Effective Utilization of Data Mining Techniques for Digital Security
Farhad Alam ,Vishal Shukla
In this paper we brainstorm and discuss about different data mining methods that we have effectively connected for digital security. These applications incorporate however are not restricted to pernicious code location by mining double executables, system interruption recognition by mining system movement, peculiarity discovery, and information stream mining. Data mining based interruption location instruments are amazingly valuable in finding security breaks.
A Novel Algorithm to Determine the Attacks Intention in Wireless Ad hoc Networks
S V Athawal, M A Pund
In Past few years growth of wireless ad hoc network has increased rapidly .The single greatest issue in a few wireless network is that it's, well, wireless! The largest reason to possess a wireless network is as a result of it eliminates the requirement for expensive, ugly, and dangerous wires trailing every where your business and home network. This paper proposes a brand new algorithmic rule known as the Similarity Intention Attack (SIA); the algorithmic rule relies on the Attack Analysis (AA) algorithmic policy rules to predict new attacks intentions in wireless intrusion detection system (WIDS) and allotted the probability values for these intentions. The analysis algorithm shows that our planned algorithmic policy based approach provides higher level wireless security.
A Survey of Load Balencing Technique in Cloud Computing Environment
Manisha Verma, Somesh Kumar .
Cloud computing refers to service delivery over internet by several application which are in distributed data centers. Cloud computing has many advantages along with some issues. These issues are related with load management, reliability, data portability, various security issues and much more. In this paper our main concern is load balancing algorithms in cloud computing. The load can be network load, memory capacity, CPU load etc. The load balancing is a process of reassigning the total load to the individual nodes of the collective system to make resource utilization effective and to improve the response time of the job, simultaneously removing a condition in which some of the nodes are over loaded while some others are under loaded. This paper presents various issues of cloud computing especially related to load balancing and various load balancing algorithms or technique in cloud computing adopted in past research work have been analyzed and findings were illustrated in this paper.
Adaptive Energy-Efficient SSL/TLS Method Using Fuzzy Logic for the MQTT-Based Internet of Things
Jin Hee Chung , Tae Ho Cho
The Internet of things (IoT) has been undergoing accelerating growth, whereas the growth in its security is falling behind, representing a significant security problem. IoT devices use Message Queuing Telemetry Transport, which is a lightweight IoT standard messaging protocol, along with another security protocol. There are a few ways to secure communications, among which SSL/TLS is recommended. However, adapting SSL/TLS to IoT has many problems. First of all, the SSL/TLS handshake can incur considerable overhead, representing an intensive task for low-performance devices. Secondly, certain IoT communications use disposable handshakes, which are used with just one message when there is no need to connect in the future; this uses energy inefficiently and leads to reduced lifetime of the IoT devices. Thirdly, SSL/TLS may provide higher security levels than are needed for a transmission, in which case energy is wasted. Also, when only low security is required and the transmitted message is very short, SSL/TLS provides excessively secure communication and thus consumes energy inefficiently. Although there are the many problems, using SSL/TLS is unavoidable. Therefore, it is necessary to improve SSL/TLS for use with Message Queuing Telemetry Transport in the IoT. Herein we propose a method to improve energy efficiency in this environment while satisfying any of various expected security levels. Our proposed method recognizes the three inputs of security level, residual energy, and message length as the relevant device conditions. Based on these inputs, the proposed method selects an appropriate fuzzy rule to determine which client-compatible cipher suite is most suitable for the conditions. Herein we demonstrate the validity of our proposed method by means of experiments on its energy efficiency relative to that of SSL/TLS.
Advancements of technology in mobile communications along with wide penetration in usage of Smart phones and its applications as well as increase in traffic densities at junctions in every major city leads to the development of Smart Wi-Fi Traffic Assister with signal overriding using RFID technology. The main purpose of such system is to alleviate the traffic congestion at the junctions by sending traffic density information from junction to Smartphone using Wi-Fi technology. The proposed system placed at traffic junction uses four sets of red, yellow and green LEDs, four IR sensors, RFID reader, Wi-Fi module all these connected to an ARM7 LPC2148 microcontroller. The IR sensor contains IR transmitter and IR receiver each one is placed on either sides of road like this we place all the IR sensors in a four road junction. The on and off condition of this IR sensor gives the density information at a particular road. Based on current traffic density at the four road junction, the microcontroller takes decision and updates the traffic light delays. The RFID technology is used to override the traffic signal if there is any emergency vehicle like ambulance, fire engine or VIP vehicle etc with an RFID tag at any road in a four road junction then the RFID reader reads the RFID tag and sends this signal to microcontroller then the green LED glows for that particular road. All the signals which cause change in normal operation of traffic signalling are continuously sent to users by Wi-Fi module and the user will get the traffic updates whenever required to his/her smart phone through a telnet application.
Prospect of Elecrto Commerce In Present Indian Market
Dr. P. Devraju .
The E-Commerce market is flourishing and poised for strong growth in Asia. There area unit players World Health Organization created a decent starting. Their success depends on their understanding of the market and providing numerous forms of options. This paper provides a summary of the long run of E-Commerce in Republic of India and discusses the long run growth segments in India’s E-Commerce. Additionally conclude numerous factors that will essential for future growth of Indian E-commerce. And represent the assorted opportunities for retailers, wholesalers, producers and for individuals. During this paper we have a tendency to found that the E-Commerce can increase exponentially in returning years within the rising market of India.
A Hypothesis on Assorted E-Commerce Performances in Online Market
Dr. P. Devaraj .
Digital Commerce is system of doing industry via computer networks. A man or woman sitting on his chair in front of a laptop/PC can access the entire services of the web to purchase or promote the products. In contrast to average commerce that's implemented physically with effort of a individual to go & get products, ecommerce has made it easier for human to decrease physical work and to avoid wasting time. E-Commerce which was started in early 1990’s has taken a satisfactory jump in the world of computer systems, but the truth that has hindered the progress of e-commerce is protection. Protection is the task facing e-commerce at present & there is nonetheless various development made within the field of safety. The essential advantage of e-commerce over natural commerce is the user can browse on-line stores, compare prices and order merchandise sitting at home on their computer. In this paper to exposed different online market groups’ functionalities. Electronic Commerce is process of doing business through computer networks. A person sitting on his chair in front of a computer can access all the facilities of the Internet to buy or sell the products.
Eeg Based Person Identification And Authentication Using Bci
Shashank N, Mrs.Rashmi C R
Now a days, a wide variety of security system requires reliable recognizable scheme to either confirm or identify the person from a group. Due to the characteristics of EEG, it is very difficult to forge or copy the EEG signal. In this paper, for feature extraction-multiwavelet transforms are used. For classification, kNN method is used.
Analysis of Speed controller for three phase induction motor in 125/60 TPH Aggregate crushing Sand Plant
H.Sathishkumar and Dr.S.S.Parthasarathy
This paper deals about the Analysis of Speed controller for three phase induction motor in 125/60 (Tons per hour) TPH Aggregate crushing Sand Plant. Three phase induction motor speed control is necessary to do the various operations of the aggregate crushing sand plant especially in the vibrating grizzly feeder and also in the vertical shaft impactor. As speed control of the three phase induction motor is required, it is also mandatory requirement of the speed controller. In this paper, crushing sand Plant operation is delineated and also shortcomings of the conventional speed controller PLC which is used in this plant is discussed.
— Image compression has become an important process in today’s world of information exchange. Image compression helps in effective utilization of high speed network resources.The discrete wavelet transform (DWT) is a technique for converting a signal into elementary frequency components. It is widely used in image compression. Here some functions for compression of both gray scale and color images with DWT and its implementation in MATLAB have been developed. The DWT is very similar to a Fourier series , but in many ways, is much more flexible and informative. It is a tool which breaks up data into different frequency components or sub bands and then studies each component with a resolution that is matched to its scale. Unlike the Fourier series, it can be used on non-stationary transient signals with excellent results.
A Review: To Detect and Identify Cotton leaf disease based on pattern recognition technique.
Mr.Chandrakant D.Kokane , Prof.N.LBhale
India is the country in which most of the people are depend on the agriculture, According to the survey of Government of India Agriculture plays a vital role in the Indian economy. Over 70 per cent of the rural households depend on agriculture as their principal means of livelihood. India ranked in the world's five largest producers of over 80% of agricultural produce items, including many cash crops such as coffee and cotton, in 2010. It has become one of the world's largest suppliers of rice, cotton. Cotton is very important crop in our country and if some disease will affected on that crop the total economy of the farmer as well as country will get collapse. Normally in my country if disease will get detected by the farmer he will contact to the Experienced person and get solution for the same but if the detection and identification of disease not correct will badly affecting on the plant. In second case farmer will contact to the owner of pesticide shop the person will suggest some wrong treatment with respect to his experience. Third case is that farmers are just going with nature they thing is that the disease will get cleared automatically in some period of span. The main motivation of this topic is to identify the type of disease and quantify the damage of crop thereby providing the treatment for the respective disease. This identification and detection of disease is possible by using image processing techniques on the different parts of cotton crop. This review paper will give information about the possible disease on cotton plants as well as possible treatment should provide to the farmer.
Ordered Dither Block Truncation Coding For Content Based Image Retrieval Using Relevance Feedback
Simantinee S Joshi .
: Now a days, content based image retrieval (CBIR) plays an important role in the image retrieval systems. Ordered dither block truncation coding (ODBTC) is applied in proposed system for CBIR which have relevance feedback mechanism. In this system features of an image are extracted using ODBTC for the generation of image content descriptor. ODBTC offers a simple and effective way to index images in CBIR system. ODBTC compresses an image block into minimum quantizer, maximum quantizer and bitmap image. The proposed image retrieval system generates Color co-occurrence feature (CCF) and bit pattern feature (BPF) from the maximum quantizer, minimum quantizer and bitmap image respectively .To be more profitable, relevance feedback technique is applied into CBIR so that more precise results can be obtained by taking users feedback into account. The method proposed here is superior to the block truncation coding and earlier methods.
A smart way of automating farming process can be called as Smart Agriculture. By implying an automated system we can eliminate possible threats to the crops by reducing the human intervention. The major emphasize will be on providing favorable atmosphere for plants. These agricultural automated systems will help in managing and maintain safe environment especially the agricultural areas. Environment real time monitoring is an important factor in smart farming.
Improving Quality Of The Services In Manet Usign The Hierarchical Fair Service Curve And Fisheye State Routing Protocol
Anand R, Jitendranth Mungara .
Mobile Ad-hoc networks (MANET) is one of the self configuring and infrastructure less connected wireless networks, which consists of the end hosts and routers. The main issue in the Mobile Ad-hoc networks is a bandwidth aware queue management and quality of the services while sharing the packets in the network. These challenges are increasing the traffic in the real time applications, consumes energy in the MANET. So, the proposed system improves the Quality of the Service (QoS) by applying the Hiearchical Fair Service Curve (HFSC) packet scheduling algorithm and the Fisheye State Routing protocol. The proposed algorithm uses the link-sharing services scheme to maintain the real time application with high quality of services, less delay and high throughput. Thus the of the proposed system is implemented in the NS2 simulation tool and the performance is evaluated with the help of the performance metrics such as, Average delay, Average throughput, Routing overhead, Packet delivery ratio
: This paper deals with the concept of Optical Character Recognition (OCR) and its various stages like pre-processing, segmentation, feature extraction, classification and post-processing. The main objective of this paper is:
To study the existing techniques for recognition of handwritten Hindi text.
To develop and apply the new segmentation technique on the handwritten Hindi text collected from different users. .
To design a new feature set for the handwritten Hindi text.
R. Stephen, A. Dalvin Vinoth Kumar , Dr. L. Arockiam
Deist: Dynamic Detection Of Sinkhole Attack For Internet Of Things
R. Stephen, A. Dalvin Vinoth Kumar , Dr. L. Arockiam
The Internet of Things (IoT) interconnects things, human and animals into a single network. The devices connected in IoT are light weight devices. The security for light weight IoT device is a challengeable task. It faces the vulnerabilities in communication infrastructure due to the different attacks. The attacks are selective forwarding attack, sinkhole attack, black hole attack, Sybil attack, wormhole attack etc. The sinkhole attack is one of the most destructive routing attacks in IoT environment. A sinkhole attacker aims to attract the greatest amount of traffic in a given area and harms the reception of data on collection point. The proposed method is an active detection of sinkhole attack. It uses the Alternative Parent (AP) information to identify the attacker. This method provides security to IoT network from unwanted traffic created by the attacker node.
K. Harishchandra, K. M. Manjunatha and Balakrishna
Software Reliability Model when multiple errors occur at a time including a fault correction process
K. Harishchandra, K. M. Manjunatha and Balakrishna
Most of the software reliability models are based on reliability growth models which deal with only failure detection process. In these models it is assumed that software faults occur randomly at different time points and fault correction times are either ignored or considered insignificant. It is also assumed that only one fault is detected at any given time point. In this paper we propose a software reliability model in which a random number of faults are detected whenever a failure occurs. The model also takes into account the correction times for the faults detected. The software failure times and the correction times are assumed to follow exponential distributions. The number of software faults detected at any time point is assumed to follow a geometric distribution. The distribution of the total correction time is derived and the model is formulated as an alternating renewal process. The properties of the reliability model are studied through the renewal process. We obtain the maximum likelihood estimators and also asymptotic interval estimators of the system parameters and their properties are discussed. We also propose some large sample tests for the system parameters. Some numerical studies have been made to evaluate the power of the tests.
Traditional teaching methods rely on written exercises, books, oral lectures and blackboards as the primary vehicles to spread knowledge. Nevertheless, technological process brought new opportunities to teach and educate, such as using video games that spiced up curiosity and fired reviews amongst many educators and researchers. Research shows that video games have a great potential to improve the learning experience and learning outcomes. These facts among others led to this research.
Guided Filter for Grayscale, RGB and HSV color space
Prajakta Mukund Waghmare, Swati Shankar Shetkar
Guided filter is derived from a local linear model and in guided filter filtering output is computed by referring guidance image, which can be input image itself or different image. The Guided filter can be used as edge preserving smoothing and gradient preserving operator, it shows better result near edges. My work is focused on implementing guided filter algorithm, which is 2D algorithm. This algorithm is applicable to gray-scale image and color images like RGB and HSV by separating each color channel. The experiments show that the guided filter is effective in computer vision and graphics applications as well as edge preserving smoothing, detail enhancement, denoising, etc.
Today big data computing is a critical challenge faced by many industries .Everyday up to terabytes to petabytes of the data is generated in the cloud computing paradigm. Thus there is a drastic demand for building a service to distribute, manage and process massive data sets that has risen tremendously. Engineers and researchers are dealing with these large dataset. In this paper, we investigate the big data broadcasting problem for single source node to broadcast a big chunk of data to a set of nodes with the objective of minimizing the maximum completion time. These nodes may be present in the same data center or across geo distributed data centers. We model the big data broadcasting problem into a LOCKSTEP BROADCAST TREE (LSBT).The main idea of this model is to define a basic unit of upload bandwidth r, such that a node with capacity c broadcast a data to a set of nodes at the rate r. We divide the broadcast data into m chunks. These data chunks can then be broadcasted using a pipeline approach.
Power Quality Control of Nonlinear Load using Custom Power Devices
Mr.Praful A.Desale MS.Bhagyshri S. Patil
A Power quality problem is an occurrence manifested as a nonstandard voltage, current or frequency that results in a failure or a miss-operation of end user equipment’s. Utility distribution networks, sensitive industrial loads and critical commercial operations suffer from various types of outages and service interruptions which can cost significant financial losses. The present work is to identify the prominent concerns in this area and hence the measures that can enhance the quality of the power are recommended.
An Innovative Accession To Mobile License Plate Reader System (MLPR)
Dolly Sharma, Dr. Pankaj Sharma Vyom Kulshreshtha
This paper presents an algorithm for the Mobile License Plate Reader System using various approaches. Mobile license plate reader (MLPR) technique consists of two modules, a license plate locating module and a license number identification module.In this paper, an experimental extraction of image is performed with PCA (Principle Component Analysis), Segmentation is performed with OCR (Optical Character Recognition) and Recognition is performed with SVM (Support Vector Machine) which are based on original binary images of the characters. The training via support vector machine has yielded the accurate outputs for the recognition of various input images taken in the algorithm. The purpose of this paper is to develop a real time application which recognizes license plates from cars at a gate, for example at the entrance of a parking area or a border crossing. Recognition of about 98% vehicles shows that the system is quite efficient
A survey on different PAPR reduction techniques in OFDM systems
Manjula A V Dr.K.N.Muralidhara
Orthogonal Frequency Division Multiplexing is considered as one of the most promising technology for future communication technology as it provides spectral efficiency robustness against multipath fading & avoids inter symbol interference. However one of the major drawbacks of OFDM system is high PAPR resulting in performance degradation of DAC & decreases efficiency of power amplifier. In this paper we review on OFDM system, its different types of PAPR reduction techniques and comparison of different PAPR reduction techniques
A Conceptual Study To Make Research About Contribution Of Innovation And Competition Relation Over New Economy
Tülin Durukan, Cihat Kartal .
The globalization fact has gained more momentum together with development in free market economy. Together with this new formation, developed countries have opened their doors to competition and have started to take new steps at state-economy relations. While globalization which requires economic, social and political integration of all world countries is creating positive consequences especially in economic and political fields for developed countries, it has brought some negative effects for economies of underdeveloped countries which do not have a substructure proper for such an integration. Contribution of “Competition” and “Innovation” concepts over new economy forms the axis of this study and development of competition and innovation indicators are examined comparatively regarding Turkey and other selected countries.
DC Motor Speed Control Using LDR Sensor and Atmega89s52
Arpita Srivatava Anil Kumar Chaudhary
In robotic applications DC Motor control is very common. Other than it there are many applications that have been developed based on motor control in electronic field such as in automation, Flexible Manufacturing System (FMS) and Computer Integrated Manufacturing (CIM). The purpose of this project is to control the speed of DC motor depending on the light intensity falling on an LDR using microcontroller.
Behavior Analysis of OSPF and ISIS Routing Protocol with Service Provider Network
Vikasdeep Kaur , Jaspreet Kaur , Harpreet Kaur
OSPF is a form of link state routing protocol developed via IETF. It works for both with IPv4 and IPv6. IPv4 is utilized by OSPFv2 and IPv6 is used by OSPFv3.
Enhanced Security Protocol for Spontaneous Wireless ad-hoc Network
Firoz Ravi Antil, Ankur Jain
with continual advances in technology, coupled with increasing price/performance advantages, wireless accessibility is being deployed increasingly in office and public environments. This paper discusses the security threats and risks associated with wireless networks, and outline a number of best practices for deploying wireless networks in corporate and home environments. Finally,an Enhanced secure protocol for spontaneous wireless ad hoc networks which uses a hybrid symmetric/ asymmetric scheme and the trust between users in order to exchange the initial data and to exchange the secret keys that will be used to encrypt the data. Trust is based on the first visual contact between users. Proposed protocol is secure autonomous protocol and is not based on any infrastructure and external support in order to develop it over the devices with limited resources. Network creation, communication and management are the functionalities of the proposed system. A mechanism has been presented to allow the nodes to check the authenticity of their IP addresses while not generating any duplicated IP addresses. This mechanism helps nodes to authenticate by using their IP addresses. The proposed protocol has the following features Distributed security mechanism, Lightweight, Malicious user revocation capability.
The tourism industry of a country is important to its economy and is ever expanding. It is a very diverse industry that accommodates even very particular interests. Like any other industry, it has its fair share of online representations of the real world at present. However, there isn't sufficient intelligence in these very static systems. "Smart-tourism" is something that must be further explored. There is so much potential in both, the information available online and in the tourism industry, waiting to be harnessed. A combination of the two along with a recommendation engine will give it all, a much needed, human touch.
Text Summarization using topic modeling and cluster based MapReduce framework
N.Prameela .
Document summarization provides an instrument for faster understanding the collection of text documents and has a number of real life applications. Semantic similarity and clustering can be utilized efficiently for generating effective summary of large text collections. Summarizing large volume of text is a challenging and time consuming problem particularly while considering the semantic similarity computation in summarization process. Summarization of text collection involves intensive text processing and computations to generate the summary. MapReduce is proven state of art technology for handling Big Data. In this paper, a novel framework based on MapReduce technology is proposed for summarizing large text collection. The proposed technique is designed using semantic similarity based clustering and topic modeling using Latent Dirichlet Allocation (LDA) for summarizing the large text collection over MapReduce framework. The summarization task is performed in four stages and provides a modular implementation of multiple documents summarization. The presented technique is evaluated in terms of scalability and various text summarization parameters namely, compression ratio, retention ratio, ROUGE and Pyramid score are also measured. The advantages of MapReduce framework are clearly visible from the Experiments and it is also demonstrated that MapReduce provides a faster implementation of summarizing large text collections and is a powerful tool in Big Text Data analysis.
Adil Wazeer, Bhaskar Chaturvedi , Shriyash Mohril, Mahipal Singh Sankhla Dr. Rajeev Kumar
¬¬¬¬¬¬Gasification-Contributing to the Energy Production Demands
Adil Wazeer, Bhaskar Chaturvedi , Shriyash Mohril, Mahipal Singh Sankhla Dr. Rajeev Kumar
At present juncture we are facing a drastic depletion of our available energy resources in the form of fuels for automobiles, as a major source for the functioning of power plants and industries, in combustion, etc. If the consumption of the non-renewable energy resources continued in the same manner then the day is not far enough when there will be disastrous consequences existing on this planet. In order to cope up with this serious issue, use of renewable energy resources must be practiced and implemented on a large scale. There are several sources of renewable energy available nowadays. One of the solutions for these problems is gasification- a process in which there is production of energy from biomass, solid waste, etc. which is easily available in our surroundings and is produced on a high rate on daily basis. This will be contributing towards the growth of renewable sources of energy. In this article an attempt has been made to study about the gasifying process, gasifiers, types of gasifiers, need of gasifiers, importance of gasifiers, reactions involved in the process, advantages of gasifiers.
Comparision Between Dct & Dwt Image Compression TechniquE
Yashi tiwari, Amit Kumar
Image compression has become an important process in today’s world of information exchange. Image compression helps in effective utilization of high speed network resources. The main objective is to design a compression system suitable for processing, storage and transmission, as well as providing acceptable computational complexity suitable for practical implementation. The two compresson technique DCT and DWT are widely used. DCT is an orthogonal transform, the Discrete Cosine Transform (DCT) attempts to decorrelate the image data. After decorrelation each transform coefficient can be encoded independently without losing compression efficiency. Discrete Wavelets Transform (DWT) is a mathematical tool for changing the coordinate system in which we represent the signal to another domain that is best suited for compression. The objective of the thesis is to compare two compression techniques (DCT & DWT) and validate the results using MATLAB programming
Mr. Pramod B. Deshmukh , Mrs. Aditi A. Kalia, Mrs. Vrushali U. Mrs. Dipali M. Patil
Intelligent Data Mining and Network-Based Modeling of Social Media for Improving Care
Mr. Pramod B. Deshmukh , Mrs. Aditi A. Kalia, Mrs. Vrushali U. Mrs. Dipali M. Patil
Intelligently extracting knowledge from social media has newly attracted great interest from the Biomedical and Health Informatics community to simultaneously improve healthcare result and moderate costs using consumer-generated viewpoint. We propose a two-step analysis framework that focuses on positive and negative sentiment, as well as the side effects of treatment, in users’ forum posts, and identifies user communities and influential users for the determination of ascertaining user opinion of cancer treatment. We used a Self Organizing Map to analyze word frequency data derived from users’ forum posts. We then introduced a novel network-based approach for modeling users’ forum interactions and employed a network partitioning method based on optimizing a stability quality measure. This allowed us to determine consumer opinion and analyses influential users within the retrieved modules using information derived from both word-frequency data and network-based properties. Our approach can expand research into intelligently mining social media data for consumer opinion of various treatments to provide speedy, up-to-date information for the pharmaceutical industry, hospitals, and medical staff, on the effectiveness (or ineffectiveness) of future treatments.
Prop up the Farming Community with E-Services: Web Based Services for Agriculture
K.Kiruthika , R.Parimala
Agriculture is the backbone of many developing country economies. Agricultural development becomes same with worldwide development. Information of adequate quality is an essential stipulation for progress of all areas of agriculture and its allied areas with the quick development of Information and Communication Technologies (ICT), data and information could efficiently created, stored, analyzed and disseminated to support farming communities for improvement of agricultural productivity and sustainability. e-services is one of the best and foremost methodologies in ICT which can be achieved via the internet to share the information and knowledge from the bureaucrat community to farming community and it is also reaches the end-user in easy and simple way being it is a mobile based era.
Harshal P. Ganvir , Prof. Pravin Kulurkar , Prof. Pranita Laddhad
An energy efficiency of cloud based services using EaaS transcoding of the multimedia data.
Harshal P. Ganvir , Prof. Pravin Kulurkar , Prof. Pranita Laddhad
: Network-based cloud computing is now rapidly expanding all over as an alternative to conventional office-based computing. Cloud computing has become widespread and the energy consumption of the network and computing resources will grow cloud. This happens when there is increasing attention being paid to the need to manage energy consumption across entire information and communications technology (ICT) sector. In the proposed scheme data duplication technology is going to be used which is method of reducing storage needs by eliminating redundant data. This will save a lot of money on storage cost to store the data and on bandwidth costs to move the data. This paper, presents an analysis of energy consumption in cloud computing. The analysis will consider both public and private clouds. Computing tasks are of low intensity or infrequent. Thus, under some circumstances cloud computing may consume more energy than conventional computing where each user performs all computing on their personal computer (PC).
Safety in Wireless Sensor Network: Types of Attacks and Solutions
Kanika Sharma , Dr. Nischay Bahl
Wireless Sensor networks (WSNs) have become the most interesting regions of exploring in the 21st century. WSNs include a large number of sensor nodes, actuator nodes, gateways, and clients. Recent progress in wireless technologies has facilitated the vast variety of uses of WSNs in the military, traffic observation, target tracking, environment monitoring, healthcare monitoring, and so on. The designers of WSNs have been faced many new challenges, like sensed quantities, the size of nodes, and nodes’ autonomy. As a result, improved solutions to these confront and perfections in the modern technologies are required. The prospect expansions in sensor nodes must construct very influential and expenditure effective devices so that they may be used in applications. This paper also describes the modern research challenges for WSNs. And finally it reviews a number of security methods presently planned or implemented in WSNs.
Key words: wireless sensor networks, Future trends, recent advances, research challenges etc.
Prof.Shivashankar M.Rampur , Miss.Kavita S.Rampur D
An Approach of Speech Recognition System for Desktop Application
Prof.Shivashankar M.Rampur , Miss.Kavita S.Rampur D
Speech Recognition for desktop application is a system that allows the computer to identify and understand the commands spoken by a particular speaker based on individual information included in speech waves. The ultimate goal of work is to be able to produce a system that can recognize with expected accuracy, all commands that are spoken by particular person so that each operation of the application (power point) is accessed by corresponding commands. In the proposed work, Linear Predictive Coding (LPC) and Artificial Neural Network (ANN) are the techniques used for speech recognition system. Speech signals are taken and sampled directly from microphone and then they are processed using LPC method for extracting the features of speech signal. These features are used to construct the database to train the Artificial Neural Network using Back propagation method. Further the testing is conducted for the particular person by giving the voice command and if command is match/found then corresponding operation of application(power point) get enabled. The overall recognition accuracy of the proposed system with static or standard database is about 91.75% when tested with minimum 100 voice sample commands of a particular speaker. But, for real-time system, the accuracy is depending on the environmental situation and it will gives around 85-86% accuracy in worth.
Automatic Retina Exudates Segmentation Algorithm For Early Detection With High Performance
Kethavath Narender , Ananchu Sushma Rani
In the world, Diabetic Retinopathy is the leading cause of vision loss. Early symptoms of this disease are exudates, so early diagnosis and treatment at right time is very important to prevent blindness. For a particularly long time, automatic diagnosis of diabetic retinopathy from digital fundus images has been an active research topic in the medical image processing community. In this work, two new methods for the detection of exudates are presented which do not use a supervised learning step; therefore, they do not require labelled lesion training sets which are time consuming to create, difficult to obtain and prone to human error. We introduce a new dataset of fundus images from various ethnic groups and levels of DME which we have made publicly available. Experimental results show that proposed yields better results over state of art methods.
Autonomous Neuron Telematics Data Mining Architecture
Bh.V.Rama Krishna , B. Sushma
In this paper a data mining schema developed to analyze human brain Autonomous Neuron Telematic metrics during its functional period. The organization of modules and their staged data process functionalities are discussed. The architecture designed helps to improve the treatment strategies as well as doctors medical diagnosis process. It acts as a recommender system with clean interfacing to raw data processing. Also the paper focuses on neuron metrics and their data acquisition techniques
Now a day the machine became as much as intelligent like human. The machine don’t have their own intelligence logic so in the modern science we need to have a human thinking logic which can be made incorporate in the machine to improve their intelligence factor. Increasing machine intelligence leads to a shift from a mere interactive to a much more complex cooperative human-machine relation requiring a multidisciplinary development approach. This paper presents a generic multidisciplinary cognitive engineering method (CE+) for the integration of human factors and artificial intelligence in the development of human machine cooperation. For each system design the method supports research and development activities in such a way that sound knowledge bases, methodologies, and user interfaces for human-machine cooperation could be established. However, the method always needs to be tailored to the specific goals and circumstances, such as the available time, novelty, and required integration.
Cloud computing it can be defined as a group of computer and servers which connected together on network. Today, as many organization and enterprises are beginning to adopt the IOT(internet of things),they all need for large amount of data to be accessed quickly, to be safe on cloud from attacker or insider then the security is also important mechanism to secure cloud data of an government organization or any IT-industry. Sometimes existing encryption data protection mechanisms failed in preventing data theft attacks from criminal attacker, especially from insider to the cloud provider. To provide security to cloud data from unauthorized access from malicious attacker we propose a different approach to securing data in cloud system by using decoy technology. We monitor user behavior or data access patterns in cloud system and identifying abnormal data access patterns. When any unauthorized data access patterns is suspected then decoy data is provided to the unauthorized user. This mechanism protects against the misuse of the user real data. If incase real user get trapped in this system then user can ask one time password for verification.
A Comparative Study of Perceiving Intrusion Using Data Mining Techniques
M.Deepa, Dr.P. Sumitra .
By the rapid development of the computer network during the past few years, the security of information issue comes to be more and more difficult. The Intrusion Detection Systems (IDS) can be used widely for protecting network. Data mining techniques are extensively used, due to some attributes like the scalability, adaptability and validity. This paper focuses on review of the existing intrusion detection system by using data mining techniques and discussing on various disputes in the existing system based on certain classification parameters such as accuracy, detection rate, false alarm etc.
In this paper, we present image segmentation quality assessment study for Truncated Compound Normal with Gamma Mixture(TCNGM) under Expectation Maximization(EM) framework. Segmentation quality metrics such as Global Consistency Error(GCE), Probabilistic Rand Index(PRI), and Variation of Information(VoI) are applied to the clusters of image pixel labels produced by the model in comparison to the other models used for image segmentation. We show that our model is a competing one with other models.
DOID: A Lexical Analyzer for Understanding Mid-Level Compilation Processes
Oyebode Idris and Adedoyin Olayinka Ajayi
This research was undertaken to give students in the local Nigerian environment a hands-on, practical and direct knowledge of Compiler Construction and Automata Theory, with the motivation to make it the Country’s first programming language. The project was carried out using the Lex/Flex Lexical Analyzer Generator and the C Language. Compiler construction and automata theory has been one of the tougher subjects for local students in the Nigerian region. The purpose of this research is to make our programmers better understand the processes in program compilation and also catch up with the interest of nonprogrammers who may become fascinated by the exquisiteness of programming when it is only at the highest level, which is more like speaking to a fellow human. Locals and students will also be more interested in the subject matter when they are to learn a Language developed in their country.
The best answers to the fuel crises compelled to survive made a sustainable road transportation. One such effort in this regard is reported in this paper. Due to overcome of power electronics, the population of hybrid vehicle is also hiking up day by day. The Brushless DC motor is considered as potential drive to automotive applications such as the (Hybrid vehicles). Design of a direct drive, Brush less DC motor is employed (BLDC) or (electronically commutated motors). Many constraints have been considered, such as the size of the motor, maximum driving current and maximum output power. The diameter and the stack length are limited by using modern analytical tools of the prototype vehicle. Nobel analytical tools are used to obtain static and dynamic characteristics of the motor and geometrical verifications for low cost efficient design. A low cost electronic controller compatible for present application has been developed and designed in this paper. The prototype is fabricated and tested on a light weight electric vehicle such as the car and two wheeler. This automotive model’s performance was tested and its results are simulated in this paper. It has lot of advantages such as the generating power by regenerative braking at speed barkers, recharging the battery while the vehicle is in under the motion.
India’s Public Distribution System (PDS) is the largest retail system in the world. System of Public Distribution provides a ration card issued under an order or authority of the State Government for the buy of essential consumer materials like rice, wheat, kerosene and oil. State Government issues distinctive ration identity cards like yellow ration card, saffron (orange) ration card, and white ration card depending on family annual income. The consumer material is feeding to ration card holders in the first week of every month by ration shop keeper. System of Public Distribution is one of the widely disputable issues that involve malpractice. The manuscript intervention in weighing of the materials leads to incorrect measurements and/or it may happen, the ration shop owner illegally uses consumer materials (Rice, Wheat, Kerosen) without previously knowledge of ration card holders.
The proposed system aids to power control malpractices which are present in ration shop by superseding manual work with automatic system based on RFID. Every consumer i.e. family head provided RFID radio frequency identification card which acts as ration identity card. The RFID card has unique (rival) identification number. The consumer scans the card on RFID radio frequency identification reader which is faced with microcontroller kept at ration shop. Once consumer is validated by details, the system shows customer’s product and cost. Based on material chosen by consumer, appropriate correct circuitry will be activated and consumer gets material. The proposed RFID based automatic ration shop system would bring transparency appropriate in public distribution system and become aids helpful to prevent malpractices.
Imperfect Debugging Software Reliability Growth Model for the Rayleigh failure time distribution
Balakrishna, K. Harishchandra .
Non homogeneous Poisson process software reliability models assume perfect debugging. However in the testing process there is a chance of introducing new faults when detected faults are removed. A model with this concept is called imperfect debugging software reliability model. Imperfect debugging software reliability models proposed in the literature assume a constant or monotonically decreasing fault introduction function. In this article we propose a software reliability model that considers Rayleigh distribution fault content function. The model can capture increasing/decreasing nature of fault introduction rate per fault. The parameters of the model are estimated using maximum likelihood method. A real data are used to verify the model.
Implementation of High speed and Low power 6T SRAM cell using FinFET at 22nm technology
A.Sai Kumar, B.S. Priyanka Kumari
Static Random Access Memory (SRAM) comprises considerable proportion of total area and total power for almost all VLSI chips as cache memory for the System on Chip (SOC) and it is considered to be more intense in upcoming time in both handy devices and high-performance processors. Static Random Access Memory (SRAM) plays a most significant role in the microprocessor world, but as the technology is scaled down in nanometers, leakage current, leakage power and delay are the most common problems for SRAM cell which is basically designed in low power application. By using low-power FinFET based SRAM cell, we can accomplish higher steadfastness and enhanced battery life for handy devices. Our objective of this work is to improve delay and power consumption in proposed nanoscale 6T FinFET SRAM cell structure. The total leakage of FinFET SRAM cell is reduced by 23% after applying self controllable voltage level technique. The power consumption and write delay as well as read delay of proposed 6T FinFET based SRAM cell structure improves on CADENCE VIRTUOSO tool at 22nm technology scale.
Reduction in Infrastructure and operating costs using Server Virtualization
Gitanjali .
This paper presents a brief look at virtualization, and its benefits in today’s IT world. Server Virtualization results in overall reduction in infrastructure and operating costs, manpower requirements, space. Virtualization provides benefits such as greater efficiency in CPU utilization, better management through central environment control, reduced project timelines, improved disaster recovery capability, more central control of the desktop, and also improved outsourcing services.
Selfish Attack detection mechanism using COOPON in Cognitive Radio
Shital.S.Patil ,A.N.Jadhav, Vivek T. Patil
Cognitive radio is one of the wireless basedcommunication technology. This technology is mainly designed to allowthe unlicensed users to utilize the maximum bandwidthavailable in the network. An important consideration to anywireless network is secure communication. In Cognitive radio (CR), the unlicensed users use the maximumavailable bandwidth. When the spectrum is not used by thelicensed primary user, the free channels are allocated forthe unlicensed secondary users (SUs). But the problem is thatsome of the secondary users act selfishly to occupy all thechannels. These secondary users are called as selfish attackers. Hence, to detect a selfishattacker COOPON (Cooperativeneighboring cognitive radio Nodes) detection technique is used. Theproposed work provides COOPON system which detects multiple selfish attacks and evaluate the detection rate by considering the parameters like selfish secondary user density, number of secondary nodes and number of neighboring nodes using MATLAB R2012a (version7.14.0.739).
Correct Name Labelled For Search Based Face Annotation
Bhawana Pise, Naziya Pathan, Shyam Dube
In this project, we investigate and implement a promising search based face annotation scheme by mining large amount of weakly labelled facial images freely available on the World Wide Web (WWW). We proposes a review on various techniques used for detection and analysis of each technique and efficient-based approximation algorithm for large-scale label refinement problem. The face annotation has many real world applications. Most of the users use person’s name as the search query. So it is effective to label the images with their exact names. The automatic face recognition techniques can annotate the faces with exact labels and it also help to improve the search more efficiently annotations from them. The challenging part of search based face annotation task is management of most familiar facial images and their weak labels. Different techniques are used in retrieving facial images based on search query. The efficiency and performance of annotating systems are improved tremendously by using edge detection technique. This approach is beneficial to find the correct data related to facial features. Firstly, at least one accurate keyword is required to enable text-based search for a set of semantically similar images. Then content-based search is performed on this set to retrieve visually similar images. At last, annotations are mined from the descriptions. Specifically, the task of face-name association should obey the following three constraints: a face can only be assigned to a name appearing in its associated caption or to null; a name can be assigned to at most one face; and a face can be assigned to at most one name. Many conventional methods have been proposed to tackle this task while suffering from some common. The face annotation technique with edge detection algorithm is efficient to tackle problem in clustering based approximation algorithm and ULR algorithms can significantly boost the performance of the promising search based face annotation (SBFA) scheme.
Combination of Cloud Computing and High Performance Computing
Mandeep Kumar .
Cloud Computing is a remote location technology which provides Platform as a Service (PaaS), Software as a Service (SaaS) and Infrastructure as a Service (IaaS). High Performance Computing (HPC) allows scientists and engineers to solve complex science, engineering, and business problems using applications that require high bandwidth, enhanced networking, and very high compute capabilities. The combination of Cloud Computing and High Performance Computing allows you to increase the speed of research by running high performance computing in the cloud and to reduce costs by providing Cluster Compute or Cluster GPU server’s on-demand without large capital investments. Tap into unlimited resources to scale your High Performance Computing jobs - analyzing large-scale data, running simulations and financial models and experimenting while reducing time to market. Build your personalized end to end High Performance Computing solution on Cloud which tailored to your organization’s needs.
Nowadays use of internet is growing rapidly. Most of the information share and use by end users on the web. In any format data or information access by user, most of the available information is in text format. All such text documents available have common content between them with different time stamp. The mutual action between common topics may deduce valuable knowledge but as they are not aligned properly they are not arranged in index fashion. The absolute purpose of this paper is to extract common topic with the help of topic model using appropriate time period. Generative topic model follows two alternative steps. First is retrieve common topic from all the documents with their adjusted time stamp and second is adjusting the time stamp with respect to time period dispersion of common topic being formely generated.
On a Software Reliability Growth Model with Log Logistic failure time distribution
Balakrishna, K. Harishchandra
Non Homogeneous Poisson process models with expected number of faults detected in given testing time are proposed in the literature. These models show either constant, monotonic increasing or monotonic decreasing failure occurrence rate per fault. In this article we propose a software reliability model in which the distribution of time between two failures assumed to be log logistic distribution. The model can capture increasing/decreasing nature of failure rate. The parameters of the model are estimated using maximum likelihood method. A simulation study and real data are used to verify the model.
Badugu Samatha, Dr. K. Raja Kumar, Nagarjuna Karyemsetty
A Low cost prototype for Vehicle to Infrastructure communication
Badugu Samatha, Dr. K. Raja Kumar, Nagarjuna Karyemsetty
Exchange of messages in Cooperative Communication and Sharing applications is the significant role in vehicular adhoc network(VANET)s for passengers, driver safety, warning indications, weather updates, traffic updates and road conditions etc can be shared among vehicle nodes in VANET within the STS (Smart Transportation Systems). We conducted an experimental setup to study and create a simple network among five vehicle nodes & it connectivity. Design of each vehicle node composed of communication unit, Processing unit, GPS and power source. Each vehicle node in network exchanges or shares details such as position, speed & direction etc. of the vehicle node to Infrastructure or RSU in which administrator or authorized user can track the mobility path record of that vehicle including current status of a vehicle. This hardware can also useful to trace any missing vehicles, theft vehicles, misbehave vehicles using latitude and longitude of vehicle. Our results showed that the Xbee wifi modules are not enough to track the high mobility vehicle without time gap. We also observed a degradation of network performance in high way scenarios. We created the base station to log and update cloud to record the details. This application can be integrated to Internet to form the Internet of Vehicle (IoV) network which is a subclass of Internet of Everything (IoT).
A mobile operating system (mobile OS) is a system software that allows smartphones and other handheld devices to run applications as well as manage the device’s precious resources like processing power, battery and memory. A mobile OS typically starts up when a device powers on, presenting a screen with icons or tiles with information and through which applications can be accessed. Apart from user applications, mobile operating systems also manage network connectivity. Android, Apple iOS and Blackberry OS are some of the famous mobile operating systems which provides the combined features of personal computer operating systems and the features including touch screen, cellular, Bluetooth, Wi-Fi, GPS navigation system, camera, speech recognition, voice recorder, music player etc. This paper systematically reviews the different operating systems used in the mobile devices
Test Case Generation for Software Quality Assurance by Using PrT Nets
M. Mahanandi Babu, G. Ramesh, G. Geetha
The quality of software is conditioned on checking and verifying of software. Programming testing performances fundamental early through of programming growth life cycle. It is the philosophy to finding absconds by executing our program without imperfections on a strategy of examinations and separating the faults outcomes and expected outcomes. For conveying the examinations, Information regarding the lead of system must be believed to in the first place, which can be taken from the models made in setup organize. Shortly a-days Model based testing for progressing structures is in impact. This paper acclimates an approach with convey test cases by utilizing PrT nets to adjust charge affirmation restrict with expansion time execution, other than the adaptability of the test code generator for nonstop frameworks. Petri Net (PrT) properties are assessed a brief time period later made trials made for check of Real time structure. It will in all likelihood redesign the capacity and meanwhile to decrease the high cost of the manual testing in setup organize itself.
Varsha Yaduvanshi, Asst.Prof. Manish Rai Prof.(Dr.) Mohit Gangwar
A Review On Data Security in Cloud Environment
Varsha Yaduvanshi, Asst.Prof. Manish Rai Prof.(Dr.) Mohit Gangwar
The primary use of cloud computing is information storage. Cloud provides enormous capability of storage for cloud users. It is lot of reliable and versatile to users to store and retrieve their information at anytime and anyplace. It is an progressively growing technology. Nowadays, several enterprises have started using cloud storage because of its benefits. Even though the cloud continues to gain popularity in usability and attraction, the issues belong information security, data privacy and alternative data protection problems. Security and privacy of information stored in the cloud are major setbacks within the field of Cloud Computing. Security and privacy of the information stored in cloud are the key issues. This paper offers the brief discussion on cloud data security.
Comparative Study of Predicting Heart Disease By Means Of Data Mining
C.Sowmiya , Dr.P. Sumitra
At the present time all the activities are done in the world through internet. The use of computer in the fieldsof medicine are highly improved. The computerized hospital includes the activities like treatment of illnesses, maintain the patient’s information up-to-date that leads to handle huge amount of data regularly. It is very difficult to handle the large amount of data for predicting the heart disease. Data mining approach is a good way for predicting the heart disease at minimum effort.This paper analyses the existing prediction system and discussing the various disputes on the existing system. The result of this paper helps the health consultants to diagnose the disease in less time and predict the probable problems well in advance and save the patient life.
Security is one of the most challenging aspects for information exchange in the World Wide Web. So this is an approach to find out the best solution for providing necessary protection to our data against malicious attacks from intruders.
Cryptography and Steganography are the two major techniques that are being used worldwide for enhancing the security of data in secret communication. Steganography is the method through which existence of the original message is kept secret from a third party. In steganography the original message is hidden into the cover medium. Cryptography converts information from its original form (plaintext) easily understood by anyone into an unreadable form (cipher text) that does not express or mean anything. In this paper we are using steganography to hide the message applied together with cryptography so that we can enhance the security of the data. We are using LSB algorithm for steganography along with IDEA algorithm for cryptography.
Enhance multipath routing in topology transparent network for better QoS in MANET
Surendra Ladiya .
the interconnected nodes in wireless environment are forming a dynamic, temporary and open network called Mobile Ad hoc Network (MANET). In Mobile ad hoc networks communication are not very easy because of limited available bandwidth. The network performance is also being possible to measures by Quality of Service (QoS). The QoS measures through criteria of modification in routing strategy, improvement in packets dropping and all the criteria that change the network parameters for improving performance. Conventionally, every network protocols follow the criteria of strictly layered structure and implement congestion control, routing and scheduling independently at different layers. In this paper we research for control congestion and collision in dynamic network. In term of lesser congestion and collision QoS of routing with multipath protocol is measures. In this research the three scenarios of routing is considered. In first scenario the normal performance of ad hoc one demand multiple distance vector routing protocol (AOMDV) is measures, second one is measures on the basis of unassigned slots utilization to senders and third is shows the enhancement by adding them the concept of location based routing and queue estimation approach. The multipath routing protocol in MANET has the capability of balance the load in network properly by providing the alternative paths possibility. The proposed scheduling techniques is reducing the bandwidth consumption and possible to handle the problem of congestion and collision i.e. necessary for improving the QoS of routing in dynamic network. The simulation results are shows that the proposed performance is better than the existing approaches.
A proposal for efficient 8 two way traffic signal system for pedestrian and ambulance along with violation detection
Riya Paul, Miss. Amrutha Benny , Dr. Vince Paul
In modern life we have to face many problems because of traffic congestion. It is said that the high volume of vehicles, the inadequate infrastructure and the irrational distribution of the development are main reasons for increasing traffic jam. The major reason for traffic congestion is the high number of vehicle which was caused by the increase in population and the development of economy. Traffic congestion is a condition that occurs as use increases, and is characterized by slower speeds, longer trip times, and increased vehicular queuing. Here in my proposed work I am depending on 8 different roads that meet at a single junction. In that i will consider pedestrian, vehicles, and ambulance and red light violation detection persons too. The use of RFID and GPS will help to make the lane clear for ambulance. Using the RFID we can detect the red light violators and we can assign fine to them. Lastlly for pedestrian I am providing one subway and one overbridged.
Performance Study of Key Developer Data Encryption and Decryption Algorithm (KDDEDA) with AES, DES and BLOWFISH
Miss. A.Usha, Dr. A. Subramani .
Information security is an important issue in network communication. Because of the significance, accuracy and sensitivity of the information it is a big security and privacy issue, making it necessary to find appropriate solution, security and privacy has become as important concern. Cryptography is making sure to secured data protection. Cryptography concept is used facilitate for secret communication among the military communications. The present days different types of cryptography algorithm are used to secure data such AES, DES and blowfish. The traditional algorithms have some of the drawbacks like speed, key size and performance. The proposed a new cryptographic algorithm named as KDDEDA [Key Developer Data Encryption and Encryption Algorithm], The KDDEDA using to transmit confidential data for source to destination with speed data transmission and performance. KDDEDA also analyse encryption/decryption time, memory space, key size, block size and performance.
An Improved Novel Energy Efficient Method for Resource Allocation in Clouds Based on Ant Theory
Ashmita , Dr. Dinesh Kumar
Cloud computing is the development of distributed computing, parallel computing and grid computing, or defined as the commercial implementation of these computer science concepts. The allocation of cloud computing resource is a hot topic. Many scholars have done some research in this area. This implementation have the intention of achieving the establishment of performance qualitative analysis on VM migration and process according to their deadline, then implemented in Cloudsim with Java language. A previous study also indicates change of instruction size (MIPS) will affect the response time and increase in instruction size (MIPS) versus VM decreases the response time. When metaphor size of VM is implemented against the VM bandwidth then no significant effect is found on response time and it remains constant for which these parameters are carried out for research. But in case of Cloudlet long length versus PM bandwidth a pattern is observed in which response time increases in proportionate manner. Using the modified approach the reduction in the down time and increase in efficiency of the various processes are resolved as shown in conclusion.
New Soft Computing Techniques in the Software Testing
Suraj Indiver, Mr. Vyom Kulshreshtha
Testing is tedious, time consuming and costly. This dissertation explores self test data creation technique. It uses a new algorithm called Genetic-Particle Swarm Combined Algorithm (GPSCA) which is based on a combination of Genetic Algorithm (GA) and Particle Swarm Optimization (PSO). It uses dominance relationship between two nodes. The test data were derived from the program's structure with the aim to traverse every statement in the software. The algorithm uses a new evaluation (fitness) function to evaluate the generated test data based on the concepts of the dominance relations between nodes of the program’s control flow graph. The fitness function used to evaluate each test case by executing the program with it as input, and recording the traversed nodes in the program that are covered by this test case. The main reason of using GPSCA is its ability to handle input data which may be of complicated and complex and difficult to determine manually. Thus, the problem of test data generation is treated entirely as an optimization problem. The performance of the proposed approach is analyzed on a number of programs having different size and complexity. Finally, the performance of GPSCA is compared to both GA and PSO for generation of automatic test cases to demonstrate its superiority. The effectiveness of test data generation using GPSCA is better than GA and PSO as it requires fewer tests than later and achieves 100% coverage in less number of generations
A Study: Impact of Interactive Posting in Social Site
Vivek Dubey .
Now a day, social sites are getting popularity in every age person because of its easy install, interface, access and update. In future, there are two biggest challenges with respect to digitalization. First is a usage of internet and second is spending time in using internet. After spending maximum time, still there is question in mind that is user analyzing, learning, getting knowledge from received message by any means. In general, there is no creativity and just user are wasting time, money of their as well as others. In this paper, this challenges and objectives: utilization and productivity, has been highlighted, studied and discussed.
Secure Data Sharing and Privacy Preserving Authentication Protocol for Cloud Environment
Rudresh N. Bagade , C.R.Barde
Cloud computing is an evolving data interactive paradigm to perceive user’s data remotely stored in an online cloud server. It provides great benefits for the users to enjoy the on-demand cloud applications without considering the local infrastructure restrictions. During the data accessing, different users may be in alliance, and thus data sharing becomes remarkable to achieve productive advantages. The existing security solutions mainly focus on the authentication to realize that a users destitution data cannot be illegally accessed, but neglect a minute privacy matter during a user challenging the cloud server to request other users for data sharing. The challenged access request itself may disclose the users privacy no matter whether or not it can obtain the data access permissions. The proposed system suggest a multi-user sharing privacy-preserving authentication protocol to address above privacy issue for cloud storage.
A Survey on Destination Prediction Using Trajectory Data Mining Technique
Banupriya C S1, Dr.V.Vijaya Chamundeeswa
Destination prediction technique involves tracking the trace of the moving objects with the positioning services like GPS equipped devices. Destination prediction is also called path discovery to find most suitable path that satisfy predefined objective between source and destination. Trajectory is represented by a sequence of time stamped geographical location. Trajectories provide intelligence to estimate, compare and construct candidate routes by historical road network. All trajectories are decomposed into sub-trajectories and then synthesized-trajectories are generated by connecting sub-trajectories together. Moving objects can be human being, animals, vehicles and even natural phenomenon (e.g., Hurricanes). Mobility pattern of the user is predicted using next check-in data. Prediction features that exploit different information dimensions about users based on venue prediction.
Analysis of Disease using Retinal Blood Vessels Detection
Minal B. Wankhade, Dr. A. A. Gurjar
The significant health issues among the senior and old individuals are eye ailments. One of the most important internal components in eye is called retina. Retinal images play vital role in several applications such as disease diagnosis and human recognition. They also play a major role in early detection of diabetics by comparing the states of the retinal blood vessels. Retinal Image Analysis is a key element in detecting retinopathies in patients. Diabetic Retinopathy is one of the most common diabetic eye conditions which cause blindness induced by alterations in the blood vessels of the retina. In this work we detect the blood vessels effectively for the diagnosis of disease such as diabetes, glaucoma, and hemorrhage
Ms. Pooja A. Baleghate Prof. Sachin B. Takmare , Prof. Pramod A. Kharade
Multi-threaded QoS Architecture for Multimedia Services over Software Defined Networks
Ms. Pooja A. Baleghate Prof. Sachin B. Takmare , Prof. Pramod A. Kharade
This paper presents novel multi threaded controller-forwarder architecture to support QoS for multimedia streaming over SDN. We foresee that, large network is partitioned into domains; each domain is managed by a controller, where each controller performs optimal QoS routing and shares the routing information with other domain controllers. To this effect, this paper proposes (i) an algorithm for super controller managing inter domain routing, (ii) an algorithm for controller managing intra domain routing, to find out an optimized QoS routes. We apply these extensions to streaming videos and compare the performance of proposed architecture with single threaded controller-forwarder architecture. Our experimental result shows that the proposed architecture performs faster than the single threaded controller-forwarder architecture.
Machine tools have imperative role in technology advances, escalating productivity and accuracy. However heat generated in machine tool results in thermal error that affects the machining precision and productivity. In machine tool the heat is generated due to internal and external heat sources. A spindle is the main internal source of heat generation. This heat can be dissipated by efficient cooling techniques. We have focused on forced cooling, conventional cooling and thermoelectric cooling techniques. This paper intended to provide investigational information aboutdifferent cooling techniques for spindle of machine tool
Advancement in Science and Technology have always helped us to live more happily. Through research and development, new innovations have made our life more peaceful and happier. Internet of Things (IoT) is one such technology which is developing at a very high pace. The proposed system is to make a system, using IoT, which senses the room temperature and sends this data to a cloud for further analysis and/or action. The proposed system has a wide area of application. Some of which are home automation, fire detection in labs, mines, etc.
Design an Innovative Smart Control Scheme to Hybridize Conventional and Expert Controllers
Mahmoud M Aboattia .
The purposes of the proposed research present approaches to the design of an Innovative Smart Control Scheme (SCS) methodology mergers the proposed local controllers (conventional PID and the expert controller such as fuzzy Logic controllers (FLC)) in a smart way. This SCS switching and merging mechanism depends on FLC that monitors the process state and act as a supervisory to make hybrid control between the local controllers. A local controller is an analytical controller designed to work around specific process operation .Once the conditions change, the rule-based supervisor decreases the influence of one classical controller (PI) and gives more weight to another intelligent controller (Fuzzy Logic) that has been designed to work in the new conditions. Application of the suggested (SCS) on a simple plant which could be a resonator in proposed system, DC machine is introduced and better response of the new proposed SCS is presented. The performance of SCS will compared to the FLC and PID. MATLAB/SIMULINK program is projected for Comparison testing by applying different disturbances cases.
On theory and Performance of high throughput parallel block and S-random interleavers for Turbo Codes
Rutuja A. Deshmukh, Dr. Ashish R. Panat
It is known that one of the essential building blocks of turbo codes is the interleaver and its design using random, semi-random (S-Random) and deterministic permutations. In this paper, two new types of turbo code interleavers, Modified Block S-Random (MBSR) interleaver and Modified Matched S-Random (MMSR) interleaver are proposed. The design algorithm for the new interleavers is described in depth, and the simulation results are compared to the two new interleavers with different existing interleavers based on the BER (Bit Error Rate) performances of the turbo codes. Through the simulation, we find a better performance of the MBSR interleaver than random and practical interleavers. In addition, the performance of MMSR interleaver is close to the code matched interleaver at different frame sizes and with less complex design.
The Probabilistic Approach for Identifying Hotel Appraise Passing Through Intrinsic & Extrinsic Domain Relevance
Miss. Rutu A Ostwal, Prof. G.P. Chakote
The Internet revolution has created a new way of expressing the opinion of an individual. It has become a means by which people openly express their views on various topics. These opinions contain useful information that can be used in many areas that require constant feedback from clients. The analysis of opinion and its classification into different classes of feelings gradually emerges as a key factor in decision-making. There has been extensive research on automatic text analysis for feelings such as sentiment classifiers, affects analysis, automatic survey analysis, opinion extraction, or recommendation systems . These methods generally attempt to extract the overall feeling revealed in a sentence or document, either positive or negative, or somewhere in between. However, one disadvantage of these methods is that information can be degraded, especially in texts where loss of information can also occur. The proposed method attempts to overcome the problem of loss of textual information by using well-formed training sets. In addition, the recommendation of a product or the application of a product according to the requirements of the user has met with the proposed method.
An All Quadrilateral Automesh Generation Technique and Explicit Integration Scheme for Finite Elements to Solve Some Elliptic Boundary Value Problems in Two Space
H.T Rathod*, K. Sugantha Devi
This paper proposes the explicit integration scheme for a unique linear convex quadrilateral which can be obtained from an arbitrary linear triangle by joining the centroid to the midpoints of sides of the triangle. The explicit integration scheme proposed for these unique linear convex quadrilaterals is derived by using the standard transformations in two steps. We first map an arbitrary triangle into a standard right isosceles triangle by using an affine linear transformation from global (x, y) space into a local space (u, v). We discretise the standard right isosceles triangle in (u, v) space into three unique linear convex quadrilaterals. We have shown that any unique linear convex quadrilateral in (x, y) space can be mapped into one of the unique quadrilaterals in (u, v) space. We can always map these linear convex quadrilaterals into a 2-aquare in a natural space by an appropriate bilinear transformation. Using these two mappings, we have established an integral derivative product relation between the linear convex quadrilaterals in the (x, y) space interior to the arbitrary triangle and the linear convex quadrilaterals of the local space (u, v) interior to the standard right isosceles triangle. Further , we have shown that the product of global derivative integrals in (x, y) space can be expressed as a matrix triple product P ( X (2 * area of the arbitrary triangle in (x, y) space ) in which P is a geometric properties matrix and is the product of global derivative integrals in (u, v) space.We have shown that the explicit integration of the product of local derivative integrals in (u, v) space over the unique quadrilateral spanning vertices (1/3 ,1/3), (0, ½), (0, 0) , (1/2, 0) is now possible by use of symbolic processing capabilities in MATLAB which are based on Maple – V software package. In a similar manner we have found explicit integrals of ihe shape function and global derivative products as well as the product of shape functions.We use these integral values in computing stiffness matrix for some elliptic equations with constant coefficients.The proposed explicit integration scheme is a useful technique for boundary value problems governed by either a single equation or a system of second order partial differential equations. The physical applications of such problems are numerous in science, and engineering, the examples of single equations are the well known Laplace and Poisson equations with suitable boundary conditions. These problems are already studied in authors recent paper. We have demonstrated the proposed explicit integration scheme to solve the elliptic equations with constant coefficients subject to Dirichlet boundary conditions over simple polygonal domains like 1-square and 2-square.We have demonstrated the propsed scheme and technique to study five typical elliptic boundary value problems.Three FEM models with 2400,5400 and 7776 elements and 2481,5521 and 7921 nodes respectively are used.Tables of fem computed values,theoretical values at selected nodes and the finite element meshes are appended.The findings confirm with surface plots of exact solutions for the considered elliptic boundary value problems.
Key words: Explicit Integration, Finite Element Method, Matlab Symbolic Mathematics, All Quadrilateral Mesh Generation Technique,Elliptic equations with constant coefficients ,Dirichlet Boundary Conditions ,Polygonal Domain,2-square,1-square
In the 21st century, the internet revolution has brought about an explosion of information in the form of documents and web pages. Today, more and more focus is being given to visual representation of data. Digital Image Processing has thus emerged as one of the most researched fields in the computer domain. Image segmentation is important part in many signal processing technique and its applications. It is the process of partitioning a digital image and dividing it into meaningful structures known as segments (sets of pixels, also known as superpixels). It is often an essential step in image analysis, object representation, visualization, and many other image processing tasks. Image segmentation is a great challenge in the field of computer vision. The aim of this paper is to give an overview of image segmentation and the techniques for the same.
A Review of Weather Forecasting Using Data Mining Techniques
Ms.P.Shivaranjani , Dr.K.Karthikeyan
The vast dramatically changes occurs day by day in certain fields due to the development of advanced technology and nature one such among them is rainfall. The rainfall is the fragment of the agriculture and unable to understand the monsoon condition, predicating the crop yield and the soil fertility. Data mining is the techniques used to extract the knowledge from the set of data.This paper provides a survey of different data mining techniques being used in weather prediction or forecasting which helps the farmer for yield worthy productive and nourish the soil fertility such as artificial feed-forward neural networks (ANNs), fuzzy inference system, decision tree method, time series analysis, learning vector Quantization (LVQ) and biclustering technique.
Web search tools have been produced to address this issue by coordinating catchphrases in questions to words in the portrayals of utilizations, remarks in their source code, and the names of program factors and sorts.. On the off chance that code sections are recovered with regards to executable applications, it makes it simpler for developers to see how to reuse these code fragments. In request to address this issue an application seek framework called Application Program Interface (API) for anticipating pertinent applications as a portion of Searching, Selecting, and Synthesizing (S3) design. This web index helps clients find very significant executable applications for reuse. It consolidates diverse wellsprings of data about applications keeping in mind the end goal to find important programming: the printed depictions of utilizations, the API calls utilized inside every application, and the dataflow among those API calls such as Class relations, circling requirements, and remarks on code. By including more semantic portrayal of venture this aides in recovering unimportant outcomes i.e., more than at least one number of result identified with current programming improvement assignment identified with client query. This can be valuable to the client keeping in mind the end goal to get various significant programming applications related current advancement undertaking for reusability of venture.
Energy Efficient Communication for WSNs using Grey-Wolf Optimization Algorithm
Pranjali Diwan ,M.R . Khan
Wireless sensor networks (WSN)are utilized for measuring various parameters such as pressure, temperature or humidity monitoring, in buildings to monitor smoke and fire, surveillance monitoring and also for environmental monitoring etc. These sensors are comprised of numerous small electronic devices known as sensors which are operated on battery. The wireless sensors are deployed in the chosen region according to the area of interest so that it can continue sensing for a long duration. But to keep these sensors active for a desired duration, the network’s lifetime should be necessarily prolonged with less power consumption because unbalanced battery usage becomes a major challenge in WSNs. There has been a vast research in last few decades on different types of protocols depending upon the type of network i.e. homogenous or heterogeneous. It is seen that energy efficiency can be obtained by clustering methods. Various meta-heuristic optimization techniques also have been proposed earlier to resolve the optimization problems. In this paper, we aim to achieve energy efficiency by using fuzzy logic for cluster formation and Grey Wolf Optimizer (GWO) for cluster head (CH) election.
Soniya Zope, Shrutika Pandit Shweta Wakale ,Farin Tamboli, Jay Bedekar
Monitoring Lan User Wirelessly By Android Mobile Based On Client/Server Mode."
Soniya Zope, Shrutika Pandit Shweta Wakale ,Farin Tamboli, Jay Bedekar
We can use android phone for monitor the network. .We can control very easily network when it is present inside the office and it is very difficult to control when present outside the office. Admin can monitor his WLAN network through his android phone with GUI from remote location, it is an alternative solution for monitor network. The main aim of this android application is to provide all the essential information of the wireless network to the admin on their android phone with the help of Wi-Fi. We are using data connectivity or Wi-Fi to connect the mobile phone to WLAN server. The interaction between the clients and the remote administrator is achieved via a central monitoring server. The main ob jective is to provide maximum details about the network to the administrator on their android phones, when administrator is away from office or goes out station.
A Partial Replacement of Fine Aggregate by Copper Slag In Concrete
Naveed A Shaikh, , Pradeep P Tapkire
Many countries are witnessing a rapid growth in the construction industry which involves the use of natural resources for the development of the infrastructure. In order to reduce dependence on natural aggregates as the main source of aggregate in concrete, artificially manufactured aggregates and artificial aggregates generated from industrial wastes provide an alternative for the construction industry. In this study we are using copper slag as a partial replacement to fine aggregates in concrete, in which cubes were casted for various grades of concrete and for various proportions of sand replacement with copper slag ranging from 20% to 50%. Obtained results on different parameters like strength, workability and density were compared with those of control concrete made with ordinary Portland cement and sand.
A New Resource Allocation Policy in Virtualized Environment for IAAS Clouds
Richa Vats * Geetika Jain* Gyanender Kumar**
Cloud computing is a ideal for enabling convenient, on-demand web admission to a public pool of configurable computing resources. To furnish cloud computing services frugally, it is vital to optimize resource allocation below assumption that the wanted resource can be seized from a public resource pool. In supplement, to be able to furnish processing ability and storage capacity, it is vital to allocate bandwidth to admission them at the alike time. This paper proposes an optimal resource allocation process for cloud computing environments.
Accessibility is a measure of the extent to which a product or service can be used by a person with a disability as effectively as it can be used by a person without that disability.” If a blind person can use all the functions of an ATM machine just as easily as a sighted person, then that machine can be said to be fully accessible to blind people. However, a person in a wheelchair might find the same ATM machine difficult or impossible to use. It would then be described as “inaccessible to a person in a wheelchair”.
Mohamed H. Haggag, Ensaf H. Mohammed, Mariam S. El-Rahmany
Social Engineering Attacks Detection Techniques: Survey Study
Mohamed H. Haggag, Ensaf H. Mohammed, Mariam S. El-Rahmany
Social Engineering Attacks becomes a real threat especially with the emerging of the Online Social Networks (OSN) which provides the attacker with personal information about the victim that facilitates the attack. It becomes more common threat against enterprises and SMBs (Small and Medium Business) like threaten its financial and trust work. The E-mails and OSNs such as Twitter and Facebook are the most common environments used in this kind of attacks. In this paper, we have reviewed the existing techniques for detecting the Social Engineering Attacks mainly on e-mails and OSNs. Mostly focus on the Natural Language Processing (NLP) and machine learning techniques. A comparative study and evaluation of these approaches is presented. This provides an understanding of the problem, its current solution alternatives, and the anticipated future research directions