Vikas Kumar, Mukesh Kumar, A.K.Jaiswal, Dr. Rajeev P Rohini Saxena, Bhupendra
Bit Error Rate Analytical Approach For Different Modulation Techniques Based On Comparison Of Conventional And Wavelet Based OFDM LTE Mechanisms
Vikas Kumar, Mukesh Kumar, A.K.Jaiswal, Dr. Rajeev P Rohini Saxena, Bhupendra
Orthogonal Frequency Division Multiplexing is considered as an advanced communication model which has wide range of applications such as 3G, 4G, and Wi-Fi etc. Comparing with Frequency Division Multiplexing (FDM), we are providing a higher level of spectral efficiency by using the OFDM Multiple Carriers. To overcome the problems of the Inter carrier interference (ICI) and inter symbol interference (ISI), using of the cyclic prefix which uses the available bandwidth of 20% for the loss of the Orthogonality between the sub carriers in OFDM. Providing of better Orthogonality which is based on the wavelet of OFDM and improving of BER (Bit Error Rate) is also used in it. Increasing of the spectral efficiency we don’t require the cyclic prefix which is based on the wavelet system. In the upcoming of the 4th generation LTE, using of wavelets in place of Discrete Fourier Transform (DFT) based OFDM is proposed. Using of the wavelets and DFT based OFDM Systems we have compared the performance of the BER.
Bhupendra Kumar, Dr. Anil Kumar , Prof. A.K.Jaiswal, Er. Mayur Kumar, Er. Neelesh Agrawal, Vikas Kumar
A Novel Papr Reduction Approach Based On The Weighted OFDM Algorithm
Bhupendra Kumar, Dr. Anil Kumar , Prof. A.K.Jaiswal, Er. Mayur Kumar, Er. Neelesh Agrawal, Vikas...
Although tremendous progress has been made in the area of wireless communications based on orthogonal frequency division multiplexing but still there exist some problems. In literature so many works has been reported to resolve the issues but still Peak to average power ratio is still area of concern. In this paper, instead of spectral efficiency we make use of HPA (high power amplifier) weights to resolve the issue of Peak to average power ratio. Meanwhile, the time period required to transmit the weighted OFDM signal is that the same because the time period for the first OFDM signal. The performance of the proposed scheme is estimated with Mat lab Simulator. With respect to the theoretical analysis, the weighted OFDM signal PAPR is smaller than that of the clipping and filtering (C&F) methodology, and also the bit-error-rate (BER) performance of the weighted OFDM system is improved compared with the C&F methodology. Here, the projected methodology is easier than the C&F method.
Performance Analysis of OTDM System at the Different Data Rate
Akriti Gupta, Jyotsana, and Himali
OTDM is an updating technique to TDM that provides high speed data generation. It is a technique which overcomes the bandwidth limitation of electronics. The basic principle of this technology is to multiplex number of low bit rate optical channels in time domain. In this paper, the performance of OTDM system is analysed at different data rates i.e.40 Gbps, 80 Gbps and 160 Gbps respectively. The single mode fiber with dispersion 17.65 ps/ nm-km is used. The maximum transmission length achieved is 145km for 40Gbps OTDM system with Q-factor of 29.22 and BER of
Manimozhi Iyer , Deepika Vasudevan , Tejaswini B. S. , Vidya Sri M
Quantum Cryptography, its Protocols and Techniques
Manimozhi Iyer , Deepika Vasudevan , Tejaswini B. S. , Vidya Sri M
Various approaches and techniques are being constantly studied to ensure a secure communication. Modern cryptographic techniques face a serious threat by the progress of computing power. They generally make use of large numbers which can be factorized. The use of this make the communication vulnerable to attacks as it is now possible to reverse the one-way functions. Motivated by this concern, Quantum Cryptography was introduced to provide secure communication. It depends on two important aspects of quantum mechanics, the Heisenberg Uncertainty principle and the principle of photon polarization. This paper focuses on the principle and working of Quantum Cryptography and compares various Quantum Key Distribution Protocols such as BB84 and B92. It also introduces other cryptographic techniques which are popularly used.
Survey on security and privacy issues of Wireless Sensor Network
Seema Mane, Madhur Patrikar
Proliferation of Wireless sensor network is increased. Security, how to localized sensor between two nodes, efficient authentication, privacy, scalability, flexibility and availability, these are main issues of wireless sensor network. Clustering based wireless sensor network will solve the problem of security, privacy issues and scalability.
Interactive Image Segmentation Using Combined MRF and Ant Colony Optimization
Vrushali D. Mendhule, Gaurav Soni , Alesh Sharma
: Image segmentation is the process that partitions an image into region. Although many literatures studied automated image segmentation, it is still difficult to segment region-of-interest in any kind of images. Thus, manual delineation is important yet. [2] In order to shorten the processing time and to decrease the effort of users, this paper introduces the approaches of interactive image segmentation method based on MRF and Ant colony optimization. In this paper we proposed a segmentation algorithm combined MRF with ACS, which not only applied ACS as optimization algorithm but also introduced the neighborhood pheromone interaction rules into ACS under MRF model. Interactive segmentation aims to separate an object of interest from the rest of an image. This problem in computer vision is known to be hard, and very few fully automatic vision systems exist which have been shown to be accurate and robust under all sorts of challenging inputs. Most of the previous works require users to trace the whole boundary of the object. When the object has a complicated boundary, or the object is in a highly textured region, users have to put great effort into iteratively correcting the selection. [1] Dirichlet Process Multiple-View Learning (DPMVL) for image segmentation technique produces very effective segmentation results as compare to previously existing techniques. DPMVL use MRF model for smoothing the segmentation. This can be further improved by using MRF-based image segmentation using Ant Colony System which works effectively and provide an alternative computational algorithm for building interactive image editing tools. In this paper, we present an interactive segmentation framework that integrates image appearance and boundary constraints in a principled way using combined MRF and ant colony optimization. We have improved proposed technique by using modified technology which have more interactivity, user control of segmentation process, and reach a satisfied result among the noise restraint, edge preservation and computation complexity. Experimental results are provided to demonstrate the superior performance of the proposed approach. A comparison with other standard operators is also discussed and the proposed method produced acceptable results within reasonable amounts of time. It is shown that the proposed algorithm based on ant colony optimization and MRF achieves better performance compared to the typical interactive image segmentation methods without using ant colony optimization concept.
32nm Based High-Speed Low-Power Calibrated Flash ADC comparator with improved ENOB
P.Chandrayudu, P.Tejashwini
with this document, we have proposed a low power high speed CMOS Comparator using Dual Mode Logic (DML) for Flash type Analog to Digital Converter, the simulation model of DML based CMOS logic simplification is to identify a system that improves the hardware utilization rate from 57.14% to 100% by improving the delay and power consumptions occurred in data converter circuits. The proposed technique whose layout simulation with extended DML logic is implemented and its performance characteristics are studied using Microwind simulator
Low Power Modeling Of Topologically Compressed Static FlipFlop.
B. Murali, Gundlapalle Rajesh, Dr.V.Thrimurthulu.
The increasing market trends of extremely low power operated handy applications like laptop, electronics gadgets etc requires microelectronic devices with low power consumption. It is obvious that the transistor dimensions continues to shrink and as require for more complex chips increases, power management of such deep sub-micron based chip is one of the major challenges in VLSI industry. The manufacturers are always targeting for low power designs for the reason that to provide adequate physical resources to withstand against design hurdles and this lead to increases the cost and restrict the functionality of the device. This power reduction ratio is the highest among FFs that have been reported so far. The reduction is achieved by applying topological compression technique, merger of logically equivalent transistors to an eccentric latch structure. Fewer transistors, only three, connected to clock signal which reduces the power drastically, and the smaller total transistor count assures to retain the chip area as conventional FFs. In addition, fully static full-swing operation makes the cell lenient of supply voltage and input slew variation. An experimental chip design with 32 nm CMOS technology shows that almost all conventional FFs are expendable with proposed FF while preserving the same system performance and layout area. The performance of this paper is evaluated on the design simulation using Microwind 3.1 simulator
Presenting here is an accelerometer based gesture controlled rover using PIC16F877, one of the most basic microcontroller. The robot can be moved in any direction just by making simple gestures, and the systems sensitivity to gestures can be easily adjusted as per our liking. The movement of gesture transmitter section is sensed by accelerometer and voltage level corresponds to movement of robot along X and Y axes are compared by a comparator, following which corresponding instructions are transmitted through the RF transmitter to control robot. The robot receives the instructions. The microcontroller drives motors corresponding to instructions received and displays the related message on LCD.
In this paper we consider the weak signal leading to barely audible conversations and continuously dropped calls and loss of data connection in cell phones. This paper introduces a novel product called The Network extender which conquers this wireless dead zone. It strengthens weak cellular signals to deliver high quality signals for voice, data and video reception on cell phones. Here we are introducing adaptive echo cancelling digital processing which helps Performance of the Network extender. All idea is about bringing the base station nearer to Cell phone
Local Independent Projection Based Classification Using Fuzzy Clustering
R.Sathya, Mrs.M.Saraswathi.
Segmentation is a vital role in medical image processing, where clustering technique widely used in medical application particularly for brain tumour detection in magnetic resonance imaging (MRI).We propose a novel automatic tumour segmentation method for MRI images. This method treats tumour segmentation as a classification problem. Additionally, the local independent projection-based classification (LIPC) method is used to classify each voxel into different classes. A novel classification framework is derived by introducing the local independent projection into the classical classification model. we applied adaptive mean shift algorithm to real MRI data and its performance is compared with other clustering methods including K-Means clustering and Fuzzy CMeans clustering. The transformation of an image into its set of features is known as feature extraction. It is a challenging task to extract good feature set for classification. Support vector machine (SVM) is one of the techniques used for the classification purpose .
Femtocells are small cellular telecommunications base stations that can be installed in residential or business environments for better cellular coverage. Information and communications technology ecosystem now represents around 10 per cent of the world's electricity generation and increasing continuously day to day due to increasing the base stations of 4G and LTE-Advanced wireless communications network and it may create a power management problem in near future. According to the Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, for 2012-2017, "the overall mobile data traffic is expected to grow to 11.2 Exabyte’s per month by 2017.To minimize the challenge A femtocell is possible solution, It results in a significantly improved signal quality and substantial cost savings also. The aim of this paper is to examine in a top-down approach the femtocells as an important component of the developing LTE-Advanced Technology, with essential projection into the future of the femto-cellular technology and what the future holds for its deployment for operators and also the benefits of Femtocells.
Experimental investigation on different properties of hazardous incinerator bottom ash concrete
V.Manjunatha, Dr V.Ramesh
The disposal and treatment of hazardous waste is very costly affairs for the environment, it has been a dormant issue. The new millennium brings challenges for the civil and environmental engineers and opportunities for research on the utilization of the solid waste and by-products and basic properties of concrete and its materials. The recycling of waste after burnt in incinerator attracts an increasing interest worldwide due to the high environmental impact of the cement and concrete industries.
Properties of Municipal Solid Waste Incinerator Ash in Concrete
S.Deepak, Dr V.Ramesh
The Municipal Solid Waste Incineration (MSWI) residues are a worldwide studied topic over the last decades. So that to utilize the municipal solid waste is the one of the possibilities is to use MSWI ashes in concrete production, as it is done the bottom ash features the most convenient composition in concrete, and it is available in highest amounts among the MSWI ashes. The bottom ash was used as partial replacement of cement in concrete strength has to find, if the prepared concrete will get sufficient durability or not. The behavior of concrete with the bottom ash is differed from the control material due to presence of sulfates and chlorides in bottom ash.
A Review on Various Approaches Utilized for image segmentation
Sudhanshu Vashistha, Er. Surbhi Gupta
Image segmentation is the process of partitioning a digital image into multiple segments to simplify the representation of an image into something that is more meaningful and easier to analyze. In this paper, various techniques of image segmentation are discussed and compared with the basic parameters. Medical images are generally characterized by multiple regions, and weak edges. When regions in medical images are made up of homogeneous group of intensities, it becomes more difficult to analyze because different organs or anatomical structures may have similar gray level or intensity representation. Practically Multi Thresholding, Correlation Matching, FCM, KFCM and PFCM have been evaluated and the results obtained shows that Multi Thresholding is the most efficient
In today’s world every activity belongs to internet, everything is going online in such a case web applications are playing an important role providing services to the customers and when the application becomes popular, traffic is also growing. Load Balancing is required in such situations to avoid overload. This paper also introduces task scheduling as it is the most important part in cloud computing which aims at meeting users requirements and improving the resource utilization. The purpose of this paper is to review various load balancing, Task scheduling algorithms along with their merits and demerits in detail.
Trustworthy elections are essential to democracy. The process of Election is complex and involve many components including voter registration, ballot preparation and distribution, voter authentication, vote casting, tabulation, result reporting, auditing, and validation. To make the process more secure and reliable, the standard mechanism should be deployed. Online Polling System offers many benefits including low cost & increased voter participation. Remote Voting system considers security & human factors carefully and mainly considers that they provide voters reliable and intuitive indications of the validity of the voting process. This gives rise to the concept of Secure Online polling System Using Extended Visual Cryptography, Such a technique thus would be lucrative for security. It offers many benefits including low cost, increased voter participation and consider human factor carefully.
EETSR: Energy Efficient Threshold Sensitive Hierarchical Routing Protocol for Wireless Sensor Network
Pinkey Bhati , Dr. Raj Dev Tiwari
Wireless sensor Networks (WSNs) has enabled the designers to create autonomous sensors, which can be deployed randomly, without human supervision, for the purpose of sensing and communicating valuable data due to increased use of Wireless sensor Networks (WSNs) in variety of applications. In Wireless Sensor Networks, efficient energy management has a great importance. In this paper, we propose a novel hierarchical routing protocol; Energy Efficient Threshold Sensitive Routing Protocol (EETSR) to prolong network lifetime and stability period. We utilize static clustering with threshold aware transmissions to achieve these targets. Our hybrid protocol is suitable for both proactive and reactive networks. Simulations are done in MATLAB and the results show that our protocol has improved stability period than LEACH, SEP, TEEN. We also implemented the Uniform Random Model (URM) to find Packet Drop to make our scheme more practical.
Solar Irradiance Measurement Using Neuro Fuzzy Network
Meega T , Kumarasabapathy N
Solar irradiance is a key parameter for MPPT in pv power plants.The operating point at which a pv array deliver its maximum power ,changes as a function of irradiance and temperature.If we sensed the both solar irradiance and temperature values we can easily compute maximum power point,moreover forcing pv array to operate at that point to increase effiency . Temperature sensing is easy, however, measuring solar irradiance is difficult because irradiance sensors are expensive and difficult to calibrate.To overcome those difficulties we go for measuring irradiance based on neuro fuzzy networks . The proposed sensor is implemented through a photovoltaic cell, a temperature sensor, and a low-cost microcontroller. The use of a microcontroller allows for easy calibration, updates, and enhancement by simply adding code libraries. Furthermore, it can be interfaced via standard communication means with other control devices, integrated into control schemes, and remote-controlled through its embedded web server.
Power Flow Control in Transmission Line Using IPFC Equipped with Fuzzy Logic Controller
Yogesh Kumar, Bipul Kunj, Navita
The interline power flow controller (IPFC) is a Flexible ac transmission based device comprises voltage source converter for the series compensation in multiline transmission systems. The IPFC is capable to manage power between two or more interconnected lines. The voltage source converter injects reactive power which is used to flow the active power in the transmission lines. Flow of electrical energy in the transmission line can be controlled adequately by utilizing IPFC. This paper proposed the compensation in the transmission line using IPFC for managing power flow and comprehensive analysis of active power is presented with and without IPFC using projected circuit models. The matlab/simulink tools equipped with fuzzy logic controller is using for simulation.
Closed Loop Control System and Remote Monitoring In Agriculture for Social Modernization
Siva Naga Syam Kumar Perisetti, P.Sudhakara Rao
In agriculture field, the current agricultural practices need to intensify the rate of food crop production for the rate of population growth with available resources. This paper describes the automated system to make effective utilization of water resources for agriculture and crop growth monitoring using GSM and Zigbee technology. Firstly, this system utilized rainwater from the harvest rainwater tank for irrigation and then bore well water has been used. The water use efficiency is increased in drip irrigation system by using soil moisture sensor, humidity sensor and temperature sensor. The signals from the sensors are coordinated by the microcontroller and transmitted to irrigation control centre (ICC) through Zigbee wireless radio communication. The optimized water use for an agriculture crops has been achieved in the ICC successfully. The growth status of the crop also monitored using IR transceiver. The device that can report data to the cultivator remotely and the system allow them to effectively control through GSM.
Design and Analysis of Hexagonal Fractal Antenna for UWB Application
Komal Tanwar*, Naman Bhargava**, Suraj Nagpal***
A fractal antenna having the shape of hexagonal for UWB application is designed. The frequency band is considered from 3 to 10.6 GHz. This antenna is designed on a dielectric FR4 epoxy substrate of dimension (50mm X 40mm) permittivity €r =4.4 and height = 1.6mm and it is fed by a 50 ohm microstrip line. With this structure the return loss less than -10dB, VSWR, radiation pattern get improved. The proposed antenna is simulated by using the HFSS software. The simulated results are in good agreement with experimental results.
Mrs. Suvarna L. kattimani , Mr. Aniruddha A. Atwadkar , Dr Suvarna Nandyal
Privacy Preserving Public Auditing Mechanism For Shared Data In Cloud Computing Environment With Dynamic Groups
Mrs. Suvarna L. kattimani , Mr. Aniruddha A. Atwadkar , Dr Suvarna Nandyal
In Cloud environment, clients can remotely store their information and appreciate the on-interest high caliber applications and administrations. The respectability of cloud information is liable to distrust because of the presence of equipment/programming disappointments and human lapses. A few components have been intended to permit both information proprietors and open verifiers to proficiently review cloud information uprightness without recovering the whole information from the cloud server. Nonetheless, open reviewing on the uprightness of imparted information to these current instruments will open evaluating on shared information put away in the cloud that endeavour ring signature to figure confirmation metadata expected to review the rightness of shared data.so that an outsider evaluator (TPA) has the capacity check the honesty of shared information for clients without recovering the whole information. In the interim, the character of the user on every block of data in shared information is kept private from the TPA likewise ready to perform numerous examining undertakings at the same time as opposed to checking them one by one.
Systematic Approach to Extract Medical Relations using Machine Learning Approach
Megha M Khanikar, Ramesh Bhat
The Machine Learning (ML) field has gained its momentum in almost any domain of research and just recently has become a reliable tool in the medical domain. Extracting medical relations is very trivial task since the medical information is stored in textual format and the database of medical information is also very large in size for example Medline is the medical database that contains 21 million records from 5000 selected publications. In addition to that web page containing medical information also contains some unrelated contents like advertisements, scroll bars, quick links, related searches etc., manually extracting only relevant information from such a huge database is very difficult task. To reduce user overhead of extracting useful information current approach is proposed. This approach presents the efficient machine learning algorithm and techniques used in extracting disease symptom and treatment related sentences from Medline. In this approach Multinomial Naive Bayes algorithm and several other techniques are used to extract semantic relation between disease symptom and their associated treatment. The proposed system gives the user exactly the Disease Symptom and Treatment related sentences by avoiding unnecessary information and this technique can be integrated with any medical management system to make better medical decisions.
Fingerprints have been used for over a century and are the most widely used form of biometric identification. Fingerprint image enhancement is required to make the image clearer for subsequent operations The quality of fingerprint images is not completely perfect. Images may be corrupted and damaged due to some skin conditions so there is a need to improve the quality of images. In this paper a new technique is proposed which is based on various existing techniques. The proposed work is based on CLAHE, curve gabor filter and fourier filtering.. This paper presents a methodology and new implementation techniques for fingerprint image enhancement.
Indepth Packet Inspection Using Modified Enhanced Multipattern Matching Algorithm
Hina Naz
. One of the most important requirements in intrusion detection systems (IDSs) is a good pattern matching algorithm. EHMA by Tzu-Fang et al. is an efficient and cost-effective pattern detection algorithm for packet inspection. A few key assumptions in their work were given without enough justification. In this paper, we have tried to verify some key assumptions of this algorithm by testing it on a cluster with real network data. We also introduce some methods to improve the algorithm by choosing the input parameters appropriately. The results show that some assumptions may not correct in some cases, and by applying some changes to the existing algorithm, we can make the performance of the matching process much better.
A Comprehensive Survey on Internet Protocol Television (IPTV)
Pooja Kumari1 , Puneet Rani2
IPTV was convergence product between broadcasting, telecommunication and information technology because it gave multimedia service such as TV broadcasting, video, audio, text, and data transmitted by using IP protocol. IPTV service had a better quality than conventional TV, such as voice over internet protocol (VoIP), data (internet), and video on demand (VoD). IPTV is distinctly different from “Internet Video” that simply allows users to watch videos like movie previews and webcams, over the Internet in a “best effort” fashion with no into- end service management an quality of service considerations. This paper is an overview of the new emerging IPTV technology. Our future work will be focusing on IPTV Quality of Experience, its architecture security threats and its possible solutions and so on.
Implementation of an Android Application for Management of a Housing Society
Omkar Singh , Aditee Lakhan , Jyoti Gupta
A housing society and its functions are a part of our everyday lives. Members of the managing committee are those who take charge of all the chores involved here. Residents often feel edgy regarding undone jobs and most even lack time to keep track of all these happenings. But, there’s no avoiding the fact that these chores and all the housing society members are inseparable. This paper presents the design and implementation of an Android based society maintenance application. The elements of this system comprise of (1) an Android application which will be accessed by both managing committee and residents (2) database server that will contain information entered by the users as well as generated for the users and (3) business logic that will interconnect and pass information between the application and the database server. Our application is developed in Eclipse.
A Study on Strength Properties for Cement Mortar added with Carbon Nanotubes and Zeolite
N. Sakthieswaran , M.Suresh
Carbon Nanotubes (CNTs) have generated great interest for their potential as reinforcement in high performance cementitious composites. Zeolites reduce the chloride permeability and increases workability in the cement mortar. The proper dispersion of carbon nanotubes and zeolites in the cement mortar plays an important role in this study. The experimentation will be performed in 1:3 cement mortar for different water cement ratio of 0.55 to 0.7, 0.1% of multiwalled carbon nanotubes, 0.5% of Polycarboxylate Superplasticizer and 1% of zeolite. Flow on different water cement ratio of cement mortars were tested. The specimens of size 50mm x 50mm x 50mm cube and 100mm diameter, 200mm height cylinders are used. Then the specimen is to be tested on7th day,28th day 90th days. The compressive strength, split tensile strength are being determined.
Cognitive Radios Spectrum Sensing Using Cyclic Detection by Wavelength Assignment
Sumeet Singh, Mrs. Mandeep Kaur
Cognitive Radio has the colossal key system of empowering range observed in the Spectrum detection. This paper manages spectrum detecting strategy utilizing wavelength which partitions a part of Cognitive radio arrangement burdens and introduces focal points confronting mostly all detecting problem for low gain SU by merging cyclic frequency with assignments. Subjective radio confronting numerous element challenges in range detecting and those are measured by multi-dimensional range detecting. Those undertakings are false detection, probability of detection with auto correlation for each secondary user. Other option techniques like Statistical detecting calculations likewise talked about here. This may enhances the radio recurrence utilization of range and it is done when both unlicensed and authorized lessening obstruction furthermore by use of authorized clients for recognizing the white spaces. The simultaneousness of these circumstances can create summon where the signal to noise ratio (SNR) is underneath the level of recognition edge by utilization of sensor, and it misses recognitions. The idea utilizing wavelength is to increase the range of detection to auxiliary clients in subjective radio to work without meddling the essential or primary clients. These advantages take a stab at the expense of expanded movement overhead, multifaceted nature, power utilization, and the requirement for control channels. The new thought of cognitive radio is given to address the issue confronted in range proficiency and it gives secondary clients to adjust their working components and dealings with the assistance of neighbouring radio environment.
A Comparative Performance Analysis of AODV and DSR Routing Protocols for Vehicular Ad-hoc Networks (VANETs)
Neha Garg , Puneet Rani
Vehicular ad hoc networks (VANETs) are the specific class of Mobile ad hoc networks (MANETs). Since vehicles tend to move in a high speed, the network topology is rapidly changed. The performance of communication between vehicles depends on how better the routing takes place in the network. Routing of data depends on the routing protocols which are being used in network. In this paper we analyse and compare the performance of two reactive routing protocols Dynamic Source Routing (DSR) and Ad hoc On Demand Distance Vector (AODV) in terms of three performance metrics like throughput, network load and end-to-end delay with different number of mobile nodes (100, 150, 200 and 250) with constant speed 10m/s. We employed OPNET Modeller v14.5 for the performance analysis of two reactive routing protocols (AODV, DSR). OPNET modeller 16.0 is a network simulator environment which is used for simulations of both wireless and wired networks. A conclusion is drawn on the comparison between these two routing protocols with performance metrics like network load, end-to-end delay and throughput on the basis of results derived from simulation.
Graphical Modularity Analysis Using Force Directed Approach
Syed Hasan Saeed
Nowadays graphical analysis has become the centrepiece of many of the studies & common day problems. Because of the ability of the graph to adept & contain data of various forms & then interpret information it is in demand everywhere, many of the big problems are being analysed through graphical networks. Graphical data mining a branch evolved out of data mining has today become such a vast subject of study, research, analysis & case-review. This in itself shows the broad scope on which graphs, graphical analysis & graphical mining is being carried out today. The basic reason for this popularity of graphs is their ease with which they can accommodate data of various types & then can give result across various domains. So in such an environment it becomes equally important to study various metrics of graph that help in such studies. Modularity is one of those metrics, whose importance has grown manifold in studying & researching social networks, behavioural pattern networks & geographical networks. In this study a force directed approach has been used to analyse modularity in a graph since it facilitates the dynamic structure of graphs that changes with respect to force applied on it similarly like a real time graphical pattern changes. Modularity is one property which can be used in multiple networks to study & analyse various parameters on which efficiency & capacity of networks is evaluated. Also with the advent of big data, business intelligence the need for information which gives multi-dimensional & multi-value relationships has grown manifold & graphical analysis especially in terms of modularity or community detection can give us plenty of such information. In this paper a very novel & realistic approach has been taken that takes into account the ever changing & dynamic nature of real time networks, based upon that a force directed approach has been taken which involves calculating the force exerted on graph at any time then finding corresponding modularity for that force. Three case of force have been analysed all for same graph to differentiate the effect of force on same graph. Three different types of forces act in a graph – attractive forces, repulsive forces & displacement force.
Types and Tools Available for Fluency Disorder –Speech Therapy
M. A. Josephine Sathya , D r.S.P.Victor
Automatic Speech Recognition (ASR) is the process by which a machine is able to recognize and act upon spoken language or utterances. Speech recognition discipline is a system within sound technologies that tries to gain a seat in the course of advancing technology. Fluency disorder is an interruption in the flow of speaking characterized by a typical rate, rhythm, and repetitions in sounds, syllables, words, and phrases. Artificial recognition and disfluency identification are considered to be complicated in fluency disorders. The fluency disorder which is mainly focused in this paper is stuttering which is characterized by various behaviors that interface with the forward flow of speech. While all individuals are disfluent to some extent, on the surface and differentiate stutterers from non stutterers are the frequency of their disfluency and/or the cruelty of their disfluency. In young children, typical nonfluent speech is initially episodic, and then becomes more cyclical in nature, coming and going without apparent cause or pattern. This paper presents the types of stuttering, stuttering therapy, techniques used for stuttering therapy and mainly focus on the young children.
Steganography differs from cryptography in the sense that where cryptography focuses on keeping the contents of a message secret, steganography focuses on keeping the existence of a message secret. Various techniques of image Steganography are explained such as spatial domain technique, Spread Spectrum Technique, Transform Domain Technique, Statistical Technique, distortion technique. In this paper various Image Steganography techniques are reviewed.
Recent advances in wireless sensor networks have prompted numerous new conventions particularly intended for sensor networks where energy awareness is a fundamental consideration. A wireless sensor network (WSN) consists of low cost, low power, small in size and multi functional sensor nodes. Routing protocols in WSNs emphasize on data dissemination, limited battery power and bandwidth constraints in order to facilitate efficient working of the network, thereby increasing the lifetime of the network. Routing protocols in WSNs are also application specific which has led to the development of a variety of protocols. WSN has a design trade-off between energy and communication overhead which forms the nerve center of the routing techniques. In this paper we present a survey of state-of-the-art routing techniques in WSN.
M.Sridharan,a , K.Anabayan,b S. Naveen kumar R.Varadharajan
Performance Analysis On Concrete Photovoltaic/Thermal Water Collectors
M.Sridharan,a , K.Anabayan,b S. Naveen kumar R.Varadharajan
This paper deals with an experimental study of an inexpensive Concrete Photovoltaic Thermal Collector (PV/T) total aperture area of 0.36 m2 , used for the simultaneous production of heat and electricity. The Concrete PV/T is characterised by a thin cement concrete slab which performs the function of collecting, absorbing and storing of the solar thermal energy. Above the concrete slab PV cells were pasted .Inside the concrete absorber PVC pipe , copper pipe and Brass pipe are embedded .Outdoor experiments were carried out under varied environmental conditions for several days during two consecutive months (from April to May 2015). The experiments were carried out by measuring the climatic variables, temperatures in different parts of the collectors, and mass flow rates of water, during the test days. Based on these measurements, the behaviour of the systems was analysed. A detailed analysis was carried out for evaluating the thermal performance of the Concrete PV/T under given operating conditions. The results obtained from the Concrete PV/T system were compared with the results obtained from a Conventional Solar PV/T system composed of a flat-plate collector (with a total aperture area of 1m2 ) tested at the same time.
Sensor-based System for Monitoring of Child movements & falls
Jayashree O. Nehete , D.G.Agrawal
The rapid aging of the world’s population, along with an increase in the prevalence of chronic illnesses and obesity, requires adaption and modification of current healthcare models. One such approach involves tele-health applications, many of which are based on sensor technologies for unobtrusive monitoring. Recent technological advances, in particular, involving micro-electro-mechanical systems, have resulted in miniaturized wearable devices that can be used for a range of applications. One of the leading areas for utilization of bodyfixed sensors is the monitoring of human movement. This paper has presented the activity recognition method for children using only a triaxial accelerometer and a barometric pressure sensor. Time-domain and frequency-domain features are extracted for categorizing body postures such as standing still and wiggling as well as locomotion such as toddling and crawling. In this approach, we use a single 3-axis accelerometer and a barometric pressure sensor worn on a waist of the body to prevent child accidents such as unintentional injuries at home. Labeled accelerometer data are collected from children of both sexes up to the age of 16 to 29 months. To recognize daily activities, mean, standard deviation, and slope of time-domain features are calculated over sliding windows. In addition, the FFT analysis is adopted to extract frequency-domain features of the aggregated data, and then energy and correlation of acceleration data are calculated. Child activities are classified into 11 daily activities which are wiggling, rolling, standing still, standing up, sitting down, walking, toddling, crawling, climbing up, climbing down, and stopping.
this paper, our main issue is an authorization and providing the data security for various applications in web services in a network. Cloud Computing is a revolutionary IT field and we are using this technology for various purposes. With the increasing use of the data sharing in distributed systems such as online social networks or cloud computing, there is increasing in concerns for data security while distributing or sharing data. Here, Ciphertext policy attribute-based Encryption(CP-ABE) is becoming cryptographic solution to above issue of secured data sharing among network. Also, we will have these achievements :1) key escrow problem could be solved by escrow-free key issuing protocol, where key is generated using the secure two-party computation between the key generation center and the data-storing center 2) fine-grained user revocation per each attribute could be done by using anonymous id algorithm where sharing of data will be done on attribute basis.
Data Dictionary Based Mechanism against SQL Injection Attacks
Biji.K. P.
: “Data Dictionary Based Mechanism Against SQL Injection Attacks” which helps and manages the important private customer data in a secured manner by mirroring the database structures into unique secure mirroring tables which is managed in a differently managed secure data management system. This plays an effective medium in the prevention of SQL Injection, which is one of the main web attack terminology which is effective utilized by various hackers to steal data from organizations which managed their transactions through online transactions and databases. This is a unique type of intrusion that takes advantage of improperly managed coding in the web applications. SQLIA allows intruders to inject SQL commands into access data’s from the web forms to allow them to gain access to the data held within your database. In this paper we will discuss several types of SQLIAs, existing techniques and their drawbacks. Finally I have proposed a solution for detection using data dictionary and prevention using the intrusion search along with ASCII values. I have implemented it using ASP.net with VB.net and SQL server 2008, although this algorithm can be implemented in any language and for any database platform with minimal modifications.
A Review On Comparative Analysis Of Different Transport Layer Protocols In MANETs
Er. Amritpal Kaur, Er.Pooja Rani
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed framework. Ad hoc network is a network which comprises of nodes that use a wireless interface to send information from source to destination. Since the nodes in a network of this kind can serve as routers and hosts so they can forward packets on part of other nodes and run user applications. The traffic scenario basically defines the reliability and capability of information transmission, which creates its performance analysis.TCP (Transmission Control Protocol), is a standard that defines how to establish and maintain a network conversation via which application programs can exchange data. Stream Control Transmission Protocol (SCTP) is a transport layer protocol which serve same role to the famous protocols Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)
A Novel Data Hiding Scheme Based on Fused Adaptive and Nonadaptive Technique
Palak V. Keshwani , Rakesh K. Khare
Steganography is a technique of hiding the secret information. Steganography hides the existence of the secret data and make the communication undetectable. Secret data can be communicated in an appropriate multimedia carrier such as image, audio or video. Image steganography is extensively used technique. In this technique secret data is embedded within the image. Steganography techniques can be categorized into two groups - adaptive and non-adaptive. Each of these have its strengths and weaknesses. Adaptive steganography embeds the secret information in the image by adapting some of the local features of the image. Non-adaptive steganography embeds secret data equally in each and every pixel of the image. Several techniques have been proposed for hiding the secret data. Least significant bit replacement is the most common method. This is because it is simple and easy to implement. Discrete wavelet transform is also a widely used technique for embedding secret information. This paper propose a novel steganographic approach for hiding the secret data by fusing both adaptive and non-adaptive methods of steganography. This will give a more secure approach for hiding the secret information as the secret embedded image is almost same and totally indistinguishable from the original image by the human eye. Also the retrieved secret image is same as the original secret image. This is proved by means of high values for PSNR and very little values for MSE.
Experimental Investigation Of Performance And Emission Characteristics Of Tamanu Oil As Alternative Fuel In Ci Engine
G. Deepankumar
The increasing industrialization and motorization of the world has led to a steep rise for the demand of petroleum products. Petroleum based fuels are obtained from limited reserves. These finite reserves are highly concentrated in certain regions of the world. Therefore, those countries not having these resources are facing a foreign exchange crisis, mainly due to the import of crude oil. Hence, it is necessary to look for alternative fuels, which can be produced from materials available within the country. Biodiesel can be extracted from vegetable oils and waste fats. The present work examined the use of a Tamanu oil, a new possible source of alternative fuel for direct injection diesel engine. The biodiesel has been prepared from Tamanu oil by Trans-Esterification method .Diesel and Tamanu oil methyl ester (B15, B25, B50, B100) fuel blends are used for conducting the performance and emission in terms of 20% load increments from no load to full load. From the experiments it is found that Tamanu oil is a better NOx reduction fuel.
Digital Signal Processing For Optical OFDM Based Future Optical Networks
K.Vishalakshi, A.Rajendra Babu
Digital signal processing (DSP) is widely exploited in the modern world to enable a vast array of high performance services and devices that were unimaginable several years ago. As a highly pervasive technology, DSP considerably enhances everyday life by enabling applications ranging from anti lock breaking systems to satellite navigation and sophisticated medical imaging. DSP has also been an enabler for many of the highly successful communications technologies over the last20 years. It is only in recent years that advanced DSP has been utilized in optical communications to realize commercial long-haul optical systems in the form of DSP-enable coherent optical receivers, which not only offer high transmission capacities of the order of 100 Gb/s per wavelength, but achieve ultra sensitive receivers for radically increasing unrepeated transmission distances. Index Terms: Digital signal processing,OFDM,Passive optical networks.
Design of high performance SRAM cell using 12T MTCMOS Technology
M. Gangasukanya, P. Asiya Thapaswin
this paper focus on the stability analysis at different pull up ratios and power dissipation at different tempetures of a novel low power 12T MT CMOS SRAM cell. The MT CMOS Technology the SRAM cell will be contains low VT (LVT) transistors and two high VT (HVT) sleep transistors. for reducing the wake up power During transition from sleep mode to active mode based on using sleep transistors and LVT transmission gate. The sleep power During transition from sleep mode to active mode for writing operations of SRAM cell. This will reduce the static energy dissipation of the cell. to reduce the swing voltage at the output nodes of the bit bar line and bit line based on the two Additional voltage sources are used, one connected with the bit bar line and another one connected with the bit line. the reduction in swing voltage causes the reduction in dynamic power dissipation, low leakage currents in MT CMOS technology and the simulation results of proposed 12T SRAM cell have been determined and compared to those of some other existing models of SRAM cell and the simulation have been done in 45nm CMOS Technology based on tanner tool.
This proposes a space time block code orthogonal frequency division multiplexing downlink baseband receiver for mobile wireless metropolitan area network. The proposed baseband receiver applied in the system with two transmit antennas and one receive antenna aims to provide high performance in outdoor mobile environments. It provides a simple and robust synchronizer and an accurate but hardware affordable channel estimator to overcome the challenge of multipath fading channels. The coded bit error rate performance for 16 quadrature amplitude modulation can achieve less than under the vehicle speed of 120 km/hr. The proposed baseband receiver designed in 90-nmCMOS technology can support up to 27.32 Mb/s uncoded data transmission under 10MHz channel bandwidth. It requires a core area of mm and dissipates 52.00 mW at 78.4 MHz with 1 V power supply. Index Terms—Baseband receiver, channel estimator, space time block code-orthogonal frequency division multiplexing (STBC-OFDM) system, synchronizer, wireless metropolitan area network (WMAN).
Vishwanath Shavi Adiveppa Ramapuri Chetan Mirje Manjunath Mathapati R V Nyamagoud
“Study of Characteristics Performance of VCR Engine for Different Fuels”
Vishwanath Shavi Adiveppa Ramapuri Chetan Mirje Manjunath Mathapati R V Nyamagoud
In the present investigation experimental work will be carrying out to estimate the performance, combustion and emission characteristics of a single cylinder, four stroke variable compression ratio multi fuel engine fuelled with honge oil blended with standard diesel. Tests has been conducted using the biodiesel blends of , 20%, 40% and biodiesel with standard diesel, with compression ratio 16:1-18:1 and an engine speed of 1500 rpm at different loading conditions. Present paper deals with effect of variation in compression ratio on engine performance and emission. Paper deals with effects on engine fueled with diesel, blend of diesel with biodiesel with a view to provide a platform for comparison of the parameter on various fuels. The performance parameters includes brake thermal efficiency (BTE), specific fuel consumption (SFC), brake power (BP), indicated mean effective pressure (IMEP), mechanical efficiency and exhaust gas temperature. The exhaust gas emission is found to contain carbon monoxide (CO), hydrocarbon (HC), nitrogen oxides (NOx) and carbon dioxide (CO2).
K V S Sree SailajaaVidyadhari, Sanath Kumar Tulasi, Tulasi Sanath Kunar
Design ALU Based online BIST for Multi word-width RAM’s
K V S Sree SailajaaVidyadhari, Sanath Kumar Tulasi, Tulasi Sanath Kunar
Memory cores are usually the densest portion with the smallest feature size in system-on-chip (SOC) designs. The reliability of memory cores thus has heavy impact on the reliability of SOCs. Transparent test is one of useful technique for improving the reliability of memories during life time. Transparent BIST schemes for RAM modules assure the preservation of the memory contents during periodic testing Symmetric Transparent Built-in Self Test (BIST) schemes skip the signature prediction phase required in traditional transparent BIST. Achieving considerable reduction in test time. Previous works or symmetric transparent BIST schemes require that a separate BIST module is utilized for each RAM under test. This approach, giver the large number of memories available in current chips, increase the hardware overhead of the BIST circuitry. In this work we propose a Symmetric transparent BIST scheme that can be utilized to test Rams. For 5 different word widths hence, more than one RAMs can be tested in a roving manner.
The main motto of the project is to use the wireless technology effectively for the automotive environments by using the GSM Modem used in sending sms in case of theft intimation. The main scope of this project is to stop the engine of an automobile automatically. This can be done whenever a person trying to steal the vehicle, at that time sends an interrupt to a programmable microcontroller of 8051 family that stores owner's number upon a miss call for the first time. When someone tries to steal the car then microcontroller gets an interrupt and orders GSM Modem to send the sms, the owner receives a SMS that his car is being stolen then the owner sends back the SMS to the GSM modem to 'STOP', while the vehicle will be stopped. The control instruction is given to the microcontroller through interface, the output from which activates a relay driver to trip the relay that disconnects the ignition of the automobile resulting in stopping the vehicle.
An Efficient Trip Planner for Time Dependent Road Networks
Sithara M P , Varsha C
Management of transportation systems has become increasingly important in many real applications such as location-based services, supply chain management, traffic control, and so on. These applications usually involve queries over spatial road networks with dynamically changing and complicated traffic conditions. When we consider road network, route search and optimal path queries are two important types of queries. A path query returns a path that is a set of points that connects the source and destination. The optimal path queries find the optimum path from set information. In the case of road network users give some specification about the travelling with or without constraints. The optimal path queries optimize the possible paths and give the optimal path that satisfies all the constraints. The road network mainly deals with time dependent parameters A spatial road network can be modeled by a large graph in a 2-dimensional geographical space, whose edges correspond to road segments, and are associated with weights related to the traffic information. This paper, mainly focus on finding one of the best path that has minimum travel time. User can select the query points and Candidate plans are generated based on the selected points. To reduce the search space time interval pruning and probabilistic pruning strategies are implemented. Finally the best plan is refined based on a probabilistic threshold.
A Review on Various Data Routing Techniques in WSN Communication
Guraneet Kaur , Rakesh Gandhi
A wireless device network may be a massive assortment of device nodes with restricted power and forced procedure capability. As a result of the restricted communication vary and high density of device nodes, packet forwarding in device networks is sometimes performed through multi-hop information transmission. Therefore, routing in wireless device networks has been thought of a crucial field of analysis over the past decade. Nowadays, multipath routing approach is wide employed in wireless device networks to boost network performance through economical utilization of accessible network resources. Consequently, the main aim of this survey is to gift the conception of the multipath routing approach and its basic challenges, yet because the basic motivations for utilizing this method in wireless device networks. Wireless device Networks (WSNs), is one amongst the foremost speedily growing scientific domain. This is often due to the event of advanced device nodes with very low price and also the potential applications of such device nodes area unit ever growing. WSNs area unit internet of device nodes with a collection of processors and restricted memory unit embedded in it. Reliable routing of packets from device nodes to its base station is that the most significant task for these networks. Routing in WSN is bit additional advanced than different wired or wireless networks. The study concludes with comparison of few distributed agglomeration algorithms in WSNs supported these metrics.
Enhancing TCP in mixed wired wireless environment using Time Agents
Ashwini A. Jewalikar,Ratnamala S. Paswan
TCP Congestion Control mechanisms needs an accurate loss differentiation scheme to improve the performance of TCP in wireless environment. This paper innovates a method to improve performance of TCP in mixed wired/wireless network by selecting one of the retransmission techniques, Selective Repeat (SR), Go Back N(GBN) depending on reason of losses and their rate of occurrence .The proposed approach exploits random losses to improve the throughput of TCP in mixed wired/wireless environment
Analysis Of Emotion Recognition System Through Speech Signal Using KNN, GMM & SVM Classifier
Chandra Praksah Prof. V. B. Gaikwad
In machine interaction with human being is yet challenging task that machine should be able to identify and react to human non-verbal communication such as emotions which makes the human computer interaction become more natural. In present research area automatic emotion recognition using speech is an essential task which paid close attention. Speech signal is a rich source of information and it is an attractive and efficient medium due to its numerous features of expressing approach & extracting emotions through speech is possible. In this paper emotions is recognized through speech using spectral features such as Mel frequency cepstrum coefficient prosodic features like pitch , energy and were utilized & study is carried out using K- Nearest Neighbor classifiers , Support Vector Machine Classifier and Gaussian mixture model classifier which is used for detection of six basic emotional states of speaker’s such as anger ,happiness , sadness , fear , disgust and neutral using Berlin emotional speech database
Groundnut is a very important oil seed and food crop around the globe based on its nutritional and trade values, it also serves as food for humans or livestock, and in the absence of meat, forms a valuable dietary protein component. Oil extracted from groundnut by traditional means can produce about 20-30% from the groundnut whereas the mechanical methods will yield a higher percentage. A mechanical means of extracting oil was designed, constructed with locally available materials and tested for groundnut oil extraction. The machine consists of the frame, hopper, gear reduction unit and the power shaft. It was powered by a 15 hp three-phase electric motor. The expeller has an average extraction efficiency and capacity of 72.94 % and 61.4kg/hr respectively. The machine comes with a production cost of N197, 000. The expeller can be used for small scale groundnut oil extraction in the rural and urban communities
Study of Enhancing ARM Algorithms with Map Reduce Framework
K.Mangayarkkarasi M.Chidambaram
This paper studies the requirements to add efficiency in data mining. As the volume of data increases in tera bytes and that too remains distributed in nature , the data mining algorithms need to be adoptive to this trend. Scaling is one essential issue to be considered. Cloud gives a virtual platform for parallel and distributed processing. This paper analyses the scope for adding efficiency to association rule mining algorithms with cloud technology.In the present scenario as data are distributed in nature to mine them efficiently algorithms with distributed and parallel in nature are needed. Cloud environment supports distributed and parallel platform. Data privacy is still a very big problem to be addressed in cloud environment. This paper throws light on many encouraging aspects of cloud for data mining. Also it gives a study on adaptation of cloud environment for association rule mining
An increasing number of databases have become web accessible through HTML form-based search interfaces. The data units returned from the underlying database are usually encoded into the result pages dynamically for human browsing. We present an automatic annotation approach that first aligns the data units on a result page into different groups such that the data in the same group have the same semantic. Then, for each group we annotate it from different aspects and aggregate the different annotations to predict a final annotation label for it. An annotation wrapper for the search site is automatically constructed and can be used to annotate new result pages from the same web database.
Cross-Layer Approach for Minimizing Routing Disruption with Load Balancing in IP Networks
Mr. Mahalingesh Honnalli , Mr. Santosh S. Dewar
In IP networks Backup paths are widely used to protect IP links from failures. Still, existing solutions such as the commonly used independent model and Shared Risk Link Group (SRLG) model will not exactly redirect the correlation between IP link failures, and which may not choose reliable backup paths. We propose a cross-layer approach for minimizing routing disruption caused by IP link failures. We develop a probabilistically correlated failure (PCF) model to quantify the impact of IP link failure on the reliability of backup paths. With this model, we propose an algorithm to pick several reliable backup paths to defend each IP link. If an IP link fails, its traffic is divided into several backup paths to ensure that the rerouted traffic load on each IP link does not exceed the usable bandwidth. Experimental results show that two backup paths are adequate for protecting a logical link. Compared with existing works, the backup paths selected by our approach are at least 18 percent more reliable and the routing disruption is reduced by at least 22 percent. Unlike prior works, the proposed approach prevents the rerouted traffic from interfering with normal traffic.
A mobile ad hoc network is defined as a collection of mobile nodes where each node is free to move arbitrarily. As wireless network expands in size, complexity and demand, effective and uniform distribution of the traffic load in the entire network is a matter of utmost importance. In situations, when an intermediate node is used for longer duration for forwarding packets, it may cause traffic concentration on it resulting in higher latency and depletion of battery power of nodes. In this paper, we have studied the problem of load balancing in multi-hop ad-hoc networks and an algorithm ELB-AOMDV is devised to incorporate load balancing mechanism into a multi hop multi path routing protocol (AOMDV) for achieving better load distribution over nodes in a network.
Attenuation of Geopathic Stress by Using NAAVRAJ Attenuation Technique
Raviraj R Sorate , Avinash G Kharat 2 , Mayur Shivshette , Aditya Desai3 , Prashant Sontakke ,,...
Geopathic Stress is the energy emitted from earth crust in Nadir direction which affects the normal functioning of human body. The relation between Geopathic Stress and occurrence of accidents has already been proved. Geopathic Stress has an adverse impact on built environment. It is very important to attenuate the Geopathic stress zones to decrease the harmful effects of it. Rate of accidents on Highways and Expressways is more as traffic volume is more. From the study, it is concluded that majority of accidents occur on Geopathic Stress zone only. The work is carried out to attenuate Geopathic Stress zones to reduce the rate of accidents on Expressway as Geopathic Stress is closely associated with change in reaction time of driver which ultimately results in accident. Attenuation of Geopathic Stress zone has been done by using well established NAAVRAJ attenuation technique.
Implementation Of User Define Kernel For Non-Linear Data Classification In Support Vector Machine
Vivek verma , ram nivas giri
Data Mining is knowledge discovery process in database designed to extract data from a dataset and transforms it in to desired data. data processing action is similarly acclimated in get of constant patterns and/or analytical relationships amid variables, and a new to validate the accusation by applying the detected patterns to new subsets of knowledge.Data categoryification is one in every of the info mining technique to map great amount of data set in to applicable class. Data categoryification is reasonably supervised learning that is employed to predict class for information input, wherever categories are predefined.Supervised learning is that part of automatic learning which focuses on modeling input/output relationship the goal of supervised learning is to identify an optimal mapping from input variables to some output variables, which is based on a sample of observations of the values of the variables. Data classification technique includes various application like handwriting recognition, speech recognition, iris matching, text classification, computer vision, drug design etc. objective of this paper is to survey major techniques of data classification. Several major classification techniques are Artificial neural network, decision trees, k-nearest neighbor(KNN), support vector machine, navie-bayesian classifier, etc This paper introduces a user define kernel technique in svm for data classification, which is applicable to general data including, in particular, imagery and other types of high-dimensional data. By using kernel techniques the framework can account for nonlinearity in the input space.
An Efficient Distributed Congestion Control Protocol with Stability and Fairness
Vikram .A
Recent research efforts to design better Internet transport protocols combined with scalable Active Queue Management (AQM) have led to significant advances in congestion control. One of the hottest topics in this area is the design of discrete congestion control algorithms that are asymptotically stable under heterogeneous feedback delay and whose control equations do not explicitly depend on the RTTs of end-flows. In this paper, we first prove that single-link congestion control methods with a stable radial Jacobian remain stable under arbitrary feedback delay (including heterogeneous directional delays) and that the stability condition of such methods does not involve any of the delays. We then extend this result to generic networks with fixed consistent bottleneck assignments and max-min network feedback. To demonstrate the practicality of the obtained result, we change the original controller in Kelly’s work [15] to become robust under random feedback delay and fixed constants of the control equation. We call the resulting framework Max-min Kelly Control (MKC) and show that it offers smooth sending rate, exponential convergence to efficiency, and fast convergence to fairness, all of which make it appealing for future high-speed networks
Lata Sankpal#1 ,Neha Tawar#2 , Saurabh Rai#3 , Surabh shah#4
ProfsApp: Android App for Professional Networking and Resume Sharing
Lata Sankpal#1 ,Neha Tawar#2 , Saurabh Rai#3 , Surabh shah#4
The future demands the solutions to be mobile and portable for their widespread use and effectiveness. Ubiquitously the Internet gets most of the traffic from portable devices. Hence there is a need for Professional Communication and recruitment to go mobile. This paper intends to throw light on ProfsApp which is a light weight Professional Networking App that simplifies employee referral, standardizes and enhances professional communication.
WiMAX stands for Worldwide Interoperability for Microwave Access. Wimax technology is a telecommunication technology which provides wireless transmission.By the help of this technology we can access the internet and other portable devices. It is technology to deliver content over cable and other links at “last mile”. WiMAX has the ability to support various types of applications, such as web browsing, email, and file transfer. WiMAX operates on the same general principles as WiFi -- it sends data from one computer to another via radio signals. A system which is equipped with WiMAX would receive data from the WiMAX transmitting station, probably using encrypted data keys to prevent unauthorized users from stealing access. WiMAX also worked like a wifi but difference in between them is fastest WiFi connection can transmit up to 54 megabits per second under optimal conditions. WiMAX should be able to handle up to 70 megabits per second. The biggest difference isn't speed; it's distance. WiMAX outdistances WiFi by miles. WiFi's range is about 100 feet (30 m). WiMAX will blanket a radius of 30 miles (50 km) with wireless access. The increased range is due to the frequencies used and the power of the transmitter. Of course, at that distance, terrain, weather and large buildings will act to reduce the maximum range in some circumstances, but the potential is there to cover huge tracts of land. WiMax coverage is measured in square kilometers, while that of WiFi is measured in square meters WiMax specifications also provides much better facilities than WiFi, providing higher bandwidth and high data security by the use of enhanced encryption schemes. WiMax can also provide service in both Line Of Sight (LOS) and Non-Line Of Sight (NLOS) Manoj Kumar, IJECS Volume 4 Issue 6 June, 2015 Page No.12587-12594 Page 12588 locations, but the range will vary accordingly. WiMax antennas can "share" a cell tower without compromising the function of cellular arrays already in place. Worldwide Interoperability for Microwave Access (WiMAX) is currently one of the hottest technologies in wireless WiMAX is a standard-based wireless technology that provides high throughput broadband connections over long distance. WiMAX can be used for a number of applications, including “last mile” broadband connections, hotspots and high-speed connectivity for business customers. It provides wireless metropolitan area network (MAN) connectivity at speeds up to 70 Mbps and the WiMAX base station on the average can cover between 5 to 10 km.
Survey on Data Mining and IP Traceback Technique in DDoS Attack
Aakriti Aggarwal , Ankur Gupta
-Denial of Service (DoS) attack is presently a very serious threat for the Internet security. These attacks attempts to exhaust victim’s resources e.g. CPU cycles, memory or network bandwidth. Thus disturb the consistent access of services to the user. When DoS attacks are formed by multiple distributed computer it is called as distributed denial of service (DDoS) attack. DDoS attacks can weaken computing and communication power of its victim within a short period of time. Because of seriousness of the problem many defense mechanisms have been proposed to encounter the attack. In this paper, two types of techniques for DDoS attacks and their countermeasure are given so that a better understanding of attack can be achieved
— Organizations rely on information to make effective business decisions and corporate intranets are changing the way organizations conduct business. As networking technologies continue to improve, with increasing bandwidth and reliability, effective distributed computing is becoming a reality. Organizations are relying on internet technologies to be the conduit for employees to access and manipulate corporate information. Having timely and accurate information is essential for effective management practices and optimization of limited resources. Information can be stored effectively and efficiently in Server object & Client object can access it through distributed computing. Two popular methods for distributed computing are RMI and CORBA. RMI uses rmi protocol and CORBA uses IIOP protocol
Designing and Implementation of Iris recognition System Using Morphological Bridged Canny Edge Detection and KNN Classifier
Shrishti Pardhi, Shahana Gajala Qureshi
A biometric system provides automatic identification of a character based on a unique feature or attribute possessed by the creature. Most practical iris recognition systems use original algorithms developed by Daugman, and these algorithms are competent to create perfect recognition rates but not includes time requirement in account and extremely suffered when pupil is illuminated with light intensity. For the efficient pupil detection a morphological bridged canny edge detection technique is proposed, which is especially designed to handle pupil occlusion problem. For the feature selection and mining part, most conventional iris recognition systems relies on wavelet features extracted from rubber sheet model, but the wavelet feature extraction is a complex and time consuming process, to handle this problem in this paper rubber sheet model of iris part is exclusively used as feature. The third and most crucial modification proposed in this paper, is in the feature classification part, after feature space formation using rubber sheet model, K- Nearest Neighbor classifier is proposed to achieve highest iris recognition efficiency. This paper, proposes three serious modifications in available conventional iris recognition method for real time and efficient iris recognition. Mean wise modification proposed are in the pupil segmentation part, Feature extraction part for conduct pupil illumination problem and iris matching part for providing high speed and efficient iris recognition.
Hadoop is a distributed system that provides a distributed filesystem and MapReduce batch job processing on large clusters using commodity servers. Although Hadoop is used on private clusters behind an organization’s firewalls, Hadoop is often provided as a shared multi-tenant service and is used to store sensitive data; as a result, strong authentication and authorization is necessary to protect private data.The biggest challenge for big data from a security point of view is the protection of user’s privacy. Hadoop Big Data frequently contains huge amounts of personal identifiable information and therefore privacy of users is a huge concern. Security and privacy issues are magnified by velocity, volume, and variety of big data, such as large-scale cloud infrastructures, diversity of data sources and formats, streaming nature of data acquisition, and high volume inter cloud migration. Therefore, traditional security mechanisms, which are tailored to securing small scale static (as opposed to streaming) data, are inadequate. As an increasing number of enterprises move towards production deployments of Hadoop, security continues to be an important topic. In this paper I am adding how Layered Approach: Secure Protocol complies with current and future security implementation standards providing authentication and authorization and integrating additional levels such as data encryption support.
An indoor positioning system (IPS) is a network of devices used to wirelessly locate objects or people inside a building. With the proliferation of consumers using smart phones and tablets, enabling indoor positioning systems has become easier now with multiple enabling technologies. Today, retail purchases are happening across multiple channels like online, in-store, and mobile with the customer interaction at various touch points. But when a consumer makes a purchase in-store, i.e. in the retailers’ brick and mortar store, the shoppers’ behavior is not getting captured by the retailer. IPS is a key enabler for capturing in-store behavior of shoppers. IGATE has created an omnichannel retail solution, with IPS being one of the key technology enablers. The solution enables retailers to link shoppers’ behavior across digital and physical channels and provide shoppers with personalized promotional offers / messages during their entire shopping journey. This paper describes the high level architecture for an IPS based solutions, using retail solution as an example. The challenges and limitations in implementing the entire IPS solution, starting from the hardware installation to mobile app integration, are also detailed.
Mr. Jayant P. Sakurikar , Asst. Prof. Divyanshu Rao , Prof. Ravi Mohan
Design and Performance Analysis of LC Oscillator and VCO for ISM and WI-FI Band Applications
Mr. Jayant P. Sakurikar , Asst. Prof. Divyanshu Rao , Prof. Ravi Mohan
Wireless device portability and power efficiency are the two major challenges in modern device modelling. Voltage Controlled Oscillator (VCO) is one the most essential circuit used in wireless systems. From last decade, people want to be connected all the time using wireless communication devices. In addition, the demand for high bandwidth communication channels has exploded with the advent of the internet. Thanks to the high density available on integrated circuits, sophisticated digital modulation schemes can be employed to maximize the capacity of these channels. This has changed the design of wireless and wire line transceivers. We focus on the design of a critical sub-block: the voltage controlled oscillator (LC oscillator, VCO). We review the requirements for VCOs and evaluate the advantages and disadvantages of VCO. A new approach is proposed work is aimed to achieve the desired operating frequency, high stability. Power has become one of the most important paradigms for microprocessor & ASIC/SOC designs. Hence to have very low power consumption, this paper work is decided to implement using VLSI technology.
The Theory of Changes in Extreme Conditions The Properties and Trends of Changes and Movements The Theory of the Dynamic Structures
Yu Han
Because any physical and chemical effect must be caused by the theory of changes in extreme conditions.So the physics and chemistry are very complicated.There are selfcontradictions and nonSelfconsistents in physics、chemistry、physics and chemistry. The theory of the dynamic structures can solve the selfcontradictions and nonSelf- consistents. The various branches of the science which includes Classical mechanics, classical electromagnetic theory and classical statistical mechanics,Quantum Mechanics , relativity , string theory even the Chemistry,Medical and so on can be united by Energy Structure Theory and the theory of the dynamic structures②.
Performance analysis of Symmetric Key Algorithms: DES, AES and Blowfish for Image encryption and decryption
Aarti Devi , Ankush Sharma , Anamika Rangra
Cryptography is the one of the main categories of computer security that converts information from its normal form into an unreadable form. The two main characteristics that identify and differentiate one encryption algorithm from another are its ability to secure the protected data against attacks and its speed and efficiency in doing so [9]. The process of encoding plaintext message into cipher text messages is called as encryption. The reverse process of transforming cipher text message back to plaintext message is called as decryption.[3] This paper provides the comparison between three symmetric key cryptographic techniques namely as DES, AES and Blowfish algorithms in terms of time and security by using image simulation. The tool used for the present work is NetBeans IDE 7.4. It observed that Blowfish algorithms took least time for simulation of encryption and decryption.
Enhanced Vulnerability Analysis For Clickjacking Web Attack And Providing Security Using Whitelisting URL Analyzer
D.Kavitha, S.Ravikumar
— In recent years the security vulnerabilities continue to infect the web applications can cause vast security problems. The main idea is to implement a set of mechanisms in the browser that enforce a strict separation between different sources. This separation is achieved by preventing the interaction between pages that are from different origins, where the origin of a page is usually defined as a combination of the domain name, the application layer protocol, and the TCP port number. One of the techniques which we used to eliminate the unwanted bugs namely clickjacking. The idea behind a click jacking attack is simple: A malicious page is constructed such that it tricks users into clicking on an element of a different page that is only barely or not at all noticeable. Thus, the victim’s click causes unintentional actions in the context of a legitimate website. Clickjacking attacks have been reported to be usable in practice to trick users into initiating money transfers, clicking on banner ads that are part of an advertising click fraud, posting blog or forum messages, or, in general, to perform any action that can be triggered by a mouse click. Our solution can be adopted by security experts to automatically test a large number of websites for click jacking. The Proposed iframe tag checking algorithm and DNSlookup checking algorithm is based on regex. Regex handles both the internal and external fault efficiently and reduces the load time of iframe tag checking and DNSlookup using simple patterns of regex. Thus the proposed algorithm overcomes clickjacking attack efficiently than existing defenses. The vulnerability of the attack can be measured by the deviation of the system state with expected state. This deviation can be overcome by the security mechanism.
Improving SNR Of Radar Signal Using Wavelet De-Noising Scheme
B. Sudharani
The purpose of Radar signal processing is to extract the desired data from radar signals. The accuracy of data available from radar is limited by thermal noise introduced by the radar receiver, echoes from targets of no interest (known as clutter) and extremely generated interference. As a result radar signal processing is also used to enhance signals and to suppress clutter and externally generated signals. In this paper wavelet denoising is used to improve SNR.
Today Free-Space Optical communication (FSO)has overcome the radio frequency communication. This paper gives an overview of the availability of an FSO system and its different weather conditions. It describes problems that the designer faces while implementing an FSO system and to overcome that problems .Performance analysis of a system for different weather conditions is carried out. Calculation of attenuation due to fog by using KIM and KRUZE Model and other parameters such as received power, BER and Q factor are analyzed. FSO provides data rate upto 1 gbps . A laser diode at the transmittter side of 850nm and the PIN diode as a photodetector at the receiver side is used. It is possible to calculate visibility from the measured data which is the main factor for estimation the availability and reliability of FSO link . The system link is established using simulation software optisystem and system characteristics is studied.
Building an Interactive environs for Blind Students with RFID Technology.
Shekhar R , Suhas Dattatreya
This paper outlines an interactive-object recognition system for the blind students using the Radio-frequency identification (RFID). RFID appears as an effective solution for object identification. This paper also gives a overview of the Radio-frequency identification technology and identification. Using a low frequency Radio-frequency identification integrated indoor environment, a framework was created to assist the blind to interact and identify with their surroundings with audio messages. The framework created uses an Arduino- Atmega328 micro-controller interfaced with a Low Frequency Reader Module. The RFID reader recognizes objects carrying passive small tags through unique, distinct codes. The object code, name and other details are logged into a Processing Script integrated with Redis DB and audio librariesthrough Serial Communication. This system successfully identifies various objects irrespective of their shape, size and physical attributes.
Privacy Preserving Multi-Keyword Ranked Search Over Encrypted Cloud Data
Remya P.S Puliparambil, Selvi U
The advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to commercial public cloud for great flexibility and economic savings. But for protecting data privacy, sensitive data has to be encrypted before outsourcing, which obsoletes traditional data utilization based on plaintext keyword search. Thus, enabling an encrypted cloud data search service is of paramount importance. Considering the large number of data users and documents in cloud, it is crucial for the search service to allow multi-keyword query and provide result similarity ranking to meet the effective data retrieval need. Related works on searchable encryption focus on single keyword search or Boolean keyword search, and rarely differentiate the search results. In this paper, for the first time, we define and solve the challenging problem of privacy-preserving multi-keyword ranked search over encrypted cloud data (MRSE), and establish a set of strict privacy requirements for such a secure cloud data utilization system to become a reality. Among various multi-keyword semantics, we choose the efficient principle of “coordinate matching”, i.e., as many matches as possible, to capture the similarity between search query and data documents, and further use “inner product similarity” to quantitatively formalize such principle for similarity measurement. We first propose a basic MRSE scheme using secure inner product computation, and then significantly improve it to meet different privacy requirements .Thorough analysis investigating privacy and efficiency guarantees of proposed schemes is given, and experiments on the realworld dataset further show proposed schemes indeed introduce low overhead on computation and communication
Ms. Anju Aravind K , Dr. T. Senthil Prakash M.Phil, Ph.D , Mr. M. Rajesh M.E, (Ph.D)
Cloud Data Center's Resource Provisioning With Secured Mining In Distributed Mechanism
Ms. Anju Aravind K , Dr. T. Senthil Prakash M.Phil, Ph.D , Mr. M. Rajesh M.E, (Ph.D)
Data center have the largest consumption amounts of energy in power sharing. The public cloud workloads contain different priorities and performance requirements of various applications [4]. Cloud data center have capable of sensing an opportunity to present the different programs. The proposed construction and the security level of self-possessed privacy leakage rarely distributed cloud system to deal with the persistent characteristics there is a substantial increases and information that can be used to an enhance the profit, downsizing overhead or both. The mining process of data analysis from different perspectives and summarize it into useful information. Three demonstrable algorithms have been proposed task evaluate the ratios are dissected theoretically and compared using real Internet latency data recital of testing methods.
Ms. Geerthidevi K G, Dr. T. Senthil Prakash M.Phil., Ph.D, Ms. S. Tharani
Social Network Based Security Schema for Botnet Detection and prevention
Ms. Geerthidevi K G, Dr. T. Senthil Prakash M.Phil., Ph.D, Ms. S. Tharani
Generally, the botnet is one of the most dangerous threats in the network. It has number attackers in the network. The attacker consists of DDOS attack, remote attack, etc., Bots perform perform repetitive tasks automatically or on a schedule over the internet, tasks that would be too mundane or time-consuming for an actual person. But the botnets have stealthy behavior as they are very difficult to identify. These botnets have to be identified and the internet have to be protected. Also the the activity of botnets must be prevented to provide the users, a reliable service. The past of botnet detection has a transaction process which is not secure. A efficient stastical data classifier is required to train the botent preventions system. To provide the above features clustering based analysis is done. our approach can detect and profile various P2P applications rather than identifying a specific P2P application. Anomaly based detection technique is used to obtain this goal.
Implementing Actual Working Like Intuition Mechanism In Artificial Neural Network
Mr.Vivek B. Patil
One fascinating thing about artificial neural networks is that, they are mainly inspired by the human brain. This doesn't mean that Artificial Neural Networks are exact simulations of the biological neural networks inside our brain - because the actual working of human brain is still a mystery. The concept of artificial neural networks emerged in its present form our very limited understanding about our own brain ("I know that I know nothing").
Mrs. Suvarna L. kattimani, Mr. Jaeerahmad N. Indikar
Dynamic Trust and Security Management Protocol For Delay Tolerant Networks using Information centric-Networks Architecture
Mrs. Suvarna L. kattimani, Mr. Jaeerahmad N. Indikar
Trust management in mobile wireless network is always been challenging because of frequently changing network environment. This will cause delay tolerance networks (DTN) a high latency, frequent disconnection over unreliable wireless links. To avoid these anomalies we proposed Dynamic Trust and Security Management Protocol (DTSMP).In the current Internet architecture (IP-based architecture), data are treated as network elements as a series of bytes that have to be transferred from a specific source to a specific destination. But the network elements have no knowledge of the information they transfer a, hence cannot realize optimizations that would be possible (e.g., information replication at various points, information-aware traffic engineering, smart in-network caching). To overcome these issues we use the Information Centric-Networks (ICN) architecture for our proposed DTSM protocol. We design and validate the Dynamic Trust and Security Management protocol for delay tolerant networks (DTN) for better optimized secure routing in DTN environment; this includes well-behaved, selfish and malicious nodes. Proposed work is analyzed and validated via extensive simulation. Our protocol determine and apply the best optimized operational setting at the runtime in response to dynamically changing network environment, by will minimize the trust bias and maximize the routing performance. We do comparative analysis with other trust protocols like Bayesian trust-based protocol, DTSM protocol (proposed) with IP-based architecture and DTSMP protocol (with ICN architecture). The results demonstrate that DTSM protocol is able to deal with selfish behavior, malicious, and unreliable nodes. It also shows that our DTSM protocol work efficiently on INC architecture which improve the performance of our protocol. Furthermore proposed protocol can deal effectively with message overhead and message delay which will increase the significant gain in delivery ratio.
An Efficient Approach for Relevance Feedback in CBIR using Navigation Patterns
Prof. R.D.Salagar , Miss.Sneha.M. Pattanshetti
Content Based Image Retrieval (CBIR) is a traditional and developing trend in Digital Image Processing. Relevance feedback (RF) is a technique used in collecting relevant information from the user. Content-based Image Retrieval (CBIR) using Relevance Feedback systems generates image based on image features and store in database and compare input query image feature with the features stored in database. To get good results, relevance feedback techniques were incorporated into CBIR so we can achieve better performance by taking users feedback. CBIR is used combine low level features and high level semantics according to need of the user. In this work, we are using two type of methods like SVM (support vector machine) and NPRF (navigation-pattern based relevance feedback). SVM classifier is used to differentiate between relevant and irrelevant images by using low level features like color, shape, texture features. By applying SVM we may reduce the size of query search in the data base and we may apply NPRF algorithm. The NPRF uses the discovered navigation pattern and three query refinement concepts viz Query Point Movement (QPM), Query Reweighting (QR), and Query Expansion (QEX), to provide a better search towards user. SVM based navigation pattern provide good quality of image retrieval in less number of feedback.
Image Watermarking Based On DWT, DCT and SVD Techniques
Prof. R. D. Salagar , Miss. Akshata S. Kamatagi
Digital watermarking is a technique used for the information of the images that provides security for the confidentiality. The repetitions of the multimedia objects (i.e. audio, video, text, etc.) have been protected by some of the developed digital watermarking techniques. In this paper, we propose discrete wavelet transform (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) to protect duplication of digital media efficiently and used for digital watermarking images. SVD is applied to the approximate and the vertical coefficient of wavelet transform improves image protection in terms of PSNR and MSE between original and watermarked images. Experimental results show that the proposed algorithm give good imperceptibility for images and provides a watermarked images with good quality.
: The purpose of this paper is to establish effective implementation of the WBS in projects. A case study of a hotel project is undertaken and analyzed for its WBS effectiveness and ways to lessen creep, uncertainty, risk and delays. This paper attempts to identify the use of deliverable oriented WBS for effective implementation. The research through the case study attempts to establish that WBS is not just a planning technique but a better control tool. It is also attempted to remove a common misconception that WBS is need for the contractor and client requires no active participation. The research attempts to identify various challenges associated with developing a quality WBS and suggest a methodology that can help practicing professionals in overcoming challenges and establish better control mechanisms in executing projects.
Study on Mining Weighted Infrequent Itemsets Using FP Growth
K.Hemanthakumar , J.Nagamuneiah
In Information mining and Knowledge discovery Techniques area, frequent pattern having important role, Frequent patterns are patterns that come out in data set recurrently. Itemsets that occur frequent are patterns or items like Itemsets, substructure, or subsequences. Frequent weighted Itemset characterize associations frequently holding in information in which items may weight contrarily. Still, in some contexts, e.g., when the need is to minimize a certain cost function, determining infrequent information associations is more curious than mining frequent ones. This paper tackles the issue of determining infrequent and weighted Itemsets, i.e. Infrequent weighted item set determine item sets whose frequency of occurrence in the analyzed data is less than or equal to a maximum threshold. To determine infrequent weighted item set, two algorithms are naked infrequent weighted item set (IWI) and Minimal infrequent item set (MIWI). In this study is motivated on the infrequent weighted item sets, as of transactional weighted data sets to address IWI support quantity is defined as a weighted frequency of occurrence of an item set in the examined data. Occurrence weights resulting from the weights related with items in each transaction and applying a given cost function.
Activities Log In Enterprise Social Network- A Review
Rajesh V N, Bharath T S M , M Siddappa
A Social network is a Social structure made up of a set of social actors (such as individuals or organizations) and a set of dyadic ties between these actors. Like their public counterpart such as Face book and twitter, enterprise social network are poised to revolutionize how people interact in the work place. Enterprise social networking focuses on the use of online social network or social relations among people who share business interests and/or activities. Collaboration is so common in today’s society. It is proven powerful for solving problems, building consensus, and helping decision making processes. An activity log is written record of how you spend your time. Activity log will also help you understand whether or not you are doing your most important work during the right time of your day.
An Introduction of Cloud Computing Security and Privacy Issues in IT Industries
Varuna Upadhyay, Dr. Ashok Jain
Cloud Computing is a model that focuses on sharing data and computation over a scalable network. This technology has grown as promising business concept to one of the fastest growing segment of the IT industry. However, the fact that Cloud Computing offers huge opportunity to IT industry. Despite the potential gains achieved from the Cloud Computing in the organizations which are slow in accepting it due to security and privacy issues associated with it. The other aspect of Cloud Computing is that, the cost oriented IT companies are now realizing that simply by processing into the cloud they can gain fast access business applications and share their infrastructure resources at negligible cost. Regardless of the fact that cloud computing offers great advantages to the end users in which several issues that are mandatory to be addressed. It is one of the major issues which hinder the growth of cloud technology.
Simulation and Analysis of Ad-hoc routing protocols under varying density and mobility in VANET
Rashmi Choudhury , Vaskar Deka
Vehicular Network is a recently developed technology which will be very beneficial for reducing the roadside accidents which are caused due to the rapid increase in number of vehicles on the road. VANET is an ad hoc network where vehicles act as the communicating nodes. Communication among the vehicles and with roadside unit helps in maintaining coordination which ensures control of traffic congestion on roads which in turn reduces environmental pollution. For the proper implementation of the Vehicular Network, the most important aspect is efficient routing of packets in the network and hence a careful study is required to choose the best routing protocol. In this paper, a performance analysis of both proactive (DSDV) and reactive (AODV) protocol is carried out for different parameters like throughput, net routing load and end to end delay to compare their performance in different scenarios. Finally the pros and cons associated with each protocol are detected and a new approach is proposed which aims to solve the problems associated with routing
In modern sciences and technologies, images gain much broader scopes due to the ever growing importance of scientific visualization. The search for similar images in large-scale image databases has been an active research area in the last couple of years. A very promising approach is content based image retrieval (CBIR). Content-Based Image Retrieval (CBIR) is a technique that uses image visual features such as color, texture, shape etc. to retrieve the images from set of large image database according to user’s request which is in the form of query image. The combination of Color and Texture information have been the most important property of any image and provides robust feature set for image retrieval. The information gained by feature extraction is used to measure the similarity between two images. For the comparison of query image and the database image, similarity measures such as Euclidean Distance, Jeffrey Divergence, color histogram matching etc. are used. In this paper, we have used the enhanced entropy feature which works best for textures with small variances and thus improving retrieval results from existing entropies.
Ant Colony Optimization (ACO) studies artificial systems that take inspiration from the behavior of real ant colonies and which are used to solve discrete optimization problems. Ants don’t use vision as they are Almost blind. Shortest path is discovered via pheromone trails, which is the chemical left on the ground which is use as a signal for other ants. More pheromone on path increases probability of path being followed. When ants want to reach to the food from home they wander randomly through different paths and when any one ant finds a short path from colony to food source, other ants are more likely to follow that short path, and such positive feedback eventually leaves all ants following same path. They are Incapable of achieving complex tasks alone and rely on the phenomena of swarm intelligence for survival. ACO originally applied to Traveling Salesman Problem and Applied later to various hard optimization problems and also use for Solving NP-hard combinatorial problems.
Multiparty Access Control and Content Based Filtering for Online Social Networks
J.Sinduja, R.China Appala Naidu
Today the social network is that the most significant space to the users to connect with every other .it provides a lot of facility to the users and conjointly a lot of drawbacks for users. it's seen tremendous growth in on-line in recent years in social networks. These OSNs aren't solely engaging for data sharing and virtual social interactions, however jointly raise privacy problems and variety of security. though OSNs enable one user to get access the information, they presently don't give any mechanism to enforce privacy issues over information data multiple users. The remaining privacy violations for the most part unresolved and resulting in the potential revealing of knowledge, that at least one user supposed to stay non-public. during this paper, propose AN approach to change cooperative privacy management of shared information in OSNs. specifically, give a scientific mechanism to spot and resolve privacy conflicts for cooperative data sharing. The conflict resolution indicates a trade-off between privacy protection and information sharing by quantifying privacy risk and sharing loss. And conjointly mentioned a proof-of-concept prototype implementation of approach as a region of an application in Face book and supply system analysis and value study of our methodology.
With the rapid growth of digital media, it is becoming more prevalent to find a method to protect the security of that media like images. An effective method for securely transmitting images is Visual Cryptography. The first algorithm in the field of Visual Cryptography was proposed in 1994 by Naor and Shamir. After this many method has develop in the field of Visual Cryptography Information. In this paper we have proposed new method for securing image. For this we have use Net Beans IDE 7. This method provides good security for image by using simple (2, 2) secret sharing scheme
Although internet seems to be the ocean of information which provides almost anything we want but abstracting the specified set of high quality data from internet becomes impossible in 99% cases.In most of the cases the user has to get satisfied with the surface web which constitutes only 1% of the total data available. Many a times user gets information only from static sites while most of the data available on net are stored in dyanamically generated sites which stands in complete contrast with the static sites both qualitatively and quantitatively. To help the user overcome such difficulties “ THE HIDDEN WEB CRAWLERS”stands as a great source . The deep Web sources store their content in searchable databases that only produce results dynamically in response to a direct request in response to which a hidden web crawler starts the process of making dozens of direct queries simultaneously , using multiple-thread technology and thus is capable of identifying, retrieving, , classifying, and organizing "deep" content. This paper highlights the comparison between surface web and hidden web, basic working principles, components, importance and future scope of this indespensible tool i.e Hidden Web Crawler.
With the advent of service computing and cloud computing, more and more services are emerging on the Internet, generating huge volume of data. The overwhelming service-generated data become too large and complex to be effectively processed by traditional approaches. How to store, manage, and create values from the service-oriented big data become an important research problem. On the other hand, with the increasingly large amount of data, a single infrastructure which provides common functionality for managing and analyzing different types of service-generated big data is urgently required.
Anatomization of Medical Image Segmentation with Novel Proposal
Nagaraja G, G.Pradeep Reddy
In this article we introduce a novel variational model for two-phase segmentation tasks, which is related to the popular ChanVese(CV) segmentation model[4]. In particular, the proposed model is based on a discriminant analysis of the given data. Level set methods are used to realize this approach is numerically. We start by applying CV model on medical ultrasound data perturbed by multiplicative speckle noise. The respective observations are noted i.e. Section1. Subsequently, discriminant analysis based segmentation model is applied i.e. in Section2.Finally, we validate the methods on real patient data from echocardiographic examinations in Section3.
Review of model based approach for automating the test case generation for Object Oriented Systems.
Rajvir Singh , Preeti
Testing plays an important part in software development process to ensure the quality and reliability of the developed product. For Object-oriented systems, model based testing has recently become very popular. This approach uses models representing system behavior to generate the test cases. In this paper, we would focus on the work done by various researchers in the field of model based testing approach. We would review the recent trends and different model-based approaches that have been proposed by different researchers. Finally, we would describe what are the present challenges and what work needs to be done in near future in this area.
Rain Removal from Video is a challenging problem and has been recently investigated extensively. In this paper, we propose a single-image-based rain removal framework via properly formulating rain removal as an image decomposition problem based on morphological component analysis (MCA). Instead of directly applying conventional image decomposition technique, we first decompose an image into the low-frequency and high-frequency parts using a bilateral filter. The highfrequency part is then decomposed into “rain component” and “non-rain component” by performing dictionary learning and sparse coding. As a result, the rain component can be successfully removed from the image while preserving most original image details. Experimental results demonstrate the efficacy of the proposed algorithm. Rain introduces sharp intensity variations in images, which degrade the quality or performance of outdoor vision systems. These intensity variations depend on various factors, such as the brightness of the scene, the properties of rain, and the camera parameters. The detection and removal of rain streaks in an image is done by image decomposition which depends on Morphological Component Analysis (MCA) by performing dictionary learning and sparse coding.
Extended Approach of Visual Secret Sharing for Digital Images
Khemutai Tighare , Chetan Bawankar
In visual secret sharing (VSS) secret image is encrypted in shares, with each participant involved in technique holding one or more shares, all the shares are required to reveal any information. The shares may appear as noise like pictures and will arouse suspicion and increase interception risk during transmission. Thus VSS scheme suffer from a transmission risk. With increasing number of shares, it becomes more difficult to manage the share. The proposed scheme shared secret image by generating only two noise-like color shares using natural image. These noise-like color shares are hided in two cover images to increase the security level
H.T. Rathod * , K.V.Vijayakumar , A. S. Hariprasad , K. Sugantha Devi C.S.Nagabhushana
A New Approach to Automatic Generation of All Quadrilateral Finite Element Mesh for Planar Multiply Connected Regions
H.T. Rathod * , K.V.Vijayakumar , A. S. Hariprasad , K. Sugantha Devi C.S.Nagabhushana
A new approach for the automatic generation and refinement of finite element meshes over multiply connected planar regions has been developed. This paper represents continuation of authors research activities in that area. An algorithm for producing a triangular mesh in a convex polygon is presented in authors recent work. It is used for the finite element triangulation of a complex polygonal region of the plane decomposed into convex polygons. We decompose the convex polygonal regions into simple sub regions in the shape of triangles. These simple regions are then triangulated to generate a fine mesh of triangular elements. We then propose an automatic triangular to quadrilateral conversion scheme.In this scheme, each isolated triangle is split into three quadrilaterals according to the usual scheme, adding three vertices in the middle of the edges and a vertex a the barycentre of the element. To preserve the mesh conformity, a similar procedure is also applied to every triangle of the domain to fully discretize the given complex polygonal domain into all quadrilaterals, thus propagating uniform refinement. This simple method generates a mesh whose elements confirm well to the requested shape by refining the problem domain. We have modified these algorithms and demonstrated their use by generating high quality meshes for some typical multiply connected regions: square domains with regular polygonal holes inside and vice versa. We have also made improvements and modifications to to the above triangulation algorithm of the triangle which can now triangulate a trapezium cut out of a triangle. This new algorithm on the triangulation of a trapezium cut out of a triangle is applied to quadrangulate the planar regions in the shape of a circular annulus and square domain with a square hole inside. We have appended MATLAB programs which incorporate the mesh generation schemes developed in this paper. These programs provide valuable output on the nodal coordinates, element connectivity and graphic display of the all quadrilateral mesh for application to finite element analysis.
Generating Private Recommendations Using ElGamal Homomorphic Encryption
Patil Maulik Y , Manjusha Yeola
In E-commerce, Recommender systems have become an important tool since it is used to personalize the online services and products. Users are concerned about the privacy as personal information can be misused easily. Privacy-sensitive data plays an important role in generating recommendations in online services. Conventional data protection mechanisms provide security only against malicious third parties, as their focus is on access control and secure transmission, but it does not secure by service provider. This creates a major privacy risk for the users. In this paper, we aim to protect the private data from the service provider with functionality of the system is preserved; Private data is encrypted and processed under encryption to generate recommendations. This mechanism becomes highly efficient system by introducing a semi trusted third party, so that system does not require the active participation of user. We have proposed a homomorphic encryption using ElGamal cryptosystem as it is faster, requires considerable less time to decrypt and easier to do distributed key generation. We also aim one comparison protocol, for the comparison of multiple values that are packed in one encryption. According to this work, system can generate private recommendations in privacy preserving manner.
The proposed work presents a competent diagnosis technique in classifying benign and malignant breast cancer cases using Genetic Algorithm. The breast cancer dataset (Wisconsin Breast Cancer (WBC)) was taken fromUCI Machine Learning Repository, center for machine learning and intelligence systems. Using the proposed Genetic algorithmbased on 3-fold cross validation method, and executing on multiple rules, we obtained preeminent classification accuracy of 97.7% which classified more accurately when compared with the other existing systems. The experimental outcomesillustrate that the categorization using genetic algorithm is loftier to the other classifiers which used WBC dataset. All experiments are carried out on MATLAB.
Akobundu, Chinyere Ihuoma, Dr. Mrs. Agu, M. N., Nnakwuzie, Doris Nkechi
Development Of Mobile Payment System: An Implementation Of Cashless Economy
Akobundu, Chinyere Ihuoma, Dr. Mrs. Agu, M. N., Nnakwuzie, Doris Nkechi
This work presents the development of a mobile payment system which implements cashless economy using Nigeria as a case study. The main aim of this development is to reduce some cash-related crimes in our society such as: robberies, the risk of losing cash in the case of fire and flooding incidents, inefficiency and corruption associated with cash usage like leakages, money laundering, amongst other cashrelated fraudulent activities. The mobile payment system developed produces services operated under financial regulation and performed from or via a mobile device. With the use of this mobile payment system, instead of paying with cash or check, a consumer can use a mobile phone to pay for a wide range of services, digital or hard goods. This payment system is a service system where the consumer sends a payment request via an SMS text message to a customized code, the system evaluates the request with regards to financial regulations and either accepts the request and carries out the financial transaction or rejects the request by sending an SMS back to the consumer that sent the request. AT commands for VB.Net programming language is the tool used in the development of this mobile payment system with MySQL as the database.
Query Recommendation Approach For Searching Database Using Search Engine
Priyanka Rani, Mrs. Annu Mor
Search Engines generally provide long lists of ranked pages, finding the desired information content from which is typical on the user end and therefore, Search Result Optimization techniques come into play. The proposed system based on learning from query logs predicts user information needs and reduces the seek time of the user within the search result list. To achieve this, the method first mines the logs using a similarity function to perform query clustering and then discovers the sequential order of clicked URLs in each cluster . Finally, search result list is optimized by re-ranking the pages. The proposed system proves to be efficient as the user desired relevant pages occupy their places earlier in the result list and thus reducing the search space. This thesis also presents a query recommendation scheme towards better information retrieval.
A Markov process is a stochastic process in which the probability distribution of the current state is conditionally independent of the path of past states, a characteristic called the Markov property. Markov chain is a discrete-time stochastic process with the Markov property. In this paper we have to use the Markov model for the prediction of the different web pages based on the sequence of previously accessed page
Glucometer is device used by diabetics to measure blood glucose levels. Blood glucose testing is an important part of controlling blood glucose. One important goal of diabetes treatment is to keep the blood glucose levels near the normal range of 70 to 120 mg/dl before meals and under 140 mg/dl one to two hours after meal. Smart diabater is bluetooth enable hardware and it sends glucometer data to mobile application for data management and analysis. This can help to make an effective diabetes management program. Smart phone application shows data in graphical format. Each test result plotted along the time axis according to the time when the test is performed. Also it shows normal glucose level. On the basis of lunch and dinner time it distinguish glucose readings, it calculate average of pre-prandial reading and post- prandial reading average and glucose profile. According to difference between changes in glucose levels it suggests food list.
SCORM/AICC Compliance in Learning Management System and e-Learning: A Survey
R.Sivakami, G.Anna Poorani
Learning Management System (LMS) is a software application for administration, delivering, tracking and reporting on elearning (electronic learning) courses to various organizations, educational institutes, and online websites. LMS launches e-learning courseware and deliver it with flexibility. LMS balances between functionality and ease of use. LMS provides the user with simple and modern user interface. Most organization uses different LMS for launching new training courseware to their employee from a central server and it is easy to track the employee understanding of the course at the end of the training by an online assessments. LMS uses AICC and SCORM standards for tracking the e-learning courses. The standards depend on the development of the course ware. In this paper, the detailed survey about the AICC and SCORM used in LMS are discussed.
Electronic Products and E-Waste Management –an approach to minimize & Regulate e-Waste in country, India.
Aditya Sharma*, M.Sharmac , A Sudhakar
Big industries approach towards producing a newer product each time dismissing the earlier product as discarded is basically a wrong concept. Instead, they should ensure utility of earlier products with minor modifications to keep the earlier products viable; thus avoiding the e-waste generation. To be more explicit today in market all older Personal Computers are treated as waste. Perhaps R&D could have created some solutions to make them compatible with recent models with minor modifications, alteration, or through modular approach. Humankind has to learn that reusability is an essential part of living. Approach of western world to use and throw has been in conflict with the same that has resulted into mountains of wastes everywhere, particularly in third world countries. Reutilization of electronic products should be encouraged, which had been practiced earlier by elders. The industries generating these products must look the product life cycle starting from its creation till its disposal. The calculation of products cost should be done with a view of products life cycle. Reutilization is very vital concept and need to be implemented in electronic waste specially to reduce load of this type of garbage on earth.
Introduction of Hadamard Coded Modulation For Optical fiber communications systems
Yashwant Kumar
- Orthogonal Frequency Division Multiplexing (OFDM) is considered to be a promising technique against the multipath fading channel for wireless communications. OFDM is a multiplexing technique that is useful in wireless transmission of data. OFDM system is use for high speed applications. The OFDM-related technique has been invented over 40 years ago, but it has gone through many advancements over the years . OFDM for wireless communications has intensively been an active research area in the past 10 years. Hadamard transform modulation is also one of the latest approach for modifications in the OFDM to bring some advantage to it. Due to its various advantages, the HCM can be used in optical fibre applications,Radio Over fiber is one of it. In this paper, HCM and its use in OFDM has been discussed for the application of Rof.
Medical image fusion is the procedure of enlisting and joining various images from single or different imaging modalities to enhance the imaging quality and lessen irregularity and repetition with a specific end goal to expand the clinical appropriateness of medicinal images for analysis and appraisal of restorative issues. Multi-modular medical image fusion calculations and gadgets have demonstrated remarkable accomplishments in enhancing clinical exactness of choices in view of restorative images. This audit article gives an accurate posting of techniques and compresses the wide experimental difficulties confronted in the field of restorative image fusion. We describe the medical image fusion exploration in light of (1) the generally utilized image fusion routines, (2) imaging modalities, and (3) imaging of organs that are under study. This survey reasons that despite the fact that there exists a few open finished mechanical and experimental difficulties, the fusion of restorative images has ended up being valuable for propelling the clinical dependability of utilizing medical imaging for medicinal diagnostics and investigation, and is an exploratory order that can possibly fundamentally develop in the impending years.
Survey On Automatic Cancer Detection And Diagnosis
Anjali Vijayan , Seena Thomas
Cancer is the leading cause of death for all over the world. In case of cancer diagnosis the classification of cancerous tissue has an important role. This is a survey on automatic cancer detection techniques. Since the cause of the disease remains unknown, early detection and diagnosis is the key for cancer control, and it can increase the success of treatment, save lives and reduce cost. Many automated systems have been implemented to aid histopathologists and clinicians in cancer diagnosis and research, which have been attempted to significantly reduce the labor and subjectivity of traditional manual intervention with histology images. Generally, a automatic system consist of four stages: preprocessing, segmentation, feature extraction and selection, and classification. In this paper, the approaches used in these stages are summarized.
Novel Technique for Parallel Pipeline Double Precision IEEE-754 Floating Point Adder
Shrikant Fulzele , Prof. Venkat Ghodke
The Floating Point Additions are critical to implement on FPGAs due to their complexity of their algorithms in hard real-time due to excessive computational burden associated with repeated calculations with high precision numbers. Thus, many scientific problems requires floating point arithmetic with high level of accuracy in their calculations. Moreover, at the hardware level, any basic addition or subtraction circuit has to incorporate the alignment of the significands. This Paper represents Novel technique for implementation of parallel pipeline Double precision IEEE-754 floating point adder that can complete a operation in two clock cycle. This kind of technique can be very useful for parallelism of FPGA device and this proposed technique can exhibits improvement in latency and also in operational chip area management. The proposed double precision floating point adder has been implemented with XC2V6000 and XC3SI500 Xilinx FPGA Device.
A Survey On Routing Issues And Routing Protocols In Wireless Sensor Networks
Anbumalar.S , Prabhadevi.S
Wireless Sensor Networks (WSN) has many applications like disaster relief operations, biodiversity mapping, medicine and health care. Recent researches show that many routing protocols are being developed that prolong the network lifetime and reduces energy consumption. Although there are many challenges in WSN only some are addressed. The main challenges to be addressed are energy consumption, Quality of Service (QoS), power management and network lifetime enhancement. To overcome these issues many efficient and effective routing protocols should be used. This paper surveys the routing design issues and routing protocols in WSNs.
Comparative Scenario between Grid and Grid based Cluster network in Wireless Sensor Network
Honey Soni, Himanshu Soni
- Wireless Sensor Network composed of a set of tiny sensor nodes. The nodes are continuously sense and transmit the data. WSN have a wireless nature, due to this has a limited lifetime. So increase the lifetime of Wireless Sensor Network and Minimize energy cost in wireless sensor network are an important problem. To solve this problem different technique are always used, among the entire technique grid network and grid based clustering network are more efficient. In this paper we compare A Grid network with Grid based cluster network to provide a comparison results based on less energy consumption. We are working on QualNet tools to simulate the scenarios.
A Review on Location Aided Routing Protocol in Mobile Adhoc Networks
Arwinder Kaur , Meenakshi Bansal
Ad hoc networks are the decentralized network consisting of randomly moving nodes. One of the main tasks in these networks is routing of data packets. Many protocols have been proposed for routing of data packets among these nodes. Our goal is to explore the working and analyze the various aspects and parameters of position based LAR protocol. This protocol suggests an approach to utilize the location information for routing purpose. This approach is beneficial in reducing the search area and limits flooding as well as increases the throughput. Existing systems work on the idea of single source and single destination system but our focus is mainly on developing a system having single source and multipoint destination. This makes a significant impact on the throughput as well as end to end delay.
A Hybrid Approach to Social Context Based Scalable Recommender System
M. Jothi , B. Chandra
Social networking sites produce an exponential amount of information and it is necessary to incorporate scalable recommender systems. In Existing Recommendation Techniques, Social Relationship Information has not been fully used. It is hard to find the contextual factors and integrate them into efficient recommendation framework. In addition to that, Prediction qualities are the most important challenges. This paper analyses this recommendation problem on the basis of psychology of the person and social relation among the persons, that exhibit two factors – User’s Preference and Relationship Influence. It proposes Hybrid Filtering Approach to incorporate user’s preference and relationship influence. This paper uses the priority based ranking algorithm to improve accuracy of social recommendation.
A Review on various techniques of hiding Association rules in Privacy Preservation Data Mining
Kenampreet Kaur , Meenakshi Bansal
Data mining is the useful technology to extract information or knowledge from large database. However, misuse of this technology may lead to the disclosure of sensitive information. Privacy preserving data mining (PPDM) is new research direction for disclosure of sensitive knowledge. There are many techniques used in PPDM to hide association rules and generated by association rule generation algorithms. Association rule hiding is the method of modifying original database to make the sensitive rules disappear. The Security and Privacy of the data are main challenging issues. The owner of the data has some private information like association rule contained old database. However the integrity of mining results can affects gravely in case of unreliable administration supplier.
Recognition Text for Liver Cell Lab Reports Based on Hybrid HMM Approach
K.Lokanayaki , Dr.A.Malathi
A Form-based Optical Word Recognition (OWR) System for printed forms includes functional mechanism for extract word from image and word image recognition. The recognizer is a very important component of the OWR system. Automatic recognition for printed images is a complex task. In this paper we discuss the form image recognition technique and improved field matching techniques implemented in our system. These effective techniques help in preparing the input word image for the Hidden Markov Model (HMM) based recognizer and Partial Matching (PM) algorithms for improving overall recognize matching accuracy. Although these algorithms have been implemented with Liver Cell reports in our OWR.
Improved Dominant Brightness Level Based Color Image Enhancemrnt Using Bilateral Filter
Geetika Mahajan Prof. Aman Arora
Image enhancement plays a significant role in vision applications. It is used to improve the overall quality of the degraded images. Recently much work has been done in the field of remote sensing images enhancement. Many techniques were proposed so far for enhancing the remote sensing images. It has been found that the most of the existing techniques were based upon the transform domain methods; which may introduce the color artifacts and also may reduce the intensity of the input remote sensing image. To overcome this problem, a new integrated approach has been proposed which have the capability to enhance the contrast in remote sensing images in efficient manner by using the dominant brightness level analysis and gamma correction. The selection of the gamma correction seems to be justifiable as it has the ability to overcome the problem of reduction in illuminate of the existing methods. However to handle the short coming of transform domain method, bilateral filter has also been used to reduce the color artifacts. The algorithm has been designed and implanted in MATLAB using image processing toolbox. Comparative analysis has shown that proposed algorithm performs better as compared to existing techniques.
Congestion Control Load Balancing Scheme Intended for Improving Performance of MANET
Smita Verma , Deepanjali Joshi Ravi Singh Pippal
—the availability bandwidth in MANET is fixed, that is creating the problem of bottleneck and the load in network is increased. In MANET if the congestion is occur then the performance of network is gradually decreased according to time. In this research we proposed the new congestion control load balancing technique with varying the buffer size of queue in dynamic network with reliable multipath AOMDV protocol. The multipath routing protocol AOMDV is also balance the load by providing alternative path but not capable at all situation. The AOMDV is provides the multiple path for data sending, if the one is fail and the varying queue length is handled the data packets that cross the decided queue maximum. The queue is incremented and the storing and forwarding capability of nodes is also improved. The proposed load balancing proposal is proficiently handled the load on the network. If the node being a component of communication is moves out of range then the AOMDV is reduced the overhead and re-establishment of connection in between sender and receiver. The proposed method is increase the routing capability of AOMDV protocol. The achievement of AOMDV and proposed varying queue is evaluated through performance metrics and observe the performance of proposed scheme is better.
Vision Assisted Web structure and Data Extraction Methods
Kumud Jaglan , Dr. Kulvinder Singh
Web page segmentation has been done to address the problems in different fields including mobile web, archiving, phishing, etc. In this paper, different algorithms are summarized that web page segmentation addresses in different fields .Web page segmentation has myriad applications like information retrieval, page type classification etc. . This paper presents a survey of web page segmentation algorithms including DOM Tree, VIPS and SD Tree algorithms. VIPS approach is independent of underlying HTML representation and works well even when layout structure is different from the HTML structure. As there is difficulty in finding the meaningful blocks existing approaches presented can extract informative parts from web pages by creating meaningful blocks and segmenting noisy WebPages.