A Literature Review of Reliable Multipath Routing Techniques
Versha Matre , Reena karandikar
Nowadays the demand of network is increasing rapidly. The ever increasing usage of such network requirements additionally demands fast recovery from network failures. Multipath routing is one in all the most promising routing schemes to accommodate the various needs of the network. It has basic features like load balancing and improved bandwidth. Author Cho et al. introduced a reliable multipath routing scheme known as directed acyclic graphs. The property of directed acyclic graph is that they allow multipath routing with all possible edges whereas ensuring secured recovery from single point of failures. We have used the concept of DAG in our proposed method.
Secure Video watermarking Algorithm Using K-harris feature point detection with dual watermarks
Ekta, Dr. Naresh Kumar Garg
Now days, cyberspace and compression technology allow the well-known use of multimedia applications. Digital watermarking technique is a process of embedding an unperceptive signature or a copyright message such as an image or signature into a video. The advantages of watermarking are due to its imperceptibility and robustness. This paper proposes a best technique for content-based watermarking based on feature points of a video. At each feature point, the watermark is embedded after scale normalization according to the local characteristic scale. Characteristic scale is the highest scale of the scale-space representation of an image at the feature point. Dual Watermarks increases the robustness of the Watermarked Video. The experimental results show that the presented scheme guarantees high peak signal to noise ratio (PSNR), low mean square error value(MSE), low Bit Error Rate (BER).
A Study of Various Web Page Recommendation Algorithms
Pallaviben J Gohil, Krunal Patel
Web-page recommendation plays an important role in intelligent Web systems. Recommender system apply various techniques and prediction algorithm to predict user interest on information, items and services from the tremendous amount of available data on the internet. The paper studies various algorithm in weka and the metrices used to evaluate algorithm performance. The basic algorithm or predictive model we use are – page rank, Rule mining collaborative filtering, Context matching simple linear regression, k-nearest neighbours(kNN), naives bayes, support vector machine.
TOXICITY STUDY OF KAJJALI WITH SPECIAL REFERENCE TO DIFFERENT SAMPLES OF PARADA
Gaurav Desai, R. S. Hiremath
Ayurveda has used mineral and herbo mineral substances in therapeutics since time immemorial. But with the recent questions raised regarding the toxicity of Ayurvedic formulations, there is a need to scientifically evaluate and establish the safety of such preparations. Kajjali is a predominantly mineral preparation containing Mercury and Sulphur. It forms the base for numerous preparations and extensively used. As per authoritative texts of Ayurveda, mercury extracted from Cinnabar is to be used in all formulations. This extraction may not be economically viable and simple process prompting the use of samples of Mercury available in the market. The present study aims to evaluate the toxicity study of three samples of Kajjali prepared using three different samples of Mercury (one extracted from cinnabar and two other samples available in the market). No toxicity signs were observed in Wistar rats either in acute or sub acute toxicity study for any of the samples. No mortality was observed. Histopathology study indicated maximum organ damage in the group administered Kajjali prepared from market sample Parada and the least in group administered branded sample Parada prepared Kajjali. Hingulottha Parada prepared Kajjali showed moderate organ damage.
Asearch-as-you-type system measures solution on –the-run as a user types the query of keyword, character by character. There emerges a more need to realize support the search-as-you-type on the residing in the relational DBMS. The existing works on the native database SQL, in which the keyword query focusses on to support type of search. The advantage of existing database functionalities is to achieve high performance requirement to attain a high speed. To increases the search performance the auxiliary indexes are used that are stored as tables. But the search as you type for databases are handled only in the single is the main detriment in the existing work at the same way multiple tables were not taken into consideration. The proposed work in which to support multiple tables for search as-you-type in relational database a Fuzzy Multi-join technique is implemented. A Top-K Query Search model is further used to support ranking queries for search as-you-type in the relational database. By using the relational query processors Top-K join queries.
Prof. Ashvini Jadhav1, Mr.Akshay L. Gosavi2,Miss.Vrushali R. H Mr.Nikhil S. Thite4, Miss.Mamta B. Sawle
Android Server For Wlan Control And Management
Prof. Ashvini Jadhav1, Mr.Akshay L. Gosavi2,Miss.Vrushali R. H Mr.Nikhil S. Thite4, Miss.Mamta...
LAN monitoring and controlling system is a computer system which would enable the lab administrator to interact with other user computers and the users as well. It enables the administrator to remotely control the all client system from our android mobile. Using this system administrator doesn’t need to be physically present at the user computer to monitor them or to solve their problems. Administrator would be remotely monitoring all the user computers in the laboratory sitting at his desk, which would greatly increase the efficiency of the work being performed and would include remote technical support. Lab Monitoring and controlling System is platform independent resulting in monitoring and interaction of all the systems in the laboratory where it is installed, independent of type of Operating System installed on it. The primary function of a LAN monitoring and controlling system is the ability to remotely operate one computer from another computer over a network.
The voltage output and the maximum power point are found to drop with high irradiance and the associated high solar cell surface temperature. The rise in temperature produces thermal agitation which not only increases the dark current but also enhances the losses of free carriers in a PV cell. A number of PV cells have been assembled locally into PV module and experimentally investigated. To control the temperature of the PV module, a cooling chamber (refrigerator) was used. Experiments were performed with and without the cooling chamber. The maximum power point was found to drop with increasing surface temperature. The experiments were carried out and data collected with and without the cooling chamber. In comparison, the surface temperature of the PV module without cooling was found to be higher. However, operation with the cooled chamber recorded a drop in the PV module temperature and in the maximum power point. The study has led to the inference that maximum power point and the output power decrease with an increasing PV cell temperature.
Development of Mathematical Model to Predict the Removal Rate of Zinc in Zinc Barrel Plating wash water using Full Factorial Design
S. Kalaivani1, Dr. S. Ananthalakshmi2
This study highlights the features of the development of inclusive mathematical models for correlating the interactive and higher order manipulates of the various parameters in the zinc barrel plating wash water. Full Factorial technique is used to perform the experiments. The response factors namely initial concentration, current density and time were involved by zinc removal rate in the zinc barrel plating wash water has been considered and examined. Analysis of variance (ANOVA) was employed to ensure the adequacy of the models so developed and student’s t-test was utilized to check the significance of each factor to appear the final form of the mathematical models. The models so developed are utilized to conclude the values of the response parameters which influence the zinc barrel plating for each given set of variables within the ranges selected.
Cervical Implementation of Image Restoration Schema Using Digital Image Processing Techniques
S. P. Victor, A. Shakul Hamid
Image Restoration in Image processing domain provides a systematic way of implementation towards real-time data with different level of implications. Our conventional setup initially focuses with images with theirs noises. This paper perform a detailed study of image restoration towards variant noises in the field of image processing which can be carried out with request to optimal output strategies. We will implement our iterated image restoration techniques with real time implementation of Tamilnadu –India Road map of Tirunelveli, Kanyakumari districts in roadmap board Domains. We will also perform algorithmic procedural strategies for the successful implementation of our proposed research technique in several sampling domains with a maximum level of improvements. In near future we will implement the Optimal Image Restoration techniques for the de noising structure of image domain.
Effect Of Routing Packet Overheads On Routing Protocols
Prof. C. M. Jadhav1, Miss. Tejaswini. P. Patil2
Mobile Ad-Hoc networks (MANETs) are collection of mobile nodes that dynamically forming a temporary network without preexisting network infrastructure and communicate with its neighbors to perform peer to peer communication and transmission. It offers unique benefits and versatility for certain environments and certain applications. Since there is no prerequisite fixed infrastructure and base stations, they can be created and used anytime, anywhere. Propagation models focused on predicting the average received signal strength at a given distance from the transmitter, as well as the variability of the signal strength in close spatial proximity to a particular location. The accuracy of any particular propagation model in any given condition will depend on the suitability among the constraints required by the model and depend on terrain. A number of propagation models like Free Space and Two Ray ground have been exist. In this paper, we present comparative study on the behavior of various routing protocols with path loss propagation models, various performance metrics used for this comparison such as packet delivery fraction, average jitter, throughput and average end to end delay. The studies would be helpful in choosing the correct protocol for any active operating environment.
Revamp the Power Consumption in MANET by designing EPARDA routing Protocol
Abinesh.T 1, Ganesan.T 2
In wireless networks, the communication link between the nodes is changeable, since the qualities of the wireless links change their states heavily. Mobile ad hoc network (MANET) is an infrastructure less network; its nodes are mobile in nature. So that, the mobile device needs more battery power due to the nodes moves in a rapid form of nature, so power feeding is the major issues in MANET. The data packets transmit from root node to the terminal node through some intermediate nodes. The draining of few nodes due to power weakening might cause the entire MANETs services disconnected. So that to improve the power consumption in MANET, we improvise the EPAR-DA [Efficient Power Aware Routing with Data Aggregation] algorithm, by adding the aggregation process with EPAR algorithm. The EPAR algorithm describes the track route and chooses the path based on the energy downed to convey the data packets from source to the destination through sub-terminal nodes. EPAR estimate all lowest hop energy of the paths and then select the maximum lowest hop energy to transfer the data packet. And through the data aggregation process, data are aggregated and transmitted in certain periodic interval to reduce the power. EPAR algorithm is an on-demand source routing protocol that uses battery lifespan anticipation. By evaluating ad hoc network routing protocols, EPAR-DA consumes less energy when compare to other protocols like MTPR [Minimum Transmission Power Routing], and DSR [Dynamic Source Routing] in different network scales. The total energy using up of the MANET is reduced by EPAR-DA and achieves a good packet delivery ratio especially for high load networks.
Implementation of Data Clustering With Meta Information Using Improved K-Means Algorithm Based On COATES Approach
Mr. Patankar Nikhil S., Prof.P.P.Rokade
In many text mining applications, such as Scientific Research Publication data, Internet Movie Database, etc. as meta- information or side-information is linked with the text documents collection. It is observed that, such attributes may contain a tremendous amount of information for clustering purposes. However, the relative importance of this side-information may be difficult to estimate, especially when some of the information is noisy. Additionally, it can be risky to incorporate side- information into the mining process, because it can either improve the quality of the representation for the mining process, or can add noise to the process. Therefore, this paper explores way to perform the mining process, so as to maximize the advantages from using this side information in text mining applications with the use of COntent and Auxiliary attribute based TExt clustering Algorithm (COATES) approach which combines classical partitioning algorithms with probabilistic models in order to create an effective clustering approach along with its extension to the classification problem
Performance and Comparison of Energy Efficient MAC Protocol in Wireless Sensor Network
Miss. Sumita S.Chandekar1, Mr. Sunil Malviya2
Energy efficiency is the kernel issue in the designing of wireless sensor network (WSN) MAC protocols. Energy efficiency is a major consideration while designing wireless sensor network nodes. Most sensor network applications require energy autonomy for the complete lifetime of the node, which may span up to several years. These energy constraints require that the system be built such that Wireless sensor networks use battery-operated computing and sensing devices. A network of these devices will collaborate for a common application such as environmental monitoring. Each component consumes minimum possible power, ensure the average successful transmission rate, decrease the data packet average waiting time, and reduce the average energy consumption. Influencing by the design principles of traditional layered protocol stack, current MAC protocol designing for wireless sensor networks (WSN) seldom takes load balance into consideration, which greatly restricts WSN lifetime. This paper proposes a new MAC protocol called Energy-Efficient MAC (E2MAC) focuses mainly on achieving good performance in packet delay and packet delivery rate while being operated on very low level of energy consumption. E2MAC is designed based on a previously defined MAC protocol called S-MAC & T-MAC with the addition of adaptive wakeup time and next awake node first packet scheduling features. We compare the performance of S-MAC & T-MAC with E2MAC. The results show that E2MAC exhibits superior performance particularly in dense/high load networks.
Fingerprints are rich in details which are in the form of discontinuities in ridges known as minutiae and are unique for each person. One of the most important tasks considering an automatic fingerprint recognition system is the minutiae biometric pattern extraction from the captured image of the fingerprint. The fingerprint matcher compares features by using Digital Image processing from input search point against all appropriate driving licences in the database to determine if a probable match exists. An extended approach of digital image processing is used for Extraction of vehicle number plate. Information from the number plate is extracted and can be used in many applications like toll payment, parking fee payment. Currently we are implementing this system for only Standardized Indian number plates. In future it can be implemented for number plates with different fonts, shapes and size. Using this method, vehicle documents are verified. With this implementation, there’ll be no need to carry documents along. A single finger print and an image will be enough to recognise and verify the individual and the vehicle.
Provable Data Possession Securing The From Untrusted Server
J.Praveen, S.Karthikeyan, Mrs Sumathy
The model described for the use of Provable data Possession which allow the client to access the stored data at an Untrusted server that the server possesses the original data without retrieving it. This model executes the probabilistic proof of possession by random set of blocks which is derived from the server that dramatically reduces the cost of I/O. Sometimes the Client maintenance the constant amount of data which is used to verify the proof. The response protocol can transmit a small amount of data, which can minimize network communication. The two provably –Securer PDP Schemes presents more efficient schemes than previous solution .Even when compared with schemes that achieve weaker guarantees. It is the widely distributed storage systems. Using the experiment we can implement and verify the practicality of PDP and we can revel that the performance of the PDP that is bounded by disk I/O and that cannot be determined by computation.
Intelligent Access Smart Grid System,Metering and Monitoring
J.Nivetha1. Dr.K.Sundaravadivu2
A smart grid is an evolved grid system that manages electricity demand in a sustainable, reliable and economic manner, built on advanced infrastructure and tuned to facilitate the integration of all involved. Today existing grids are under pressure to deliver the growing demand for power, as well as electricity. These complex changes are driving the evolution of smart grid technologies. Smart grids make use of materials in system components like transformers and circuit breakers to improve efficiency, safety and operational performance. Widespread use of power electronic devices will help maximize performance of existing asserts and make the grid more resilient in the event of disruptions. More flexible transmission and distribution systems can accommodate fluctuations in supply, increase efficiency and optimize system operations. Powerful monitoring and control system will help prevent disruptions before they occur. A smart grid combines all these features linked by communication technologies. The future electrical system must be able to meet demand for electricity in a way that also satisfies environmental concerns. The biggest changes are in the distribution network and for end users especially commercial and residential users. This report is organized as follows: section II with the prior workwhich is the base for the proposals, section III& IV with the overall work implemented section V contains the simulation result with the comparison.
Role of Robot Scientists and Artificial Intelligence in Drug discovery
Anand M1, Clarice Susan2
The paper gives an overview of the meaning of Artificial Intelligence, (AI) Advantages and disadvantages. There are several fields in AI-robotics, speech recognition and expert system-to name a few. Doing the laundry or the dishes may no longer seem a chore. Robots are programmed to perform these activities. The recent times saw the artificially developed robot “Eve” help in searching for new drugs.Eve uses a standardized form of assay to compute Boolean functions of compound properties. These assays can be quickly and cheaply engineered using synthetic biology, enabling more targets to be assayed for a given budget. Another discovery is the anti-cancer drugs which exhibited anti-malarial properties.
Aishwarya S Bote, Nitish Ghare, Pravin Kumar Rahurkar, Mandar Latkar
Bluetooth Chat Application: Bluez
Aishwarya S Bote, Nitish Ghare, Pravin Kumar Rahurkar, Mandar Latkar
Bluetooth is still a relatively new technology to the wireless world. It is designed for wireless communication between a wide variety of different Bluetooth enabled devices; from computers and PDAs to GPS systems and heart monitoring devices. There are a growing number of companies continually adopting this technology. As Bluetooth becomes a standard feature in many products that we use every day, it seems that the use of the technology will grow even faster in the future. [2]
Unlike most devices, Bluetooth enabled devices communicate with each other automatically. There is no need to specify what type of action to take place or when it should to happen. When two devices are within range of each other, they will communicate back and forth to determine if there is any information to be passed.
Messenger applications are very much in vogue these days. Whatsapp, WeChat, Hangouts, etc are a rage in the app world. But all these messenger applications exploit either mobile data which is a paid service or WiFi which is not always available and when available the connection strength fluctuates from place to place. Even when one wants to send a message to another person on the same floor or a few feet away they have to rely on the availability of these two. Hence we develop a Bluetooth based android chat application.
Apart from general messaging between to users, the application also has an additional feature which allows users to save their chat history to an Android based server for storage thus not crunching on the phone memory as well.
A Survey on Various Developments In The Field Of Computer Science
Anik Shah, Animesh Shah
The World Wide Web (WWW) allows the people to share the information (data) from the large database repositories globally. In order to manage this data efficiently, we need to use specialized technologies to improve the user experience. This survey paper superficially explains the various web technologies such as HTML5 - Multimedia, Intelligent Semantic Web Search Engine, Web Data Mining, Distributed/Grid Computing and Image Processing.
Md.Ramij Howlader1 Md.Monirul Islam (Rajib)2 Md.Tanjibul Hasan Sajib3
Practically observation of standard Minute Value of T-shirt
Md.Ramij Howlader1 Md.Monirul Islam (Rajib)2 Md.Tanjibul Hasan Sajib3
This research project is based on calculation of standard minute value of T-shirt. An experimental investigation for the distribution of SMV for each and every operation require for making a T-shirt and provides a clear and details concepts for determining line balancing, machine requirements, man power allocation for setting a definite target within a reasonable efficiency. This project is a details discussion and distribution of SMV which will assist to minimize SMV by having a better synchronization with man, machine, materials and methods to achieve higher efficiency.
Improving the Hybrid Ad hoc Network Routing Performance Using RMECR Algorithm and Lightweight protocol
R Priya, H Prabavathi
The work deals with the problem of energy-efficient reliable wireless communication in the presence of unreliable or loss wireless link layers in multi-hop wireless networks. RMER and RMECR are proposed for networks in which either hop-by-hop or end-to-end retransmissions ensure reliability. Simulation studies show that RMECR is able to find energy-efficient and reliable routes similar to RMER while also extending the operational lifetime of the network. This makes RMECR an elegant solution to increase energy efficiency, reliability and lifetime of wireless ad hoc networks. We conducted extensive simulations to study the power consumption, the end-to-end delay and the network throughput of our protocols compared with the existing protocols. In contrast to the conventional power-aware algorithms, the Maximum Residual Packet Capacity (MRPC) identifies the capacity of a node not just by its residual battery energy but also by the expected energy spent in reliably forwarding a packet over a specific link. In this paper we argue that such a formulation based solely on the energy spent in single transmission is misleading —the proper metric should include the total energy (including that expended for any retransmissions necessary) spent in reliably delivering the packet to its final destination. In focus of achieving secure communication and preserving user’s privacy in hybrid ad hoc wireless networks, to preserve user’s anonymity each node uses pseudonyms and one-time session key. In addition to secure the communication, this paper develops efficient pseudonym generation and trapdoor techniques require only lightweight hashing operations and a payment system.
The aim of my paper is to show how to perform a crashworthiness simulation in the automobile industry using Finite Element Method, Repetitive braking of the vehicle leads to heat generation during each braking event. The resulting rise in temperatures has very significant role in the performance of the braking system. Problems such as premature wear of brake pads and thermal cracking of brake discs are attributed to high temperatures. Consequently controlling the temperature profiles and thermo-mechanical stresses are critical to proper functioning of the braking system. CAE simulations are often used for evaluating the brake disc design using thermo-mechanical analysis techniques. Conventional approach is to use three dimensional FE models of the brake discs. This approach has major drawbacks of higher pre and post processing as well as solution times. Need is felt to develop a quick and reliable method to evaluate the thermal stresses in brake discs. This paper describes one such approach based on modified FEM axisymmetric analysis. This paper reviews numerical methods and analysis procedures used in the study of automotive disc brake. It covers Finite element Method approaches in the automotive industry, the complex Contact analysis. The advantages and limitations of each approach will examine. This review can help analysts to choose right methods and make decisions on new areas of method development. It points out some outstanding issues in modelling and analysis of disc brake squeal and proposes new conceptual design of the disk braking system. It is found that the complex Contact analysis is still the approach favoured by the automotive industry.
HyPACK: Hybrid Prediction-Based Cloud Bandwidth and Cost Reduction System
Ms.Pratibha A Kuber , Ms.Garima Makhija
Cloud computing brings significant benefits for service suppliers and users due to its characteristics: e.g., on demand, gets use, scalable computing. Virtualization management may be a important task to accomplish effective sharing of physical resources and scalability [1]. Transmission price plays a crucial role once attempting to minimize cloud price. But for server specific TRE approach it's troublesome to handle the traffic with efficiency and it doesn’t suites for the cloud atmosphere due to high process prices. . During this paper we have a tendency to provide a survey on the new traffic redundancy technique called novel-TRE conjointly called receiver based mostly TRE. This novel-TRE has vital options like police investigation the redundancy at the shopper, repeats seem enchained, matches incoming chunks with a antecedently received chunk chain or native file and causing to the server for predicting the longer term information and no want of server to ceaselessly maintain shopper state[2]. , our implementation maintains chains by keeping for Associate in Nursing chunk solely the last discovered ensuant chunk in an LRU fashion .So on the receiver aspect we are able to refresh the chunk store for incoming chunks
Minutiae Matching Algorithm For Partial Fingerprints
Lekshmi S P
A fingerprint is an impression of ridges left behind on the surface of an object when they are touched or handled. Each person has own fingerprints with the permanent uniqueness. Because of this reason fingerprints are considered to be the excellent way of personal identification for criminal investigation purposes. The fingerprints encountered at crime scenes called partial fingerprints plays an important role in identifying criminals. Partial fingerprint matching also plays an important role in identifying suspects and criminals. In this paper we have proposed a minutiae matching algorithm to improve the performance of matching and reduces the time for matching. The proposed work reconstructs the orientation field of partials and iteratively matches the minutiae of partials and list of rolled and plain candidates that are initially matched. The main purpose of minutiae matching algorithm is to improve the matching rate and reduce the computational time in matching minutiae and also reduces the fault ratio.
Prof. Sulbha Ghadling , Piyush Mehta, Piyush Oswal, Rohit Padwal, Amit Mohol
Data DeDuplication Using Optimized Fingerprint Lookup Method for Cloud Storage Using Android
Prof. Sulbha Ghadling , Piyush Mehta, Piyush Oswal, Rohit Padwal, Amit Mohol
Today we all keep hearing about how fast data is being generated and also how important this data is to different organizations and enterprises. Hence organizations all around the globe are looking forward to storing this data in an efficient manner to avoid data loss and also to store all important information in a compressed and secure manner. Data Deduplication is an effective emerging technology that provides a solution to store more information in less space. As the advantages of offsite storage, less maintenance of storage infrastructure and cost benefits are very useful, huge enterprises choose to back up their data on cloud services. Data DeDuplication strategy aims at exploiting the fact that redundancy between two different types of data sets is minimal. By treating each application differently and storing the related information separately the overall disk usage can be improved to a great extent. This is done by implementing adaptive chunking, hashing and storing of different application separately. Data Conscious deduplication is observed to thus give a greater deduplication factor. It not only improves the deduplication process but also gives good bandwidth saving and efficient resource utilization essential for cloud storage.
A newer method and its comparison with other available methods in wireless sensor network
Jyoti Sharma1, Beerendra Kumar2
The real challenge for wireless sensor network is to design optimal routing protocol which enhance the network lifetime by reducing energy consumption. Energy saving is the main component in designing of network architecture. Many routing protocol have been developed in the past years and research is still going on for the best possible solution .One of the best routing protocols between them is clustering based protocol. It is the most efficient method of reducing energy consumption by load balancing over the nodes. In this thesis, a new routing protocol is proposed to improve network lifetime by reducing energy dissipation. AODV protocol is modified to improve leach protocols transmitting capability, enhancing throughput and reducing packet loss and delay. It had used TDMA MAC protocol for the transmission of data among the nodes and base station. This reduces collision in the channel and provide real time guarantees by eliminating packet losses and delay. Then multi hop routing protocol is used instead of direct transmission as it gives better results in transmission of data. It helps in reducing energy consumption in far away nodes during transmission. .
A Survey Report on Risk-aware Role-based Access Control Model
Bhoomi Pipaliya 1 Vinay Harsora 2
Cloud computing is an advanced emerging technology that uses internet to provide reliable, convenient, on-demand services to customers. One of the interesting and most challenging area in cloud computing is access control model. MAC, DAC, RBAC, etc are traditional access control methods which controls the access to services and resources. Role based access control (RBAC) allows access based on role(s) assigned to a particular object, which increases security. There exist some risks like insider threats in RBAC. Risk-aware role based access control (RAAC) provides a mechanism that can manage the access to resources using two approaches of RAAC: traditional approach and quantified approach.
A Review: Intelligent Pick and Place System by Using Practical Robotic Minimal Grasper
Dhairyashil M. Patil, Dr. S.K. Shah,
The proposed system introduces a technology for the grasping of components, which is flexible and proposed for pick-andplace tasks with low manipulation complexity for industrial applications. Here it having two main characteristics: self adaptively and flexibility. Self-adaptively says that the proposed grasper can grip an object in a self-adaptive way such that various process complexities (e.g., sensing, force control, and sensor-motor coordination) are significantly reduced. In flexibility means by using a flexible material, a stable grip can be implemented.
Improving Network Performance Using An Intrusion Detection & Adaptive Response Approach For Manets
Karthigha M, Rangarajan Gowtham S
A mobile ad hoc network (MANET) is normally a, infrastructure-less network of mobile devices connected without wires. But protecting the network layer from malicious attacks is an important and challenging security issue in mobile ad hoc networks (MANETs). Mobile ad hoc networks are vulnerable to a variety of network layer attacks such as black hole, gray hole, sleep deprivation & rushing attacks. Intrusion detection and prevention provides a way to protect mobile ad hoc networks (MANETs) from attacks by external or internal intruders. So, in the existing system cost sensitive model for Intrusion Response Systems (IRS) is used in fixed networks. This technique relies on comparing the cost of deploying a response against the cost of damage caused by an “un-attended” intrusion and decides to preemptively deploy a response with maximum benefit. But the problem is In MANETs it is difficult to calculate the intrusion response cost, which we can define as the negative impact on the network resources caused by the response. So, in the proposed system an intrusion detection & adaptive response mechanism (IDAR) for MANETs is presented that detects a range of attacks and provides an effective response with low network degradation. The deficiencies of a fixed response to an intrusion are considered and we overcome these deficiencies with a flexible response scheme that depends on the measured confidence in the attack, the severity of attack and the degradation in network performance. We present results from an implementation of the response scheme that has three intrusion response actions. Simulation results show the effectiveness of the proposed detection and adaptive response mechanisms in various attack scenarios. An analysis of the impact of our proposed scheme shows that it allows a flexible approach to management of threats and demonstrates improved network performance with a low network overhead.
A New Technique for Low Power Double Tail Comparator Using Parallel Mechanism
Remya Ayyappan
Comparators are the most analyzing unit in the analog to digital converters. In such situation we have to use the high speed and the low power consumption based comparators. Hence we are designing the comparators is more challenging when the supply voltage is smaller. To achieve high speed, larger transistors are required to compensate the reduction of supply voltage, which also means that more die area and power is needed. In this paper we are presenting the low power and high speed comparators even in small supply voltages. This comparator design having the small count of transistors which is used to reduce the delay time. Apart from technological modifications, developing new circuit structures which avoid stacking too many transistors if they do not increase the circuit complexity.
This paper describes the design of a radio frequency identification system that we called Trees RFID Tracking System (TRTS). This suggested study develops a system that would enable the detection and identification of trees illegal logging cases and hence preventing risks of species distinction and deforestation threats. The TRTS consists of RFID passive tags (static tags) fitted in trees and serving as unique identity for each tree; handheld readers (moving devices) with a suitable readable range and embedded circular polarization antenna. These readers would be held by forest officers and the data read from the tags would be accessible through the readers thanks to a visualization software that would analyze and process the data received. The database that saves all the readings and user interface and enables access to that data is located at the server side of the system. Communication between the tag readers and the server side is done through 3G connectivity enabled at the handheld reader device. An example of this suggested study practicality is the forests in Ifrane region of Atlas Mountains which are well known for the cedar species that are constantly subject to illegal extracting and thus are threatened by extinction. Moreover there has been no suggested method to improve their management process. Here is where our RFID system comes to play
Efficient data transmission is a critical issue for wireless sensor networks (WSNs). Clustering is an effective and practical way to enhance the system performance of WSNs. In this paper, we propose a cluster-based synchronization algorithm for underwater acoustic sensor networks based on MU-Sync, called EMU-Sync. In underwater sensor networks the time synchronization is challenging for long propagation delay, sensor node mobility and energy consumption. The improved performance of MU-Sync from the EMU-Sync gives the ability to maintain its low Complexity. This is possible by allowing the cluster head to calculate the skew and the offset from the view of both a cluster head and a neighboring node. Simulation results confirms that EMU-Sync offers better performances than MU-Sync in both accuracy and energy efficiency.
Tejal D. Katore 1 , Tejaashri M. Ghule 4 Prof .Tamhane K. D Gayatri R. Ghogare 2 Dipeeka R. Shinde
Android Parental Tracking
Tejal D. Katore 1 , Tejaashri M. Ghule 4 Prof .Tamhane K. D Gayatri R. Ghogare 2 Dipeeka R. Shinde
Nowadays child security has become a greater issue. Cases of missing children, kidnapping them between the age 14 to 17 has increased. This paper presents a mobile application based solution to aid parents to track the real time location of the children. Smartphones today provide the facility of location service and most of kids today use mobile phones. The application uses the GPS and SMS services found in Android phones. It allows the parents to get their child’s location on Google Maps and also their browsing history. The main responsibility of parent device is to send a request location SMS to child’s device to get location of child. While the responsibility of child’s device is to reply the GPS position to the parents device upon request.
Comparative Analysis Of Methods For Semi- Supervised Dimensionality Reduction
Archana H.Telgaonkar1, Sachin Deshmukh1
Data classification is one of the most challenging areas in the field of Machine Learning and Pattern Recognition application where data is represented as a point in high-dimensional space. The data can be classified using supervised learning if it is already labeled. Otherwise unsupervised learning is used. To get golden point between them, Semi supervised learning is introduced which uses both labeled and unlabeled data. Analyzing the high dimensional data is the biggest challenge that can be tackled with the help of dimensionality reduction techniques. When Dimensionality Reduction is embedded in Semi supervised learning, it gives superior performance. The purpose of dimensionality reduction is to reduce complexity of input data without losing important details. In this paper, Semi supervised learning is studied using four different approaches. Analysis and comparative study of these techniques is illustrated with the help of three datasets. Role of dimensionality reduction is also observed in the classification of data.
The usage of computers and mobile phones has increased considerably in the past few decades. But the current scenario suggests that the percentage of mobile internet users has increased immensely. The reason for this is nothing but the advantages of portable mobiles or tablets over the fixed computer machines. Now that people are resorting to mobiles there is a major need for the development of web applications which are mobile/tablet friendly. This will help ameliorate the user experience and in turn gain more clients. Up till now the tradition of building websites for PCs and apps for mobiles was being followed. But responsive web design has made it possible to design a single responsive website which can easily be accessed from various digital devices with different display screen sizes. Responsive web design favors the resizing of the elements present on any page of the website. The elements of the page may contain tables, images or simple texts as well. Thus it is evident that responsive web design is going to set a trend in the industry giving all sorts of benefits to the developers as well as the users. This paper gives a brief introduction to the softwares that can be used for designing a website responsively and the implementation details as well.
Prof. N. B. Kadu 1, Pushkar U. Wable2, Swati K. Wale3, Dipti B. Tambe4, Amol P. Londhe5
Face Captcha
Prof. N. B. Kadu 1, Pushkar U. Wable2, Swati K. Wale3, Dipti B. Tambe4, Amol P. Londhe5
Now a day’s use of smart phone increases tremendously. User gives the priority to the touch screen mobile or tablets which is based on touch screen technology. Security level in these devices is not much as compare to the desktop computer. Today user uses the touch screen devices for online transaction. At this point issue of security is created, which is most important from user point of view. There is need of very effective online security. For that purpose CAPTCHA is used at start of any application to determine whether or not the user is human. CAPTCHA is abbreviation for Completely Automated Public Turing Test to Tell Computer and Human are Apart. This is sure option for the online transaction. It is helpful to reduce crime in online shopping or any else. It is used to prevent the automated attacks in that user have to perform task that are easy for human but challenging for computers. Actually it increases the one level of security. Hence to provide advanced security we providing new version of image based CAPTCHA called as Face CAPTCHA. It has 0 percent attack rate.
R. Ramachandran, R. , Manivannan, R. Ramachandiran, N. Balachandar
Cloud Based Real Time Anti Vehicle Theft By Using LP Recognition And OCR Recognition
R. Ramachandran, R. , Manivannan, R. Ramachandiran, N. Balachandar
A real time Anti-Vehicle theft using LP Recognition in cloud is an image processing technique with cloud computing environment which uses license plate to identify the theft vehicle. The proposed system of this paper is on recognition of LP (License Plate) number and authentication of the license plate number to make human work easier. The main objective of the system is to improve efficient automatic theft vehicle identification system by using the vehicle LP number. It is widely used in various areas such as traffic signals, toll booths and surveillance. The algorithm consists of major parts: Extraction and Segmentation, Template Matching and Authentication, Vehicle identification, The LP characters are recognized and compare with cloud database environment. It helps police and military forces to locate whether license plate number is registered or not and shows owner name and address, place of registration. The system will be going to implemented and simulated in Mat lab, and its performance is testing on a real static and dynamic images.
Vulnerable Attitude of Road user using Fuzzy Matrix Technique
A. Victor Devadoss1 , S.M.A. Shahul Hameed2
Road collision is one among the major cause of increase death toll around the world. An increasing heavy burden of traffic on roads thus lead to road accidents. The purpose of this study is to determine the age group of people who violates traffic rules and regulations to engage themselves and others in road traffic collision using fuzzy matrix technique. This paper is constituted into four division with introduction, procedure for combined effective time dependent data matrix, estimation of maximum age of the vulnerable road user, conclusion and suggestion based on the study.
Use case analysis is a major technique used to find out the functional requirements of a software system. Use case, an important concept in use case analysis, represents an objective user wants to achieve with a system. It can be in text form, or be visualized in a use case diagram. There are different approaches and methods to successfully estimate effort using use cases. This Paper describes use cases and how to write them, and presents the Use Case Points method. It also describes related work on estimating with use cases. Keywords: Use case, Use case point methods, software project estimation.
A Social Chat Network Site With User Anonymity Consideration
Oyinloye O.Elohor, Akinyemi B.Peter
Preserving privacy in social networks against neighborhood attacks is an initiation which uses the definition of privacy called K-anonymity. K-anonymous social network still may leak privacy under the cases of homogeneity and background knowledge attacks. To overcome, we find a place to use a new practical and efficient definition of privacy called G-anonymity. In this paper, we take a step further on preserving privacy in collaborative social network site by developing a site using the G-anonymity to improved user privacy on the social media for unaware and illiterate users. Testing was performed using five users and from the users comment; it was observed that the system is 70% efficient for their usage which is better than the other existing systems.
The crime rate and robbery especially in bank is keep on increasing these days. Protecting personal and private information is now great challenge. The intelligent security system, biometrics, is now playing an irreplaceable role. Though there are lot of biometric systems available previously, each have their own disadvantages. In this paper we propose Finger vein recognition system which matches vascular pattern in an individual’s finger to previously obtained data. The proposed system uses only 0.8 seconds to verify one input finger vein sample and equal error rate is about 0.07% on a database of 100 subjects, demonstrating that the design approach can be effective than other biometric system.
A. Aditya Shankar1, P.R.K.Sastry2, A. L.Vishnu Ram3 , A.Vamsidhar4
Finger Print Based Door Locking System
A. Aditya Shankar1, P.R.K.Sastry2, A. L.Vishnu Ram3 , A.Vamsidhar4
Security has been playing a key role in many of our places like offices, institutions, libraries, laboratories etc. in order to keep our data confidentially so that no other unauthorized person could have an access on them. Nowadays, at every point of time, we need security systems for protection of valuable data and even money. This paper presents a fingerprint based door opening system which provides security which can be used for many banks, institutes and various organizations etc..,. There are other methods of verifying authentication through password, RFID but this method is most efficient and reliable. To provide perfect security to the bank lockers and to make the work easier, this project is taking help of two different technologies viz. EMBEDDED SYSTEMS and BIOMETRICS. Unauthorized access is prohibited by designing a lock that stores the fingerprints of one or more authorized users. Fingerprint is sensed by sensor and is validated for authentication. If the fingerprint matches, the door will be opened automatically otherwise the buzzer connected to an audio amplifier will be activated so that the people near the surroundings will get an alert.
With the rapid change and development in the sector of Information Technology and in Network technologies; the value of data and information is also increased. Today lot of valuable data is generated using many computers based application and stored back to the company database. But unfortunately, the threat to the same data is also increasing rapidly. So, development of a proper Intrusion Detection System which provides a right alarm is a hot topic today. There are many areas which helps to build such devices and software applications like Data mining techniques, network protocol system, decision tree, clustering, SNORT, Genetic Algorithm etc. This paper presents a technique of applying evolutionary algorithm i.e. Genetic Algorithm to Intrusion Detection System. It also provides a brief and how to implement it in real IDS.
The image retrieval technique uses so many methods for retrieving related images from various database systems. Sketch based retrieval of image also used for many purposes in the cyber activity or any other search engine. The aim of this paper is to retrieve the images from the database based on the sketch that the use drawn. Here we consider the attributes of sketch and compare the sketches with the related images. The features of sketches like color (RGB format) edge points, lines, circles, rectangles, and straight lines for comparing with the related images. And after comparing these images we are trying to retrieve the refined result of users sketch .That means the user can view the accurate results with maximum clarity. The paper concerns with the effective and quality results of user search and here we apply the different vision techniques to extract the features of the sketch.
Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential to be authenticated by multiple service providers in a distributed computer network. Recently, Chang and Lee proposed a new SSOscheme and claimed its security by providing well-organized security arguments. In this paper, however, we demonstrative that their scheme is actually insecure as it fails to meet credential privacy and soundness of authentication. Specifically, we present two impersonation attacks. The first attack allows a malicious service provider, who has successfully communicated with a legal user twice, to recover the user’s credential and then to impersonate the user to access resources and services offered by other service providers. In another attack, an outsider without any credential may be able to enjoy network services freely by impersonating any legal user or a nonexistent user. We identify the flaws in their security arguments to explain why attacks are possible against their SSO scheme. Our attacks also apply to another SSO scheme proposed by Hsu and Chuang, which inspired the design of the Chang–Lee scheme. Moreover, by employing an efficient verifiable encryption of RSA signatures proposed by Ateniese, we propose an improvement for repairing the Chang–Lee scheme. We promote the formal study of the soundness of authentication
Security has gained a lot of importance as information technology is widely used. The main issue in visual cryptography is quality of reconstructed image. This problem is overcome by using “An improved image watermarking using LTVC scheme”. In this method the quality of reconstructed image is higher, compare with conventional visual cryptographic scheme. The secret image is converted into shares, that means black and white pixel images. Each share is embedded to different carrier images. Invisible watermarking method is used for embedding carrier image and shares. For security, the invisible watermarked shares are then encrypted, AES modified encryption method is used. The encrypted shares are send to other participants. At the receiver end receiving the shares and decrypt the shares, then combining these shares together reveal the secret. The quality of rejoined shares and original secret shares are almost same. The loss of image quality is less compared to other visual cryptographic schemes.
Deploying Relay Nodes with Controllable Mobility to Conserve Power in MANETs
Priya S 1, Karthikeyan M 2
In this paper, we consider the mobile ad hoc network (MANET) which consists of two types of mobile nodes called traditional and relay nodes. The traditional node has limited energy whereas the relay node has relatively abundant energy. The primary objective of this paper is to minimize the power consumption in the mobile ad hoc networks. The main idea behind the proposed relay node deployment framework is to efficiently deploy the relay nodes, so that the traditional nodes can utilize them as intermediate hops for communication. This improves the energy efficiency across the traditional node thereby maximizing the network life time. The proposed framework utilizes the mobility prediction scheme and works in tandem with the underlying MANET routing protocol called Maximum-Residual Energy Routing Protocol (MRERP). Two strategies of the relay deployment problem are presented together with the solutions, to achieve different goals. Strategy 1, termed Min-Total, aims to minimize the total energy consumed across all the traditional nodes during data transmission, while strategy 2, termed Minimum-Maximum, aims to minimize the maximum energy consumed by a traditional node during data transmission. Our solution enables the prioritization of individual nodes in the network based on residual energy profiles. Results indicate that the proposed framework results in significant energy savings, even when the relay nodes constitute a small fraction of the total nodes in the network.
Madhusudan A. Mohite, Sandeep C. Munghate, Subodh N. Pandharkame
Improving Return loss of Microstrip Patch antenna using AMC
Madhusudan A. Mohite, Sandeep C. Munghate, Subodh N. Pandharkame
To develop new materials with desirable electro-magnetic properties those are not currently available to microwave engineers. One unifying theme of the materials should be moderately low loss magnetic materials for microwave applications. Specific properties we have investigated are impedance matched materials, tuned enhanced permeability, reactive impedance surfaces, and negative permeability electromagnetic band-gap materials.
Today, world has come closer due to rapid increase of internet. So computer security is of big concern now. As technology has been developed many threats are emerged for the data security which is not at all good for sensitive data transactions. So it is necessary to build high level security to provide safe communication between various networks. Intrusion detection systems are built to detect the attacks. Because of the intruders, the security of the network has become serious problem. Thus to overcome this we are proposing this paper for intrusion detection using k-means and Naïve Bayesian Classifier, which is depend on probabilistic model. This algorithm performs attack detection and keeps false positive rate at low level for different types of networking attacks
Madhusudan A. Mohite1, Tirupati L.Iltapawar2, Krunal P.Rane3
Comparison between PMC AND AMC
Madhusudan A. Mohite1, Tirupati L.Iltapawar2, Krunal P.Rane3
To develop new materials with desirable electro-magnetic properties those are not currently available to microwave engineers. One unifying theme of the materials should be moderately low loss magnetic materials for microwave applications. Specific properties we have investigated are impedance matched materials, tuned enhanced permeability, reactive impedance surfaces, and negative permeability electromagnetic band-gap materials.
Android mobile apps is used to provide information regarding there college .Android is the fastest growing open source mobile device platform, which in turn is powered by Linux operating system. Android offers a simple yet powerful application development framework (C++/Java and XML) and open access to APIs to build richer mobile applications. Android is a software stack for mobile devices that includes an operating system, middleware and key applications. Today in colleges student details are entered manually. The student separate records are tedious task. Referring to all these records and updating is needed. There is a chance for more manual errors. As mobile devices have become popular; there appears a new trend to release all kinds of campus information by intelligent mobile terminals. We describe a network for distributing campus information among lecturers and students. The concept of developing campus information system is to ensure that student can access information at any time, at any locations and ad-hoc basic. Information System helps the students and lecturers on campus to find and access information based on ad-hoc basic, which is of interest and relevant to students or lecturers through a smart phone.
Analysing Uncertain Data by Building Decision Tree
Megha Pimpalkar1, Garima Singh2,
In data processing, Classification of objects supported their options into pre-defined classes could be a wide studied downside with rigorous applications in fraud detection, computer science ways and lots of alternative fields. Among the assorted classification algorithms out there in literature the choice tree is one in every of the foremost sensible and effective ways and uses inductive learning. during this paper we tend to reviewed numerous call treefor same dataset and that we ar primarily performing on the ID3 algorithmic rule.
Inferring User Search Goals with feedback Sessions using Fuzzy KMeans Algorithm
Mr.Gajanan Patil, Miss.Sonal Patil
This document shows the concept for a broad topic and ambiguous query, different types of users may have different search goals when they submit the query to the search engine. The inference and analysis of user search goals can be very useful in improving search engine relevance information and user experience. In this paper, we propose a novel approach to infer user search goals by analyzing search engine query logs. First, we propose a framework to search different user search goals for a query by making cluster to the proposed feedback sessions. Feedback sessions are constructed from user click-through logs i.e. user response and can efficiently reflect the information needs to users. Second, we propose a novel approach to create pseudo-documents to better represent the feedback sessions for clustering. Finally, we propose a new criterion Classified Average Precision (CAP) to calculate the performance of inferring user search goals. Experimental results are presented using user click-through logs from a commercial search engine to check the effectiveness of our proposed methods
Performance Analysis of Shunt Active Power Filter Using Pi Controller
Md. Jahid Hasan1, Ahmed Abdullah2, Apu Samadder 3
This paper presents the improvement of power quality in three phase four wire system with balanced and unbalanced source condition based on three phase shunt active power filter. The PI controller is used to regulate the DC link voltage. The synchronous reference frame (SRF) method is used for extracting reference current. The PWM controller is used to generate gate pulses and applied to three phase VSI based shunt active power filter with split capacitor topology. The main aim of this paper is to reduce the total harmonic distortion (THD) in the source current. The MATLAB/Simulink environment is used to model for three phase source and nonlinear load is connected to the system.
Twice Precaution during Transmission of Hidden Data
Amrapali Bhandare, Dinesh Patil & Rahul Shete,
Now days, every single human being is addicted by technology. Technology becomes one of the basic needs. So, we have also responsible for the data which is transmitting over the network. We have to maintain the records, security & oppose the hacking that data from the third persons. Therefore our group focus on these issues & try to implement such kind of system which is comprises in the class of ‘data security’ which named as “Twice Precaution during Transmission of hidden data”. There are two phases included in our system. 1st phase is depends upon image & data encryption. 2nd phase is depends upon recovery of that image & data. After encrypting image & data, the encrypted data is embedded into the encrypted image. At the end of 1st phase, we get image encryption key & after embedding the data into image, we get data hiding key. Both keys, encrypted form of image & data is transmitted to receiver at another end side. Both keys are essential to decrypt image & data successfully. After decryption we get the original image as well as data.
Sign Language Recognition for Deaf and Dumb People
Y.M.Pathan1, S.R.Waghmare2, P.K.Patil3
Gestures are basically the physical action form performed by a person to convey some meaningful information. Gestures area powerful means of communication among humans. The Sign language is very important for people who have hearing and speaking deficiency generally called Deaf and Mute. It is the only mode of communication for such people to convey their messages and it becomes very important for people to understand their language. The aim of our project is to implement a system that will help deaf and dumb people to communicate with others. It recognises the hand gestures with highest accuracy and in least possible time and translates them into corresponding voice so that the people who don't know the sign language, can understand the meaning. It is implemented in MATLAB and uses Eigen Value Weighted Euclidean Distance Based Classification Technique. The output is the sound corresponding to the recognised sign. Keywords: Sign Language, Feature Extraction, Sign Recognition, PCA.
Present world faces lots of problems and they have no time to concentrate in each and every work in their busy schedule, our robot is designed to perform the application of library control operations. It is mainly focused on detection of book and check for the availability of the book and by using GSM technology the user being in membership can be able to check out whether the book is present or not without their arrival to the library. when the person enters the required book in the PC by using line following sensor the book from the shelf is searched through RFID tag and the arm of the robot is made to extend were the book is fetched using the gripper which is designed by sensor operated motors and give it to the person also when the person returns the book the robot keeps the book back to its respective place book here the process of searching the book is made easier without the help of human. In case if the book is not available it can be identified in the database system the information of non-availability of the book is sent as message in the mobile to the user. Since we maintain database system we ensure that the library items stored properly in order to maintain their security thus the main purpose of the robot is to manage library daily operations efficiently.
Design & Simulation of MHD Antenna for Wireless Applications
Kuldeep Lakra , Amit Kumar, Gyanender Kumar
This paper investigate stacked cylindrical DRA,s placed on concentric annular rings . These hybrid nature of structure is operating under controlled electric fields and magnetic fields. Higher gain has been reported in this work when electric bias is given under magnetic bias bandwidth of the antenna is enhanced by making little bit compromise on the Gain. Frequency shift has also been notice during magnetic and electric bias condition .This can be wisely used for getting reconfigureabilty.
One of the important aspects of modern electronic technology is embedded systems based on micro controllers. The main aim of science has always been to make our lives easier. In this paper, we discuss an innovative concept of Radio Frequency Identification(RFID) which is used to implement an Intelligent Shopping and billing trolley. Some of the issues faced by customers while shopping are: Wastage of valuable time while standing in long queues at the billing counter. No track of expenditure.
We observed that the main cause for long queues at the billing counter is not the crowd but the time spent in scanning each and every item using the Bar code Technology. Our project consist of an RFID based trolley that communicates with the billing side using a ZIGBEE(NRF24L01) module. The RFID reader scans all the items as and when they are put in the trolley. The record of the items bought is stored in the micro controller memory along with their individual costs as well as the total expenditure.This information will be displayed on a LCD screen which will also be placed on the trolley for the customer to verify the item bought and to keep a track on the amount spent on each item. At the billing side, the employee can get an itemized bill from each and every trolley just by giving the trolley number as the input to a software which would then print the itemized bill. Data can be erased from the micro controller memory after the bill is printed so as to make that trolley reusable.
Ashwin Pais1, Jivitesh Gudekar2, Pinak Kelkar3, Jay Borade4
PC Controlled Car for Terrain Detection
Ashwin Pais1, Jivitesh Gudekar2, Pinak Kelkar3, Jay Borade4
It is difficult to determine the structures like caves where the humans cannot enter. Remotely controlled car can enter in such spaces and can give a user the experience of structure he may be entering, before he could even get into it. The idea behind the proposed system is to show the approximate structure of the area on the system. The user can then study and analyze it for any changes that would occur. We have put forth a method to plot the structure of the terrain using ultrasonic sensors along with the use of Arduino to accomplish this purpose. This paper improvises the way in which it is accomplished.
Survey Paper on Automatic Speaker Recognition Systems
Miss. Sarika S. Admuthe1 Mrs. Shubhada Ghugardare
In this paper we present an overview of approaches for Speaker recognition. Speaker recognition is the process of automatically recognizing a person on the basis of individual information included in speech signals. Voiceprint Recognition System also known as a Speaker Recognition System (SRS) is the best-known commercialized forms of voice Biometric. The Speech is most essential & primary mode of Communication among of human being. In this paper we are focus on speaker identification and various feature extraction methods used for speaker identification system.
Estimating The Age Of Human Face In Image Processing Using Matlab
Aditi Sengupta1 , Piyas Mondal2
Estimating human age automatically via facial Image analysis has lots of potential real-world application, such as human computer interaction and multimedia communication. It is rapidly entering in all the sectors and aspects of our life. In this work the identification of younger image and older image are Focused on the methods using MATLAB. First we extract certain features from the input Face images, later using different method like thresholding, segmentation, edge detection and thus we get related databases. Comparing several trained databases, we get a specific range for younger images and older images. From the proposed range we can identify the young and old face. Thus this paper analysis the younger and older images with a very high accuracy successfully using image processing.
Bi-orthogonal wavelet transform based video watermarking
Aswathy K.Nair1, Flower Abraham Mundackal2
This paper proposes a robust video watermarking algorithm based on Bi-orthogonal wavelet transform and singular value decomposition(SVD).This is a method that provides dual way authentication of video using QR code and Logo image which is more robust and accurate. Results show that the proposed algorithm has good robustness against common digital video attacks.Performances of the algorithm is evaluated with the help of various performance evaluation parameters.
Dr.P. Tamije Selvy1, T. Renuka Devi2, R.Siva Keerthini3, S.Umamaheswari4
A Proficient Extreme Learning Machine Approach For Tracking And Estimating Human Poses.
Dr.P. Tamije Selvy1, T. Renuka Devi2, R.Siva Keerthini3, S.Umamaheswari4
Tracking and Estimation of human pose in real time is a difficult problem with many interesting applications. Automated tracking is useful in variety of domains including human computer interaction, gait analysis, the film industry and entertainment. The existing system uses different algorithm to estimate and track human poses but the limitation is due to the error rate which is above 10%. In the proposed system effective filtering technique and background subtraction technique is used in order to remove clutters and noises. The objects in each frame are tracked and the corner points are identified. The corner points are used to identify objects that are human. Finally, Extreme Learning Machine classifier is used to identify and estimate the exact human pose from video
Now a days information security is become a basic need in this digital world. It is very important to protect the information from various intruders. The system on which information is stored should not be vulnerable to E-mail attacks such as phishing, E-mail date and time spoofing E-mail address spoofing, as well as various malware attacks. This project presents basic protection that can be provided to the system .It illustrates E-mail forensics to detect E-mail Date and Time spoofing as well as E-mail address spoofing. We have created dataset of spoofed and legitimate E-mails. We propose a technique to perform the analysis of E-mail, by reading the header information and analyzing the fields related to date and time as well as sender and receiver address. We have also given an introduction to various malware detection techniques. We have described hash based malware detection technique. Here we have compare the hash values of input file with the database of bad hash values to detect virus.
A Probabilistic Approach for Anomaly Detection In Social Streams
S. Sundara Selvi, Mr. K.Durairaj
This Project is used to measure to abnormality of future user behavior of users It proposed a possibility model that can capture the normal mentioning behaviour of a user, which consists of both the number of mentions per post and the frequency of users occurring in the mentions. Conventional-term-frequency-based approaches may not be appropriate in this context, because the information exchanged in social-network posts include not only text but also images, URLs, and videos. Our basic assumption is that a new (emerging) topic is something people feel like discussing about, commenting about, or forwarding the information further to their friends. It shows that this approach can detect the emergence of a new topic At leastas fast as using the best term that was not obvious at the moment. Aggregating anomaly scores from hundreds of users, we show that we can detect emerging topics only based on the reply/mention relationships in social-network posts. We demonstrate our technique in several real data sets we gathered from Twitter. The proposed link-anomaly based method can detect the emergence of the topics earlier than keyword frequency based methods.
A Novel Secure Multiparty Algorithms in Horizontally Distributed Database for Fast Distributed Database
S.Pavithra, P.Prasanna
We proposed a protocol for protected mining of association rules in horizontally scattered database. The current leading set of rules is that of Kantarcioglu and Clifton. Our procedure, like theirs, is based on the Fast Distributed Mining (FDM) algorithm of Cheung et al. which is an unsecured spread version of the Apriori algorithm. The main ingredient in our procedure are two novel secure multi-party algorithms[1] — one that computes the union of private subsets that each of the interacting group of actors hold, and another that tests the inclusion of an element held by one actor in a subset held by another. Our protocol offers improved separation with respect to the protocol. In addition, it is simpler and is extensively more efficient in terms of announcement rounds, announcement cost and computational cost.
Resist Adverseries With Broader Background Knowledge In Personalized Web Search.
R.Jayanthi, Mr. C.Mahesh
Personalized web search (PWS)[2][9] has demonstrated its effectiveness in improving the quality of various search services on the Internet. However, evidence show that users’ reluctance to disclose their private information during search has become a major barrier for the wide explosion of PWS. We study privacy security in PWS applications that model user preferences as hierarchical user profiles. We suggest a PWS structure called UPS that can adaptively generalize profiles by queries while respecting user specified privacy requirements. Our runtime simplification aims at striking a balance between two predictive metrics that evaluate the utility of personalization and the privacy risk of exposing the widespread profile. We present two insatiable algorithms, namely Greedy DP and Greedy IL, for runtime generalization. We also provide an online prediction mechanism for deciding whether personalizing a query is valuable. Extensive experiments demonstrate the effectiveness of our framework. The new results also reveal that Greedy IL(Greedy Information Limit) significantly outperforms Greedy DP in terms of efficiency.
Performance Analysis of Cement manufacturing Industry
Neeraj Pandagre
Growing concerns arise about energy consumption and its adverse environmental impact in recent years in India, which cause manufactures to establish energy management groups. The purpose of the Audit is to identify the performance of Energy Guzzlers and set the Energy Baseline for the facility. For finding out the energy baseline various testing has been performed. As per the current pattern there are numerous measures which will help facility to reduce their energy baseline in future. The results from the performance analysis of cement industry has been presented in this paper.
Bramha Gogade1, Shraddha Dharmik2, Saili Patil3, Prof. A. N. Adapanawar 4
Interactive File Sharing Web Application for Organization
Bramha Gogade1, Shraddha Dharmik2, Saili Patil3, Prof. A. N. Adapanawar 4
As demand for sharing and accessing files online is increasing, people are likely to shift their focus from traditional file sharing systems to online file sharing system so that files could be accessed any time and any place. Variety of file sharing applications is available to ease sharing files online. In this paper, we are presenting a file sharing system which is devoted to sharing and accessing files in an organization. Requirements of sharing files for an organization are a bit different from general file sharing applications that are available. This web application will be an interactive application for organization wherein ideas can also be shared along with file sharing and users will be provided with different privileges to share file which is currently not present in available file sharing applications
Location-based services (LBS) are information and entertainment services that are accessible by mobile users through mobile networks. Examples of LBS are: Location-based traffic reports like how many cars in the free way, what is the estimated travel time to reach my destination; Location-based store finder like what are the restaurants within five miles of my location, where is my nearest fast food restaurant; Location-based advertisement like sending E-coupons to all customers within five miles of my store etc. LBS rely mainly on an implicit assumption that mobile users are willing to reveal their private locations. With untrustworthy LBS providers, the revealed private location information could be abused by adversaries. For example, an adversary may infer a user’s medical record by knowing that she regularly visits a specialized clinic. Recently, there is huge interest to enable privacy-preserving LBS in which users can entertain high quality location-based services without compromising their privacy. In this paper we will discuss LBS architecture and research issues. In first section, we discuss primary concepts and different architecture of LBS. In second section we discuss research challenges and scopes.
Cost-Efficiency And Privacy Preserving With Eirq Methods In Commercial Cloud
Vanajakshi Devi.K1 Praveen Kumar.N2, Ramesh.B3
Cloud computing emerges as a hottest trend in area of information technology and heterogeneous networking. Due to less efficient allocation resources in a cost-efficient cloud environment, a user can tolerate a certain degree of delay while retrieving information from the cloud to reduce costs. In this paper, we focused on two primary issues in such an environment: search privacy and efficiency. We first come across a private searching scheme that was originally proposed by Ostrovsky. Their private keyword based retrieval scheme allows a user to retrieve files of interest from un-trusted servers in leakage of any information. The main drawback is because of processing of all the queries from different users, it will cause a heavy querying overhead incurred on the cloud and thus goes against the original intention of cost efficiency. In this paper, we present three efficient information retrieval for ranked query (EIRQ) schemes to reduce querying overhead incurred on the cloud. In EIRQ, queries are classified into multiple ranks, where a higher ranked query can recover a higher percentage of matched files on user demand. A user can retrieve files on demand by choosing queries of different ranks. This feature is useful when the user only needs a small subset of files from large number of matched files. This system introduces retrieval of files with low bandwidth and low computational and communication cost. Under different parameter settings, extensive evaluations have been conducted on both analytical models and on a real cloud environment, in order to examine the effectiveness of our schemes.
In today’s world, the use of hand gestures to control devices has increased significantly. We see the use of hand gestures in application like controlling a presentation, mobiles, gaming, toy-cars, direction systems, automotive engines etc. A new trend has been emerging for many human based electronic products, because of the gesture recognition system. Therefore the need to study the gesture recognition system becomes a must. In our paper we are proposing a model, where we are trying to control a car buggy using hand gestures. The hand gestures will be recognized using a Near Infrared Camera (NIR). This can also be implemented using an ordinary low resolution camera. The better the camera, better the results. This system is known as the Human Vehicle Interaction System (HVI). The HVI possesses the following characteristics, namely like robustness, Stability & Reliability. In our paper we propose the use of series of algorithms to process the image and perform desired action.
A Robust Technique for Detection of Lung Nodules with Virtual Dual Energy Technology and Feed Forward Neural Network
Drishya Vijayan1 Shine P. James2
Lung cancer is the cause of one of the most common cancer-related deaths found in both males and females. Although attention has been paid to early stage predictions and diagnoses, prognosis is not at all working good. The two major challenges in nodule detection are to detect nodules that overlap with ribs and clavicles and also to reduce the number of false positives caused by these structures. This problem can be approached by developing more sensitive diagnosis methods using the new growing neural network technologies. In most of the existing CAD schemes for lung cancer detection by detecting the lung nodules they are not able to detect the nodules that overlap with ribs and clavicles, even though there exists VDE based CAD schemes(MTANN) with better sensitivity when compared with other schemes, it is not enough to provide high sensitivity. Here a CAD scheme incorporated with VDE scheme with FFNN that can provide better sensitivity compared to the existing techniques. This method is found to possess a sensitivity of 92.3% which is better.
Retinal Hemorrhage Detection Using Feature Classification
Preniya Prasad
Diabetic Retinopathy is a retinal disease because of high blood sugar. Early detection is necessary to maintain our vision. Small and large retinal hemorrhages can be detected using feature classification by extracting features from fundus images using filters bank outputs. Image level interpretation can be done by using difference of first and second order derivatives of Gaussian filters from green channel result. Finally a set of extracted features are selected with the help of filter approach and wrapper approach. k-NN classifier is used for final feature classification.
Memory management is basic for all languages because it is the important factor to determine the efficiency of the language. Language like Java have own garbage collector hence the programmer no need to do memory management. But in C++ the programmer has to release the memory through new and delete functions. In this paper, we are going to discuss how the memory is managed in both the languages and what are all the issues are there in memory in both the languages.
The people in old age or disabled people will have to stay at home, though their health exacerbates every day. The global population of people over the age of 65 is expected to more than double from 375 million in 1990 to 761 million in 2025. As the problem of aging and disability are converging, the smart home based health monitoring has become a key research area of ubiquitous and embedded computing system. The telehealth service has been widely implemented and used to help one (refers to elderly or individual with a disability) to live independently at home.The problems to be focused on, to improve the independence of old age people are their health, safety and reducing user assistance. These hurdles were the motivation factors for proposing the system. The main objective of this paper is to investigate techniques for using smart home technologies to monitor the day-to-day chores of old age people. The objectives are as follows: 1) identifying the problems faced by elderly people, 2) detecting difficulties in current data, and 3) designing a system which is senior citizen friendly. This paper is a solution that currently supports a set of functions that help home alone senior citizens to live independently. The idea of this project is to develop an intelligent and versatile home safety environment that could help the elderly and individual with disability live independently in their own home. The primary features of this project are Medicine Reminder and Scheduler, Programmable Remote, Health monitor, An enhanced fall detection system. This system offers the best features for improving the independent life of older population which includes providing a cost effective system for personal care and minimizing the financial burden upon the healthcare system.
Digital watermarking is new method of providing protection to multimedia data and digital content from unauthorized copying. Robust and imperceptible audio watermarking scheme using Discrete Wavelet Transformation (DWT) is presented in this paper. It is effective data hiding technique for audio signal. Algorithm embeds scramble watermark (image) into discrete wavelet transformed audio signal. For scrambling of image Arnold transformation based on best iteration is used. Then embedded watermark must be survived and recovered against different attacks like volume scaling, re-sampling, low pass filtering, re-quantization, random cropping
Himangi Mohan Mujumdar1 1, Prof. Sachin B. Takale2
Reversible Data Hiding Technique with Improved Reversibility in Encrypted Images
Himangi Mohan Mujumdar1 1, Prof. Sachin B. Takale2
Reversible Data Hiding is a form of Steganography, in which embedded information is recovered at the destination without any distortion with respect to information as well as cover media. This paper proposes a novel technique which deals with embedding data into encrypted images and recovering back the data as well as image without any distortion. Proposed technique also separates data embedding and image encryption steps. Person having only data hiding key can embed and extract the embedded data without the knowledge of encryption key. Room required to hide data is created before image encryption by estimating values of some randomly selected pixel positions. Improved histogram sifting method is used to hide data into the estimating errors of randomly selected pixel locations. Data is embedded with data hiding key. These estimating errors and remaining image pixel points are encrypted with standard encryption algorithm like AES (Advanced Encryption Standard). To encrypt estimating errors special encryption technique may be used. Proposed technique yields in complete reversibility
A Study on Securing Privacy In Personalized Web Search
Priyanka Deulkar 1, Dr.A.D.Gawande2
Millions of users wants to get some information on web search engines. The growing use of search engines enables us to mainly describe the information that we seek. However, the major pitfall of generic search engine is that they returns the same list of results to user which can be irrelevant for users need. To address these problem, personalized search is considered to be encouraging solution as it provides relevant search results as per users information need and interest. We study securing privacy in PWS which captures user personal information and generates user profile and outputs relevant list of results. For web searching, user profiles are must for effective results. But the use of this profile to find interest is a breach to secure privacy. To conquer this issue, securing privacy is necessary. Hence, we study the existing methods for security of privacy in personalized web search and its efficacy.
K.Rajasekhar 2.Devi Prasanna Yamuna 4.Pujitha Sai 5.Pranay Kumar 6.Sanasi Naidu
Design of A Controlled Multi-Logic Function Generator and ALU by Using COG Reversible Logic Gates
K.Rajasekhar 2.Devi Prasanna Yamuna 4.Pujitha Sai 5.Pranay Kumar 6.Sanasi Naidu
Reversible logic is one of the most essential issues at present time due to its power reduction capability in circuit designing. It finds application in various fields including quantum computing , optical computing , nano technology , computer graphic , cryptography . Dissipation of a significant amount of energy is achieved in the conventional digital circuits because bits of information are erased during the logic operations. Thus, if logic gates are designed in such a way that the information bits are not destroyed, then it is possible to reduce the power consumption dramatically. The information bits are not lost in case of a reversible computation. This has led to the development of reversible gates. The reversible circuits do not lose information and can generate unique outputs from the specified inputs. The main purposes of designing reversible logic are to decrease quantum cost and the number of garbage outputs. This paper represents the realization of different MULTIPLEXERS and a MULTI LOGIC FUNCTION GENERATOR circuit for generating multiple logical functions simultaneously using COG gates. And a CONTROLLED MULTI LOGIC FUNCTION GENERATOR circuit for generating any specified output in a controlled way. This paper also proposes the design of ALU which have better performance in terms of quantum cost. The proposed work leads to an improvement of 20% and 17% in terms of gate count and quantum cost. The simulation and verification of these are done in XILINX software.
An High Eqipped SC FDMA Communication Model Based On Advanced Wavelet Mechanism For Wireless Systems
A.Navya Lakshmi, V.Vamsi Sudheera
Recently, varied development work has been carried out on mobile robots due to their high level performance and accuracy. The autonomous navigation of a mobile robot in an unknown environment has always been a very challenging task. In order to achieve safe and collision free navigation, distance to target is very important and is often estimated by using ultrasound. Ultrasonic measurements are mostly based on determination of TOF. A factor of great importance when assessing the accuracy of ultrasonic range finders is the knowledge of speed of sound, necessary to convert temporal into spatial information. A digital signal-processing technique using Discrete Extended Kalman filter for making an ultrasonic transducer capable of automatically compensating for variations in the speed of sound due to temperature and to reduce the distortion effects of cross correlation estimation is proposed and discussed in this paper. SC-FDMA has become most prominent in broadband uplink wireless systems. Since it offers low distortion and free from PAPR problem which often arises in OFDMA (Orthogonal frequency division multiple access) systems. In this paper wavelets are substituted instead of FFT for this Orthogonality achievement. The discrete wavelets of orthogonal and bi-orthogonal type proves to be best when substituted instead of FFT analysis .The proposed approach shows outstanding performance in terms of BER ,PAPR when compared against the conventional system.
This paper deals with a new approach for image segmentation of brain image by applying k-means clustering algorithm for detection of tumor. Manual segmentation of brain tumor is time consuming and challenging task. In image segmentation, clustering algorithms are very popular as they are intuitive and implementation is easy. One of the most widely used algorithms in the literature is the K-means clustering algorithm. This paper proposes a color-based segmentation method that uses K-means clustering technique. In kmeans algorithm partition of an image is takes places into k clusters. The K-Means algorithm produces accurate segmentation results only when applied to images defined by homogenous regions with respect to color. At first, the pixels are clustered based on their color. After clustering of pixels clustered blocks are merged to a specific number of regions. This approach provides a useful new solution for image segmentation in which tumor is detected. At the end of the process the tumor is extracted from the MIR or CT scan image and tumor position determined. It clarify the effectiveness of our approach to improve the segmentation quality in aspects of precision and computational time.
A Review on Channel Allocation Schemes in Mobile Ad Hoc Networks
Shweta A Mane, Sanjay S Pawar
Mobile Ad Hoc networks are the networks that has no centralized control in it. The Ad Hoc network consists of mobile nodes that exchange packets by sharing a common broadcast radio channel. Bandwidth that is available for communication to be shared is limited and thus there is a need to control the access to this shared medium. Due to this, bandwidth can be used very efficiently. In MANET’s, MAC layer protocol plays a very vital role in efficient utilization of shared media in a distributed manner. There are three contradicting requirements at the MAC layer and they are: maximize channel utilization, minimize control overhead and ensure fairness. In this paper, we have studied about channel allocation schemes in mobile communication and have also studied various reuse partitioning schemes, handoff’s effects.
Handwriting examination is always been a challenge for document expert in court of law. The expert has to form his opinion on the perceptions and observation, however, the need of mathematical or definite calculation is required for a precise and scientific opinion. Automated tool for handwriting examination have always been an area of scientific research in the field of Forensic Document Examination, several models have been reported by many researchers for Optical Character Recognition and few on signature verification but all are very lengthy and need extensive sample size to train the model. However the tool proposed here is developed to measure the pixel distance and compute to calculate angle, and distance which in turn is used to identify the handwriting characteristics.
As we all know, Wireless Local Area Networks (WLANs), which is based on the IEEE 802.11 standards, is growing at a very considerable rate in the fields of business, schools and other organizations. As WLAN deployments increase, so does the challenge to provide these networks with security. Security can be needed either for the technical issues in the mechanisms, or due to software implementations. This survey paper proposes the use of GSE technique to analyze the shortcomings in the standards specified. After providing with the issues, we will switch focus to the Robust Security Network (RSN) which is proposed in the IEEE 802.11i standard using different GSE models.
A Mutation Testing Analysis And Regression Testing
Deepti singh1, Ankit Thakur2, Abhishek Chaudhary3
Software testing is an investigation conducted to provide stakeholders with information about the quality of the product or service under test. Software testing can also provide an objective, independent view of the software to allow the business to appreciate and understand the risks of software implementation. In this paper we focused on two main software testing –mutation testing and mutation testing. Mutation testing is a structural testing method, i.e. we use the structure of the code to guide the test process. A mutation is a small change in a program. Such small changes are intended to model low level defects that arise in the process of coding systems. Ideally mutations should model lowlevel defect creation. Mutation testing is a method of software testing in which program or source code is deliberately manipulated, followed by suite of testing against the mutated code. The mutations introduced to source code are designed to imitate common programming errors. A good unit test suite typically detects the program mutations and fails automatically. Mutation testing is used on many different platforms, including Java, C++, C# and Ruby. Regression testing is a type of software testing that seeks to uncover new software bugs, or regressions, in existing functional and non-functional areas of a system after changes such as enhancements, patches or configuration changes, have been made to them. During confirmation testing the defect got fixed and that part of the application started working as intended. But there might be a possibility that the fix may have introduced or uncovered a different defect elsewhere in the software. The way to detect these ‘unexpected side-effects’ of fixes is to do regression testing. The purpose of a regression testing is to verify that modifications in the software or the environment have not caused any unintended adverse side effects and that the system still meets its requirements. Regression testing are mostly automated because in order to fix the defect the same test is carried out again and again and it will be very tedious to do it manually. Regression tests are executed whenever the software changes, either as a result of fixes or new or changed functionality.
Intrusion Detection and Response Using Game Strategy And RRE Engine In Network Security
Anuvarsha.G, 2Rajesh kumar
The security of the network reduces due to increase in the size of the network, there are many intrusion detection and intrusion response strategies which are carried on the basis to find and stop the intruders in the network such as local and global. Preserving the availability and integrity of networked computing systems in the face of fast-spreading intrusions requires advances not only in detection techniques and also in automated response techniques. Here a new concept of game theory using Stackelberg game is introduced along with the RRE (response and recovery engine) to provide the automated response by using ART trees. In the intrusion detection system, the intruders can be found automatically by the IDS alerts but the response is to be provided by the manual process with is based on the time constraint, in order to overcome this drawback, the intrusion response system is provided with automation
Various Techniques of Fractal Image Compression - A Review
Veena K K1 , Bhuvaneswari P
Image compression is a method in which we can condense the space for storing images, video which will be helpful in transmission performance. There are many application which requires image compression such as multimedia, internet, remote sensing etc. This paper presents analysis of fractal image compression (FIC), fractal compression is a lossy compression methods for digital images, based on fractal. The method is appropriate for natural images and textures. FIC is an image coding technology based on the self-similarity of image structure and broadly used in image authentication, image denoising, image encryption etc. In this context, the review summaries the major FIC method spanning across different FIC technique.
Textual Graphical Password Scheme against Shoulder Surfing Attack
Saurabh Saoji1 Swapnali Bhadale2, Harshada Wagh3
Schemes like conventional password schemes such as textual password scheme, graphical scheme are commonly used for authentication. But these schemes are vulnerable to dictionary attack, shoulder surfing attack, accidental login. Hence the text-based shoulder surfing resistant graphical password schemes have been proposed. These existing schemes are not secure and efficient enough and have high failure rate. The text-based shoulder surfing resistant graphical password scheme is improved by using colors. In addition one time password is also used. So it has become more secure. User can easily login to the system. Unauthorized user cannot get the password easily. Hence this scheme provide protection against the shoulder surfing
A Machine Learning Techinque For Generative Classifier Under Attack
S.Sasikala, C.Mahesh
Pattern classification systems are commonly used in adversarial applications, like biometric authentication, network intrusion detection, and spam filtering, in which data can be going on purpose manipulated by humans to undermine their operation. Extending pattern arrangement[1] theory and design methods to adversarial settings is therefore a novel and very relevant research direction, which has not yet been pursued in a systematic way. Our address one of the main open issues: evaluating at design phase the security of pattern classifiers, namely, the performance degradation below potential attacks they may incur during operation. It proposes an algorithm for the generation of training and testing sets to be used for Security evaluation . Developing a framework for the empirical evaluation of classifier security at design phase that extends the model selection and act evaluation steps of the classical design cycle. Our proposed framework for empirical evaluation of classifier security that formalizes and generalizes the main thoughts designed in the literature, and give examples of its use in three real applications. report results show that security evaluation can provide a more complete thoughtful of the classifier’s behavior in adversarial environments, and lead to improved design choices .
Direct sequence code division multiple access (DS-CDMA) system suffers from Multiple Access Interference (MAI) caused by Direct Sequence users and Near–far effect. Multi-User Detection schemes are used to detect the users’ data in presence of MAI and Near-Far effect. In this we present a comparative study between linear multiuser detectors and conventional single user matched filter in DS-CDMA systems. Simulation results depict the performance of the Conventional detector, Decorrelating detector and Minimum Mean Square Error (MMSE) detector. It shows that the performance of these above mentioned detectors depends on the length of PN code used and number of users. Linear multiuser detectors perform better than the conventional matched filter detector in terms of BER performance. And in case of flat fading channel for different Doppler shifts, performance of these three detectors observed and concluded that MMSE detector has better performance than the other detectors
Roshan Kshirsagar1, Amol Date2, Yogesh pawar3, Darshana Desa
Piston connecting rod code detection and matching system using image processing and OCR
Roshan Kshirsagar1, Amol Date2, Yogesh pawar3, Darshana Desa
In piston manufacturing company piston connecting rod divided into two parts and both parts have same batch number printed on it, now matching of this batch number performing manually so this is very tedious job and time consuming. So there is need for developing one system, “Piston connecting Code Matching and Detection System” to simplify this job and increase the productivity. Image Processing [IP] And Optical Character Recognition [OCR] is closely related term to each other. Image processing is any form of signal processing for which the input is an image file, such as a photograph or video frame; the output of image processing may be either an image or a set of characteristics or parameters related to the image and the Optical character recognition is the mechanical or electronic conversion of scanned or photographed images of typewritten or printed text into machine-encoded computer-readable text.
A Survey On Channel Estimation In Mimo-Ofdm Systems
Sonia Rani1, Manish kansal2
In Communication Systems, MIMO (Multiple Input Multiple Output) Channel have been introduced to achieve high data speed and better bit rate. The system becomes more efficient when OFDM (Orthogonal Frequency Division Multiplexing) is combined with MIMO to obtain high transmission rates, good quality of service and minimize the probability of error. Channel estimation is of great importance in MIMO-OFDM system. Channel estimation is used to estimate the transmitted signal using the corresponding receiver signal. Channel capacity of MIMO-OFDM system is also increased by channel estimation. A main challenge in MIMO-OFDM system is retrieval of the channel state information accurately. Channel state information is retrieved with the help of channel estimation i.e. all the channels between the transmit antenna are accurately known. In this paper we describe the basic introduction of MIMO-OFDM system and survey the different channel estimation techniques used in MIMO-OFDM system considering the various system parameters.
Prof.Ms. P.B.Alappanavar1, Mr. Kishor Gardi2, Mr. Shubham Raut3, M Ghorpade4, Mr. Sameer waghmare5
Head gesture recognition for hands-free control of robot movements
Prof.Ms. P.B.Alappanavar1, Mr. Kishor Gardi2, Mr. Shubham Raut3, M Ghorpade4, Mr. Sameer waghmare5
Now a days because of vast and intelligent use of technology things are becoming extremely easy and user friendly. The pace in which development of technology had been done is certainly giving the way for invention of many amazing and revolutionary products which may help people in their day to day life. Robotics is one of such field which makes lives of people to surprising ease and comfort, so this field promises to be one of the most stalwart fields of engineering. With the development of high speed computers and because of which increasing their computational capacity have given us a way to think in a way to recognize gestures and make their use for other applications. So with combination of robotics and image processing we can make a robot move on the head movements by recognizing head gestures. Application of this can be done in field of human computer interaction and usability (HCIU) and create intelligent wheelchair (IW) that will move by recognizing the head movements done instead of traditional electronically powered wheelchairs that move on joysticks . So this paper presents a book of reference for hands free control of robot movement using head gesture recognition.
A Survey of ICI Self-Cancellation Techniques for OFDM Systems
Ritu Chaudhary1 Geeta Arora2
Inter-carrier Interference (ICI) is a severe problem in orthogonal frequency division multiplexing (OFDM) systems. Any offset between the subcarrier frequencies of the transmitter and receiver ruins the orthogonality of OFDM subcarriers and introduces ICI to an OFDM system. There are various methods to mitigate the effects of ICI. In this paper various ICI self-cancellation (ICI-SC) techniques to minimize ICI are studied and reviewed. Those techniques are described in this paper and a comprehensive comparison is made of all the techniques. It is found that Weighted Conjugate Transformation technique (WCT) is better than all other conventional ICI-SC schemes.
Robust Document Image Binarization Technique for Degraded Images
Gaurav Divate1 1,Aniket Vaidya2,Vipul Wankhede3
Segmentation of text from badly degraded document images is a very challenging task due to the high inter/intravariation between the document background and the foreground text of different document images. We propose a novel document image binarization technique that addresses these issues by using adaptive image contrast. The combination of the local image contrast and the local image gradient that is tolerant to text and background variation caused by different types of document degradations is called as The adaptive image contrast. In the system, an adaptive contrast map is first constructed for an input degraded document image. The contrast map is then converted into binary and combined with Canny’s edge map to identify the text stroke edge pixels. Then document text is segmented by a local threshold that is estimated based on the intensities of detected text stroke edge pixels within a local window. The proposed method is robust, simple and involves parameter tuning at its minimum. It has been tested on datasets that are used in the recent document image binarizationcontest (DIBCO) 2009 & 2011 and handwritten-DIBCO 2010 and achieves accuracies of 93.5%, 87.8%, and 92.03%, respectively, that are higher than or close to that of the bestperforming methods reported in the three contests. The Bickley diary dataset experiments that consists of several challenging bad quality document images also show the superior performance of the system over the others.
Weather conditions i.e. rain, snow, fog, mist and haze degrade the quality also performance of outdoor vision system. Rain is one of the type of weather condition as well as rain is the major component for the dynamic bad weather. Rain introduces sharp intensity variations in images, which degrade the quality or performance of outdoor vision systems. These intensity variations depend on various factors, such as the brightness of the scene, the properties of rain, and the camera parameters. Rain removal has many applications in the field of security surveillance, vision based navigation, video or movie editing and video indexing or retrieval. So, it is important to remove rain streaks from the images. The detection and removal of rain streaks in an image is done by image decomposition which depends on Morphological Component Analysis (MCA) by performing dictionary learning and sparse coding. Rain streaks removal is fall into the category of image noise reduction. After Removal of rain streaks we can easily identify feature in the image
Preference Aware Automatic Search Using Multiple Taxonomies
Nidhin.R1 , Sharmila.L2
The project aims on frequent itemset mining, which focuses on discovering the different correlations among data. The itemsets that became rare are no longer extracted using frequent generalized itemsets from a certain point. Frequent generalized itemsets includes itemsets that are frequently occurring in source data and itemsets that provide a top level abstraction of the knowledge that is mined. The discovery of relevant data occurrences and their most significant temporal trends are becoming very essential and important research area. In different application contexts the correlation among data has been found out by the application of frequent itemset mining and association rule extraction algorithms. Here provides several query optimization strategies for extended queries and describes an algorithm which includes query execution with performance evaluation while making use of native query engine. I
ZrxZn0.5-xNi0.5Fe2O4 (x=0.00, 0.05 and 0.15) has been synthesized successfully using solution combustion method with the use of high purity nitrates and fueling agent urea. XRD study of obtained sample confirms the cubic spinel structure formation. AFM reveals the surface morphology and microstructure of well dispersed Zn-Ni ferrite nanoparticles to be spherical.
Load-Balancing Based On Geographic Routing Around Connectivity Holes In Wireless Sensor Network
R.Mohanapriya1, V.Vennila2, S.Savitha3
To detecting connectivity failure around the wireless sensor network by using Adaptive Load-Balancing Algorithm (ALBA) for find the solution to identify the localization errors. Rainbow mechanism is used to differentiate grouping sensor nodes by various colors. Both Adaptive Load-Balancing Algorithm and Rainbow mechanism (ALBA-R) are detects connectivity holes in network, a protocol for converge casting in wireless sensor networks. ALBA-R features are used in existing system for detecting localization error in the sensor network. Information can be gathered from node location; during end to end transmission of data packet loss will occur because of traffic in the transmission path. Even though connectivity failure occurred in wireless sensor network should increases the path cost of data transmission. To Propose Hole Healing algorithm to identify and heal holes in the network. The hole detection mechanism is used to solve the connection failure in between sensor nodes. The limited numbers of nodes neighboring the hole, only those nodes are involved in the process of moving and repairing the hole. Implementing Hole Healing Algorithm by using ns-2 simulation, for increasing performance by finding Localization error and solving those problems.
Ann Based Head Movement Detection with Eye Tracking
Nimi M R, Renji S
Eye tracking is the process of watching where a person is looking. The significance of eye movements with regards to the perception of and attention to the visual world is certainly acknowledged since it is the means by which the information needed to identify the characteristics of the visual world is gathered for processing in the human brain. Hence, robust eye detection and tracking are considered to play a crucial role in the development of Human-Computer Interaction (HCI), creating attentive user interfaces and analyzing human affective states. The proposed work uses ANN-based head movement detection with eye tracking. This proposed system aim to estimate the head movements and to locate the eye in the image and then use the obtained information about the eye region and the head pose to estimate the eye gaze direction to be used in various applications, such as HCI, virtual reality, driver assistance systems and assistance for people with disabilities
Multimedia Cloud Computing an Emerging Technology: Surve
Er. Ramandeep Kaur Er. Gurjot Kaur
To provide rich media services, multimedia computing has emerged as a noteworthy technology to generate, edit, and search media contents, such as images, graphics, video, audio, and so on. For multimedia applications and services over the Internet and mobile wireless networks, there are strong demands for cloud computing because of the significant amount of computation required for serving millions of Internet or mobile users at the same time. This paper reviews brief literature on multimedia cloud computing aspects and describe some of the security issues in cloud computing, including data integrity, data confidentiality, access control, data manipulation in the encrypted data domain, with respect to the existing security algorithms.
Basically, in this project we are going to monitor the parameters of the bridge which will help us to maintain the bridge and detect the faults in it. The real-time safety evaluation of bridges includes the following components: (1) real-time analysis of pressure (2) real-time analysis of temperature (3) real-time analysis of tilt (4) real-time analysis of weight (5) real-time analysis of flood (6) real- time boat detection. The sensors will detect the condition of the changing parameter of the bridge. The sensors installed on main cables, hangers, decks, towers, etc detect the strain, acceleration, temperature, wind and water level. The advancement in wireless technology has provided a motive to develop the wireless network based bridge health monitoring system. Sensor technologies have made the monitoring process more accurate and fast. GSM technology is suggested to send the data to the remote location in which the maintenance office is located. This project is useful for monitoring the faults and errors in the bridge and will help to prevent the loss of human life. It will also save the hazards which will create distractions in human life.
M.D. Nirmal1, Shital B. Jadhav2, Nilam V. Dhumal3, Rutuja V. Kapadnis4, Priyanka H. Thakar
Extract Structured Data from Heterogeneous Web Pages
M.D. Nirmal1, Shital B. Jadhav2, Nilam V. Dhumal3, Rutuja V. Kapadnis4, Priyanka H. Thakar
Information Extractor is a powerful tool for web data mining and data crawling. Data from web pages. Reform into local file or save to database, post to web server. No need to the web page you are interesting and click what you want to define the extraction task, and run it as you want, or let it run automatically. Data Extraction is act or process of retrieving data out of data sources for further data processing or storage. The import into the intermediate extracting system is thus usually followed by data transformation and possibly the addition of metadata prior to export to another stage in the data workflow. We formally define structured data, the kind of data that we are hoping to extract from the web pages Structured Data is any set of data values conforming to a common type. The Basic Type, denoted by, represents a string of tokens. A token is some basic unit of text.
Cellular Phone Has Opened a New Horizon of Socio- Economic Development: A Case Study Of Banglades
Malaya Tashbeen Barnamala
Now a day use of cellular phone has become a part of human life. It has a great contribution to make the life modern. Not only on human life cellular phone has a large impacts on socio economic development. As a developing country Bangladesh can not ignore the contribution of cellular phone to it’s continuous development. In this paper , the objective is to find the impact of cellular phone on every part of development in case of Bangladesh. For this purpose this paper has given its attention on agriculture, employment opportunity, banking system, social networking, admission process, entertainment and government revenue of Bangladesh
Traffic Classification By Using: TIE (Traffic Identification Engine)
P.Raj kumar, P.Prasanna
The availability of open source traffic classification[1][2][3][4][5] systems designed for both experimental and operational use can facilitate cooperation, union on standard definitions and events and trusted evaluation of methods. In this paper, we describe Traffic Identification Engine (TIE), an open source tool for network transfer classification, Investigating the optimal combination strategy and set of classifiers to generate reliable ground truth while preserving privacy Extending the support for sharing labeled traffic with anonym zed traces Investigating strategies for multi-threaded classification, exploiting: off-load techniques focuses by recent traffic capturing engines such as multi queue adapters. Comparing the accuracy of different classifiers and classification performance. Investigating multi-classification and combination strategies.
Nowadays printed text appears everywhere like product names, restaurant menus, instructions on bottles, signed boards etc. Thus blind people need some assistance to read this text .This paper presents a camera-based product information reader to help blind persons to read information of the products. Camera acts as main vision in detecting the label image of the product then image is processed internally and separates label from image by using MATLAB and finally identifies the product name and identified product information is pronounced through the optical character recognition (OCR).The OCR is used to convert the text from text regions and then converted to voice output.
A Phishing obligation analysis on web based secure authentication
M.Rajesh M.Tech, Mr.R.Hariharan M.Tech
Phishing websites is an attempt by an individual or a group to thieve personal confidential information such as the password,credit card information etc from unsuspecting victims for identify theft,the financial gain and other fraudulent activities.Visual cryptography is a special type of secret sharing .in this paper we have proposed a new approach for phishing websites classification to solve the problem of phishing website. Phishing websites comprises a variety of cues within it’s the content-parts as well as the browser-based security indicators provided along with the website. The use of images is explored to preserve the privacy of image captcha by decomposing the original image captcha into two shares that are stored in separate database servers such that the original image captcha can be revealed only when both simultaneously available;the individual sheet images do not reveal the identity of the original image captcha. Once original image captcha is revealed to the used as password.Several solutions have proposed to tackle phishing websites.Nevertheless,there is no single magic bullet that can solve this threat radically.Since anti-phishing solutions aim to predict the website class accurately and that exactly matches the data mining classification.The important features that distinguish phishing websites from legitimate ones and assess how good rulebased data mining classification techniques are in predicting phishing websites and which classification technique is proven to be more reliable.