Recoverable Concealed Data Aggregation with Multiple Applications in WSN
M.Amrutha, M.Kamarajan
Recently several data aggregation techniques based on symmetric key encryption mechanism have been proposed on wireless sensor networks (WSNs). These types of data aggregation methods result better security compared with the traditional aggregation mechanisms. In this proposed Recoverable Concealed Data Aggregation approach, Cluster Head (CH) can directly aggregate the cipher texts of an individual nodes present on that particular cluster. Based on symmetric schemes, the provider can conduct aggregation queries without decryption. Here, a Concealed Data Aggregation (CDA) technique is extended with the symmetric key encryption. Also, the clustering strategy is presented to divide the sensor nodes into multiple clusters. Cipher Block Chaining (CBC) algorithm is used to encrypt the sequence of bits into a single block or unit. The proposed scheme has three contributions. First, it is designed for a multiple application environment. The base station retrieves the application-specific data from the aggregated cipher texts. Next, it mitigates the impact of compromising attacks in single application environments. Finally, it degrades the attacks from unauthorized aggregations. The result shows that the proposed Recoverable Concealed Data Aggregation with Multiple Applications (RCDA-MA) performs better than the existing CDAMA system.
Enhanced 2nd Order Gray Edge Color Constancy Algorithm Using Bilateral Filter
Richa Dogra, ArpinderSingh
The color constancy techniques becomes an important pre-processing technique which reduces the effect of the light source on the given image or scene. It is found that light effects lot on a given scene. So effect of the light source may degrades the performance of certain applications a lot like face recognition, object detection, lane detection etc. Color constancy has ability to detection of color independent of light source. It is a characteristic of the distinct color awareness organization which guarantees that the apparent color of objects remains relatively constant under altering illumination conditions. The overall goal of this paper is to propose a new algorithm 2nd order gray edge based color constancy algorithm using bilateral algorithm. The overall attention is to enhance the color constancy algorithm further. The histogram stretching is also used to improve the results. The comparison has shown the significant improvement over the available techniques.
Integrated PCA & DCT Based Fusion Using Consistency Verification & Non-Linear Enhancement
Shaveta Mahajan, Arpinder Singh
The image fusion is becoming one of the hottest techniques in image processing. Many image fusion methods have been developed in a number of applications. Many image fusion methods have been developed in a number of applications. The main objective of image fusion is to combine information from multiple images of the same scene in order to deliver only the useful information. The discrete cosine transforms (DCT) based methods of image fusion are more suitable and time-saving in real-time systems using DCT based standards of still image or video. DCT based image fusion produced results but with lesser clarity, less PSNR value and more Mean square error. Therefore the overall objective is to improve the results by combining DCT with PCA and non-linear enhancement. The proposed algorithm is designed and implemented in MATLAB using image processing toolbox. The comparison has shown that the proposed algorithm provides an significant improvement over the existing fusion techniques.
A Survey on Privacy Preserving Homomorphic in Collaborative Data Publishing
R.Sharmila, Dr. A.V.K. Shanthi
Security issues for software system ultimately concern relationships among social actors, stakeholders, system users, potential attackers and the software acting on their behalf. The tools and methodologies providing systematic guidance and support to the design process are much needed. Data in its original form typically contains sensitive information about individual, and publishing such data will violate individual privacy. The current practice in data publishing relies mainly on policies and guidelines as what types of data can be published. This paper presents A Survey on Privacy Preserving Homomorphic in Collaborative data Publishing that are found in the current literature. Problems in usage of privacy preserving areas are identified. Security areas that needed future research are presented
Manju Devi, Arunkumar P Chavan, Dr. K N Muralidhara
A 1.5V 3bit, 500MS/s LOW POWER CMOS Flash ADC
Manju Devi, Arunkumar P Chavan, Dr. K N Muralidhara
The analog to digital converters play a vital role in today’s world of electronic systems. The requirement of present applications demands is high speed and low power analog to digital converter. Out of the available ADCs Flash ADC is most popular for its highest conversion rate and its wide applications. In this paper, a 1.5v, 3-bit 500MS/s CMOS flash ADC is presented in 0.180 μm. Improved calibration capabilities resulted in an INL and DNL smaller than 0.20 LSB with power dissipation of 2.48mw.Flash ADC has major components like comparators, thermometer to binary encoder. The comparators are replaced by op-amp. A novel architecture is designed for thermometer to binary encoder by using Full adders. The applications of flash ADC include data acquisition, satellite communication, radar processing, sampling oscilloscopes, and high-density disk drives
MOBILITY MOVEMENT PATTERNS TRAITS FOR ROUTING PROTOCOL
Bhasin Anil
Mobile Ad-Hoc Network is dynamic infrastructure based network of mobile nodes. Nodes are connected by wireless links to form random topology without the use of existing infrastructure. It consists of a number of mobile nodes that uses data packets through a wireless medium. In all the routing protocols, mobility of a node is one of the vital characteristics in determining the by and large performance of the ad hoc network, so it is necessary to know about various movement mobility models and their effect on the routing protocols. In this paper, we have compared different mobility models. The performance of mobile ad-hoc network protocol change significantly with the change of the mobility model.
Robustness of Disruption Tolerant Network against Flood Attacks
Priyanka H V, Akhila Thejaswi R
Disruption Tolerant Networks (DTNs) utilize the quality of nodes and also the opportunist contacts among node for information communications. Because of the limitation in network resources such as contact opportunity and buffer space, DTNs are at risk to flood attacks within which attackers send as several packets or packet replicas as possible to the network,so as to exhaust or overuse the restricted network resources. In this paper, there is a rate limiting to defend against flood attacks in DTNs, such that every node has a limit over the amount of packets that it will generate in every time interval and a limit over the amount of replicas that it will generate for every packet. There is a distributed scheme to discover if a node has violated its rate limits. To handle the challenge that it is troublesome to count all the packets or replicas sent by a node due to lack of communication infrastructure,the detection scheme adopts claim-carry-and check: every node itself counts the amount of packets or replicas that it has sent and claims the count to alternative nodes; the receiving nodes carry the claims once they move, and ensure if their carried claims are inconsistent once they contact; The claim structure uses the pigeonhole principle to ensure that an attacker will build inconsistent claims which can cause detection. There is a rigorous analysis on the possibility of detection, and valuate the effectiveness and efficiency of our scheme with in depth trace driven simulations.
In order to help the visually challenged people, a study that helps those people to walk more confidently is proposed. The study hypothesizes a smart walking stick that alerts visually-impaired people over obstacles, pit and water in front could help them in walking with less accident. It outlines a better navigational tool for the visually impaired. It consists of a simple walking stick equipped with sensors to give information about the environment. GPS technology is integrated with pre-programmed locations to determine the optimal route to be taken. The user can choose the location from the set of destinations stored in the memory and will lead in the correct direction of the stick. In this system, ultrasonic sensor, pit sensor, water sensor, GPS receiver, level converter, driver, vibrator, voice synthesizer, keypad, speaker or headphone, PIC controller and battery are used. The overall aim of the device is to provide a convenient and safe method for the blind to overcome their difficulties in daily life.
Local Thresholding Techniques in Image Binarization
Rukhsar Firdousi, Shaheen Parveen
Binarization is a process of separation of pixel values of an input image into two pixel values like white as background and black as foreground. It is an important part in image processing and the first step in many document analysis and OCR processes. Most of the binarization techniques associate a certain intensity value called threshold. Each and every pixel of the concerned grayscale input image should be compared with the threshold value and according to it, pixels are separated into two classes background and foreground. Thus threshold plays a major role in binarization and choosing of an appropriate threshold value is an important one. It can be approached by two ways, first is the global thresholding and second is the local thresholding techniques. The global thesholding are suitable for converting any grayscale image into a binary form but are inappropriate for complex documents, and degraded documents. If the illumination over the document is not uniform, it produces marginal noise along the page borders. To overcome these complexities, local thresholding techniques have been proposed for document binarization. These techniques estimate a different threshold for each pixel according to the grayscale information of the neighboring pixels. In this paper various local thresholding techniques are compared
In recent times, web remains the preferred platform for users to carry out their business activities. The migration of applications to web has been rapid ranging from applications like E-commerce, Public forum, E-governance, E-banking, Shopping Portals or any other applications running on the web. Web Applications have increased its usage because of easy accessibility to different users around the world. But as the usage of the web has increased, it has also given an undesirable or dark side to the usage of html. Cross-site scripting (XSS) attacks continue to remain the topmost threat to web apps, databases and websites around the world for a considerable amount of time now. A survey of about 15 million cyber attacks in the third quarter of 2012 has revealed that most of these attacks are XSS based. Although attacks like SQL Injection, CSRF and Phishing are also common, XSS still remains the preferred technique for hackers to carry out malicious activities on web. This paper discusses about XSS attacks, their operation and different categories of XSS attacks. The paper also highlights the mitigation scenario and techniques possible for prevention
Providing Data Sharing For Multiple Users In Cloud
Mushra, Akhila Thejaswi R
With the character of low maintenance, cloud computing provides a cheap and economical resolution for sharing cluster resource among cloud users. Sadly, sharing information an exceedingly in a multi-owner manner whereas protective information and identity privacy from an untrusted cloud continues to be a difficult issue, because of the frequent modification of the membership.
During this paper, we tend to propose a secure multi-owner data sharing theme, named Mona, for dynamic teams within the cloud. By investing cluster signature and dynamic broadcast encryption techniques, any cloud user will anonymously share information with others. Meanwhile, the storage overhead and cryptography computation price of our theme area unit freelance with the quantity of revoked users. Additionally, I tend to analyze the protection of our theme with rigorous proofs, and demonstrate the potency of us theme in experiments.
Ad-hoc networking is regarded as an adequate solution to cooperative driving between communicating cars on the road. Deploying and testing these networks, usually known as Vehicular Ad-hoc Networks (VANETs), involves a high cost in the real world, so simulation is a useful alternative in research.
In this paper, we discuss five major categories of various Mobility Models that is Entity, Group, Urban, City-Section and Realistic Mobility models for simulation of VANET as a critical aspect in a simulation study of VANETs, is the need for a mobility model which reflects, as close as possible, the real behaviour of vehicular traffic. Our work provides a sound starting point for further understanding and development of more realistic and accurate mobility models for VANET simulations.
The software quality prediction is a major issue these days. in order to develop software quality prediction model, one must first identify the factors that strongly influence software quality and the number of residual errors.unfortunatly,it is extremely difficult, to accurately identify relevant quality factors. that is although exact and discrete metric data are used, inference rules used may be fuzzy in nature. the benefits of inspections, originally indicated by Fagan[1],have been re-confirmed by other practitioners. Software inspection is considered as an essential practice to develop high quality software. if it is possible to identify potentially error –prone modules with relatively high degree of accuracy at a little or no extra cost by analyzing the present inspection data. this paper purpose a fuzzy logic based precise approach to quantify quality of software modules based on inspection rate and error density to predict quality factor such as whether a component is fault prone or not.
IMPLEMENT A NEW WINDOW FUNCTION AND DESIGN FIR FILTERS BY USING THIS NEW WINDOW
Manira Khatun
In this paper a new window function is implemented based on Blackman window function. Tthis window provides higher side lobe attenuation comparison to Hamming window, Hanning window and Blackman window. The width of the main-lobe is slightly greater than Hamming window function and Hanning window function, but slightly less than Blackman window function. In this paper FIR filters are design by using this new window function.
Tushar K Mendhe, Sagarkumar S. Badhiye, Sarika Bongade
Survey on Weighted Load Balanced Routing Protocol and Energy-Aware Routing Protocol for MANET
Tushar K Mendhe, Sagarkumar S. Badhiye, Sarika Bongade
AODV is a prominent routing protocol for MANET that uses hop count as a path selection metric. However, AODV has no means to convey traffic load on current route. In this paper we will survey protocols for load-balancing and energy-aware routing on MANET . This protocol is used for Internet gateway broadcasting route, and it evaluates route with node’s residual energy and transmission load. With this protocol node accessing Internet can find a shortest route and avoid low-power node and busy node. The routing strategy in this paper focuses on distributing the traffic on the routes consisting of nodes with comparatively longer life and have less traffic to pass through. Aggregate Interface Queue Length (AIQL), to deal with traffic issue. The weight of a route is decided by three factors: the aggregate interface queue length, the route energy and the hop count. The route with highest weight value is selected for further data transmission.
Prof. D. B. Rane,Miss. Pallavi Zingade, Mr.Shrawankumar Bhat, Miss. Sonal Bagal
DESIGN AND DEVELOPMENT OF ETHERNET CONTROL SYSTEM FOR EMBEDDED WEB SERVERUSING ARM PROCESSOR
Prof. D. B. Rane,Miss. Pallavi Zingade, Mr.Shrawankumar Bhat, Miss. Sonal Bagal
We describe the application of civil infrastructure for Monitoring and controlling long term degradation & bridge safety is the major concern to the government and the people. Although there are so much safety majors taken to ensure the protection of bridge, still there is no effective system which can monitor and control the status of the highway bridges from a centralized location. Aim of this proposed project is to develop the device that monitor the vibrations on the bridges, control the vehicles traffics on bridge by the traffic signal and carry the appropriate weight of vehicle on bridge. The values of these parameters are updated on the main PC server with the regular span of interval. The administrator helps to monitor the condition from any location in a web page. So it provides the idea related to maximum weight carriage capacity of the bridge & safety of the bridge. So any emergency situation like natural calamities such as earthquake, hurricanes, tornadoes, fire etc. occurs, the decision can be taken immediately after verifying the live data. This project has ARM processor based embedded system connected to Ethernet module which is connected to router. Personal IP address enters on HTML web page & this address is called from the host which is connected to the router.
Vaishnavi M. Naik, Ketki S. Kulkarni, Dipali M. Chordiya, Sreeja Kumar, Prof. Poonam Chaudhari
Mining and Clustering of mobile transaction sequences in location based service environment
Vaishnavi M. Naik, Ketki S. Kulkarni, Dipali M. Chordiya, Sreeja Kumar, Prof. Poonam Chaudhari
The improved capabilities of the recent cellular phones compared to older ones had lead the telephone companies offer a lot of value added services. Emergence of new technologies will lead to emergence of new services increasing the percentage of users for such services. To improve the quality of services provided for the users, mining and clustering of different mobile transaction behavior are useful. For clustering we have LBS based algorithm. LBS based services which are in demand are used to find a location, people, services and to find similarities to predict next behavior of mobile user
A new CMOS voltage-mode Four-quadrant analog Multiplier is proposed and analyzed by applying inputs signals to set of Summation circuit and substractor. Based on the proposed multiplier circuit, a low voltage high performance CMOS four quadrant analog multiplier is designed and simulated by using 0.35 micron technology. The measured 3dB bandwidth is 15 MHz. Simple structure, low-voltage, low power, and high performance makes the proposed multiplier quite feasible in many applications
This paper demonstrates the application of Robot for library inventory management system. A robot is designed using sensor operated motors to keep track the library book shelf arrangements. Robot get the data of book which going to be search from the pc through Zigbee, The robot carries a barcode reader which collects the barcode data from the books arranged in a vertical manner and compares the decoded barcode data with the input. If the particular book which is to be found out by the robot, then the robot gives location of the book to the librarian’s system through Zigbee, in which the robot is used for searching purpose. In case of any difficulty faced by the robot when it does the searching process, the robot halts and sends an alarm. Misplaced books can be identified using the pre-programmed data in the robot which helps to maintain the books in an order. This helps and simplifies the job of monitoring the arrangement of books and also reduces the manual routine work done by the library staff.
Ramteke Mahesh K., Nikalaje Mahesh , Prof.D.B.Rane
FPGA IMPLEMENTATION OF INTELLIGENT TRAFFIC SIGNAL CONTROLLER BASED ON NEURO FUZZY SYSTEM
Ramteke Mahesh K., Nikalaje Mahesh , Prof.D.B.Rane
The aim of this paper is to design, simulate, and synthesis a simple, suitable and reliable VLSI fuzzy processor for controlling the traffic lights. Fast, rapid, and vast transportation systems are nerves of economic development for any nation. This paper studies the deviation in traffic flow data and data bottleneck production problem, and provides a solution based on conjunction of mathematical statistics and time series analysis. The monitoring and control of city traffic is one of the key issues especially in metropolitan areas due to ever increasing number of vehicles and pedestrians. Present traffic controllers are based on microcontroller and microprocessor. These traffic light controllers have limitations because it uses the predefined hardware, which functioning according to program that does not have the flexibility of modification on real time basis. In traffic signal control system, detection of traffic variables at intersection is very important and is the basic input data to determine signal timing. The paper starts with an overview of FPGA in order to get an idea about FPGA architecture, and followed by an explanation on the hardware implementation with both type analogue and digital implementation, a comparison between fuzzy and conventional controller also provided in this paper. The “Intelligent Traffic Signal Controller using FPGA controller based on Neuro-Fuzzy system” is capable of taking decision to reduce delays at intersection. To develop the system, algorithm need to be developed using VHDL. The designing part of this controller into VHDL program eliminates the shortcomings of the other custom facilities and conventional controller design available today.
Performance Investigation of DYMO, DSR, AODV and LAR Routing Protocols using Different Mobility and Energy Models in MANETs
Er. Hanisha Goyal, Er. Parveen Kakkar
An ad hoc network is a collection of mobile nodes which communicate with each other using multi-hop wireless links. MANET nodes are equipped with wireless transmitters and receivers. In these networks, nodes act as router as well as host enabling the cooperation between them. In this paper we focus on the impact of mobility models (Random Waypoint and Group Mobility Model ) and Energy Models (Mica Motes, Micaz, Generic ) on the performance of reactive routing protocols AODV, DSR, DYMO, and LAR. With the help of Qualnet 5.2 simulator, we investigated various scenarios by varying number of nodes, maximum velocity of the mobile nodes, Pause time and Packet size. Performance analysis is carried out on the basis of Throughput, Packet delivery ratio, Jitter, End to End Delay, Total Energy Consumption under mobility and Energy model.this work shows that mobility models and energy models have great effect on the performance of routing protocols.
Global positioning system (GPS) is being actively employed in a variety of vehicular monitoring systems such as automated car navigation and emergency assistance. Nowadays easily observed many passengers footed at the Bus stops waiting for the bus. This paper considers performance issues in Public transport monitoring system that utilize GPS and embedded system. For the purpose of monitoring the movement of the bus, to report the location of the bus in the bus stop and to record whether the bus stops in its respective bus stop using Global Positioning system in collaboration with Transceivers modules, and detect any passenger stands in footboard is described here. In addition to some basic functions such as real-time monitoring, some special functions are combined to make the system compatible with the daily operations of any public transport scheme. The proposed method will surely provide smooth and linear transmission of location information to the bus stations which led people to take decision either to wait for Bus or not.
Students automation system has become more important part for any organizations/ institutions. This paper presents the integration of ubiquitous computing systems in classrooms for managing student’s attendance using RFID. RFID is a powerful tool which helps to manage student’s attendance throughout the working day. RFID is used to solve problems where it is necessary to automatically record the student’s attendance in classrooms of university environment. A real time intelligent system is implemented in conjunction with RFID hardware to record student’s attendance at lectures in a university environment. RFID tag is affixed on identity card to communicate wirelessly with a reader in order to the identify the students
Lecture recording has a significant role in online learning and distance education. Usually lectures are recorded by a cameraman or a stationary camera. The recorded video consists of the complete training room including trainer, students and the projector screen.
In regular lectures, presenter will speak more than changing presentation slides; hence more time will be spent in explaining the slide. Video recording of such lectures will not have changes in consequent frames.
In this project, we propose an intelligent lecture recording & broadcasting system that will automatically filter out the projector screen and the presenter face if it appears in front of the screen. Optimal video with changed images will be distributed to all the students through online streaming.
Modeling the Adaptive Immune Response in HIV Infection Using a Cellular Automata
Khabouze Mostafa, Hattaf Khalid, Yousfi Noura
The public health issues have a lot of importance in our society, particularly the Human Immunodeficiency Virus (HIV) infection. Many models based on ordinary differential equations (ODEs) or partial differential equations (PDEs) have explained different aspects of the dynamics of the virus-immune system interaction. Although, they assume that various populations of cells and viruses have been homogeneously distributed over the space and time in which the infection takes place. In this paper, we present a cellular automaton (CA) that models the interaction between the cytotoxic T lymphocytes (CTLs) Cells and the immunoglobulin of the immune system and HIV in blood stream. Our approach is based on simple calculation rules that are easy to implement. The results of our (CA), taking into account the role of the two components of the adaptive immune system to overcome HIV infection reproduces the acute stage and the beginning of the second phase of the HIV infection development.
Ademola Abdulkareem, Dike U. Ike, Adewale A. Ajao Adelakun A. A
Programming a Computer and a Microcontroller to Control the Speed and Direction of DC Motors
Ademola Abdulkareem, Dike U. Ike, Adewale A. Ajao Adelakun A. A
Direct current (DC) motor has already become an important machine used in many applications across a wide range of powers and speeds. The ease of control and excellent performance of the DC motors will ensure that their applications will continue to grow in the future. This work is mainly concerned with DC motor speed, direction and active state (either start or stop) control by using microcontroller PIC18F452 via Pulse Width Modulation (PWM) technique, where its signal is generated in microcontroller. The PWM signal will request the motor driver to vary the voltage supply across the motor to maintain its speed. A program written in Visual Basic 6.0 is developed to provide a graphic user interface (GUI) to enable the control of the DC motor from a computer.
Design and Implementation of a Virtual Machine Video Conferencing Application
Adeyinka A. Adewale, Samuel N. John, Dike U. Ike
Videoconferencing today is faced with the challenge of limited number of participants per time, and also the need for large and fully equipped conference rooms. This might not be a problem to a large enterprise, but for the small to medium-sized business, access to a videoconferencing facility involves either a very costly rental fee or is completely impossible. The aim of this work is to design and implement a videoconferencing prototype (OpenMeeting) with added functionalities which will solve problems facing the traditional way of conducting meetings.
An Efficient Image Denoising Technique for Various Noisy Images
T.Rajesh, M.Karnan, R.Sivakumar
During transmission the different types of noise that are either in the image during captured or injected in to the image. When captured images usually have Gaussian noise, Speckle noise, and Salt and pepper noise. To remove these types of noise applied image filtering methods on images. In this paper, four different image filtering methods are compared using the Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE) for the three different noise types. The median filter gives desirable results in terms of the above parameters for three different noises
Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol
Surya.R.M, Anitha.M
In mobile ad hoc network, Position aided routing protocols can offer a significant performance increase over traditional ad hoc routing protocols. As position information is broadcasted including the enemy to receive. Routes may be disconnected due to dynamic movement of nodes. Such networks are more vulnerable to both internal and external attacks due to presence of adversarial nodes. These nodes affect the performance of routing protocol in ad hoc networks. So it is essential to identify the neighbours in MANET. The “Neighbor Position Verification” (NPV), is a routing protocol designed to protect the network from adversary nodes by verifying the position of neighbor nodes to improve security, efficiency and performance in MANET routing
Location Based Services and Integration of Google Maps in Android
Pankti Doshi, Pooja Jain, Abhishek Shakwala
In today’s scenario, mobile computing has advanced to such an extent where the user has access to all the information on a single device. Today people are always moving with mobile devices like laptops, cell phones, tablets etc. Using the user’s geographic location, a lot of information related to the user of the mobile device can be collected. The knowledge of mobile user's location can improve the class of services and applications that can be provided to the mobile device user. These classes of applications and services are termed as location based services. Location Based Service (LBS) is a kind of service that helps in getting the geographical location of the user and more useful information near to the user location. This location based information can be obtained in different terms such as position, vicinity, proximity, context, maps, routes, places etc. Our paper focuses on LBS in detail and identifies key components of LBS for providing this service to the user on the Android platform. It also explains the use and implementation of Google Maps and its APIs in getting various location based information on Android.
EXPLORATORY STUDY FOR REGRESSION TEST SELECTION TECHNIQUES IN PROCEDURAL AND OBJECT ORIENTED PROGRAMMING PARADIGM
Priyanka Rana, Dr. Anita Ganpati
The most crucial phase in the software development life cycle is maintenance phase. Whether it is corrective, adaptive or perfective maintenance it must be ensured that the modification does not affect other portions of the program. Therefore testing is required. Regression testing is carried out after a software developer has attempted to fix a problem or has introduced source code to software. An important research problem in regression testing is the selection of a suitable subset of test cases from existing test suite that would reduce the regression testing time and effort without giving up the completeness of regression testing. Researchers have suggested a number of regression test selection (RTS) techniques for different programming paradigms. In this paper an exploratory study of regression test selection techniques was carried out for procedural and object-oriented programming paradigm. From the study it was concluded that Specification Based RTS Technique is most effective as it does not depend on model-based or code based analysis.
Removal of malachite green from aqueous solution using corn cob as adsorbent
K. Rajasekhar
The objective of this work is the study of adsorption of dye solution which is a dye malachite green using corn cob. Removal of this dye from aqueous solution using corn cob has been investigated. Liquid phase adsorption experiments were conducted. Batch adsorption studies are Carried out by observing the effect of experimental parameters, namely, pH, and amount of adsorbents, contact time and initial concentration. Optimum conditions for dye removal are studied like pH value, contact time required, amount of adsorbent, initial concentration, etc. The results generated by this work can be used for determination of optimum conditions for adsorption of dye in aqueous solutions. Dye is present in mixture form in various Industrial effluents like Textile Industries, Sewage water, Water treatment plants. This work can have use in Design of adsorption columns for dyes removal
Performance Evaluation of iSCSI based storage network with cluster mirroring
Rahul Jangid, Mr. Rajendra Purohit
With an increase in the amount of volume of data in networks, the traditional storage architecture is greatly challenged. Today, SAN (storage area network) emerges as the main technology of network storage. The main inter networking technology of SAN is the fibre channel. But now with increasing demand for mirroring solutions for small & medium sized businesses, the high implementation costs, lack of trained staff and poor interoperability of fibre channel have proposed iSCSI to be a cost effective and viable alternative of fibre channel. Mirroring provides excellent solution for disaster-recovery, high data availability and business continuity. Synchronous mirroring or asynchronous mirroring enables customers to have an instantaneous recovery and eliminate loss of access to storage during disasters. But the cluster mirroring can transform your existing server storage into high availability storage system. The cluster mirroring tries to reduce the response-time and provide high availability storage. In this paper, we explore the details of iSCSI and attempt to evaluate the performance of iSCSI SAN and show that it can be performed satisfactorily and economically, without requiring the costlier fibre channel option
REVIEW ON DIFFERENT TECHNIQUES OF IMAGE REGISTRATION
Neha Gupta, Naresh Kumar Garg
Image registration is a current area of research in many areas like medicine, remote sensing and many more. This paper illustrates the various techniques of image registration providing advantages and disadvantages of these techniques and an overall understanding of image registration. Image registration is a process of overlaying two or more images of the same scene taken at different times, from different viewpoints, or by different sensors. Image registration is a crucial step in all image analysis tasks. This paper would help the researchers to have a full understanding of image registration process.
A COMPREHENSIVE REVIEW ON DIFFERENT TECHNIQUES OF IMAGE FUSION
Renuka Dhawan, Naresh Kumar Garg
Image fusion is one of the current areas of research of image processing. Image fusion is the process of combining two or more images or some of their features into a single image retaining the features from each of the original images without the introduction of distortion or loss of information. The fusion of images is often required to integrate complementary multisensor, multitemporal and/or multiview information into one new better quality image. In this paper we will discuss the different levels and techniques of image fusion. This Paper will be helpful for the research in the field of image fusion
Secure Fuzzy keyword Search using an Advanced Technique over Encrypted Cloud Data
Deeptha Hegde, Saritha
Cloud computing is a technology that uses the internet and central remote servers to maintain data and applications. As the data produced by individuals and enterprises that need to be stored and utilized are increasing rapidly, data owners are motivated to outsource their local complex data management systems into the cloud for its great flexibility and economic savings. To ensure that the data can be stored in the cloud securely, data owners encrypt their data before outsourcing to the cloud, which makes searching scheme on a large amount of encrypted data a demanding task. The traditional searchable encryption schemes provide a number of approaches to search on encrypted data, but they all support only exact keyword search. Exact keyword search is unsuitable for cloud storage systems, because it doesn't allow users to make any spelling errors or format inconsistencies, and thereby reduces the system usability. The proposed system uses a wild-card based technique with edit distance as the similarity metric to obtain a fuzzy keyword sets.This solves the problems of the cloud user who search the encrypted cloud data with the help of fuzzy keyword, thereby maintaining keyword privacy.
FACE IMAGE RETRIEVAL USING LWT-PCA WITH DIFFERENT CLASSIFIERS
Ganesh V, Madhavan J. M.E., (Ph.D.)
In This paper, the face images retrieved system based on Lifting wavelet transforms with principal component analysis (PCA). These techniques are implemented and their performances are investigated using frontal facial images from the ORL database. The retrieval accuracy compare with different distance methods like Euclidean distance and Manhattan distance. Lifting wavelet Transform(LWT) is effective representing in image features and is suitable in Face image retrieval, it still encounters problems especially in implementation. e.g. Floating point operation and decomposition speed. We use the advantages of lifting scheme, a spatial approach for constructing wavelet filters, which provides feasible alternative for problems facing its classical counterpart. Lifting scheme has such intriguing properties as convenient construction, simple structure, integer-to-integer transform, low computational complexity as well as flexible adaptivity, revealing its potentials in Face image retrieval. Lifting wavelet transform with PCA gives less computation and high retrieval rate.
Kale Swapnil T, Mahajan Sadanand P, Rakshe Balu G, Prof. N.K.Bhandari
Robot Navigation control through EEG Based Signals
Kale Swapnil T, Mahajan Sadanand P, Rakshe Balu G, Prof. N.K.Bhandari
The Electroencephalogram (EEG) is a biological signal that represents the electrical activity of the brain. Brain potentials have been of scientific interest since the discovery of the Electroencephalogram (EEG). This project develops a brain-computer-interface (BCI) based manmade robot control system with help of MATLAB and FPGA KIT. The system consists of an electroencephalograph (EEG) database and a manmade robot. The control loop includes a brain signals stored database, a robot interface and fpga board. The goal of our study is to control navigation of robot through neural signals acquired by EEG database. When the database having signals of “turn right”, “turn left” , “move forward” , “turn 45 degree” , “pick up and pick down” Then the developed control system is a powerful tool to examine relationships between complex manmade robot behaviours and given database signals. Mapping brain activity patterns in external actions has been studied in recent decades and is the base of a brain-computer interface. This type of interface is extremely useful for people with ill health, where one can control robotic systems that support, or even replace, non-functional body members. Part of the studies in this area focuses on non-invasive interfaces, in order to increase the interface usage to a larger number of users without surgical risks. Our results demonstrate that an EEG- data based brain–computer interface can be used for refined robotic interaction with the environment, involving not only navigation But also perform some task.
FPGA Implementation of Fast Fourier Transform (FFT) Based Finite Impulse Response (FIR) filter Using VHDL
Ms.Ritu Sharma, Prof. Ravi Mohan Verma
The paper describes the development of FIR filters on Field programmable gate array (FPGAs) using FFT Algorithm. FIR filter has been designed and realized by FPGA for filtering the digital signal. The implementation of FIR filter on a Cyclone IV GX FPGA is considered. Presented soft core is the unit to perform the finite impulse response filter based on the Fast Fourier Transform (FFT). It performs the convolution of the unlimited signal sequence with the synthesized impulse response of the length of Ni=N/2 samples, where N = 64, 128, 256, 512, 1024. The data and coefficient widths are tunable in the range 8 to 18. The model is capable of performing filtering operations like low pass, high pass, band pass and band stop based on selection that is embedded into the design. The most basic functions required for nearly any signal processor include addition, multiplication and delays. Input data, output data, and coefficient widths are generics. The maximum sampling frequency Fs by N=1024 is less than Fclk/29. IP Corse has been used to filter the input data. The design is coded through VHDL (hardware descriptive language). To verify the designed outputs simulation, compilation and synthesis have been done.
G.Srimathy, I. Aarthi , V.Geetha,V.Priyadharsini, T.Kalaivani
ENHANCEMENT OF QUALITY OF SERVICE IN WIRELESS SENSOR NETWORKS THROUGH ENERGY EFFICIENT QUERY SCHEDULING SCHEME
G.Srimathy, I. Aarthi , V.Geetha,V.Priyadharsini, T.Kalaivani
A Wireless Sensor Network (WSN) consists of sensor nodes capable of collecting information from the environment, process the collected information and direct it to the desired destination (sink). Due to the recent advances in wireless communications, it is important to address the quality of service (Qos) issues. Energy consumption, delay and throughput are some of the Qos issues. The WSN with Static Sink (SS) which uses multihop communication between sensors and SS have certain drawbacks which degrade the Qos of the system. Due to the use of multihop paradigm, the sensors around SS deplete their energy very fast due to high forwarding data traffic. Thus the higher energy consumption by these sensor nodes cannot be avoided. Also, workload of sensor nodes is very high due to the SS. Thus the energy efficient query scheduling scheme is proposed which uses mobile sink to save sensor energy spent for multihop communication. This aims at extending the network lifetime by optimizing the energy consumption, throughput and delay thereby improving the Qos of the system
Enterprise networks are facing ever-increasing security threats from worms, port scans, DDoS, and network misuse, and thus effective monitoring approaches to quickly detect these activities are greatly needed. Firewall and intrusion detection systems (IDS) are the most common ways to detect these activities, but additional technology such as NetFlow can be a valuable enhancement. A worm (malicious codes) can disturb network and normal network operation. Internet worms are causes significant worldwide disruption, a huge number of infected hosts generate traffic, which will impact the performance of the internet. Therefore this is one of the areas where researchers are concentrating to find effective detection system, which will presence the worms and reduce the worm’s spread. This paper deals with a classified study of most important and commonly used methods for detecting internet worms using Netflow.
POWER QUALITY IMPROVEMENT USING ACTIVE POWER FILTER BASED ON FUZZY LOGIC CONTROLLER
Pramesh Choudhary, Nitin Gupta
A fuzzy logic controller (FLC) with fast reference voltage generation with active power filter to correct and regulate unbalance voltage in three-phase system is proposed to improvement in power quality. The compensation algorithm is not based on three symmetrical components decomposition so the controller can yield a fast response that is essential in such a critical real time control work. The reference voltage is fed to the FLC, which is a robust closed loop controller. The proposed algorithm and control scheme of active power filter may correct and regulate unbalance voltage in three-phase system under different conditions of the utility of supply
Prof. D.B. Rane, Pokharna Pritesh G, Pawade Swapnil B, Chopade Yogesh S
Design and Performances Analysis of 16-bit RISC Processor using Xilinx tool
Prof. D.B. Rane, Pokharna Pritesh G, Pawade Swapnil B, Chopade Yogesh S
In this project we have described the design of a 16-bit non-pipelined RISC processor for applications in real-time embedded systems. The processor executes most of the instructions in single machine cycle making it ideal for use in high speed systems. The processor has been designed to be implemented on an FPGA using VHDL such that one can reconfigure it according to specific requirements of the target applications. the main objective of this project is to design and implement an 16-bit Reduced Instruction Set (RISC) processor using XILINX Spartan 3E tool. It involves writing a VHDL / verilog behavioral model, developing test-bench and simulating the behavior. The important components of this processor include the Arithmetic Logic Unit, Shifter, Rotator and Control unit. The instruction code is received at the beginning of each cycle, all operations are executed during the clock period, and results are stored at the end of it.
Dhanalakshmi Ranganathan, Archana.C.S, S.S.G.Krishnan AP
ICDM for Motion of the Object Detection with GCM Alert over Android Phone
Dhanalakshmi Ranganathan, Archana.C.S, S.S.G.Krishnan AP
This project has an enhanced feature of smart video transfer and capture character. Smart video surveillance systems are able of enhancing situational awareness across multiple scales of space and time. Video surveillance systems are becoming increasingly important for crime investigation and the number of cameras installed in public space is increasing. However, many cameras inaugurated at fixed positions are required to observe a wide and complicated area. In order to efficiently observe such a wide area at lower cost, mobile robots are an acceptable option. According to the result of moving object detection research on video sequences, the motion of the people is tracked using video surveillance. The moving object is described using the Cauchy distribution model. The Cauchy distribution model will contrast the current frame with the previous frame. The threshold value is determined to find the moving image. Using threshold value the discovered pixel is identified. Hence the motion of the object is identified accurately. After motion discovery, it will send GCM alert to the android mobile application
MOTION DETECTION USING CAUCHY DISTRIBUTION AND SENDING IMAGE OVER ANDROID SMART PHONE USING GCM ALERT
Aswini.R, Nandhini.G, S.S.G.KrishnanAP/IT
Video surveillance systems are becoming increasingly important for crime investigation and the number of cameras installed in public space is increasing. However, many cameras installed at fixed positions are required to observe a wide and complex area. In order to efficiently observe such a wide area at lower cost, mobile robots are an attractive option. According to the result of moving object detection research on video sequences, the movement of the people is tracked using video surveillance. The moving object is identified using the Background subtraction. The Background subtraction will compare the current frame with the previous frame. The threshold value is calculated to find the moving image. Using threshold value the detected pixel is identified. Hence the movement of the object is identified accurately. The motion detection is done using Cauchy distribution model and Absolute Differential Estimation .Absolute Differential Estimation is used to compare the background frame and incoming video frame if any changes occur in incoming video frame .Cauchy distribution Model is used to detect the pixel of moving object in the detected incoming video frame. Whenever motion detected that image is saved on the server and the server will notify the Google server. The Google server will send a GCM Alert to the android application user mobile who are all registered for that application
Some Studies on PWM Converter Controlled Wind Energy Conversion System
Shamik Chatterjee, Susanta Dutta
Wind power is a green renewable source of energy that can compete effectively with fossil fuel as a generator of power in the electricity market. The main parts of a Wind Turbine System (WTS) are rotor, gearbox, generator, transformer and possible power electronic system (PES). Wind turbines require certain control systems. Horizontal-axis wind turbines have to be oriented to face the wind. In high winds, it is desirable to reduce the drive train loads and protect the generator and the power electronic equipment from overloading by limiting the turbine power to the rated value up to the furling speed. At gust speeds, the machine has to be stalled. At low and moderate wind speeds, the aim should be to capture power as efficiently as possible. The high efficient power electronics in power generation, power transmission/distribution and end-user application is being used to control. This paper deals with the discussion and control of the most emerging renewable energy source, wind energy, with the help of PWM converter. Due to this power electronics system, it is changing from being a minor energy source to be acting as an important power source in the energy system
Change Detection in Satellite Images Using Contourlet Transform and RFLICM Clustering
Neenu Varghese, Mr. Arun Jose
An approach based on contourlet image fusion and reformulated fuzzy clustering for change detection in satellite images is introduced in this paper. In this approach fusion of images is used to produce difference image from log ratio and mean ratio images. An optimal difference image should retain the unchanged areas and show the changed areas. So contourlet image fusion is used to generate the difference image. Processing the difference image means to discriminate changed regions from unchanged regions using reformulated fuzzy local information c means algorithm. It is used because it is very sensitive to noise. Experimental result shows that this approach provides better performance than the previous methods.
Network Security: A study on Emergency security signal technology for safety
Mr. Vinod Saroha, Reenu Lathwal, Samiksha Deshwal
It is very recent technology which is mainly used in network security, networking, computing, and distributed computing. These types of service reduce the information technology overhead for end users. It is reliable to handle and provide flexibility and on-demand services. This service provides reliability even when we are traveling. It becomes an important task to security for the devices that we are dependent so much. This device is used to provide safety signal. To handle this types of service a new service device come into use that is SOS. SOS means stay safe! The SOS signals come from Morse code distress signal. The SOS term use for various phases. The Morse code distress signals are firstly replaced with Global Maritime Distress Safety system. This paper, is tell us about security signals used in emergency for safety. It gives a view on various security services for safety that are replaced with old one.
An E-CIRCULAR SYSETEM consisting of code number was designed, and we are transmitting the data through wireless medium and data is displayed on the LCD display in the corresponding classroom or lecturer hall or some other places. The transmitter side is the principal room, and he can send the messages whatever he wants to inform to this college staff or student using pc or mobile and the transmitted message is received through the GSM modem. Then the received message is displayed on the LCD screen and at the same time alarm will be heard
We are creating an Android Application MEDAPP with a white glove service. MEDAPP is an upgraded and simplified version of all application which is used in optimizing a data in medical for a doctors and consultants. That includes a concierge service with a personal Business Intelligence Software Advisor. The new version software and service accepted to the individual practices key indicators (KI) and reporting needs. MEDAPP a revolutionary return on investment system that includes optimizing of fee, insurance rate check, profit and loss analysis, marketing capability of every day, weekly and monthly reports that are itself mailed to you.MEDAPP takes data from Users practice management system and uploads to Amazon MYSQL Server. We take data from server and plot KIs (Key Indicator) and generate reports .For this we want to build a mobile app (Android/I phone).It take a help of web services to achieve a data from server.
MEDAPP is the data collecting and processing platform used for all types of mobile. MEDAPP will provide the four crucial Practice Optimizer daily reports:
Clustering Based Energy Efficient Protocols For Wireless Sensor Networks
Meera Jadhav
Sensor networks have become an emerging new tool for habitat monitoring in nature preserves, it monitors and gathering events in hazardous environments, it does the work of buildings surveillance, monitoring the enemy activities in a battlefield environment. Sensor nodes have limited energy resources, less storage capacity and they are energy constrain. Efficient routing protocols are very critical to design in order to prolong the lifetime of the sensor nodes. Sensor networks are mainly designed for monitoring and reporting events though sensor nodes are application dependent, designing a single routing protocol cannot be efficient for sensor networks for all applications. In this paper, we first analyze the requirements, similarities and distinguish between sensors networks and MANETs (Mobile Ad hoc Networks). Cluster formation reduces the nodes involved in transmission & conserves the energy. The cluster based protocols are energy efficient & prolong the network lifetime when compared to other protocols.
Clustering Perspective in Attribute Based data Set in the Collaborative Learning Behavior
P Manoj Reddy, S Govinda Rao
Technology has its own way to understand the aspect of human social life, in this prospect we consider collective context in the sense of an individual scalability of the Data set in the perspective of considering the network is a network that relies on computing power of its clients rather than in the network itself on attribute. a set of information-theoretic techniques based on clustering that discover duplicate, or almost duplicate, tuples and attribute values in a relation instance. From the information collected about the values, we then presented an approach that groups attribute so that duplication in each group is as high as possible. The groups of attributes with large duplication provide important clues for the re-design of the schema of a relation. We consider the context using these clues, since we consider the node mechanism flow putting forward to the level of highest cluster in the social networking domain
Prof. Ms. N. K. Bhandari, Miss.PotphodePratibhaM Miss.NeheDipali d Miss. Gagare Kirti A
Moving Object Detection and Tracking
Prof. Ms. N. K. Bhandari, Miss.PotphodePratibhaM Miss.NeheDipali d Miss. Gagare Kirti A
Nowadays video surveillance systems have been developing rapidly. Video surveillance systems detect the target in initial stage and then perform the functions like object classification, its behavioural description & tracking. However there are many problems associated with object detection & tracking, such as illumination changes, fake motion, image noise etc. To overcome such problems, a system based on Particle filter algorithm is proposed in this paper. An attempt has been made to develop effective object detection & tracking system
In this article, we develop some important results relating to the concepts of triple derivation and Jordan define triple derivation and Jordan triple derivation of gamma rings. Through every triple derivation of a gamma ring M is obviously a Jordan triple derivation of M, but the converse statement is in general not true. Here we prove that every Jordan triple derivation of a 2-torsion free prime gamma ring is a derivation
A Review on Photovoltaic Module and its Various Simulation Methods
Sheetal kaw, S.K. Biradar
The solar panel is a highly non-linear source and to select a right operating point on the I-V characteristics based on measured load current and voltage is very crucial in order to obtain maximum output. Several PV Simulation techniques for obtaining right operating point on the I-V characteristics of PV cell are available. In this paper mathematical model of a single diode PV module with different techniques for PV Simulation are briefly presented and compared.
Comparison on Various User Authentication Protocols Against Password Stealing And Reuse Attacks
Aparna CM, Binisha Mohan, Alpha Vijayan
Nowadays passwords are really an influential tool to keep all data and information digitally safe and secure. Text password are most popular compared with other formats of passwords, since information that resides in text passwords are more simple and convenient. However, text passwords are more prone to be stolen and are not always strong enough and come across different vulnerabilities. If the person creates a weak password or a password that is reused in many other sites, the intruders can easily get it. If the password is stolen ,it can be used for all the websites and this is what is called the Domino Effect. One of the risky environment is when a person enters his/her password in a computer that is not trust-worthy the password is prone to attacks like malware, phishing and key loggers etc. In this paper, a user authentication protocol is designed, which leverages a user’s cell phone and short message service to thwart password stealing attacks .The protocols requires a unique phone number that will be possessed by each participating website. A telecommunication service provider is involved in the registration and the recovery phases. The main concept of the paper is reducing the password reuse attack and password reuse attacks. The one time password technology reduces the password validity time. The good performance had improved the security.