Proficient Techniques For The Enhancement Of Horizontal Aggregations In SQL
V Prasanti Parimala R Praveen Kumar
The importance of datasets in data mining for knowledge discovery is universally recognized. Raw data sets that are available are not directly amenable for data mining analysis. Vertical and horizontal aggregations have been extensively used to transform the original data set for this purpose. However, vertical aggregations contribute only minimally for preparation of data sets in data mining analysis. Horizontally aggregated data sets are extensively used. Horizontal data sets are generated directly by using simple, yet powerful methods such as CASE, PIVOT, and SPJ. Basic SQL aggregations limitations to return one column per aggregated group using group functions is overcome by these three methods to generate aggregated columns in a horizontal tabular layout that are suitable for data mining analysis. Of these three methods SPJ employs relational operators to realize horizontal aggregations which are a better strategy in comparison to case and pivot. However SPJ’s is weak in performance. In order to enhance the performance of SPJ method which improves horizontal aggregation performance in parallel, we proposed technique to improve SPJ methodology by using Join Enumeration strategies which includes a query tree generation with quantifier’s algorithm. Then horizontal aggregations performance improvement is attempted using secondary indexes on common grouping columns. In conclusion we found that the above two changes improved Horizontal aggregations performance significantly and produce efficient dataset in horizontal format.
R. Ramachandran, R. Manivannan R. Ramachandiran, N. Balachandar
A Real Time Automatic License Plate Recognition Using Optical Character Recognition
R. Ramachandran, R. Manivannan R. Ramachandiran, N. Balachandar
Automatic license plate recognition is used to recognize the characters from license plate image. It is widely used in localized areas such as traffic control, burglary and surveillance. The proposed method applied on yellow color license plate. It has two main stages. First, exact location of the license plate is detected from an input image by using image acquisition and optical character recognition and sobel edge is used for character segmentation. Second, template matching is used to test the recognized characters with templates. This paper also proposed vehicle authorization by checking the license plate number from database and electronic mail is send to administrator if authorization fails.
A Novel Combination of Encryption and Compression for Privacy Protection by Using BTC
Kancharla Murali, Mr.B.Vishnu Vardhan
The privacy protection between the buyer and the respective seller is a area of concern in the area of digital image procession security domain. From last few decades it has been an area of research for many researchers due to its high equipped prominence protection of information between buyer and seller. The Proposed work presents new approach to transmitting the digital images using a framework named block truncation coding. The proposed block truncation coding framework main approach is to compress the images according to original gray level pixel value in high equipped manner. Addition of BTC pixel value along with the pseudo random number to obtain the encrypted image in an efficient way and then transmits the obtained encrypted image. Finally at the receiver side the compressed pixel value is obtained by using cryptographic key which is done in well equipped manner and latter the original image is obtained successfully by decompressing the decrypted signal using the BTC approach.
DESIGN AND IMPLEMENTATION OF USB DRIVER FOR REAL TIME APPLICATION
Kalpavi C Y, Manasa.B.T
In today’s world, a new device is being developed almost every day. All such devices need a device driver for them to be compatible with the PC (Personal Computer). The objective of this work is to design and develop a USB (Universal Serial Bus) driver for real time applications. The device driver designed in this work is a combination of Firmware and Software. Firmware is constituted by the codes written into the Master and Slave Microcontrollers. Software using VB (Visual Basic) code has been developed for the frontend computer system. An USB protocol has been used for this work. This explains the development of new application used in communication industries for connecting modems, routers, hubs etc. and also it provides an easy way to install and operate the devices. This is the latest technology and has wide range of application in the world today.
An Advanced BIST Architecture with Low Power LBIST and BDS Oriented March Algorithm for Intra Word Coupling Faults
P.Ananda Babu, Jagadeesh Samudrala
Today’s System-on-Chips (SoCs) design and test confront several problems, especially power dissipation. Generally, power dissipation of a system in test mode is more than in normal mode. This is because a significant correlation exists between consecutive vectors applied during the circuit’s normal mode of operation, whereas this may not be necessarily true for applied test vectors in the test mode. Reduced correlation between the consecutive test vectors increases the switching activity and eventually the power dissipation in the circuit. The second reason of increasing the power dissipation during test is because the test engineers may test cores in parallel to reduce the test application time. This extra power (average or peak) can cause problems such as instantaneous power surge that causes circuit damage, difficulty in performance verification and decreased overall product yield and cost. Low power test application has become important in today’s VLSI design and test.
Optimization Techniques For High Performance Content Downloading And Data Access In Vehicular Networks
R. M. Kadwe, Pradnya Kamble , Yogesh Bhute
We consider a road scenario where users in vehicles are well-equipped with communication-enabled interfaces in vehicles are requesting for data access or content downloading from the internet servers or roadside Access Points (APs). Here the content that is requested or downloaded is altogether different content (different from that of the other vehicular users). Downloading an altogether different content from the Internet is a topic of increasing interest in vehicular networks due to high demand of mobile users and vehicular networks. We will analyze the technique used for increasing the performance limits of such vehicular communication system for downloading content and accessing data which is unique for the other users by considering the downloading process as an optimization problem, so that can maximize the overall system throughput by leveraging both Infrastructure-to-Vehicle (I2V) and Vehicle-to- Vehicle (V2V) communication. We will see the various methods used to investigate the impact of various factors such as the traffic intensity of vehicular users in the given region, deployment of roadside infrastructure, V2V relaying technique and penetration rate of the system. Our main objective will be to introduce traffic relaying by one or more vehicles creating a multi-hop between the user and the AP along the roadside so that the data flow is maximize across the whole network using a maximum flow algorithm.
Multiple-input multiple-output (MIMO) systems are today regarded as one of the most promising research areas of wireless communications. This is due to the fact that a MIMO channel can offer a significant capacity gain over a traditional single-input singleoutput (SISO) channel. Bandwidth is one important constraint in wireless communication. In wireless communication, high data transmission rates are essential for the services like triple play i.e. data, voice and video. At user end the capacity determines the quality of the communication systems. This paper aims to compare the different RF wireless communication systems like SISO, MISO, SIMO and MIMO systems on the capacity basis. Ergodic capacity and Outage capacity has also been discussed. Moreover, a computer simulation with Matlab is implemented
Next Generation Networks (NGN) Billing and Charging System
Amir Ahmed Omer Yousif
This paper reviews the private next generation networks (NGN) , billing and charging system and clarify the billing and charging system and compared with traditional telecommunications billing system. The paper also contains the NGN billing and charging system mathematical model so as to understand the NGN billing process.
Enhancement of SMAC Using Clustering Approach in Wireless Sensor Networks
Pooja Rani, Manoj Kumar Sah Anil Kumar
The Wireless Sensor Networks (WSNs) have become popular with the increasing development of the smart sensors. Since the sensors used in these networks, operate on the limited battery capacity so that energy efficiency is the main goal. Energy efficiency of MAC protocols is one the wide research area because a major energy consuming component of sensor called as radio, is controlled by MAC protocols. In this paper a protocol known as Cluster Based SMAC (CBSMAC) protocol has been proposed which is based on SMAC protocol and the results has been further analyzed by using ns2 tool to show that CBSMAC is more energy efficient in comparison to SMAC
Payal R. Potarkar, Mayuresh A. Hedao, Prasad M. Dandhare Samiksha D. Nakade ,Pradnya B.Kamble ,
A Survey Paper on "Effective Navigation in Website
Payal R. Potarkar, Mayuresh A. Hedao, Prasad M. Dandhare Samiksha D. Nakade ,Pradnya B.Kamble ,
Well-structured website is not been design yet to facilitate effective user navigation.It has long been a challenge for developers. Mathematical model and two evaluation metrics using real data sets are to be discusses here. Here we also discusses the previous designed models and algorithms which are not so enough for effective user navigation. Developers design the website according to user’s behavior so that the most disoriented user can find their path easily.we are not reorganizing website,just by making substantial changes we are making website more useful. Our goal is to provide better navigation to user by proposed model.
In this paper to investigate the effect of Electrolytic Capacitor and Ultra Capacitor The electrolytic capacitor produces distortion in output while ultra capacitor produces distortion less output. By way of habit DSTATCOM & Tuning the block Parameter of Controller by using matlab Simulation. The foremost detached of the research paper is to appearance that using DISTRIBUTION STATCOM (DSTATCOM) it is possible to reduce the voltage fluctuations like drop and fabulous conditions in distribution systems. In this paper diverse topologies of DSTATCOM (distribution static compensator) are discussed. The distribution static compensator (DSTATCOM) is a shunt connected device capable of compensating power quality problems in the load current. A shunt active filter intended for installation on a power distribution system. The active filter has an addition a capability to regulate the distribution line voltage by means of adjusting reactive power. Theoretical analysis investigates the dynamic performance of combined harmonic damping and voltage regulation. As a result, harmonic damping makes it possible to improve the stability of the control loop for voltage regulation, and the combined harmonic curbing. The system with control scheme is implemented in Matlab / Simulink. The simulation results are shown in figures. The main detached of the research paper is to show that using (DSTATCOM) it is possible to reduce the voltage fluctuations like fall and marvelous conditions in distribution systems
Speech is the most basic, common and efficient form of communication method for people to interact with each other. People are comfortable with speech therefore persons would also like to interact with computers via speech, rather than using primitive interfaces such as keyboards and pointing devices. At present, inputting the data in computer by speech and converting the data into the another form for eg. Text. with the help of automatic speech recognition system and its recognition by the computer is one of the developed scientific fields. As each language has its specific feature, the various speech recognition systems are investigated for the different languages. In this paper, we have classify the Automatic Speech Recognition System
There exist a billing process for meter reading of electricity, gas and water supplier companies, as well as to know the consumption of particular vehicle by reading the meter. Now a days, electricity billing and meter reading are very complex tasks. The current method of billing process uses manual work of reading the meter, updating details of meter and sending bill to the customer. We are developing the technology that comprises android application as well as web application to get reading, updating information into server and informing consumers about electricity consumption units and bill amount. To make meter reading task automatic android application is used to get the readings from the meter by only capturing the image of the meter and then performing the OCR i.e. ”optical character recognition” technique on that image in android app. The result of OCR is meter readings extracted from the captured image and then send to the server. With the help of web application customer can receive mail regarding the bill at the instant the image is accepted at the server and then customer can view his bill. New features can also be added that will reduce workload on companies as well as their workers.
Muhammad Hussain, Rana Faisal Tufail Kashif Riaz , Sohaib Naseer
Resilient modulus of different asphalt mixtures of varying bitumen content by performing Creep test using UTM-5P
Muhammad Hussain, Rana Faisal Tufail Kashif Riaz , Sohaib Naseer
High traffic volume and high traffic load exert a major impacts on roadways .The traffic volume is increasing continuously with passage of time and modern era. This increase in volume cause adverse impacts on roadways and highways and this increase in volume demands a good construction of roadways and means of transportation but during the last few decade, the continuously increasing in traffic volume and poor construction of roadways and highways in combination with an inappropriate due to Govt Policies and regulations cause an continuous deterioration of road network in Pakistan. As the traffic volume increases which cause the increase in traffic load and poor quality of construction or any compromise on the construction quality are the main cause on pavement failure especially in the fatigue cracking. In this research to improve the asphalt binder properties LDPE (Plastics) and crumb rubber are used .The proportion of Additives is kept 0.2% and 0.4% by the weight of bitumen content. In this study the different asphalt mixture are tested for resistance to creep by subjecting all specimen to UTM- 5P at the control load rate. Improvement in resistance against permanent deformation is monitored in Plastic modified bitumen and then crumbed rubber modified mix.
This research work is carried out to study wireless sensor networks (WSNs) are composed of many stumpy cost, little power devices with sensing, local processing and wireless communication capabilities. Minimizing energy dissipation and maximizing network lifetime are important issues in the design of routing protocols for sensor networks. The clustering algorithms are a kind of key technique used to reduce energy consumption, increase the scalability and lifetime of the network. Many routing protocols have been designed which have used the clustering mechanism to improve the energy efficiency and lifetime of the network. In the clustering protocols the cluster heads for every particular round are selected among the nodes that have the highest energy and they aggregate the data from their associated cluster members to transmit it to base station. Traditionally homogeneous networks are only used where the nodes have limited resources and limited computation capabilities as all the nodes are equipped with the same amount of energy and as a result, they cannot take full advantage of the presence of node heterogeneity. Heterogeneous networks are especially useful in extending the lifetime of the network, providing more stability to the network and increasing the throughput of the network, as here total energy of the network is increased due to node heterogeneity. Our protocol comprises of four level heterogeneity as here four types of nodes i.e normal, intermediate, advanced and superadvanced nodes are used to boost the network energy
Introduction to technique of Soft Computing: Artificial Neural Networks
D.P. Salapurkar
This is a literature survey on one of the soft computing techniques i.e. neural networks. It is aimed to get a general understanding on neural networks and find out the possible applications of these models. Beginning with a preliminary definition and typical structure of neural networks, neural networks are studied with respect to their architecture structures. The characteristics and applications of some neural network models are then discussed
An Overview of Load balancing Techniques in Cloud Computing Environments
Bhatt Hirenkumar, H, Prof. Hitesh A. Bheda
The present era has witnessed tremendous growth of the internet and various applications that are running over it. Cloud computing is the internet based technology, emphasizing its utility and follows pay-as-you-go model, hence became so popular with high demanding features. Load balancing is one of the interesting and prominent research topics in cloud computing, which has gained a large attention recently. Users are demanding more services with better results. Many algorithms and approaches are proposed by various researchers throughout the world, with the aim of balancing the overall workload among given nodes, while attaining the maximum throughput and minimum time. In this paper, various proposed algorithms addressing the issue of load balancing in Cloud Computing are analyzed and compared to provide a gist of the latest approaches in this research area.
Secure Geographic Routing Hybrid Approach For Void Resolution In Wireless Sensor Network
Shishir Patra, Jajati Mallick
- In this paper, we propose a new hybrid approach between the geographic greedy mode and the recovery mode in order to improve routing efficiency in number of hops, without network overhead. It exploits the optimal topological route to base stations, obtained by beacon messages, as a resource to find better routes than the ones created by greedy mode and recovery mode. We show by simulations that the proposed hybrid approach leads to a significant improvement of routing performance when applied to combined greedy and recovery routing algorithms.
Solar Radiation Prediction with Single Diode Photovoltaic Module
T.Pearson, S.Bhuvaneswari S.Abish Samuel
This paper proposes a novel simplified model of a photovoltaic module and also the modeling of hourly cloudless solar radiation of a particular site to achieve optimal operation. This model uses standard specifications along with actual solar radiation and temperature. This proposed work develops a matlab/simulink model to generate simulation of solar radiation of any location to provide the insolation on a photovoltaic module of any orientation and for any time of the year. A single diode model for current voltage characteristics and maximum power operation of a photovoltaic module is also presented which models the effect on VI characteristics of varying climate conditions. The combined model of solar radiation and PV module provide a tool to investigate the effect of meteorological conditions on the performance of a PV module generator. The predicted solar radiation and the experimental data are in good compliance.
Cancelable Template Generation Based On Imrpoved Quality Fingerrint Image For Person Authentication
Janani.B, Dr. N. Radha
Biometric based authentication system provides robust security and ease of use than conventional methods of verification system. Among various biometrics namely iris, face and gait recognition, Fingerprint recognition has been extensively used by several organizations for recognition and authentication purpose because of its low cost, usability and reliable performance. However, the performance of fingerprint identification techniques are extensively depends on the quality of the input fingerprint images. Due to the context of the image-acquisition process, most of the fingerprint images are found to be low or lack in quality. By concerning privacy issues, these types of low-quality fingerprint templates are easily accessible by intruders, thereby lacks the security. To address this issue, the present work proposes quality enhanced, secured biometric template which simultaneously combines the quality enhancement and cancellable template generation techniques for robust authentication purpose. The fingerprint quality can be improved by means of two-phase enhancement technique, learns the acquired input image by enhancing spatial and frequency domain of image respectively. After that, the cancellable fingerprint templates are generated by means of transforming the quality enhanced fingerprint minutiae distortedly by using Distortion Transformation. Experimental results show that the proposed algorithm efficiently holds various input image contexts and attains improved results in terms of quality and security when compared with some state-of-the-art methods, and thus improves the fingerprint-authentication systems performance.
This paper about the information on creating a MATLAB application with resistor value calculation program. In this application Graphical User Interface (GUI) for ease to use. It notes the use of color code technique to manually calculate value of resistors. This resistor color code calculator will help to determine the value of axial resistors marked with color bands. It can be used for 3 and 4 band resistors. We can select the colors of the corresponding bands by clicking on them in the table. The resistor will visually show band color choices and display the value of the resistor.
The Concept of Time and Space on the Internet Analyzed through the Pseudonymous
Marcienne Martin, Marcienne, Martin
If the digital society is rooted in civil society, it does not duplicate. Indeed, a great number of social practices are put into place both in the real world as well as in the virtual world and are organized around the same objects: time and space; however, they differ in their realization. The Internet is at the crossroads of two phenomena that oppose one another with respect to both their concepts and the social practices involved; these are anonymity and privacy life. Quite clearly a number of phenomena have emerged from these different Internet approaches. So, what are the consequences of these new concepts of time and space on Internet?
Kali Linux is the operating system that is reverenced by almost every cyber security professional since 2013.While Kali is extensivelydeveloped for penetration testing and digital forensics, it is considered as quintessential operating system for tenderfoot hackers.Basically Kali is the renaissance of Backtrack which typically means that kali is the offspring of backtrack.When it comes to security Kali has the eminent set of exemplary tools. These tools are panacea for your own security practices before a real intruder does it.Among all such tools,there are tools which are highly enamored by security research professionals. This paper enumerates these top tensecurity tools of Kali Linux and is an epistle that will hanker the sinister powers for the use of good.
An Improved Steganography Technique of LSB Substitution Method
Neha Jain, sudhir goswami
In this paper we have discussed the art and science of Steganography in general and proposed an algorithm which is the variant of LSB substitution method. It efficiently and effectively hides data with the help of a key in JPEG colored digital image. Security of hidden data is proportional to the length of key used. Proposed algorithm is capable to hide more data in cover image as compared to the many existing algorithm and require no pre-processing. Successful implementation of this algorithm opens the track for proposed algorithm to be used in data hiding and secure transmission
Amir Ahmed Omer Yousif, Hamid Abbas Ali,UofK, Sami M. Sharif, UofK
Migration to Next Generation IP Network
Amir Ahmed Omer Yousif, Hamid Abbas Ali,UofK, Sami M. Sharif, UofK
This white paper will help service providers understand the benefits and economics associated with implementing a Next Generation Network (NGN). Convergence is the process of interconnection of traditional switched circuit networks (the PSTN and mobile networks) and packet-switched networks based on the Internet Protocol (IP) for routing.
Privacy Preserving Public Auditing and Recovery Using Backup & Restore Method for Secure Cloud Storage
Priya Rupeja, Kalyani Waghmare
As cloud computing provides many relinquish characteristics to users like on demand self-service, storage, multi-tenancy, pay-as-you go and access information from shared pool of configurable computing resources without any burden. So that users stores their data remotely anywhere and enjoy on demand services of cloud. Cloud computing is capable of handling mass data storage and intense computing tasks so that, user can store huge amount of data on cloud without any storage capacity limitations. Despite this, users no longer have a physical possession of the outsourced data which make data integrity and availability in cloud a dreadful task, for those which has limited computing resources. Besides also, user can use cloud storage as it is local without any worry for its integrity check. Thus, to avoid this burden from user so there is need of public auditing for cloud storage. So users can rely on third party auditing (TPA) to check its outsourced data integrity. TPA should effectively do its auditing process without any risk towards user data privacy and provide no additional online burden to user. In this paper, we propose secure cloud storage system which will maintain outsourced data confidentiality and integrity by supporting privacy preserving public auditing. We further extend our system to provide recovery of lost data and also identify which block is lost from which file and recovery of that block or file to maintain data availability in cloud server.
V. Radhika V.P. Priyadharshini, B. Shibila , V. Varsha
Closed loop control of curing process using Lab VIEW
V. Radhika V.P. Priyadharshini, B. Shibila , V. Varsha
The objective of this project is to simulate a curing process chamber found in many industry settings. Curing involves any process where heat is used to catalyze or initiate chemical and molecular level structural changes in polymeric materials such as epoxies, phenolic, polyesters and silicones. The project aims to simulate the entire process of temperature control, its variations and as to how PID controller determines its response in LabVIEW. Each set point is attained and controlled for the specified time. On a waveform chart, all the important process parameters like set point, process variable and controller output are plotted using a DAQ card to the host computer running LabVIEW
Data cleaning techniques are used for identification of record duplicates, missing data, and duplicate elimination. This paper presents a data cleaning system, it goes through six steps: selection of attributes, formation of tokens, clustering algorithm, similarity computation, elimination function, and finally merge step. The system architecture contains three components: users interface, data cleaning, and reports component where they can communicate and cooperate with each other's. It is implemented using SQL Server 2010 and Microsoft visual c# 2010.
Innovation and Knowledge Cluster in 21st century: An Economic Manifesto for e-Learning Future
Sudhir Kumar Sharma, Vandana Lama Nidhi Goyal
21st Century is an information economy age for the digital revolution. The amalgamation of wireless technologies and mobile computing is ensuing in raising the edification domain. The popularity of web-based learning i.e. e-learning or m- learning opens the doors for remote education that will become triumph of future generations. With the aid of the electronic gadgets and services like 3G, 4G have led to the miracle in education reforms. Cloud computing technology helps to manage this on demand service in an efficient technique and offer excellent prospects for economic growth in developed and developing nations. A foremost advantage of this innovative learning is to reach people globally who live in remote places where there are no schools, educationalists, or libraries. The objective of this paper is to urgent reforms in the education system by the introduction of e- learning using latest technologies for the employment and economic benefits of the realm.
Farm Monitoring Mobile Robot Speed Controlled of DC Motor Driver System Using PID Controller.
Namdev K.Barhate, Krishana S.Ingle
The ARM Based controller for DC motor Drive system for mobile robot which are used for The farm environment and plant condition such as temperature, humidity soil moisture content etc. are continuously monitored through suitable data acquisition system incorporated in the robotic system. A DC motor based robotic arm is designed for collecting soil sample and test various soil parameters. A closed loop feedback algorithm based on Digital PID controller has been developed for precise position and speed control of mobile robot. A mobile Robotic system for monitoring these parameters using wireless network has been developed based on ARM platform. Robotic platform consists of ARM7 based LPC 2148 processor, Motor driver, robot mechanical assembly .The multi-sensor measurement over a wireless connectivity for various distances. From an application point of view, a mobile robotic platform is developed to test the multi-sensor embedded system for Agro- Industrial Applications. The indoor and outdoor range for wireless transmission has been presented. It is observed that for better transmission of signals via wireless communication, the low frequency along with low baud rate and line of sight range is required to minimize the signal loss.
R. A.Ganiyu, S. O. Olabiyisi T. A. Badmus , O. Y. Akingbade
Development of a Timed Coloured Petri Nets Model for Health Centre Patient Care Flow Processes
R. A.Ganiyu, S. O. Olabiyisi T. A. Badmus , O. Y. Akingbade
:Hospital deals with human lives, which are often at risk and where everything depends on quick response to diverse medical conditions. Thus, the need for efficient and effective management of patient care flow processes in a hospital is being one of the main leading goals in health sector.In this paper,a Timed Coloured Petri Nets (TCPN) formalism is used to develop a simulation model forpatient care flow processeswith emphasis on medical record area and examination room using Ladoke Akintola University of Technology Health Center, Ogbomoso, as a case study. The developed TCPN model consists of a main model (arrival and evaluation module) and a sub model (treatment module). The main model abstracts the arrival and operation(pre-treatment test) in the medical record area while the sub-model describesthe operation (treatment) taking place in the examination room of the health centre.The developed TCPN model was simulated using CPN tools while its validation was explored by comparing the simulated and actual number of patients of the health centre under study.The results obtained from the simulation of the TCPN model revealed 34 (7 inpatients and 27 outpatients), 53 (9 inpatients and 44 outpatients), 42 (8 inpatients and 34 outpatients) and 45 (9 inpatients and 36 outpatients) as the average numbers of patients entering the health centre during the first, second, third and fourth working days under consideration, respectively. Statistically, there were no significant differences between the simulated and real number of patients entering the health centre at 5% level. This gave a confirmation that the developed TCPN model accurately described the patient care flow processesof the health centre under study.The developed TCPN model could serve as a referential model for studying and improving patient care flow processesina named health centre
Hand gesture recognition has proven to be an excellent means of Human Computer Interaction over other approaches through keyboards and mouse. This paper presents a review of the evolution of this excellent, easy and natural way of Human Machine Interaction. In this review article the advantages and disadvantages of various techniques that have come up with time and ongoing researches in this field have been discussed. Most of the researchers initially used gloves for the interaction, and then came the vision based hand gesture recognition for 2D graphical interface which uses colour extraction through optical flow and feature point extraction of the hand image captured. New ideas and algorithms have come for 3D applications for moving machine parts or humans. This evolution has resulted in developing a low cost interface device for interacting with objects in virtual environment using hand gestures. Finally, the future work that can be done in this field is also discussed.
Double Threshold Based Load Balancing Approach by Using VM Migration for the Cloud Computing Environment
Rajyashree, Vineet Richhariya
Cloud computing is emerging as a new paradigm for next generation computing in the field of computer science and information technology because of their attractive services such as adaptive, online, value added and pay as use scheme. Virtualization is the core technology in the cloud computing, which allow the sharing of physical resources. With the help of virtualization single physical device can be share by the multiple users. So it increased the resource utilization. Cloud is a very large in size and having complex structure. Cloud resources are heterogeneous and geographically distributed and the resource demanded by the user may change dynamically on runtime. So the resource management and the resource scheduling in such a large-scale distributed environment is a very challenging task. In cloud environment each data center can contain number of host, so there may be a situation when some hosts are overloaded and some are underloaded. To avoid this situation we proposed a double threshold based load balancing approach, where threshold is decided based on the utilization. This approach motivated by the fact that overloaded situation can’t be avoided, but can be control by assigning the dynamic threshold. For assigning the dynamic threshold we monitored host utilization for each 20 Second and assign the threshold based on the utilization in the previous interval. Experiment result shows that our approaches reduce the energy consumption and minimize the number of migration
Data mining and machine learning depend on classification which is the most essential and important task. Many experiments are performed on Student datasets using multiple classifiers and feature selection techniques. Many of them show good classification accuracy. The existing work proposes to apply data mining techniques to predict Students dropout and failure. But this work doesn’t support the huge amount of data. It also takes more time to complete the classification process. So the time complexity is high. To improve the accuracy and reduce the time complexity, the MapReduce concept is introduced. In this work, the deadline constraint is also introduced. Based on this, an extensional MapReduce Task Scheduling algorithm for Deadline constraints (MTSD) is proposed. It allows user to specify a job’s (classification process in data mining) deadline and tries to make the job to be finished before the deadline. Finally, the proposed system has higher classification accuracy even in the big data and it also reduced the time complexity.
A Review on Distributed Application Processing Framework – Clone Cloud
Prajakta R. Mali, Gayatri D. Naik
The latest developments in mobile devices technology have made smartphones as the future computing and service access devices. Users expect to run computational intensive applications on Smart Mobile Devices (SMDs) in the same way as powerful stationary computers. However in spite of all the advancements in recent years, SMDs are still low potential computing devices, which are constrained by CPU potentials, memory capacity and battery life time. Mobile Cloud Computing (MCC) is the latest practical solution for alleviating this incapacitation by extending the services and resources of computational clouds to SMDs on demand basis. In MCC, application offloading is ascertained as a software level solution for augmenting application processing capabilities of SMDs. The current offloading algorithms offload computational intensive applications to remote servers by employing different cloud models. This seminar reviews existing Distributed Application Processing Frameworks (DAPFs) for SMDs in MCC domain. And mainly focuses on CloneCloud Framework.
In this paper we propose a new and effective image retrieval scheme using color, texture and shape features based on pseudo-Zernik moment. Image is predefined by using fast color quantization algorithm with cluster merging. A small number of dominant colors and their percentage can be obtained. The spatial features are extracted using steerable filter decomposition. This offers an efficient and flexible approximation of early processing in the human visual system (HVS). Sharp descriptor of an image uses pseudo-Zernik moment. It provides better feature representation and more robust to noise then other representations. Finally, the combination of the color, shape and texture feature provides a robust feature set for image retrieval. Experimental result shows that the proposed method provides a better color image retrieval. It provides accurate and effective in retrieving the user-interested images.
A Configurable Bus-Tracer For Errorreproduction In Post-Silicon Validation
E.Deepthi, Cha.Swamy, S.Prabhakar
In today’s modern system-on-chips , there are several intellectual properties on the system to provide different functionality. However, more complex communications on SoCs the harder at which the programmer could discover all errors before first silicon during its verification. Therefore, it provides a reconfigurable unit for recording the transactions between IPs and adopt logical vector clock as a time stamp of each trace. The programmable trigger unit in debugging node could be configured by the validation to cache their interest sequences of transaction. Because traces of transactions would have their own timestamp, during the post-silicon validation, finally it could reproduce the errors in faulty transactions between IPs and get more information for by passing or fixing the problems. In future, due to several entries of traces finally shrink observation window very quickly, it also implement a compressor to compress traces before it store them into trace buffer. Finally,experiments demonstrate that the proposed debugging architecture is capable of recording the critical transactions, and the proposed reconfigurable debugging unit whole debugging execution time can be reduced more than 80%.
Improving Security and Reduce Overhead in Mobile Health Monitoring
N.Tajunisha, V.Archana
Cloud-assisted mobile health (mHealth) monitoring, which applies the prevailing mobile communications and cloud computing technologies to provide feedback decision support, has been considered as a revolutionary approach to improving the quality of healthcare service while lowering the healthcare cost. Unfortunately, it also poses a serious risk on both clients’ privacy and intellectual property of monitoring service providers, which could deter the wide adoption of mHealth technology. This paper is to provide better privacy and security in a mobile health monitoring system and also to protect the privacy of the involved parties and their data. Moreover, a newly proposed Diffie Hellman algorithm and Homomorphic encryption technique are adapted. Finally, the security and trust worthiness demonstrates the effectiveness of our proposed design. One service provider operates the encryption and decryption system while other providers operate the storage and application systems, according to the core concept of the proposed Health monitoring model. Our work further includes suggestions for multi-party Service- Level Agreement (SLA) suitable for use in the proposed Health monitoring model.
Varsha Pandey, Mr. Neelmani Verma Deepak Kumar Xaxa, Devendra Kumar
Achieving MAC Fairness Using Binary Exponential Backoff (BEB) Algorithm in Wireless Adhoc Network
Varsha Pandey, Mr. Neelmani Verma Deepak Kumar Xaxa, Devendra Kumar
The Medium Access Control (MAC) protocol is the main constituent which determines the system throughput using IEEE 802.11 protocol in Wireless Networks. The MAC Layer system of the IEEE 802.11 protocol is also referenced as Distributed Coordination Function (DCF). In DCF mode, source nodes contend for the use of the channel in dispersed manner via the use of the Carrier Sensing Multiple Access with Collision Avoidance (CSMA/CA) procedure. Using the CSMA/CA procedure, each source nodes sets up a Backoff time according to a randomly selected interval from zero to the Contention Window (CW) size for an extra delay time before transmitting the data packets. Binary Exponential Backoff (BEB) algorithm is used to randomize moments at which source nodes try to access the wireless medium. Additionally, in the Backoff mechanism, data packet collisions are not totally eliminated, and the system throughput is decreased when the number of source nodes is large, and there is no fairness between source nodes. The BEB algorithm occupies number of disadvantages; one vital disadvantage is the problem of fairness. This research paper analyzes the behavior of the BEB algorithm used in IEEE 802.11 protocol. We have proposed a hybrid environment using IEEE802.11p protocol to enhance the fairness of the channel access for BEB algorithm. Hybrid approach adapts the way of increase or decrease of the contention window (CW) based on the number of the frame which is delivered successfully. NS-2 simulator is used to analyze the network's fairness of the channel access of the BEB algorithm in terms of throughput, end-to-end delay and packet dropping ratio. The result showed that comparing with IEEE 802.11 and BEB algorithm, hybrid approach with IEEE 802.11p improves the fairness of the channel access and increases the network's throughput capacity.
Survey on Different types of Neural Network Techniques to Classify Human Face
Akshay Patil, Saurabh Wagh Abhishek Sahay
Face Detection presents a challenging problem in field of image study and computer visualization but nowadays, Face Detection is important technique because it uses in various Application. There are many approaches to implement it. In this paper, an overview of some of the well-known methods in each of these categories is provided and some of the benefits and drawbacks of the schemes mentioned are examined. This paper also mentions some of the most recent algorithms developed for this purpose and attempts to give an idea of the state of the art of face recognition technology.
ECC Based Prevention for Side Channel Attack: A Survey
Anuja S. Deoghare , K. N. Hande
Elliptic curve cryptography has many advantages like it is used for data encryption as well as digital signature. Also it gives efficiency for both software and hardware implementation. Despite of its security level the elliptic curve cryptography is affected by various types of attacks like side channel attacks. In side channel attack basically the attacker retrieve the secret key with less effort and affect the implementation of the cryptosystem and exploit the information leakage. We introduce the most effective side channel attack is the power analysis attack. This attack categories into simple power analysis attack (SPA) that reveals the secrete key by analyzing operation sequence that depend on the key value using power consumption trace and differential power analysis ie.(DPA) it uses statistical tool for analyzing the correlation between consumption and processing operation which depend on secrete key. Basically the Power analysis attack exploits the power consumption of the cryptosystem and break the ECC.
this paper presents a comparative study of various operating system archetypes similar to Windows, Linux, UNIX, ANDROID, and AMIGA which are the most well known operating systems. The basic criterion for studying the different operating systems the fundamental architecture power management, Architecture, security and throughput, this research study gives an overview on the similarities and differences in the basic operating systems use. As every operating system has difference in the underlying composition and working background this gives the best valuable comparative study.
iOS Based Multipurpose Application for Task Scheduling with Voice Command Handling
Pratik R. Sardar, R. A. Kulkarni, S. M. Kolekar
— Smartphones provides the facility adoption of various mobile applications. The goal of this project is to implement all in one mobile applications, and find out the intention of customers or users to use this application. In this paper, we explain our experiences on constructing speech recognition applications on smartphones. We are going to explain three different models of use for speech recognition systems on smartphones that are – speech recognition in the cloud, distributed speech recognition and embedded speech recognition; evaluating advantages and disadvantages of these models. Mobile Cloud Computing has improved the way of using the service by customer across the globe It integrates cloud into smartphone environment and overcome the drawbacks regarding to performance like battery usage, bandwidth and storage.
Constructing Horizontal layout and Clustering Horizontal layout by applying Fuzzy Concepts for Data mining Reasoning
Kalluri N V Satya Naresh, Divya Vani .Y
Clustering is one of the significant tasks in data mining which is benevolent for bounteous users by affording analysis and decision making. This paper inaugurates agile and dexterous way to conceive horizontal layout and forthright usage of horizontal layout in data mining algorithms like clustering. Predominantly educing a data set in data mining project for analysis is a time conceiving, striving task so horizontal layouts are created and stored in database which averts the burden of performing data preprocessing in data mining projects .The vertical layouts created by vertical aggregations in SQL are impotent for data mining algorithms so horizontal aggregations are used to create horizontal layouts. It is surpass to create horizontal layout instead of creating vertical layout as vertical layout only creates one column per aggregated group by using normal SQL (Structured Query Language) aggregations and horizontal layouts returns many values per aggregated group or row so they are useful for data mining algorithms. Through CASE and SPJ methods horizontal aggregations are evaluated for creating horizontal layouts dexterously and agilely. This paper induces how horizontal layout can be created easily with CASE method than by using SPJ method. To prepare a data set for clustering takes more time and effort so the created horizontal layout is obliged for clustering directly without wastage of time and effort. As in data uncertainty is the key feature so by using soft computing concepts like Fuzzy Set, clustering of horizontal layout is done, hence clustered data is serendipitous for users for analysis and decision making and the whole process is elucidated with examples and experimental results.
Maximum Power Point Tracking System for Wind Generator Using MATLAB.
Krishnat R. Dubal, dattatray S. Chavan
:The purpose of this work is to develop a maximum power tracking control strategy forvariable speed wind turbine systems. Modern windturbine control systems are slow, and they depend on the design parameters of the turbine and use wind and / or rotor speed measurements as control variable inputs. The dependence on the accuracy of the measurement devices makes the controller less reliable. The proposed control scheme is based on the stiff system concept and provides a fastresponse and a dynamic solution to the complicated aero dynamic system. This control scheme provides a response to the wind changes with out the knowledge of wind speed and turbine parameters. The system consists of a permanent magnetsynchronous machine (PMSM), a passive rectifier, adc/dcboost converter, acurrent controlled voltages our ceinverter, and a micro controller that commands the dc/dcconverter to control the generator for maximum power extraction. The microcontroller will also be able to control the current output of the three-phaseinverter. In this work, the aerodynamic characteristics of wind turbines and the power conversion system topology are explained. The maximum power tracking control algorithm with avariable stepestimat or is introduced and the modeling and simulation of the wind turbine generator system using the MATLAB/SIMULINK® software is presented and its results show, at least in principle, that the maximum power tracking algorithm developed is suitable for wind turbine generation systems.
Embedded Based System for the Fruit Quality Management Using PIC Micro Controller
J.Ramprabhu S.Nandhini
This paper presents a novel defect segmentation of fruits based on color features with K-means clustering algorithm. The algorithms Gaussian Mixture Model (GMM), Support Vector Machine (SVM) are used for background removal and color classification respectively. Physical recognition of defected fruit is very time overwhelming. These days, most existing fruit superiority detecting and grading system have the drawback of low efficiency, low speed of grading, high cost and complexity. Although the color is not commonly used for defect segmentation, it produces a high discriminative power for different regions of image. This approach thus provides a feasible robust solution for defect segmentation of fruits. Image processing gives solution for the automated fruit size grading to give precise, dependable, unfailing and quantitative information apart from handling large volumes, which may not be achieved by employing the human graders. The hardware model can also be created by using PIC microcontroller. This will have a good aspect of application in fruit quality detecting industries.
Evaluation of Network Performance Using Upper Threshold RED
Jai Mungi, Aishwarya Mishra
Random Early Detection [RED] algorithm achieves high throughput, packet delivery and low average end to end delay by stabilizing the average queue size through mapping the congestion into packet drop probability and detection and avoidance of incipient congestion. This paper includes the research work done in recent and modified mechanism to control the network congestion by maintaining the average queue length in acceptable range. This mechanism will avoid congestion, so that overall network performance will improve. Goal of this research paper is to gain higher throughput and low end to end delay in highly congested network.
An Intrusion Detection System Based On Support Vector Machine Using Hierarchical Clustering And Genetic Algorithm
Minakshi Bisen, Amit Dubey
An NIDS system based on SVM ,GA and Hierarchical Clustering is proposed.GA along with hierarchical clustering is used to provide fewer,efficient and abstraced instances of the KDD Cup 1999 dataset to SVM for further processing.GA is used to eliminate the unimportant feature and BIRCH hierarchical clustering is used to provide optimal instances of the data set to the SVM.Due to this optimal instances, SVM will be able to classify the network traffic data more accurately and precisely . This system try to reduce the detection time of r2l,u2r,probe and DoS atack and increase in the accuracy
A Survey on Different Methods for Hiding Information behind an Image
Deepali G. Singhavi, P. N. Chatur
In recent years data hiding has been proposed as a likely technique for the purpose of information security.Hiding data is the process of embedding information into digital content without causing perceptual degradation. In data hiding, pieces of information represented by some data are hidden in a cover media like image. The main intention of data hiding is to prevent the detection of hidden information.The most commonly used algorithm for data hiding is Least Significant Bit algorithm apart from these various algorithms have been proposed for data hiding in last few years. This paper consists of survey of different methods and techniques available for data hiding
Mining Educational Data for Predicting Higher Secondary School Student’s Grade Using ID3 Algorithm
Nirmala Devi.R, Deepa.R , Kalaiarasi. P
Educational data mining concerns with developing methods for discovering knowledge from data that come from educational domain. The performance in higher secondary school education in India is a turning point in the academic lives of all students. It is essential to develop predictive data mining model for student’s performance so as to identify the slow learners and make necessary steps for the improvement of the students. In this paper, a new system that will predict students’ higher secondary grades based on academic and personal details of the students. ID3 decision tree algorithm was used to train the data of the school students sets. The knowledge represented by decision trees were extracted and presented in the form of IF-THEN rules. A set if prediction rules were extracted from id3 decision tree algorithm and the efficiency of the generated model was found.
A Novel Fusion Approach by Non-Sub Sampled Contourlet Transform
Patil. Sujatha, N.Nagaraja Kumar
In This project we analyzes the characteristics of the non-sub sampled counterlet Transform and put forward an image fusion algorithm based on Wavelet Transform and the Second Generation Curvelet Transform method. We would take the selection principles that all about low and high frequency coefficients according to different frequency domain after Wavelet and the Second Generation Curvelet Transform. We first measure the STD (stranded deviation) of low frequency components and high frequency components. The window property and local characteristics of pixels were analyzed in this method. Totally, the proposed algorithm in this paper was appalling to the experiments of multi focal image fusion and also complementary image fusion. In accordance with the final results the proposed method hold useful information with other method
Context-Aware Approach for enhancing security and privacy of RFID
Nisha R. Wartha, Vaishali Londhe
RFID systems have increasingly impact on both public and private domains. However, due to the inherent weaknesses of underlying wireless radio communications, RFID systems are plagued with security and privacy threats. Approach for enhancing security and privacy in certain RFID applications location-related information can serve as a legitimate access context. Examples of these applications include access cards, credit cards, and other payment tokens. To defend against unauthorized reading and relay attacks, such context information can be leveraged in two ways. First, contextual information can be used to design context-aware selective unlocking mechanisms so that tags can selectively respond to reader interrogations and thus minimize unauthorized reading and “ghost-and-leech” relay attacks. Second, contextual information can be used as a basis for context-aware secure transaction verification that allows a bank server to decide whether to approve or deny a payment transaction and detect a specific type of relay attack involving malicious readers.
To propose a new algorithm for improving software architecture with clustering algorithm
Jyoti Godara, Shilpa Sharma
The size and difficulty of business potential software systems are continually rising. This means that the task of supervision of a large software project is becoming even more demanding, particularly in light of high turnover of skilled human resources. Software clustering approaches can help with the task of understanding large, complicated software systems by automatically decomposing them into smaller, easier-to-manage subsystems. In this paper we recognize significant study instructions in the area of software clustering that require further attention in order to develop more effective and efficient clustering methodologies for software engineering. To that end, we first there the state of the art in software clustering research. We consider the methods of clustering that have received the most attention from the research community and outline their strengths and weaknesses. Our paper defines every stages of a clustering algorithm separately. We also present the most important approaches for evaluating the value of software clustering.
Dual Tree Complex Wavelet Transform Based On Noise Reduction Using Partial Reference
Somabattini Venkata Nagaraju, Ch.Ramesh
The main aim of this paper is to reduce noise introduced by image enhancement methods based on the random spray sampling technique. Based on nature of sprays, output images of spray-based methods shows noise with unknown statistical distribution. The non-enhanced image is nothing but either free of noise or affected by noise of non-perceivable levels. The dual-tree complex wavelet transform (CWT) is a relatively recent enhancement to the discrete wavelet transform (DWT), with important additional properties: It is nearly shift invariant and directionally selective in two and higher dimensions. Across the six orientations of the DTWCT the standard deviation of non-enhanced image coefficients can be computed, and then it normalized for each level of the transform. The result is a map of the directional structures present in the non-enhanced image. Then Said map is used to shrink the coefficients of the enhanced image. According to data directionality the shrunk coefficients and the coefficients of the non-enhanced image are mixed. Finally, the enhanced image can be computed by doing the inverse transforms. The theoretical analyses of new algorithm are well verified via computer simulations.
Examplar Based Inpainting Mechanism Based On Sr Algorithm
Kodi.Meena, Ch.Ramesh
In digital image processing “filling the missing areas” is still area of concern. Although so many algorithms proposed in the literature to tackle this issue of “filling the missing areas”. A new framework is presented in this paper for examplar-based in painting. In the proposed literature, algorithms are mainly classified into two stages. Firstly inpainting is applied on the coarse version of the input image, latter hierarchical based super resolution algorithm is used to find the information on the missing areas. The unique thing of the proposed method is easier to inpaint low resolution than its counter part and creating a mask based on the priority of missing information. To make inpainting image less sensitive to the parameter, it has inpainted several times by different configurations. The output from the inpainting phase is efficiently combined using the novel loppy belief propagation and finally by using the super resolution algorithm details are recovered based on the dictionary building approach. The proposed literature results are compared with the different conventional methods, to prove that the proposed literature results more reliable and yield high performance in all concern areas.
A Review On Palmprint Recognition Using Features From Principle Lines
Ramandeep Kaur, Meenakshi Garg
Palmprint recognition is one of the most important approaches of biometric technology and is one of the most reliable and successful human being identification and authentication methods. In this paper, several existing palmprint recognition algorithms have been studied and analyzed. These palmprint recognition helps to identify the individuals effectively. A simple approach to pre-processing and ROI extraction has been discussed. The available databases have also been analyzed and the most efficient of all will be used for the development of the proposed system. The technique described in this paper gives an overview of palmprint recognition
Review on Xml Tree Pattern Matching Using Holistic Algorithms
Bharti D. Wanjari, Kapil N. Hande
The extensible markup language XML has recently to come into view as a new standard for information representation and exchange on the internet. With XML becoming ever-present language for data interoperability purposes in various domains, efficiently querying XML data is a critical issue. XML has become a practice standard to store, share and exchange business data across similar and dissimilar platforms. The interoperability is possible though XML. As organizations are generating large amount of data in XML format, there is a need for processing XML tree pattern queries. This paper presents survey on some developments in the field of XML tree pattern query processing, especially focusing on holistic approaches. XML tree pattern query processing is a research flow within XML data management that focuses on efficient Tree Pattern Query (TPQ) answering. The existing holistic algorithms for XML tree pattern matching queries display suboptimmality problem as they consider intermediate results before taking final results. This causes suboptimal performance. This suboptimality is overcome by using TreeMatch algorithm. This paper presents the overview of prototype application that makes use of efficient Dewey labeling scheme to overcome suboptimality with TreeMatch algorithm.
Review on Performance of MANET Using Different Routing Algorithm
. Bobby R. Sarode, A. A. Nikose
Now a day’s wireless ad-hoc network is receiving more popularity as compared to wired networks. A wireless ad hoc network is a decentralized type of wireless network. A Mobile Ad hoc Network can change locations and arrange itself. A Mobile Ad-Hoc Network (MANET) is self-configuring network of mobile nodes connected by wireless links to form an uninformed topology without the use of existing transportation. Previous make inquiries in ad hoc networking have generally studied the routing problem in a non-adversarial setting by considering the trusted atmosphere. In this paper, we investigation the design and performance evaluation of a new efficient on demand routing protocol for mobile ad-hoc networks. Up till now many routing algorithms have been proposed to find the routing trouble in mobile ad-hoc networks so it is difficult to evaluate the presentation of different routing protocols qualitatively as there are many point of view that affect the performance of network. The proposed TAODV (Tactical On Demand Distance Vector Routing Algorithm) algorithm performs superior for finding routing problems in Mobile Ad Hoc networks. Most of the proposed algorithms use a blind flooding technique through the route discovery process. This method is unsuccessful and creates excessive routing overhead. To defeat this problem, the forth put routing protocol uses a query localization technique that importantly reduces the network traffic and raises the performance of network. The simulation results clearly show that proposed on demand routing protocol is more efficient and resizable than existing ones.
Scalable Push Pull architecture for retrieving student information request and response with data wrappers
J.Saravanesh, E.Ramaraj
The concept of web services deals with request and response services for storing and retrieving data. As the data focus on dynamism, the strategy becomes highly impeccable to deal with the growing data volumes. The data service also retrieves the unwanted data that come along with the request. The strategy should satisfy the demand and balance the volume and provide exact result using the pull push architecture. The proposed work address the same that produce feasible result for student information gathering based on the information request by them and the response made in return. The work also address the data wrapper set that encapsulate specific information target based on the request.
A Survey of Various Scheduling Algorithms and types of Resources Provisioning in Cloud Environment
Jeni Patel, Jignesh Prajapati ,
Cloud computing is referring as simply “the cloud,” which is the delivery of on-demand computing resourceseverything from applications to data centers-over the Internet on a pay-for-use basis. In Cloud computing it contain four types of deployment model Private cloud, public cloud, hybrid cloud, community cloud. Cloud Services are Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). As cloud charge you for what you use only, it is necessary to manage the resources. So, The managing of cloud resources and handling user’s request is important things for cloud computing. In this paper present various types of scheduling algorithms for resources managing and also define the resources provisioning techniques. Also define the comparison between scheduling Algorithm.
Vikash K Singh, Devendra Singh Kushwaha, Shaibya Singh, Sonal Sharma
Introduction of “Internet of Things” its Application and Challenges
Vikash K Singh, Devendra Singh Kushwaha, Shaibya Singh, Sonal Sharma
In recent years, the term “Internet of Things” has spread rapidly we’re entering a new era of computing technology that many are calling the Internet of Things (IoT). Machine to machine, machine to infrastructure, machine to environment, the Internet of Everything, the Internet of Intelligent Things, intelligent systems call it what you want, but it’s happening, and its potential is huge. We see the IoT as billions of smart, connected “things” (a sort of “universal global neural network” in the cloud) that will encompass every aspect of our lives, and its foundation is the intelligence that embedded processing provides. The IoT is comprised of smart machines interacting and communicating with other machines, objects, environments and infrastructures. As a result, huge volumes of data are being generated, and that data is being processed into useful actions that can “command and control” things to make our lives much easier and saferand to reduce our impact on the environment. The creativity of this new era is boundless, with amazing potential to improve our lives. Now consider that IoT represents the next evolution of the Internet, taking a huge leap in its ability to gather, analyze, and distribute data that we can turn into information, knowledge, and, ultimately, wisdom. In this context, IoT becomes immensely important.
Data Privacy in Multi Cloud Environment using Third Party Key Providence in Public Clouds
S.V Satish Kumar Reddy, K.Narayana
Cloud computing provides the data to the users remotely on different services. The Encryption plays major role in securing the data in cloud. We can access the data using encryption with key for more privacy reasons. Now-a-days the public cloud needs more privacy because of the increment of number of users everyday. The multi cloud technique performs load balancing when there is huge transactions of the data. The key is used to arrange more security for accessing the data by the owner, but to have secure communication better to have a support of the third party for key issuing. In this paper we provide third party for key providing in multi cloud environment. The encryption algorithm provides basic security for the data
The present paper provides the conceptual framework of next three generation of wireless technologies: Wi-Fi, WiMAX and MBWA the formally, in which expertise or combination of two expertise provide a key for making of a wireless network. Every expertise are assessed founded on presentation, exposure zone, dependability.
A Novel And Improved Technique For Clustering Uncertain Data
Vandana Dubey, A A Nikose
Clustering on uncertain data, one of the essential tasks in data mining. The traditional algorithms like K-Means clustering, UK Means clustering, density based clustering etc, to cluster uncertain data are limited to using geometric distance based similarity measures and cannot capture the difference between uncertain data with their distributions. Such methods cannot handle uncertain objects that are geometrically indistinguishable, such as products with the same mean but very different variances in customer ratings. In the case of K medoid clustering of uncertain data on the basis of their KL divergence similarity, they cluster the data based on their probability distribution similarity. Several methods have been proposed for the clustering of uncertain data. Some of these methods are reviewed.Compared to the traditional clustering methods, K-Medoid clustering algorithm based on KL divergence similarity is more efficient. T
Improved Energy Consumption and Resource Utilization through Sensor Virtualization in Smart home
Monali G.Sonule, Swati Nikam
Wireless sensor networks have tremendous importance in our daily life style. Recently in the fields of WSN, the concept Virtualization of wireless sensor network i.e. VSN is a new promising research approach. The state of the art technology can provide the opportunity to build an economic business model for application area such as smart home, health care, because of the involved infrastructure cost. In this paper we propose an agent based approach of sensor virtualization concept in Smart home by efficiently utilizing the available resources for multiple Smart home applications through scheduling sensing activity and reduce Energy Consumption. We have implemented and evaluated the sensor virtualization scheme in real time environment. The evaluation method shows that the virtualization of s ensor network technology reduces the overall cost and complexity
In today's world, safety and security are the major aspects that are confronted by any individual. The existing systems in the present scenario are not efficient enough to provide necessary security. We implement a system "cab tracking and personal security system" is an android application. Android is a new generation of smart mobile phone platform launched by google. Cab tracking and personal security system enables the server (company) to track the employees who opt for cab services as well as helps the employee to retrieve the information about their current location and offers possible services according to the need. With the help of GPS in phones and through web services using GPRS, Location based Services are implemented on android smart phones to provide services like advising clients with routing information, help them finding nearby Emergency Services.
Nowadays electricity has become the most important aspect of life without which no work can be performed or completed. So this paper introduces about electricity management via Android application. As to manage electricity in a very efficient way, we are providing postpaid and prepaid billing system to customer. Also task of human intervention will get reduced as there will be no manual reading. The meter reading will be transmitted wirelessly to the local server along with the meter number. This data will be fetched by the server and generate bill automatically .The user will be able to view updated power consumption as well as billing information in provider web services. When bill is generated SMS alert will be send to the owner's mobile number. If in case the owner has not paid his bill, cut-off warning messages will be send to users via e-mail and SMS
Analysis and Simulation of Orthogonal UWB Pulse for Modulation Scheme and Transmission
Suvarna R. Patil, Vishal Raskar
A promising coherent Impulse-Radio Ultra-Wideband (IR-UWB) communication system with one relay. IR-UWB communications attracted significant attention as a strong candidate solution for short-range high data-rate applications. UWB is a modulation and data transmission method which has potential to change the wireless picture entirely in future. The non-orthogonal cooperation in narrow-band wireless networks often requires deploying distributed space-time codes with joint encoding of several symbols at the source and relays; in addition, it requires joint decoding of these symbols at the destination. But the proposed non-orthogonal cooperation scheme realized within one symbol duration. This means the proposed strategy is adapted to the structure of the Pulse Position Modulation (PPM) that constitutes the most popular modulation scheme associated with UWB transmissions. This strategy also proposes a simple and efficient power allocation strategy that further boosts the performance of the proposed cooperation strategy. This paper illustrates various pulses using Gaussian monocycle and doublet.
Enhancing Information Management System performance by specializing the concept of Indexing
A. S. Dhanadhya, P. N. Chatur
For almost all the colleges and universities, having such a large amount of information, with regard to accurately and efficiently carry out the student’s management on the basis of a full grasp of information, the extent of difficult task is incomprehensible. Through the SIMS, we can realize the management of students information network-based digitally, groove and gather the students information realtimely, precisely, minimize the workload of students information management, assist the scientific and effectiveness of students information management, thus to uphold the management of college students to carry out high efficiently. The common way to represent a relational database is a tabular structure, where each table represents a relation. The extent of difficult task is unimaginable for each of the colleges and universities, having such a large amount of data, in order to accurately and efficiently carries out the student’s management on the basis of a full grasp of information. We now can realize the management of students information network-based digitally, groove and gather the students information real-timely, precisely, minimize the workload of students information management, stimulate the scientific and effectiveness of students information management through the SIMS, and hence we can uphold the management of college students to carry out high efficiently. The common way to represent a relational database is a tabular structure, where each table represents a relation.
Search Results Clustering using TF-IDF Based Apriori Approach: A Survey Paper
Hetal C. Chaudhar K. P.Wagh P.N.Chatur
the use of internet has increased exponentially. Search engines have become most important tool to retrieve any kind of information from the web. Users simply cast their queries on a search engine to get the desired information. More than thousands of documents are shown in search results of a query. Many times most of these web pages are not relevant to the user at all. Thus, it becomes essential for search engines to return only the relevant information to the user based on the query. Clustering makes it easier to separate out relevant results out of thousands of search results obtained for a query. Combining clustering with ranking can make it better as clustering makes groups of similar documents and applying ranking methods ranks each cluster according to their relevance with the user query. In this survey, various clustering techniques implemented before and their results are discussed. Some recent techniques discussed here are proven much more accurate than the traditional techniques.
Different Methods of Classification of Documents A Survey Paper
Sneha K.Dehankar, K. P.Wagh P.N.Chatur
The task of web mining is to classify documents automatically many algorithms have been developed to deal with automatic text classification The most common techniques used for this purpose include Apriori algorithm. In this survey, the various models using Apriori algorithm are explained to classify the text of documents, saving time and increasing accuracy of the web searching. It increases the data accessibility on the web giving the results faster. All the methods explained in this survey are executed to get the result accuracy for retrieving the web pages faster and getting the documents classified easily based on the probability calculated. The easiest algorithm used for classification of documents is Apriori algorithm used. The result of the survey of various methods used for classification shows that the search results are classified according to the classes they belong to. It is done on the basis of content matching of documents.
Dhanshri Patil, Tejal Pardeshi , Nikita Mane , Akshaykumar Thakur
Identity Based Secured Distributed Data Storage Schemes
Dhanshri Patil, Tejal Pardeshi , Nikita Mane , Akshaykumar Thakur
Identity based secured distributed data storage is such a scheme that reduces the load of an owner to maintain excessive number of files. Hence, it reduces the ramification of the owner to take care of all the files that he has with him. In this, the owner passes his files to the mediator between the owner and the user that is the proxy server. The proxy server plays an important role in this scheme. It encrypts the files that are given to him by the owner that are encrypted once, without having any cognition about the contents of the files. The proxy server also stores these encrypted files and gives the files to the authenticated users. When these files are given to the proxy server, the owner deletes those files from his system for the benefit of space efficiency. Hence, it is necessary to carefully examine the issues of confidentiality and integrity of the outsourced files. IBSDDS schemes possesses the properties: firstly, the file owner can decide access permission independently for each file and secondly, a user can access only one file for a single query. Resultantly, by using this scheme, the collusion attacks, means the disambiguation of data can be avoided.
A Compressive Survey on Active and Passive Methods for Image Forgery Detection
Nikhilkumar P. Joglekar, P. N. Chatur
In digital computing world representing information in visual forms has become very important. Due to improvement in computing and network technologies, in past few years we have seen a considerable rise in the accessibility and transmission of digital images using imaging technologies like digital cameras, scanners. This technology is also used for manipulating digital images and creating different forgery in image which is very difficult to identify. In tampering of digital images involved copying one part of image into other part of image, any types of image manipulation operation is consider as a forgery in image. Simple way to image forgery is manipulated image without leaving any perceptible traces; as a result, the authenticity of images can’t be taken for granted. There are no of operation in which we can change the image contain, like scaling, rotating, cropping. Preserving image authenticity is very complex because easily availability and free downloading image editing software. So detecting image forgery is difficult and challenging task. A lot of research has been going on this area and one of the problems is unavability of original image for evaluation. In this paper we studied active and passive or blind approaches to detect forgery in digital image.
Mr. Nishant Kumar, Mayank Aggrawal , Dr. Raj Kumar Spandan Singh , Mr. Chirag Goel
An Application Deployment to Openshift Cloud Using Existing Git Repository From Local Client
Mr. Nishant Kumar, Mayank Aggrawal , Dr. Raj Kumar Spandan Singh , Mr. Chirag Goel
Cloud is capable of running many kinds of applications. Putting application to some clouds are free and had their own procedure. Few clouds are famous for their services and OPENSHIFT, a Red Hat Cloud, is one of that cloud service provider which is constantly providing good services thus famous one for individual application deployment. Keeping personal development in mind here we are describing complete procedure to deploy application to OPENSHIFT cloud. For deployment first create a small application in HTML or PHP then application is connected to the newly created GIT repository. GIT repository is then connected to the OPENSHIFT account. Cloud deployment will provide a link which can be used to access your application. Application is successfully running over cloud thus availability to your project anywhere. Deploying application to cloud will provide the access anywhere ease. This deployment will teach the procedure to manage big applications and also this procedure will reflect immediate change in cloud when applications edited at local machine. This will help developers, researcher, and student to start with the very popular concept of cloud.
Single-Stage Reconfigurable Solar Converter for Grid-Linked System by using a fuzzy logic
Reena Jain, Neelesh Kumar
For photovoltaic (PV)-battery application, mostly for utility-scale PV-battery application a new converter i.e. Reconfigurable solar converter (RSC) is introduce. The output power of PV module varies with solar irradiation; temperature; loads and it quickly and accurately tracks the sun. The basic concept of the RSC is to employ a single-stage three phase conversion system to perform different operation modes such as dc/dc and dc/ac for solar PV systems with energy storage. This converter solution is appealing for PV-battery application as it minimizes the weight, volume, the number of conversion stages there by reducing the cost, and improving efficiency. In this paper fuzzy logic controller (FLC) is used for controlling the Reconfigurable solar converter (RSC) for photovoltaic (PV)-battery application, mostly for utility-scale PV battery application. The main advantage of fuzzy logic control is to eliminate harmonic content, improve the system response and steady state error.
Passive Optical LAN as an emerging LAN Architecture
Shubha Chaturvedi, Gautam Chaturvedi
In a rapidly changing technological environment, though the Local Area Network helps an organization gain a competitive edge, both domestically and internationally, but due to the fast changing technology, the environment of organizations, and the growing role of information is challenging firms both large and small to replace their copper-based networks with fiber optics. Fiber-based Passive Optical LAN (POL) technology is a point-to-multipoint network architecture optimized for local area network (LAN) environments to provide a fiber-to-the-desktop solution. (1) and has emerged as a particularly promising alternative for enterprises in need of a secure, converged network with increased bandwidth. Passive optical LAN (POL) technology platforms optimized for enterprise LAN environments have become available only in the last couple of years. Therefore in this paper authors have summarizes the potential use of POL for further use. We’ll then discuss traditional LAN architecture, Passive Optical LAN components and further implications on network management, real estate, and energy consumption.
Software Testing as a Service (STaaS) using Cloud Computing
Khushwant Virdi Radhika Kalyan Navjot Kaur
Due to wide range of applications of cloud computing it has become very popular in current era of the computing. Many companies and academies has started migrating their data from their expensive servers to clouds. This work deals with providing the testing of software as a service via clouds. As known in prior: the testing is very critical and costly part of software development. So this paper we find the various directions or circumstances to provide software testing as a service. In this paper we also described different tools that used to test the software via cloud. By using TSAAS we minimize the cost of software testing. Different researchers used different methods to test the software, web applications, mobile applications via cloud computing . Keywords: Software
Software Project Risk Assessment based on Neuro-Fuzzy Technique
S. W. Jadhao R. V. Mante . P. N. Chatur
Many risks are involved in the development of software project and Risk assessment methods are most important component in the process of risk management. They are a critical component of software project management and software testing. Practitioners, particularly researchers, are mostly interested in the evaluation of these methods for their applicability, strengths, and weaknesses for particular scenarios. So far, no model has proved to be successful at effectively and consistently predicting software development cost. Fuzzy Ex-COM (Fuzzy Expert COCOMO) that combines the advantages of a fuzzy technique with Expert COCOMO methodology for risk assessment in a software project which leverages existing knowledge and expertise from previous effort estimation activities to assess the risk in a new software project. A novel Neuro-fuzzy Expert Constructive Cost Model is proposed to improve the accuracy of risk assessment technique. With the introduction of the Neuro-Fuzzy Risk Methodology which combines the non-linear learning features of neural networks with fuzzy logic that has capability to deal with sensitive and linguistic data and generate risk rules using Artificial Neural Network(ANN) techniques to improve the accuracy of risk assessment technique. This paper shows the workflow required for implementing the Neuro-Fuzzy Risk Methodology on the original Fuzzy Ex-COCOMO methodology.
Wani Suraj R, Ghaywat Vivek V , Naik Akshay D Mandlik Sachin B
IVR System for three phase motor protection, Control and Alert system using GSM
Wani Suraj R, Ghaywat Vivek V , Naik Akshay D Mandlik Sachin B
Control systems have received exceptional attention in the industrial sector as they manage and regulate various systems. This paper is focused on the development of an IVR system for three phase motor control. A new approach is proposed for designing the protection and control unit of the three phase motor using the IVR systems. The main objective is to control the motor from a remote place using the mobile DTMF tone and also to receive the motor status feedback through SMS. GSM is found to be the most convenient, cost efficient network to be used for the transmission of the feedback signals at the motor end along with the generation of control signal by mobile DTMF. This control signal and the feedback SMS is transmitted through the GSM modem. Thus, this paper serves as an introduction to a new control technique of a three phase motor which can be effectively used for industrial purposes along with providing an SMS based alert system.
A.R.Zade, Shaikh Umar, Potghan Rahul Rale Sagar and Borade Sagar
Improving Cloud Data Storage Using Data Partition and Recovery
A.R.Zade, Shaikh Umar, Potghan Rahul Rale Sagar and Borade Sagar
Cloud storage system allows storing of data in to the cloud server efficiently and makes the user to work with the data without any problem, trouble of the resources. Also the Cloud storage permits users to remotely store their data and enjoy it on _demand high quality cloud applications without the burden of local hardware and software management. In existing system data are stored in the cloud using dynamic data operation with computation which makes the user need to make a copy of data for further updating and verification of the data loss unfortunately.
A Study on Mobile Networks and 3d Self-Deployment Algorithm
Muskan sharma
The sensor deployment problem of wireless sensor networks (WSNs) is a key issue in the researches and the applications of WSNs. Fewer works focus on the 3D autonomous deployment. Aimed at the problem of sensor deployment in three-dimensional spaces, the 3D self-deployment (3DSD) algorithm in mobile sensor networks is proposed. A 3D virtual force model is utilized in the 3DSD method. A negotiation tactic is introduced to ensure network connectivity, and a density control strategy is used to balance the node distribution. The proposed algorithm can fulfill the nodes autonomous deployment in 3D space with obstacles. Simulation results indicate that the deployment process of 3DSD is relatively rapid and the nodes are well distributed. Furthermore, the coverage ratio of 3DSD approximates the theoretical maximum value
Growth of electric & electronic equipments (EEE) with given rate of obsolesce the pool of obsolete EEE is day by getting to a dimension where its disposal is becoming challenge. The constituents in terms of elemental and manmade materials make it hazardous and toxic which required technological disposal. The availability of 5 % formal sector leaving remaining 95 % in informal sector for crude and unscientific disposal is depleting the environment and degrading the atmosphere where we livein. The health concerns of persons directly involved in handling these disposals in particular and population in general is at threat from these unlawful activities. National demography, economic strata and consumerisation trends are different for different states and cities and localities. In view of these factors when case study for getting the level of contamination due to elements available in these EEE disposed products burial places and knowhow of measures reveals that in case of Bihar cities the contamination levels are inching towards the worst affected parts of globe situation. Knowhow and regulating mechanism and information towards these are at minimal level and mass education and concerns is need of hour.