VOLUME 8, ISSUE 6, JUNE 2019
Combining Traditional Face-to-Face Classroom Practices with Computer Mediated Activities for Meaningful Learning Experience
Olubummo, Daniel Adebiyi; Emmanuel, Ikiomoye Douglas; Otobo, Firstman Noah; Bello, Rotimi-Williams
An Analytical Approach for Junk Collecting Wireless Robot
Rahul Navghare, Mrunali Dhanorkar, Vaishali Behaniya
Improving Data Analysis using Data Mining Techniques for KSOMM and PAPLM
Vivek Rajput, Prof.Amit Thakur
An Efficient Protocol for VANET Architecture Design and Performance Improvement
Monica Varmaiya, Sushma Kushwaha, Amit Thakur
Improve Performance Localization in Wireless Sensor Networks Based Received-Signal-Strength Technique and PGA
Virendra Jain, Prof.Amit Thakur
A 16X16 High Speed Vedic Multiplier for Area and Power Reduction
Mr.T.Muruganantham, Mr.N.R.Nagarajan, Mr.S.Syed Husain
Combining Deduplication and String Comparison for Avoiding Redundant Data with Enhanced Authentication Approach on Cloud
R.Sasikumar, S.Deva Priya
Isilon Credential Vault: An Authentication Provider
Prof. R.B. Murumkar, Sanket Kulkarni, M. Shushanth, Priyanka Fulzele, Esha Shah
A Novel Architecture for Multiplier and Accumulator unit by using Parallel Prefix Adders
N. R. Nagarajan, T. Muruganantham, S. Rajapriya
Effective Electronic Human Resource Management For Educational Institutions
L. Amudha, I. Infant Raj, T.M. Nithya
An Authentication Process for End to End Delay in the Malicious Network using Alert Correlation
R.Sasikumar, R.Ramesh
Study of Attention-Deficit Hyperactivity Disorder (ADHD) in Children- Applying Association Rule Mining (ARM) (Survey)
Neema.H.N, Dr. N.V.Balaji
Converting Human Thoughts into Text through Mind Gate and Mind Computer Interface Devices
Mahesh Nelapati, Naresh Madavarapu
A Study on Future of Electric Vehicles in India
Indukala M. P, Bincy M. Mathew
A Novel Approach to Cattle Health Monitoring for Maximizing Dairy Output Using LoRa IoT Technology
Adithya Sampath, P Meena
Application of UAVâs in Agriculture: Nigeriaâs Case
Fatima Balarabe Ilyass
Survey on Image Data Hiding Based on Block Histogram Shifting Encryption Algorithm
Swapnil Singh Thakur, Prof. Amit Thakur
Video-Based Face Recognition Modules & Approaches: A Survey
B.Sivaranjani, Dr.C.Kalaiselvi
Implementing Blockchain in Public Distribution System
Asmath Fahima Famnaz, Dr.Sharmila Kumari
Advanced System for the Safety of Vehicles
Priya Bhagwan Munde, Prof. Dr. Achala Deshmukh
Classification of Soil Based on Fuzzy Logics
Fathima Rubi M.H, Dr. Sharmila kumari
A Review on Development of a High Resolution Imaging System at 635 nm and 840 nm
Roshan K. Borase, Kartik Shrivastav, S.L.Nalbalwar , Roshan Makkar
Abstract
Combining Traditional Face-to-Face Classroom Practices with Computer Mediated Activities for Meaningful Learning Experience
Olubummo, Daniel Adebiyi; Emmanuel, Ikiomoye Douglas; Otobo, Firstman Noah; Bello, Rotimi-Williams
DOI: 10.17148/IJARCCE.2019.8601
Abstract:
Literacy is defined as the ability to read and write; and these reading and writing must come by learning, and learning, by teaching. But, for a meaningful teaching and learning to be experience, combining traditional face-to-face classroom practices with computer mediated activities is not debatable in that, such blended approach will go a long way in reducing the challenges mitigating the zeal towards teaching and learning. Today, there are various available instructional materials that are computer-aided for teaching and learning purposes, which in the past were made of poisonous materials that pose danger to the life of both the teachers and the learners. Apart from all these known facts; two good heads (synergizing traditional face-to-face classroom practices with computer mediated activities) are better than one (sum of their individual effects), so says an adage. In this paper, we set the following as the objectives: 1) to review some learning technologies that are related to blended learning technology; 2) to describe the blended learning models; and 3) to discuss both the advantages and the disadvantages of blended learning. The blended learning principle was mathematically interpreted.Keywords:
Computer literacy, Teaching and learning, Blended learning, Classroom, VLEAbstract
Blockchain in Voting
Adwait Dabholkar, Dr.Pravin Gundalwar
DOI: 10.17148/IJARCCE.2019.8602
Abstract: Even Though the technology Blockchain was invented in 1991 by Dr W.Scott Stornetta, it is well Known to be used in cryptocurrencies for example bitcoin one of the most famous cryptocurrency introduced by Satoshi Nakamoto in 2008.Blockchain also Offers new opportunities to develop many types of applications and digital services. In this Paper we are going to discuss the use of the open source blockchain technology in electronic voting system that can be used in local or national elections that can deliver fraud-less, reliable & Secure voting system.
Keywords: Blockchain ,Voting, Decentralized Voting, e- voting
Abstract
A Research on Mobile Number Portability
Sairaj Devkar
DOI: 10.17148/IJARCCE.2019.8603
Abstract:
The Indian telecom industry is one of the fastest growing in the world and is projected that India will have âbillion plusâ mobile users by 2015. This research study pull the attention on mobile number portability with the special consideration given on porting, porting time, porting costs/fee, Customer demographics, customer awareness, Easy entry of new operator, launch of services by new operators, attractive/aggressive tariff plans, innovative services, quality of service, Voice quality, low call drops and state-of-the-art customer service setup etc. This research aims to figure out the impact of mobile number portability on service providers and service users, This paper examines the effect of Mobile Number Portability (MNP) on market price and consumer surplus. MNP reduces switching costs by allowing consumers to keep their phone number when they change service provider. Our study shows how the experience with regards to the introduction of MNP can be used as an example of best practice by other countries that plan to introduce it in the near future. It has become especially important in recent years because of enormous growth of information technology and its significant potential for the impact on the rest of the economy. Telecom companies have recognized this and are rapidly evolving with better brands services and attractive measures. The competition in this space is further fuelled with the implementation of mobile number portability system, which allows switching your mobile phone operator from one to another while keep your existing mobile phone number. This paper tries to explore the scenario of MNP and how it has affected the various mobile network service providers across the region of  Mumbai.ÂKeywords:
Mobile Number Portability (MNP), Telecom Regulatory Authority India (TRAI),Service providersAbstract
Women Safety Ensurance Device
R.Balamurugan, T.Muruganantham
DOI: 10.17148/IJARCCE.2019.8604
Abstract
An Analytical Approach for Junk Collecting Wireless Robot
Rahul Navghare, Mrunali Dhanorkar, Vaishali Behaniya
DOI: 10.17148/IJARCCE.2019.8605
Abstract: Our project mainly concentrates on mission clean India. one step toward swatch Bharat mission by our Anuourable prime minister which offering an easy,reliable solution to the common problem of inefficient garbage disposal faced within Public place. At present, which also implies that the main users of our product would be public place. For this, we have decided to implement a remote control, fully automated, junk bin. Here, the process includes the garbage collector moving through a series path, while stopping at each to collect garbage. This is the main process of the system. When the garbage container becomes full, a signal is generated and container continues straight to its dumpsite, without stopping at any other junction. The dumping of garbage is automated as well. This project mainly focuses on the importance of the product within the current world, with respect to places such as offices, production plants, hotels and especially schools, and how it really influences and enhances the quality of human life, by reducing the wastage of time and money. Keywords: Garbage, Bluetooth, Lifting Maschine, Foot-path
Abstract
Improving Data Analysis using Data Mining Techniques for KSOMM and PAPLM
Vivek Rajput, Prof.Amit Thakur
DOI: 10.17148/IJARCCE.2019.8606
Abstract:
Cluster analysis could also be a descriptive task that seeks to identify consistent cluster of object and it's in addition one in all the foremost analytical technique in processing. K-means cluster with self organization map methodology a neural network methodology is that the popular divided bunch technique. They need a tendency to debate commonplace k mean formula and analyze the defect of k-mean formula. Throughout this paper three dissimilar modified k-mean formulas are mentioned that exclude the limitation of k-mean formula and improve the speed and efficiency of k-mean formula. Experiments supported the quality information UCI show that the projected technique will find yourself a high purity cluster results and eliminate the sensitivity to the initial centers to some extent. E.Coli dataset and Yeast dataset resides issue organism and altogether all completely different super molecule assign in their cell. If that protein is wounded, then these cause varied infections that affected anatomy adversely. So, the target of this work is to classify proteins into altogether all completely different cellular localization sites supported chemical compound sequences of E.Coli bacteria and Yeast. Itâs found that projected bunch provides correct result as compared to K-Mean and is ideal resolution to localization of proteins. Itâs in addition known as nearest neighbor trying. It simply clusters the datasets into given kind of clusters. Varied efforts are created to boost the presentation of the K-means bunch formula and our Planned Advanced Proteins Localization Methodology (PAPLM) in rising accuracy of information proteins level analysis then notice best answer. They need mentioned the restrictions and applications of the K-means bunch formula still. Discover our projected formula best resolution. Improving information analysis victimization data processing techniques for KSOMM and PAPLMKeywords:
Data Processing, Cluster Technique, Hierarchical Cluster, K-Mean Cluster, Performance Accuracy, Optimization Algorithmic RuleAbstract
An Efficient Protocol for VANET Architecture Design and Performance Improvement
Monica Varmaiya, Sushma Kushwaha, Amit Thakur
DOI: 10.17148/IJARCCE.2019.8607
Abstract: Node development highlight of Vehicular Ad Hoc Network (VANET) intently looks like with that of Mobile Ad Hoc Network (MANET) yet its rapid versatility and flighty development qualities are the key contrasting element from that of MANET. The similitude nature proposes that the predominant routing protocol of MANET is especially relevant to VANET. Be that as it may, on a similar line, the difference qualities result in incessant loss of connectivity. This requires up gradation of the current routing protocols to adapt itself into VANET situation. In this paper, proposed On Demand Multicast Routing Protocol (ODMRP). The exhibitions are assessed by fluctuating portability, number of sources and hub speed while parcel conveyance fraction, start to finish deferral and standardized routing load are utilized as execution measurements. The simulations have demonstrated that OMMRP performs nearly superior to DSR and AODV in various versatility models as far as start to finish delay as execution metric. Keywords: VANET, MANET, Protocol, ODMRP
Abstract
Improve Performance Localization in Wireless Sensor Networks Based Received-Signal-Strength Technique and PGA
Virendra Jain, Prof.Amit Thakur
DOI: 10.17148/IJARCCE.2019.8608
Abstract:
Secure localization of unknown nodes throughout a Wireless Sensing Element Network (WSN) could be an important analysis subject. Wireless detector Networks (WSNs) are networks of distributed autonomous devices which can sense or monitor Physical or environmental conditions hand and glove. WSNs face many challenges, primarily caused by communication failures, with advancements in hardware technique, communication protocols, resource efficiency, and totally different aspects. Recently, there has been a great deal of target mobile device networks, which they got even seen the event of small-profile sensing devices that are able to management their own movement. Although it has been shown that quality alleviates several issues with regard to device network coverage and property, many challenges keep. Among these, the requirement for position estimation is maybe the foremost important. Learning on localization methods for mobile wireless device networks. They provide taxonomies for mobile wireless sensors and localization, furthermore as common architectures, measure techniques, and localization algorithms. They conclude with a top level view of real-world mobile device applications that require position estimation. Describe a three stage optimization technique is planned to cut back the estimated error and finding the case of a node throughout a network. Improve performance localization in wireless detector networks based mostly received-signal-strength Technique and PGA. A resource used in WSN with wireless channels and fast channel, aware WSN and get nodes target localization is represented based parameter, wherever the channel model is incorporated into the localization scheme itself, thereby rising performance while not increasing communication overhead. Another sensible issue involving the presence of malicious sensors referred to as Byzantines is mentioned and mitigation schemes are provided. Received Signal Strength (RSST) is intricately utilized in each the 2 algorithms. The primary algorithmic rule controls the mechanical phenomenon of the mobile anchor node and uses a geometrical property to change the estimation of the situation of the unknown nodes. old method RSST more error but our proposed method less error.Keywords:
Wireless sensor Network, security, localization, mobile sensors, anchor nodes, Localization error, received signal strength technique, PGAAbstract
A 16X16 High Speed Vedic Multiplier for Area and Power Reduction
Mr.T.Muruganantham, Mr.N.R.Nagarajan, Mr.S.Syed Husain
DOI: 10.17148/IJARCCE.2019.8609
Abstract:
This paper is motivated for the efficient high speed Vedic multiplier with implementation in FPGA. Recent and advanced Vedic multiplications of multipliers are implemented by using Urdhva tiryakbhyam multiplication technique is commonly used in different multiplier architectures. This multiplication algorithm is giving less delay and efficient power utilization with reduction of area. The 16x16 Vedic multiplier is synthesized in Xilinx and implemented in FPGA.Keywords:
Field Programmable Gate Array (FPGA), Vedic multiplier TechnologyAbstract
Combining Deduplication and String Comparison for Avoiding Redundant Data with Enhanced Authentication Approach on Cloud
R.Sasikumar, S.Deva Priya
DOI: 10.17148/IJARCCE.2019.8610
Abstract:
Every day activity many number of data and file has been generated. Every organization wants to store and main that information with efficient manner. Efficient denotes, storage space utilization, securely maintaining the organization records, accessing records quickly. Â On the organization server maintain the files some of them are stored for more than once. It will increase the utilization of memory. It will lead us to insufficient storage space. Sometimes outgoing data in the network connection contain the duplicate files so, network traffic is occurring (or) the transfer speed gets shrunk. So, here we propose a technique called data deduplication and we also use the algorithm of machine learning called string comparison to detect the redundant data and files. To ensure the security we also proposed hybrid authentication approach.Keywords:
Cloud Services, Deduplication, Greedy Approach, String ComparisonAbstract
Isilon Credential Vault: An Authentication Provider
Prof. R.B. Murumkar, Sanket Kulkarni, M. Shushanth, Priyanka Fulzele, Esha Shah
DOI: 10.17148/IJARCCE.2019.8611
Abstract:
In this era of digitisation, information security is of utmost importance. It is provided usually by PINs or passwords, whose security is very crucial in order to preserve data integrity. This paper explains insights on the multi-level security being implemented for the credential vault. Passwords in the system are stored as salted hashes. Database is then encrypted and then , the key for decryption would be stored externally. Also we aim to provide APIs for the system through which open source applications like Apache can make use of the authenticator to store credentials.Keywords:
Salting, Hashing, Authentication, Security, AttacksAbstract
A Novel Architecture for Multiplier and Accumulator unit by using Parallel Prefix Adders
N. R. Nagarajan, T. Muruganantham, S. Rajapriya
DOI: 10.17148/IJARCCE.2019.8612
Abstract:
MAC unit is mostly demanded in the DSP application. It performs the both addition and multiplication. Here the MAC unit is designed by using the parallel prefix adders like kogge-Stone adder, Brent-Kung adder, Han-Carlson adder and Ladner Fischer adder these adders are the high-speed adders to improve the speed of MAC unit and multiplication purpose. In this design, these four adders are implemented to the array multiplier and to design the MAC unit. The performance and analysis of MAC unit is done by the Verilog HDL and the MAC unit is simulated and synthesized in Xilinx ISE 14.7 for Spartan-6 family technology. The simulation results show that low power, high speed and low area consumption MAC unit.Keywords:
MAC, HDL, Fast Adders, DSPAbstract
Effective Electronic Human Resource Management For Educational Institutions
L. Amudha, I. Infant Raj, T.M. Nithya
DOI: 10.17148/IJARCCE.2019.8613
Abstract:
For any organization may it be a school, college, hospital, industry or any organization, the major task is to identify the roles and responsibilities of individuals in the organization. Earlier details are maintained as hard coded handwritten ledgers and documents which were difficult and cumbersome in maintenance and verification. In the Recent years, many companies have transformed to digital method of handling employee information. This paper discusses about one such digital maintenance with the need for digitization and benefits. The effective way of implementation is also discussed with relevant screen captures.Keywords:
Digitization, Employee, Organization, Business, Retention, AnalyticsAbstract
An Authentication Process for End to End Delay in the Malicious Network using Alert Correlation
R.Sasikumar, R.Ramesh
DOI: 10.17148/IJARCCE.2019.8614
Abstract:
Nowadays Internet of Things devices are rapidly developing to support a great deal of end-end devices (E2E) applications and services. But these services require and reliable device authentication for the security of data. Most of the low-cost devices do not include the security mechanisms. This reduces the reliability of the credentials thus leading to the vulnerability. The are many authentication algorithms for normal devices but extending these algorithms to IoT end devices is a difficult task. In this paper we propose an algorithm for the end to end authentication of End-End devices. We use the algorithm called as Alert Correlation Algorithm for the purpose of the authentication of devices. The algorithm uses the hashing method using alphanumeric keys for the security by using cryptography. If any vulnerable user is detected the algorithm generates the alarm and notifies the user. It also stops the data transfer in the network route till the vulnerable user is removed. We use the cloud tool to store the log file data of each and every successful transaction and detected vulnerability. Our work is providing an extended security to the userâs data. Only registered users can transmit data in the channel.Keywords:
Internet of Things (IoT), Cloud, Security, Cryptography, Hashing, Alert Correlation AlgorithmAbstract
IOT Based Dam Monitoring System
S.Rajapriya, A.Abinaya, V.Subashini
DOI: 10.17148/IJARCCE.2019.8615
Abstract:
Monitoring Dams safety and water management is extremely important considering both the situations like water scarcity and excess of water. It is of crucial importance and needs to develop information system based on existing system allowing utilization of intelligent sensors network. Basic idea is to describe possibilities of IoT applications in Dam Safety and water management. Here the entire dam and the main pipeline is sensed 24x7 through various sensors. These wireless sensor nodes connected with each other and transmits the data to a gateway. Common storage space âCLOUDâ stores and provides on line information to the observer. Employing an IoT for the said purpose will definitely help saving the most precious natural resource the water. Here in this paper an attempt is made proposing an electronic circuit design employing an Internet of Things concept for the purpose. Ultrasonic sensor is used to find the crack in dam and vibration sensor is used to find any abnormal changes in dam due to natural disaster.Keywords:
Crack, Dam, Microcontrollers, Sensors, Interface panelAbstract
Study of Attention-Deficit Hyperactivity Disorder (ADHD) in Children- Applying Association Rule Mining (ARM) (Survey)
Neema.H.N, Dr. N.V.Balaji
DOI: 10.17148/IJARCCE.2019.8616
Abstract: Attention Deficit Hyperactivity Disorder (ADHD) is one of the most thoroughly researched disorders in medicine. Although many data mining techniques have been applied to diagnose the main causes of ADHD, but only few sets of clinical risk factors are considered. So the results produced by such techniques may not represent appropriate ADHD pattern and risk factors appropriately. Environmental factors also play a role in elucidating this disorder. In this study, we have designed a system that can efficiently discover the rules and the risk level of patients based on the given parameter about this disorder, comfortable with making the diagnosis and treating them with ADHD. We consider the relationship among comorbidities of ADHD based on association rule mining (ARM) among these data mining techniques with the help of Apriori Algorithm .The intention of this project is to diagnose the symptoms(patterns) that may result in ADHD in children in the earlier stages by using the Data Mining techniques . Keywords: ADHD, Data mining, R software, Association Rule Mining, Apriori Algorithm
Abstract
Converting Human Thoughts into Text through Mind Gate and Mind Computer Interface Devices
Mahesh Nelapati, Naresh Madavarapu
DOI: 10.17148/IJARCCE.2019.8617
Abstract:
The Brain Gate System is set up on Cyber energy organize innovation to detect, exchange, look at and put on the language of neurons. The standard of activity behind the Brain Gate System is that with unblemished cerebrum work, mind signals are created despite the fact that they are not sent to the arms, hands and legs. The signs are deciphered and converted into cursor developments, offering the client another Brain Gate pathway to control a PC with thought, similarly as people who can move their hands utilize a mouse. The 'Mind Gate' contains minor spikes that will reach out down around one millimetre into the cerebrum subsequent to being embedded underneath the skull, checking the action from a little gathering of neurons. It will presently be workable for a patient with spinal rope damage to make cerebrum flags that pass on the aim of moving the deadened appendages, as signs to an embedded sensor, which is then yield as electronic driving forces. These driving forces help the client to work mechanical gadgets with the assistance of a PC cursor. Matthew Nagle, a 25-year-old Massachusetts individual with unadorned spinal string harm, has been incapacitated starting from the neck since 2001[1].After partaking in a clinical preliminary of this framework, he has opened email, exchanged TV channels, turned on lights [2]. He even moved an automated hand from his wheelchair. This character the first occasion when that neural development signals have been recorded and decoded in a human with spinal rope damage. The framework is additionally the first to allow a human to direct his close-by circumstance utilizing his psyche.Keywords:
Neurons, Brain Gate, cerebrum flags, Neural Development SignalsAbstract
A Study on Future of Electric Vehicles in India
Indukala M. P, Bincy M. Mathew
DOI: 10.17148/IJARCCE.2019.8618
Abstract
A Novel Approach to Cattle Health Monitoring for Maximizing Dairy Output Using LoRa IoT Technology
Adithya Sampath, P Meena
DOI: 10.17148/IJARCCE.2019.8619
Abstract: The past few decades have seen rapid growth in consumption of dairy products in several parts of the developing world. According to a study by Food and Agriculture Organization under the United Nations, it is predicted that there will be 68% higher demand for milk and milk products by 2050. With the ever growing demand a major concern is the low milk yield of cows. The potential of increase in dairy consumption remains significant, as population levels continue to grow in developing countries, especially in countries like India. The focus of this work is to design a lightweight and smart IoT wearable device strapped around the cow's neck to help farmers to monitor the vitals of cows through various sensors and hence monitor cattle health, which contributes to a healthy reproductive cycle and therefore leads to an improved milk yield. The IoT wearable device measures temperature, position activity and behaviour (Eating, sleeping, lameness). LoRa communication protocol is the IoT technology used for the communication of this information. The IoT wearable is the LoRa device which transmit the cattleâs health information and the data is received by a LoRa gateway, which is the data hub of all received sensor data from the cattle. The collected data is then sent to cloud from the LoRa gateway. Data analytics is done on the cloud and a report is generated detailing the health of each cow in the farm. Based on this report the farmer can approach a vet, nutritionist, agronomist to get actionable intelligence to improve the cowâs milk yield. The results obtained from the testing of the PoC prototype on cattle in a farm are presented. Keywords: Improve Dairy Output, IoT Wearable Device, LoRa Protocol, Cloud Data Analytics
Abstract
Application of UAVâs in Agriculture: Nigeriaâs Case
Fatima Balarabe Ilyass
DOI: 10.17148/IJARCCE.2019.8620
Abstract:
Precision Farming has been described as a new approach to farming whereby information technology is introduced into the whole production process so as to increase yield, save time and cost and improve the overall economic outlook of a nation. Information has been found to be one of the key requirements to achieve this great feat. Unmanned Aerial Vehicles (UAVâs) have been used over the years mostly in military applications. Recently, these low cost, low maintenance vehicles have been utilized in precision agriculture from overall monitoring of the crop field to spraying of pesticides and fertilizer. In this research, the need to adopt UAVâs in the context of Nigerian farmers most of whom are small scale in nature is presented. Potential areas of application such as in the field of crop monitoring and spraying system are analyzed.Keywords:
Nigeria, Precision Farming, UAV, Crop Monitoring, Spraying SystemsAbstract
Design and Development of Smart Vehicle using Microcontroller
Naseem Rao
DOI: 10.17148/IJARCCE.2019.8621
Abstract:
 Robot controlling through Wi-Fi is a fascinating tool to operate laboratory experiments within Electronics and Telecommunication Engineering. Designing of the system requires the expertise of physical components, sensors, embedded system and selection algorithm. As we know people can't perform many tasks which a Robot can do. Robots are required where human interventions are nearly impossible. Due to this, a thinking of designing a robot which can be controlled via Wi-Fi emerged in our minds. Here controls of the robotic are built-in on a webpage. This undertaking involves of basically the following modules Wi-Fi Module, Router, Microcontroller and Smartphone and laptop with which handles all simple functionalities of a Robot.Keywords:
WIFI; Automatic Car; MCU; MPUAbstract
Survey on Image Data Hiding Based on Block Histogram Shifting Encryption Algorithm
Swapnil Singh Thakur, Prof. Amit Thakur
DOI: 10.17148/IJARCCE.2019.8622
Abstract:
Describes the thought of Reversible Information Hiding (RDH) methodology is based on steganography. Recently a lot of attention is paid to RDH in encrypted image. Security should be provided for the transmission of confidential and sensitive information over the network and insecure channel, loss in information happens. To secure the information, encode the wrap information and introduce is secret information into cover media. so the protection of image and embedded information is maintained, Since RDH manages the outstanding secured property, and therefore the original image are often recovered with none loss, Reversible Information Hiding (RDH). Within the planned rule, Histogram Shifting (HS) is employed for RDH, and therefore the BHSEA methodology is used for encoding. The BHSEA methodology performs four processes for encoding; Reversible information hiding could be a form of information hiding techniques whereby the host image is often recovered specifically. Being lossless makes this method appropriate for medical, military applications and cloud storage. In cloud storage, a content owner will encode a picture to preserve his/her privacy, and transfer the encrypted knowledge onto cloud. Reversible knowledge activity in encrypted image, which might recover the first image with none distortion from the marked image when the hidden information, are extracted. Existing rule consists of various hierarchal steps for the information embedding and therefore the encoding. Therefore, the planned rule are often appropriate for the hierarchical access system, wherever the permission is granted consistent with the assorted access rights and planned algorithmic rule up strength and authentication of image information hiding.ÂKeywords:
Reversible Data Hiding, BHSEA, Lossless Data Hiding, Image Encryption, PSNR, MSE, Data Hiding Capacity, HSAbstract
Video-Based Face Recognition Modules & Approaches: A Survey
B.Sivaranjani, Dr.C.Kalaiselvi
DOI: 10.17148/IJARCCE.2019.8623
Abstract
Implementing Blockchain in Public Distribution System
Asmath Fahima Famnaz, Dr.Sharmila Kumari
DOI: 10.17148/IJARCCE.2019.8624
Keywords: Blockchain, Public Distribution System, Blocks, POW, Mining, Bitcoin
Abstract
Advanced System for the Safety of Vehicles
Priya Bhagwan Munde, Prof. Dr. Achala Deshmukh
DOI: 10.17148/IJARCCE.2019.8625
Keywords:
Raspberry-Pi, Vibration Sensor, IR Sensor, MQ3 sensor, Hall-Effect sensorAbstract
Classification of Soil Based on Fuzzy Logics
Fathima Rubi M.H, Dr. Sharmila kumari
DOI: 10.17148/IJARCCE.2019.8626
Abstract: The quick height in innovation has made information in plenty which has both required just as undesirable. So as to truncate the undesirable information and order, plentiful of data mining methods has been actualized. The primary objective of information mining is to gather, pre-process and order the information dependent on specific highlights of soil, for ex, PH, Nitrogen, Oxygen and Carbon percent of soil and foresee the harvests developed for the particular soil type. The application provides a deep insight of the behaviour of the soil in a particular region. It provides a feature extraction method to sort the data set according to the users need and thereby determining the necessary values of certain attributes. The decision makers can easily focus on the content they are interested on under certain context in the sub-classifications by grouping the attributes. Information from different nations are assembled and broke down and were determined based predefined Fuzzy Rules which has returned the precise and recall as result at the end of an output. Keywords: Data Mining, PH, Nitrogen, Carbon, Oxygen, Fuzzy Rule, Precise, Recall
Abstract
A Review on Development of a High Resolution Imaging System at 635 nm and 840 nm
Roshan K. Borase, Kartik Shrivastav, S.L.Nalbalwar , Roshan Makkar
DOI: 10.17148/IJARCCE.2019.8627
Abstract: This Optical Coherence Tomography (OCT) technique is a non-invasive technology used in medical as well as in non-medical applications. It is used to produce high resolution images. It provides the cross-sectional images of an sample in X & Y direction. It provides the depth as in millimeter range with the resolution in micrometer range. A broadband source of light is used so as to get the more bandwidth. The light beam is get splitted by the sample arm & reference arm respectively. An optical detector is used to detect the back-scattered light from the sample & reference arm. The matlab algorithm is used to process the signal. By moving the sample in X & Y direction, we can get the appropriate 2D & 3D images.
Keywords: OCT, non-invasive, resolution, broadband source, optical detector, MATLAB etc.
Abstract
Performance Comparison of Some Classifier for Chronic Kidney Disease
Ayesha Nasuha
DOI: 10.17148/IJARCCE.2019.8628
