VOLUME 5, ISSUE 6, JUNE 2016
Monthly Weather Forecasting through ANN Model: A Case Study in Barisal, Bangladesh
Taohidul Islam, Sajal Saha, Ali Ahmed Evan, Nabonita Halder, Shakti Chandra Dey
Primary, Secondary and Tertiary Structural Analysis of Disease Resistance Protein RGA4 of ZEA Maize Using Bioinformatics Tools
Payal Patel, Hetalkumar Panchal
Automatic Headlight Dimmer Using Image Processing
Priyanka V Murkute
An Approach towards Data Security in the Cloud Computing Using AES
Santosh Kumar Singh, Dr. P.K. Manjhi, Dr. R.K.Tiwari
Evolution of Modern Communication Systems
Krishn Kumar Gupt, Vinay Kumar Singh
Analysis of Compression Ratio and Processing Power of Image Data Compression
Rohini Wadkar, Prof. Shivanand Patil
A Mixed Approach for Data and Sentiment Analysis on Twitter
T. Jhansi Rani, K. Anuradha, P. Vijayapal Reddy
An Enhanced Technical Approach for Quality of Images Using Directional Filters
Manasa K Chigateri, Manjuvani K M, Prashanth Keni, Manjunath K M
Security Algorithm for Distributed Denial of Service Attack in Cloud
Geetanjali Nenvani, Huma Gupta
Pre-Prediction of Tuberculosis Disease using Soft Computing Technique
Rupali Zakhmi, Jyoti Arora
Self Optimal Clustering Technique Based on Multi-Objective Genetic Algorithm
Anuradha Paliwal, Himanshu Yadav, Anurag Jain
Text Recognition and Detection of Traffic Sign -A Survey
R. Siva Prasath, Mr. S. Giri Prasad
A Soft Computing Technique Based Multi-port Power Modules for Power Management Systems
Shaik Abdul Muneer, H. Azhar Salam, S. Meenakshi, Dr. P. Suresh Kumar, Dr. M. Suganthi
An Intelligent System to Filter Undesired Message from Online Social Media Wall
Miss. Radhika Fulzele, Prof. Vipul Dalal
Technique for Image Watermarking Authentication Using Graph Theory and IWT
Mr. Rohit Singh, Mrs. Pancholi Bhavna K
Tandem algorithm with Supervised Classifier for Pitch Estimation and Voice separation from Music accompaniments
Nichal Vikas R. Mane Vikram A
Review Paper on Solving the Travelling Salesman Problem Using Genetic Algorithm, Ant Colony Optimization, Artificial Neural Network
Dipta Das Chowdhary, Rahul Jain, Prof (Dr.) Anindya Jyoti Pal
Sensor-Based Automatic Fan Controlling System and Power Consumption Analysis
Nikita Bagali, Prof. Geeta Navalyal
Inference and Clustering Based Routing Techniques in WMN
Monika , Dr. Yashpal Singh
Hardware Integrated Trio Security System
Ria Mathews , Nisha Mariam Jacob , Sruthymol TA ,Tobin PC, Varghese Chacko
Protecting Scram Based FPGA Configuration Frames against Low Cost Multiple Bit Upsets
Ramya R.S , Sakthivel.B
Method & Implementation to Stop SIM Tool Kit Application Messages
Sushma Singh, Ranjit Singh Chauhan
Study on Privacy-Preserving and Detection of Sensitive Data Exposure using Message Digest
Ashwini T K, Mohan Kumar S, Jagadeesha S N
An Effect of Selfish Nodes on Network Performance in MANET
Ms. Lilu Odedra, Prof. Ashish Revar , Prof. Munindra H. Lunagaria
Extracting Opinion from Reviews for Better Analysis of Products and Services
Jyoti S Bhoosanurmath, Prof. Gambhir Halse
Detection, Segmentation and Recognition of Face and its Features using Neural Network
Smriti Tikoo, Nitin Malik
An Efficient Way of Securing the Data in MANETS Using MRA Technique with RSA Algorithm
Mahesh K S, S Girish
Enhancement of YCbCr Algorithm for Skin Color Segmentation
Sumandeep Kaur, Kuldeep Singh
SQL Injection Detection and Prevention using Pattern Matching Algorithm
Poornima Javali, Sushma V. Chougule
Measuring Calories and Nutrition from Food Image
Kiran Ambhore, Prof. N.A. Dawande
Multitemporal Image Analysis Using NSCT Fusion and Supervised Classifier for Land Change Detection
Pooja Sawant, Dr. S. D. Shirbahadurkar
A Simple Approach for Face Features Detection
Saghir Ahmed Alfasly, Suresha M
Performance Evaluation of QoS Parameters for Different Application Header Lengths for Adaptive Probabilistic Broadcast in WSN
Randeep Kaur, Jyoteesh Malhotra
An Effective Shrinkage Threshold for Contourlet based on Image Denoising in Natural Images
Jannath Firthouse P, Latha Rani G.L, Shajun Nisha S
A New Approach to Biological Mimic Using Artificial Intelligence
Mr. Harsha Mario Akano
Design and Development of Customized Flue Gas and Opacity Monitoring System for Power Plants and Industries
Shivanand Pujari, Shivanandgowda K R
Multi Feature Based Opinion Mining for Unstructured Text Document
Pratik Singh Rajput, Sampada Viswas Massey
Brain Tumor Detection from MRI Images using Fuzzy C-Means Segmentation
Jinal A. Shah, S. R. Suralkar
An Improved Topology for Symmetric, Asymmetric and Cascade Switched-Diode Multilevel Converter
Bhageerathi Dewangan, Mr. Tikeshwar Gajpal
Comparative Analysis of TWDP Fading Channel using Different Modulations and Diversity Combining Techniques
Prabhpreet Kaur, Kiranpreet Kaur
Personalized Recipe Recommendation System using Hybrid Approach
Lipi Shah, Hetal Gaudani, Prem Balani
Deployment of Cloud Infrastructure using Puppet Configuration Tool
Smita S Ereshimi, Geetha V, Suresh Rathinam
Reducing the Effect of Energy Drain Attack in Wireless Ad Hoc Sensor Network
Saneesh P S, Dhanya Narayan, Jeethumol K Joy
Review: Comparative Study of Wireless Sensor Network Protocols
Rajwinder Kaur, Gurleen Kaur Shergill
Comparative Analysis between NRZ and RZ Coding of WDM System
Supinder Kaur, Simarpreet Kaur
A Study of D.C Motor Speed Control through Pulse Width Modulation Implemented by MATLAB Simulation
Mohd Samsul Islam, V.K Tripathi
EEG Signal Acquisition for Sleep Analysis
Nupur Jain, Vaishnavi Venkatesh, Chaitra Hegde
Hybrid DCT-DWT Digital Image Steganography
Anuradha Goswami, Sarika Khandelwal
Analysis and Comparison of Capacitor Diode Voltage Multiplier Fed with a High Frequency and a Low Frequency Voltage Source
Devesh Malviya, A.K. Bhardwaj
Automated Lane Changing using Automated Vehicles with Disruption Minimization
Ajaykumar, Lakshmisha S Krishna
Addressing of Electromagnetic Interference Aspects in VLSI design
Mlnacharyulu , n.s.murthysarma ,k.Lal kishore
A Review on Security Issues and their Impact on Cloud Computing Environment
Sadhana Malgey, Mr. Pranay Chauhan
A Study of Security Requirements in Cloud Computing Environment
Naziya Khan, Mrs. Asha Khilrani
Dezert-Smarandache Theory based Classification of EMG Signals
Preeti Meena , Malti Bansal
SVM-kNN and Pixel Gradient Based Segmentation Technique for Brain MRI Tumor Images Classification
Sahil Dalal, Rajesh Birok, Sanchit Kumar
Text Extraction using Morphological Operation and DWT from images
Soubhagya B Meti, Prof. Shivanand Patil
Wormhole Attack Detection and Prevention Based on Threshold Function using SEAODV
Deepali Jamodkar, Prof. Kapil Vyas, Prof. Deepa Vyas
A Study on Multi Camera Image Quality Analysis
Anirban Banerjee, Prof. Dr. Mrs. S.K. Shah
Screen Content Images Quality Assessment (Subjective and Objective Test)
Sachin C. Jadhav, Prof. N. M. Wagdarikar
Automation of Person and License Number Plate Detection System to Extract Various Fonts
Ms. Neha T. Kolkar, Mrs. Vandana B. Malode
Implementation of Hand Gesture Recognition for Controlling In-Car Devices
Sujata U. Hoke, Prof. R.S. Nipanikar
Handoff and Network Selection Stratergy in Next Generation Networks
Sudhir L. Mane, Raghib Nasri
Prediction of Campus Placement Using Data Mining Algorithm-Fuzzy logic and K nearest neighbor
Mangasuli Sheetal B, Prof. Savita Bakare
Sclera Feature Extraction for Detection of Diabetic Disease
Sangeetha Y, Latha B.M, Dr. Ushadevi M.B
User Friendly Operation of Remotely Operated Underwater Vehicle Using Android Application
G. Pradeep Kumar, A. Imran Begum, K. Monisha Preethy, L. Krishna Krupa
Review on Technical and Non Technical Education using Regression Technique
Jyoti Parashar, Kamal Kumar Ranga
Data Analysis on Technical and Non Technical Education using Regression Technique
Jyoti Parashar, Dr. Kamal Ranga
Survey Paper on Data Mining in Mobile Devices
Surya Kumar B, Dr. E. Ramadevi
A Proficient Algorithm to ensure Differential Privacy in Frequent Item-set Mining
Akanksha Bhalerao-Kulkarni, Prof. Soumitra Das
Distributed Association Rule Mining on Batchwise Data
Nisha Kapoor, Nidhi Sonpal, Dhwani Mehta, Vinaya Sawant
Spam Mail Detection using Classification
Parhat Parveen, Prof. Gambhir Halse
Pothole Tracking System Using Android
Mr. Aditya Bamne, Mr. Omkar Shinde
Defining and Formalising Project Management Models and Processes
Ravinder Singh, Dr. Kevin Lano
An Enhanced Fuzzy Min-Max Neural Network Based on Pruning Algorithm for Pattern Classification
Ashish D. Bopte, Dr. D. M. Yadav, Prof. S. B. Shinde
Detection and Notification of Potholes and Humps on Roads
Mr. Nilesh C. Yadav, Prof. Madhura M. Raste
A Study on Sensory Data processing Framework in integration of WSN and Cloud Computing
Ndayishimye Moise, N.J. Uke
Energy Efficient LLR based Cooperative Spectrum Sensing Method for CRAHNs using Clustering
Deepali Dagde, Dr. Manish Sharma
Identification of Ambiguity in Requirement Specification using Multilingual Word Sense
T. Jaison Vimalraj, B. Seema
Analysis of Forest Fire Behaviour on Thermal Images Using Data Mining Technique
Vaibhavi S. Shukla, Jay Vala
Design of Trust Aware Routing Framework
Zeeshanali Shaikh, B.B. Gite
Parametric Analysis of CdTe/CdS Thin Film Solar Cell
Erteza Tawsif Efaz, Atiya Anjum Ava, MD. Tanzidul Alam Khan, MD. Mohaiminul Islam, Afrin Sultana
Model Interactions in a Domain Specific Modeling Language: An ICT Solution to Transformations in Design of Fluid Supply Systems
Igulu Kingsley Theophilus, Piah Z. Patrick, Japheth R. Bunakiye, Georgewill Moses Onengiye
Dual Background Segmentation Based Abandoned Object Detection in Video Surveillance Systems
Prem Jeevan, Ravi Sah, Sharmili Potdar, Shikha Singh
Effective Aging Approximation for Adult People Using Morphing Technique
Patel Mira Y, Jaymit Pandya, Nirav M Raja
A Mobile Agent Based Framework for Securing Iot Network
Anubhuti, Harjot Kaur
A New Parallel Split and Concurrent Selection Sorting Algorithm based on Binary Search
Jagdeep Singh, Alka Singh
Signature Verification Technique using Artificial Neural Network and SURF Algorithm
Sadia Ahmed, Navjot kaur, P.K Bansal
Design of Broadband Microstrip Patch Antenna for RF Applications
Pratiksha Singh Gaur, Vivek Singh Kushwah
A Review: “An Efficient Method to Remove Camera Shake in Blurred Images”
N. B. Humbe, Prof. S. O. Rajankar
An Efficient Recovery of Degraded Document Images using Binarization Technique
Umesh B. Sangule, Dr. A. B. Pawar
Applications and Challenges in Wireless Sensor Networks
Sonam Khera, Dr. Neelam Mehla, Dr. Navdeep Kaur
Static Hand Gesture Recognition Using SOM-Hebb Classifier
Richa V. Vedpathak, Mrs. S.A. Shirsat
Personal Authentication by Extracting Sclera Veins
Latha B.M, Dr. Ushadevi M.B, Sangeetha Y
Review: Air Quality Monitoring System
Priyanka V. Shitole, Dr. S. D. Markande
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage with ABE Techniques
M. H. Ranadive , L. K. Ahire
Design and Implementation of Automatic Street Light Controller for Energy Optimization Using FPGA
Mr. Amey J.Manekar, Dr. Dr. R .V. Kshirsagar
A Survey of Dual Sentiment Analysis Considering Two Sides of One Review
Ashwini Damodar Kanherkar, Sarika M. Chavan
Loss Recomputed-Least Mean Square-Ten Split Feature Extraction and Statistical Range Comparison (LORE-LMS-TESFESRACO) Algorithm
Krishnu Bhaskar K.S, Dr. Rini Jones S.B
Area Optimized VLSI Implementation for Color Image Edge Detection
Shrutika S. Matte, Mrs. M. V. Vyawahare
A Review: Road Traffic Sign Detection and Recognition Systems
Mrs. Pranali A. Sakhare, Mrs. S.S. Vasekar
Performance Optimization of Heterogeneous Computing Environment
Touseef Golandaz
An Approach to Increase the Efficiency of Printed Solar Cell Using Convex Lens
Khushbeen, Nisha Sharma, Anil
A Review on recent developments on solar technology
Nisha Sharma, Khushbeen
Design and Simulation of Directional Antenna for Millimetre Wave Mobile Communication
Miss. Ankita P. Manekar, Dr. S. W. Varade
Performance Evaluation of Duty Cycle Modulation in HPC
Aparna Sure, Dr S.L.Deshpande
Zone Adaptive Virtual Coordinate Selection Approach for WSN Optimization
Manisha, Vijay Kumar
News Recommendation Systems: A Comparative Study
Kavita Soni, Shyam Sundar Meena, Preetesh Purohit
Review and Enhancement of security in Mobile Computing Devices
Shubham Dwivedi, Akanksha Deep
Various Methods for Analysis of Skin Diseases
P. B. Manoorkar, D. K. Kamat, Dr. P. M. Patil
An Internet Controlled Robotic Arm Using an Android Mobile and FPGA Board
Prasanna S. Bhoite, Madan B. Mali
FakeTech: Identifying fake reviews using Collective-Positive Unlabeled Learning
Savita K Shetty, Kanchana S Kokatanur
Application Framework and Data Processing in IoT based Email System
Vishakha More, Prof. Raghib Nasri
FPGA based Smart Water Distribution System using Wireless Sensor Network
Priyanka J. Ranade, Prof. S. B. Takale
Model Driven Embedded System Testing Using Real-Time Data
Pravin Y. Karmore, Pradeep K. Butey
Counting people by extracting low level features using Bayesian Regression
Rajshri S Vaswade, Prof. N.A. Dawande
Improved Hessian Curvature for Fingerprint Analysis
Shan Juan Xie, Yanshuang Zhang
Energy efficient cluster head scheduling for tiered wireless sensor network
Manish Gupta, Ashutosh Gupta
Performance Evaluation of Bit Error Rate for Conventional and Wavelet Based OFDM
Makarand N. Patil, Prof. S. S. Savkare, Prof. S. B. Shinde
Improved Payroll Service with Hybrid Security Algorithm
Sujith K G, S. Kuzhalvaimozhi
Detection Strategy for Multiple Access Spatial Modulation Channel Based on Compressive
Pooja Chandankhede, Manish Sharma
An Analytical Study on Key Management in Mobile Ad-Hoc Network
Dr. S. Dhanalakshmi, R. Anupryia
CMS: An Improved Scheme for Dependency-Based Load Balancing in Cloud Environment
Neethu M.S, Jayalekshmi .S
Attendance Collection System: Comparison of Different Approaches
Muralidharan P, V.K. Annapurna
Implementation of Convolutional Encoder by XOR-Free Approach
Pankaj Kumar, Deepak Kumar
Development of Integrated Message alert system for Weather Informatics
Nagaraj Bhat, Shricharana U, Pratheek P Hegde, Shetty Neha Karunakar, Srikanth Rao P, Shreya, Krushna Chandra Gouda
Multi-cell Resource Block Allocation Frequency Reuse Scheme with Optimal Power
Vivek C Mohite, Shilpa Lahane
Adaptive Optimal Handover Parameters Adjustment Technique for Conflict Avoidance in LTE
Nikhil Mathane, Manish Sharma
Next Generation Electronic Voting Machine
Navnath Baban Belote, Sneha Revankar
Portable Camera Based Assistive Text Reading from Hand Held Objects for Blind Person
Ashwini V. Mhaske, Mahesh S. Sadavarte
Clustering Sentence Level Text using Hierarchical FRECCA Algorithm
Mujawar Nilofar Shabbir, Prof. Amrit Priyadarshi
Secure Data Transmission with Hierarchical Clustering Based WSN
Shital Mohan Mane, Asst Prof. Madhav D. Ingle
Use of multicast routing protocols for Comparative performance analysis in Wireless Mesh Network
Ms. Vasundhakumari, Prof. B.A Patil
Weather Prediction Based on Big Data Using Hadoop Map Reduce Technique
Basvanth Reddy, Prof. B.A Patil
Accident Prevention of Pedestrian on Road
Shivkumar V Biradar, Prof. S. M. Kulkarni
Design and Fabrication of Double T-monopole Antenna for Dual Band Wireless Communication
Akshay R Markad, Prof. A S Patel
Modeling, Simulation and Analysis of 100Kw grid connected PV system using MATLAB/SIMULINK
Nisha Sharma
Car-License-Plate Detection Method Using Vertical-Edge-Detection and Canny Edge Detector
Koshti Sanket V, Prof. R.A. Patil
Parallel PSNM Duplicate Record Detection with Map Reduce
Shubhangi Anandrao Dhane, Prof. Amrit Priyadarshi
Design and Simulation of Multirate Filter using BFD Multiplier Architecture
Mr. Sagar Lohe, Mrs. P.J. Suryawanshi
Task manager: Gives open windows information
Mrs. vaishali j. Desai, dr. Kishor h. Atkotiya
A Review: Power generation using rural cooking Method
Keerickal Jithin Abraham, Prof. M. M. Jadhav
Privacy Enhancement of User Data and Images on Content Sharing Sites
Gaikwad Swati Shankar, Prof. Amrit Priyadarshi
Timeline Generation for Progressive Tweet Stream
Dhanshri A. Nevase, Prof. Amrit Priydarshi
Implementation of CELP and MELP Speech Coding Techniques
Rhutuja Jage, Savitha Upadhya
A Review: Identification of Annotations for Circuit Symbols in Electrical Circuit Images
Mohammad Tafhim Khan, M. Tahseenul Hasan, Waseem Maroofi
Cyber Security Approach using Data Mining for Malicious Code Detection
Ms. Poonam Bhagwandas Godhwani, Ms. Jayshri Arjun Patil
Smart Parking System for Monitoring Vacant Parking
Ndayambaje Moses, Y. D. Chincholkar
An Approach to Adapt Sensing Methodology via Magnetic or Pickup Sensing to Hall Sensing for Diesel Engine
Pulkit Sanadhya, Vivek Dixit, Manoj. S. Nagmode
Development of a Decision Support System for the Diagnosis of Neuromuscular Disorder using Neural Network
Syed Irfan Ali, Sunita Parihar, Deepak Kapgate
A Review on Trust Based Method to Detect Black Hole Attack in Manet
Priyanka Donga, Shraddha Joshi
Survey: Mobility Assistive Devices for Blind People
Sumit S. Parale, Prof. Dr.Shripad S. Bhatlawande
A Study On “VIDEO SUMMARIZATION”
Tanuja Subba, Bijoyeta Roy, Ashis Pradhan
Authentication and Data Repairing of Document Image using Steganography Method
Rahil Khan, Ruhina Quazi
Indian currency recognition for visually disable people using image processing
Sonali P. Bhagat, Sarika B. Patil
Review on Design Methodologies for Low Power VLSI Architecture
Wasim Maroofi, Sanjay R. Ganar
Mapping of Turbo Encoded bits with 64-QAM modulator for spectral efficiency in LTE
Kajal Bambole, Rutuja Deshmukh, Neelam D. Deshmukh
A scalable and consistent event matching service for content-based publish subscribe systems in cloud environment
Dr.V.Goutham, B.Triveni , B.Navya
A Selective Control on Access of Photo Sharing on Online Social Network
Anusha Rao, Sonal Fatangare
Secured Data Retrieval for Decentralized Disruption-Tolerant Disaster Networks
Dhanashree Karadi, Umesh V. Somanatti
Proper Use of Adaptive Learning for Student Modeling
Chandrima Chatterjee
Internet Security against Hacking System
Ms. Pooja D. Jaiswal, Dr. Harshalata J. Petkar
An Internet Based Interactive Embedded Data Acquisition System
Amruta G. Gangaji, M.U. Inamdar
Support Vector Machine Based Iris Recognition System for Personal Identification
Priyanka V. Bhongade, Prof. Mr. P.R. Rothe
Implementation of Secure Hash Algorithm-1using FPGA
Ms. Vishakha Borkar, Mrs. A.S. Khobragade
Enhanced Hybrid Services in Sensor Networks Using Routing Techniques
Simple Thammaiah, Shabana Sultana
Big Data solution for Improving Traffic Management System Effectively for vehicular networks
Saili Shinde, Prof. Shital Jagtap
Home Automation Using ZigBee Protocol
Pratik V. Patil, Mahadev S. Patil
Colour–Texture based Image Segmentation Using Effective Algorithms: Review
Ms. Sonali Warudkar, Dr. Prof. M. T. Kolte
Meta-Algorithmic Approach for Development of Recommender System
Ms. Priya D. Rakibe, Dr. Anil B. Pawar
Optimized Ring Routing Protocol for Wireless Sensor Networks
Mrs. S.G.Salunkhe, Mrs. H.V. Kumbhar
Multiple Verification for Continuous Secure User Authentication
Poonam Mahale, Mr. Niranjan Bhale
Hybrid Intrinsic and Extrinsic Domain Relevance for Establishing Features in Opinion Mining
Miss. Hafsa N. Mohd Yusuf, Prof. Dinesh D. Patil
Ambiguity Resolution in Text Mining Using Probabilistic and Statistical Approach
Parveen, Khushboo Chandel
IoT based Smart Agriculture
Nikesh Gondchawar, Prof. Dr. R. S. Kawitkar
Two Factor Authentication for Secured Login
Nagaashwini Nayak V J, Nagaveni B Biradar
A Review: Image Interpolation by Low-Rank Matrix and Bilinear Method
Nitish Kumar, Prof. N. M. Wagdarikar
Enhanced Sleep Scheduling Algorithm for Geographic Routing by Data Encoding
Amal Mohan, Dr. Rini Jones S B
A Review: Liver Cancer Detection Algorithm
Abhijeet Patil, Prof. Mrs. V. S. Kulkarni
Abstract
Monthly Weather Forecasting through ANN Model: A Case Study in Barisal, Bangladesh
Taohidul Islam, Sajal Saha, Ali Ahmed Evan, Nabonita Halder, Shakti Chandra Dey
DOI: 10.17148/IJARCCE.2016.5601
Abstract: Bangladesh demonstrates seasonal alterations with six seasons where natural calamities cause tragic death of lives and severe hazardous in Bangladesh regularly and frequently. It is difficult to predict the weather pattern because of non-linear characteristics of natural disaster and seasonal changes in the country. The conventional weather prediction models are conducting in a huge domain and high resolution in Bangladesh which is constraint to show reliable seasonal disaster predictions. The research uses a methodology that considers specific and significant weather parameters from meteorological data in MATLAB platform to train the ANN based model. This paper includes a case study on prediction of heavy rainfall in Barisal City of Bangladesh using the model of artificial neural network (ANN) for monthly basis reliable weather forecasting planning. The model has been tested with individual month�s average rainfall percentage to obtain the confirmation of the model. The results based on mean square error function (MSE) confirm the reliability of model based on multilayer perceptions for weather forecasting with successful application. The results are compared with weather information of FORECA limited to validate the seasonal disaster prediction criteria. This paper is important for the preparedness of people about forthcoming disaster in Bangladesh.
Keywords: Pre disaster prediction, ANN model, weather parameters, seasonal variations.
Abstract
Primary, Secondary and Tertiary Structural Analysis of Disease Resistance Protein RGA4 of ZEA Maize Using Bioinformatics Tools
Payal Patel, Hetalkumar Panchal
DOI: 10.17148/IJARCCE.2016.5602
Abstract: Objective: Disease resistance protein RGA4 of Zea Maize is mitochondrial carrier-like protein having UniProtKB ID: B6STS5. B6STS5 has been identified as an important protein involved in ADP binding. Therefore B6STR5 is considered as a significant protein for various diseases. The experimental 3D structure of B6STS5 is not available. Therefore, present study aims for analysis of primary, secondary and tertiary structure of disease resistance protein RGA4 of Zea Maize using bioinformatics tools and proposing the best 3D model after evaluating various parameters. Methods: Primary structure analysis was done by ProtParam, Secondary structure analysis was done by SOPMA and Jpred4 and Tertiary structure analysis was done by using two different softwares namely SPDBV and I-Tasser. All the predicted 3-D models were analyzed and validated by PROCHECK, ProQ and SolvX. Results: Model2 predicted by I-Tasser showed top results with 67.10% of the residues in the most favorable region, 22.00% in the allowed region, 7.90% in the generously allowed region and 3.00% in the disallowed region. The RMSD between the modeled and the template structure was found to be 1.96 �. Quality of predicted Model2 developed by I-Tasser had checked by ProQ and found the best LGscore of 2.485 and MaxSub of 0.061 which indicates that the model is very good. PROCHECK and SolvX also confirmed the same. Conclusion: In this study, homology model was developed for B6STS5 using SPDBV and I-Tasser. The models developed were validated using PROCHECK, ProQ and SolvX. These analyses validated the homology model2 produced by I-Tasser is best, robust as well as reliable enough to be used for future study.
Keywords: B6STS5, Homology modeling, SPDBV, I-TASSER, PROCHECK, ProQ, SolvX, ProtParam, SOPMA.
Abstract
An Event based Micro Continuous Outlier Detection
M. Obulakshmi
DOI: 10.17148/IJARCCE.2016.5603
Abstract: Anomaly detection is an important data mining task, aiming at the discovery of elements that show significant diversion from the expected behaviour; such elements are termed as outliers. In this paper studies the problem of outlier detection on continuous data streams. The proposed system EMCOD (Event based Micro Cluster-Based Continuous Outlier Detection)algorithms for continuous outlier monitoring on deterministic data streams based on the sliding window. In this paper, design efficient algorithms for continuous monitoring of distance-based outliers, in sliding windows over data streams, aiming at the elimination of the limitations of previously proposed SVDD algorithms. The primary concerns are efficiency improvement and storage consumption reduction. ?The proposed algorithms are based on an event-based framework that takes advantage of the expiration time of objects to avoid unnecessary computations. The EMCOD algorithm is an outlier detection method based on micro-cluster. Thesis technique is able to reduce the required storage overhead, run faster than previously proposed SVDD technique and offers significant flexibility. Experiments performed on real-life as well as synthetic data sets.
Keywords: Anomaly Detection, Outlier Detection, Distance Calculation, Cluster Outlier.
Abstract
Automatic Headlight Dimmer Using Image Processing
Priyanka V Murkute
DOI: 10.17148/IJARCCE.2016.5604
Abstract: This paper describes the Automatic headlight system for vehicle; this technology will decrease road accidents by 75 percent. According to the survey conducted Europe, major reason for death for below 45 age is road accidents around 1700000 causing more than 400000 deaths a year. Major road accidents occur normally at night time due to blurriness, intensity of light. This can be avoided by implementing adaptive front lighting system using image processing, implementing this will lead to traffic safety. It is active safety system providing an optimized vision to the driver during night time and other poor-sight conditions of the road by adapting the headlight angle and intensity. To avoid such incidents we will implement headlight dimmer using image processing that will make dimmer high to low and vice versa sensing in front vehicles� light, that will reduce manual intervention of the driver and task will become much easier.
Keywords: Image Processing, Front light, Accidents, Road safety.
Abstract
An Approach towards Data Security in the Cloud Computing Using AES
Santosh Kumar Singh, Dr. P.K. Manjhi, Dr. R.K.Tiwari
DOI: 10.17148/IJARCCE.2016.5605
Abstract: With the rapid development of Internet technology, the data of the user�s information have raised up largely, so internet storage became more and more important in today�s life. The intelligence and networking development of the electronic products, meeting the needs of the public users or the businesses for portable and high capacity has become the most important in development of the information industry. Cloud storage has become the preferred option to provide portable storage service for ordinary users, solve the requirement of large capacity, the difficulty of management and the requirement of high generic extensions. The security mechanism of cloud storage system is also becoming more and more important. By using AES encryption algorithm the security mechanism of users� files uploading and downloading has been researched. So in this paper a new algorithm is introduced, regarding the extent of Cloud network, the most important feature of the proposed algorithm is its resistivity against the attacks. The algorithm is designed and implemented in java script in CloudSim environment. The objective of this paper is the development and creation of a new algorithm by implication of some changes in the initial key of AES encryption algorithm.
Keywords: Security, Data security, Cloud computing security, Cryptography, AES Encryption Algorithm, CloudSim.
Abstract
Evolution of Modern Communication Systems
Krishn Kumar Gupt, Vinay Kumar Singh
DOI: 10.17148/IJARCCE.2016.5606
Abstract: Modern communications technology revolutionized the way, mobility and efficiency of electronic communications. Starting from with Alexander Graham Bells� telephone experiments to widely practiced W-CDMA network and the nearly achieved 4G mode of communications, all had and will have great contributions in today�s voice/data network arena. Wireless technology has achieved evolutionary success aiming at unified target: efficiency, performance and feasibility in high mobile environment. The mobile experience is expanding everywhere fulfilling the basic electronic communication needs. The first generation (1G) was analog. 1G established seamless mobile connectivity used for basic mobile voice until being replaced by the second generation (2G) digital telecommunications technologies which increased voice capacity delivering mobile to the masses with network infrastructure supporting text messaging. The success of digital voice and simple data prompted to the development of cellular wireless communication system with improved data connectivity and more accessible features leads to followed by the third generation (3G). Third generation system having mobile optimization for data enabling mobile broadband services with better and higher speed of data transfer and connectivity. The fourth generation (4G) having more capacity for faster and better wireless mobile broadband experiences with accessing capability to wide range of communication services, including advanced mobile services, and enhancement in the quality of services with increase in the bandwidth. In this paper we address the evolution of wireless modern mobile communication systems, from first generation (1G) to the widely practiced third generation (3G), recently introduced fourth generation (4G) and some glimpse of foreseeable future of fifth generation (5G).
Keywords: 1G, 2G, 3G, 4G. 5G, EDGE, GPRS, GSM, LTE, LTE-A, UMTS, W-CDMA.
Abstract
Analysis of Compression Ratio and Processing Power of Image Data Compression
Rohini Wadkar, Prof. Shivanand Patil
DOI: 10.17148/IJARCCE.2016.5607
Abstract: Wireless sensor network is the main source to make the use of IoT in order to make the environment smart. Many wireless sensor networks use image data transmission. Image data is very common now a day, and it is transmitted from one node to another. Hence bandwidth can be the important parameter to be considered while sending multimedia information such as images. To utilize bandwidth in the better way image compression plays a vital role. Hence this project aims to compress the image in the sensor node and send it to master node and analyse its size and processing time taken to compress the image. Two techniques called Lossy and Lossless are applied to compress the image and corresponding analysis are made.
Keywords: Image compression, Image capturing, Raspberry pi, Lossy, Lossless.
Abstract
A Mixed Approach for Data and Sentiment Analysis on Twitter
T. Jhansi Rani, K. Anuradha, P. Vijayapal Reddy
DOI: 10.17148/IJARCCE.2016.5608
Abstract: Sentiment Analysis also termed as opinion mining is a process of obtaining knowledge on a specific subject from source content. Sentiment Analysis uses techniques from various disciplines such as machine learning, text mining and natural language processing. Data analysis is a process of extracting information from knowledge source for the purpose of supporting decision making process. The various phases in data analysis are data extraction, cleaning, transformation, integration and finally knowledge extraction. In this paper, a model has proposed to address the two issues such as sentiment analysis and data analysis on the data which is collected from Twitter. Various dimensions in the form of a new science behind the famous blog service known as Twitter are extracted. Twitter blog is used by the users to post the micro messages and their opinions know as tweets on a particular subject. The results are obtained for the tweets on the topic and classify them into positive, negative and neutral opinions. It is also analyzed the tweets arriving source, aggregate number of tweets generated by the users on a particular topic along a time series, number of tweets specific to language from different parts of the world.
Keywords: Data Analysis, Sentimental Analysis, Twitter, Map-reduce, Time series analysis, Data visualization.
Abstract
An Enhanced Technical Approach for Quality of Images Using Directional Filters
Manasa K Chigateri, Manjuvani K M, Prashanth Keni, Manjunath K M
DOI: 10.17148/IJARCCE.2016.5609
Abstract: The main aim of this project is that implemented image enhancement aspect of guided image filtering techniques. Principle objective of Image enhancement is to process an image so that result is more suitable than original image for specific application. Digital image enhancement techniques provide a multitude of choices for improving the visual quality of images. A survey on directional filter, which defines the splitting of the input image into eight parts and reconstruction in to a single image after image enhancement. It generates the filtering output by considering the content of a guidance image, which can be the input image itself or another different image. This project will provide an overview of underlying concepts, along with algorithms commonly used for image enhancement.
Keywords: 1D Gabor filter, 1D Gaussian filter, DMF, DFB, and STFT.
Abstract
Security Algorithm for Distributed Denial of Service Attack in Cloud
Geetanjali Nenvani, Huma Gupta
DOI: 10.17148/IJARCCE.2016.5610
Abstract: Cloud consists of distributed data centres located at various geographical locations. Distributed denial of service (DDOS) attack is a major trouble to its availability. DDOS is performed in order to disrupt the services provided by the data centres. The attacker can greatly degrade the quality or fully breakdown victim�s network connectivity. The attacker first compromises many agents or hosts and then uses these depletes the target network by using these agents. The main aim of a DDoS attack is to make the victim unable to use the resources. In this paper,a flooding based defence algorithm for DDOS attack is proposed which yields better performance.
Keywords: DDOS, flooding attack, cloud VMM.
Abstract
Pre-Prediction of Tuberculosis Disease using Soft Computing Technique
Rupali Zakhmi, Jyoti Arora
DOI: 10.17148/IJARCCE.2016.5611
Abstract: Tuberculosis is an epidemic disease that points to death. It spreads through the air by person anguish from Tuberculosis. Ten or more people can be infected per year by a single patient. Like any transmittable disease, TB is ubiquitous even in urbanized nations. But it is a foremost problem in the established nations including India. Soft computing is an agglomeration of methodologies. For tuberculosis detection, consolidation of the Genetic algorithm and Neural Network is proposed. This soft computing technique is used to acquire an optimized solution that is needed to seize correct decision for improved performance and gave the rigorous result. The main aspiration of this scrutiny is to pre-predict information about tuberculosis disease at low outlay. Genetic Algorithm has Fitness function, Crossover and Mutation operations to disentangle optimization problems. In this study, various parameters are taken as an input and conform five hidden nodes afterward hatch an output. The Neural Network is trained with Genetic Algorithm and Back propagation algorithm to improve accuracy. There are ten parameters such as Age, Gender, Cough, Fever, Chest Pain, Weight Loss, Night Sweats, and Unwillingness for work and Loss of Appetite. These parameters are adopted by many researchers to identify Tuberculosis.
Keywords: Tuberculosis, Genetic Algorithm, Neural Network, Soft Computing, Data Mining.
Abstract
Self Optimal Clustering Technique Based on Multi-Objective Genetic Algorithm
Anuradha Paliwal, Himanshu Yadav, Anurag Jain
DOI: 10.17148/IJARCCE.2016.5612
Abstract: The self optimal clustering technique is new area of research in data mining. The self optimal clustering technique increases the efficiency and scalability of partition clustering and mountain clustering technique. The concept of self optimal clustering technique used the concept of heuristic function for the selection of cluster index and centre point. In this paper proposed a novel self optimal clustering technique using multi-objective genetic algorithm. The multi-objective genetic algorithm work in two phases in first phase the genetic algorithm work for the selection of center point and merging the cluster index value based on defined fitness constraint value. In second phase of genetic algorithm check the assigned number of value of K for the process of clustering and validated the clustering according to the data sample. The proposed algorithm implemented in MATLAB software and used some reputed dataset form UCI machine learning repository.
Keywords: Data Mining, Clustering, Heuristic Function, MOGA.
Abstract
Text Recognition and Detection of Traffic Sign -A Survey
R. Siva Prasath, Mr. S. Giri Prasad
DOI: 10.17148/IJARCCE.2016.5613
Abstract: In this survey recognition and detection of text in traffic signs Scene structure from Canny edge detector with Hough transform and HOG descriptors is used to outline search regions inside the image, within which traffic sign candidates or samples are then found. Maximally stable extremal regions (MSERs) with HSV or HSI color thresholding are used to find a high variety of candidates, and then they're reduced by applying constraints supported by temporal and structural information. The recognition stage interprets the text contained within detected candidate regions. Individual text characters are detected as MSERs and are arranged into lines, before being taken using optical character recognition (OCR) and Support vector machine (SVM). Recognition accuracy is immensely improved through the temporal fusion of text results across consecutive frames.
Keywords: Maximally stable extremal region (MSER), Hue Saturation Value or Intensity (HSV or HSI) color, Optical Character Recognition (OCR) and support vector machine (SVM).
Abstract
A Soft Computing Technique Based Multi-port Power Modules for Power Management Systems
Shaik Abdul Muneer, H. Azhar Salam, S. Meenakshi, Dr. P. Suresh Kumar, Dr. M. Suganthi
DOI: 10.17148/IJARCCE.2016.5614
Abstract: The aim of this paper is designing a Multiport Converter (MPC) from the Bidirectional DC-DC converter and Full bridge converter for a Power Management energy system. Voltage regulations are essential for the system to get stable output. Hence Pulse Width Modulation (PWM) and Phase Angle shift Control Scheme are employed. A typical four port converter are developed for the proposed system named Buck-Boost Four port converter (BB-FPC).Furthermore, Zero voltage switching for all four ports are realized in the proposed system. In the proposed system we use a solar power as a source. Hence Photo Voltaic (PV) system as the source for proposed system. To maximize the output of the system we use Maximum Power Point Tacking (MPPT) algorithm to the system. A Soft Computing Technique Controller is proposed for monitoring the voltage and current of the PV array and adjusting the duty cycle of the Multiport DC_DC converter and a output of the converter is used to run a DC series motor. Hence a PID controller is also proposed for speed control of DC series motor by setting the voltage fed to the DC series motor through another DC converter.
Keywords: Multiport converter (MPC), Pulse Width Modulation (PWM), Phase angle Shift Control, Buck-Boost Four Port Converter (BB-FPC), Maximum power point tracking (MPPT), Perturb And Observe (PO) algorithm.
Abstract
An Intelligent System to Filter Undesired Message from Online Social Media Wall
Miss. Radhika Fulzele, Prof. Vipul Dalal
DOI: 10.17148/IJARCCE.2016.5615
Abstract: Today�s online social networks (OSN) have become a fairly common way to keep in touch with friends and family. OSN is an easy and interactive medium for communication; a number of people exchange messages with each other, these people may be desired or undesired. People may carry a wrong intent while sending messages to friends or unknown people, such scenario may distract the personal space of an OSN user. Cyber bullying due to online social network (OSN) is also on rise therefore the need of present situation is not only to avoid unwanted wall post but also to avoid undesired creator. OSN does not completely support this requirement OSN deals with the same issue, where a system is proposed, in which users directly can control the posted messages on their wall. A rule based system is designed which allows a user to manage their filtering criteria. Also the use of machine learning based soft classifier helps in automatically labelling the messages that supports content based filtering. Additionally we are implementing an automated strategy to blacklist user on a temporary or permanent basis.
Keywords: On-line Social Networks, Fuzzy c-Means, Information Filtering, Short Text Classification.
Abstract
Technique for Image Watermarking Authentication Using Graph Theory and IWT
Mr. Rohit Singh, Mrs. Pancholi Bhavna K
DOI: 10.17148/IJARCCE.2016.5616
Abstract: Digital image watermarking algorithms used to protect the copyright of digital images and to verify multimedia data security. A signature image is embedded inside the host image. The media may be a image file, video file or audio file. Host cover file depends on the size of the information. The watermark embedding mainly divided into two different techniques, one is in spatial domain and another one is in transform domain. There is need to compress the cover image if its size is too large. A uncompressed digital images needs a lot storage capacity and bandwidth, so efficient transmission could not take place easily. The main objective to be consider in watermarking is its robustness and high imperceptibility, due to high imperceptibility viewer can easily read the host image and with robustness image is free from different attacks. In this paper, a transform domain embedding is used for color images. Here, integer wavelet transform is applied to each and every R, G, B planes of the image and then information is embedded separately in R, G, B planes. This method is highly capable, robust and simple.
Keywords: Digital Image watermarking, Integer wavelet Transform, Signature image, Graph Theory, LSB (Least Significant Bit).
Abstract
Tandem algorithm with Supervised Classifier for Pitch Estimation and Voice separation from Music accompaniments
Nichal Vikas R. Mane Vikram A
DOI: 10.17148/IJARCCE.2016.5617
Abstract: Singing voice separation from music is a kind of speech separation and it is a big challenge in many applications. In this paper, support vector machine with tandem algorithm is proposed to estimate the singing pitch and separate the singing voice and music from music accompaniments. Detecting the pitch range of the singing voice and minimizing the spurious pitches occurring due to higher order harmonics are done by trend estimation algorithm. In tandem algorithm, the pitch is estimated first and then the multiple pitch contours and their associated time-frequency masks are obtained. Then the pitch contours are expanded according to temporal continuity. A post-processing stage is introduced to deal with the �sequential grouping� problem. Once tandem algorithm detects multiple pitch contours, the nest stage separates the singing voice by estimating the ideal binary mask (IBM), which is a binary matrix, constructed using premixed source signals. This stage employs a continuous SVM to decode an input mixture into vocal and nonvocal sections. Finally, separated voice is used to extract music from the mixture signal. The experimentation is performed using a signal containing voice and music, and the performance is evaluated using precision, recall and accuracy.
Keywords: Support vector machine, music accompaniments, Pitch, Trend estimation, Tandem algorithm.
Abstract
Review Paper on Solving the Travelling Salesman Problem Using Genetic Algorithm, Ant Colony Optimization, Artificial Neural Network
Dipta Das Chowdhary, Rahul Jain, Prof (Dr.) Anindya Jyoti Pal
DOI: 10.17148/IJARCCE.2016.5618
Abstract: The Traveling Salesman problem is one of the very important problems in Computer Science and Operations Research. It is used to find the minimum cost of doing a work while covering the entire area or scope of the work in concern. In this paper we will review the past work done in solving the travelling salesman problem using three different techniques- genetic algorithm, ant colony optimization and artificial neural network
Keywords: Travelling Salesman Problem, Genetic Algorithm, Artificial Neural Network, Ant Colony Optimization.
Abstract
Sensor-Based Automatic Fan Controlling System and Power Consumption Analysis
Nikita Bagali, Prof. Geeta Navalyal
DOI: 10.17148/IJARCCE.2016.5619
Abstract: : Consumption of electric power efficiently is the responsibility of every citizen of our country. Energy saved is energy generated. Resources to generate electric power either are limited or have side effects. There are many devices invented to use the electric power efficiently. But there are hardly any to be used in our everyday life. Hence a system is suggested to analyse the power usage in a Gathering Hall/Auditorium by deploying a visitor counter and automatic fan control system
Keywords: Raspberry Pi, IoT (Internet of Things), IR Sensors, Counter.
Abstract
Inference and Clustering Based Routing Techniques in WMN
Monika , Dr. Yashpal Singh
DOI: 10.17148/IJARCCE.2016.5620
Abstract: The main goal of using the WMN (Wireless Mesh Network) is to find the correct and easy path from source to destination. The routing techniques have the potential to find the correct path.With the increase in demand of the service in WMN [1],[8],[17] ,the Routing topology comes out to be an interesting topic in Research Field.WMN provides the concept of new challenges in the next generation level networks for example Flexibility,adptive nature and cost efficiency. WMN supports AODV( Ad Hoc on Demand Distance Vector) [5],[7] ,Hop Count ,Fuzzy model and throughput that has the capability of self forming and self organizing.WMN consist of static WMR(wireless Mesh Router) called Ap�s.As in the Other way , Clustring is the other Routing technology consist of Wireless sensor, Congestion Control and Distributed System which provides the adaptive methods of routing.
Keywords: Wireless Mesh Network, AODV , fuzzy Inference ,Cluster Routing , LEACH.
Abstract
Hardware Integrated Trio Security System
Ria Mathews , Nisha Mariam Jacob , Sruthymol TA ,Tobin PC, Varghese Chacko
DOI: 10.17148/IJARCCE.2016.5621
Abstract: security assurance is an inevitable factor required for online voting system. The proposed system is an authenticated system that provides integration of trio security features such as QR code scanning, face recognition, cryptography. The existing voting system is based on ballot machine where when we press the button corresponding to the symbol, the voting is done. Here there is a security risk, the person who votes may be fake person voting. The people there might not know that a person is using fake voting card, this may cause problem. The proposed system is an integrated system that provides three layers of security. First level of security is that each individual voter is provided with a separate QR code and that code is scanned before entering the room. The second phase security is provided by face recognition. The voter�s image is captured and compared with the image stored in the database, if it matches the automated smart room will be opened and can cast their vote and the door can be closed using a sensor and the bulb inside will be illuminated. The third level of security is provided for the voter�s details by encryption method. The intended system will provide more security than the existing systems.
Keywords: Cryptography, Face Recognition, QR Code Scanning,
Abstract
Protecting Scram Based FPGA Configuration Frames against Low Cost Multiple Bit Upsets
Ramya R.S , Sakthivel.B
DOI: 10.17148/IJARCCE.2016.5622
Abstract: In nanoscale technology nodes Radiation induced multiple bit upsets are the major reliability. Functionality of the mapped design is permanently affected by the occurrence of such errors in the configuration frames of a field programmable gate arrays. Permanent effect of these errors can be avoided by periodic configuration scrubbing combined with a low cost error correction scheme is an efficient approach. In this paper, we present a low-cost error-detection code to detect MBUs in configuration frames as well as a generic scrubbing scheme to reconstruct the erroneous configuration frame based on erasure codes. The proposed scheme does not require any modification to the FPGA architecture. Implementation of the this scheme on a Xilinx Virtex-6 FPGA device shows that it can detect 100% of MBUs in the configuration frames with the recovery time which is comparable to the previous schemes and with only 3.3% resource occupation.
Keywords: MBU, configuration frames, erasure codes, scrubbing
Abstract
Method & Implementation to Stop SIM Tool Kit Application Messages
Sushma Singh, Ranjit Singh Chauhan
DOI: 10.17148/IJARCCE.2016.5623
Abstract: This paper describes how we can track the messages (SMS) which wereautomatically sendthrough the cell phone without the user�s consent and how to make the phone to restrict such operations.This software is a tool that works like a spy or surveillance program that silently runs in your mobile device. As long as the software is installed in your device, the installed program will continuously run in the background as it logs the information it can retrieve from the cell phone.It is an Android based software once is installed in phone, then it will run in background continuously and tracking every message which are coming from network.When any message is automatically sending in the response of any attacker SMS it will generate a pop up window for the confirmation if we really want to allow our phone to send SMS. For this, it uses Eclipse tool with ADT bundle.
Keywords: Eclipse, ADT, OTA, SIM,STK etc.
Abstract
Study on Privacy-Preserving and Detection of Sensitive Data Exposure using Message Digest
Ashwini T K, Mohan Kumar S, Jagadeesha S N
DOI: 10.17148/IJARCCE.2016.5624
Abstract: Analysis from security bodies, research institutes, government organizations shows that the amount of data leak incidents is more now a day. Most of the data leak incidents is because of mistakes done by humans, such type of leaks can be classified as inadvertent data leak.In this paper we present a privacy preserving data-leak detection (DLD) method to solve the data leak issue such as human mistakes (data loss through e-mail). We presented the design method using fuzzy fingerprint (Message Digest5 algorithm) technique that enhances data privacy during data leak detection operation. This approach is based on fast and real-world one-way encryption on the sensitive data. The approach enables the data owner to safely delegate the detection operation to the DLD provider by generating set of message digests to reduce inadvertent data leak in network traffic. This method assists the organization or owner to know the details of the file whether the file is sensitive or not through displaying or sending an alert message.
Keywords: Data leak detection (DLD), Message Digest (MD5), Social security number (SSN), Electronic mail (E-Mail).
Abstract
An Effect of Selfish Nodes on Network Performance in MANET
Ms. Lilu Odedra, Prof. Ashish Revar , Prof. Munindra H. Lunagaria
DOI: 10.17148/IJARCCE.2016.5625
Abstract: Mobile Ad-hoc Network(MANET) is the infrastructure less and the central object less network in which the mobile nodes can be communicate with the wireless connections. Any node can join and leave the network anytime nodes may change its place and move one place to another place anytime in network. Due to this characteristics of MANET it�s a more vulnerable to network attacks such as black hole, gray hole, sink hole and selfish attacks. The aim of the selfish attack is to preserve the own resources such as battery power, bandwidth etc. This paper surveys the effect of selfish attack on the network performance matrices.
Keywords: Network Security, MANET, Selfish attack, countermeasures, wireless security, Types of selfish attack;
Abstract
Extracting Opinion from Reviews for Better Analysis of Products and Services
Jyoti S Bhoosanurmath, Prof. Gambhir Halse
DOI: 10.17148/IJARCCE.2016.5626
Abstract: Mining opinion targets and opinion words which are extracted from online reviews are two most essential components for efficient opinion mining which is achieved by identifying opinion relations within words. Analysis done in this piece of work is an approach based on partially supervised alignment model. Then a co-ranking algorithm is used to develop a graph model to identify approximate level of confidence of each candidate and at the end of all opinion targets and opinion words are selected based on confidence level of the candidate.
Keywords: Sentiment Analysis, Opinion target, Opinion word, Word Alignment Model.
Abstract
Detection, Segmentation and Recognition of Face and its Features using Neural Network
Smriti Tikoo, Nitin Malik
DOI: 10.17148/IJARCCE.2016.5627
Abstract: Face detection and recognition has been prevalent with research scholars and diverse approaches have been incorporated till date to serve purpose. The rampant advent of biometric analysis systems, which may be full body scanners, or iris detection and recognition systems and the finger print recognition systems, and surveillance systems deployed for safety and security purposes have contributed to inclination towards same. Advances has been made with frontal view, lateral view of the face or using facial expressions such as anger, happiness and gloominess, still images and video image to be used for detection and recognition. This led to newer methods for face detection and recognition to be introduced in achieving accurate results and economically feasible and extremely secure. Techniques such as Principal Component analysis (PCA), Independent component analysis (ICA), Linear Discriminant Analysis (LDA), have been the predominant ones to be used. But with improvements needed in the previous approaches Neural Networks based recognition was like boon to the industry. It not only enhanced the recognition but also the efficiency of the process. Choosing Backpropagation as the learning method was clearly out of its efficiency to recognize non linear faces with an acceptance ratio of more than 90% and execution time of only few seconds.
Keywords: Face detection, Biometric analysis, Recognition, Backpropagation, Neural Networks.
Abstract
An Efficient Way of Securing the Data in MANETS Using MRA Technique with RSA Algorithm
Mahesh K S, S Girish
DOI: 10.17148/IJARCCE.2016.5628
Abstract: Moving to wireless network from wired network has been a global trendy in the last few decades. The most important fact about wireless network is it's mobility. One of the most used and familiar applications of wireless networks is Mobile Ad hoc NETwork (MANET). MANET does not require any fixed network infrastructure; each node works as both a transmitter and receiver. Nodes imparts directly with each other when they are both within the same communication range. Otherwise, they rely on their neighbors to relay messages. The self-configuring ability of nodes in MANET made it popular among critical mission applications like military use or emergency recovery. However, the open medium and wide distribution of nodes make MANET vulnerable to malicious attackers. In this case, it is crucial to develop efficient intrusion-detection mechanisms to protect MANET from attacks. With the improvements of the technology and cut in hardware costs, we are witnessing a current trend of expanding MANETs into industrial applications. To adjust to such trend, we strongly believe that it is vital to address its potential security issues. In this paper, we propose and implement new intrusion-detection systems to check malicious nodes in a network and which make the improved network performance.
Keywords: IDs, ACK, S-ACK, MRA, TWOACK, AACK.
Abstract
Enhancement of YCbCr Algorithm for Skin Color Segmentation
Sumandeep Kaur, Kuldeep Singh
DOI: 10.17148/IJARCCE.2016.5629
Abstract: Skin color segmentation is a promising research field in computer vision. It�s basically use applications are development of more effective and friendly interfaces for human computer interaction, face detection, faces tracking, content-based image retrieval systems and gesture analysis. It can also be used for medical applications. Last but not least it can also be used as biometric feature in mobile security problems. Skin color segmentation is used to determine whether the color pixel is a skin color or non skin color. Good skin color segmentation is that in which segment the every skin color whether it is blackish, yellowish, brownish and whitish and gives good results under different light conditioning as possible. There are different color spaces have been used for color classification. Color classification is done by using chrominance component because it is expected that skin color segmentation may become sturdier to lighting variations if luminance component is discarded.
Keywords: YCbCr color model, RGB color model, Segmentation, Comparison.
Abstract
SQL Injection Detection and Prevention using Pattern Matching Algorithm
Poornima Javali, Sushma V. Chougule
DOI: 10.17148/IJARCCE.2016.5630
Abstract: Web applications play important role in our daily life. It has made our life easy and simple, we use web applications in almost every fields like online banking, online shopping, to read news paper, in government sectors to pay tax these all applications maintain huge amount of user data and prone to attacks dangerous attacks like SQLI (Structural Query Language Injection) attacks. In this paper we used Pattern matching algorithm detect and prevent SQLI attacks on websites, hence provide security to website.
Keywords: Include (SQL Injection Attack); web applications; pattern matching; malicious SQL commands.
Abstract
Measuring Calories and Nutrition from Food Image
Kiran Ambhore, Prof. N.A. Dawande
DOI: 10.17148/IJARCCE.2016.5631
Abstract: Obesity is the major cause of overweight this leads to the type II diabetes, heart disease and cancer. Measuring the food is very important for a successful healthy diet. Measuring calorie and nutrition in daily food is one of the challenge methods. Smartphone plays a vital role in today�s technological world using this technique will enhance the issue in intake of dietary consumption .In this project an food image recognition system for measuring the calorie and nutrition values was developed. After taking the food image the colour, shape, size and texture features are extracted and it is given to the K-nearest neighbour (KNN) for recognizing the food and then the calorie value is measured with the help of nutrition table.
Keywords: Calorie measurement, Food image, K-nearest neighbour (KNN), Obesity, Healthy Diet, Nutrition, Smartphone.
Abstract
Multitemporal Image Analysis Using NSCT Fusion and Supervised Classifier for Land Change Detection
Pooja Sawant, Dr. S. D. Shirbahadurkar
DOI: 10.17148/IJARCCE.2016.5632
Abstract: The project presents change detection approach for artificial aperture radiolocation (SAR) pictures based mostly on a picture fusion and supervised classifier system. The image fusion technique will be introduced to come up with a distinction image by victimisation complementary info from a mean-ratio image and a log-ratio image. NSCT (Non- sub sampled contour let transform) fusion rules based on a mean operator and minimum native space gradient square measure chosen to fuse the contour let coefficients for a low-frequency band and a high-frequency band, respectively to restrain the background details and increase the info of modified regions within the amalgamate distinction image. For the remote sensing images, differencing (subtraction operator) and rationing (ratio operator) square measure well-known techniques for manufacturing a distinction image. In differencing, changes are calculate by subtracting the intensity values pel by pel between the thought-about couple of temporal pictures. In rationing, changes are gained by applying a pixel-by-pixel quantitative relation operator to the thought-about couple of temporal pictures. In the case of SAR images, the ratio operator is generally used rather than the subtraction operator since the image differencing technique isn't tailored to the statistics of SAR pictures. An artificial neural network kind multilayer perception or back propagation with feed forward network are going to be projected for classifying modified and unchanged regions within the amalgamate distinction image. This classifier comes under supervised segmentation that is worked based mostly on coaching liquid body substance classification. The results are going to be proven that allocation generates higher distinction image for amendment detection victimisation supervised classifier segmentation approach and potency of this algorithmic program can be exhibited by sensitivity and correlation analysis.
Keywords: SAR (Synthetic Aperture Radar), NSCT (Non-sub sampled contour let transform), VHSR (Very High Spatial resolution).
Abstract
A Simple Approach for Face Features Detection
Saghir Ahmed Alfasly, Suresha M
DOI: 10.17148/IJARCCE.2016.5633
Abstract: This paper presents a new approach for face features detection; eyes, eyebrows, nose, and mouth, based on sensing the edge points of face features and predict the intra-features points. Pixels sweeping is the approach has been used in this work to detect face corners and face feature edges. The proposed method has been compared to Viola-Jones algorithm and it shows an excellent performance with higher accuracy.
Keywords: Face Detection, Eye Detection, Image Processing, Face components Detection.
Abstract
Performance Evaluation of QoS Parameters for Different Application Header Lengths for Adaptive Probabilistic Broadcast in WSN
Randeep Kaur, Jyoteesh Malhotra
DOI: 10.17148/IJARCCE.2016.5634
Abstract: Wireless sensor network (WSN) is a network with miniaturized sensor nodes deployed in a region. These nodes have limited battery, a communication subsystem, mobility subsystem and sensor subsystem. Adaptive probabilistic broadcast is a data dissemination protocol for network level broadcast with adaptive parameters based on the probabilistic broadcast. This protocol reduces the broadcast storm problem in WSN. Energy efficiency is the major issue in WSN, as recharging and replacement of batteries is difficult. In this paper the performance of the Adaptive probabilistic broadcast routing is evaluated with the help of simulation tool Omnet++. Mixim framework of Omnet++ simulation tool provides a choice in application layer between Sensor application layer, Burst application layer battery and Traffic generator. Simulative results are used to show the effect of varied application header length (256 bit, 512 bit, 1024 bit) of Burst application layer battery on Backoff duration, latency, mean number of hops, number of frames dropped with interference and mean power consumption.
Keywords: Wireless sensor network, Adaptive probabilistic broadcast, Omnet++, Burst application layer, header length, backoff, mean power consumption.
Abstract
An Effective Shrinkage Threshold for Contourlet based on Image Denoising in Natural Images
Jannath Firthouse P, Latha Rani G.L, Shajun Nisha S
DOI: 10.17148/IJARCCE.2016.5635
Abstract: Image Denoising is an underlying problem in the field of image processing. In moreover, the intension of image denoising is to eliminate the noises as well as to conserve the details of an image as much as possible. Noise is a haphazard variation of image intensities and its shows as grains in the image. In this work Gaussian and Salt & Pepper noise are added to the input image. Contourlet is used for decomposition and the main advantage of Contourlet transform is to preserve the edges and contours. After decomposition, thresholding function are used such as Sure Shrink and Visu Shrink. These Shrinkage methods is to remove the noises effectively. After the noise removal, Performance of the denoised images is analysed and find the better threshold. Performance of natural image denoising is deliberate by Peak Signal to Noise Ratio (PSNR), Image Quality Index (IQI), Normalized Cross Correlation(NCC).
Keywords: Image Denoising, Contourlet, Shrinkages, PSNR.
Abstract
A New Approach to Biological Mimic Using Artificial Intelligence
Mr. Harsha Mario Akano
DOI: 10.17148/IJARCCE.2016.5636
Abstract: The quest towards the understanding of intelligence has different pathways and is used in different fields to solve different problems. This paper presents a newer approach towards the architecture with observation and study of behavioural of a simple biological being and mimics its intelligence using artificial intelligence.
Keywords: Artificial, biological, intelligence, mimic, quest.
Abstract
Design and Development of Customized Flue Gas and Opacity Monitoring System for Power Plants and Industries
Shivanand Pujari, Shivanandgowda K R
DOI: 10.17148/IJARCCE.2016.5637
Abstract: The flue gas monitoring plays a vital role in thermal power plants as these emissions contribute to the majority of air pollution and global warming. This project proposed to measure concentration method for flue gas of multiple fuels such as natural gas, coal, oil etc based on NDIR & Electrochemical Sensors. Efficiency of power plants becomes more important due to the demand for cost-efficient energy production & tightening environmental regulations. The main objective of the project is to increase the performance of the plant and to protect the environment, thereby giving a pollution free environment for the future generation. The Flue Gas Analyzer measures the amount of Oxygen, combustible gases such as Carbon Monoxide, Carbon Dioxide, Nitrogen Oxides and Sulfur Oxides in the flue with the help of electrochemical Sensors. The measured values of flue gases that are displayed are then compared with their permissible limits.
Keywords: Flue Gas analysis, Air pollution and effects, Wireless communication, NDIR, Opacity monitoring system.
Abstract
Multi Feature Based Opinion Mining for Unstructured Text Document
Pratik Singh Rajput, Sampada Viswas Massey
DOI: 10.17148/IJARCCE.2016.5638
Abstract: Today we are living in the online time, where for acquiring anything, for going anyplace people groups dependably attempt to do some online examination, they checks the sentiment of the people groups about the item, put or whatever it might be, case: today clients are moving towards web shopping on the grounds that here they get the input, audits of the item from past clients, this is exceptionally useful them for basic leadership. The fundamental issue in these wonders is that every single past technique are not that precise on the grounds that at some point these strategies not ready to bring the definite client survey so toward the end client confronts issue. In the past strategies for getting precise survey and feeling technique needs to recognize such words which gives best result, yet this procedure of distinguish such words removes numerous undesirable words or expressions which is thought to be an element by the framework however in all actuality these are not highlight. In this paper we are utilizing multi highlight base element order technique for survey report which go about as a spine for mining the supposition words.
Keywords: Review Mining; Opinion Mining; Frequent Pattern Generation; Text Mining; Feature Mining.
Abstract
Brain Tumor Detection from MRI Images using Fuzzy C-Means Segmentation
Jinal A. Shah, S. R. Suralkar
DOI: 10.17148/IJARCCE.2016.5639
Abstract: The tumor is an undesirable growth of unhealthy tissues which increase intracranial pressure. Magnetic Resonance Imaging is a medical expertise, mainly used by the radiologists for diagnosis of an internal structure of the human body without any surgery. The method proposed in this paper is fuzzy c-means (FCM) and is compared with K-Means segmentation. Followed by tumor detection which will display the presence of a tumor as Abnormal brain whereas the absence of tumor as a normal brain. In the different clusters obtained, it shows different elements of the brain such as white matter, gray matter, edema and CSF (Cerebrospinal fluid) and tumor. A user-friendly environment is created by using GUI in MATLAB which in turn saves the precious time of doctor to diagnose the tumor automatically. Performance analysis using various parameters such as PSNR, Global Consistency error (GCE), Variation of Information (VOI), area, elapsed time, reproducibility, and Rand Index (RI) is done.
Keywords: Fuzzy C-Means, K-MEANS, Brain Tumor, PSNR, Rand Index, Variation of Information, GCE.
Abstract
An Improved Topology for Symmetric, Asymmetric and Cascade Switched-Diode Multilevel Converter
Bhageerathi Dewangan, Mr. Tikeshwar Gajpal
DOI: 10.17148/IJARCCE.2016.5640
Abstract: Multilevel converters have been used for several applications such as static reactive power compensation, adjustable speed drives, renewable energy sources, and so on. The principal function of multilevel converter is to synthesize a desired ac voltage from several separate dc sources. Many kinds of topologies for multilevel converters have been proposed. In symmetric cascaded multilevel converter; dc voltage sources values of similar cells are equal. For the same number of power devices, asymmetric cascade multilevel topology significantly increases the number of output voltage levels. In these topologies, the values of dc voltage sources of different cells are non equal. However, the symmetric and asymmetric CHB converter requires a large number of switches and dc voltage sources. The current work proposes a improved H-bridge inverter whose topology is advantageous over other topologies.
Keywords: Inverters, Converters, H-Bridge inverter, Capacitor, Bidirectional switch.
Abstract
Comparative Analysis of TWDP Fading Channel using Different Modulations and Diversity Combining Techniques
Prabhpreet Kaur, Kiranpreet Kaur
DOI: 10.17148/IJARCCE.2016.5641
Abstract: A signal propagating by means of wireless channel withstands fading effect, which debases the performance of wireless communication system. This paper focuses on the concept of fading, mainly TWDP fading with comparison over several modulations and diversity combining techniques. The phenomenon of fading requires careful scrutinization so as to get efficient data reception at the receiver side. It is a random process that occurs either due to multipath propagation or shadowing. Out of various models present, TWDP is the locus of interest �being latest and scanty work done in this field. Outage probability and average bit error rate (ABER) are accounted for in order to perform the comparison. TWDP PDF analysis is based on the expression that includes parameters such as Bessel function Io(.), fading parameters (K and ) and order L. The results are obtained after simulation in MATLAB. Modulations compared are BPSK and DPSK with further collation of SC and MRC diversity technique.
Keywords: TWDP, Fading channels, SNR, MRC, SC, Outage Probability, ABER.
Abstract
Personalized Recipe Recommendation System using Hybrid Approach
Lipi Shah, Hetal Gaudani, Prem Balani
DOI: 10.17148/IJARCCE.2016.5642
Abstract: This paper describes the recommendation system in culinary domain. With the prevalence of internet, whole world is connected and different users of different countries are sharing millions of new recipes on the internet, world widely. So, as a result users are not aware of the all the recipes on the web. Recipe contains different heterogeneous information�s like ingredients, cooking procedure, categories etc. So, we think the recipe is aggregation of the different heterogeneous features. Most of the recommendation system is based on the content or collaborative filtering to predict the new recipe of interest for a user. Incorporating with the both the filtering techniques, we present an effective and elegant framework for combining both techniques in recipe recommendation system. Most of the recipe recommendation system uses content information as ingredients or cooking procedures of recipes. We proposed the hybrid approaches by incorporating conventional techniques, content as well as collaborative filtering, by adding more heterogeneous information of recipes like cuisines, preparation direction, dietary etc. and try to reduce RMSE than the conventional recommendation system.
Keywords: Recommendation system, collaborative filtering, hybrid approaches, recipes, content information.
Abstract
Deployment of Cloud Infrastructure using Puppet Configuration Tool
Smita S Ereshimi, Geetha V, Suresh Rathinam
DOI: 10.17148/IJARCCE.2016.5643
Abstract: Deployment of cloud infrastructure is very critical and complex task to administrators as well as developers. Problems faced while deploying cloud environment are - more time and effort to install, exhaustive line by line configuration, adding and updating OpenStack services is difficult, need thorough knowledge to install and troubleshoot, does not support parallel execution, no user friendly interface. To address these issues and to automate the deployment of OpenStack cloud infrastructure, Puppet Configuration Management Tool and Python has been used. Automated scripts have been written for deploying OpenStack Infrastructure modules. This project provides light weight appliance, deployment portal, updating and managing all the features and services of OpenStack and KVM (Kernel Virtual Machine).
Keywords: Cloud infrastructure, Open Stack, Puppet.
Abstract
Reducing the Effect of Energy Drain Attack in Wireless Ad Hoc Sensor Network
Saneesh P S, Dhanya Narayan, Jeethumol K Joy
DOI: 10.17148/IJARCCE.2016.5644
Abstract: Wireless sensor network is a network for sensed data communication across the sensor nodes. In wireless ad hoc Sensor Network each hop to hop connection of sensor nodes are in a random way, there is no fixed infrastructure and nodes are randomly deployed in the sensor field. Due to their ad hoc organization, wireless ad hoc sensor networks are affected to denial of service (DoS) attacks. The most permanent Resource depletion attacks is to entirely deplete node�s batteries .One new type of attack called vampire attack. This attacks causing the impact of persistently damaging the networks by quickly draining the node�s battery power. They not only affect single node but they bring down entire system battery power. So limiting the energy drain attack has very importance in sensor network. In the cause of vampire attack the packet travels longer distance than actually required this way consume more energy. To reduce such attack MDSDV protocol is used here and compare its performance with energy efficient LEACH protocol.
Keywords: Vampire Attack, Ad Hoc Network, Denial of Service Attack, Resource Depletion Attacks.
Abstract
Review: Comparative Study of Wireless Sensor Network Protocols
Rajwinder Kaur, Gurleen Kaur Shergill
DOI: 10.17148/IJARCCE.2016.5645
Abstract: Wireless Sensor Network is a diverse network and in this resource-constrained sensor nodes are deployed in the monitoring region for collecting data and transmit it to the destination via routing. An optimal selection of a route for the data transmission helps to extend the lifetime of a network by consuming less energy. In this paper, the different routing protocol strategies have been discussed based on a routing path. However, dynamical changes in the network such as mobility, node density, and traffic cause connection breakage, routing overhead, node failure, delay and thereby data loss may occur. It can affect the overall network performance. In order to overcome these problems, efficient routing protocols were introduced. The significance of this survey is to investigate the impact of overhead, mobility as well as scalability factors on a wide range of routing protocols. All routing protocols are described under their specific category i.e. reactive, proactive and hybrid. Further, a performance comparison among routing protocols is discussed on the basis of some parameters like mobility, scalability, energy efficiency etc.
Keywords: Wireless Sensor Network, Optimal Path Decision, Routing Protocols, Energy efficiency, Network Lifetime.
Abstract
Comparative Analysis between NRZ and RZ Coding of WDM System
Supinder Kaur, Simarpreet Kaur
DOI: 10.17148/IJARCCE.2016.5646
Abstract: An ameliorated performance of optical wireless transmission system is obtained from wireless system which deploys the lengthy fibers. Inter-satellite links are necessary between satellites in orbits around the earth for data transmission and also for orderly data relay from one satellite to other and then to ground stations. Inter-satellite Optical Wireless Communication bestows the use of wireless optical communication using lasers instead of conventional radio and microwave systems. Optical communication using lasers cater many benefits over conventional radio frequency systems. The utmost complication existing in this wireless optical communication for inter-satellite links is the affects of satellite vibration, which leads to severe pointing errors that degrade the performance. Performance of this system also depends on numerous parameters such as transmitted power, data rate and antenna aperture which are analyzed using Opti-System simulation software. The main objective of this is to introduce WDM in existing ISOWC system to improve the system capability, to implement Model with different coding NRZ and RZ, to propose a new approach for increasing system capability for multi users and also analysis the Performance parameters like BER, Q-factor of optical systems.
Keywords: BER, FSO, Inter Satellite Link (ISL), IsOWC, Q-factor, Return-to-zero(RZ), Non Return-to-zero(NRZ).
Abstract
A Study of D.C Motor Speed Control through Pulse Width Modulation Implemented by MATLAB Simulation
Mohd Samsul Islam, V.K Tripathi
DOI: 10.17148/IJARCCE.2016.5647
Abstract: Direct current (DC) motor has already become an important drive configuration for many applications across a wide range of powers and speeds. We can easily control the performance of the DC motors and ensure that the number of applications using them will continue to grow for the future. In this paper it has presented the realization of the speed control by using Pulse Width Modulation.PWM is generated using Microcontroller 8051 and to drive the motor, H-bridge is used which is made up of four MOSFETs. Precise control of low torque DC motor is obtained by using simple and inexpensive hardware. This paper shows that accurate and precise control of small DC motors can be done effectively and efficiently without using complicated circuitry and costly components.
Keywords: DC motor, H-bridge, Pulse Width Modulation.
Abstract
EEG Signal Acquisition for Sleep Analysis
Nupur Jain, Vaishnavi Venkatesh, Chaitra Hegde
DOI: 10.17148/IJARCCE.2016.5648
Abstract: This paper describes the design of a portable, low cost EEG (Electroencephalogram) signal acquisition device which also further divides the EEG signals into its frequency components for sleep study.The primary focus of the paper is on signal acquisition and frequency division of the EEG waves into five major components. The uniqueness also lies in the minimal usage of electrodes namely 10 at the most important scalp locations. The input from the electrodes is then subjected to various amplification, filtering, noise removal techniques in both analog and digital domain, however the use of analog filtering is kept to a minimal as we try to exploit the advantages of digitization which include increased accuracy, minimal usage of hardware, and operability at lower frequencies .Further processing of the signals is done using a DSP enabled processor, allowing for digital implementation of filters.
Keywords: analog, EEG signals, DSP, amplification
Abstract
Hybrid DCT-DWT Digital Image Steganography
Anuradha Goswami, Sarika Khandelwal
DOI: 10.17148/IJARCCE.2016.5649
Abstract: Steganography is the Method of hiding secret information in a multimedia carrier as image file, audio file and video file. This differs from cryptography concept which is applied to make a message unreadable by a third party but does not hide the existence of the secret communication. Research issues in Image steganography are to increase efficiency in term of the payload capacity of secret information, robustness against visual attacks and statistical attacks. Image steganography in Wavelet transform domain have higher robustness against statistical attacks compared to image steganography in spatial domain and Discrete Cosine Transform domain, While DCT image steganography have higher imperceptibility compared to DWT image steganography. The combined technique of DWT and DCT provides advantages of both techniques. The Proposed algorithm presents Hybrid DCT-DWT Digital image steganography algorithm. Proposed Approach embedding image is embedded is imperceptible part of an image than other methods as shown in results. Steganography is done by embedding image in middle frequency coefficient set of the 3-level DWT transform of host image followed by block DCT transformation and embedding in selected HH DWT coefficient sets.
Keywords: Steganography, Digital image, DCT, DWT, PSNR
Abstract
Analysis and Comparison of Capacitor Diode Voltage Multiplier Fed with a High Frequency and a Low Frequency Voltage Source
Devesh Malviya, A.K. Bhardwaj
DOI: 10.17148/IJARCCE.2016.5650
Abstract: This paper presents the analysis and comparison of Capacitor Diode Voltage Multiplier fed with a high and low frequency voltage source. The characteristics of this multiplier has been studied using PSpice simulations. The behavior of the multiplier especially the multipliers response time has been studied, when it is fed with high frequency voltage source and a low frequency voltage source. The voltage multiplier fed with a high frequency voltage results in an appreciable reduction in the size, weight and the price of the power supply developed using such a voltage multiplier.
Keywords: Cockcroft Walton Multiplier, PSpice, ac, dc, cascading circuit.
Abstract
Automated Lane Changing using Automated Vehicles with Disruption Minimization
Ajaykumar, Lakshmisha S Krishna
DOI: 10.17148/IJARCCE.2016.5651
Abstract: Our project is mainly considered for automated vehicles, utilizing small microcontroller named as Beagle Bone black this project portrays such an algorithm to alleviating the interference of traffic flow by optimizing for the number of safe lane alterations. Our project is doing all these things with low cost by using small micro controller named as Beagle Bone black. It�s like a minicomputer can boot within 20 sec. It is having capability of tolerating network connection. Here we are using two android phones for accurate positioning, for remote operation like a TCP protocol full duplex communication. Once the app we created will be getting on, data will be hardcoded by using PHP script. Analogously, another vehicle also will be having yet another android app so that the cloud contains both vehicles� data. Distance will be calculated using the Beagle Bone black which will navigate the vehicle depending upon the data. The distance between the two vehicles and the speed of both will be calculated using the relative speed by which we will get to know how much meters is travelled per second. So with this the distance between both vehicles is found to be higher for which the lane change can be demanded until accepted limits else lane change request will be refused.
Keywords: Automated Vehicles, Congestion, Lane change Maneuver, GPS, and Distance
Abstract
Addressing of Electromagnetic Interference Aspects in VLSI design
Mlnacharyulu , n.s.murthysarma ,k.Lal kishore
DOI: 10.17148/IJARCCE.2016.5652
Abstract: This paper presents the theoretical aspects of electromagnetic interference issues in very large scale integrated circuit development. Primarily, the development of integrated circuits, various noise causing factor and numerous associated technologies in VLSI towards electromagnetic compatibility achievement. Here we intend to illustrate trends in CMOS technology and its consequences on electromagnetic compatibility (EMC) and all possible issues.
Keywords: VLSI, electromagnetic, CMOS, electromagnetic compatibility (EMC)
Abstract
A Review on Security Issues and their Impact on Cloud Computing Environment
Sadhana Malgey, Mr. Pranay Chauhan
DOI: 10.17148/IJARCCE.2016.5653
Abstract: The cloud computing is a technology used to organize and manage resources and services. Cloud based Web applications help for enabling convenient and on demand resource access with resource shared pool. Cloud Computing application provides platform for various computation, software access and data handling for betterment of proposed solution. Security is primary requirement to maintain trust and authenticity of information and services. This research work observes that there is big gap into security issue of existing system. Confidentiality, authentication, access control and integrity are the major ideology of security and one of the essential requirements for any software. This paper investigate existing solution for SaaS model of Cloud computing and explore the various flaw in context of security. Here, work concludes with the comparative study of different existing solution and address the common problems and excuses.`
Keywords: Cloud Computing, Security Issues, Hybrid Cloud, Security Techniques.
Abstract
A Study of Security Requirements in Cloud Computing Environment
Naziya Khan, Mrs. Asha Khilrani
DOI: 10.17148/IJARCCE.2016.5654
Abstract: Cloud computing is a technology helps to share resource, services and platform with another user. This is a technology used to organized huge amount of data and multiple services for establishing convenient way of communication and execution. In simple words, cloud computing technology help to access services and resource without installing or configuring into local system. Cloud computing establish their access through public network, security issues like privacy, trust, authenticity , information security, authorization, access control becomes essential challenges for developers. In order to overcome these challenges, various algorithms are developed and implemented with cloud computing applications to get best way for implementation. Today, security becomes indispensable concern and required separate attention for cloud computing environment. This research works consider this issue on primary mode and try exploring algorithms and their limitations to observe and analyse security solutions and vulnerabilities for scope of improvement. Here, work concludes with the comparative study of different existing solution and address the common problems and excuses.
Keywords: Cloud Computing, Security Issues, Hybrid Cloud, Security Techniques.
Abstract
Dezert-Smarandache Theory based Classification of EMG Signals
Preeti Meena , Malti Bansal
DOI: 10.17148/IJARCCE.2016.5655
Abstract: This research paper proposes an intellectual method for the classification of different types of Electromyography (EMG) signals like normal, myopathy and neuropathy signals. Inside the human body, contraction of muscles and nerves occur at every second. And, EMG is a techniqueused to measure this electrical activity. For the analysis of EMG signals, so many methods have been already used.With this research, a new method is proposed in which Dezert-Smarandache Theory (DSmT) based classification technique is utilizedfor the EMG signals analysis. In this, discrete wavelet transform with some features likeenergy, mean and standard deviation are exploited for the features extraction of the EMG signals. After that, classifiers are used in the analysis for the modelling purpose. Then, using these classifiers, DSmT based technique helps in improving the accuracy of the results.It can be seen in the results that DSmT based classification gives the best accuracy (approximately 97%) in comparison to the other classifiers used during this research.
Keywords: DSmT, Electromyography, Wavelet Transform, SVM, SVM-kNN.
Abstract
SVM-kNN and Pixel Gradient Based Segmentation Technique for Brain MRI Tumor Images Classification
Sahil Dalal, Rajesh Birok, Sanchit Kumar
DOI: 10.17148/IJARCCE.2016.5656
Abstract: The research paper proposes a novel and robust segmentation technique for the classification of Brain MRI Tumor Images. It is a completely automatic technique for the segmentation of tumor in a tumor pretentious brain MRI image with its classification from a normal image. In this technique, method is able to detect brain tumor utilizing the pixel intensities differences among the tumor and its neighbouring tissues. Here, it also uses the associated tumor�s pixels labelling which can efficiently segments the brain tumor from the image. After that, SVM-kNN is exploited for the classification of brain MRI image from the normal one. For the feature vector�s computation, GLCM technique is utilized. From the results, it can be observed that with only less number of feature vectors, in terms of speed and computational power used, the method is much better. As accuracy of nearly 98% is computed using the proposed method which is very good in comparison to the other methods used.
Keywords: GLCM, MRI, Solidity and Thresholding, SVM-kNN.
Abstract
A Brief Study of Graph Data Structure
Jayesh Kudase, Priyanka Bane
DOI: 10.17148/IJARCCE.2016.5657
Abstract: Graphs are a fundamental data structure in the world of programming. Graphs are used as a mean to store and analyse metadata. A graph implementation needs understanding of some of the common basic fundamentals of graph. This paper provides a brief study of graph data structure. Various representations of graph and its traversal techniques are discussed in the paper. An overview to the advantages, disadvantages and applications of the graphs is also provided.
Keywords: Graph, Vertices, Edges, Directed, Undirected, Adjacency, Complexity.
Abstract
Text Extraction using Morphological Operation and DWT from images
Soubhagya B Meti, Prof. Shivanand Patil
DOI: 10.17148/IJARCCE.2016.5658
Abstract: Extraction of text from images is important and it is challenging task. This is used in many applications like license plate detection, recognition of object and retrieving of the document etc. In recent year it became one of the challenging and important tasks. In this paper, in first phase colour image is converted into gray scale and applied the median filter to remove noise from image and morphological open operation is performed. And then image is divided into blocks. Then applied discrete wavelet transform for the feature extraction. Threshold is applied to separate text blocks and non text blocks of the images, then merge all text blocks. Finally text is extracted from images.
Keywords: Text Detection, Text extraction, Image Processing, Wavelet features.
Abstract
Wormhole Attack Detection and Prevention Based on Threshold Function using SEAODV
Deepali Jamodkar, Prof. Kapil Vyas, Prof. Deepa Vyas
DOI: 10.17148/IJARCCE.2016.5659
Abstract: To manage the ADHOC network is great challenge because it has dynamic infrastructure and mobility of node. Due to mobility of node routing path of network and security of communication suffered. In the process of node mobility and path discovery of routing protocol take huge amount of power and decrease the life of network. For the enhancement of power and protected communication various protocol are designed. A security constraint in mobile adhoc network is very critical task. Some critical security issue such as black hole attack, wormhole attack, sinkhole attack, prevention and detection of attack is major challenge. For the detection of wormhole attack various authors used various techniques such as clock synchronization, nearest neighbour node selection method. In this dissertation modified the AODV routing protocol for the detection of wormhole attack is used. The modified protocol is called secured energy efficient routing protocol (SEE-AODV). The SEEAODV protocol based on two functions one is threshold based function and one is energy based function. The threshold based function measure the distance of normal node and wormhole node and the energy based function is used to measure power consumption in the form of energy. Our proposed algorithm is very efficient as compare to ADOV routing protocol. For the assessment of performance our modified protocol tested in various network situation and tested with different simulations for different distributions of nodes. During this evaluated scenarios, this technique demonstrates excellent detection probabilities with few false alarms that depend on the value of threshold. Our proposed modified scheme �SEAODV� simulate in NS-2 simulator. In simulation process we used 10, 20, 30, 40 and 50 nodes. The evaluation of performance is measured by packet delivery ratio, Average end to end delay, packet throughputs and Energy Consumption. Our modified scheme is compared with existing AODV and good results in compare with old method.
Keywords: MANET, ADHOC Network, AODV, SEAODV, Wormhole Attack, Threshold.
Abstract
A Study on Multi Camera Image Quality Analysis
Anirban Banerjee, Prof. Dr. Mrs. S.K. Shah
DOI: 10.17148/IJARCCE.2016.5660
Abstract: As Image quality analysis is one of the most important measures in image research. The Objective of quality analysis is to check the quality of an image or to generate a better transformation for future automated image development. The quality of image can be monitored in two ways that is subjective & objective. In the past years various subjective & objective techniques have emerged for image quality analysis but those are valid for single camera images. Very less work has been done in quality assessment of Multi-camera images. The quality of multicamera images can be influenced by various factors such as camera features, calibration of camera, and number of camera units used for capturing the event. Multicamera images have two types of distortions: - a) Photometric distortion & b) Geometric distortion. The relative distortion between two or individual camera images are the main factor while evaluating the required quality of final image. Both these distortion can be measured in terms of index as Luminance, contrast (LC index), spatial motion (SM) & edge-based structural. The entire indexes are then combined and processed to obtain the perceived quality of multicamera image. This work describes a review on different image quality analysis techniques with different quality parameters and various types of distortion in the image.
Keywords: PSNR, SSIM, MSE, MSSSIM, MIQM.
Abstract
Keylogging: A Malicious Attack
Sonal Shinde, Ujwala H. Wanaskar
DOI: 10.17148/IJARCCE.2016.5661
Abstract: Keylogging, one of the harmful malware, is the activity of recording the keys struck on a keyboard such that the person using the keyboard is unknown about the fact that their actions are being observed. It has authentic use in investigation of human-computer interaction and is considered as the main threat for business and personal activities. It can be used to intercept passwords and other confidential information entered via the keyboard. Hence, prevention of keylogging is important and strict authentication is required for it. Designing of secure authentication protocols is quite challenging, considering that various kinds of root kits reside in Personal Computers to observe user�s behaviour. There are various keylogging techniques, extending from hardware and software based methodologies to acoustic examination. Human involvement in authentication protocols, though guaranteeing, is not simple. This paper reviews various research areas which cover protocol authentications used securely preventing the visualization of keylogging attacks.
Keywords: Keylogging; Authentication; Protocol; Acoustic examination; Visualization.
Abstract
Screen Content Images Quality Assessment (Subjective and Objective Test)
Sachin C. Jadhav, Prof. N. M. Wagdarikar
DOI: 10.17148/IJARCCE.2016.5662
Abstract: Quality assessment is important for digital visual signal in the field of image and video processing. Screen content images are used in multi-device communication applications. Process evaluation, implementation, and optimization quality assessment becomes important. Screen content images (SCIs) shows different statistical properties in textual and pictorial regions, and the human visual system (HVS) also behaves differently while viewing the textual and pictorial regions in terms of the extent of visual field. Quality assessment of distorted screen content images subjectively and objectively with the help of screen image quality assessment database (SIQAD). The subjective quality scores shows, which part of the image (text or picture) have greater quality to that of overall visual quality. The single stimulus methodology is used to obtain three kinds of subjective scores i.e. the entire, textual, and pictorial regions, respectively. Analyzing the subjective data, we recommend a weighting strategy for correlation among these three subjective scores. An objective metric is used to measure the visual quality of distorted screen content images by considering visual difference of text and picture regions. The proposed quality assessment method gives better predicts to the perceptual quality of screen images, also leads to an effective way to optimization screen content coding schemes.
Keywords: Screen content image, image segmentation, quality assessment, subjective and objective quality assessment.
Abstract
Automation of Person and License Number Plate Detection System to Extract Various Fonts
Ms. Neha T. Kolkar, Mrs. Vandana B. Malode
DOI: 10.17148/IJARCCE.2016.5663
Abstract: Automatic car driver/person and license number plate detection system is the interesting and challenging research topic from few years. License number plate detection system (LNPDS) is applicable to large scale of uses such as Border crossing vehicle, Highway toll-collection and parking management at various locations, stolen vehicles and many more. Here the system is implemented to detect license number plates especially in INDIA. The detection system method process is divided into two steps viz. Character segmentation, Character recognition by using template matching in MATLAB. By using this algorithm detection of person and number plates is correctly done with minimum time duration and approximation as much as possible.
Keywords: Character segmentation, Character recognition and template matching.
Abstract
Implementation of Hand Gesture Recognition for Controlling In-Car Devices
Sujata U. Hoke, Prof. R.S. Nipanikar
DOI: 10.17148/IJARCCE.2016.5664
Abstract: When the system is integrated with facility of the recognizing real time gesture then system can be used for interfacing HCI (Human computer Interface). This work presents a technique for a human computer interface through hand gesture recognition that can recognize most of English alphabet from the American Sign Language hand alphabet. Gesture control is techniques which are to be explored as it can tremendously simplify numerous interactions between the car and the driver and/or other passengers. Distracted driving is one of the main causes of vehicle collisions. To provide support at times of danger and critical situation networking are used that transmit the gestures to the respective Industry along with whereabouts of the user of asset. Alert about traffic in rout is provided using sound sensor, obstacle sensor and vibrator. An internet based SMS (Short Message Service) application issued for where there is emergency which will message the real time location of asset and its speed and location name to the user�s mobile. The GPS receiver system uses a hardware GPS receiver provided with a USB (Universal Serial Bus connector) so that the receiver is compatible and can be easily connected to a user computer. A GPS antenna is connected to the GPS receiver to acquire the signals. There should not be obstacle between the antenna and the satellite to achieve stronger signal. The software used for system is developed in VB.NET (visual basic.NET) programming language. VB.NET is an application oriented computer programming language.
Keywords: GPS, GSM, Image Processing, MATAB.
Abstract
Handoff and Network Selection Stratergy in Next Generation Networks
Sudhir L. Mane, Raghib Nasri
DOI: 10.17148/IJARCCE.2016.5665
Abstract: Heterogeneous wireless network will be dominant in next generation wireless networks (NGWN). Increasing user demands and the growing interest of service providers to offer diverse applications have motivated the integration of heterogeneous wireless networks which enable the users to move seamlessly across different types of networks and to enjoy anytime, anywhere services. So, the trending factor for next generation wireless networks will be heterogeneity of access networks, various networks are brought together to form an heterogeneous wireless network environment. Mobile users are now equipped with multimode capabilities that has the ability to select more than one type of network. In such type of heterogeneous network the mobile users may be having more than one access point to select for seamless service delivery and service continuity across the network environment. The proposed system architecture explicitly takes into account the user preference and context data for selection of optimal network. The system is based on IEEE 802.21 MIH (media independent handoff) framework. The proposed system best meets the need of user and ensures the selection of optimal network to perform handoff in heterogeneous wireless network environment.
Keywords: Media independent handoff, Vertical handoff, Horizontal Handoff, Mobility Management.
Abstract
Prediction of Campus Placement Using Data Mining Algorithm-Fuzzy logic and K nearest neighbor
Mangasuli Sheetal B, Prof. Savita Bakare
DOI: 10.17148/IJARCCE.2016.5666
Abstract: Data Mining is �the process of extracting useful information from a large scale data set�. It is a powerful tool to be considered best in the field of education. Educational data mining involves the new methods and its approaches for discovering the knowledge by analysing the database sets to support the decision making process in educational institution. It interprets an effective method for mining the student�s performance based on the database sets to predict and analyse whether a student (he/she) will be recruited or not in the campus placement. The placement of a student not only depends on his academic capabilities but also involves the attributes such as co-curricular activities, communication skills etc. Using these datasets and attributes, predictions are made using the Data Mining Algorithm �Fuzzy logic� and �K nearest neighbor (KNN)�. The results obtained from each approaches are then compared with respect to their �performance� and �accuracy� levels by graphical analysis and thus the decisions are made towards the best prediction in the campus placement.
Keywords: Data Mining, Educational Data Mining, Fuzzy Logic, KNN.
Abstract
Sclera Feature Extraction for Detection of Diabetic Disease
Sangeetha Y, Latha B.M, Dr. Ushadevi M.B
DOI: 10.17148/IJARCCE.2016.5667
Abstract: Sclera is a white and opaque outer protective covering of the eye. It is stable over the life time and unique to each person. A very few researchers have studied about the color changesoccur in sclera, but low accuracy, initial results. This is the challenging to identify the particular disease. Here segmentation is performed to separate the sclera from the image; k-means clustering is used. Enhancement is necessary to develop the accurate vessel structure for that Gabor filter is used. To detect the disease it is important to extract the feature for the identification of the particular disease. Here LBP method is used to extract the feature of the sclera. SVM is used to classify the affected and non-affected sclera regions.
Keywords: Diabetes, Segmentation, Sclera, LBP, SVM classifier.
Abstract
User Friendly Operation of Remotely Operated Underwater Vehicle Using Android Application
G. Pradeep Kumar, A. Imran Begum, K. Monisha Preethy, L. Krishna Krupa
DOI: 10.17148/IJARCCE.2016.5668
Abstract: : This paper reports and describes the development of an unmanned underwater vehicle that can be controlled by mobile app. The design and development of the unmanned under water vehicle, the onboard communications, the instrumentation system, the unidirectional communications platform from mobile app, the vehicle automation, the navigation strategies, as well as the vision systems to help navigation and to carry out the planned surveillance missions, are addressed in this paper. One of the main innovative issues of this platform is the distributed onboard wireless network, based on Bluetooth technology by developing android application. Already existing models are based on remote controlled technique and it needs more training to operate the vehicle. Any confusion occurs while operating the vehicle it may damage the vehicle. To avoid these limitations we are going to create a user friendly android application to control the vehicle in an efficient way without much training. This proposed work simply used by any user that can be utilized for underwater surveillance.
Keywords: ROV, RF, TMS, WSN
Abstract
Review on Technical and Non Technical Education using Regression Technique
Jyoti Parashar, Kamal Kumar Ranga
DOI: 10.17148/IJARCCE.2016.5669
Abstract: Data mining, the extraction of hidden predictive information from large databases, is a powerful new technology with great potential to help companies focus on the most important information in their data warehouses. Data mining tools predict future trends and behaviors, allowing businesses to make proactive, knowledge-driven decisions. The automated, prospective analyses offered by data mining move beyond the analyses of past events provided by retrospective tools typical of decision support systems. Data mining tools can answer business questions that traditionally were too time consuming to resolve. They scour databases for hidden patterns, finding predictive information that experts may miss because it lies outside their expectations. Most companies already collect and refine massive quantities of data. Data mining techniques can be implemented rapidly on existing software and hardware platforms to enhance the value of existing information resources, and can be integrated with new products and systems as they are brought on-line. When implemented on high performance client/server or parallel processing computers, data mining tools can analyze massive databases to deliver answers to questions such as, "Which clients are most likely to respond to my next promotional mailing, and why?" This white paper provides an introduction to the basic technologies of data mining. Examples of profitable applications illustrate its relevance to today�s business environment as well as a basic description of how data warehouse architectures can evolve to deliver the value of data mining to end users.
Keywords: Data mining, MIS, Statistical tests, Regression technique.
Abstract
Data Analysis on Technical and Non Technical Education using Regression Technique
Jyoti Parashar, Dr. Kamal Ranga
DOI: 10.17148/IJARCCE.2016.5670
Abstract: Data Mining is the investigation step of the knowledge Discovery in Database process, a relatively young and interdisciplinary field of computer science is the process of extracting pattern from large data sets by combining methods from statistics from artificial intelligence with database management. Data mining uses a combination of an explicit knowledge base, primitive analytical skills, and domain knowledge to uncover unidentified trends and patterns. These trend and patterns form the basis of a analytical models that make possible analysts to produce new justification from existing data. Data mining is a process of analyzing data from different perspectives and summarizing it into useful information- information that can be used to increase revenue, cuts costs or both. Technically, data mining is the process of finding correlations among dozens of fields in large relational database. This paper provides the comparison between technical and non technical education in terms of methods of teaching skills ,students skills, social and family pressure, area of interest they choose and in decision about whether they should go to technical or non technical colleges by using regression technique.
Keywords: Data mining, MIS, Statistical tests, Regression technique.
Abstract
Survey Paper on Data Mining in Mobile Devices
Surya Kumar B, Dr. E. Ramadevi
DOI: 10.17148/IJARCCE.2016.5671
Abstract: The necessity of the mobile devices like smart phones and tabs is increasing very fast, with the advent of new technologies and the new innovations in area of communications. Even though this type of devices share a common ground exhibiting their work, but they run on different stations which makes coordination with server application. Data mining for mobile devices using web services can be made use of its best in mobile friendly environment. It improves interoperability between clients and server applications from the different platforms they execute on. Mobile user wants useful information in a short time. So that user will be able to extract relevant data. Data mining for mobile devices is very efficient process to classify data. In this paper, different types of architecture and some common tools for mobile data mining for the proposed methodology is explained. Mobile data mining is the process of extracting specific knowledge from data collected from mobile users through the different data mining techniques. As per the latest technology the status of mobile phone adoption being very high in technologically developed nations, with the expansion of mobile devices with new capabilities. With such modern mobile devices, areas that mobile users visit, time of communications, description of surrounding locations of mobile users can be collected, stored and distributed to a central location, in which it have the great potential application in area such as wholesale, retail, marketing, and banking. As the life of mobile users are mined, common patterns and knowledge such as the ordered collection of locations that they choose to visit, groups of people that they like to meet, and timing where they generally active can be collected. This supports marketing, retail and banking systems through the use of knowledge of behaviour of the mobile users. However, challenges related privacy and security are still a main constrain before the mobile user data mining can be implemented.
Keywords: Data mining, mobile devices, web services Extensible Markup Language, XML.
Abstract
A Proficient Algorithm to ensure Differential Privacy in Frequent Item-set Mining
Akanksha Bhalerao-Kulkarni, Prof. Soumitra Das
DOI: 10.17148/IJARCCE.2016.5672
Abstract: The mining of successive examples is a central part in numerous information mining undertakings. A lot of research on this issue has prompted the excessive need of efficient and scalable algorithms for mining frequent patterns. Meanwhile, discharging these examples is posturing worries on the protection personal data of the clients participating. In this proposition, we examine the mining of successive examples in a protection saving setting. We propose an approach for differential private frequent item-set mining based on LCM algorithm; we refer it as P-LCM algorithm. P-LCM is extended version on PFP growth algorithm which basically works in two phases as pre-processing and mining phase. The first phase being the pre-processing phase it needs to be performed only once and smart transaction splitting method is used in this phase for improving utility as well as privacy trade off. Second phase limits the information loss caused by splitting as well as reduces the amount of noise added during mining process. LCM is an algorithm which finds all frequent item sets in polynomial time per item set. The closed item-sets obtained earlier are not stored in memory. The computational experiments on real world and synthetic databases exhibit the fact that in comparison to the performance of previous algorithms, our algorithms are faster and also maintain high degree of privacy, high utility and high time efficiency simultaneously.
Keywords: Differential Privacy, Frequent Item-set Mining, Transaction Splitting.
Abstract
Distributed Association Rule Mining on Batchwise Data
Nisha Kapoor, Nidhi Sonpal, Dhwani Mehta, Vinaya Sawant
DOI: 10.17148/IJARCCE.2016.5673
Abstract: With the growing amount of data generated from millions of transactions taking place every second all over the world, it has become increasingly necessary to find interesting patterns from this data. Multinational companies, being spread over the globe, have to integrate data from various geographically dispersed sites. This data is generated from varied sources in heterogeneous forms and has to be processed before mining can be carried out on it. Mining association rules from data involves finding correlations between two or more variables in a dataset. Algorithms like Fast Distributed Mining (FDM) and Count Distribution Algorithm (CDA) have been used for association rule mining in a distributed environment. However, these algorithms prove to be inefficient when it comes to dynamically streaming input. Our proposed solution suggests a methodology to implement Association Rule Mining on Distributed Systems using ODAM (Optimized Distributed Association Rule Mining) algorithm on batchwise data. Further, in an effort to aid the user in analysing the output, we display the association rules generated for each item as well as for the entire dataset. Also, the user can view the time series analysis for each association rule.
Keywords: ODAM, Batchwise Data, Apriori, Distributed Association Rule Mining.
Abstract
Spam Mail Detection using Classification
Parhat Parveen, Prof. Gambhir Halse
DOI: 10.17148/IJARCCE.2016.5674
Abstract: We are going to explore on how the elaboration of web results in all communication and transactions which are all taking place through web based tool known as email and these days all people are making all their general or business transactions through emails so email acts as an active machine for communication so the user essential time and amount of cash spent on bandwidth will be saved. Spam is an alternative way of an electronic messaging system to send a large number of messages to the user inbox. Here we are going to experiment many data mining techniques to the dataset of spam in an attempt to search the most suitable classifier to email classification as spam and non-spam. Here we are going to check the performance of many classifiers with the use of feature selection algorithm and we found that in the result analysis part the Na�ve Bayes classifier provides finer accuracy with respect to other two classifiers such as support vector machine and J48 and we can also see that time taken for Na�ve Bayes classifier is lesser than other two classifiers which means that Na�ve Bayes classifier is the best classifier among the other two classifier which are used for classifying the spam mails.
Keywords: Classifier, Feature selection, Emails, Spam mails.
Abstract
Pothole Tracking System Using Android
Mr. Aditya Bamne, Mr. Omkar Shinde
DOI: 10.17148/IJARCCE.2016.5675
Abstract: Pothole Tracking System which assists the driver in avoiding pot-holes on the roads, investigates an application of mobile detecting and reporting the surface conditions of roads. It describes a system to monitor this important civil infrastructure using an android based smart phone. The pothole tracking system uses the inherent mobility of the participating smart phone by the citizen,opportunistically gathering data from image clicking from an android based smart phone which is GPRS enabled, and processing the data to assess road surface conditions. Using a simple geotagging technique which is a feature of android OS, it show that we are able to identify potholes and other severe road surface anomalies from images clicked by the citizens and uploaded by the same application on the server. This paper presents the architecture of a Global Positioning System (GPS) based approach for reporting thoroughfare problems via Global System for Mobile Communication (GSM) for road maintenance management environment. To increase accuracy and efficiency, GPS can be used as it enables the tracking and tracing of the three figures of a GPS receiver�s coordinates namely longitude, latitude and altitude.
Keywords: Global Positioning System (GPS), Road Maintenance ,Android, Complaint management system, Global System for Mobile Communication (GSM),I.
Abstract
Defining and Formalising Project Management Models and Processes
Ravinder Singh, Dr. Kevin Lano
DOI: 10.17148/IJARCCE.2016.5676
Abstract: The research is aimed at studying the feasibility of defining/ formalising model driven project management with base methodology of PMBOK. Our research focuses on PMBOK since more than 75% of the projects around the world use PMBOK for managing projects. Previous research works had considered one or two areas of Project Management but did not consider the whole methodology, and also did not make use of model driven methods. Our research is proposing a model driven project management using UML and OCL for all the 5 process areas and 10 knowledge areas of the PMBOK. The research work will provide large scale applications of system modelling. This will provide support of defining tools for Project Management, deliverables, and documentation. These models will provide consistency, enhance the reusability of components, reliability, and help in automation of standard processes of Project Management.
Keywords: Modelling; Programme and project Management Distributed work; Onshore; Offshore; Software; IT projects, Automation, Software Engineering.
Abstract
An Enhanced Fuzzy Min-Max Neural Network Based on Pruning Algorithm for Pattern Classification
Ashish D. Bopte, Dr. D. M. Yadav, Prof. S. B. Shinde
DOI: 10.17148/IJARCCE.2016.5677
Abstract: Various neural networks has been studied based on Fuzzy Min-Max (FMM) for classification of patterns. An Enhanced Fuzzy Min-Max (EFMM) neural network is recent one. The contribution of EFMM is ability to overcome a number of limitations of the original FMM network and increases the performance. The key contributions are three heuristic rules to enhance the learning algorithm of FMM. First, a new rule of hyperbox expansion is introduced to eliminate the overlapping problem which occur while process of hyperbox expansion. Second, other possible overlapping cases are discovered by using newly introduced hyperbox overlap rule. Third, a new hyperbox contraction rule to resolve possible overlapping cases is provided. Due to these rules, EFMM is more complex than FMM. Hence a concept of pruning is introduced in this paper. Confidence factor is used for pruning the hyperboxes and confidence factor is baes of frequency of use and its accuracy of recognition. Pruning of hyperboxes is done to minimize the hyperboxes and improve the network complexity of EFMM, but the recognition rate decreases slightly.
Keywords: Artificial Neural Network, Fuzzy Min-Max Neural Network, Enhanced Fuzzy Min-Max Neural Network, Pruning
Abstract
Detection and Notification of Potholes and Humps on Roads
Mr. Nilesh C. Yadav, Prof. Madhura M. Raste
DOI: 10.17148/IJARCCE.2016.5678
Abstract: Roads are the one of the main transportation system amongst the other especially when we talking about developed and developing countries. India is said to be the fastest developing countries today, our road network is gigantic and said to be only after the USA. But one of the striking underlying facts is the condition of the roads. Since roads indirectly contribute to the economic growth of the country it is extremely essentially that the roads are well laid out and strong. India is home to several bad roads it the metropolitans, the cities or the villages. Identification of pavement distress such as potholes and humps not only helps drivers to avoid accidents or vehicle damages, but also helps authorities to maintain roads. This paper discusses previous pothole detection methods that have been developed and proposes a cost-effective solution to identify the potholes and humps on roads and provide timely alerts to drivers to avoid accidents or vehicle damages. For that ultrasonic sensors are used to identify the potholes and humps and also to measure their depth and height, respectively. The proposed system captures the geographical location coordinates of the potholes and humps using a global positioning system receiver. The sensed-data includes pothole depth, height of hump, and geographic location, which is stored in the database (cloud). This serves as a valuable source of information to the government authorities and vehicle drivers. An android application is used to alert drivers so that precautionary measures can be taken to avoid accidents. Alerts are given in the form of flash messages with an audio beep.
Keywords: Android application, GSM SIM900, GPS, PIC16F877A, ultrasonic sensors
Abstract
A Study on Sensory Data processing Framework in integration of WSN and Cloud Computing
Ndayishimye Moise, N.J. Uke
DOI: 10.17148/IJARCCE.2016.5679
Abstract: Wireless sensor network (WSN) are spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to pass cooperatively their data through the network to a main location. Although WSNs have many advantages such as small size, low cost, low power and can communicate with each other over a short range, they have many limitations in terms of their processing power, storage resources, and battery life. Cloud computing (CC) is a distributed computing paradigm that provides access of the resources such as storage, network, servers and applications on demand. The integration of wireless sensor network and cloud computing which consists of taking advantages of data gathering capability of WSN as well as the data storage and processing ability of CC is done to overcome limitations of WSN. This integration provides a flexible, an open and reconfigurable platform for different monitoring and controlling applications. In this work we show the importance of integrating wireless sensor network with cloud to achieve these objectives. Then we present some issues and methodologies used by some authors in integration of wireless sensor network with cloud computing along with future directions.
Keywords: Wireless Sensor Network (WSN), Cloud Computing (CC), Data Processing, Integration.
Abstract
Energy Efficient LLR based Cooperative Spectrum Sensing Method for CRAHNs using Clustering
Deepali Dagde, Dr. Manish Sharma
DOI: 10.17148/IJARCCE.2016.5680
Abstract: Cognitive radio (CR) technology is invented to solve the problems in wireless networks resulting due to the scarcity of spectrum and due to the inefficiency in the spectrum usage by making use of existing wireless spectrum opportunistically. The cooperative spectrum sensing schemes exploit spatial diversity of the Secondary Users (SUs), to detect an unoccupied licensed spectrum. A Soft energy combining scheme provide optimal detection performance by aggregating the actual sensed information from SUs. Alternately, a hard energy combining scheme offers lower cooperation overhead in which only local decisions taken by SU are reported to the fusion centre (FC). A Log-Likelihood Ratio (LLR) based cooperative spectrum sensing scheme in which each SU performs a local LLR based sensing test employing two threshold levels. Indeterministic region with two threshold level along with LLR is used to reduce the computational overhead. The detection performance of the proposed scheme is close to the soft combining techniques. In this work energy efficient LLR based cooperative spectrum sensing method for CRAHNs with clustering is proposed. Clustering organizes nodes into clusters in order to provide network-wide performance enhancement. Generally there are three main advantages of clustering to CR networks, scalability, stability, and supporting cooperative tasks, such as channel sensing and channel access, which are essential to CR operations, and these advantages have led us to use the clustering in CR networks. Effectiveness of proposed strategy will be verified through simulation study on the basis of signal to noise ratio (SNR), probability of detection and energy consumption.
Keywords: Cognitive Radio, Cooperative spectrum sensing, LLR, Clustering
Abstract
Identification of Ambiguity in Requirement Specification using Multilingual Word Sense
T. Jaison Vimalraj, B. Seema
DOI: 10.17148/IJARCCE.2016.5681
Abstract: Requirements are the basic building block for development of good product. Requirement analysis is one of the major steps to reduce complexity of developing product. Several automatic analysis methods have been proposed to improve the quality of requirement. Currently there is no technique available to reduce ambiguity caused by Lexical, Syntactic and Syntax ambiguities. In this paper we identify these ambiguities and reduce them to improve the quality of requirement.
Keywords: Requirement Specification, Lexical Ambiguity, Syntactic Ambiguity, Semantic Ambiguity.
Abstract
Analysis of Forest Fire Behaviour on Thermal Images Using Data Mining Technique
Vaibhavi S. Shukla, Jay Vala
DOI: 10.17148/IJARCCE.2016.5682
Abstract: As we realize that today's reality is computerized world and we have use advanced information, for example, video, sound, images and so forth in different fields for different purposes. In present situation, images assumes key part in each part of business, for example, various fields like business, medical, satellite etc. Broke down images uncover helpful data to the human clients. Image mining makes do with the extraction of information, image information relationship, or different examples which is not put away in the images. The enthusiasm of image mining additions as the need of image data is creating in everyday life. Forests fires are a tremendous problem.. To fight against these disasters, the appropriate analysis of forest flames is a crucial concern. The development in the amount of woods flares of woodland flame in the latest couple of years has obliged governments to take protections. These Forests flames are a noteworthy issue. On the off chance that the flame contenders know spreading flame and where the flame will be in once in a while it would be simple for them to take precautionary measures against the flame. In this way, for that a noteworthy prerequisite for examination and analysis of the fire of flame exists. The analysis of forest fire behavior is done using thermal images of forest fire.
Keywords: Data mining, Multimedia mining, Image mining, forest fire, Thermal image.
Abstract
Design of Trust Aware Routing Framework
Zeeshanali Shaikh, B.B. Gite
DOI: 10.17148/IJARCCE.2016.5683
Abstract: Wireless Sensor Networks (WSN) consist of Nodes, there can be several hundreds or even thousands. Node is built of several parts i.e. a radio Transceiver with an internal antenna, microcontroller, and an electronic circuit for interfacing. Nodes are controlled to specific base station which they are associated .WSNs can be applied in various fields i.e. Military Applications , Health Care Application, Forest Fire Detections, area monitoring etc. .Wireless Sensor Networks i.e. WSNs are exposed to various attacks such as Sinkhole attacks, Wormhole attacks, Sybil attacks .The major concern in WSNs is security ,only Cryptographic Techniques are not beneficial for solving severe problems .There are routing protocols such as Ambient Trust Sensor Routing (ATSR ), Time Analysis Resilient Protocol (TARP), Feedback Based Secure Routing (FBSR) etc. which help in protecting WSNs from the attacks but some severe attacks cannot be addressed from the above routing protocols .Severe problems such as Identity deception through replaying routing information ,this may help in launching other attacks which were mentioned .TARF (Trust Aware Routing Framework ) is effective against such attacks .TARF can be embedded with other routing protocols which exists and hence provided a secured network for data transmission.
Keywords: WSN, TARF, ATSR, FBSR, TARP, Trust- Manager, Energy-Watcher.
Abstract
Parametric Analysis of CdTe/CdS Thin Film Solar Cell
Erteza Tawsif Efaz, Atiya Anjum Ava, MD. Tanzidul Alam Khan, MD. Mohaiminul Islam, Afrin Sultana
DOI: 10.17148/IJARCCE.2016.5684
Abstract: This paper mainly represents Cadmium Telluride (CdTe) and Cadmium Sulfide (CdS) thin film solar cell�s parametric analysis of fill factor and efficiency with the variation of electron and hole mobility. From this analysis, results showed that the variation of electron and hole mobility gives an effective improvement in fill factor and efficiency, though variation of hole mobility gives higher fill factor and efficiency than variation of electron mobility. On the other hand, varying the thickness of CdS layer also gives a slight improvement on efficiency of CdTe solar cell. But the rate of change of efficiency is quite low.
Keywords: Heterojunction device, Cadmium Telluride, Thickness, Efficiency, Fill factor.
Abstract
Model Interactions in a Domain Specific Modeling Language: An ICT Solution to Transformations in Design of Fluid Supply Systems
Igulu Kingsley Theophilus, Piah Z. Patrick, Japheth R. Bunakiye, Georgewill Moses Onengiye
DOI: 10.17148/IJARCCE.2016.5685
Abstract: In domain specific modeling language development, model interactions and transformations play a crucial role. This paper introduces a new, syntax directed approach for the specification of modelinteractions for transformations within a domain specific modeling language. The technique is based on tokenization of the characteristic values and attributes of possible component elements of a fluid supply system. To demonstrate the mapping, expression parse trees and streams of tokens are recursively specified as syntax directed definitions in a context free grammar. With each grammar symbol, a set of attributes are associated, and with each production, a set of semantic rules for mapping values of the attributes corresponding to a typical fluid supply system physical design and modeling parameters are associated. The main contributions are the specifications that will aid the design of a domain specific modeling language for the representation of transformations and translation scheme execution engine for the target domain of fluid supply systems, and another is a possible pathway for the implementation of the semantics of the language with a syntax directed scheme that consists of a grammar and the set semantic rules.
Keywords: Model Driven Engineering, Domain Specific Modeling, Values and Attributes, Context Free Grammar, Transmission Pipelines, Joints and Fittings.
Abstract
Dual Background Segmentation Based Abandoned Object Detection in Video Surveillance Systems
Prem Jeevan, Ravi Sah, Sharmili Potdar, Shikha Singh
DOI: 10.17148/IJARCCE.2016.5686
Abstract: Detection of unattended object is one of the important tasks in video surveillance system. This paper describes the unattended object detection based on dual background segmentation approach. The proposed system consists of preprocessing model which includes background segmentation, shadow removal and brightness balancing techniques. The system uses two sets of background i.e current background and buffered background for the detection of foreground blob. The framework of the system is based on approximate median model. The stationary object is detected and based on the threshold value the alarm is raised after detecting the unattended object. The system is tested on a video of resolution 320�240 pixels containing all types of objects. i.e. moving objects, static objects and abandoned/unattended objects.
Keywords: Video Surveillance, Image Pre-processing, Dual Background Subtraction, Tracking, Abandoned Object.
Abstract
Effective Aging Approximation for Adult People Using Morphing Technique
Patel Mira Y, Jaymit Pandya, Nirav M Raja
DOI: 10.17148/IJARCCE.2016.5687
Abstract: Age progression results considerable change in the look of human countenances has recently gained attention from the computer vision. Because of numerous ways of life elements, it is hard to decisively anticipate how people may look with propelling years or what they looked like with "withdrawing" years. Automatic age variation methods and techniques useful to capture wanted fugitives, finding missing children, updating employee databases, enhance powerful visual effect in film, television, gaming field. Currently there are many different methods available for age variation like: Craniofacial Growth Model, Anthropometric Model, Image Morphing, Image Based Surface Detail Transfer (IBSDT), Aging function (AGES), Gaussian Mixture Model (GMM) etc. Each method has its own advantages, purpose and limitations. The main goal of our dissertation work is to enhance the effect of age variation for adult people doing facial shape changes and including specific texture information like fine line, wrinkles in age modelling process.
Keywords: Age progression, Age Variation Methods, Anthropometric Model, Ages, Image Morphing, Ibsdt, Gmm.
Abstract
A Mobile Agent Based Framework for Securing Iot Network
Anubhuti, Harjot Kaur
DOI: 10.17148/IJARCCE.2016.5688
Abstract: At present, Internet of things (IOT) has become an important area of research work in which the various physical objects are connected to internet for a number of applications. Due to world-wide acceptance of the Internet of Things, security problems in it have increased. This paper presents these security issues and proposes a framework to detect the malicious node in a network using mobile agents. An algorithm is also proposed to detect malicious nodes.
Keywords: Mobile agents, multi agent systems, internet of things, attacks, Security Certificate, Insecure nodes.
Abstract
A New Parallel Split and Concurrent Selection Sorting Algorithm based on Binary Search
Jagdeep Singh, Alka Singh
DOI: 10.17148/IJARCCE.2016.5689
Abstract: We all know that the most important procedure in managing data is its sorting. To perform sorting, one can choose different sorting algorithmic methods. But, all the various sorting algorithms do not result the same speed, execution time and efficiency at a given set of inputs. Hence, it is necessary to know which algorithm can give better result for a given platform and pre-defined data sets. This paper presents reader an experimental study of performance comparison for various parallel sorting algorithms. Proposed algorithm shows up to 50 times speed up as compare to serial and two fold speedup as compare to parallel algorithm.
Keywords: Bitonic sort, odd-even merge sort, parallel merge sort, parallel rank sort, complexity.
Abstract
Signature Verification Technique using Artificial Neural Network and SURF Algorithm
Sadia Ahmed, Navjot kaur, P.K Bansal
DOI: 10.17148/IJARCCE.2016.5690
Abstract: In today�s world Signature plays a crucial role. It depicts a person name graphically or in handwritten form. It is the best form of recognition of an individual. Other attributes also plays a big role in recognition but signature is best feature among them. In order to permit a check or it is a mark as well as mark made by an individual to execute a document and signify knowledge, acceptance, or obligation. A signature is also categorized on the basis of Biometric authentication where a user�s identity is established by means of physical trait or certain behavioural characteristics. . Signature facilitate us enforce security in many such cases for e.g. transactions at banks, wills, assets, government documents etc .We investigated the impact using artificial neural network (ANN) and Surf algorithm. The EER (equal error rate) is achieved as 14.64.
Keywords: Biometry, ANN, signature verification, FRR (False Rejection Rate), FAR (False Acceptance Rate), Forgery, image processing, SURF.
Abstract
Design of Broadband Microstrip Patch Antenna for RF Applications
Pratiksha Singh Gaur, Vivek Singh Kushwah
DOI: 10.17148/IJARCCE.2016.5691
Abstract: Microstrip patch antenna was designed in this paper for Radio Frequency (RF) applications. The proposed patch antenna operates at frequency 1.8GHz to 2.4 GHz which obtained very sharp cut-off points. And also it obtained Return loss -22dB at 2GHz resonant frequency. Two L- shaped patch antenna was constructed using probe or coaxial feeding techniques. Loading slots on a rectangular patch antenna. Two parallel L-shaped antennas was used to achieved good or better impedance bandwidth. Microstrip antennas are made of a rectangular patch with dimensions length L and width W, above a ground plane with dielectric constants er .and substrate thickness h. Microstrip antenna is made of with the help of conducting patch over a ground plane isolated by a dielectric substrate the proposed antenna was simulating on HFSS software tool for commercial purposes.
Keywords: Microstrip Patch Antenna, IE3D EM Simulation, S-Parameters, Return-Loss and Defected Micro Strip Structure.
Abstract
A Review: “An Efficient Method to Remove Camera Shake in Blurred Images”
N. B. Humbe, Prof. S. O. Rajankar
DOI: 10.17148/IJARCCE.2016.5692
Abstract: The paper presents an effective technique for tackling one of the most challenging problem of photographers viz. motion blur due to camera shake. The most common cause of a blur image is camera shake or a relative movement of a handheld camera and object in a given exposure time. The movement may be very small, but still creates blurry images. There exist different conventional techniques which are used for removal of motion blur to get clear and sharp image. Most of these methods use multiple images as a input taken through a burst mode, a feature available in all modern cameras, and combine them to get a more clean image. However there are certain limitations and disadvantages of using these conventional techniques. Removing a blur from a single image is a challenging problem. The proposed work is based on a technique that uses a single input image unlike other conventional techniques for removal of blur in images post capturing it. In the proposed technique a single blur image is divided into smaller images with an assumption that each sub image is uniformly blurred. with the implication of Fourier algorithm these sub images are used to estimate motion blur parameter -Blur Length and Radon transformation is used for determining values of Blur Angle. A local parametric blur model is prepared with the help of these estimated values of motion blur parameters, VIZ blur length and blur angle. These models are then deconvolved with blurry sub images. The resultant of this algorithm is a reconstructed, original, blur free image. The proposed technique is an effective solution to remove motion blur and serves the important requirement of clear images of various fields like medical, navigation, satellite imaging, driving assistance systems.
Keywords: Camera shake; Deconvolution; Single-image deblurring; Motion blur.
Abstract
An Efficient Recovery of Degraded Document Images using Binarization Technique
Umesh B. Sangule, Dr. A. B. Pawar
DOI: 10.17148/IJARCCE.2016.5693
Abstract: There exists a variety of proposal and books which are been composed long years back. So some of them which are essential for us we should protect them in terms of their degradation. In any case, these reports are being debased because of some common causes such as discriminated color illusion, or ink sipping from background to foreground etc. Because of such debasement a hefty portion of the report images are not in lucid arrangement. In order to isolate the content from those corrupted images, such document images need to be processed under efficient binarization methods. For this reason we will build up the framework that can fit for isolating the content from the debased image. Proposed system eradicates the Cannys� edge recognition calculation in its framework. In this paper, for isolating the frontal area and the background of the image, use of few calculations are done such as gray scaling and local thresholding. Image contrast reversal, edge estimation, image bimodal binarization and post processing binarized images are incorporated into proposed system. Subsequent to applying these all techniques proposed system becomes ready to partition out the frontal area content from back ground debasements.
Keywords: Image Adaptive contrast, document images, document image processing, pixel classification, degraded document binarization.
Abstract
Applications and Challenges in Wireless Sensor Networks
Sonam Khera, Dr. Neelam Mehla, Dr. Navdeep Kaur
DOI: 10.17148/IJARCCE.2016.5694
Abstract: Sensor networks offer a powerful combination of distributed sensing, computing and communication. They lend themselves to countless applications and, at the same time, offer numerous challenges. Energy is the scarcest resource of WSN nodes, and it determines the lifetime of WSNs. WSNs may be deployed in large numbers in various environments, including remote and hostile regions, where ad hoc communications are a key component. Wireless Sensor Networks provide capabilities that are valuable for continuous, remote monitoring for healthcare applications; they can be deployed inexpensively in existing structures without additional IT infrastructure. This paper presents an overview of the different applications of the wireless sensor networks and various Challenges. Energy management is an important parameter in increasing the network lifetime and thereby meeting user requirements to perform various applications in different fields.
Keywords: WSN Applications, Challenges, Classification.
Abstract
Static Hand Gesture Recognition Using SOM-Hebb Classifier
Richa V. Vedpathak, Mrs. S.A. Shirsat
DOI: 10.17148/IJARCCE.2016.5695
Abstract: Gestures are physical actions made by human to convey feelings or expressions to others. Hand gestures are basically classified as static and dynamic. It is used as sign language for deaf and dumb, controller less video gaming, Smart TV, video surveillance, human robot interaction, biometrics, virtual and augmented real time applications. This proposed work focuses on static hand gesture recognition system using hybrid network consisting of SOM (Self-organizing map) and Hebb classifier. SOM classifier is a single layer feedforward neural network. It uses Hebbian learning algorithm to in its association to help in identifying categories. Mapping is done by SOM method and network training is obtained by Hebbian learning algorithm. The performance of this proposed work is simulated using MATLAB and evaluated in terms of recognition accuracy. The obtained accuracy of the system is 91.11%.
Keywords: Euclidean distance, Fourier descriptor, Hebb, Self-organizing maps (SOM), Skin color Segmentation.
Abstract
Personal Authentication by Extracting Sclera Veins
Latha B.M, Dr. Ushadevi M.B, Sangeetha Y
DOI: 10.17148/IJARCCE.2016.5696
Abstract: In this paper biometric technology is used to give the best result for the authentication. Here sclera recognition is used to perform the authentication process. Segmentation is the process of partitioning the image and extracts the sclera region, for that k-means clustering is used. To filter out the noise and the other part here Gabor filter is used. Feature extraction is the one of the important method to extract the feature of that sclera part. Here LBP method is used to perform the feature extraction process. In the next section classification will be takes place with the presence of the SVM classifier. By considering all these methods the person authentication can be done.
Keywords: sclera vein recognition, LBP, SVM
Abstract
Review: Air Quality Monitoring System
Priyanka V. Shitole, Dr. S. D. Markande
DOI: 10.17148/IJARCCE.2016.5697
Abstract: Air Quality monitoring system monitors the environmental air quality. Now a days air pollution rates in developing and developed countries increase, so it requires more portable and cost effective air quality monitoring devices. Pollution measuring chambers are available in developed countries. The polluted air is harmful for health. In developing countries all services not available commonly. In this paper the review of various air quality monitoring systems is done. These systems measure the concentration of oxygen, carbon dioxide, carbon monoxide, nitrogen dioxide, sulfur dioxide, light intensity sensor, humidity, temperature respectively. All readings will be displayed on Android smart phone. According to threshold values of sensors alarm will be ring. GSM/GPRS Modem is used to send data wirelessly to the server pc. In some systems global positioning system is used for indication of location, date, time. Sensor data is automatically stored in SD card storage module for future use. Such systems prevent hazardous health problems as well as enhance air quality.
Keywords: Sensors; Air Quality; Air Pollution; Health.
Abstract
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage with ABE Techniques
M. H. Ranadive , L. K. Ahire
DOI: 10.17148/IJARCCE.2016.5698
Abstract: Cloud computing is obtaining popularity because it provides various on demand services which is location independent. Cloud user can store their data on cloud server remotely. Most of them are from different trust domains. Thus cloud data security and privacy becomes critical task. Before storing the data on the cloud server, the data can be encrypted. Attribute-based encryption technique is a public key encryption which enables access control over encrypted data using different access policies and ascribed attributes. Personal health record (PHR) is an emerging health information exchange model, which is always outsourced to be stored on third party, such as cloud server. Before storing the Personal Health Information of Patients and Doctors the attribute based encryption is applied. A public auditing scheme is used which audits the tampered data on the cloud server. This scheme can totally releases the burden of PHR users about storing and maintaining their data on cloud server.
Keywords: Cloud storage, regenerating codes, public audit, privacy preserving, ABE, AES.
Abstract
SIXTH SENSE – An Air Mouse
Kiran Parte
DOI: 10.17148/IJARCCE.2016.5699
Abstract: The Sixth Sense is a wearable gestural interface that augments the physical world with digital information and lets us use natural hand gestures to interact with that information. The sixth sense technology was introduced to bridge the gap between physical world and the digital world. This paper provides an analytical approach towards the Sixth Sense technology wherein the cursor movements and click events of the mouse are controlled by simple hand gestures. A Web Cam is used as a sensing element to detect the gestures. The gestures sensed by the camera are converted into digital form using image processing to develop a virtual human computer interaction (HCI).
Keywords: Sixth Sense technology, human computer interaction (HCI), image processing, hand gestures.
Abstract
Design and Implementation of Automatic Street Light Controller for Energy Optimization Using FPGA
Mr. Amey J.Manekar, Dr. Dr. R .V. Kshirsagar
DOI: 10.17148/IJARCCE.2016.56100
Abstract: The street lightning consume huge amount of electric power. And the cost per unit is expensive also we have limited resources for power generation so it is always better to depend on renewable sources. Therefore the goal of the present study is to save energy in Street lighting. In the existing system, power consumption takes place due to continuous lighting throughout the night by street lights. Automatic Street Light Control System is not only easiest but also the powerful technique. It releases the manual work at most up to 100% Hence an idea is implement such system which dynamically switch ON and OFF light depending upon traffic and light intensity.. Therefore, maximum power will be saved. The proposed idea was implemented by FPGA and IR sensor.
Keywords: Field Programmable gate array (FPGA); Infrared Sensor (IRS); Pulse Width Modulation(PWM).
Abstract
A Survey of Dual Sentiment Analysis Considering Two Sides of One Review
Ashwini Damodar Kanherkar, Sarika M. Chavan
DOI: 10.17148/IJARCCE.2016.56101
Abstract: With flourishing of social media such as blogs, forum, social network, etc... Sentiment analysis is an excellent source for gathering the public opinions. This paper fully focuses on an exhaustive study of dual sentiment analysis considering two sides of one review. It is used to analyze and compare the public opinion for the product review. Sentiment analysis is a kind of natural language processing for tracking the mood of the public about a particular product or topic. Sentiment analysis, which is also called opinion mining, involves in building a system to collect and examine opinions about the product made in comments, reviews, blog posts, or tweets. Sentiment analysis can be useful in several ways. Polarity classification is the most classical sentiment analysis task which aims at classifying reviews into either positive or negative. However, in many cases, in addition to the positive and negative reviews, there still exist many neutral reviews. This survey paper focuses a comprehensive overview of the last updates in this era. Many recently proposed enhancements and various sentiment analysis applications are entitled and presented briefly in this survey.
Keywords: machine learning, sentiment analysis, natural language processing, opinion mining.
Abstract
Loss Recomputed-Least Mean Square-Ten Split Feature Extraction and Statistical Range Comparison (LORE-LMS-TESFESRACO) Algorithm
Krishnu Bhaskar K.S, Dr. Rini Jones S.B
DOI: 10.17148/IJARCCE.2016.56102
Abstract: The SOund NAvigation and Ranging (SONAR) is an underwater sound propagation technique used for navigation, communication or detection of objects on or under the surface of the water. The objects may be submarines, vessels etc. It involves the use of frequencies from very low or infrasonic range to extremely high or ultrasonic range. Proper design of a SONAR system requires accurate detection of the signals. Here, tonal features of the received signal are analyzed based on the signal detection theory. Using filtering and several comparison techniques, the targets can be detected and this can be simulated via variables using MATLAB. This paper attempts to design an algorithm for range estimation and target classification using Passive SONAR. The hardware implementation has a wide arena of applications mainly in the defence sector.
Keywords: Acoustic Propagation Loss, Least Mean Square Adaptive Filter, Energy Entropy, Short Time Energy, Zero Crossing Rate, Spectral RollOff, Spectral Centroid, Spectral Flux, Mean, Standard Deviation.
Abstract
Area Optimized VLSI Implementation for Color Image Edge Detection
Shrutika S. Matte, Mrs. M. V. Vyawahare
DOI: 10.17148/IJARCCE.2016.56103
Abstract: Mathematical structure study is recognized as signal processing method and image. Mostly tools such Matlab is suited for image processing. Now the image processing technique is used may field. Image compression by using image edge detection method is used mainly to reduce the memory requirement.Important terminology in image processing is edge detection in computer vision. It is in the front position of image processing for object detection, so it is crucial to have a good understanding of edge detection operators. In the present work, relative analyses of various edge detection techniques in image processing are presented.
Keywords: Color Edge Detection; FPGA Implementation, Edge Detection.
Abstract
A Review: Road Traffic Sign Detection and Recognition Systems
Mrs. Pranali A. Sakhare, Mrs. S.S. Vasekar
DOI: 10.17148/IJARCCE.2016.56104
Abstract: Traffic sign detection and recognition is an essential component of advanced driver assistance systems. It is mainly designed to increase driver safety through the fast acquisition and interpretation of traffic signs. However, still such systems are not able to recognize traffic signs accurately. In this article, firstly challenges and undesirable factors facing road traffic sign detection and recognition systems are addressed. The contributions of recent works to the various stages inherent in traffic sign detection: segmentation, feature extraction, and final sign detection are described in this paper.
Keywords: Active safety, object detection, recognition.
Abstract
Performance Optimization of Heterogeneous Computing Environment
Touseef Golandaz
DOI: 10.17148/IJARCCE.2016.56105
Abstract: The applications which are running on heterogeneous computing system (HCS) with hybrid processors (CPU and GPU) often uses only one processor and the Other processor will be in ideal state for the rest of operations of the application and this results in the wastage of the available computational resources and issues related to performances. It is possible to avoid this kind of wastage of the computational resources of modern HCS by dividing work across hybrid processors of HCS. We introduce a technique to fully utilize the hybrid processors of HCS to provide the significant improvement in performance and usage of hybrid processors for matrix multiplication based applications. We are using library functions like cblas (MKL) and cublas (NVidia�s CUBLAS Library function) to divide the work across the hybrid processors of HCS.
Keywords: scale, GPGPU, hybrid processors, HCS
Abstract
An Approach to Increase the Efficiency of Printed Solar Cell Using Convex Lens
Khushbeen, Nisha Sharma, Anil
DOI: 10.17148/IJARCCE.2016.56106
Abstract: This has been proved with conventional solar cell that the efficiency is increasing and besides that the material consumption i.e. silicon has been greatly reduced. Thus along with the increment in efficiency, the cost of conventional solar cell was greatly reduced. Here, the work is done to increase the efficiency of a printed solar cell without changing its actual printed structure or any other material. The idea for this work came from the use of Holographic planar concentrator on conventional Silicon based solar cell. Thus we proceeded with that idea by making the use of convex lens (light converging lens) to concentrate the light source on to the specific point of known dimension. We used standard xenon light source. The experiment started with the measuring of current and voltage of standard solar cell to check whether the set-up is working or not and after that measurements with printed samples were done. The results we got from conducting this experiment were positive i.e. the efficiency in terms of current and voltages was increased. The readings were taken by cutting samples from a single cell because the printed solar are not homogenous and shows different values of current and voltages over a single cell as compared to conventional solar cell due to the presence of number of variables in printing process.
Keywords: Holographic planar, conventional solar cell, standard xenon light.
Abstract
A Review on recent developments on solar technology
Nisha Sharma, Khushbeen
DOI: 10.17148/IJARCCE.2016.56107
Abstract: The photovoltaic market is booming with over 30% per annum compounded growth over the last 5 years. Most of the solar cells being supplied to this market are �first generation� devices based on crystalline or multicrystalline silicon wafers. �Second generation� thin-film solar cells based on amorphous silicon/hydrogen alloys or polycrystalline compound semiconductors are starting to appear on the market in increasing volume. PV remains the most rapidly growing energy technology by a wide margin. Different methods have been adopted to increase cell efficiency and various research done on solar cell have been discussed in this paper.
Keywords: PV cell
Abstract
Design and Simulation of Directional Antenna for Millimetre Wave Mobile Communication
Miss. Ankita P. Manekar, Dr. S. W. Varade
DOI: 10.17148/IJARCCE.2016.56108
Abstract: With increase in the smart phone users the capacity demand also increases, the fifth generation (5G) mobile technology would be able to greatly increase communication capacity by using the large amount of spectrum in the millimetre wave (mmWave) bands. The studied references shows that in addition to capacity boosting technologies 5G needs to offer ultra-reliable communications, low latency and massive connectivity. In this paper, we present the motivation for future antenna for 5G mobile communication, methodology, and offer a variety of simulation results that show 2.8 GHz frequency can be used when employing steerable directional antenna. The proposed idea is implemented by using HFSS software.
Keywords: 2.8GHz, millimetre-wave, 5G, Mobile Communication, Directional Antenna, HFSS.
Abstract
Performance Evaluation of Duty Cycle Modulation in HPC
Aparna Sure, Dr S.L.Deshpande
DOI: 10.17148/IJARCCE.2016.56109
Abstract: High Performance computing (HPC) is the use of parallel processing for running application program efficiently, reliably and quickly. HPC is also refers to how fast one can get the result, and how efficiently can get the result. HPC can also refer as high productivity of systems. Speedup of high performance is measured by considering the parameters like threads. Here 3 cases are considered that is; keeping the number of jobs constant and varying number of threads, keeping number of threads constant and varying number of jobs. And modifying the duty cycle of the threads. The numbers of runs are considered and founded the ideal number of threads to gain the average speedup.
Keywords: Number of threads, number of jobs, average speedup.
Abstract
Genetic Algorithms for Classification Rule Discovery: Issues and Challenges
Pooja Goyal, Saroj
DOI: 10.17148/IJARCCE.2016.56110
Abstract: Classification Rule discovery is one of the major tasks of data mining. Genetic algorithms (GAs) for discovery of classification rules have recently gained increased importance because these are capable of finding global optimal solutions in large and complex search spaces like classification rule discovery. Building a rule based classification model, particularly for large data sets, using Genetic Algorithms becomes a very complex and time-consuming task. This paper enlists some of important issues that influence the efficacy and/or efficiency of GAs in the domain of building classification models. The paper also emphasizes the research direction to make application of GAs more amiable for discovering classification rules.
Keywords: Genetic Algorithm, Data Mining, Classification, Rule Mining
Abstract
Wireless Notice Display
Chandani Maurya, Dr. M. B. Mali
DOI: 10.17148/IJARCCE.2016.56111
Abstract: Notice boards are common in variety of institutions and are used daily. The urgent notices are normally printed on the papers and then displayed. The proposed system can announce a notice by just typing on a computer. If there is no notice, along with temperature and humidity, time will be displayed. ZigBee module is used for wireless communication. At receiver side, matrix of LEDs will display a notice which will be controlled by microcontroller. GPS module is to interface with microcontroller for displaying real time. At transmitter side, computer is used where ZigBee module will be interfaced via USB to serial converter. An application is developed to write a notice so that when anything is written on that window it will display immediately on the board. With the help of this application notice can be transmitted from any computer if needed.
Keywords: GPS module, LED matrix board, Notice display.
Abstract
Zone Adaptive Virtual Coordinate Selection Approach for WSN Optimization
Manisha, Vijay Kumar
DOI: 10.17148/IJARCCE.2016.56112
Abstract: Wireless networks provide the conception of distributed design in order that the sharing of knowledge yet as resources will be done effectively. There area unit completely different mediums of playing the communication over the network. This all results an efficient sharing of knowledge and resources. whereas playing the communication in such network there's the necessity of more practical info sharing techniques. The analysis paper is on the brink of perform the analysis of sensing element network underneath completely different real time situations in order that the work includes the discussion on sensing element network, its design and outline a virtual arranger primarily based routing for sensing element network in details. For this, we are going to use space localization approach to divide the network in smaller zones with specification of arranger node. Further, work is to keep up the zone nodes statistics on arranger node to spot the effective next hop. Final objective of the work is to attenuate the energy consumption and improve the network life. of these results area unit simulated with facilitate of Matlab 2013a tool in a very comparison with existing and purposed technique. Parameters taken in thought area unit alive & dead nodes analysis, spherical primarily based Communication Analysis.
Keywords: Image Processing, Thinning, Computer Vision.
Abstract
News Recommendation Systems: A Comparative Study
Kavita Soni, Shyam Sundar Meena, Preetesh Purohit
DOI: 10.17148/IJARCCE.2016.56113
Abstract: A recommendation system is a solution offers separate and specialized set of information. New era of technology enhance the involvement of web world and web solutions have become crucial part of daily life. A study concludes that personalized solutions have sought much attention due to wide scope of features and facilities. A News Recommendation System is a solution which not only suggests relevant news and articles but also recommends solution as per popularity and user requirement. Several recommendation systems are proposed based on knowledge, content and usage. This paper investigates the role of recommendation system on such papers.
Keywords: News Recommendation, Web Mining, Content Mining.
Abstract
Review and Enhancement of security in Mobile Computing Devices
Shubham Dwivedi, Akanksha Deep
DOI: 10.17148/IJARCCE.2016.56114
Abstract: One of the fastest growing technology of today�s world is mobile computing. It is growing at an exponential rate. Most of the complex tasks which required computers can now be done using mobile devices like smartphones at the touch of a finger.Out of all the mobile computing devices, the smartphones are most popular. The smartphones have now become an integral part of our lifestyles. Though the Smartphones help to increase the productivity, they also pose an underlying serious security threat. This research paper aims to review these potential threats, state the efficient methods to tackle them and draw conclusions for further research opportunities in this area.
Keywords: Mobile devices, Smartphones, Attacks, Security
Abstract
Various Methods for Analysis of Skin Diseases
P. B. Manoorkar, D. K. Kamat, Dr. P. M. Patil
DOI: 10.17148/IJARCCE.2016.56115
Abstract: Skin diseases like skin cancers, leprosy are untreated and mostly cause death. If the physician finds the appearance of lesion doubtful then normally visual inspection method is used for diagnosis but all malignant lesions are not identified through visual inspection. Visual inspection could help to prevent misdiagnosis of BCC and other skin diseases. Electrical impedance may distinguish skin cancer from other tissue. The electrical impedance of a tissue depends on its structural characteristics as well as its chemical composition. Studies have shown a wide degree of variation in the bio-electric properties between tissue and cells of body. Differences in electrical impedance of skin as a result of irritation, allergic reaction, location, sex, age and hydration. A small clinical study has also shown significant differences between affected skin and normal skin. Impedance measurement based on a comparison of indexes: magnitude, phase, real part and imaginary part index.
Keywords: Impedance analysis, Lesion impedance, Affected skin, Normal skin impedance, Skin diseases.
Abstract
An Internet Controlled Robotic Arm Using an Android Mobile and FPGA Board
Prasanna S. Bhoite, Madan B. Mali
DOI: 10.17148/IJARCCE.2016.56116
Abstract: Internet and the smart phones especially android are the most common things used by people around the globe. Integration of this commonly used terms internet, android mobile and wireless technology can be used to develop a remote control robotic system. In this paper, we present the internet controlled robotic arm using the android mobile and fpga board. The robotic arm presented in this paper, with some fine tuning, can be used in many applications like internet based robot system, hospitals, control systems, etc. Wireless medium is the most popular medium of communication and is the future of all the technologies. The work presented in the paper is a step towards the future of the wireless robotic arm system.
Keywords: Android mobile, Bluetooth HC-05, Gripper, Robotic arm, Spartan 6.
Abstract
FakeTech: Identifying fake reviews using Collective-Positive Unlabeled Learning
Savita K Shetty, Kanchana S Kokatanur
DOI: 10.17148/IJARCCE.2016.56117
Abstract: The advancement of technology with the Internet has generated plentiful of user-generated data. This content is used to give knowledgeable information using different data mining techniques. Among various types of generated data reviews about product, business or services are becoming more important. Now a days online review is often the primary factor and a valuable source of information in aiding customer�s purchase or service decisions. The vitality of the peer reviews has attracted spammers to induct fake and unrealistic reviews. Some online review systems are facilitating interactions between customers to improve its utility and experiences by expressing product or service opinions. Due to the large public opinion generated, directly or in-directly affecting the marketing of the products or service has incepted the manufacturer�s interest on online reviews. Observing the reliability of customers on reviews some vendors are trying to Fake It! thus misleading the customers. Despite aware of manipulated reviews, customer is unable to distinguish the fake once from the genuine review which necessitates building a system that filters reviews. In this paper, we approach a dual layer classification based on two -level filtering method. The intent is achieved by splitting into two levels, at first by using metadata followed by review content analysis In the first level of classification, we will consider the metadata parameters (IP address, time)to decide the truthfulness of the review. Next, Auto learning system is built which learns from past history of the user. The real reviews classified may still contain some suspicious reviews which calls second level of classification technique using review content features and reviewer centric features to detect review spam. In both the levels auto learning system is built which learns from past history of the user in the system which reduces the computational time when new data is fed into the system. A comparative study is carried out where our built model showed high performance than other techniques.
Keywords: primary factor and a valuable source, reliability of customers.
Abstract
Application Framework and Data Processing in IoT based Email System
Vishakha More, Prof. Raghib Nasri
DOI: 10.17148/IJARCCE.2016.56118
Abstract: Internet of Things (IoT) is the concept of connecting multiple objects together in an Internet-based architecture. Applications built around this concept are constantly growing in variety and quantity. The Internet of Things (IoT) has provided a promising opportunity to build powerful applications by leveraging the growing ubiquity of Radio Frequency Identification (RFID) and wireless sensors devices. In IoT enabled systems data from all connected devices can be generated quite rapidly the volume may be huge and types of data can be various. Processing & Analysis provides proper management of data. There are various email systems available worldwide. The idea IoT based email system is extension to existing email system. In such a system devices can send the notifications in email format, automatic actions are performed if necessary. For such a system, Application framework is necessary and which aims to provide a framework which would allow or facilitates the users to create their IoT applications. In this paper we explained how the IoT based email system is designed with suitable framework and how data can be processed for further analysis
Keywords: Internet of Things, Framework, Microcontroller Module, Cloud Layer, Heterogeneous data.
Abstract
FPGA based Smart Water Distribution System using Wireless Sensor Network
Priyanka J. Ranade, Prof. S. B. Takale
DOI: 10.17148/IJARCCE.2016.56119
Abstract: In Agriculture, water scarcity in field is one of the major problems for farmers since it affect the yield. To get rid of this problem proper distribution of water in field is required. The proposed work aims to develop a system to sense and monitor real time agricultural environment using wireless sensor network that is smart water distribution system. This is realized by network of FPGA based wireless sensor unit called field module which will be spread across the field to cover area under irrigation. The field module detects the soil moisture and communicates these parameters to FPGA based control unit having motor interfacing so that motor action can be controlled automatically. The information transferring between two modules is through ZigBee. Thus the proposed work provides an automatic controlling of irrigation system for proper management of water and labor cuttings.
Keywords: WSN; ZigBee; FPGA; Irrigation
Abstract
Model Driven Embedded System Testing Using Real-Time Data
Pravin Y. Karmore, Pradeep K. Butey
DOI: 10.17148/IJARCCE.2016.56120
Abstract: Model driven development and testing of an embedded system is a great solution over the unnecessary wasting of time and money in the physical development and testing of embedded systems. This paper mainly focuses on the model driven development of an embedded system using the Simulink system development tool and testing of the modelled system to find out the better system using real-time data. The testing of embedded system before the actual development of hardware, software and testing using modelling approach is a very good advantage of the system developers. Today�s embedded system development and testing becomes very complex due to increase in customer demands from household appliances to industry equipment.
Keywords: Embedded system testing, model driven development, image processing, real-time data.
Abstract
Counting people by extracting low level features using Bayesian Regression
Rajshri S Vaswade, Prof. N.A. Dawande
DOI: 10.17148/IJARCCE.2016.56121
Abstract: Counting people is a crucial component in visual surveillance mainly for crowd monitoring and management. Now days, significant improvement has been made on the field by using features regression. On this context, perspective distortions have been frequently studied; however, crowded scenes remain particularly challenging and could extremely affect the count because of the partial occlusions that take place between individuals. To overcome this challenge this paper proposes Gaussian Mixture Model (GMM). It uses background subtraction to obtain highly accurate foreground segmentation for people counting approach. It leads to integrating an uniform motion model. The counting is established on foreground measurements, where perspective normalization and a crowd counting measures the density of a crowd with foreground pixel counts into a single feature. Afterwards, the correspondence between this frame-wise feature such as internal features, segment features, texture features are extracted and these extracted features are applied to the Bayesian regression. Then count is estimated in each frame.
Keywords: Bayesian regression, crowd analysis, Gaussian Processes
Abstract
Speaker Identification with Whispered Speech
Nisha Beegum S
DOI: 10.17148/IJARCCE.2016.56122
Abstract: : For an access control system, which is a speaker identification system based on whispered speech. Speaker identification is a main function of an access control system. Hence, a novel speaker identification system using instantaneous frequencies is proposed. The input speech signals pass through both signal independent and signal dependent filters firstly. Then, we derive the signal�s instantaneous frequencies by applying the Hilbert transform. The analysed instantaneous frequencies are proceeded to be modelled as probability density models. Using these probability density models as the feature in the proposed speaker identification system. Here, compare the use of parametric and nonparametric probability density estimation for instantaneous frequency modeling. Furthermore, propose an approximated probability product kernel support vector machine (APPKSVM). In the APPKSVM, Riemann sum is applied in approximating the probability product kernel. The whisper sounds from the chain speech corpus were used in the experiments. Results of the experiments show the superiority of the existing speaker identification system. For the proposed system using the empirical mode decomposition.
Keywords: MFCC, APPKSVM, FP model, LPCC, IF, EMD, RPS
Abstract
Improved Hessian Curvature for Fingerprint Analysis
Shan Juan Xie, Yanshuang Zhang
DOI: 10.17148/IJARCCE.2016.56123
Abstract: Curvature analysis is important to the fingerprint image which is constructed by a group of regular ridgelines. Five kinds of curvatures constructed by the eigenvalues are tested, including the Gaussian curvature, Mean curvature, Laplacian curvature, Hessian curvature and our improved Hessian curvature. Researching on these five kinds of curvature, we find the relative advantages of our improved Hessian curvature for fingerprint curves. A measure for fingerprint reference point determination based on the eigenvalues of the covariance matrix of the ridges. Fingerprint reference points are determined by combining the global and local proposed curvature properties of ridges by using multi-resolution levels. The performance of the proposed one is verified through simulations and its analysis.
Keywords: fingerprint, reference point, curvature, multi-resolution
Abstract
Energy efficient cluster head scheduling for tiered wireless sensor network
Manish Gupta, Ashutosh Gupta
DOI: 10.17148/IJARCCE.2016.56124
Abstract: Wireless Sensor Network (WSN) has a significant contribution in the field of emerging. Load balancing and optimization of network resources are crucial areas for network longevity. Since clustering is the significant method to enhance system scalability and energy efficiency. In this paper, a multitiered clustering (MTC) technique is introduced. In this technique, the network is subdivided into a number of tiers based on the area of the sensing field. The proposed MTC supports for tiered WSN architecture and selects cluster heads and gateway nodes using Received Signal Strength Indication (RSSI) and residual energy level of the sensor nodes for each tier. The experimental results show that the proposed MTC yields better performance than the existing LEACH, LEACH-C, HEED and DCHS Protocols in terms of energy consumption.
Keywords: Energy efficiency; wireless sensor network; cluster head selection; RSSI
Abstract
Performance Evaluation of Bit Error Rate for Conventional and Wavelet Based OFDM
Makarand N. Patil, Prof. S. S. Savkare, Prof. S. B. Shinde
DOI: 10.17148/IJARCCE.2016.56125
No abstract available.
Abstract
Improved Payroll Service with Hybrid Security Algorithm
Sujith K G, S. Kuzhalvaimozhi
DOI: 10.17148/IJARCCE.2016.56126
Abstract: Payroll services in banks are major sources of their revenue. Almost all the banks have moved to Core Banking and are offering payroll services to corporates. Corporates are utilising this service to a very great extend because of the advantages they offer to them. But now a days the scenario has changed. Wage related information is expected to be kept as a secret and hence the topic of concern is how effectively the payroll software maintain secrecy and ensure data integrity while preserving a secure channel for information interchange. This paper provides a hybrid algorithm for improving the payroll processing in banks which employ branch banking.
Keywords: Payroll Service, Hybrid cryptography, AES, MD5
Abstract
Detection Strategy for Multiple Access Spatial Modulation Channel Based on Compressive
Pooja Chandankhede, Manish Sharma
DOI: 10.17148/IJARCCE.2016.56127
Abstract: Wireless mobile communication has to deal with the problem of data traffic generated due to tremendous increase in wireless applications and the total energy consumption by them. The technology which deals with both these challenges is spatial modulation. Spatial modulation(SM) is a technology developed in multiple input multiple output (MIMO) by reducing its RF complexity. In conventional MIMO energy efficiency is incorporated by number of antennas at base station(BS), whereas SM switch on subset of antennas at BS instead of activating all the antennas simultaneously which reduces the complexity of cellular network. But it causes signal processing load which can be reduced by incorporating compressive sensing. A detector, based on the compressive sensing(CS) principles, for multiple-access spatial modulation channels with a large-scale antenna base station is proposed. Particularly, the use of a large number of antennas at the BSs and the structure and sparsity of the SM transmitted signals is exploited to improve the performance of conventional detection algorithms. Effectiveness of proposed strategy will be verified through simulation study on the basis of throughput, signal to noise ratio and bit error rate.
Keywords: Spatial modulation, compressive sensing, multiple access channels.
Abstract
An Analytical Study on Key Management in Mobile Ad-Hoc Network
Dr. S. Dhanalakshmi, R. Anupryia
DOI: 10.17148/IJARCCE.2016.56128
Abstract: Mobile Ad hoc Network (MANET) is a collection of wireless infrastructure less network. The topology of the network changes continuously. Due to the dynamic structure of MANETs, they are prone to various types of attacks. The traditional security solutions for MANETs are inadequate, hence security should be maintained at all the levels. Many key management schemes for MANETs are presented to solve various security problems. Usually the cryptography techniques are used for secure communications in wired and wireless networks. Identities (ID)-based cryptography with threshold secret sharing, ECC and Bilinear Pairing computation are popular approaches for the key management design. The task of key management includes keys for generation, distribution and maintenance. Key maintenance includes the procedures for key storage, key update, key revocation. Thus the security is enhanced at various levels which prevent strong malicious attacks. In this paper, we adopt these approaches to construct tree structure and cluster structure ad hoc network and then give out a three-level security communication ad hoc network.
Keywords: MANET, wireless security, Elliptic Curve Cryptography, ID-based key management.
Abstract
Cryptography
Mr. Swapnil S. Dalve
DOI: 10.17148/IJARCCE.2016.56129
Abstract: The uses of computer & communication systems by industry has increased day by day and the theft of proprietary information is also increased. For protecting those information encryption is a primary method which is used for protecting valuable electronic information now a days by the industry and military department. Cryptography is the most important aspect of communication and network security. Cryptography is encryption and decryption of the information which is transferred through internet and even more than this. Authentication is a part of privacy which provides the unique identity to the sender and receiver too. We use authentication in everyday lives - when we sign our name to some documents it shows that it�s a valid document for this we need to have electronic techniques for providing authentication. A digital signature is also works like authentication in which sender needs to use his own digital signature which show that the information is send by the authorized sender. These cryptographic mechanisms can be used to control access to a shared disk drive, a high security installation. The problem of providing the security to the electronic information and electronic business transaction are became critical so for securing this data we are using all the above techniques: Symmetric Encryption Algorithm, Asymmetric Encryption Algorithm and many more.
Keywords: RSA- Rivest-Shamir-Adleman, DS- Digital signature, DES- Data Encryption Standard, 3DES- Triple Data Encryption Standard, AES-Advanced Encryption Standards, IDES- International Data Encryption Standard, Encryption, Decryption, Cryptography.
Abstract
CMS: An Improved Scheme for Dependency-Based Load Balancing in Cloud Environment
Neethu M.S, Jayalekshmi .S
DOI: 10.17148/IJARCCE.2016.56130
Abstract: Cloud computing provides an opportunity to dynamically share the resources among the users through virtualization technology. In this paper, a scheme for load balancing is proposed on the basis of dependency among the tasks. CMS consists of three algorithms including Credit-based scheduling for independent tasks, Migrating Task and Staged Task Migration for dependent tasks. The Credit-based method is used for scheduling the independent tasks considering both user priority and task length. Each task will be assigned a credit based on their task length and its priority. In the actual scheduling of the task, these credits values will be considered. Task Migration algorithm is used to guarantee balancing of loads among the virtual machines. Task migration is done such that the tasks get migrated from heavily loaded machines to comparatively lighter ones. Thus, no rescheduling is required. For dependent tasks, the dependencies between tasks are considered and the technique termed as data shuf?ing is used. In data shuffling, a job is divided into several tasks according to the execution order. The method used here is that the tasks in one stage run independently, while the tasks in different stages must be executed serially. Finally the system is simulated and experiments are conducted to evaluate the proposed methods. This work also concentrates on a simulated study among some common scheduling algorithms in cloud computing on the basis of the response times. The algorithms being compared with the work includes: Random, Random Two Choices (R2C) and On-demand algorithms. The evaluations demonstrate that Credit-based scheduling algorithm significantly reduces the response time.
Keywords: Load Balancing, Virtual Machine, Scheduling, Dependency.
Abstract
Attendance Collection System: Comparison of Different Approaches
Muralidharan P, V.K. Annapurna
DOI: 10.17148/IJARCCE.2016.56131
Abstract: Attendance collection is an important activity in every organization whether it be an educational institution or any other organization with employees. Attendance information collected has to be accurate and needs to be maintained properly to make sure that the organization can carry on with its activities smoothly. The main challenge in attendance collection is that there are variety of techniques which are introduced to reduce the effort for data collection and by making sure that the collected data is accurate. In this paper we are going to compare those techniques and understand which among them can be best used in different scenarios.
Keywords: Attendance collection, Attendance management, RFID, Attendance system comparison.
Abstract
Implementation of Convolutional Encoder by XOR-Free Approach
Pankaj Kumar, Deepak Kumar
DOI: 10.17148/IJARCCE.2016.56132
No abstract available.
Abstract
Development of Integrated Message alert system for Weather Informatics
Nagaraj Bhat, Shricharana U, Pratheek P Hegde, Shetty Neha Karunakar, Srikanth Rao P, Shreya, Krushna Chandra Gouda
DOI: 10.17148/IJARCCE.2016.56133
Abstract: This paper introduces a prototype on integrated weather informatics. Weather information delivery has been a major concern in India. This prototype can solve this problem as it uses two widely used communication systems i.e. TEXT SMS and Email. The prototype has been divided into modules and explained individually. Customizing and reimplementation can be done to suite any requirement specification by the reader.
Keywords: Web Server, Trigger, SMS Gateway.
Abstract
Multi-cell Resource Block Allocation Frequency Reuse Scheme with Optimal Power
Vivek C Mohite, Shilpa Lahane
DOI: 10.17148/IJARCCE.2016.56134
Abstract: In the wireless cellular systems, generally two things are most important; the one is shortage of spectrum and interference. 4G systems provides high bandwidth to the end user, but to achieve high bandwidth some problems has been arises, like intercell interference and this intercell interference affects the cell capacity and the overall system throughput. Some interference cancellation techniques are used to increase the cell user capacity but the main drawback of these techniques are power provided to the all user with in a cell remain same to every user. In this paper, we propose a multicell resource block allocation method, which dynamically optimizes subcarrier and power allocation of every user due to which system capacity got increased in multicell networks. To improve system capacity this algorithm is useful. Simulation results shows that by the multicell resource block allocation algorithm we can achieves increased network capacity and high throughput.
Keywords: Next Generation Networks (NGN), Long Term Evolution (LTE), Soft Frequency Reuse (SFR), Fractional Frequency Reuse (FFR).
Abstract
Adaptive Optimal Handover Parameters Adjustment Technique for Conflict Avoidance in LTE
Nikhil Mathane, Manish Sharma
DOI: 10.17148/IJARCCE.2016.56135
Abstract: LTE is the advanced network ,used for cellular network communication, Load balancing is the main problem ,to overcome the load balancing handover technology is implemented Handover Parameters Adjustment for Conflict Avoidance (HPACA) is proposed. Taking into consideration the movement of users, HPCAC can adaptively adjust handover range to optimize the mobility load balancing. The motion of users is an prime factor of handover, which has a noticeable impact on system performance. The numerical calculation of results show the proposed approach provide better results than the existing method in points of call blocking ratio, throughput, load balancing index, radio link failure ratio and call dropping ratio
Keywords: Self organizing network, Long Term Evolution, Long Term Evolution (LTE), Mobility Load balancing (MLB), Mobility Robustness Optimization (MRO)
Abstract
Next Generation Electronic Voting Machine
Navnath Baban Belote, Sneha Revankar
DOI: 10.17148/IJARCCE.2016.56136
Abstract: India is the world�s largest democratic country. Fundamental right to vote forms the basis of Indian democracy. In India all earlier elections, be it state elections or central elections a voter used to cast his/her vote to his/her favourite candidate by putting the stamp against his/her name. Then folding the ballot paper as per prescribed method before putting it in the ballot box. This is a long, time-consuming process and prone to errors. Over the years, there was a pronounced increase in the volume of work: millions of ballot papers had to be printed and lakh of ballot boxes had to be manufactured, transported, and kept in storage; and a great amount of time was taken up by the conduct of elections. To overcome these difficulties, the Election Commission of India (ECI) thought of electronic gadgets. The Electronics Corporation of India Limited (ECIL), Hyderabad, and Bharat Electronics Limited (BEL), Bangalore, developed the electronic voting machine in 1981. The proposed Electronic Voting Machine is based on Raspberry Pi model 2B which will be convenient for every citizen at the polling booth. Unique Identification Number (UID)/Aadhar Card will be used for identification of a voter.
Keywords: putting the stamp against his/her name, central elections a voter, Election Commission of India (ECI)
Abstract
Portable Camera Based Assistive Text Reading from Hand Held Objects for Blind Person
Ashwini V. Mhaske, Mahesh S. Sadavarte
DOI: 10.17148/IJARCCE.2016.56137
Abstract: We propose a camera-based assistive text reading framework to help blind persons to read text labels from hand-held objects in their day to day lives. In this paper Camera acts as main vision to capture the image of product packaging and hand held objects. To isolate the object from complex backgrounds, we first propose an effective motion-based method to define a region of interest (ROI) in the image. In the extracted ROI, text localization and recognition are conducted to acquire text information. Then text characters are recognized by off-the-shelf optical character recognition (OCR) software. Using text to speech convertor the extracted texts are output in audio output.
Keywords: camera-based assistive text reading, motion-based method, text localization and recognition, off-the-shelf optical character recognition
Abstract
Clustering Sentence Level Text using Hierarchical FRECCA Algorithm
Mujawar Nilofar Shabbir, Prof. Amrit Priyadarshi
DOI: 10.17148/IJARCCE.2016.56138
Abstract: Text Processing is essential to organize data or to extract needful information from a heap of available Big Data. Sentence clustering is one of the processes used in Text mining task. Text document may contain Hierarchical structure which relate to more than one theme at a same time. Hence Hierarchical Fuzzy Clustering Algorithm can be used for clustering such text data. The paper presents a novel Hierarchical Fuzzy Relational Eigenvector Centrality-based Clustering (HFRECC) Algorithm which is extension of FRECCA Algorithm. It solves the problems like complexity, sensitivity and changeability of clusters and is useful for natural language document (NLP) and operates in Expectation-Maximization Framework and is capable to identify overlapping clusters. The algorithm uses graph representation of data and works on relational data provided viz., data in pairwise similarities among data objects.
Keywords: HFRECCA, FRECCA, Page-rank, Sentence clustering, Expectation-Maximization.
Abstract
Secure Data Transmission with Hierarchical Clustering Based WSN
Shital Mohan Mane, Asst Prof. Madhav D. Ingle
DOI: 10.17148/IJARCCE.2016.56139
Abstract: A wireless sensor network (WSN) is a network system for geographically distributed resources using wireless sensor nodes to observe physical or environmental conditions such as temperature, motion, and sound. The nodes are individually capable to send data to one or more collection points in a WSN to sense their environments and processing the information data locally. WSNs are great solutions for most applications and security is often a major concern. Though research regarding cryptography, secures routing, key management, intrusion detection, and secure data aggregation in WSNs is done until today, there are still some challenges to be addressed. These challenges are like first selection of proper cryptographic method second factors affecting sensors like memory, speed, and bandwidth, third challenge is, most of the available protocols assume that the sensor nodes and the base station are stationary. Sensor node and base stations in some situations like battlefield need to be mobile. The sensor network topology is been extensively affected by mobility of sensor nodes and so raises many issues about secure routing protocols. This paper surveys various security issues related to cluster based WSNs and existing security protocols.
Keywords: Cluster-based WSNs, ID based digital signature, Secure data transmission, wireless sensor networks, secure routing protocol.
Abstract
Use of multicast routing protocols for Comparative performance analysis in Wireless Mesh Network
Ms. Vasundhakumari, Prof. B.A Patil
DOI: 10.17148/IJARCCE.2016.56141
Abstract: In recent years multicast routing in wireless mesh network has became adversary research, in the earlier protocols such as unicast routing considered hop count as path selecting metric where as recent protocols such as multicast routing considered link quality as path selecting metric. Hop count will not increase throughput, the main focus is to improve link quality and maximize the throughput. To achieve high throughput On Demand multicast routing protocol-High throughput(ODMRP-HT) protocol is used but nodes in wireless mesh network are incorporated to more attacks as nodes act as malicious nodes. This works gives the solution to defend against the attacks identified using Secure-On Demand Multicast routing protocol(S-ODMRP). In this paper gives a comparison of detailed simulation analysis of both the protocols. S-ODMRP protocol will give better performance than ODMRP.
Keywords: unicast routing, multicast routing, ODMRP-HT, S-ODMRP.
Abstract
Weather Prediction Based on Big Data Using Hadoop Map Reduce Technique
Basvanth Reddy, Prof. B.A Patil
DOI: 10.17148/IJARCCE.2016.56142
Abstract: The assists of big data collects large volume of data, it is great computational challenge for the big data Hadoop which uses map reduce to maintain and process this data and also helps to extract useful information in an efficient manner . Keeping these things in mind there is need for designing system architecture that helps to predict weather forecast for future. It helps people to take decision in advance for their any outdoor events. In our proposed architecture there are 3 main units, such as: Data acquisition unit, Data processing unit, Data analysis and decision unit. DAU collects data from the satellite and sends to the different base station and finally stores in the national climatic data centre (NCDC).DPU it plays key role in the architecture, it takes the data from the NCDC and HDFS takes the data from this NCDC and store in it and later processed by MapReduce framework and produce required output .DADU it performs the compilation based on the results produced by the DPU and makes decision to produce required results. Hence in our proposed architecture we are focusing on the offline data that is stored in the NCDC to predict the weather analysis by Hadoop map reduce framework the output of result consists of, minimum temperature, maximum temperature, number of hot days and cold days and also predict future weather forecast, which brings the great significance of our work.
Keywords: Big data, HDFS, Hadoop, YARN, MAPREDUCE.
Abstract
Accident Prevention of Pedestrian on Road
Shivkumar V Biradar, Prof. S. M. Kulkarni
DOI: 10.17148/IJARCCE.2016.56143
Abstract: Efficient and instant recognition of pedestrian moving across road by vehicle�s ECU system is very challenging and it is crucial. As the shape features of on-road pedestrians are irregular and complex, and the computation for detection is very complex. To resolve this challenge, we propose fast pedestrian detection algorithms based on histogram of oriented gradients (HOGs), and support vector machines (SVMs). This technique is evaluated and implemented in on any embedded systems which can communicate with vehicle ECU and make the detection of pedestrian with the required action to avoid collision. This approach is improvised for this challenge.
Keywords: Pedestrian collision, Application of HOG, Accident avoidance.
Abstract
Design and Fabrication of Double T-monopole Antenna for Dual Band Wireless Communication
Akshay R Markad, Prof. A S Patel
DOI: 10.17148/IJARCCE.2016.56144
Abstract: A novel printed monopole antenna with dual wideband is presented for simultaneously transmitting as well as receiving in wireless local area network (WLAN). A compact and optimized design of a rectangular printed monopole antenna with FR-4 substrate and coaxial feeding technique is presented. The proposed antenna has a double T shape structure mainly designed for dual-band operation at 2.4 GHz and 5.2 GHz for Wireless Local Area Network (WLAN) applications which is in ISM band. This antenna has good impedance matching, return loss (> than -10dB), radiation patterns and consistent gain in required frequency band. The calculated and measured results in terms of return loss and VSWR shows good agreement and the results also shows good wideband characteristics.
Keywords: Dual Band, Monopole, WLAN, Coaxial, ISM.
Abstract
Modeling, Simulation and Analysis of 100Kw grid connected PV system using MATLAB/SIMULINK
Nisha Sharma
DOI: 10.17148/IJARCCE.2016.56145
Abstract: Increasing interest and investment in renewable energy give rise to rapid development of high penetration solar energy. Solar energy is most readily available source of energy. It is Non polluting and maintenance free. There are various models developed in MATLAB/SIMULINK to investigate different aspects of PV technology. In this paper a simulation model has been developed on MATLAB/SIMULINK. This model is developed on the basis of mathematical model of 100Kw grid connected photovoltaic (PV) generation system �Vikram Solar Panel�, installed at B.R.C.M College of Engineering & Technology, Bahal, Bhiwani, India. This module has 18 series and such 24 arrays parallel connected with 60 polycrystalline cells in each module. Taking the effect of irradiation and temperature into consideration, the output current, voltage and power characteristic of PV system are obtain. The results obtained are compared with the practical results. The simulated results are very close to the practical result.
Keywords: Maximum power point tracking, Photovoltaic (PV) system, Module, Grid connection.
Abstract
Car-License-Plate Detection Method Using Vertical-Edge-Detection and Canny Edge Detector
Koshti Sanket V, Prof. R.A. Patil
DOI: 10.17148/IJARCCE.2016.56146
Abstract: Automatic number plate recognition, Car License Plate Detection (CLPD) is a mass surveillance method that uses character recognition on images to read number plates. Existing system focused on character segmentation (CS) and License plate detection in the license plate (LP) recognition system,in which low contrast and dynamic-range problems occurs. In this paper we present a robust car license plate detection method using vertical edge detection algorithm (VEDA) and Canny edge detector. To extract number plate, first image binarization technique is applied.Then for reorganization of LP data, system starts character identification process which is based on VEDA and Canny Edge Detector. After character identification process, results of VEDA are compared with Canny Edge operator and VEDA results. Proposed method shows better accuracy as compare to VEDA alone.
Keywords: Car License Plate Detection (CPLD), VEDA, Character Recognition, Adaptive Thresholding(AT), unwanted-line elimination algorithm (ULEA), LP(license plate),Automatic license plate recognition(ALPR)
Abstract
Parallel PSNM Duplicate Record Detection with Map Reduce
Shubhangi Anandrao Dhane, Prof. Amrit Priyadarshi
DOI: 10.17148/IJARCCE.2016.56147
Abstract: Duplicate detection is a problem of serious substance in many applications, including customer relationship management, personal information management or data mining. Duplicate detection is method of detecting all cases of multiple illustration of same real world object. A representative example is customer relationship management, where a company loses money by sending multiple catalogs to the same person, who in turn is wound up lowering customer satisfaction. Another application is data mining, where correct input data is necessary to construct useful reports that form the basis of decision mechanisms.
Keywords: Duplicate Detection, Entity Resolution, Progressiveness, Pay-As-You-Go, Data cleaning, Map Reduce.
Abstract
Design and Simulation of Multirate Filter using BFD Multiplier Architecture
Mr. Sagar Lohe, Mrs. P.J. Suryawanshi
DOI: 10.17148/IJARCCE.2016.56148
Abstract: Interpolation and Decimation is very much effective in Multirate signal processing application. This paper proposes VLSI architecture polyphase decimation filter with decimation factor using BFD multiplier. High speed, area and power efficient are the main concerns in this VLSI design. The power dissipation can be reduced in polyphase decimation filter when uses with BFD multiplier which consumes low-power when compared to the conventional multiplier. The speed can be improved by using carry look ahead adder. This architecture also provides significant reduction in area (in terms of number of slices).
Keywords: Area, BFD multiplier architecture, Carry look ahead adder, Polyphase decimation filter, power dissipation, Speed.
Abstract
Task manager: Gives open windows information
Mrs. vaishali j. Desai, dr. Kishor h. Atkotiya
DOI: 10.17148/IJARCCE.2016.56149
Abstract: In this paper, we present the development of computer, openwindows detail. The system gets the open windows ID and then returns this windows full name, process id, start time and main window's title. This system is developed in Java. All so define algorithm and work flow of the system. First time start any type of application that time gets application detail.These all work are depend on Microsoft different operating system.it is same as task manager.
Keywords: ProcessId,Time, Windows Title, Icon.
Abstract
A Review: Power generation using rural cooking Method
Keerickal Jithin Abraham, Prof. M. M. Jadhav
DOI: 10.17148/IJARCCE.2016.56150
Abstract: The system is dealing with the generation of electricity from low temperature domestic excess heat. Excess of heat energy from cooking at rural houses can be used for generation of electrical energy. Since burning wooden logs are the method used in many rural areas for cooking food where LPG and Electricity connections are not available. There are a lot of excess heat energy wasted due to this method of cooking. This heat energy can be used to rotate rotor of stirling engine which will be connected to a dynamo. The dynamo results in generation of current. This current can be stored in a battery and can be used later. This may even work if LPG gases are used for cooking. Apart from that, solar panel is also used which will be providing electrical energy to the battery. So the battery is receiving energy from two different sources. This will result in betterment.
Keywords: Electricity generation, Excess heat, Heat recovery
Abstract
Smart Dust
Dr. M.H. Nerkar, Nand kumar
DOI: 10.17148/IJARCCE.2016.56151
Abstract: Smart dust is a tiny dust size device with extra-ordinary capabilities. Smart dust combines sensing, computing, wireless communication capabilities and autonomous power supply within volume of only few millimeters and that too at low cost. These devices are proposed to be so small and light in weight that they can remain suspended in the environment like an ordinary dust particle. These properties of Smart Dust will render it useful in monitoring real world phenomenon without disturbing the original process to an observable extends. Presently the achievable size of Smart Dust is about 5mm cube, but we hope that it will eventually be as small as pack of dust. Individual sensors of smart dust are often referred to as motes because of their small size. These devices are also known as MEMS, which stands for micro electro-mechanical sensors.
Keywords: Smart dust, millimeters, MEMS.
Abstract
A Study on Proxy Re-Signatures for Public Auditing of Shared Data on the Cloud
Jyothi Anantula
DOI: 10.17148/IJARCCE.2016.56152
Abstract: Cloud computing has evolved as the current major technology in IT industry .Among many services provided by the cloud, data service has much importance and is very much susceptible as the data can be shared and modified by different users in the group . As the cloud cannot be trusted, the owner of the data can delegate the task of checking integrity of the shared data .In this paper a study is made on some proxy re-signature schemes and also a public auditing scheme using the idea of proxy re-signatures for efficient integrity checking of data
Keywords: Integrity, Proxy, cloud, shared data
Abstract
Privacy Enhancement of User Data and Images on Content Sharing Sites
Gaikwad Swati Shankar, Prof. Amrit Priyadarshi
DOI: 10.17148/IJARCCE.2016.56153
Abstract: In today�s world, sharing of personal information like images more easily due to the enhancement in content sites. Number of images user can share with more number of people. Increasing use of social media violates the privacy of contents due to large amount of sharing of the data. With the purpose to help the users to compose privacy settings for the images shared through social sites and improve content search method. This paper introduces a system called Adaptive Privacy Policy Prediction (A3P) system through which users can create their privacy settings for images and to satisfy other needs. The different contents like social context, image content, and metadata are administrated for users� privacy preferences. According to the history available on the site previously paper implement two level frameworks to provide a best privacy for the images which will be uploaded by the users. The images uploaded are classified according to the image categories and policy prediction algorithms on which our implementation depends and generates a particular strategy for user uploaded images and characteristic.
Keywords: Content sharing sites; Metadata; Privacy; Clustering; Cluster Labeling.
Abstract
Timeline Generation for Progressive Tweet Stream
Dhanshri A. Nevase, Prof. Amrit Priydarshi
DOI: 10.17148/IJARCCE.2016.56154
Abstract: Now a day�s use of twitter, face book such type of micro blogging services are increased. People post his services on this sites every day .Going through this millions of tweets are difficult because that tweets contains redundancy and noise. This paper consider continuous arriving tweet stream to generate timeline. Timeline is a way of displaying a list of event in chronological order. To generate a timeline first require to cluster all tweet stream of related topic then summarize that tweet stream by continuous summarization and then generate timeline automatically from tweet stream. In traditional method dates of summaries are already pre-defined to produce timeline. In this paper timeline discovers changing dates and topic changes and generate timelines dynamically during the process of continuous summarization. This paper focus on efficiency and scalability factors.
Keywords: continuous summarization, tweet stream, timeline, summary.
Abstract
Implementation of CELP and MELP Speech Coding Techniques
Rhutuja Jage, Savitha Upadhya
DOI: 10.17148/IJARCCE.2016.56155
Abstract: Speech is one of the natural ways of communication amongst humans. Nowadays there is insatiable demand for speech communication as it carries more information like speaker identity, emotional state, prosodic nuance which adds naturalness in communication. With rapid growth and increased number of applications there exists a need for devising an approach for data compression techniques which reduces communication cost by using available bandwidth and storage space effectively. The speech coding techniques helps to achieve lower bit rate by simultaneously maintaining the original speech quality.This paper aims at implementing the CELP (Code Excited Linear Prediction) and MELP (Mixed Excitation Linear Prediction) coding techniques of speech using MATLAB R2009a. These coding techniques are analyzed on the basis of subjective and objective tests like Mean Square Error (MSE), Mean Opinion Score (MOS) and Signal-to-Noise Ratio (SNR). The analysis of CELP speech coding technique shows that this technique is an improvement to a coder called Linear Predictive Coder (LPC). It is an efficient coding technique having bit rate in the range 9.6 kbps to 16 kbps. The analysis of MELP coding technique shows that this coder removes the voicing error in two state excitation model of LPC. It is a low bit rate coder having a bit rate of 2.4 kbps and mainly used by military and Federal Standards. The comparative results of different values which are obtained for CELP and MELP coding techniques give a clear idea about more efficient coding technique.
Keywords: Speech coding, Linear Prediction (LP), CELP (Code Excited Linear Prediction), MELP (Mixed Excitation Linear Prediction)
Abstract
A Review: Identification of Annotations for Circuit Symbols in Electrical Circuit Images
Mohammad Tafhim Khan, M. Tahseenul Hasan, Waseem Maroofi
DOI: 10.17148/IJARCCE.2016.56156
Abstract: Though electrical circuit annotations are integral part of Electrical circuit symbol, special attention is yet to be given on their interpretation, identi?cation and storage. This paper presents a proposed method for segmentation and identi?cation of annotations associated with electrical symbols in a circuit diagram images. Our proposed method will ?rst separates the text region around an electrical/ electronic circuit diagram, then identi?es the annotation of electrical circuit part of the segmented text corresponding to that particular annotated electrical symbol. In symbol identification morphological operations can be used. At the end an ef?cient OCR will be used to get the numerical values of the symbols along with their units with comparing it with stored database in MATLAB environment.
Keywords: Symbol recognition, electrical symbols, morphological operation, text annotation, OCR.
Abstract
Cyber Security Approach using Data Mining for Malicious Code Detection
Ms. Poonam Bhagwandas Godhwani, Ms. Jayshri Arjun Patil
DOI: 10.17148/IJARCCE.2016.56157
Abstract: A serious security threat today is malicious executables, especially new, unseen malicious executables often arriving as email attachments. These new malicious executables are created at the rate of thousands every year and pose a serious security threat. Current anti-virus systems attempt to detect these new malicious programs with heuristics generated by hand. This approach is costly and oftentimes ineffective. In this paper, we present a data-mining framework that detects new, previously unseen malicious executables accurately and automatically. The data-mining framework automatically found patterns in our data set and used these patterns to detect a set of new malicious binaries. Comparing our detection methods with a traditional signature based method, our method more than doubles the current detection rates for new malicious executables.
Keywords: serious security threat, ineffective, accurately and automatically
Abstract
A3P System for Image Uploading
Sucheta Shinde, Swarupa Kamble
DOI: 10.17148/IJARCCE.2016.56158
Abstract: With the sharing of images on social media such as Facebook, twitter, etc. increases, maintain their privacy becomes the major problem. As user shares their private images on social sites, people expect more tools to allow them to regain control over their privacy. By considering this need, we propose an Adaptive Privacy Policy Prediction (A3P) system which provides user convenient privacy settings by automatically generating personalized policies. To define users� privacy preferences we consider the different factors such as social environment, personal characteristics, image content and metadata. We also consider the side information of the user such as contact list, visitors view and previous settings. For the images being uploaded, we define the best available privacy policy for the user based on the users� available history on the site. For that we propose a two level framework. A3P system relies on the image classification framework for image categories which may be associated with similar policies and on a policy prediction algorithm to automatically generate a policy for each newly uploaded image, also according to users� social features. We increase the efficiency by using the side information of the user.
Keywords: Social media, content sharing sites, metadata, policy mining, policy prediction.
Abstract
Smart Parking System for Monitoring Vacant Parking
Ndayambaje Moses, Y. D. Chincholkar
DOI: 10.17148/IJARCCE.2016.56159
Abstract: Worldwide, vehicles have become a very significant means of transport in which results into a huge number of cars that are owned in various cities, in turn traffic congestion and pollution leads. At top of all, parking has become the sparking factor of the mentioned problems. This paper puts an eye on various techniques as far as the smart parking system (SPS) is concerned which are already implemented. In looking after this parking issue, big number of authors contributed a lot in monitoring SPS and management of SPS with the help of various technologies including wireless sensor network, Bluetooth, Zigbee, RFID, GSM, Cameras, Image processing, IoT accompanied by a number of software solutions based on mobile application. Following this survey will enhance researcher�s thought on SPS which will result in a real solution of the technique and algorithms for ultimate SPS.
Keywords: Smart parking system, wireless sensor network, Reservation, IoT
Abstract
An Approach to Adapt Sensing Methodology via Magnetic or Pickup Sensing to Hall Sensing for Diesel Engine
Pulkit Sanadhya, Vivek Dixit, Manoj. S. Nagmode
DOI: 10.17148/IJARCCE.2016.56160
Abstract: Sensors are used to measure different physical parameters which is being done by capturing the variation in a physical quantity to an equivalent electrical signal and vice versa holds good for the actuators. An array of sensors is being commonly used during advanced electronic engines platforms development to achieve precise and controlled emissions and to meet legislative requirements as per time and notifications as and when required. In order to achieve these requirements a sophisticated controlled electronic system is a need of hour and sensors are inevitable components for achieving the same. Different sensing control loops are applied and implemented in various electronic engines. This paper proposes an approach to develop the hall effect sensor for genset application which encapsulates optimized signal strength as well as increased fan-out by keeping the mounting dimensions same as that of existing sensor. The parameters scrutinized for defining the performance in the system are falling rate, fall time, frequency, rising rate and rise time.
Keywords: Hall sensor, Magnetic pickup sensor, Electronic control, Diesel Engine, Emission control, Genset application
Abstract
Development of a Decision Support System for the Diagnosis of Neuromuscular Disorder using Neural Network
Syed Irfan Ali, Sunita Parihar, Deepak Kapgate
DOI: 10.17148/IJARCCE.2016.56161
Abstract: Since past few years, researchers have been concentrating on the classification of Electromyography Signal. This method is very beneficial in detecting the neuro-muscular disorders, which consists of wide spread diseases affecting peripheral nervous system. Progressive muscle weakness is the major form of these disorders. Out of various proposed methods, scholars are commonly focusing on Neural Network for its accuracy. And the basic variant feature, Motor Unit Action Potential is selected for classification. Out of various available tools, this research uses Discrete Wavelet Transform as a tool for classification and for the training of N-Network, a multilayer feed forward neural network with back propagation algorithm is used.
Keywords: Artificial neural network (ANN); Discrete wavelet transform (DWT); feed forward neural network (fNN); Motor unit Action Potential (MUAP); Amyotrophic Lateral Sclerosis (ALS); k-Nearest Neighbors (kNN); Electromyography (EMG)
Abstract
A Review on Trust Based Method to Detect Black Hole Attack in Manet
Priyanka Donga, Shraddha Joshi
DOI: 10.17148/IJARCCE.2016.56162
Abstract: Self configuring nature of MANET exposes itself to variety of active and passive attacks. Black hole attack is an active attack which creates disruption in communication path. There are two types of black hole attack i.e. single black hole attack and collaborative black hole attack. We have considered single black hole attack. In this research work, single malicious node doesn�t allow the transmission of legitimate packets to the receiver and drop that packet. In this work in trust we present a detailed survey on various trust computing approaches and this approaches are used find the black hole attack in MANET.
Keywords: Network Security; MANET; Effects; Black hole attack; trust
Abstract
Survey: Mobility Assistive Devices for Blind People
Sumit S. Parale, Prof. Dr.Shripad S. Bhatlawande
DOI: 10.17148/IJARCCE.2016.56163
No abstract available.
Abstract
A Study On “VIDEO SUMMARIZATION”
Tanuja Subba, Bijoyeta Roy, Ashis Pradhan
DOI: 10.17148/IJARCCE.2016.56164
Abstract: Nowadays, a huge amount of multimedia data is being processed, browsed, retrieved which makes its delivery slower and computation cost expensive. The technique video summarization is one of the ways of managing video and browsing and is extended in order to process entire video information in minimum amount of time. This technique makes user easier for quick browsing of large amount of data. It is a process of creating a summarized view or an abstract view of an entire video in minimum amount of time and also removing duplication or redundant features by extracting key frames and video skims. There are two ways to generate a sample video they are static and dynamic which are categorized into two main technique of video summarization i.e. key frame based and video skimming respectively. This paper focuses on the approach of static and dynamic technique.
Keywords: static video summarization, dynamic video summarization, key frame, video skim.
Abstract
Authentication and Data Repairing of Document Image using Steganography Method
Rahil Khan, Ruhina Quazi
DOI: 10.17148/IJARCCE.2016.56165
Abstract: This paper attempts to propose a novel technique of blind authentication based on the method of secret in addition to data repair capability for grayscale document images through the use of the Portable Network Graphics (PNG) image. For every block of a grayscale document image, an authentication signal is generated, which, along with the block content in binary, is transformed into numerous shares using the Shamir secret sharing scheme. The parameters involved are carefully selected so that as many shares as possible can be generated and embedded into an alpha channel plane. After this, the alpha channel plane is combined with the original grayscale image to yield a PNG image. During this process, the computed share values are recorded as a range of alpha channel values near their maximum value of 255 to return a transparent stego-image with a disguised effect. In the image authentication process, marking of an image block is done as tampered, if the authentication signal computed from the current block content does not match the one extracted from the shares embedded in the alpha channel plane. Each tampered block is then subjected to data repairing by a reverse Shamir scheme after collecting two shares from unmarked blocks. Procedures to protect the safety of the data that lies concealed in the alpha channel have been proposed. Decent experimental results demonstrate the efficiency of the proposed method.
Keywords: Data hiding, data repair, grayscale document image, image authentication, Portable Network Graphics (PNG) image, secret sharing.
Abstract
Indian currency recognition for visually disable people using image processing
Sonali P. Bhagat, Sarika B. Patil
DOI: 10.17148/IJARCCE.2016.56166
Abstract: Currency is the means for exchange of articles, goods, etc. Money related transaction is an important part of our day to day life. With the consideration of visually disabled people or blind people, it is somewhat difficult task to identify the paper currency as it has same feel without any brail marking on it. Even though denomination based on size may or may not be identified but it is almost difficult to identify whether the note is original or fake. It is the question on edge to develop such a system that will make sure for visually disabled or blind people that the currency they have is original or not. The currency recognition algorithm discussed in this paper using image processing is based on an ORB (Oriented fast and Rotated Brief). It is faster and also rotation invariant. The proposed algorithm shows 90% true recognition rate.
Keywords: Currency recognition, Denomination, ORB, visually disabled.
Abstract
Review on Design Methodologies for Low Power VLSI Architecture
Wasim Maroofi, Sanjay R. Ganar
DOI: 10.17148/IJARCCE.2016.56167
Abstract: Present generation of electronic design scenario demands low power architectures. In earlier days, power was secondary as the field was premature and main concerns of design engineers were size, throughput and cost. However trade off exists between the metrics namely, size, throughput, cost and power according to the famous design metric competition theory of VLSI systems wherein improving one deteriorates the other metric. The performance of any circuit is affected greatly by its components. Optimization of the design is accomplished by compromising design issues as well as components. With the ever-shrinking technology, especially below 90 nm, power dissipation and its management has been critical for the design engineers.Significance of optimization has been understood from the fact that how important it is to have an extended battery life and at the same time reducingthe package cost. This paper presents a literature review upon the strategies and methodologies in designing low power VLSI systems.
Keywords: VLSI systems, Low power management, Low power strategies, power dissipationand Power optimization.
Abstract
Mapping of Turbo Encoded bits with 64-QAM modulator for spectral efficiency in LTE
Kajal Bambole, Rutuja Deshmukh, Neelam D. Deshmukh
DOI: 10.17148/IJARCCE.2016.56168
Abstract: In turbo-coded transmission systems, several ways of allocating the bits generated by the turbo encoder can be considered. Thus the bits generated by turbo encoder can occupy different positions in the modulator input symbol. In this paper, we have considered the performance of transmission systems, in terms of bit/frame error rate with respect to signal to noise ratio (BER/FER vs SNR) for both single binary turbo code of the LTE standard with coding rates 1/3 and 2/3 and also double binary turbo code of the DVB-RCS2 with coding rate 2/3. The simulation results show that different investigated allocation methods affect the performance of bit/frame error rate with respect to signal to noise ratio of the turbo coded system. The simulation result provides certain conclusions for the selection of best allocation methods, both in waterfall region and error floor region.
Keywords: turbo codes, modulation, QAM, LTE.
Abstract
Surveillance of Wi-Fi Devices with Privacy Preservation and Evading Anonymous Usage
Gokulnath G
DOI: 10.17148/IJARCCE.2016.56169
Abstract: Wired networks are increasingly being replaced by wireless networks due to its varied advantages. Open access networks are implemented in most of hotels, libraries and institutions throughout the world. Many security measures and protocols are adopted for securing the wireless personal area networks. The flaws in wireless networks and limitation of security protocols have increased the number of attacks as well. As a result a secure system has to be developed that can prevent attack to the wireless networks by identifying the location of the mobile device with only using the current resources.
Keywords: Wi-Fi system, security protocols, attacks to system , location identification, privacy
Abstract
A scalable and consistent event matching service for content-based publish subscribe systems in cloud environment
Dr.V.Goutham, B.Triveni , B.Navya
DOI: 10.17148/IJARCCE.2016.56170
Abstract: The cloud computing affords excessive prospects for the necessities of multifarious computing and consistent communication. Categorized by the increasing arrival rate of live content, the emergency applications that stance a great challenge how to publicize large-scale live content to interested users in a scalable and reliable manner. The publish/subscribe (pub/sub) model is broadly used for data dissemination of its capacity of impeccably escalating the system to colossal size. Most event matching services of existing pub/sub systems either lead to low matching throughput when matching a large number of twisted subscriptions when a large number of servers fail. SREM, a scalable and reliable event matching service for content-based pub/sub systems in cloud computing environment to realize low routing latency and consistent links between servers, a distributed overlay Skip Cloud to organize servers of SREM. Through a Partition technique, large-scale skewed subscriptions are charted into several subspaces, which safeguards high matching quantity and delivers multiple candidate servers for each event. Assessing the concert of SREM, 64 servers are organized and millions of live content items are tested in a Cloud Stack test bed. The tentative results shown that the traffic above of routing events in Skip Cloud is at least 60 percent smaller than in Chord overlay, the matching rate in SREM is at least 3.7 times and at most 40.4 times larger than the single-dimensional partitioning technique of Blue Dove based on various parameter settings. SREM facilitates the event loss rate to drop back to 0 in tens of seconds even if a large number of servers fail concurrently.
Keywords: Publish/subscribe, event matching, overlay construction, content space partitioning, cloud computing.
Abstract
A Selective Control on Access of Photo Sharing on Online Social Network
Anusha Rao, Sonal Fatangare
DOI: 10.17148/IJARCCE.2016.56171
Abstract: Online social networks provides facilities such as sharing, hosting , uploading and photo management which are shared and transferred online on social network. The provision of photo sharing refers to the transfer or posting of a user's digital photos online which facilitates uploading and displaying of images by both websites and applications. It can also be used by the user to manage photo galleries and photo blogs which can make them view the photos but doesn�t allow them to download the photo. If a user is permitted to post, comment and tag a photo then it may reveal user�s privacy, so to solve this problem various systems has been explained that can recognize everyone in the photo. Photos are shared with a range of people with the help of online photo sharing which provides users various innovative alternatives. Many social networking sites is featured with photo sharing which assists users in posting photo to their families, friends and close ones. It ensures the safe upload of the photo and makes every individual present in the photo be aware of the posting activity and as well make them actively take part in the activity of photo posting. This system considers the needs of the users and focuses on the privacy concerns, as well as user�s current behavior and concerns are taken into consideration for the protection of privacy of individuals.
Keywords: Online Social Network, Privacy, Sharing, FR System
Abstract
Secured Data Retrieval for Decentralized Disruption-Tolerant Disaster Networks
Dhanashree Karadi, Umesh V. Somanatti
DOI: 10.17148/IJARCCE.2016.56172
Abstract: The wireless devices carried by the user in scenario such as disaster situation, which may include earthquake, floods, would be temporary disconnected for some time, it would be due to discontinues network connection and partitioning. Disruption-tolerant network (DTN) is one of the successful techniques which allow the devices to communicate with other devices in such situation. This is accomplished by using the storage node as the intermediary node. If the sender wants to send the message or the data to receiver in such scenario where the network connectivity is not continuous, the message is been stored in the storage node of some time. If the receiver wants to access the message it can retrieve from storage node. Attribute-Based-Encryption(ABE) provides a capable approach in which it fulfils the requirement for retrieving of the data in DTN's in a secured way. ABE provides technique in which different access-control for the encrypted message over different access policy can be defined. There are several problems to apply Attribute-Based-Encryption(ABE) for the DTN, in terms of safety and confidentiality of data. The Cipher-text Policy-ABE(CPABE), defines the technique in encryption of the data in such that, sender will define some of the attribute, the receiver must hold to decrypt the data or message, such that different receiver's are permitted to decrypt the different piece of the data as defined in security policies.
Keywords: Attribute-Based-Encryption(ABE), Ciphertext Policy-Attribute-Based-Encryption (CP-ABE), Disruption-tolerant network (DTNs)
Abstract
Proper Use of Adaptive Learning for Student Modeling
Chandrima Chatterjee
DOI: 10.17148/IJARCCE.2016.56173
Abstract: In this paper, it described the application of Moodle adaptively: a definite but average learning management system. In Moodle, after a lots of study about the adaptive e-learning and the quality of being able to ready to perform a proper student modeling which includes the extension of Moodle with domain model, student model and tutoring model to do automatic identifying learning styles and automatic monitoring for a specific student. The future scope of this paper is to test the student�s efficiency method and the student�s assessment test by delivering course content.
Keywords: Adaptive Learning, Intelligent Systems, learning management, moodle, student modeling, activity locking
Abstract
Internet Security against Hacking System
Ms. Pooja D. Jaiswal, Dr. Harshalata J. Petkar
DOI: 10.17148/IJARCCE.2016.56174
Abstract: The internet has been a wide usage in all the fields in the present competitive world. It is used in education, business, research and everything. So it provides security for user�s information or transactions or any other data in every field. In other words, the security attacks are made either by the hackers or the intruders, the ways how they attack and exploit to illegitimate means.This paper is an overview of the security and privacy concerns based on the experiences as developers of E-commerce.E-commerce is a business application that is used to do transaction between the retailers to the customer.And also it is used to do trading between manufacture and supplier. Here we present you the better ways of how to defend from the attacks and protect your personal data without depending on the network provider�s security with the help of personnel firewalls and honey pots.
Keywords: Network security, Hacking, Authentication, Authorization, Encryption, Decryption
Abstract
An Internet Based Interactive Embedded Data Acquisition System
Amruta G. Gangaji, M.U. Inamdar
DOI: 10.17148/IJARCCE.2016.56175
Abstract: Remote Monitoring, Control and intelligent is one of the most important criteria for maximum production and process plant availability. With the development of modern industry, the requirement for industrial monitoring system is getting higher. The main core of the system is an embedded hardware. The embedded device communicates through General Packet Radio Service (GPRS),which makes it accessible from anywhere in the world througha web server built into the embedded device. In addition, GPRSprovides a bidirectional real-time data transfer allowing interaction.The proposed system eliminates the need for server softwareand maintenance. A novel approach is introduced to minimize theoperational costs while operating with a large amount of data.The system is demonstrated to be suitable for different embeddedapplications by attaching several real-time modules throughappropriate interface
Keywords: Data acquisition, GPRS, Internet, Real time Data
Abstract
Support Vector Machine Based Iris Recognition System for Personal Identification
Priyanka V. Bhongade, Prof. Mr. P.R. Rothe
DOI: 10.17148/IJARCCE.2016.56176
Abstract: Iris recognition is emerging as important method of biometrics-based identification systems. Image preprocessing is performing at first, follow by extracting the iris portion of the eye image. The extracted iris part is then normalize and then Iris Code is construct using 1D gabor filter.The selection of the finest feature subset and the categorization has grow to be an important issue in the field of iris recognition. In this paper we propose several methods for iris feature subset selection and vector creation. The acceptable feature sequence is extracted from the iris image by using the contour let transform technique. Contour let transform capture the fundamental geometrical structures of iris image. It decompose the iris image into a set of directional sub-bands with texture particulars captured in different orientations at a variety of scales so for dropping the feature vector dimensions we use the method for extract only significant bit and information from normalized iris images. In this method we disregard fragile bits and finally we use SVM (Support Vector Machine) classifier for resembling the amount of people identification in our proposed system. Experimental result show that most projected method reduces processing time and enlarge the classification accuracy and also the iris feature vector length is much smaller versus the other method. Experimental image results illustrate that, exclusive codes can be generated for every eye image. Iris recognition analysis the features that exist in the colored tissue neighboring the pupil, comparison, rings , furrows and freckles.
Keywords: Biometric-Iris Recognition, Contourlet-Support VectorMachine (SVM), Grey Level co-occurrence matrix(GLCM), IRIS.
Abstract
Implementation of Secure Hash Algorithm-1using FPGA
Ms. Vishakha Borkar, Mrs. A.S. Khobragade
DOI: 10.17148/IJARCCE.2016.56177
Abstract: Sharing of information over the internet becoming a critical issue. To secure the data lots of techniques are available. The present work will focus on the combination of hashing, cryptography to secure the data. Hash value will obtained from original data. Secure hash algorithm is use for hash value. Then the data is encrypted by using cryptography algorithm. Now the hash value and encrypted data must be hidden in image or audio or video file to secure the data. At the receiver end the hash value is match and data is decrypted by using decryption technique.
Keywords: FPGA, hash function, Secure Hash Algorithm-1 (SHA-1), Verilog HDL.
Abstract
Enhanced Hybrid Services in Sensor Networks Using Routing Techniques
Simple Thammaiah, Shabana Sultana
DOI: 10.17148/IJARCCE.2016.56178
Abstract: In WSN, routing protocols play an important role in network performance. This paper mainly deals with quality of service which consists of two parameters namely low delay and data integrity. These parameters are difficult to achieve simultaneously but using IDDR these can be achieved simultaneously. By constructing a virtual hybrid potential field, IDDR separates packets of applications with different QoS requirements according to the weight assigned to each packet, and routes them towards the sink through different paths to improve the data fidelity for integrity-sensitive applications as well as reduce the end-to-end delay for delay-sensitive ones. Using the Lyapunov drift technique, we prove that IDDR is stable. Simulation results demonstrate that IDDR provides data integrity and delay differentiated services.
Keywords: WSN, Data integrity, delay differentiated services, Dynamic routing
Abstract
Big Data solution for Improving Traffic Management System Effectively for vehicular networks
Saili Shinde, Prof. Shital Jagtap
DOI: 10.17148/IJARCCE.2016.56179
Abstract: Nowadays traffic congestion is a serious issue. Traffic congestion is most predominant in metro cities. There are different causes of traffic congestion such as increasing population, rising incomes leading to more vehicles on the road, insufficient capacity of roads to handle traffic etc. Therefore there is a need for optimizing the traffic management system of the city. This paper introduces a new technique using image processing and big data to build a better traffic management system. The system takes CCTV videos installed at various checkpoints as input and converts the video into image frames. Thereafter, background subtraction is performed on these image frames to obtain only objects of relevance. Haar-based cascade classifier is used to detect vehicles and finally vehicle count is performed using parallel computation power of Hadoop.
Keywords: Intelligent traffic system, Big data, transport system, smart city, reduce traffic congestion, vehicle count, video processing.
Abstract
Home Automation Using ZigBee Protocol
Pratik V. Patil, Mahadev S. Patil
DOI: 10.17148/IJARCCE.2016.56180
Abstract: In coming years, the home environment will see a proliferation of network enabled digital connectivity among different appliances. Even though the use of home automation technology is low. This paper highlights the potential of ZigBee [1] through the design and implementation of home automation system. ZigBee based home automation system provides remote access to the user for the monitoring and controlling purpose. To explain the effectiveness and working of the proposed system, four appliances viz. bulb, fan, refrigerator and alarm along with the ZigBee and touch screen enabled remote controller are developed. ZigBee wireless devices are most preferable because of its low power consumption. Previously mentioned advantages of ZigBee take advantage of short-range wireless protocol and provide complete interoperability. This makes the complete home automation wireless which add to its benefits. User can control home switches with ZigBee enabled touch screen.
Keywords: Touch Screen, ZigBee, ARM Controller, Home Automation.
Abstract
Colour–Texture based Image Segmentation Using Effective Algorithms: Review
Ms. Sonali Warudkar, Dr. Prof. M. T. Kolte
DOI: 10.17148/IJARCCE.2016.56181
Abstract: Image segmentation for analysis is a major aspect of perception and till date it is challenging issue for machine perception. Many years of study in computer vision prove that segmenting an image into meaningful regions for subsequent processing (e.g., pattern recognition) is just as hard problem as invariant pattern recognition. This paper discusses the major color-texture image segmentation approaches which treat the colour and texture pattern separately or integrally. And then review the various algorithms with most representative method with their advantages and limitations. Finally summarize the image segmentation methods designed to integrate more feature information, with high accuracy and satisfactory visual entirety.
Keywords: image segmentation, colour texture integration, feature extraction, colour texture analysis, pattern recognition.
Abstract
Meta-Algorithmic Approach for Development of Recommender System
Ms. Priya D. Rakibe, Dr. Anil B. Pawar
DOI: 10.17148/IJARCCE.2016.56182
Abstract: Recommender systems are applied in a variety of applications like movies, music, research articles, social tags and restaurants etc. As these systems have become extremely common in recent years. Providing the good recommendations to the customer based on their usage patterns is the major focus of this paper. Prior research has reported that desired property of recommendation algorithm is the stability and has important implications on user�s trust and acceptance of recommendation. Two scalable, general purpose meta algorithmic approaches based on bagging and iterative smoothing that can be used in conjunction with different traditional recommendation algorithms to improve their stability are introduced in [1].The proposed system is not only for improving the recommendation stability, but are actually able to provide good recommendations based on user�s usage patterns.
Keywords: Bagging, Collaborative Filtering, Iterative Smoothing, Recommender Systems, Recommendation Stability.
Abstract
Optimized Ring Routing Protocol for Wireless Sensor Networks
Mrs. S.G.Salunkhe, Mrs. H.V. Kumbhar
DOI: 10.17148/IJARCCE.2016.56183
Abstract: In a typical wireless sensor network, the batteries of the nodes near the sink deplete quicker than other nodes due to the data traffic concentrating towards the sink, leaving it stranded and disrupting the sensor data reporting. To mitigate this problem, mobile sinks are proposed. They implicitly provide load-balanced data delivery and achieve uniform-energy consumption across the network. On the other hand, advertising the position of the mobile sink to the network introduces an overhead in terms of energy consumption and packet delays. In this paper, we propose Ring Routing, a novel, distributed, energy-efficient mobile sink routing protocol, suitable for time-sensitive applications, which aims to minimize this overhead while preserving the advantages of mobile sinks. Furthermore, we evaluate the performance of Ring Routing via extensive simulations.
Keywords: Mobile sinks, distributed routing, data dissemination, energy efficiency, mobility, wireless sensor networks
Abstract
Multiple Verification for Continuous Secure User Authentication
Poonam Mahale, Mr. Niranjan Bhale
DOI: 10.17148/IJARCCE.2016.56184
Abstract: In the field of internet services secure internet services is important issue. Traditional distributed internet services are based on session management of username password, logouts and user session expiration based on timeouts. Biometric authentication provides solution to substitute password with biometric information in session creation with single verification. In proposed work, additional level of security can be provided & multiple verification can deployed for authentication. In this paper we present continuous authentication of user by multiple authentication. The user identity is continuously verified by applying different authentication in session management. A secure data flow with privacy preservation for the session management by using biometric systems will be offered. This paper described a technique used to secure raw data along with dummy bit insertion in hash code & for less memory utilization. The use of biometric allows identity to be obtained clearly. The result we have obtained based on real data from this research is satisfactory.
Keywords: Web Security, Authentication, Continuous Authentication, Biometric Authentication, Web Services.
Abstract
Invitee Supervision
Manjunath .N, Devaraj Verma C
DOI: 10.17148/IJARCCE.2016.56185
Abstract: Is a security based software that allows people of the organization to keep track of the Guests who are Visiting the organization. It avoids unauthorized persons from visiting the organization. Security is a very big issue since since a small ignorance now may lead to a very big loss and trouble to the organization. IS keep track on the materials that they carry this avoids Guests from carrying the materials that cause threat to the organization. IS maintains details of each and every Guest. IS allows Guest to visit only required department by giving access card.
Keywords: people of the organization to keep track of the Guests, carrying the materials that cause threat to the organization
Abstract
Hybrid Intrinsic and Extrinsic Domain Relevance for Establishing Features in Opinion Mining
Miss. Hafsa N. Mohd Yusuf, Prof. Dinesh D. Patil
DOI: 10.17148/IJARCCE.2016.56186
Abstract: In this paper, we propose a novel technique to identify opinion features options, implicit feature, occasional options and non-noun options features from on-line reviews by exploiting the excellence in opinion feature statistics across two corpora, one domain-specific corpus (i.e., the given review corpus) and one domain-independent corpus (i.e., the contrastive corpus). We have got an inclination to capture this disparity via a live called domain relevance (DR), that characterizes the relevance of a term to a text assortment. We initial extract a list of candidate opinion features choices from the domain review corpus by defining a group of descriptive linguistics dependence rules. For each extracted candidate feature, we've got an inclination to then calculate its intrinsic-domain relevance (IDR) and extrinsic-domain relevance (EDR) scores on the domain-dependent and domain-independent corpora, severally. The aim of document-level (sentence-level) opinion mining is to classify the final judgment or sentiment expressed during a personal review document. We, thus, call this interval thresholding the hybrid intrinsic and extrinsic domain relevance (HIEDR) criterion. Evaluations conducted on real-world review domain demonstrate the effectiveness of our projected HIEDR approach in identifying opinion features choices.
Keywords: IDR, EDR, IEDR, HIEDR, opinion mining, opinion feature
Abstract
Ambiguity Resolution in Text Mining Using Probabilistic and Statistical Approach
Parveen, Khushboo Chandel
DOI: 10.17148/IJARCCE.2016.56187
Abstract: Ambiguity means inexactness. In case of data mining and natural language processing ambiguity refers to have more than one meaning of the same word. A term �Polysemy� is also used for such a situation. This paper presents the process of ambiguity removal in data mining (so that the precise meaning of the word should be clear to the computer) and the problems with ambiguity removal. There are different types of ambiguity with a word. We will use probabilistic and statistical approach to remove the ambiguity attached with the word. Word Sense Disambiguation (WSD) is a must condition for human computer interaction otherwise without it the meaning of the word will not be clear to computer as user wants and this will create problems in further interaction between human and computer if user is dealing with a paragraph instead of a sentence. The probabilities for each word can be estimated from a tagged corpus.
Keywords: Ambiguity, POS Tag, Probability, Text mining
Abstract
IoT based Smart Agriculture
Nikesh Gondchawar, Prof. Dr. R. S. Kawitkar
DOI: 10.17148/IJARCCE.2016.56188
Abstract: Agriculture plays vital role in the development of agricultural country. In India about 70% of population depends upon farming and one third of the nation�s capital comes from farming. Issues concerning agriculture have been always hindering the development of the country. The only solution to this problem is smart agriculture by modernizing the current traditional methods of agriculture. Hence the project aims at making agriculture smart using automation and IoT technologies. The highlighting features of this project includes smart GPS based remote controlled robot to perform tasks like weeding, spraying, moisture sensing, bird and animal scaring, keeping vigilance, etc. Secondly it includes smart irrigation with smart control and intelligent decision making based on accurate real time field data. Thirdly, smart warehouse management which includes temperature maintenance, humidity maintenance and theft detection in the warehouse. Controlling of all these operations will be through any remote smart device or computer connected to Internet and the operations will be performed by interfacing sensors, Wi-Fi or ZigBee modules, camera and actuators with micro-controller and raspberry pi.
Keywords: IoT, automation, Wi-Fi
Abstract
Two Factor Authentication for Secured Login
Nagaashwini Nayak V J, Nagaveni B Biradar
DOI: 10.17148/IJARCCE.2016.56189
Abstract: In the present digital day with remarkable development in Computer sector, Single factor authentication, e.g. passwords, is no more examined as secure in the World Wide Web. It has never been less difficult in Securing the system and remote access. Simple, obvious and easy-to-guess passwords, such as names and age, are effortlessly found via computerized secret key gathering programs. The security and privacy threats through malware are always constantly growing both in quantity as well as quality. Expanded access to information increases weakness to hacking, cracking of passwords and online frauds. In this association the conventional login/password authentication is taken into account inadequately secure for several security-critical applications such as login to Mailing Accounts, Social Networks, Gadgets, Financial accounts, official secured networks, commercial websites online etc. Obliging more than one independent factor increases the difficulty of providing false credentials. Two-factor authentication proposal guarantee a higher protection level by extending the single authentication factor. This paper focuses on the implementation of two-factor authentication methods by using both users friendly traditional Alphanumeric Password and graphical Password as gateway for authentication. An attempt has been made by using two factor Authentication, and in this paper we describe the two factor Authentication system design and design implementation. Thus affording an additional password adds an extra layer of security.
Keywords: Authentication, password, alphanumeric password, graphical password, secured login, network security, data protection.
Abstract
A Review: Image Interpolation by Low-Rank Matrix and Bilinear Method
Nitish Kumar, Prof. N. M. Wagdarikar
DOI: 10.17148/IJARCCE.2016.56190
Abstract: Image interpolation occurs in all digital photos at some stage. It happens anytime you resize or remap your image. Many researchers are working on improving image resolutions with different algorithms. When a low-resolution image is down sampled from the corresponding high-resolution image without blurring, the reconstruction becomes an image interpolation problem. Hence, this is a way to define the linear relationship among side by pixels to reconstruct a high-resolution image from a low-resolution image. In low rank matrix completion and recovery, a process for performing single-image super resolution is initiated by formulating the reconstruction as the recovery of a low-rank matrix. Besides that this method can be utilized to process noisy data. In this paper, we have studied and reviewed different interpolation methods.
Keywords: super-resolution, Image interpolation, low-rank matrix recovery, reconstruction augmented Lagrange multiplier
Abstract
Mechanical Properties of Nanocomposite
Mashal Alenazi
DOI: 10.17148/IJARCCE.2016.56191
Abstract: The effect of microstructure on thermal stability and mechanical properties of co-sputtered deposited Zr�W�B�N thin films on Si (100) substrates have been studied in detail. The power density of boron target has been varied from 0.1 to 7.5 W/cm2 to obtained films of varying microstructure. It was found that there were a lot of dislocations and twins generated in the composite. The process of dislocation or twin generation can dissipate much fracture energy and then increase the fracture toughness.
Keywords: Mechanical, Nanocomposite, Ceramic, AL2O3/SIC.
Abstract
Enhanced Sleep Scheduling Algorithm for Geographic Routing by Data Encoding
Amal Mohan, Dr. Rini Jones S B
DOI: 10.17148/IJARCCE.2016.56192
Abstract: Despite of wide use of Taxi in the main cities for travelling purpose the taxi drivers does not decide in which route they will get more passengers and passengers also does not know when actually the taxi will come to pick up. Because of this problem taxi drivers have to travel from one place to other without any passengers and this is just not wasting time of taxi drivers but they even consume lots of fuel. The taxi drivers do this work to earn money but due to this problem they do not earn that much money at the end of day. So here is a new application for efficient taxi business. Though this is basically design for taxi drivers to improve their revenue but this will also help passengers in some manner.
Keywords: Global Positioning System (GPS); Taxicab: Recommendation System; Cab.
Abstract
Recommendation System for Efficient Taxi Business
Shaikh Nazneen N
DOI: 10.17148/IJARCCE.2016.56193
Abstract: Despite of wide use of Taxi in the main cities for travelling purpose the taxi drivers does not decide in which route they will get more passengers and passengers also does not know when actually the taxi will come to pick up. Because of this problem taxi drivers have to travel from one place to other without any passengers and this is just not wasting time of taxi drivers but they even consume lots of fuel. The taxi drivers do this work to earn money but due to this problem they do not earn that much money at the end of day. So here is a new application for efficient taxi business. Though this is basically design for taxi drivers to improve their revenue but this will also help passengers in some manner.
Keywords: Global Positioning System (GPS); Taxicab; Recommendation System; Cab.
Abstract
A Review: Liver Cancer Detection Algorithm
Abhijeet Patil, Prof. Mrs. V. S. Kulkarni
DOI: 10.17148/IJARCCE.2016.56194
Abstract: The liver is the largest internal organ in the human body. It performs a multiplicity of life sustaining functions and fundamentally affects every physiological process in the body. The liver is the second organ most normally involved by metastatic disease, being liver cancer one of the prominent causes of death worldwide. The early detection and diagnosis of liver tumor is consequential for the detection of liver tumor. Medical image processing is used as a non-invasive method to detect tumors. Many techniques have been developed for the detection of liver tumor utilizing the aberrant lesion size and shape. This paper reviews many different liver tumor detection algorithms and methodologies utilized for liver tumor diagnosis. The novel methodology for the detection and diagnosis of liver tumor is additionally proposed in this paper for the detection and diagnosis of liver tumor.
Keywords: liver tumor segmentation, CT image, computed tomography.
