VOLUME 5, ISSUE 7, JULY 2016
Molecular solutions for the Maximum K-colourable Sub graph Problem in Adleman-Lipton model
Akbar Moazam
An Efficient and Secure Protocol for Ensuring Data Storage Security in Cloud Computing Using ECC
Santosh Kumar Singh, Dr. P.K. Manjhi, Dr. R.K. Tiwari
Securing User Protection in Personalized Web Search Using Slicing Algorithm
Chanda Agarwal, Prof. Dr. Suhasini Itkar
A Low cost Brain Computer Interface Module and EEG Analysis Using MATLAB
Ms. Ashwini Gokhale, Mr. Sunil. M. Patel
Performance Analysis of Topologies using for RWA in Optical WDM Network
Radha Raman Chaurasiya, Jashwant Samar, Durgesh Wadbude
Automated Fruit Classification System
Mr. Udamale Shivaji R., Prof. Nitin Dawande, Prof. Ashish Mulajkar
Contrast Enhancement Technique Using Sub-band Decomposition for OLED Display
Pallavi T. Ghormade, S. K. Bhatia
New Technique to Read Linear Barcodes
Snehal S. Jadhav, S. K. Bhatia
A Review of Use of TCP over Wireless Cellular Networks
Vaibhav Vaidya, Prof. Amutha Jeyakumar
Multilevel Image Compression in Encrypted Domain
Vitthal Shelke, Prof. R.A. Patil
A Practical Approach of Neural Network Based Detection and Prevention of Malicious URL using MATLAB
Varuna, Preeti Gupta
An Improvement of Road Scene Enhancement Using Hybrid Technique
Gagandeep Singh, Er. Sarabjit Singh
Implementation of PSOLA for Comparative Linguistic Analysis of English and Marathi Language
Kavita Waghmare, Pravin Yannawar, Bharti Gawali
An Efficient Video Interpolation Framework for Unwanted Object Removal
Dnyanesh S. Gaikwad, Prof. D. B. Kshirsagar
Design and Simulation of 4T-Cascode Amplifier at 45 Nanometer Technology Node
Arshad Jamal, Dr O.P. Malik
Privacy Protection of Collaborative Data Using Slicing Technique
Sarita Kashid, Prof. Mrs. Manasi K. Kulkarni
Evolution Characteristics of ERP Systems that Distinct from Traditional SDLCs
Basem Zughoul, Mohammed Al-Refai, Nidhal El-Omari
Efficient Data Backup Mechanism for Cloud Computing
Yashodha Sambrani, Dr. Rajashekarappa
Image Restoration Technique to Solve Image Deblurring Problem
Madhuri B. Kathale, A. S. Deshpande
Recommendation System Using Collaborative Filtering Technology
Miss. Harshali U. Chaudhary, Prof. Priti Subramanium
Nuclear Power Plant Robots Monitoring and Control Using Lab View
R. Maheswaran, S. Muruganand, B. Dinesh Kumar
IT Strategies in Government Policies: A Case Study of M.P. (Part – II: With Proposed Modular Cloud Architecture for Digitization)
Pratibha Sharma, Dr. D. N. Goswami
Comprehensive Adaptive Partition Testing Using Design Models for Software Quality Assurance
Ms. Ranjana Dalwani, Prof. Makrand Samvatsar
Database Queries Using Dynamic Query Forms
Priyanka G. Varkad, Prof. P. N. Kalavadekar
Secure Energy Efficient Virtual Machine Allocation in Cloud Computing Environment
Ms. Anupama Patil, Mrs. Pushpalatha R
Segmentation of Renal Calculi from CT Abdomen Images by Incorporating FCM and Level Set Approaches
N. Senthil Kumaran, S. Sathyavathy
Design and Simulation of Error Correction Codes
Chaitra Vardhini H, Prof. Madhu Patil
An Automatic Computer Aided Detection System for Emergency Aircraft Landing
Dipalee J. Surwase, Mr. Moresh Mukhedkar
A Novel Approach to Monitor the Health of a Critical Patient through WBAN
Mandeep Kaur, Dr. Sukhwinder Singh
SVSS: Selective Variant Intelligent Spectrum Sensing for Cognitive Radio
Monika Negi, Sukhwinder Singh
Redundancy Management of Multipath Routing for Intrusion Tolerance in Hetrogeneous WSN
Manisha Dangi, Prof. R.K. Krishna
Performance Analysis of Hybrid Microstrip Patch Antenna at Ka-Band
K. Lalitha, K. Lakshmi Bhavani, Dr. P Siddaiah
Brain Tumor Segmentation and It’s Features Extraction by using T2 Weighted Brain MRI
Priyanka Kadam, S.N. Pawar
Vachantar –Lokbhasha: A Speech to Text Conversion for Marathi
Archana . V. Chechare
A Hybrid Scheme for Cryptography and Watermarking
Amandeep Kaur, Rajbir Kaur
A review on the state of art of Internet of Things
T. Santhi Sri, J. Rajendra Prasad, Y. Vijayalakshmi
Data Filtering and Storage using WSN and Artificial Neural Networks
Rama Krishna K, Jagadevi N. Kalshetty, Ramya Srikanteswara, Kumar Abhishek
Pedestrian Detection Using Moving Camera
Sahil Dalal, Rajesh Birok, Ashutosh Goswami
A Novel Clustering Algorithm for Classification of Network Traffic on Semi- Supervised Data
Anjali Wankhede, Kailash Patidar, Mr. Manoj Yadav
MKF-Firefly: Hybridization of Firefly and Multiple Kernel-Based Fuzzy C-Means Algorithm
Satish Chander, Vijaya P
Allocation of Phase-Based Scheduler for MapReduce Job Scheduling
Suryakant S. Bhalke
Resolution Enhancement of Images using Multi-wavelet and Interpolation Techniques
Arya A R, Sreeletha S H
Geometrical Properties of 3-D Images and Its Uses in 3-D Image Processing
K. Rajiv, G. Ramesh Chandra, B. Basaveswara Rao
Implementation of an Efficient Noise and Air Pollution Monitoring System Using Internet of Things (IoT)
Anjaiah Guthi
Comparative Analysis of Direction of Arrival Estimation algorithms
S. S. Jadhav, D. G. Ganage, S. A. Wagh
Gigabit Passive Optical Network- A Review
Kulwinder Kaur, Ramandeep Kaur, Rajandeep Singh
Opinion feature Identification via Intrinsic and Extrinsic Domain Relevance
Vinakshi R. Longani, Prof. M. S. Ankoshe
ATM Transaction without Debit Card
Pranav Gebad, Prof. N. A. Dawande
A Survey on Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
S. Sahaya Nirmala Daisy, Dr. D. Ravindran
A Low-Voltage and Low-Power 3-GHz CMOS LC VCO for S-Band Wireless Applications
Akshay B . Mahajan, Dr.Shirbahadurkar
Electrical Impedance Tomogrphy
Prof. Prabhakar Manage, Shivani I Melge, Devang Rajesh Bhutara, Amit A Nainar, Ketaki S Shah
Product Aspect Ranking on the Consumers Reviews and Its Applications
Miss. Dhanashri Rohidas Londhe
Robust Dynamic Vehicle Collision Avoidance System Using Wireless Communication: A Review
Vikas Chhabra, Er. Ankita Mittal
Study and Implementation of Unitified Power Quality Controller for Mitigation of Power Quality Issues
Rajat Malhotra, Gaurav Sharma
Bit Error Rate Performance Analysis with Beam forming
Pawan Soni, Narendra Singh Thakur, Ritu Chauhan
Homomorphic Encryption Algorithms for Securing Data against Untrusted Cloud
Gaurav Somani, Sourabh Garg
Amplitude Noise Reduction in Millimeter- Wave Radio-Over-Fiber Systems by using Filtration Techniques
Neeraj Singh, Harmanjit Kaur
File Sharing System using Multi-keyword Ranked search with Data Cache
Nevil Raju Philip, R. Anitha
A Novel Study on Data Forwarding Mechanism with Improved Sleep Scheduling in WSN
Sushila Batan, Kanika Sharma
Low Power Three Stage Operational Transconductance Amplifier Design
Priti Gupta, Rajesh Mehra
Lossless and Reversible Data Hiding
Mayuri B. Lokhande, Prof. N. G. Pardeshi
Correlation Based Feature Selection for Movie Review Sentiment Classification
K. Bhuvaneswari, Dr. R. Parimala
Energy Efficient Mobile Data Collection in Wireless Sensor Network
Neethu Krishnan, Abhitha .E
An Efficient Organization for Wireless Sensor Networks
Madhuneha A. Shrivastava, Prof. R.K. Krishna
2D to 3D Image Conversion using Trimetric Projection and Depth-map Estimation
Rashmi Snawer, Asst. Prof. Ms. Anubhooti Papola
An Improved Method for Scheduling of Scientific Workflows
Merly Mathew, Jayalekshmi S
A Survey on Recommender System
Miss. Priya D. Rakibe, Dr. Anil B. Pawar
Design of Low Pass Fir Interpolator for Wireless Communication Application
Renuka Verma, Rajesh Mehra
Design of High Performance Double Tail Comparator Using Header Switch
Vanshikha Singh, Rajesh Mehra
Preview Analysis in Requirement Engineering
Harjot Kaur, Dilraj Singh, Pawandeep Kaur
Efficient Public Auditing Scheme for Shared Cloud Data Storage Using Multi Replica Merkel Hash Tree
Kaveri Sonawane, Prof. Ranjana Dahake
Link Aggregation for Embedded Applications
Nandini .S, Prof. Sankar Dasiga
Using Rule Based and Blocking Approaches to accomplish Entity Identification for Data Cleaning
Ankita Saxena, Prof. Ranjana Dahake
Efficient Dynamic Resource Allocation Using Map-Reduce
Ms. Rutul D. Dhomse, Prof. R.N. Phursule
Scheduling Algorithms in Distributed Data Warehouse Environment: A Survey
Krishnaveni Sakkarapani, Sathish Ayyaswamy
LTE Direct as a Device-to-Device Network Technology: Use Cases and Security
Umut Can Çabuk, Georgios Kanakis, Feriştah Dalkılıç
A Clustering based Cross Layer Protocol for optimizing Energy Efficiency in Wireless Sensor Network using Duty Cycling Approach
Vishal Singh, Dr. Maninder Singh
Secure Data Deduplication
Vijay M Hittalmani, Prof. Vidya I. Hadimani
Optimized Design of Active Pixel Sensor using CMOS 180 nm Technology
Dipti, Rajesh Mehra, Deep Sehgal
Patient of Foot Ulcer Diabetes Identification Based on Smartphone
Sadhana S.Jadhav, Prof. Manisha M. Naoghare
Random Number Generator Design using QCA Logic for FPGA Architecture
Nilima P. Pannase, Amol Boke
Analysis of Blackhole Attacks on Wireless Sensor Networks
Arpita Pateliya, Jignesh Kumar N. Patel, Ketan R. Tandel
Difference Convex Programming based TSVM to Detect Phishing Pages
K. Selvan, Dr. M. Vanitha
A Survey on Emotion Recognition from Speech Signal
Sandeep Pathak, Vaishali Kolhe
High Performance Column Level ADC for CMOS Imager using Switched Capacitor Technique
Anurag Yadav, Rajesh Mehra, Deep Sehgal, H.S. Jatana
Design and Simulation of Wide-Band Square Microstrip Patch Antenna
K. Prasad M.Tech, (Ph.D), M.A (Lit), M.A (Politics), B. Lakshmi Devi M.Tech
Mammogram of Breast Cancer Detection Based Using Image Enhancement Algorithm
M. Radha, Dr. S. Adaekalavan
Automatic Cancer Detection in Mammographic Images
Jasmeen Kaur, Mandeep Kaur
Floating Point Parallel Processing Multiplier Based RISC (MIPS) Processor
Omkar A. Shastri, Asst. Prof. Shubhangini Ugale, Asst. Prof. Vipin Bhure
Audio based Music Classification based on Genre and Emotion using Gaussian Process
Mugdha Magare, Prof. Ranjana Dahake
Physiological Variability Analysis Using Pre-existing Data Mining Techniques
Shagun Goyal, Sunila Godara
Automated Resource Planning System for library using ASRS Robot
Della Reasa Valiaveetil, Veena K, Sindhu T. V, Bency Varghese A, Linu Babu P
Lung Cancer Detection from Images of Computer Tomography Scan
Vaishali C. Patil, Shrinivas R. Dhotre
Design of Dual Band Microstrip Patch Antenna Using Proximity Feed for Wireless Applications
Meenu, Gaurav Monga
Fire Wrap: A cyber defence mechanism against dark web attacks
Feby C Varghese, Varghese John, Dr. T. A. Ashok Kumar
Secure Distributed Deduplication in Cloud with Improved Reliability
Reshma D. Kapadi, Prof. Pramod Patil, Prof. Prashant V. Raut
Hadoop-GPU Based K-Means for Data Clustering
Parag Pachouri, Prof. Manaswini Panigrahi
Accident Prediction from Traffic Data using Hadoop
Pallavi Dubey, Prof. Manaswini Panigrahi
Automatic detection of true retinal area and diagnosing retinal disease using SLO images
Geetanjali Arjun Argade, Prof. N. A. Dawande
State of the Art Technique for Recognizing Understanding of Learners’
Vrajesh Pankaj Doshi, Bidisha Roy
Automatic Pill Dispenser
Mrityunjaya D H, Kartik J Uttarkar, Teja B, Kotresh Hiremath
Secure Data Transmission for Iot Applications
Radhika Munoli, Prof. Sankar Dasiga
An Approach of Colour Based Image Segmentation Technique for Differentiate Objects using MATLAB Simulation
Preeti Rani, Raghuvinder Bhardwaj
Congestion Avoidance in Node Communication Network using NS-2 Simulation
Rashika, Kavita Khatkar
A Review: Modified Remove Redundancy Technique of Lossless Image Compression
Ramanpreet Kamboj, Shailja Kumari
Remove Redundancy Technique of Lossless Image Compression
Ramanpreet Kamboj, Shailja Kumari
OLED Revolution
Aditya Vaishampayan, Prof. Deepali H. Shah, Prof. (Dr.) Tejas V. Shah
Impact of Modeling and Simulation for Conductivity Measurements
Dr. Y. P. Raiwani, Dr. Rakesh Mohan Bhatt, Anunay Gairola
Convolution and De-convolution using Vedic Mathematics
Ramya Annigere, Smt. Savita S Patil
Biomedical Image Compression Using BTC Method with Rectangular Truncation Matrix
Tamanna Kapahi, Kamal Gupta
Design and Implementation of MPPT Technique Applied to Solar Wind Hybrid System
Praveen Shukla, Shimi S.L., Lini Mathew
Reversible Data Hiding In Encrypted Images- An Overview
Mr. Dipak R Pardhi, Miss. Harshali Phalak
Infrared Non- Destructive Testing Using Image Processing: A Survey
Karishma Chaudhary, Ashok Kumar
A Qualitative and Quantitative Analysis of Routing Protocols in MANET
Karan Singh, Arun Kumar Yadav
Evaluation of Probability of Detection using Energy Detection for Secondary User in Cognitive Environment with Variable Threshold & Sample Values
Ashish Suri, Dr. Jaswinder Singh
An Approach to Devise an Interactive Software Solution for Smart Health Prediction using Data Mining
Aditya Tomar
An Enhanced Approach in Novel Content Based Video Retrieval Using Vector Quantization
Prof. Rahul Gaikwad, Jitesh R. Neve
A Real Time Image analysis System to Detect Skin Diseases
Pravin S. Ambad, Prof. A. S. Shirsat
Modified PSO based Intrusion Detection in Streaming Network Data
G. Banupriya, M. Lalli
Classification of High Dimensional Class Imbalanced Data Using data mining techniques
Vidya D. Omase, Prof. Jyoti N. Nandimath
Recovering From a Node Failure in Wireless Sensor Actor Networks with Minimal Topology Changes
Mr. B.R. Tapas Bapu M.E, Mekala M, Nagma S. N, Nandhini P
Mask-SDA: Secure Aggregated Data Sensing Over Hetrogeneous Wireless Sensor Networks
Dr. R. Priya, Mr. S. Sundaramoorthi
Fuzzy Approach for Examining the Performance of Driver
Chaitree Baradkar, Aishwarya Ganveer, Shyamlee Lokhande, K. Surender
Enhanced Resource Scheduling in Virtual Cloud Laboratory (VCL) Cloud Architecture
Lakshmi T S, Ziaur Rahman
An Empirical Performance Evaluation of Relational Keyword Search Techniques
Madhuri V. Diwan, Sangve S.M
Deployment of Software Puzzle on Server to Offset DoS Attacks
Ms. Rupali Suravase, Prof. Pramod Patil
ESDIT: An Approach for Improving Performance in MANET by Detecting and Isolating Selfish Nodes
G. Sri Kanya, P. Ramya
TF-IDF and KDC based Privacy Preserving Multi keyword Search over Distributed Encrypted Documents
Miss. Nilima Kasar, Prof. Vitthal S. Phad
TF-IDF and KDC based Privacy Preserving Congestion Free Topology for Route Management in WSN Using K-Map
Nagarjuna M, Bhat Geetalaxmi Jayram
K-Nearest Neighbor Classification on Data Confidentiality and, Privacy of User’s Input Queries
Dr. V. Goutham, P. Ashwini Reddy, K. Sunitha
A Protected Anti Collection Data Sharing and Secure user Revocation Scheme for Dynamic Groups in the Cloud
Dr. V. Goutham, Mrs. K. Srilatha, Ms. M. Swapna
On Chip Optical Interconnect for High Speed Communication System
Prashant G. Salunke, Mukesh P. Mahajan, Gayatri M. Phade
Analysis of Lecture Videos Retrieval: A Content Based Approach
Kalyani D. Wagh, Dr. M. U. Kharat
Different Language Recognition Model
Sankirna D. Joge, Prof. A. S. Shirsat
A Survey Congestion Based Routing Protocols for Better Performance of Mobile Adhoc Networks
Radhika Gupta, Jashwant Samar, Durgesh Wadbude
Detection and Prevention of SQL Injection in a Web Application Using Secure Object Relational Mapping Approach
Siddhesh Bhagat, Dr. R. R Sedamkar, Prachi Janrao
Study of Mobile Ad Hoc Network in the Presence of Wormhole Attack
F. Anne Jenefer, A. M. Merlin Ruby, D. Vidhya
Link Lifetime Prediction in Mobile Adhoc Network: A Survey
Ashish Kumar Awadhiya, Subodh Mishra, Vivek Sharma
Application of Radial Basis Function Neural Network in Diagnosis of Ms Disease
Mohammad Esmaeil Shaabani, Touraj Banirostam, Alireza Hedayati
Novel Sequence Clustering Approach for Biological Data
Sunila, Rishipal, Sanjeev Kumar
Implementation and Analysis of Open Source Computing on Cloud-Based ERP Method
Dr. D. Durga Bhavani
Detection Evaluation and Protection of Vampire Attacks in Ad-Hoc Wireless Sensor Network
Kalyani S Kumar
Design of a Power Efficient Parallel Architecture for Linear Feedback Shift Registers
Y. Aasrita, R. Mahesh Kumar, B. Abdul Rahim, N. Bala Dastagiri
Soft Computing Technique for the Design of Band Pass Fir Digital Filter
Navnoor Brar, Balraj Singh, Darshan Singh Sidhu
Comparison of Proactive, Reactive and Hybrid Routing Protocol in MANET
S. Saranya, Dr. R. Manika Chezian
A Multi-Agent Based System Architecture for Monitoring Nodes in Local Area Networks
John-Otumu Adetokunbo M, Ojieabu Clement E, Oshoiribhor Emmanuel O
Resource Optimization for Big Data processing using MapReduce Framework: Survey
Parul Chhabra, Surender Singh
Security Analysis of Honey words Generation Scheme to Evade Unauthorized Access
Ms. Manisha B. Kale, Prof. D. V. Jadhav
Web Page Navigation Mining Through Association Rules
Harsha Dubey, Dr. Megha Mishra, Dr. V. K. Mishra
A Review on Detection Techniques in Medical Imaging
Priyanka Pareek, Pankaj dalal
Customization of Document Using Content and Query Based Annotation
Kalyani Kute, Prof. R. P. Dahake
The Detection, Separation and Quantification of Brain Tumour via MRI Images
Smita N Wakale, Ram K Kanhe
Abstract
Molecular solutions for the Maximum K-colourable Sub graph Problem in Adleman-Lipton model
Akbar Moazam
DOI: 10.17148/IJARCCE.2016.5701
Abstract: Adleman [1] showed that deoxyribonucleic acid (DNA) strands could be employed towards calculating solutions to an instance of the Hamiltonian path problem (HPP). Lipton [5] also demonstrated that Adleman�s techniques could be used to solve the Satisfiability problem. In this paper, we use Adleman-Lipton model for developing a DNA algorithm to solve Maximum k-colourable Sub graph problem. In spite of the NP-hardness of Maximum k-colourable Sub graph problem our DNA procedures is done in a polynomial time.
Keywords: DNA computing, NP-hard problem, Maximum k-colourable Sub graph problem
Abstract
An Efficient and Secure Protocol for Ensuring Data Storage Security in Cloud Computing Using ECC
Santosh Kumar Singh, Dr. P.K. Manjhi, Dr. R.K. Tiwari
DOI: 10.17148/IJARCCE.2016.5702
Abstract: Computing applications and data are growing so rapidly that increasingly larger servers and data centre are needed for fast processing within the required time. A fundamental shift in the way Information Technology (IT) and computing services are being delivered and purchased, results in the development of cloud computing. Currently, there has been an increasing trend in outsourcing data to remote cloud, where the people outsource their data at Cloud Service Provider(CSP) who offers huge storage space with low cost. Thus users can reduce the maintenance and burden of local data storage. Meanwhile, once data goes into cloud they lose control of their data, which inevitably brings new security risks toward integrity and confidentiality. Hence, efficient and effective methods are needed to ensure the data integrity and confidentiality of outsource data on entrusted cloud servers. However, Cloud computing requires that organizations trust that a service provider�s platforms are secured and provide a sufficient level of integrity for the client�s data. In this paper, we propose an efficient and secure protocol to address these issues. Our design is based on Elliptic Curve Cryptography and Sobol Sequence (random sampling). Our method allows third party auditor (TPA) to periodically verify the data integrity stored at CSP without retrieving original data. The challenge-response protocol transmits a small, constant amount of data, which minimizes network communication. Most importantly, our protocol is confidential: it never reveals the data contents to the malicious parties. The proposed scheme also considers the dynamic data operations at block level while maintaining the same security assurance. To compare with existing schemes, our scheme is more secure and efficient.
Keywords: Data storage, Integrity, Confidentiality, Elliptic Curve Cryptography (ECC), Sobol Sequence, Cloud Computing, TPA, CSP.
Abstract
Securing User Protection in Personalized Web Search Using Slicing Algorithm
Chanda Agarwal, Prof. Dr. Suhasini Itkar
DOI: 10.17148/IJARCCE.2016.5703
Abstract: Web Search engines are designed to help their users to find information on the World Wide Web (WWW). However, �generic� search engines are not capable to identify the specific needs of the individual user. These search engines have the same treatment to all users irrespective of their individual need for information. This problem can be solved using �Personalization�. Personalization has the capability to give different search results for different users based on parameters like their interest, preference and knowledge. To meet this requirement, there is a need to capture user�s personal information � therefore, certain users may not want to disclose it. Therefore, �privacy� is a major concern. To provide privacy to the user�s information in Personalized Web Search application, a framework called �User Customizable Privacy-Preserving Search� is discussed. Two runtime generalizations of profiles called Greedy DP and Greedy IL are conversed and it is found that Greedy IL performs better than Greedy DP in terms of response time. Slicing technique is implemented at the proxy side for prevention from attacks that may disclose user�s personal information.
Keywords: Personalized Web Search (PWS), Private Information Retrieval (PIR), Search Engine Web Search, Wrapper
Abstract
A Low cost Brain Computer Interface Module and EEG Analysis Using MATLAB
Ms. Ashwini Gokhale, Mr. Sunil. M. Patel
DOI: 10.17148/IJARCCE.2016.5704
Abstract: A brain-computer interface, or BCI, is a modality for human-computer interaction whereby a person may control an external device using brain signals without muscular intervention. One of the most widely used signals is the electroencephalogram (EEG), since it has excellent temporal resolution, can be measured non-invasively, and is comparatively inexpensive and simple to acquire. The design itself is based on three main components: an Analog Front End, a Microcontroller, and data acquisition and classification system (software). This work will show that by interfacing these three main embedded devices, the results of a proven clinical EEG system can be replicated.
Keywords: Brain Computer Interface, Analog Front end, EEG, MATLAB Analysis
Abstract
Analysis of Controlled Staircase Comb Actuator using Different Structural Materials
Rajesh Kumar
DOI: 10.17148/IJARCCE.2016.5705
Abstract: Staircase comb geometry using different materials are analysed. PTFE is also a type of polymer which produces maximum displacement of 3.6 �m at low voltage 3.5 V as compared to Poly silicon which produces same displacement at 62.1 V, 0.1V to 1.1V, then a Sharpe change in voltage occur between 1.1 to 2.3 V and then again a second slow movement of nearly 0.8 �m takes place between 2.3 to 3.5 V.
Keywords: Comb Drive, FEM, Actuator, Electrostatic
Abstract
Performance Analysis of Topologies using for RWA in Optical WDM Network
Radha Raman Chaurasiya, Jashwant Samar, Durgesh Wadbude
DOI: 10.17148/IJARCCE.2016.5706
Abstract: Fiber optic networks are known for their limitless capabilities and high bandwidth. To utilize this high capability network different multiplexing techniques are used. Wavelength division multiplexing (WDM) is one of the techniques which are most frequently used in WDM networks to utilize the available resources. In WDM network every link has its own bandwidth capacity. Whenever traffic is generated from source to destination the wavelength is assigned to each link to carry that traffic and out of the paths available between source and destination proper path is selected. So for routing and wavelength assignment problem different algorithms are used. In this thesis standard Routing and wavelength assignment algorithm is used. In this thesis analysis of different topologies in WDM network is done for different traffic patterns using routing and wavelength assignment algorithm (RWA). The MATPLAN WDM simulation tool based on MATLAB is used to simulate WDM topologies and to generate traffic patterns. Then behaviour of different topologies for distinct traffic patterns is analysed using the tool for different parameters. The parameters analysed in this thesis are message propagation delay which should be minimum, channel utilization which should be more, traffic carrying capacity of the network which should be high. It is found that mesh topology is better for high traffic but it is costly due to large number of links. So star topology is one topology which is better in all aspects.
Keywords: Wavelength division multiplexing (WDM), Routing and Wavelength assignment algorithm (RWA), MATPLAN.
Abstract
Automated Fruit Classification System
Mr. Udamale Shivaji R., Prof. Nitin Dawande, Prof. Ashish Mulajkar
DOI: 10.17148/IJARCCE.2016.5707
Abstract: The Automated fruit classification system is totally based on new technology. Existing some systems are used for testing the leaf and fruit. This �automated fruit classification system� are also used for testing the quality of fruit. In a fruit market large amount of various fruits are available, and testing of this fruit or classifying a damaged and contaminated fruit is a very difficult to human. This system is very use full for handling such difficult task, this system automatically classify the good fruit and the damaged or contaminated fruit. This paper give us a idea about how to distribute the fruit according to the size, Quality, colour and health. This system is very use full for the framer and the fruit buyer. This system is totally based on image processing. This system has high accuracy of classifying fruit and it is a very big advantage of this system. This system strongly implemented in agricultural sector. Agricultural sector specially fruit cultivation. This paper has two units one is image acquisition and second is image processing because our system main part based on image processing.
Keywords: Automated, Image Processing, Embedded, agricultural, DSP, feature extraction, Edge detection.
Abstract
Contrast Enhancement Technique Using Sub-band Decomposition for OLED Display
Pallavi T. Ghormade, S. K. Bhatia
DOI: 10.17148/IJARCCE.2016.5708
Abstract: Sub-band decomposition along with multiscale retinex is used for contrast enhancement. Initially the image is divided into its components of red green and blue and is processed differently to avoid overlapping of bands. So the image is decomposed and this is done for various bands using multiscale retinex where the log function is used to produce point by point ratio of image.
Keywords: Image enhancement, sub band decomposition, multiscale retinex
Abstract
New Technique to Read Linear Barcodes
Snehal S. Jadhav, S. K. Bhatia
DOI: 10.17148/IJARCCE.2016.5709
Abstract: Spatial domain dynamic template matching technique is capable of reading linear blur barcodes taken by low resolution camera. The proposed system treats barcode reading under the binary waveform analysis. The graphical model is designed which gives the relationship between scanline of blur barcode and deblurr barcode. The programming based algorithm used to retrieve the symbol of barcode.
Keywords: Barcode, Edge Detection, Deblurring Barcode, Extract Barcode
Abstract
A Review of Use of TCP over Wireless Cellular Networks
Vaibhav Vaidya, Prof. Amutha Jeyakumar
DOI: 10.17148/IJARCCE.2016.5710
Abstract: This paper is a review of the issues faced when TCP is used over wireless cellular networks further to that proposed solutions to these issues. The problem is ?rst characterized by the TCP operation followed by characteristics of wireless channels that affect performance. Different Wireless generations are compared as they determine nature and severity of problems when TCP is used. Further to this paper provides proposals made to resolve the problem. Performance degradation is considered based on examples from previous studies.
Keywords: Standard TCP, mobile wireless network, TCP performance, end-to-end, 3DA, M-TCP, Freeze TCP.
Abstract
Multilevel Image Compression in Encrypted Domain
Vitthal Shelke, Prof. R.A. Patil
DOI: 10.17148/IJARCCE.2016.5711
Abstract: Image compression is nothing but reducing the size of data required to represent an image. In the few recent years there is tremendous growth of data intensive and multimedia based applications, efficient image compression solutions are becoming critical. The main objective of Image Compression is to reduce redundancy of the data and improve the efficiency. The main techniques used are Fourier Analysis, Discrete Cosine Transform vector quantization method, sub-band coding method. The drawbacks in the above methods are, they cannot be used for real time systems. In order to overcome these problems, the Wavelet Transform method has been introduced. The signal processing after encryption that is in cryptosystem is relatively somewhat new topic. The data size to store available information require large memory, so here we are proposing a method called multilevel discrete wavelet transform(DWT) in encrypted domain. We are suggesting a frame work for carry out DWT and its inverse DWT in the encrypted domain. With this proposed framework we carry out multilevel DWT and inverse DWT in Homomorphic encrypted domain.
Keywords: Data Processing, Discrete Wavelet Transform (DWT), Inverse Discrete Wavelet Transform (IDWT), Encryption, Decomposition, DFT, FFT.
Abstract
A Practical Approach of Neural Network Based Detection and Prevention of Malicious URL using MATLAB
Varuna, Preeti Gupta
DOI: 10.17148/IJARCCE.2016.5712
Abstract: The Web contains the mixed type of URL which contains the Malicious as well as normal URLS. The research work is about the study of Malicious URLS techniques and provides the approach of security along with the Detection and Prevention. The System information need to be secure and should be confidential. The system information protection is main aspect of this research work. This paper proposed the approach for prevention and Detection of the Webpage URL using Neural Network. This research work provides a new way of securing the information to avoid hassle in transmission over network. The Dictionary has been created of which are counted as the malicious and input data of URL with parameters such as IsURLKeywords, Toxic Factor based on auto Downloading Links and the third parameter is No of Download links. Based on these parameters, the weight has been assigned and equation has been created. The threshold values have been settled and generated results in MATLAB Simulation Tool.
Keywords: Botnets, Denial-Of-service attacks, IDS, SQL Injection Attack, Penetrations.
Abstract
An Improvement of Road Scene Enhancement Using Hybrid Technique
Gagandeep Singh, Er. Sarabjit Singh
DOI: 10.17148/IJARCCE.2016.5713
Abstract: The perceivability of pictures of open air street scenes will by and large get to be corrupted when caught amid severe climate conditions. Drivers frequently turn on the headlights of their vehicles and streetlights are regularly actuated, bringing about restricted light sources in pictures catching street scenes in these conditions. Moreover, dust storms are additionally climate occasions that are regularly experienced when driving in a few locales. The issue embraced for the work is "A change in Road Scenes Captured by Intelligent Transportation Systems". A novel and viable murkiness evacuation way to deal with cure issues brought about by confined light sources and shading movements, which along these lines accomplishes unrivaled reclamation results for single murky pictures. The Road picture debasement can bring about issues for savvy transportation frameworks, for example, voyaging vehicle information recorders and activity reconnaissance frameworks, which must work under an extensive variety of climate conditions. Another issue is that the caught cloudy street picture contains confined light sources or shading movement issues because of dust storm conditions. Movement discovery is known not one of the best issue ranges. There is murkiness issue in the street scene pictures. The goal of this work is to execute the Road Scenes Captured by Intelligent Transportation Systems utilizing Hybrid method. To improve the pictures utilizing distinctive channels and upgrade methods. The distinctive sorts of parameters are computed that is PSNR, MD and Processing Speeds.
Keywords: PSNR, MD and Processing Speeds ,videos etc.
Abstract
Implementation of PSOLA for Comparative Linguistic Analysis of English and Marathi Language
Kavita Waghmare, Pravin Yannawar, Bharti Gawali
DOI: 10.17148/IJARCCE.2016.5714
Abstract: Naturalness is one of the very important parameter to evaluate the speech synthesis system. Besides other prosodic feature parameters like pitch, formant and energy, pitch plays a very significant role in understanding spoken signals. To obtain naturalness in synthesized speech, pitch has to be analysed. Pitch is dependent on language we attempted to present the implementation of PSOLA algorithm on the database of English and Marathi sentences. It is seen that English being irregular language results in different accent whereas Marathi being regular proves to be with good synthesized speech.
Keywords: Speech Synthesis, PSOLA, pitch.
Abstract
An Efficient Video Interpolation Framework for Unwanted Object Removal
Dnyanesh S. Gaikwad, Prof. D. B. Kshirsagar
DOI: 10.17148/IJARCCE.2016.5715
Abstract: When videos and photographs are captured some unwanted objects come in. On removal of such unwanted objects through image editing tools result in blurred image. It may not be removed properly. There may be case that one wants to replace that undesired object with some new object. In such case both texture and structure of the surrounding region should be preserved. Due motioning of camera some portion contains blur pixels. Some images might appear with missing portions and having cracks. There might be titles, headings written on photographs can be removed using image inpainting. In this paper, a framework is implemented for video inpainting using exemplar based image inpainting. Initially, a video containing unwanted objects is processed and frames are extracted containing unwanted objects and inpainted using exemplar based image inpainting. After inpainting, inpainted frames are saved and all frames are merged to a video. Quality of inpainted video is measured by PSNR.
Keywords: Unwanted object, Image Inpainting, Video Inpainting, Texture, Blurred Image.
Abstract
Design and Simulation of 4T-Cascode Amplifier at 45 Nanometer Technology Node
Arshad Jamal, Dr O.P. Malik
DOI: 10.17148/IJARCCE.2016.5716
Abstract: In this research paper, design and simulation of of 4T-Cascode Amplifier at 45 Nanometer Technology Node has been performed using 45nm technology. DC voltage gain, average power, bandwidth and output resistance have been computed using HSPICE Software. Further, the low voltage Cascode Op Amp has better DC Gain, output resistance and less power dissipation. Thus the simulation studies have revealed that the performance of the low voltage folded cascode Op Amp can be improved optimized at different voltage. DC voltage gain is 35.6 dB, average power is 7.81 uW, bandwidth is 4.08 MHz, Phase Margin 88.30 and Output Resistance 25.16 K-Ohms have been computed using HSPICE Software at 0.9V. DC voltage gain is 13.7 dB, average power is 0.23uW, bandwidth is 110.7 MHz, Phase Margin 95.30 and Output Resistance 9.5 K-Ohms have been computed using HSPICE Software at 1.5V.
Keywords: 4T-Cascode amplifier, DC Gain, Output Resistance, Band width, Average Power.
Abstract
Privacy Protection of Collaborative Data Using Slicing Technique
Sarita Kashid, Prof. Mrs. Manasi K. Kulkarni
DOI: 10.17148/IJARCCE.2016.5717
Abstract: There is an increasing need for sharing data that contains personal information from distributed database. The data is collected from multiple providers. The sharing of data can be used for research in different fields. While sharing a data first, personal information must be hidden from user. There are different techniques used for encryption of personal information. The process of removing personally identifiable information from data sets is called Anonymization. The techniques are k-anonymity, bucketization and slicing. Privacy for data and verification against privacy is very important and challenging task. Best utility must be preserved for collaborative data and loss of data must be avoided. Secure Multi Party (SMP) and Trusted Third Party (TTP) protocols create anonymized data. There may be a problem of insider and outsider attacker�s for collaborative data. The proposed work will be the implementation of Slicing algorithm which gives more security to the database.
Keywords: M-Privacy; K-Anonymity; Suppression, Anonymization; Bucketization; Slicing.
Abstract
Evolution Characteristics of ERP Systems that Distinct from Traditional SDLCs
Basem Zughoul, Mohammed Al-Refai, Nidhal El-Omari
DOI: 10.17148/IJARCCE.2016.5718
Abstract: Information systems designed and developed in house to fit a specific or small set of functions. It�s typically much smaller than enterprise system, however most of these developments also required more time, high cost to develop, not integrated, unclear customer requirements, and the most importantly working version is available during the implementation phase. On the other hand, many organizations rely on Enterprise Resource Planning (ERP) systems to manage and process their entire business requirements, including a large size of applications, where these systems comply with various business needs, like expanding markets, increasing competition and technology developments. Most of ERP systems should have specific characteristics to achieve the developments of business processes. ERP systems work in dealing with customization off-the-shelf ERP package, or changing organization business process and people structure to suite with the package. This constitutes a handicap for both the research and practice communities. The present study outlines the main and specific characteristics distinct from other information systems and discusses the influence of various enterprise system characteristics such as standardization integration, flexibility, best practices and process-orientation. The aim of this study is to recapitulation of the main characteristics of ERP systems and concludes the impact of ERP key characteristics upon the performance of the system in a given organizational setting and focusing on functionality, procedures and business needs in organizations.
Keywords: Information System, Enterprise Resource Planning, Integration, Enterprise System, Software Packages.
Abstract
Efficient Data Backup Mechanism for Cloud Computing
Yashodha Sambrani, Dr. Rajashekarappa
DOI: 10.17148/IJARCCE.2016.5719
Abstract: Data generated in electronic format are voluminous in amount, as large generated data can be flexibly stored and accessed when needed by the users. Cloud computing has become the boon and emerging latest distributed computing technology which provides number of on demand services to the cloud users. This survey paper will be focusing more on the factors like security and disaster recovery aspects. The algorithm which will be proposed has two main objectives firstly providing highest security to the cloud users and secondly recovering of the data during natural destruction , paper also focus much on efficiency, time consumption to recover the data , data integrity, cost etc. Few of the recent techniques used for backup and security will be introduced giving a brief description on each of them.
Keywords: Remote server, Seed block, Data backup, Central Repository, Data Dynamics.
Abstract
Image Restoration Technique to Solve Image Deblurring Problem
Madhuri B. Kathale, A. S. Deshpande
DOI: 10.17148/IJARCCE.2016.5720
Abstract: Image restoration is an important role in image processing from last 10 decades. The quality of image degraded due to lots of reason. There is a need to restore the quality of an image for further processing for many applications. Blur and noise are responsible to degrade the image. . The image restoration is the reconstruction process. This process is applied to the degraded images to perform restoration. The aim of the paper is to remove the blur from an image to gain its quality. The paper proposes local statistical and non local statistical method to perform image restoration.
Keywords: Image blurring, statistical methods, image deblurring etc
Abstract
Recommendation System Using Collaborative Filtering Technology
Miss. Harshali U. Chaudhary, Prof. Priti Subramanium
DOI: 10.17148/IJARCCE.2016.5721
Abstract: Recommendation systems are used to predict the �rating' or �preference' that user would give to an item and are applied in a variety of applications like music, movies, news, research articles, books, social tags, search queries and products in general. In this paper, author has given investigation on the cooperative filtering recommendation from a brand new perspective and presents a completely unique typicality-based cooperative filtering recommendation technique named Tyco. Collaborative filtering (CF) is an important and popular technology for recommender systems. However, current CF methods suffer from such problems as data sparsity, recommendation inaccuracy and big-error in predictions. A distinct feature of typicality-based CF is that it finds �neighbours� of users based on user typicality degrees in user groups.
Keywords: Recommendation System, Travel Package, Fuzzy C-means clustering.
Abstract
Nuclear Power Plant Robots Monitoring and Control Using Lab View
R. Maheswaran, S. Muruganand, B. Dinesh Kumar
DOI: 10.17148/IJARCCE.2016.5722
Abstract: Electricity plays a major role in our day to day life. Nuclear power provides a significant portion of current energy demand and is likely to become more wide spread with growing world population. The expulsion of radiation is dangerous to human beings. So this project aims to replace a robot instead of human in nuclear power generation. In this project there are three Robots used namely, Robot A, Robot B and Robot C. These three robots are monitored and controlled by using LabVIEW through Zig BEE transceiver. In nuclear power plant Robot A is used to measure the radiation using Geiger MullerCounterwhich is integrated with Arduino kit; it reads the signal at regular intervals. These signals are transmitted to Zig BEE transmitter and the Zig BEE receiver receives signal and send them to the LabVIEW through serial communication which are compared with the predefined threshold values. If the measured value is above than the security threshold value, a signal will be sent through DAQ arising an alarm. Robot B is used to the handle the radioactive wastewhich comes from nuclear power generation. Proximity sensor is used to detect the radioactive waste container which is integrated with Arduino kit. After detecting the container LabVIEW sends the command to Robot B through Zig BEE to pick and place the radioactive waste container. Robot C is used to inspect the Pipelines in the nuclear power plant. An ultrasonic sensor is used to inspect the pipelines which are integrated with Arduino kit. If any mechanical damages or corrosion are present in the pipeline, ultrasonic sensor detects these damages. After detecting these problems in pipeline Arduino kit sends this signal to Zig BEE transmitter. A Zig BEE receiver receives the value and sends it to the LabVIEW through Serial communication.
Keywords: LabVIEW, Wireless Sensor Network, Arduino kit and DAQ
Abstract
IT Strategies in Government Policies: A Case Study of M.P. (Part – II: With Proposed Modular Cloud Architecture for Digitization)
Pratibha Sharma, Dr. D. N. Goswami
DOI: 10.17148/IJARCCE.2016.5723
Abstract: Digitization is required for fast growth in proportion to the time of current need. This paper is representing the final case study, results and the newly proposed simulated idea to give a new direction for state digitization by the digitization of its rural and urban area. The technical growth of rural and urban area could form efficient digitization with accuracy in each task execution in both areas. State government services to the stats peoples and people satisfaction with these services represent the state growth and state growth could affect country growth positively. Make in country is the second aspects through which any country can grow technically like all other top ranking developing country. The shown module in this paper could work under the observation of state head like Chief Minister and country head could observe this entire module from Sate Chief Minister.
Keywords: IT Stategies; New State Government Polices(NSGP); State Education System (SES); Smart Health Care System(SHCS).
Abstract
Comprehensive Adaptive Partition Testing Using Design Models for Software Quality Assurance
Ms. Ranjana Dalwani, Prof. Makrand Samvatsar
DOI: 10.17148/IJARCCE.2016.5724
Abstract: Software execution is serving the needs of human effort reduction through automatic execution of process. It also reduces the dependencies of effort and serves correctness towards working. Sometimes the software execution shows changed behavior towards its actual operations which causes business loss, commercial downfall, information loss etc. Thus the deployments always go through the rigorous testing of applications for the various systems. Testing is very important phase of software development lifecycle which includes verification and validation of parameters used for evaluating the software. It aims towards creation of defect free codes with better quality and reliability. Defect identification and prediction along with requires recalling of product from customer end. It guides the developments to be driven continuously in presence of testing methodologies. We have gone through the rigorous study of various research articles which covers the possibilities of applying testing through different processes like partition testing and model based testing. After analyzing the problem associated with early generation of test cases and the partitioning logics we have suggested some improvements using comprehensive methods towards test process improvements and quality primitives. Analytical evaluations are showing the benefits of work and its probable improvements over other traditional approaches.
Keywords: Software Testing, Automated Testing, Partition Testing, Model Based Testing, Comprehensive Testing, Quality Assurance.
Abstract
Database Queries Using Dynamic Query Forms
Priyanka G. Varkad, Prof. P. N. Kalavadekar
DOI: 10.17148/IJARCCE.2016.5725
Abstract: With the rapid enhancement of web services and their popularity, web users are increasing day by day. The modern databases are relational and include large number of relations and attributes. By this enhancement of web information and scientific databases it is not able to get user require results with the static query forms. The solution to this problem is dynamic queries. This paper provides a Dynamic Query Form (DQF), a curious database query form interface which is able to tackle the large and complex relational databases. A system captures the user�s preference during the user communication and guides user to make decisions. Query form generation is a iterative process. The ranking of form components is based on the captured user preferences. A user can also fill up the query form and deliver queries to view the query output at each step. In this way, a query form could be dynamically refined till the user gets the query result.
Keywords: Query Form, User Interaction, Query Form Generation, Query Form Enrichment, and Dynamic Query forms (DQF).
Abstract
Secure Energy Efficient Virtual Machine Allocation in Cloud Computing Environment
Ms. Anupama Patil, Mrs. Pushpalatha R
DOI: 10.17148/IJARCCE.2016.5726
Abstract: Cloud computing is found as another model for facilitating and conveying client services through web media. Cloud computing offer processing resources as virtual machines on demand, as the number of clients to have their prerequisite on cloud expands, VM's at the server farms additionally expanded. This will make the issue of legitimate administration of resources of VM. Proficient usage of resources has acknowledged utilizing VM consolidation. VM movement is capable utility to accomplish VM union. Be that as it may, VM movement includes expense of Bandwidth and Resources between two machines. It prompts exchange off between vitality used in relocation versus energy used during workload. Indeed, even security issues additionally required in VM management. Cloud attacks confronting enormous issue while managing VM. In this paper a novel VM administration is acquainted that is hearty with different sorts of assaults, for example, robust assaults, Sybil assaults and Daniel of service attacks.
Keywords: Cloud computing, reputation, credibility, credentials, security, Collusion Attack, Sybil Atack, availability
Abstract
Segmentation of Renal Calculi from CT Abdomen Images by Incorporating FCM and Level Set Approaches
N. Senthil Kumaran, S. Sathyavathy
DOI: 10.17148/IJARCCE.2016.5727
Abstract: In this paper, CT abdomen images are engaged to the segment kidney stones. The proposed work to perform segmentation of renal calculi is done at two stages. At first stage, the CT abdomen scan image is partitioned into different clusters by spatial fuzzy c means clustering method. From the divided clusters, the kidney region is selected and the fuzzy level set method is applied at the second stage. The proposed work is compared with the threshold and level set method implementation on CT abdomen images. The comparison of the two methods and the efficiency of the proposed work are analyzed quantitatively by using the evaluation parameters; Jaccard similarity coefficient and Accuracy. The qualitative and the quantitative analysis prove that the proposed work gives a proficient segmentation of renal stones from CT abdomen images.
Keywords: Image Segmentation, Kidney Stone, FCM, Level Set, Jaccard, Accuracy.
Abstract
Design and Simulation of Error Correction Codes
Chaitra Vardhini H, Prof. Madhu Patil
DOI: 10.17148/IJARCCE.2016.5728
Abstract: Natural interference like EMI, noise, crosstalk can happen over the communication channel like memory, which causes the original data to be different from the stored data. In order to find these errors a few techniques to recognize and correct the error is required. This work is an overview of different Error Correction techniques. These techniques guarantee to find and possibly correct the errors brought about by the stuck-at faults in the memory. The work is mainly focused on Hamming codes, Convolution codes, CRC and Turbo codes.
Keywords: Hamming codes, Convolution codes, CRC - Cyclic Redundancy Check and Turbo codes.
Abstract
An Automatic Computer Aided Detection System for Emergency Aircraft Landing
Dipalee J. Surwase, Mr. Moresh Mukhedkar
DOI: 10.17148/IJARCCE.2016.5729
Abstract: An automatic computer-aided detection (CAD) system is proposed to assist aircraft pilots to find safe emergency landing sites where no runway is available. Customarily, pilots are prepared to distinguish safe landing destinations by looking to the ground with crude eyes. Be that as it may, human vision can be altogether influenced by climate conditions. Additionally the significant choice extraordinarily relies on upon the pilot's flight experience. Moreover, the pilot will be under the enormous weight in such to great degree critical circumstances. Time is another essential variable of the survival of travelers and the pilot himself. In this manner, a powerful, solid and productive calculation of selecting hopeful landing destinations is emphatically coveted. By applying picture preparing and investigation methods we proposed a programmed CAD framework and preparatory results demonstrate the attainability of the proposed calculation. The principle commitment of this framework is the configuration of a completely programmed CAD calculation for deciding safe crisis landing locales. Above all else, we explored the fitting criteria to evaluate landing destinations. Two geographic ideas, height and landform, are contemplated. The angle of rise by and large decides the unpleasantness of the landscape. Landform depicts territory covering, i.e., backwoods, grass, water, rock, structures, and so on. Smooth rise inclination without anyone else's input is not adequate to ensure a sheltered landing site, subsequent to the related landform could be unpleasant. Also, the arrival site needs to have adequate length and width which can shift with the sort of plane to empower safe crisis landing.
Keywords: Image Stitching, Horizon Detection, Roughness Assessment, Aero plane safe landing-area detection system.
Abstract
A Novel Approach to Monitor the Health of a Critical Patient through WBAN
Mandeep Kaur, Dr. Sukhwinder Singh
DOI: 10.17148/IJARCCE.2016.5730
Abstract: WBAN is becoming significant technology in many fields such as medical, entertainment, sports, electronics, military applications etc. It is basically a short range communication in or on a human body. Recent advances in WBAN making it more facilitated in both hospital and home care environment. And this helps to provide better health care facilities for the human being. Basically, WBAN is a network of biomedical sensors and these sensors are attached or worn out by the human body. It brings out a set of changes in WBAN systems including system�s scalability, efficiency, lifetime, security, sensors density etc. to make it more efficient. Many studies were performed to make the WBAN system secure, real- time monitored, flexible, and power efficient for suitable health care applications. To efficiently control and monitor a person�s health as well as to reduce cost and maintenance a new wireless communication is developed as a new advanced technology for better health monitoring. WBAN in medical field provides many advantages as compared to other networks such as flexibility and economic for both users as well as for server.
Keywords: wireless body area network, wireless sensor network, medical health care.
Abstract
SVSS: Selective Variant Intelligent Spectrum Sensing for Cognitive Radio
Monika Negi, Sukhwinder Singh
DOI: 10.17148/IJARCCE.2016.5731
Abstract: In recent past the growth of wireless devices and multimedia applications has resulted in increased usage of spectrum causing spectral congestion problem. In order to access the electromagnetic spectrum in an opportunistic way Cognitive radio (CR) provides tempting solution by making best use of the frequency band which is not heavily occupied by licensed users i.e. primary user(PU), hence improving the spectrum utilization and quality of service (QoS) of a secondary user (SU). In this paper, a new hybrid spectrum sensing technique is proposed for transmitter based spectrum sensing which can reduce the computational power consumption and sensing time of frequency band. The proposed technique helps in detecting the inactive spectrum bands opportunistically with better utilization of the spectrum with increase in the overall spectrum efficiency. The Strategy is being described in the following sections. Where two parameters of comparison are taken, with which the results are formulated which are probability of detection and probability of misdetection. In both the considered parameters the Selective Variant Intelligent Spectrum Sensing (SVSS) performs better than Intelligent Spectrum sensing scheme (I3S).
Keywords: cognitive radio, spectrum hole, spectrum sensing, opportunistic spectrum access, Primary User, Secondary User.
Abstract
Redundancy Management of Multipath Routing for Intrusion Tolerance in Hetrogeneous WSN
Manisha Dangi, Prof. R.K. Krishna
DOI: 10.17148/IJARCCE.2016.5732
Abstract: Wireless sensor networks (WSNs) are an important for monitoring distributed remote environments. As one of the key technologies involved in WSNs, nodes fault detection is indispensable in most WSN applications. It is well known that the distributed fault detection scheme checks out the failed nodes by exchanging data and mutually testing among neighbor nodes in this network., but the fault detection accuracy of a scheme would decrease rapidly when the number of neighbor nodes to be diagnosed is small and the node�s failure ratio is high. an improved scheme is proposed by defining new detection criteria. Simulation results demonstrate that the improved scheme performs well in the above situation and can increase the fault detection accuracy greatly. wireless sensor-actor networks, sensors probe their surroundings and forward their data to actor nodes. Actors collaboratively respond to achieve predefined application mission. Since actors have to coordinate their operation, it is necessary to maintain a strongly connected network topology at all times. Moreover, the length of the inter-actor communication paths maybe constrained to meet latency requirement. Distributed Actor Recovery Algorithm (DARA) Most existing works mainly focus on the design of the trust models and how these models can be used to defend against certain insider attacks. However, these studies are empirical with the implicit assumption that the trust models are secure and reliable. In this paper, we discuss several security vulnerabilities that watchdog and trust mechanisms have, examine how inside attackers can exploit these security holes, and finally propose defending approaches that can mitigate the weaknesses of trust mechanism. We observe that many existing trust models adopting watchdog as their monitoring mechanism do not explicitly address these weaknesses. Our goal in this paper is to demonstrate how serious insider attacks can be in WSNs.
Keywords: Network security, virtual network system computing, intrusion detection, attack graph, zombie detection.
Abstract
Performance Analysis of Hybrid Microstrip Patch Antenna at Ka-Band
K. Lalitha, K. Lakshmi Bhavani, Dr. P Siddaiah
DOI: 10.17148/IJARCCE.2016.5733
Abstract: In wireless communication system antenna plays vital role. Therefore, the need for antenna used in any communication system should be low weight, low profile, low cost, smaller in dimension and conformity. A microstrip patch antenna fulfills all these requirements. This paper presents design of hybrid microstrip patch antenna array operating at Ka-band. The hybrid microstrip patch antenna consists of a triangular patch mounted on a rectangular patch. The signals from the antennas are combined or processed in order to achieve improved performance over that of a single antenna. The antenna is tuned at resonance frequency of 28 GHz and its bandwidth is from 26.5 GHz to 40GHz. This technique is used to analyze the performance of �HYBRID PATCH ANTENNA ARRAY� using different feeding techniques like microstrip and coaxial feeding techniques by using HFSS software.
Keywords: Ka-band, hybrid microstrip patch antenna, microstrip feed, coaxial feed.
Abstract
Brain Tumor Segmentation and It’s Features Extraction by using T2 Weighted Brain MRI
Priyanka Kadam, S.N. Pawar
DOI: 10.17148/IJARCCE.2016.5734
Abstract: The objective of this paper is to present a method to detect the exact location of brain tumor and its size by using the T2 weighted brain MRI. This objective has been simulated by using the MATLAB R2012 (7.14.0.739). The algorithm has been developed, which skips the areas of brain which do not suits the criteria of high intensity and high entropy; because these are the two main features of brain tumor in T2 weighted MRI. After that the image is rebuilt by using the extended maxima transformation, which helps to detect the brain tumor. The tumor size, major and minor axis length, eccentricity, Perimeter, solidity all this parameter of brain tumor region are extracted by using the region property functions. This method is very simple, fast and versatile; therefore it can be applicable to all types of 2D MRI which represent the tumors.
Keywords: Magnetic Resonance Imaging (MRI), MATLAB Software, Segmentation, Extended maxima transformation, Region property function.
Abstract
Text Mining Methodology
Prajakta R. Pagar, Dr. M. U. Kharat
DOI: 10.17148/IJARCCE.2016.5735
Abstract: D-matrix is a standardized diagnostic model which is used to catch the fault system data and its causal relationship at the hierarchical system-level. Construction of D-Matrix by using the data source views the overall data by saving the entire database. Further it parses that data scanning which requires more memory and makes the process time consuming. Is describes construction and updation of D-Matrix by auto mining the unstructured repair verbatim ( written in unstructured text) data collected during fault diagnosis using document pre-processing, term extractor and phrase merging. The system composes the fault diagnosis ontology comprising of dependencies and relationships currently saw in the fault diagnosis domain of interest and then text mining algorithms make utilizing of ontology concept to identify the necessary artifacts, like as failure modes, parts, symptoms and conditions from the unstructured repair verbatim content. The proposed scheme is equipment as a prototype tool and accepted by utilizing real time information gathered from the automobile domain of interest.
Keywords: Data Mining, fault analysis, fault diagnosis, information retrieval, text processing
Abstract
Vachantar –Lokbhasha: A Speech to Text Conversion for Marathi
Archana . V. Chechare
DOI: 10.17148/IJARCCE.2016.5736
Abstract: Speech processing has always been so important application area of digital signal processing. The various fields are available for researching in speech processing that are speech recognition, speaker recognition, speech synthesis, speech coding etc. The objective of Vachantar Lokbhasha, A Speech to text conversion for Marathi is to recognize speaker�s speech and then convert it to text. This text will be saved to a file and that file can be further used. Automatic speaker recognition is to extract and recognize the information about speaker�s speech. Feature extraction is the first step for this. Many algorithms are stated by the researchers for feature extraction. In this work, the Mel Frequency Cepstral Coefficient (MFCC) feature extraction algorithm has been used for designing this system. In this Artificial Neural Networks will be used for feature classification.
Keywords: Automatic Speech Recognition (ASR), Mel-Frequency Cepstral Coefficients (MFCC), Feature Extraction, Neural Networks.
Abstract
A Hybrid Scheme for Cryptography and Watermarking
Amandeep Kaur, Rajbir Kaur
DOI: 10.17148/IJARCCE.2016.5737
Abstract: With the rapid development the computer network, data has been an exchange in the form of text, image, audio and video, hence securing of all type of data is most necessary in today�s era. To enhance security and copyright protection of digital data, we are implementing a hybrid scheme for cryptography and watermarking. In this scheme, the message divided the five different parts and encrypts them with the Fibonacci series, XOR cipher, PN sequence, RSA, Hill cipher. After obtaining the encrypted data, this data is hide using one bit LSB watermarking, two bit LSB watermarking and three bit LSB watermarking. This paper also represents the comparative analysis of one bit LSB watermarking, two bit LSB watermarking and three bit LSB watermarking.
Keywords: Encryption, Decryption, Cryptography, LSB, Watermarking, Fibonacci series, PN sequence, XOR cipher, RSA, Hill cipher, Hybrid technique.
Abstract
A review on the state of art of Internet of Things
T. Santhi Sri, J. Rajendra Prasad, Y. Vijayalakshmi
DOI: 10.17148/IJARCCE.2016.5738
Abstract: The Internet of Things is fast growing technology with business opportunities and risks. It is confluence of wireless networks, internet and computing. IoT connects the physical objects like vehicles, buildings and other devices with embedded intelligent sensors and enables these objects to exchange and collect data. The domains where IoT is becoming popular are smart cities, e-health, smart grids, e-commerce, smart transportation, and e-commerce etc. The embedded and wearable computing will have greater impact in providing services in wide range of applications by 2020[1]. The architecture of IoT is incorporated with the latest technologies of communication protocols, intelligent sensor and RFID. The security and privacy issues of IoT are crucial as it connects large number devices. In this article we analyze a state of art review of IoT with regard to technologies, protocols, application issues.
Keywords: Internet of Things (IoT), IoT protocols, IoT, architecture, IoT applications
Abstract
Data Filtering and Storage using WSN and Artificial Neural Networks
Rama Krishna K, Jagadevi N. Kalshetty, Ramya Srikanteswara, Kumar Abhishek
DOI: 10.17148/IJARCCE.2016.5739
Abstract: The state of art development in wireless communication has led to the development of various wireless sensors. The wireless sensors are versatile and low priced and can be used for several different applications like temperature monitoring, health monitoring. However there are certain limitations to the use of such sensors. Two of the few major limitations of wireless sensor networks are its inability to store data and transmit it back when needed and unreliability i.e. the sensor, due to its limited channel, bandwidth and lack of security becomes unreliable. The objective of this paper is to address the above two problems. The unreliability of the system is tackled by using artificial neural networks for data filtering i.e. the data at the sensor gateway is transmitted to an artificial neural network which filters out redundant data and also compresses the relevant data. The data is then transferred to cloud for storage where it can be accessed when needed. This can have various applications in data monitoring, prediction of natural disasters, weather forecast etc.
Keywords: WSN, Artificial neural network, Sensor gateway.
Abstract
Pedestrian Detection Using Moving Camera
Sahil Dalal, Rajesh Birok, Ashutosh Goswami
DOI: 10.17148/IJARCCE.2016.5740
Abstract: In the paper, segmentation is performed using Sliding Window method. When the camera is moving, then in such cases, the prevalent methods for segmentation like background subtraction will get failed. Therefore, with the help of sliding window technique which scans through the frame through different scales, segmentation of the object of interest, which is the pedestrian in our case, is done. For this, due to the advantages offered by HOG such as better representation of human contour, invariance to illumination changes and small movements, and easy computation in constant time make it best suited for its application as a feature extractor. After feature extraction, Neural network classifier modelled on training and subsequent testing, decides whether the region cropped by sliding window is in actual containing a pedestrian or not. In addition to that, neural network is preferred because single neural classifier can be used for training and classification of multiple classes and also for large set of database, convergence is better in neural network based classifier. And from the results it is also proven that neural network is successful in pedestrian detection.
Keywords: ANN, Canny HOG, PDS, RD-HOG.
Abstract
A Novel Clustering Algorithm for Classification of Network Traffic on Semi- Supervised Data
Anjali Wankhede, Kailash Patidar, Mr. Manoj Yadav
DOI: 10.17148/IJARCCE.2016.5741
Abstract: The goal of semi-supervised learning (SSL) methods is to reduce the amount of labeled training data required by learning from both labeled and unlabeled instances. Macskassy and Provost [1] proposed the weighted-vote relational neighbor classifier (wvRN) as a simple yet effective baseline for semi-supervised learning on network data. It is similar to many recent graph-based SSL methods (e.g., [2], [3]) and is shown to be essentially the same as the Gaussian-field classifier proposed by Zhu et al. [4] and proves to be very effective on some benchmark network datasets. We describe another simple and intuitive semi-supervised learning method based on random graph walk that outperforms wvRN by a large margin on several benchmark datasets when very few labels are available. Additionally, we show that using authoritative instances as training seeds instances that arguably cost much less to label dramatically reduces the amount of labeled data required to achieve the same classification accuracy. For some existing state-of-the-art semi-supervised learning methods the labeled data needed is reduced by a factor of 50.
Keywords: Semi-Supervised Learning(SSL), Clustering Algorithm, (wvRN), Network Traffic, Semi- Supervised Data.
Abstract
MKF-Firefly: Hybridization of Firefly and Multiple Kernel-Based Fuzzy C-Means Algorithm
Satish Chander, Vijaya P
DOI: 10.17148/IJARCCE.2016.5742
Abstract: Clustering find various application in the variety fields like, telecommunication, medical image processing, bioinformatics and so on. This high demand poses a challenge to the researchers to develop an effective and efficient clustering algorithm for grouping the data objects. Accordingly, literature presents various algorithms for data clustering using partitional-based approaches. This paper presents a new clustering algorithm, namely, MKF-Firefly which is developed by combining the multiple kernel-based objective function and firefly algorithm. The firefly algorithm finds the optimal cluster centroids using the multiple kernel-based objective function. The centroids obtained from the firefly algorithm are then utilized for clustering process. The proposed clustering process is evaluated using Rand coefficient, Jaccard coefficient and Clustering Accuracy on the two different datasets like iris and wine. The proposed MKF-firefly achieved the clustering accuracy of 97% on the iris dataset.
Keywords: Clustering, Firefly, optimization, Multiple Kernel-Based clustering, Rand coefficient.
Abstract
Quality Model Based Decision Support System for Cloud Migration
Anu A S
DOI: 10.17148/IJARCCE.2016.5743
Abstract: The aim of this work is the selection of most suitable cloud service provider for the migration of existing applications. Here the cloud provider selection is not only based on the quantitative and qualitative requirements of the application, but also based on cost minimization. For this purpose, this work proposes a decision support system that makes decisions with the help of a migration framework, which consider both the quantitative and qualitative factors. The proposed framework is then compared against the existing works.
Keywords: Cloud migration; decision support system; migration framework; usage pattern; Quality of Service
Abstract
Allocation of Phase-Based Scheduler for MapReduce Job Scheduling
Suryakant S. Bhalke
DOI: 10.17148/IJARCCE.2016.5744
Abstract: Hadoop MapReduce is effective user interface design classic for large scale data handling. MapReduce has two levels: Task-level and Phase level. In existing system, that focuses on scheduling at task level which tasks can have changing resource requirements. There are some difficult to efficiently apply accessible resources to reduce job implementation time. To report this limitation, this project proposes a Phase-Based Scheduler. Map Reduce which allocates resource information about status of every Phase the phase-based to executed job scheduling. The job scheduling of phase based is executed by the MasterNode, which handle & service lots of list of jobs in the system. EachNodeManager (slave node) from time to time getting a heartbeat message to the scheduler. Getting the status message from a NodeManager running on machine, the scheduler divides the use for fixed of phases for the tasks using the jobs phase-based resource requirement. This improves to reduce job implementation time. This is achieving high job performance and resource utilization.
Keywords: Big Data, Hadoop, Scheduler, MapReduce, Phase-Based Scheduler
Abstract
Resolution Enhancement of Images using Multi-wavelet and Interpolation Techniques
Arya A R, Sreeletha S H
DOI: 10.17148/IJARCCE.2016.5745
Abstract: Many digital imaging applications requires high resolution images or videos for later image processing and analysis. The need for high quality image is one of the major challenges in image processing. In this paper a study of image resolution enhancement methods using multi-wavelet and interpolation in wavelet domain is done. One of the most important quality factors in images comes from its resolution. Visual appearance of an image and image quality can be improved by the various enhancement techniques. Some spectral and spatial problems still prevail in digital images such as motion blur, pixelation and poor perception. The super resolution images are obtained by applying enhancement techniques on noisy and blurred images. In this paper, some of the resolution enhancement techniques such as Discrete Wavelet Transform, DWT-SWT and interpolation methods are described. Of these methods DWT-SWT method improves the visual appearance of the images is highlighted.
Keywords: Discrete Wavelet Transform, Stationary Wavelet Transform, Inverse Discrete Wavelet Transforms, High Resolution, Low Resolution, Interpolation.
Abstract
Geometrical Properties of 3-D Images and Its Uses in 3-D Image Processing
K. Rajiv, G. Ramesh Chandra, B. Basaveswara Rao
DOI: 10.17148/IJARCCE.2016.5746
Abstract: This paper discusses geometrical properties of the 3-D images and applications in 3-D image processing. The main focus is given to neighborhood geometric property. This paper also discusses three dimensional grid and its properties. 3-D Mathematical erosion and dilation is taken as an example to explain the use of neighborhood.
Keywords: Three Dimensional Grid, 3-D Images; 3-D Image Processing, 3-D Image Analysis.
Abstract
Implementation of an Efficient Noise and Air Pollution Monitoring System Using Internet of Things (IoT)
Anjaiah Guthi
DOI: 10.17148/IJARCCE.2016.5747
Abstract: The rapid growth in infrastructure and industrial plants creating environmental issues like climate change, malfunctioning and pollution has greatly influenced for the need of an efficient, cheap, operationally adaptable and smart monitoring systems. In this context smart sensor networks are an emerging field of research which combines many challenges of computer science, wireless communication and electronics. In this paper a solution for monitoring the noise and air pollution levels in industrial environment or particular area of interest using wireless embedded computing system is proposed. The solution includes the technology Internet of Things (IoT) which is outcome of merged field of computer science and electronics. Here the sensing devices are connected to the embedded computing system to monitor the fluctuation of parameters like noise and air pollution levels from their normal levels. This model is adaptable and distributive for any infrastructural environment that needs continuous monitoring, controlling and behavior analysis. The working performance of the proposed model is evaluated using prototype implementation, consisting of Arduino UNO board, sensor devices and MATLAB with Arduino hardware support package. The implementation is tested for two or three parameters like noise, CO and radiation levels with respect to the normal behavior levels or given specifications which provide a control over the pollution monitoring to make the environment smart.
Keywords: Internet of Things (IoT); Embedded Computing System; Arduino UNO; MATLAB Software; Smart Environment.
Abstract
Comparative Analysis of Direction of Arrival Estimation algorithms
S. S. Jadhav, D. G. Ganage, S. A. Wagh
DOI: 10.17148/IJARCCE.2016.5748
Abstract: Direction of Arrival (DOA) estimation has typically played a key role in signal processing. Its task is to find the directions impinging on an antenna array to increase the performance of the received signal. It has become the key of technique implementation to use DOA estimation methods that are applicable to most environments. This estimation is an efficient method for improving the quality of service in a communication system by focusing the reception and transmission only in the estimated direction. The traditional algorithms such as MUSIC, ESPRIT, etc. can get superior performance for DOA estimation in the rich receiving conditions, but they are not fit for adverse environment such as low SNR, small number of array elements or snapshots, etc. In order to improve the performance of DOA estimation, the modified method is based on wavelet operator. Moreover, the method is applied to MUSIC (Multiple Signal Classification) DOA estimation algorithm to get the modified algorithm WMUSIC. Undoubtedly, the wavelet based method expands the application range of traditional DOA estimation algorithms and has widely practical prospects in future. Further results are improved to minimize the errors in angle estimation by using optimization techniques.
Keywords: Direction of Arrival, MUSIC, SNR.
Abstract
Gigabit Passive Optical Network- A Review
Kulwinder Kaur, Ramandeep Kaur, Rajandeep Singh
DOI: 10.17148/IJARCCE.2016.5749
Abstract: A review on current advancement in gigabit passive optical network technologies to standardized economical system is investigated in this paper and also establishes cost-effective solutions and potential areas of application. The next-generation gigabit passive optical networks are required to provide flexible and various services to users in a cost-effective way. A GPON system is a bi-directional point-to-multipoint network architecture deploying optical access lines between a carrier�s central office and customer sites. The GPON standard has more speed as compare to all other PON standards.
Keywords: Gigabit Passive Optical Network (GPON), PON standards, APON, BPON, EPON, GEPON.
Abstract
Opinion feature Identification via Intrinsic and Extrinsic Domain Relevance
Vinakshi R. Longani, Prof. M. S. Ankoshe
DOI: 10.17148/IJARCCE.2016.5750
Abstract: In this paper the main focus is on identifying opinion features via its distributional disparities across two Corpora domain dependent which is intrinsic domain and domain independent which is extrinsic domain. In the Initial stage candidate features are extracted via syntactic rules, then in the second stage we calculate domain relevance Score of candidate features related to intrinsic domain which is Intrinsic Domain relevance score(IDR Score) And that of extrinsic domain is Extrinsic Domain Relevance Score (EDR Score). At the very last stage we identify the Opinion features by thresholding activity. Those candidate features intrinsic domain relevance score greater than Threshold and those that having score less than extrinsic threshold is identified as opinion feature. We further determine the polarity of opinion feature whether it is positive, negative or neutral
Keywords: Candidate features, Intrinsic Domain Relevance Score (IDR Sore) and Extrinsic Domain Relevance Score (EDR Score),Opinion Features.
Abstract
ATM Transaction without Debit Card
Pranav Gebad, Prof. N. A. Dawande
DOI: 10.17148/IJARCCE.2016.5751
Abstract: Today, number of the systems is automated in order to solve new challenges and present day requirements to achieve better results. Automated Systems have not more manual operations, so that flexibility, reliabilities are high and accurate. There for each field use automated control systems, especially in field of electronics. The goal of the project is to develop unique system through GSM technology controlling various units of the houses, industries, and offers a scarified system. The various appliances are used by controlling them remotely by using GSM Technology, which enables the user to remotely handle the operations different types of the appliances. Just by pressing keypad the user does switching operations on the device. The system is designed to carry out ATM transactions without the use of debit card. The structure of ATM transaction without using debit card contains a matrix keypad, a GSM modem, an IVRS, DTMF decoder for security interfaced to the microcontroller (ARM 9). The keypad interfaced to the controller is used as the password entry system. The GSM modem uses the UART interface to the controller. When the unknown user gives an unauthorized password then the controller uses the modem to give knowledge the user. The modem gives a secure dial up number and message. And uses the GSM network to transmit the message. There is a socket in the modem which inputs the SIM card to use the GSM network. The destination mobile number & the password are stored in the EEPROM of the controller.
Keywords: Card less; secure transaction, Anti-theft, Fast process.
Abstract
A Survey on Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
S. Sahaya Nirmala Daisy, Dr. D. Ravindran
DOI: 10.17148/IJARCCE.2016.5752
Abstract: Cloud computing is the delivery of computing services over the Internet. The present time cloud computing provides us a efficient way to share data amoung cloud users with low maintenance. In this paper we see the secure multiowner data sharing scheme for dynamic groups in cloud computing. And also a secure multiowner data sharing schema by leveraging group signature and using dynamic broadcast encryption techniques any members can share and data with other users. MONA presented for secured multi owner data sharing to resolve the many problem in the cloud computing.Whenever the existing system is revocation of member form group.manager has to generate a new key and then distribute to other members able to upload or download files. So that we need for generating new key each time whenever therisa revocation of members.
Keywords: Cloud computing,Data sharing, Group Signature,Dynamic group
Abstract
A Low-Voltage and Low-Power 3-GHz CMOS LC VCO for S-Band Wireless Applications
Akshay B . Mahajan, Dr.Shirbahadurkar
DOI: 10.17148/IJARCCE.2016.5753
Abstract: In this paper presents integrated low-power CMOS LC voltage-controlled oscillator (VCO) by using complementary cross-coupled pair of CMOS. A fully integrated 0.13-�m CMOS LC-tank voltage-controlled oscillator (VCO) suitable for low voltage and low-power S-band wireless application. This structure can be widely used in wireless communication. Technique is employed two cross-coupled pairs by adopting admittance-transforming. Using forward-body-biased metal oxide semiconductor ?eld effect transistors. Despite the low power supply near threshold voltage. Proposed VCO achieves phase noise of -110.1 to -130dBc/Hz at 1MHz offset. Tuning range 29.2% to 45.1 % while consuming only 594 �W in 0.4V supply. Tuning range of the proposed VCO is -192.1db to -225.4 dB at 3GHz.
Keywords: ADS (Advance Design System) VCO, phase noise
Abstract
Electrical Impedance Tomogrphy
Prof. Prabhakar Manage, Shivani I Melge, Devang Rajesh Bhutara, Amit A Nainar, Ketaki S Shah
DOI: 10.17148/IJARCCE.2016.5754
Abstract: Electrical impedance tomography (EIT) is the technique that applies time varying currents to the surface of a human body and stores the resulting voltages in order to reconstruct and display the electrical conductivity and permittivity in the interior of the body. This technique exhibits the electrical properties of tissues such as resistance and capacitance. It exploits the differences in the electrical properties of tissues in order to generate a tomographic image. When electric current is fed through different available electrode pairs and by measuring the corresponding voltages at remaining pair of electrodes, it is possible to create an image of the impedance of different regions by using certain reconstruction algorithms. This method is called impedance imaging.
Keywords: Electrical Impedance Tomography (EIT); Data Acquisition; current Injection; Electrodes.
Abstract
Product Aspect Ranking on the Consumers Reviews and Its Applications
Miss. Dhanashri Rohidas Londhe
DOI: 10.17148/IJARCCE.2016.5755
Abstract: Consumers normally search large amount of information from online reviews before buying any product, while many business firms use online customer reviews as significant feedbacks in developing, marketing and promoting their product. The objective of our work is proposing a product aspect ranking framework, which automatically identifies the important aspects of products from online consumer reviews, which makes it easier for the consumers for buying the product by using the numerous online consumer reviews. System classifies the reviews on the basis of aspects. And then the aspects are ranked with probability ranking algorithm. Millions of reviews from various websites are grouped and made available within each website by means of graphical representations of each aspect of different products.
Keywords: Aspect Ranking, Aspect Identification, Consumer Reviews, Opinions, Product Aspects, Sentiment Classification, Graphical Representation.
Abstract
Robust Dynamic Vehicle Collision Avoidance System Using Wireless Communication: A Review
Vikas Chhabra, Er. Ankita Mittal
DOI: 10.17148/IJARCCE.2016.5756
Abstract: In order to reduce the traffic accidents, it is necessary to control the speed of vehicle in freeway. Safety assurance of vehicles is of great importance to improve road transportation. For this, it presents a review on vehicle collision avoidance system using wireless communication. We consider the problem of collision avoidance at vehicular intersections for a set of controlled and uncontrolled vehicles that are linked by wireless communication. Inter-vehicle safety communication is also a method to improve road safety. In this work, it will design a controller using fuzzy approach for controlling the movement of vehicle. In this, it presents a WSN application to avoid obstacles and vehicle accidents. This system will contain a sensor set, a managing unit and a monitoring platform. The collected data will be transmitted wirelessly to monitoring platform for data processing. The main part of the work was to carry out a feasibility study on vehicle collision avoidance system using wireless sensor networks. We then pose the desired collision avoidance problem in the framework of the theory of supervisory control. The problem has major requirements: safety, i.e. vehicular collisions must be avoided; non-blockingness, i.e., vehicles should not deadlock and must reach their final destinations, which in this case means they must completely cross the intersection.
Keywords: VANET, Wireless Communication, Vehicle Collision Avoidance, Fuzzy Controller etc.
Abstract
Study and Implementation of Unitified Power Quality Controller for Mitigation of Power Quality Issues
Rajat Malhotra, Gaurav Sharma
DOI: 10.17148/IJARCCE.2016.5757
Abstract: This work deals with conceptual study of unified power quality conditioner (UPQC) during voltage sag and swell on the power network. Power quality has become an important factor in power systems, for consumer and household appliances with production of various electric and electronic equipment and computer systems. The main causes of a poor power quality are harmonic currents, poor power factor, supply voltage variations etc. The Unified Power Quality Conditioner (UPQC) is a custom power device, which diminishes voltage and current related power quality issues. It uses a PWM control for firing the circuit and provides six clock pulses for operating the IGBTs circuit. It also prevents load current harmonics from entering the utility and corrects the input power factor of the load. In this, a frequency of 50 Hz is used for Indian systems.
Keywords: UPQC, DSTATCOM, DVR, PWM Pulses etc.
Abstract
Bit Error Rate Performance Analysis with Beam forming
Pawan Soni, Narendra Singh Thakur, Ritu Chauhan
DOI: 10.17148/IJARCCE.2016.5758
Abstract: In wireless communication system, there exists a problem of fading, due to which sometimes very weak signal will be received on another side resulting in errors in received bits. Bit error rate (BER) should be improved for getting good quality of signal. One of the ways to improve BER is Beam Forming technique. In this paper, the BER is analysed for BPSK in Rayleigh fading channel with 2 or more transmitter antenna and 1 receiver antenna with or without beam forming.
Keywords: MIMO, Multipath, fading, beam forming.
Abstract
Homomorphic Encryption Algorithms for Securing Data against Untrusted Cloud
Gaurav Somani, Sourabh Garg
DOI: 10.17148/IJARCCE.2016.5759
Abstract: Cloud Computing has revolutionized businesses and individuals needs by outsourcing computations and storage providing significant cost-effectiveness and flexibility. With its rapid development, the security and privacy are the primary concerns. The homomorphic encryption techniques have provided a good potential in mitigating these issues in recent years. It allows the cloud to perform blind-computations on the encrypted inputs uploaded by the user without prior decryption and return the encrypted results, which can only be decrypted by the user who initiates the proceedings. Thus, clients can rely on the cloud services without compromising the privacy. Some classical, as well as recent practical homomorphic schemes and their algorithms, are discussed in this paper. The main focus is to provide the reader good background knowledge on various schemes for applications in context to practical implementations based on their scope, performance, security and complexity factors.
Keywords: Homomorphic encryption, Cloud Security, FHE schemes, LWE.
Abstract
Amplitude Noise Reduction in Millimeter- Wave Radio-Over-Fiber Systems by using Filtration Techniques
Neeraj Singh, Harmanjit Kaur
DOI: 10.17148/IJARCCE.2016.5760
Abstract: RoF is a technique widely used in wireless network to control the data traffic over the network. In this radio signals transmits through fiber optic cables in the form of light. It is widely applicable in real time applications. Some other usage of this is cables used for televisions etc. Noise is a parameter which effects the data traveling through fiber cables. There are many techniques available to remove the noise from the signals. Envelope detectors are available to remove the noise from the signals but it is not capable to remove the noise properly from the signals. It takes the high frequency signals as input and produces the output by enveloping the signals. This leads to the distortion in the signals. In this paper modulated technique is used to remove the noise from the signals. This modulation technique is based on traditional noise removal technique. Along with this the filters are used to improve the quality of the signal. After simulation it is proved that the modulation technique with some alterations is an efficient technique to remove the noise.
Keywords: Base station, Radio over Fiber, Electric to optical converter, BER, Q factor.
Abstract
File Sharing System using Multi-keyword Ranked search with Data Cache
Nevil Raju Philip, R. Anitha
DOI: 10.17148/IJARCCE.2016.5761
Abstract: With the advent of communication systems and high speed data networks, the amount of data and files an individual or an organization has to maintain and access have also increased multi fold. But with the limited storage space available in a mobile device or a laptop it is not feasible to store all the files in the personal systems. Hence we require a common file sharing platform. These systems provide functionality to data owners to upload their private data and users to search and retrieve the required files. But performing search and retrieval while preserving data privacy is a challenge as data is stored globally by a third party. To improve data security almost all file sharing platforms store the data in an encrypted manner. For enabling search and retrieval functionality, it is required to create a searchable index which contains the keywords present in the files and its respective weight or relevance in the file. The initial systems only supported single keyword search and the keywords were not encrypted as computations on encrypted data is complex. To enhance security we propose a system that implements two-round search with multi-keyword search support. The keywords are also encrypted to enhance the security. To improve efficiency and system performance a user cache is implemented which helps is removing the duplicate files.
Keywords: Homomorphic encryption, Multi-Keyword based file retrieval, relevance search
Abstract
A Novel Study on Data Forwarding Mechanism with Improved Sleep Scheduling in WSN
Sushila Batan, Kanika Sharma
DOI: 10.17148/IJARCCE.2016.5762
Abstract: Power saving is an important issue in WSN now days. For minimizing the power usage, the nodes get switching to sleep mode. So, the main objective of this work is to design an improved algorithm for sleep scheduling in WSN. It will provide the concept of synchronous and asynchronous sleep scheduling. It will also provide the concept of adaptive duty cycle and also provides optimization of energy. In this, it will formulate the routing problem as shortest path problem. The proposed mechanism will be implemented with MATLAB.
Keywords: WSN System, Sleep awake cycle, Route Management, Sleep Scheduling etc.
Abstract
Low Power Three Stage Operational Transconductance Amplifier Design
Priti Gupta, Rajesh Mehra
DOI: 10.17148/IJARCCE.2016.5763
Abstract: An operational transconductance-amplifier (OTA) is basically designed for low voltage and low power applications. Bulk driven technique is widely used for the low supply voltage applications in the analog circuits, but it has another drawbacks such as low gain , low slew rate , and low bandwidth. In this paper, cascade technique is used the overcome the problem of the low gain, slew rate and low bandwidth. The proposed bulk driven three stage OTA is implemented with the use of cascoding technique. The 65nm CMOS technology is used for the designing of the proposed three stage OTA circuit. The measured results of the simulation shows that the proposed three stage OTA circuit requires the power consumption of 124.3�W and slew rate of 77.20 V/us. It also improves the gain, bandwidth of the bulk driven OTA.
Keywords: Moore�s Law, CMOS technology, Cascoding technique, OTA.
Abstract
Lossless and Reversible Data Hiding
Mayuri B. Lokhande, Prof. N. G. Pardeshi
DOI: 10.17148/IJARCCE.2016.5764
Abstract: The paper proposes a lossless, a reversible, and a combined data hiding schemes for encrypted images. It uses the concept of Reversible data hiding and Lossless data hiding concept. Using these concepts the data can be embedded into cover image which is encrypted. For encryption of cover image, paillier algorithm is used. The paillier algorithm generates the pair of public private key. In contrast to using an existing cover image to hide messages, the algorithm conceals the source image and embeds secret messages using. This allows extracting the secret messages and source image from a embedded data in encrypted image. The approach offers some advantages. First, the scheme offers the embedding capacity that is proportional to the number of pixel in image. Second, the reversible capability inherited from this scheme provides functionality, which allows recovery of the cover image.
Keywords: Data embedding, reversible, lossless, histogram shrinks.
Abstract
Correlation Based Feature Selection for Movie Review Sentiment Classification
K. Bhuvaneswari, Dr. R. Parimala
DOI: 10.17148/IJARCCE.2016.5765
Abstract: Sentiment Analysis is one of the recent research areas in Data Mining concepts and Natural Language Processing techniques. It retrieves users or customer reviews from the web and classify the reviews using sentiment analysis approach. This paper proposes a method for sentiment classification using correlation based feature selection. First, different levels of data pre-processing techniques applied on the labeled polarity movie review dataset results in structured documents with Bag of Words. Second, correlation attribute method is used for feature selection to identify most important features. Finally, the two popular classifiers namely Naive Bayes(NB) and Support Vector Machine(SVM) are implemented and evaluated various performance measures of sentiment analysis. The proposed model concludes with the better results of accuracy using SVM classifier.
Keywords: Sentiment Analysis, Opinion Mining, Correlation, Naive Bayes, Support Vector Machine.
Abstract
Energy Efficient Mobile Data Collection in Wireless Sensor Network
Neethu Krishnan, Abhitha .E
DOI: 10.17148/IJARCCE.2016.5766
Abstract: Wireless Sensor Network (WSN) play a crucial role in today�s world. The role of Wireless Sensor Network becomes effective if they can offer good sensing quality, network coverage, energy consumption mobility, long network lifetime, low data collection latency. A new data gathering mechanism for large scale Wireless sensor network is being introduced by deploying two cluster head within a cluster. Also a mobile collector, SenCar patrols the selected polling point for data collection and finally returns to static sink node where further data processing take place. The stimulation results demonstrate that proposed scheme of data gathering outperform the compared scheme.
Keywords: LBC, SenCar, cluster head, sensors.
Abstract
An Efficient Organization for Wireless Sensor Networks
Madhuneha A. Shrivastava, Prof. R.K. Krishna
DOI: 10.17148/IJARCCE.2016.5767
Abstract: In this paper we focus on finding the most optimal first transmission path and all transmission paths in duty cycled mobile WSN�s employing geographical routing. The system introduces the concept of Load Calculation and delay as the main parameter in finding the optimal paths with Geographic Distance Based Connected k-neighborhood sleep scheduling algorithm. The WSN networks employing duty cycle technique in geographic routing has a task to find out the path from sensor to Base Station of the network to send the sensed data. GCKN for static WSN. Hence this research work proposes the system that will calculate the best optimal path from source node to destination by taking into consideration the load on each node and delay incurred by each node in Duty-Cycled Mobile sensor networks along with geographic routing.
Keywords: Geographic Routing, Sleep Scheduling, Duty �Cycled Mobile Sensor Network, Network simulator-2 (NS2)
Abstract
2D to 3D Image Conversion using Trimetric Projection and Depth-map Estimation
Rashmi Snawer, Asst. Prof. Ms. Anubhooti Papola
DOI: 10.17148/IJARCCE.2016.5768
Abstract: The three-dimensional (3D) displays needed the axes and angle information for dimensional view which is engaged in the predictable 2D substance. This work presents a novel methodology that involuntarily converts 2D images into 3D which is easily available for users with the help of our mM desktop application. Here we are working on axonometric projection and focusing on axis of any object or image, in this methodology we are going to merge three different axonometric projections and showing this as a new technique in Tri-metric projection. Projection applies in 2D records which we have to convert in 3D. This technique is helpful in 2d to 3D conversion with a better view and it takes less time for conversion since researchers are using three different projection techniques together for an exceptional result.
Keywords: Predictable 2D substance, focusing on axis of any object or image, 2D records which we have to convert in 3D help of our mM desktop application
Abstract
An Improved Method for Scheduling of Scientific Workflows
Merly Mathew, Jayalekshmi S
DOI: 10.17148/IJARCCE.2016.5769
Abstract: Cloud computing is the latest distributed computer paradigm where the resources are delivered over the Internet as services. It follows a pay-as-you-go model where users are charged with respect to their use. A lot of researches are being done on the scheduling in cloud computing and most of them are about workflow and job scheduling. A workflow is defined as a sequence of tasks interconnected via data or computing dependencies. Many scheduling policies have been proposed which aim to maximize the amount of work completed while meeting QoS constraints such as deadline and budget. However many of them are not optimal because they do not incorporate some basic principles of cloud computing such as the elasticity, heterogeneity of the resources. In this paper a meta-heuristic optimization technique, HDPSO is used to minimize the execution cost. Other parameters like makespan, execution time are considered within heterogeneous and homogeneous environment of virtual machines.
Keywords: Cloud Computing, HDPSO, QoS, Scheduling, SLA, Workflow.
Abstract
A Survey on Recommender System
Miss. Priya D. Rakibe, Dr. Anil B. Pawar
DOI: 10.17148/IJARCCE.2016.5770
Abstract: This work proposes a literature survey on Recommender systems which are applied in a variety of applications like movies, music, research articles, social tags and restaurants etc. as these systems have become extremely common in recent years. Providing the good recommendations to the customer based on their usage patterns is the major focus of every recommendation system�s study. Prior research has reported that desired property of recommendation algorithm is the stability and has important implications on user�s trust and acceptance of recommendation. Two scalable , general purpose meta algorithmic approaches can be used in conjunction with different traditional recommendation algorithms to improve their stability are introduced in[1]. Recommendations based on user�s usage patterns would also be the another interesting direction in research of recommendation system�s algorithm.
Keywords: Recommender Systems, Recommendation Stability, User�s Usage Patterns
Abstract
Design of Low Pass Fir Interpolator for Wireless Communication Application
Renuka Verma, Rajesh Mehra
DOI: 10.17148/IJARCCE.2016.5771
Abstract: The purpose of this paper is to design the Interpolator for WLAN 802.11n applications. The design of interpolator is based on Low Pass FIR filter. FIR filter show linear and stable performance if compare to the IIR filter. Equiripple technique and Kaiser Window are used here for the design simulation purpose which is done by using Matlab. The performance has been compared in the terms of stop band ripples, RMS EVM and PSD. It is concluded from the simulation results that Kaiser Window show better results when less transition width is required and Equiripple technique gives reduced amount of stop band ripples. The result also shows that performance of all the designs can be changed when filter order is increased.
Keywords: Equiripple technique, IEEE802.11n, Interpolator, Kaiser Window, Low Pass Filter, MATLAB, MIMO, OFDM.
Abstract
Design of High Performance Double Tail Comparator Using Header Switch
Vanshikha Singh, Rajesh Mehra
DOI: 10.17148/IJARCCE.2016.5772
Abstract: Power consumption is most important parameter for concern in CMOS technology. For past several years, technology scaling is the most important procedure for the improvement of the performance of circuit in terms of the power, speed etc. In this paper, design and analysis of double tail comparator with sleep transistor is done in terms of power, delay and noise. Comparator is the very important circuit in the digital design and the performance of comparator is defined in terms of power and speed, which is the most important factor in attaining the complete performance of ADCs. Several ADCs require small delay, Low power comparators with small die size. It is observed that in the proposed comparator power, delay and pdp is reduced having values of 169.9e-9 watts, 319.7ps and 54.25e-16 respectively.
Keywords: ADC, Double-tail Comparator, Dynamic Comparator, Low power design.
Abstract
Preview Analysis in Requirement Engineering
Harjot Kaur, Dilraj Singh, Pawandeep Kaur
DOI: 10.17148/IJARCCE.2016.5773
Abstract: This paper describes the role of preview in software engineering. It defines the role of requirement discovery in detail that encompasses following: 1) Requirement discovery 2) Requirement analysis 3) Requirement negotiation 4) Requirement definition. Requirement lies under many category and specific to system. In Requirement discovery we will be dealing with all the fact gathering methods. Preview also gives affect of problems associated with requirement discovery that are unexpected requirements, incomplete requirements, confusing requirements, weak coordination mechanism, and untraceable requirements and sometimes wrong. Future work in this paper defines the points to be considered for better requirement discovery.
Keywords: Requirements Discovery, Requirement Analysis, Requirement Negotiation, Requirement definition.
Abstract
Efficient Public Auditing Scheme for Shared Cloud Data Storage Using Multi Replica Merkel Hash Tree
Kaveri Sonawane, Prof. Ranjana Dahake
DOI: 10.17148/IJARCCE.2016.5774
Abstract: Cloud computing is in demand in recent portion of decades as data transaction and storage it is exponentially increases as far as web based systems are concern. Also Cloud provides dynamic storage space and can handle big data dealing complexities. Though they can manage cloud big data complexities, it is also semi trusted entity. Cloud shows secure but snooping behaviour hence integrity of data and security is major part of concern. Also replication of data is required to improve data availability on cloud. Hence data replication process is provided by the cloud. Also there are cloud data auditing processes that keep the trace of data integrity. To do auditing process, complete dataset retrieval is not required. There are existing data auditing schemes that has flaws when concern to big data. These flaws can be like time consuming process of multiple replica update when verification is done, problem is simultaneous operations of authentication and auditing etc. Hence to rectify these problems proper solution can be developed for auditing process. To address these problems with big data in current public auditing, we proposed a multi-replica dynamic public auditing approach for shared user. For time problem we introduced SHA-1 algorithm instead of previous algorithm that gives significance time improvement that can bridge the gaps mentioned in above discussion.
Keywords: Cloud Computing, Public Data auditing, Big Data, Merkel Hash Tree.
Abstract
Link Aggregation for Embedded Applications
Nandini .S, Prof. Sankar Dasiga
DOI: 10.17148/IJARCCE.2016.5775
Abstract: Connectivity is a key feature for digital devices to exist in this connected world. Every device sends and receives the data. As the demand of data communication is increasing day by day has resulted in enhancements of capacity and QoS of interfaces and devices supporting more than one communication types. The subsequent evolution to enhance the data communication speed is to aggregate the multiple physical channels, aka Link Aggregation. Link aggregation is already in use for faster data syncs across servers using dedicated links and, IEEE has already come up with the standards for the same. With the rapid strides in the integration technology etc yet another trend that is emerging currently is the ever increasing capabilities and applications of embedded systems. Embedded Systems too now simultaneously support different types of communication interfaces!! It is envisaged that �Link Aggregation� would soon become a requirement for embedded systems, and this project work was taken up towards studying the possibilities. Raspberry Pi is an open and also regarded as a good reference platform for Embedded Systems development was chosen for the study in this project work. Ethernet and Wi-Fi are the most common and standard communication interfaces supported in almost every digital system, and, TCP, UDP and SCTP are the very commonly employed protocols for data communication. Therefore these interfaces and protocols have been selected for the study and comparison of performance of data communication between computer and embedded platform in this project work. Having collected the data and done some analysis, few recommendations for further enhancements and work were also made from this work.
Keywords: Link Aggregation, data rate, client server communication, point to point communication, Raspberry pi, protocols, performance.
Abstract
Using Rule Based and Blocking Approaches to accomplish Entity Identification for Data Cleaning
Ankita Saxena, Prof. Ranjana Dahake
DOI: 10.17148/IJARCCE.2016.5776
Abstract: In today�s scenario entity appear in multiple data sources so it is necessary to identify the records referring to the same real-world entity, which is named as Entity Resolution (ER).ER is one of the most substantial problems in data cleaning and ascends in many applications such as information integration and information retrieval. Familiar ER approaches are in sufficient to identify records based on pair wise likeness comparisons, which assumes that records referring to the same entity are more similar to each other than otherwise. However for certain circumstances this assumption does not always hold in practice and likeness comparisons do not work well when such assumption breaks. So to overcome outdated ER drawback a new set of rules which could describe the complex matching conditions between records and entities is proposed such as rule discovery algorithm, rule based ER algorithm along with blocking scheme methods to get more resolved classified entity set.
Keywords: Entity Resolution, Data Cleaning, Rule Learning and Meta blocking.
Abstract
Efficient Dynamic Resource Allocation Using Map-Reduce
Ms. Rutul D. Dhomse, Prof. R.N. Phursule
DOI: 10.17148/IJARCCE.2016.5777
Abstract: Map-Reduce gives an offering encoding model to enormous information exchanges. One important problem in map-reduce is efficiently allocation of resources; it�s a crucial the development of stragglers that will make the data allocated to each and every reducer disturbance. This paper offers an effective resource utilization algorithm using Kerberos in Mapper and Reducer phase. Goal is to minimize the operating effort and by reordering the job list authenticate the user for execution of any job on map-reduce. This process mostly squares up the resource allocation. After we implement Kerberos using Enterprise Identity Management i.e EIM system of it in Hadoop, the tests show that Kerberos carries minimal over-head which enable it to accelerate the performance time of a few preferred programs undoubtedly. We examine an advancement arrangement about how to actualize the token validation in light of the Kerberos pre-authentication system. We propose a pre-authentication system for Kerberos that permits clients to validate to Key Distribution Centre (KDC) utilizing a standard token, and build up a module for Kerberos that can be conveyed independently to utilize the new system. In light of that, we build up our token validation answer for the whole Hadoop stack that incorporates character administration approval arrangements, then keeping away from risk, confusion and organization overhead.
Keywords: EIM, KDC, Mapper, Reducer, Resource Utilization
Abstract
Scheduling Algorithms in Distributed Data Warehouse Environment: A Survey
Krishnaveni Sakkarapani, Sathish Ayyaswamy
DOI: 10.17148/IJARCCE.2016.5778
Abstract: The data are actuality distributed across many data warehouses in various systems at different sites are collected by the distributed data warehouse system and transformed into a single view which support the decision makers to create queries, perform analysis and make reports. In a spread environment multi-stage processing is performed which involves many joint and fragmented operations to be performed when processing the queries thereby increasing the processing time. Scheduling algorithms are used to determination these issues. The query sorting technique is commonly used for formatting the number of queries and grouped together. This idea describes prior art and some important work done in the research areas of data warehouse, information collected, content-based data retrieval and query processing. It borrows techniques from these fields and the purpose is to allow the reader to place their contributions in the context of previous work done in these areas and also makes a comparative analysis of existing solution strategies. Also this paper discuss about the usage of grid based algorithms in data warehouse environment at the time of scheduling tasks as well as resources.
Keywords: Data warehouse, scheduling algorithms, grid computing.
Abstract
LTE Direct as a Device-to-Device Network Technology: Use Cases and Security
Umut Can Çabuk, Georgios Kanakis, Feriştah Dalkılıç
DOI: 10.17148/IJARCCE.2016.5779
Abstract: While the Internet is evolving to the Internet of Things, all other technologies that are related to it are also advancing in a way to contain and support concepts like device-to-device networking, proximate discovery, energy efficiency and security. One of the fastest thrives can be seen in mobile communication technologies. This became more obvious after 4G spread out. In our study, we present a review of a new and revolutionary mobile technology under development: LTE Direct; which runs on licensed radio spectrum and is claimed to be energy efficient and secure, while enabling new approaches for the Internet of Things. We state why and how LTE Direct should replace existing systems, by making an analysis considering provided features, resource consumption, possible use cases and security concerns, as well as comparisons with the conventional technologies. Lastly, we provide ideas for the areas where further research should be made to have this system be a reality.
Keywords: LTE Direct, Device-to-Device Networking, Internet of Things, Proximate Discovery, Energy Efficiency.
Abstract
A Clustering based Cross Layer Protocol for optimizing Energy Efficiency in Wireless Sensor Network using Duty Cycling Approach
Vishal Singh, Dr. Maninder Singh
DOI: 10.17148/IJARCCE.2016.5780
Abstract: WSNs are a special type of wireless networks where the nodes are static, have limited computation and battery capacities and have limited transmission ranges. They are battery operated computing and sensing devices. The sensor nodes will be planted in an ad hoc fashion with individual nodes staying inactive for large periods of time but suddenly becoming active on detecting an event. Energy management is a noteworthy issue in wireless sensor networks. In this paper, we describe DCSMCL Protocol for power management in wireless sensor networks. We assess the execution of the DCSMCL Protocol, over a sensor network with SMAC and ZMAC schemes, in terms of energy consumed, throughput, End to End Delay and Jitter for varying rounds of transmissions. DCSMCL demonstrates an exceptionally superior performance in terms of energy consumption, throughput, End to End Delay and Jitter contrasted with SMAC and ZMAC schemes.
Keywords: Energy efficiency, throughput, end to end delay, Jitter, SMAC, ZMAC.
Abstract
A Review On Metrics in SOA
Simardeep Kaur, Saloni Khanna
DOI: 10.17148/IJARCCE.2016.5781
Abstract: A service-oriented architecture (SOA) is an architectural pattern in computer software design in which application components provide services to other components via a communications protocol, typically over a network. The principles of service-orientation are independent of any vendor, product or technology. A service is a self-contained unit of functionality, such as retrieving an online bank statement. By that definition, a service is an operation that may be discretely invoked. However, in the Web Services Description Language (WSDL), a service is an interface definition that may list several discrete services/operations. And elsewhere, the term service is used for a component that is encapsulated behind an interface. Metrics play an important role in empirical software engineering research as well as in industrial measurement programs. The metrics presented in this paper measure the difference between class inheritance and interface programming. The metric values of class inheritance and interface prove which program is good to use. Our goal is comparing the inheritance and interface concepts in object oriented programming through cohesion- metrics. Complexity, Service granularity metrics
Keywords: SOA, Cohesion, complexity, granulity ,Metrics, WSDL, Inheritance, Services.
Abstract
Secure Data Deduplication
Vijay M Hittalmani, Prof. Vidya I. Hadimani
DOI: 10.17148/IJARCCE.2016.5782
Abstract: Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the confidentiality of sensitive data while supporting deduplication, the convergent encryption technique has been proposed to encrypt the data before outsourcing. To better protect data security, this paper makes the first attempt to formally address the problem of authorized data deduplication. Different from traditional deduplication systems, the differential privileges of users are further considered in duplicate check besides the data itself. We also present several new deduplication constructions supporting authorized duplicate check in hybrid cloud architecture. Security analysis demonstrates that our scheme is secure in terms of the definitions specified in the proposed security model. As a proof of concept, we implement a prototype of our proposed authorized duplicate check scheme and conduct test bed experiments using our prototype. We show that our proposed authorized duplicate check scheme incurs minimal overhead compared to normal operations.
Keywords: Deduplication, authorized duplicate check, confidentiality, hybrid cloud
Abstract
Optimized Design of Active Pixel Sensor using CMOS 180 nm Technology
Dipti, Rajesh Mehra, Deep Sehgal
DOI: 10.17148/IJARCCE.2016.5783
Abstract: In this paper, an Active Pixel Sensor of CMOS Imager using 5T architecture has presented. The sensor has been designed in 180nm CMOS technology. This CMOS Image Sensor consist of pixel that act as basic unit cell, called picture element that employs number of NMOS transistors with single reverse bias p-n-junction diode. The schematic, layout and simulated results of Pixel have been presented and described. The pixel designed in this paper occupies the area of (10X10) um2. There are such parameters of Pixel have been modified- Well capacity, Conversion gain and Fill factor. The calculated results of sensor employs well capacity of (55935 e-), Conversion gain of (39.5 �V/e-) and Fill factor of (45.5%).
Keywords: CMOS Image Sensor (CIS), Active Pixel Sensor (APS), Photodiode, Image Sensor, CMOS.
Abstract
Patient of Foot Ulcer Diabetes Identification Based on Smartphone
Sadhana S.Jadhav, Prof. Manisha M. Naoghare
DOI: 10.17148/IJARCCE.2016.5784
Abstract: Our System a novel wound image analysis System implemented solely on Gmail Smartphone. Now-a-day�s many people face to Foot ulcer. The Aim is to identify foot ulcer by Smartphone. The camera on the Smartphone with the assistance of an image that captured the wound image using Smartphone, it is easy to capture wound image at that time patient are active participants in their own care. After that by using mean shift Algorithm Smartphone performs wound segmentation. Doctor can easily analyse the problem through image & Segmentation. According to patients with diabetes these technique is easy to use Smartphone device for self-management of foot ulcer. The outline of foot ulcer & accurate wound area are detected by the image segmentation. The processing algorithm of mean Shift Algorithm & K-mean Algorithm both are Accurate & well suited for the available hardware & computational resource that can be provided by the candidate through image capture & image processing.
Keywords: Android-based Smartphone, mean-shift, Image of patient with diabetes, Wound Analysis.
Abstract
Random Number Generator Design using QCA Logic for FPGA Architecture
Nilima P. Pannase, Amol Boke
DOI: 10.17148/IJARCCE.2016.5785
Abstract: Quantum-dot cellular automata (QCA) are a technology which has the potential of faster speed, smaller size and minimum power consumption compared to transistor based technology. Random number generators (RNGs) are used in variety of applications including Monte Carlo Application Cryptography, Statistical sampling, Game Playing etc .In many hardware implementations it is desirable to optimize performance of the RNGs in terms of speed and area. To be considered as a suitable CMOS substitute, the QCA technology must be able to implement complex real- time applications with affordable complexity. This project describes improved version of RNG using Quantum Dot Cellular Automata Technique to generate wider variety of random number. In the proposed circuit, RNG unit is constructed using a VHDL model of QCA elementary circuits which provides an approach to improve the complexity of RNG.
Keywords: Quantum Dot Cellular Automata (QCA), Random Number Generator (RNG), VHDL, Field Programmable Gate Array (FPGA), Majority Voter Gate (MVG).
Abstract
Analysis of Blackhole Attacks on Wireless Sensor Networks
Arpita Pateliya, Jignesh Kumar N. Patel, Ketan R. Tandel
DOI: 10.17148/IJARCCE.2016.5786
Abstract: Wireless sensor networks are consisting large number of sensor nodes which are limited to sensing, computing, processing the data and communication capability. Due to these limitations it is important to minimize the amount of data transmission so the average lifetime of network and bandwidth utilization improved as well minimize the computational power at every node in order to improve lifetime of network. WSNs are deployed in remote and open environment to transmit the sensitive information, and sensor nodes are easily prone to malicious activity of the attackers so security is most important. Hence, wireless sensor networks protocols must be designed with security in mind. This paper presents protocol, which merely detect the Blackhole attacks from network itself and take appropriate decision so the performance of the network can be improve.
Keywords: Wireless Sensor Networks (WSNs), Data Aggregation, Security Objectives, Attacks, Routing Protocols.
Abstract
Difference Convex Programming based TSVM to Detect Phishing Pages
K. Selvan, Dr. M. Vanitha
DOI: 10.17148/IJARCCE.2016.5787
Abstract: Phishing sites are duplicated created to trick people for their personal information, in order to simulate the real site's pages. Because they rarely detect tactical adaptability costs and identify phishing site it is a complex and dynamic problems. This work proposes a new method to detect phishing sites using Convex Programming based Transductive Support Vector Machine (CTSVM). TSVM is an independent method to detect attack, and does not change the behavior of users proposed a new way of phishing sites. Image feature extraction, and sensitive information on the page, it can completely reflect the nature of the site website. Then, phishing pages are classified by the algorithm CTSVM. Experiment result shows that the method performed well, improving the accuracy and precision are more fully. The result is to use CTSVM detect phishing sites to improve performance, such as classification TSVM should be more flexible, which makes learning CTSVM, in order to more efficiently.
Keywords: Classification, convex programming, feature selection, phishing websites, transductive support vector machine.
Abstract
A Survey on Emotion Recognition from Speech Signal
Sandeep Pathak, Vaishali Kolhe
DOI: 10.17148/IJARCCE.2016.5788
Abstract: Emotion recognition has been studied in recent past with great interest, out of various modalities from which emotions can be extracted, speech is the most natural and fastest of all the modalities. The major challenges for making a Speech emotion recognition system are finding and preparing database, selecting the most suitable features and designing appropriate classification scheme. The common approach is to extract a very large set of features over a generally long analysis time window and perform machine learning methods for classification. Speech emotion recognition increases the naturalness in Human Computer Interaction and can be used in wide variety of application in our day to day life. This paper surveys the three main building blocks of speech emotion recognition system, first part is survey of existing databases, the second part surveys most widely used features and the third part discuss various classification techniques.
Keywords: Emotion recognition, Speech emotion recognition, Statistical classifiers, Emotional speech databases.
Abstract
High Performance Column Level ADC for CMOS Imager using Switched Capacitor Technique
Anurag Yadav, Rajesh Mehra, Deep Sehgal, H.S. Jatana
DOI: 10.17148/IJARCCE.2016.5789
Abstract: An integrating type analog to digital converter is commonly used to achieve a high resolution. In this work 12-bit Dual slope ADC is developed which is an integrating type ADC. To integrate the input signal it requires one integrator made up of one resistance in feed forward path and one feedback capacitance with opamp circuit. Switched capacitor based integrator is alternative technique to realize the integrating function. In this design resistance in feed forward is replaced with two switches and one capacitor. This technique requires non overlapping clock. One of the advantages of this technique is area minimization. This technique is easily compatible with technology. This dual slope column level ADC minimizes the conversion time. Two stage opamp is designed which has gain of 78.22 dB. This column level dual slope ADC is implemented using 180nm standard CMOS technology.
Keywords: ADC, CIS, CMOS, OPAMP.
Abstract
Design and Simulation of Wide-Band Square Microstrip Patch Antenna
K. Prasad M.Tech, (Ph.D), M.A (Lit), M.A (Politics), B. Lakshmi Devi M.Tech
DOI: 10.17148/IJARCCE.2016.5790
Abstract: In this, a square Micro Strip Patch Antenna is designed using MENTOR GRAPHICS IE3D TOOL. Communication between humans was first made by sound through voice. In initial days, devices such as drums, visual methods such as signal flags and smoke signals were used to communicate information. The so mentioned optical communication devices, utilize the light portion of the electromagnetic spectrum as carrier. It has been only very recent in human history that the electromagnetic spectrum, outside the visible region, has been employed for communication, through the use of radio. The aim of this is to design and fabricate an Micro Strip square patch by using feed line technique. Micro Strip Antenna and study the effect of Micro Strip line length dimension Length (L) on Radiation pattern ,directivity , gain and return loss. Low dielectric substrates are generally preferred for maximum radiation. The length of the square patch antenna is nearly half wavelength in the dielectric; it is a very critical parameter, which governs the resonant frequency of the antenna. In view of design, selection of the patch width or length is the major parameters along with the feed line depth. Desired Patch antenna design is initially simulated by using IE3D simulator and Patch antenna is realized as per design requirements.
Keywords: square patch, Micro Strip, Radiation pattern, dielectric substrates.
Abstract
Mammogram of Breast Cancer Detection Based Using Image Enhancement Algorithm
M. Radha, Dr. S. Adaekalavan
DOI: 10.17148/IJARCCE.2016.5791
Abstract: Principle objective of Image enhancement is to process an image so that result is more suitable than original image for specific application. Digital image enhancement techniques provide a multitude of choices for improving the visual quality of images. A frequency domain smoothing sharpening technique is proposed and its impact is assessed to beneficially enhance mammogram images. This technique aims to gain the advantages of enhance and sharpening process that aims to highlight sudden changes in the image intensity, it is usually applied to remove random noise from digital images. The already developed technique also eliminates the drawbacks of each of the two sharpening and smoothing techniques resulting from their individual application in image processing field. The selection of parameters is almost invariant of the type of background tissues and severity of the abnormality, giving significantly improved results even for denser mammographic images. The proposed technique is tested breast X-ray mammograms. The simulated results show that the high potential to advantageously enhance the image contrast hence giving extra aid to radiologists to detect and classify mammograms of breast cancer.
Keywords: Fourier transform, Gabor filter, Image processing, Image enhancement, Mammogram, Segmentation.
Abstract
Remote Light Intensity Monitoring System Using BPW21r, ARM, Arduino and ZigBee
Vijay S. Kale
DOI: 10.17148/IJARCCE.2016.5792
Abstract: Measurement of light intensity is a prime necessity in several occasions. The diversity of such needs make their way to various branches of physics and engineering as well as in media. For instance, design optimum lighting conditions of a room, good quality pictures by determining the right exposure, streets and parking must be well lit at night, optimizing light levels in museums and art galleries etc. Lux meter is used for the light intensity measurement. The light intensity measurement is needed especially in remote areas, where mobile network is unavailable. So, there is an requirement to do the remote place light intensity monitoring system which is to be accurate, easily operated, simple in working, cost-effective and light weight. This paper represents the wireless light sensor data communication using photodiode BPW21r, ARM microcontroller, ZigBee module, Arduino, Graphics LCD and PC. The calibration of BFW21r was performed using lux meter, dimmer and lamp arrangement. The transmitter section includes the light sensor photodiode, microcontroller and ZigBee. Receiver section receives the data using ZigBee and displays it on GLCD and stores the same in PC for further processing.
Keywords: Arduino, Wireless communication, Light sensor, Graphic LCD, ZigBee.
Abstract
Automatic Cancer Detection in Mammographic Images
Jasmeen Kaur, Mandeep Kaur
DOI: 10.17148/IJARCCE.2016.5793
Abstract: Breast cancer is the major health problem in women that has increased over years. Early detection is necessary as to treat breast cancer with success and reduce mortality. Towards this, mammography is the main diagnostic test for screening of breast tumors wherein high quality images with low dose x-rays are used to image the breast(s). Due to the immense danger that this disease presents it becomes necessary to develop a Computer-aided diagnosis (CAD) systems to improve radiologist�s diagnosis. This paper has implemented such a system. The developed method proceeds in four steps: pre-processing mammograms for enhancement, segmentation to detect breast abnormalities, then texture feature(s) are extracted and finally image is classified.
Keywords: Breast Cancer, Mammography, image pre-processing, segmentation, feature extraction, image classification.
Abstract
Floating Point Parallel Processing Multiplier Based RISC (MIPS) Processor
Omkar A. Shastri, Asst. Prof. Shubhangini Ugale, Asst. Prof. Vipin Bhure
DOI: 10.17148/IJARCCE.2016.5794
Abstract: This paper proposes a design of high speed 32 bit RISC processor. The processor consists of blocks namely Instruction Fetch block, Instruction Decode block and Execution block. The ALU in the execution block comprises of a single precision floating point multiplier designed in a parallel architecture thus improving the speed and accuracy of the execution. Furthermore the power gating technique is used which switch off the power at the time when processor execution is not required. All the blocks are designed using VHDL hardware description language.
Keywords: RISC, Floating point multiplier, Power gating, VHDL.
Abstract
Audio based Music Classification based on Genre and Emotion using Gaussian Process
Mugdha Magare, Prof. Ranjana Dahake
DOI: 10.17148/IJARCCE.2016.5795
Abstract: In the field of Music Information Retrieval (MIR), music genre classification and music emotion recognition are the two main tasks to investigate for further development. In this project work, these two tasks are focused. For this purpose, Gaussian Processes Model is used. Gaussian Processes (GPs) are Bayesian nonparametric models that are becoming more popular for their superior capabilities to capture highly nonlinear data relationships in various tasks, such as dimensionality reduction, time series analysis, novelty detection, as well as classical regression and classification tasks. Gaussian Processes are used to investigate the feasibility and applicability of Gaussian Process model for music genre classification and emotion estimation. Along with this, we are reducing the time required for feature extraction for classification tasks. Principle component analysis (PCA) technique is used to reduce this time. In this, it selects and considers only higher order features for classification.
Keywords: Music Information Retrieval, Genres, Emotions, Features.
Abstract
Network Anomaly Detection on Fast Streaming Data Using Spark
D. Priya
DOI: 10.17148/IJARCCE.2016.5796
Abstract: Intrusion detection is a continuous process and depending on the size of the network and the number of transmissions being carried out in the network, the number of packets to be analyzed varies considerably. Hence there is no specific or defined data size associated with it, but the Velocity component of Big Data plays a vital role here. The packets being transferred tends to be fast, hence a mechanism to provide analysis in real time becomes mandatory. This paper presents a technique to predict intrusions faster and with higher accuracy. It uses a Random Forest based classifier implemented on Hadoop platform using Spark. Spark, being a stream processing framework exhibits effective results in real-time.
Keywords: Intrusion Detection; Networks; Hadoop; Spark; Random Forest.
Abstract
Physiological Variability Analysis Using Pre-existing Data Mining Techniques
Shagun Goyal, Sunila Godara
DOI: 10.17148/IJARCCE.2016.5797
Abstract: Background/Objective: To analyse the efficiency and performance of pre-existing data mining techniques for development of novel predictor model for mining the response shown by physiological parameters. The medicines here being tested are physiological variability affecting medicines. Methods/Statistical Analysis: The data has been have been analysed using WEKA (version 3.7) tool for the following techniques � Classification Via Regression, Randomized filtered classifier, IBk and RandomForest technique. Findings: Usage pre-existing data mining techniques for development of novel prediction models for mining physiological variability data. An overall comparison of various techniques has also been made on the basis of various performance parameters like sensitivity, specificity, precision & F-measure. It has been found that Randomized Filtered classifier is the best suitable technique amongst all the techniques for such a use. Applications: it can be used for mining the physiological variability responses, thereby helping to check the effectiveness of medicines.
Keywords: Data Mining, Physiological Variability, ClassificationViaRegression, Randomized Filtered Classifier, Random tree classifier, IBk technique.
Abstract
Automated Resource Planning System for library using ASRS Robot
Della Reasa Valiaveetil, Veena K, Sindhu T. V, Bency Varghese A, Linu Babu P
DOI: 10.17148/IJARCCE.2016.5798
Abstract: In this paper, we study about Automated Library System (ALS) which is a cost effective and space saving alternative to common document shelving technologies. Addressing the need for space efficiency, secure and automated document and records handling, ALS is a turnkey design and software solution focused on reliability and maintainability. Automated Storage and Retrieval Systems (ASRS) are designed for automated storage and retrieval of book items. Retrieval of items is accomplished by specifying the item type and quantity to be retrieved. The computer determines where in the storage area the item can be retrieved from and schedules the retrieval.
Keywords: ALS, ASRS.
Abstract
Lung Cancer Detection from Images of Computer Tomography Scan
Vaishali C. Patil, Shrinivas R. Dhotre
DOI: 10.17148/IJARCCE.2016.5799
Abstract: Computer�aided detection (CAD) can help the radiologists to detect pulmonary nodules at an early stage. In this paper we propose a CAD system to detect the pulmonary nodules from the segmented lungs from Computer Tomography images and classify the abnormalities. First the lung is segmented from the CT images using Watershed Transform then the nodules are extracted. Here for detection of lung nodules some features are considered such as 1) Shape features: Shape based feature descriptor are used. The shape of the nodules is considered for detection of nodules. 2) Texture features: 2D Haar Wavelet Transformation is used which is used to obtain the texture information in different levels of decomposition. 3) Intensity features: The intensity of the nodules is taken as a feature which helps us in putting a threshold which is taken on trial and error manner which help us in detecting the nodules. 4) Context features: Specifies the location of nodule. Classification is done using three different classifiers like SVM, ANN & KNN to increase the efficiency and decrease the error rate. Finally a comparative study is made with respect to error rate, efficiency and training ratio.
Keywords: Lung cancer, Image pre-processing, Image segmentation, Feature Extraction, Classification.
Abstract
Design of Dual Band Microstrip Patch Antenna Using Proximity Feed for Wireless Applications
Meenu, Gaurav Monga
DOI: 10.17148/IJARCCE.2016.57100
Abstract: In this paper, the design of dual band microstrip patch antenna has been presented for technology oriented requirements of high speed wireless applications.The proposed antenna is excited using proximity coupling feed.The proposed antenna resonates at 2.4GHz and 4.65GHz . The E shaped slot on the upper stacked patch helps in improving the results. The designed antenna gives efficient results resonating at 2.4 GHz and 4.65 GHz. CST Microwave studio is used to design and simulate the proposed antenna structure.
Keywords: Dual band, Microstrip antenna, Proximity feed.
Abstract
Fire Wrap: A cyber defence mechanism against dark web attacks
Feby C Varghese, Varghese John, Dr. T. A. Ashok Kumar
DOI: 10.17148/IJARCCE.2016.57101
Abstract: Fire Wrap, a network based cyber defence system proposal which detect network anomalies by analysing the pattern of an incoming attack and distinguishes the attacker from the existing networked machines using the Boltzmann machine learning algorithm, then re-routes the incoming signal using double tunnelling approach to a sandbox environment where, the exit node vulnerability of onion routing is exploited to extract the raw data. The attacker will execute the attack in this sandbox environment and we can analyse the behaviour of the attack virtually without affecting the original network system, there by obtaining vital information which will help in forensic studies. The analysis part of Fire Wrap is carried out through Hopfield neural network, which is a simple recurrent network that can work as an efficient associative memory and can store and analysis data in a manner similar to the brain. The system is far advanced than any currently used firewalls and is developed to protect the surface web users from the cybercriminals which use the tor anonymous network to launch cyber-attacks from their hotspots in the dark web, which will steal all the confidential data and causes fatal damage to users including the defence network of a country. We are formulating this system with a provision of planning a counter attack which will make the system future proof.
Keywords: Tunnelling, dark web, neural network, Boltzmann, sandboxing
Abstract
Secure Distributed Deduplication in Cloud with Improved Reliability
Reshma D. Kapadi, Prof. Pramod Patil, Prof. Prashant V. Raut
DOI: 10.17148/IJARCCE.2016.57102
Abstract: Data deduplication is best way for eliminating identical copies of data. This technique has been greatly used in cloud. It results in reduced storage space and network bandwidth for upload. Only one copy of file stored in cloud even though file has number of owners. This gives improved of storage space but reduces reliability. Furthermore users also stores their sensitive data on cloud. Security of this sensitive data becomes a great challenge. This research proposes new deduplication system with higher reliability. This technique is used to save storage space and bandwidth under cloud. In this research data chunks are stored on multiple cloud servers. Data deduplication has two types one is file level deduplication and other is block level deduplication. The new deduplication system also maintains direct communication between deduplication System�s users and owner of the file. Users can directly communicate with owner and request for file. Owner of the file send the respective file to the user in secure way. The deduplication system is mainly used in educational institutes and industry. The deterministic secret sharing scheme is used to achieve security requirements of data privacy and tag consistency. This research incurred small overhead in realistic environments.
Keywords: Deduplication, cryptography, distributed storage system, reliability, security.
Abstract
Hadoop-GPU Based K-Means for Data Clustering
Parag Pachouri, Prof. Manaswini Panigrahi
DOI: 10.17148/IJARCCE.2016.57103
Abstract: For achieving data parallelism in Apache Hadoop, MapReduce is the most prominent programming model. Lots of efforts are attempting for boost the computational speed of MapReduce in Hadoop framework. In this paper, we present a MapReduce programming model focused on the Kmeans clustering algorithms that leverage the acceleration potential of the integrated GPU in a multi-node cluster environment. It accelerated the framework by providing intra parallelism between the MapReduce function by using modified k-means algorithm. Based on various experiments on multi node cluster and depth analysis, we find that utilizing of the integrated GPU via OpenCL offers significant performance and power efficiency gains over the original CPU based or sequential approaches.
Keywords: Hadoop, Map/Reduce, OpenCL and KMeans.
Abstract
Accident Prediction from Traffic Data using Hadoop
Pallavi Dubey, Prof. Manaswini Panigrahi
DOI: 10.17148/IJARCCE.2016.57104
Abstract: Accident prediction has been in trend to provide alerts before accidents happen. Traffic on highways is monitored and lots of data is processed daily to predict probability of accidents based on highway conditions like road surface, light on highway, turns etc. In this paper to predict accident based on different queries and process this big data Hadoop has been used. It is found that execution time is very less on Hadoop as compared to sequential techniques.
Keywords: Data analysis, Hadoop, MapReduce, HDFS
Abstract
Automatic detection of true retinal area and diagnosing retinal disease using SLO images
Geetanjali Arjun Argade, Prof. N. A. Dawande
DOI: 10.17148/IJARCCE.2016.57105
Abstract: Artificial Neural Network (ANN) classifier can be wont to detection of retinal diseases. Scanning laser ophthalmoscopes (SLOs) will be used for early detection of retinal diseases. It is a technique of examination of the attention. The advantage of using SLO is its wide field of read, which will image an oversized a part of the tissue layer for higher identification of the retinal diseases. On the other facet, during the imaging method, artefacts such as eyelashes and eyelids also are imaged together with the retinal area. This brings a big challenge on the way to exclude these artefacts. In proposed novel approach to mechanically extract out true retinal space from An SLO image based mostly on image process and machine learning approaches. The Simple Linear Iterative Clustering (SLIC) is that the rule utilized in super-pixel calculation. To decrease the unpredictability of image getting ready errands and provide an advantageous primitive picture style. To reduce the complexness of image process tasks and supply a convenient primitive image pattern, also to classified pixels into completely different regions based mostly on the regional size and compactness, known as super-pixels. The framework then calculates image based options reflective textural data and classifies between retinal space and artefacts. The experimental evaluation results have shown sensible performance with a high accuracy.
Keywords: Feature selection, retinal artefacts extraction, retinal image analysis, scanning laser ophthalmoscope (SLO) Superpixel Classification.
Abstract
State of the Art Technique for Recognizing Understanding of Learners’
Vrajesh Pankaj Doshi, Bidisha Roy
DOI: 10.17148/IJARCCE.2016.57106
Abstract: Online Multiple Choice Questions (MCQ�s) Exams have been used as a medium for assessing the proficiency of individual in school, colleges and corporate. The results of the exams conducted are commonly used for promoting the student to the higher class or for competition to decide the aptitude of individual for employment. The report hardly provides any insights for identifying the concepts that students� have not understood properly and required to be re-explained or further discussed. The system discussed in this paper customizes the online MCQ�s exam system and generates variety of reports. These reports makes the system useful not only for assessing the proficiency of students�/trainees� but also help the teacher/corporate trainer in recognizing their true state of understanding for the knowledge shared in class/corporate training.
Keywords: Online Examination, Assessment, Evaluation, Understanding, Doubts, Queries, Student, Teacher, PARAM, Rule Based Reasoning, Multiple Choice Question.
Abstract
Automatic Pill Dispenser
Mrityunjaya D H, Kartik J Uttarkar, Teja B, Kotresh Hiremath
DOI: 10.17148/IJARCCE.2016.57107
Abstract: Geriatrics rely on their medications to keep them healthy, but complex medication schedules can lead to mistakes like missing doses, taking incorrect amounts, or taking medicines at the wrong times. These mistakes could lead to unnecessary doctor or hospital visits, illness and even death. Hence there is a need to design a Medication Dispensing Device that can help Geriatrics to take medication on schedule. This would prevent unplanned hospital or doctor visits related to incorrect medication use. This paper proposes a design of a smart device which dispenses the medications on the prescribed schedule.
Keywords: Microcontrollers, Driver Circuits, Stepper Motor, Medicines, Medications.
Abstract
Secure Data Transmission for Iot Applications
Radhika Munoli, Prof. Sankar Dasiga
DOI: 10.17148/IJARCCE.2016.57108
Abstract: Providing security for the IOT environment is the major assessment carried out where the entire world is dependent on e-communication and assures the guarantee of communication without any error causing .In this project work, Raspberry Pi, an open source and a popular choice as the hardware platform for IoT - both devices as well as gateways, has been used. It is nowadays a trend and also a more appropriate path to choose open source software for implementation for the prototyping and study purposes in academia. As such OpenSSL has been employed for configuring secure access of data at the device level as well as the library for the secure communication using the MQTT and CoAP protocols. Further, the project work also involves a study of different web access vulnerabilities and suggested remedies.Even when the latest version 2 of Raspberry Pi was employed the performance of the application with OpenSSL vs. a standard desktop computer system is not comparable. Further optimization of the application or use of a 128-bit key based encryption could be the possible approaches for security implementations for embedded applications.The primary objective of this project aims at implementing security procedures for IoT based devices such as nodes (for ex raspberry pi) and gateways (for ex PC) using MQTT and CoAP protocol in an embedded platform. Project approaches at different layers of the ISO/OSI model for the security of end to end nodes and gateways through cloud.
Keywords: Raspberry Pi, IOT, Open SSL, Secure, End to End Communication, MQTT, CoAP, Vulnerability.
Abstract
An Approach of Colour Based Image Segmentation Technique for Differentiate Objects using MATLAB Simulation
Preeti Rani, Raghuvinder Bhardwaj
DOI: 10.17148/IJARCCE.2016.57109
Abstract: Digital Processing techniques help in manipulation of the digital images by using computers. As raw data from imaging sensors from satellite platform contains deficiencies. To get over such flaws and to get originality of information, it has to undergo various phases of processing. The three general phases that all types of data have to undergo while using digital technique are Pre- processing, enhancement and display, information extraction. The proposed work has been explained the concept of the Image Segmentation means to analysis of Images based on the colour Features. The analysis of the different objects and differentiate it can be implement using image segmentation process. The proposed work has been implemented in the MATLAB Simulation Tool and results has been generated on the different image datasets and correspondingly PSNR performance parameters has been calculated shows the accuracy.
Keywords: Image Processing, Segmentation, Computer Vision.
Abstract
Congestion Avoidance in Node Communication Network using NS-2 Simulation
Rashika, Kavita Khatkar
DOI: 10.17148/IJARCCE.2016.57110
Abstract: Wireless mobile unintentional networks (MANETs) square measure self configuring, dynamic networks during which nodes square measure unengaged to move. a serious performance constraint comes from path loss and multipath weakening several Manet routing protocols exploit multi methods to route packets. The likelihood of winning packet transmission on a path relies on the reliableness of the wireless channel on every hop. speedy node movements conjointly have an effect on link stability, introducing an oversized physicist unfold, leading to speedy channel variations. However, thanks to their inherent characteristics of dynamic topology and lack of centralized management security, Manet is susceptible to varied styles of attacks thanks to that the congestion happens within the Network. the most categories of routing protocols square measure Proactive, Reactive and Hybrid. A Reactive (on-demand) routing strategy may be a fashionable routing class for wireless unintentional routing. the look follows the concept that every node tries to cut back routing overhead by causation routing packets whenever a communication is requested. during this work an endeavor is to implement to avoid the congestion within the networks. The construct of AOMDV has been wont to avoid the congestion from the network. The parameters are calculated like finish to finish Delay and Packet Delivery quantitative relation that shows the accuracy of the projected work.
Keywords: AODV, AOMDV, Congestion, WSN (Wireless Sensor Networks).
Abstract
A Review: Modified Remove Redundancy Technique of Lossless Image Compression
Ramanpreet Kamboj, Shailja Kumari
DOI: 10.17148/IJARCCE.2016.57111
Abstract: Image compression is process to remove the redundant information from the image so that only essential information can be stored to reduce the storage size, transmission bandwidth and transmission time. The essential information is extracted by various transforms techniques such that it can be reconstructed without losing quality and information of the image. The purpose of image compression is the original large image with less bytes and transmission and required with good image recovery quality. The development of multimedia and digital imaging has led to high quantity of data required to represent modern imagery. This requires large disk space for storage, and long time for transmission over computer networks, and these two are relatively expensive. These factors prove the need for images compression. Image compression addresses the problem of reducing the amount of space required to represent a digital image yielding a compact representation of an image, and thereby reducing the image storage, transmission time requirements. The key idea here is to remove redundancy of data presented within an image to reduce its size without affecting the essential information of it.
Keywords: Lossless Image Compression; Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT), compression ratio (CR), peak signal to noise ratio (PSNR).
Abstract
Remove Redundancy Technique of Lossless Image Compression
Ramanpreet Kamboj, Shailja Kumari
DOI: 10.17148/IJARCCE.2016.57112
Abstract: Image compression is method to get rid of the redundant info from the image in order that solely essential info may be keep to scale back the storage size, transmission information measure and coordinated universal time. The essential info is extracted by varied transforms techniques specified it may be reconstructed while not losing quality and data of the image. the aim of compression is that the original massive image with less bytes and transmission and needed with smart image recovery quality. The event of transmission and digital imaging has junction rectifier to high amount of knowledge needed to represent trendy mental imagery. this needs massive disc space for storage, and while for transmission over laptop networks, and these 2 are comparatively pricy. These factors prove the necessity for pictures compression. Compression addresses the matter of reducing the quantity of house needed to represent a digital image yielding a compact illustration of a picture, and thereby reducing the image storage, coordinated universal time needs. The key plan here is to get rid of redundancy {of data of knowledge of info} bestowed among a picture to scale back its size while not moving the essential information of it.
Keywords: Lossless Image Compression; Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT), compression ratio (CR), peak signal to noise ratio (PSNR).
Abstract
OLED Revolution
Aditya Vaishampayan, Prof. Deepali H. Shah, Prof. (Dr.) Tejas V. Shah
DOI: 10.17148/IJARCCE.2016.57113
Abstract: This paper presents the concept of organic light emitting diode (OLED) as a modern trend in opto-electronic devices. OLED display technologies make it possible to get significant improvement in the bright light output, image resolution and the pixel response time with low operating voltages. These extremely thin devices consist of layers of organic molecules which emit light with application of electric current. The self-luminous devices made from OLEDs eliminate the need of backlight unlike Liquid Crystal Display (LCD) display. With recent development in manufacturing techniques, reduced costs are a remarkable factor. These all features increase worldwide adaptability and popularity of OLED.
Keywords: OLED, Electroluminescent, Liquid Crystal Display (LCD), AMOLED, PMOLED
Abstract
Churn Prediction on Huge Sparse Telecom Data Using Metaheuristic
T. Sumathi
DOI: 10.17148/IJARCCE.2016.57114
Abstract: Churn prediction in telecom has become a major requirement due to the increase in the number of telecom providers. However due to the hugeness, sparsity and imbalanced nature of the data, churn prediction in telecom has always been a complex task. This paper presents a Metaheuristic based churn prediction technique that performs churn prediction on huge telecom data. Particle Swarm Optimization algorithm is used as the classifier. Experiments were conducted on the Orange dataset. It was observed that PSO algorithm works best on churn data providing effective and faster results.
Keywords: Telecom churn prediction, Data Imbalance, Data Sparsity, Huge Data; PSO
Abstract
Optimal Face Recognition Techniques
Dasu Vaman Ravi Prasad
DOI: 10.17148/IJARCCE.2016.57115
Abstract: Face recognition is one of the most significant achievements in human vision. It has emerged that eigenface, neural network, graph matching, hidden markov model, geometrical feature matching ,template matching, 3D morph able model , line edge map (LEM) , support vector machine (SVM) ,multiple classifier systems (MCSs) are fashionable techniques of face recognition. Till date, all existing techniques could not provide satisfactory results. In this view, paper is presented a new system OFRS (Optimal Face Recognition System).This system can be find optimal accuracy of face recognition. The system is based on PCA-SVM (Principle component analysis-Support Vector Machine) combinations. It is used preprocessing, feature extraction, classification, optimization, techniques in the best way. Since, �PCA-SVM combination� suffers from the limitation of scalability. Hence, IPCA (Incremental PCA) is proposed to be used, for the first time with this combination, as feature selection strategy to overcome scalability problem. GA (Genetic Algorithm) is proposed to be used, for the first time, as optimization of SVM kernel for face recognition .At last, paper describes impact of proposed system in academic as well as industry.
Keywords: PCA, SVM, MCS, OFRS, Face recognition
Abstract
Impact of Modeling and Simulation for Conductivity Measurements
Dr. Y. P. Raiwani, Dr. Rakesh Mohan Bhatt, Anunay Gairola
DOI: 10.17148/IJARCCE.2016.57116
Abstract: Modeling and simulation techniques have opened the new windows to address various issues related with complex computations. Researchers belonging to different field viz. Economics, Physics, Biology etc. have been applying computer-aided simulated techniques in their research work. The modified mathematical model relevant to the present case has been taken into account. Further, simulation techniques become the essential tool to examine the behavior of the proposed system so as to explain and verify in the real-world situation. The present paper explores the aspects of modeling and simulation by discussing the measurements of the conductivity of YBCO superconductor materials by using the mathematical model for the numerical experimentation in the temperature range of 10K to 240K. By changing the value of one of the scattering strength, impact of modeling and simulation has also been observed.
Keywords: Modeling, Simulation, YBCO Superconductor, and Conductivity.
Abstract
Convolution and De-convolution using Vedic Mathematics
Ramya Annigere, Smt. Savita S Patil
DOI: 10.17148/IJARCCE.2016.57118
Abstract: In Digital Signal Processing, the convolution and de-convolution with a very long sequence is ubiquitous in many application areas. The basic blocks in convolution and de- convolution implementation are multiplier and divider. They consume much of time. This paper presents a direct method of computing the discrete linear convolution, circular convolution and de-convolution. The approach is easy to learn because of the similarities to computing the multiplication of two numbers. The most significant aspect of the proposed method is the development of a multiplier and divider architecture based on Ancient Indian Vedic Mathematics sutras Urdhvatriyagbhyam and Nikhilam algorithm. The results show that the implementation of linear convolution and circular convolution using vedic mathematics is efficient in terms of area and speed compared to their implementation using conventional multiplier & divider architectures. The coding is done in Verilog HDL. Simulation and Synthesis are performed using Xilinx ISE design suit 14.2. Simulated results for proposed 4x4 bit Vedic convolution circuit shows a reduction in delay of 88% than the conventional method and 41% than the OLA method.
Keywords: Linear Convolution, Circular Convolution, De-convolution, Vedic Mathematics, Urdhva Triyagbhyam, Paryavartha, VerilogHDL.
Abstract
Biomedical Image Compression Using BTC Method with Rectangular Truncation Matrix
Tamanna Kapahi, Kamal Gupta
DOI: 10.17148/IJARCCE.2016.57119
Abstract: Biomedical images are important factor in health care for diagnosis of disease. As medical imaging faclities are moving towards film less imaging technology, digital image processing techniques plays an important role. Image compression technique is an important multimedia application to effectively store and transmit data at lower bandwidth. BTC based algorithm is designed to compress the biomedical CT-scan image. A new application of block truncation coding (BTC) is presented to compress gray as well as rgb CT-scan images with rectangular non-overlapping truncation matrix. Experimental results are presented which demonstrate that at lower value of truncation matrix, the compression rate is low with image characteristic parameters close to the original image values.
Keywords: BTC, SNR, PSNR, RMSE, Compression.
Abstract
Design and Implementation of MPPT Technique Applied to Solar Wind Hybrid System
Praveen Shukla, Shimi S.L., Lini Mathew
DOI: 10.17148/IJARCCE.2016.57120
Abstract: A hybrid power control system is being proposed in this paper contain solar power and wind power generation systems. Today demand for electricity is increasing rapidly whether yield of energy from fossil fuels is dwindling and therefore the choice of the clean energy source is required. The proposed method of MPPT control system is compared with the conventional perturbation and observation (P&O) method.
Keywords: MPPT, Boost Converter, Hybrid System, Renewable Energy.
Abstract
Reversible Data Hiding In Encrypted Images- An Overview
Mr. Dipak R Pardhi, Miss. Harshali Phalak
DOI: 10.17148/IJARCCE.2016.57121
Abstract: Reversible data hiding (RDH) has captured most of the attention in the field of encrypted images, RDH has ability to maintain the strong property that the original cover can be easily be recovered after embedded data is extracted while protecting the image content�s confidentiality. Available methods embed data by reversibly vacating room from the encrypted images that leads to some errors on data retrieval and/or image recreation. In this paper, we propose a novel method by reserving image space before encryption with a traditional RDH algorithm, and thus it is easy for the data hider to reversibly embed data in the encrypted image. The proposed method can achieve real reversibility, that is, data retrieval and image recreation are free of any error. Experiments show that this novel method can embed more than 10 times as large payloads for the same image quality as the previous methods, such as for PSNR dB.
Keywords: Reversible data hiding, image encryption, privacy protection, histogram shift.
Abstract
Infrared Non- Destructive Testing Using Image Processing: A Survey
Karishma Chaudhary, Ashok Kumar
DOI: 10.17148/IJARCCE.2016.57122
Abstract: Non-destructive Testing (NDT) is a wide clump of analysis techniques. These techniques are used in industries and sciences to calculate and guesstimate the properties of material, substance or a system without damaging it. NDT is highly valuable technique as it does not enduringly change the substance being scrutinized and hence can save the money and time in product evaluation, troubleshooting and research. Infrared and Thermal testing is one of the many Non-destructive Testing techniques provided by the American Society for Non-destructive Testing (ASNT). This paper has concentrated the study towards Infrared Thermography which is the science of measuring and mapping surface temperature. It has proven to be an effective, expedient, and economical method of testing.
Keywords: NDT, TNDT, Image processing techniques, image processing approaches, IRNDT
Abstract
A Qualitative and Quantitative Analysis of Routing Protocols in MANET
Karan Singh, Arun Kumar Yadav
DOI: 10.17148/IJARCCE.2016.57123
Abstract: Mobile ad hoc networks (MANET) are decentralized, self-configuring, without any fixed infrastructure and temporary network where participating nodes/devices are working as host as well asrouters.Every communicating device/node in MANET is free to movefor making the multi-hop network topology. Selection of a routing protocol for mobile network is an emerging research area in mobile computing and communication. In order to select appropriate routing protocol, IETF (Internet Engineering Task Force) MANET group has given certain parameters. These parameters define the reservedcharacteristics of a protocol. This paper isexplaining different routing protocols and comparing them onqualitative and quantitative parameters. Many qualitative metrics such as security, routing scheme, routing metric, multicasting, nodes with special task and average end-to-end delay are discussed in various protocols like DSDV, AODV, DSR, TORA and OLSR.
Keywords: AODV, DSDV, DSR, Evaluation Metric, OLSR.
Abstract
Evaluation of Probability of Detection using Energy Detection for Secondary User in Cognitive Environment with Variable Threshold & Sample Values
Ashish Suri, Dr. Jaswinder Singh
DOI: 10.17148/IJARCCE.2016.57124
Abstract: In the current scenario, the conception of the Cognitive Radio (CR) and the cognitive radio networks are new areas of research, development, evolution and elaboration. The job of sensing the spectrum proves a very cumbersome process. In current times, in order to sense the spectrum which exists, we do have a number of techniques available. Some of these spectrum sensing techniques and methods are energy detection method, cyclo-stationary technique, feature detection technique, wavelet transform method etc. In this paper, the main area of concern will be the spectrum sensing using energy detection method with the enhancement of probability of detection by the adaptive nature of the threshold and the number of samples.
Keywords: Cognitive Radio, Probability of Detection, Energy Detection
Abstract
An Approach to Devise an Interactive Software Solution for Smart Health Prediction using Data Mining
Aditya Tomar
DOI: 10.17148/IJARCCE.2016.57125
Abstract: This study aims in developing a computerized system to check and maintain your health by knowing the symptoms. This study has many features generally not available in normal software like suggesting doctors as per the disease, Symptom checker, gives reference of mobile applications that could help us to remain fit. It has login functionality so that it would be an easier for user to register him and view all the functions on the site and access it easily and with speed .It has a symptom checker module which actually defines our body structure and gives us liability to select the affected area and checkout the symptoms. Overall this study is done to help the people of all ages to check the symptoms related to affected area and can cure it as soon as possible. This study focuses on developing a computerized system to maintain a checkup system for people to check about their own health issues. Suggest Doctor Module includes a facility for the people to approach one of the best doctors in their field for curing their health issues. With this computerized system there would be an ease for people to recognize the health issues.
Keywords: Data Mining, Technologies Used, Proposed System, Symptom Checker.
Abstract
An Enhanced Approach in Novel Content Based Video Retrieval Using Vector Quantization
Prof. Rahul Gaikwad, Jitesh R. Neve
DOI: 10.17148/IJARCCE.2016.57126
Abstract: In the recent and modern world, almost everything is in the race to be digitized rapidly. Today, end-user sometimes thinks that video retrieval system based on simple text query is degrading the performance these days. So it�s a good time to move on to the content based retrieval approach based systems for searching videos. Revision of the content based video retrieval approach can lead to the effective implementation of this system. Content Based Video Retrieval (CBVR) is the best evolving system for any video retrieval application. The Block Truncation Coding (BTC) is one of the techniques in the CBVR used for color feature extraction. With improvements to the BTC, Thepade�s Sorted Ternary Block Truncation Coding (TSTBTC) is also the recent color feature extraction technique. Transform feature extraction is one more technique about extraction of the video. None of the method is right now extended for both of the features like color feature and transform feature of a video. In other hand Vector Quantization (VQ) is the lossy data compression technique. If VQ is used with TSTBTC it can deal with both of the features like color and transform feature of a video. Because the Vector Quantization (VQ) supports hybrid features (i.e. color and transform). VQ is not used before in CBVR, this paper explains the implemented stuff of VQ with CBVR.
Keywords: Content Based Video Retrieval (CBVR); Block Truncation Coding (BTC); Thepade�s Sorted Turnary Block Truncation Coding (TSTBTC); Vector Quantization (VQ); Linde-Buzo-Gray (LBG).
Abstract
A Real Time Image analysis System to Detect Skin Diseases
Pravin S. Ambad, Prof. A. S. Shirsat
DOI: 10.17148/IJARCCE.2016.57127
Abstract: Skin diseases rate has been increasing for past few decades. One of the risk factor in skin diseases is unprotected exposer to UV radiation, which causes various skin diseases. For early diagnosis of skin cancer, psoriasis and dermatophytosis increases chance for cure significantly. Therefore proposed method used for a real time analysis sys-tem, which will detect skin diseases. The image recognition technique where user will able to capture skin images of different mole type or rashes type. System will analyze and process the images, which alert the use to seek medical help urgently. This system will introduce steps for automating the process of skin diseases prevention and detection.
Keywords: Enhancement, statistical analysis, Adaboost classifier.
Abstract
Modified PSO based Intrusion Detection in Streaming Network Data
G. Banupriya, M. Lalli
DOI: 10.17148/IJARCCE.2016.57128
Abstract: Intrusion Detection is one of the prime functionalities of any Network Based System and it reflects the quality of the network. The existing intrusion detection systems performs in a fairly predictable and reliable manner, however, on the other side, hackers and attackers are always ahead, and they keep conjuring new attacks in a constant and consistent manner. The only way to solve this issue is to detect or predict an attack as soon as possible, in real time and if possible to prevent them from happening all together. Detecting it after it has occurred is useless, as the damage is already done. However, the current systems used for detecting intrusions are not capable of providing real time protection against such attacks. Latencies in the detection structure has become unavoidable due to the hugeness of the data associated with it. This paper presents an Intrusion Detection System based on PSO, a well-known metaheuristic algorithm. Regular PSO is hybridized with Simulated Annealing to provide a more effective and faster detection mechanism. Experiments conducted on PSO-SA prove that the algorithm works effectively on networked data providing high quality results. Further, comparisons with regular PSO also indicate that the proposed technique performs much better than regular PSO in detecting intrusions.
Keywords: PSO; Simulated Annealing; Network Intrusion Detection; KDD.
Abstract
Classification of High Dimensional Class Imbalanced Data Using data mining techniques
Vidya D. Omase, Prof. Jyoti N. Nandimath
DOI: 10.17148/IJARCCE.2016.57129
Abstract: As increase in data dimensionality classification of data increased. In industries or organizations fault detection is important task. Due to imbalanced of data classification process has problem. In standard algorithm of classification majority classes have priority for classification and minority classes have less priority for classification therefore it is not suitable for minority classes fault detection from data is applied for only majority classes and less for minority classes. Incremental clustering algorithm solved this problem but it reduced data attribute. To maximize the accuracy, time, and memory for this we proposed a feature selection algorithm for better performance of classification and fault detection.
Keywords: Classification, Class imbalanced data, Clustering, Data mining
Abstract
Recovering From a Node Failure in Wireless Sensor Actor Networks with Minimal Topology Changes
Mr. B.R. Tapas Bapu M.E, Mekala M, Nagma S. N, Nandhini P
DOI: 10.17148/IJARCCE.2016.57130
Abstract: A wireless sensor network (WSN) consists of sensor nodes capable of collecting information from the environment and communicating with each other via wireless transceivers. The collected data will be delivered to one or more sinks, generally via multi-hop communication. The sensor nodes are typically expected to operate with batteries and are often deployed to not-easily-accessible or hostile environment, sometimes in large quantities. It can be difficult or impossible to replace the batteries of the sensor nodes. On the other hand, the sink is typically rich in energy. Since the sensor energy is the most precious resource in the WSN, efficient utilization of the energy to prolong the network lifetime has been the focus of much of the research on the WSN. The communications in the WSN has the many-to-one property in that data from a large number of sensor nodes tend to be concentrated into a few sinks. Since multi-hop routing is generally needed for distant sensor nodes from the sinks to save energy, the nodes near a sink can be burdened with relaying a large amount of traffic from other nodes.
Keywords: Wireless Sensor Network (WSN), wireless transceivers, Wireless Sensor Actor Networks.
Abstract
Mask-SDA: Secure Aggregated Data Sensing Over Hetrogeneous Wireless Sensor Networks
Dr. R. Priya, Mr. S. Sundaramoorthi
DOI: 10.17148/IJARCCE.2016.57131
Abstract: A Wireless Sensor Network consists of spatially distributed sensor nodes. In a WSN, each sensor node is able to independently perform some processing and sensing tasks. Furthermore, sensor nodes communicate with each other in order to forward their sensed information to a base station. Wireless sensor networks have limited computational power and limited memory and battery power, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In Data aggregation the sensor nodes can monitor the environment by collecting information from their surroundings, and work cooperatively to send the data to a base station, or sink, for analysis. Homomorphic encryptions have been applied only in Homogeneous environment not for heterogeneous environment. The existing schemes become insecure in case some sensor nodes are compromised. Existing schemes may suffer unauthorized aggregation attacks. The above problems are solved using Masked secure data aggregation scheme.
Keywords: Sensor nodes, Base station, Homomorphic encryptions, masked secure data aggregation.
Abstract
Fuzzy Approach for Examining the Performance of Driver
Chaitree Baradkar, Aishwarya Ganveer, Shyamlee Lokhande, K. Surender
DOI: 10.17148/IJARCCE.2016.57132
Abstract: Soft Computing can be used for the analysis of driver�s performance which may help the licensing authorities to make a better judgment about the skills of a driver. We have used Fuzzy Logic in the proposed system. The readings (engine rpm, engine load, vehicle speed and acceleration) are obtained from the car using sensors and are used as input for the fuzzy system. Fuzzy C-Means Clustering (FCM) with unsupervised learning is used for obtaining input membership functions. The fuzzified parameters are fed into the Fuzzy Inference System (FIS) along with the rule base to obtain a crisp output as a final result. The crisp output gives degree of correctness along with a report on driving skills of a driver.
Keywords: Fuzzy C-Means Clustering, Membership function, Fuzzy Inference System, fuzzification, unsupervised learning.
Abstract
Enhanced Resource Scheduling in Virtual Cloud Laboratory (VCL) Cloud Architecture
Lakshmi T S, Ziaur Rahman
DOI: 10.17148/IJARCCE.2016.57133
Abstract: IT infrastructure management and budget has been reduced by implementing cloud computing. Cloud computing has strengthened the current population. There are various cloud computing solutions, Virtual Cloud Laboratory (VCL) is one among them, per class hand�on labs is provided for every course. Capabilities of the universities have been increased by using Virtual Cloud Laboratory (VCL). Architecture of the VCL is very simple, but handling of VCL during the development is very difficult. Various works will be carried out at real and extended environments of VCL this entire are calculated, using various polices used for resource allocation along with scheduler algorithms. Default scheduler drawbacks are being recognized and new scheduler is proposed here. Performance of the scheduler algorithm is evaluated by simulating the environment of VCL cloud.
Keywords: Virtual Cloud Laboratory, Cloud Computing, Resource Scheduling Algorithm, CloudSim.
Abstract
An Empirical Performance Evaluation of Relational Keyword Search Techniques
Madhuri V. Diwan, Sangve S.M
DOI: 10.17148/IJARCCE.2016.57134
Abstract: Number of approaches has proposed for relation keyword search but for the evaluation of proposed techniques there remains several lack of standardization. There are more irregularity has been in results from different techniques of relational keyword search. Observing more no of results we reach at there are lacks of technology transfer coupled with discrepancies between existing system indication is that there is need for thorough, independent empirical evaluation of search techniques. In this paper, we present the most extensive empirical performance evaluations of relational keyword search techniques to appear to date in the literature. Our results indicates that most of existing techniques not giving acceptable performance for realistic retrieval tasks. Memory consumption precludes more search techniques from scaling beyond small data sets. We also explore the relationship between execution time and factors varied in previous evaluations; analysis of this indicates that these factors relatively little impact on performance.
Keywords: Relational database; data mining; database queries; keyword search; information retrieval ; ranking; keyword search.
Abstract
Deployment of Software Puzzle on Server to Offset DoS Attacks
Ms. Rupali Suravase, Prof. Pramod Patil
DOI: 10.17148/IJARCCE.2016.57135
Abstract: Denial of Service (DoS) attack may be a malevolent decide to create a server or a network resource unobtainable to users, sometimes by briefly interrupting or suspending the services of services of a host connected to the Internet. DOS attacks and Distributed DoS (DDoS) attacks plan to eat up an internet service s resources like network information measure, memory and computation power by overwhelming the service with fake requests. Client puzzle, that demands a consumer to perform computationally expensive operations before being granted services from a server, may be a well-known measure to them. A new client puzzle is generated to countermeasure against DOS and DDoS attacks called as a software puzzle. Unlike the present consumer puzzle schemes, that publish their puzzle algorithms earlier, a puzzle algorithm with this scheme is arbitrarily generated solely only after a client request is received at the server side and the algorithm is generated such that: an attacker is unable to prepare an implementation to solve the puzzle in advance and the attacker needs appreciable amount of effort to translate a central processing unit puzzle software to its functionally identical GPU version in such a way that the translation cannot be done in real time.
Keywords: Software Puzzle, Denial of Service, Distributed Denial of Service, Cryptography.
Abstract
An Adaptive Selection of Gradient Magnitude Threshold in Anisotropic Diffusion of MRI
Anu S Nair
DOI: 10.17148/IJARCCE.2016.57136
Abstract: Anisotropic diffusion filter, being an edge preserving non-linear image restoration method, has been of wide acceptance and of intrinsic interest among the researchers in image processing domain. But judicious choice of its operational parameters is mandatory to ensure the optimum performance. Its operational parameters include number of iterations, threshold of gradient modulus etc. These operational parameters are usually selected through trial and error, through qualitative inspection of restored image. The noise retains even after the restoration and the image is likely to get blurred if the number of iterations is not wisely chosen. The selection of threshold of gradient modulus is not image driven and usually blindly chosen. Moreover, in anisotropic diffusion the diffusion coefficient is computed from the local gradient. Even the noise pixels may exhibit high local gradients in heavily corrupted images. The fine details in the image may be lost during the iterative smoothing unless the operational parameters are carefully selected. The main objective is to propose an adaptive image driven estimation of threshold of gradient magnitude, rather than setting it manually. The performance of the modified anisotropic diffusion will be compared with conventional P-M model in terms of the ability to preserve edges during restoration.
Keywords: Image Quality measures include Edge Content Ratio(ECR),Pratt�s Figure of Merit(PFOM) and Percentage Reduction in the Standered deviation of Noise(PRNSD).
Abstract
ESDIT: An Approach for Improving Performance in MANET by Detecting and Isolating Selfish Nodes
G. Sri Kanya, P. Ramya
DOI: 10.17148/IJARCCE.2016.57137
Abstract: Mobile Ad hoc Network (MANET) is a dynamic self-organized network which comprises of wireless mobile nodes. Ad hoc networks can be merged or can be partitioned into separate networks, without relying on a fixed infrastructure to manage the operation. The performance of MANET diminishes significantly because of misbehaviour of nodes due to selfish reasons. A selfish node refuses to share its resources with neighbouring nodes and uses for its own purpose. So this may lead to packet loss in MANET. To improve the performance of MANET it is important to detect and isolate the selfish nodes. In this paper, ESDIT (Efficient Selfish node Detection and Isolation Technique) is proposed to efficiently detect and isolate selfish nodes in MANET. The proposed technique has been carried out to analyze the selfish nodes detection on essential function such as network routing. The simulation study demonstrates that the proposed ESDIT enhances the packet delivery ratio and throughput.
Keywords: MANET, ad hoc networks, self-organized, selfish node, ESDIT.
Abstract
Cyber Crime: A Threat to the Nation and its Awareness
Monalisa Hati
DOI: 10.17148/IJARCCE.2016.57138
Abstract: In the present day world. India has witnessed number of crimes with respect to computer and internet. The users of computer system and internet are increasing worldwide day by day and it is easy to access information easily within a few seconds. Cyber crime which is considered as illegal activity committed on the internet increasing day by day in spite of we are taking precautionary measures. In this paper I have discussed how cyber crime affects to the nation and the awareness and preventive measures by which one can overcome the threat.
Keywords: Cyber crime, precautionary measures
Abstract
TF-IDF and KDC based Privacy Preserving Multi keyword Search over Distributed Encrypted Documents
Miss. Nilima Kasar, Prof. Vitthal S. Phad
DOI: 10.17148/IJARCCE.2016.57139
Abstract: In recent years, growth of private and semi-private information has grown up rapidly on information network; mechanisms to search such information have failed in privacy preservation. The privacy preserving searching is playing important role in the field of information networks to perform various data mining operations on encrypted data stored in various storage systems. It is also important and challenging task to protect the confidentiality of private data shared among service providers and data owners. Existing system provides one possible solution that is privacy preserving indexing (PPI). In this system, documents are stored in plain text form on private server that is privacy is compromised. So to enhance this system to make it more secure and efficient, first we store the documents on server in encrypted form and then use Key Distribution Center (KDC) for allowing decryption of data received from private server, at client side. We also implement TF-IDF, which provides the efficient ranking of results, to improve the user search experience. Finally we conduct the extensive experiments on dataset, to evaluate the performance of our proposed system. Experimental results will show that the proposed system is better than existing one, in terms of, privacy preserving, efficient and secure search on encrypted distributed documents.
Keywords: Privacy preserving indexing, Information networks, Encrypted data storage.
Abstract
TF-IDF and KDC based Privacy Preserving Congestion Free Topology for Route Management in WSN Using K-Map
Nagarjuna M, Bhat Geetalaxmi Jayram
DOI: 10.17148/IJARCCE.2016.57140
Abstract: In the field concerning the wireless sensor network, the constraint of energy dissipation plays a very crucial role in determining the overall performance efficiency of the system. The main consideration criterion for any wireless network is the topology of that network. The topology considered in the proposed work is the CATree topology which uses Kmap technique to reduce the distance map between the nodes. A comparative analysis is performed considering different topology such as star topology and mesh topology with respect to CAtree topology. The evaluations of the proposed system is performed with respect to network throughput, packet delivery ratio and energy dissipation.
Keywords: CATree, Congestion Avoidance, K-Map, Packet Retransmission, Wireless Sensor Network.
Abstract
K-Nearest Neighbor Classification on Data Confidentiality and, Privacy of User’s Input Queries
Dr. V. Goutham, P. Ashwini Reddy, K. Sunitha
DOI: 10.17148/IJARCCE.2016.57141
Abstract: Data mining emphases on producing beneficial information from the data sources rather than a simple data mining technology. Among several forms of data mining tasks, data classification is a key task for a user who wants to group a record at hand based on the database existing in the cloud. The existing privacy methods for privacy preservation in data mining are perturbation method and secure multiparty method (SMC). But these methods are current for the data that are not encrypted. Hence it is essential to present new protocols for the classification problem in data mining for the database stowed in cloud in encrypted form. We proposed the input record query classification problem of data mining task for accessing the database in encrypted form in the cloud is solved using KNN Classification method. A new privacy preserving protocol based on KNN classification method is used for protecting the privacy preservation and confidentiality of the data in the database, input query and data access.
Keywords: Security, KNN classification, Outsourced databases, Encryption.
Abstract
A Protected Anti Collection Data Sharing and Secure user Revocation Scheme for Dynamic Groups in the Cloud
Dr. V. Goutham, Mrs. K. Srilatha, Ms. M. Swapna
DOI: 10.17148/IJARCCE.2016.57142
Abstract: Endorsed from Cloud Computing, clients can achieve a thriving and modest practice for information sharing among gathering individuals in the cloud with the characters of low upkeep and slight administration cost. Then, security authorizations to the sharing information records will be given since they are outsourced. Extremely, due to the never-ending change of the enrolment, sharing information while giving protection saving is still a testing issue, predominantly for an untrusted cloud since of the agreement attack. In accumulation, for standing plans, the security of key dispersion be contingent on the harmless communication channel, then again, to have such channel is a solid feeling and is difficult for practice. A safe route for key dispersion with no safe correspondence channels, and the clients can safely acquire their private keys from gathering administrator is proposed. Besides, the plan can accomplish fine-grained access control, any client in the gathering can utilize the source in the cloud and refused clients can't get to the cloud again after they are rejected.
Keywords: Access control, Privacy-preserving, Key distribution, Cloud computing.
Abstract
On Chip Optical Interconnect for High Speed Communication System
Prashant G. Salunke, Mukesh P. Mahajan, Gayatri M. Phade
DOI: 10.17148/IJARCCE.2016.57143
Abstract: Interconnect is the most dominant factor determining system performance in integrated circuit. As technology is scaled down, device size have been shrunk on chip, copper based electrical interconnects are facing many problems like dispersion, attenuation, ringing and reflections. New design challenges are continuously emerging, conventional interconnects are not able to fulfil design requirement. Electrical interconnects have high failure rate at connecting nodes such as processors, memories and input/output ports. Optical interconnect plays vital role in removing the bottlenecks of existing interconnects and offers no. of advantages such as increasing interconnect channels, integration and reconfigurability. In this line of thought this paper discusses limitations & drawbacks of electrical interconnect. The electrical and optical interconnect are compared based on different criteria. The simulation result of transient analysis shows that optical interconnect gives better result at global interconnect level.
Keywords: optical interconnect, copper interconnect.
Abstract
Analysis of Lecture Videos Retrieval: A Content Based Approach
Kalyani D. Wagh, Dr. M. U. Kharat
DOI: 10.17148/IJARCCE.2016.57144
Abstract: Technology is very fast developed in recent year. Students are interested in fast learning, for that they prefer e-learning technology for study. Numbers of videos are available on internet on single concept. In some cases output videos are useful to user or related with users query, but some videos are not related with users query, to avoid such a type of searching use content based video retrieval system. This system consist text and speech based video retrieval and video search system. First step of content based video retrieval system is segmentation and next is key frame detection. After that extract textual data from each key frame by applying OCR(optical Character Recognition) technology also apply ASR(Automatic Speech Recognition) technology on lecture audio track , the both technology give output in form of text data. These text data is useful for content based video retrieval.
Keywords: Segmentation, OCR, ASR, Indexing, Feature Extraction.
Abstract
Different Language Recognition Model
Sankirna D. Joge, Prof. A. S. Shirsat
DOI: 10.17148/IJARCCE.2016.57145
Abstract: Language is the ability to know any complex era in a real world application. Approximate number of languages is 6500. It is possible to record the language in either analog or digital media for example, in graphic writing, braille, or whistling because human language is modality-independent. Different regions in a world have different languages spoken. When a human meets another human, speaking different language, it is difficult to identify the one what next person is talking about or in which language. Hence, the main focus is on to detect the language which is spoken by a next person. For this the database of different languages is recorded. Pc as a hardware with Matlab software is used for extracting feature of speech to detect the particular language. For detection of language, database of different languages is created. The signal processing is done on a database so as to get the final output which is final detection of a language.
Keywords: Language, Hardware, Recognition, Database, Signal processing, etc.
Abstract
A Survey Congestion Based Routing Protocols for Better Performance of Mobile Adhoc Networks
Radhika Gupta, Jashwant Samar, Durgesh Wadbude
DOI: 10.17148/IJARCCE.2016.57146
Abstract: A mobile unintentional network (MANET) may be an assortment of wireless mobile hosts forming a short lived network without the help of any complete infrastructure or centralized administration. Mobile Ad-hoc networks are self-organizing and self-configuring multichip wireless networks where, the structure of the network changes dynamically. This is principally because of the quality of the nodes. Nodes in these networks cooperating in an exceedingly friendly manner to participating themselves in multihop forwarding. The nodes within the network not solely act as hosts however additionally as routers that route data to/from different nodes in network. MANETs need associate efficient routing protocol that achieves the standard of service (QoS) mechanism. Routing protocol ought to be absolutely distributed; adjective to frequent topology amendment, Easy computation & maintenance, optimum and loop free route optimal use of resources, Collision ought to be minimum. MANET consider the shortest path with minimum hop count as optimum route with none thought traffic and so degrading the performance of the network so it's very essential to contemplate load equalization issue in routing mechanism. This Paper principally focuses on survey of varied load balanced Routing protocols for economic data transmission in MANETs.
Keywords: MANET, Mobile Adhoc Networks, Congestion Based Routing Protocols, QoS.
Abstract
Detection and Prevention of SQL Injection in a Web Application Using Secure Object Relational Mapping Approach
Siddhesh Bhagat, Dr. R. R Sedamkar, Prachi Janrao
DOI: 10.17148/IJARCCE.2016.57147
Abstract: Many modern web based systems are presently following 3-tier architecture for implementation of enterprise application. However rare use of modern frameworks and standards in this kind of applications, these applications are more vulnerable to attack that can breach and steal confidential information stored in database. One of the attack known as SQL injection is a very serious and flawless way to retrieve data without leaving any traces behind process. This paper addresses a solution for this kind of serious problem in a novel way which not only provides efficient solution but acquire a modern coding standard which developers follow. This new approach called as ORM technique. ORM is a Object Relational Mapping where we maps the table architecture with corresponding Object and use those objects to retrieve data instead of getting data from database directly . Hence it creates a indirect barrier from firing SQL query which helps us to prevent our important information from direct access. As it also follows standard of coding this ORM Methodology satisfies desired criteria of highly cohesive with loose coupling while coding.
Keywords: ORM, Hibernate, SQLIA, LDAP, FCD, SSC, T-SQL.
Abstract
Study of Mobile Ad Hoc Network in the Presence of Wormhole Attack
F. Anne Jenefer, A. M. Merlin Ruby, D. Vidhya
DOI: 10.17148/IJARCCE.2016.57148
Abstract: A generic definition of security is �freedom from risk, danger or safety�. Mobile Ad-Hoc Networks (MANETs) are a kind of wireless network that usually has a routable network environment above the link layer. It is a peer-peer self forming and self healing network. The nodes which are present in this network can move from one place to another in the network or may leave or join the network at any time. Due to this the topology of the network changes rapidly. Due to the absence of central administrator the MANETs are vulnerable to attacks. In this paper, performance comparison of MANET in the presence and absence of two types of wormhole attack such as replay and tunnelling has been carried out. The performance of the network is measured using metrics like Link Breakage and Delay in the network by varying the number of nodes and number of attackers. The study results prove that the network performance is severely affected in the presence of wormhole attack.
Keywords: Link Breakage, AODV, Mobile Ad-hoc Networks, Wormhole, Tunnelling, Replay.
Abstract
Link Lifetime Prediction in Mobile Adhoc Network: A Survey
Ashish Kumar Awadhiya, Subodh Mishra, Vivek Sharma
DOI: 10.17148/IJARCCE.2016.57149
Abstract: In the recent years, wireless technology has enjoyed a tremendous rise in popularity and usage, thus opening new fields of applications in the domain of networking. Without using any fixed structural support the information is exchanging in the network of mobile devices. Such networks are termed as ad �hoc network. One of the most important of these fields concerns mobile ad hoc networks (MANETs), where the participating nodes do not rely on any existing network infrastructure. Ad hoc On-Demand Distance Vector (AODV) is a widely used routing protocol for mobile ad hoc networks (MANETs). The nodes in the network are themselves responsible for routing the packets from the source to the destination. These nodes are also responsible to make the transfer of packets secure. In the mobile Adhoc network environment, a number of factors such as noise, physical obstructions mobility, and weather conditions contribute to the difficulty of accurately modeling the behavior of the lifetime of a link between two mobile nodes. Due to the inherently dynamic nature of the network topology, the current links are frequently broken, and new links are frequently established. Mobile Adhoc network requires reliability and security of data packets. The quality of service must satisfy end to end data packet delivery and no packet data loss. In this paper we provide survey on the effects of mobility on the link lifetime.
Keywords: MANET, residual link lifetime, velocity change detection, Quality of service, Route Discovery.
Abstract
Application of Radial Basis Function Neural Network in Diagnosis of Ms Disease
Mohammad Esmaeil Shaabani, Touraj Banirostam, Alireza Hedayati
DOI: 10.17148/IJARCCE.2016.57150
Abstract: Artificial intelligence consist of research in computer science that it's targets is creating a computer that could reason such as human and help them make decision better. Decision support system is computer software that design for diagnosis system. Multiple Sclerosis is a kind of disease that starts with damage the myelin of brain and has some neurological symptoms like reducing the power of vision, spastic paralysis of limbs and impotency. In this case, the major problem is the lack of diagnosis. To improve diagnosis, Radial Basis Function Neural Network is used. In this study, we use learning power of Neural Network. K-fold cross validation has been used for optimizing the input/output. Implementation has been done in MATLAB. The Dataset consist of 600 patients that each one has 6 columns, 5 of them is input and one a of them is output that shows diagnosis. Proposed Method RBF compared with ANFIS and MLP. The result shows that RBF's accuracy is 96%. Its accuracy is a little more than ANFIS but it's training time is much more that the other. ANFIS's accuracy is almost 96%. By consideration of too much training time of RBF and ignore the slightly different accuracy, ANFIS give us the best result.
Keywords: Multiple Sclerosis, Fuzzy System, Neural Network, Radial Basis Function.
Abstract
Novel Sequence Clustering Approach for Biological Data
Sunila, Rishipal, Sanjeev Kumar
DOI: 10.17148/IJARCCE.2016.57151
Abstract: Clustering is one of the unsupervised learning technique in which a set of basics is separated into uniform groups. It is more hard job as compared to supervised classification where classes are already known for training the system. This dilemma becomes most awful when sequential data are to be measured. Hidden Markov Models (HMM) comprise a tool for sequential data modeling. In this paper a scheme for HMM based sequential clustering is proposed and compared with K-Means using machine learning tool WEKA. In this approach proximity based methods are used, in which the main endeavor of the clustering process is in formulating similarity or distance measures between sequences. Proposed K-Means is a useful tool for identifying co-expressed genes, biologically relevant groupings of genes and samples. Experimental results demonstrate that HMM based K-Means outperforms K-Means in terms of accuracy. But Proposed K-Means has an intense computational load.
Keywords: Data mining, Clustering, K-Means Clustering, HMM, Distance measure.
Abstract
Implementation and Analysis of Open Source Computing on Cloud-Based ERP Method
Dr. D. Durga Bhavani
DOI: 10.17148/IJARCCE.2016.57152
Abstract: Cloud computing is an emerging computing paradigm that is real and becoming gradually more common. While there are advantages and similarly challenges to implementing the cloudcomputing concept, the key attention provided in this paper can be used as a preliminaryfact. Businesses are largest in capitalist economies, where most of them are privately owned and administered to earn profit to increase the wealth of their owners. ERP also leads to global decision optimization, a clearoverview of enterprise functioning and quicker performance. ERP enables companies to have greater control over marketing, production and inventory. This reduces costs as well as reliance on help desk support. Using a cloud based solution negates the need to purchase hardware, software licences and annual hardware and software maintenance support contracts for company owned assets. Eliminate worries regarding aging hardware and asset replacement.. Avoid the costs associated with environmental controls in server rooms. Reduction in bandwidth and communication service requirements to local servers if multiple sites require access. Traffic is redirected to the Web. As business vendors are targeting SMEs but many projects fail due to poor planning, lack of resources, organization immaturity and failure to understand the complexities of integrating such applications with existing business systems.
Keywords: Include at least 4 keywords or phrases
Abstract
Detection Evaluation and Protection of Vampire Attacks in Ad-Hoc Wireless Sensor Network
Kalyani S Kumar
DOI: 10.17148/IJARCCE.2016.57153
Abstract: Wireless Sensor Networks (WSNs) in today�s world are the means of communication. These contain nodes that act as transmitter and receivers are prone to different attacks leading to different types of losses. The resource depletion attack that is called vampire attack drains out the energy from the nodes leaving them useless. These attacks are protocol compliant, they are easy to implement. Since they are orthogonal in nature they can easily intrude into any routing protocol. They affect the entire network causing large loss of energy and A vampire attack is caused by the malicious node on the decentralized ad hoc wireless network. The paper analyses how protocols faces these attacks. Vampire attacks are not protocol specific rather uses its compliant message. The current security measures to prevent these attacks are been reviewed along with result of simulation of representative protocols in the presence of a vampire attack is been presented. The paper also describes how the existing sensor network protocol is been modified for protection from the vampire attacks for which PLGP) solution is also been proposed.
Keywords: Wireless Sensor Network; Denial of service; Resource depletion; Routing; Energy consumption; Security; carousel attack; stretch attack; PLGP;
Abstract
Design of a Power Efficient Parallel Architecture for Linear Feedback Shift Registers
Y. Aasrita, R. Mahesh Kumar, B. Abdul Rahim, N. Bala Dastagiri
DOI: 10.17148/IJARCCE.2016.57154
Abstract: This brief presents a new parallel architecture for linear feedback shift registers. This is 8-bit parallel architecture, which can be used to achieve high-throughput. In linear feedback shift registers exclusive-or is commonly used as linear function. Linear feedback shift register is determined by the feedback polynomial. Cyclic Redundancy Check (CRC) & Bose - Chaudhuri �Hocquenghem (BCH) are encoders for storage and communication systems. CRC is a system that reduces complexity of its feedback loop. When compared to previous parallel architectures based on the transposed serial LFSR. In this the LFSR based upon the IIR topology. The previous 4-bit parallel architecture has more complexity; it occupies more area, time. The proposed 8-bit parallel architecture better achieves area-time product &reduces complexity.
Keywords: Bose�Chaudhuri�Hocquenghem (BCH) encoder, cyclic redundancy check (CRC) encoder, linear feedback shift register (LFSR), parallel architecture.
Abstract
Soft Computing Technique for the Design of Band Pass Fir Digital Filter
Navnoor Brar, Balraj Singh, Darshan Singh Sidhu
DOI: 10.17148/IJARCCE.2016.57155
Abstract: This paper presents a soft computing technique for the design of band pass FIR digital filter. Nature inspired optimization technique known as predator prey optimization (PPO) has been used to design an optimal band pass FIR digital filter. PPO technique is considered as a comprehensive search technique and as a stochastic optimization process; it avoids confined stagnation as preys play the role of diversification to find best solution because of predator�s fear. PPO technique enhances the ability to discover and utilize the search space locally as well as globally in order to obtain the finest filter parameters for the design of filter. Performance of PPO has been compared with craziness based Particle Swarm Optimization (CRPSO). Simulation results demonstrate that the proposed PPO algorithm gives better results for the design of band pass FIR digital filter as compared to CRPSO.
Keywords: Predator Prey Optimization, Craziness based PSO, Band-Pass FIR Digital Filter, Magnitude and ripple errors, Magnitude and Phase response.
Abstract
Comparison of Proactive, Reactive and Hybrid Routing Protocol in MANET
S. Saranya, Dr. R. Manika Chezian
DOI: 10.17148/IJARCCE.2016.57156
Abstract: An ad hoc network is Latin words are for this purpose. It is refers to a network connection established for a single period and does not require a router or a wireless base station. A Mobile ad hoc network is a one type of network that can change locations and configure itself on the fly. But MANETS are uses mobile with wireless connections to connect to various networks. Another medium, such as a cellular or satellite transmission. The protocol is set of rules and convention of communication between the networks. A routing protocol specifies how routers communicate with each other; propagate information that enables them to select routes between any two nodes on a computer network. This paper describes three types of routing protocols and its structure and formation. Proactive routing protocol is used for updating information in the network. Reactive protocol is determining the structure of networks. Hybrid routing protocol is combination of proactive and reactive protocols. This paper also compares Common parameter of proactive, reactive and hybrid routing protocol.
Keywords: Ad hoc network, routing protocol, proactive routing protocols, reactive routing protocols, hybrid routing protocols, comparison.
Abstract
A Multi-Agent Based System Architecture for Monitoring Nodes in Local Area Networks
John-Otumu Adetokunbo M, Ojieabu Clement E, Oshoiribhor Emmanuel O
DOI: 10.17148/IJARCCE.2016.57157
Abstract: Since it is not easy for network administrators to monitor nodes in a network environment manually due to the physical movement from one node to another; and it is even worst with the trend of the increase in nodes in a network environment due to Web based Service Oriented Applications (SOA) that runs on the networks. Monitoring of nodes in terms of detecting faulty network cables, detecting of nodes that is not supposed to be part of a particular network, and even the shutting down of hundreds of nodes has become a nightmare for most network administrators. The static software solutions and dynamic single task software for network management developed has not really helped matters on the network administrators end. These worries gave birth to this research work, of designing a multi-agent based system to handle different task for the sole benefit of the network administrator and not the network environment. The system is effective and efficient, and it is recommended for practical usage.
Keywords: Multi-agent based system, Mobile agent, Monitoring, Nodes, LANs.
Abstract
Resource Optimization for Big Data processing using MapReduce Framework: Survey
Parul Chhabra, Surender Singh
DOI: 10.17148/IJARCCE.2016.57158
Abstract: Big Data is a new area for researchers and it supports various application domains i.e. Medical, Finance, Sales & Marketing, Education etc. Big Data deals with the processing of large data volume. There are different challenges which are associated with the data processing i.e. storage of large scale data, memory management, energy consumption, job scheduling, process management and security etc. There is need to explore each issue and its possible solutions. Researchers have already developed some solution for Big Data processing and in this paper, we will explore them.
Keywords: Hadoop, Big Data, Energy Consumption, HDFS, MapReduce.
Abstract
Security Analysis of Honey words Generation Scheme to Evade Unauthorized Access
Ms. Manisha B. Kale, Prof. D. V. Jadhav
DOI: 10.17148/IJARCCE.2016.57159
Abstract: Now a day, rapid expansion of the accessing data from the network or from the other system the security becomes biggest issue. Storage of information also becomes the insecure because of attacker. And encryption of the data is also having some deficiencies. So the security of data is the latest issue. As the solution of above problem is the honey word generation is the best option for providing security to the data. In existing systems they only concentrated on the security of the password file but the different issues come. For solving this here we create the honeyword, i.e. a false word, using a perfectly flat honeyword generation method. Hence that time we catch the unauthorized user and also the attacker not getting the original data.
Keywords: Honey word; Authentication; Decoy Document; Tweaking-digits; Hybrid.
Abstract
Web Page Navigation Mining Through Association Rules
Harsha Dubey, Dr. Megha Mishra, Dr. V. K. Mishra
DOI: 10.17148/IJARCCE.2016.57160
Abstract: Web mining is the utilization of information mining systems to naturally find and concentrate data from web archives and administrations. Web mining is three sorts: Web use Mining, Web content Mining and Web structure Mining. Web utilization mining is the Process of finding information from the cooperation created by the clients in the types of access logs, program logs, intermediary server logs, client session information, treats. The web server log document naturally made and kept up by a server comprising of a rundown of exercises it performed. The proposed framework is intended for website page forecast in suggestion framework and also it is useful for the investigation of web mining calculation to get incessant consecutive access design from the web log document of web server. The execution in light of the cleaning, fuzzy c means clustering and Association rules and the outcomes are noticed that the effective calculation for web log successive access in accurate example mining.
Keywords: Web Mining, Association rules, Clustering, Web Server log file.
Abstract
A Review on Detection Techniques in Medical Imaging
Priyanka Pareek, Pankaj dalal
DOI: 10.17148/IJARCCE.2016.57161
Abstract: Various researches are going on in the field of medical image processing. In this paper we have done a comparative study of various computer based abnormity detection method in medical image processing. This paper also discusses about various algorithms proposed by researchers time to time in this area of medical imaging. This study is helpful for better use of new existing method and improving the performance of object detection.
Keywords: Region growing, MRI, segmentation, Texture analysis, Edge detection etc.
Abstract
Customization of Document Using Content and Query Based Annotation
Kalyani Kute, Prof. R. P. Dahake
DOI: 10.17148/IJARCCE.2016.57162
Abstract: Various information retrieval methods are retrieve the prepared and correct information from large number of datasets, which are expensive to manage in terms time and money. Particularly when work on important text that may not contain any instance of the embattled planned information. The different approach that serves and also creates well arranged metadata using attributes which are reasonable by identify the data store that are likely to contain information of user interest or related to search keyword enter in query and this information is going to be consequently useful for querying and extracting from the database. We propose the method CADS (Collaborative Adaptive Data Shearing Platform) is based on the query modules and the metadata with clustering using which metadata added in datasets and search using the query forms in which resulted records are downloadable and readable. It represents the way to recognize structured information and extraction of information make easy. It is useful to improve the search efficiency by using the content search and query search with use of clustering searching is faster.
Keywords: Query, Annotation, CADS.
Abstract
Natural Polymers in Tissue Engineering
Mashal Alenazi
DOI: 10.17148/IJARCCE.2016.57163
Abstract: The application of freeze dried hydroxypropyl methylcellulose (HPMC) and methylcellulose (MC) as stabilizers in peanut butter were investigated. These cellulose derivatives were dispersed in water and subsequently freeze dried and chopped to produce a stabilizer that is able to absorb high amounts of oil. Without this templating approach, HPMC and MC had no effect on peanut butter stability and texture. An alternative spray drying approach was attempted. There are numerous techniques for microfabrication of patterned polymer surfaces and microchips for drug delivery. While silicon has been the choice material for much of the research done with MEMS, the methacrylates and acrylates provide a rapid and inexpensive base for future work. new method for determining Rigidity temperature applying cooling curve analysis. The determined values of Rigidity temperatures for three AlSi8Cu3 alloys with different contents of Strontium using thermal analysis technique have been compared with Rigidity temperatures obtained using mechanical technique (viscosity measurement).
Keywords: Natural, tissue, hydrolysate, polymers, engineering.
Abstract
The Detection, Separation and Quantification of Brain Tumour via MRI Images
Smita N Wakale, Ram K Kanhe
DOI: 10.17148/IJARCCE.2016.57164
Abstract: Magnetic Resonance Imaging is generally used for the diagnosis of brain tumour. In this paper the gradient differential as a main principle for brain tumour detection, separation and quantification. The pre-processing step is done by denoising and enhancing image. It is partitioned into 4 equal quadrants and locates the maximum entropy area for evaluating the exact tumour portion. It avoids live cell and consider the dead cell. By applying the extended maxima and regional maxima the image is obtained. It will evaluate the tumour size, the execution time and entropy of images. The results show that proposed method requires 3.22 seconds. It is more efficient and easy to implementation.
Keywords: MRI, Tumour, Entropy, Boundary, Extended maxima transform.
