific applications. Biometric data are considered to be different and distinct from personal information because it cannot be reverse-engineered to recreate any personal information and cannot be stolen to attempt theft.
Keywords: Security, Facial recognition, Finger print scanning, wireless security systems, GSM verification.
Abstract
Techniques to Identify Audio Recording Location
Kiran P Kamble, Manik K Chavan
DOI: 10.17148/IJARCCE.2016.55212
Abstract: Audio recording location authentication is needed when we want to prove an any evidence as recording of an event, audio recording depends on the various factors like geometry,composition of the audio recording and also a recording device. To authenticate the recording we need to consider many features of event happened. Methods are Electrical network frequency is machine learning based a system find grid environment. Sabin & Erying approach usefull for acoustic environment design. Time domain analysis effective for editing and compression attack.Sttatistical pattern recognization with help of classification and validation gives more accurate result. This paper is a survey of various approaches and techniques used to authenticate recorded audio.
Keywords: Audio Recording, Sabin & Erying, Time domain.
Abstract
Privacy Preserving in High Dimensional Data using Randomized and SVD algorithm
Tripti Singh Thakur, Dr. Abha choubey
DOI: 10.17148/IJARCCE.2016.55213
Abstract: Data mining is a process of extracting useful knowledge and hidden confidential patterns from data. The growth of information technology increases need for electronic data to be carefully stored and secretly shared. In last few decades a wide variety of approaches and techniques have been proposed for modifying data in such a way that privacy will remain preserved. Perturbation based randomization and SVD are one of the methods for preserving privacy. We need an algorithm which protects sensitive private information from huge databases in data mining system. In this paper we proposed an efficient privacy preserving data mining technique using perturbation based randomization in combination with SVD. In this technique we will apply several classification schemes on perturbed data. Experimental comparisons will define the effectiveness of this algorithm.
Keywords: Randomization; perturbation; SVD.
Abstract
A Home Security System Using Background Subtraction
Ranjana Thakuria, Hiranya Sarma, Dipankar Nath
DOI: 10.17148/IJARCCE.2016.55214
Abstract: This paper presents a technique for human object detection and recognition that uses basic model for back ground subtraction. Background subtraction approach is used to detect the moving object from background. Our proposed technique takes the first frame from a live video (from web cam/CCTV) when it is switched on and compares it with the next frames of the video sequence in an interval. Thus when it detects an object system analyzes it. If it is a human being alarm rings. The system used in the study ranges from varying levels of accuracy and computational complexity. In future enhancement of this work is remotely we are checking and providing security to our system.
Keywords: Background subtraction, Real-time systems, Video surveillance, Segmentation, Human recognition, Alarm system.
Abstract
Personalized Web Service Recommendation Based on User’s Location and User’s History
Ekta K. Chainani, Prof. Rajeshri R. Shelke
DOI: 10.17148/IJARCCE.2016.55215
No abstract available.
Abstract
Review: Comparative Study of Gi-Fi Technology with Other Existing Technology
Umalaxmi Sawant, Prof. Shailesh Jadhav
DOI: 10.17148/IJARCCE.2016.55216
Abstract: Today civilization is hugely dependent upon Electronic and Communication system. In this electronic world, different techniques are used for data transmission and communications many years ago cables are used for data transmission. But there are lots of difficulties in the installation of cables Networks and no of drawbacks, so we need to find an alternative to the cable network .Now a day�s wireless technology is the most advanced technology used for data transmission and communications overcome the drawbacks related old techniques, but still man the continues search for the better. For speedy transformation, Wi-Fi is used and next to that Gi-Fi technology is generated in wireless technology that improves our own surrounding, either work or private, by means of networking or a variety of own and wearable devices within the space and with the outside world. For transferring large files audio as well as video with high speed within seconds. Gi-Fi played the main role with small size, less cost, and high security.
Keywords: Bluetooth, CMOS, Gi-Fi, Wi-Fi, Wi-Max.
Abstract
Review on Wi-Vi Technology
Mayuri Dharma Shinde, Prof. Shailesh Jadhav
DOI: 10.17148/IJARCCE.2016.55217
Abstract: Wi-Fi is a popular technology which allows an electronic device to connect to the internet wirelessly using radio waves. Wi-Fi signals are nothing but the information carriers between transmitter and receiver. Wireless Vision (Wi-Vi) is a new technology similar to the same concept of Wi-Fi which enables seeing through walls with the help of Wi-Fi signals. Wi-Vi allows us to track moving humans through walls as well as behind closed doors. Wi-Vi's operation does not require any access to any device on the other side of the wall. Wi-Fi can also enable us to see moving objects through walls and behind closed doors. So particularly, we can use such signals to identify the number of people in a closed room and their relative locations also.
Keywords: Gesture-Based User Interface, MIMO, Seeing Through Walls, Wireless.
Abstract
Cloud Computing Security Applied by Homomorphic Encryption
Santosh Kumar Singh, Dr. P.K. Manjhi, Dr. R.K. Tiwari
DOI: 10.17148/IJARCCE.2016.55218
Abstract: Cloud Computing has been envisioned as the next generation architecture of IT Enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, Cloud Computing moves the application software and databases to the large data centers, which provides the capability to use computing and storage resources on a rented basis and reduce the investments in an organization�s computing infrastructure. With all its benefits, cloud computing also brings with it concerns about the security and privacy of information extant on the cloud as a result of its size, structure, and geographical dispersion. Cloud computing security challenges and it�s also an issue to many researchers; first priority was to focus on security which is the biggest concern of organizations that are considering a move to the cloud. There are two major challenges to the Cloud Computing providers: first is How to guaranty a better data security and second is how we can keep the client private information confidential. When the data transferred to the Cloud we use standard encryption methods to secure the operations and the storage of the data. But to process data located on a remote server, the Cloud providers need to access the raw data. In this paper we are proposing an application of a method to execute operations on encrypted data without decrypting them which will provide us with the same results after calculations as if we have worked directly on the raw data.
Keywords: Homomorphic Encryption; Cloud Computing; Security; Confidentiality; Integrity.
Abstract
A Naïve Breadth First Search Approach Incorporating Parallel Processing Technique For Optimal Network Traversal
Laxmikant Revdikar, Ayush Mittal, Anuj Sharma, Dr. Sunanda Gupta
DOI: 10.17148/IJARCCE.2016.55219
Abstract: The authors have modied the existing breadth first search (BFS) technique by incorporating a parallel processing feature to it. A multithreaded implementation of breadth-first search (BFS) of a graph using Open MP. the results of our research reveal that implementing BFS using multiprocessor runs much faster than the standard BFS.
Keywords: Breadth-First Search, Parallel Programming, optimal Network Traversal Open MP.
Abstract
Message Transformation Designer for Messaging System Using Streaming Transformation for XML (STX)
Ms Rajani M V, Mr Annappa Swamy D R
DOI: 10.17148/IJARCCE.2016.55220
Abstract: Fields like logistics, travel, financial services and insurance needs exchange of messages in wide variety of formats. Message contains elements which carry the data between applications or systems. Message exists in various formats like text, XML, CSV etc. Different application uses different message format, to reduce the difference in communication between such varying systems, the architecture and design of high performance message transformation designer is needed. Streaming Transformation for XML approach is efficient for transformation of message from the legacy/proprietary format to standard format.
Keywords: XML, STX, message transformation, encryption, Apache Camel.
Abstract
Face Extraction, Feature Extraction and EDGESIN Face Beautification
Ms. Priyanka Mehra, Prof. A. S. Deshpande
DOI: 10.17148/IJARCCE.2016.55221
Abstract: In this paper, we present a new image processing structure for face recognition, feature extraction and landmark localization. The proposed method is used to extract the face by using adaptive region aware mask based on edge preserving energy minimization model with a spatially different parameter and a high quality of guided feature space for mask generation. Using region-aware masks, our method simplifies more flexible and accurate facial skin enhancement In our beautification structure, a image is decomposed into smoothness, lighting, and color layers by an edge-preserving filter. Next, facial land marks and important features are extracted as input constraints for mask generation. The Experimental results show that the proposed method determines the ability to beautify the face.
Keywords: Feature Extraction, Facial Beautification, Edge Preserving Energy Minimization.
Abstract
Satellite Image Quality Improvement Using Wavelet Based Enhancement Method
Gauri D. Rode, Prof. V. K. Shandilya
DOI: 10.17148/IJARCCE.2016.55222
Abstract: In image processing there are many enhancement methods have been proposed earlier to improve quality of satellite images. Despite of having advance steps still those methods unable to give satisfied result. There are many issues related to the satellite images it included edge enhancement also, as edges plays important role in information preservation. Therefore this new method is focus on edge preservation and enhancement. In this new method uses the concept of wavelet and morphological filtering. As the Gabor filter is used for efficiently detects the edges from image, while these detected edges are sharpened by using morphological filters. Also the other intermediate steps are applied so that it works on other important aspects such as noise removal, color and useful information preservation etc. This method gives better qualitative and quantitative result compare to the well known state-of- the-art techniques.
Keywords: Image enhancement, wavelet transform, Gabor filter, morphological filtering, remote sensing.
Abstract
Cell Co-ordination Using Beam forming and Parameters of MIMO
Miss Madhavi Vilas More, Mr. V.D.Shinde
DOI: 10.17148/IJARCCE.2016.55223
Abstract: Wireless communication has grown staggeringly over the last decade, wireless systems and mobile telephones have been the most reason for the expansion. There is a requirement for ever faster wireless communications as this can allow new applications like widespread wireless broadband web access. Multi-Antenna transmission schemes, using multiple antennas at the transmitter and/or receiver have been projected as some way to satisfy the demand for exaggerated capacity. Main aim of this project is to enhance the capacity of MIMO system. Capacity is increased by variable parameters like SNR and BER using channel coding such as alamouti coding, feedback systemopen-loop and close-loop comparison, channel correlation, antenna selection techniques as optimum and sub-optimum antenna selection techniques. In the LTE mobile system, all cells use the same set of frequencies. This means that a user may expertise interference from different cells. A method that has been studied so as to cut back this interference and thereby increase rate or system outturn is to coordinate programing between cells. Good results of this have been found in numerous studies. However, the interference is generally assumed to be well-known. Studies using calculable interference and simulating more than one cluster of cells have found virtually no gain. This paper focused on how to use information from coordinated scheduling and other traffic estimates to do better interference estimation and link adaption.
Keywords: MIMO, Channel Correlation, Open Loop-Close Loop, Alamouti Coding, Antenna Selection Techniques, Optimum And Sub-Optimum Selection Technique, CSI Feedback, Cell Co-Ordination, Beam forming.
Abstract
Review on Lane Departure Detection Methods
Geetanjali S. Jadhav , Prof. P. V. Mulmule
DOI: 10.17148/IJARCCE.2016.55224
Abstract: Lane Departure Warning System (LDWS) is advanced technology used now days and developed for assisting the driver. The main purpose is to detect the lanes and warn the driver for lane departure. Various techniques are available for detection of lanes. This paper describes different lane detection methods. The most effective technique is FPGA based Hough transform which shows reduced logic area and optimum memory utilization.
Keywords: Lane departure warning systems, Lane keeping, Lane detection, Hough transform.
Abstract
A Fast Generative-Judicial Based Hashing Method Using Surf Descriptor
C. Maleappane Lawrence, M. Shanmugham, D. Sabarinathan, T. Banumathi
DOI: 10.17148/IJARCCE.2016.55225
Abstract: Hashing and Feature Detection methods have demonstrated to be useful for a variety of tasks and have appealed extensive tending in recent years. Various feature detection and hashing approaches have been purported to capture similarities between textual, visual, and cross-media information. However, most of the existing works use a bag-of-words methods to represent textual information and for feature detection use the SIFT algorithm. Since words with different forms may have similar meaning, semantic level text similarities cannot be well processed in these methods. To address these challenges, in this paper, we propose a novel method called semantic cross-media hashing (SCMH), which uses uninterrupted word representations to entrance the textual similarity at the semantic level and use a deep belief network (DBN) to fabricate the correlation between different sense modality and a technical report on feature detection and carrying out a SURF algorithm. To manifest the potency of the proposed method, we evaluate the proposed method on three commonly used cross-media data sets are used in this work. Experimental results show that the proposed method attains significantly better performance and speed than state-of-the-art approaches. Moreover, the efficiency of the proposed method is comparable to or better than that of some other feature detection and hashing methods.
Keywords: Hashing method, SURF, Word Embedding, Fisher Vector
Abstract
Surveillance Using CAMshift Tracking
Prof. S.O. Dahad , Rupali R Sonawane
DOI: 10.17148/IJARCCE.2016.55226
No abstract available.
Abstract
A Practical Approach of Parallel Thinning Algorithm on Numeral Patterns Using Matlab Simulation
Komal Bishnoi, Preeti Gupta
DOI: 10.17148/IJARCCE.2016.55227
No abstract available.
Abstract
Study of Improved Parallel Thinning Algorithm for Numeral Patterns: A Review
Komal Bishnoi, Preeti Gupta
DOI: 10.17148/IJARCCE.2016.55228
No abstract available.
Abstract
Design Issues in Federated Cloud Architectures
Priyesh Kanungo
DOI: 10.17148/IJARCCE.2016.55229
Abstract: Cloud computing offers new ways of flexible resource provisioning for business enterprises to manage IT based applications and big data analysis to meet increasing expectations of customers. The central idea to cloud computing is constant availability; elasticity and scalability satisfy client requirements. Cloud Federation is a distributed, heterogeneous and multi-cloud environment that consists of various cloud infrastructures by aggregating resources of different service providers. This paper gives an insight to the formation and interoperability issues of Cloud Federations. It addresses the several issues of related to service monitoring, data management, protection and security in the area of cloud federations.
Keywords: Cloud Federation, Interoperability, Multicloud, Cloud Broker, Load Balancing, Service Level Agreement (SLA).
Abstract
Significant Big Data Interpretation Using SAMR Scheduling Algorithm
M. Suriya, S. Jeevitha
DOI: 10.17148/IJARCCE.2016.55230
Abstract: Big data is a term for information sets that are so extensive or complex that traditional data processing applications are inadequate. Map Reduce concept is used with an incremental and distributed inference method for large-scale ontologies which realizes high-performance analysis and runtime searching, but it does not find out the slow node at execution time. This paper proposes to improve the efficiency of the map reduce scheduling algorithms by using SAMR scheduling technique which uses the factual information and finds the slow node and launches multi tasks. In addition, the usage timing of each user is calculated. Finally, implement and test the effectiveness of the proposed approach on the Hadoop framework. The purpose of this paper is to speed up the query to the user.
Keywords: Big data, SAMR, Map Reduce, ontology reasoning.
Abstract
A Survey on CBIR Using Affinity Graph Based on Image Segmentation
Vrunda Korde
DOI: 10.17148/IJARCCE.2016.55231
Abstract: Need of image retrieval has increased with the addition of digital images. Construction of graph for capturingperceptual grouping cues of an image is important for graph based image segmentation. Basic CBIR system captureonly the local visual feature, thus to cover the gap between local feature and high level visual perception we proposedthis system. This technique introduces graph-based image segmentation method in order to retrieve the content-basedimages. In this CBIR system first, query image over-segmented into multiple super-pixels then extraction of visualfeatures e.g. color, shape and texture. Affinity graph construction is there for building a graph from super-pixels. Finallygraph edit distance will be used for graph matching between query image and database images. Then images withsmallest edit cost will be retrieve and display relevant result to user. Thus proposed CBIR system using graph basedimage segmentation will improve performance and accuracy.
Keywords: Content Based Image Retrieval, Image Segmentation,Graph Construction,Graph Matching,Super-pixel.
Abstract
Buffer Behaviour in Massive MIMO Systems
Ranko Vojinović, Svetlana Furtula
DOI: 10.17148/IJARCCE.2016.55232
Abstract: In this paper, performances of buffers in Massive MIMO (Multiple-Input Multiple-Output) systems are analysed in the presence of statistical querying constraints. Querying constraints are included as limitations on the buffer capacity.
Keywords: Massive MIMO, buffer capacity, spatial multiplexing.
Abstract
Determination of Electrical and Optical Design Parameters of High-Efficiency OLED
Ipek Atik, O. Faruk Farsakoglu, Nurdal Watsuji , Saban Yilmaz
DOI: 10.17148/IJARCCE.2016.55233
Abstract: Although LED (Light Emitting Diode) was discovered in the 1900s, in recent years, it is utilized in lighting, screens and many indoor and outdoor applications widely. On the other hand, OLED (Organic Light Emitting Diode) technology is one of the advancing branches of LED technology. OLEDs, differently from other ordinary LEDs, contain organic light emitting layers between two electrical contacts. OLEDs are very slim and flexible. They are capable of providing more vivid and brighter display compared to LCDs (Light Crystal Displays). In our study, information about structural characteristics of OLED has been given. Band model of OLED has been explained, and functional equalities have been included. A three layer OLED has been designed. Optic materials with high light efficiency such as IRPPY, BCP, and Alq3 have been used in the structure of OLED. In the analyses, General-purpose Photovoltaic Device Model � gpvdm simulation software has been used. Bandwidth values of the layers have been determined respectively as 3.e-08, 5.e-08 and 2.e-08. As optical materials, Indium Tin Oxide (ITO) for anode and Silver (Ag) for cathode have been used. To the OLED designed, in an electrical circuit with current limiting, a voltage between -0.2V and 2.5 V has been implemented, and light output power variance curves have been obtained. On OLED band structure, energy level variance curves of lowest unoccupied molecular orbital (LUMO) and highest occupied molecular orbital (HOMO) have been obtained according to Maxwell-Boltzmann statistical features. Photon density emitted by optical materials used, and energy and location variance data have been obtained. Efficiency values of designed OLED have been aimed to be at optimum level. In order for HOMO and LUMO energy levels to stay at equilibrium state, bandwidth values have been analyzed. The study has been aimed to be a pathfinder in the direction of being able to analyze effects of OLED technology and organic layers on energy level.
Keywords: OLED, band model, HOMO - LUMO energy, optic materials.
Abstract
Mitigation of Cooperative Black Hole Attack and Rushing Attack in MANETS
Gowri S, M/S. Lipsa Dash
DOI: 10.17148/IJARCCE.2016.55234
Abstract: A Mobile ad hoc network (MANET) is a kind of network where the mobile devices are with a dynamic structure. Here each node in the network participates in routing by forwarding data packets to other nodes. Security becomes a crucial concern to ensure protected communication between nodes in ad hoc networks. There are several of challenges with respect to security design as ad hoc network is a decentralized and infrastructure less type of wireless network. There are five layers in MANET and each of these layers is prone to various kinds of attacks. This paper discusses about two important attacks in network layer, their defence mechanisms, those are: Cooperative Black Hole Attack and Rushing Attack.Mobile ad hoc networks (MANETs) are mostly and widely used in military and civilian applications. Due to the dynamic topology of MANETs, it allows the nodes to join and leave the network at any point of time. This generic characteristic of MANET is a cause which makes it vulnerable to security attacks. In this paper, I address the problem of coordinated attack by multiple black holes acting in group and rushing attack. I introduce a technique to identify multiple black hole nodes cooperating with each other and rushing nodes and solutions to discover a safe route avoiding cooperative black hole attack and rushing attack.
Keywords: MANET, Destination Sequenced Distance Vector routing (DSDV), Dynamic Source Routing (DSR).
Abstract
A Systematic Review on Existing Data Dictionary
Anshul Mishra, Dr. Devendra Agarwal, Dr. M. H. Khan
DOI: 10.17148/IJARCCE.2016.55235
Abstract: Data dictionary is an important factor for software development process and facilitates to learn the product or complete description of data object, object relationship and analysing a System. The data dictionary uses as a tool in software engineering for documentation, design and maintenance to software system. The system stores the structures, procedures, description and cross referencing about data model of project. Researchers and Experts have always claimed that data dictionary should be consider as an important factors for it have positive impact on system analysis and design in order to improve the quality of software system. This paper presents the results of a systematic review conducted to collect evidence on exiting data dictionary of system development process. In this review paper initially our aim is to find the detail view of existing data dictionary and their contribution during the software development process at initial stage. Finally paper demonstrates an existing data dictionary proposed by various experts and researchers including their contribution and limitations.
Keywords: Data Dictionary, Software Development Life Cycle, Meta Data, Repository System, Dictionary Attributes.
Abstract
Power Quality Enhancement using Distributed Generation Inverters with Active Power Control
N. Rajesh Kumar Gowd, M.MD. Sayeedi Baig, V. Naresh, S. Baba Fakruddin, M. Lokanadha, M. Meena
DOI: 10.17148/IJARCCE.2016.55236
Abstract: Renewable Energy Sources (RES) based Distributed Power Generation use Power Electronic Converters for grid interfacing. This paper deals with a multi objective control strategy for a current controlled three phase Distributed Generation (DG) inverter. The DG inverter incorporates active filter functionality in forward and reverse power flow modes when connected to a nonlinear load. The multifunctional grid connected inverter (MFGCI) can compensate for load current harmonics, load unbalance and load reactive power demand with closed loop active power control. The proposed closed loop power control scheme achieves accurate power tracking with zero steady state errors under ideal and non-ideal supply conditions. A hysteresis band current controller is used to generate the switching pulses for the interfaced inverter. Extensive simulation studies are done in MATLAB/Simulink software to validate the effectiveness of the proposed control strategy.
Keywords: Renewable Energy Sources (RES), Distributed Generation (DG), Multifunctional grid connected inverter (MFGCI), Power quality, Total Harmonic Distortion (THD).
Abstract
Finding Secure and Reliable Routing in Densely Distributed Wireless Sensor Networks
Sushmitha S.R, Mrs R Anitha
DOI: 10.17148/IJARCCE.2016.55237
Abstract: The main purpose of a sensor network is information gathering and delivery. Therefore, the quantity and quality of the data delivered to the end-user is very important. In this paper, we focus on designing a general energy efficient, fault tolerant, and highly reliable routing protocol that prolongs the network lifetime; we call it greedy geographical routing algorithm (GGRA). Our objective is to determine in a Multi-hop network the optimal number of cooperating nodes per hop to minimize the end-to-end total energy consumption while satisfying an outage probability requirement at each hop. Identify the effect of the number of cooperating nodes on energy consumption, all other parameters, i.e., transmission power; rate and reliability are kept constant. Simulation results reveal that the proposed algorithm yields a longer network lifetime, less packet latency, and higher delivery ratio than other existing schemes.
Keywords: network lifetime, secure, reliable, energy.
Abstract
Digitized Load Cell with Advanced Reporting and Weighing Algorithms
Vijay S. Kale
DOI: 10.17148/IJARCCE.2016.55238
Abstract: A load cell convert a force into electrical signal through a mechanical arrangement and it usually consists of four strain gauges in a Wheatstone bridge configuration. The electrical signal output is typically of the order of a few mill-Volts and requires an instrumentation amplifier before it can be used. The output of the transducer is plugged into an algorithm to calculate the force applied to the transducer. Load cells are high cost of the order of 25,000/- to 2,000,000 /- rupees or more. These load cells can get easily damaged by large pressure or by high voltage. This paper represents a load cell with a totally new way. The load cell is designed on a shaft and potentiometer typical arrangement which helps to develop a highly efficient and effective load cell application. The output of the potentiometer was given to an ADC. ADC converts this voltage to digital signal which was interfaced with a computer. The computer program written in vb.net displays the converted output that is the weight. The circuit interfaced with computer was cost effective and maintenance free. The circuit requires 5V supply. The developed efficient load cell can be implemented in weighing load on goods at retail shops, bag Filling Machine, tank dispensing, Liquid Separation etc.
Keywords: ADC, potentiometer, load cell, amplifier, transducer, Wheatstone bridge.
Abstract
Revolution Technique To Enhance Cognition of Sensor Nodes in ZigBee Network with Advertisement Packets
Mr. Ravi Kumar Singh, Prof. Amit Saxena
DOI: 10.17148/IJARCCE.2016.55239
Abstract: A ZigBee network platform is developed to improve performance under a wide range of conditions for both unicast and broadcast packets over ZigBee networks that support multi-hopping. Both ZigBee networking and IEEE 802.15 Transport layer utility like fragmentation and reassembly which are performed at the application layer, since the ZigBee network does not have a fragmentation support. Observations and resulting statistics are presented, and the MAC schedule provides to increase in lifetime for different traffic scenarios in the get broadcast schedule to robotically coordinate the nodes that can decrease packet delivery delays, which can provide an increases efficiency and also throughput will increases. At the similar time, an increase in packet size boost the lost in packet. This is because the radio transmits for packet or until interrupted, whatever the packet size. The advantages of ZigBee are reduced further when the data packet size achieve that of the advertisement size because the advertisement packet is no longer easier to hear than the data packet. As discussed, we begin this evaluation with the simulation of an analytical model, and verify it with a Matlab implementation.
Keywords: ZigBee, Wireless sensor networks (WSNs), Transmit, Receive Schedule, unicast and broadcast packet, MAC Schedule, Efficiency and Throughput, IEEE 802.11, network.
Abstract
Performance of Spatial Multiplexing by Transmit Antenna Selection using Singular Value Decomposition
Saurabh Kumar Srivastava, Prof. Ashok Kumar, Arjun Kumar
DOI: 10.17148/IJARCCE.2016.55240
Abstract: In this paper, we analyze the performance of proposed diversity order of the optimal Transmit Antenna Selection (TAS) for Spatial Multiplexing (SM) systems with linear receivers. By using the diversity order N (M� L + 1) for optimal TAS by selecting L antennas among M transmit antennas in the SM system with M transmit antennas and N receive antennas, which coincides with the well-known results of the respective diversity orders MN and N for the special cases when L =1and L = M.
Keywords: Diversity order, maximum likelihood (ML), minimum-mean-square-error (MMSE), spatial multiplexing(SM), transmit antenna selection (TAS).
Abstract
Wireless Mesh Networking Routing Algorithm Based on Inference Model
Monika, Dr. Yashpal Singh
DOI: 10.17148/IJARCCE.2016.55241
Abstract: With the growing demand for real time services in Wireless Networks, based routing has emerged as an interesting research topic. A Wireless Mesh Network (WMN) is based on ad-hoc networks, where each node transfers data to and from an Access Point (AP) which is connected to the Internet by a wired or wireless network. These AP need not be in the reach of all the nodes in the network. Nodes around the AP forward the packets from the faraway nodes to the AP. If there are a significant number of nodes in the network, faraway nodes can transfer data with the AP in a few hops. Besides mobility, WMN have the advantages viz., they can work in a decentralized fashion, are cheap with minimum investment for initial infrastructure, more reliable, scalable and provide increased coverage. They are widely used in campus networks, metropolitan area networks, transportation system, security surveillance system, etc.
Keywords: Wireless Mesh Network (WMN), Access Point (AP), Ad-Hoc Networks.
Abstract
Privacy-Preserving Authentication in Shared Authority Based Cloud Data
Mr. Tamboli Sameer Iqbal, Prof. Amrit Priyadarshi
DOI: 10.17148/IJARCCE.2016.55242
Abstract: Cloud computing is creating as a common information shrewd perspective to grasp clients' data remotely set inside an on-line cloud machine. Cloud courses of action give marvellous solaces anticipated that would the clients to enjoy the experience of the on interest cloud applications without considering the nearby framework confinements. Through the information getting to, various clients might be in a community oriented relationship, and subsequently data sharing gets to be huge to accomplish gainful advantages. The current security options for the most part offer enthusiasm to the verification to value that a client's private information can't be not approved got to, but rather ignore an unpretentious protection worry amid a client testing the cloud server to ask for different clients proposed for data sharing. The tested access request itself may reveal the client's security regardless of whether or absolutely not it could acquire the points of interest access authorizations.
Keywords: Cloud Computing, Privacy Preservation, Shared Authority, AES Algorithm.
Abstract
Intelligent Knowledge Extractor
Pratiksha Patil, Prof. Dr. A.D. Thakare, Kanchan Pawar, Poonam Kshirsagar, Rupa Solapure
DOI: 10.17148/IJARCCE.2016.55243
Abstract: Now a days it is important to extract knowledge from structured i.e. relational databases, XML and unstructured i.e. text documents, images etc sources. The resulting knowledge needs to be in a human-readable format. The large amount of online repositories requires extracting useful knowledge. This extracted knowledge is then useful for further processing like analysis etc. There are some domains like Biomedical, E-Commerce, Banking, where the huge amount of data present. This huge amount of data needs analysis, in order to produce useful knowledge which will helpful for analysis like in biomedical domain analysis of Clinical data used to predict the Disease, Treatments etc. There are various techniques which are used for knowledge extraction. In this proposed work, we are using Clustering technique. Clustering analysis is an important field of artificial intelligence and data mining. The basic idea is to use words and characters from the documents for checking degree of similarities among documents and cluster those documents without prior knowledge. This paper introduces the proposed work based on clustering biomedical abstracts to extract the hidden knowledge. The document clustering of biomedical abstracts will be based on Genetic algorithm. The work will be based on Genetic Algorithm to find optimal cluster centre. Genetic algorithm performs simultaneous mutation. The proposed algorithm outperforms the K-Means and Simple GA.
Keywords: Genetic Algorithm, Clustering, TF-IDF, Biomedical abstracts.
Abstract
To implement CBPGA for Simplified Large Data on Hadoop Map Reduce
Shalini Jain, Prof. Saurabh Kapoor
DOI: 10.17148/IJARCCE.2016.55244
Abstract: This paper introduces implementation CBGPA (Cluster Based Parallel Genetic Algo) [1] for simplified large data on Hadoop Map Reduce. Hadoop is a framework used for processing large amount of data in a parallel and distributed manner .Its provides the reliability in storing the data and efficient processing system. The two main gears of Hadoop are the HDFS (Hadoop Distributed File System) and Map Reducing (for processing). Map Reduce is a programming model which enables parallel processing in a distributed environment. Classify similar objects under the same group called cluster. Metaheuristic techniques, such as Genetic Algorithms (GAs) [2], It is one important data mining methods constitute the best alternative to find near-optimal solutions for such problems within a reasonable execution time and limited resources. To improve efficiency better approach is used called Map Reduce for Parallelization Genetic Algo(MRPGA)[3][4] by using the features of Hadoop. An analysis of proposed Algo CBPGA to evaluate performance gains with respect to the current algo MapRedue Word Count [5]. Our proposal aim is to evaluate both the parallel algo are compared based on speedup the no of processing node on different size of text files and find the solution within a reasonable time. Parallel implementation of the CBPGA algorithm makes the algorithm faster and scalable in order to find the optimal solutions while working with large data cluster in a parallel manner.
Keywords: Big Data, word count, hadoop, mapreduce, cluster ,Parallel Genetic Algorithm.
Abstract
Survey: Restricted Domain Question Answering System Using Semantic
Aakriti Gupta, Mr. Pranay Chauhan
DOI: 10.17148/IJARCCE.2016.55245
Abstract: The information present on the World Wide Web is continuously increasing at a tremendous rate. The rate at which the information is growing, requires new techniques to handle and organize this data. Question and Answering System is used to answer the query given by the user in the natural language. Main challenges of Question and Answer system is to give exact answer of question given by the user. This paper gives a thorough overview on the QA system, Types of question, its methods and the related work done on QA systems.
Keywords: Answer extraction, answer ranking, semantic similarity.
Abstract
A Case Study of DC Motor Speed Control with PID Controller through MAT LAB
Shatrughana Prakash Yadav, V.K. Tripathi
DOI: 10.17148/IJARCCE.2016.55246
Abstract: Conventional PID controllers are used to control the dc motor for various industrial processes from many years due to their simplicity in operation. In industrial area the of PID controller used in various level to improve efficiency of the industries or plant. A PID controller requires controlling the plant for different process and control applications. In this paper worked out, speed control analysis of DC motor using PID controller & Speed control of separately excited dc motor has done with using armature voltage control method. So that PID controller basics are verified and various tuning methods of PID controller are explained and the mathematical modeling of dc motor has done and it is simulated to Simulink. The control system consisting of PID controller dc motor is also simulated to Simulink. Response of dc motor is recorded as simulation result when step input to provide as reference signal. Therefore, the performance and analysis of dc the motor with PID controller is performed and calculating the various responses of the parameters such as maximum overshoot, rise time, settling time, etc.
Keywords: DC motor, PID controller, Tuning methods, modeling and simulation.
Abstract
Data Anonymization Technique for Privacy Preservation Using MapReduce Framework
Nagajothi .S, Raj Kumar .N
DOI: 10.17148/IJARCCE.2016.55247
Abstract: Data anonymization is widely adopted for data privacy preservation in non interactive data publishing and sharing scenarios. It refers to hiding identity and/or sensitive data for owners of data records. Sharing the private data record in its most specific state poses a threat to individual privacy. This privacy of an individual can be effectively preserved while certain aggregate information is exposed to data users for diverse analysis and mining. This is mainly to investigate the scalability problem of large-scale data anonymization. Data sets are generalized in a top-down manner until k-anonymity is violated in order to expose the maximum utility. This Top-Down Specialization is efficient for high scalability and privacy concerns. High scalable two-phase top-down approach to anonymize large-scale data using map reduce is proposed.
Keywords: Anonymization, Generalization, Top-Down Specialization, MapReduce algorithm, K-anonymity, Big Data.
Abstract
Watersheds in the Alaknanda Basin of Uttrakhand
Komal, Rakesh Joon
DOI: 10.17148/IJARCCE.2016.55248
Abstract: We use satellite remote sensing and a DEM to determine the boundary of the Alaknanda basin. �watersheds are found in the Alaknanda Basin. Our detailed data on watershed areas over the area provide an important temporal assessment of water resource variability in this area. These data can be integrated into further studies to analyze morphometric analysis of the region and hence can be used for water resource management.
Keywords: DEM, Watershed, Basin, GIS, Remote Sensing.
Abstract
Performance Study of Reed Solomon Code with Effective Error correction and Minimum Area Constraint on FPGA
K. Kumar, A. Lakshminarayanan, V. Krishnakumar, K. Shajudeen
DOI: 10.17148/IJARCCE.2016.55249
Abstract: In wireless, satellite communication systems reducing error rate is crucial. High bit error rates of the wireless communication system need using numerous committals to writing ways on the info transferred. Channel committal to writing for error detection and correction helps the communication system designers to cut back the consequences of a loud channel. The aim of this paper is to review and investigate the performance of Reed-Solomon code that's wont to decode the info stream in electronic communication. This paper presents a style on Reed Solomon Code for Wi-Max Network. The implementation is predicated on Berlekamp Massey, Forney and Chain formula. The 802.16 network customary recommends the use of Reed-Solomon code RS that is enforced and mentioned during this paper. It�s targeted to be applied during a forward error correction system supported 802.16 network customary to boost the general performance of the system.
Keywords: Reed Solomon, Generator polynomial, Syndrome calculator, FPGA.
Abstract
Driver Drowsiness Detection and Alcoholic Alerting System
G. Kavitha
DOI: 10.17148/IJARCCE.2016.55250
Abstract: In recent years, driver drowsiness has been one of the major causes of road accidents and can lead to severe physical injuries, deaths and significant economic losses. The system architecture for driver drowsiness detection and alcoholic alerting system using microcontroller. The driver drowsiness is detected by using drivers wearing eye blinking sensor .In one of the major disappointment of the system does not wearing all time eye blinking sensor by drivers because the sensor is irritating the drivers eye. It is overcome by using camera. Determine if the eyes are open or closed. The system deals with using information obtained for the binary version of the image to find the edges of the face, which narrows the area of where the eyes may exist. Once the face area is found, the eyes are found by computing the horizontal averages in the area. Once the eyes are located, measuring the distances between the intensity changes in the eye area determine whether the eyes are open or closed. A large distance corresponds to eye closure. Alcohol drinking it is about 31% of all road accidents. By using alcoholic gas sensor to detect the alcohol when the driver is drunken or not.
Keywords: driver drowsiness, alcoholic gas sensor transportation safety and alerting system.
Abstract
Efficient Way for Multimedia Streaming in Cluster Based Cognitive Radio over Wireless Sensor Network
Ashwini D.R, Dr Nagamani K
DOI: 10.17148/IJARCCE.2016.55251
Abstract: Gushing or media spilling is a procedure for trading data so it can be taken care of as a continuing and constant stream. Overflowing intuitive media WSN (MWSN) in urban environment is attempting as a result of various issues among which run need and high radio impedance. Such conditions make it difficult to ensure high information transmission, low transmission concedes and low bundle hardships required for continuous media spilling applications. In this paper, we propose COMUS a Cognitive radio response for Multimedia spouting over remote Sensor frameworks which uses both mental radio development and gathering instrument to update reach and imperativeness profitability. In COMUS we consider gathering the MWSN center points into different clusters to ensure low imperativeness use. In addition, in light of the center points geographical position and the genuine and the guage channel availability, we intend to ensure stable gatherings molding. The blended media spilling from a particular source center point to the sink center point, require a physical channel determination to perform the relating coordinating errand. Thus, in COMUS we propose a capable channel determination to foresee unending channel trading which considers the PU (Primary User) activity gages. Our reenactment results show that COMUS beats the two existing initiating frameworks called SEARCH and SCEEM and this to the extent giving higher video quality (PSNR and packaging rate), lower end-to-end transmission put off and cut down edge mishap extent under moved reach conditions. Blend of K-medoid and COMUS figurings are used to ensure reduced essentialness use and beneficial physical channel decision.
Keywords: Wireless Sensor network (WSNs), Cognitive Radio, Multimedia, k-medoid.
Abstract
Information Cryptical Steganalysis Detection Technique by PSNR and RGB Intensity
Md. Sohel Ansari , Prof. Deepak Jain
DOI: 10.17148/IJARCCE.2016.55252
Abstract: We all know day by day technologies become strong hacker and terrariums attacked become more power full as per older techniques for cryptical messages inside images. In this research paper propose a high-tech region-adaptive steganalysis algorithm which will be used for the legend application to detect watermark attacks. The major advantages of the proposed steganalysis detection technique is RGB Intensity value, PSNR values and NC values which is allows tamper detection using linear classifier by given that these selective features. In the watermark processes data is embed on diverse location of the targeted image using a combination of discrete wavelet transform (DWT) and singular value decomposition (SVD) technique. In addition, there is a new use the major region-adaptive steganalysis technique to detect attack, if certain types of attack have occurred. As will be elaborate, the method to improve the efficiency of detection, Test the robustness of the projected steganalysis method. Histogram Equalization, Gaussian Noise, Sharpen, Salt and Pepper Noise, JPEG Compression, and Smoothing are the major attack. Some different system effect robustness of the projected steganalysis which are translation, rotation, and scaling belongs to geometric attacks. The cruelty of these attacks can be adjusted by modifying their corresponding factor values. Experimental results will detect the cryptical data on the original image or targeted images file.
Keywords: RGB Color Intensity, Image steganography, Image encrypton, Linear Classifier, Message Encryption.
Abstract
User Privacy Preservation in Personalised Web Search
Siva.B, Merlin Shoerio
DOI: 10.17148/IJARCCE.2016.55253
Abstract: Personalised web search is an inevitable part of today�s fast growing world. For an efficient search result user may have to reveal their private information. But, due to security reasons most users do not disclose these secrets. This may affect the search results. This paper deals with the privacy preservation in personalised web search based on the online rating of the user. The proposed system includes online profile creation, customization of user interests, user ratings etc.
Keywords: Personalised web search, privacy preservation, online profile creation.
Abstract
New Graphic Password Scheme Containing Questions-Background-Pattern and Implementation
Bulganmaa Togookhuu
DOI: 10.17148/IJARCCE.2016.55254
No abstract available.
Abstract
Nanotechnology in Drugs Delivery
Mashal Alenazi
DOI: 10.17148/IJARCCE.2016.55255
Abstract: There are numerous techniques for microfabrication of patterned polymer surfaces and microchips for drug delivery. While silicon has been the choice material for much of the research done with MEMS, the methacrylates and acrylates provide a rapid and inexpensive base for future work. Cyclodextrins have been used for two purposes: as a solubilising agent of paclitaxel, which it is a very lipophilic compound, and for their ability to disturb and inhibit the activity of the intestinal P-gp. The oral bioavailability of these cyclodextrin-poly(anhydride) nanoparticles was about 80%. This fact would be due to the combination of both bioadhesive and inhibitory properties of these nanoparticles.
Keywords: Nanotechnology, Delivery, MTC, RNA
