Eman A. Sultan , Said E. El-Khamy , EL-Sayed El-Rabie, Nawal A. El-Fishawy, Fathi E. Abd El-Samie
Single Image Super Resolution Using Sparse Representation with Image Fusion Principle
Eman A. Sultan , Said E. El-Khamy , EL-Sayed El-Rabie, Nawal A. El-Fishawy, Fathi E. Abd El-Samie
A suggested single image super resolution algorithm is proposed based on image fusion principle. Magnetic resonance and computed tomography images are interpolated using two algorithms that use sparse-representation modeling with dictionary learning. The MR and CT images are fused either by discrete wavelet or curvelet transforms, then the fused result are interpolated by the same algorithms. Simulation results show that the fused super resolution image provides higher PSNR values than the original CT and MR images by using these interpolation algorithms. Also experimentally we deduce that using the curvelet fusion technique provides better results than using the wavelet, and scaling-up by one of the sparse representation algorithm gives more better results than bicubic and the other sparse representation algorithms in almost all images.
Data Encryption and Decryption Algorithms using Key Rotations for Data Security in Cloud System
Prakash G L, Dr. Manish Prateek, Dr. Inder Singh
Outsourcing the data in cloud computing is exponentially generating to scale up the hardware and software resources. How to protect the outsourced sensitive data as a service is becomes a major data security challenge in cloud computing. To address these data security challenges, we propose an efficient data encryption to encrypt sensitive data before sending to the cloud server. This exploits the block level data encryption using 256 bit symmetric key with rotation. In addition, data users can reconstruct the requested data from cloud server using shared secret key. We analyse the privacy protection of outsourced data using experiment is carried out on the repository of text files with variable size. The security and performance analysis shows that the proposed method is highly efficient than existing methods performance.
H.T. Rathoda, Bharath Rathod, K. T. Shivaramc ,A. S. Hariprasad , , K.V.Vijayakumar d, K. Sugantha Devi
A New Approach to an All Quadrilateral Mesh Generation over Arbitrary Linear Polygonal Domains for Finite Element Analysis
H.T. Rathoda, Bharath Rathod, K. T. Shivaramc ,A. S. Hariprasad , , K.V.Vijayakumar d, K....
This paper describes a scheme for finite element mesh generation of a convex, non-convex polygon and multiply connected linear polygon. We first decompose the arbitrary linear polygon into simple sub regions in the shape of polygons.These subregions may be simple convex polygons or cracked polygons.We can divide a nonconvex polygon into convex polygons and cracked polygons We then decompose these polygons into simple sub regions in the shape of triangles. These simple regions are then triangulated to generate a fine mesh of triangular elements. We propose then an automatic triangular to quadrilateral conversion scheme. Each isolated triangle is split into three quadrilaterals according to the usual scheme, adding three vertices in the middle of the edges and a vertex at the barrycentre of the element. To preserve the mesh conformity a similar procedure is also applied to every triangle of the domain to fully discretize the given convex polygonal domain into all quadrilaterals, thus propagating uniform refinement. This simple method generates a high quality mesh whose elements confirm well to the requested shape by refining the problem domain. The proposed scheme has been realized as computer programs and a number of examples have been included to demonstrate the technique. Although the paper describes the scheme as applied to planar domains, it could be extended to three dimensions as well. We have appended MATLAB programs which incorporate the mesh generation scheme developed in this paper. These programs provide valuable output on the nodal coordinates ,element connectivity and graphic display of the all quadrilateral mesh for application to finite element analysis.
Use of NFC Technology In Electronic Ticket System For Public Transport
M.R.Waghe, P.A.Pawar, Prof S.N. Bhadane
For conducting day to day collaboration, contacts and business transactions, the use of mobile devices are growing. In order to manage their various business and personnel activities, many users are switching on mobile devices.Since the early 1990s, mobile devices have been in use and their wide acceptance may lead them to decrease in use of personal computers everywhere. Powerful new handsets are attracting new customers, that’s why companies and government services are busy in developing seemingly endless mobile applications in the mobile environment. This innovation will significantly affect the direction and growth of mobile commerce like Near Field Communication, or NFC, a radio frequency (RF) communication technology that permit data to be exchanged between electronic devices . In payments, coupons, mobile wallet, mobile banking and ticket generation, NFC is expected to be used for
The Proposal of an Efficient Cyber forensics tool using Neural Networks and Image Mining concepts
P Ramesh Babu, Hunde Merga Dugassa, Abebe Gemeda3
Transmitting huge amount of unlawful or illegal data through the internet is the main motivation to develop this efficient cyber forensic tool. The proposed tool was developed with the help of image mining system and neural network concepts. This paper also describes the main requirements of cyber forensics with respect to image mining system and our proposed tool can be trained by using neural network application to identify intended objects in the scenes. End Users or forensic investigators can use our tool through an algorithm for training, searching and querying
Security has becoming an important issue everywhere. Home security is becoming necessary nowadays as the possibilities of intrusion are increasing day by day. Safety from theft, leaking of raw gas and fire are the most important requirements of home security system for people. A traditional communications based security systems provides enhanced security as whenever a signal from sensor occurs, a text message is sent to a desired number to take necessary actions.
This paper suggests two methods for home security system. The first system uses web camera. Whenever there is a motion in front of the camera, it gives security alert in terms of sound and a mail is delivered to the owner. The second method sends SMS which uses GSM-GPS Module (sim548c) and lpc2148 microcontroller, sensors, relays and buzzers.
The development of open source software is a multidisciplinary approach and it requires different areas of expertise, knowledge, tools and techniques. The open source software development has an important role. During the last decades, open source software development has changed the dynamics of software engineering research and added different new domains. In closed source software, the data related to software development, bug reported before release and post release was not available. It was difficult for researchers to validate their methods and models due to non-availability of data. In open source software, different repositories namely Source control repositories, Bug repositories, Archived communications, Deployment logs, Code repositories are available. Researchers are developing methods to mine useful information from these repositories to improve the quality of software projects. Different machine learning techniques have been applied to determine the level of severity and priority of bugs, to find the buggy module, security bugs and right developers. In this paper we are trying to focus on various domains such as Artificial Intelligence based Software Engineering to develop new tools, Model Based Software Engineering, Search Based Software Engineering , Role of Software Engineering in Cloud Computing, Quantitative and Qualitative Software Engineering, Empirical Software Engineering ,regression based prediction models and machine learning techniques used to predict the bug fix time, man power involved in fixing that bug , assign a bug to the right fixer.
Mehulkumar J Panchal, Dr. Ved Vyas Dwivedi, Rajendra Aparnathi
The Case study of Energy Conservation & Audit in Industry Sector
Mehulkumar J Panchal, Dr. Ved Vyas Dwivedi, Rajendra Aparnathi
Energy is very much important input in all sectors of any country’s economy. The standard of living of any country can be directly related to per capita energy consumption. The ever increasing population on the world and increased standard of living of human being has no doubt put a tremendous pressure on Earth’s Resources. In this research paper, Study of Energy Conservation and Energy Audit in industry. It is carried out and very effectively tried to make systematic approach for the same. It is studied that results of energy conservation and energy audit point out possibilities of energy saving, by simple housekeeping measures as well as improved techniques, better instrumentation and more efficient machinery. A careful day to day monitoring of specific energy consumption can help in saving wastage of energy and raw materials.
Clustering Approach To Test Case Prioritization Using Code Coverage Metric
Medhun Hashini D.R
Software testing is important phase of software development life cycle which ensures the developer that the developed software works according to specifications or not. Prioritization techniques that incorporate a clustering approach and utilize code coverage, code complexity and history faults as well to increase the effectiveness of the prioritization. To make testing efficient and effective a techniques of test case prioritization are used. An efficient Test case prioritization technique reduces the cost of testing and fault detection capabilities of testing. Results show that test case prioritization that utilizes a clustering approach can improve the effectiveness of test case prioritization techniques.
Gondge Sagar S, Jawalkoti Chaitanya B,Raut Pranoti N, Ms.N.K. Bhandari
PAPR Reduction in OFDM Systems
Gondge Sagar S, Jawalkoti Chaitanya B,Raut Pranoti N, Ms.N.K. Bhandari
Orthogonal Frequency Division Multiplexing (OFDM) is a multi-carrier transmission method which is most widely used in the field of communication. One of the major drawbacks of this system is Peak to Average Power Ratio (PAPR). There are various methods introduced for the reduction of PAPR in OFDM system. However these techniques have major drawback that they cause non-linear in-band distortion and out-of-band radiation, this reduces the system throughput. Thus, SHIFTING AND SWITCHING OF NULL SUB-CARRIERS, which is the proposed technique discussed in our report overcomes this problem. In this technique, we replace some of the transmitted data symbols by nulls, i.e. we introduce errors in the transmitted signal. At the receiver, an iterative decoder is used to correct the transmitter and channel errors.
An Effective Classification and Novel Class Detection of Data Streams
G.Divya, MR.D.BrightAnand
Data stream classification suffered from the problem of infinite length, concept drift, concept-evolution and feature-evolution in data mining community. Usually data streams are infinite in length and it makes difficult to store and use all the historical data for training. Several research is eliminating the concept-evolution and feature-evolution concepts. Recently, many researchers have been focused on data streams as an important approach against huge database mining instead of mine the entire database. In this paper, an efficient approach is proposed for classification and novel class detection of data streams. The proposed method uses the outlier detection method to remove the unwanted data present on the data streams. Also, this approach uses the Nearest Neighbor algorithm and the Naive Bayes classifier concepts for novel class detection. The performance is evaluated with respect to error rates, final word count, speed and time. The result shows that the proposed method for classification and novel class detection provides better results than the existing techniques
Location Detection and Time Monitoring System for Moving Object
Nirupama.Sheelwant, Sandeep.Sheelwant
Location tracking and updating are the fundamental issues in the moving objects.Object’s moving efficiency and location detection accuracy are taken into account in the project. The client sends the queries to the server based on the proper result. The server sends the reply to the client maintaining its accuracy as well as efficiency. Main strategies are to update the client request with the exact result. The advantage of this is the flexibility and ability to optimize the efficiency and also updating location of the moving object. We developed a system of high efficiency and accuracy to detect the exact location and also location updating technique for moving object.
A software product line (SPL) companies expanding their platform outside their organization, which is now termed as a software ecosystem approach. This approach investigates the relationship between companies in software industry. Companies work together with co-ordination to achieve their strategic goals. In this paper we undertake a review on the software ecosystem as an emerging area. This paper also described challenges, implications and new approach of software ecosystem as business perspective rather than only technical. We have focused on three dimensional perspectives of software ecosystem as technical, social and business including most recent investigated areas of software ecosystem. This paper emphasis on the, research areas needed to develop sustainable software ecosystem
Asst. Prof. Sanjay S. Ghodke, Harshad Kolhe, Saurabh Chaudhari, Kedar Deshpande, Somesh Athavle
ATM Transaction Security System Using Biometric Palm Print Recognition and Transaction Confirmation System
Asst. Prof. Sanjay S. Ghodke, Harshad Kolhe, Saurabh Chaudhari, Kedar Deshpande, Somesh Athavle
Biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. In this project the existing security of the ATM (Automated Teller Machine) system has been improved by integrating the palm print of the user into the bank’s database as to further authenticate it. This was achieved by modeling and building an ATM simulator that will mimic a typical ATM system. The end result is an enhanced biometric authenticated ATM system that ensures greater security and increased customer’s confidence in the banking sector
Anuraag Vikram Kate , Nikilav P V, Kasthuri Rengan
Mining Hashtags: The Tweet Suggestion System
Anuraag Vikram Kate , Nikilav P V, Kasthuri Rengan
Nowadays social networking has become a requisite and obsession rather than a service. In this ever progressive system, we propose a tweet suggestion system that enhances the basic features of the prevailing tweet structure. In this paper we explore the framework of mining multiple hashtags from tweets in the data repository and suggesting the tweets to the user based on their previous tweets. The algorithm employed here is the Apriori algorithm that mines the frequent data item-set and presents us with the hashtags required for the suggestion.
DEFENDING FLOOD ATTACKS BY LIMITING PACKET REPLICATION ON TIME INTERVAL
V.Senthilvel, A.Arjun
Disruption Tolerant Networks (DTNs) consist of node which has high mobility and lack of consistent in connectivity between the nodes. To adopt such a situation two nodes can only exchange data when they move into the transmission range of each other. DTNs employ such contact opportunity for data forwarding. Due to the limitation in bandwidth and buffer space, DTNs are vulnerable to flood attacks. In flood attacks, attackers inject as many packets as possible into the network, or instead of injecting different packets the attacker’s forward replicas of the same packet to as many nodes as possible. To defend against flood attacks in DTNs A system is proposed in which each node has a limit over the number of packets that it, as a source node, can send to the network in each time interval. Each node also has a limit over the number of replicas that it can generate for each packet. The two limits are used to mitigate packet flood and replica flood attacks
Optimal Sizing And Placement Of Capacitor In A Radial Distribution System Using Loss Sensitivity Factor And Firefly Algorithm.
Priyanka Das, S Banerjee
In distribution systems minimization of active power loss is very essential to raise the overall efficiency of power system. This article presents a method of reducing the loss by placing shunt capacitors. In this paper a two stage methods have been proposed for optimal allocation of capacitor in a radial distribution system. In first stage loss sensitivity factor is used to calculate the location and secondly the firefly algorithm is used for cost minimization including capacitor cost and cost due to power loss. The proposed method is tested on 33-bus and 69-bus system and results are given below
Evaluation of the Reduction in Switching Time and Stress in Constant Electric Power Dependent Public Utilities by Automatic Mains and Phase Changer
Lasisi Hammed, Oladokun Ajibola Samson
Power failure is the major factor that causes constant electric power-dependent public utilities to stop operation, making it paramount to have backup or alternative electric power sources to ensure the continuity of operation of these utilities. The power outage time lag experienced when these public utilities are switched from a failed electric power source to an available backup power source as well as the stress of manual switching, makes the operation of these utilities inefficient.
The Automatic Mains and Phase Changer (AMPC) is a device that aids in greatly reducing the power outage time lag during the switching between power sources. It also eliminates the stress of manually switching between power sources.
This paper reports a research that evaluates the relationship between the time lag experienced with the use of the AMPC and the time lag experienced when the switching is done manually. It also evaluates the relationship between the stress levels during manual load switching and the stress levels using the AMPC for automatic load switching.
The research involved the use of an Automatic Mains and Phase Changer to provide automatic switching from a failed phase of the mains supply to an available phase of the same mains supply. The time lag in the automatic switching was compared with the time lag experienced when the same switching process was done manually. With the load being a single phase load, it can be switched between the phases of a 3-phase mains supply depending on which phase is available.
The research also involved the use of the AMPC to provide automatic switching from a mains power supply to a generator supply. The time-lag in the automatic switching using AMPC was compared with the time-lag when the switching was done manually and the relationship between the time-lags was fully analyzed and evaluated in this paper. 20 different time-lag readings were taken with the AMPC used and with the switching done manually and the analysis of the relationship between the time-lags as well as the relationship between the stress levels of both, is well documented in this paper. The result of this research showed that change-over time is greatly reduced with the AMPC, compared to manual change-over time which depends on the position of the operator relative to the position of the change-over switch.
Prof. Jayvant H. Devare, Sonali D.Kotkar, DipaliN.Nilakh, Priyanka S.Solat, Ms. Shradha S. Wabale
iMobile: Remote Access for Android Phones
Prof. Jayvant H. Devare, Sonali D.Kotkar, DipaliN.Nilakh, Priyanka S.Solat, Ms. Shradha S. Wabale
Now a dayswe are dependent on our mobile phones, if we forget the phone at home it seems we have lost a limb. That time we think that it would be good to access our mobile remotely, like the web browser. The application like iMobile, instead of accessing the computer remotely, we will access the mobile phones. An application creates a TCP connection with web application and the mobile phone and retrieves all the data like missed calls, contacts and message. Sometimes Cell Phone companies block “Incoming” TCP connection towards the phone over network to overcome this problem, through the application SMS could be sends with the application IP addresses and then it would be the mobile phone establishing the TCP connection. Then, it could easily and securely send the data using the GSM or 3G network.The AES algorithm used for the security purpose.
Providing Information Security Using ArcSight SIEM in an Organization
Aamir Sohail
In Today’s world Data is very important and we are storing our confidential data using the latest technology like –Cloud, Virtualization and BYOD (Bring your own device i.e. Laptop, mobile etc.). We all are storing our confidential data over there .Even there is advancement in the thinking and behaviour of Hackers. Cyber Attack is also a big concern. To overcome all these problems we have ArcSight SIEM (Security Information and Event Management) Technology. Arcsight SIEM will collect, analyse and present information on security products, Operating System, Databases etc. Every data needs to be recorded. So it will monitor all the data coming from different devices and will give you the centralized view of logs
Identification of diseases of Soybean Using Cluster Analysis
Mamta Tiwari, Dr. Bharat Mishra
In this paper we humbly present an effort in the direction of identifying major diseases in soybean crop, by application of cluster analysis. Data mining in agriculture is in itself a relatively new research field. The use of cluster analysis in the field of agriculture is relatively in its nascent form. A few techniques of cluster analysis have also been discussed here. It includes hierarchical agglomerative clustering approach, fuzzy clustering, hierarchical divisive clustering and Kohonen self-organizing feature maps. This is our strong belief that more effective techniques can be carved out in future for finding the root cause factors for spreading of various diseases in various crops and also for solving different agricultural problems of various complexities and domains, by intelligent use of data mining and its tools such as cluster analysis, classification and prediction
Agile Development Methodology with cloud computing
Neha Jain, Shipra Dubey
Combining agile development methodologies with cloud computing brings the greatest of both worlds. Agile development methodologies are very hopeful in the software industry. Agile development techniques are very practical in accepting the fact that prerequisite in a business environment changes regularly. This method used by artistic people who have understood the faults of regular software management processes & and provide a lot of opportunities to assess the direction of a project throughout the development lifecycle. Agile development processes optimize the opportunity provided by cloud computing by doing software releases iteratively, receiving user opinion more regularly & facilitate the organizations to examine quality standards at each section of the improvement. In this paper we are trying to analyze the Agile Management & development methods and its benefits conjunction with cloud computing.
Twitance is a recommendation and analytic tool for Twitter which would help Twitter users to find people on their particular interest so as to better engage with the audience. It works as a search engine of people. A website on which user can search for his topic related Twitter users and then afterwards use them as mentions in his tweet to increase his audience. Later on the user will be provided with the reach of his tweet. A graphical representation of who all have re-tweeted his tweet, made his tweet favorite, replied to his tweet and who among those re-tweeters have greater influence. He also gets to know who are the people who have similar interests to him.
With the dynamic nature of Ad-hoc Networks coupled with the mobility of nodes results in breakage of the links due to ever changing topology of the nodes. When there is a substantial increase in the degree of mobility of the wireless network more link errors are likely to occur. When this happens, route repair is typically performed to establish a new route. Such route repair mechanisms suffers with the problems like high control overhead and long packet delay making them inefficient due to frequent failures of intermediate connections in an end-to-end communication. When there is a breakage in the intermediate link, it is favorable to discover a new route locally without resorting to an end-to-end route discovery. In this paper, a new idea on local route repair (LRR) mechanism that the repair is confined to the vicinity of the broken link is proposed to decrease the reaction time of recovery and the overhead of route maintenance. The route repair idea is implemented by improving repair mechanism in the widely accepted AODV protocol. The proposed version of AODV routing protocol with route repair scheme overcomes the disadvantages of its antecedent. In the earlier AODV routing protocol, on the occurrence of a link break an error message is sent to the source stating that a link failure has taken place and further communication is stopped temporarily. Where as in the proposed version of AODV, nodes in the active path between source and destination act as a virtual source when link breakage occurs and there by the search process is continued till the link is formed to reach the original destination is reached.
Fabrication Of Thin Film Transistor Using High K Dielectric Materials
S.Arunprathap, A.Napolean, Cyril Robinson Azariah
The scaling of complementary metal oxide semiconductor (CMOS) transistors has led to the Silicon dioxide (SiO2) layer used as a gate dielectric becoming so thin so it produces the tunnelling current leakage, high power consumption and produces high heat when scaling of the transistor. It is necessary to replace the SiO2 with a physically thicker layer of oxides of higher dielectric constant (κ) or ‘high K’ gate oxides. A technique has been developed to fabricate a Thin Film Transistors (TFT) using stacked high- κ nanomaterials. Here in this work using TiO2, and ZrO2 as high-κ dielectric nanomaterials,
ITO/PET substrate which is flexible, and HMDS as a semiconducting layer provides high performance to the device. Through this proposed approach the above problems are solved and the transistor could be shrunk below 32 nm
DDOS Attack And Detection For Secured Cloud Computing Resources
Danveer Singh, Basant Kumar Gupta , Harshit Gupta
Cloud Computing is a hot subject now a days in IT industry. It has some security issues due to which people are unsure to endure cloud computing. Availability, confidentiality and integrity are main security issues in Cloud computing. Availability is one which is effect by DDoS exasperate. This paper describe how to detect DDoS violence, in view of that cloud providers will alert to assign resources to users even in denial of serve violent behavior in in the distance ahead.
Biometric features such as facial shape, hand shape, fingerprint, sound and iris have been proposed for human identification. Iris recognition systems are used in world wide applications and more effective compared with other recent biometric technologies. This paper is mainly concentrated on eye pathology and specifies whether eye disease will cause the iris recognition process to fail. Iris images were taken before and after the treatment of eye disease and the output shows the mathematical difference obtained from treatment. Gabor filter is used to extract the features. This iris recognition was effectively withstood with most ophthalmic disease like corneal oedema, iridotomies and conjunctivitis. This proposed iris recognition should be used to solve the potential problems that could cause in key biometric technology and medical diagnosis.
H.T. Rathod, Bharath Rathod Shivaram K.T , H. Y. Shrivalli Tara Rathod ,K. Sugantha Devi
An explicit finite element integration scheme using automatic mesh generation technique for linear convex quadrilaterals over plane regions
H.T. Rathod, Bharath Rathod Shivaram K.T , H. Y. Shrivalli Tara Rathod ,K. Sugantha Devi
This paper presents an explicit finite element integration scheme to compute the stiffness matrices for plane problems using symbolic mathematics. Stiffness matrices are expressed as double integrals of the products of global derivatives over the all quadrilateral plane region. These matrices can be shown to depend on material and geometric properties matrix and the rational functions with polynomial numerators and linear denominator in bivariates over a 2-square. We have computed the integrals of these rational functions over a 2-square by explicit integration using the symbolic mathematics capabilities of MATLAB. The proposed explicit finite element integration scheme is illustrated by computing the Prandtl stress function values and the torisonal constant for the square cross section by using the four node linear convex quadrilateral finite elements.An automatic all quadrilateral mesh generation techniques which is recently proposed by the authours is also integrated in the appended application programs written in MATLAB.
Using Wi-Fi at homes, offices, colleges will now become a thing of the past. Now we have Li-fi, Light Fidelity, refers to wireless communication systems using light from light emitting diodes as a medium instead of traditional radio frequencies, as in Wi-Fi. Li-fi is expected to be ten times cheaper than wi-fi. Li-Fi has the advantage of being able to be used in electromagnetic sensitive areas such as in aircraft or nuclear power plants, without causing interference. However, the light waves cannot penetrate walls which makes Li-Fi more secure relative to Wi-Fi. The visible light spectrum is 10,000 times larger than the entire radiofrequency spectrum. This paper will focus on Li-Fi technology over Wi-Fi technology and challenges for the new VLC technology.
Netflow Traffic Analyzer For worm detection- A Survey
Manish Khule, Megha Singh, Deepak Kulhare
Due to easy access and requirement of the Internet make it more popular for research and information sharing. Because of this feature a malicious codes are also easily exchange. A worm (malicious codes) can disturb network and normal network operation. Internet worms are causes significant worldwide disruption, a huge number of infected hosts generate traffic, which will impact the performance of the internet. Therefore this is one of the areas where researchers are concentrating to find effective detection system, which will presence the worms and reduce the worm’s spread. This paper deals with a classified study of most important and commonly used methods for detecting internet worms using Netflow, which can help network managers to monitor suspect Internet worm’s activities by analyzing the source data from the router
Customization Issues In Cloud Based Multi Tenant SaaS Applications
Mala Dutta, Pritesh Gupta
Cloud computing is growing rapidly, with applications in almost all the areas. SaaS (Software as a Service) is a modern approach to deliver large scalable enterprise software as a service on Internet. Cloud platform provides the scalability, availability and utility computing for services on Internet. There are many technical challenges involved in SaaS development. One of them is multi-tenancy, which allows single instance of software to serve multiple organizations by accommodating their unique requirements through configuration at the same time. SaaS architecture requires the both configuration and some level of customization to achieve higher maturity model. As every organization requires a Management Software to run their business, as they have been using traditional on-premise software which usually requires many hardware and software resources. There are many organizations that cannot afford such investments and cloud computing is the best solution. In this paper, we will explore the customization issues and challenges to SaaS vendors; we proposed an application model in which we can use xml data type in database to make customizations more flexible
Tracking A Dynamic Target in Wireless Sensor Network Using Enhanced Polygon Based Framework
Ramya A R, P Mangayarkarasi
The Main objective of a Wireless Sensor Network is to provide reliable and accurate information regarding the environment in which the sensors are deployed. Among the various applications of a sensor network, recent advances are with respect to target tracking. Target tracking is a challenging task due to failure of sensor nodes, high mobility of the target, processing of data acquired from multiple targets and multiple sensors at sink, communication between the sensors using wireless medium. Many approaches have been developed to address the issues of target tracking and provide the solution for the same. In this paper we present the various mechanisms developed for the purpose of target tracking using the target signal parameters such as Received Signal Strength( RSS ) and Time of Arrival( ToA ). Finally we propose a target tracking framework considering the flaws in existing system and combining the advantages of various mechanism with energy of a sensor node being the main constraint.
Image Processing is a procedure to translate an image into digital figure and carry out some operations to get a better image and take out useful information from it. There are many techniques of digital image processing like image enhancement, compression and reconstruction which are discussed in this paper. Image segmentation is an important method of image processing which is widely used in these days. Further image segmentation is divided into different categories in which edge segmentation is very common and effective in the latest research area.
Ms. Deepali R. gadbail, Prof. S.S. Dhande, Prof.Kanchan M. Pimple
Age Synthesis and Estimation From Face Image
Ms. Deepali R. gadbail, Prof. S.S. Dhande, Prof.Kanchan M. Pimple
Human age, as an important personal trait, can be directly inferred by distinct patterns emerging from the facial appearance. Computer-based age synthesis and estimation via faces have become particularly prevalent topicsy because of their explosively emerging real-world applications, such as forensic art, electronic customer relationship management, security control and surveillance monitoring, biometrics, entertainment, and cosmetology. Age synthesis is defined to rerender a face image aesthetically with natural aging and rejuvenating effects on the individual face. Automatic age-progression is the process of modifying an image showing the face of a person in order to predict his/her future facial appearance.Age estimation is defined to label a face image automatically with the exact age (year) or the age group (year range) of the individual face.During growth, aging is affected in two main forms, one is the size and shape variation and the other is the textural variation. In this paper, we use the textural variation of the face during the growth, which appear more in the adulthood in theform of wrinkles.
Purushottam Wadekar, Prakash S. Jadhav, Vishal Raj, Prof.N.K.Bhandari
Digital Image Watermarking For Bank Security Using Arm Processor
Purushottam Wadekar, Prakash S. Jadhav, Vishal Raj, Prof.N.K.Bhandari
The growth of image processingused in embedded system has boosted the increase of security in various sectors to a greater extent, we developed a digital watermarking technique for security purpose using discrete wavelet transform (DWT) and Discrete Cosine Transform (DCT).Watermarking technique is highly secure if knowing the exact algorithms for embedding and extracting. Watermark does not help an unauthorized party to detect the presence of the watermark information in it.
PREDICTION OF ELASTIC MODULUS FROM COMPESSIVE MODULUS OF LIME STABILIZED LATERITIC SOIL FOR MECHANISTIC DESIGN USING THE SPLIT CYLINDER
D.B.Eme, J.C.Agunwamba
In recent years there has been a change in philosophy in flexible pavement design from the more empirical approach to the mechanistic approach based on the elastic theory. The mechanistic approach is in the form of layered elastic theory which is being used by many agencies. Elastic theory based design methods require as input, the elastic properties of these pavement material for an effective design. In this study laterites were gotten from seven (7) local government areas in Rivers state. The laterites were classified using the AASHTO classification system, the properties obtained from the laterites indicates that it is an A-5 soil which is a silty-clay material. The material was mixed with different lime contents of 0,2,4,6,and 8% and compacted at the energy of Standard Proctor in 100mm diameter by 80mm long split cylindrical moulds, the compacted specimens were moist- cured and tested after 7, 14 ,21 and 28days. The CBR machine was used to load the specimen to failure through static load application. The failure loads as well as the horizontal and vertical strains were measured and used to predict Elastic modulus from compressive modulus using the SPSS programme, the result show that the Elastic and Compressive modulus increases with an increase in lime content up to 8% lime content, also the predicted values were close to the measured values with an average R2 value of 92%, indicating that the predicted Elastic modulus can be used for mechanistic design of flexible pavement.
POWER QUALITY IMPROVEMENT TECHNIQUES IN HYBRID SYSTEMS – A REVIEW
V.Srikanth, A. Naveen kumar
Power Quality is one of a major constraint in power system transmission and distribution. Now a day’s most of the energy was consumed by us. The abnormal growth of Electric Energy consumers, power demand is also being increased. At the same time the unavailability of fossil fuels and the cost of generation, transmission and utilization are increased. Hence, the power producer opposes to reduce the cost of power generation. Simultaneously the consumer thinks about that, to get good quality of power and to minimize the power tariff. To meet the both ends we go for hybrid power generation system. To implement Hybrid power system, it has several problems such as Protection, Synchronization, Power Quality, etc., in this paper we focused on various methods of power quality improvement Techniques in hybrid power systems.
Cloud storage is one of the many services offered by the cloud computing. Cloud storage is much sought due to anytime, anywhere access using wide varieties of devices, for instance, laptop, desktop and smart phones. Due to these capabilities, a number of individuals as well as organizations are subscribing for this service from the various vendors existing in this area. These cloud providers differ from their services in a great deal. This work compares the offering of different storage provider considering the storage space, synchronization capabilities, pricing, compliances etc. Finally, we discussed the major issues that exist in cloud and methods to address them without compromising the cloud performance.
Privacy Preservation of Sensitive Attributes Using Hybrid Approach
M. Geetha , V. Uma Rani
Privacy Preserving Record Linkage (PPRL) is widely used in data mining applications which aims to integrate data from different heterogeneous data sources while hiding the private information. In this paperwe propose a new algorithm for merging two datasets using Sorted Neighborhood Deterministic approach and a new Preservation algorithm that uses Pattern mining over dynamic queries. In contrast to the existing techniques our approach guarantees strong privacy less computational complexity and is scalable over large datasets. We provide empirical evidences to prove that our method is secure, fast and efficient than the existing methods.
Short Term Load Prediction of a Distribution Network based on an Artificial Intelligent Method
K.Aruna, Dr.N.Yadaiah
Accurate load forecasting plays a key role in economical use of energy and real time security analysis of system. Artificial Neural Network (ANN) model have been extensively implemented to produce accurate results for short-term load forecasting with time lead ranging from an hour to a week. In this paper a practical case of the small load area of a town getting supplied by 19 distribution feeders is considered with dominant residential-type of load. Historical load and temperature data is collected from January-2010 to December- 2010.Four weather seasons are defined by the Meteorological Department, India. Each season includes the group of month .Representative months are selected from each season by observing the variation in load behavior patterns. An input vector composed of load and temperature values at previous instants, is employed to train ANN designed for each selected month by using Back-Propagation algorithm with Momentum learning rule. ANN testing is carried out and their performance is evaluated using mean absolute percentage error (MAPE) criterion. Finally, error values are compared for each month and hence the deviation in forecasting ability of ANN is observed for each month and season
Performance Studies of Three-Phase Cascaded H-Bridge and Diode-Clamped Multilevel inverters
T.Rakesh, Dr.V. Madhusudhan, Dr.M.Sushama
This paper discusses a concept of two types multilevelinverters including of Cascaded H-Bridge and Diode-Clampedfor harmonic reduction on high power applications. Normally,multilevel inverters can be used to reduce the harmonic problemsin electrical distribution systems. These studies focused on theperformance and analysis of a three phase multilevel invertersincluding Cascaded H-Bridge and Diode Clamp based on SPWMapproaches. Based on the various simulations on nine levels ofmultilevel inverters, we found that the Total HarmonicsDistortion for voltage (THDV) output for both multilevelinverters is decreased. It also produces lower contents based onthe IEC standard.
Design of a Power System Stabilizer for aSynchronous Generator Using HybridIntelligent Controller
V.Sanjeeva Rao, Dr.B.V.Shankarram
The potential and effectiveness of a hybrid intelligent PSS controller combining the advantages of both differential evolution (DE) and tabu search (TS) is assessed in this paper. The controller is incorporated in a single machine infinite bus (SMIB) system with a synchronous generator. An analysis is also carried on the quality of results if various parameters of the differential evolution like crossover, mutation and population size of the algorithm is varied. At the end a comparison is made between the controller based totally on differential evolution and the one designed with the hybrid technique
Satellite Image enhancement using Combination of Transform Techniques and Interpolation Methods
R.Swaminathan, Dr.Manoj Wadhwa
Satellite images are used in many fields of research and enhancement of these images is an important process. In this paper we discuss the different types of transform techniques used for image enhancement. The edges of an image can be improved by using an effective transform technique and the resolution can be improved by using interpolation technique. The combination of transform techniques and interpolation methods helps to produce an overall enhanced image. The different transform techniques discussed in this paper are DWT, CWT, SWT and Curvelet Transform
River: A Reliable Inter-Vehicular Routing Protocol For Vehicular Adhoc Networks
R.Mallika Devi., Dr.B.Srinivasan.
Vehicular Adhoc Networks (VANETs), associate degree rising technology, would permit vehicles on roads to make a self-organized network while not the help of a permanent infrastructure. As a requirement to communication in VANETs, associate degree economical route between act nodes within the network should be established, and therefore the routing protocol should adapt to the quickly changing topology of vehicles in motion. This is often one in every of the goals of VANET routing protocols. In this paper, we have a tendency to gift associate degree economical routing protocol for VANETs, referred to as the Reliable Inter-Vehicular Routing (RIVER) protocol. Stream utilizes associate degree aimless graph that represents the surrounding street layout wherever the vertices of the graph ar points at that streets curve or run across, and therefore the graph edges represent the road segments between those vertices. In contrast to existing protocols, stream performs time period, active traffic observation and uses these information and different information gathered through passive mechanisms to assign a reliability rating to every street edge. The protocol then uses these responsibility ratings to select the foremost reliable route. Management messages ar accustomed determine a node’s neighbors; determine the responsibility of street edges, and to share street edge responsibility info with different nodes
The main objective of this paper is to aware the computer users or other novice users about spoofing attacks. Spoofing means pretending something you are not, it is done in order to gain unauthorized access It is mainly the kind of attack that may harm the users in one or many ways depending upon the type of attack, during the spoofed attack attacker not only see our private information like password, user name, account number we type but also modify that precious information. There may be various types of spoofing attacks like web spoofing, URL spoofing ,e-mail spoofing ,IP spoofing etc here we describe the various type of spoofing attack &some useful method for prevent those internet attacks.
IRCAR: Improved Reputation based Context-aware Routing Algorithm for Delay Tolerant Network
Aditya Pancholi, Sapna Grover
Delay Tolerant Networks are the network where the continuous network connectivity is lacking. R-CAR algorithm[2] addresses the issue of routing in such networks. But the paper fails to address issues regarding newly arrived node in a network, prioritization of low hop count carrier node and sharing and dynamic updation of local reputation tables. This paper gives an Improved version (IRCAR) that efficiently solves these issues.
Research on Android app Vs Apple app Market: Who is leading?
Shivam Jaiswal , Ajay Kumar
Now days there is boom of smart phones, there are more than a billion smartphone users in the world [1]. As of 2013, two-third of Americans own smartphones [2].The key feature of these smart phones are their application support and there operating system on which these application runs. The most common mobile operating systems are Android, iOS, Blackberry and WindowsPhone.
This paper provides detail analysis of market share of smart phones having different mobile operating systems.
With the arrival of new era of technology , incremental use of gadgets such as smart phones loaded with camera , tablets ,music players, hand held game consoles etc. has led to a continuous requirement to store , share and access digital data .Thus massive digital data born every day requires a huge storage which can only be fulfilled by cloud.. [13]. Cloud computing allows the storage and processing of data over huge data centres and facilitates an on demand delivery of services over a computer network (typically Internet) . With the development of IC technology and advancement of VLSI andULSI technologies, consumers are made available modern day computes with high processing capability which could not be utilized to its fullest .In this paper we have explained how this problem is solved with use of Virtualization technique.This paper is a brief survey based on reading of cloud computing and it tries to explains how services are delivered in cloud computing , gives the basic concepts, general architecture of cloud, and fundamental software for virtualization called hypervisor.[2]
Comparative study of CPW-fed Bowtie antenna with ACS-fed Bowtie antenna for wireless applications
Bathala V. Sindooja, T. Anita Jones Mary
The bowtie antenna with two types of feed structure is analyzed in this paper. The co-planar waveguide (CPW) fed bowtie antenna is compared with the asymmetric co-planar stripline (ACS) fed bowtie antenna on the parameters like return loss characteristics and frequency bandwidth percentage. The antenna is designed using the software CADFEKO 5.5 suit and the results are analyzed. The results show that Bowtie antenna with CPW feed gives good bandwidth enhancement and Bowtie antenna with ACS feed gives good impedance matching for the wireless applications.
The objective of this contest is to maximize the profit using metric by which classifier’s performance will be tested and applied to customer churn problems which will be driven by classifiers i.e. customer churn prediction model. The public dataset that has customer usage pattern and if the customer has churned or not ,these factors will be applied to our profit maximizing framework. With the explosive growth of data, and the increasing popularity of social network sites, companies will rely more than ever on data mining techniques to support their decision making process. In such cases, the cost-benefit analysis framework provides directions on how to develop performance measures tailored to specific business problems
Routing in Delay Tolerant Mobile Network: A Comparative Analysis
Sapna Grover, Aditya Pancholi
Routing in Delay Tolerant Network has received considerable attention in the recent years. Context-aware Adaptive routing and Reputation based Context-aware Adaptive routing are based on a single copy of the message, whose delivery is based on the choice of a best carrier node. In this paper, we present a comparative analysis of these algorithms and highlight the issues not addressed by any of these algorithm.
Survey of MARS: Spatial Link Quality and Node Positioning in Wireless Relay Network
Suganya.G, Mrs. A. Mary joycy
Multihop wireless relays can extend the area of network connectivity instantly and efficiently. However, due to the spatialdependence of wireless link-quality, the deployment of relay nodes requires extensive, expensive measurement, and managementefforts. This paper presents a mobile autonomous router system, (MARS) through which a relay router autonomously seeks andadjusts the best “reception” position for itself and cooperatively forms a string-type relay network with other neighboring routers.Specifically, MARS 1) accurately characterizes spatial link-quality through a new measurement technique, 2) effectively probes/optimizes node positioning via a spatial probing algorithm, and 3) maintains error-tolerant position information via an inexpensivepositioning algorithm. MARS has been prototyped with both a commodity mobile robot and a wireless router with IEEE 802.11cards. Our experimental evaluation of both the MARS prototype and ns-2-based simulation show that MARS achieves an average of 95 percent accuracy in link-quality measurements, and reduces the measurement effort necessary for the optimization of a node’slocation by two-thirds, compared to exhaustive spatial probing