Hybrid Approach for Location Based Customized POI Travel Recommendation System
Ashwini R,
v
a new method to identify navigation- related Web usability problems based on correlating Actual and Predictable usage patterns. The actual usage patterns can be extracted from Web server logs routinely recorded for operational websites by first processing the log data to identify users, user sessions, and user task-oriented transactions, and then applying an usage mining algorithm to discover patterns among actual usage paths. The anticipated usage, including information about both the path and time required for user-oriented tasks, is captured by our ideal user interactive path models constructed by cognitive ex- perts based on their cognition of user behavior. The comparison is performed via the mechanism of test oracle for checking results and identifying user navigation difficulties. The deviation data produced from this comparison can help us discover usability issues and suggest corrective actions to improve usability. A software tool was developed to automate a significant part of the activities involved. With an experiment on a small service-oriented website, we identified usability problems, which were cross-validated by do- main experts, and quantified usability improvement by the higher task success rate and lower time and effort for given tasks after suggested corrections were implemented.
In recent years with the development of network data collection and storage technology, the usage and sharing of large amounts of data has become easy process. Once the data and information is accumulated, its will become the wealth of information. Data mining, otherwise known as knowledge discovery, can extracted meaningful information from the large amounts of data because it supports people’s decision- making. However the traditional data mining techniques and algorithms directly operated on the original data set, which will cause the leakage of privacy data, these problems challenge the traditional data mining, so privacy-preserving data mining (PPDM) it has become one of the most newest trends in the privacy, security and data mining research. Existing cryptography is the based work for privacy-preserving data mining and is still too slow to be effective for the large scale. But proposed approach is based on exploit for fact that RDTs can naturally it fit into the parallel and fully distributed architecture.
The rapidly growing energy consumption has raised concerns over exhaustion of energy resources and its impacts on the environment. The global contribution towards energy consumption of the developed countries including residential and industrial sector has steadily increased from 20% to 40%. For this reason, it is of utmost importance to manage and monitor the energy consumption and making it cost efficient for small and large scale industries, as industrial sector contributing the higher rate of energy consumptions. Therefore, the system is proposed to remotely manage and monitor the Energy utilization considering various parameters and generating the reports, log data for analytics. Thus, reducing fault logs providing live alerts by real time monitoring with a better performance and efficiency, finally reducing the cost. The approach is to ensure a robust system on aspects such as measure, store and report via high quality components and redundancies in the system design.
Adaption of Cloud Computing On Smart Phones To Enable Efficient Multimedia Applications
Dr. A.Samydurai, K.Priyadharshini
The survey says that the desktop users are shifting their usage to mobile/Tablet for the past 8 years. The mobile networks are doing their work to enhance their speed from 2G to LTE networks. The speed of packet delivery to the mobile network increases, leads to the increasing usage of mobile phones. In CMM applications, the cloud providers are facing the challenges in the cost factors. This issue causes the need to change something of videos on the user mobile; we propose to work on two factors. One, to make the video stored in the RAN cache through UPP caching. Second to adapt the bit rate of the user mobile by Adaptive Transmission of Bit Rate . By using this two factors, the Quality of User Experiencing a video is increasing and the cost factors are also reduced as per the cloud provider and the mobile user expectation.
Review on Secure Routing in Wireless Adhoc Networks
Ugendhar Addagatla1, Dr. V. Janaki2
Adhoc network, because of dynamic behavior, self sustaining approach, and non-reliability of infrastructure has made this network a major communication approach for future usage. These networks are benefited by adaptive node integration and dynamic routing for data exchange. Adaptive routings has high significance of data exchange, with adaptive network performances such as high throughput, low power dissipation, less interference, and long lasting networks. However with the advantage of having dynamic routing behavior in adhoc network, optimal routing and its selection remains an open issue to solve. To achieve the objective of optimal routing based on node characteristic and network property, various methods were developed in past. This paper, outlines the methods developed towards secure routing for robust and reliable routing in wireless adhoc network.
Health Care Virtual Environment System Reinforced by Hadoop and Cloud
Vidyashree S K .
The advances in information technology have wit- nessed great progress on healthcare technologies in various do- mains nowadays. However, these new technologies have also made healthcare data not only much bigger but also much more difficult to handle and process. Moreover, because the data are created from a variety of devices within a short time span, the character- istics of these data are that they are stored in different formats and created quickly, which can, to a large extent, be regarded as a big data problem. To provide a more convenient service and environment of healthcare, this paper proposes a cyber-physical system for patient-centric healthcare applications and services, called Health-CPS, built on cloud and big data analytics technolo- gies. This system consists of a data collection layer with a unified standard, a data management layer for distributed storage and parallel computing, and a data-oriented service layer. The results of this study show that the technologies of cloud and big data can be used to enhance the performance of the healthcare system so that humans can then enjoy various smart healthcare applications and services.
Data mining environment creates a lot of information, that should be investigated, examples must be removed from that to pick up learning. In this new period with blast of information both organized and unstructured, in the field of genomics, meteorology, science, ecological examination and numerous others, it has gotten to be hard to process, oversee and break down examples utilizing customary databases and architectures. Thus, a legitimate structural engineering ought to be comprehended to pick up information about the Big Data.This paper presents a review of various algorithms from necessary for handling such large data set. These algorithms define various structures and methods implemented to handle Big Data, also in the paper are listed various tool that were developed for analyzing them.
This paper presents a concept of an extended iBeacon system for proximity target marketing. iBeacon is a proximal wireless notification service proposed by Apple, Inc. This service uses beacon modules emitting radio waves based on Bluetooth Low Energy technology and provides automatic triggering of a single notification from a beacon module to multiple smart phones at proximity. In usual iBeacon systems, there is one-to-one correspondence between notification and beacon module. However, if we introduce a memory to remember the history of iBeacon detection, iBeacon systems can be extended to handle multiple notifications by multiple beacon
modules with awareness of some contexts of pedestrians’ moving directions, which enables a guide, for example, to the exit of buildings. We explain this idea for proximity target marketing using iBeacon and discuss its implementation with our simple experiment and performance evaluation.We are going to explain what it is and how it works, in order to understand how the app works and how it uses these potentialities. This new technology may also be used by Android system. iBeacon works with Bluetooth Low Energy (BLE), also known as Bluetooth 4.0 or intelligent Bluetooth. We show in this project how iBeacon technically really work, The app. Smart devices, such as Android phone can detect advertising signals sent by the low energy consumption tiny device. Notifications will be pushed automatically to the user when smart device with iBeacon Apps come to certain areas. It provides promising and portfolio usage scenarios for business, such as retail stores, to push related information aboutcustomers’ interested items with the awareness of customers’location.
Authentication System for Any Touch Devices Using DWT
Vasundhara M. Goslar(M.E.), Mangala Madankar
— In today’s world, the identification techniques based on human biometric features gaining much more importance. For e.g. Iris recognition system, face recognition system, finger print recognition system, retina scanning system, etc. Some important area of other techniques is also to recognize the human hand signature. Also, there is the requirement of some techniques which works automatically based on some standard computer algorithms for recognition. For e.g. to identify the criminal identity automatically based on biometric features. The aim of research is to develop an on-line system for signature verification using Discrete Wavelet Transform (DWT). Discrete Wavelet Transform (DWT) algorithm is used for features extraction. In online signature dynamic features are usually available. Genuine or Forgery signature is substantiating based features comparison. Each feature of an input signature is extracted using various steps discrete wavelet transform algorithm are matched against a reference signature to identify the genuine signature. The final decision of verification is made based on the matched features of both the signatures.
Enhancing Web Navigation Appropriateness by Correlating Actual and Predictable Practice
Ashwini R, .
a new method to identify navigation- related Web usability problems based on correlating Actual and Predictable usage patterns. The actual usage patterns can be extracted from Web server logs routinely recorded for operational websites by first processing the log data to identify users, user sessions, and user task-oriented transactions, and then applying an usage mining algorithm to discover patterns among actual usage paths. The anticipated usage, including information about both the path and time required for user-oriented tasks, is captured by our ideal user interactive path models constructed by cognitive ex- perts based on their cognition of user behavior. The comparison is performed via the mechanism of test oracle for checking results and identifying user navigation difficulties. The deviation data produced from this comparison can help us discover usability issues and suggest corrective actions to improve usability. A software tool was developed to automate a significant part of the activities involved. With an experiment on a small service-oriented website, we identified usability problems, which were cross-validated by do- main experts, and quantified usability improvement by the higher task success rate and lower time and effort for given tasks after suggested corrections were implemented.
A Survey on Moving Object Detection and Tracking Techniques
Shilpa , Prathap H.L , Sunitha M.R
Moving object detection and tracking are the more important and challenging task in video surveillance and computer vision applications. Object detection is the procedure of finding the non-stationary entities in the image sequences. Detection is the first step towards tracking the moving object in the video. Object representation is the next important step to track. Tracking is the method of identifying, the position of the moving object in the video. Identifying the position is much more challenging task then detecting the moving object in a video. Object tracking is applied in numerous applications like in robot vision, monitoring the traffic, Video surveillance, Video in-painting and Simulation. Here we are going to present a brief review of numerous object detection, object classification and object tracking algorithms available.
Routing Taxonomies for Network Aware Territory of Vehicles: A Review
T. Sivakumar 1, Ali Tauseef Reza2 T. Anil Kumar 3
In this task we aim to provide a through global taxonomy of VANET routing protocols. This task also aims to provide a simulation test bed enabling performance assessment of the protocols. This work also complements the previous approaches of classification. Characteristically we acknowledged following taxonomical routing protocols classification, based on their transmission approach, based on their prerequisite knowledge needed to realize routing, based on their delay sensitivity and toleration, based on their accommodating network i.e., heterogeneous and homogeneous vehicular network environment and based on their inspiration i.e., bio-inspired algorithms. Evaluation of a routing protocol in VANET is a necessary, indispensable and struggling task, so we bring assessment methods, i.e., simulation and real world research into the picture. Once the protocol passes all the simulation tests with expected results then it can be tested in the real time vehicular environments. All of this work provides a base for VANET research community to excogitate a new routing techniques
Detection of Collision Attacks and Comparison of Efficiency in Wireless Sensor Network
Punam Dandare1, Prof. Vikrant Chole2
Wireless sensor networks (WSNs) consist of sensor nodes. It is a collection of wild number of low cost device constraint sensor nodes that communicates using wireless medium and they are small in size, low battery power and limited processing capability. This restraint of low electricity power of a sensor node and limited energy capability makes the wireless sensor network failure. Thus, data aggregation is very important techniques in wireless sensor networks and it reduces the energy consumption by eliminating redundancy. The increased deployment of ubiquitous WSN networks has exponentially increased the complexity to detect WSN attacks and protect in oppose to them. In this paper, we consult that collision attack in a network that can be easily launched by a hostile node: a hostile node does not follow the medium access control protocol and purpose collisions attack with neighbor communication by sending a short noise packet. Collision attack means the formation of nodes to access the false data. The data collected from singular nodes is aggregated at a base station or host computer. This attack does not consume much more energy of the attackers but can cause a lot of disruption of the network operation. Due to the wireless broadcast nature, it is not insignificant to identify the attacker. This paper specifies detection algorithms for WSN, which detects collision attack based on the packet flow rate to base station node in the wireless network. Simulation results show that the algorithm have low false toleration and false detection rates and small time to detect attacks.
Modeling The Performance Enablers Of Public Sector Banks Using Cfa And Conjoint Analysis.
T. Harikrishna1*, N. Vijaya Sai2
The progression of an economy is significantly dependent upon deployment as well as optimum utilization of resources and most importantly operational efficiency of the various sectors, of which banking sector pla ys a very vital role. Banking sector helps in stimulation of capital formation, innovation and monetization in addition to facilitation of monetary policy. It is imperative to carefully evaluate and analyze the performance of banks to ensure a healthy financial system and an efficient economy. Performance measurement is the most important activity of a management's control function of any organization.
Smart pi cam based Internet of things for motion detection using Raspberry pi
Pallavi N R .
Internet of things is the communication of anything with any other thing, the communication mainly transferring of useable data, for example a sensor in a room to monitor and control the temperature. It is estimated that by 2020 there will be about 50 billion internet-enabled devices. This paper aims to describe a security alarm system using low processing power chips using Internet of things which helps to monitor and get alarms when motion is detected and sends photos and videos to a cloud server. Moreover, lnternet of things based application can be used remotely to view the activity and get notifications when motion is detected. The photos and videos are sent directly to a cloud server, when the cloud is not available then the data is stored locally on the Raspberry Pi and sent when the connection resumes. Therefore, advantages like these make this application ideal for monitoring homes in absence.
Digital Remembrance Based User Validation for Internet of Things [IoT]
Sunain Kowser,
The increasing number of devices within the IoT is raising concerns over the efficiency and exploitability of existing authentication methods. The weaknesses of such methods, in particular passwords, are well documented. Although alternative methods have been proposed, they often rely on users being able to accurately recall complex and often unmemorable information. With the profusion of separate online accounts, this can often be a difficult task. The emerging digital remembrance concept involves the creation of a repository of remembrance specific to individuals. We believe this abundance of personal data can be utilized as a form of authentication. In this paper, we propose our digital remembrance based two-factor authentication mechanism, and also present our promising evaluation results. Keywords—Digital remembrance, authentication, IoT, security
Cloud Computing: “Secured Service Provider for data mining”
Garima Gupta, Dr. Rajesh Pathak
Data safety and procedure in method are the most demanding scrutinize work going on, at present, in cloud computing. This is for the reason that of the clients sending their complex data to the cloud providers for obtaining their facilities. Thus, security concerns among users of the cloud have become a major barrier to the extensive growth of cloud computing. One of the security concerns of cloud is data mining based isolation attacks that involve analyzing data over a long period to extract valuable information. In particular, in current cloud architecture a client entrusts a single cloud provider with his data. It gives the provider and outside attackers having unlawful access to cloud, an occasion of analyze client data over a long period to take out sensitive information that causes privacy violation of clients. Therefore, to rise above these difficulties, a model (cloud architecture) is explained in this paper which accepts only those data which are essential in an encoded form, performs the service opted by the client and sends the result in the encoded format to be implicit by the specific client.
A Review of techniques for Automatic detection and diagnose of mango pathologies
S. B. Ullagaddi , Dr. S.Vishwanadha Raju2
The agriculture is the sole area that serves the entire life on earth. With aid of advanced technology research with new challenges in the field of agriculture is increase the production and profit. The different diseases and symptoms on any part of plant cause significant loss in production and economy to farmers as well as country. Thus the techniques for automatic disease detection and diagnose of agriculture crop or plant plays a major in disease management. This paper presents a review on methods that use digital image processing techniques to detect, recognize and classify plant diseases from digital image and concludes with discussion of more useful problems in the domain and future direction.
Purnima Singh1 Archana Gautam.2 Km. Jyotsana3, Diksha S ,Aditya Kumar Singh5
Students Record System using Radio Frequency Technique
Purnima Singh1 Archana Gautam.2 Km. Jyotsana3, Diksha S ,Aditya Kumar Singh5
- In recent years, there have been rise in the number of applications based on Radio Frequency Identification (RFID) systems and have been successfully applied to different areas as diverse as transportation, health-care, agriculture, and hospitality industry to name a few. RFID technology facilitates automatic wireless identification using electronic passive and active tags with suitable readers. In this paper, an attempt is made to solve recurrent lecture attendance monitoring problem in developing countries using RFID technology. The application of RFID to student attendance monitoring as developed and deployed in this study is capable of eliminating time wasted during manual collection of attendance and an opportunity for the educational administrators to capture face-to-face classroom statistics for allocation of appropriate attendance scores and for further managerial decisions
1 S. Sakthi Priya ,2 P. Rishika Menon, 3 M. Vasanthi , * I. Thivya Roopini *
Improved PSO algorithm approach in Gray scale image multi-level thresholding
1 S. Sakthi Priya ,2 P. Rishika Menon, 3 M. Vasanthi , * I. Thivya Roopini *
The heuristic algorithm based segmentation procedures are widely used to find optimal thresholds for RGB and Gray scale images. In this paper, Otsu based bi-level and multi-level image segmentation is carried for a class of gray scaled images using Improved Particle Swarm Optimization (IPSO). Optimal thresholds for the test image are attained by maximizing Otsu’s between-class variance function. The performance of the proposed IPSO based segmentation procedure is validated with the existing methods, such as Particle Swarm Optimization (PSO) and Bacterial Foraging Optimization (BFO) algorithms. The performance assessment between algorithms are verified using well known image parameters such as objective function, Peak to Signal Ratio (PSNR), and the Structural Similarity Index Matrix (SSIM). The result shows that for most of the images, IPSO based method offers enhanced result compared to the alternatives.
Authentication methods are used to tackle a very important issue, the cyber security. It helps to avoid the illegal use or misuse of highly sensitive data. Completely Automated Public Turing Test to Tell Computer and the Humans Apart (CAPTCHA) is the automatic security mechanism which is used to determine whether the user is a human or the robot. It is a program which generates and grades the tests that are human solvable but is beyond the current computer program capability. Unfortunately among several CAPTCHA techniques, the text catpcha can be easily hacked and are not reliable for the data security. Though CAPTCHA’s that are robust such as complex image CAPTCHA, graphical CAPTCHA, iCAPTCHA are available, yet most of the websites do not implement as they have to rely on the 3rd party CAPTCHA service provider and also due to the fact that the size occupancy which loads their database on the server which is of less size and cause slow operation of the website. This paper describes the various categories of the CAPTCHA systems, their applications and the drawbacks of each CAPTCHA techniques.
New Approach in Biometrics to Combat the Automated Teller Machine Frauds: Facial Recognition
Priyanka Mahajan
There is an urgent need for improving security in banking region. In this paper discussion is made about the face recognition technology, an important field of biometrics which will be employed for the purpose of checks on frauds using ATMs. The recent progress in biometric identification techniques, has made a great efforts to rescue the unsafe situations at the ATM. Several facial recognition techniques are studied which include two approaches, appearance based and geometric based. A new facial recognition technique: 3-D technique is also reviewed in the paper. These techniques are widely used in e-passports and on the airports for entry of travellers and others. ATM systems today use no more than an access card and PIN for identity verification. If the proposed technology of facial recognition becomes widely used, faces would be protected as well as PINs.
Weather forecasting has been one of the most scientifically and technologically challenging problems around the world in the last century. One of the most popular methods used for weather prediction is data mining. Over the years many data mining techniques have been used to forecast weather such as Decision tree and Artificial neural network. In this paper we present a new technique for weather prediction namely CPT+ which is highly efficient than all the methods used till date for prediction.
Here we present a novel prediction model for weather prediction which losslessly compresses the training data so that all relevant information is available for each prediction. Our approach is incremental, offers a low time complexity for its training phase and is easily adaptable for different applications and contexts.
Study of vulnerability taxonomies to provide a Novel approach for vulnerability categorization
Bindu Dodiya Ranawat1 Dr.Umesh Kumar Singh2
In this age of universal electronic connectivity when world is becoming a global village ,different threats like viruses and hackers, eavesdropping and fraud, undeniably there is no time at which security does not matter. In view of large growing population of vulnerabilities, major challenge is how to prevent exploitation of these vulnerabilities by attackers. The first step in understanding vulnerabilities is to classify them into a taxonomy based on their characteristics. A good taxonomy also provides a common language for the study of the field. Properties and requirements of good taxonomy are described in this paper to lead security experts for the development of secure infrastructure. An analysis of some prominent taxonomies and their valuable aspects are highlighted that can be used to create a complete useful taxonomy.
Optimum Route Selection & Modified Network Approach to optimize Power aware Routing in MANET
Nikita Yadav1, Abhishek Sharma2
Energy consumption is a significant issue in ad hoc networks since mobile nodes are battery powered. In order to prolong the lifetime of ad hoc networks, it is the most critical issue to optimize the energy consumption of nodes. In this paper, we propose a power aware routing protocol for choosing energy efficient optimum route selection & network approach. This system also considers transmission power of nodes and residual energy as energy metrics in order to maximize the network lifetime and to reduce energy consumption of mobile nodes. The objective of our proposed system is to find an optimal route based on two energy metrics while choosing a route to transfer data packets. This system is implemented by using NS-2.35. Simulation results show that the proposed routing protocol E-EPAR with transmission power and residual energy control mode can extend the life-span of network and can achieve higher performance when compared to EPAR and DSR routing protocols.
Wireless Sensing System Security Concerns - A Review
Shabnum Mohi Ud Din1 , Narender Singh Rana2
Sensors are electronic devices that are meant for recording particular environment variable for example temperature, pressure, speed etc. with the advancement in the field of electronics and sensors, it is possible to the gather physically measured data from sensors remotely. This is possible only because of the network facilities like Ethernet, Wi-Fi, and cellular networks that enable remote access to the data sampled by a sensor.Faults, errors, failures and attacks are common in a wireless communication and this imperfection in wireless communication compromises the effective data collection of a wireless sensing system. In this paper we are going to discuss some various challenges and solutions in robust data collection in wireless sensing system.
My Privacy My Decision: Control Communication media on Online Social Networks
Arpitha B, Mrs. Deepika
Photo sharing is an attractive feature which popularizes Online Social Networks (OSNs). Unfortunately, it may leak users privacy if they are allowed to post, comment, and tag a photo freely. In this paper, we attempt to address this issue and study the scenario when a user shares a photo containing individuals other than himself/herself (termed co-photo for short). To prevent possible privacy leakage of a photo, we design a mechanism to enable each individual in a photo be aware of the posting activity and participate in the decision making on the photo posting. For this purpose, we need an efficient facial recognition (FR) system that can recognize everyone in the photo. However, more demanding privacy setting may limit the number of the photos publicly available to train the FR system. To deal with this dilemma, our mechanism attempts to utilize users' private photos to design a personalized FR system specifically trained to differentiate possible photo co-owners without leaking their privacy. We also develop a distributed consensus- based method to reduce the computational complexity and protect the private training set. We show that our system is superior to other possible approaches in terms of recognition ratio and efficiency. Our mechanism is implemented as a proof of concept Android application on Facebook's platform.
An Analytic Survey On Current Clustering Technique of data Categorizing and Retrieving
Snehlata Bhadoria , U. Datta
in this survey we have a furnished detail of Clustering. Clustering is not only bounded in boundary of grouping of same kind of objects in cluster, it would also be like to get or retrieve specific data by just analyzing clustering approach. This analytic survey focused on the current clustering technique of data categorizing and retrieving as faster as possible from huge amount of data because data is growing like square or cube of their current position. So saving of all information and easier retrieving will always face new challenges as proportion of data increasing in various aspects which would population of any country or data of any field related to them
Equal And Unequal Distribution of Nodes based Simulation of Routing Protocols in MANET
Vaibhav Gupta1, Prof. Ashish Mishra2
One important aspect of mobile ad-hoc networks is the group mobility of nodes in topological area, since any node can enter or leave the topological area at any time. The resources are limited with mobile ad-hoc networks, so increasing number of node cannot generate more resources, but they can use and share existing resources with pre-existing nodes in the topological area. An important aspect of group mobility is mobility of nodes inside the group with reference to their leader. Inthis paper we analyze the two protocols AODV and DSDV with equal and unequal distribution of nodes in group.
Bitcoin is the latest addition to the online payment transaction systems. It is a digital currency also known as cryptocurrency. Bitcoin system is the first transaction payment system that deviated from the conventional approach of processing and clearing transactions though the trusted third parties and allowed direct transactions between parties. Thus making the whole system decentralized. It is a pure peer to peer network system which facilitates every party on the network to keep track of all the transactions that are taking place on the network. It uses Cryptography for its implementation and to deal with the internet security threats. This papers aims to explore the need of the decentralized system, technology used for its implementation and also the key features of bitcoin system that makes it so unique as compared to the conventional currency. It also throws the light on the benefits of bitcoin system and its shortcomings.
Dev Baloni ,Jyotsna, Minakshi Mandoli Pawitra Kathait
Comparision of two different andriod versions i.e Lollipop and Marshmallow, and also development of campsys mobile Andriod Application - An Overview
Dev Baloni ,Jyotsna, Minakshi Mandoli Pawitra Kathait
In the previous system, all the information has to view in a hard file, or in website [6]. At the same time while searching any information it is too difficult to access and takes a lot of time to search the particular website. Hence, in order to overcome this problem a smart phone based application using Android can be used to make this process easier, secure and less error prone. More efficient information’s will be achieved through this system. Android
is an open source Linux based system developed by Google, and primarily aimed at mobile handsets and other portable devices. In short, we will be using them to accomplish our daily task. One application that falls into this category is the Android Application for College. This College application provides a wide range of useful information which split into several functionalities. These include: academics, news, events, facilities and all the college details. Users can install this application in their android mobile to view all of these college details and make use it.To improve mobile experience for users[17] android project aims to create successful real world products. Android is a mobile OS but it’s not limited to mobile only. It’s currently used in smart phones and televisions. There are many code name of android such as Lollipop, Kitkat, Jelly Bean, Ice cream Sandwich, Froyo, Ecliar, Donut etc. In this paper we are also discussing aboutcomparison of androidLollipop version, its features, and its issues with android Marshmallow versions and also the development of Campsys mobile application.
Afolabi Ezekiel O; Ben Omoh E; OhanejeChidozie H; and Kindala Junior T.
Comparism Of Thermal And Microwave Methods In Structural Modification Of Lumefantrine
Afolabi Ezekiel O; Ben Omoh E; OhanejeChidozie H; and Kindala Junior T.
The three chlorine atoms on lumefantrine were replaced with 5-aminotetrazole using both thermal method (TM) and microwave method (MW). The products were characterized with GC-MS spectral analyses. The usual isotopic mass percentages of 35(75%) and 37(25%) of chlorine abundance in nature were absent in the product’s fragmentation peaks. Gas Chromatogram of the two methods showed that the percentage yield of the microwave method (MW) is about double that of the thermal method (TM).
Attack Graph-Based Approach For Enterprise Networks Security Analysis
Saidu Isah Rambo , Ibrahim M, Anka
Network administrators are always faced with numerous challenges of identifying threats and in retrospect, securing the organization’s network. The classical approach of identifying the vulnerability in the network is by using commercially developed tools that do not take into cognisance vulnerability interaction between network elements and their behavioral pattern.Therefore, network administrators have to take a hollistic methods to identify vulnerability interrelationships to be captured by an attack graph which will help in identifying all possible ways an attacker would have access to critical resources. The objective therefore is to design an attack graph–based approach for analyzing security vulnerabilities in enterprise networks, implement and evaluate performance of the approach.
LIVE: Lightweight Integrity Verification for Named Data Networking
M.K.M. Lhogeshvaree1 S. Muruganandam2,
Named information organizing (NDN) is another worldview for the future Internet wherein hobby and information parcels convey content names as opposed to the present IP worldview of source and destination addresses. Security is incorporated with NDN by installing open token mark in every information bundle to empower check of credibility and uprightness of the substance. Be that as it may, existing heavyweight signature and check calculations to avoid all inclusive uprightness confirmation among NDN nodes, which may bring about substance contamination and refusal of administration assaults. We propose a lightweight respectability confirmation (LIVE) engineering, an expansion to the NDN convention, to address these two issues. Besides, it permits a substance supplier to control content access in NDN hubs by specifically dispersing uprightness check tokens to approved hubs. We also introduce IP address verification to avoid unauthorized users. Here our tokens valid from the user can access his accounts from another system.
Outlier Detection in High Dimension Data Based On Multimodality And Neighbourhood Size Using KNN Method
Deepthi Navile, Dr. Ravikumar G.K
Outlier detection in high-dimensional data presents various challenges resulting from the “curse of dimensionality.” A prevailing view is that distance concentration, i.e., the tendency of distances in high-dimensional data to become indiscernible, hinders the detection of outliers by making distance-based methods label all points as almost equally good outliers. In this paper, we provide evidence supporting the opinion that such a view is too simple, by demonstrating that distance-based methods can produce more contrasting outlier scores in high-dimensional settings. Furthermore, we show that high dimensionality can have a different impact, by reexamining the notion of reverse nearest neighbors in the unsupervised outlier-detection context. Namely, it was recently observed that the distribution of points’ reverse-neighbor counts becomes skewed in high dimensions, resulting in the phenomenon known as hubness. We provide insight into how some points (antihubs) appear very infrequently in k-NN lists of other points, and explain the connection between antihubs, outliers, and existing unsupervised outlier-detection methods. By evaluating the classic k-NN method, the angle-based technique designed for high-dimensional data, the density-based local outlier factor and influenced outlierness methods, and antihub-based methods on various synthetic and real-world data sets, we offer novel insight into the usefulness of reverse neighbor counts in unsupervised outlier detection. Index Terms—Outlier detection, reverse nearest neighbors, high-dimensional data, distance concentration
A Review on an Efficient Monitoring Of Substations Using Microcontroller Based Monitoring System
Kaxil Patel, ,
The paper presents review on innovative design to develop a system based on AVR micro controller that is used for monitoring the voltage, current and temperature of a distribution transformer in a substation and to protect the system from the rise in mentioned parameters. Providing the protection to the distribution transformer can be accomplished by shutting down the entire unit with the aid of the Radio frequency Communication. Moreover the system displays the same on a PC at the main station which is at a remote place. Furthermore it is capable of recognizing the break downs caused due to overload, high temperature and over voltage. The design generally consists of two units, one in the substation unit, called as transmitter and display unit, and another in the Main station called as controlling unit. The transmitter and the display units in the substation is where the voltage, current and temperature are monitored continuously by AVR microcontroller and is displayed through the display unit. An RF transmitter is used for transmitting the signals that are obtained. The controlling unit in the main station by means of a PC and a RF receiver receives the RF signals that are transmitted by the Transmitter unit and reacts in accordance to the received signal. In general, the proposed design is developed for the user to easily recognize the distribution transformer that is suffered by any open or short circuit and rise in temperatures. The ultimate objective is to monitor the electrical parameters continuously and hence to guard the burning of distribution transformer or power transformer due to the constraints such as overload, over temperature and input high voltage. If any of these values increases beyond the limit then the entire unit is shut down by the designed controlling unit.
Vehicular Ad Hoc Network (VANET) is a subgroup of mobile ad hoc network (MANET). It is an emerging new technology to exchange information between vehicles to vehicles. VANETs are considered as one of the most noticeable technologies for improving the efficiency and safety of transportation systems. VANET mainly used to exchange traffic information between the vehicles and prevent accident. In VANETs the high mobility of the nodes is the major concern. This dynamic topology makes the route unstable and unreliable for exchange of information or messages among the vehicles in the ad hoc network. To improve the throughput and performance of the VANETs, routes between nodes must be reliable, less overhead and stable. It is a challenging task to design a routing protocols for VANETs which should support the intelligent transportation system (ITS) for enhancing the driver’s safety, improving whole driver experience and regulating traffic. In this paper, the various challenges and issues of routing protocols of VANETs are discussed about its advantages and disadvantages in VANETs scenarios.
OTP system with third party trusted authority as a mediator
Suraj Rasal 1, Megha Matta 2, Karan Saxena 3
One Time Password is one of the preferable security techniques to do online transaction. If the security level is compared, it shows the need of improvement in its transaction methods and medium. In this paper, two authorities are considered viz. bank domain itself and third party as a trusted authority. Third party authority will have its own secrete key based on its own considered attributes. This key will be combined with user attribute key to form encrypted key. This key will be stored in temp database till session time is available. Here the two new concepts are added as to use third party secrete key and storing this key into temp database for predefined session time only. After these stages only main database can be accessed. It will increase the security level to make secure online transaction.
Reliable and Adaptive Steganalysis Method for Binary Image Using CRMST Algorithm
K.Suganyadevi Snehalatha.V., M.E.,
Data security is one of the most vigorous fields of study in Informatics and Computer Forensic. Author right for intellectual stuff is a real challenge, particularly when information is processed and transmitted. One of the electronic methods of digital data is images. They are widely used in organizations, research institutions, and in environments where speedy, secured and minimized distortion is needed. In the proposed using the Complement, Rotate, and Mirrored with respect to Local Texture Using Syndrome Trellis Code (CRMST) algorithm. Entrenching the data in binary image is potential by flipping the pixels. The flip ability decision of a pixel depends on three transitions from the pixels to its eight neighbors in a Local window. Flipping a pixel does not abolish the connectivity among pixel, to safeguard the good visual quality of an image. The steganography scheme engenders the cover vector by dividing the scrambled image into super pixels. By testing on both simple binary images and the constructed image data set, show that the proposed measurement can well describe the distortions on both visual quality and statistics. A spatial domain-based binary image steganography scheme is proposed. The scheme minimizes a unique flipping distortion measurement which considers both HVS and statistics. This measurement employs the weighted sum of CRMST changes to measure the flip ability of a pixel. It is used for military purposes and provide high security.
Design and Implementation Of NAODV ETCP To Handle Jelly Fish Attack
Preety Dahiya, Miss Bhawana
This paper modifies the existing TCP and AODV system to handle the jelly fish periodic dropping attack, the jellyfish packet reordering attack and the jelly fish delay variance attack. The proposed system modifies the AODV routing protocol and TCP to handle the jelly fish attack variants. The proposed system uses the E_TCP of the existing system along with the modified AODV routing to get the effective results. In the E_TCP protocol the buffer stores the sequence number and the acknowledgement time while in the NAODV_ETCP protocol the fr(forwarding ratio) is also stored in buffer. This paper analyzes the performance using PDR, E2Edelay and the throughput on the various scenario attacked by different types of jellyfish attack. The result analysis shows that the performance of NAODV_ETCP is better than the ETCP protocol
Applications of Pattern Recognition Algorithm in Health and Medicine: A Review
Priyanka Mahajan
A pattern is an entity that could be named, e.g. fingerprint image, handwritten word, human face, speech signal, DNA sequence and many more. Pattern recognition has its roots in artificial intelligence(AI). Pattern recognition is the study of how machines can learn to distinguish patterns and make some decisions about the categories of the patterns. Medical and healthcare sector are a big industry nowadays. Image based medical diagnosis is one of the important service areas in this sector. Various artificial intelligence techniques such as artificial neural network and fuzzy logic are used for classification problems in the area of medical diagnosis. Most of these computer-based systems are designed by using artificial neural network techniques. Electronic health records (EHR) provide detailed, time-stamped, and highly multivariate data for a large patient population, enabling the use of AI techniques to connect care practices and outcomes.
Nearest Neighbor Browsing and Search with Keywords in Spatial Databases
Sphurti S. Sao1, Dr. Rahila Sheikh2
Users may search for different type of things from anywhere. But Search results depend on the user entered query which has to satisfy their searched properties that is stored in the spatial database. Due to rapid growth of users it becomes essential to optimize search results based on nearest neighbour property in spatial databases. Conventional spatial queries, such as range search and nearest neighbour retrieval, involve only geometric properties of objects which satisfies condition on geometric objects. Nowadays many modern applications aim to find objects satisfying both a spatial condition and a condition on their associated texts which is known as Spatial keyword search. For example, instead of considering all the hotels, a nearest neighbor query would instead ask for the hotel that is closest to among those who provide services such as pool, internet at the same time. For this type of query a variant of inverted index is used that is effective for multidimensional points and comes with an R-tree which is built on every inverted list, and uses the algorithm of minimum bounding method that can answer the nearest neighbor queries with keywords in real time.
GALSR: Geographical Based Adaptive Lifetime Secure Routing Protocol For Wireless Sensor Network
Hanan Raj.R1, Shanthameena.C2
: Wireless sensor networks (WSNs) are potentially increased in research field due to their wide range of application. The topology of advanced WSNs form Multi-Hop WSNs. The Main issues in this topology is location based security and lifetime preserving in energy resources. In this paper, we projected a Geographical based Adaptive Lifetime Security Routing (GALSR) Protocol and GALSR Algorithm to improve the lifetime and security of WSNs. This algorithm enhanced with Greedy for Shortest path finder and Direct Random Propagation for Random Walking. We then determine that the energy consumption is rigorously disproportional to the uniform energy deployment for the given network topology, which greatly reduces the lifetime of the sensor networks. To resolve this issue, we introduce non-uniform energy deployment to optimize the lifetime and message delivery ratio under same energy resources and security. This energy balancing is set by Energy balance control (EBC) and security parameter using Metric Energy Balancer (MEB).We validate our finding in both Quantitative and Qualitative measures. Our quantitative measures is shown out of NetSim Simulator similarly our implementation is an best prove for our qualitative measures, Our proposed model shows that we achieved with increased Lifetime, Adaptive Security and Monetary efficient protocol
Implementation of Robust Barcode Modulation Mechanism for Large Data Trans Reception Using Android Device
Ashwini Kasurde1, Pratima Bhati2
major use of the bar-coding is to secure the data using barcodes. The concept of 2-D barcodes is of great relevance for use in wireless data transmission between handheld electronic devices. In a general setup of barcode standalone systems, any file on a cell phone, for example, can be transferred to a second cell phone through a series of images on the LCD which are then captured and decoded through the barcode scanner of the second cell phone. In the proposed system, a new approach for data modulation in high capacity 2-D barcodes is introduced, where in the High capacity 2 D barcode of 448*63 pixels is used to barcode the data and thereby transmitted through any wireless or wired medium. The proposed barcode has a high capacity of encoding the large amount of data by making use of MD5 secure hashing algorithm for uniquely identifying the data. The data is hashed using MD5 algorithm and thereby retrieved by cross hashing the values decoded from the barcode. The proposed bar-coding and barcode modulation technique makes use of the latest technology for generating and reading the barcodes and thereby avail users to securely transmit the data. In this paper we have propose the survey of barcode types and compare this with high capacity 2D barcode.
The objective of this paper is to control the railway tracks by using anti-collision techniques. The model of railway track controller is designed to avoid railway accidents. When we go through the daily newspapers we come across many railway accidents occurring at unmanned railway crossings. This is mainly due to the carelessness in manual operations or lack of workers. And also the collision of two trains due to the same track. This model is implemented using sensor technique. We placed the sensors at a certain distance from the gate detects the approaching train and accordingly controls the operation of the gate. Also an indicator light has been provided to alert the motorists about the approaching train. The arrival and leaving of the system is monitored and the gate is operated accordingly
Improved Tumor Detection Using Modified Hough Mertic Trasformation
Kirna Rani
The brain tumor detection is a very important vision application in the medical field. In this paper, an efficient brain tumor detection using the object detection and modified hough metric has been proposed. To enhance the tumor detection rate further we have integrated the proposed object based tumor detection with the Decision based alpha trimmed global mean. The proposed technique has the ability to produce effective results even in case of high density of the noise. This approach has been tested on various images thus defining an efficient and robust technique for automated detection and segmentation of brain tumors.
The technology evolvement has led to incorporation of more and more features into the system. One such feature is the flexibility of changing the hardware and software at the time of fabrication. Such a feature is called reconfiguration. The reconfiguration allows the user to incorporate more control over the hardware and software even at final stages of the process. Such type of reconfiguration is possible in Field Programmable Gate Array (FPGA). There are various classifications of reconfiguration based on application of reconfiguring a device usually FPGA. In this paper we go through the overview of partial reconfiguration and various techniques employed to achieve it.
The field of technology is evolving at a very fast pace. The competition is very intense. So the need of the hour is to produce efficient system. In accomplishing this objective we are required to establish better interaction among all the components of the system. This requirement is fulfilled by the Advanced Microcontroller Bus Architecture (AMBA) protocol from Advanced RISC Machines (ARM).The AMBA is the on-chip standard for the communication among components in Application Specific Integrated Circuits (ASIC) or System on Chip (SoC). This paper focuses on the 2 protocols of AMBA which are Advanced High Performance Bus (AHB) and Advanced Peripheral Bus (APB) and the APB bridge. The coding is done in Verilog synthesis on Xilinx 14.7 ISE and simulation on ISim simulator and FPGA implementation on Spartan 3.
Free Vibration Response Of Double-Bay Multi-Storey Building Frames With Stiffened Joints
E.C. Mbanusi*1, D.A. Obodoh2
This paper investigated self-excited vibration response of double-bay multi-storey building frames for the effect of joint stiffening on natural frequencies. One of the frames has normal rigid joints. Three others of the frames have stiffened joints of stiffened lengths: 250mm, 400mm and 750mm respectively. On account of limitations of shear frame models, the frames are modeled as frames with flexible horizontal members having multi degrees of freedom (MDOF). Classical displacement method of analysis is adopted using stiffness coefficients which are modified to include and embrace the contributions of joint stiffening. Results revealed: joint stiffening increased the natural frequencies of the frame; natural frequencies also increased with the length of stiffening. In addition, joint stiffening brought about enhanced values of other dynamic characteristics of the frame which are functions of natural frequencies.
A General Framework for Multi-level security to restrict unauthorized users in Sulaymaniyah E-Court Database
Rzgar Sirwan Raza Zana Azeez Kakarash
Data is vulnerable at many points in any computer system, and many security techniques and types of functionality can be applied to protect it. Sulimanyah Court is a big and popular Government sector in Iraq. Many clients accessing E-Court Systems, SES (Sulimanyah E-Court Systems) is using SQL SERVER database to store and accesses court cases with different clients. Most of the security models available for databases today protect them from outside, unauthorized users and cannot be provides internal security in relationship with the user type of access to the database.
This database can access by hundreds of clients. We propose a framework to increase security needs of database systems. Clients in this approach can be analysed to instituting sub channels between specific (groups of) users such that authorized subchannels appropriating from accessing objects that contain some sensitive information and restricting unauthorized users. In this paper we propose a general framework for Multi-Level Security (MLS) in Sulaymaniyah E-Court database.
Optimized cloud migration using reliabilty framework
Ancy Nevil.S, Kavitha Priya . C.J
The on-demand use, high scalability, and low maintenance cost nature of cloud computing have attracted more and more enterprises to migrate their legacy applications to the cloud environment. Although the cloud platform itself promises high reliability, ensuring high quality of service is still one of the major concerns, since the enterprise applications are usually complicated and consist of a large number of distributed components. Thus, improving the reliability of an application during cloud migration is a challenging and critical research problem. To address this problem, we propose a reliability-based optimization framework, named RO Cloud, to improve the application reliability by fault tolerance. RO Cloud includes two ranking algorithms. The first algorithm ranks components for the applications that all their components will be migrated to the cloud. The second algorithm ranks components for hybrid applications that only part of their components are migrated to the cloud. Based on the ranking result, optimal fault-tolerant strategy will be selected automatically for the most significant components with respect to their predefined constraints. The experimental results show that by refactoring a small number of error-prone components and tolerating faults of the most significant components, the reliability of the application can be greatly improved.
Carlos R. Soria-Cano1 Salvador Álvarez Ballesteros
Video broadcast using cloud computing with metadata
Carlos R. Soria-Cano1 Salvador Álvarez Ballesteros
- In this paper the model of broadcast digital video signal with embedded audio (SDI) using cloud computing is detailed in each transcoding process of the signal. The SDI signal is coding and multiplexing in ASI signal, Multidecriptor transcoding the signal in Transport Stream, with GT-3 we can change the program in a new TS. Then with CPC develop chuncks with HLS (Http live streaming), with diferents profile. Anevia recive this chunck and delivery the signal to cloud. Testing bandwidth and bit rate for each signal process is performed, without losing the quality control standards and without losing the services of metadata (V-chip, closed caption, cue tone, DPI, GPI, Watermarket, SCTE 35 y104, etc.). How the stream is received by the end user it is shown.
Implementation and Analysis of Multi-Processing Processor Using Data Encryption Standard on FPGA
Soumya D1, Dr. K Ramesha2 and Guruprasad S P3
:The network communication is mandatory and critical in our day-to-day life. The cryptography is the technique to secure the data in communication field such that privacy of data is maintained. The cryptography has different types of algorithms; they are Data Encryption Standard (DES), Advanced Encryption Standard (AES) and Ron Rivest Adi Shamir & Leonard Adlemen (RSA) Triple Data Encryption Standard algorithm (TDES). The Multi-processor is most used in this era as it is subject to constraints while computing. The Multi-processing is the processing of multiple tasks at a time using two or more central processing units in one system. Here in this paper the Multiprocessing processor and light-weight DES algorithm is implemented using Xilinx 14.7. The simulation is done in Model Sim 6.3 and verifying the code is done by dumping onto Spartan 3 Field programmable gate array (FPGA).
Sapana M Adhalli 1, H Umadevi 1 Guruprasad S P 2 and Rajeshwari Hegde3
Design and Implementation of EEG Signals Analysis on FPGA
Sapana M Adhalli 1, H Umadevi 1 Guruprasad S P 2 and Rajeshwari Hegde3
In today’s world our life style accumulates too much of stress. This stress is major factor for deteriorating health. To reduce the stress level, meditation is one of the ways. The Electroencephalography (EEG) is characterized by five signals they are Alpha, Beta, Gamma, Delta and Theta. This paper focuses on the analysis of EEG signals of meditating and non-meditating persons. The signals are analyzed using Matlab and Verilog Xilinx 14.7 on FPGA. It was found that the variation of alpha wave in a person who is meditating regularly was less and delta wave density is more compared to a person who is not meditating
Web Harvesting: A Technique for Fast Retrieval of Information from Web
Meenakshi Srivastava1, Dr. S.K. Singh2
V
Internet is collection of vast information. Need of searching the web pages for a specific piece of information is a common practice. Search engines are used to search and retrieve the information as per query raised by the user. Making this search process better and fast has always been the area of interest for researchers involved in web mining. The process of searching the web can be improved by Web harvesting. Web harvesting is the process by which specialized software collects data from the Internet and places it into files for end user. It serves a function similar to, but more advanced than, the tasks a search engine performs. Web harvesting is also known as Web scraping. In this article we have explored the field of Web harvesting and emphasized its use for fast and effective retrieval of information from web
Content Caching and Scheduling in Wireless Networks with Elastic and Inelastic Traffic
B.Muniswamy, Dr. N. Geethanjali
The rapid growth of wireless content access implies the need for content placement and scheduling at wireless base stations. We study a system under which users are divided into clusters based on their channel conditions, and their requests are represented by different queues at logical front ends. Requests might be elastic (implying no hard delay constraint) or inelastic (requiring that a delay target be met). Correspondingly, we have request queues that indicate the number of elastic requests, and deficit queues that indicate the deficit in inelastic service. Caches are of finite size and can be refreshed periodically from a media vault. We consider two cost models that correspond to inelastic requests for streaming stored content and real-time streaming of events, respectively. We design provably optimal policies that stabilize the request queues (hence ensuring finite delays) and reduce average deficit to zero [hence ensuring that the quality-of-service (QoS) target is met] at small cost. We illustrate our approach through simulations.
Index Terms—Content distribution network (CDN), delay-sensitive traffic, prediction, quality of service
Improvement of HADOOP Ecosystem and Their Pros and Cons in Big Data
S.Suguna1 , K.Devi2
Big data plays a major role in all aspects of business and IT infrastructure. Today many organizations, Social Media Networking Sites, E-commerce, Educational institution, satellite communication, Aircrafts and others generate huge volume of data on a daily basis. This data is in the form of structured, semi-structured and unstructured. So this huge voluminous amount of data is coined as big data. These big data should be stored and processed in the effective manner. But, in the traditional distributed system this data cannot be effectively handled because of lack of resources. So the term Hadoop comes in to the picture. Hadoop stores and process the huge voluminous amount of data with their strong Hadoop ecosystem. It contains many modules for processing the data, storing the data, allocating the resources, Configuration Management, retrieving the data and for providing highly fault tolerance mechanism. In this paper it focuses on big data concepts, characteristics, real time examples of big data, Hadoop Modules and their pros and cons.
Power Quality Improvement in Modified Solid State Transformer System Using Statcom
R.S. Sundaramoorthy, Dr.G.Udhayakumar, M.E.Ph.D,
Power quality is a major issue of loads in the distribution system used in industrial and domestical appliances. In this work, we proposed a modified solid state transformer system using statcom to improve the power quality of loads in the distribution system. The proposed model is used to eliminate voltage sag, and swell. The matrix converter is adopted in the proposed design of modified solid state transformer to reduce the power loss. The control strategy of matrix converter is done by sinusoidal pulse width modulation techniques. In addition to this, harmonics are reduced by using vector proportional integral controller. The simulation is done in MATLAB/SIMULINK software, the several case studies are carried out and the simulation results shows that the proposed system has better voltage regulation than that of conventional system.
Design Of A Model Predictive Control For A Multivariable Process
J. Merlin1, C. SelvaKumar2
Model Predictive Control is a process control technique that is used in process industries that predict the future behavior of the process state by predicting the change in the dependent variables of the modeled system. It can compute the future input at each step by minimizing a cost function on the manipulated and controlled variables. The main goal of this paper is to design a Model Predictive for a multivariable process. Here, the distillation column is used as a multivariable process. Finally, the settling time, overshoot, ISE, IAE, ITAE errors of MPC controller is compared with PID controller for both SISO and MIMO systems
In this paper we will discuss about how we can create an artificial environment.
In this Hi tech era Temperature plays an important part in our environment. Changes in temperature can affect the behaviour of human beings, plants and even materials such as semiconductors. This project is to control the temperature of a given environment such as baby incubator, industrial boiler, for automatic room temperature control, for creating artificial weather etc.
A microcontroller is used to control the temperature in a circuit. Where the temperature had to be kept constant at particular value. The system will function as stated in the programming code of Atmega 8 in order to keep the temperature stable. A simple temperature controller which has least complex circuitry has to be designed so that it saves space and be more reliable for an incubator. Present design which uses microprocessor as main controller in digital signal processing combined with complex combinational logic circuit are redundant and needs to be improved in the sense of functionality. Hence, replacement of microprocessor with an microcontroller is prudent action due to its efficiency and reliability especially in an incubator and boiler.
Block Based Compressed Sensing Algorithm for Medical Image Compression
S.Spurthi, Parnasree Chakraborty
Block Compressive sensing technique has been proposed to exploit the sparse nature of medical images in a transform domain to reduce the storage space. Block based compressive sensing is applied to dicom image, where original dicom image is divided in terms of blocks and each block is processed separately. The main advantage of block compressive sensing is that each block is processed independently and combined with parallel processing to reduce the amount of time required for processing. Compressed sensing exploits the sparse nature of images to reduce the volume of the data required for storage purpose. Inspired by this, we propose a new algorithm for image compression that combines compressed sensing with different transforms. Different sparse basis like discrete cosine transform, discrete wavelet transform and contourlet are used to compress the original input image. Among these transforms, Dct transform has block artifacts problem [14]. Wavelet transform can overcome the block artifacts introduced in the reconstructed image. Contourlet transform effectively captures smooth contours[4] and hence Contourlet transform provides better reconstruction quality image. In order to reconstruct original image, different techniques such as basis pursuit, orthogonal matching pursuit etc. are used at the decoder.
With the new emerging technologies the cloud marketplace has identified many new cloud service providerswhich provide a similar service and offerings. The services and offerings are provided in an agreement named as Service Level Agreement (SLA).The SLA is the agreement that has been established between the providers and the users. The services provided in the SLA by the providers are not consistent and satisfiable for the consumers. The environment like a cloud, the quality of service is said to be a very important parameter. In order to reduce the inconsistency of SLA it proposes Trust Based Cloud Service Provider Selection which provides the scalable and reliable cloud service providers to the consumers. In the proposed work the trust value is estimated with the interaction between the users and the providers. With the help of the ratings provided to the cloud service providers’ by the users, the trustworthiness is estimated by confidence level, which is determined by the recent interaction and the interaction intensity. The competence is estimated by the parameters like security, availability, policies provided by the providers to the users. The trustworthiness and competence are combined to find the cloud service providers of user needs and the performance is estimated.
Automatic Mathematical and Chronological Prediction in Smartphone Keyboard
G. Indrajith, K.Vijayakumar
Artificial intelligence is the mechanism which makes human work very easy by making the devices to process from the perspective of a human being. Predictive text is a feature in smart phones, which runs on Operating Systems such as iOS, Android, Windows etc. This feature plays a major role in helping the individual to select the word that succeeds the current word of their text message or statement. In the proposed system, the concept of predictive mechanism is taken to the next level by predicting mathematicalsolutions and chronological data. Thus, the system automatically does the mathematical calculations in the middle of a chat, without making the user switch to the calculator application; and also finds chronological data such as date and day, without having to switch to the calendar application.
Spoofing Attack Detection And Localization In Wireless Networks
V Jagadheeswar Reddy , M.Nirmala
Abstract: Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. In this paper, we propose to use spatial information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for (1) detecting spoofing attacks; (2) determining the number of attackers when multiple adversaries masquerading as a same node identity; and (3) localizing multiple adversaries. We propose to use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. We then formulate the problem of determining the number of attackers as a multi-class detection problem. Cluster-based mechanisms are developed to determine the number of attackers. When the training data is available, we explore using Support Vector Machines (SVM) method to further improve the accuracy of determining the number of attackers. In addition, we developed an integrated detection and localization system that can localize the positions of multiple attackers. We evaluated our techniques through two test beds using both an 802.11 (WiFi) network and an 802.15.4 (ZigBee) network in two real office buildings. Our experimental results show that our proposed methods can achieve over 90% Hit Rate and Precision when determining the number of attackers. Our localization results using a representative set of algorithms provide strong evidence of high accuracy of localizing multiple adversaries.
Presently in the system patient need to contact a doctor and take an appointment is possible only if patient goes to that particular doctor’s clinic. Even the people can’t get the correct information about doctors, their details and different hospitals available in a particular city. The only way to get all these are through directly contacting particular persons personally and it’s a very big problem for a person new to that city. Those who want to have some information in the medical field or wants to get appointment to particular doctor from his own place are not possible.
Nowadays in order to get correct information and right treatment for a patient has to go by him wherever needed. This is a lengthy process, which takes a lot of time to design manually, and also costs more and even limited to certain extent. It’s not possible to get all the information or details as well as we can’t satisfy the user through this process.
So, this “E-Clinic” website will provide all the information regarding different types of therapy available in clinic and patient can easily book the appointment.
Implementing Campus Indoor Location Tracking System
S.Neelakandan1 , S.Muthukumaran2, R.Annamalai3
Digital electronic maps are used to track the location in outdoor and indoor environment. Most of electronic maps are useful for outdoor environment. There is no efficiency technology for search the indoor location. Many smart-phones are used to track the location by electronic map. The electronic maps may be the Google map, GPS navigation, waze and offline GPS maps. These are only useful for outdoor environment. Indoor based location tracking system can be implemented by using the Indoor Atlas Android SDK. It provides an API for developers to create application for inside building navigation. This app also useful for vision it have impaired people because the speech recognition for searched location and also include the event details in indoor based location tracking application. Using this app to find the shortest path for desired location.
Introducing automated system for Lung Cancer Detection using Evolutionary Approach
Manasee Kurkure, Anuradha Thakare
Cancer is one of the most commonly affected diseases in the developed countries. Early diagnosis plays a significant role in curing cancer patients. Every year, thousands of people die due to Lung cancer. In this paper, a novel Candidate group search algorithm based on evolutionary approach is proposed. This optimization algorithm allows assistant doctors to identify the nodules present in the lungs at the early stages. As manual interpretations are time consuming and very critical. Genetic algorithm (GA) helps in identifying genes that help to classify patient lung cancer status with notable predictive performance
Akshay M R, Arun Kumar S G Bhimappa Baragundi Harshavardhan M, 2Dr. Rehna VJ
Design of a Smart Low Cost Mini Ups for PC’s
Akshay M R, Arun Kumar S G Bhimappa Baragundi Harshavardhan M, 2Dr. Rehna VJ
Digital equipment such as telecommunication, computers systems and instruments use microprocessors that operate at high frequencies allowing them to carry billions of operations per second. A disturbance in the electrical supply lasting just a few milliseconds can affect millions of basic operations. The result may be malfunctioning and loss of data with dangerous or costly consequences (e.g. loss of production). That is why many loads, called sensitive or critical loads, require a supply that is protected. Many manufacturers of sensitive equipment specify very strict tolerances, much stricter than those in the distribution system for the supply of their equipment, one example being Computer Business Equipment Manufacturer’s Association for computer equipment against distribution system disturbances. The design of this uninterrupted power supply (UPS) for personal computer (PC) is necessitated due to a need for enhanced portability in the design of personal computer desktop workstations. Apart from its original functionality as a backup source of power, this design incorporates the unit within the system unit casing, thereby reducing the number of system components available. Also, the embedding of this unit removes the untidiness of connecting wires and makes the whole computer act like a laptop. Not to be left out is the choice of Arduino as an important part of the circuitry. This has eliminated the weight and space-consuming components that make up an original design. The singular use of this Arduino places the UPS under the class of an advanced technology device.