USING CLOUD COMPUTING TO PROVIDE DATA MINING SERVICES
Naskar Ankita, Mrs. Mishra, Monika R.,
Data security and access control are the most challenging research work going on, at present, in cloud computing. This is because of the users sending their sensitive data to the cloud providers for acquiring their services. In cloud computing, the data is going to be stored in storage area provided by the service providers. The service providers must have a suitable way to protect their client’s sensitive data, especially to protect the data from unauthorized access. A common method of information privacy protection is to store the client’s data in encrypted form. If the cloud system is responsible for both storage and encryption/decryption of the data, the system administrators may simultaneously obtain encrypted data and the decryption keys. This will allow them to access the information of the client without any authorization. This leads to the risk of sensitive information leak and the method involved of storage and encryption/decryption is costly too. Hence, to overcome these problems, a model (cloud server) has been proposed in this paper which accepts only those data which are required in an encoded form, performs the service opted by the client and sends the result in the encoded format to be understood by the respective client.
An Unlinkable and Unobservable Secure Routing with Symmetric Approach for MANETS
Dr.V.Khanaa, Dr.Krishna Mohanta
Privacy preserving routing is crucial for some ad hoc networks that require stronger privacy protection. A number of schemes have been proposed to protect privacy in ad hoc networks. However, none of these schemes offer complete unlinkability or unobservability property since data packets and control packets are still linkable and distinguishable in these schemes. In this paper, define stronger privacy requirements regarding privacy-preserving routing in mobile ad hoc networks. Then propose an unobservable secure routing scheme to offer complete unlinkability and content unobservability for all types of packets. It is efficient as it uses a novel combination of group signature and ID-based encryption for route discovery. Security analysis demonstrates that can well protect user privacy against both inside and outside attackers. Implement it on ns2, and evaluate its performance by comparing with AODV and MASK. The simulation results show that not only has satisfactory performance compared to AODV, but also achieves stronger privacy protection than existing schemes like MASK
Secure And Authenticated Reversible Data Hiding In Encrypted Images
Dr.V.Khanaa, Dr.Krishna Mohanta,
-Reversible data hiding a novel technique which is used to embed additional information in the encrypted images, applies in military and medical images, which can be recoverable with original media and the hided data without loss. A number of reversible data hiding techniques were proposed in the recent years, but on analysis, all lacks in providing the security and authentication. This project proposes a novel reversible data hiding technique which work is separable, the receiver can extract the original image or extra embedded data or both according to the keys hold by the receiver. On the other hand the receiver can verify the data hided by the data hider, such that the work proposes both security and authentication. This project proposes a novel reversible data hiding technique which poses both security and authentication for additional data stored in the encrypted images. Also proposed work is separable, the receiver can extract the original image or extra embedded data or both according to the keys hold by the receiver. On the other hand the receiver can verify the data hided by the data hider, such that the work proposes both security and authentication. This work proposes a novel scheme for separable reversible data hiding in encrypted images. In the first phase, a content owner encrypts the original uncompressed image using an encryption key. Then, a data-hider may compress the least significant bits of the encrypted image using a data-hiding key to create a sparse space to accommodate some additional data. With an encrypted image containing additional data, if a receiver has the data-hiding key, he can extract the additional data though he does not know the image content. If the receiver has the encryption key, he can decrypt the received data to obtain an image similar to the original one, but cannot extract the additional data. If the receiver has both the data-hiding key and the encryption key, he can extract the additional data and recover the original content without any error by exploiting the spatial correlation in natural image when the amount of additional data is not too larg
Increasing no. of nodes for Dijkstra algorithm without degrading the performance
Nikita Jaiswal , Rajesh Kumar Chakrawart
In most of the shortest path problems like vehicle routing problems and network routing problems, we only need an efficient path between two points—source and destination, and it is not necessary to calculate the shortest path from source to all other nodes. Dijkstra algorithm is called “ Single Source Shortest Path “.This paper introduces the Dijkstra algorithm in detail, and illustrates the method of implementation of the algorithm and the disadvantages of the algorithm .this algorithm applied on Directed weighted graph to find shortest path between two nodes ,but all weights in the graph should be non negative. In this paper we also discuss about how we can improve this algorithm in terms of finding path according to cost by increasing some no. of nodes.
Qi Open Wireless Charging Standard – A Wireless Technology for the Future
P.Manivannan, S.Bharathiraja,
This paper is used to express the great capabilities of the wireless power transmission techniques. Wireless power transfer allows a convenient, easy to use battery charging of mobile phones and other mobile devices. No hassle with cables and plugs, just place the device on a pad and that’s it. Such a system even has the potential to become a standard charging solution . I. Introduction: Usage of Wireless power provides a convenient solution for the users of portable devices and also gives designers the ability to develop more creative answers to problems. Inductive coupling is the method by which efficient and versatile wireless power can be achieved. It is a technology which can be developed to great potential and which has the proficiency to change the way power is transferred between devices and the source. Therefore, in 2009 the Wireless Power Consortium was founded with meanwhile more than 80 international companies as members. The consortium recently released the first worldwide standard on wireless power for mobile devices of to 5W called “Qi”. The contribution presents details of this standard and the rationale behind.
R .VivekanadhanDr.V.Khanaa , T.Nalini, Dr.V.Khanaa,
An Efficient Scheme To Improve The Overlapped Transmission In Wireless Adhoc Network Using Carrier Sense Multiple Access
R .VivekanadhanDr.V.Khanaa , T.Nalini, Dr.V.Khanaa,
— Wireless network refers to any type of computer network that is not connected by cables of any kind. Wireless network is divided into multiple types such as Wireless LAN, Wireless MAN, Cellular networks and Ad-hoc networks etc. In wireless ad-hoc networks, interference is one of the major impairments that reduce the performance of a network. To reduce this interference, we have been using a technique called Interference Cancellation(IC). Instead of this Interference Cancellation some of the techniques such as Multi User Detection (MUD), Multi Packet Reception (MPR) has been used in networks. However MPR is typically requires a very complicated hardware. As well as it is not suitable without knowing a interfering signals. Therefore we moved to Overlapped Transmission technique. In this overlapped transmission technique, a multiple transmission can occur in the same network. These techniques have much lower signal processing demand than the Multi Packet Reception. Overlapped Carrier Sense Multiple Access (OCSMA) protocol can be used to improve the performance of overlapped transmission technique. We develop a MAC protocol based on the IEEE 802.11 standard to support the overlapped transmission in networks. And we investigate the impact of overlapped transmission on the performance of Transmission Control Protocol in wireless ad-hoc MIMO networks using directional antennas.
A Soc Trojan Virus Detector And Corrector Using Multiple Monitoring Schemes
R .Vivekanadhan T.Nalini Dr.V.Khanaa
A design of 16 bit processor is programmed in VHDL. The processor module is added with extra hardware logic calle d Trojan.A fault bit pattern is injected into the circuit along with the processor clock. The fault bit patterns triggers the extra hardware hidden in the processor that can be detected by verifying the output result from memory and CPU
- This paper presents the study of 3D Internet in web 3.0 and analyze how it is used in present and future. 3D internet also known as virtual worlds is a powerful new way for you to reach consumers, business customers, co-workers, partners, and students. It combines the immediacy of television, the versatile content of the Web, and the relationship-building strengths of social networking sites like Face book. Yet unlike the passive experience of television, the 3D Internet is inherently interactive and engaging. Virtual worlds provide immersive 3D experiences that replicate (and in some cases exceed) real life. Second Life is one such resource which is implementing the concept of the 3D Internet in its applications. And off late this application has been a great success in the United States and is expected to affect the internet usage in a drastic way. This paper is for anyone who may have recently heard the term "3D Internet in web3.0" for the first time and needs to know what it is and how it helps them.
This paper provides security that has to be implemented in the network path. The vital part of this can be effectively programmed so that the data are sent in encrypted form. Among the fool proof algorithms that are in existence we chose RSA to be implement .The factoring challenge was intended to track the cutting edge in integer factorization. A primary application is for choosing the key length of the RSA encryption scheme. Progress in this challenge should give an insight into which key sizes are still safe and for how long. Two thousand forty eight bit is used for security purposes. Web portal give access to multiple users. Security is provided by allowing only authenticated users for accessing websites and files. Authenticated users can be determined by checking against database with the user name and password. The path security can be provided by encrypting the client request using 2048 bit key and can be decrypted by the server with the help of private key which is known only to the server. The accessed detail of every client has been seen in session viewer.
Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to isolate malicious nodes based on binary or naıve fuzzy response decisions. However, binary responses may result in the unexpected network partition, causing additional damages to the network infrastructure, and naıve fuzzy responses could lead to uncertainty in countering routing attacks in MANET. In this paper, we propose a risk-aware response mechanism to systematically cope with the identified routing attacks. Our risk-aware approach is based on an extended Dempster-Shafer mathematical theory of evidence introducing a notion of importance factors. In addition, our experiments demonstrate the effectiveness of our approach with the consideration of several performance metrics.
Gokulakannan R, Indhumathi M, Kalpana P, karthick.S,
Persistent And Concurrent Server For Reliable Transacton
Gokulakannan R, Indhumathi M, Kalpana P, karthick.S,
This paper provides Reliability that has to be implemented in the Client –Server communication in a network .The most important thing in client server communication is the reliability of data. In an online transaction all the data is transferred over the network there are several factors like hardware crisis or unavailability of network which prevent the total reliability factor. For this purpose it is required that the data should have a backup. Not only the data but the webserver can have these problem.Inorder to overcome these problems we merge the concept of mirroring of data with the help of a primary and secondary webserver. Each webserver runs independently on a different machine. The machine will have two NIC(NETWORK INTERFACE CARD) cards. In the server1 the first NIC card will be configured to the static ip which will be accessed by the client. In a point of failure the second NICin the primary server will be in communication with the first NICin the server2. When the query from the First NIC in server2 fails it assigns the static ip to the second NICin the server2. By this mechanism the client will have uninterrupted usage of the server even when the server2 fails.Another key aspect of this project is that it will take regular backup of the data in the database server to the secondary database server in which RAID 10 concept is used. This process will occur for a small interval of time as decided by the user. This paper use the RSA Algorithm to provide the Security to the client data during backup
Final Year, Department Of Computer Science And Engineering K.S.R College Of Engineering
Geetha.K , Dr.Chandra.E,
In Automatic Speech Recognition (ASR), there is consistent growth since past five decades. ASR has been developed in many spoken languages. This paper gives an overview of speech recognition system and its applications.
Increase In Cache Performance Use Of Size As Factor In Replacement Algorithm
Nandnee Jain, Rajesh kumar chakrawarti,
The main requirement of any programmer is unlimited amount of fast memory. But the speed of memory is directly proportional to the cost of memory. But our goal is to achieve more speed in less cost, for these we have introduce memory hierarchy. At the top of this hierachy is small but very fast and costly cache memory. As cache is small memory so it contain only some part of data at any given time. If some new data is to be placed in cache than we have to replace the existing data (in case when cache is packed with data) using some strategies. LRU (Least Recently Used) is one such strategies. In this paper we have a new extension to LRU depending on the size of the block to be replaced
Bayesian Classifier Approach For An Effective Outlier Intrusion Detection System In Mobile Adhoc Networks
CherukuriSai Gowtham, BobbaVeeramallu,
Networks are protected using many firewalls andencryption software’s. But many of them are not sufficient andeffective. Most intrusion detection systems for mobile ad hocnetworks are focusing on either routing protocols or itsefficiency, but it fails to address the security issues. Some of thenodes may be selfish, for example, by not forwarding the packetsto the destination, thereby saving the battery power. Someothers may act malicious by launching security attacks likedenial of service or hack the information. The ultimate goal ofthe security solutions for wireless networks is to providesecurity services, such as authentication, confidentiality,integrity,anonymity, and availability, to mobile users. Thispaper incorporates agents and data mining techniques toprevent anomaly intrusion in mobile adhoc networks. Homeagents present in each system collects the data from its ownsystem and using data mining techniques to observed the localanomalies. The Mobile agents monitoring the neighboring nodesand collect the information from neighboring home agents todetermine the correlation among the observed anomalouspatterns before it will send the data. This system was able to stopall of the successful attacks in an adhoc networks and reduce thefalse alarm positives.
The World Wide Web has had an extremely significant impact on access to information and information services. Web-based applications are influencing many domains such as business, commerce, banking and learning. The Web has simplified access to information and information services, enabling a variety of users with different backgrounds, social situations, and so on to participate. The increasing complexity of such applications calls for engineering methods for developing efficient high quality software applications with all the appropriate performance, features and services which are required. Applications and information which are provided on the Web according to the ‘one size fits all’ approach are not appropriate to such a heterogeneous environment. Adaptive Web-based applications are an alternative to the traditional “one-size fits-all” static approach in the development of applications. Thus a distinctive feature of such an adaptive application is its ability to adapt itself to certain conditions.
Andropay- M-Commerce Application For Procurement Of Products Enabled With Barcode Through Mobiles
Sindhu.M, , Panneer Selvam.N2, Sabarish.S,
Modern hand held devices like smart phones and PDA’s have became increasingly powerful in recent years. The extra features added to these devices made them very popular. In particular most cell phones include cameras, processors equal to PC and internet access. As mobile devices became very popular in our day to day life they tend to replace the PC. They will replace the objects like mp3 players, cameras, planners, chequebooks, etc. In short, we will be using them to accomplish our task. One application that falls into that category is ANDROPAY developed for the Google Play- android phones.
STRATEGIC ENVIRONMENTAL ASSESSMENT (SEA) OF MULTIMODAL TRANSPORT ON NH-9 IN HYDERABAD CITY USING REMOTE SENSING AND GIS
Ishita Roy , Vijaya Lakshmi T, Anji Reddy M,
The paper describes the work of the Strategic Environmental Assessment on the National Highway No- 9 connecting Hyderabad and Pune junction which has been deliberately worked and surveyed in the recent past as multi modal transport corridor to construct the elevated Metro rails in near future.
The study purpose is to provide a multi - modal land- use and transport designed to lead to a preferred environmental and development strategy corridor. The study was intended to be strategic, both in its identification of options and in its assessment of impacts. It is to look forward over a 25 year planning period, and the focus was to be on quick movements, comfortable and environment friendly traffic. The paper briefly describes the present results in terms of impacts on travel, land- use and the environment.
While the study successfully demonstrated a methodology for strategic environmental assessment, further, work on the land- use and transport strategy is required before firm conclusions can be drawn and the broad outline strategy can be converted into specific policies or plans. The key appraisal framework tools for the study are,
a) The Transport model and
b) The Land- use model.
GIS has played a vital role in the study of Transport and the Land use Models for determining the Strategic Environmental Assessment for any long term project .It is one of the fastest growing technologies of present time. It has emerged as powerful and sophisticated means to manage vast amounts of geographic data. This paper also enhances the key roles played by GIS and Remote Sensing in various application maps and understanding of the Environmental issues with respect to the corridors
ArgoUML is an UML diagramming application written in Java and released under the open source Eclipse Public License. By virtue of being a Java application, it is available on any platform supported by Java. Within the open-source community, ArgoUML represents a major cooperative effort for the development of a UML development environment, ArgoUML is still under development, and processing errors arise periodically.
Implementation and Control of an Hybrid Multilevel Converter
Swapna.Rikka, M.Divya Charitha, T. Naveen Kumar,
Multilevel converters offer advantages in terms of the output waveform quality due to the increased number of levels used in the output voltage modulation. This advantage is particularly true for cascaded Hbridge converters that can be built to produce a large number of levels thanks to their modular structure. Nevertheless, this advantage comes at the cost of multiple DC-links supplied by independent rectifiers through the use of a multi-output transformer for inverters. This frontend complicates the implementation of converters that have a high number of levels. An alternative method of using lower voltage cells with floating dc-links to compensate only for voltage distortion of an NPC converter is considered for active rectifier applications. The analogy between the floating H-bridges and series active filters is used to develop a strategy for harmonic compensation of the NPC output voltage and the control of the floating dc-link voltages. This simplifies the current control scheme and increases its bandwidth. Experimental results with a low power prototype that show the good performance of the proposed modulation technique and the resulting improvement in the output waveform are provided. Index Terms—Power elect
Modeling and Simulation of Non-Grid-Connected Wind Energy Conversion System
K.Shravankumar, D.R.K.Mahesh, K.Ravishanker,
Method for wind turbine controller design and test in laboratory still remains a problem. This paper presents a real time simulator of non-grid-connected wind energy conversion system suitable for controller design and test. The simulation model, which is composed of a fixed-pitch wind turbine, a permanent magnet synchronous generator with PWM voltage source vector control and DC-DC converter with peak current control, is especially suitable for electrochemical industries. High energy efficiency can be achieved by adjusting the rotor speed according to the wind speed. Simulation results show the validity of system modeling and control strategy.
Study Of Different Attacks On Network & Transport Layer
Deepti Rajwal, Deepali Band, Prof. Atul Yadav
this paper represents Network attacks generally adopt computer networks as transportation media to convey the intrusion or even attack the communication system itself. We will put our focus mainly on the network attacks happened around the TCP/IP (Transmission Control Protocol/Internet Protocol) protocol suite, which are the most widely used communication protocol and the de facto standard among the Internet society
AN AUTONOMOUS FRAMEWORK FOR CLASSIFIER SELECTION IN WEKA
Arjun Solanki , Rajesh kumar chakrawarti,
Automating Classifier selection is an interesting task in Data Mining. In this paper we describe a framework for automatic Classifier selection integrated into Weka for identifying a model for effective classification for user’s dataset. With this Framework we can easily achieve the expected result at extremely fast learning speed. It automatically selects the parameters based on algorithms present in Weka and determines the best model for the input dataset. Also the lists of available classifiers are open to the users, allowing them to choose depending on the dataset.
Comparative study of reactive routing protocol (AODV, DSR, ABR and TORA) in MANET
.Mr. L Raja , Capt Dr. S Santhosh Babo,
A mobile ad hoc network (MANET) is a collection of wireless mobile nodes dynamically forming a network topology without the use of any existing network infrastructure or centralized administration. Routing is the process which transmitting the data packets from a source node to a given destination. The main classes of routing protocols are Proactive, Reactive and Hybrid. A Reactive (on-demand) routing strategy is a popular routing category for wireless ad hoc routing. In this paper work an attempt has been made to compare the four Reactive (on-demand) routing protocols for MANETs: - Ad hoc On Demand Distance Vector (AODV), Dynamic Source Routing (DSR) protocols, Temporally Ordered Routing Algorithm (TORA) and Associativity Based Routing (ABR) protocol.
BROADCASTING OF URBAN-STATISTICS VIA VEHICULAR INTELLECT DIA
Vinothini.R, Sugapriya.M,Sudha.S, Srisakthi.C,
We present the boomerang protocol to efficiently retain information at a particular geographic location in a sparse network of highly mobile nodes without using infrastructure networks. To retain information around certain physical location, each mobile device passing that location will carry the information for a short while. This approach can become challenging for remote locations around which only few nodes pass by. To address this challenge, the boomerang protocol, similar to delay-tolerant communication, first allows a mobile node to carry packets away from their location of origin and periodically returns them to the anchor location. A unique feature of this protocol is that it records the geographical trajectory while moving away from the origin and exploits the recorded trajectory to optimize the return path. Simulations using automotive traffic traces for a southern New Jersey region show that the boomerang protocol improves packet return rate by 70 percent compared to a baseline shortest path routing protocol. This performance gain can become even more significant when the road map is less connected. Finally, we look at adaptive protocols that can return information within specified time limits. Index Terms—Geocache, GPS, mobile, location-aware information, infrastructureless data management.
Effect Of Global Thresholding On Tumor-Bearing Brain Mri Images
Tirpude NN, Welekar RR,
Modern Science has found a special place for the field of Medical Imaging and Bio-medical image processing. With the advent of advanced imaging modalities like Magnetic Resonance Imaging (MRI), Computerised Tomography (CT), Mammography, UltraSonography (USG), it is now possible to look inside into the internal structure of the ailing body. Thus, it helps to diagnose, monitor and track the abnormality, if any. This paper provides us with the results and effects of two standard thresholding techniques applied to tumor-bearing MRI images of brain. The two standard techniques implemented are the basic global thresholding method and the standard Otsu’s thresholding method. This paper studies the poor results obtained after applying these two techniques to MRI images of tumor-bearing brain and analyzes the reasons for the same.
MULTIPLE KEY GENERATION USING ELLIPTIC CURVE CRYPTOGRAPHY FUSION ALGORITHM FOR BIOMETRIC SOURCE
Joju John, Mr T. Rajesh
The biometric data are stored in the template in which various techniques are used to protect it against privacy and security threats. The binary vector derived from biometric samples provide a great portion of template protection technique. For the same template protection system it is observed that there is a large variation on its key length. It determine the analytical relationship between the classification performance of the fuzzy commitment scheme and theoretical maximum key size given as input on Gaussian biometric source. The number of enrolment, verification sample, features component and biometric source capacity. It shows features of estimated maximum key size and classification performance are interdependent in analysis of the work. Both the theoretical analysis, as well as an experimental evaluation showed that feature interdependencies have a large impact on performance and key size estimates
Technology is making many things easier. We can say that this concept is standing example for that. So far we have seen LAN, MAN, WAN, INTERNET & many more but here is new concept of “ RED TACTON ” which makes the human body as a communication network by name HAN (Human Area Network). Red Tacton is a new Human Area networking technology that uses the surface of the human body as a safe, high speed network transmission path. Red Tacton uses the minute electric field generated by human body as medium for transmitting the data. The chips which will be embedded in various devices contain transmitter and receiver built to send and accept data in digital format. In this paper we will discuss about red tacton, and its working states, and applications of red tacton various fields. And we will compare our red tacton with the other technology for data transmission and know about human area network.
VIRTUAL, ALL TOO VIRTUAL THE VIRTUAL TRANSACTION AND THE END OF POSTMODERNISM
Rawaa Mahmoud Hussain, Rawaa Mahmoud Hussain
Virtualism is a new style of thinking and acting that human kind began moving toward it. Reducing time and nearing place in virtual space produce new patterns of thinking and acting. My article aims to two things; first: it wants to understand the overall global transformation to virtual system, reality and language. Second: then to indicate that philosophical system imposed by philosophers of postmodernism on the scene of world philosophy may has been rotted as a result to the changing in cultural structure.
Information Retrieval From Web Document Using Clustering Techniques
Mr..Keole.Ranjit R, Dr..Karde.Pravin.P,
With more than two billion pages created by millions of Web page authors and organizations, the World Wide Web is a tremendously rich knowledge base. The knowledge comes not only from the content of the pages themselves, but also from the unique characteristics of the Web, such as its hyperlink structure and its diversity of content and languages. A considerably large portion of information present on the world wide web (www) today is in the form of unstructured or semi-structured text data bases. It becomes tedious for the user to manually extract real required information from this material. Large document collections, such as those delivered by Internet search engines, are difficult and time-consuming for users to read and analyze. The detection of common and distinctive topics within a document set, together with the generation of multi-document summaries, can greatly ease the burden of information management. Clustering is useful technique in the field of textual data mining. Cluster analysis divides objects into meaningful groups based on similarity between objects. This paper focus on this problem of mining the useful information from the collected web documents using clustering techniques of the text collected from the downloaded web documents.
1 Vivek.A, 2 Asst Prof. Anbazhagan.K, Sathish kumar.P,
Reduce The False Positive And False Negative From Real Traffic With Intrusion Detection
1 Vivek.A, 2 Asst Prof. Anbazhagan.K, Sathish kumar.P,
Typically the traffic through the network is heterogeneous and it flows from multiple utilities and applications.Considering todays threats in network there is yet not a single solution to solve all the issues because the traditional methods of port-based and payload-based with machine learning algorithm suffers from dynamic ports and encrypted application.Many international network equipment manufactures like cisco, juniper also working to reduce these issues in the hardware side.Here this paper presents a new approach considering the idea based on SOTC.This method adapts the current approaches with new idea based on service-oriented traffic classification(SOTC) and it can be used as an efficient alternate to existing methods to reduce the false positive and false negative traffic and to reduce computation and memory requirements.By evaluating the results on real traffic it confirm that this method is effective in improving the accuracy of traffic classification considerably,and promise to suits for a large number of applications.Finally, it is also possible to adopt a service database built offline, possibly provided by a third party and modeled after the signature database of antivirus programs,which in term reduce the work of training procedure and overfitting of parameters in case of parameteric classifier of supervised traffic classification.
-In this paper total charge of multigate MOSFET is calculated by using centroid model. Analytical modeling of total inversion charge is computed using self consistent model. The total Charge is analyzed for various value of gate to source voltage and results are discussed. The model is based on charge quantisation within the channel and it includes overshoot velocity effect
Predictive Model Of Stroke Disease Using Hybrid Neuro-Genetic Approach
K.Priya, T.Manju, R.Chitra,
Stroke is a major life threatening disease to cause of death and it has a serious long term disability. The time taken to recover from stroke disease depends on patient’s severity. Number of work has been carried out for predicting various diseases by comparing the performance of predictive data mining. In the proposed work MLFFNN with back propagation algorithm is used. The number of hidden neurons is optimized by genetic algorithm. This work demonstrates about ANN based prediction of stroke disease by improving the accuracy with higher consistent rat using optimized hidden neurons. In this algorithm determines the attributes involving more towards the prediction of stroke disease and predicts whether the patient is suffering from stroke disease. The data is collected from 300 patients. Among that 180 patients having disease .In the proposed work 196 data are used for training and 104 data is used to test the performance of the system.
IRIS-GRATITUDE STRATEGIES ACTIVELY INVOLVED IN AN IMPROVEMENT OF REVOLUTIONARY MERCANTILE APPLICATION ACROSS UNRESTRICTED & RESTRICTED SECTOR.
Ashwini D. waghmare, A.D. Kapse,
This work aims to present the main characteristics of the biometric technology related to iris gratitude used currently in the control of physical access, therefore the biometry is known as the measurement technique more assurance currently in the identification of a person. Iris localization is one of the most essential steps in iris gratitude system and determines the accuracy of harmonizing. In this, efficient techniques for iris localization are proposed and explain how iris is providing high security in restricted & unrestricted sectors. Biometrics itself a science of establishing human distinctiveness by using corporeal or behavioral persona such as face, fingerprints, palm prints, iris, hand geometry, and voice. The control of the physical entrance in computerized safekeeping systems, like banks, ports, airports and military areas, is vital to pledge the economical security of the institutions and to thwart to the possibility of accomplishment of uncompromising acts. To this, a lot of technologies used in security systems can be used, but the choice of a technology depends on some factors, as the level of security related with the economical value to be sheltered, the entailed cost to the technology carrying out related to the level of security presented, and the physical characteristics to the proper installation.
TRANSFORMATION OF UML ACTIVITY DIAGRAMS INTO PETRI NETS FOR VERIFICATION PURPOSES
Bhawana Agarwal,
In the software engineering world, modeling has a rich tradition, dating back to the earliest days of programming. The most recent innovations have focused on notations and tools that allow users to express system perspectives of value to software architects and developers in ways that are readily mapped into the programming language code that can be compiled for a particular operating system platform. The current state of this practice employs the Unified Modeling Language (UML) as the primary modeling notation. The UML allows development teams to capture a variety of important characteristics of a system in corresponding models. Transformations among these models are primarily manual. However, potential faults that violate desired properties of the software system might still be introduced during the process. Verification technique is well-known for its ability to assure the correctness of models and uncover design problems before implementation. This paper presents a set of rules that allows Software engineers to transform the behavior described by a UML 2.0 Activity Diagram (AD) into a Petri Net (PN). The main purpose of the transformation to Petri nets is to use the theoretical results in the Petri nets domain to analyze the equivalent Petri nets and infer properties of the original workflow. Furthermore, we implement a tool to support the transformation process.
ODA : PROCESSING MODEL DESIGN FOR LINKING DOCUMENT
R. N. Jugele, Dr. V. N. Chavan,
Designers of systems have always been deeply concerned about their systems demise. The idea address some thoughts on the implementation of ODA Link systems, particularly with respect to processing design platform that remain malleable and stable through periods of experimentation and radical change. When documents are to be accessed the link structure of the documents should be employed. The structures also form the basis for the presentation of the content of the document to the user. The content of document is not just text but a highly structured collection of text fragments and figures. The model defines link to capture relations and consists of specifications of its starting point and its ending point. The link context structure defines that the displayed component should only be replaced when it is not the component the activated link is pointing to.
WEATHER TEMPERATURE COMPUTATION USING DISCRETE FOURIER TRANSFORMATION TOOLS
A.A. Mohit, Md. Jashim Uddin, M. Shohidul Islam3
The weather temperature computation procedure has been discussed. This paper presents an application of Discrete Fourier Transformation (DFT) technique for weather temperature computation. This temperature computation is based on the previous daily maximum temperature. The experimental result of the temperature computed can found to be in good agreement with the data obtained from Bangladesh Meteorological Department.
In this paper, we made a comprehensive simulation study to evaluate the performance of a multi-user Wideband CDMA wireless communication system. The 2-by-1 spatially multiplexed ½-rated Convolutionally encoded system under investigation incorporates Alamouti space-time block coding scheme with utilization of Walsh Hadamard codes and various digital modulations (BPSK, DPSK, QAM, QPSK and 8PSK). In our study, MATLAB based computer programs have been developed to process the synthetically generated multi-user bit streams and text messages under Additive white Gaussian noise (AWGN) and Raleigh fading channels. The simulation results elucidate that a significant improvement of system performance is achieved with BPSK digital modulation scheme at a comparatively low signal to noise ratios. It has been anticipated from the simulation study that the implementation of Walsh Hadamard is highly effective to discriminate the data (Synthetically generated/text) of individual users.
Md. Jashim Uddin, S.M.A. Rahim, Md. Abdul Al Mohit, M. Shohidul Islam
Comparative study between MFCC and LP-Mel based front-ends for noisy speech recognition using HMM
Md. Jashim Uddin, S.M.A. Rahim, Md. Abdul Al Mohit, M. Shohidul Islam
Since the parameterization in the perceptually relevant aspects of short-term speech spectra in ASR front-end is advantageous for speech recognition, such as Mel-LPC, LPC-Mel, MFCC etc., in this paper, MFCC and LP-Mel based front-ends have been designed for automatic speech recognition (ASR). The speech classifier of the developed ASR is based on Hidden Markov Model (HMM) as it can successfully cope with acoustic variation and lack of word boundaries of speech signal. The performance of the developed system has been evaluated on test set A of Aurora-2 database both for MFCC and LP-Mel based front-ends. It has been found that the MFCC based front-end is more effective for noise type subway, babble, car and exhibition. The average word accuracy for MFCC has been found to be 59.21%, while for LPC-Mel, it has been 54.45%.
Cloud computing provides convenient on-demand network access to a shared pool of configurable computing resources. The resources can be rapidly deployed with great efficiency and minimal management overhead. Cloud is an insecure computing platform from the view point of the cloud users, the system must design mechanisms that not only protect sensitive information by enabling computations with encrypted data, but also protect users from malicious behaviours by enabling the validation of the computation result. In this paper, we propose a new data encoding scheme called layered interleaving, designed for time-sensitive packet recovery in the presence of bursty loss. It is high-speed data recovery scheme with minimal loss probability and using a forward error correction scheme to handle bursty loss. The proposed approach is highly efficient in recovering the singleton losses almost immediately and from bursty data losses.
SURVEY ON RESOURCES PROVISIONING IN CLOUD SYSTEMS FOR COST BENEFITS
M.Karthi, S.Nachiyappan,
In Cloud computing, the information is permanently stored in servers in the internet. From there, the Cloud consumers utilize resources using Virtual Servers and they are charged based on pay-per-use basis. For this, Cloud provider offer two type of provisioning plans, namely On-demand and Reservation plan. They are also called as Short-term and Long-term planning. In general, the reservation plan has minimum cost than on-demand plan. Although the reservation offers the discounted usage price, this option could result in over provisioning and under provisioning problems due to demand uncertainty. There are many kinds of resource provisioning options available in cloud environment to reduce the total paying cost and better utilizing cloud resources. However, the best advance reservation of resources is difficult to be achieved due to uncertainty of consumer’s future demand and providers’ resource prices. In this paper survey the different provisioning options and algorithm. Compare the existing provisioning algorithms with analysis based on cost, availability, uncertainty parameters.
Mr. Anuj Kumar, Mr. Harvinder Singh, Mr. Prateek Bansal
AN IMPROVED TECHNIQUE FOR ENRICHING THE QUALITY OF IMAGE USING ENHANCED NL MEANS APPROACH
Mr. Anuj Kumar, Mr. Harvinder Singh, Mr. Prateek Bansal
Over the years a variety of methods have been introduced to remove noise from digital images, such as Gaussian filtering, anisotropic filtering, and Total Variation minimization. However, many of these algorithms remove the fine details and structure of the image in addition to the noise because of assumptions made about the frequency content of the image. The non-local means algorithm does not make these assumptions, but instead assumes that the image contains an extensive amount of redundancy. These redundancies can then be exploited to remove the noise in the image. In this paper, we are trying to reduce the redundancies so that the quality of the image can be improved and enhanced.
RF ID TAGS BASED ENERGY AUTOMATION SYSTEM USING EMBEDDED TECHNOLOGY
G.Karthikeyan, J.DineshKumar, S.Kannadhasan
Energy is a key factor in the development of any country. The energy needs are increasing day by day. Both for economical and environmental reasons, efficient use of the electrical energy is the need of hour. In our project, we developed one circuit, which will control the utilization of electrical energy in the economical way, especially in the case of energy saving and power management services. An RFID (Radio Frequency Identification) tag consist of a small integrated circuit attached to a small antenna, capable of transmitting a unique serial number a distance of several meters to reading device in response to a query. This RFID tags are passive, these are battery less and obtain the power necessary to operate form the query signal itself. The main heart of the circuit is microcontroller chip, interfaced with different sensing circuit. In our project the energy saving is achieved in RFID based automatic electricity control using embedded technology. This tag has used to access the secured areas. User can display the particular RFID tag to this RFID reader it read this serial number and it also check with its internal serial number when this card serial number is matched it automatically open this door. Then it automatically turn on the special devices AC and light and fan when this person enter the this RFID tag against to this RFID reader then it automatically close the locker and turn off the special devices. Otherwise this card serial number is not matched then it does not allowed this secured room. When the manager has enter the RFID tag into this reader then it automatically turn on this manager special electrical appliance like AC and water heater etc. in this same manner when this employ has come to enter this room enter the tag into the RFID reader then it allow to turn on the person allowed electrical devices like Fan, and TV also. When this corresponding person leaves that particular office then it automatically switches of those particular special devices. So this projects achieved energy saving and avoid the miss usage of electrical appliances.