Seamless Access Internet using Wi fi in Dynamic Vehicles
Kiruthika A.M Chandra Sekran .S
In wireless communication, the connections will be either unstable or dynamic. Hence the connections will be easily disturbed by the interrupts like noise. Now-a-days mobile networks provide the internet connections with expensive cost. Cellular networks suffer from offloading and overloading problem due to the explosive growth of mobile users in moving vehicles. WIFI technology is used to provide the efficient internet connectivity for the moving vehicles. WIFI technology has some advantages compared with the cellular networks, such as, low cost and high peak throughput. To avoid the offloading problem and delays in the internet access over moving vehicles, the access point diversity technique is used. For example multiple access points can be fixed in the road side. When the client can enters that environment, it can communicate with the group of access point through the up link. Each access point may have different ranges. So, when the client is moving from one access point to another access point, the delays may be occurred due to the hand off technique. Hence the virtual access point is created in order to avoid the delays. Virtual access point is the one, in which all the access points are configured with the same MAC and IP address. If the transmission is succeed access point send the information to the client through the multi cast communication. Then the access points dynamically follow the client and deliver the packets.
Cloud computing is the developing computer paradigm, where data owners can remotely store and modify their data on the premise of pay-as-use manner and enjoy on demand high-quality applications. The fundamental service provided by the Cloud is Data Storage which makes it a primary source for customers to utilize cloud for online data store and share. As it requires low maintenance it provides an economical and efficient solution for sharing group resource among cloud users .But, sharing data in a multi-owner manner while preserving data and identity privacy from an untrusted cloud is still a challenging issue, due to the frequent change of the membership in the multi owner group. To preserve data privacy, a basic solution is to encrypt data files, and then upload the encrypted data into the cloud. Existing solutions usually apply cryptographic methods by disclosing data decryption keys only to authorized users which was a very tedious work. To resolve this problem recently the best efficient method MONA presented for secured multi owner data sharing for dynamic groups in the cloud has been proposed in which a group signature is used so that the revoked member is not able to upload or download files .By including group signature and stateless broadcast encryption techniques, any cloud user can anonymously share data with others .Meanwhile, the storage overhead, length of the signature and the running time of the signing algorithm are independent with the number of group members.
The Human Genome Project: An Insight to the Homo Sapiens
Neda Firoz .
We are now living in the 21st century, where we know technology has revolutionised the way of living of human life to so much so that we are now looking forward to be technologically dependent enough to do even small tasks of simple life, to complex issues of human beings. The human genome project enhances the capabilities of human beings, towards a new era where we may have possibilities of tracing even the deadliest diseases and even dealing with it. In this paper, the human genome project is being explored to make assumptions of further researches and how far the issues of healthy human society could be established is estimated. The idea is to allow the experts reflect upon the intricate progressions of science into practices of genes, and improve tools that can map genes, with the simulation of information technology. Among the main goals of the Human Genome Project (HGP) was to develop new, better and cheaper tools to identify new genes and to understand their function
Ruhin Mary Saji, Drishya Gopakumar , Harish Kumar S , K N Mohammed Sayed Lakshmi s
A Survey on Smart Garbage Management in Cities using IoT
Ruhin Mary Saji, Drishya Gopakumar , Harish Kumar S , K N Mohammed Sayed Lakshmi s
As the population is increasing day by day, the environment should be clean and hygienic. In most of the cities the overflowed garbage bins are creating an unhygienic environment. This will further lead to the arise of different types of unnamed diseases. This will degrade the standard of living. To overcome these situations an efficient smart garbage management method has to be developed. As the scope of IoT is developing day by day effective methods can be found out easily. Various designs were proposed and have advantages as well as disadvantages. This paper is a survey based on Smart Garbage Management in Cities using IoT. This survey involves various smart garbage management ideas that can be easily implemented.
This project introduces a practical timetabling algorithm capable of taking care of both strong and weak constraints effectively, used in an automated timetabling system. So that each teacher and student can view their timetable once they are finalized for a given semester but they can’t edit them. Timetable Generation System generates timetable for each class and teacher, in keeping with the availability calendar of teachers, availability and capacity of physical resources (such as classrooms, laboratories and computer room) and rules applicable at different classes, semesters, teachers and subjects level. Even though most college administrative work has been computerized, the lecture timetable scheduling is still mostly done manually due to its inherent difficulties. The manual lecture-timetable scheduling demands considerable time and efforts. The lecture-timetable scheduling is a Constraint satisfaction problem in which we find a solution that satisfies the given set of constraints. A college timetable is a temporal arrangement of a set of lectures and classrooms in which all given constraints are satisfied. Creating such timetables manually is complex and time-consuming process. By automating this process with computer assisted timetable generator can save a lot of precious time of administrators who are involved in creating and managing course timetables.
Adaptive Video Streaming Through Server Driven Rate Control In Manets
Yaddula Vijay Babu , R.Raja Sekhar
The IEEE 802.11standard is developed and gained unprecedented popularity for its simple and cost-effective wireless technology to provide best effort services. But, it has to address serious challenges concerned to multimedia services. Quality of Service (QOS) is one of the most prominent among them. The tradeoff between the video quality and the streaming performance is eliminated by the quality driven rate controller’s. They treat all the users alike but, where in practical it cannot be. The educational videos must be of more video quality than that of the video news, where video streaming must be more. To address the problem the proposedEquity Enhanced Distributed Channel Access (EEDCA) prioritizes the traffic according to their type and also focus on providing the Quality of Service (QOS) of a Mobile Adhoc Network (MANET) to equally distribute the resources among all the nodes to gratify the users.
An Approach of Handling Packet Loss for Delay Sensitive Video Streaming in MANETs
Y.MD.Inayathulla, R. Raja Sekhar
Wireless communication networks became ubiquitous. Mobile ad hoc networks (MANETs) have become an exactly right option that can be chosen for on-demand infrastructure less communications. Besides the enhancements in Mobile ad hoc networks (MANETs) communications, more research can be done on these networks, if they have to be used for video streaming. The reason behind this is that, the Mobile ad hoc networks (MANETs) devices are resource constrained and thus efficient methods to support multimedia communications supporting video streaming is a defiance problem. This is because videos are delay sensitive and thus good quality streaming is inevitable. In the proposed work we use AODV protocol and an idea of Dynamic congestion detection and routing. In this work we define Signal to noise ratio threshold at nodes in all the previously visited paths from source to destination in order to identify the congestion level at the nodes dynamically and construct an optimal path for the transmission of video packets in Mobile ad hoc networks (MANETs) . This decreases the traffic which occurs due to multiple feedback messages from nodes in the network. Hence this approach decreases the loss of packets and this leads to the improvement in the performance.
Improved LEACH Routing Communication Protocol for Wireless Sensor Network
Mankita, Er. Paramjeet Singh, Er. Shaveta Rani
WSN (wireless sensor network) consists of thousands of sensor nodes which have limited energy, memory, and computation capability. In some of extreme environment, it becomes difficult to replace the sensor nodes once they used up the resources. Therefore, many researchers in this field focus on how to design an efficient routing protocol to prolong the life span of the network. The hierarchical protocols such as LEACH and LEACH-C have better performance in saving the energy consumption. However, neglecting the choosing formula of CHs and non-CHs makes the consumption of too much energysH. In order to reduce the energy consumption, we improve the tradition method used for selecting cluster heads. Meanwhile, we establish a vice cluster head for each cluster to reduce the energy consumption and prolong the lifetime. Hence, simulations show that our improved protocol performs better than the LEACH and the LEACH-C.
Maximum Power Point Tracking Using DRCC and MRAC With Modified Mit Rules For PV Cells
K.SriRakavi ,N.Muthumohanraj
This paper is about improving the maximum power point tracking by using the Discrete time Ripple Correlation Control and Model Reference Adaptive Control with MIT rules. MPPT technologies have been used in photo-voltaic systems to deliver the maximum power output to the load under changes of solar insolation and solar panel’s temperature. Where as in the existing models combined feature of ripple correlation control (RCC), and the model reference adaptive control (MRAC) are used in Photovoltaic systems to reduce pertabations.This paper includes the improved version of both RCC and MRAC ,a model two layer architecture which provides promising increase in tracking efficiency and accuracy. The performance of the pro-posed technique was observed and developed by MATLAB/simulink software.
Preventive Measurement and Online Insulation Evaluation of Power Transformer
T.Saranya. ,R.Dheivanai
Cellulose based non conducting materials and mineral oils have widely been used in liquid filled transformers. Environmental and fire-safety concerns have accelerated the use of Natural Esters (NE) as a sustainable alternative to mineral oil. To ensure a safe and long-term operation of the vegetable oil filled transformers, it is need to clarify the knowledge gaps with respect to the ageing of vegetable oil impregnated cellulose and insulation diagnostic methods. The condition monitoring of mineral oil filled transformers has been well characterised, due to the numerous laboratory and field studies conducted during the past several decades. The application of these available condition monitoring techniques for NE filled transformers is yet to be validated as the use of NE for power transformers is in the tested stage. In this paper the performance of NE as insulation in transformers by evaluating the ageing of NE impregnated cellulose pressboard is presented. For this purpose, an accelerated ageing experiment has been carried out in sealed tubes at 120 ⁰C. The ageing of oil impregnated pressboard has been characterised by decrease in the degree of polymerisation (DP) of pressboard, and the formation of both 2-furfuraldehyde and dissolved carbon dioxide (CO2) in the oil. The structural changes of cellulose have been supported by fuzzy logic algorithm. Moreover, the results have been compared with cellulose insulation samples aged under similar conditions in conventional mineral oil.
Scalability Study of Hadoop MapReduce and Hive in Big Data Analytics
Khadija Jabeen , Dr TSS Balaji
Hadoop is a data management solution for the analysis of Big Data. In Hadoop, Hive is used to store the metadata. This study compares the scalability of Hadoop MapReduce and Hive for small and medium datasets besides showing how the metadata can be created, loaded, accessed and stored using Hive – a data warehousing solution built on top of Hadoop. To make the comparison of scalabilities Hadoop MapReduce and Hive, a word count program was investigated using two data management solutions- Hadoop MapReduce and Hive. This comparison demonstrates that the Hadoop MapReduce programming model is very low level and it will make the developers write custom programs which are hard to maintain and reuse, where as Hive uses an SQL-like query language called HiveQL to store large amounts of data consuming less time and also plugs in the Map Reduce scripts into queries
Data Deduplication in Parallel Mining of Frequent Item sets using MapReduce
Pavithra.K .
A Parallel Frequent Item sets mining algorithm called FiDoop using MapReduce programming model. FiDoop includes the frequent items ultrametric tree(FIU-tree), in that three MapReduce jobs are applied to complete the mining task. The scalability problem has been addressed bythe implementation of a handful of FP-growth-like parallelFIM algorithms. InFiDoop, the mappers independently and concurrently decompose item sets; the reducers perform combination operationsby constructing small ultrametric trees as well as miningthese trees in parallel. Data Deduplication is one of important data compression method for erasing duplicate copies of repeating data and reduce the amount of storage space and save bandwidth.The technique is used to improve storage space utilization and can also be applied to reduce the number of bytes. The first MapReduce job discovers all frequent items, the second MapReduce job scans the database to generate k-item sets by removing infrequent items, and the third MapReduce job complicated one to constructs k-FIU-tree and mines all frequent k-item sets.
In this paper, we applying Deduplication technique in third MapReduce job to avoid the replication of data in frequent item sets and improve the performance. It produces highly related mining results with less time and increase the storage capacity. Hadoop supports nine different tools, while Mahout is based on core algorithm and classifications. Having sequence algorithm to produce the output in better way. We aim to implement recommendation algorithm using Mahout, a machine learning device, on Hadoop platform to provide a scalable system for processing large data sets efficiently. This can be performed on such platforms for quicker performance.
Parikh matrix on the Context-Free Grammar for Natural Languages
Amrita Bhattacharjee ,Bipul Syam Purkayastha
In this paper Parikh Matrices over context-free languages are investigated. Context-free grammars for Natural languages are a developing area of investigation. Parikh matrix is a significant tool of Formal languages. Context-free language is a kind of formal language. Parikh matrix can be used in context-free language. A context-free grammar for Bengali language is also a developing area of investigation. As a case study in this paper Bengali letters, Bengali words and Bengali sentences are studied by using Parikh matrix.
Introduction of adamantine problem for environment is pollution that causes fickleness, instability, hard or disquiet to ecosystem. Now days, there are a number of techniques, which are used for the collection and management of the garbage. Zigbee and GSM technologies are not only latest trends but also one of the best combinations to use in the project. Set of carefully chosen sensors to monitor the status of garbage bin. The smart garbage bin consist sensors namely ultrasonic sensor, gas sensor and moisture sensor. Ultrasonic Sensor is used for detect the garbage level. The ultrasonic sensor is placed inside the garbage bin at lead position, gas sensor will sense the toxic gases and moisture sensor will sense moist in bin then that indication will give to PIC micro-controller. The controller will give indication to the cleaning authority and needs urgent attention. The Pic-micro-controller will indication by sending SMS using GSM technology. These Dustbins are interfaced with the central system showing status of garbage in Dustbin on GUI.
Enhancing the Performance of AODV by Exchanging Neighboring Node Information with Hello Packets in VANET
Shubham Mittal, Swati Singh, Kamlesh C. Purohit
Today's developing innovation of wireless communication is a Vehicular Ad-hoc Network (VANET). VANET is an instance of MANET in which the foundation of wireless scenario is done between vehicles-vehicles and vehicles-roadside Unit (RSU) [12]. Mobile nodes in VANET are considered as quick moving vehicles because of which the topology turns out to be very dynamic in nature, which makes it exceedingly supportable for analyzing the security measures for drivers and travelers if there should be an occurrence of any perilous circumstance. AODV is a reactive routing protocol, which has critical influence in the route discovery from source to destination. In this paper, we have acquainted an enhanced strategy with lessening the overhead of control messages from the network by sharing the information through HELLO messages, and expansion the execution of AODV in VANET environment
Trust Factor Based Secure Congestion Control For Vanet
Shanty Bala , Dr. Vijay Laxmi
Weight-based clustering algorithm in ad hoc network is an on demand clustering algorithm for multi-hop packet radio network. These types of networks are ad hoc networks and dynamic in nature due to mobility of nodes. Clustering in mobile ad hoc network can be defined as various partitions into various groups. It is an important concept of VANNET, because clustering makes it possible to guarantee of system performance, such as throughput delay and also security issues. So in the algorithm they select the cluster head whose performance is well and formation of cluster in ad hoc network. The cluster head is elected based on weight factor, so it is called weighted clustering algorithm. Weighted clustering algorithm is basically appropriate cluster selection in wireless adhoc network where it is necessary to provide robustness in face of topological changes caused by node motion, node failure and node insertion or node removal. The WCA select the cluster head which has lowest weight among the nodes and some other factor also consider the election for cluster head. The cluster head, form a dominant set in the network, determine the topology and its stability. The weighted clustering algorithm takes into consideration the ideal degree, transmission power, mobility and battery power of nodes. Traffic efficiency applications are becoming increasingly popular over the road networks in the last few years. This type of applications aims mainly at increasing the traffic fluency over the road network, which minimizes the travel time of each vehicle towards its targeted destinations. The Vehicular Ad-Hoc Networks (VANETs) technology has been utilized to design these applications. Communications between vehicles, V2V, and between vehicles and installed Road Side Units (RSUs), V2I, helped designing these applications. Malicious, selfish and intruder drivers can take advantages of other cooperative drivers and use their trust. a Secure Congestion control protocol. This protocol aims to guarantee integrity and authenticity of transmitted data. It is designed to provide the security requirements of traffic efficiency protocols that have been proposed using the technology of VANETs. SCOOL also aims to preserve the privacy of the cooperative vehicles and drivers. The main contribution of work is new strategy for clustering a wireless ad hoc network and improvement in WCA. Author derived a simple stability model and a load balancing clustering scheme. They showed that the algorithm outperform in term of cluster formation and stability. Main idea of approach is to avoid cluster re-election and reduce the computation and communication cost. The improved weighted clustering algorithm, the goals of algorithm are maintaining stable clustering structure, minimizing the overhead for clustering set up, maximize lifetime of nodes in the system and achieving good performance.
Map Reduce Framework Driven Apriori Algorithm Base Model of Opinion Mining for drug Review
R.Rajesh, B.Raghu Ram B.Hanmanthu, Dr.P.Niranjan
Big data which is modern buzz word of computer science society is showing its presence in almost all the trades including medical domain. The mounting trend of blogging the opinions and feedbacks of used drug is turned to be good tool for researchers and patients to take confirmation of advantageous and disadvantageous about the consumption of drugs. The data extracted from blogs about various drugs and symptoms is a huge and turned to be a big data. So extracting use full information forma such data is a challenging task to data mining research community. Applying opinion mining concepts on map reduce frame work for drug review can lead to a useful platform to extract and answer needs of research community. We propose a map reduce framework driven apriori base model form retrieving information about various drugs and symptoms. The proposed work is extension to our previous work [1] on opinion mining of drug reviews. The proposed model is tested on WebMD blog reviews which shown the good results.
Cloud computing has make the conceptual and structural basis for tomorrow’s computing. The World computing structure is rapidly moving towards cloud based architecture. While it is important to take advantages of could based computing by means of moving it in diversified sectors, the security aspects in a cloud based computing environment is most important. Cloud based services and service providers are being evolved which has resulted in a new business trend based on cloud technology. With the introduction of large number of cloud based services and geographically differ cloud service providers, sensitive information of different entities are normally stored in remote servers and locations with the possibilities of being exposed to unauthorized access in situations where the cloud servers storing those information are compromised. If security is not strong and consistent, the flexibility and advantages that cloud computing has to offer will have little credibility. In this paper security in cloud computing is elaborated in a way that covers security issues, concerns and challenges for Data Security in Cloud.This paper presents a review on the cloud computing concepts as well as security issues inherent within the context of cloud computing and cloud structure.
Improving the Reverse Dictionary Using Scalable Dataset
Mrs. R. Carolene Praveena, Mrs. A. Manjula
A reverse dictionary takes a user input phrase describing the desired concept, and returns a set of candidate words that satisfy the input phrase. The user entered phrase need not necessarily be the same as in the definition, therefore it is implemented in such a way that the concept of the user input will be considered and corresponding words will be obtained as the outcome. The experimental results show that the proposed approach provides significantly higher quality than existing reverse dictionaries.
Investigation on Super Lift DC/AC Inverters Using Photovoltaic Energy for AC Component Application
Mr.A.Johny renoald , M.Dhivya B.E
The solar photovoltaic has the advantage of direct conversion of sunlight to electricity and also suitable for most of the regions therefore it is highly preferred when compared to other renewable energy sources. So the PV energy is considered as the source for the voltage lift technique. Voltage lift technique is a popular method wildly used in electronic circuit design. It has been successfully employed in dc-dc converter application in recent years and opened a way to design high voltage converters. However the voltage increases stage by stage along arithmetic progression. When compared with MLI where the harmonic content deteriorate as the number of levels increases, the super-lift dc-ac converter can reduce the harmonics with reduced number of levels and reduced devices. In the proposed super-lift dc to ac inverter the output increases stage by stage
A Survey on Efficient Broadcast Protocol for the Internet of Things
Anusree Radhakrishnan Minu Lalitha Madhav
Internet of Things is a collection of entities which can be physical devices, animals, people ,electronic devices etc. If they are connected through a network they can exchange data without any human - human or human - computer interaction. 2011 hype cycle says that there is IoT for more than 10 years .So the need of an efficient protocol is of greater importance. Analysis says that there will be 20 billion connected devices in the year 2020. So these devices should be connected so that we can call them as smart devices. IoT can be imagined as a wireless network IoT(T,n) in which T denotes the communicating entities in the network and n denotes the data that is to be distributed in between them. The importance of routing in IoT is that each information should be distributed to corresponding devices in the network .This paper is a survey on different protocols through which we can implement the IoT concepts
A Paper On Edge Detection In Images Using Fuzzy K Means Clustering Approach
R.Dhivya, R.Prakash, R.Thilepa
Edge Detection plays a major role in Image processing applications. K means clustering using fuzzy logic is a technique which produces high quality images. There are existences of many edge detection methods. Among these this approach using Fuzzy logic elevates the performance in the output for Gray scale images. The features considered for edge detection are Mean, Standard Deviation, Entropy and image gradient. Using these features the image quality has been improved by this Fuzzy K means Clustering approach.
Clustering on uncertain data, one of the essential tasks in mining uncertain data, posts significant challenges on both modeling similarity between uncertain objects and developing efficient computational methods. The previous methods extend traditional partitioning clustering methods like k-means and density-based clustering methods like DBSCAN to uncertain data, thus rely on geometric distances between objects. Such methods cannot handle uncertain objects that are geometrically indistinguishable, such as products with the same mean but very different variances in customer ratings. Surprisingly, probability distributions, which are essential characteristics of uncertain objects, have not been considered in measuring similarity between uncertain objects. In this project, we systematically model uncertain objects in both continuous and discrete domains, where an uncertain object is modeled as a continuous and discrete random variable, respectively. We use the well-known Kullback-Leibler divergence to measure similarity between uncertain objects in both the continuous and discrete cases, and integrate it into partitioning and density-based clustering methods to cluster uncertain objects.
Prediction of post overload fatigue crack growth life of HSLA steel under mixed-mode (I and II) spike overload by using genetic programming
J. R. Mohanty .
In the present investigation, fatigue crack growth tests under mixed-mode (I and II) overload have been conducted on HSLA steel and subsequently genetic programming has been applied to predict post overload fatigue life. It is observed that the proposed model predicts fatigue life of HSLA steel with reasonable accuracy.
Mahaling G. Salimath Pavana S. Baligar, Sharada K. S Rajeshwari Banni
Secure Data Retrieval Of Attribute Based Encryption Policy System
Mahaling G. Salimath Pavana S. Baligar, Sharada K. S Rajeshwari Banni
In networking aggressive environment Disruption Tolerant Networking (DTN) method is widely used advances are broadly used in hostile environments for successful wireless communications. Applying ABE to DTN presents a few issues like Key revocation (or upgrade), Key escrow issue and Coordination of attributes issued from distinctive authorities. The CP-ABE gives a multiauthority scheme to secure information retrieval in decentralized DTNs where every secret key of an end user can be redesigned separately and instantly. Consequently the scalability and security can be enhanced in the proposed system.
Satyajeet Bankar,Krushna Barve Rohit Dusane,Tejas Desale
Review on Mining High Utility Patterns Decreasing Candidates
Satyajeet Bankar,Krushna Barve Rohit Dusane,Tejas Desale
Utility mining is a latest development of data mining technology. Among utility mining issues, utility mining with the item set share structure is a hard one as no anti-monotonicity property hold swith the interestingness measure.Prior work son this problem all use a two-phase,candidate generation approach with one exception that is however in efficient and not scalable with big databases.This paper plan sa novel algorithm that find shigh utility patterns in a single phase with out generating candidate
Prachi D.Bhuskat Priya G. Babhulkar Jay R. jayjethawa, .Ruchi M.Iche
Plastic Flexible Memory Chip Devices
Prachi D.Bhuskat Priya G. Babhulkar Jay R. jayjethawa, .Ruchi M.Iche
A lines of advances in organic memory technology is demonstrated that enable an entirely new low-cost memory technology. Inventors incorporate these advances with the one of the most flexible material PLASTIC. This novel memory technology can be utilized in a 3D onetime-programmable storage array. Without the prohibitive costs of silicon processing, this memory is able of setting cost points several orders of magnitude lower than their inorganic counterparts. They have also progressively integrated this technology onto flexible plastic substrates. Combined with stacking, these vertical memory elements can create read only memory densities denser than many inorganic memories, at a fraction of the cost. A conducting plastic has the potential to put into a mega bit of data in a millimetre-square device-10 times denser than current magnetic memories. This system is cheapand fast, but cannot be rewritten, so would only be suitable for permanent storage. The system sandwiches a blob of a conducting polymer called PEDOT and a silicon diode between perpendicular connection. The key to the new technology was discovered by passing high current through PEDOT (Polyethylenedioxythiophene) which converts it into an insulator, rather like blowing a fuse .The polymer hastwo possible states conductor and insulator, that form the one and zero, necessary to put into digital data
Software Reliability Testing Tools: An Overview and Comparison
Manohar Singh .
Software reliability has been regarded as major quality attribute and still there are very few available standardized tools. Software reliability is such a significant factor in finalizing the overall quality of software, thus it must be estimated. In this paper we will discuss various software reliability metrics. A well designed metrics can helps in detection and correction of requirement faults that will guide in avoidance of error in later stage of software development. A software reliability growth model is one of the basic techniques used to evaluate the software reliability quantitatively. The software growth model is required to have a significant performance in term of goodness of fit, reliability etc. In this paper we will summarize some existing software reliability tools such as CASRE, SMERFS, SOFTREL, SOREL etc. Overall the paper will provide various ways to enhance software reliability.
Saniya Taskeen, Inchara.K Rumana Sadiya, Mohammed Elahi
An Approach of Computer Simulator for Integrating with Radar Data Encoder by using Basic Platforms
Saniya Taskeen, Inchara.K Rumana Sadiya, Mohammed Elahi
Radar (Radio Detection And Ranging) is an object – detection system that uses radio waves to determine the range, angle or Velocity of objects. It can be used to detect aircraft, ships, guide missiles, motor vehicles, weather formations and terrain. In addition, the radar system can also guide the missile towards the hostile target which is called the GUIDANCE RADAR.In this radar, the hostile target continuously tracked with the minimum error variance and accordingly the data is presented to the battery control officer for launching the missiles. After the launch, the encoded commands are transmitted from radar to guide the missile towards target. The Computer is the heart of Radar system which computes schedules and synchronizes all the system for the radar processing. It guides the missile based on the target and missile data which is then forwarded for Radar Data Encoder (RDE). RDE mainly encodes the data coming out from the computer and then converts the received data in a particular required format and then sends the converted data to Power Module. In this project, the implementation of RDE is carried on a cyclone –V-FPGA board and along the RC simulator is developed to validate the stand alone RDE unit.
Gouri Ajeev , Karthik Karunakaran Arpita Gaur, Priya G
Review on Security Management in Cloud computing
Gouri Ajeev , Karthik Karunakaran Arpita Gaur, Priya G
The basic ideas involving cloud computing were first came into picture in 1960, when John McCarthy stated that "computation may someday be organized as a public utility". But the concept of Cloud computing started drawing attention of the IT world until recently. It is changing the focus of enterprises. It has become a part of normal work flow for thousands of users on the internet. Cloud computing gained attention due to many of its salient features such as reduced storage cost, ‘pay per use’ policy, the growing technology of visualization, SOA (Service Oriented Architecture) and also because of development in internet security. Cloud security is one of the major challenges in cloud computing. This paper focuses on various cloud security issues and methods to enhance the security of data storage and processing in the clod environment. The definition of cloud computing and some of its features are also discussed in this paper.
A Survey on Privacy Protected Facial Biometric Verification
Parvathy R , Dhanya Sreedharan .
Today the use of security cameras or the surveillance cameras has been increased dramatically. Why because the cameras and networks become cheaper and also these cameras provide a feasible amount of security to the society. But the important thing is that the system should achieve two goals: it should perform face recognition for the security purpose and also the system should provide privacy protection for the individuals who are captured in those cameras. In simple words their face image should not browse without permission or it cannot be misused for any other purpose. Many solutions have been proposed to achieve these two in a surveillance system. The first solution was cryptographic encryption and later face scrambling has been proposed. In this paper we discuss about different techniques used for the privacy protection as well as face recognition and also a comparison between these methods are performed to evaluate these techniques.
With the advent of searching technologies becoming more and more efficient day by day it has become impertinent to apply the same on audio. Often times we require search results which if in audio format makes more sense. Our existing algorithms use waveforms to search on audio which requires indexing of all audio files or the audio file is matched via the names of the file itself and pertaining metadata about the file. In order to make real and real-time searching on the audio files possible we use this methodology. This paper merely outlines a possible way of searching for the content of the audio files. We do this by converting the audio to text and then search on the text itself thus giving better results. In this paper we review on the previous works and provide a rough guideline how this can be achieved.
Ajin P Thomas, Sruthi P.S,Jerry Rachel Jaco,Vandana V Nair,Reeba R
A Survey on Secret Data Transmission Using Various Steganographic Aspects
Ajin P Thomas, Sruthi P.S,Jerry Rachel Jaco,Vandana V Nair,Reeba R
The security of Transmission of data becomes a huge issue in information and communication Technology. So ,to ensure the security of data during transmission, Two major techniques are adopted. They are Cryptography and Steganography. In these, the input data is encrypted using encryption algorithms and embedded into carrier image then transmitted through a communication channel, at the receiver side, data decrypted using data decryption algorithms is restored with error free. We are conducting a survey in this paper based on different steganographic and cryptographic methods for Data security.
Coal mines are the great source of good for which we are highly dependent. It plays a vital role for the development of growth of nation. Here in this paper we are focusing over the safety prerequisite for the coal mines. As we know that now a day’s Wireless sensor networks (WSN) and the Modern Artificial Intelligence technique are good at security monitoring in coal mine. It is able to rapidly detect diverse parameters, which can reduce human and material losses. The Coal mine pivotal parameters include Dust Density (Dust), Temperature (Temp), Wind Speed (WindS), Gas Density (GasD) and Carbonic Oxide Density (COD). It is the most vital area of modern society which requires a proper safety prerequisite for mining. The data collected by the sensors are sent to the sink node to be processed with information fusion technology. This work presents a strategy for the classification of coal mine status based on sensed data by WSN and the use of unsupervised neural network-the Self-Organizing Map (SOM). The SOM application classifies the coal mine environment into four clusters. An experiment confirms the effectiveness of the proposed approach.
Implementation of Solar Power Ac Motor Pump Set on MPPT With Battery Backup For Agriculture System
S.Kalasathya , P.Sathish Khanna
Solar water pumping systems are a modern but field proven means of pumping water in locations where access to grid power is not available, or where the grid is not reliable. These systems use photovoltaic (PV) cells to convert sunlight into electricity to power DC pumps which can be used to pump groundwater or surface water.This system provide the power at all time even at cloudy days.To increase the efficient irrigation in agriculture.This system to achieve dc supply to ac supply which can be used for pumping application. Dc-Dc Buck boost converter used in pumping system is to stabilize the voltage for induction motor. The buck boost converter is used to stepup and stepdown the input voltage. A solar photovoltaic water pumping system (SPWPS) consists of PV array, motor-pump set, associated electronics and an On/OFF switch.
Dr.G.Kavitha, M.Agalya AP,S.Gayathri AP,S.K.Murugaraja AP
Distortion-Resistant Routing Framework for Video Traffic in Wireless Networks
Dr.G.Kavitha, M.Agalya AP,S.Gayathri AP,S.K.Murugaraja AP
Traditional routing metrics designed for wireless networks are application-agnostic. In this paper, we consider a wireless network where the application flows consist of video traffic. From a user perspective, reducing the level of video distortion is critical. Popular link-quality-based routing metrics do not account for dependence across the links of a path; as a result, they can cause video flows to converge onto a few paths that cause high video distortion. To account for the evolution of the video frame loss process, we construct an analytical framework .The framework allows us to formulate a routing policy for minimizing distortion, based on which we design a protocol for routing video traffic. We find via simulations and test bed experiments that our protocol is efficient in reducing video distortion and minimizing the user experience degradation.
Mining process plays the vital role in the modern era for the development of nation as well as the world wide. By using the mining only we can now a day’s having so many essential goods what we are using everywhere[2]. If we take the case of coal, then it is the most important product through which all the byproduct we are getting like fuel, wax, plastic, peat etc. In this paper purpose was to provide an implementable design scenario for underground coal mines using Artificial intelligence technique along with wireless sensor networks (WSNs)[1]. The main reason being that given the intricacies in the physical structure of a coal mine, only low power WSN nodes can produce accurate surveillance and accident detection data[4,6]. Because of the rapid growth of accident in mines area like roof fall, explosion, etc, the development of intelligent sensors, microcontrollers, and network technology, became essential; so as to make a reliable condition for our automatic real-time monitoring of coal mine[2]. The underground system collects temperature, humidity and methane values of coal mine through these intelligent sensor nodes in the mine, and provide the necessary safety prerequisite to avoid accidents.
The Artificial Intelligence is the modern era technology which plays a vital role in the modern engineering by using which we can enhance the technology. It not only influence the technology but also it provides a wide range of sophisticated paths for the humans to put his thoughts in terms of machine intelligence. The major factor lies in the Human learning is the decision taking ability is poor. So we are moving towards the Machine and to make a machine more interactive, we think for intelligence.
A survey paper on logical perspective to manage BigData with incremental map reduce
Snehal Dhamelia A.P.Kankale
Big Data is a collection of a huge and complex data that it becomes extremely drab to seize, store, process, reclaim and inspect it with the help of on hand database management tools or traditional data processing techniques. Now a day, data is constantly evolving and becomes a big data. The data is being generated from different sources – undertaking, social media, sensors, digital images, video, audio and clickstreams for domains together with healthcare, retail, energy and utilities. It is intended to scale up from single server to thousands of machines, each offering local computations and storage Big data with 3 V’s: volume, variety and velocity. For processing such big volume of data, variety of data and the data with high velocity and having high storage capacity, we introduced Hadoop which is evolved day by day. We used MapReduce at this point as a programming model. In this paper we worn Incremental MapReduce most extensively used framework for processing big data. To improve the time of processing big data and optimizing data content of big data we applied PageRank and k-means iteratively along with MapReduce. Therefore to process big data incremental MapReduce approach is used. Incremental MapReduce 1) performs key-value pair level incremental processing, 2) supports complicated duplication computation, which is widely used in data mining applications. That means incremental MapReduce processes big data in a less time and stores it in a more optimized form.
Kunal Sanghvi, Chetan Kumar, Aditya Trikha, Prof. Priya G
Trust Mechanism in E-Commerce
Kunal Sanghvi, Chetan Kumar, Aditya Trikha, Prof. Priya G
The new and eruptive dimension in consumerism today is caused by the rise of e-commerce. As the willingness and retention of purchasing online by a customer are rising so does it increase the amount of risks involved in the transactions involved. To tackle such problems the new age research have come up with many methods to compute the level of trust and confidence that can be invested into an entity. While the social media rises it has now become a pressing need for organizations to involve various trust mechanisms in their core businesses.
Neural Networks (NN) are important data mining (Extraction of Knowledge) tool used for classification and clustering (Grouping of nodes together). It is a branch of Artificial Intelligence which plays an important role in almost all field of science. It is an attempt to build machine that will mimic brain activities and be able to learn. NN usually learns by examples. If NN is supplied with enough examples, it should be able to perform classification and even discover new trends or patterns in data. If we consider the architecture point of view then, NN is composed of three layers, such as input, output and hidden layer. Each layer can have number of nodes and nodes from input layer are connected to the nodes from hidden layer. Nodes from hidden layer are connected to the nodes from output layer. Those connections represent weights between nodes.
The Back Propagation (BP) Algorithm is one of most popular NN algorithms, which is applied in every sector of real time application. BP algorithm is quite simple, eases to handle and works on the principle of, output of NN, which is evaluated against desired output. If results are not satisfactory, connection (weights) between layers are modified and process is repeated again and again until error is small enough. In underground mine area, we apply this algorithm to determine the valuable data like, signal analysis, rock characterization, etc.
A Comprehensive Assessment and Comparative Analysis of Simulations Tools for Cloud Computing
Nimisha Patel, Hiren Patel
Offering “Computing as a utility” on pay per use plan, Cloud computing has emerged as a technology of ease and flexibility for thousands of users over last few years. In Cloud, computational resources are rented avoiding huge investment on the industry part. Due to this attractive offering, adoption and deployment of Cloud have become very popular not only among industries but also in the research community. But, due to lack of infrastructure and due to problems using the real hardware and software resources because of its high costs and other economical issues, it is not always possible for the research community to work on the actual Cloud for carrying out their experiments and testing & implementing proposals. For fulfilling such requirement, modeling and simulation technologies are required which make them available a look and feel of real Cloud offerings. In this paper, we make an exhaustive assessment and comparative analysis of around twenty simulation tools for Cloud environment.
A Survey on Feature Extraction Techniques for Image Retrieval using Data Mining & Image Processing Techniques
Sreelekshmi.U, Anil A.R
There is an interesting field in data mining called image mining for image processing. Image mining is the association of image data and extraction of hidden data. Data mining is the process of extracting information or knowledge from a wide database. Image mining makes use of texture, color factors and size of an image. Image texture is determined by a feature called Gray Level Co-occurrence Matrix (GLCM).In this case image retrieval feature will be sharp. In order to retrieve features of similar types of image shapes and texture, a feature called Weighted Euclidean distance is used.
In smart cities, the wide variety of use cases spans from traffic management to water distribution.This is an important issue for managing traffic in an urban environment like smart cities.For solving this, Internet of Things(IoT) should be used.IoT used network of physical objects that feature an IP address for internet connectivity.Reservation-based system,Connected and Automated Vehicles(CAV) and smart parking system are proposed as a part of traffic management by using IoT.Sensing and classifying roadway obstacles provides accident free environment and also a smooth drive to the vehicles.This paper is a survey on traffic management in smart cities which is useful for traffic management in smart cities. Survey involves different traffic management schemes by using IoT.
With the fast growth of current internet and service demand for multiple access has also been increased significantly. Therefore, there is huge traffic in the network which results in congestion where buffer management acts an important role. Earlier, drop tail and random drop were used as buffer management techniques with the TCP. Drop tail suffers from huge queuing delay, lockout, global synchronization problem. To overcome all these problems with earlier techniques active queue management(AQM) technique has been introduced. In active queue discipline packets are dropped or marked before buffer becomes full while in earlier technique does the same when buffer becomes full. We have various algorithms under the AQM as Random early detection(RED), Random Exponential Marking (REM), Blue and Stochastic Fair Blue (SFB), ARED, Re RED, PI controller, Robust random early detection (RRED), RED with Preferential Dropping (RED-PD) etc.
Social Event Storyboard Generation from Image Click-A Survey
Sreelekshmi.U Gopu Darsan
Traditional websites were driven by human-edited events which lead to huge web search traffic. This paper is a survey conducted for identifying the various event detection methods which are useful for event mining. Moreover this paper also suggests an automatic system to detect events from search log data and generate storyboards where the events are arranged along a timeline. Image search log is treated as a good data resource for event mining, as search logs directly reflects people’s interests. In order to discover events from log data, an approach known as Smooth Nonnegative Matrix Factorization framework (SNMF) is used. Moreover, time factor is considered as an important element for event detection as different events develop at different time. In addition, to provide a visually appealing storyboard, each event is mapped with a set of relevant images arranged along a timeline. These relevant images are automatically generated from image search results by analyzing both local and global image content feature
High Gain Coupled Inductor-Based Dc/Dc Converter For Offshore Wind Energy Systems
S.Priyadharshini1 ,K.Devaraj .
Now a days power demand are increased to reduce the power demand using renewable the energy systems. With the increasing integration of renewable energy generation into high-power grids, transmission at the dc level is becoming increasingly more useful than ac transmission. In this regard, emerging application, such as offshore wind farms, require a high-power offshore wind energy systems. The proposed dc/dc converter is characterized by the resonant switching transitions to achieve minimum switching losses and maximum system efficiency. Therefore, a higher switching frequency is conceivable to attain a higher power density. The double stage output voltage of the proposed converter operates at seven times as high as the input voltages with a small device count. The output capacitors are charged and discharged continuously by a 180 phase shift with respect to each other to eliminate the output voltage ripples with low capacitance requirements.The proposed series-modular and cascade configurations show the intrinsic merits of being readily applicable to multistage power switching converter. The developed topology has been implemented on a 5-kw prototype converter to test its feasibility.
Dr Sheikh Gouse, Dr G Kiran Kumar M. Jhansi, B. Kishore Kumar
Privacy Circles: Sharing Images on Social Networking Sites Using A3P
Dr Sheikh Gouse, Dr G Kiran Kumar M. Jhansi, B. Kishore Kumar
Utilization of online networking has been impressively expanding in this day and age which empowers the client to impart their own data like pictures to different clients. This enhanced innovation prompts protection infringement where the clients can share huge number of pictures over the system. To give security to the data, we set forward this paper comprising Adaptive Privacy Policy Prediction (A3P) system to help clients make efforts to establish safety for their pictures. The part of pictures and its metadata are analyzed as a measure of client's security inclinations. The Framework decides the best security approach for the transferred pictures. It incorporates an Image grouping structure for relationship of pictures with comparative strategies and an approach forecast strategy to consequently create a security arrangement for client transferred pictures.
Research & Survey of Data Mining Techniques In Educational System
Surabhi juneja, Swapnali kendre , Parinita chate
Data mining is the process of finding of hidden information from a huge amount of data. Data mining analyzing the data from different source and convert it into meaningful information. In the world of internet there are several online open source resources that are utilized by various academicians. Unfortunately, all the resources that are available in a scattered manner. Because of this factor it required a proper arrangement of data in meaningful information for this we are going to use data mining process which is popularly know as EDM . educational data mining is the emerging topic for research community. educational data mining means to extract the hidden knowledge from large repositories of data with the use of technique and tools. educational data mining develops new methods to discover knowledge from educational database and used for decision making in educational system. The various techniques of data mining like classification. clustering can be applied to bring out hidden knowledge from the educational data. In this paper, we focus on the educational data mining and classification techniques for a specific sector of Education system.
With the availability of numerous different project development techniques it is highly complicated for software developers and project supervisors to assess the adequacy of agile processes as well as other traditional methods to the projects and modules. This paper briefly describes the advantages, limitations as well as comparison with other popular project development techniques to the agile methodology.
Auto Contour Initialization of Breast Masses in Contrast Enhanced Breast CT
Harmandeep Kaur , Neeraj Julka
Dedicated breast CT (bCT) produces high-resolution 3D tomographic images of the breast, fully resolving fibroglandular tissue structures within the breast and allowing for breast lesion detection and assessment in 3D.Various techniques have been used for detecting cancer in women. Previous studies have worked on providing a manual seed point for evaluating the area of tumor. In this study, we present a method for auto initialization of seed point enhancing the quality of detection. First, image enhancement techniques are used which is then followed by detection of circular areas in image and choosing the best out of them. In next step, centroid of the finest circle is used as the seed point. Further, 3D radial-gradient index segmentation is used to obtain a crude initial contour, which is then refined by a 3D level set-based active contour algorithm. The algorithm is run for a number of iterations to get the enhanced results.
Yawning detection and Head Nodding Detecion Analysis of Student Engagement during online Tutorials
Harshali S.Sawale , R.R.Keole
Learning involves a rich array of cognitive and effective states.over the past decades research has increasingly highlighted ways in which affective states are central to learning.Learning centered affective states such as engagement and frustration are inextricably linked with the cognitive aspects of learning.Thus understanding and detecting learner affective states has become a become a fundamental research problem.The facial Action Coding System has been widely used to study detailed facial movements for decades.FACS has been widely consumed.This paper presents an automated facial recognition approach to analyzing student facial movements during tutoring and an examination of the extent to which these facial movements corresponds to tutoring outcomes.The result indicate that excellent agreement at the level of presence versus absence of facial movements.Naturalistic video is challenging for computer vision technique.Second the model were constructed to examine whether the intensity and frequency of facial expressions predict tutoring outcomes.CERT produces intensity values for a wide array of FACS facial action unitsthus enabling fine grained analysis of facial expressions .A particularly compelling nonverbal channel is facial expressions which has been intensely studied for decades.
Ever since wireless broadband communication services were introduced, its demand has been growing constantly. Over the last twenty years, wireless communications have become popular all across the world. It provides an attractive option for many private as well as administrative communication requirements due to various attributes including cost, effectiveness, and agility. The new generation mobile communication systems i.e. fourth generation (4G) are required to support multiple services in various types of environments. 4G is being developed to accommodate the quality of service and essential data rate like wireless broadband access, Multimedia Messaging Service (MMS), video chat, mobile TV. This paper throws light on numerous multiple access techniques anticipated in 4G communication systems. Among all the multiple access (MA) techniques, it is tried to demonstrate that IDMA (Interleave Division Multiple Access) technology can competently alleviate the interference among users and provision high data rates without compromising the quality of service that is required.
Image Enhancement Using Novel Spatial & Frequency Techniques
Er. Ashutosh Kumar Singh .
Image enhancement is a necessary step in image processing. The primary goal of image processing is to achieve better visualization so that they could more efficient for human beings and machines. This paper provides description of image using spatial domain and frequency domain.
Switching techniques defines when and how packets/messages are forwarded through the network. The aim of the paper is to evaluate and establish a comprehensive view of different switching techniques. The main objective of the paper is to bring out the drawbacks and possible solutions to tackle them. Different switching techniques are used in different networks, each having its own advantage and disadvantage. Networking is a crucial area of research and a lot development has been made. We do not mean to give complete solutions to the disadvantages of different switching techniques, rather we intended to show an overview of all switching techniques along with their disadvantages
A Data Owner Controlled Model for Co tenant Covert Channel Protection
S.Rama Krishna, B.Padmaja Rani
The emerging technology cloud Computing has became as a popular choice for small and medium enterprises for their infrastructural needs. It has many services providing support like computing, storing etc. Virtualization is the key technology to provide features like scalability and elasticity using multi tenancy. In multi tenant cloud architecture malicious co tenants use covert channels like RAM, bus and other shared devices to hijack the sensitive data. Literature is available for identifying and preventing these kinds of attacks in matured cloud providers. Immature or lazy cloud service providers will suffer from these kinds of problems profoundly. Our novel model tries to suggest measures in protection of covert channel protection. It uses a simple technique of split and sharing data to store multiple regions in multiple places. We have taken factor called as missing data which is inaccessible data in the case of compromised co tenant covert channel attack. Experiments were done in the Amazon S3 cloud with different accounts in different regions and multiple buckets for storing split data and results were analyzed. We come across with best number of splits to maximize missing data factor with less impact over the time cost for upload and download operations from our result analysis satisfactorily.
Efficient Exploration of Algorithms in Scholarly Documents Using Big Data Analytics
B. Tamil Bharathi , K. Devaki
Algorithms are important and essential part of computational science research work which is regularly published in scholarly articles. To solve the scaling problem of handling more documents, we examine an intelligent system designed with the goal of automatically identifying algorithms. In this paper, we propose a method to develop an algorithm search engine. The proposed system analyzes a document to discover any algorithm that may be there in the document. If any algorithm is found in the document, the document text is further analyzed to extract additional information about the algorithm. Machine learning and rule based approaches are used to discover algorithm representation. All discovered algorithms and their associated metadata are indexed and offered for searching throughout a text query interface.
Task Scheduling Using Meta-Heuristic Optimization Techniques in Cloud Environment
M.Jaeyalakshmi , Dr.P.Kumar
Cloud computing provides various services for the resource allocation like computation, storage in a virtualization. The virtual machine in cloud, allocate the job and schedules the task efficiently. The task scheduling and resources utilization are the key issues in the cloud environment. Scheduling allocate different types of job in the resources. Scheduling is decided based on the feedback of the Quality of Services (Qos). Quality of Service is the guaranteed service which handles the different task in the job allocation. Therefore, in order to schedule the intensive data, numerous heuristic algorithms have been recommended such as Particle Swarm Optimization (PSO), Genetic Algorithms (GA), Ant Colony Optimization Algorithms (ACO), Artificial Bee Colony Algorithms (ABC), to solve the task scheduling and resource matter. This project proposes a Bat Algorithm to solve task scheduling and resource allocation problem in cloud computing. The Bat algorithm is implemented to enforce a better efficient scheduling mechanism which will increase the performance and efficiency of the system by minimizing the execution time (makespan), execution cost, deadline and load balancing. This service is used to complete the task as soon as possible without any delay in task scheduling.
Antara Prakash, Simran Kalera Archisha Tomar, Aarushi Rai Pooja Reddy, Prof. Ramesh Babu
Review on K-Mode Clustering
Antara Prakash, Simran Kalera Archisha Tomar, Aarushi Rai Pooja Reddy, Prof. Ramesh Babu
v
Cluster is a gathering of items that belongs with a similar class. At the end of the day, comparative articles are assembled in one cluster and different objects are gathered in another cluster. clustering is the way toward making a group of conceptual articles into classes of comparable items. Clustering analysis is comprehensively utilized as a part of numerous applications, for example, statistical surveying, design acknowledgment, information investigation, and picture handling. Clustering can likewise help advertisers find particular gatherings in their client base. Also, they can portray their client bunches in view of the buying designs. Clustering is a popular strategy for implementing parallel processing applications because it enables companies to leverage the investment already made in PCs and workstations. In addition, it's relatively easy to add new CPUs simply by adding a new PC to the network. In this paper we study k-mode clustering and implementing those for date classification.
Review on Intrusion Detection and Prevention System
Sayalee Shinde S.V.Athawale
Nowadays internet and network technology have been spread rapidly, cyber-attack increasing accordingly. In this paper we propose a network based Intrusion Detection and Prevention System (IDPS) which can detect many attack types that can prevent network systems from network attack. Our system is simple that can be used with several machine learning algorithms. We test the IDPS using machine learning algorithm in online network environment. The result of the test shows that our IDPS can distinguish normal attack activities from main attack types. We apply C4.5 machine learning technique in our approach to consider unknown or new attack types
The Challenges and Opportunities of E-Commerce in India: Future Prospective
Dr. P. Devaraju .
E-commerce is playing one of the vital role in business options and facilitate to explore in the future. E-commerce is concerning the paradigm shift in the business world for trading. Forecast of E-commerce is showing extraordinary prospects in business growth of Indian Economy. The customers base of online shopping is augmented by using internet of things (IOT) and mobile phone applications. Consequently the Indian e-commerce business has seen exciting growth in since from few years. It taking into consideration India’s demographic payment system and increasing internet accessibility, the E-commerce business is growing up to greater heights. However, India’s overall retail opportunity is substantial, the online business is plagued with some critical challenges. Hence in attending current study has been carried out to depict the present condition and the future prospective of e-commerce business in India. It facilitates to analyze the present trends, explore the challenges and opportunities of e-commerce business in India.
An Incorporation of Artificial Intelligence Capabilities in Cloud Computing
Mandeep Kumar
Cloud providers like Google, Amazon, Microsoft and IBM have incorporating of Artificial Intelligence capabilities in cloud computing. They provides cloud machine learning platform and artificial intelligence cloud services like computer vision, powerful speech recognition, powerful text analysis, fast dynamic translation, smart search, intelligent language and intelligent knowledge. Artificial Intelligence is a power of new cloud computing generation. In this paper, discuss about artificial intelligence capabilities in cloud computing, in the form of cloud machine learning platforms and artificial intelligence cloud services.
Uploading Images on Content Sharing Sites with privacy Policy Inference
Venkatesh, Sudheer Kumar
With the sharing of pictures via web-based networking media, for example, Facebook, twitter, and so forth increments, keep up their security turns into the significant issue. As client shares their private pictures on social destinations, individuals anticipate that more apparatuses will permit them to recover control over their protection. By considering this need, we propose an Adaptive Privacy Policy Prediction (A3P) framework which gives client advantageous security settings via consequently producing customized arrangements. To characterize clients' protection inclinations we consider the distinctive elements for example, social environment, individual qualities, picture substance and metadata. For the pictures being transferred, we characterize the best accessible security arrangement for the client in light of the clients' accessible history on the site. For that we propose a two level system. A3P framework depends on the picture characterization structure for picture classes which might be connected with comparative arrangements and on a strategy forecast calculation to naturally create a strategy for each recently transferred picture, likewise as indicated by clients' social components
An Energy Saving Multipath AODV Routing Protocol In MANET
Seema Tiwari, Er. Prateek Singh
MANET is a infrastructure less communication network system. Power saving is the greater issue in Mobile Ad-hoc Networks because nodes are power constrained due to limited battery power supply. Pointing at energy constrained of Mobile Ad-Hoc Networks, this paper proposes an Energy Saving Multipath AODV routing protocol, which based on node residual energy and Threshold value based scheme for selecting only two paths that have maximum energy value . Choose one path from two of them that have maximum energy for communication and second path is reserve for future use as alternate route. So, when main route is no longer in use due to link failure, energy exhaustion second route is used for data transmission which conserve energy consumed in reroute initiation process. Simulation results shows that it shows better performance in terms of Packet Delivery Ratio and End-to-End delay in comparison to AODV routing protocol. The proposed work is verified using MATLAB simulator.
Everyday almost 20 million of installs [1], minor-party apps are a main reason for the popularity and obsess of facebook. Disastrously, hackers have registered the possibility of using apps for extending malware and spam. The issue is already valid, as we find that at least 13% of apps in our dataset are malicious. So far, the research center has concentrated on detecting malicious posts and campaigns. In this paper, we ask the question: Given a facebook application, can we figure out if it is malicious? Our main contribution is in evolving FRAppE—Facebook’s Rigorous Application Evaluator—feasibly the first tool focused on detecting malicious apps on facebook. To implement FRAppE, we use data gathered by monitoring the posting action of 111K facebook apps [2] seen across 2.2 million users on facebook. Initially, we determine a set of features that help us classify the malicious apps from favorable ones. For instance, we figured it out that malicious apps frequently share names with other apps, and they generally seek fewer permissions than favorable apps. Secondly, leveraging these characterizing features, we present that FRAppE can encounter malicious apps with 99.5% precision, with no false positives and a elevated true positive rate (95.9%). Finally, we scrutinize the ecosystem of malicious facebook apps and find mechanisms that these apps use to generate. Fascinatingly, we identify that many apps collaborate and assist each other; in our dataset, we identify 1584 apps facilitating the viral proliferation of 3723 other apps across their posts. Long term, we notice FRAppE as a step forward building an independent protector for app appraisal and grading, so as to alert Facebook users before installing apps.
In India there are numerous riverbridges.Those bridges have the capacity of holding only light weighted vehicles.The heavy vehicles are restricted to use those bridges.Those bridges are seen just with a warning board alone.But in most cases the drivers of the heavy vehicles may violate the rules and they may use the same bridge to cross the river.This can result in the development of cracks in the bridge which eventually causes the bridge to collapse.In Mahaath of Maharastra,a river bridge over the Savitri river collapsed weeks ago.The reason has found out be the entry of heavy vehicles on the bridge.To prevent the entry of heavy vehicles to the river bridges,an arch is built over the entrance of the bridge in some places across India.But this can increase the dead load on the bridge and this could further reduce the strength of the bridge.Thus a smart system which prevents the entry of heavy vehicles into the river bridges is proposed in this paper.This system uses a automatic checkpost in the entrance of the bridge.The weight sensor is placed on the entrance of the bridge.The vehicles when stopped at the entrance of the bridge,the weight sensor which is installed down at the road determine the weight of the vehicle being stopped at that moment.If the weight exceeds the threshold value,the entry of heavy vehicle can be found.The GSM Module is used to alert the concerned personnel.The buzzer is installed in the nearby traffic control office which sounds when the rules are violated in this case.When the entry of heavy vehicles is found,the checkpost will remain closed.In other cases the checkpost will open.This system reduces the manpower and it makes the surveillance completely automatic.This system if implemented can reduce the bridge collapses.
Temperature Controller for Continuous Stirred Tank Reactor using Adaptive PSO Based PID Controller
S.Boobalan, K.Prabhu .
The objective of the project is to control the reactant temperature of a Continuous Stirred Tank Reactor (CSTR) by manipulating the coolant temperature. The plant is modeled mathematically for the normal operating condition of CSTR. Then the transfer function model is obtained from the process. The various different kinds of controller is designed and implemented to control the temperature of the CSTR system, such as conventional method (Trial and Error method), Ziegler- Nichols method, Fuzzy logic method, PSO tuned PID controller method and Adaptive PSO tuned PID controller method. The servo response is obtained for the different operating condition of temperatures. From the servo response, Adaptive PSO algorithm based PID tuning method has given better setpoint tracking capability than the Ziegler-Nichols method, Conventional PID method, Fuzzy logic method, Particle swarm optimization (PSO) algorithm based PID tuning method. . In particular, our experience supports the conjecture that Adaptive PSO algorithm based optimal tuning of PID controller method offer advantages over all other controller method
Precision Agriculture Using Wireless Sensor Network System: Opportunities and Challenges
Manikandan .S.V Jayapriya .P
Wireless Sensor Networks (WSNs) have concerned much attention in recent years. The prospective applications of WSNs are enormous. They are used for collecting, storing and sharing sensed data. WSNs have been used for various applications including habitat monitoring, agriculture, nuclear reactor control, security and tactical surveillance. The WSN system developed in this project is for use in precision agriculture applications, where real time data of climatological and other environmental properties are sensed and control decisions are taken based on it to modify them. The architecture of a WSN system comprises of a set of sensor nodes and a base station that communicate with each other and gather local information to make global decisions about the physical environment. Farmers depend heavily on the rains because they lack the access to irrigation facilities. Their crop yields are highly unreliable due to the variability in both rainfall amount and its distribution. Also these farmers depend heavily on the prediction values of various factors such as weather, water, soil, etc. Agriculture faces many challenges, such as climate change, water shortages, labour shortages due to an aging urbanized population, and increased societal concern about issues such as animal welfare, food safety, and environmental impact. Sensor network and other agricultural techniques might help them to store and utilize the rain water, increase their crop productivity, reduce the cost for cultivation and make use of real time values instead of depending just on prediction.
A New Improve Intrusion Prevention System Security for Wireless LAN A Review
K K. Mahurkar, S V. Athawale
Threat in any system can be identified only when we have full knowledge of the system. And threats can also be prevented if proper tools or mechanisms are present or developed. So, this paper review not only identifies the problem in Wireless LAN but also reviews previously proposed solutions to the threats that exploit communication through WLAN. And presents new prevention mechanism to the existing problem with securing its main server. The paper reviews the experiments conducted to study the impact of various attacks on the system and also post solution results evaluation. A hybrid approach is used for deep packet inspection over network traffic to resolve unauthorized access in WLAN, provide satisfactory results in performance.
One of the key security threats on the Internet are called Compromised machines. The compromised machines in the network are recognize or distinguish using SPOT algorithm. SPOT algorithm is worked on The basis of powerful statistical tool called as Sequential Probability Ratio Test (SPRT) [1]. The Proposed system Spam Zombie Detection and Blocking Mechanism is an online spam zombie detection system in network which designed with Iterative Dichotomiser 3 (ID3) type logic which will increase the existing system performance and efficiency along with the detection it will also blocks the zombie system detected within the network. Proposed system is designed for the private mailing system. It also try to provide the enhanced security mechanism by blocking hacked machines.
Trend of Students towards Higher Education in Science & Technology: Study on Central Universities in India
Shashank Mishra , Manju Pandey
Education is one of the major sectors for national development, being given serious attention on increasing educational organizations geographically, increasing literacy rate i.e. to cover more and more human resource of the country and elevating the level and improving quality of education as well as spreading more education to the society. The speed of change brought by new Science & Technologies had an important outcome on the way people live, work, and plays worldwide. New and emerging Science & Technologies challenge the traditional process of teaching and learning, and the way education is managed. Science & Technology, while an essential area of study in its own right, is having a key impression across national curriculum areas. There has been an exceptional growth in the use of science and technology in teaching, research and extension activities. This paper is an endeavor to assess the extent trend of students for Science and Technology (S&T) education and Arts & Commerce (A&C) education in various years of study from 2011 to 2014. Current attention is being paid on the practical application of education in field’s science, engineering, architecture, medical, information & communication technology, agriculture, Social science, commerce, geography commerce and others which comes under these major disciplines
Predictive Analysis in E-commerce Domain and Cloud Platforms – A Survey
Nisha Jha Prof.Amit Saxena
For doing business in this communication era, web is the best medium. For business owners and consumers, online businesses broke down the barrier of time and space compared to the physical shop or office. Big companies around the world are realizing that E-commerce (EC) in not just buying and selling over Internet rather improving the competence than other giants in the market. E-Commerce has allowed businesses to offer more choices to consumers. Increasing choice, however, has also increased the amount of data and information that consumers must process before they are able to select which items meet their needs. To grow their potential markets, the big shopping platforms like Amazon, Flipkart and ebay etc. wants to utilize Machine Learning (ML) potential to build unmatched competitiveness in the market. ML has empowered businesses to analyze all queries, whether searched or abandoned, from all the users. Application of machine learning for Predictive Analytics can enhance business opportunities by analyzing customer’s past click-through behaviour, purchases, preferences and history in real-time. To make fast real-time predictions from e-commerce data, the algorithm must be capable of processing huge volume of training data in reasonable time, and must be capable of handling large number of classes. So, the paper investigates the use of machine learning in E-commerce domain and its importance in predictive analysis. The need of Cloud platforms for analyzing E-commerce data is also established in this work. The paper concludes with exploration of potential areas of research in the field of E-commerce.
the primary reason for the paper is to build up a model of Black Box For vehicle finding that can be introduced into any vehicle to track its operations. This model can be planned with least number of sensors and circuits with minimal effort so that everybody can bear. This can add to build more secure vehicles, enhancing the treatment for accident casualties, helping insurance agencies with their vehicle crash examinations, and improving street status keeping in mind the end goal to diminish the death rate due to accidents, tracking the exact location of the car. The ignition secret key framework introduced operating at a profit box will anticipate taking and thefts of autos. Data from these black box can be gathered after an accident and broke down to figure out what the vehicles were doing some time recently, amid and after the accident or occasion
Content Based Image Retrieval Using Multifeaturefusion Extraction
Shrutayu M.Thakre , Prof. D.G..Gahane
the development of multimedia technology in Content Based Image Retrieval (CBIR) System is one of the prominent area to retrieve the images from a large collection of database.The feature vectors of the query image are compared with feature vectors of the database images to obtain matching images.
It is practically observed that any one algorithm is not efficient in extracting all different types of natural images. Hence a thorough analysis of certain color, texture and shape extraction techniques are carried out to identify an efficient CBIR technique which suits for a particular type of images. The Extraction of an image includes feature description and feature extraction. In this paper, we proposed Color Layout Descriptor (CLD), Gray Level Co-Occurrences Matrix (GLCM), Marker-Controlled Watershed Segmentation feature extraction technique which extract the matching image based on the similarity of Color, Texture and Shape in the database. For performance analysis, the image retrieval timing results of the proposed technique is calculated and compared with each of the individual feature.
An Energy Efficient Multicast Routing Protocol for MANET
Vijay Kumar Tiwari , Dr. Anil Kumar Malviya
An important and essential issue for multicast mobile ad-hoc networks (MANETs) is routing protocol design i.e. a major technical challenge due to the dynamism of the network. Mobile Ad-Hoc Network (MANET) is a dynamic, multi-hop and autonomous network composed of light wireless mobile nodes. A lot of control messages are required to build optimal multicast trees and maintaining group membership due to the dynamism of MANETs. Due to these overheads we consume greater energy resourses of mobile nodes and network resourses like wireless links bandwidth . This paper presents an effective multicast routing protocol for MANET with least control overhead. The protocol constructs shared multicast tree using the physical position of the nodes for the multicast sessions. To obtain the physical location of the nodes we use the concept of distributed location service , which effectively reduces the overheads for route searching and shared multicast tree maintenance.In this protocol we use the concept of small overlapped zones around each node for active topology maintenance with in the zone. To pursuit for an existing multicast tree outside the zone, constrained directional forwarding is used which ensure a good reduction in overhead in comparison to network wide flooding for search method.The protocol employs local connectivity technique and protective route reconfiguration on the basis of the current status of the nodes are being proposed which reduces the overhead, power and bandwidth requirement and try to increase the performance and reliability.
Image Encryption using RSA Algorithm with Biometric Recognition
R.Saranya , S.Prabhu
— In the fast evolution of digital data exchange, security of any information becomes much important in data storage and transmission. Due to the increasing use of images in various fields, it is essential to protect the confidential image data from unauthorized access. Biometric identification is an actively growing area of research and is widely used in application fields like E-commerce, E-banking, E-passports, E-licences and security applications. In recent years, Face recognition becomes one of the popular biometric identification systems used in identifying or verifying individuals and matching it against library of known faces. Also it finds its application in wide variety of areas like criminal identification, human - computer interaction, security systems, credit- card verification, teleconference, image and film processing. This paper suggests a secure encryption of medical images along with an automated face recognition system based on extracting the features from the input face image. For encryption process, RSA algorithm is used. Feature extraction process in the face image is performed by locating the position of eyes, nostrils and mouth and determining the distances between those regions. From the extracted features, a database is created for known individuals. A virtual neural network is created based on Extreme Learning Machine (ELM). This network verifies whether the individual is a known user or an intruder.
Capture the data flowing from client application to the server in a network as pcap files. And then, analyze them to detect if they contain sql injection type string patterns. SQL injection is an attack in which malignant code is inserted into strings that are eventually passed as an instance of sql server
A 3D Molecular design and Management using Data Glove Interaction Technique
Prachi D, Patil D.R. .
The creation of meaningful knowledge in Molecular world has been the great challenge in chemistry learning process. This paper proposed an interactive 3D design of Molecule and develops an alternative input device for interacting with it for molecules manipulation. This article describes the steps on the development of low cost data glove based on Contact switching technique. Also it shows a set of preliminary result obtain in Molecular application with the input Data Glove and discuss the use of Molecular application that could be supportive and helpful for student in chemistry learning process. The result shows that Data glove interaction is more accurate and natural than keyboard and mouse in operating 3D Molecular environment. It also enhances the user interaction in Chemistry studies and feels immersion in using Human Computer Interaction (HCI) technique
The software is for automation of Health Centre monitoring. The software includes maintaining patient details, providing services, fixing appointments, providing and maintaining all kinds of tests for patients and billing report generator
Economic Potential of Cultural Tourism In Terms of Tourism Marketing
Tülin Durukan Cihat Kartal
The concept of tourism marketing includes all activities related to marketing of the tourism sector. In tourism marketing, all activities which are applied to ensure participation of the customer who is referred as “tourist” in the tourism movements and satisfaction of this customer constitute the basic element of the mentioned concept.
A DWT-SVD Hybrid Approach for Robust Digital Image Watermarking
Hina Lala .
Digital media can be copied and modified easily nowadays leading to security issues. There is a need for protection of digital media against unauthorized access. Digital Watermarking is a technique for protecting the copyrights and unauthorized manipulation of the digital content. In this some ownership data is embedded into the digital media that can be extracted later to prove the ownership. This paper focuses on DWT - SVD hybrid approach for improving the robustness of the watermark against various attacks
The police forces around the world use vehicle number plate for legal vehicle authorization purposes, to check if a vehicle is registered or licensed. Most of us keep the vehicle papers in the vehicle itself, which is not at all safe in case of theft. In today's world, it is not secure to carry our vehicle papers and wherever we go. Hence a system must be designed in which it is not necessary to carry our important documents to each and every place for verification. The aim is to design a system which captures the image of the number plate of a vehicle using a camera and the details are being retrieved using the character segmentation which is done by a feature extraction optical character recognition algorithm (OCR). Then the details retrieved from the number plate in text format is used to extract all the important information of the vehicle like, the name of the owner, address of the owner, date of registration of the vehicle etc. from the database. The police can verify whether the documents are fake or not. For us, it is useful as we do not have to carry our documents to every place with the fear of losing them.
Ankita Kaushik, Dr. Vikas Kumar, Dr. Amit Chaturvedi
Analysis Of Cloud Based Multitenant Load Scaling
Ankita Kaushik, Dr. Vikas Kumar, Dr. Amit Chaturvedi
: An internet based computing,through which resources are shared to customers
.In multinenancy ,customers share same hardware and database .Many clients are working under one server and single instance of application is available to many customers . With minumum resource and cost , requirements can be fulfilled .With the help of scaling , resources can be allocated as per requirements. Increasing the potentiality of system,by adding /removing components or functionality or components of systems van be termed as scalability.
Optimization of Wireless Sensor Networks using PPSS Algorithm
S.Muthukumaran, S.Neelakandan
In the development of various large-scale sensor systems, a particularly challenging problem is how to dynamically organize the sensors into a wireless communication network and route sensed information from the field sensors to a target system. The prime motivation of our work is to balance the inherent trade-off between the resource consumption and the accuracy of the target tracking in wireless sensor networks. Toward this objective, the study goes through a new energy-efficient dynamic optimization-based sleep scheduling and target prediction technique for large-scale sensor networks. We present a probability-based prediction and optimization-based sleep scheduling protocol (PPSS) to improve energy efficiency of proactive wake up. A cluster-based scheme is exploited for optimization-based sleep scheduling. At every sampling instant, only one cluster of sensors that located in the proximity of the target is activated, whereas the other sensors are inactive. To activate the most appropriate cluster, we propose a non myopic rule, which is based on not only the target state prediction but also its future tendency. Finally, the effectiveness of the proposed approach is evaluated and compared with the state-of-the-art protocols in terms of tracking accuracy, inter node communication, and computation complexity
Breakthroughs and issues in the implementation of Six Sense Technology: A review
Harsimrat Deo .
During the attention at a new object our senses try to sense and analyze that particular object and make us interact with them. But to know the complete information about a particular object we should go through it in detail by surfing on net or asking the relevant person for information. Instead, sixth sense technology can be used to immediately trace out the whole information about an object as soon as we see it. Sixth Sense technology is a revolutionary way to interface the physical world with digital information. Sixth sense is a wearable gestural interface that augments the physical world around us with digital information and lets us use natural hand gestures to interact with that information. This paper focuses on and makes us aware with the sixth sense technology which provides an integration of the digital world with the physical world; it helps us understand how the sixth sense device had overpowered the five natural senses
Overview of MIMO Technology in LTE, LTE-A & LTE-A-Pro
Bhavesh Khasdev , Angeeta Hirwe
The MIMO systems having large number of base station antennas often called massive MIMO or FD-MIMO have received much attention in academia and industry to provide High spectral efficiency, High energy efficiency, High hardware efficiency and processing complexity for future cellular systems such as 4G LTE systems, LTE-Advance, LTE-Advance Pro and Fifth generation cellular communication systems. This paper presents an overview of MIMO technology being applied in LTE and LTE-Advance.
Mobile Ad hoc networks (MANET) are a new paradigm of networks offering unrestricted mobility without any underlying infrastructure. The network is set up with a group of mobile wireless nodes and is devoid of any dedicated routers or base stations. The wireless nodes move around freely and mutually cooperate with each other in routing and forwarding packets without the support of any fixed infrastructure or centralized administration. The topology is highly dynamic, making the routing procedure more difficult and insecure. In this paper, the performance of the network is analyzed after flooding the network using malicious nodes. The flooding attack is done by the malicious node by sending fake RREQ packets throughout the network. The number of malicious nodes and their position is changed along with various other node characteristics to observe their respective effects on the network performance. The simulation environment is implemented by using the NS-3 network simulator.
Indu R. Nair ,Nadiya Ebrahimkutty Priyanka B.R , Sreeja M Prof. Gopu Darsan
A Survey on Driver Fatigue-Drowsiness Detection System
Indu R. Nair ,Nadiya Ebrahimkutty Priyanka B.R , Sreeja M Prof. Gopu Darsan
One of the major reasons for road accidents now a days is due to driver fatigue. Be it long distant travelling or drunk driving drowsy state leads to risky crashes which is hazardous to lives as well. To overcome such accidents some method has to be developed that is feasible to all vehicle drivers . This paper is a survey based on various methods for preventing road accidents and designs on drowsiness detection methods which were proposed and have advantages and disadvantages
Neenu Ann Shaji, Soumya Murali , Sumitha Soman, Sandeep Hari, Sanoop Hari
A Survey On Biometrics Authentication For Online Transactions
Neenu Ann Shaji, Soumya Murali , Sumitha Soman, Sandeep Hari, Sanoop Hari
Authentication represents the process which verifies the identity of a user who has got the rights to make certain actions or changes in an application or on a device. Methods for authenticating users into their devices and online services have to be user-friendly and must uphold privacy.
This paper aims on discussing the different methods adopted for authentication using biometrics rather than using the conventional methods for authentication such as PIN or Password. Biometrics can be used as a very effective method against cyber theft. They are so unique that it is nearly impossible to precisely reproduce a user characteristic.
The Automated Scrolling Using speech recognition is a promising technique which allows users to scroll through a document with minimum effort and in a smart manner. Speech recognition is being used to perform speech to text conversion of the user’s input which is then processed to accomplish automated scrolling. Google speech recognition API and python speech recognition library are used for efficient extraction of user speech input. A string matching algorithm is used to keep track of user speech input which is converted to text and the document which is to be scrolled. The paper discusses all the modules present in the creation of a proficient automated scrolling system using speech recognition.
Compute the Best Route from All Intersection using Cloud Based Services
Priyatharsini V, Grahalakshmi S
Cloud computing is a type of figuring that depend on distribution computing incomes rather than having native servers or personal devices to handle applications. Cloud based service is one of the sub services of cloud computing, that service is applied to this project. In this process we have chosen the one dataset in this dataset contains the some congested area details are presented. The details contain name, place, street and distance of the particular area is stored. These details are maintained in our database the user choose particular source and destination of the area. The user select intermediate route also and the find out shortest route. The user fined the Heuristic algorithm for route recommendation process.
Rukhsana Ambreen, Prof. Shahid Nadeem Prof. Shyam Dubey
APT Attacks: How Big Data Fights Back
Rukhsana Ambreen, Prof. Shahid Nadeem Prof. Shyam Dubey
Now cyber-attacks are increasing because existing security systems are not able to identify them. The cyber attacks had purposes of disclosing personal information by attacking the PC and to reduce the system. The goal of recent heavy blows. attacks has changed from disclosing information and destruction of services to attacking large-scale systems such as analytic infrastructures. The defense technologies to counter these attacks are build on patterns matching methods which are very limited. This reality, The event of new and previously unknown attack, detections rate become very low. To keep safe from these unknown attacks, which unable to identified with existing technology, We proposed the new model based on big data analysis techniques that can obtain information from a variety of sources to identify future attacks. The model base on the future Advanced Persistent Threat detection and prevention system implementations.
Restoration-Multiple Removing of Noise under Water Images using Multidirectional Filtering Techniques
Sukhjinder Singh , Dr. Sandeep Kautish
Image restoration one part is the Denoising which plays important tasks in image processing. Despite the significant research conducted on this topic, the development of efficient denoising methods is still a compelling challenge. Image denoising is an essential requirement of image processing. The images contain strongly oriented harmonics and edge discontinuities. Wavelets, which are localized and multiscaled, do better denoising in single dimension using multiple local thresholding technique. Filter based denoising and reconstruction exhibit higher quality recovery of edges and curvilinear features. This thresholding scheme denoises images embedded in Speckle noise. The experiment shows denoising using Filters such as Wiener, Median, Wavelet Transform , Bayes Shrink and our proposed technique as (median and bayes Shrink wavelet) to outperforms in terms of PSNR(peak signal-to-noise ratio) , MSE (mean square Error), Elapsed time and Coc (Coefficient of Correlation ), but also in better visual appearance of the resulting images. In this thesis, we will study and investigate the application of using best filters to remove noise using our proposed method Median with Bayes shrink wavelet with soft thresholding for denoising techniques to remove multiple noises from under water images. In this, Gaussian, Poisson, Salt & pepper, Speckle is used for restoration. Our Technique, works best for all types of noises but speckle is better restored as denoised by wavelet based only technique.
Segmentation of Degraded Text using Dynamic Profile Projection in Handwritten Gurmukhi Script
Karamjeet Kaur Ashok Kumar Bathla
Character segmentation is a vital area of research for optical character recognition. The process of OCR involves several steps to recognize the character. After converting the scanner’s output as bitmap image, set its threshold value. The recognition phase’s output is totally depends upon the segmentation phase. Touching and broken character affects the accuracy rate of the recognition phase badly. Existing methods concentrate only upon the single touching characters problem with fixed size and mostly works upon the middle zone. Segmentation of the broken character is an uphill task. In this paper, we used proposed technique for identification and segmentation of multiple touching characters in handwritten Gurmukhi words. In proposed technique firstly scanner’s output is saved as bitmap image and then set its threshold value 200. The bitmap image is segmented into individual characters, called segments after applying the dynamically projection technique. The name of developed method i.e. Dynamic profile projection technique means that it works for variable size. Thus, the new technique works upon the segmentation of broken, multiple touching characters of variable size including the three zones of the handwritten gurmukhi script and increase the accuracy for touching characters. Thus, after the implementation of this concept got encouraging results than the existing systems.
Review of Various Image Restoration and Denoising Methods Underwater Images
Sukhjinder Singh Dr. Sandeep Kautish
The paper presents a denoising method, based on Daubechies Wavelet transform and filters, for underwater images. The method here adapts itself to various types of image noise as well as factor that are to be derived to estimate the noise-free coefficients. In the preference of the images in any field, a single parameter can be used to balance the preservation of relevant details against the degree of noise reduction. Edges play a important role in image representation, one effective means to enhance spatial resolution is to enhance the edges. DWT, a time-scale representation of the digital signal is obtained using digital filtering techniques. Effectiveness of this method is compared with all other techniques such as median ,wiener, bayes shrink and normal shrink methods for removing noise.This paper presents a review of some significant work in the area of denoising. We will introduce the wavelet and other filters methods with homomorphics filters multi-scale analysis framework and summarize related research work in this area.