Evaluating effectiveness of BIM application in Construction Projects
S. M. Dodia, S. Hariharan
The purpose of this paper is to evaluate the effectiveness of Building Information Modeling (BIM) as method of quantity estimation versus conventional methods. A case study of a residential tower situated in Mumbai is taken into consideration for the comparative analysis. The methodology to be used consists of three stages; model creation, scheduling, and cost estimation with the help of BIM tool. The difference will be then compared between conventional method of estimation and BIM based one with regard to time, accuracy, ease in access and future scope. It is to be noted that BIM has gained popularity in recent times and is also mandated in international projects. The results of the analysis shall be useful in understanding the effectiveness of the tool and to explore innovative means of application of BIM in projects.
The power generated from solar panels cannot be directly used in many applications. One of the key reasons is that the sun is not stationary as it keeps moving from east to west. The solar panels are able to receive peak sun light only for a short time period of day when the sun is directly facing the solar panels. During rest of the day, they get only partial sun light. For this purpose “SUN TRACKER WITH POSITION DISPLAY” is one of the optimal way that allows the solar panel to track the sun’s position, ensuring maximum power generation. Such systems are based on a solar collector, designed to collect the sun's energy and to convert it into either electrical power or thermal energy. The literature contains many studies regarding the use of solar collectors to implement such applications as light fixtures, window covering systems.
Secure M-commerce Business over Global System For mobile communications (GSM)
Amanze Bethran Chibuike
Global system for mobile communication has changed the face of communication and information exchange, much as the internet did with the advances made in the mobile technology arena, new opportunities are created. Mobile communication (m-commerce) is one such opportunity. Each new advance in technology brings with its associated risks. This paper focuses on the risks involved with m-commerce for the business industry. This paper provides a detailed overview of basic service that any m-commerce application should provide to the business industry. These principles provide the foundation for securing any financial transaction over untrusted Networks. The security of GSM networks has come under attack in the past. This is largely due to the fact that the GSM consortium opted to develop their security technologies in secret, rather than in public domain. This paper aims to evaluate the security offered by GSM and access potential attacks in order to further understand risks associated with m-commerce business over GSM. Keywords m-commerce, GSM, E-commerce, customer, receive order, invoice, shopping goods.
An Improved Energy Efficient Scheme for Scheduling Mobile Sensors in a Hybrid Wireless Sensor Networks with Obstacle Avoidance
Diana P Varghese, Vinodh P Vijayan
Advancement of robotic technologies as well as wireless communication led to the development of hybrid sensors which consist of static sensors and mobile sensors. Static sensors are the traditional sensors used for sensing physical and environmental characteristics while mobile sensors have powerful sensing capabilities so that it can move anywhere at any time. Each static and mobile sensors can analyze multiple attributes of events. However, such a high mobility may cause scheduling problems. The critical issue is the dispatching of multi attribute mobile sensors to the multi attribute event location appearing in sensing field while considering obstacles and also balance the energy consumption and increase the lifetime of wireless sensor network. Here an improved MAM sensor dispatching algorithm is proposed for developing an energy efficient solution.
Adulsalam Abdulla, Ako Abubakr, Mazen Ismaeel, Hoger Mahmud
E-Payment: Prospects, Challenges and Solutions in KRG Public Sector
Adulsalam Abdulla, Ako Abubakr, Mazen Ismaeel, Hoger Mahmud
In this paper we propose a design solution to address the challenges of e-Payment in Kurdistan Regional Government’s public sector.
The reality of globalization is upon us due to the advancement in new technologies and telecommunications. The advancement is more apparent in areas such as e-payment that has opened a wide door for service provision regardless of time and location. Kurdistan region is a newly recognized region of Iraq that has made real progress in many areas of governing with some real challenges left to address. Due to the political and economical situation in the country, e-communication infrastructure is not well established and this has caused real problems to many e-services including e-payment.
In this paper we investigate the main challenges and obstacles facing e-payment service provision and propose a design solution that will help KRG to overcome some of these challenges.
The findings of this paper will contribute towards speeding up the progress that KRG is currently achieving as well as providing alternative strategies for the future.
The growth rate of the internet exceeds day by day. With the fast growth of internet, there is need to protect the sensitive data from unauthorized access. Cryptography plays a major role in the field of network security. There are many encryption techniques available currently to secure the data. Cryptography can be defined as the art or science of altering information or change it to a chaotic state, so that the real information is hard to extract during transfer over any unsecured channel. Latest advancements in technology and new concepts like quantum cryptography have added a complete new dimension to data security. The strength of this cryptographic technique comes from the fact that no one can read (or steal) the information without altering its content. This alteration alerts the communicators about the possibility of a hacker and thus promising a highly secure data transfer. Audio cryptography can be employed in audio distribution for the purpose of guaranteeing the confidentiality. Electronic commerce in audio products would be facilitated by the development of solutions which can ensure security/privacy, efficiency in compressed domain to reduce the bandwidth requirements, flexibility of implementing progressive audio quality control and computationally inexpensive to be used in real-time systems. Audio cryptography aims to minimize the residual intelligibility of the original audio and control the access to only authorized users. It is similar to but not a direct application of normal cryptographic techniques. The main advantage is that scrambled audio are still validly formatted which can be played by the corresponding players. In this research work, a novel method for audio encryption is proposed using random permutation with multiple key applications. The proposed method would not only provide highly secure audio but also efficient for audio file having higher frequency band. MATLAB R2013a has been used as an implementation platform using signal processing tool box.
Sheltered Security for Mobile Ad Hoc Networks Using Stoical Traffic Pattern Systems
Hemalatha Duraivel, A.Safia Parvin
In today's world networks plays a vital role in our daily life. The whole world is evolving with networks. The main purpose of this work to provide security in networks, because high-security is required for the network system. It is basically a protecting structure which only desires the encrypted raw traffic information from PHY/MAC layer deprived of beholding into the contents of the interrupted packets. The data is sent from source to destination without being decrypted with help of routing jammers like file appended, data appended and datum modifier. The data which are in the transmission layer is in the form of jammed data in the form of false data. The communication part is taken over by jammer. The jammer works inertly to achieve road traffic investigation based on geometric physiognomies of bagged raw traffic with the help of end to end communication. By doing so, the goal of achieving upright precision in revealing the veiled traffic pattern is obtained.
In medical image processing, medical images are corrupted by different type of noises. It is very important to obtain precise images to facilitate accurate observations for the given application. Removing of noise from medical images is now a very challenging issue in the field of medical image processing. Most well known noise reduction methods, which are usually based on the local statistics of a medical image, are not efficient for medical image noise reduction. This paper presents a new and fast method for removal of noise and blur from Magnetic Resonance Imaging (MRI) using wavelet transform. In this work we utilize a fact that wavelets can represent magnetic resonance images well, with relatively few coefficients. We use this property to improve MRI restoration with arbitrary k-space trajectories. Image restoration is posed as an optimization problem that also could be solved with the Fast iterative shrinkage thresholding algorithm (FISTA)Using mathematical analysis we show that our non linear method is performing fast than other regularization algorithms.
Query Response Ranking by Temporal Diversity using User Sessions as Feedbacks
Divya Seelam, B.Hanmanthu, B.Ragu Ram
Retrieval efficiency of temporal issues can be enhanced by getting into account the time aspect. Latest temporal ranking systems use a couple of main strategies: 1) a mixture unit linearly integrating textual resemblance as well as temporal resemblance, and 2) a probabilistic system producing a query from the textual as well as temporal component of report automatically. In this document, we suggest a unique time-aware ranking system according to learning-to-rank strategies. We use two classes of attributes for understanding a ranking system, entity-based as well as temporal attributes, which are based on annotation information. Entity-based attributes are targeted at acquiring the semantic resemblance around a query as well as a document, while temporal attributes determine the temporal resemblance. By using considerable studies we reveal that our ranking system considerably enhances the retrieval efficiency over current time-aware ranking systems.
Analysis of Non-coherent Receivers for Suppression of NBI in UWB Communication System
Snehal A. Chandankhede, Prof.Varsha Bobade
A new promising technique adopted by 4G community is Ultra-Wide Band (UWB) technology, which offers a solution for high bandwidth, high data rate, low cost, low power consumption, position location capability. One type of UWB communication is impulse radio. The paper discusses the effectiveness of major UWB schemes using non coherent receivers i.e AR receivers: the Transmitted Reference (TR) scheme, Averaged Transmitted Reference (ATR) and Differential Transmitted Reference (DTR) scheme. Performance comparison using Matlab Simulation reveals that ATR and DTR receiver outperforms the conventional TR receiver by 3 − 4 dB in IEEE 802.15.4a environment.
Nnakwuzie, Doris Nkechi, Akobundu, Chinyere Ihuoma, Onah, M. U.
SIM300 GSM Module Controller For Smart Home
Nnakwuzie, Doris Nkechi, Akobundu, Chinyere Ihuoma, Onah, M. U.
Advancement in technology has made things simpler and easier for mankind. Automatic systems are being preferred over manual system. This research work presents the development of SIM300 GSM-module controller for smart homes. The system allows the user to monitor electrical equipment via the mobile phone set by sending commands in the form of SMS messages and receiving the appliance status, as the feedback. The main aim of this prototype is to reduce electricity wastage, provide security and replace human work force, which is prone to errors to automated system. The system will be integrated with microcontroller and SIM300 GSM module network interface using assembly language. It is activated when a user sends the SMS to the controller, on receiving the SMS command, the microcontroller unit then automatically controls the electrical appliances by switching “ON” or “OFF” the device according to the user instruction. The design technique used in this research is top down decomposition; the approach is best-suited when the problem and its environment are well defined.
Progressions in silicon innovation, micro-electro-mechanical frameworks (MEMS), wireless communications, and digital gadgets have prompted the expansion of wireless sensor networks (WSNs) in a wide mixture of use areas including military, health, ecology, environment, industrial automation, civil engineering, and medical. This wide application differing qualities joined with complex sensor hub architectures, usefulness prerequisites, and exceedingly obliged and harsh working situations makes WSN plan exceptionally difficult. One basic WSN outline test includes meeting application necessities, for example, lifetime, reliability, throughput, delay (responsiveness), and so on for heap of application domains. The proposed research work utilizes the firefly system in optimization methods, which forms the efficient WSN communication and reduces the risk of false routing while minimization of delay in path switching. In algorithms introduced for data transmission in such networks up to now, a single route is used for data transmissions that results in decrease in energy of nodes located on this route which in turn results in increasing of remaining energy. In this paper a new method is proposed for selection of data transmission route for splving the issue of the mobile receiver problem. This method is based on the energy usage in the network and dead nodes as parameters and number of nodes to sink. In this method average energy of network will be estimated and the reduction in energy will be noted and compared with previous system. This will result in increased energy conservation in routing of the WSN.
Apriori Algorithm base Model of Opinion Mining for Drug Review
M.Alekhya, B.Raghu Ram, B.Hanmanthu
The growing trend of blogging the experiences can provide good feedback for patients to take decision about the consumption of drugs. In order to extract information from blogs about various drugs and symptoms is a challenging task to data mining research community. Applying opinion mining concepts for drug review can lead to a useful platform to drug users to decide to go with particular drug or not. We propose an Apriori base model form retrieving information about various drugs and symptoms. The proposed model is tested on WebMD blog reviews which shown the good results.
Toward Data Protection laws and code of conduct in Kurdistan region government
Mazen Ismaeel Ghareb
Kurdistan Region Government is a s a developing region in Iraq. Since 1992, Kurdistan parliament has reported numerous standards and regulation in diverse ranges aside from Information advances and PC set of accepted rules laws. KRG has separated from Iraq influenced by hacking their touchy data and digital unlawful acts since war 2003. In Kurdistan Region there are numerous web gives the vast majority of them upheld by private segment and they don't have any significant bearing PC laws and set of accepted rules to keep the costumers from information lost, protection rupture and digital law violations. This paper will examine every one of the cases related PC law break in broad daylight and private divisions of KRG (Kurdistan Region Goverment) organizations. The study will propose a standard guidelines and regulation for all web suppliers keeping in mind the end goal to minimize hacking and digital law violations. Moreover, of that the examination will propose the how it can apply the PC laws and regulation and the results of abusing these laws for individual and establishments. This study due of development private sectors and there are many Internet providers In Iraq and KRG without clear law to apply for all providers regarding data privacy and protections. There are numerous cases in Iraq and Kurdistan Region Government identified with Information Technology This paper will overview law experts and mastery in laws. This will bolster the lawful prerequisites required for applying the PC Law in KRGs governments.
Optimized Approach for Authentication In Audio Signal By Wavelet Packets Transformation Technique
Kuruva Gowthami, Dr. N. Ramamurthy
In our proposed framework we present a novel watermarking procedure to embed for copyright protection and authentication into digital audio by directly changing the audio samples then after modifying the audio signals. The modified audio signals are divided into no. of samples each sample is decomposed adaptively by the method of novel Empirical Mode Decomposition (EMD).those decomposed samples after decomposition called as a Intrinsic Mode Functions (IMFs),In this Intrinsic Mode Function the low frequency mode table under different attacks is presented and then after audio perceptual quality of the original audio signal is preserved. Finally in our proposed algorithm we show the robustness efficiency of the hidden watermark for additive noise re-quantization, MP3 compression,, filtering, cropping and re-sampling. A comparison analysis shows that our proposed framework has high end performance than the other watermarking schemes proposed recently in the literature.
A Survey on Parallel Method for Rough Set using MapReduce Technique for Data Mining
Ms.Suruchi V.Nandgaonkar, Prof.A.B.Raut
In this paper present survey on Data mining, Data mining using Rough set theory and Data Mining using parallel method for rough set Approximation with MapReduce Technique. With the development of information technology data growing at an incredible rate, so big data mining and knowledge discovery become a new challenge. Big data is the term for a collection of data sets which are large and complex, it contain structured and unstructured both type of data. Data comes from everywhere, posts to social media sites, digital pictures and videos etc this data is known as big data. Useful data can be extracted from this big data with the help of data mining. Data mining is a technique for discovering interesting patterns as well as descriptive, understandable models from large scale data. Rough set theory has been successfully applied in data mining by using MapReduce programming technique. We use the Hadoop MapReduce System as an Implementation platform. The lower and upper approximations are two basic concept of rough set theory. A parallel method is used for the effective computation of approximation and is improving the performance of data mining. With the benefits of MapReduce The MapReduce technique, received more attention from scientific community as well as industry for its applicability in big data analysis it makes our approach more ideal for executing large scale data using parallel method .In this paper we have presented working and execution flow of the MapReduce Programming paradigm with Map and Reduce function. In this work we have also briefly discussed different issues and challenges that are faced by MapReduce while handling the big data. And lastly we have presented some advantages of the Mapreduce Programming model.
Automating the test case generation for Object Oriented Systems using Activity Diagrams
Rajvir Singh, Preeti
Generation of test cases is the most important issue in the software testing. Thus test cases need to be carefully designed. An activity diagram is used for modelling the dynamic aspects of the system. It helps in visualizing the sequence of activities involved in a control flow. The proposed approach is to automate the generation of test scenarios from activity diagram using DFS and BFS method. By using these two methods, the useless test paths are eliminated which in turn reduces the time complexity. This approach also helps in synchronization between various activities. It generates an Activity Graph from the activity diagram by specifying some mapping rules. Then a proposed approach will generate the number of valid paths by using activity graph as an input and these valid paths will help in generating the test cases which will cover all aspects of the system and results in increased system efficiency and performance.
Performance comparison between single & couple rectangular tank system using NNPID controller
Srijan Banerjee
This thesis addresses Neural Network Based Predictive controller based control systems for coupled tank system. The first is a PID controller based control systems. PID controller tuning methods has been carried out. Neural Network based Predictive Controller and system Identification has been discussed where controllers are designed for single rectangular tank system, coupled rectangular tank system. Initially PID Controller is introduced for Single Rectangular Tank System. The controller is tuned by Manual Tuning Method and Ziegler-Nichols Tuning Method. For controlling these two systems Neural Network Based Predictive Controller is suggested. Block specification, system identification and Back propagation are also illuminated. The proposed technique shows the satisfactory result in terms of controlling the coupled tank system with fixed input and it is also executed in simulation and gives the satisfactory result. Finally process is reliable for nonlinear plant in simulation. At last, MATLAB coding produces different response curve for real time system which is also discussed in the paper.
Paradigm of Privacy Preserving Techniques in Social Network Data Publishing
Ms.Shashikala N.Havanurkar, Mr.Abhijit V. Mophare
In our modern life, social networks are pervasive and omnipresent. Activities like tweeting, uploading photos on Facebook, finding job by using LinkedIn, are nothing but the use of social networks. Even the average computers are used to social networks. The incredible use of social networks in counter-terrorism and marketing has increased the need for accurate classification techniques for hiding important data and connections. However, users of admissible social networks have reasonable concerns about the use of their private data. Also, nowadays many social networks that have been partly driven by Web 2.0 applications have made publicly availability of the data. This data is analyzed in many different ways. Publishing the social network data by maintaining the privacy is a task of concern. In this paper, we present a brief review of the existing techniques for privacy preserving publishing of social network data.
Classification of Breast Mass classification - CAD System with Performance Evaluation
Dr. S. Mohan Kumar, Dr G. Balakrishnan
Mammogram is measured the most consistent method for early detection of breast cancer. Computer-aided diagnosis system is also able to support radiologist to detect abnormalities earlier and more rapidly. In this paper the performance evaluation of the computer aided diagnostic system for the classification of mass classification in digital mammogram based on Discrete Wavelet Transform (DWT), Stochastic Neighbor Embedding (SNE) and the Support Vector Machine (SVM) is presented. This proposed system classifies the mammogram images into normal or abnormal, and the abnormal severity into benign or malignant. Mammography Image Analysis society (MIAS) database is used to evaluate the proposed system. The average classification rate achieved is satisfied.
Thokala Nirosha, Kunjam Nageswara Rao, G Sita Ratnam
Computer Aided Detection of Diabetes Retinopathy and Analysis through ANFIS and Optimtool
Thokala Nirosha, Kunjam Nageswara Rao, G Sita Ratnam
The entire human body can be controlled using a Computer aided diagnosis (CAD). One of such technology is CAD system for diabetic retinopathy detection. Damage or degeneration of the optic nerve, the brain or any part of the visual pathway between them, can impair vision. Diabetic Retinopathy (DR) does not exhibit any distinctive symptoms which the patient cannot easily perceive until a severe stage is reached. This is because lack of specialized ophthalmologists i.e., 1:1000 ratio availability of doctors to patients together with associated higher medical costs makes regular check up costly. We proposed to develop a low cost and versatile Computer Aided Diagnosis (CAD) systems. It can be achieved by Adaptive Neuro Fuzzy Inference System (ANFIS) assisted Diagnosis and by genetic algorithm through Fundus Image. So that we can estimate the damage of retina and the appropriate treatment to the patient can be recommended to save them from vision loss.
An Incremental Shared Nearest Neighbour Clustering Approach For Numerical Data Using An Efficient Distance Measure
B. Naveena Bai, Dr. A. Mary Sowjanya
Clustering is one of the prominent fields of data mining. A major drawback of traditional clustering algorithms is that they perform clustering on static databases. But in real time databases are dynamic. Therefore incremental clustering algorithms have become an interesting area of research wherein clustering is performed on the incremental data without having to cluster the entire data from scrape. In this paper, a new incremental clustering algorithm called Incremental Shared Nearest Neighbor Clustering Approach (ISNNCA) for numeric data has been proposed. This algorithm performs clustering based on a similarity measure which is obtained from the number of nearest neighbors that two points share. In order to identify nearest neighbors, a distance measure is used. A distance measure that performs well with this algorithm has been identified in this work. This algorithm could find clusters of different shapes, sizes and densities.
Analysis of Non-Melanoma Skin Lesions Using Curve Let based Texture Analysis on Probabilistic Neural Network Classifier
P.Sravani, S.Vyshali
This paper presents a Curvelet Transform -based texture analysis method for classification of non-melanoma skin lesion classification. We are applying tree-structured on wavelet transform and subband analysis on Curvelet Transform on gray scale image analysis on wavelet and curvelet coefficients. In our proposed method Feature extraction and a 8 subband stages on feature selection method, based on entropy and correlation, were applied to a train set of images. The resultant feature subsets were then fed into neural network classifiers on 3 stages of Normal;Disease Effected 30-50% and Disease Effected above 50% and comparision measurement analysis on DWT /DCT Using Probabiliste Neural Network Classifier based accuracy improvement.
Design of High Performance Shared Buffer NoC Router
B.S.L.K.Anusha, K.S.N.Raju
In a NoC system, modules such as processor cores, memories and specialized IP Cores exchange data using a network via multiple point to point data links interconnected by switches (Routers) by making routing decisions at Routers. These Routers generally have Buffers dedicated to their input or output ports for temporarily storing packets in case contention occurs at output physical channels. These buffers, in fact, consume significant portions of router area and power. So, sharing these buffers among input or output ports makes using the buffers more efficient. The Extended Router Architecture with Shared Queues (E-RoShaQ), shares the buffers among output ports making the operation dead-lock free. With this architecture, the performance of router has increased by 50% over conventional router architecture at all the traffic loads. This work focuses on realization of both conventional and Extended RoShaQ. The E-RoShaQ is designed with 4 input ports, 4 output ports and Shared Queue length of 8 with 2 Buffer entries each, using Field Programmable Gate Array (FPGA) technology.
Optimized Multi scale Similarity Approach for Images Based on Single Image Super Resolution Framework
Syeda Ayesha Farheen, A. Pugazhenthi
The aim of Super Resolution (SR) algorithms is to produce a High Resolution (HR) image with the help of one or more than one low resolution (LR) image(s) of some real scene. Existing SR algorithms are of 3 types – Interpolation based SR algorithms, reconstruction based and Example learning based SR algorithms. Example based image SR has been recognized as an effective way to produce a HR image using an external training set. However, the effectiveness of these example based SR methods highly depends upon the consistency between the training set and the LR image(s). Single image SR method by learning multi scale self-similarities from an LR image has been proposed for the reduction of the effect created by incompatible high frequency details that are present in the training set. This proposed method is based upon the observation that in the natural images, small patches tend to repeat themselves redundantly many times, both within the same scale and across different scales. And to synthesize the details that are missing, HR-LR patch pairs have to be established using the LR image input and its down sampled version in order to capture the similarities that are present across different scales. Then Neighbor Embedding (NE) algorithm is applied to estimate the relationship between HR and LR image pairs. To completely exploit the similarities across various scales of an LR image, we use the previous resultant images as training examples for subsequent reconstruction process and adopt a gradual magnification scheme to upscale the LR input to the desired size step by step. Further, in order to preserve the sharper edges, we apply non local means (NLM) method to learn the similarity within the same scale. This has also suppressed the aliasing artifacts which are not required in an image.
Arm Based Human Machine Interface Of Plastic Extrusion Blow Molding System
K.Priyanka, K.Dhanunjaya M.Tech
This paper designs monitoring and controlling parameters of Plastic Extrusion Blow molding system. This system takes ARM processor as a core and takes CAN bus as communication system by analyzing the human machine interface system. In this Hardware design consist of LPC2138 with ARM7 microprocessor having large memory capacity and CAN communication as Human machine interface control device. In software design Embedded C is transplanted to the ARM core to achieve real time multi task switching. Secondly, GUI is transplanted to display graphics & text. Write the HMI application program task-unit. Finally LPC 2138 communicates to human machine interface system with CAN bus and HMI of the Plastic Extrusion blow molding system is completed.
Security Enhancement of 4G LTE system using PGP and Iterative RSA technique
Shivali Kanwal, Parvinder Singh
Security is often vital in knowledge networks; however it's significantly crucial in wireless networks like LTE. One in all the distinctive challenges of fourth-generation technology is the way to shut a security gap through that one compromised or malicious device will jeopardize a whole mobile network due to the open nature of these networks. To satisfy this challenge, relinquishing key management within the 3GPP LTE/SAE has been designed to nullify any vulnerable keys and as a result detach tainted network devices. Though periodic updates of the PGP key are Associate in Nursing integral a part of relinquishing key management, our work here emphasizes however essential these updates or to minimizing the result of asynchrony attacks that, as of now, can't be effectively prevented. The main contribution, however, is to explore however network operators will verify for themselves Associate in Nursing best interval for updates that minimizes the communication load they impose ,whereas protective for the protection of user mobility. Our rational and simulation consideration indicate the impact of the key update interval on such performance criteria as constellation and user quality once victimization RSA and PGP.
RFID Tag Enabling Wireless Sensor Networks Data Acquisition System By Using Embedded Linux
Sk.Sohail Naqui , G.Mukesh
Monitoring the environment, capturing significant events, and interpreting physical space information with sensors are increasingly demanded in several application fields such as disaster prevention and recovery, surveillance, home automation, healthcare, structure and machine diagnosis, advanced traceability systems. This project focuses on developing a data acquisition from one place to another place using Zigbee wireless sensor network. For environmental monitoring we are using Temperature sensor and LDR or light sensor to continuously calculating the temperature and light density values in the environment. We are using MEMS sensor to detect abnormal behaviors exhibited by machines for diagnosis purpose and to warn others on the environment so as to prevent accidents from happening. Each owner has their own RFID reader to access information from the environment. If any changes occurred in MEMS, temperature and LDR we can alert the people by using buzzer indication and also LED. Each and every monitoring value can be stored in the memory card for further action. Whenever the particular authorized person show his/her card to the RFID reader the monitored values can be send to the receiver and displayed on LCD. Data acquisition can be possible using Zigbee network. Here we can monitor the sensor network using low power supply or battery. For indicating purpose we are using buzzer and LED whenever in abnormal condition.
Document Clustering and Automatic Labeling for Forensic Analysis Using High Performance Clustering Algorithm
Asmita V. Mane, Prof. Gitanjali Shinde
Forensic document the strategy for examination of different unlawful acts by computer based techniques is called as computerized scientific investigation . A huge number of records are generally inspected in computer forensic investigation. The greater part of the information in that advanced records are fundamentally unstructured. To handle or investigation of this expansive, unstructured information by inspectors is hard to be performed and drawn out. Many calculations or algorithms are applied for document clustering can encourage the revelation of new and helpful learning from the archives under examination. Clustering algorithm are key piece of this work in which number of unstructured records are given as an input and the yield is organized document position. We exhibit a methodology that applies clustering algorithm of documents to measurable examination of seized computers in examinations. One particular calculation is not a Cluster examination itself but rather the general undertaking to be explained. Different algorithms are utilized that essentially vary as a part of their idea of what they constitutes a group. We characterize the proposed methodology with K-Means algorithm and hierarchical algorithm. Likewise we can create number of clusters dynamically and cluster labeling . The execution of computer for examining a few documents is enhanced in our test approach.
Devnagari Sign Language Recognition using Image Processing for Hearing Impaired Indian Students.
Prof. C. M. Jadhav , Mr.Shitalkumar B.Sagare
Some people in society are hearing impaired due to which they can’t communicate with other people easily. Hand gesture is one of the most natural and expressive ways for the hearing impaired. Since people with hearing impairment or deaf people cannot talk like normal people so most of the time they have to depend on some sort of visual communication. Dumb people are usually deprived of normal communication with other people in the society. It has been observed that they find it really difficult at times to interact with normal people with their gestures, as only a very few of those are recognized by most people. Hand gesture is one of the most natural and expressive ways for the hearing impaired. Sign language is the primary means of communication in the deaf and dumb community. It also got grammar and vocabulary but uses visual modality for exchanging information. Normal people are usually unaware of sign language. E.g. American Sign Language (ASL) or Devnagari Sign Language. The gestures are of many types like hand gesture which include one hand, two hands and face gestures. Hand gestures can be classified in two categories: static and dynamic. A static gesture is a particular hand configuration and pose, represented by a single image. A dynamic gesture is a moving gesture, represented by a sequence of images. However, because of the complexity of dynamic gestures, most researches are focused either on static gestures, postures, or a small set of dynamic gestures.
Efficient Recognition Of Survival Rate In Bone Marrow Records Using Non-Matrix Factorization Algorithm
S.Vinothini, S.C.Punitha
Patients undergoing a bone marrow stem cell transplant face various risk factors, stem cell is a procedure to replace the damaged or destroyed bone marrow with healthy bone marrow. Stem cells are immature cells in the bone marrow that gives rise to all of blood cells. Totally 2000 patients records are collected also split into training and test data of 768 records with 18 different attributes. Non-matrix factorization algorithm are used to find the missing values, for handling the more attributes and more data set of different patients with excluding of errors and missing values. The data set focused in targeted information extraction and investigative analysis along with useful patterns. Various classification algorithms like SVM, RF, and NN are trained on predicting the survival of each patient depends on their preoperative measurements along with highest prominence. Non-matrix algorithm increases the accuracy of prediction result.
A Web Based Fuzzy Expert System for Human Disease Diagnosis
Ms. Kalyani Baghel, Mr. Neeraj Mehta
Fuzzy expert system has shown a remarkable tool for building of intelligent decision making systems based on expert’s knowledge and observations. This work presents an approach for the treatment of patients on the basis of fuzzy rules applied on symptoms that seen in patient. For the identification of complex disease like ADHD, SLP and IBS, firstly fuzzy rules applied based on the symptoms selected by the patient and secondly for the improvement of developed system, expert learning system is proposed by which disease diagnosis accuracy has been enhanced. Through exert learning system, experience Doctors around the world can share their knowledge with the system for enhance the probability of finding diseases more accurately. Finally, a tool named “Diagnosis Portal” has to be developed for showing the proposed work and our results shows improved interpretation accuracy in treatment of patient with faster and accurate manner.
Performance Evaluation of PAPR Reduction in OFDM System Using Non Linear Companding Transform
P.Chaitanya, Ch.Rajendra Prasad
The main limitation in employing orthogonal frequency division multiplexing (OFDM) system is high peak-to-average power ratio (PAPR) of the transmitted signal. A new nonlinear companding algorithm that transforms the OFDM signals into the desirable statistics form defined by a linear piecewise function is proposed. The more adjustability in companding form and an effective trade-off between the PAPR and bit error rate (BER) performances can be obtained by introducing an inflexion point and the variable slopes in the target probability density function. Theoretical analyses for this algorithm is presented and expressions regarding the achievable signal attenuation factor and transform gain are produced. The selection criteria of transform parameters focusing on its robustness and performance aspects are also examined. The conferred theoretical analyses are well verified via computer simulations.
Hyperspectral Image Denoising with a Spatial– Spectral View Fusion Strategy
Princee Parul, Rakesh Gandhi
The paper discusses about the hyper spectral and MS-PAN fusion system, the first part discusses the introduction to fusion imaging and its types, and second part deals with work done by authors with respect to the fusion imaging, third section discusses the proposed system of MS-PAN image fusion with RDWT with reduced noise error and statistical comparison of results.
Use Of precast SIFCON Laminates For Strengthening of RC Beams
Mr. Yogesh N. Dhamak, Prof. Madhukar R. Wakchaure
Slurry infiltrated fibrous concrete (SIFCON) is a novel type of high performance fibre reinforced concrete made by infiltrating steel fibre bed with a specially designed cement based slurry. Laboratory experiments have shown that SIFCON is an innovative construction material possessing both high strength and large ductility. In the present study, the use of SIFCON has been investigated as an externally bonded strengthening material on reinforced concrete beams The experimental programme has been carried out to study the behaviour of flexural RC beams with precast SIFCON laminates. A total number of twenty one specimens of size 150mm x 300mm x1800mm corresponding to four test series are cast and tested under static loading to study the load deformation behaviour and ductility associated parameters. The concrete beams has been designed to obtain a concrete grade of M20.For laminates the fibre volume fraction was 7% and 10%. The steel fibres used in the study were hooked end steel fibres having 0.6mm diameter and aspect ratio of 50. Previous results indicate that the strengthening of RC beams with SIFCON laminates has significantly improved the cracking behaviour in terms of significant increase in first crack load and the formation of larger number of finer cracks. The stiffness, ductility and energy absorption are found to be increase to a great extent when the beams are strengthened by three face confinement ( bottom & side faces ).
This research work is an attempt towards achieving an approach for designing PI and PID controllers for a two loop missile autopilot system in pitch plain. A two loop autopilot configuration has been chosen which is characterized by a dynamics involving non-minimum phase zero. A systematic methodology for linear design in frequency domain of lateral autopilot for a class of guided missiles has been carried out. The present work utilizes the autopilot configuration with one accelerometer and one rate gyro. The configuration in pitch plain for the two loop autopilot system has been illustrated. The present work includes a study on plant uncertainties.
Analytical Approach For Privacy Protection By Palm Print Mechanism Using Wavelet Transformation
Nalli Venkata Prasanth, K.Jhansirani
The prominence of digital image processing domain has been increased from last few decades due to its advanced research areas such as medicine, biometrics, military, robotics etc. In this work an important issue has taken as area of research namely protecting the privacy information from the unauthenticated users either as accidental or incidental ways. Although tremendous progress has been made in the past years on the protecting the privacy information by make use of biometrics namely fingerprint, palm print, iris etc. The usage of palm print in academia, medical labs, and military has been increased from few years but in some scenarios these palm print mechanisms fails to meet the practical requirement. The proposed work presents a novel work where palm print approach uses textural information along with the different wavelet transforms in order to protect the privacy information where the information from different transform techniques is analyzed in terms of individual as well as combined level. Biorthogonal, Symlet and Discrete Meyer are the wavelet transform techniques used in the proposed work for the analysis on the palm images taken from the image acquisition system. Finally when compare with the traditional palm print approaches the proposed palm print algorithms has better genuine acceptance rate i.e. GAR is 97.12%.
Evaluation Of Dual Fingerprint Approach For Privacy Protention
Setty Shireesha, E. G. Sreedhar Kumar
The prominence of digital image processing domain has been increased from last few decades due to its advanced research areas such as medicine, biometrics, military, robotics etc. In this work an important issue has taken as area of research namely protecting the privacy information from the unauthenticated users either as accidental or incidental ways. Although tremendous progress has been made in the past years on the protecting the privacy information by make use of biometrics namely fingerprint, palm print, iris etc. The usage of fingerprint in academia, medical labs, military has been increased from few years but in some scenarios these fingerprint mechanisms fails to meet the practical requirement. The proposed work presents an novel work where dual fingerprint mechanisms is utilized to protect the privacy information where the orientation from one fingerprint and miniature from another finger print has been taken into account to develop an template which looks alike of original fingerprint..The proposed template protects the information from the theft and as well as shows low error rate FRR= 0.4% at FAR= 0.1%. over traditional approaches. Finally when compared with conventional methods proposed method has better virtual identity which shows good results against incidental and accidental attacks.
Optimized Papr Reduction Approach By Piece Wise Linear Companding Framework With Less Companding Distortion
Greeshma T, E. Upendranath Goud
In the OFDM communication system the main disadvantage factor is Peak Average to Power Ratio (PAPR) which limits the performance of the overall system. To limit this factor in the OFDM system there are so many techniques are there, depends on the nature of the system like clipping, Partial transmission, Selective mapping, Companding transform etc, in these technique companding technique is the a simple methodology to compress or compand the input signal based on the inflection points to reduce the PAPR in the system, while decompander is the technique in the receiver to expand the companded signal from the transmitter section in the OFDM. The piecewise linear companding is based on the linear equations to compress the OFDM sequence where the companding distortion should considered, in this paper we present a efficient companding based on the piecewise linear equations. The whole system considered under ETU channel model. The simulation results show that a reduced PAPR and optimal BER rate of the OFDM system.
Priyanka Saini (MTech Student), Dr. Supreet Kaur (Assistant Professor)
Management of Packet Queues in Buffer using Proactive Protocol
Priyanka Saini (MTech Student), Dr. Supreet Kaur (Assistant Professor)
Mobile Ad hoc Network is a self-configuring infrastructure less wireless network in which nodes are mobile in nature and they form a temporary network. Each mobile node is free to move anywhere independently in any direction. As the number of nodes in the network increases the transfer of packets also increases so it becomes necessary to give priority to the packets. When packets are processed according to their priority then more packet or same service may arrive at processing node and hence it becomes necessary to queue the incoming packets in the buffer. Thus the primary objective of the research work is on management of buffer space for queuing the packets. Active queue management scheme is used for queuing packet in which sending node is notified before the queue is about to filled completely so sender can stop sending data or lower the rate of data transmission. The MANET model which is considered is working on Optimized Link State routing protocol (OLSR). In this paper, the performance of the protocol is analyzed and compared with previous work on the basis of parameters Delay and Throughput. After the evaluation and comparison of results, it is concluded that the performance of OLSR is better than AODV protocol.
R. Sandhya (Pg Scholar) , B.Sanjai Prasada Rao Associate Professor
Optimized Analytical Approach For Wireless Sensory Nodes Based On Low Power DSP Architecture
R. Sandhya (Pg Scholar) , B.Sanjai Prasada Rao Associate Professor
In 21st the role of wireless communications is huge in daily life applications but still power consumption by the applications is still concerned area in field of digital signal processing. Low power DSP architecture is required in all applications. Wireless communication exhibits the highest energy consumption in wireless sensor nodes. Given their limited energy supply from batteries or scavenging, these nodes must trade data communication for on-the-node computation. Due to the increasing complexity of VLSI circuits and their frequent use in portable applications, energy losses in the interconnections of such circuits have become significant. In the light of this, an efficient routing of these interconnections becomes important. In the implemented design describes the design and implementation of the newly proposed folded-tree architecture for on-the-node data processing in wireless sensor networks, in addition of add the routing technique for the high communication. Measurements of the silicon implementation show an improvement of 10–20× in terms of energy as compared to traditional modern micro-controllers found in sensor nodes.
Afshan Fathima (Pg Scholar) , B.Sanjai Prasada Rao Associate Professor
Analytical Approach For Enhanced Residue Modular Multiplier For Cryptography
Afshan Fathima (Pg Scholar) , B.Sanjai Prasada Rao Associate Professor
This paper presents an implementation of VLSI architecture for Dual Field Residue Arithmetic modular multiplier with less delay based on finite field arithmetic to support all public key cryptographic applications. A new method for incorporating Residue Number System (RNS) and Polynomial Residue Number system (PRNS) in modular multiplication is derived and then implemented VLSI Architecture for dual field residue arithmetic modular multiplier with less delay. This architecture supports the conversions, modular multiplication for polynomials and integers and modular exponentiation in same hardware. This architecture has a carry save adders (CSAs) and parallel prefix adders in MAC units to speed up the large integer arithmetic operations over GF (P) and GF (2n), hence this reduces the delay up to 10 percent.
Veeranarayanareddy C (Pg Scholar) , K Prabhakar Assistant Professor M.Tech
A Novel BER Analytical Performance Of DWT Based OFDM Using Various Channel Over DFT Based OFDM
Veeranarayanareddy C (Pg Scholar) , K Prabhakar Assistant Professor M.Tech
OFDM has been widely adopted in many applications due to its good spectral performance and low sensitivity to impulse noise and multipath channels. In OFDM that a cyclic prefixes (CP) is appended to each symbol in order to mitigate the effect of Inter-Symbol-Interference (ISI) and inter carrier interference (ICI). However, this reduces the spectral efficiency. A perfect reconstruction using wavelet based OFDM provides good orthogonality and with its use Bit Error Rate is improved. Wavelet based system does not require CP, so spectrum efficiency is increased. In this paper, we are presenting BER analysis of conventional and wavelet based OFDM in LTE using different modulation techniques like QAM 2, QAM 4, QAM 16, QAM 256 and PSK.
Optimized Reserving Room Approach For Reversible Data Hiding Algorithm Before Encryption On Encrypted Digital Images
C. Vara Lakshmi , B.Geetha Rani
Reversible data hiding is the technique in which data in the cover image reversibly can retrieve after the extraction of hidden data in it. The technique provides the secrecy for a data, and also for its cover image. Ancestor methods of reversible data hiding were vacates room for data hiding after encryption, which leads to some errors at the time of data extraction and image recovery. Here describes a novel method of reversible data hiding in which, Reserving room before encryption in images, so that image extraction is subjected to free of errors. Here we are proposing an LSB plane method for the data hiding, which will result more space for embedded secret data. Moreover the usage of colour images as cover images will helps to store more data in different channels.
Impact Of Data Mining Techniques In Medical System
Reema Arora, Sandeep jaglan
The objective of this master’s thesis is to recognize and evaluate data mining algorithms which are commonly implemented in modern Medical Decision Support Systems (MDSS). They are helpful in a variety of healthcare units over the entire world. These institutions store enormous amount of medical data. This data may contain suitable medical information buried in different patterns concealed among the records. Inside the research some admired MDSS’s are analysed in order to make a decision for the most common data mining algorithms employed for a particular purpose by them. Three algorithms have been identified: Multilayer Perceptron, Naïve bayes and C4.5. A number of testing configurations are examined in order to make a decision of the best setting for the algorithms. After that, an eventual comparison of the algorithms orders them with respect to their manner of functioning. The assessment is rely on a set of performance metrics. In WEKA software analysis has been done and data has been taken from UCI repository medical datasets The data which is taken into consideration are breast cancer, heart disease, hepatitis . The analyses have shown that it is not very simple to name a single data mining algorithm to be the most suitable for the medical data. The consequences of data sets for the algorithms were very linked. However, the concluding evaluation of the outcomes allowed singling out the C4.5 to be the best classifier for the given domain. It was followed by the Naïve Bayes and the Multilayer Perceptron.
Survey On Verification Of Storage Correctness In Cloud Computing
Jeevitha M, Chandrasekar A, Karthik S
In the recent era of the world of computing, cloud has become a trend-setter by providing the ease of storing and sharing the data in enormous volumes. Cloud computing has evolved as a boon to its users by not only relieving them from the burden of storing and maintaining huge data but also give them the feel that their data is straightforwardly accessible from anywhere across the globe. The users will no more have the physical possession of their data, which will mount the security concerns of storing the data in cloud, which is a third party server whose location is not known to the user. Therefore verification of data to ensure the storage correctness becomes a significant task in cloud. As the users of cloud are free from the burden of storing and maintaining their data, they must also be free to use their data without worrying about the need for any integrity checking. So cloud uses a Third Party Auditor (TPA) who has the capability for verifying the data for its consistency. In this paper we will discuss about the various techniques that can be adopted by the TPA in ensuring the storage correctness of dynamic data in cloud.
An Overview of Multi-Microcontroller Bus Synchronization for Simultaneous Operation of the Microcontrollers
Anoop Kumar Vishwakarma, Neerja Singh
Now a day’s embedded systems are more complex and complicated as compared to the old one. Low power microcontrollers are limited to a specific task. But current time demand is data specific which requires more data processing. Re configurability is also an interesting feature of current time embedded system. So we have to develop a system that is easily re configurable as per our requirement. Cost is also a design factor; we have to develop a system that its cost will not increase. High power microcontrollers are able to process higher data at a higher speed taking higher amount of power. But when our task is limited to power, cost; high power microcontrollers can’t be used. High power microcontrollers become problematic for the battery operated embedded systems where power backup is limited. To overcome this problem we are developing Multi-microcontroller System on Programmable Chip (MMSoPC). Synchronization is a key problem in multi-microcontroller systems to operate simultaneously. To synchronize the buses of the microcontrollers, network on chip (NoC) is the solution. Local system buses are connected to a common system bus i.e. global system bus. Global buses are externally available to the outside for different interfacing of various components/peripherals etc. So there is a need of synchronization of local system buses to the global system bus.
A Study Of Multi Level Heterogeneous Routing Protocols In WSN
Pankaj Sapra, Varsha
Wireless sensor networks (WSNs) are popular in real world applications. Because of the characteristics of the resource-constrained and battery-aware sensors; in WSNs energy used has establish to be a major interesting subject of research. WSNs compose battery-powered nodes which are connected with the base station to for definite action or task. As sensor nodes are battery-powered i.e. it has become dead subsequent to the consumption of the battery which is also called lifetime of WSNs. So utilizing the energy in well-organized way has results in prolonging the lifetime of the WSNs. The general aim has to get the drawbacks of the BEENISH i.e. well known multi-level heterogeneous energy aware protocol. In BEENISH ultra-super nodes are mostly elected as CH as compare to super, advance and normal nodes, and so, on. In this way energy inspired by all nodes is equally distributed. But BEENISH has neglected the utilization of intercluster data aggregation which has reason flooding. So to overcome this issue a new inter cluster data aggregation and neural network based BEENISH protocol has been proposed. Neural network has improved the cluster head selection of the BEENISH utilizing the various factors such as range of neighborhood of individual nodes, nodes waiting time etc. MATLAB tool will be used to design and implementing the performance of the given protocols.
Analytical Approach For Evaluating Performance Of An Interference Alignment Based Precoding In Mimo-Ofdm System
Patil Meenakshi, S. Siva Reddy
Although tremendous progress has made in the past years to eliminate the inter-block interference (IBI) but still it is considered as area of concern in orthogonal frequency division multiplexing system. We proposed interference alignment based channel independent precoding in MIMO OFDM system. We showed that when the number of receive antennas (nr) is not more than the number of transmit antennas (nt), our proposed precoding is more bandwidth efficient than the conventional zero-padded or CP added MIMO systems, such as, ZP-only, CP-OFDM and SC-FDE system and When the number of receive antennas is more than the number of transmit antennas, it was shown that the IBI in an MIMO OFDM system can be completely eliminated without any CP or zero-padding or precoding, when the OFDM block size is not too small. In this paper, we consider only CP based block transmission system.
A Genetic Algorithm Based K-Means Algorithm For Compressing Images
M.Mary Shanthi Rani
In this paper, an evolutionary approach based Genetic algorithm, is adopted to find the initial seeds of K-means for compressing images. Genetic Algorithm is a kind of optimization technique inspired by the natural process of evolution, well suited to find true and approximate solutions for hard problems even with little knowledge of search space. The proposed method shows enhanced performance in terms of image quality , when applied to test images.
Optimized Blind Data Extraction Approach Based On SS Technique
J Srinivasa Naik , Smt K Ramadevi
Hiding the information is a vital issue in the 21st century in the field of Data Communication security .Its an important issue because the virtual and digital information transmission faces critical setbacks due to hacking and hackers threats. The transmission of information via the Internet may expose it to detect and theft. The data embedding technologies are developed to provide personal privacy, commercial and national security interests. In this work we consider the problem of extracting blindly data embedded over a wide band in a spectrum (transform) domain of a digital medium (image, audio, video).We develop a novel multicarrier/signature iterative generalized least-squares (M-IGLS) core procedure to seek unknown data hidden in hosts via multicarrier spread-spectrum embedding. Here the original host and the embedding carriers both are assumed as not available. Experimental results shows the proposed algorithm can achieve recovery probability of error close to what may be attained with known embedding carriers and host autocorrelation matrix.
Now a days, Association Rule Mining become a major Role in Data mining. It attracts more attention because of its wide applicability. Association Mining aims to extract interesting correlations, frequent patterns, associations or casual structure among sets of items. This paper aims at giving a theoretical study on some of the existing algorithms. The concepts behind association rules are provided at the beginning followed by an overview to some of the previous research works done on this area. The merits and demerits are discussed and concluded with inference.
A Transformation from Relational Databases to Big Data
Shraddha Agarwal, Maddipatla Krishna Priyusha
We are living in an information age and there is enormous amount of data that is flowing between systems, internet, telephones, and other media. The data is being collected and stored at unprecedented rates. There is a great challenge not only to store and manage the large volume of data, but also to analyze and extract meaningful information from it. There are several approaches to collecting, storing, processing, and analyzing big data. The main focus of the paper is to draw an analogy for data management between the traditional relational database systems and the Big Data.
Different Enterprise Information Systems store relevant information about the events occurring in the enterprise. The information stored may be of data, process, etc. and is well structured. The stored information paves the path for Process Mining. Many approaches are suggested for Process Mining, out of which the core approach is algorithmic approach. In Process Mining, Alpha Algorithm assumes importance as it aims at reconstructing causality, from a set of sequences of events that take place in an organization. The paper focuses on identifying limitations of Alpha Algorithm and giving an extension to increase its functionality.
Multiple Antenna Adaptation for Secondary Users Using Data Rate Assessment
Bipandeep Kaur, Ruchi Singla
In the paper a method for multiple antenna communication with switching of users between different antenna loads is presented for cognitive radios networks, this process is an enhancement to the problem of spectrum sharing, after the detection is processed for spectrum space, the paper also discusses about the CR basics and importance of spectrum management. The performance of the proposed system is assessed by calculating the total average power of primary to secondary receiver and the overall SEP (Symbol Error Probability).
Multi-criteria Decision making for Identifying Top-k profitable Stocks from Stock market
Yara Srinivas , Dr. A. Mary Sowjanya
In general, previous studies[1], [2]mostly focus on helping customers find a set of “best” possible products from a pool of given products. Finding top-k profitable products is common in many real-life applications like finding profitable laptops in a new laptop company, finding profitable delivery services in a new cargo delivery company, finding profitable shares in stock market and e-advertisements in a web page etc. This paper we propose a solution to a real life application by identifying top-k profitable stocks, since has not been studied before is undertaken. Given a set of stocks in the existing market, a set of k “best” possible stocks are found such that these new stocks are not dominated by the stocks in the existing stock market. Hence, the user can decide which stocks to be bought for making better profit. Two problem instances of finding top-k profitable stocks are found addressed in this paper. An extensive performance study using both synthetic and real data sets is reported to verify the effectiveness and efficiency of proposed algorithms.
A Comparative Study: Image Steganography and Watermarking
Kamred Udham Singh, Achintya Singhal
Steganography technique plays an important role in information hiding in any digital cover object. Security of information on internet against unauthorized access has become a prime problem. Due to this, steganography technique becomes more popular. Steganography is the science which includes secret communication in an appropriate digital cover objects viz. audio, image, text and video files. The main objective of steganography technique is to hide the presence of the embedded information in carrier file and other objectives are robustness, Un-detectability and capacity of the concealed data. Steganography is separate from other related techniques viz. watermarking and cryptography in term of robustness and Un-detectability of information. Watermarking is a technique that hides information in digital image to protect intellectual properties and copyright, such as logo for proving ownership. Steganography and watermarking are important techniques to conceal important data in cover object an undetectable and irremovable way. Both techniques are the fast developing area of information hiding. This paper delivers a comparative study on digital images steganography and watermarking techniques and significant research growths are also discussed.
Study & Analysis of Intention of a BDI Agent and its Performance
Vishwanath Y, Dr M V Vijaya Kumar
The reasoning ability is significant in an agent model and especially in BDI model. The belief, desire and intentions are the three important concepts in reasoning of the BDI agent. The response of a BDI agent is effective when the belief, desire and intention concepts are optimum. In this paper the efficiency of a BDI agent is analyzed by compelling the agent to dynamically revise the intention based on the perceptual input and achieve the target goal.
During this paper we have gone through the depth analysis what the work currently being done in the field of the code optimization.
The goal of code improvement is to contour code in ways in which either troublesome or impossible for the computer programmer to accomplish. Programs area unit generally written in high-level languages, usually with the intent of each generality and target-independence; code improvement tries to extend program potency by restructuring code to alter instruction sequences and make the most of machine-specific options. Current trends towards transportable languages like Java area unit widening the gap even more in between programmers and also the machines that execute their code; this makes code improvement even a lot of necessary for getting peak take pleasure in new microarchitectural option [2].
Due to the ease of network connectivity and the proliferation of digital capture devices, the access and sharing of images has become extremely feasible and convenient. However, some access and sharing may be unauthorized or illegal. Thus, digital watermarking has become an active research area focused on battling these types of activities. The paper compiles the various researches/advancements done in this field.
Analyzing logs of a network can help us extract important information about users and the usage of network bandwidth. This information can then be used by the network administrator to take necessary administrative actions in order to enhance the security of network. There are several log analyzers available in the market, but have limited features or are platform dependent. In this paper, an efficient and platform independent log analyzer is proposed. This log analyzer along with all essential features regarding users, traffic and bandwidth usage, also has inbuilt features for search engine analysis and contains searched keywords and phrases in its reports. These reports give a easy-to-understand view of bandwidth usage by different users and also the type of content the users are accessing. The searched keywords and phrases report gives an idea about what is being searched on the network. The network administrator, who has the ability to filter users and traffic on the network can then take necessary steps to ensure that the network security policy of the organization remains intact. This also gives the network administrator flexibility, in taking decisions regarding maintaining the security of network. This log analyzer also overcomes issues faced in other tools by procuring reduced memory consumption and by being platform independent.
Comparative Analysis of performance of K-means algorithm for skin detection using wearable Sensors
Anshul Sharma, Varun Sharma, Anil Saroliya
The main idea of this project to provide an alternative method of analysis of K-means algorithm using wearable sensors. The presented work is a give the step of classification using K-means algorithm of data. It is well known classification approach for clustering in data representation. The analysis verifies and motivates the presented method which increases the advantage for intensity independent activity recognition. It is also present the design, implementation and testing of the K-means algorithm through complete experimentation by using wearable sensors. Finally performance analysis of the K-means algorithm on skin detection as well as features extracted discuss in detail.
Peer-to-peer (P2P) databases are mostly used on the Internet for distribution and sharing of documents, applications, and other data. Finding answers to large-scale ad hoc queries like aggregation queries on these databases gives rise to many new challenges. Finding the exact solutions can consume a large amount of time and is also difficult to implement since the P2P databases are distributed and dynamic. In this paper, an approach for approximately answering of ad hoc queries in such databases is presented. Generally, the data is distributed across many peers in a distributed environment, and most of the times, within each peer, the data is highly correlated. This fact is taken advantage of and an approach to process the queries in such an environment is proposed in this work.
Interacting Device for Deaf & Dumb using Atmega 328 Processor
Abhijeet Sondhi, Paresh Kasa, Kuldeep Solanki
This interacting device is a large scale microcontroller based system being designed to facilitate the communication among the deaf and dumb communities and their communication with the normal people. This system can be dynamically reconfigured to work as a “smart device”. In this paper, Atmega 328 and sensors based interacting device is presented. The device discussed is basically a data glove and a microcontroller based system. Data glove can detect almost all the movements of a hand and microcontroller based system converts some specified movements into human recognizable voice. The data glove is equipped with two types of sensors: The bend sensors and accelerometers as tilt sensors. This system is beneficial for dumb people and their hands will speak having worn the interacting device data glove.
Since WSN’s have seen tremendous growth in the past few years and have contributed in transforming the society from simple living to smart living. To explore the diverse deployments of WSN, we have studied the various practical deployment applications of WSN in this research work. For each deployment site, we studied its application credentials and technical details related to the deployment site. We feel that this study will not only provide the in-depth knowledge to the learning community, but we will also open the new area of research for rapid commercial deployment of the WSN.
Umakant B. Gohatre, Mr. Vijay D. Chaudhari ,Dr. K. P. Rane
Rasp-Pi based Remote Controlled Smart Advertising of Still and Moving Images
Umakant B. Gohatre, Mr. Vijay D. Chaudhari ,Dr. K. P. Rane
The paper puts on the basis of idea which focuses on cost reduction and enhancing the quality of service in the field of digital advertising technologies. This work is about a remotely managed smart advertising system designed using Raspberry pi along with python programming. The digital advertising display system designed is based on various methods of using LCD screen, as well as other display devices. This system is very efficient to provide advertising information, to those people who live in public areas but; some areas that does not convenient to build- up the other types of advertise hoarding boards for their information. The Raspberry Pi model and its web interface using Wi-Fi dongle. This proposed system aims to substitute another system interface with Raspberry Pi, which will not only drastically reduces the cost involved but also will help achieving quality of services as the system will consume a smaller amount of power and become the system smartness.
In this digital advertising system using Raspberry Pi B+ model. The multiple display screens are placed at such place having maximum people crowded areas and those areas are mostly attractive in city. The contents on the screen are made up of several images files which are continuously running having different contents. The main goal of this project is broadcasting information and remotely controls it. The broadcasting information such as, buses and bus station, train and train station, shopping malls, city square, road highways, subways, hospital, in conference hall. It is also used in educational institutes like colleges and schools for the purpose of displaying notices for students and also displaying all institutional growth and achievements information for visitors. Similarly this application for industry purpose of displaying notices, information about current technologies and market scenario; which is useful for all company’s employee.
Vipra Dave , Ms. Pooja Parnami , Mrs. Shweta Sharma
Design & Analysis of Performance of Semantic based approach for Knowledge Extraction in Web mining Environment
Vipra Dave , Ms. Pooja Parnami , Mrs. Shweta Sharma
The stimulating work and determining for social mining of web data, the user interest for individual and non-individual reference systems is an important task. The sharing of the knowledge between the web users has become important in measuring the tradition of web data and marking the information in many social websites as per the requirement of the user. This paper provides an alternative method as an online application reference system for the performance analysis of semantic based methodology. It extracts information from various web application sources and social websites. The information is extracted for the different users to take a proper decision (uncertainty, qualitative and quantitative analyses and risk) at a critical stage. The results of services with conservative web search engines are inadequate in the situation (anomalies, security attacks) and simultaneously reducing the service discovery search space with the attention of mathematical/statistical method to brief the text. The data repository is consisting common data which is reached by the process of obtaining data from different web sources. The semantic data is collected from the ontology based data source and draws it to the user with help of query processor constituent. An online reference system is used to make references for a decision making process of the user. The implementation process of this proposed work is helping the experimental process of an online application reference system for the career guidance of a learner.
Comparative Analysis of Performance of Various Virtual Machines in Hybrid Cloud Environment using KVM
Anjali Asawa, Anil Saroliya , Varun Sharma
Virtualization means to create a virtual version of a device or resource, such as a server, storage device. Thus the virtualization play good role in the resource provisioning for the cloud controller. There is large scope in the resources provisioning management in Virtualized Cloud. This paper presents a process of analysis of performance in terms of CPU Time, Memory usage for the different virtual machines of Ubuntu, RHEL 6.0 and Win7’s using the KVM hypervisor in hybrid virtualization environment. The main objective is to find the performance parameters of various virtual machines on a single host and proceeds to find an effective choice for the collection of effective virtual machine for the cloud user.
Utilization Of Renewable Energy Resource Pva With Parallel Current Sharing Dc-Dc Booster Converters
P.Kiran Kumar, M.Vamsi Krishna .Tech
In this paper, a new current sharing technique on general case ofN paralleled DC–DC boost converters is presented. The proposed optimization is based on the knowledge of individual boost parameters. Every loss through the structure are modeled b equivalent resistors. Using an accurate online estimation of those resistors, the losses through each individual converter can be de termined. Then, a new current sharing scheme is defined aiming to maximize the global efficiency of the overall structure. To verify the proposed method, simulations and experiments have been realized on a three-parallel boost converters structure.
High-Efficiency Isolated Bidirectional Ac Dc Converter For A Dc Distribution System
B.Krishnakanth , P.Siva Krishna M.Tech
A high-efficiency isolated bidirectional ac–dc con- verter is proposed for a 380-V dc power distribution system to control bidirectional power flows and to improve its power con- version efficiency. To reduce the switches’ losses of the proposed nonisolated full-bridge ac–dc rectifier using an unipolar switching method, switching devices employ insulated-gate bipolar transis- tors, MOSFETs, and silicon carbide diodes. Using the analysis of the rectifier’s operating modes, each switching device can be selected by considering switch stresses. A simple and intuitive fre- quency detection method for a single-phase synchronous reference frame-phase-locked loop (SRF-PLL) is also proposed using a filter compensator, a fast period detector, and a finite impulse response filter to improve the robustness and accuracy of PLL performance under fundamental frequency variations. In addition, design and control methodology of the bidirectional full-bridge CLLC resonant converter is suggested for the galvanic isolation of the dc distribu- tion system. A dead-band control algorithm for the bidirectional dc–dc converter is developed to smoothly change power conversion directions only using output voltage information. Experimental re- sults will verify the performance of the proposed methods using a 5-kW prototype conveter
Performance evaluation of CI engine with Rice bran and Pungamia oil-Diesel blends as Alternative fuel.
M. Ganapathy
Petroleum products resources are limited and their consumption is increasing very fast with globalization. Diesel consumption is about 45% of the total consumption of petroleum products. Over the last 15 years the demand for petroleum products in India has risen and the situation could be more difficult for diesel engines. Apart from conservation there is a global threat to the environment due to polluting nature of conventional fuels. The solution to these twin problems will be utilizing the vegetable oils. A lot of research is going on the potential use of many vegetable oils. This paper provides detailed information, based on experimental work, on the use of rice bran and pongamia-oil as bio fuel. Various performance tests were carried out by blending rice bran and pongamia-oil as 5%, 10%, 15% with diesel and the results were found to be convincing with all blend ratios. More effective output was obtained with 15% blend
Improving The Performance Of Dc Motor Drive Application For Dc-Dc Converter By Using Resistance Compression Network
B. Umamaheswara Rao, P.Siva Krishna M.Tech
In this paper improve the performance of DC motor by the resistance compression network. The output DC supply is dependence upon number of transformer winding ratio. If the DC input side voltage is two times of the output side voltage. The RCN maintains desired current waveforms over a wide range of voltage operating conditions. HIGH-voltage-pick up dc/dc converters are found in a mixed bag of utilizations [1]–[4]. For instance, to associate photovoltaic boards to the lattice, interface hardware is required. A few architectures for this reason consolidate dc/dc converters to support voltage of individual photovoltaic boards to a high dc-join voltage, with take after on gadgets for changing over dc to air conditioning (e.g., see, [5] and [6]). The progression up dc/dc converter is a discriminating piece of this framework, and must work effectively for an extensive voltage venture up and for a wide voltage range (e.g., at the converter information and/or yield contingent on the framework). Moreover, to be minimal, it must work at high exchanging frequencies. In ordinary hard-exchanged force converters, the cover of current and voltage is extensive amid exchanging, bringing about huge force misfortune, particularly at high frequencies. We implementing torque and speed characteristics are performed by the Resistance Compression Network (RCN). The validated results are verified by the MATLAB/SIMULINK Software
A Brief Review of Defogging Techniques for Haze Affected Images
Navjot Kaur, Dr. Lalita Bhutani
One of the significant issues in picture preparing is the rebuilding of images ruined by different sorts of corruptions. Images of outside scenes frequently contain environmental debasement, for example, cloudiness and haze created by particles in the air medium retaining and scrambling light as it goes to the eyewitness. Despite the fact that, this impact may be alluring from an imaginative point of view, for an assortment of reasons one may need to restore a picture defiled by these impacts, a procedure for the most part alluded to as fog evacuation. This paper presents enhanced dimness evacuation method taking into account combination technique that joins two got images from unique picture. These images can be acquire by performing white adjusting and difference improvement operation.
Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
P.Venkteswarlu , Smt. S. Jhansi Rani
Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. In this paper, we propose to use spatial information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for 1) detecting spoofing attacks; 2) determining the number of attackers when multiple adversaries masquerading as the same node identity; and 3) localizing multiple adversaries. We propose to use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. We then formulate the problem of determining the number of attackers as a multiclass detection problem. Cluster-based mechanisms are developed to determine the number of attackers. When the training data are available, we explore using the Support Vector Machines (SVM) method to further improve the accuracy of determining the number of attackers. In addition, we developed an integrated detection and localization system that can localize the positions of multiple attackers. We evaluated our techniques through two test beds using both an 802.11 (WiFi) network and an 802.15.4 (ZigBee) network in two real office buildings. Our experimental results show that our proposed methods can achieve over 90 percent Hit Rate and Precision when determining the number of attackers. Our localization results using a representative set of algorithms provide strong evidence of high accuracy of localizing multiple adversaries.
Prabhjot Kaur, Ankur Sharma, Raminder Preet Pal Singh
FPGA Implementation of Double Precision Floating Point Arithmetic Unit
Prabhjot Kaur, Ankur Sharma, Raminder Preet Pal Singh
Every computer has a floating point processor or a dedicated accelerator that fulfils the requirements of precision using detailed floating point arithmetic. The main applications of floating points today are in the field of medical imaging, biometrics, motion capture and audio applications, including broadcast, conferencing, musical instruments and professional audio. Floating point representation can support a much wider range of values than fixed point representation. In this design the complex logic operations which consist of various multiple numbers of stages are converted into single stage implementation. Once the inputs are applied to the input terminals the final output is obtained at the output terminals there are no intermediate stages. So now the input take less time to reach at output due to single stage implementation and the number of flip flops and other intermediate required circuits are less as a result the area require is less in the presented design called high throughput design. All four individual units addition, subtraction, multiplication and division are designed using Verilog and than combined into one single unit. The code is dumped into low cost Spartan 6 FPGA.
Energy Efficient AODV routing protocol For Mobile Ad-hoc Network
Jaspreet Singh , Kartik Sharma
Mobile ad-hoc networks are infrastructure-less networks used for communication between two or more nodes without a common access point. It is a collection of nodes that is connected through a wireless medium forming changing topologies. In mobile ad-hoc networks all the nodes are mobile in nature and having limited battery charge. Continuous change in position of nodes in the network degrades the battery charge of the nodes therefore it is necessary to save the battery power of those nodes so that the network lifetime can be long lasting. Nodes are in network are working in the presence of limited energy then energy efficient routing is necessary for reducing energy consumption. In this paper we proposed energy efficient Aodv routing protocol in which Dijkstra algorithm is enhanced to improve the overall performance of the network. Existing systems are not capable of finding the shortest and energy based path among the nodes in the network if multiple nodes fail simultaneously. Performance parameters are Packet delivery ratio, Throughput, Energy consumption and routing overhead. The simulation is done using NS2 network simulator.
Client Identification Model for GPS-based On-demand Real-Time Video Surveillance Security System
Nwokolo Chinyere. P. , Inyiama H.C.
Due to continued increase in crime rate, the security of life, property and infrastructure has been an issue of national concern over the years and increasingly so all over the world. This paper presents a method of identifying clients that request for real-time surveillance security service activated by SMS or phone call in event of invasion or suspected robbery attack. Recognition of DTMF (Dual Tone Multi Frequency) tones produced by the buttons pushed on client’s telephone keypads was done using Goertzel algorithm which is a digital processing technique that provides a means for efficient evaluation of individual terms of the Discrete Fourier Transform (DFT).The proposed GPS-based Real-time Security System (GRSS) is proposed to offer on-demand video capture using indoor cameras and outdoor surveillance cameras, transmit the data wirelessly to a remote data centre for monitoring via IP (Internet Protocol) technology. The Master control station should be able to receive a Save Our Soul (SOS) alert from a subscriber either by GSM (Global System for Mobile communications) call or SMS (Short Message Service), determine the sub control station in charge of the client’s zone and transfer control to it. The station in charge should now pinpoint the client’s location using Global Positioning System (GPS) based location data stored in the database, and trigger relevant components for surveillance action over the area. The system features a flexible and scalable remote automated client identification system for the proposed on-demand GPS based real-time security service system.
Comparative Performance Analysis of KNN (K-Nearest Neighbor) algorithm for Fatigue Detection in vehicular Drivers using pulse oximetry signal
Amit Chauhan, Anil Saroliya, Varun Sharma
Vehicular accidents are taking place day by day and people are losing their lives across the world. It is important to detect physiological and Psychological parameter of the vehicular driver so that various levels of physical and mental fatigue can be measured. Research has been initiated at a great extent in India to develop an insidious solution for eliminating such accidents. In this paper the KNN (K-nearest neighbor) algorithm has been designed to organize Post and Pre driving fatigue levels. The performance analysis of K- nearest neighbor algorithm has been discussed here. This paper propose a method to plan and to execute the major element of this computing system which is wearable and the aim is to watch the Fatigue level of a driver using physiological parameters so that a simplified system can be built without disturbing the driver and unaffecting his comfort level. This paper also presents the usage of physiological parameters of the body such as oximetry pulse for classifying the post and pre driving fatigue state of the vehicular drivers.