VOLUME 5, ISSUE 8, AUGUST 2016
ECG Arrhythmia Detection Using Choi-Williams Time-Frequency Distribution and Artificial Neural Network
Sanjit K. Dash, G. Sasibhushana Rao
Data Security using RSA Algorithm in Cloud Computing
Santosh Kumar Singh, Dr. P.K. Manjhi, Dr. R.K. Tiwari
Detection Algorithms in Medical Imaging
Priyanka Pareek, Pankaj Dalal
A Review Study on the CPU Scheduling Algorithms
Shweta Jain, Dr. Saurabh Jain
Quantitative and Qualitative Analysis of Milk Parameters using Arduino Controller
Y.R. Bhamare, M.B. Matsagar, C.G. Dighavkar
Ardunio Based Security and Safety using GSM as Fault Alert System for BTS (Base Transceiver Station)
Umeshwari Khot, Prof. Venkat N. Ghodke
Automatic Single and Multi Topic Summarization and Evolution to Generate Timeline
Mrs. V. Meenakshi, Ms. S. Jeyanthi
Data Hiding in Encrypted HEVC/AVC Video Streams
Saltanat Shaikh, Prof. Shahzia Sayyad
A Study of Imbalanced Classification Problem
P. Rajeshwari, D. Maheshwari
Design of PTL based Area Efficient and Low Power 4-bit ALU
Saraabu Narendra Achari, Mr. C. Pakkiraiah
The Design of Driver Safety Awareness and Assistance System through Sleep Activated and Auto Brake System for Vehicle Control
D. Sivabalaselvamani, Dr. A. Tamilarasi, L. Rahunathan and A.S. Harishankher
Parameters Selection, Applications & Convergence Analysis of PSO Algorithms
Sachin Kumar, Mr. N.K. Gupta
Effective Pattern Deploying Model for the Document Restructuring and Classification
Niketa, Jharna Chopra
Digital Image Watermarking using Modified DWT&DCT Combination and Bi Linear Interpolation
Yannam .Nagarjuna, K. Chaitanya
Comparative Study and Analysis on the Techniques of Web Mining
Dipika Sahu, Yamini Chouhan
A Review of MIL-STD-1553 Bus Trends and Future
K. Padmanabham, Prabhakar Kanugo, Dr. K. Nagabhushan Raju, M. Chandrashekar
Design of QPSK Digital Modulation Scheme Using Turbo Codes for an Air Borne System
D. Sai Brunda, B. Geetha Rani
An Efficient Locally Weighted Spectral Cluster for Automatic Image Segmentation
Vishnu Priya M, J Santhosh
An Efficient Sliding Window Based Micro Cluster Over Data Streams
Nancy Mary, A. Venugopal
Comparative Analysis of Traditional Frequency Reuse Techniques in LTE Network
Neelam Rani, Dr. Sanjeev Kumar
Score Level Integration of Fingerprint and Hand Geometry Biometrics
Jyoti Tiwari, Santosh Kumar
CHARM: Intelligently Cost and Bandwidth Detection for FTP Servers using Heuristic Algorithm
Shiva Urolagin
Image Enhancement Using Modified Exposure Based Histogram
SK. Nasreen, N. Anupama
Human Gesture Based Recognition and Classification Using MATLAB
Suman, Er. Kapil Sirohi
Image Denoising- A Novel Approach
Dipali D. Sathe, Prof. K.N. Barbole
Design of Low Pass Digital FIR Filter Using Nature Inspired Technique
Nisha Rani, Balraj Singh, Darshan Singh Sidhu
Hybridization of GSA and AFSA to Detect Black Hole Attack in Wireless Sensor Network
Soni Rani, Charanjit Singh
Reversible Watermarking Technique for Data Hiding, Accurate Tamper Detection in ROI and Exact Recovery of ROI
Y. Usha Madhuri, K. Chaitanya
Fault Tolerance and Concurrency Control in Heterogeneous Distributed Database Systems
Sagar Patel, Meghna Burli, Nidhi Shah, Prof. (Mrs.) Vinaya Sawant
Collection of Offline Tamil Handwriting Samples and Database Creation
D. Rajalakshmi, Dr. S.K. Jayanthi
Overview of Renewable Energy in Maharashtra
Mr. Sagar P. Thombare, Mr. Vishal Gunjal, Miss. Snehal Bhandarkar
Comparative Analysis of Efficient Image Steganographic Technique with the 2-bit LSB Algorithm for Color Images
K. S. Sadasiva Rao, Dr A. Damodaram
An Efficient Reverse Converter Design for Five Moduli Set RNS
Y. Ayyavaru Reddy, B. Sekhar
VLSI Design of Area Efficient High Performance SPMV Accelerator using VBW-CBQCSR Scheme
N. Narasimharao, A. Mallaiah
Customer Retention of MCDR using 3SCDM Approaches
Suban Ravichandran, Chandrasekaran Ramasamy
User Privacy and Data Trustworthiness in Mobile Crowd Sensing
Ms. T. Sharadha, Dr. R. Vijaya Bhanu
A Safe Anti-Conspiracy Data Model For Changing Groups in Cloud
G. Ajay Kumar, Devaraj Verma C
Scope and Adoption of M-Commerce in India
Anurag Mishra, Sanjay Medhavi, Khan Shah Mohd, P.C. Mishra
A Study of Different Content Based Image Retrieval Techniques
C. Gururaj, D. Jayadevappa, Satish Tunga
Cache Management for Big Data Applications: Survey
Kiran Grover, Surender Singh
Survey on Energy Efficient Protocols and Challenges in IOT
Syeda Butool Fatima, Sayyada Fahmeeda Sultana, Sadiya Ansari
Educational Data Mining For Evaluating Students Performance
Sampreethi P.K, VR. Nagarajan
Iterative Pareto Principle for Software Test Case Prioritization
Manas Kumar Yogi, G. Vijay Kumar, D. Uma
Localization Techniques in Wireless Sensor Networks: A Review
Abhishek Kumar, Deepak Prashar
Survey Paper on Get My Route Application
Shubham A. Purohit, Tushar R. Khandare, Prof. Swapnil V. Deshmukh
Design and Implementation of Smart Car with Self-Navigation and Self-Parking Systems using Sensors and RFID Technology
Madhuri M. Bijamwar, Prof. S.G. Kole, Prof. S.S. Savkare
Comparison Study of Induction Motor Drives using Microcontroller and FPGA
Sooraj M S, Sreerag K T V
Multirate Signal Reconstruction Using Two Channel Orthogonal Filter Bank
Sijo Thomas, Darsana P
The Multi-keyword Synonym Search for Encrypted Cloud Data Using Clustering Method
Monika Rani H G, Varshini Vidyadhar
A Review on Various Speech Enhancement Techniques
Alugonda Rajani, Soundarya .S.V.S
A Survey on Various Spoofing Attacks and Image Fusion Techniques
Pravallika .P, Dr. K. Satya Prasad
Non-Invasive Vein Detection using Infra-red Rays
Aradhana Singh, Dr. S.C. Prasanna Kumar, Dr. B.G. Sudershan
Boundary-Polygons for Minutiae based Fingerprinst Recognition
Kusha Maharshi, Prashant Sahai Saxena
Image Forgery Detection on Digital Images
Nimi Susan Saji, Ranjitha Rajan
Secure Multi-Owner Data Sharing for Dynamic Groups in Cloud
Ms. Nilophar M. Masuldar, Prof. V. P. Kshirsagar
Compact Microstrip Octagonal Slot Antenna for Wireless Communication Applications
Thasneem .H, Midhun Joy
‘Aquarius’- Smart IOT Technology for Water Level Monitoring System
Prof. A. M. Jagtap, Bhaldar Saniya Sikandar, Shinde Sharmila Shivaji, Khalate Vrushali Pramod, Nirmal Kalyani Sarangdhar
Future of Results in Select Search Engine
Peerzada Mohammad Iqbal, Dr. Abdul Majid Baba, Aasim Bashir
Semantic Indexing Techniques on Information Retrieval of Web Content
Abdullah K-K. A, Robert A.B.C, Adeyemo A.B
Brain Tumor Segmentation using K-Means Based Level Sets
Ch. Deepika, N. Anupama
A Survey on Comparable Entity Mining from Comparative Questions by Using Weakly Supervised and Markov-Logic Network
P. Ragha Vardhani, Y. Indira Priyadrashini
A Survey on Overview of Data Mining
Mrs. R. Pradheepa, Ms. K. Pavithra
Morphological Technique for Improving Indian Coin Detection System under Varying Lighting Conditions
Nida Rahman, Mr. Jay Kant Pratap Singh
Survey Paper on Private Audio Wave Technology
Tushar R. Khandare, Shubham A. Purohit, Prof. Swapnil V. Deshmukh
Caching of Routes in AODV for MANET
Vinod Kumar, Samir Srivastava, Rajesh Kumar Maurya
Channel hopping Algorithm in Cognitive Radio Networks
V. Gopi, B. Ajay Kumar, R. Chandrasekhar
GPS Based Vehicle Navigation System
S. Mohanapriya, K. Priyadharshini, V. Ramya, G. Vignesh, V. Anand Kumar
Method & Implementation on Node Relocalization in Dynamic Reconfiguration System in WSN
Rajni Kamboj, Er.Veena Rani
Annotating Assamese Corpus using the Standard POS Tagset
Bipul Roy, Bipul Syam Purkayastha
An Approach for Brain Tumor classification using Artificial Neural Network
Tanya Saxena, Vimal Gupta
Movement Detection of Target in Wireless Sensor Network
Chinmayee Pande , Prof. S.D. Joshi
A Survey on Skin Cancer Detection Techniques Using Digital Imaging Processing
Shefali Laddha, Komal Paliwal
Survey Paper on Intelligent Skipping Rope
Bhagyesh S. Mawale, Tushar R. Khandare, Prof. Swapnil V. Deshmukh
Encryption and Watermarking Embedded in H.264/AVC Video Stream
Sowmya Keerthi .D, Dr. K. Satya Prasad
Segmentation of Liver from images of Visceral Organs through Automatic Processing – A review
K.A.M. Sajad Hyder, M. Vanitha
Multiband Microstrip Patch Antenna for RFID Applications
Ankita Batta, Ruchi
Multi-Objective Optimization for Feature Selection using Pareto Front
Bhuvaneswari Ragothaman, Dr. B.Sarojini
Web of Things Based Smart Grid Architecture to Monitor and Control Energy Sources
Amala T. Kadam, Prof. S. S. Savkare
Improving Medical Diagnosis using Filter and Wrapper Techniques
Sonu Rani, Dharminder Kumar, Sunita Beniwal
Comparison of the Performance Evaluations in Classification
So Jung Shin, Hyeuk Kim, Sang-Tae Han
An Algorithm for Enhancing and De-hazing Videos
Anna Mathew, Therese Yamuna Mahesh
Lane Detection System for Autonomous Driver Assistance
Geetanjali Paradkar, Prof. P.V. Mulmule
EAACK – A Secure Intrusion – Detection System for MANETs
G. Sathyanarayani, Dr. S. Adaekalavan
A Review Paper on Forgery Part Detection using Different Methods
Manpreet Kaur, Mandeep Kaur
Bit Error Rate Performance Evaluation of Various Modulation Techniques with Forward Error Correction Coding of WiMAX
Jaipreet Kaur, Sukhdeep Kaur, Manjit Sandhu
An Invisible Robust Image Watermarking Technique based on Pseudo Random Numbers with Attacks
Shatha Ghazal, Raina S Alkhlailah
Wireless Web Server for Industrial Data Acquisition and Control Using Raspberry Pi
N.R. Darda, G.R. Gidveer
Comparative Analysis of Novel Weight Based Cluster Algorithm and Energy Efficient Cluster Based Algorithm in MANET
Sanehi Sirohi, Manoj Yadav
Phishing Detection using Map-reduce and PART Algorithm
Mr. Rakshith Raj K. R, Prof. Prabhakara B. K
Statistics and Mean Filters Based on Spatial Noise: A Comparative Study
Ali Abdulkarem Habib
Measurement of MF Receiver Performance Deviation Using Conventional and Practically Derived Threshold for Binarised Image Signals
Bimla Pandey, Amit Kumar Ahuja
An Optimized Queuing Model to Improve Spectrum Utilisation in Cognitive Radio Network
Kumud Tiwari, Ashutosh Rastogi
Comparative Study of the Programming Languages
Ruchi Sharma, A.J Singh
Selection of Proper Fixed Size Square Washer using Image Processing Approach”
Swati Kiran Diddi, Prof M.R Madki
An Energy Efficient Congestion Aware Routing Strategy Based on Genetic Algorithm for Mobile Adhoc Network
Radhika Gupta, Jashwant Samar, Durgesh Wadbude
Fake Currency Detector
Ms. Khatke Rasika Nandakumar, Mr. Hindurao Dinkar Gore
Pan-Sharpening Based Satellite Multispectral Image Enhancement under NSC-Transform
Harshada R. Ghodekar, Prof. A.S. Deshpande
Helmet Based Vehicle’s Auto Ignition with Alcohol Detection and Accident Indication and Reporting System
Ms. Khyati Varma, Ms. Sneha Jainwar, Mr. B. Hari Kishor Rao, Ms. Juby Jogi
Survey Paper – Online Android Notice Board for Education Society
Nikhil S. Kawna, Shubham A. Purohit, Prof. Swapnil V. Deshmukh
License Plate Recognition of Indian Number Plates- An Image Processing Approach
Riri Pradeep Shah, Prof M.R Madki
Big Data: Exploring Hadoop, MapReduce & HDFS in Data Mining
Prof. Datey Zuhaib Khalil, Prof. M. Jhansi Lakshmi
Design and Survey of Optical Time Division Multiplexing for Very High Bit-Rate Transmission
Mohammad Umar Ansari, A. Ashok, A.K. Jaiswal, A. Masih
Selective Gene Exchange (SGEX) Mutation Algorithm as a Data Encryption and Decryption Mechanism
Cris Paulo G. Hate, Arnel C. Fajardo
Brain Tumor Classification Based on Singular Value Decomposition
Nidahl K. El Abbadi, Neamah E. Kadhim
Effective Data Retrieval Using Relevance Feedback and Local Search Approximation Algorithms
Mathumathi .B, Darsana K Gopidas
Adaptive Privacy Policy Prediction of Content Sharing on OSN
Dr. V. Goutham, Mr. G. Guru Brahmam, Ms. R. Bharathi
Secure Data Outsourcing Protocol in Cloud by PRE and ECC with Chaotic Standard Map
Mahendra Kumar Yadav, Jashwant Samar, Durgesh Wadbude
A Novel Face Detection And Recognition System Using Hybrid Skin Color Model
Pradeep Kumar, Pankaj Kumar, M. Rakesh
Edge Detection of an Image Using an Improved Canny Algorithm: A Review
Lalrinawma, Ramanjeet Kaur
Study of Data Mining Approach for Privacy Preservation
Priyank Pathak, Rajat Paliwal
Texture Segmentation using Threshold Entropy Filter
Harjot, Rupinder Kaur Wahla
An Improved Image Watermarking Algorithm using Three-Level Dwt-SVD Technique
Ashish Kumar, Rishi Singh, Kailash Patidar
Analyzing Zone Routing Protocol in MANETs and Applying Open SSL DES96 Enhancement Algorithm
Vineetha Gunturi, Harsha Varma
A Review of Label Dependency and Feature Similarity for Multi-Label Classification
Rohit Tiwari, Shivank Kumar Soni
A Survey on MANET Security Challenges, Attacks and its Countermeasures
Harpreet Singh Bedi, Shekhar Verma, Mohit Goel
Abstract
5th Generation Wi-Fi
Shatha Ghazal, Raina S Alkhlailah
DOI: 10.17148/IJARCCE.2016.5801
Abstract: Technology is evolving rapidly for making things easier. Due to innovative ideas at the customer and manufacturers level, new networking methods are introduced. Nowadays, these networking methods are concentrating on wireless technology (wi-fi) where it is the most acceptable and flexible one. It became popular for all, which wireless communications standards continue to evolve, to provide ever-increasing data throughput capabilities. Today, two of the hottest wireless standards are IEEE 802.11ac in wireless-local-area-network (WLAN) products and 3GPP LTE-Advanced in cellular communications. IEEE 802.11ac is the new draft standard for Gigabit wifi. IEEE 802.11ac promises data rates of up to 1.73Gbps between an access point and a wireless client. In this paper, we�ll take a basic knowledge about IEEE 802.11ac. More specifically, we�ll look at how features such as Video Streaming and Data Syncing and Backing Up. Finally, we�ll look technical detail and its application.
Keywords: Wi-Fi, LTE, IEEE Standard, SS Id.
Abstract
ECG Arrhythmia Detection Using Choi-Williams Time-Frequency Distribution and Artificial Neural Network
Sanjit K. Dash, G. Sasibhushana Rao
DOI: 10.17148/IJARCCE.2016.5802
Abstract: Feature selection is one of the most important aspects of classification problem. Due to the nonlinear characteristic of the ECG signal, the time-frequency transformation is proposed for better feature extraction to classify different ECG arrhythmia beats. In our study Choi-Williams time-freqency distribution and short time Fourier transform are used to extract features from the ECG signals. Total sixteen features are extracted which are used as the input to the feed-forward backpropagation neural network using the conjugate gradient optimization algorithm. ECG signals of MIT-BIH arrhythmia dataset are used in this work. Six different classes of ECG beats, Normal (N) beat, Left Bundle Branch Block (L) beat, Right Bundle Branch Block(R) beat, premature ventricular contraction (V) beat, paced (PA) beat and fusion of paced and normal (f) beat are classified and the performance is compared.
Keywords: Time-Frequency Distribution, Backpropagation neural network, Pattern Classification, ECG Arrhythmia
Abstract
Data Security using RSA Algorithm in Cloud Computing
Santosh Kumar Singh, Dr. P.K. Manjhi, Dr. R.K. Tiwari
DOI: 10.17148/IJARCCE.2016.5803
Abstract: Cloud computing is an emerging paradigm which has become today�s hottest research area due to its ability to reduce the costs associated with computing. In today�s era, it is most interesting and enticing technology which is offering the services to its users on demand over the internet. Since Cloud Computing stores the data and disseminated resources in the open environment, security has become the main obstacle which is hampering the deployment of Cloud environments. Even though the Cloud Computing is promising and efficient, there are many challenges for data security as there is no vicinity of the data for the Cloud user. To ensure the security of data, we proposed a method by implementing RSA algorithm. After implementing RSA Algorithm, we have also analyzed the performance of our algorithm based on three parameters namely Time Complexity, Space Complexity and Throughput. In our proposed work, we are using RSA algorithm to encrypt the data to provide security so that only the concerned user can access it. By securing the data, we are not allowing unauthorized access to it. User data is encrypted first and then it is stored in the Cloud. When required user places a request for the data to the Cloud provider, Cloud provider authenticates the user and delivers the data.
Keywords: Cloud Computing, Data Security, RSA algorithm, Encryption, Decryption, Time complexity, Space complexity, Throughput.
Abstract
Detection Algorithms in Medical Imaging
Priyanka Pareek, Pankaj Dalal
DOI: 10.17148/IJARCCE.2016.5804
Abstract: Image Processing is popular now a day in every field. The algorithms are keys of various activities in image processing. The medical science is one of the field using image processing called medical imaging. The medical imaging is one of the important tools for diagnosis of diseases inside of body especially delicate part like Brain. Researchers have worked over many algorithms for comparing images of body parts for diagnosis the diseases. Here we will review various algorithms proposed by researcher time in this area of medical imaging.
Keywords: brain disease affected area (Tumour), Region growing, MRI, segmentation, Texture analysis, Edge detection etc.
Abstract
A Review Study on the CPU Scheduling Algorithms
Shweta Jain, Dr. Saurabh Jain
DOI: 10.17148/IJARCCE.2016.5805
Abstract: In operating system, Scheduling plays a vital role in their designing. Different authors proposed various Scheduling algorithms and performance of their algorithms. In this paper, studying the review of those different scheduling algorithms are performed with different parameters, such as turnaround time, burst time, response time, waiting time, throughput, fairness and CPU utilization. In this paper, different reviews are collected and integrated various researches done in the field of CPU scheduling and its performance, so that this effort can be helpful for new researches to find out the future aspects in this field.
Keywords: Scheduling, Scheduler, Response time, Time quantum, burst time, context switch, AWT, ATAT, FCFS, SJF, STCF, Priority, RR, MLQ, MLFQ , GBTQ, EPSADTQ, PSMTQ, DWRR, Markov chain model, VHRRN, FUZZ, deadlock-waiting index, simulation, SL, GLS, State Probability, lottery scheduling, PPS-LS, SRS-LS, SJRR, mean-deviation, LRRTIME QUANTUM, integer programming, SRBRR, SARR, Deterministic, ARR, STS, TPBCS, CPU-intensive, I/O-intensive, Balanced factor, PSMTIME QUANTUM, AMRR, RRHRRN, ERR, NMLFQ, PSSDTQ, non-linear programming, integer programming, MDTQRR, NMLFQ, EDRR, SRBRR, ISRBRR, EDRR.
Abstract
Healthcare Biosensors – A Paradigm Shift To Wireless Technology
Taha Mukhtar
DOI: 10.17148/IJARCCE.2016.5806
Abstract: Health is the most important part of the existence, and is in today�s age the most critical, costly and time consuming area. People want to safeguard their health and take all the necessary precautions all by themselves, moving to the healthcare facilities only at dire need. A leading technology paradigm is the use of biosensors in quantifying the biological and physiological parameters and transferring the result to a GUI for health monitoring without the assistance of any healthcare personal. These biosensor enabled devices are becoming very popular in the masses as they can themselves monitor their health. Biosensors coupled with the wireless technology offer pervasive ubiquitous remote health monitoring and being extremely small enhances the users mobility with simultaneous monitoring. The work has discussed the biosensor structure and its importance in healthcare. Various breakthroughs in the biosensor innovations have been listed. A varied discussion about the integration of the wireless technology with the biosensors has been done, emphasizing the importance of real-time healthcare monitoring, and lastly a literature survey for the above-mentioned areas has been given.
Keywords: BAN, Biosensors, BSN, Implantables, IoT, Wearables, WBAN, WBSN, Wireless Healthcare.
Abstract
Congestion Control for Peer to Peer Application using Random Early Detection Algorithm
Sonam
DOI: 10.17148/IJARCCE.2016.5807
Abstract: This paper presents an extension of Random Early Detection Algorithm to avoid congestion in the peer to peer connection. Avoid congestion either by dropping the packet or arriving at the gateway. In this algorithm we use multiple queues for buffering and storing the packets one is the main queue for calculating the average queue length and use multiple threshold value for each queue. RED gateways keep the average queue size low while allowing occasional bursts of packet in the queue during congestion. In this way we can avoid the congestion.
Keywords: Peer to Peer network, RED Algorithm, congestion, multiple queues.
Abstract
Quantitative and Qualitative Analysis of Milk Parameters using Arduino Controller
Y.R. Bhamare, M.B. Matsagar, C.G. Dighavkar
DOI: 10.17148/IJARCCE.2016.5808
Abstract: This paper presents the design and development of Arduino controller based system to detect the parameters of milk. The parameters include milk quantity, pH, CLR and SNF. The Ultrasonic sensor, pH sensor and lactometer are used to measure the quantity, pH and CLR of the milk respectively. Using the value of FAT and CLR the value of SNF can be calculated and studied qualitatively. The sensors are interfaced with the Arduino controller. The software developed enables to read the parameters and display them on the LCD panel. The milk quantity is displayed in litres. This is a low cost and efficient tool to detect adulteration of the milk.
Keywords: Milk; Adulteration; Arduino controller; pH meter, SNF, CLR.
Abstract
Ardunio Based Security and Safety using GSM as Fault Alert System for BTS (Base Transceiver Station)
Umeshwari Khot, Prof. Venkat N. Ghodke
DOI: 10.17148/IJARCCE.2016.5809
Abstract: As we know in mobile communication the Base Transceiver Station (BTS) site, the tower maintenance has a very important role. Now days scenario some of the problems are being faced in the maintenance of the station site .The major problems which are faced include the fluctuation or variations of temp�ratures, unnoticed or unauthenticated entry of Person , fuel level amount being not noticed, the technical person has to manage time management in case of any of the above discussed problems. The instant message about the each activity happing in the site given by GSM .The temperature sensor LM35 will sense the room temperature level and if it is above the minimum level Global System modem will send an immediate message to the technician unique mobile. The values are displayed on LCD monitor, the aurdino controller gives command to turn on AC cooler or fan. The Base Station which is operated by Diesel fuel for generator. When the fuel level goes below the set value similar way message is sent to the technician unique number saying as fueil level is about to finish its 10% remaining. Door close/opener sensor is also used for indication of door opening and closings hall effect sensor for saving light energy as well finiding un noticed person entry. Theft of wire Status indicated by motion detection IR Sensor.The site door can be accessed only through the ID system ie using RFID reader. The situation in the site is updated to the technician through messages. PIR sensor used to detects the presence of humans inside the room. Camera is placed to record BTS room happings.
Keywords: Atmega2560, BTS Shelter, Mobile station, GSM, Arduino, RFID, Sensors.
Abstract
Automatic Single and Multi Topic Summarization and Evolution to Generate Timeline
Mrs. V. Meenakshi, Ms. S. Jeyanthi
DOI: 10.17148/IJARCCE.2016.5810
Abstract: Nowadays many online social networking services that enable the user to send and receive the information. These information are being shared at an extraordinary rate and their unrefined form, although providing useful information and also be vast. It is difficult for the end users and data analyst to rectify huge amount of noise and data redundancy which included in millions of text. To ease the problem, novel continuous single and multi topic summarization framework has been proposed for text streams. Traditional summarization systems mainly focus on static and small-sized data sets, so, there are not efficient as well as scalable for huge amount of data sets and data streams. Their iterative/recursive results are insensitive to time and difficult to detect topic evolution. Our proposed framework is efficiently designed to deal with dynamic, fast arriving, and large-scale text streams and multi topic summarization. Our framework consists of clustering, single and multi topic summarization and evolution techniques to generate text. A novel clustering algorithm has been proposed to cluster texts and maintain distilled statistics in a data structure. Next a single and multi topic summarization technique has been proposed for generating online summaries and historical summaries of indiscriminate time durations. By comparing manually created summaries and summaries created by some important traditional summarization systems to evaluate the generated summaries efficiently. And finally, an effective topic evolution detection method has been proposed which automatically produce the timelines by monitoring different variations from text streams.
Keywords: Clustering, continuous summarization, single and multi topic summarization, summary, timeline generation, Text stream
Abstract
Data Hiding in Encrypted HEVC/AVC Video Streams
Saltanat Shaikh, Prof. Shahzia Sayyad
DOI: 10.17148/IJARCCE.2016.5811
Abstract: Transmission of video over internet is prone to attacks from untrustworthy system and administrators. Hence it is necessary to perform encryption of video content for maintaining security of those contents. Data hiding in encrypted domain without decryption preserves the con?dentiality of the content. For authentication and damage detection and covert communication, it is useful to embed secret information in these encrypted videos. A method is proposed where the secret information is embedded directly into encrypted video stream, thereby maintaining confidentiality of video content. The input video is compressed using H.264/AVC (Advance Video Compression) or HEVC (High Efficiency Video Coding encoder). This compressed video is converted into frames for the purpose of data hiding using codeword substitution and those encoded data hidden video is encrypted using DES (Data encryption standard) and random generated password. The codewords of residual coefficients, motion vector differences and intra-prediction modes are encrypted using a stream cipher. Encrypted video along with encrypted file which contain password and frame number is send for storage or to receiver for decryption.
Keywords: HEVC/AVC Video, Data hiding, H.264/AVC (Advance Video Compression), random generated password
Abstract
A Study of Imbalanced Classification Problem
P. Rajeshwari, D. Maheshwari
DOI: 10.17148/IJARCCE.2016.5812
Abstract: Recently there are major changes and evolution has been done on classification of data. Class imbalance problem become greatest issue in data mining. Imbalance problem occur where one of the two classes having more sample than other classes. The most of algorithm are more focusing on classification of major sample while ignoring or misclassifying minority sample. The minority samples are those that rarely occur but very important.. Class imbalance is one of the most challenges of machine learning and data mining fields. In this paper we focused on more techniques involve solving rare class or imbalanced problem.
Keywords: Class imbalance problem, data pre-processing, machine learning, and algorithm.
Abstract
Design of PTL based Area Efficient and Low Power 4-bit ALU
Saraabu Narendra Achari, Mr. C. Pakkiraiah
DOI: 10.17148/IJARCCE.2016.5813
Abstract: Now a day�s Area, Low power, and Speed are the major concerns of the VLSI circuits. In this paper a new design approach is introduced for reducing number of transistors and power consumption and dissipation in VLSI circuits. Here, a new design approach is followed based on pass transistor logic which provides better performance in terms of low power, area, and speed of the VLSI circuits. The explored method is implemented on ALU (Arithmetic Logic Unit) to reduce the trade off parameters. After compare the results of proposed ALU with conventional ALU, this Proposed ALU gives better performance in terms of power and area. All the work has been carried out on Tanner EDA Tool 13.0 and Micro wind 3.1.
Keywords: Pass Transistor Logic, Arithmetic Logic Unit, Low Power, Area.
Abstract
The Design of Driver Safety Awareness and Assistance System through Sleep Activated and Auto Brake System for Vehicle Control
D. Sivabalaselvamani, Dr. A. Tamilarasi, L. Rahunathan and A.S. Harishankher
DOI: 10.17148/IJARCCE.2016.5814
Abstract: This paper displays another methodology towards vehicles safety and security. As indicated by exploratory and genuine study, the main driver of the larger part of accidents can be followed back to the conduct of the person who drives the vehicle, the driver himself. After recognizing the main factor, the framework will begin an activity to maintain a strategic distance from the impact and/or give a warning to the vehicle administrator. So it is not just essential to growing more dynamic security elements to keep away from accidents yet it is similarly vital to creating savvy mechanical arrangements that can precisely recognize the driving behavior of drivers and to help them. In this paper, we are executing two image processing instrument to get the facial geometry based eye locale recognition for eye flickering count, the consolidated following of mouth for yawning identification. Inside an inner self-vehicle, frequencies of eye flickering and eye closure and yawning frequencies are utilized as the sign of tired driver and warning sign is then created for suggestion; Outside a personality vehicle, Ultrasonic sensor is utilized to gauge distance in front of cars and auto- braking mechanism is connected during unsuccessful drowsiness alarm furthermore amid brake failure situations, hence preventing this faults and guarantees a safe journey.
Keywords: Driving Behavior, Eye Flickering, Yawning Identification, Ultrasonic Sensor, Auto-Braking mechanism.
Abstract
Parameters Selection, Applications & Convergence Analysis of PSO Algorithms
Sachin Kumar, Mr. N.K. Gupta
DOI: 10.17148/IJARCCE.2016.5815
Abstract: A mathematical technique or methodology that deals with the finding of maximal or minimal of functions in some feasible searching space or region is called as Optimization. Every business or industry is involved in solving optimization problems. Some different varieties of optimization processes compete for the best minima solution. Particle Swarm Optimization (PSO) is a relatively new, advanced, and powerful method for optimization that has been empirically tested on many optimization problems and it perform well in solving those optimization problems. PSO is widely used to find the global optimum solution in a complex searching space. This work is focused on providing a review and discussion of the most established results on PSO algorithm as well as exposing the most active research topics that can encourage the practitioner for future work with improved results by applying little effort .This work introduces a theoretical concepts and some detailed explaining of the PSO algorithm, its advantages and disadvantages, judiciary selection of the various parameters with their effects. Moreover, this dissertation discusses a study of boundary conditions with the invisible wall technique, controlling the convergence behaviours of PSO, discrete-valued problems, multi-objective PSO, and applications of PSO. Finally, this work presents some kinds of improved versions as well as recent progress in the development of the PSO, and the future research issues are also discussed.
Keywords: Optimization, Swarm Intelligence, Social network, convergence, stagnation, multi-objective.
Abstract
Effective Pattern Deploying Model for the Document Restructuring and Classification
Niketa, Jharna Chopra
DOI: 10.17148/IJARCCE.2016.5816
Abstract: In this electronic environment most of the information is made available in cutting edge structure. For quite a while, people have held the hypothesis that using phrases for a representation of report and subject should perform better than anything terms. In this paper we are break down and inquire about this with considering a couple states of workmanship information mining strategies that gives useful results to improve the feasibility of the illustration. Here we realizing plan acknowledgment system to deal with issue of term-based methodologies and improved result which obliging in information recuperation structures. Our recommendation is moreover evaluated for a couple well perceive region, offering in all cases, tried and true logical orders considering exactness and audit close by f-measure. For the examination, we use dataset and the results show that we improve the discovering plan when stood out from past substance mining systems. The outcomes of the trial setup show that the catchphrase based systems not give ideal execution over illustration based procedure. The results moreover exhibit that removal of worthless illustrations diminishes the cost of computation and also improves the quality of the structure.
Keywords: Text mining, Natural language processes, Pattern evolving, Pattern deploying.
Abstract
Cataloging Telugu Sentences by Hidden Morkov Techniques
V. Suresh
DOI: 10.17148/IJARCCE.2016.5817
No abstract available.
Abstract
Biometrics for Cell Phone Safety
Jyoti Tiwari, Santosh Kumar
DOI: 10.17148/IJARCCE.2016.5818
Abstract: In the recent times, a mode of communication has changed drastically. Since last decade technology has meticulously changed the use of cell phones. In the contemporary times cell phones have been transformed to a device that is not able to act as a mode of communication but it can also successfully perform all the work of a personal computer. This means executing half the official work by a pocket carrying device will be requiring high security and safety measures. Apart from the safety of confidential data, the safety of the device is becoming a concern for the common masses. As cell phones have turned into prime targets for theft. Cell phones are equipped with PIN security feature but people either do not use it or they simply do not trust. So it is the need of time to upgrade and update all the security features of a cell phone.
Keywords: Biometrics, security, fingerprint, face recognition, cell phones.
Abstract
Digital Image Watermarking using Modified DWT&DCT Combination and Bi Linear Interpolation
Yannam .Nagarjuna, K. Chaitanya
DOI: 10.17148/IJARCCE.2016.5819
Abstract: This paper presents a robust Hybridized Watermarking scheme based on 3- level DWT (Discrete Wavelet Transform) and DCT (Discrete cosine Transform) using Bilinear Interpolation. The host image is subjected to DWT and DCT. The DWT coefficients of host image are modified with DCT coefficients of scrambled watermark logo to get watermarked image and then, various attacks are applied on this watermarked image to check the robustness. To enhance the quality of embedding logo, bilinear interpolation is applied to get optimal NCC value. Proposed method gives better results in terms of better image quality of watermarked image and robust watermark logo in terms of PSNR and NCC values.
Keywords: DCT, DWT, Bilinear interpolation, PSNR, NCC
Abstract
Comparative Study and Analysis on the Techniques of Web Mining
Dipika Sahu, Yamini Chouhan
DOI: 10.17148/IJARCCE.2016.5820
Abstract: Now a day�s most of the people rely on internet. At the same time internet has many information. It should give related information for each user query. Web mining is used to extract information based on the user query from the large collection of data accessible in web. It is concerned mainly with its content, structure and usage. Web usage mining is extracting information based on user log, frequently accessed paths. Web content mining is used to fetch information from the web files. Web structure mining usually use graph theory to extract the web site structure through which they give better search results for the user. This paper also reports the summary of various techniques of web mining approached from the following angle like Feature Extraction, Transformation and Representation and Data Mining Techniques in many application domains.
Keywords: Web Mining, Web Usage Mining, Web Structure Mining, Web Content Mining, Graph theory.
Abstract
A Review of MIL-STD-1553 Bus Trends and Future
K. Padmanabham, Prabhakar Kanugo, Dr. K. Nagabhushan Raju, M. Chandrashekar
DOI: 10.17148/IJARCCE.2016.5821
Abstract: MIL-STD-1553 communication bus is in the defense field since last 45 years and is still a preferred bus in Defence and Space all over the globe. The 1553 bus initially developed by US to use in the defense Aircrafts to satisfy the robust communication bus in terms of protocols and hardware for weapon delivery subsystems. The main advantage is that the communication is highly deterministic and reliable compared to all other communication buses. Due to this feature the 1553bus made inroads into major programs all over the globe and reached installed base more than one million and spread from aircrafts to the other defense areas like Ships, Submarines, Battle tanks, also into Space vehicles. Because of it�s full fledge acceptance in avionics, today it is continue to find its way into Military, Aerospace, Space programs and entered into commercial Aircrafts too. Keeping in view the strategic importance of 1553 Bus, we made an extensive survey on 1553 for this review Article, starting from the beginning to the present state, to be useful to the future Engineers for their understanding the 1553 Bus.
Keywords: Include at least 4 keywords or phrases.
Abstract
Design of QPSK Digital Modulation Scheme Using Turbo Codes for an Air Borne System
D. Sai Brunda, B. Geetha Rani
DOI: 10.17148/IJARCCE.2016.5822
Abstract: Handwriting analysis is an important research area in today�s world. In many languages, recognition of handwritten letters, numerals and words were focused by the researchers. To the best of our knowledge, there is no public domain database of Tamil Scripts available for handwriting analysis. Hence the idea of creating own database for Tamil Handwriting raised. This paper describes the efforts to create a collection of handwritten samples in Tamil to support research activities in offline Tamil handwriting analysis and recognition. The database is created with a view to make it available publicly for research purpose, which contains handwritten- scripts of 300 document images of different writers. The collected documents were converted into document images and then preprocessed. The paper concludes with the status of the effort and future directions.
Keywords: Handwriting samples, Document Images, Tamil Script, Preprocessing
Abstract
An Efficient Locally Weighted Spectral Cluster for Automatic Image Segmentation
Vishnu Priya M, J Santhosh
DOI: 10.17148/IJARCCE.2016.5823
Abstract: Spectral clustering is one of the most important algorithms in data mining and machine intelligence; however, its computational complexity limits its application to truly large scale data analysis. However, ensample clustering suffers from a scalability problem in both memory use and computational time when the size of a data set is large. The proposed system introduced are three: (a) The local scale, rather than a global one, (b) estimating the scale value of the data, and (c) weighted based eigenvectors value rotating to create the maximally sparse representation. The proposed an automated spectral clustering algorithm based on these ideas: it computes automatically the large data and the number of groups and it can handle multi-scale data which are difficult for previous ensample approaches. Experimental results on multiple real-world image datasets demonstrate the effectiveness and efficiency of our approach. In particular, given a cluster, investigate its uncertainty by considering how the objects inside this cluster are grouped in the multiple base clustering�s. Based on cluster uncertainty estimation, a spectral cluster index (SCI) is then presented to measure the reliability of clusters. The proposed algorithm the crowd of diverse clusters in the spectral can provide an effective indication for evaluating each individual cluster in the subspace. By evaluating and weighting the clusters in the spectral via the SCI measure, the present the concept of locally weighted co-association matrix, which incorporates local adaptively into the conventional co-association matrix and serves as a summary for the spectral of diverse clusters. Finally, to achieve the final clustering result, propose novel locally weighted Ng-Jordan-Weiss (WNJW) Algorithm, respectively, with the diversity of clusters exploited and the local weighting strategy incorporated.
Keywords: Locally Weighted Spectral Cluster, matrix, Local Scaling, Estimating Weight based Clusters.
Abstract
An Efficient Sliding Window Based Micro Cluster Over Data Streams
Nancy Mary, A. Venugopal
DOI: 10.17148/IJARCCE.2016.5824
Abstract: Time series data streams are common due to the increasing usage of wireless sensor networks. Such data are often accompanied with uncertainty due to the limitations of data collection equipment. Outlier detection on uncertain static data is a challenging research problem in data mining. Moreover, the continuous arrival of data makes it more challenging. In this paper propose continuous outlier detection is a special class of steam data mining. Typically, stream data mining algorithms assume that each object is inspected at most once. However, in continuous outlier detection need to be capable of reporting, at each time point, the outliers among all the objects in the current sliding window. The propose a sliding window approach of outlier detection, which makes use of the results obtained from the previous state set to efficiently detect outliers in the current state set. These methods are verified using both real data and synthetic data. The results show that they are able to reduce the required storage and running time.
Keywords: Intrusion Detection Systems, Sliding window, MCOD, Event window.
Abstract
Comparative Analysis of Traditional Frequency Reuse Techniques in LTE Network
Neelam Rani, Dr. Sanjeev Kumar
DOI: 10.17148/IJARCCE.2016.5825
Abstract: Frequency Reuse Techniques are required to satisfy the exponential increase of data demands in mobile net-works, such as the Long Term Evolution (LTE) network of Universal Mobile Terrestrial radio access System (UMTS). However, the simultaneous usage of the same Frequency in adjacent LTE cells that creates inter-cell interference problems at cell-edge users. Inter-Cell Interference Coordination (ICIC) techniques are deployed to avoid the negative impact of interference on system performance. This paper classified the existing ICIC techniques and investigates the performance of reuse-1, reuse-3 schemes under various user distributions. Performance of cell-center and cell-edge users is inspected, as well as the overall spectral efficiency, throughput and network load. System level simulations are performed that shows the advantages and limitations of each of the examined techniques under different network loads and user distributions which is used to determine the most suitable ICIC technique to be used.
Keywords: LTE, OFDMA, Reuse 1, Reuse 3.
Abstract
Score Level Integration of Fingerprint and Hand Geometry Biometrics
Jyoti Tiwari, Santosh Kumar
DOI: 10.17148/IJARCCE.2016.5826
Abstract: In the age of information technology biometric identification is the heart of computer implementation. Biometric is a physical or biological attribute that can be measured. Biometric identification accepts or rejects the person�s identity, based on his/her physiological or behavior characteristics. Multimodal biometric identification system is more power full, more accurate, less noisy data than the single biometric model. In unimodal such as face, finger, iris, retina all are decade according to time pass or some changes may be applied therefore multimodal is given better performance. In this work we use fingerprint, hand geometry used as multibiometric and find good result with high accuracy using quantile normalization fusion of hand geometry and fingerprint biometrics.
Keywords: Fingerprint, Biometrics, Quantile Normalization, Hand geometry.
Abstract
CHARM: Intelligently Cost and Bandwidth Detection for FTP Servers using Heuristic Algorithm
Shiva Urolagin
DOI: 10.17148/IJARCCE.2016.5827
Abstract: CHARM - In this sense it is a data hosting schema and it helps to reduce the cost of hosting data and also helps to detect the bandwidth and speed. Now a day more and more companies, organizations and enterprises are hosting their data into the cloud to reduce maintenance, cost and data reliability. Many cloud storage companies are providing cloud spaces to store the data, but vendors are getting problems with which cloud space is better to store the data and also getting problem with costs. Customers usually store their data into single cloud but some clouds are high price and low bandwidth in this situation customer may face problems with uploading their data. Sometimes customer may struck with lock in risk, In this sense the customer suffer from price adjustments of cloud venders because price is not fixed according to market. According to their need they bind up with one company and company polices. This proposed CHARM system helps to analysis the cost and bandwidth of different clouds, In this system customers possible to analysis the speed and cost of different clouds before they putting data. This system integrates two key functions. First is selecting a severable suitable clouds and appropriate redundancy to store the data with low cost and guaranteed availability. Second is putting a transmission process to re-distribute the data according to variations of data axis and pricing. Performance of the CHARM can be analyse using trace-driven simulation and prototype experiments.
Keywords: Cloud computing, Multi-cloud, Data hosting, Bandwidth analyser.
Abstract
Image Enhancement Using Modified Exposure Based Histogram
SK. Nasreen, N. Anupama
DOI: 10.17148/IJARCCE.2016.5828
Abstract: This paper addresses the contrast enhancement of low gray scale images by implementing the Histogram Equalization method using Exposure value. The Exposure value of an image is calculated using the maximum intensity present in the histogram and the image gets divided into sub-images using exposure value. The enhancement rate of the image is controlled by performing histogram clipping. The individual histogram of sub images is equalized independently by using equalization based on exposure and integrated into one image for analysis. The proposed method results in a better contrast enhancement of gray scale images as well as for color images and improves image quality, entropy preservation.
Keywords: Image Enhancement, Image Segmentation, Image Exposure, Histogram, Histogram clipping.
Abstract
Human Gesture Based Recognition and Classification Using MATLAB
Suman, Er. Kapil Sirohi
DOI: 10.17148/IJARCCE.2016.5829
Abstract: Gait analysis is the systematic study of animal locomotion, more specifically the study of human motion, using the eye and the brain of observers, augmented by instrumentation for measuring body movements, body mechanics, and the activity of the muscles. Gait analysis is used to assess, plan, and treat individuals with conditions affecting their ability to walk. Human identification using Gait is method to identify an individual by the way he walk or manner of moving on foot. Gait recognition is a type of biometric recognition and related to the behavioral characteristics of biometric recognition. Gait offers ability of distance recognition or at low resolution. This project aims to recognize an individual using his gait features. However the majority of current approaches are model free which is simple and fast but we will use model based approach for feature extraction and for matching of parameters with database sequences. The Feature Mapping and Extraction from input image is the major task to work efficiently. The input image has been categorize horizontally, vertically and diagonally with tracking of the boundaries of human motion using Color formatting to identify the boundaries of the moving objects. Then the input image has been provided to the algorithm to classify the image and identify from the dataset. It shows the accuracy and shows the matching dataset.
Keywords: Image Processing, GAIT, Computer Vision.
Abstract
Image Denoising- A Novel Approach
Dipali D. Sathe, Prof. K.N. Barbole
DOI: 10.17148/IJARCCE.2016.5830
Abstract: Images play an important in research and technology such as geographical information systems. Information is transmitted in the form of digital images and becoming a major method of communication in the modern age, but the image obtained is often corrupted with noise. Image processing plays a very important role in image denoising. Most of the applications make use of images in various fields such as medical, space exploring, aerial images, satellites images and many more. Images are received in defective conditions due to poor scanning and transmitting devices. Consequently, it creates problems for the process to read and understand such images. Before it can be used in applications the image that is received needs processing. To produce a visually high quality image, Image denoising is used which involves the manipulation of the image data. Selection of the denoising algorithm is dependent on application. Hence, the necessity to have detail information about the noise present in the image, to select the appropriate denoising algorithm is required. Image denoising issues can be addressed as an inverse problem. The paper presents an efficient denoising scheme by using LPG with PCA for better preservation of image local structure. LPG-PCA is compared by fast non- local means algorithm and the proposed method. In LPG-PCA, the pixel and its nearest neighbors are modeled as a vector variable. Trading samples are selected from the local search window by using block matching based on LPG. Such an LPG procedure guarantees that only the sample looks with similar content are used in the local statistics calculation. This calculations are for PCA transform estimation, so that the image local features can be well reserved. In order to accelerate the algorithm a Fast non- local means algorithm was developed to accelerate the calculation. Using proposed method the denoising performance is improved. Furthermore, results obtained by simulation using Matlab. We finally demonstrate the potential of the algorithms through comparisons. This paper specifies the description of noise, types of noise and LPG-PCA, Fast NLM and proposed algorithm that has been used for denoising the image.
Keywords: noise; types of noise; LPG-PCA algorithm; Fast NLM.
Abstract
Design of Low Pass Digital FIR Filter Using Nature Inspired Technique
Nisha Rani, Balraj Singh, Darshan Singh Sidhu
DOI: 10.17148/IJARCCE.2016.5831
Abstract: The digital filters play an important role in the field of science and technology. Due to phase linearity and frequency stability, digital finite impulse response (FIR) filters are used in number of applications. The various methods for the design of digital filters like particle swarm optimization (PSO), genetic algorithm (GA), differential evolution (DE) etc. and the modified version of these. This paper presents the hybrid predator prey optimization (HPPO) technique for the design of digital low pass FIR filter. HPPO has the capability of both exploration and exploitation of search space locally as well globally. This algorithm is used with the aim to achieve desired filter specifications for designing an optimal filter. This paper also compares the simulation results with hybrid differential evolution (HDE) algorithm. The simulation results show that the proposed design method is better than other optimization techniques in terms of objective function and magnitude errors for the design of low pass digital FIR filters.
Keywords: Digital Finite Impulse Response filters (FIR), Prey Predator Optimization, Exploratory move, Hybrid Predator Prey Optimization (HPPO), Hybrid Differential Evolution (HDE).
Abstract
Hybridization of GSA and AFSA to Detect Black Hole Attack in Wireless Sensor Network
Soni Rani, Charanjit Singh
DOI: 10.17148/IJARCCE.2016.5833
Abstract: In today�s world, wireless sensor network is very important in our daily life due to its variety of applications like in military and battlefield areas, business purposes, in education, or all other applications. Everything or every person is connected to wireless sensor network. Several nodes are connected through the wireless links. Wireless sensor network is vulnerable to various types of attacks. But black hole attack is very common and every hacker or attacker choose this attack because it stops the flow from source to destination. GSA and AFSA is natural phenomenon so we choose this to detect the black hole attack from the network. In this paper, we hybrid the GSA and AFSA to detect and prevent the black hole attack from the network. The main challenging problem is to design the fitness function and other parameters related to GSA and AFSA.
Keywords: Wireless Sensor Network, Black Hole Attack, GSA, AFSA.
Abstract
Reversible Watermarking Technique for Data Hiding, Accurate Tamper Detection in ROI and Exact Recovery of ROI
Y. Usha Madhuri, K. Chaitanya
DOI: 10.17148/IJARCCE.2016.5834
Abstract: Medical images are passed away through networks without any noise or disturbances for diagnostic decisions. Patient Details embedded into the medical image and transferred to another location without degradation or no change in actual quality of image. While transferring medical images tampers may be introduced. To avoid tampers this paper propose a block based fragile method water marking technique to verify integrity of ROI, distortion inside ROI, Authentication of ROI, Data hiding and exact recovery of ROI using reversible water marking technique. The medical image can be divided into 3 parts as Region of interest (ROI), region of Non interest (RONI) and Border pixels. The recovery of ROI embedded into RONI. Number of Experiments is conducted in thirty medical images to achieve 100% accuracy with zero loss in ROI.
Keywords: Authentication of ROI, Data hiding, Region of interest (ROI), Region of Non interest (RONI).
Abstract
Fault Tolerance and Concurrency Control in Heterogeneous Distributed Database Systems
Sagar Patel, Meghna Burli, Nidhi Shah, Prof. (Mrs.) Vinaya Sawant
DOI: 10.17148/IJARCCE.2016.5835
Abstract: This project attempts to demonstrate the working of a Heterogeneous Distributed Database. It focuses primarily on fault tolerance and concurrency control in a distributed environment. Fragmentation, Replication and Query processing form the integral part of the program. The purpose of the software is that it allows the potential user to work in the heterogeneous environment. The potential user can access the database remotely. This software allows the user to fragment the data, to replicate the data and store it at different sites and lastly it enables user to fire a query from a remote pc and they can obtain the desired result set. It is a fault tolerant system which enhances its usability and acceptability in the database industry for applications in various sectors of the economy. The configuration file consists of metadata of the database and the list of IP address where the respective databases are stored.
Keywords: Distributed, fault tolerance, concurrency control, fragmentation, replication
Abstract
Collection of Offline Tamil Handwriting Samples and Database Creation
D. Rajalakshmi, Dr. S.K. Jayanthi
DOI: 10.17148/IJARCCE.2016.5836
Abstract: Handwriting analysis is an important research area in today�s world. In many languages, recognition of handwritten letters, numerals and words were focused by the researchers. To the best of our knowledge, there is no public domain database of Tamil Scripts available for handwriting analysis. Hence the idea of creating own database for Tamil Handwriting raised. This paper describes the efforts to create a collection of handwritten samples in Tamil to support research activities in offline Tamil handwriting analysis and recognition. The database is created with a view to make it available publicly for research purpose, which contains handwritten- scripts of 300 document images of different writers. The collected documents were converted into document images and then preprocessed. The paper concludes with the status of the effort and future directions.
Keywords: Handwriting samples, Document Images, Tamil Script, Preprocessing
Abstract
Overview of Renewable Energy in Maharashtra
Mr. Sagar P. Thombare, Mr. Vishal Gunjal, Miss. Snehal Bhandarkar
DOI: 10.17148/IJARCCE.2016.5837
Abstract: Maharashtra has been one of the most industrialized and urbanized states in the country. India has a vast supply of renewable energy resources. In this context, the main objective of this study is to critically examine the state�s renewable energy landscape. The state also has set targets for capacity installation for four different renewable based power generations. Keeping this in view, it is critical that Maharashtra should implement a comprehensive renewable energy policy with a focus on promoting large scale solar projects in both urban and rural areas of the state. In this paper we focus on renewable energy sources available in Maharashtra.
Keywords: Solar, Hydro, Biomass, Wind.
Abstract
Comparative Analysis of Efficient Image Steganographic Technique with the 2-bit LSB Algorithm for Color Images
K. S. Sadasiva Rao, Dr A. Damodaram
DOI: 10.17148/IJARCCE.2016.5838
Abstract: Steganography is the process of embedding data bits on carrier or cover file. If the carrier file is an image file, then it is called as image steganography. In this proposed method, an image steganographic technique is applied on only red and green planes of 2-bit LSB and also the experimental results are compared with the general two bit LSB (i.e., red, green, blue planes) algorithm. We observed our proposed algorithm is giving best results in terms of quality of the stego image.
Keywords: LSB algorithm, red-green-blue planes, Image Steganography, Spatial Domain.
Abstract
An Efficient Reverse Converter Design for Five Moduli Set RNS
Y. Ayyavaru Reddy, B. Sekhar
DOI: 10.17148/IJARCCE.2016.5839
Abstract: For designing high speed digital systems, it considered so many factors, among those the Number System, what it uses plays a crucial role. The Residue number system provides the inherent properties such as Carry-free operations, Parallelism and Fault Tolerance. While designing RNS, the selection of choice of moduli set plays a key role. The 3n-bit dynamic range RNS moduli set {2n-1,2n, 2n+1} is the most famous RNS moduli set because of its simple and well formed balanced moduli. However, the arithmetic operations with respect to the modulus 2n+1 are complex and dynamic range is not sufficient for applications that require larger dynamic range. The 4n-bit dynamic range four moduli set minimize the dynamic range, asymmetric moduli channel length and long conversion delay. In this paper review on, a special five moduli set (2n-1, 2n, 2n+1, 2n+1-1, 2n-1-1) for even n . It exploits the special properties of the numbers of the form 2n �1, and extends the dynamic range of present triple moduli {2n-1, 2n ,2n+1} based systems. It has dynamic range that can represent up to 5n-1 bits while keeping the moduli small enough and converter efficient. In this review paper reverse converter design is done with the Chinese Remainder Theorem (CRT) and the results are compared with the Mixed Radix Conversion theorem and also with three and four moduli sets.
Keywords: Residue Number System (RNS), Chinese Remainder Theorem (CRT), Dynamic Range (DR), Mixed Radix Conversion.
Abstract
VLSI Design of Area Efficient High Performance SPMV Accelerator using VBW-CBQCSR Scheme
N. Narasimharao, A. Mallaiah
DOI: 10.17148/IJARCCE.2016.5840
Abstract: This project presents a high performance sparse matrix-vector multiplication (SpMV) accelerator on the field-programming gate array (FPGA). By exploiting a hardware-friendly storage theme, named as Variable-Bit-Width Coordinate Block similar Compressed distributed Row, the redundant computation and memory accesses are often reduced greatly through the nested block compression and variable-bit-width column-index secret writing schemes. Supported the planned compression theme, a deeply-pipelined SpMV accelerator is enforced on a Xilinx Virtex XC7VX485T FPGA platform, which may handle distributed matrices with absolute size and poorness pattern. Dadda number is one in all the quickest number utilized in several data-processing processors to perform quick arithmetic functions. The most elements of Dadda number area unit full adder and half adder modules that area unit used for playacting the reduction of the partial Merchandise. A full adder is used because the key part within the style of those multipliers to cut back space and delay. In this work, 8-bit DADDA number victimization VBW-CBQCSR theme is enforced. Experimental results show that the projected style will gain less delay and space is additionally less and reduces the power consumption as compared to the previous works.
Keywords: Sparse Matrix Vector Multiplication (SPMV), FPGA, accelerator, VBW-CBQCSR.
Abstract
Customer Retention of MCDR using 3SCDM Approaches
Suban Ravichandran, Chandrasekaran Ramasamy
DOI: 10.17148/IJARCCE.2016.5841
Abstract: In telecommunication industry satisfying customers� needs plays a vital role to retain them within their network for longer duration of time. A well-known fact in the telecommunication industry is that the competition among industries is very fierce. The acquisition of new and resourceful customers has become difficult and often very expensive. Subsequently customer retention has become more and more important. Data Mining can determine characteristic customer clusters on the basis of collected historic data points from customers - such as for instance the frequency and timely distribution of customer�s usage of services (calls, text messages, MMS, navigation, mail exchange). For each of these customer patterns the company can then offer tailored customer life cycle messages and offers. Implementing the Three-Stage Classifier based Data Mining (3SCDM) approach, an operator can predict churn, incentives may be offered to the customers for successful retention. The proposed system is evaluated by implementing Chi-Square (Chi2) Feature Reduction method along with 3SSCDM approach. Combination of Bayesian Network � RBFNet � RT, Bayesian Network � RBFNet � J48 and Bayesian Network � RBFNet � MLP classifiers are used in Three-Stage Classifier (TSC). On comparing the performance based on accuracy and time taken, Bayesian Network � RBFNet � RT with Chi-Square method performs well by 89.31% and 8.03 secs respectively. This inference can be used for identifying the prospective 3G customers in the network.
Keywords: Three-Stage Classifier based Data Mining, PAKDD 2006, MCDR, Bayesian Network, RBFNet, RT, J48, MLP, Chi-Square, and WEKA.
Abstract
User Privacy and Data Trustworthiness in Mobile Crowd Sensing
Ms. T. Sharadha, Dr. R. Vijaya Bhanu
DOI: 10.17148/IJARCCE.2016.5842
Abstract: �Mobile crowd sensing� is an evolving technology based on the sensing the networking capabilities of mobile wearable devices. Mobile Crowd Sensing (MCS) has shown great potential in improving peoples� quality of life, including healthcare, transportation, and environmental monitoring. User privacy and data trustworthiness are two critical challenges faced by MCS. In MCS, the private information such as IP addresses and location tracking are prevented by user privacy concern. The main objective of trustworthiness is to hide reports of sensed data and queries from unconcerned parties. In this work, MCS technology will provide wireless sensor network security solution by user privacy and trustworthiness in traffic and event management.
Keywords: Mobile Crowd Sensing (MCS), User Privacy, Data Trustworthiness, Wireless Sensor Network security (WNSs).
Abstract
A Safe Anti-Conspiracy Data Model For Changing Groups in Cloud
G. Ajay Kumar, Devaraj Verma C
DOI: 10.17148/IJARCCE.2016.5843
Abstract: Having advantage in cloud type computing, people can get a real, inexpensive way to information distribution in group users through a font of low preservation and low management cost. Since they will be outsourced to third parties we have to provide some guaranteed security for the files to be shared. Unluckily, because of regular change of connection, providing confidentiality preserving while sharing data is even now a matter of tricky, specifically for the untrusted cloud due to the conspiracy attack. The way of securely distributing key is mainly based on secure message channel especially for accessible methods having these type of control is a very strong belief and to practice it is difficult. Coming to this document we are planning a safe information distribution format to active users. First step, not including any safe message channels a secure mode for key distributing is proposed and by the group manager private keys can be obtained securely by the users. Secondly, a very well grained access control can be achieved by our scheme; the source can be used by several users in group that is stored in cloud. The revoked users could not be accessed by the cloud yet again when they will be revoked. Now, thirdly the scheme can be protected from conspiracy attack that is that the real data file cannot be retrieved by revoked users even still they accessed with untrusted cloud. In this method we can get a safe user revocation method by establishing leveraging polynomial task. Finally, preceding users not required to revise private keys of their even a fresh user joined in a group or he/she be revoked from active group.
Keywords: Anti-Conspiracy Data Model, private keys, active users.
Abstract
Scope and Adoption of M-Commerce in India
Anurag Mishra, Sanjay Medhavi, Khan Shah Mohd, P.C. Mishra
DOI: 10.17148/IJARCCE.2016.5844
Abstract: The purpose of this empirical article is, to study the scope and adoption of M-commerce in India. Standardized inventory was integrated into questionnaire on exclusive web site developed to collect the data from all over the India. In all 425 subjects filled up the questionnaire within given time frame. The study was non-parametric (survey) in nature. Majority of subjects showed agreement towards scope and adoption of M-commerce and clears that users in India are all set to adopt M-Commerce devices and services. With the M-commerce, users� can introduce a standard, convenient communication and transaction channel that supports anywhere, anytime mobile commerce services. Cost doesn�t have a meaningful effect, this shows that Indian people doesn�t have a clear view of cost of mobile commerce since they didn�t experience it in general. Risk has a negative effect on attitude toward use. This issue can be a result of �Indian culture� which there is a resistance toward new innovation technologies, privacy, security and product. Findings also confirm that there is a lot of scope for M-commerce services in India. M-commerce is complex in nature and includes changing procedure in market and is in infancy stage in India. Suggestions for future research and implications to service providers and policy makers discussed.
Keywords: M-commerce, scope, adoption, cost, risk.
Abstract
A Secure Data Hiding Scheme For Color Image
Mrs. S.A. Bhavani
DOI: 10.17148/IJARCCE.2016.5845
Abstract: Any information stored in a computer needs to be kept secret from the outside users as they may use the data for illegal purposes. In order to achieve this security, we propose a new Steganography scheme for hiding a piece of critical information in a host binary image. Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. There are three basic types of Steganography: Image, Text and Audio/Video. Steganography is the science which deals with security issues. It refers to the art and science of writing messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. Main goal of steganography is to protect data from unauthorized users. The two key processes used in Steganography are: Encryption and Decryption. In this paper we use a secret key and a weight matrix to protect the hidden data. Given an image block of size m x n, our scheme can hide as many as log2(mn+1) bits of data in the image by changing at most 2 bits in the image. This scheme can provide highest security, embed more data and maintain higher quality of the host image. The project evaluates the performance of the above mentioned algorithms and suggests the best suitable technique from the comparative study of images. In this paper we have presented a new steganography scheme for hiding critical information in a host binary image. The main idea is to use a secret key and a weight matrixto protect the hidden data and maintain higher quality of the host image. Our scheme is to use the best technique available to provide a higher data hiding ratio, but change less pixels in the original image.
Keywords: Steganography, spatial domain, transform domain, LSB, PVD.
Abstract
A Study of Different Content Based Image Retrieval Techniques
C. Gururaj, D. Jayadevappa, Satish Tunga
DOI: 10.17148/IJARCCE.2016.5846
Abstract: Interest in image retrieval has increased in large part due to the rapid growth of the World Wide Web. The traditional text based search and retrieval has its own limitations and hence we move to a content based image search and retrieval system. In this paper we present an image retrieval system that takes an image as the input query and retrieves images based on image content. Content Based Image Retrieval is an approach for retrieving semantically-relevant image from an image database based on automatically-derived image features. Content-based image retrieval (CBIR), also known as query by image content (QBIC) and content-based visual information retrieval (CBVIR) is the application of computer vision to the image retrieval problem. "Content-based" means that the search will analyze the actual contents of the image. The term 'content' in this context might refer colours, shapes, textures, or any other information that can be derived from the image itself. Here we deal with colour images.
Keywords: CBIR, shape, texture, text retrieval, feature extraction.
Abstract
Cache Management for Big Data Applications: Survey
Kiran Grover, Surender Singh
DOI: 10.17148/IJARCCE.2016.5847
Abstract: Big data processing consumes resources at very large scale and its very challenging to manage the memory for each running process. Researchers have developed the some memory management schemes which can synchronize the data flow for each process. Processes use two memories i.e. Main memory which retains only current processing data and cache which retains frequent required data for processes. It is very challenging to replace the cache data with new one because, during the processing of large volume data, process may claim any data block, so due to random block replacement, process may have to wait for a long time which may result unnecessarily delay. In this paper, we will explore the current research work related to cache management.
Keywords: Big Data, cache, memory, resource management
Abstract
Survey on Energy Efficient Protocols and Challenges in IOT
Syeda Butool Fatima, Sayyada Fahmeeda Sultana, Sadiya Ansari
DOI: 10.17148/IJARCCE.2016.5848
Abstract: Internet of things (IoT) connects everything for communication making smart cites, smart home etc with IoT. it is embedded with various technologies WSN wireless sensor networks one such technology play important role in IoT, sensors with limited power as battery backup problem of IoT. In this paper we survey of different challenges and energy efficient protocol that make IoT energy efficient.
Keywords: Internet of things (IoT), wireless sensor network (WSN), battery backup, Energy efficient.
Abstract
Educational Data Mining For Evaluating Students Performance
Sampreethi P.K, VR. Nagarajan
DOI: 10.17148/IJARCCE.2016.5849
Abstract: Now a day�s many organizations/institutions provides different courses to students. It provides quality education to its students. So such institutions keep large database with them to evaluate student�s performance in future. Database may contains information such as students personnel information, their secured marks for every subjects and their internal scores based on their academic performance etc. �Educational Data Mining For Evaluating Students Performance� research paper makes use of different kinds of data such as attendance details, previous semester marks, seminar performance etc to evaluate student�s academic performance. Classification methods are used here to evaluate the student�s performance. Here uses data mining algorithm to calculate performance metrics. In this paper using ID3 decision tree algorithm for predicting the student performance.
Keywords: Datamining, ID3 Algorithm, Gain Ratio.
Abstract
Iterative Pareto Principle for Software Test Case Prioritization
Manas Kumar Yogi, G. Vijay Kumar, D. Uma
DOI: 10.17148/IJARCCE.2016.5850
Abstract: This paper introduces a repetitive nature of application of Pareto principle for test case prioritization. In software testing, situations demand effective resource and time utilization which forces the testing team to execute the test cases which uncover more number of bugs. So, taking the Pareto Principle we apply the 80-20 rule in a repeated manner until a satisfiable state is reached. The proposed mechanism precisely does what it is modelled for, test case prioritization.
Keywords: Pareto Principle, Testing, Prioritization, Bugs, Iterative
Abstract
Localization Techniques in Wireless Sensor Networks: A Review
Abhishek Kumar, Deepak Prashar
DOI: 10.17148/IJARCCE.2016.5851
Abstract: Wireless Sensor Networks have emerged as one of the key research area since last few years containing various challenges. Determining the accurate position of nodes in sensor networks is one of those imperative and tedious tasks.Once the precise location of nodes has been established only then the required functions such as routing, forwarding, information broadcasting can be achieved. To achieve localization,we need some deployed nodes whose position is pre-known.These nodes are called anchor or landmark nodes. With the help of these anchors,location of sensing nodes are found out.This paper presents an analysis of various localization schemes and contrasts the traditional techniques with modern ones.
Keywords: Sensor networks, anchors, localization, range based, range free, mobile nodes
Abstract
Ensemble Averaging Filter for Noise Reduction
Tom Thomas
DOI: 10.17148/IJARCCE.2016.5852
Abstract: Noise is the extraneous information that changes the original signal information. It is not possible to completely suppress the noise, but we can reduce it. Signal to noise ratio is very important in studies based on signal. It is a measure of the signal level in the measured waveform. The noise affecting the signal is random in nature. The average value of the random noise affected on a signal at different time instants is zero. Ensemble averaging is one of the best noise filtering methods and is based on the concept of noise random nature. In ensemble average successive sets of collected data are summed point by point. Therefore, a prerequisite for the application of ensemble averaging method is the ability to reproduce the signal many times starting always from the same data point. Signal to noise ratio can be improved in proportion to the square root of the number of repetition of the signal. As the number of repetition increases, the signal to noise ratio also increases. Ensemble averaging filtering can be applied to a number of applications like spectroscopy and non-destructive testing.
Keywords: Ensemble Averaging, FPGA, noise reduction, average filter, noise filter.
Abstract
Survey Paper on Get My Route Application
Shubham A. Purohit, Tushar R. Khandare, Prof. Swapnil V. Deshmukh
DOI: 10.17148/IJARCCE.2016.5853
Abstract: Smart Phone usages become increasingly in recent years. Dramatic breakthroughs in processing power along with the number of extra features include in these device have opened doors to wide range of possibilities. The main intention of introducing Get My Route system is to reduce the manual work of human toward searching any think like where is the school, roadchat, jobs, Emergency services etc in city or all over country. Every type of searching task is performed by the system with their perfect location that is where that shops, school is actually located. The System also focuses on small shop like puncher shop, auto care, all city events happen in future with perfect map.
Keywords: Get My Route, Categories, Sub-Categories, Road chat, Phone Gap.
Abstract
Design and Implementation of Smart Car with Self-Navigation and Self-Parking Systems using Sensors and RFID Technology
Madhuri M. Bijamwar, Prof. S.G. Kole, Prof. S.S. Savkare
DOI: 10.17148/IJARCCE.2016.5854
Abstract: In this paper the research is done on making a smart car prototype which is having the functions like self-navigation, space detection for parking, self-parking, obstacle detection, and alcohol detection. AVR microcontroller is used for achieving these functions. For self-navigation function, Radio Frequency Identification technology is used, with the help of Radio Frequency Identification cards. On-board RFID receiver module is used to locate RFID cards which are embedded in the path of navigation. IR sensors are placed into the car in different directions for sensing the obstacles and space for parking the car. This smart car is having two modes of operation, one is manual mode and other is automatic mode. Alcohol detection module detects that the driver has consumed alcohol or not, if this module detects alcohol, then the car will not get turn on for driving in manual mode. Automatic mode consists of features like self-navigation, self-parking and obstacle detection and manual mode consists of alcohol detection. The goal of this research is that to make smart self-driving car. The features of smart car are achieved here by doing self-navigation and obstacle detection with the help of Radio Frequency Identification module and Infra-Red sensor module respectively, in very low cost and for small purpose.
Keywords: AVR, RFID, GPS, IR, ADC.
Abstract
Comparison Study of Induction Motor Drives using Microcontroller and FPGA
Sooraj M S, Sreerag K T V
DOI: 10.17148/IJARCCE.2016.5855
Abstract: Variable speed induction motors are one of the most researched topics in the industry today. As the digital control of the motors took over the analog control, the search for an efficient speed control scheme for ac induction motors has started. Along with the speed control mechanism the selection of the controller is also of utmost importance. As there are different controllers available like microcontroller, FPGA, dsp, Choosing the most efficient controller for the given application is crucial. This project is a comparison study of speed control of induction motor using a microcontroller and FPGA. The induction motor is driven using both FPGA and microcontroller and the results are studied. The system is tested and experimental results are recorded for various speed for both controllers.
Keywords: Induction Motor; Microcontroller; Pulse Width Modulation Inverter; Speed Control; FPGA.
Abstract
A Survey on Text Categorization
Senthil Kumar B, Bhavitha Varma E
DOI: 10.17148/IJARCCE.2016.5856
Abstract: Now a day�s managing a vast number of documents in digital forms is very important in text mining applications. Text categorization is a task of automatically sorting a set of documents into categories from a predefined set. A major characteristic or difficulty of text categorization is high dimensionality of feature space. The reduction of dimensionality by selecting new attributes which is subset of old attributes is known as feature selection. Feature-selection methods are discussed in this paper for reducing the dimensionality of the dataset by removing features that are considered irrelevant for the classification. In this paper we discuss several approaches of text categorization, feature selection methods and applications of text categorization.
Keywords: Text categorization, Clustering, Na�ve Bayes, K Nearest Neighbor, Support Vector Machine. .
Abstract
Multirate Signal Reconstruction Using Two Channel Orthogonal Filter Bank
Sijo Thomas, Darsana P
DOI: 10.17148/IJARCCE.2016.5857
Abstract: A multirate digital ?lter is a variable ?lter that provides variations on di?erent parameters such as bandwidth, sampling rate and frequency. Filter banks are particularly useful for communication applications since the channel bandwidths and frequencies are easily and rapidly adjusted during their operation. This paper proposes an alias free two channel orthogonal filter bank by Parks McClellan algorithm. The synthesis filter responses of proposed filter bank can be selected as time reversed version of analysis filters. Finite impulse response filter is used to get stable and linear output at synthesis side.
Keywords: Analysis filters, Filter banks, Finite impulse response filter, Orthogonal filter bank, Parks McClellan algorithm, Synthesis filters.
Abstract
The Multi-keyword Synonym Search for Encrypted Cloud Data Using Clustering Method
Monika Rani H G, Varshini Vidyadhar
DOI: 10.17148/IJARCCE.2016.5858
Abstract: In the era of cloud computing, the large data owners are willing to store their precious data on cloud instead of their own server, to reduce maintenance burden and for low cost expenditure. This trend introduces the problem of data privacy for storing the sensitive data on cloud. Therefore, the confidential data has to be encrypted before outsourcing to cloud services. It is a challenging task to search an encrypted data because the relationship between plain text and encrypted text are concealed. We need an efficient search method for online retrieval of required data from the encrypted documents repository on cloud. We propose an efficient and secure search with hierarchical clustering method to improve the search efficiency and propose synonym search along with this method to increase the relevance of retrieved documents. This method ensures the Multi-keyword synonym search, relevance between documents, checks the ranking of documents and solves the problem of maintaining the relationship between plain text and encrypted text. It is proved with the help of practical analysis.
Keywords: Cloud Computing, Hierarchical clustering method, Multi-keyword synonym search.
Abstract
A Review on Various Speech Enhancement Techniques
Alugonda Rajani, Soundarya .S.V.S
DOI: 10.17148/IJARCCE.2016.5859
Abstract: Communications in general and telephonic conversations often take place in noisy environments. The most important method for enhancing speech is the removal of background noise and echo suppression. In this paper review various speech enhancement techniques. Various types in single sensor and multi sensor speech enhancement are reviewed. They mainly focus on noise removal in speech signals. Noise cancellation techniques are also reviewed.
Keywords: Speech enhancement, Communication, Noise removal, Echo suppression.
Abstract
A Survey on Various Spoofing Attacks and Image Fusion Techniques
Pravallika .P, Dr. K. Satya Prasad
DOI: 10.17148/IJARCCE.2016.5860
Abstract: Biometrics systems are used to verify or identify an individual from his physiological and biological characteristics. But now a days, some biometric systems fail to meet the security requirements in some practical cases. Among these threats and vulnerabilities that are facing by the current biometric systems are spoofing attacks. A spoofing attack is that when a person tries to act as someone else by false data and there by gaining illegal access to the biometric systems. Here the user makes use of some artificial gummy finger, iris image printed on paper or masks. The study of anti-spoofing, has been growing in interest in recent years. This paper presents an introduction to spoofing attacks and anti-spoofing measures. Here we also present about image fusion techniques in biometrics. It enhances the security of biometric systems by fusion of multiple biometric traits like iris, face, finger etc.
Keywords: Image fusion; anti-spoofing; biometric system; spoofing attacks
Abstract
Non-Invasive Vein Detection using Infra-red Rays
Aradhana Singh, Dr. S.C. Prasanna Kumar, Dr. B.G. Sudershan
DOI: 10.17148/IJARCCE.2016.5861
Abstract: Vein identification is one of the most recent research topics in biomedical examination. Intravenous catheterization is most essential process in therapeutic medication in which practitioners find the appropriate vein for the process of with draw the sample of blood and injecting the medicine. Medical practitioners find difficulty to locate the vein, because of various physiological qualities, like skin tone, age, scars and burns. Therefore, improper location of veins, causes wounds, rashes, blood clot etc. To overcome this difficulty of vein detection we propose a new technique in this paper which consists of a ring of Near Infra-red (NIR) Light emitting diodes and a camera to capture the image of the vein structure. The image is captured by camera is processed using Visual studio with Open Computer Vision (Open CV). The processing of image is based on enhancement of image, segmentation of image and overlay method. This complete procedure helps the doctors in detecting the suitable veins for vein puncture.
Keywords: NIR, Open CV, Vein puncture, Histogram equalization, Adaptive Thresholding.
Abstract
Boundary-Polygons for Minutiae based Fingerprinst Recognition
Kusha Maharshi, Prashant Sahai Saxena
DOI: 10.17148/IJARCCE.2016.5862
Abstract: Over the years, researchers have developed numerous algorithms for pattern recognition, each one being either a novel approach or a significant improvement over the previous work. Also, each new concept for identifying patterns finds uses in many more fields than what it was initially moulded for. Pattern recognition has found indispensable use in human identification based on unique biometric features. A biometric widely used for identification is the fingerprint. In this paper, we propose and explain a new method for minutiae-point-based pattern recognition for fingerprint identification. Comparison between the angles and edge lengths of polygons formed from the minutiae extracted from a fingerprint image is used as the criterion for matching.
Keywords: Point pattern recognition, boundary polygon algorithm, fingerprint recognition, minutiae based matching.
Abstract
Image Forgery Detection on Digital Images
Nimi Susan Saji, Ranjitha Rajan
DOI: 10.17148/IJARCCE.2016.5863
Abstract: Image forgery is a manipulation process which hides some key information from the digital image. To avoid the traces of this manipulation, attackers use contrast enhancement. So, contrast enhancement can be used as an identifying feature for detecting an image forgery. In this paper, an algorithm to detect the global contrast enhancement applied to JPEG-compressed images is proposed. The histograms of the images are created and then the peak or gap bins present in the histogram are analyzed theoretically and distinguished by identifying the zero-height gap fingerprints. To verify the efficiency and effectiveness of the proposed technique, extensive experiments have verified.
Keywords: Composite image, contrast enhancement, digital forensics, image forgery.
Abstract
Enhancing Information Security in Big Data
Renu Kesharwani
DOI: 10.17148/IJARCCE.2016.5864
Abstract: Data Mining attracting more and more attention in recent years probably because of the growth of the �Big Data�. This Big Data when analyzed properly can be very dangerous to insecure the information of Enterprise data. The biggest challenge for big data from security point of view is the protection of user�s privacy. If the data is stored in the cloud a there should be establish a trust boundary between the data owners and the data storage owners. So the major challenge is to developing a safe and sound information sharing protocol .here we will discuss about the methods and privacy concern so that we could secure our user�s sensitive information. Making use of Data Mining and some efficient algorithm user�s sensitive privacy can be well taken .In this paper we will use the code inline parsing technique to make information more secure from the attackers and hackers and from the SQL injections so that we could make our Information more secure. This would be helpful to protect sensitive information on a big data platform.
Keywords: Information Security, Big Data Security, Big Data Analysis, Hadoop project.
Abstract
Secure Multi-Owner Data Sharing for Dynamic Groups in Cloud
Ms. Nilophar M. Masuldar, Prof. V. P. Kshirsagar
DOI: 10.17148/IJARCCE.2016.5865
Abstract: Cloud computing provides the efficient use of resources over the internet. In this paper a secure multi owner data sharing scheme for dynamic groups in cloud is proposed. By generating the group signature and encryption technique the user can anonymously store and share the data. When the new user registration is done a group signature is given to the user belonging to a particular group. While downloading the data from the cloud the user has to enter the group signature and secret key which will be received to the user via an e-mail. When both the entities will match then only the user is able to download the data.
Keywords: Multi owner, dynamic broadcast encryption, group signature, user revocation
Abstract
Compact Microstrip Octagonal Slot Antenna for Wireless Communication Applications
Thasneem .H, Midhun Joy
DOI: 10.17148/IJARCCE.2016.5866
Abstract: In this modern world, wireless communication has been developed rapidly and widely. The field of wireless communication is growing at a very fast rate covering different technical areas such as WLAN, Wi-MAX and Bluetooth. For wireless communication application efficient and small antennas are required. In this paper design of a compact size Microstrip line feed single slot dual band antenna is proposed. Microstrip antennas are suitable for Microwave and Millimetre wave Integrated Circuits (MMIC) and less expensive to fabricate using modern day printed board technologies. The antenna is composed of an octagonal slot on the bottom plane and one side of this octagon is modified into a half octagon. CST Microwave Studio is used for the simulation. The simulation results of the antenna shows that the designed antenna is capable of operating over the two bands 2260 MHz - 2580 GHz and 3970 - 6880 GHz. The dimension of the antenna is only 25 ? 25 ? 1.6 mm�. Moreover, antenna have nearly omnidirectional radiation pattern and 2.87 dB gain obtained in the second band of this antenna. The proposed Microstrip single slot antenna is suitable for operating Bluetooth, WiMAX (2.5/5.5 GHZ) and WLAN (2.4/5.2/5.8 GHz) applications.and experimental results, is presented to verify the feasibility and effectiveness of the projected study.
Keywords: Microstrip, Omnidirectional, Wi-MAX, WLAN.
Abstract
‘Aquarius’- Smart IOT Technology for Water Level Monitoring System
Prof. A. M. Jagtap, Bhaldar Saniya Sikandar, Shinde Sharmila Shivaji, Khalate Vrushali Pramod, Nirmal Kalyani Sarangdhar
DOI: 10.17148/IJARCCE.2016.5867
Abstract: In mega cities of the world, Water deficiency is one of the crucial problem leads to wastage during transmission. We aim to resolve this issue by using Internet of Things. Monitoring system plays an important role in every household, commercial complex and even industries. The system used ultrasonic sensor to detect the level of water in multiple tanks, switch on or off the pump accordingly and display the status on android device. The water level is monitored and its data is sent through notification to the intended user�s android device.
Keywords: Ultrasonic sensor, tanks, remote monitoring, IoT, Raspberry Pi.
Abstract
Future of Results in Select Search Engine
Peerzada Mohammad Iqbal, Dr. Abdul Majid Baba, Aasim Bashir
DOI: 10.17148/IJARCCE.2016.5868
Abstract: The paper is an attempt to evaluate projected data of select search engine on the basis of seasonal data collection. The attempt is to generate the future of results in select search engines using simple keyword �Indexing� from the field of Library and Information Science. The Data collection was carried out for 100 Days to generate 50 days of predicted data using project trend method. The search engines viz., Google, Bing, Yahoo! & Baidu selected on certain parameters show tremendous variations in results. The evaluation reveal that Bing shows a significant positive secular trend while Google, Yahoo! and Baidu show a downward or negative secular trend.
Keywords: Future, Search engine, Fluctuation, Indexing, Counter.
Abstract
Semantic Indexing Techniques on Information Retrieval of Web Content
Abdullah K-K. A, Robert A.B.C, Adeyemo A.B
DOI: 10.17148/IJARCCE.2016.5869
Abstract: Information on the Web is increasing every day, the searching problem also increased. Indexing involves constructing a structured access to web content to facilitate search result. Retrieving relevant result is difficult due to traditional keyword based search which lack semantic. To address this issue, queries need to be disambiguated by considering the context (concept) using semantic search terms to index the search engine. However, user query may reflect multiple domains of interest which may lead to collection of semantically related terms. This paper discussed query terms with semantic search for retrieval of web content using different semantic indexing techniques. This would increase precision and recall for the semantic search when compared to traditional search. This would derive search related terms in the retrieved result taking into consideration the advantages, limitations on each of the techniques. Categories and Subject Descriptors [Information Search and Retrieval]: Clustering, information filtering, query formulation, Search process
Keywords: Semantic Search, WordNet, Ontology, Latent semantic indexing.
Abstract
Brain Tumor Segmentation using K-Means Based Level Sets
Ch. Deepika, N. Anupama
DOI: 10.17148/IJARCCE.2016.5870
Abstract: Image processing is an active research area in which medical image processing is a highly challenging field. Medical imaging techniques are used to image the inner portions of the human body for medical diagnosis. Brain tumor is a serious life altering disease condition. Image segmentation plays a significant role in image processing as it helps in the extraction of suspicious regions from the medical images. In this paper we have proposed segmentation of brain MRI image using K-means clustering algorithm followed by level set method which avoids the misclustered regions that can inevitably be formed after segmentation of the brain MRI image for detection of tumor location.
Keywords: Image Segmentation, MRI, K-means clustering, Level set method.
Abstract
A Survey on Comparable Entity Mining from Comparative Questions by Using Weakly Supervised and Markov-Logic Network
P. Ragha Vardhani, Y. Indira Priyadrashini
DOI: 10.17148/IJARCCE.2016.5871
Abstract: Comparing two objects is a very typical part for human decision making process. However, this process is not always easy to know what to compare and what are the substitutes. To address this difficulty, we propose a novel way to automatically mine comparable entities from comparative questions that users posted online. To get high precision and high recall, we implemented a weakly-supervised bootstrapping method, to achieve comparable entity extraction and comparative question identification by leveraging a large online question archive. The experimental results show our proposed method achieves F1- measure of 82.5% in comparative question identification and 83.3% in comparable entity extraction. The comparative question identification and comparable entity extraction significantly outperform an existing state-of-the-art method.
Keywords: Automatically mine comparable entities, weakly-supervised bootstrapping method, F1- measure of 82.5%
Abstract
A Survey on Overview of Data Mining
Mrs. R. Pradheepa, Ms. K. Pavithra
DOI: 10.17148/IJARCCE.2016.5872
Abstract: Data mining is used to extract meaningful information and to develop significant relationships among variables stored in large data set/data warehouse. In the case study reported in this paper, a data mining approach is applied to extract knowledge from a data set. Data mining is the process of discovering potentially useful, interesting, and previously unknown patterns from a large collection of data. Today, Data mining helps different organization focus on the information in the data they have collected about the behaviour of their customer�s. From last few years, research in data mining continues growing in various fields of organization such as Statistics, Machine Learning, Artificial Intelligence, Pattern Recognition, business, education, medical, scientific etc. In this paper discusses the concept of data mining, important issues and applications.
Keywords: Data mining, Data Base, Information, Association rules; Clustering, KDD.
Abstract
Morphological Technique for Improving Indian Coin Detection System under Varying Lighting Conditions
Nida Rahman, Mr. Jay Kant Pratap Singh
DOI: 10.17148/IJARCCE.2016.5873
Abstract: We proposed a method for Indian coin detection under varying lighting conditions. The basic idea behind our method is to extract features of known coins and put in a database. And when a new coin is entered its features are compared with the images of the coin that stored in the database. We trained our system under different lighting conditions. We assumed different lighting intensities, which occurs due to various reasons such as power fluctuations. We tried to detect Indian coin value under these conditions. This work basically involved automatic detection and recognition of Indian coin using morphological operations of image processing. Image processing is a process in which an input image is transformed into digital image form and performs some operation on it, In order to get high image property and to extract some useful information from it. This work is a prototype simulation and a proof of concept. The application of this work ranges from simple vending machines to automatic mobile recharging. In this thesis, we use MATLAB based simulation to obtain our result.
Keywords: Edge detection, Segmentation, Thresholding, Edge enhancement, Features extraction, Patter matching.
Abstract
Survey Paper on Private Audio Wave Technology
Tushar R. Khandare, Shubham A. Purohit, Prof. Swapnil V. Deshmukh
DOI: 10.17148/IJARCCE.2016.5874
Abstract: The purpose of this technology to design a system that would actively direct audio in desired directions and locations. Private audio wave is a technology that produces focused beams of sound similar to light beams coming out of a flashlight. It is very useful in security. By shining sound to one location, sound projected toward the required listeners. And another nearby listener unable to hear it. It uses a combination of non-linear acoustics and some fancy mathematics. But it is real and is fine to knock the socks of any conventional loud speaker. This acoustic device minimizes a speaker that fires inaudible ultrasound pulses with very small wavelength which act in a manner very similar to that of a narrow column. The ultra sound beam acts as an airborne speaker and as the beam moves through the air gradual distortion takes place in a predictable way due to the property of non-linearity of air. The targeted or directed audio technology is going to a huge commercial market in entertainment and consumer electronics and technology developers are scrambling to tap in to the market. Being the most recent and dramatic change in the way we perceive sound since the invention of coil loud speaker, Private audio wave technology can do many miracles in various fields like Private messaging system, Home theatre audio system, Navy and military applications, museum displays, ventriloquist systems etc.
Keywords: Acoustics, Airborne, Transducer, Hyper Sonic Sound, Ventriloquist.
Abstract
Caching of Routes in AODV for MANET
Vinod Kumar, Samir Srivastava, Rajesh Kumar Maurya
DOI: 10.17148/IJARCCE.2016.5875
Abstract: Mobile Ad hoc networks (MANET) have multi-hop wireless connectivity and they are categorised on the basis of route finding and maintenance. MANET has frequently changing topology and need dynamic routing protocol. Comparative studies between on demand or reactive routing protocols like AODV and DSR (the two best known and used routing protocols) shows that performance of AODV, DSR etc. are varies i.e. performance of AODV is better in high mobility environment and performance of DSR is better in high routing MAC load case. This is the cause of route caching in DSR as in high mobility; it has to modernize the route as soon as the node moves from the network. In this paper, we have cached the route in AODV without manipulating its basic structure to enhance the throughput, packet delivery ratio (PDR), energy etc. We have made a comparison between the traditional AODV and proposed AODV. We have shown the performance graph in performance result section.
Keywords: AODV, DSR, MANET, QoS.
Abstract
Channel hopping Algorithm in Cognitive Radio Networks
V. Gopi, B. Ajay Kumar, R. Chandrasekhar
DOI: 10.17148/IJARCCE.2016.5876
Abstract: Cognitive radio networks (CRNs) have been recognized as an advanced and promising paradigm to address the spectrum under-utilization problem. Cognitive Radio (CR) users improve spectrum efficiency by opportunistic spectrum access when the licensed spectrum is not occupied by the primary users (PUs). CR users also need to sense the spectrum and vacate the channel upon the detection of the PU�s presence to protect PUs from harmful interference. this paper presents CH algorithm calculate the BER in cognitive radio networks different modulation techniques used in CH algorithm We evaluate the performance of our algorithm through analysis and MATLAB simulations.
Keywords: cognitive radio; quadrature amplitude modulation; bit error rate.
Abstract
GPS Based Vehicle Navigation System
S. Mohanapriya, K. Priyadharshini, V. Ramya, G. Vignesh, V. Anand Kumar
DOI: 10.17148/IJARCCE.2016.5877
Abstract: This paper aimed at developing a System to prevent an unauthorized person from boarding the Bus. This is done by using RFID. Using GPS, the system gets the satellite information such as positioning and navigational parameters of the Bus like latitude, longitude, velocity, altitude, the name of the current location of the bus. The RFID technology is used to identify the members, who enter into the bus. If an unauthorized person enters into the vehicle, the door will lock automatically and the buzzer will be set to ON. An antenna is connected to the GPS receiver to acquire the signals from the Satellite. Line of sight is maintained between the antenna and the Satellite. All the information is displayed on Graphical User Interface (GUI). In the receiver side, the system provides a website application where the values of the parameters on the GUI are displayed. The parameter values are continuously updated and are displayed on the GUI. The main feature of this system is the ease of use of the system and visual display of the results which can be seen on android mobile phone using application.
Keywords: RFID, GPS, latitude, longitude, velocity, altitude, Graphical User Interface, mobile phone using application
Abstract
Method & Implementation on Node Relocalization in Dynamic Reconfiguration System in WSN
Rajni Kamboj, Er.Veena Rani
DOI: 10.17148/IJARCCE.2016.5878
Abstract: This is mobility based dynamic reconfiguration system in WSN. The concept of dynamic reconfiguration routing protocol is used that achieves the need of various applications and also various network conditions. An environmental data collection scenario is taken with the use of movement of nodes and controlled by controller. All nodes are in dynamic nature and moves randomly. All nodes are communicating with each other as well as from head nodes. There is a direct communication between head & nodes. It evaluate a multi-hop routing based on shortest path in wireless networks. A controller is designed which is used to control the movement and location of nodes. Before disaster occurred, all nodes changed their location for security. As disaster under control, there may get back to their locations. Results are presented and evaluated by use of MATLAB R2013a. The localization response and location error are the main performance parameters and its error value is less than 3%.
Keywords: WSN System, Dynamic Reconfiguration System, Localization, Mobility Management etc.
Abstract
Annotating Assamese Corpus using the Standard POS Tagset
Bipul Roy, Bipul Syam Purkayastha
DOI: 10.17148/IJARCCE.2016.5879
Abstract: Assamese is the official language of the Indian state of Assam and is about 25 million native speakers. But, being a regional language, it is highly lacking in language resources like corpus, language technology tools, guidelines etc till date. As the digitization of Assamese corpus, after it was tagged at the Part-of-Speech (POS) level, can help tremendous in the fields of various Natural Language Processing (NLP) applications, linguistic studies, various linguistic research works, etc. So, the development of annotated Assamese corpus has become unavoidable task now-a-days.
Keywords: Assamese, POS, BIS, NLP.
Abstract
An Approach for Brain Tumor classification using Artificial Neural Network
Tanya Saxena, Vimal Gupta
DOI: 10.17148/IJARCCE.2016.5880
Abstract: Brain Tumor is detected by using automatic support intelligent system through the neural network system. Automatic support intelligent system helps in the diagnostic and assistance in the treatment of the brain tumor. To find the brain tumor is a very difficult problem because of the complexity of the cells in the brain. In this paper we are presenting an analytical method that improves the detection of brain tumor cells in its initial stages by investigating anatomical constructions for training and classification of the samples in neural network system. The back propagation neural network will be used for classification purpose of brain tumor whether it is benign or malignant. In this paper, the MRI images of brain have been taken into consideration.
Keywords: Magnetic Resonance Image, Segmentation, Back Propagation Network, Image processing, Brain tumor.
Abstract
Movement Detection of Target in Wireless Sensor Network
Chinmayee Pande , Prof. S.D. Joshi
DOI: 10.17148/IJARCCE.2016.5881
Abstract: Target tracking is one of the eye catching applications in wireless sensor network. The network employees the object tracking practices which track the affecting target when it moves through sensor network. Existing work mostly involves face tracking edge detection algorithm which tracks the movement of target in timely fashion. In this paper, we propose a new tracking framework, which involves prediction and detection of the target in a face. Here �Kalman filter� is introduces which is used to predicts the objects location individually in a face and �Face Tracking Framework� for target detection. Kalman Filter is capable of tracking a target with high resolution in the presence of compromised or colluding malicious beacon nodes. Face Tracking employs, the nodes of a spatial region surrounding a target, called a face. Edge detection algorithm is used to generate each face further in such a way that the nodes can arrange onward of the target�s moving, which helps tracking the target in a timely basis and recuperating from special cases, e.g., sensor fault, loss of tracking. Also, optimal selection algorithm is used which select the sensors of faces for enquiry and to acceleration of the tracking data. Simulation results, compared with existing work, show that new tracking methodology achieves better tracking accuracy and energy efficiency and effectiveness.
Keywords: WSN, target tracking, tracking techniques, Tracking methods, face tracking
Abstract
A Survey on Skin Cancer Detection Techniques Using Digital Imaging Processing
Shefali Laddha, Komal Paliwal
DOI: 10.17148/IJARCCE.2016.5882
Abstract: Lately, skin disease is the most widely recognized type of human growth. It is evaluated that more than 1 million new cases happen every year. Keeping in mind the end goal to distinguish skin malignancy different techniques have been proposed in the previous decades. This paper concentrates on the improvement of a skin cancer screening framework that can be utilized as a part of a general practice by non-specialists to order typical from strange cases. The advancement procedure comprises of Feature Detection and Classification Technique.
Keywords: Skin cancer, Region growing, skin texture, segmentation, Edge detection.
Abstract
Survey Paper on Intelligent Skipping Rope
Bhagyesh S. Mawale, Tushar R. Khandare, Prof. Swapnil V. Deshmukh
DOI: 10.17148/IJARCCE.2016.5883
Abstract: Intelligent Skipping Rope is an advance stage of skipping rope that will be use by the people, athletes. Intelligent Skipping Rope which can measure our fat burn, heart beats, number of jumps. It has in build sensor for performing the various operations specified earlier. There will be a screen situated at one of the terminal of rope, where it will display the current result of the workout. Intelligent Skipping Rope is a great invention for the training purpose. Sports training is intended to promote health and improve skills of the sport.
Keywords: Skipping rope, sensor, pulmonary vein calculator, display screen, LED light.
Abstract
Encryption and Watermarking Embedded in H.264/AVC Video Stream
Sowmya Keerthi .D, Dr. K. Satya Prasad
DOI: 10.17148/IJARCCE.2016.5884
Abstract: Now a days, there is large growth in multimedia applications such video conferencing, video telephony, stream video/audio online etc. There is a need to secure the data. While transferring the data it plays a major role in today�s scenario. So in this paper we discuss about hiding the data and images in a video. We propose a data and image hiding schemes embedded directly in the encrypted version of H.264/AVC video stream which includes different parts of H.264/AVC video and data encryption, data embedding and data extraction. The embedded data and image in a video is reconstructed without knowing the original host video. The video properties are analyzed with the codewords of IPMs, the codewords of MVDs, and the codewords of residual coefficients. Data extraction can be done either in the encrypted domain or in the decrypted domain. Furthermore, video file size should be preserved even after encryption and data embedding. We represent examples of embedding image and data in a video. We also discuss about different hiding techniques which include watermarking, steganography, cryptography.
Keywords: Data hiding, Encrypted domain of H.264/AVC, watermarking, codeword substituting, image encryption.
Abstract
Segmentation of Liver from images of Visceral Organs through Automatic Processing – A review
K.A.M. Sajad Hyder, M. Vanitha
DOI: 10.17148/IJARCCE.2016.5885
Abstract: Automatic organ segmentation is an upcoming new field of research in image processing. The extraction of liver image for the diagnosis of its structural defective details is a difficult task for medical experts. Automatic extraction which is known as segmentation by computer processing may minimize the burden as well as time consuming. Several methods have been suggested for the above image segmentation particularly liver image capture. This present paper reviews the various methods. In addition it also discuss the merits and merits of the image processing procedures described in the current literature. This review may help to find a new scientific solution to overcome the issues addressed by the users and innovate new approach for the automatic liver segmentation from abdominal CT scan digital image pool.
Keywords: Automatic Liver Segmentation, Methods of Image Segmentation, Extraction.
Abstract
Multiband Microstrip Patch Antenna for RFID Applications
Ankita Batta, Ruchi
DOI: 10.17148/IJARCCE.2016.5886
Abstract: This paper presents a compact multiband microstrip patch antenna for RFID applications which resonates at 912 MHz and 5.8 GHz. The multi-frequency behavior is obtained by etching four asymmetric square-shaped slots and slits in the patch. Coaxial feeding technique is used to design this antenna. The design is simulated using Computer Simulation Technology (CST) Microwave Studio software. Finally, the results obtained from the simulations are demonstrated.
Keywords: Microstrip Patch Antenna, RFID, Multiband, Slits.
Abstract
Multi-Objective Optimization for Feature Selection using Pareto Front
Bhuvaneswari Ragothaman, Dr. B.Sarojini
DOI: 10.17148/IJARCCE.2016.5887
Abstract: The huge amount of data is collected from the real world and stored in the databases. The extraction of useful information from the large data is a tedious task. The effective extraction of the data can obtain useful information. The classification of the large data regarding their features is difficult. The feature selection for the particular data set in order to classify the data should be performed in clear way to obtain better classification. Different algorithms are used in the data mining to obtain the classification in a better manner with effective feature selection process. The problem confronted by the classification process is due to the presence of redundant data and irrelevant data. In feature selection process the data present in the set may not support with similar feature as some points having irrelevant feature then specified. The existing classification process can�t compete with the minimum local deviation and they include high computation cost. In order to achieve better classification of the data to obtain the appropriate result this work includes implementation of the Pareto Optimization along with optimization algorithm to extract the feature subset. The Pareto front is used to determine non-dominated feature subset in order to compute the feature extraction in minimal number and to increase the classification accuracy.
Keywords: Classification, Feature Selection, Pareto Optimization, Optimization Algorithm.
Abstract
Web of Things Based Smart Grid Architecture to Monitor and Control Energy Sources
Amala T. Kadam, Prof. S. S. Savkare
DOI: 10.17148/IJARCCE.2016.5888
Abstract: The quest for sustainable energy models is the main factor driving research on smart grid technology. Smart Grids represent the bridging paradigm to enable highly efficient energy production, transport, and consumption along the whole chain, from the source to the user. This paper describes a Smart Grid architecture implemented with the help of Web of Things. The goal of the Smart Grid architecture using Web of Things (WoT) is to provide the reliable power supplies to the consumers by making maximum use of solar energy source. The Web of Things comprise of a set of Web services provide on top of a number of Internet enabled Embedded devices. The Web browser on any computer can act as an interface to the services provided by this Web of Things. The Embedded devices are PIC16F877A, Raspberry Pi with Internet capabilities. REST API, Raspbian Operating System are used for process control on each of these embedded devices. The Web interfaces provide us information on each of the energy meters that are installed on site and communicate to the Embedded Internet devices using ZigBee. The real time energy source scheduling, energy source selection, power connection and disconnection are some of the surfaces that are provided to an online authenticated user.
Keywords: Web of Things (WoT), Smart Grid (SG), Solar Energy Source, Smart Home (SH)
Abstract
Improving Medical Diagnosis using Filter and Wrapper Techniques
Sonu Rani, Dharminder Kumar, Sunita Beniwal
DOI: 10.17148/IJARCCE.2016.5889
Abstract: Data mining also called knowledge discovery is essential for solving problems in specific domain. Medical diagnosis is a time consuming and difficult task performed by experts. For improving medical diagnosis using data mining techniques, data mining techniques need to be applied on relevant features. Over fitting can be reduced and performance of mining can be enhanced if more relevant features are selected. This paper reviews the various feature selection techniques and their application in different domains.
Keywords: Relief Attribute Evaluation, Symmetric uncertainty attribute, Multilayer Perceptron
Abstract
Comparison of the Performance Evaluations in Classification
So Jung Shin, Hyeuk Kim, Sang-Tae Han
DOI: 10.17148/IJARCCE.2016.5890
Abstract: This document gives formatting instructions for authors preparing papers for publication in the Proceedings of an International Journal. The authors must follow the instructions given in the document for the papers to be published. You can use this document as both an instruction set and as a template into which you can type your own text.
Keywords: Include at least 4 keywords or phrases.
Abstract
An Algorithm for Enhancing and De-hazing Videos
Anna Mathew, Therese Yamuna Mahesh
DOI: 10.17148/IJARCCE.2016.5891
Abstract: Haze removal from video is a composite process as the visual effect of haze are impenetrable. A haze removal method is put forward here which use Koschmiedars law in lack of prior. A boundary restricted smoothing technique is also used here. Image filter guided by weight is used which filters the out-turn based on details contributed by guidance image. A transmission map is determined and is employed to re-impose the haze free video. Power law transformation is used to enhance the quality of the output images.
Keywords: Koschmiedars law, Edge preserving smoothing technique, Image filter guided by weight, Power law transformation.
Abstract
Lane Detection System for Autonomous Driver Assistance
Geetanjali Paradkar, Prof. P.V. Mulmule
DOI: 10.17148/IJARCCE.2016.5892
Abstract: Saving lives and reducing road accidents is of great interest while driving at high speeds on freeways. Traffic accidents have a vast majority of fatalities worldwide; hence, lives safety on roads is an important area of interest since decades. The most complicated tasks of future road vehicles are successful lane detection. Lane detection locates lane markers on the road and presents these locations to intelligent system. Intelligent transportation cooperates with infrastructure which provides a safer environment and better traffic conditions. Vision system is one of the basic approach which helps to detect lanes and road boundaries. Currently, camera based systems using computer vision and image processing are used to detect lanes. There are large number of vision based systems which are developed during the last two decades for vehicle control, collision avoidance and lane departure warning. Detecting lane becomes difficult problem because of the varying road conditions and weather conditions that one encounter while driving. This paper describes the implementation of two algorithms with their results using Raspberry Pi. The Raspberry Pi is a low cost, credit-card sized computer that plugs into a computer monitor or TV, and uses a standard keyboard and mouse. It is a capable little device that enables people of all ages to explore computing, and to learn how to program in languages like Scratch and Python. It�s capable of doing everything you�d expect a desktop computer to do, from browsing the internet and playing high-definition video, to making spreadsheets, word-processing, and playing games.
Keywords: Lane detection, intelligent vehicle, PLSF, Laplacian filter, Canny Edge detection, Hough transform, Raspberry Pi.
Abstract
Study on Steganography Using Reversible Texture Synthesis
R. L. Sable
DOI: 10.17148/IJARCCE.2016.5893
Abstract: It is a unique approach for steganography using a reversible texture synthesis where rather than using existing image the algorithm will create new texture image using source texture and embeds message by texture synthesis process. The new image with similar appearance can be re-created by using texture synthesis process. The size of new image can be user specified. The important concept behind this kind of steganography is texture synthesis process. We can extract the embedded message and original texture image from final stego synthetic texture image. This new technique of steganography using reversible texture synthesis provide some advantages like the embedding capacity is directly proportional to the size of stego image. There will be no image distortion since size of new texture image is user specified. Also it provides the ability to recover source texture from the stego texture image. We can create visually plausible texture images by using this technique.
Keywords: Steganography, Data embedding, Texture synthesis.
Abstract
EAACK – A Secure Intrusion – Detection System for MANETs
G. Sathyanarayani, Dr. S. Adaekalavan
DOI: 10.17148/IJARCCE.2016.5894
Abstract: The migration to wireless network from wired network has been a global trend in the past few decades. The mobility and scalability brought by wireless network made it possible in many applications. Among all the contemporary wireless networks, Mobile Ad hoc Network (MANET) is one of the most important and unique applications. On the contrary to traditional network architecture, MANET does not require a fixed network infrastructure; every single node works as both a transmitter and a receiver. Nodes communicate directly with each other when they are both within the same communication range. Otherwise, they rely on their neighbors to relay messages. The self-configuring ability of nodes in MANET made it popular among critical mission applications like military use or emergency recovery. However, the open medium and wide distribution of nodes make MANET vulnerable to malicious attackers. In this case, it is crucial to develop efficient intrusion-detection mechanisms to protect MANET from attacks. With the improvements of the technology and cut in hardware costs, we are witnessing a current trend of expanding MANETs into industrial applications. To adjust to such trend, we strongly believe that it is vital to address its potential security issues. In this paper, we propose and implement a new intrusion-detection system named Enhanced Adaptive Acknowledgment (EAACK) specially designed for MANETs. Compared to contemporary approaches, EAACK demonstrates higher malicious-behavior-detection rates in certain circumstances while does not greatly affect the network performances.
Keywords: Digital signature algorithm (DSA), Enhanced Adaptive Acknowledgement (EAACK), Mobile Adhoc NETwork (MANET).
Abstract
A Review Paper on Forgery Part Detection using Different Methods
Manpreet Kaur, Mandeep Kaur
DOI: 10.17148/IJARCCE.2016.5895
Abstract: Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery and investigation of material found in digital devices. Digital image forensics aims at validating the authenticity of images by recovering information about their history. Two main problems are addressed: the identification of the imaging device that captured the image, and the detection of traces of forgeries. Nowadays, thanks to the promising results attained by early studies and to the always growing number of applications, digital image forensics represents an appealing investigation domain for many researchers. Fake images are many times used to publicize in social Medias and news papers. Many cases are noted in regard to the defaming business as well as political leaders by using fake photos and videos. In this paper DWT and Shift technique is used with optical flow to detect the video forgery frames and different parameters are calculated.
Keywords: Frame, Video, forgery, DWT and SIFT etc.
Abstract
Bit Error Rate Performance Evaluation of Various Modulation Techniques with Forward Error Correction Coding of WiMAX
Jaipreet Kaur, Sukhdeep Kaur, Manjit Sandhu
DOI: 10.17148/IJARCCE.2016.5896
Abstract: In this paper, a physical layer simulator for WiMAX corresponding to the IEEE 802.16e specification is simulated. The bit error rate performance evaluation of a WiMAX system using Reed-Solomon (RS) coding with Convolutional coding with 1/2, 2/3 and 3/4 rated codes in forward error correction channel coding and various digital modulation techniques (BPSK, QPSK, 4QAM and 16QAM) under communication channel AWGN is carried out.
Keywords: OFDM, WiMAX, Reed-Solomon coding, Convolution coding, Additive White Gaussian Noise, Bit error rate.
Abstract
An Invisible Robust Image Watermarking Technique based on Pseudo Random Numbers with Attacks
Shatha Ghazal, Raina S Alkhlailah
DOI: 10.17148/IJARCCE.2016.5897
Abstract: In thispaper an invisible robust image watermarking scheme based on pseudo random numbers with various attacks is proposed.This algorithm works on spatial domain. In this paper cover image partitioned into 3*3 blocks and random blocks are chosen for the watermark embedding. Watermark is pseudo random binary sequence and protected by the secrete key. At the receiver effectiveness is checked by the correlation between sender data and received data. This paper comprises various attacks such as noise attack, low pass filtering attack, median filtering attack on the watermarked image for checking robustness of the scheme.
Keywords: Watermarking, Robust, Pseudo random, invisible.
Abstract
Recommendation of Recommender System
Celine M R, Dr Sheetal Rathi
DOI: 10.17148/IJARCCE.2016.5898
Abstract: Recommender System is the system that creates important suggestions in predicting user response to options to end users for things or items that may intrigue them. Recommender system vary in the way they analyse these information sources to create thoughts of liking amongst end-user and things which can be utilized to recognize the likely coordinated sets. RS is not only restricted to certain industry but is used in overall market/industry.The setup of such RS depends on upon the space and the particular characteristics of the data accessible. Collaborative Filtering examine authentic connections alone, while Content-based Filtering depend on profile traits; and Hybrid strategies endeavour to join both of these outlines. The design of recommender system and their assessment on real world problems is an active area of research.
Keywords: Recommender System, Collaborative Filtering, Content-based filtering, Hybrid Strategies
Abstract
Wireless Web Server for Industrial Data Acquisition and Control Using Raspberry Pi
N.R. Darda, G.R. Gidveer
DOI: 10.17148/IJARCCE.2016.5899
Abstract: In today�s world wireless technologies are more used in industrial automation. Wireless technology offers a good opportunity in the area of communication. When the embedded devices are provided with internet access the demand will rise due to the remote accessing capability of these devices. Users can monitor and control remote systems by using embedded web server. This system is designed to develop a Data Acquisition System for industrial use which will also act as live web server. All data which is monitored can be seen live on webpage along with the live video coming from Raspberry Pi Camera. Data Backend is also provide in this system. If Temperature Sensor value exceeds beyond threshold value then client will receive mail. This increases the productivity of the conventional Data Acquisition and Control System largely, making it smart Data Acquisition System.
Keywords: Raspberry Pi, Embedded Web Server, Real Time Processing, Raspberry Pi Camera, Sensors.
Abstract
Comparative Analysis of Novel Weight Based Cluster Algorithm and Energy Efficient Cluster Based Algorithm in MANET
Sanehi Sirohi, Manoj Yadav
DOI: 10.17148/IJARCCE.2016.58100
Abstract: MANETs is a fast developing research area with a vast spectrum of applications. For better communication we have to make routing easy. Adhoc routing protocols can be divided into flat and cluster based routing. Clustering can be done on taking accounts the key factors like mobility, energy, weight, ID, etc. In clustering a cluster head is selected which have the information of all the nodes of cluster. Unlike flat routing not all of the nodes have to know about each node, if the cluster head communicate with the cluster head of other cluster they get all the details necessary for routing. Here we compare the performance of two algorithms energy efficient cluster based SEEC algorithm and weight based weight based WBA algorithm. Their performance is compared on the basis of four factors these are delay, energy, packet delivery ratio and throughput.
Keywords: Mobile Ad hoc Networks, cluster head, clustering algorithms, LEACH.
Abstract
Phishing Detection using Map-reduce and PART Algorithm
Mr. Rakshith Raj K. R, Prof. Prabhakara B. K
DOI: 10.17148/IJARCCE.2016.58101
Abstract: Phishing is the fraudulent activity that is done by the phishers, in order to gain information of users such as their user IDs, passwords and credit card details through online. The users will be victim for this kind of activities, because phishing web pages looks very similar to real ones, so finds difficult to distinguish between the fake website and ones, detecting this kind of webpage is very difficult because for identification it takes several attributes into consideration which user might not knowing those things. The existing phishing detection systems are highly dependent on database and they are very time consuming also. In this proposed system, Hadoop-Map Reduce is used for fast retrieval of URL attributes, which plays a major role in identifying phishing web pages and it is known for its time efficiency and throughput also can gained using this. The PART algorithm is used for classifying and predicting the phished pages, which is more efficient and accurate than the algorithms used in existing systems. The main goal is to provide security to the user�s data while browsing.
Keywords: Phishing, Anti-Phishing, Hadoop, Map Reduce, Information Retrieval, Data Mining.
Abstract
Statistics and Mean Filters Based on Spatial Noise: A Comparative Study
Ali Abdulkarem Habib
DOI: 10.17148/IJARCCE.2016.58102
Abstract: The main idea of this paper to exhibit study which illuminate set of characteristics among statistics and mean filters rely on additive and multiplicative in addition salt and pepper noise with compare among them using difference type analysis methods and blur metric . We selected one filter form statistics filters and another one from means filters. Finally, we get perfect results tell as what is the best filter and affect them on noises [3].
Keywords: Default color image, statistics and means filters, noise models, blur metric.
Abstract
Measurement of MF Receiver Performance Deviation Using Conventional and Practically Derived Threshold for Binarised Image Signals
Bimla Pandey, Amit Kumar Ahuja
DOI: 10.17148/IJARCCE.2016.58103
Abstract: Matched filter based receiver (MF receiver) are designed to achieve reliability at physical layer of TCP/IP model. Signal detection in this receiver is based on the use of threshold which is logarithmic function of input signal parameters, r0 and r1. Usually, at the receiver, r0 and r1 are assumed as 0.5. This leads to = 0. But in many practical situations such as transmission of image signals through AWGN channel, r0 ? r1 and hence ? 0. The objective of this work is to find the performance deviation using and when image signal are transmitted through AWGN channel. This is done for different considered window lengths and by using appropriately defined methodology. The simulation analysis study is carried out using MATLAB 7.6.0.324 (R2008a) version. For different considered signal, various results are plotted in the form of percentage BER deviation vs. SNR curves. From the results it is found that substantial performance deviations do exist when considering (i) (ii) for image categories especially at low SNR values and smaller window length.
Keywords: MF Receiver, TCP/IP, AWGN, BER, MATLAB, SNR.
Abstract
An Optimized Queuing Model to Improve Spectrum Utilisation in Cognitive Radio Network
Kumud Tiwari, Ashutosh Rastogi
DOI: 10.17148/IJARCCE.2016.58104
Abstract: Allocated Spectrum band has always been a limited resource; being later a more challenging issue due to the growth of user demands. The past decade is marked by important changes in spectrum access through especially cognitive radio technology. Here, spectrum access issue can be studied in all the different aspects of cognitive capabilities. This paper focuses on spectrum handoff in spectrum mobility. We will then study secondary connections behaviours after multiple interruptions providing from multiple secondary connections. In the IEEE 802.22 standards [1], two Spectrum Handoff Sequences have been defined to characterize Secondary Connections behaviours after each Primary Connections interruption. These sequences are known as always-leaving and always-staying sequences. A recent analysis uses the extended data delivery time metric to analyse these Spectrum Handoff Sequences. It shows the exponential value of connections service time in the first sequence (always-leaving sequence) and in the other (always-staying sequence), the lack of fairness due to the acquisition of channel�s low-priority queue by the ongoing secondary connection (i.e. the secondary connection actually being served in the low-priority queue. We propose the pre-emptive resume priority (PRP) M/G/1 queuing network model to characterize the spectrum usage behaviours with all the three design features. This model aims to analyse the extended data delivery time of the secondary connections with proactively designed target channel sequences under various traffic arrival rates and service time distributions. These analytical results are applied to evaluate the latency performance of the connection-based spectrum handoff based on the target channel sequences mentioned in the IEEE 802.22 wireless regional area networks standard. Then, to reduce the extended data delivery time, a traffic-adaptive spectrum handoff is proposed, which changes the target channel sequence of spectrum handoffs based on traffic conditions. Compared to the existing target channel selection methods, this traffic-adaptive target channel selection approach can reduce the extended data transmission time by 35 percent, especially for the heavy traffic loads of the primary users.
Keywords: Cognitive Radio; Spectrum Handoff; Lifetime of Secondary Connection; PRP M/G/1 Queuing Theory.
Abstract
Comparative Study of the Programming Languages
Ruchi Sharma, A.J Singh
DOI: 10.17148/IJARCCE.2016.58105
Abstract: With the rapid development of software industry, additional and more individuals need to learn programming languages. But today there are a more than three hundred programming languages accessible, only a few of them will be applied relatively wide. In this study, the research in programming language was conducted. Three of the most widespread programming languages C, C# and Java are chosen to be the objects to study.
Keywords: C, Java, C#, Programming Languages.
Abstract
Selection of Proper Fixed Size Square Washer using Image Processing Approach”
Swati Kiran Diddi, Prof M.R Madki
DOI: 10.17148/IJARCCE.2016.58106
Abstract: In this paper a real time vision based system is proposed to identify the defect in the square washer. The entire frame work is based on the Arduino board and MATLAB. The images of square washer are taken from camera which is placed on top of conveyor belt. This images are processed in MATLAB. To extract the feature of washer area, height & width of washer is calculated and also area of hole is calculated. SVM is implemented for the classification of faulty and not faulty washers. The classified output is given to the Arduino board which will control the rotation of motor (motor is connected to conveyor belt) in clockwise / anticlockwise direction depending on not faulty / faulty washers. An LCD display is used for displaying status of washer. This paper attempts to study the defect detection technique on computer vision (MATLAB) platform which implements an industry assembly line using image processing.
Keywords: Conveyor Belt, Arduino, MATLAB (MATrix LABoratory), SVM (Support vector machine).
Abstract
An Energy Efficient Congestion Aware Routing Strategy Based on Genetic Algorithm for Mobile Adhoc Network
Radhika Gupta, Jashwant Samar, Durgesh Wadbude
DOI: 10.17148/IJARCCE.2016.58107
Abstract: In mobile adhoc network (MANET) all the nodes are in motion and runs on battery power. In such networks all the nodes communicate with each other via wireless transmission medium. And the message from source to destination is sent with the help of intermediate in range nodes. So dynamic path selection, routing and routing table updates are done in MANET. So to select proper path which is congestion free and in a short span of time is a challenging task. In this paper an energy efficient congestion aware routing strategy (EECARS) for MANET is proposed. The results show that the proposed scheme outperforms traditional DSDV protocol in MANET.A mobile unintentional network (MANET) may be an assortment of wireless mobile hosts forming a short lived network without the help of any complete infrastructure or centralized administration. Mobile Ad-hoc networks are self-organizing and self-configuring multichip wireless networks where, the structure of the network changes dynamically. This is principally because of the quality of the nodes. Nodes in these networks cooperating in an exceedingly friendly manner to participating themselves in multihop forwarding. The nodes within the network not solely act as hosts however additionally as routers that route data to/from different nodes in network. MANETs need associate efficient routing protocol that achieves the standard of service (QoS) mechanism. Routing protocol ought to be absolutely distributed; adjective to frequent topology amendment, Easy computation & maintenance, optimum and loop free route optimal use of resources, Collision ought to be minimum. MANET consider the shortest path with minimum hop count as optimum route with none thought traffic and so degrading the performance of the network so it's very essential to contemplate load equalization issue in routing mechanism. This Paper principally focuses on survey of varied load balanced Routing protocols for economic data transmission in MANETs.
Keywords: DSDV, Congestion, Network life free, MANET
Abstract
Fake Currency Detector
Ms. Khatke Rasika Nandakumar, Mr. Hindurao Dinkar Gore
DOI: 10.17148/IJARCCE.2016.58108
Abstract: The purpose of this paper is to present an introduction to fake currency detector concept because Counterfeit notes are a problem of almost every country but India has been hit really hard and has become a very acute problem. Fake Indian currency of 500 and 1,000 rupees seems to have flooded the whole system and there is no proper way to deal with them for a common person. The legal system is even more troublesome, even a small court case in India can easily drag for months and years there is necessity to make available low cost and easy detection of fake currency for every computer user. As we are technical and part of Indian Future introduces this idea in our concept.
Keywords: Fake currency detector concept, Fake Indian currency of 500 and 1,000 rupees, technical and part of Indian Future
Abstract
Pan-Sharpening Based Satellite Multispectral Image Enhancement under NSC-Transform
Harshada R. Ghodekar, Prof. A.S. Deshpande
DOI: 10.17148/IJARCCE.2016.58109
Abstract: The project presents that pan sharpening used for satellite panchromatic and multi spectral images based Non-subsamples contourlet transformation. It contains two different approaches that are, NSCT with different levels of decomposition and NSCT with up-sampling based fusion of pixel level. NSCT is very well-organized in representing the information of directional and capturing intrinsic geometrical structures of the objects. A combination of spatial resolution (high) extracted from PAN images into the spectral resolution (high) of MS images gives both high spatial and spectral resolution pan sharpened image. This displays both spatial and spectral qualities while falling computation time. By applying up sampling after NSCT, structures and more information of the MS images are extra likely to be preserved. Hence, pan-sharpening is done by merging it with detail information offered every Pan image at the same fine level. The system simulated result represents that used method provides better resolution in this image and it also measured the performance parameters for example correlation, PSNR, SSIM and standard deviation.
Keywords: Image Enhancement, Non-sub sampled Contourlet Transform, Pan-sharpening Technique.
Abstract
Helmet Based Vehicle’s Auto Ignition with Alcohol Detection and Accident Indication and Reporting System
Ms. Khyati Varma, Ms. Sneha Jainwar, Mr. B. Hari Kishor Rao, Ms. Juby Jogi
DOI: 10.17148/IJARCCE.2016.58110
Abstract: The World Health Organization states that 1.2 million people lose their lives annually due to road traffic injuries. More than half of the deaths caused affect the two wheelers in the form of head injuries. Most of these deaths are preventable by the compulsory use of helmets. Studies have shown that wearing a helmet can reduce the fatalities by 70%. Global initiatives have been taken to make helmets a high priority for public health. Many awareness drives have been launched, laws have been enforced in the public interests but still we find people violating the rules and driving very casually without wearing helmets and thereby risking their lives. Hence to overcome this problem we came up with a novel project of smart helmet. This system is designed in such a way that the vehicle will not start unless the rider wears a helmet and passes the alcohol test, thereby also solving the problem of drunken driving. The helmet has an additional feature of accident indication and reporting through GPS � GSM technology which sends message to the hospitals and family members at the time of accident. This project is designed for people�s safety and is in the best interest of the society.
Keywords: Helmet, Alcohol detector, Accident reporting, Safety, Gps-Gsm.
Abstract
Survey Paper – Online Android Notice Board for Education Society
Nikhil S. Kawna, Shubham A. Purohit, Prof. Swapnil V. Deshmukh
DOI: 10.17148/IJARCCE.2016.58111
Abstract: Now a day�s technologies are increasing and every person is using smart phones but to use it more smartly this idea of digital app that is digital notice board will be helpful. As we know that notice board is mandatory in each college or we can say institutes but in present in institutes a clerk have to go to notice board and then stick that notice on board when students pass through notice board they have to stay there to read notice which is very time consuming and due to which notice board area is totally surrounded by students which creates disturbance. So to avoid manual work this project will helpful by which student get notice any time through this one app.
Keywords: Android app, Digital, Notice- board, Network, Smart phone.
Abstract
License Plate Recognition of Indian Number Plates- An Image Processing Approach
Riri Pradeep Shah, Prof M.R Madki
DOI: 10.17148/IJARCCE.2016.58112
Abstract: The authentication of Indian Vehicles by their number plates is the most interesting and challenging research topic from past few years. License Plate Recognition is a system designed to help in recognition of number plates of vehicles. As the technology is getting advanced day by day, for each country there are many different aspect of designing number plates to the vehicle. For the several respective regular administrative tasks the license number plate is used for various purposes like tracking of number plates by the traffic police, for the analysis of theft cars, parking management of vehicles and collection of toll etc. Unique numbers are assigned to all the motorized vehicles in India. These unique numbers are designated to the vehicles by district-level Regional Transport Office (RTO). This paper aims to present a technique for license plate recognition (LPR). Images of rear end of the car will be considered. From the whole image only the license plate is extracted and segmentation will be done in order to extract the characters from the image. To recognize the characters which are extracted from the image and to recognize the number plate a suitable algorithm will be used and as a result the recognized number plate will be displayed. The characters will be recognized from the whole image and the authorized number plate will be displayed as a result.
Keywords: License plate recognition, Optical character recognition (OCR), connected component analysis, India vehicles, Authorized vehicle number plate.
Abstract
Big Data: Exploring Hadoop, MapReduce & HDFS in Data Mining
Prof. Datey Zuhaib Khalil, Prof. M. Jhansi Lakshmi
DOI: 10.17148/IJARCCE.2016.58113
Abstract: The Global digital content created will increase some 30 times over the next ten years � to 35 zetta bytes, this unstoppable increase in data challenges business problems, a big data represents a large and rapidly growing volume of information that is mostly untapped by existing analytical applications and data warehousing systems. To analyze this enormous amount of data Hadoop can be used. Hadoop is an open source software project that enables the distributed processing of large data sets across clusters of commodity servers. It is designed to scale up from a single server to thousands of machines, with a very high degree of fault tolerance. The technologies used by big data application to handle the massive data are Hadoop, Map Reduce, Apache Hive, No SQL and HPCC. This paper highlights the big data and the new method of hadoop, MapReduce and HDFS to tackle the problem of big data.
Keywords: Data Mining, Big data, Structured data, BI, Big Data analytics, OLAP, EDA, Neural Networks, Hadoop and MapReduce technique, Advantages, Disadvantages.
Abstract
Design and Survey of Optical Time Division Multiplexing for Very High Bit-Rate Transmission
Mohammad Umar Ansari, A. Ashok, A.K. Jaiswal, A. Masih
DOI: 10.17148/IJARCCE.2016.58114
Abstract: Optical time division Multiplexing (OTDM) is well known techniques of Electrical time division multiplexing into optical domain. Time multiplexing is used to construct optical streams in OTDM. In this paper, an overview of recent work show the multiplexing and de-multiplexing of incoming data. In this, lower bits (10GBits/S) constructed to a higher bits i.e. (40GBits/S) by multiplexing process. The pulses streams are delayed with respect to one another using delay element. The Delay streams in picosecond order. The de-multiplexing reconstructs the bit streams at the original bit rate (10GBits/s) by separating bits in the multiplexed streams. The Bits are transmitted over long distance using single fiber. In this paper we verified by the results that at the receiver end each bits are separated and show their property such as Q factor, Power, Wavelength, Power Penality etc. On Increasing distance that will decreased power penality means at the receiver end the noise is decreased. Data is transmitted 80 Km using single mode fiber.
Keywords: AM Modulator, NRZ Pulse, Multiplexer, De-multiplexer, loop control, EDFA, Clock recovery.
Abstract
Selective Gene Exchange (SGEX) Mutation Algorithm as a Data Encryption and Decryption Mechanism
Cris Paulo G. Hate, Arnel C. Fajardo
DOI: 10.17148/IJARCCE.2016.58115
Abstract: This paper describes the mechanism utilizing the alteration of data at a binary level using a binary exchange algorithm. This is to address the need for a flexible and robust form of encrypted data during transmission over networks. The process covers mathematical conversion of data which crossovers and mutates the binary version of a plain text string, and translates the data without the need for a standardized cipher key. The resulting algorithm is also applied to a database driven application, and then exposed to a decryption tool. The data will be passed to a functional database, which in turn will be queried and decrypted.
Keywords: Evolution, Genetic, Cryptography, Mutation, Bitwise, Algorithm, Cipher Text
Abstract
Brain Tumor Classification Based on Singular Value Decomposition
Nidahl K. El Abbadi, Neamah E. Kadhim
DOI: 10.17148/IJARCCE.2016.58116
Abstract: Every day over 100 adults will be diagnosed with a primary brain tumor and many more will be diagnosed with a cancer. Diagnosing a specific type of brain tumor can be a complicated affair, making confirmation of its diagnosis essential. In this paper we suggested new method for detection of brain tumor based on singular value decomposition (SVD). The algorithm first trained/learned with normal brain MR images, then in the second step the algorithm become capable to classify the brain MR images into healthy and non-healthy image (that have a tumor). The algorithm is trained with 20 of normal brain MR images and tested with 50 brain MR images. The accuracy of this method was up to 97%.
Keywords: MRI, brain tumor, classification, image processing, SVD.
Abstract
Effective Data Retrieval Using Relevance Feedback and Local Search Approximation Algorithms
Mathumathi .B, Darsana K Gopidas
DOI: 10.17148/IJARCCE.2016.58117
Abstract: In search engines, data/Information Retrieval (IR) is affected with indexing and retrieving documents with user�s requirement. The documents which are retrieved should most relevant to the users need. In order to improve the retrieval efficiency, RF (Relevance Feedback) methods are used. The query expansion with effective data retrieval is the main aim of our proposal. In this paper, we propose a local search approximation algorithm to re-weight the query terms and to re-rank the document retrieved by an IR and it solves the computational hard optimization problems. Additionally, we propose a new indexing method named as Set Inverted Index, which is a semantic extracted term based inverted index. This helps to summarize the documents and sum up with its semantic similarity. This indexing system outperforms than other inverted index methods.
Keywords: Information Retrieval systems, search engine, relevance feedback, local search approximation, inverted index.
Abstract
Effectiveness of Variable Transformation in Customer Marketing Using Classification Model
Hyeuk Kim
DOI: 10.17148/IJARCCE.2016.58118
Abstract: We usually focus on how to apply data mining techniques to data. However, it is important to manipulate data such as cleaning observations, dealing with missing values, and transforming variables. The pre-processing and transformation steps in KDD affect the performance of a model much. We compare the performances of various classification methods based on the different data set in the paper. Several data sets are generated from a real bank data. The differences in data sets are which variables are transformed. The results show that variable transformation improves the performance of a model. Additionally, the more transformations for the appropriate variables happens the more improvement in the performance of a model.
Keywords: Classification, variable transformation, customer marketing, performance comparison, neural networks
Abstract
Adaptive Privacy Policy Prediction of Content Sharing on OSN
Dr. V. Goutham, Mr. G. Guru Brahmam, Ms. R. Bharathi
DOI: 10.17148/IJARCCE.2016.58119
Abstract: An Adaptive Privacy Policy Prediction (A3P) system to support users to comprise privacy settings for their images. With the accumulative volume of images, user�s stake through social sites, sustaining privacy has become a major problem, as proven by a recent trend of publicized happenings where users unintentionally shared personal information. In such a case of incidents, the need of tools to help users control access to their shared content is superficial. Towards addressing this need, it is examined the role of social context, image content, and metadata as probable indicators of users� privacy partialities. A two-level framework which is rendering to the user�s available history on the site, defines the best available privacy policy for the user�s images being uploaded. The solution depend on an image classification framework for image categories which may be accompanied with similar policies, and on a policy prediction algorithm to automatically generate a policy for each newly uploaded image, also according to users� social features. Over time, the created policies will follow the evolution of users� privacy attitude. It also provides the results of extensive evaluation which determine the efficacy of the system, with prediction accuracies.
Keywords: Online information services; isb-based services.
Abstract
Secure Data Outsourcing Protocol in Cloud by PRE and ECC with Chaotic Standard Map
Mahendra Kumar Yadav, Jashwant Samar, Durgesh Wadbude
DOI: 10.17148/IJARCCE.2016.58120
Abstract: Cloud computing has evolved as one of the most promising technologies as it has the potential to transform the traditional way of computing. It is a technology in which the resources are relying on the Internet and one can use it on pay per use modus operandi. Cloud computing enables the provisioning of these resources on demand in the form of service. Now days everyone uses cloud services for data outsourcing and sharing with. So security of data becomes important issue in cloud computing. Data should be secure and sharing of data should be efficient. To conserve the confidential data of user against untrusted servers, existing solutions generally apply cryptographic methods and reveal data decryption keys only to authentic users. However, doing this process, these solutions obligatory introduce a heavy computation overhead on the data holder for key dispensation and data management. Here we proposed an SDOP (secure data outsourcing protocol) approach for data outsourcing onto the cloud and reduced the heavy computation overhead on the data holder. In our proposed work we used chaotic standard map with proxy re-encryption (paring free unidirectional proxy re-encryption scheme) to provide fast and easy data sharing. By using chaotic standard map we are reducing the calculation overhead, while proxy re-encryption (PRE) makes flexible and easy data outsourcing. On comparing existing EFADS approach with our proposed approach we found that our proposed approach efficient than existing data sharing approach.
Keywords: Cloud computing, Proxy Re-Encryption, EFADS.
Abstract
A Novel Face Detection And Recognition System Using Hybrid Skin Color Model
Pradeep Kumar, Pankaj Kumar, M. Rakesh
DOI: 10.17148/IJARCCE.2016.58121
Abstract: Human face detection plays a very significant role in various biometric applications like crowd surveillance, human-computer interaction, automatic target recognition, artificial intelligence etc. Varying illumination conditions, color variance, pose variations affect face recognition performance. So, automatic facial detection and recognition is an interesting concept that has evoked considerable attention because of its applicability in various areas. Our work suggests a novel algorithm for enhancing the facial detection and recognition performance, which comprises of two major steps: first, we locate the faces and then the located faces are recognized. We have utilized multiple color space based skin color segmentation and morphological operations for facial detection that is faster and has more accuracy when compared with the other existing algorithms. First, skin regions are segmented from an image using a combination of RGB, HSV and YCgCr color models using thresholding concept. Then facial features are used to locate the human face depending on understanding of geometrical features of human face. The face recognition method contains four stages: Gabor feature extraction, dimensionality reduction by making use of PCA, selecting features using LDA, and classification using SVM. Simulation results show that, our suggested approach is sufficiently robust for achieving approximately 96% accuracy and recognizes faces with lesser misclassification compared to existing schemes.
Keywords: face detection, skin color segmentation, RGB, HSV, YCgCr, Sobel edge detector, LDA, SVM.
Abstract
Edge Detection of an Image Using an Improved Canny Algorithm: A Review
Lalrinawma, Ramanjeet Kaur
DOI: 10.17148/IJARCCE.2016.58122
Abstract: Edge detection of an image is a fundamental, yet one of the most important fields in image processing, pattern recognition, and image analysis and computer vision technique. In edge detection, the structural information of an image is extract and reduced to important data to process. There are different methods for detecting the edge, and mainly categories into search based and zero-crossing based. One of the most common methods is �Canny edge detector�, and work well under some condition. Like every other method, it had some disadvantages, drawbacks and limitation. Due to this limitation and constant evolution of image processing, a better method is in demand and a number of researches had been done to improve the methods and the performance of this technique. To rectify the problem, and to have a better outcome, a new method of edge detection is needed. To increase the performance of the detector, the removal of noise from an image is the first important thing such that it does not affect the detection by showing false noise. The detector must also have a single response of thin line for each detected edge. In other words it must present clear and corrected image which might further be used for different purpose: medical field for identifying diseases, object identification and computer vision system etc.
Keywords: Edge detection, image processing, pattern recognition, computer vision technique, Canny detector, 2-D Otsu�s method, Threshold.
Abstract
Study of Data Mining Approach for Privacy Preservation
Priyank Pathak, Rajat Paliwal
DOI: 10.17148/IJARCCE.2016.58123
Abstract: In this paper reviewed the utility and application of data mining technique in the field of privacy preservation. Privacy preservation is technique for hiding of information and secured the information during transmission. Now a day�s various technique of privacy preservation are used such as cryptography, k-animosity and other methods used for the hiding an information. Data mining provide verity of technique such as rule mining, clustering and classification, all these technique used for the process of privacy preservation. The noise adaptive and data transformation is well known technique for privacy preservation. The collection of different method of data mining and perform privacy preservation task is called collaborative mining technique for this task. The collaborative technique enhances the security strength of privacy preservation and decrease the loss of data during the transformation of data.
Keywords: Privacy Preservation, Data Mining, Collaborative Technique.
Abstract
Texture Segmentation using Threshold Entropy Filter
Harjot, Rupinder Kaur Wahla
DOI: 10.17148/IJARCCE.2016.58124
Abstract: Texture segmentation has come a long way from manual segmentation to reasonable automated segmentation. Using just a few simple grouping cues, one can now produce rather impressive segmentation on a large set of Textures. In some cases from texture, meaningful objects have been identified based on variations of color depth beyond a threshold value. In some case boundary between two regions are measured by comparing intensity differences across the boundary and intensity differences between neighboring pixels within each region. But the works done so far will not be able to get meaningful texture segmentation in all cases, particularly when the threshold values change drastically within the same object or the object is a combination of various different parts with different features and colors. Although it is safe to draw the conclusion that very thorough, accurate and meaningful texture segmentation would be extremely difficult to achieve, the past and present directions and efforts of research on this problem seem to be appropriate and as such should be continued to achieve more accuracy as far as possible.
Keywords: Texture, Pixel, Segmentation, Discrete Wavelet Transform.
Abstract
An Improved Image Watermarking Algorithm using Three-Level Dwt-SVD Technique
Ashish Kumar, Rishi Singh, Kailash Patidar
DOI: 10.17148/IJARCCE.2016.58125
Abstract: Digital image watermarking is a modern copyright protection technique. It aims at asserting intellectual property rights of digital images by inserting a copyright identifier in the contents of the image, without sacrificing its quality. It has been affirmed that the frequency domain techniques are more robust than spatial domain techniques. In this paper, we proposed a digital video watermarking technique with multi-level discrete 3-D wavelet transform using MATLAB. In the proposed method, first the video frames are extracted from the host video. Then, each frame get watermarked with multi-level discrete 3- D wavelet transform using key which is also known as embedding. After that each watermarked video frame get reconstructed. Watermarked video is obtained after reconstruction of watermarked video frame. The effectiveness of frame is evaluated using frame quality measures against some attacks.
Keywords: Digital Video Watermarking, Discrete Wavelet Transform, Video Frame, Watermark, MATLAB.
Abstract
Analyzing Zone Routing Protocol in MANETs and Applying Open SSL DES96 Enhancement Algorithm
Vineetha Gunturi, Harsha Varma
DOI: 10.17148/IJARCCE.2016.58126
Abstract: Routing is an important part of wireless ad hoc network conventionally there are two approaches first one is Proactive and another one is Reactive. Both these approaches have some disadvantages and to overcome the problems hybrid routing protocols designed. ZRP (Zone Routing Protocol) is one of the hybrid routing protocols, it takes advantage of proactive approach by providing reliability within the scalable zone, and for beyond the scalable zone it looks for the reactive approach. It (ZRP) uses the proactive and the reactive routing according to the need of the application at that particular instance of time depending upon the prevailing scenario.In this paper we use ZRP that proactively maintains routes within a local region of the network (which we refer to as the routing zone). Knowledge of this routing zone topology is leveraged by the ZRP to improve the efficiency of a reactive route query/reply mechanism. we further incorporate security, provide guaranteed QoS and enhancement for use in heterogeneous mesh and sensor networks and this is accomplished by using Open SSL-DES96(double encryption) enhancement algorithm. The performance of this algorithm is evaluated through simulation and data transfer among the nodes is done through SFTP.
Keywords: Ad hoc network, hybrid routing, proactive routing, reactive routing, routing protocol, routing zone, zone routing protocol (ZRP), Multi clusterhead, Dominating Set.
Abstract
A Review of Label Dependency and Feature Similarity for Multi-Label Classification
Rohit Tiwari, Shivank Kumar Soni
DOI: 10.17148/IJARCCE.2016.58127
Abstract: The increasing rate of data diversity in current decade faced a problem of data categorization. Data categorization used a classification technique such as KNN, decision tree and support vector machine. The process of classification divided into two sections one is trained model and other is test model. The assign class measured the similarity between trained and test. The dependency of feature bound the limitation of accuracy of classifier. The process of classification mapped data into labels and labels categorized in the different predefined class for the classification purpose. This paper concludes multi label classification technique removal of similarity of dependency.
Keywords: Multi-Class Classification, Label Dependency, Data Mining.
Abstract
Comparative Study of Feature Extraction Techniques for Hindi Speech Recognition System on HTK-Toolkit
Malay Kumar
DOI: 10.17148/IJARCCE.2016.58128
Abstract: Hindi is a language of masses. It is the national language of India and widely popular in Indian sub-continent. It is important to develop interactive system which comprehend Hindi language. This article presents the implementation of Hindi speech recognition system. The systems have been developed on HTK-Toolkit V 3.4 in Linux environment (Ubuntu 10.04.3 LTS). The Hindi speech recognition system has been developed for 101-word vocabulary size. Each word is uttered for a number of times to capture all the acoustic variability�s. The system has been developed in two parts namely front-end and back-end. Front-end part covers preprocessing and feature extraction while back-end covers acoustic modeling, language modeling and recognition.The comparative analysis shows that MFCC perform better in same training and testing conditions while PLP perform better in mismatch conditions while both the feature extraction techniques outperform LPCC.
Keywords: MFCC, LPCC, PLP, HTK, Hindi Speech Recognition Engine.
Abstract
A Survey on MANET Security Challenges, Attacks and its Countermeasures
Harpreet Singh Bedi, Shekhar Verma, Mohit Goel
DOI: 10.17148/IJARCCE.2016.58129
Abstract: The increase in availability and acceptance of mobile wireless devices has lead researchers to develop an inclusive variety of Mobile Ad-hoc Networking (MANET) protocols to activity the single communication opportunities existing by these devices. Devices are able to communicate directly using the wireless range in a peer-to-peer fashion, and route messages through in-between nodes, however the nature of wireless public communication and mobile devices result in many routing and security challenges which must be addressed before deploying a MANET. Ad-hoc networks have lots of challenges than traditional networks. It has challenges like infrastructures and self organizing networks. They don�t have any fixed infrastructure. In Manets there will be no centralized authority to manage the network. Nodes have to rely on other nodes to keep the network connected. As the ad-hoc network is dynamic and every transmission in these networks become vulnerable to many number of attacks and security becomes a major issue.
Keywords: Mobile Ad-hoc Networking (MANET), peer-to-peer fashion, Bluetooth.
