IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
A Survey on Novel Method for Delegatable Proofs of Storage to Prevent Data Leakage Based on AVL Tree
Rajashri Chandrakantrao Bhongale, Prof. Aarti D. K
DOI: 10.17148/IJARCCE.2018.7102
Abstract:
Cloud computing is widely use in today’s time which removes user’s burden of local data storage. While providing storage it is important to provide security and integrity of the outsourced data. A Proof Of Storage (POS) is the main technique introduced to address this problem. Publically verifiable POS allows the third party to verify data integrity on behalf of the data owner which significantly improves the scalability of cloud service. There are existing publically verifiable POS schemes which are extremely slow to compute authentication tags for all data blocks. In this paper we are proposing a new variant called ‘Delegable Proofs of Storage’. The tag generation process is speed up by at least several hundred times, without sacrificing efficiency in any other aspect. The propose scheme is extended to support fully dynamic operations with high efficiency. We are going to divide data files into blocks and going to use double encryption. Which will obviously provide more security to users data again we are going to divide our data into blocks and store it on different cloud server. So if attackers get access to data on one server, the remaining data will be secure
Keywords:
AVL Tree, Proof of Storage, Delegable Proofs of Storage
A Survey on Adaptive Wildcard Rule Cache Management with Cache Replacement Algorithms for Software - Defined Networks
Kusekar Shrutika Ajaykumar, Prof. H.A.Hingoliwala
DOI: 10.17148/IJARCCE.2018.7103
Abstract:
Software Defined Networking empowers adaptable stream control by reserving rules at OpenFlow switches. Trump card run the show storing empowers administration of movement totals, diminishes stream setup questions, and disentangles strategy administration. Ternary Content Addressable Memory (TCAM) limit issue is a vital issue in Software-Defined Networking. Lead reserving is an effective method to tackle the TCAM limit issue. Be that as it may, there exists run reliance issue in special case run storing procedure. A Cover-set method to solve the rule dependency problem and wildcard-rule caching algorithm to cache rules into TCAM. Cache replacement algorithm considering both temporal and spatial localities.
Keywords:
Software Defined Network, Ternary content Addressable Memory, Wild-card rule
A Survey on CDPCF: Concise Discriminative Patterns Based Classification Framework
Ashwini Shahpurkar, Prof. S B Chaudhari
DOI: 10.17148/IJARCCE.2018.7104
Abstract:
Example based arrangement was initially proposed to enhance the precision utilizing chosen visit designs, where numerous endeavours were paid to prune a colossal number of non-discriminative successive examples. Then again, tree-based models have demonstrated solid capacities on numerous arrangement errands since they can undoubtedly fabricate high-arrange communications between various highlights and furthermore handle both numerical and downright highlights and high dimensional highlights. Simple models such as generalized linear models have ordinary performance but strong interpretability on a set of simple features. There are different series which includes tree-based models, organize numerical, categorical and high dimensional features into a comprehensive structure with rich interpretable information in the data. Frequent pattern-based classification methods have shown to be very effective at classifying categorical or high dimensional sparse datasets
A Survey on Energy Efficient Throughput with Delay Constrained (EETDC) on Shared Access Network
Manisha Vitthalrao Shitole, Prof. Swati Patil
DOI: 10.17148/IJARCCE.2018.7105
Abstract:
In this paper, a shared access network with a fixed primary node and randomly distributed secondary nodes whose spatial distribution takes after a Poisson Point Process (PPP). The secondary node utilizes an irregular access convention enabling them to get to the channel with probabilities that rely upon the queue size of the primary node. Accepting a framework with Multi-Packet Gathering (MPR) beneficiaries, having burst bundle landings in the primary and soaked activity at the secondary, the convention can be tuned to mitigate congestion at the primary. Here define an improvement issue to expand the throughput of the secondary network under delay constraints for the primary node; in the case of no congestion control, the optimal access probability can be provided in closed form. The numerical outcomes outline the impact of network operating parameters on the performance of the proposed priority-based shared access protocol. Here results highlight the impact of system design parameters on the delay and throughput behaviour of the shared access network. Each node has limited battery power in shared access network. Here enhance this concept with Energy Efficient system.
A Survey on Identity-Based Authenticated and Efficient Traceable Search System
Shital Khandare, Prof.H.A.Hingoliwala
DOI: 10.17148/IJARCCE.2018.7106
Abstract:
Secure search over encrypted remote data is crucial in cloud computing to ensure the data privacy and usability. To prevent unauthorized data access and usage, fine-grained access control is important in multi-user system. Whereas, authorized user may intentionally leak the secret key for financial benefit. So, tracing and revoking such malicious user who abuses secret key needs to be solved. The key escrow free mechanism can be used which will effectively prevent the Key Generation Centre (KGC) from unscrupulously searching and decrypting all encrypted files of users. The decryption process involve here only requires ultra-lightweight computation, which is a desirable feature for energy-limited devices. If we figure out malicious user we can efficiently revoke that user. Again if we have, flexible multiple keywords subset search pattern, which will also not affect the order of search result.
Cloud is defined as “A bunch of commodity computers networked together in the same or different geographical locations, operating together to serve a number of customers with different need and workload on demand basis with the help of virtualization”. Cloud services are provided to the Cloud users for some of the useful services including telephone, electricity and water via “pay-as-you-use business model”. Administering the Quality of Service is the primary task of the Cloud Applications. However, maintaining the performance, scalability, availability, reliability and dependability is the challenging task for the Cloud Service Providers.
Analyzing Kerr Effect on WDM Optical Fiber Network with Fiber Bragg Grating
Abhineet Kaur, Atul Mahajan
DOI: 10.17148/IJARCCE.2018.7108
Abstract: Since the event of the first-generation fiber communication systems in the early 80’s, the fiber communication technology has developed quickly to attain larger transmission capability and longer transmission distance, partially because of the increasing demand of network. The demand on the increasing system and network capability is expected to stay as additional bandwidth needed technologies like video conference and real-time image transmission emerge. Although global information management systems are capable of transmitting data at high data rates, they are still faced with many serious problems that reduce the performance of the optical transmission system as these Side effects. In our proposed work we found that parameters play a vital role in the development of the link, some of the values are interconnected with each other. E.g., power and frequency of CW laser are dependent on each other so we have to alter these two with utmost care. Specifications are changed under proper supervision so that not even a single one should be raised beyond the threshold value.
Privacy, Security and Trust Related Issues in Pervasive Computing
Rohit Tiwari, Monika Kohli
DOI: 10.17148/IJARCCE.2018.7109
Abstract:
Our routine life can have a consistent assimilation of automated infrastructure with the help of pervasive computing environments having interconnected devices and services promise. With the possibilities of adding new devices to the herd of pervasive computing devices and developing new and effective applications to enhance functional performance, there is another flip of the coin is there having privacy and security issues in pervasive computing environments, which are, unfortunately, not delved into an appropriate extent. The user experience is made superior by accessing the context information about the resources and users and their physical location by the pervasive computing application, but eventually helping in exploitation, which was not possible in the traditional distributed computing because of its nature of abstracting away the physical location of resources and users. The need of resource sharing and collaboration is giving birth to different types of communication not only amongst users but between the physical and virtual worlds as well. And it is making the separation of physical security from digital security altogether is very difficult. There are so many new vulnerabilities has been exposed by the pervasive computing paradigm and existing policies and security mechanisms cannot provide adequate guarantee do deal with this new environmental exposure. In this paper, the authors are putting their combined efforts to explore the challenges for security and privacy into pervasive computing environments.
“Literature Review on Electricity Generation using Speed Breaker”
Akash Liladhar Gorle, Akash Narendra Patil, Akshay vilasrao Thawale, Shridhar Vinod Giri,Brinda Darjee, Leena . H. Patil
DOI: 10.17148/IJARCCE.2018.71010
Abstract:
In the current situation power has become a basic need for human life. The extensive usage of power has resulted in power crisis, and there is a need to develop methods of optimal utilization, which will not only ease the crisis but also preserve the environment. This paper attempts to show how the power can be generated through the speed breaker. Speed breaker plays very important role in slowing down the traffic and the idea we have come up with the speed breakers is that we can generate power through these speed breakers.
Keywords: Conventional Energy; Electricity; Kinetic energy; Speed breaker
Design an Information Management System for Hospitals of Duhok City Using Android Application System
Hewa Majeed Zangana
DOI: 10.17148/IJARCCE.2018.7101
Abstract:
The proposed system consists of two applications, we made both of them on android system by online, and we made this system especially for hospitals in Duhok governorate. The name of the application is (management hospital) that used for hospital management system, in order to input all information about hospitals, and changing the information too and we made another application which called (Hospital user), this application will be the one which people can use. They can see easily all information by regulation, and that information consist of (name of doctors, specialty of doctors, phone number, holiday days) and we used (rating) in order to evaluate the doctors and used (Search) for searching the name of doctors and epode is made by easier shape and regulation.
A Survey on Semantic Texton Forests for Image Categorization and Segmentation
Nilophar Mullani, Prof. Dr.Arati K.Dandawate
DOI: 10.17148/IJARCCE.2018.71011
Abstract:
The proposed semantic texton forests, efficient and powerful new low-level features. These are troupes of choice trees that demonstration specifically on picture pixels, and along these lines needn't bother with the costly calculation of channel bank reactions or neighbourhood descriptors. They are extremely fast to both train and test, especially compared with k-means clustering and nearest-neighbour assignment of feature descriptors. The hubs in the trees give (I) an understood various levelled grouping into semantic textons, and (ii) an unequivocal neighbourhood characterization gauge. Our second commitment, the pack of semantic textons, consolidates a histogram of semantic textons over a picture locale with an area earlier classification circulation. The pack of semantic textons is registered over the entire picture for classification, and over nearby rectangular areas for division. Counting both histogram and locale earlier enables our division calculation to misuse both textural and semantic setting. Our third commitment is a picture level earlier for division that underscores those classes that the programmed arrangement accepts to be available. We will evaluate on two datasets. Results might be significantly advancing the state-of-the-art in segmentation accuracy, and furthermore, our use of efficient decision forests gives at least a five-fold increase in execution speed.
Design an Information Management System for a Pharmacy
Hewa Majeed Zangana
DOI: 10.17148/IJARCCE.2018.71012
Abstract:
This paper is insight into the design and implementation of a Pharmacy Management System. The primary aim of it, is to improve accuracy and enhance safety and efficiency in the pharmaceutical store. Today management is one of the most essential features of all form. Management provides sophistication to perform any kind of task in a particular form. This is pharmacy information management system; it is used to manage most pharmacy related activities in the pharmacy.
Implementing a System for Recognizing Optical Characters
Hewa Majeed Zangana
DOI: 10.17148/IJARCCE.2018.71013
Abstract:
In the current paper we present a system of characters recognition by taking the photo of character with the identity of symbolic. In the proposed system we are going to make a scan in kind of optical for input character in order to be digitized. After that every character will be segmented and located and after that it will be obtained as a photo to be processed for normalization and even for reducing noise. After that it will be classified. Then from the obtained extraction we can find various techniques like weakness and strengths. Next step will be grouping the characters which identified in order to obtain the original string of symbols and we can apply the context in order to fix and detect false. The results show us that the system is working well and the recognition is really good.
Rich source of information is present in social media. Social media provides meaningful information of gleaning emotions of people and understanding public attitude and mood more deeply. Internet provides a huge platform for exchanging ideas, online learning, sharing ideas on social networking sites such as Google plus, Instagram, Twitter, Facebook. There is huge volume of data in the web with the advancement of web technologies and its growth. Social networking sites give exposure, allow people to express and share their view about the topic discussion with various communities and can post message across the world. Lot of work is been progressed in the field of sentimental analysis of twitter data. The emphasis of this survey is to analyse the in the tweets where opinions are highly unstructured, heterogeneous opinions are either positive, negative or neutral. In this paper we present a survey and comparative analysis of existing techniques for opinion mining. there are two main parts in framework initially, ensemble classifier schema, combines knowledge based, generic domain independent with machine learning methods, used to perceive contents of emotions in user generated data. To model the emotional level of the topic based on emotional recognition, a graph-based method is used to create the topic emotional graph visualizing public moods and emotion on topic. Encouraging results are observed.
Keywords:
Sentiment analysis, Twitter, Predictive Analysis, Affinity analysis, Pre-processing, R Language, Social Network
Rich Approach for Semantic Segmentation using Neuro-Fuzzy Technique
Kanwaljit Kaur, Gurjit Singh
DOI: 10.17148/IJARCCE.2018.71015
Abstract:
Image segmentation is the process of partitioning an image into multiple segments, so as to change the representation of an image into something that is more meaningful and easier to analyse. Semantic segmentation makes an effort to partition the image into semantically meaning parts also to classify each part into one among pre- determined categories. Semantic segmentation may be a classification task. Semantic segmentation is that the task of cluster components of pictures along that belongs to a similar object category.
Keywords:
3D Entangled, Semantic Segmentation, Neuro-Fuzzy Network
Introduce Website about Insights into Housing Markets in Viet Nam
Hoang Tuan Long
DOI: 10.17148/IJARCCE.2018.71016
Abstract:
Nowadays, data has become one of the most important resources in the world, and according to some reports, data have even overtaken oil. In Vietnam, there are still many data resources which still have not been utilized fully such as real estate data. In recent years, people have witnessed a boom in the real estate market with a great number of property projects that can provide the middle class a house to live, and this can also boost the economy in Vietnam. However, despite hundreds of thousands real estate items are created every day, they are just considered as trivial properties posted on a website. Moreover, there are few organizations that are willing to make effort to find out an original approach for utilizing these data. Because of that, in this article, the author introduce a website that can take advantages of real estate sources in Vietnam and provided people who have business in the real estate market a detailed insight into the market.
Privacy Preserving in Data Mining using Bi-party Data Releasing Method
K. Noel Binny, Nisha Varghese
DOI: 10.17148/IJARCCE.2018.71017
Abstract:
Nowadays, tremendous amount of data is created and distributed to different repositories. With reduction in cost of storing information and existing infrastructures such as cloud computing and grid computing, there is the opportunity to extract knowledge or confidential data from that resources. In this topic the privacy preserving in Data mining works with Bi-Party Data Release Method. The exponential mechanism chooses a candidate that is close to optimum with respect to a utility function while preserving differential privacy. In the distributed setting, the candidates are owned by two parties and, therefore, a secure mechanism is required to compute the same output while ensuring that no extra information is leaked to any party. The proposed distributed exponential mechanism takes (candidate, score) pairs as inputs. The score is calculated using a utility function. The proposed distributed exponential mechanism is therefore independent of the choice of the utility function. In the case of vertically-partitioned data, we can use two types of utility functions: First, utility functions such as information gain, maximum function, and the widest (normalized) range of values that can be calculated locally by each party or Second, utility functions that cannot be computed locally. In the latter case, secure function evaluation techniques can be used by the parties to compute these utility functions. Once the scores of the candidates are computed using the utility functions in either case, they are ready to be used as inputs to execute the distributed exponential mechanism. The third party can request the data on the basis of anonymity and can view the data with the digital signatures provided by the both parties.
Automated Vision Wheelchair for the Physically Challenged
Rajath.C, Rushikesh.S.D, Rishab.B, Ruthvik.R
DOI: 10.17148/IJARCCE.2018.71018
Abstract:
In India, more than 2% of the total population consists of people with some physical disability due to which they face problems while handling day to day activities. They face a severe lack of mobility and are dependent on others to help them move around. The system we have proposed here is an automated wheelchair system for the physically challenged that helps them move freely using only their eye pupil movement and thereby gain a sense of independence and self-mobility. The system can go forward, right or left and can stop along with obstacle detection capabilities. The system is simple to use, cost-effective and can be used by a variety of users with different eye shape, size and color.
Keywords:
Raspberry Pi, ZigBee, Arduino Uno, Motor Driver LM293D, Open CV
Intrusion Detection System Survey for Mobile Ad-Hoc Networks
Ms. Priyanshi Jaiswal, Prof. Amit Kumar Sariya
DOI: 10.17148/IJARCCE.2018.71019
Abstract:
Mobile ad-hoc network needs to take major concern of security due to vulnerable open environment and non-stationary mode. Mostly, offenders focus to attack on victim using these venerable points to affect resources and performance of the networks. Kinds of attack targeted on victim nodes which are influence resources actively and passively. Several works have been done to detect and mitigate such kind of attacks, but still some more work required. In this paper, different activity of intrusion and IDS Schemes are discussed.
Keywords:
Mobile Ad-hoc Networks, IDS, Watchdog, Pathrater, AACK
A Review on: Network Load Balancing in Dynamic Data Center
Prof. Nitin Chopde, Shrikant Deshmukh
DOI: 10.17148/IJARCCE.2018.71020
Abstract:
Achieving efficient resource utilization and guaran-tees of required performance in data centers is difficult. Efficient load balancing, on various parts of data center, is the key to overcome these problems. This paper presents load-balancing in two parts of the data center: network traffic load balancing and virtual server load balancing. We review some of the proposed load balancing systems, and discuss their advantages and challenges.
Keywords: Network traffic load balance, Data center network, served system, virtual server load balance and load balance mechanism.
In today's era everyone is trying to be conscious about health although due to workload and busy schedule one gives attention to the health when it shows any symptoms of some kind. But CKD is a disease which doesn't shows symptoms at all or in some cases it doesn't show any disease specific symptoms it is hard to predict, detect and prevent such a disease and this could be lead to permanently health damage, but machine learning can be hope in this problem it is best in prediction and analysis. By using data of CKD patients with 14 attributes and 400 record we are going to use various machine learning techniques like Decision Tree, SVM, etc. To build a model with maximum accuracy of predicting whether CKD or not and if yes then its Severity.
Investigating Optimization Strategies that Determine Performance of CMS Websites in Organizations
Samuel K. Shitote, Dr. Kelvin. Omieno, Dr. Jaspser. Ondulo
DOI: 10.17148/IJARCCE.2018.71022
Abstract:
Web Content Management Systems (WCMS) have evolved over years from very primitive systems to complex and robust intelligible systems. These systems provide the ability to maintain and navigate the structure of a website and allow the developers to design websites more easily, hence making content publishing on the internet fast and easy. Due to the complexity of CMS, most corporate websites tend to experience performance downside. Studies reveal that a lot is being done to improve websites performance. Several web optimization techniques have been adopted to reduce pageloadtime and much has been achieved but as the web content keeps on growing, performance is lowering. This study tries to address the CMS website performance gaps by providing strategies that can achieve better performance.. The study employs experimental research design. Joomla, Wordpress and Drupal CMS were used in the experiment to represent the most popular CMS used in organizations. The experiments were done in Moi university labs. Optimization process was achieved using GTMetrix and GiftOfSpeed online tools. The findings were that: Image optimization, CSS/JS & HTML Minificaition, Caching, mobile optimization had significant impact on CMS website performance. A combination of these techniques results to web optimization strategies that will improve CMS website performance
Farming helps to meet the basic needs of human and their civilization by providing food, clothing, shelters, medicine and recreation. Hence, agriculture is the most important enterprise in the globe. Agriculture provides food, feed, fibre, fuel, furniture, raw materials and materials for and from factories; provides a free fare and fresh environs, abundant food for driving out dearth; favours friendship by eliminating battle. One of the reasons for the shortage of food across the country can be choice of unsuitable crop for cultivation. The proposed project will contain information of different crops and will suggest the granger crop which is suitable for cultivation based on the geographic area and climatic status such as temperature, moisture and humidity by making use of different sensors.
Trust Based Approaches of Intrusion Detection Architecture for Wireless Sensor Networks: A Survey
Jeelani, Manoj Rana, Subodh Kumar and Aasim Zafar
DOI: 10.17148/IJARCCE.2018.71024
Abstract:
Wireless Sensor Networks (WSNs) consists of tiny sensor nodes deployed in various geographic conditions to gather the information about the environment. The Intrusion Detection Architecture (IDA) in Wireless Sensor Network is used to detect various attacks occurring on sensor nodes of WSNs that are placed in various hostile environments. In the last few years, many innovative and efficient approaches have emerged in this area, and we mainly focus our attention on Trust based approaches of Intrusion Detection Architecture. In this article, our focal point of consideration is on Intrusion Detection Architecture for Wireless Sensor Networks. In addition, we present the security attacks and comparison of various Intrusion Detection Architectures.
An Interoperability Framework for E-Government Heterogeneous Information Systems
Hillan Ronoh, Kelvin Omieno, Stephen Mutua
DOI: 10.17148/IJARCCE.2018.71025
Abstract:
Information Communication and Technology (ICT) utilization has become a backbone of e-government implementation. Six components of information system (hardware, software, people, data, process and network) are combined to deliver information from government to their citizen as part of public services. However, there is an interoperability challenge on e-government implementation related to information system. Organizations in Kenya have automated processes and digitize services and information using various information systems e.g. IFMIS systems which acts as a financial management of government departments. These systems due to different vendors and their use of different storage types, data formats, languages and middleware platform have become diverse, thus the issue of e-government information system heterogeneity and interoperability. This has led to the need for organizations to share information and services through interoperability platforms. Currently most e-government platforms are independent thus result to lack of integration, inconsistency of meaningful data, redundancy of effort and lack of integration. The main aim of this Study was to develop an interoperability framework for e-government information system which will improve efficiency and effectiveness of government services through accurate information among various information systems while the specific objectives were to identify the factors that affected e-government information system interoperability, determine the critical factors that influenced e-government information system interoperability. The Research design used was exploratory study of both national and county governments in Kenya. It focused on the way public organizations managed identity-related data and the sharing of such data, either with other public agencies or with private organizations. The study adopted a mixed methods approach where both quantitative and qualitative data was used. Quantitative data was analyzed descriptively based on the information from the questionnaire and based on the research questions. Factor analysis was conducted on the two sets of data. The target population was users of e-government information systems in county government and government ministries in Kenya. The study sample was drawn from two county governments and two huduma centres in Kenya. Descriptive statistical analysis and principal component analysis was used. The findings of this study will be essential to both the government and county governments in improving efficiency and effectiveness of government services and also form a basis for future development of interoperability of e-government information systems. The framework was successfully accepted by the experts who were interviewed by the researcher. The framework recombines interoperability framework of e-government in guiding decision makers to better manage issues related to e-government information system interoperability.
Keywords:
Information system, Heterogeneity, Interoperability, e-Government information systems, IFMIS
Enhanced Automatically Mining Facets for Queries and Clustering with Side Information Model
V.Yasvanthkumaar, Dr.G.Singaravel
DOI: 10.17148/IJARCCE.2018.71026
Abstract:
In text mining applications, side-information is obtainable at the side of the text documents. Such side-information types are document provenance data, the links within the document, user-access behavior from net logs, or alternative non-textual attributes that are embedded into the text document. Such attributes might contain an incredible quantity of data for bunch functions. However, the relative importance of this side-information is also tough to estimate, particularly once a number of the data is noisy. In such cases, it is risky to include side-information into the mining method; as a result of it will either improve the standard of the illustration for the mining method, or will add noise to the method. Therefore, a principled means is needed to perform the mining method, thus on maximize the benefits from mistreatment this aspect information. The proposed system developing an application for recommendations of reports articles to the readers of a news portal. This paper designs an algorithmic rule which combines classical partitioning algorithms with probabilistic models so as to form an efficient clustering approach.
Keywords:
Data Mining, Ontology Mining, Classification Model, Clustering, Automatic Analysis
AXI Interface with a Multiple Master and Slave through Interconnect
Mr. Mukesh Kumar Yadav, Dr. R.K.Paliwal, Dr. K.C.Mahajan
DOI: 10.17148/IJARCCE.2018.71027
Abstract:
AMBA protocols are today the de facto standard for 32-bit embedded processors . The AMBA AXI protocol supports high-performance, high-frequency system designs. It is suitable for high-bandwidth and low-latency designs and provides high-frequency operation without using complex bridges. It provides flexibility in the implementation of interconnect architectures and is backward-compatible with existing AHB and APB interfaces. This Project is aimed at the Verification of the AMBA based AXI protocol has an additional write response channel to allow the slave to signal to the master the completion of the write transaction AXI protocol has an additional write response channel to allow the slave to signal to the master the completion of the write transaction. This slave interface can be used to connect different peripherals into AMBA based processors.
Keywords:
Advanced Microcontroller Bus Architecture (AMBA), Advanced Peripheral Bus (APB), AMBA High-performance Bus (AHB), Advanced Extensible Interface (AXI), Sysytem on Chip (SoC)