Today many cloud users are facing the major problem of fake logging in and data theft. So it is required to authenticate the cloud user that requests access to an account for providing privacy and security. However, the techniques used for authentication so far were not capable to guarantee the same and thereby kept the data at high risk. So, we are using the concept of Biometric Authentication along with Data compression and Data Encryption. Most of the techniques of Biometric Authentication in Cloud face performance issues like time and space complexities. So it is a need to measure these flaws. This paper eventually studies all the possible techniques relevant to Biometric Authentication and upgrade the system to a new level.
Review on Content Based Image Retrieval (CBIR) Technique
Prof. Vikram M Kakade, Ishwar A. Keche
In digital image processing finding or searching a image in huge database of digital images is big task for designing more efficient image and shape matching algorithm. In data storage and image acquisition technologies we have to enabled the creation of large image datasets. In this type, it is necessary to develop appropriate information systems to efficiently manage these collections. The common approaches use the so-called Content-Based Image Retrieval (CBIR) systems. Basically, these systems try to retrieve images similar to a user-defined specification or pattern (e.g., shape sketch, image example). In this paper we see the different type’s techniques of content based image retrieval for different application purpose
Stega Image a Technique to Hide Data within Image File, Using Image Steganography and Encryption
Abdullah Hamid
We propose new algorithm to hide data inside image using Steganography and Encryption. The proposed algorithm uses binary codes and pixels inside an image. The file is converted to binary codes to maximize the storage of data inside the image. By applying the proposed algorithm, a system called STEGA IMAGE is developed. The system is then tested to see the viability of the proposed algorithm. Various sizes of data are stored inside the image, Depends upon the pixels of the Carrier Image.
Design & Simulation of Turbo Decoder for BER Calculation
Wazir ,
Turbo decoders applied in wireless communications are complex and dissipate large amount of power. In this paper, we investigate design & simulation of Turbo algorithm for wireless communications applications, including our proposed Simulink model of Turbo decoder. The schemes employed in our low-power design are clock-gating and toggle filtering. We described the behavior of Turbo decoders in Matlab Simulink Model and synthesized using a Simulink Communication tool. The analyzing circuits were replaced and routed in the standard cell design environment. BER estimation obtained through different simulations indicates that the proposed design reduces the BER of an original Turbo decoder design by 55%.
Technological changes based on the art of optical signal processing technologies and devices their limitations and thus there is increased focus on technologies that use photons. There are vast opportunities to carrying information in the field of fiber optics for communication purpose. Basically there are two types of fiber optics cables are used i.e. step graded and graded index. Fiber-optic networks have been used for decades to transmit large volumes of traffic across the country. The economics of fiber networks have only recently allowed for connecting the fiber directly to the home, creating a fiber-to-the-home (FTTH) network. FOSAPP objectives to develop a high-speed fiber optic data link, future prospects such as FTT/FISL and HFC are the challenging opportunities in the status of fiber optics in the counter’s. Fiber-optic networks have been used for decades to transmit large volumes of traffic across the country. The economics of fiber networks have only recently allowed for connecting the fiber directly to the home, creating a fiber-to-the-home (FTTH) network.
Anpu Ann John , Feba G. Joseph , Mr. Pradeep P. Mathew
Enhanced Public Auditing System
Anpu Ann John , Feba G. Joseph , Mr. Pradeep P. Mathew
Cloud computing and storage solutions provide users and enterprises with various capabilities to store and process their data .To guarantee shared information respectability can be checked freely, clients in the gathering need to process marks on every one of the squares in shared information. Diverse squares in shared information are by and large marked by various clients because of information alterations performed by various clients. For security reasons, once a client is denied from the gathering, the squares which were already marked by this disavowed client must be re-marked by a current client. The clear technique, which permits a current client to download the comparing a portion of shared information and re-sign it amid client denial, is wasteful because of the expansive size of shared information in the cloud. In this paper, we propose a novel open inspecting instrument for the honesty of imparted information to productive client repudiation at the top of the priority list. By using the possibility of intermediary re-marks, we permit the cloud to re-sign squares for the benefit of existing clients amid client repudiation, so that current clients don't have to download and re-sign pieces independent from anyone else. Moreover, an open verifier is constantly ready to review the uprightness of shared information without recovering the whole information from the cloud, regardless of the possibility that some piece of shared information has been re-marked by the cloud. We develop privacy preserving framework which handle all the worries in privacy security. This mechanism strengthens the cloud storage services. The integrity of data in the cloud is protected. Besides, our instrument can bolster group evaluating by checking numerous inspecting assignments all the while. Trial comes about demonstrate that our instrument can altogether enhance the productivity of client denial. The cloud providers provide a more secure and reliable environment for users. Attribute based encryption is used to provide cloud security for third party auditors
E-Shopping Community Structure Analysis Using Data Clustering
Sreeja B P , Saratha Devi G
The E-Shopping Experience has opened the new ways of business and shopping. The conventional terms of shopping have been changed and new terms to shop online emerge into customers' online shopping behaviors and preferences. Extort interesting shopping patterns from ever increasing data is not a inconsequential mission. It require intelligent association rule mining of the available data, that can be practically knowledgeable for the online retail stores, so that they can make viable business decisions .The fast development of online shopping, the ability to segment e-shoppers basing on their preferences and characteristics has become a key source of competitive advantage for firms. This paper presented the pragmatic algorithms for clustering e-shoppers in e-commerce applications. Various multidimensional range search is presented to solve the range-searching problem..In addition, in this paper, the global clustering algorithm is presented which is an incremental approach to clustering that dynamically adds one cluster center at a time through a deterministic global search procedure The basic idea underlying the proposed method is that an finest solution for a clustering problem with other clusters can be obtained using a series of location based clustering and segmentation.
Modified AODV Techniques for Detection and Prevention of Gray Hole Attack in MANET
Nutan*, Punit Kaushik**
Compared the On-Demand (DSR and AODV) and Table-Driven (DSDV) routing protocols by changing the nodes number and evaluated the metrics “end-end delay, packet delivery ratio, packets dropped, throughput”. In case of packet delivery ratio, AODV performs better than DSDV when number of nodes are high, but DSDV performs better than two protocols in as far as throughput is concerned. So, in real time traffic scenario AODV is favoured as compared to DSR and DSDV. Further, the attacker selects only those genuine nodes through more than a threshold number of alternative paths pass through, thereby facilitating the attacker to use less number of nodes. So the attack scheme is power aware. Finally we also propose IDS to detect the proposed energy aware Gray hole attack. NS2 experimental results show the validity of the proposed attack
Question-Answering(QA) is a new research area/ region in the field of Information science which comes into focus in last few decade. The present study is undertaken to survey about the QA system.The study in this paper will provide the guidelines to the researchers, scholars and practitioners of computer engineering. In this paper, the study is undertaken by planning, conducting, evaluating and reporting the literature review from the past years. A Question –Answering system consists of three core components i.e. question classification ,information retrieval and answer extraction module. This paper aims at giving an overview in this field, evaluating the current and emerging status and visualizing the future scope and trends.
Attendance plays a vital role in evaluating a student. The traditional method of taking attendance manually is very time consuming and often leads to human error. Also there are many challenges that are faced while one adopts a manual method of taking attendance such as, difficulty in keeping the attendance list over a long period of time, lecturers forgetting the attendance register in the classroom, students illegally marking the attendance of their friends while the roll number is being called out and many more. This paper elaborates the implementation of Radio Frequency Identification based Student Attendance Management System using Open Source Software in a multi-user environment. This would eradicate the deficiencies associated with the manual attendance system since an automated approach is being adopted
V.Amudha , A.Ashwini , G.KaviBharathi, and P.Ranjitha
Multi-Key Searchable Encryption for Group Sharing Via Cloud Storage
V.Amudha , A.Ashwini , G.KaviBharathi, and P.Ranjitha
In case of sharing the group of documents in cloud storage the document owners uses the encrypted key for secured sharing. For a single owner, the document contains one trapdoor key then the user can download it using the key, but for multiple owners this concept does not works. To overcome this practical problem this paper proposes a solution for KASE in case of federated clouds. This is a practice of interconnecting the cloud computing environment of two or more service providers for the purpose of load balancing traffic.
Enhancement of Slotted Circular Patch Antenna ith Different Substrate
Ayushi Aggarwal , Bindia
This paper presents the design and simulation of broadband microstrip patch antenna using High Frequency Structure Simulator (HFSS).The two different configuration of broadband microstrip patch antenna, rectangular patch antenna & circular patch antenna are analyzed. The performance of designed antennas are analyzed in terms of return loss and gain. The substrate used in these two configurations is RT Duroid having dielectric constant 2.2.The result calculated is return loss of rectangular patch & C slot rectangular patch are -10.768 db& -13.4457db and gain of rectangular patch & C shape patch are 5.6197db& 5.7457db respectively. The calculated result for return loss of circular patch & C slot circular patch are -27.7852 db& -32.4685 db and gain of circular patch & C shape patch are 11.0708 db& 11.1834db respectively.
Digital Image Watermarking Using 3-Level DWT-SVD And Median Filter
Pooja Jain , Ravi Malik
In the 21st century, the use of internet and multimedia applications is growing day by day. The demand of online trade and digital content, in the form of audio, video, text, images is increasing. But the problem arises that the digital data can easily be manipulated and duplicated. This increased the demand of securing the digital data for copyright protection, preventing unauthorized distribution, and ownership verification. Digital image watermarking is a powerful tool to secure digital data. An information called ownership identifier is hide in the original data with a suitable algorithm so as not to affect the quality of the original data. Watermarking techniques mainly aims in maintaining the robustness and imperceptibility of the image. Watermark can be embedded in frequency domain or spatial domain. Frequency domain is the mainly used technique due to its robustness against different types of attacks. Watermark can be extracted using blind and non-blind technique. In this paper, 3-level DWT –SVD of the host image is done by Haar wavelet and the technique is used to embed watermark in the host image. Further a median filter is used to improve PSNR at a low value of alpha. Watermark is extracted using blind technique. The experimental results conclude that the extracted watermark with the proposed algorithm is invisible and quality of watermarked image and recovered image is good.
This paper presents the maximum power point tracking (MPPT) technique for increasing the output voltage of the photovoltaic (PV) system. In order to increase the output voltage of the system, boost converter is connected to the PV system. However, when connecting the boost converter to the PV system the voltage value at the output equal to the input voltage. According to the principle of boost converter, output voltage must be higher than the input voltage. The output voltage depends upon the switching frequency and duty cycle of the converter. As to increase the output voltage of the PV system based on boost converter characteristics. The control strategies can be used based on the combination between the Particle Swarm Optimization (PSO) method and the Proportional Integral (PI) controller that strategies can be extract the maximum power from a PV system. The PI Controller is used to tracking the maximum power from the PV panel, at different atmospheric condition. The Solar PV power generation system is comprised several elements like solar panel, DC-DC converter, MPPT Control Strategies and load.The Simulation result from MATLAB/SIMULINK is presented to verify the performance of the converter.
Review of Techniques Used For Change Detection in Remotely Sensed Images
Ankita khullar, Chetan Marwaha
he propensity towards up to date information about the earth’s surface is ever increasing. The information generated through the satellites is used in wide range of applications such as land monitoring, whether forecasting, resource monitoring and environment monitoring. Legion of techniques are developed to detect change by utilizing the applications of remote sense data and new techniques through research are still emerging. This paper begins by first of all discussing slandered pixel based techniques and statistics based techniques for change detection. This is preceded by describing object oriented techniques. Data mining approaches for change detection is comprehensively described. The relative merits and demerits of each technique is described to determine optimal methodology to be used in future research.
A Review on the Artificial Bee Colony & Clahe Based Hybrid Hough Transform For Efficient Lane Detection
Er. Rajni Multani, Er. Chetan Marwaha
This paper represents that lane coloration has become popular in real time vehicular ad-hoc system. Lane detection is normally helpful to localize path limits, determine undesired lane variations, and to enable approximation of the upcoming geometry of the road. There are different types of methods that are used for detecting lines, curves and ellipses i.e. hough transform, clustering and curve fitting. The overall objective of this paper is to providing better performance in lane coloration algorithm. The methods developed till now are working effectively as well as giving good results. Keywords: Lane Detection, Hough Transform, Clustering, Curve Fitting
Image Contrast Enhancment Using Feed Forward Network
Manish Bhamu, Dr. Sudhir Kumar Rathi
Histogram Equalization (HE) is a popular, simple, fast and effective technique for improving the gray image quality. Contrast enhancement was very popular method but it was not able to preserve the brightness of image. Image Dependent Brightness Preserving Histogram Equalization (IDBPHE) technique improve the contrast as well as preserve the brightness of a gray image. Image features Peak Signal to Noise Ratio (PSNR) and Absolute Mean Brightness Error (AMBE) are the parameters to measure the improvement in a gray image after applying the algorithm. Unsupervised learning algorithm is an important method to extract the features of neural network. We propose an algorithm in which we extract the features of an image by unsupervised learning. After apply unsupervised algorithm on the image the PSNR and AMBE features are improved.
Cloud computing has enabled entirely new business models for high-performance computing. It is a dedicated local highperformance computer is still an option for some, but more are turning to cloud computing resources to fulfil their high-performance computing needs. With cloud computing it is possible to tailor your computing infrastructure to perform best for your particular type of workload by selecting the correct number of machines of each type. This paper presents an efficient algorithm to find the best set of computing resources to allocate to the workload. This research is applicable to users provisioning cloud computing resources and to datacenter owners making purchasing decisions about physical hardware. Studies have shown that cloud computing machines have measurable variability in their performance. Some of the causes of performance variability include small changes in architecture, location within the datacenter, and neighboring applications consuming shared network resources. The proposed algorithm models the uncertainty in the computing resources and the variability in the tasks in a many-task computing environment to find a robust number of machines of each type necessary to process the workload. In addition, reward rate, cost, failure rate, and power consumption can be optimized, as desired, to compute Pareto fronts.
Distributed denial of service attacks (DDoS) are a growing threat to business worldwide. By adopting new purpose built solutions designed specifically to detect and defeat DDoS attacks, businesses can keep their business operation running smoothly. Data mining algorithm is used presents a DDoS attack detection model. Experimental result source that DDoS attacks can be detected efficiently and swiftly.
Wireless networks are computer networks that are not connected by cables of any kind which enables enterprises to avoid the costly process of introducing cables. Ad hoc wireless communication between devices might be loosely defined as a scheme, often referred to as ad hoc networking. MANET is a type of ad hoc network that has the characteristics of mobility and self-configuring in which each mobile node not only act as a host and it also act as a router. Each node operates with the limited battery power to forward the data packets from the source to a group of the nodes. In a MANET, multicast is a very useful communication system for group-oriented applications, where one-to-many propagations are needed frequently in critical situations. This paper presents a new power-aware multicasting algorithm for MANETs. Here, it uses the residual battery energy for the multicasting from the source to a group of destinations. These networks are lack of fixed infrastructure and nodes are typically powered by batteries with a limited energy supply where in each node stops functioning when the battery drains. Multi-casting procedures for routing in MANET become a major concern to support the propagation of data from a sender to all the receivers. Hence the system propose PUMA (Protocol for Unified Multicasting through Announcements) for performing multi-cast routing. It reduces the load on wireless nodes by selecting the route with minimum energy with maximum hop count within the multicast group. Simulation results show that the performance of the proposed protocol is increased than the existing protocol in terms of throughput, delay, PDR and network lifetime.
From last few years, there is an enormous growth in size of digital image collections. Every day, millions of images are being generated, in that semantic Image retrieval is the most complex process in the real time scenario where the similarity finding would be more difficult in case of larger homogeneous image contents. In Semantic based image retrieval, the weight adjustment scheme is used to give the high priority for the contents which are semantically more related. However, the weight adjustment scheme doesn’t care about the user feedback which might reduce the user satisfaction level. In this survey, homogeneous image data is retrieved by the proposed fuzzy logic based feedback weight adjustment scheme which will increase the score of the class which is more preferred by the users.
Android Arduino Interface with Smart Farming System
Ms. G. Rekha M.E , S. Muthu Selvi
The purpose is used to plan and grow an agricultural system based on arduino method. The arduino chip was used in combination with sensors to measure ecological factors namely the temperature, humidity and soil moisture. The data’s are sent to the farmer through message from the cloud based on necessities used by weed detection algorithm. This will be estimated to supportive for farmers in the order of the state.
Energy Aware Compressive Sensing Scheme in Wireless Sensor Network
K.Vaishnu Sankareshwari, R.Saranya, Dr.K.Ramasamy
In wireless sensor network energy consumption plays major role .The main reason for designing a enhanced optimized energy efficient routing protocol is to reduce the scarcity of energy resource .The major intension of this protocol is to improve the data accuracy, packet delivery ratio and to reduce the retransmission delay, energy consumption using energy aware activity scheduling algorithm .The opportunistic routing make use of a scheduler to co-ordinate transmission .The need for a scheduling algorithm to perform multitasking and multiplexing performance .The proposed EOEERP reduces/eliminates such individual node formation and improves the overall network lifetime when compared with the existing protocols .It can be achieved by applying the concepts of energy aware activity scheduling algorithm for buffer node formation and routing respectively
P.S.R.Rengasamy College Of Engg for women, Sivakasi
Ms.S.Chinmaya , Mr. R. Balaji
Research on Screen Content Images (SCIs) has become important as they are used frequently in multi-device communication applications. In this project, a study on perceptual quality assessment of distorted SCIs subjectively and objectively is made. A screen image quality assessment database (SIQAD) consisting of 20 source and 980 distorted SCIs is constructed. A subjective quality scores is for estimating which part (text or picture) contributes more to the overall visual quality. The single stimulus methodology with 11 point numerical scale is used as subjective method. Followed by the subjective quality analysis an objective metric is used to measure the visual quality of distorted SCIs. In object quality analysis a weighting strategy method is used to correlate quality of the two regions (text and pictorial) of SCI and provide quality for the entire image.
Department of Computer Science and Engineering Sri Krishna College of Engineering and Technology Coimbatore, India
Haseena.P.A, R.Dharmalingam
Through these paper we have obtained a new and improved health monitoring system. For robustness, the proposed system is equipped with analysis capabilities. The temperature sensing need that for the patients fever condition. So we have the heart patient is always in under our consideration. The IoT enviornment that is not only a networking but also make a sudden impact that can make attention to the person who have the week health. In these paper introduces the ECG detection through the technique photophlythmography(ppg) the temperature condition of the person using a temperature sensor and the blood pressure detection also.Here the high cost and high weight equipment problem removed by inventing wearable heart monitoring systems with a finger tip analysis.
M.V.Sangameswar, Dr. M.Nagabhushana Rao , M.Shiva Kumar
A Framework for Natural Disaster Management System Using Twitter Data
M.V.Sangameswar, Dr. M.Nagabhushana Rao , M.Shiva Kumar
Over the decades, numerous kinds of knowledge discovering and sharing of the data techniques are playing a major role to reach the information quickly. Among these since last few years, social networks or media and own blogging are playing a major in sharing the personal information, updating the status, tagging the location and many more features. These data are considered to examine and the acceptance for emergency services to respond with the information gathered from the social network. Taking this into the consideration, proposed an algorithm to find out the location of the person based upon the information shared. This is implemented on a most popular social media twitter to identify the tweets.
Qualitative Significant Image Reports in Image Reclamation Structure for Ontology
Sonia Jenifer Rayen , T.GraceWinsolin
The structural design addresses the issues of keyword based image retrieval and content-based image retrieval through the use of qualitative spatial representations over semantic image annotations. Three types of image retrievalSemantic Retrieval based on Global Labels of Images,Semantic Retrieval based on Image concepts, Semantic Retrieval based on Qualitative Relations
Sonia Jenifer Rayen ,Divya M , Farheen Tasneem Z , Nivetha M
Benami Identification Using Mining with Bigdata Analytics
Sonia Jenifer Rayen ,Divya M , Farheen Tasneem Z , Nivetha M
The actual meaning of Benami is without a name. The word “Benami” means buying property in the name of another person. However, when you are making a purchase, you are not purchasing a plot on your name. You are purchasing this plot on the name of close relatives. The property purchased like this will be considered as a Benami property. The holder of the property is known as benamidar. In this paper, we introduce an Uniform Cost Search algorithm for efficient searching of benamidar. The benamidar is a person who has the movable and immovable, tangible, intangible, any right or interest, or legal documents asserts of another person in their name. As such, even gold or financial securities including bank accounts could qualify to be Benami. To identify the benamidar, the details of Aadhar card, the details of PAN card, the details of asserts and details of Bank are filled and stored. The interlink of Aadhar card, PAN card, asserts and Bank account is done. The mining of details is done by generating family tree and by pruning the person is being extracted. Each property is linked with Aadhar card so that on examining the details will help to find the benamidar by the Income Tax Officer.
Sonia Jenifer Rayen,Bharathi P , Renuka V , Saranya R
Revocable-Storage Identity-Based Encryption: Secure Data Sharing In Cloud
Sonia Jenifer Rayen,Bharathi P , Renuka V , Saranya R
Cloud computing provides a simplest way of data sharing, it provides various benefits to the users. But directly outsourcing the shared data to the cloud server will bring security issues as the data may contain valuable information. Hence, it is necessary to place cryptographically enhanced access control on the shared data, named Identity-based encryption to build a practical data sharing system. when some user’s authorization is expired, there should be a mechanism that can remove him/her from the system. Consequently, the revoked user cannot access both the previously and subsequently shared data. Thus, we propose a notion called revocable-storage identity-based encryption (RS-IBE), which introducing the functionalities of user revocation and cipher text update simultaneously.
Shama Kashyap, Pruthvi N, Mohammed Emad, Dr T H Sreenivas
Development of IOT Based Secured Emission Test
Shama Kashyap, Pruthvi N, Mohammed Emad, Dr T H Sreenivas
The IoT based emission test system produces authentic digital emission test certificates. The objective is to overcome some of the disadvantages of the current emission test system where the sensor values are easily altered in the certificates in order to avoid vehicle servicing overhead in case of exceeding the standard emission threshold. Current system of emission test certificate generation requires manually collecting the sensor readings and generating paper-based certificates where veracity of the information on the certificate is not ensured. The proposed technology automatically collects the sensor readings, encrypts the sensor data along with vehicle details and transferring data to the certification authority (CA) for processing over the cloud. The CA is responsible for verifying the authenticity of received data, producing corresponding results and making it available to the authenticated users. This technology induces efficiency, authenticity and integrity by minimizing the manual work.
This paper represents the text segmentation is an important process of image processing and understanding. Basically it is defined as the process of dividing the image into different parts of homogeneity. The aim of text segmentation is to simplify the representation of an image into something that is more meaningful and easier to understand.So the overall objective is to represent the nearest neighbor criteriaon for grouping components in the same line which results in clusters as well as large dataset containing variety of images .The Sobel and Laplacian for enhancing degraded low contrast pixels in it.
A Review on the Performance of Object Detection Algorithm
Rubaljot kaur, Chetan Marwaha
This paper represents multiple Object recognitions technology in the field of computer vision for finding and identifying multiple objects in a image or video sequence.It is basically highlight only those objects which are needed. Algorithmic descriptions of recognition task are implemented on machines which is an complex job. Thus multiple object recognition techniques need to be developed which are less intricate and well-organized The multiple object detection is a very important application of image processing. the literature survey has shown that the most of existing methods have ignored the poor quality images like image with noise or poor intensity . Noise means those signals which are not required .Also the most of the existing work for multiple object detection has neglected the use of hybrid technique. The overall goal of this research work is to propose an efficient and simple multiple object detection using the fuzzy and transition region based image segmentation
This paper proposes transformer-less Unified Power Flow Controller (UPFC) which can be able to control the parameters of the transmission line. It incorporates back to back inverter that requires large transformers for power flow injection. The transformers are somewhat bulky, very costly and introduce high losses due to magnetic properties of the material used for the erection of core. To conquer this difficulty, a totally transformer-less UPFC is proposed in this work. The proposed controller will reduce the cost and space when compared to the traditional UPFC. A multilevel configuration technique will be used to decrease the total harmonic content. The proposed configuration requires a separate dc source for every level. To reduce the switch count and to eliminate separate dc sources, this multilevel configuration can be further modified. This paper focuses on the performance of transformer-less UPFC involving Fundamental Frequency Modulation (FFM) for reducing the Total Harmonic Distortion (THD) and increasing the efficiency. The proposed UPFC is simulated as a result of using MATLAB Simulink.
An ultrasonic sensor HC-SR04 uses ultrasonic waves to detect various objects. The operation of this ultrasonic sensor is not obstructed by sunlight or black material, so regardless of the lighting conditions it is able to work properly. This property makes it useful in number of applications. This sensor is used to make an Obstacle Sensing Robot (OSR) which when detects the presence of an object while working, is able to avoid collision with that object and change its path automatically. Various complimenting materials have been used to make the robot communicate with all its parts or components and to make it run. Further, after successful completion of obstacle sensing robot, a Maze Solving Robot (MSR) with the same hardware was implemented. It is capable to solve mazes and come out of mazes on its own without any external help.
Optimisation of Damping in Short Fiber Reinforced Aligned Composites: A Review of literature using Micromechanical Analysis
Manish Pandey* , Dr. Sanjay Shukla
Vibration damping is becoming increasingly important for improved vibration and noise control, dynamic stability, and fatigue & impact resistance in advanced engineering systems. Specially, there is a strong need for information on methods for improvement of damping in lightweight structural composite materials so that they may be more effectively used in the design of high performance structures and machines. Polymer composites are good candidates in the development of damped structural materials because of their low specific weight and excellent stiffness & damping characteristics. A review is presented on fiber composite materials optimising damping properties and aspect ratios along with experimentally attainable at the micromechanical level.
Security Based Deduplication with Efficient and Reliable Data Storage
J.Sreejith, A. Jeno Kalaiselvi Sathya
Data is a set of values of quantitative variable information. Data deduplication means that the data compression technique for eliminating duplicate copies of repeating data. In the deduplication process, unique types of data, or byte patterns or images, which are identified and stored during a process of analysis Data deduplication is increasingly accepted as a technique to reduce storage costs. In cloud computing system the data deduplication acts as a special role. The Cloud computing is a type of Internet-based computing, that provides shared computer processing that means data to computers and other devices on demand. The example of cloud services are computer networks, servers, storage, applications and in these most commonly using cloud service is data storage. The data are often stored in cloud in an encrypted form. One application of cryptographic splitting is to provide security for cloud computing. However encrypted data introduce new problems arise in cloud data deduplication, which is big data storage and processing. Existing system suffer from security weakness. They cannot flexibly support data access control and revocation. The cloud-based storage example such as Drop box, Google Drive, and Mozy can save on storage costs via deduplication. We make a data will be secure using a user key before he store in to the cloud. But common encryption modes are randomized. People upload personal or confidential data to the data center of a Cloud Service Provider (CSP) but it is do not give fully secure for the data because the data holders may not be always online or available for such a management, which could cause storage delay. And also create the Dekey is secure in terms of the definitions specified in the proposed security model.
Adaptive Acknowledgement Techniques to Improving Security for MANETs Using MRA Scheme
C.Muthupriya, G.Sivakumar Dr.K.Ramasamy
The favour of wireless networks over wired networks has been increasing for the past few decades. The flexibility and accountability brought by wireless networks makes it preferable for several applications. In this midst all the present-day wireless networks, Mobile Ad hoc network (MANET) is among the most important types having distinctive applications.Each node in the Manet has a wireless interface to Communion with each other. In the Propone system adaptive acknowledgement approach (AACK) Digital signature algorithm is used which increases causes the network overhead if more malicious node involved. Thus system is used with Rijndael algorithms as a session key cryptography to reduce the network overhead caused by digital signatures in AACK. It scope of hybrid encryption is combination of Rijndael algorithm and RSA for the acknowledgement packets
In the time of extreme proclivity of users towards internet and its services, it is almost implied to worry for the concerned security of highly confidential information. So, are the available safety trends and the continuous endeavor in this domain towards unfolding new techniques with enhanced features suggest pioneering concerns of the associated parties for preserving the integrity of underlying system(s). Having gone through some of the works available, we can easily gaze at the much talked issues in the field of network business (specifically communication) demanding the robust cryptosystems with adjusting feature(s) to safeguard the interest(s) of communicating parties. It is immaterial to talk about cryptosystems without touching the edges of famous algorithm i.e., R.S.A. algorithm. We, here, attempt to mention a few of the developing techniques that have/are gathering attention from masses associated with this field.
This paper aims to design and develop a new efficient toll collection system using QR Codes which will be a low cost alternative among all other systems. The system is based on Computer Vision vehicle detection using OpenCV library Java platform. In this system, a camera captures images of vehicles passing through toll booth thus a vehicle is detected through camera. On the other hand user generates a QR code for his vehicle and paste it on the windscreen of his vehicle. Depending on the area occupied by the vehicle, classification of vehicle is done as light and
Evaluation of Software Testing Techniques Using Artificial Neural Network
V. Sathyavathy
Software Industry plays a vital role in the current environment, it is very essential to minimize the fault in the existing software products. In SDLC life cycle, software testing becomes very much important which finds faults in the software that increases the efficiency of software. Most of the cost is occupied by the software testing process, it is product very essential to implement the automation technique that reduces the cost that increases the software reliability. In the automated testing process, various intelligent methods are used in order to avoid the manual process. Automation testing tools can be implemented to increase the quality of the software.
Load Balancing of Intermediate Nodes to Extend Network Lifetime
Tanuj Kumar Mishra and Raj Kumar Paul
Wireless sensor network is energy constraint network. The lifetime of a network is defined by the life of first specified percentage of dying nodes. Load balancing is a method to equalize energy consumption of all nodes and this way all nodes will degrade together. By load balancing, the lifetime of the network does not depend only on the life of weak node but depends on the life all nodes in the network which helps to increase the life of the network. In this paper, a distributed multi-hop routing algorithm for Load Balancing of Intermediate Nodes (LBIN) has been proposed to extend network lifetime. The objective of the proposed protocol is choose forwarded node in such a way, so they deplete their energy at approximately the same time, which is achieved by addressing the load balance problem at the node levels. At the node level, a predefined threshold is used to select the best node to balance the load in the selected subregion. This approach is shown to be an effective solution for load balancing and extending network lifetime in large multi-hop networks. This paper shows that the use of LBIN offers significant improvement over existing protocols in extending network lifetime.
This paper presents a speed control of a separately excited DC motor by using PI (Proportional Integral). The speed of the separately excited DC motor can be varied below and above the rated speed by various speed control techniques. It can be varied above the rated speed by field flux control and below the rated speed by armature terminal voltage control. The conventional controllers are commonly being used to control the speed of the DC motors in various industrial applications. It’s found to be simple, robust and highly effective, when the load disturbance is small. Here, we using chopper as a converter the speed of DC motor is controllable. The chopper firing circuit gets signal from controller and then by supplying variable voltage to the armature of the motor then to obtain the desired speed of the motor. There are two different types of control loops, current controller and speed controller. The controller used is ProportionalIntegral type. The current and speed controller loop is designed and in order to get stable and high speed control of DC motor. The simulation of the above model is done in MATLAB/SIMULING under varying speed and torque condition.
B.V. Rama Krishna, B. Basaveswar Rao K.Gangadhar Rao ,K.Chandan
Restricted Legal Dictionary generation for Legal Domain Specific Mining
B.V. Rama Krishna, B. Basaveswar Rao K.Gangadhar Rao ,K.Chandan
The Indian legal domain maintains largest heterogeneous multi domain based text corpora. In order to document specific search domain specific dictionaries are widely acceptable compared to whole legal dictionary. Many domain specific dictionary extractions proposed by various authors for business and scientific domains. In this paper we proposed a two stage domain specific dictionary for legal domain. The approach helps to construct Restricted Legal Dictionary which is domain specific in nature. The dictionary constructed supports text mining mechanisms over specific crime (dowry) based legal documents and improves the BoW construction with higher domain specific terminology. The Restricted Legal Dictionary constructed in this paper improves the efficiency of similarity measures during document comparison techniques
Detection of Traffic Sign using Feature Based Method
Shweta Thakre, Prof.N.P.Bhosale
Driver assistance system (DAS) is an essential component in providing the drivers with safety measures and precaution information in traffic sign recognition (TSR). In this system we propose a novel system for the automatic detection and recognition of traffic sign. As an application of intelligent transportation system (ITS) a method is used to detect and to recognize the information contained in the traffic panels in street level images. The detection and recognition of text and symbol is applied on those images where a traffic panel has been detected, in order to automatically read the text and symbol and through the speaker the data will be announced.in this system we have used a feature based method for traffic sign detection. The images of the traffic sign board are cropped and it is matched with the original image, it will identify the key points in both the images and match between those points to find the similarity. The SURF descriptor is used for key point and matching points.
The design of secure authentication protocols is quite difficult, considering that varied types of root kits reside in PC’s (Personal Computers) to look at user’s behavior and to create PCs un-trusted devices. Involving human in authentication protocols, whereas promising, isn’t straightforward because of their restricted capability of computation and acquisition. Therefore, wishing on users to reinforce security necessarily degrades the usability. On the opposite hand, quiet assumptions and rigorous security style to enhance the user expertise will cause security breaches that may harm the users trust. In this paper, we tend to demonstrate however careful visualization style will enhance not solely the safety however conjointly the usability of authentication. thereto finish, we tend to propose two visual authentication protocols: one may be a one-time-password protocol, and therefore the alternative may be a password-based authentication protocol. Through rigorous analysis, we tend to verify that our protocols area unit proof against several of the difficult authentication attacks applicable within the literature. what is more, mistreatment an in depth case study on a epitome of our protocols, we tend to highlight the potential of our approach for real-world deployment: we tend to were able to win a high level of usability whereas satisfying rigorous security necessities.
K-means Clustering is the most popular unsupervised mining technique. The paper explores the standard k-means clustering algorithm and its limitations. Fixing the number of clusters in advance limits the effectiveness of the algorithm. Moreover calculating the distance between each information item and cluster centers, in every single step causes the time complexity of the algorithm to increase. This paper exhibits an improved K-Means algorithm which pre-calculates the optimal number of clusters, dynamically using Dunn’s index and achieves high efficiency in terms of execution time, executes the algorithm in a parallel manner using the capabilities of Microsoft’s Task Parallel Libraries. Exploratory and comparative results demonstrate that the improved method can effectively enhance the pace of clustering and accuracy when applied on two dimensional raw data consisting of different numbers of records.
G. Vidhya Krishnan , R.Nagarajan , T. Durka3 , M.Kalaiselvi , M.Pushpa , S. Shanmuga priya
Vehicle Communication System Using Li-Fi Technology
G. Vidhya Krishnan , R.Nagarajan , T. Durka3 , M.Kalaiselvi , M.Pushpa , S. Shanmuga priya
In this paper, presents the designs of a small-scale prototype of a vehicle to vehicle communication system using light fidelity (Li-Fi) technology. The new technology that was developed in the last few years, which still needs more investigations on its sustainability for outdoor vehicular networks. The vehicle to vehicle communication is the most effective solution that has been used in order to reduce vehicles’ accidents. The proposed use of Li-Fi technology comprises mainly light-emitting diode (LED) bulbs as means of connectivity by sending data through light spectrum as an optical wireless medium for signal propagation. In fact, the usage of LED eliminates the need of complex wireless networks and protocols. In this work, several case studies are, presents to mimicking the vehicle to vehicle communication. The numerical simulations are done by using proteous package and the experimental results are also presented. The proposed system gives better results in both simulation and hardware
Motif Placement on Garment Pattern: Comparison and Development of a CAD Tool
Shalini Singh , Rajeev Singh
Clothing is not only used to cover the body but is also a part and parcel of decoration as it includes painting, dyeing, printing and embroidery. Embroidery is one of the oldest forms of surface ornamentation of fabrics and garments. Embroidery is like ornamentation which gives elegance and grace to a piece of clothing. It is an art of beautiful drawing, harmonious color and elaborate needle skill. The embroideries in India are many and varied. The word ‘motif designing’ refers to the total composition of lines, forms, colours, shapes and textures in a decorative manner. Technological advancements have brought computer aided designing system in all the areas including textile and garment industry. Five motif designs suitable for clothes such as 'salwar' , 'dupatta', and skirt are developed in 2D and 3D software and by using C ++ programming. The integration of motif with clothes are presented by combining preferred motifs of different categories on the basis of visualization of designs suitable for cloth
As of recent trends, this is a persistent challenge of integration of cloud computing, data mining and big data mining processes. This paper reveals most recent progress on Hadoop and MapReduce applications. Hadoop and MapReduce can be used for analyzing enormous amount of data. Hadoop is an open source software project used to processing a large data sets. MapReduce is a programming model that associated implementation for parallel processing of large dataset. Big data environment is used to acquire, organize and analyze the various types of data. There is an observation about MapReduce framework. This framework generates large amount of intermediate data.
Nowadays, MR images are very important for automatic defects detection in many diagnostic and therapeutic applications. This available work categorized the brain tissues as normal or abnormal automatically, using computer vision. This paper introduces novel approach of strong automatic diagnostic system using Gabor Wavelets and to find accuracy of tumor diagnosis in brain. Here we are tried to give clear justification from brain tissues using Gabor wavelets, entropy, contrast, energy and statistic features (such as mean, median etc.).
Multimodal Biometric In Human Identification Of Finger Vein Patterns Using Score Level And GSA
R. Mahalakshmi*, Mr.R. Purushothaman,ME,
Biometric and multi biometric science play an important role in human authentication systems. Among many types of biometric model finger vein pattern is one of the most reliable and secure biometrics due to its invariability and safety from stealth. Since there are so much of algorithms carried out in our existing system, SVM (support vector machine) used for human authentication which has the ability to achieve maximal computational efficiency, fast spatiotemporal and has the ability to classify human motion patterns. However there are so many algorithms carried out for identification fingerprint faces some disadvantages such as sensibility to noise and spoof attack, here SVM requires large amount of training data to identify. To overcome this, thus proposing a system using heuristic method and gravitational search algorithm had advantages of solving non differentiable and multimodal problems effectively, requires less computation. The Gravitational Search Algorithm is based on Newton’s law of GRAVITY and MOTION .The performance is evaluated using FAR, FRR, EER.
Emergency scenarios are very common in healthcare domain. These situations are very unpredictable and difficult to estimate the loss and amount of injuries or diseases that could occur. Hence it is impossible for the automated systems to detect these emergency situations and cannot provide the new information’s. In case of elderly persons and patients who reside at home, need to check their healthcare record periodically using the systems. At times this becomes time consuming and inefficient to use and it could also happen that the person may forget to record or monitor the values periodically. Another scenario to be considered is when the patient is alone and not able to communicate the emergency situation to the family members and doctors. Hence to help and identify this situation we propose a flexible access control framework using Complex Event Processing (CEP) technology. When an emergency is detected the temporary access control policies (tacps) will be activated. These control policies will override the regular policies in emergency cases.
This paper provides a low cost-effective and flexible home control and monitoring system with the aid of an integrated micro-web server with internet protocol (IP) connectivity for access and to control of equipment and devices remotely using Android-based smartphone app. The proposed system does not require a dedicated server PC with respect to similar systems and offers a new communication protocol for monitoring and controlling the home environment with more than just switching functionality. Smart home interfaces and device definitions to ensure interoperability between Wi-fi devices from various manufacturers of electrical equipment, meters and smart energy enables products to allow manufactured. In this project gives the intelligent operation for lamps and fans. Here the system is connected with temperature control and lamp control. Light dependent resistor (LDR) and Temperature sensor (LM35) are the main components for this automatic control of lamps and fans. Here the LDR is responsible for lamp control and LM35 is responsible for controlling the operation of fan. The proposed home energy control systems design intelligent services for users and provides, The proposed system are implemented with smartphone.
Fraud Resilient Device Offline Micro-Payments using Bit-Exchange Algorithms
R.Bargavi, Dr. L.Jaba Sheela
Credit and debit card data theft is one of the earliest forms of cybercrime. It is one of the most common problems now days. Attackers often aim at stealing such customer data by targeting the Point of Sale system, i.e. the point at which a retailer first acquires customer data. Modern Point of Sale systems are powerful computers equipped with a card reader and running specialized software. Increasingly often, user devices are leveraged as input to the Point of Sale. In these scenarios, malware that can steal card data as soon as they are read by the device has flourished. As such, in cases where customer and vendor are persistently or intermittently disconnected from the network, no secure on-line payment is possible. A secure online micro-payment solution that is resilient to Point of Sale data breaches. Our solution improves over up to date approaches in terms of flexibility and security. To the best of our knowledge, FRODO is the first solution that can provide secure fully on line payments while being resilient to all currently known POS breaches. In particular we detail FRODO architecture, components, and protocols. Further, a thorough analysis of FRODO functional and security properties is provided, showing its effectiveness and strong.
The rapid growth in infrastructure and industrial plants creating environmental issues like climate change, malfunctioning and pollution. The project shows the estimated values of environmental parameters by using the adaptable and smart monitoring systems. The solution includes the technology Internet of Things (IoT).The existing model describes the original value of the environmental parameters with the help of the sensor networks. The proposed model comprises of lcd displays or alarms which displays the exceeded value of the environmental parameters .The implementation is tested for CO2,noise,temperature,humidity,acid rain detection in rain
Cognitive Weighted Polymorphism Factor: Empirical and Theoretical Validations
T. Francis Thamburaj , A. Aloysius
Software complexity metrics are valuable and widely accepted tools to produce high quality software. The quality of the software metrics depends on various validations to prove it as valid, robust, realistic, accurate, and comprehensive metric. So, validations are important while proposing a new complexity metric. The Cognitive Weighted Polymorphism Factor complexity metric, already proposed by the author, is validated empirically as well as theoretically to prove its worth. Case studies are conducted to prove the applicability of the metric in all situations. To show the theoretical soundness of the metric, validations are done against Weyuker’s nine properties and Abreu’s seven criteria. The empirical validation is done to corroborate the theoretical validations. To show the better accuracy of the metric, the comparative study is done. Finally, the statistical validity is displayed with the performance of correlation analysis. All the validations proved that the Cognitive Weighted Polymorphism Factor complexity metric is truly a valid, more robust, more realistic, more accurate and more comprehensive in nature.
An Improved Run Length Encoding Scheme for Image Compression
Ch.Samson , VUK Sastry
In this paper, we propose an Improved Run-Length Encoding (IRLE) scheme for image compression. Conventional RunLength Encoding is a widely used scheme as it is simple and effective but not suitable to represent non-block images. The IRLE which we have developed, combines runs and run values and it reduces the space required to store the image significantly. The compression ratio depends on the size and type of the input message. From the results obtained in this analysis, we conclude that the proposed approach is an efficient method for image compression and it provides high compression ratio and better compression percentage.
Automatic Detection of Tuberculosis in Chest Radiography Using Fuzzy Classifier
R.Krithika*, Mrs.K.Alice., ME,(Ph.D)
Tuberculosis is one of the major health concerns which an infectious disease is caused by the bacterium Mycobacterium tuberculosis (MTB). Tuberculosis generally affects the lungs, but can also affect other parts of the body. Most infections do not have symptoms, known as latent tuberculosis. In 2014, there were 9.6 million cases of active TB which resulted in 1.5 million deaths. More than 95% of deaths occurred in developing countries. Automatic systems to detect TB on chest radiographs (CXRs) can improve the efficiency of diagnostic algorithms for pulmonary TB.A computer aided detection (CAD) system was developed which combines several sub scores of supervised subsystems detecting textural, shape, and focal abnormalities into one TB score. A typical thin curvilinear shape of fissure profiles inside 2D cross-sections, the dos filter is presented by first defining nonlinear derivatives along a triple stick kernel in varying directions. To accommodate pathological abnormality and orientation deviation, a max-min cascading and multiple plane integration scheme is adopted to form a shape-tuned likelihood for 3D surface patches discrimination. Our main contribution is to isolate the fissure patches from adhering clutters by introducing a branchpoint removal algorithm, and a multi-threshold merging framework is employed to compensate for local intensity inhomogeneity
T. Grace Winsolin , R.Kowsalya , M. Santhakumari, S. Sowndarya
Improving Rating Predection Accuracy by Exploring Social User Sentiments
T. Grace Winsolin , R.Kowsalya , M. Santhakumari, S. Sowndarya
Now a day the boom of social media is very popular to share their viewpoints to their friends is very easy by various social networking platforms. In this paper, we face information overloading problem. We mine the information from reviews what the user understood. Then user’s preferences and an accurate recommendation is done. It consists of some important factors purchasing records by the user, category of product and their location. We propose a sentiment based rating prediction. It improves the prediction accuracy in the recommender systems. At the first we propose a social user measurement approach sentimentally and then it calculates each user’s sentiments based on the products. At the second it not only views a user’s own sentiment attribute will consider the interpersonal sentiment influence. Then, it also considers product reputation sentimental distribution of a user can infer it reflects customer’s evaluation. Here we combine all the three factors where user sentiment that is similar, interpersonal sentimental influence and reputation of items it considers all into the recommender system and make accuracy in rating prediction. It makes compulsory for the user to pose their viewpoints as reviews before buying another product to know the quality of the product. It also considers the performance evaluation for all the three factors in the real word. As the result, it helps to improve the recommendation performance.
The past decade saw machine-to-people connections via Internet and people-to- people connections via social networks capturing the world, catapulting it into an era of accessibility and connectivity. Today, the concept has been cranked up into the Internet of ‗Everything‘ that leverages this accessibility and connectivity to efficient and productive use like the smart cities, smart governments and policing, smart grids, smart Transportation and so on. So, the availability of hyper-connectivity sets the stage for building utility and enterprise services around it, which otherwise stay unharnessed. These people-to-machine, people-to-people, machine-to-people and machine-to-machine connections that engage people, processes, data and machines in a bidirectional flow of information results in enormous amount of data which needs to be stored, processed and accessed. Such use cases require convergence of machine-to-machine connectivity, event stream processing, Big Data, analytics, Cloud, and mobile technologies. This paper highlights the introduction, standards, bodies and challenges of IoT
Ear Recognition by Feature Extraction Using Force Field Transformation
K. Mohanapriya, Mr.M.Babu,Me ,(Ph.D)
Biometrics is the study of automatic techniques for recognizing human beings based on physical or behavioral traits. Among several biometric features, ear is quite stable because it does not vary with age and emotion. It is an important means to guarantee the quality of teaching by the standard and the optimization of the teaching process. Large amounts of data which generated in the process of teaching such as attendance, class performance, homework and testing results and so on are used to process manually. At the same time, there is quite randomness. And it is difficult to accurately reflect the teachers' working condition. This study explores the use of an Ear Visual Biometric as a measure of identification unit for the Teaching Management System in Universities and Colleges. It is significantly reduces the workload of teachers' teaching process and improved the credibility and controllability of data by the data acquisition equipment and the whole system. Ear detection and recognition is achieved through the use of Feature Extraction approaches like Force Field Transformation and Chord Point Detection Algorithm is used for better performance than the method to other algorithm.
Review Paper on Wireless Power Transmission for Charging Mobile Devices
Suprabhat Das
Wireless charging is an emerging technology. It transmits power through an air gap to various electrical devices mainly mobile devices for energy replenishment. Basically, the attempt is to make the charging process easy and user-friendly by removing physical cable connection between the mobile phone and the cable. There has been growing need in wireless field as it has enormous benefits like the user don’t have to carry mobile charger with him/her, no need to keep mobile devices near to charging socket as wires have shorter length. The mobile operators have been working to develop methodologies to reduce power consumption in the mobile devices but unfortunately, the reductions were not enough. The early adopters of wireless power are Verizon, AT&T, NTTDocomo, Softbank and KDDI. The purpose of this paper is to present brief idea on wireless power transmission as well as to present its future research scope.
Landslides have always been one of the most catastrophic natural phenomena. Continuous monitoring and warning as early as possible about the beginning of such disaster may lead to avoid of losses of human lives. With this aim we have developed a monitoring system structured as WSN equipped with very sensitive sensors capable of measuring real time direction and magnitude of the landslide displacement. The sensors are placed in order to measure the accurate value about the parameter of the landslide. Here GPS is used in order to determine the location of the landslide occurrence. The movements are observed and the collected data sets are automatically transmitted to a connected system and the FLUX SENSOR which is used in this paper provides a real time information about the current state of the monitored slope. More such sensors are mounted on a certain area more in advance for a landslide prone and connected in a network able to wirelessly communicate and transmit online data to a monitoring centre. Details related to network construction as well as the involved protocols are provided in the paper.
Libin M George , Annu Mariam Abraham , Ananthapadmanabhan J , Vineetha Anna Saji , Anil A R
Implementation of IoT In Smart Robotics: A Survey
Libin M George , Annu Mariam Abraham , Ananthapadmanabhan J , Vineetha Anna Saji , Anil A R
Here in this paper we develop a smart Robotic Assistant (RA) that will help human being a lot in multiple ways. The area used is Internet of Things (IoT). The RA can be accessed remotely using human voice commands and gestures. The RA is provided with mechanical arms to pick an object and place it in another location. An Arduino microcontroller based platform is used to develop this smart RA. The RA is controlled with the help of an android platform based IoT device like smart phones etc. The gestures and voice commands are processed using cloud server. The working of RA is as follows the gestures and human voice commands are converted to text form and are then communicated over a Wi-Fi network. The RA is capable of performing different operations like start/stop, move left/right, forward/backward, picking up object and placing it in another location. These peculiarities are really helpful for humans especially for elderly people.
A Comparative Study of SVM Kernel Functions Based on Polynomial
D.Shanthini , M.Shanthi , Dr.M.C.Bhuvaneswari
This paper presents a comparative study between Polynomial and V-transform coefficients for the fault classification in analog filter circuit using different kernel functions of Support Vector Machines (SVM). V-transform is a non-linear transformation which increases the sensitivity of polynomial coefficients with respect to circuit component’s variation by three to five times. It makes the original polynomial coefficients monotonic. Support Vector Machine is used for fault classification in polynomial and V-transform coefficients. The classification accuracy in both Polynomial and V-transform coefficients are increased by varying the kernel parameters c and epsilon associated with the use of SVM algorithm for the different kernel functions. The SVM’s are estimated in comparisons with the varied kernel functions by applying to the two feature sets. It is shown that the Pearson VII kernel function (PUK) provides good classification accuracy for the two feature sets compared to the other kernel functions such as Polynomial kernel function (POLY kernel) and the Radial Basis Function (RBF) kernel functions
Ms. Neha Malviya , Dr Naveen Choudhary, Ms. Kalpana Jain
Review on Content Based Medical Image Retrieval System and Techniques
Ms. Neha Malviya , Dr Naveen Choudhary, Ms. Kalpana Jain
The rapid expansion and improvement in medical science and technology which generates the amount of image data more and more in its regular activity such as CT-image, X-ray, MRI etc. Due to scalability of image data, it has been increased in size of database and containing millions of images. For the proper management of medical image and requirement of efficient retrieval system for clinical decision making and research activities, It emerges Content based medical image retrieval system for quick diagnosis of medical images. The review of CBMIR system has been analyzed the overview of currently available techniques useful for medical domain.
During these days, till now there is no classifier used for classification of Punjabi documents. Here we have some Punjabi news article facts, which we have necessity to examine with the use of algorithms. Punjabi is an Indo Aryan language spoken in west Punjab (Pakistan) and East Punjab (India). So just a little work has been done in Text Classification for Punjabi language. In this work, assigns to the centroid technique for text News classification to construct structure for Punjabi Language. Huge News is accustoming for training and testing persistence of the classifiers. Language detailed pre-processing technique are beneficial for raw data to originate an identical or reduced-feature lexicon. Punjabi language is a morphological amusing language which makes those responsibilities complicated and hard to do. Statistical physical characteristics of bulk and lexicon are dignified which demonstrate satisfactory and appropriate results and consequences of text pre-processing of each distinct portion. We are residue able to get satisfactory and sufficient out comes or exertion using centroid Classifier. This research paper to reveal the centroid text News classification system to fix firmly for Punjabi Language. News quantity is accustomed for training and analysis purpose of the classifiers. Punjabi language is morphological rich language which originates those jobs and trustworthy complex. Statistical features of body and lexicon are measured which show acceptable results of text pre-processing section. We are able to get appropriate/competent out comes using centroid Classifier Algorithm
Automatic Rule Detection and POS Tagging of Punjabi Text
Er.Davinder Kaur , Er.Ubeeka Jain
Natural language is a study that involves the communication between humans and computers. There are number of tasks that can be performed by using NLP like speech recognition, information extraction, segmentation, language translation, grammer checking etc.. Punjabi language is mostly spoken by the people living in Punjab and Pakistan. NLP is considered as a hard problem in computer science due to the ambiguity of the languages .POS tagging involves process for disambiguating the part-of-speech information for such ambiguous words by taking into consideration the context information. In this paper we study this problem and generate “ automatic rule detection and pos tagging of Punjabi text” by using rule based approach. The chances of error are less and work is more efficient and accurate.
Dr. Diana moses , Annu , Monika chowdhary, Obaid Ur Rehman Khan
Empboard
Dr. Diana moses , Annu , Monika chowdhary, Obaid Ur Rehman Khan
EMPBOARD is the process of employee recruitment in an efficient way so as to make it a steamroll for the employee, reduce risk and provide maximum benefits by e-provisioning. An employee’s paperwork is not sufficient to meet today’s requirement. EMPBOARD offers employees a comprehensive benefits package. EMPBOARD allows in pleasing all the requirements and make the enterprise run efficiently. With the concept of e-Provisioning coming in, the agencies undertake or build gear to begin the method while a brand new worker is employed. Worker becoming a member of the company is a big occasion now not only for a worker who is joining however similarly for the HR and the associated features that have the duty to ensure the worker isn't sitting idle due to loss of sources. The procedure is supported via the get admission to a management application that automates maximum of the work, saving time and not requiring the intervention of community directors or mainframe operators.
A Self-Healing Network is one, which is used to focus on how to reduce the complexity and cost of the management of dependability policies and mechanisms without human intervention. It also has to monitor the Network Traffic to predict the abnormal traffic patterns. The main objectives of this Self-Healing Network is to spot the problems before they occur, to know immediately when problems arise, to share available data with stakeholders, to detect the security breaches i.e., this network aims at ensuring that the service will continue to work regardless of defects that might occur in the network. One of the problems is chosen to solve as an initial work. When users are accessing any service from the server, the server may unexpectedly close the connection, thus sending an empty response. The tool designed tries to rectify this problem without the knowledge of the user and thus avoids manual fixing of this fault. Nowadays , Internetwork outer surfaces the some of the challenges and tasks based upon the utilization and incremental growth of the users. Prerequisites involved in the network are multipath, multi-home, mobility etc. Here we discussed the techniques which increases the employability of user data transmission through the multipath. Although the several techniques involved, in this paper we target the tunnelling strategy based upon the scalability, performance and time consumption is regarded.
Multilevel Security Models in Real-Time Database Systems: Comparing and Analyzing
Ebrahim Abduljalil, Dr.S.B.Thorat
Recently, security of real-time systems becomes a very important concern in real-time database systems (RTDBS). However, security is becoming a more significant challenge in several real-time applications. Nowadays, there are many multilevel security (MLS) models which can make RTDBS more secure. Three information security models based on multilevel security policy have been discussed, analyzed and compared in this paper. Moreover, this paper concludes that BLP model focuses only on the confidentiality of information and ignores the integrity. On the other hand, Biba and Clark-Wilson models protect the integrity only.
Shaicy P Shaji, Leo Pius, Maritta Simon P, Tressa Francis,Vishnu Babu K, Vineeth Francis
Virtual Keyboard
Shaicy P Shaji, Leo Pius, Maritta Simon P, Tressa Francis,Vishnu Babu K, Vineeth Francis
This paper presents a virtual keyboard technology based on ultrasonic sound technique. Virtual Keyboard can be defined as touch typing device which enhances and enables the communications through virtual interface technology. It doesn’t have a physical appearance like conventional keyboard. Instead it uses a laser projection module to display the layout of keyboard. It is actually a key-in device, which can be implemented in space saving situations and as well as in hostile environments as the utilization of conventional keyboard is limited there. When system is powered ultrasonic sensor continuously emits signals, which then used to identifying the characters. The corresponding character will then displayed using arduino and Bluetooth module.
Cluster Based Data Mining Technique for Identification of User Behavior
J.Kumaran Kumar, E.Karunakaran , K.M.Sabarivelan
A frameworks for identifying patterns and regularities in the pseudo anonymized Call Data Records (CDR) pertaining a generic subscriber of a mobile operator. We face the challenging task of automatically deriving meaningful information from the available data, by using an unsupervised procedure of cluster analysis and without including in the model any a priori knowledge on the applicative context. Clusters mining results are employed for understanding users' habits and to draw their characterizing profiles. A novel system for clusters and knowledge discovery called LD-ABCD, capable of retrieving clusters and, at the same time, to automatically discover for each returned cluster the most appropriate dissimilarity measure (local metric).The PROCLUS, the well know sub clustering algorithm which is used to identify the sub spaces. The data set under analysis contains records characterized only by few features and consequently to show how to generate additional fields which describe implicit information hidden in data. Also proposed an algorithm over these two techniques for searching common patterns and regularities in order to group together users characterized by a similar profile.