IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
Blockchain is introduced as the basic technology of cryptocurrency, with characteristics of decentralization, stability, security, and immutability. Because there is no authority on the peer-to-peer network, the consensus mechanism is essential to make distributed peers reach an agreement on some data value. Including Proof-of-Work mechanism of first implementation of blockchain cryptocurrency, Bitcoin, several consensus mechanisms are introduced to meet the requirements of several kinds of applications. In this paper, we study some representative blockchain consensus mechanisms, analyse their characteristics, and consider matching between applications and consensus mechanisms.
Keywords:
Blockchain, Consensus, Permissionless, Permissioned, Requirements of Applications.
Increasing number of vehicles in the city is one of the major issue. In every country the population are growing very fast because of that it is very necessary to control the traffic. Traffic monitoring becomes the challenging task. The fast growing traffic increases the different problems like traffic jams, congestion and accidents. It is very necessary to improve the traffic management. We have to use advance version of techniques to improve the traffic management. This paper propose the different algorithms which is used to detect the vehicles and it is very help full for control the traffic. For controlling the traffic or related problem it is necessary to know the exact or approximate number of vehicle count so this paper gives the overall view of different algorithms which is used in density count. And these algorithms are helpful in traffic management.
Keywords:
Traffic management, Vehicle count, road traffic, Median filter, congestion.
Compact and High Speed Hardware Implementation of CLEFIA
Pankaj V. Jadhav, Vishnu Suryawanshi
DOI: 10.17148/IJARCCE.2018.763
Abstract:
Since 19th century, we were get aware of the process of communication. But, from the last 3 or 4 decades we knew how the communication is essential for entire living. It is just a process of conveying information from one end to another. One end is known as transmitter and other a receiver. For the success of communication, there should be presence of these both. As the use of this process goes on increasing, different methods or strategies were established. Afterwards the human being experienced that, not only the communication is important but also its safety is important. To achieve safety of communication many methods are used. But, the best method while using communication is Cryptography. Clefia is one algorithm used in Cryptography. It is 128 bit block cipher algorithm. This paper presents the different work done on Clefia by different authors. Also it proposes a method for the implementation of Compact and High Speed Hardware of CLEFIA.
SDDA: An Implementation of Secure Data Deduplication Approach for Cryptographic Data Storage
Akanksha Upadhyay, Pooja Meena, Chetan Agrawal
DOI: 10.17148/IJARCCE.2018.764
Abstract: Perhaps, today’s need to secure end user data on storage server with full of security where user can retrieved or manage data without any vulneraries. So that this issues of data security and maintained data without storing multiple copies of same data is essential to overcome. Therefore, in this thesis work, we proposed a mechanism named “Secure Data Deduplication Approach i.e. SDDA” using cryptographic technique which ensure user authenticity and maintained data deduplication on storage server for the same data. For this perform we implement cryptographic algorithm as MD5 for hash Key generation and SHA1 Algorithm. For Data Encryption we use AES Algorithm where key generated by SHA1 is pass to AES algorithm. Additionally the small chunks of the encrypted data are prepared. These chunks of data are further used with the markle hash tree algorithm using SHA1 algorithm. Firstly, data will be check using MD5 generated hash key. After this, individual block of data is verified by the available data using markele has tree if the data is available then data is duplicate and need not to upload, otherwise the data is uploaded to server. According to the experimental results the proposed SDDA method provides better security approach and facility to store data on server with scalability and availability. The performance of the system is measured in terms of encryption, decryption time and memory respectively.
Keywords:
Cloud Storage, Data De-duplication, Data Privacy, AES, Cloud Server, Cloud Security, MD5, Merkle Hash tree.
This paper presents GPU based CUDA framework that is efficiently and accurately detect unattended object from surveillance video. The system focuses on the problem of finding the unattended object in public places such as shopping mall, airport, railway station etc. In a recent year, GPU has attracted the attention of many application developers as powerful massively parallel system. CUDA as a general purpose parallel computing architectures that makes GPU is an appealing choice to solve many complex computational problems in a more effective way. The processing of surveillance video is computationally intensive. This paper describes parallel implementation of video object detection algorithms like Gaussian Mixture Model(GMM) for background modeling, morphological operation for post processing. SVM classifier is used for unattended object detection. Experimental evaluation shows that parallel GPU implementation achieves significant speedup for GMM and Morphological operations when compared to sequential implementation running on Intel Processor.
High Performance Delta-Sigma Modulator for Neurosensing
Anil Kumar Sahu, Sapna Soni
DOI: IJARCCE.2018.766
Abstract:
Recorded neural knowledge are often corrupted by massive amplitude artifacts that are triggered by a range of sources, like subject movements, organ motions, electromagnetic interference's and discharges at the electrode surface. to forestall the system from saturating and therefore the electronics from non functioning because of these massive artifacts, a large dynamic vary for information acquisition is demanded, that is kind of difficult to attain and would need excessive circuit area and power for implementation. in this paper, we tend to present a high-performance Delta-Sigma modulator beside many design techniques and enabling blocks to cut back circuit area and power. These competitive circuit specifications create this design a decent candidate for building high preciseness neurosensory.
Design & Implementation of Mobile Jammer with Prescheduled Time Duration
Dr K Rameshbabu, Mr Misay.Mangisthu, Mr. Mogos, Birhanu, Wondosen
DOI: 10.17148.IJARCCE.2018.767
Abstract:
Mobile jammer is used to prevent mobile phones from receiving or transmitting signal switch the base stations. It is effectively disable mobile phones within the defined regulated zones without causing any interference to other communication means, like television and radio broadcasting systems. It can be used in practically any location, but are used in places where a phone call would be particularly disruptive like Libraries, Hospitals, Cinema halls, schools & colleges, etc. As with other radio jamming, mobile jammers block mobile phone use by sending out radio waves along the same frequencies that mobile phones use I.e. for 900 MHZ and 1800 MHZ. This causes enough interference with the communication between mobile phones and communicating towers to render the phones unusable. Upon activating mobile jammers, all mobile phones will indicate "NO NETWORK" in the necessary places. When the mobile jammers are turned off, all mobile phones will automatically re-establish communications and provide full service.
It was originally developed for law enforcement and the military to interrupt communications by criminals and terrorists to foil the use of certain remotely detonated explosives. The signal isolator contains IF and RF section. IF section is used to generating tuning signal for feeding the RF section. The RF section is amplified the tuning signal and distribute the signal to surround air through antenna. The income (downlink) calling and jamming signal cancelled each other before interring to a phone.
In this project, its controlling this mobile jammer by means of PIC16F77 microcontroller IC. Language which is used embedded C language. compilation this program is in microC and finally our simulation is assembled through Proteus. The activation and deactivation time schedules can be programmed with microcontroller. Real time clock chip DS1307 is used to set the schedules and used triple output regulated AC to DC power supply.
Keywords:
Mobile jammer, jam zone, no network, scheduled jammer etc.,
A Robust Method for Recognition of De-Authentication Dos Attacks
Manish Tyagi*, Seema Narvare, Chetan Agrawal
DOI: 10.17148/IJARCCE.2018.768
Abstract: In this paper we look into the deauthentication Denial of Service (De-DoS henceforth) attack in 802.11 Wi-Fi networks. The attack is very serious in nature, as the usage of few system resources can actually disconnect the Wi-Fi clients connected to the network facing immediate disconnection. The primary reason for this attack is the MAC layer vulnerabilities that exist in 802.11 Wi-Fi networks. Many current solutions to deal with De-DoS attack propose usage of digital certificates, using encryption, up-gradation of standards, and other cumbersome solutions which are difficult to deploy and increase the maintenance costs. In De-DoS attack and attacker sends a large number of deauth frames targeting a set of clients. All the client receiving this deauth frames are immediately disconnected from the network. In this paper we propose a Machine Learning (ML) based Intrusion Detection System (IDS) to identify the De-DoS attack in Wi-Fi network. The proposed solution is effective and has high detection rate and accuracy and does not have the problems associated with the existing solutions.
A Neural-Fuzzy SOM Based Approach On Brain Tumor Detection From MRI Images
Nikita Sarawat, Neeraj Kumar
DOI: 10.17148/IJARCCE.2018.769
Abstract:
In this paper, presents an effective strategy for brain tumor characterization, where, the brain tumor pictures are arranged into typical normal, non-dangerous (Benign) brain tumor and destructive (Malignant) brain tumor. This paper introduces an efficient method approached of brain tumor classification and segmentation, where, the brain tumor images are generally classified into a normal or non-cancerous (benign) brain tumor detection and cancerous (malignant) brain tumor detection. The proposed method follows three steps, (1) pre-processing for Gaussian filter, (2) textural feature extraction for glcm and (3) SOM classification. Gaussian filter is first utilized utilizing for evacuate commotion the brain picture into various levels of rough and itemized coefficients and after that the dim level co-event matrix is framed, from which the surface measurements, for example, vitality, differentiate, relationship, homogeneity and entropy are achieved. The results of co-occurrence matrices are then fed into a SOM (self-organizing map) for further classification and tumor detection with fuzzy partition matrix clustering and segmentation.
Keywords:
GUI, MRI, SOM Technique, Fuzzy logic, Confusion Matrix, Benign, Malignant
A Review on Arm7 Based Accident Detection Using GSM, GPS and MEMs
Prof. Anap S.D, Prof. Gaikar M.R, Prof. Rane D.B
DOI: 10.17148/IJARCCE.2018.7610
Abstract:
Traffic accidents are one amongst the leading causes of fatalities in most of the countries. a vital indicator of survival rates when AN accident is that the time between the accident and once emergency medical personnel are sent to the scene. Additional the quantity of vehicles, additional is chance of accidents. The govt. has undertaken variety of initiatives and lots of awareness programs however accident rate remains high. This project is concerning creating cars additional intelligent and interactive which can advise or resist user beneath unacceptable conditions. This technique provides vital data of real time things to the closest station house and hospital to bring the machine to the spot to rescue the passengers or owner himself. Driver fatigue ensuing from sleep deprivation or sleep disorders is a vital considers the increasing variety of accidents on today's roads. The most elements of the system encompass variety of sensors like optocoupler, alcohol, ultrasonic, MEMS, GSM and a software package interface with GPS and Google Maps Apis for location. This installed framework demands for crisis administrations at whatever point the vehicle met with mishap, and system avoids unneeded emergency requests just in case of safe condition of passengers at that state of affairs.
Obtaining a Feasible Path with Maximum Flow Rate in a Network
Shreekant Jere
DOI: 10.17148/IJARCCE.2018.7611
Abstract:
This research work proposes an algorithm to find a path which has the maximum allowed flow rate for data, between source and destination in a network. Unlike max-flow and min-cut theorem, algorithm is selecting single path for data transmission. To find a path in a network there are multiple techniques. Prim’s technique is used recursively in our proposed algorithm to find different paths between source and destination. The maximum allowed flow rate for each of those paths is calculated and finally we take the maximum of those calculated flow rates.
Keywords:
Maximum flow rate; max-flow and min-cut theorem; Prim’s algorithm.
Data Cleaning of Medical Datasets Using Data Mining Techniques
Usha T
DOI: 10.17148/IJARCCE.2018.7612
Abstract:
Data cleaning is a process that detects and removes the errors and inconsistencies in the data in order to improve the quality of the data. To have a high data quality, data quality problems has to be solved. Data quality problems exist in single and multiple source systems. A single source problem refers to the errors, inconsistencies, missing values, uniqueness violation, duplicated records and referential integrity violations. Multiple source problems are structural conflicts, naming conflicts, inconsistent timing and aggregating. In this paper, data quality problems such as duplication, missing values and attribute correction are solved by implementing different algorithm using data mining techniques.
Keywords:
Data cleaning, Duplication, Missing data, Attribute correction, Levenshtein distance.
Intrusion detection system is a derived barrier of resistance which observes the standard actions of the client for any unspecified or unbalanced act, either inside the network or inside the Host. Intrusion detection systems elevate alarms for anomaly recognition in addition to misuse recognition. It could be applied as a federal as well as distributed setup. It fundamentally observes the internet log for network actions and application, structure and data server logs for host related actions. The rationale of this work is to represent an inventive scheme that presents outcomes of suitably classified and wrongly categorized as fractions and the attributes selected. During this research we enlightened the method “A Machine Learning Approach for Intrusion Detection System” which is advised to develop the fitness of discovery of intrusion pertaining variety of Machine learning algorithms on KDDCUP99 data set. During the experimentation we make use of Adaboost, JRip, NaiveBayes and Random Tree classifiers to classify the variety of attacks from the KDDCUP99 data set. The implementation outcomes study of proposed algorithm exhibit that the used machine learning algorithms offers maximum Receiver Operating Characteristics (ROC) to 99.9 %.
Keywords:
Classification, Data Mining, NIDS, Cyber Security, Kdd Cup 99, Machine Learning.
Microblogging Content Propagation – Hybrid Propagation Models and Analysis
N. Baggyalakshmi, Dr. A. Kavitha and Dr. A. Marimuthu
DOI: 10.17148/IJARCCE.2018.7614
Abstract:
Micro-blogging is a type of social networking deal that has develop permeating in Network 2.0 era. Micro-blogs agrees bloggers to interchange data, deliberate concepts, and stake capabilities with groups or even guests with analogous safeties. Due to the growth of situates similar Facebook, Twitter, and Weibo, administrative statistics is extra and further habitually encountered in a social context: even stories published by mainstream media sites are often encountered by users after having been mutual by others. Obviously, this social environment can impact how data is construed and re-shared. In recent times, there has been an extreme pact of attention in questioning inherent configurations in posts on microblogs such as Facebook, Twitter. While many works consume a well-known topic exhibiting technique, we instead suggest to apply a Hybrid Propagation Model and Hybrid Propagation Analysis in Microblogging. In propagation model use Affinity, Modeling and Visualizing Information Propagation. In analysis side virality and susceptibility type of techniques used. The Microblogging propagation model system shows the propagation paths and social graphs, influence scores, timelines, and geographical information among people for the user-given terms. Propagation analysis, based on this framework, it develop a numerical factorization model and another probabilistic factorization variant. The work also develop an efficient algorithm for the models’ parameters learning.
A Survey of Rule based Tag Recommendation for Image
Harshada A. Karande
DOI: 10.17148/IJARCCE.2018.7615
Abstract:
Tag recommendation is focused on recommending useful tags to a user who is annotating a Web resource. A relevant research issue is the recommendation of additional tags to partially annotated resources, which may be based on either personalized or collective knowledge. Analyzed tag collection can be stored in different abstraction level by applying GENIO algorithm in generalized association rule mining on it. Association between two levels find out by WordNet lexical database. Tag selection and Ranking algorithm assign the desirable tags to the image. The use of the generalizations in rule-based tag recommendation yields significant performance improvements.
Keywords:
Tag recommendation, Generalized association rule mining, Rule-based systems.
Visual content is becoming a major medium for social interaction on the internet, including various popular platforms like Flickr, Instagram and Facebook. Increased attention has been obtained by the visual sentiment analysis due to the rapidly grown number of images in online interactions. Several applications such as advertisement, education and entertainment emerged because of the development in this field. Most work reported in the literature focuses on competent techniques for object recognition and its applications. This paper includes various approaches that have been used by different researchers for object detection.
Keywords:
Visual Content, Computer Vision, Social Multimedia, Object Detection.
A Comparative Analysis of Shortest Path Algorithms on GPU using OpenCL
Dharmendra Sansaniya, Sanjay Keer
DOI: 10.17148/IJARCCE.2018.7617
Abstract:
Shortest path algorithms find applications in wide domains. But to provide result for complex graphs in real time is a challenging task. So in this paper four shortest path algorithms namely Dijkstra’s algorithm, Floyd Warshall, Bellman Ford and Jhonsons algorithm are studied and analyzed to detect parallelism in them and the parallelized version of all three is implemented using parallel computing framework OpenCL. It is found that Bellman Ford and Floyd Warshall contains fine grained parallelism while Jhonsons has less parallelism.
Many of the real world problems are solved by the electronic world jointly with the computational science. The research paper aims in designing the unique advanced technology aided security system specially designed for safety of women (also useful for children safety). Here, it is mainly focused and designed for women employees of metropolitan cities for their safety considering the problems they face such as robbery, kidnap, sexual harassment, rape, etc… which nowadays are decorating the first page headlines of the newspapers.
Individual well being is a standout amongst the most essential worries for ladies, as wrongdoing against ladies has not diminished. These days, different gadgets are accessible in business sectors which claim to ensure ladies from numerous points of view. Still there emerges the need of a defensive gadget which goes about as a watchman at time of an assault.. A smart security wearable device for women based on Internet of Things is proposed. It is implemented in the form of a smart ring and comprises of Raspberry Pi, Raspberry Pi camera, buzzer and buttons to activate the services. This device is extremely portable and can be activated by the victim on being assaulted just by the click of a button that will fetch her current location and also capture the image of the attacker via Raspberry Pi camera. The location and the link of the image captured will be sent to predefined emergenacy contact numbers or police via smart phone of the victim thus preventing the use additional hardware devices/modules and making the device compact.
Keywords:
Raspberry pi zero, GPS, Smart ring, raspberry pi camera, android application
Optimization Of A Full adder Based On FinFET Technology
Utkarsh Tripathi, Ms.Tamanna Ashraf Siddiqui
DOI: 10.17148/IJARCCE.2018.7620
Abstract:
In this paper, an adder circuit are designed in which full adder cmos is included, are designed using MOSFET in 32nm Technology length and in FinFET Technology with 28 transistors in MOSFET and FINFET. Then, they are simulated using HSPICE and the performance parameters of adder such as average power and delay are determined in both FinFET and MOSFET counterpart. It is observed that FAFINFET gives best results in the form of Average Power consumption and delay.
Optimization of Data Aggregation & Transmission in Wireless Sensor Network
Yogesh, Mr. Manoj Awana
DOI: 10.17148/IJARCCE.2018.7621
Abstract:
Wireless Sensor Network is one of most common adhoc network with lot of problems related to congestion and routing. This work provides one of the solutions to optimize the transmission over the network by combing multiple route data from one path. In this work focusing on optimizing over both transmission and aggregation costs has been done, also develop an online algorithm capable of dynamically adjusting the route structure when sensor nodes join or leave the network. Furthermore, by only performing such reconstructions locally and maximally preserving existing routing structure, the purposed approach is the solution to reduce the traffic over the network by collecting multiple routes data in once combined route.
A Weighted Control Multipath Transmission Model for Wireless Sensor Network
Buta Singh, Kulwinder Singh, Amit Kumar
DOI: 10.17148/IJARCCE.2018.7622
Abstract:
In Wireless Sensor network communication take place between moving Sensor Nodes in a definite environment. Remote Sensor Networks fundamentally comprises of hubs known as sensors. Sensors are gadgets with low vitality as they work on battery, having restricted memory and preparing capacity and are intended to survive extraordinary natural conditions. These are generally because of their little size. They are additionally highlighted with self-arranging and self-mending power. A Wireless sensor arrange is an arrangement of moderate battery-controlled gadgets the sensors which are sent to identify occasions which are of a predefined way and sending detected data to the BS for considerably more contemplation. They have coordinated figuring, detecting, and remote correspondence capacities. It has been watched that WSNs have enormous possibilities for a significant scope of uses like - military checking, observing the encompassing, foundation and office finding, and so forth. It is normal that WSNs have slightest conceivable aggregate vitality utilization and that they adjust vitality utilization for singular sensor hubs. the proposed technique shows better result in life time of cluster head and better transmission
E-Marketing Adoption among Small Businesses in the Hospitality Industry in Kenya: The Institution Theory Perspective
Charles Owuor Omoga, Dr. George Raburu, Dr.Samuel Liyala
DOI: 10.17148/IJARCCE.2018.7623
Abstract:
Small sized businesses play an important role in the growth of economies all over the world, yet they appear to be slow in adopting E-marketing technology to market their products and services which may lead to business failure. This study sought to investigate the interrelationship between Coercive, Mimetic and Normative pressures and e-marketing adoption intention. A cross sectional survey design was employed on a target population of 150 small businesses in the hospitality industry in Kisumu County-Kenya. Stratified random sampling method was used to generate the sample of 115 small businesses. Primary and secondary data were collected using questionnaire and already existing literature respectively. Instrument reliability assessment was confirmed using Cronbach’s alpha.The data was analyzed using descriptive and inferential statistics using WarpPLS v.5 software. The results for Mimetic pressure indicate a positive relationship with e-marketing adoption intention (β=0.176, p=0.019). Normative pressure had a positive relationship with e-marketing adoption intention (β= 0.354, p<0.001). However there was no inter-relationship between coercive pressures and intention to adopt e-marketing (β= 0.106, p= 0.133). Policy makers may find these results useful for future policy formulations regarding adoption of e-marketing among small businesses.
With the growing internet technology, the number of intruders trying to steal the confidential information has grown exponentially. In the recent past, hybrid mechanisms that use steganography mechanism to hide the encrypted data are proposed. The salient features that these hybrid security mechanisms should posses are high Peak Signal to Noise Ratio (PSNR), data embedding capacity, entropy and low computational time. This thesis also proposes a hybrid security mechanism that emphasizes on embedding capacity and entropy. To improve randomness, the use of chaos process wherever possible is done while for improving embedding capacity the steganography process employed is Improved Bit Plane Complex Steganography (IBPCS). In addition, for efficiency improvement hierarchical visual cryptography is used. The scheme is implemented in MATLAB-10 and several performance metrics are used to evaluate the efficacy of proposed technique in comparison with others in literature. The results show that the proposed mechanism has high embedding capacity and high security with moderate decrease in PSNR value.
Identity-Based Encryption Approach to provide Confidentiality and Authentication in Publication / Subscription system without an Intermediary
Ms. Prerna Umalkar, Prof. N.D.Kale
DOI: 10.17148/IJARCCE.2018.7625
Abstract:
In a publication / subscription system based on content, authentication and confidentiality are very demanding. Due to the free coupling of publishers and subscribers to obtain the authentication of publishers and subscribers, it is very difficult, for example, the identification / authentication of the user and the confidentiality of the transmitted data are the main challenges that most systems faces in distributed. The existing subscription system uses intermediaries, but there are still some problems with message delivery. This document uses the identity-based encryption approach to provide confidentiality and authentication in a content-based publication / subscription system without an intermediary. There are three main objectives for the secure publication / subsystem system that must be compatible with authentication, privacy and scalability. Our system stores only unique events by using hash mechanism. To achieve security, the event is dividing into multiple fragments and instead of storing on single node, fragments stores on multiple nodes.
In today's world, humans exchange information mainly through books or some digital media, which have everything written or printed on them. But to access these sources, a person mainly needs to have vision. However, for people who are deprived of vision, gathering information is mainly done by listening. To process the speech for a huge range of applications, continuous efforts have been taken. Speech recognition and its conversion to text has been extremely useful in many applications. In the field of electronics and computers, speech is not used much due to its complexity and variation in accents of the individual. However, with the help of complex algorithms and methods we can process speech signals to convert to text. This paper deals with the translation of speech from one language to another language using Raspberry Pi. This application is quite useful for Blind people. The code for the application program is written using Python programming language and embedded in Raspberry Pi. This application developed of conversion of speech from one language to another language can be the most useful and flexible approach.
Keywords:
Language Learning for Blind, Foreign Language Learning, Speech Recognition, Speech to text display, Raspberry Pi.
Abstract: The importance of industrial safety is very much important now days because of the fact that every year industrial accidents occur which consequences in loss of production time. Industrial safety is important as it protects human life, especially in high risk areas such as nuclear, petroleum industries, chemical, oil and gases, and mining industries, where a lethal mistake can be disastrous. We are developing a system which will semi Automatically control and monitor the industrial parameters like temperature, humidity, movement of various industrial tools using IOT concept to provide the industrial safety and avoid the accident. In this paper, we are developing a system which will automatically monitor the industrial parameters and generate Alert or take intelligent decisions using concept of IOT. IOT has given us an auspicious way to form powerful industrial systems and applications by using wireless devices and sensors.
Mitigation of ISSDF Attacks by using Mobility and Context Aware Trust Management Algorithm
Headar Tarsh Batool, Prof.Dr. R.S.Kawitkar
DOI: IJARCCE.2018.7628
Abstract: The dynamic spectrum access in Cognitive Radio Networks (CRNs is found, in which Secondary Users (SUs) can use the licensed spectrum bands which are based on opportunistic non-interference. These networks are based on efficient cooperation between the secondary users (USs) in its operation regarding the spectrum sensing. Many kinds of attacks can affect on performance of CRNs very harmful, one of these types is the Insistent Spectrum Sensing Data Falsification (ISSDF) attack. Many recent studies proposed methods based on trust management to face such attacks, but these methods were not enough to alleviate such attacks especially in the dynamic environment where primary users (PUs) repeatedly transitions between active and inactive state. In this paper we propose a novel technique efficient ISSDF attack alleviation method for the Distributed Cooperative Spectrum Sensing (DCSS) in the Cognitive Radio Ad Hoc Networks (CRAHN). The proposed method is based on mobility aware technique for energy efficient ISSDF attack mitigation along with context aware distributed trust method. The SU nodes analyse the trustworthiness with each other using PU absent and present contexts in which they make observations from each other by considering mobility and energy values of SUs. The utilization of energy values and mobility of SUs helps to extend the network operational lifetime while dealing with ISSDF attacks.
Keywords: Secondary Users, Insistent Spectrum sensing data falsification, Primary User, Cognitive Radio Ad hoc Networks, Context aware, mobility aware
Abstract: Ultrasound image plays a vital role in medical profession as this is the best approach to look inside the body structure without any cuts and without any use of much expensive equipments. Ultrasound imaging is less expensive, safe, accurate and good in forming real time imaging. Image acquisition is based on the principle that when ultrasound waves travel through tissues, they are partly reflected back as echoes to the transducers. The major issue associated with ultrasound imaging is that it may corrupted by speckle noise during image acquisition. Hence it is necessary to de-speckle the medical images like ultrasound images, so that the effective and reliable decision can be taken on the basis of acquired images. There are various methods that have been developed in the past and still the research is going on.Traditionally the LBP i.e Local Binary Pattern was used for de-speckling the ultrasound images. After having the review to the problem with existing techniques the proposed work aims to replace the traditional LBP method with CLBP, which is an enhanced version of LBP technique. CLBP i.e Compound Local Binary Pattern, this method is considered to be efficient and more accurate than the traditional methods. From the results obtained it is concluded that the new methods is accurate and efficient than the traditional methods of ultrasound image de-speckling.
Keywords: Ultrasound images, Speckle noise, Local Binary Pattern, Compound Local Binary Pattern.
Secure Collaborative Contact Based Watchdog for Detecting Selfish Nodes in MANET using Hash Chain Technique
Sonal Jitendra Patil
DOI: 10.17148/IJARCCE.2018.7630
Abstract: Mobile Ad hoc Network (MANET) is composed of mobile nodes which are connected by wireless links using without any pre-existing infrastructure. In network some nodes cooperate in order to work properly but some nodes not cooperate unwilling to forward packets to other nodes behave like selfish, leading to selfish node behavior. This leads to overall performance degradation. Watchdog detects selfish nodes it leads to wrong detection of false positive and false negative. More advanced technique is collaborative contact based watchdog technique based on diffusion of selfish node information when contact occurs but this approach doesn’t provide security like node authentication. This paper proposed secure collaborative contact based watchdog using hash chain it provide security in network to giving node authentication and reduces the effect of malicious nodes.
OFDM using Steering Sinusoids for Underwater Acoustic Communication
Amey R. Kulkarni, Dr. Vaibhav V. Dixit
DOI: 10.17148/IJARCCE.2018.7631
Abstract:
Among the different modulation techniques used for acoustic communication underwater, Orthogonal Frequency Division Multiplexing (OFDM) still happens to be the best and an extremely effective modulation scheme. However, the major hurdle which the Under Water Acoustic (UWA) communication encounters is the challenges posed by the dynamic nature of the sea, which degrade the quality of the signal. The non-uniform effects of the sea dynamics due to wind or platform motion may result into inter-carrier interference causing a complete distortion of the signal. To avoid such distortions, relative changes in terms of Doppler factors need to be tracked properly and included in the system designing. Adapting to this ideology, a new OFDM approach based on Steering Sinusoids has been introduced in this paper. The Steering Sinusoids will be able to track and correct the fast oceanic variations incurred within a symbol length. These recorded changes, either uniform or non-uniform, are used to reduce the intensity of the Doppler spreads. The proposed system can be analyzed using the MATLAB simulation along with self-induced Doppler. Bellhop Ray tracing algorithm has been used for generating static multipath channel models.
Auditing Techniques for the Maintenance of Data Integrity in Cloud: The Review
Misbah U.Mulla, Prabhu R.Bevinamarad
DOI: 10.17148/IJARCCE.2018.7632
Abstract: The cloud computing allows the data owners to store their data remotely so that data users can access the data more easily and efficiently, the data owners are relieved of the task of holding the huge amount of data on their local storage but due to which the control of the data is transferred from the data owner to the cloud server where the security of the data is at risk. The cloud servers and the services offered by them cannot be trusted completely and there are chances that the cloud server may not store the data honestly so to check the data integrity and to maintain its privacy is an important task as well as a challenge .This paper focuses on different techniques that are applied to check the accuracy of the outsourced information and keeps up the uprightness of the information on cloud. The aim of this survey is to understand the research work executed in this specific field.
An Efficient Geographic Routing using Spanning Tree and Greedy Distributed Routing in WSN
Linsy A, Dr. R. Deepa
DOI: 10.17148/IJARCCE.2018.7633
Abstract:
Geographic routing specially for location information based routing. It is mainly proposed for wireless networks and based on the idea that the source sends a message to the geographic location of the destination instead of using the network address. The existing trap array topology model that provides a unified framework to uncover the limiting behavior of 10 representative geo-routing algorithms. The problem with such a trap array approach is that it is doubtful to route the packet efficiently, the approach can guarantee that a packet will be delivered no more than 2 - 3 hops, need to add more hops to deliver the packet. No planarization techniques applied to avoid the high traffic link. It won’t detect the cross link if any traffic contains in that way while packet delivering to destination point. The proposed geographic routing algorithm, Spanning Tree Based On Greedy Distributed Routing (STGDR), this routing algorithm finds best shorter routes path and generates less traffic compare with existing location based routing algorithms. A multi hull tree designed based on multi spanning tree where each node has a related multi convex hull that contains within it the locations of all its successor nodes in the tree. Multiple hull trees deliver a way of gathering location information and they are built by convex hull information up the tree. This routing information is used in routing to avoid paths null path tree; instead that able to traverse a significantly reduced subtree, consisting of only the nodes with convex hulls tree that contain the destination node point uses new caring of multi spanning tree, which called multi hull tree, for use in networks where each node has an allocated coordinate. The experimental result shows the routing to avoid paths that will not be productive; instead it is able to traverse a significantly reduced subtree, consisting of only the nodes with convex hulls tree that contain the destination node point.
Keywords:
Spanning Tree Based On Greedy Distributed Routing (STGDR), Wireless Sensor Network (WSN), Delaunay Triangulation (DT).
Most educational institutions administrators are concerned about student irregular attendance. Truancies can affect students overall academic performance. The conventional method of taking attendance by calling names or signing on paper is very time consuming and insecure, hence inefficient. Geo-fencing based attendance system is one of the solutions to address this problem. This system can be used to take attendance for students in school, college, university and working places. In the present day scenario, every guardian is worried whether his/her child has reached safely or not. Therefore, the guardian is intimated by a Short Message Service (SMS) sent using the Global System for Mobile Communications (GSM) modem of the same. As per the report of Human Rights Commission of India, over 40,000 children are reported missing every year of which 11,000 are untraced. Kidnappers target victims most often after school programs. The system proposed in this work, utilizes the Global Positioning System (GPS) module for determination of the exact location of the victims.
Learning Invariant Color Features for Person Re-Identification
Miss. Nikita V Jadhav (PG), Dr. D.D.Chaudhary
DOI: 10.17148/IJARCCE.2018.7635
Abstract:
In this examination we have proposed Learning invariant shading features for singular re-cognizable evidence using human face for high capable banner trade system applications. In this paper, we tend to propose a data driven approach for taking in shading plans from pixels analyzed from pictures transversely finished to camera sees. The impulse behind this work is that, notwithstanding accepting picture component estimations of same shading would meander across views, they thought to be encoded with indistinct characteristics. We tend to demonstrate shading highlight age as a learning downside by together taking in an immediate change and a wordbook to write in code picture segment regards. We tend to conjointly analyze completely unforeseen evaluating invariant shading zones. Manhandle shading in light of the way that the solely quick, we tend to differentiate our approach and all the evaluating invariant shading zones and show better execution over each one of them. Overpowering rotated adjacent twofold case is foreseen yields higher execution. This paper proposes an absolutely extraordinary system of portraying the external body part abuse Convolutional Neural Network.