Prof. S. A. Annadate, Mr. Mangesh S. Wadatkar, Prof. Swapnil N. Jadhav
A Review On Rfid, For Resolving Transport Related Issues
Prof. S. A. Annadate, Mr. Mangesh S. Wadatkar, Prof. Swapnil N. Jadhav
Now a day’s people don’t have much time due to their intensive schedule. And roads have become much more crowdy to drive. So everyone wants to reach the destination as early as possible. Therefore transportation has become a major issue. To over-come such problems Radio Frequency Identification (RFid) can be used. In this paper we would see how RFid can be used for transport related problems for Indian roads.
Here in collaboration with RFid we have also used Global System for Mobile Communication (GSM) and Enhanced Circuit Switched Data on GSM (ECSD) which has increased the range and scope of our project. Here we are going to see certain traffic problems and how we can over-come them using RFid.
A Strong Token Authentication And Cryptography Based Application And Data Access For Cloud Users
Ali Asgar Hussain, Reetu Gupta
Cloud computing is the latest trend in comuting by which various services, applications and other computing things can be delivered as a service. Mainly it is a formal combination of distributed, grid, cluster, elastic and utility computing. Such computation provides a quality of service based robust usage experience for the user. It serves reduced complexity and service expandability for making standardization. This leads to improved operational efficiencies and offers the client reduced predictable annual costs. Other benefits were realized in areas, such as self service, service catalog, automatic provisioning and deprovisioning, and capacity flexibility. A cloud provides clients with features, such as disaster recovery, security, and metering, which enable clients to reduce costs, increase standardization, and improve business continuity
In cloud the data center is the location where the users all confidential information is stored by some security schemes provided by the service provider. Along with users normal data there is any more secure and private data which need to be hidden from even service provider and that type of control is not provided by any provider in the market.
Any organization needs securing access to corporate networks, protecting the identities of users, ensuring that a user is who he claims to be and protecting the integrity of business-critical transactions. However, the recent surge in high-profile security threats, as well as evolving business environments requires entirely new considerations for access control. Cloud offerings and mobile platforms represent a shift in how trust and control is established and maintained.
This evolving environment requires a comprehensive set of security services, yet flexible enough to quickly adapt to ever changing requirements without impacting the applications and access control infrastructure in use. Smooth migration is an essential aspect of such flexibility.
With this work, the aim is to make the application level of security provided by any of the servers or provide more effectively and according to the users need. For achieving the confidentiality attribute based encryption is used. Digital signature and multi factor authentication like single sign on one (SSO) are some of their examples. They should be delivered as a service so that multiple small scale companies might also integrate them to serve their users in a better way. Multiple authentication mechanisms, like digital signatures, certificates or 2-factor security and several identity validators can coexist and can be combined to suite the most complex needs.
An Improved LEDIR Technique Using LEDIR For Failure Node Recovery In WSN
Jasbir Kaur, Khushboo Bansal
In this paper, node recovery techniques in Wireless Sensor Networks have studied and an improved node recovery algorithm has developed. LEDIR algorithm has studied and then a new I-LEDIR (improved LEDIR) algorithm has developed and also has compared with previous LEDIR and RIM. The new algorithm is compared to existing algorithms based on three parameters: distance moved, no. of nodes moved and total no. of messages exchanged and the results are presented.
B.Deevena Raju, Dr. Pvrd Prasada Rao , dr.G.Styanarayana Prasad
A Review on Image reconstruction using Haar DWT on Crack Images
B.Deevena Raju, Dr. Pvrd Prasada Rao , dr.G.Styanarayana Prasad
The main aim of this paper is to provide a better reconstruction technique for image by solving the drawbacks that currently exist in the literary works. Thus, we intended to propose an efficient image reconstruction technique by exploiting the Haar DWT to remove cracks to input image and accurate threshold values to very high PSNR compared to input cracked image by improved particle swarm optimization used for better theshold values. Normally in image reconstruction, the input image which is corrupted by noise is given to the reconstruction process and obtained the reconstructed image with high quality. we exploit a renowned filtering technique to yield high quality reconstructed image. The low quality blurred image will be processed by our renowned filtering technique and obtain a reconstructed image with high contrast. Thus, we finally obtain a reconstructed image from our proposed technique with enhanced quality. To prove the performance of our proposed technique, the reconstructed image quality will be compared with the conventional techniques. Overall, our proposed technique can reconstruct the image more effectively by two phases (i) training phase and (ii) investigation phase achieving higher image quality ratio than the conventional reconstruction techniques.
Dr. Vibhakar Shrimali, Dr. Manoj Kumar Taneja, Mr. Abhishek Gaur
Performance Evaluation Of Bandwidth Scheduling Techniques In Passive Optical Networks
Dr. Vibhakar Shrimali, Dr. Manoj Kumar Taneja, Mr. Abhishek Gaur
Abstract— Passive Optical Networks are thought to be the next step in the development of Access Networks and providing broadband access in the ”last mile” area. Ethernet PONs (EPON) gain the most attention from the industry as they offer highly flexible, cost effective solution. In this paper we propose algorithms that provide Dynamic Bandwidth Allocation and shift the burden of queue management from the customer to the network, this results in less complicated and more generic equipment used on the customer’s premises. We show the results of simulations to validate the effectiveness of algorithms presented.
Performance of Dynamic Voltage Restorer by Using Fuzzy Controller With Battery Energy Storage System
N.Ayyappa, P.Siva Krishna M.Tech
Inthis paper the dynamic Voltage Restorer (DVR) has as of late been acquainted with shield the touchy mechanical burdens from the impeding impacts of voltage lists/swells and other voltage aggravations. Different injection schemes for DVR are analyzed with particular focus on new method used to minimize the rating of voltage source converter(VSC) used in DVR. Anew control technique is proposed to control the capacitor-supported DVR. The control of DVR is demonstrated with a reduced-rating VSC. The reference load voltage is estimated using the unit vectors. The synchronous reference frame theory is used for the conversion of voltages from rotating vectors to the stationary frame. In this control scheme fuzzy logic controller is used to activate the Pulse Width Converter. The compensation of the voltage sag,swell and hormonics is demonstrated using a reduced-rating DVR.Results shows that this method can compensate voltage sag, swell and harmonics.
A Single-Phase Photovoltaic Drive Controller with A Series-Connected Energy Buffer
M.Bhanu Kiran, M.Vamsi Krishna 2 M.Tech
Module integrated converters (MICs) have been un- der rapid development for single-phase grid-tied photovoltaic ap- plications. The capacitive energy storage implementation for the double-line-frequency power variation represents a differentiat- ing factor among existing designs. This paper introduces a newtopology that places the energy storage block in a series-connected path with the line interface block. This design provides inde- pendent control over the capacitor voltage, soft-switching for all semiconductor devices, and the full four-quadrant operation with the grid. The proposed approach is analyzed and experimentally demonstrated.
There has been recently a growth of interest in developing the current machine-readable Web towards the next generation of machine-understandable Web - Semantic Web. The development of the Web to a global business was reasonably fast, whereas Semantic Web development has taken time from a plan to be used as the mainstream Web. It is also important to note that the use of Semantic Web would only be successful in small technologies. However, the goal of Semantic Web is to be used in big technologies and to be the mainstream Web. Some challenges may impede make further progress of Semantic Web. In this review paper, an overview of the current status and future needs of Semantic Web will be presented. Specifically, the challenges and needs of Semantic Web in the hope of shedding some light on the adoption or infusion of Semantic Web in the future will be discussed. Then, a critical evaluation of these challenges and needs will be presented. Semantic Web has a clear vision. It is moving, in line with this vision, towards overcoming the challenges and usability in real world applications.
Advanced Vecliw Architecture For Executing Multi-Scalar/Vector Instructions On Unified Datapath
B.Prasanna, Sharad Kulkarni M.S(E&C),FIETE,MISTE
This paper proposes new processor architecture for accelerating data-parallel applications based on the combination of VLIW and vector processing paradigms. It uses VLIW architecture for processing multiple independent scalar instructions concurrently on parallel execution units. Data parallelism is expressed by vector ISA and processed on the same parallel execution units of the VLIW architecture. The proposed processor, which is called VecLIW, has unified register file of 64x32-bit registers in the decode stage for storing scalar/vector data. VecLIW can issue up to four scalar/vector operations in each cycle for parallel processing a set of operands and producing up to four results. However, it cannot issue more than one memory operation at a time, which loads/stores 128-bit scalar/vector data from/to data cache. Four 32-bit results can be written back into VecLIW register file. The complete design of our proposed VecLIW processor is implemented using Verilog HDL.
Recognition Of Punjabi Script Character And Number For Multiple Fonts
Guriqbal Singh, Vikas Mongia
In this paper there is telling about a easy and quick algorithm for recognition of Punjabi script which included both character and number. This algorithm is designed for multiple fonts because the fonts used in newspaper, magazines and books are different. We apply morphological operations on binary images. There is no need of any knowledge of phase or any kind of memory. Main advantage of this algorithm is its correctness to identify Punjabi characters and number. Only a very few work can be traced for character recognition of Indian scripts especially for the North Indian scripts like Punjabi. Input to the system is the scanned images from newspaper, magazines and old books.
A Review on Sentiment Analysis and Visualization of Customer Reviews
Apurva V. Gundla, Prof. Manisha S. Otari
The Web has become an excellent source for gathering consumer opinions. There are now numerous Web sites containing such opinions, e.g., customer reviews of products, forums, discussion groups, and blogs. All these reviews are the opinions of people all over the world about different products. With the growing availability and popularity of opinion-rich resources such as review forums for the product sold online, choosing the right product from a large number of products have become difficult for the user. These sources are underutilized both by consumers and businesses due to their unstructured nature, serial presentation, limited search tools, and low ratio of useful information to the overall amount of data. The proposed system illustrates visual analysis system that performs sentiment analysis and derives insight from a collection of online reviews of products from customer. Effective visual analysis of online customer opinions is needed, as it has a significant impact on building a successful business and helps the customers in decision making process. This paper presents background Study of Sentiment Analysis or Opinion Mining and gives overview of proposed methodology with insights into past research work.
Improvement in Wireless TCP Using Modified Loss Differentiation Algorithm
Shilpa Sharma, Manoj Kumar
TCP was designed to perform on wired networks, where packet loss is mostly caused by congestion, as compared to wireless networks, where losses due to error in channel are more likely. Hence TCP respond to all kind of losses by invoking congestion control and avoidance schemes resulting in performance degradation. In this thesis, a modified Loss Discrimination Algorithm is proposed which identifies the actual cause of packet loss and accordingly adaptively decreases the congestion window size in case of congestion loss and maintains the congestion window size in the case of wireless loss. Loss Differentiation Algorithms (LDA) are used to identify the actual cause of the packet loss so as to improve the performance of the wireless Network. This algorithm analyse the behaviour of Packet Inter-Arrival Time, ROTT (Relative One way Trip Time) and gives an idea of the cause of packet loss to the TCP. Experimental results validate the ability of our proposed algorithm to successfully classify the cause of the packet loss, with low End-to-End Delay and high packet delivery ratio. The Throughput is also better than before.
This mechanisms allow users to sign on only once and have their identities automatically verified by each application or service they want to access afterwards. There are many practical and secure single sign-on models even though it is of great importance to current distributed application. Many application architectures required the user to memorized and utilize a different set of credentials (eg, username/password or tokens) for each application he/she wants permission. In this approach is not practical and not secure with the exponential growth in the number of applications and services a user has to access both inside corporative environments. This is a new authentication mechanism that enables a legal user with a single credential to be authenticated by multiple service providers in distributed computer networks. In this paper we proposed a new single sign-on scheme and claimed its security by providing well-organized security arguments. In this paper shows the Chang & Lee scheme and it aims to enhance security using RSA encryption and decryption. The programming part is done using socket programming in Java. Identification of user is an important access control mechanism for client–server networking architectures. The goal of this platform is to eliminate individual sign on procedures by centralizing user authentication and identity management at a central identity provider. In this paper a SSO the user should seamlessly authenticate to his multiple user accounts (across different systems) once he proves his identity to the identity provider.
Cloud Computing provides the means through which everything from computing power to computing infrastructure, applications to personal collaboration can be delivered to you as a service whenever you need. This study was motivated by the fact that most Nigerian industries have experienced unexpected loss of files from their system units hence virus infection and/or some other sudden crash of the Hard disks. The study therefore seeks access cloud computing, its benefit to business organizations and implementation to Nigerian industries. The opinions of 500 respondents working in some industries in the South Eastern Nigeria were sampled through questionnaires statistically analyzed using the weighted mean average method. The result shows that the benefits of Cloud Computing package, provision of up-scaling opportunities and shared service, as well as easier allocation of resources to a diversity of users. However, these benefits were found to come with some socioeconomic and business implication.
Performance of Induction Motor Drive by Using Modular Multilevel Converter With Battery Energy Sources
T.Lakshman Kumar, P.Siva Krishna 2 M.Tech
This paper presents a control scheme for the Modular Multilevel Converter (MMC) to drive a variable- speed AC machine, especially focusing on improving dynamic performance. Theoretically, the energy balance in the MMC cell capacitors is prone to be unstable at start-up and at low frequency operations. Additionally, the MMC topology essentially requires advanced control strategies to balance energy and suppress the voltage pulsation of each cell capacitor. This paper proposes a control strategy for the robust dynamic response of MMC even at zero output frequency employing leg offset voltage injection. The leg offset voltage for balancing the arm energy is produced by direct calculation without the circulating current control loop controller. Thanks to the highly dynamic leg offset voltage from direct calculation and not conventional circulating current controller, the dynamic performance of the MMC at low speeds has conspicuously improved. The AC machine has been driven from standstill to rated speed without excessive cell capacitor voltage ripples utilizing this proposed strategy. The simulation and experimental results verify that stable operation is guaranteed down to less than 2 % of the rated speed under 40% step load torque disturbance.
The Adoption of Knowledge Management Development System in Nigeria Higher Education
Amanze B C, Nwoke B.C, Amaefule I. A
The rate of diffusion of knowledge management developmental systems in developed countries may now have reached the late majority phase of Rogers’ diffusion adoption model, given the large number of higher educational institutions that have adopted this technology for improving the quality of teaching and learning in the area of course delivery, quick access to information, operating costs reduction, information avalanche, online testing, quiz, online collaboration, submission of assignment, enhance feedback process, information consistency, self-study, on-demand course material availability and announcements to mention a few (Bhuasiri et. al, 2012).
However, the rate of diffusion of this emerging technology in developing countries is still very slow (Bhuasiri et. al, 2012). For example , several institutions in Nigeria are not following this best practice in modern educational system, hence an in exhaustive exploratory case study was conducted at Imo State University using interview and questionnaire data generation methods to find out the barriers that might be impeding higher education in Nigeria from taking advantage of this educational technology break through. In addition, the study was conducted to identify enablers that may counter barriers and act as catalyst to enablers identified to increase the rate of adoption of this technology in developing countries.
A Study of Two Stage Operational Transconductance Amplifier using Floating gate MOSFET
Vijeta, Dr. Subodh Wairya
This paper presents a two stage operational transconductance amplifier realized using floating gate MOSFETs in differential inputs. A configuration of two stage operational transconductance amplifier using floating gate MOSFET for low power and low voltage applications is presented. Here we design a two stage operational transconductance amplifier using floating gate MOSFET in HSPICE 180nm CMOS technology with the entire transistor in the saturation region. The simulated output transient response and frequency response is shown for a supply voltage of 1V using Cosmos Scope in HSPICE. DC gain is 60dB, settling time 550ns and power consumption 3.06pW.
Quantitative Analysis of Apriori and Eclat Algorithm for Association Rule Mining
Tanu Jain, Dr. A.K Dua Varun Sharma
Apriori and Eclat algorithms are the mostly used algorithms in the area of association rules mining. They are generally used for mining of frequent item sets and to discover associations between these frequent item sets. R is a domain specific language for data analysis and analytics. It is already being used across different disciplines from Computer Science to Social Sciences. In this research a qualitative and quantitative analysis of Apriori and Eclat algorithms is done using R Environment. Different R-Packages and libraries are used for the access of different datasets and their connectivity with R. In this research, both algorithms have been implemented using different data sets and are further analysed on the basis of their performance. The performance analysis is based on total execution time taken by these algorithms in order to identify their quantitative performance and speedup with different volume of datasets.
S.Ashwini (Pg Scholar) , P.Thirapaiah Assistant Professor
A High-Speed Montgomery Modular Multiplication Algorithm To Reduce The Energy Consumption Based On RSA Cryptosystems
S.Ashwini (Pg Scholar) , P.Thirapaiah Assistant Professor
In the age of information, security issues play a crucial role. Security comes with three points’ confidentiality, integrity and availability. The entire above said thing will come from an efficient cryptographic algorithm. Cryptosystem is usually achieved by repeated modular multiplications on large integers. To speed up the encryption decryption process, many high-speed Montgomery modular multiplication algorithms and hardware architectures employ carry save addition to avoid the carry propagation at each addition operation of the add-shift loop. In this paper, we propose an energy-efficient algorithm and its corresponding architecture to not only reduce the energy consumption but also further enhance the throughput of Montgomery modular multipliers. The proposed architecture is capable of bypassing the superfluous carry-save addition and register write operations, leading to less energy consumption and higher throughput. In addition, we also modify the barrel register full adder (BRFA) so that the gated clock design technique can be applied to significantly reduce the energy consumption of storage elements in BRFA. Experimental results show that the proposed approaches can achieve up to 60% energy saving and 24.6% throughput improvement for 1024-bit Montgomery multiplier.
An Efficient Structured Sparsity Model For Reverberant Speech Separation
Khamarunnisa P. , Sherikh K. K
The growth of technology in this world is at a very high rate and hence the need to cope up with it is essential. In the field of communication, speech is one with the topmost priority. Performance of current speech recognition systems severely degrades in the presence of noise and reverberation. While rather simple and effective noise reduction techniques have been extensively applied, coping with reverberation still remains as one of the toughest problems in speech recognition and signal processing. Reverberation in speech is one of the primary factors which degrade the quality of the audio by persistence of audio in space by creating large number of echoes. Reverberation degrades the speech signal when recorded by a distant microphone and in the hands free telephonic scenarios. This reverberation corrupts the speech signal and it is difficult to carrying out communication in automatic voice recognition applications in which the voice is not properly recognized by the voice recognition applications. Reverberation in speech, caused by room reflections, is problematic especially for hands-free telephonic applications in a confined space. The problem is even severe for hearing impaired people. Therefore blind speech dereverberation is an important research area. The task is to remove reverberation from the output of a room, where the room impulse response, as well as the clean speech signal is unknown.
S.Kiranmayi (Pg Scholar) , B. Sanjai Prasada Rao Associate Professor
A Novel Power Saving Approach for Residue Number System Moduli Set Based On Fast Sign Detection Algorithm
S.Kiranmayi (Pg Scholar) , B. Sanjai Prasada Rao Associate Professor
Although lot of research done o residue number system to save power but still it is considered as concerned area in the field of VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS the proposed method presents an sign detection unit offers significant savings in delay, area and power compared with the sign detection units and recorded good performance over traditional approaches. The processing’s of the proposed work is performed in two steps namely, first, a sign detection algorithm for the restricted moduli set is described. The new algorithm allows for parallel implementation and consists exclusively of modulo 2n additions. Then, a sign detection unit for the moduli set {2n+1 − 1, 2n − 1, 2n} is proposed based on the new sign detection algorithm. The unit can be implemented using one carry save adder, one comparator and one prefix adder First, a sign detection algorithm for the restricted moduli set is described. The new algorithm allows for parallel implementation and consists exclusively of modulo 2n additions. Then, a sign detection unit for the moduli set {2n+1 − 1, 2n − 1, 2n} is proposed based on the new sign detection algorithm. The unit can be implemented using one carry save adder, one comparator and one prefix adder. Finally the experimental results shows that the proposed work offers 63.8%, 44.9%, and 67.6% savings on average in area, delay and power, respectively, compared with a unit based on one of the best sign detection algorithm.
B.Swarupa (Pg Scholar) , Y. Subhash Kumar Assistant Professor
Analytical Approach For Decoder Delay Reduction Sec-DED-DAEC Codes Derived From Orthogonal Latin Square Codes
B.Swarupa (Pg Scholar) , Y. Subhash Kumar Assistant Professor
Although tremendous progress has done in past years on memory designing but still Radiation-induced soft errors is concerned area in the field of soft memories and the single error correction double error detection (SEC-DED) codes are commonly used to give assured memory contents with absence of corrupted scenario. Since SEC-DED codes cannot correct multiple errors, they are often combined with interleaving. Interleaving, however, impacts memory design and performance and cannot always be used in small memories. This limitation has spurred interest in codes that can correct adjacent bit errors. In particular, several SEC-DED double adjacent error correction (SEC-DED-DAEC) codes have recently been proposed. Implementing DAEC has a cost as it impacts the decoder complexity and delay. Another issue is that most of the new SEC-DED-DAEC codes miscorrect some double nonadjacent bit errors. In this brief, a new class of SEC-DED-DAEC codes is derived from orthogonal Latin squares codes. The new codes significantly reduce the decoding complexity and delay. In addition, the codes do not miscorrect any double nonadjacent bit errors. The main disadvantage of the new codes is that they require a larger number of parity check bits. Therefore, they can be useful when decoding delay or complexity is critical or when miscorrection of double nonadjacent bit errors is not acceptable. The proposed codes have been implemented in Hardware Description Language and compared with some of the existing SEC-DED-DAEC codes. Finally the experimental results confirm the reduction in decoder delay.
Comparison of Empirical Models in the Estimation of Global Solar Radiation over Nigeria
J.T Azoom, J.U. Ugwuanyi, E.I Echi
The performance of both temperature and Sunshine dependent models were evaluated for the estimation of global solar radiation over Nigeria using relative sunshine duration, mean monthly minimum and maximum air temperature and extraterrestrial solar radiation (Ro). The monthly global solar radiation was estimated for 10 years (2001-2010). The Angstrom-Prescott (1924), Hargreaves and Sammani (1982) and Garcia (1994) models were used. Sokoto, Enugu, Port Harcourt and Oyo were chosen for the study. New Armstrong –type equations were formulated for each city with new coefficient constants.
From the models compared, the improved Angstrom-Type models performed best with a RMSE of 0.00000241, 0.00028, 0.0127, and 0.000935 for Enugu, Oyo, Port Harcourt and Sokoto respectively. This was closely followed by the Hargreaves and Sammani Model and the Angstrom-Prescott model. The Garcia model performed least.
Sokoto recorded the highest global solar radiation in Nigeria with the month of April having 21.598MJ/M2/ day, While Oyo has the least with 8.630 MJ/M2/ day during the month of August. Consequently the developed Angstrom-type models can be used with confidence for each of the cities in Nigeria and other locations with similar latitudinal variations
A Literature Review on Quantization Table Design for the JPEG Baseline Algorithm
S.P.Naresh, B.Vinoth Kumar, Dr.G.R.Karpagam
JPEG is widely used method for image compression. JPEG image compression involves a sequence of steps in which quantization process plays a major role in compression process. Quantization table decides the quality of the encoded image and also controls the amount by which image should be compressed (compression ratio). Hence generation of quantization table in the JPEG baseline algorithm is viewed as an optimization problem. For the past few decades, numerous researches have been conducted to generate optimal Quantization table for a given image and they are categorized as follows; Rate-distortion approach, Human Visual System approach and Meta-Heuristics approach. In this paper, an extensive survey is made on these methods to generate optimized quantization table for the JPEG baseline algorithm
Detection Monitoring Of Secure Packet Transfer Over Network Traffic
Mrs.M.Shyni, Mrs.D.Ruby
In the world of Networks, Everything on the Internet involves packets. Web page constitutes of a series of packets, and every e-mail get transfers as a series of packets. In the Proposed methodology, a monitoring system has been designed for tracing the packet transfer between the source and destination. A strategy of pattern matching has been utilized to monitor the source and destination content for its originality based on the water marking security concepts. In the proposed methodology, the monitoring system has been designed with leakage analyzer for checking the intrusion or leakage of packets between the transfers of source to destination. A security based packet tracing has been designed and the performance of the monitoring system has been visualized graphically.
Prevention of Blackhole Attack over AODV and DSR MANET Routing Protocol
Shabnam Sharma, Meenakshi Mittal
Wireless technology is one of the biggest contributions to mankind. In wireless system, transmission of information can be done without the need of wires and cables. Mobile Adhoc Networks (MANETs) do not have any centralized administration. They are infrastructure-less networks. They do not contain any networking device like routers or access points. MANETs are self-starting and dynamicnetwork comprising of mobile nodes. Mobile Ad-hoc networks require routing protocols for communication among nodes. Due to the lack of centralized management, various attacks are possible in MANETs such as passive or active attacks. Blackhole attack is an active kind of attack in which a malicious node pretendsto have a shortest and fresh path to the destination. Blackhole attack affects the performance by disrupting the normal communication in the network. Therefore, there is need to prevent the network from attack. In this paper, prevention of blackhole attack is done over AODV and DSR routing protocol with Random Waypoint Model. Malicious nodes in the network are known and if malicious nodes encounter in between the route from source to destination, then intermediate node have to simply discard that path and have to find an alternate path.The simulation results show that AODV routing protocol performs best and is suitable for highly dynamic networks.
Konda. Hari Krishna, Dr. Y. Suresh Babu , Dr. Tapas kumar
A Comparative Study on Various Wireless Sensor Network Tools
Konda. Hari Krishna, Dr. Y. Suresh Babu , Dr. Tapas kumar
Wireless sensor network have recently come into prominence because they hold the potential torevolutionize segment of our economy and life with its wide applications. Unlike a centralized system, a sensor network is formed by large numbers of networked sensing nodes. They are having unique set of resource constraints such as finite onboard battery power and limited network communication bandwidth. Since running real experiments is costly and time consuming, simulation is essential to study Wireless Sensor Networks (WSN). It is rather complex, or even unfeasible, to model analytically a WSN and it usually leads to oversimplified analysis with limited confidence. Therefore, simulation is essential to study WSN. The word “wise” in the title indicate the meaning most appropriate according to their usage and testing
Energy Efficient Secure Routing in Manets Based on Multipath Erasure Coding
Sethulekshmi C G, Manoj Kumar G
Wireless networks can be mainly categorized as, infrastructure wireless networks and infrastructure-less wireless networks. MANET is a type of infrastructure-less wireless network. It is a collection of nodes that dynamically connected together to form a network without using any fixed infrastructure. As it is infrastructure less network, the information or data packets are send between the nodes with the help of radio signals and each node act as routers. Providing efficient networking services in MANETs is very challenging due to mobility and unpredictable radio channel: a significant number of packets can be corrupted or lost. To increase reliability, various measures have been proposed. A more efficient way is to use Network Coding on top of path redundancy and send different, encoded packets on each path. Network coding can improve throughput efficiency. In this work proposing Multipath Erasure Coding for high energy efficient. The use of erasure codes in networks has proved to be promising in order to make communication more robust against both independent and correlated data losses. In particular, erasure codes are an appealing solution to provide communications with increased reliability. Experimental results exhibit consistency with the theoretical analysis, and show that the proposed method achieves higher efficiency when compared to other routing protocol.
A New Approach to Automatic Generation of An All Pentagonal Finite Element Mesh For Numerical Computations Over Convex Polygonal Domains
H.T. Rathod , K. Sugantha Devi
A new method is presented for subdividing a large class of solid objects into topologically simple subregions suitable for automatic finite element meshing with pentagonal elements.
It is known that one can improve the accuracy of the finite element solution by uniformly refining a triangulation or uniformly refining a quadrangulation. Recently a refinement scheme of pentagonal partition was introduced in [31,32,33]. It is demonstrated that the numerical solution based on the pentagonal refinement scheme outperforms the solutions based on the traditional triangulation refinement scheme as well as quadrangulation refinement scheme. It is natural to ask if one can create a hexagonal refinement or general polygonal refinement schemes with a hope to offer even further improvement. It is shown in literature that one cannot refine a hexagon using hexagons of smaller size. In general, one can only refine an n-gon by n-gons of smaller size if n ≤ 5. Furthermore, we introduce a refinement scheme of a general polygon based on the pentagon scheme. This paper first presents a pentagonalization (or pentagonal conversion) scheme that can create a pentagonal mesh from any arbitrary mesh structure. We also introduce a pentagonal preservation scheme that can create a pentagonal mesh from any pentagonal mesh. This paper then presents a new numerical integration technique proposed earlier by the first author and co-workers, known as boundary integration method [34-40] is now applied to arbitrary polygonal domains using pentagonal finite element mesh. Numerical results presented for a few benchmark problems in the context of pentagonal domains with composite numerical integration scheme over triangular finite elements show that the proposed method yields accurate results even for low order Gauss Legendre Quadrature rules. Our numerical results suggest that the refinement scheme for pentagons and polygons may lead to higher accuracy than the uniformrefinement of triangulations and quadrangulations.
Analytical Channel Estimation Approach For OFDM System Based On Near-Optimal Dft-Based Channel Estimator With Leakage Nulling
M. Gowtham Reddy, D. Vijayakumar Reddy
Although tremendous progress has been made on the past years on channel estimation in ofdm systems still it is considered as area of concern in wireless communication. A novel channel estimation technique with virtual sub carriers is proposed in this work namely a low-complexity but near-optimal DFT-based channel estimator with leakage nulling is proposed for OFDM systems using virtual subcarriers. The flow of the proposed approach is initially starts with time-domain (TD) index set estimation considering the leakage effect then followed by low-complexity TD post-processing to suppress the leakage. The proposed channel estimator approach outperforms the existing channel estimators in terms of efficiency and performance. Finally the performance and complexity of the proposed algorithm are analyzed by simulation results.
A Novel Approach For Papr Reduction And Mitigating The Companding Distortion By Using Piece Wise Linear Companding Framework
Pokuru Naveen kumar, D.Srihari
In the OFDM communication system the main disadvantage factor is Peak Average to Power Ratio (PAPR) which limits the performance of the overall system. To limit this factor in the OFDM system there are so many techniques are there, depends on the nature of the system like clipping, Partial transmission, Selective mapping, Companding transform etc, in these technique companding technique is the a simple methodology to compress or compand the input signal based on the inflection points to reduce the PAPR in the system, while decompander is the technique in the receiver to expand the companded signal from the transmitter section in the OFDM. The piecewise linear companding is based on the linear equations to compress the OFDM sequence where the companding distortion should considered, in this paper we present a efficient companding based on the piecewise linear equations. The whole system considered under ETU channel model. The simulation results show that a reduced PAPR and optimal BER rate of the OFDM system.
AN EFFICIENT POWER-CONSTRAINED CONTRAST ENHANCEMENT ALGORITHM FOR OLED DISPLAYS USING MULTI SCALE RETINEX ALGORITHM
A. Prem Kumar reddy, K. Prushotham Prasad
A Novel calculation for imperativeness obliged differentiation upgrade Algorithm utilizing SDMSR was propose . As a rule, MSR, which is the key segment of the proposed calculation, comprises of force controllable log operation and sub band wise increase control. To start with, we decay an info picture to MSRs of distinctive sub-groups, and figure a fitting addition for every MSR. Second, we apply a coarse-to-fine power control system, which recomputes the MSRs and additions. This step emphasizes until the target force sparing is precisely fulfilled. With feature successions, the differentiation levels of adjoining pictures are resolved reliably utilizing fleeting soundness as a part of request to abstain from glinting antiquities. At long last, we display a few improvement aptitudes for ongoing preparing. Test results demonstrate that the proposed calculation gives preferable visual quality over past techniques and a steady power-sparing degree without glimmering ancient rarities, actually for feature arrangements.
A Novel Reversible De-Identification Approach For Lossless Image Compression Based On Reversible Watermarking Mechanism Based On Obfuscation Process
Ghatamaneni Tejaswini, T.Venkataramana
Although tremendous progress has been made in the past years on watermarking for protecting information from incidental or accidental hacking, there still exists a number of problems. De-Identification is a process which can be used to ensure privacy by concealing the identity of individuals captured by video surveillance systems. One important challenge is to make the obfuscation process reversible so that the original image/video can be recovered by persons in possession of the right security credentials. This work presents a novel Reversible De-Identification method that can be used in conjunction with any obfuscation process. The residual information needed to reverse the obfuscation process is compressed, authenticated, encrypted and embedded within the obfuscated image using a two-level Reversible Watermarking scheme. The proposed method ensures an overall single-pass embedding capacity of 1.25 bpp, where 99.8% of the images considered required less than 0.8 bpp while none of them required more than 1.1 bpp. Experimental results further demonstrate that the proposed method managed to recover and authenticate all images considered.
A Novel Optimized Approach for Underwater Acoustic (UWA) Cooperative Communication Systems to Achieve Delay Diversity
G. R. Karthick (PG Scholar)
The communication through water is different scenario from the communication on the land, while transmission through the water the delays are frequently happens when the signals received from geographically separated nodes. Moreover, UWA communications enable high motion agility and flexibility of the nodes, and allow interactive system query and instantaneous system response. The UWA environment is commonly viewed as one of the most challenging environments for wireless communications and networking. It differs from the terrestrial radio environment in many different aspects. Although tremendous progress has been made in the past literature but still the synchronism issues is concerned area in the field of UWA communications. To resolve the issue of the synchronism issues usage of the OFDM communication system is employed and transmissions at the source node by preceding every OFDM block with an extremely long cyclic prefix (CP) which reduces the transmission rates dramatically. One may increase the OFDM block length accordingly to compensate for the rate loss which also degrades the performance due to the significantly time-varying nature of UWA channels. In this paper, we develop a new OFDM-based scheme to combat the asynchronism problem in cooperative UWA systems without adding a long CP (in the order of the long relative delays) at the transmitter. By adding a much more manageable (short) CP at the source, we obtain a delay diversity structure at the destination for effective processing and exploitation of spatial diversity by utilizing a low complexity Viterbi decoder at the destination, e.g., for a binary phase shift keying (BPSK) modulated system, we need a two-state Viterbi decoder. We provide pair wise error probability (PEP) analysis of the system for both time-invariant and block fading channels showing that the system achieves full spatial diversity. Finally the simulation results shows that performance of the proposed method is good over the conventional state of the art methods and extensive simulations that the proposed scheme offers a significantly improved error rate performance for time-varying channels (typical in UWA communications) compared to the existing approaches.
E. Dhana Lakshmi (Pg Scholar) , Syed Sultan Mahmood Professor
Analytical Analysis Of Implementation Issues And Its Practical Applicability In DVB-NGH Single Frequency Networks
E. Dhana Lakshmi (Pg Scholar) , Syed Sultan Mahmood Professor
The role of the television has huge impact on the 21st century and basically the televisions either make use of SFN single frequency networks (SFN) or multi frequency networks (MFN) and both these networks are ideal for meeting the practical requirements either in local and global services. Another important drawback in these two networks are these two networks consumes huge amount of spectrum. The single frequency networks (SFN) main approach is it radiates the same amount of signal both in terms of time and frequency and Without violating the SFN principle, local services meant to address sub-regions of an SFN must therefore be transmitted throughout the whole network, causing inefficient distribution of local services. A novel approach has been proposed in this paper where high equipped next generation mobile broadcasting standard digital video broadcasting—next generation handheld for providing global and local contents in SFN topologies: hierarchical modulation (H-LSI) and orthogonal local services insertion (O-LSI) techniques. H-LSI uses hierarchical modulation to transmit local services on top of the global services in areas close to the transmitters, by transmitting the local services in the low priority stream and the global services in the high priority stream. The O-LSI scheme specifies groups of OFDM subcarriers in specific OFDM symbols for the exclusive use of particular transmitters to transmit local services. For both techniques, the transmission of local content through the whole SFN network can be scheduled in a way that different local areas do not interfere with each other. In addition to the description of both H-LSI and O-LSI schemes, the applicability of these approaches in terms of network topologies, implementation issues, and performance evaluation are analyzed.
Analytical Approach for PAPR Reduction and Mitigating Companding Distortion Using Piecewise Linear Companding
K.Harika, M. Saritha Devi
In the OFDM communication system the main disadvantage factor is Peak Average to Power Ratio (PAPR) which limits the performance of the overall system. To limit this factor in the OFDM system there are so many techniques are there, depends on the nature of the system like clipping, Partial transmission, Selective mapping, Companding transform etc, in these technique companding technique is the a simple methodology to compress or compand the input signal based on the inflection points to reduce the PAPR in the system, while decompander is the technique in the receiver to expand the companded signal from the transmitter section in the OFDM. The piecewise linear companding is based on the linear equations to compress the OFDM sequence where the companding distortion should considered, in this paper we present a efficient companding based on the piecewise linear equations. The whole system considered under ETU channel model. The simulation results show that a reduced PAPR and optimal BER rate of the OFDM system.
Content Based Medical Image Retrieval Using Fuzzy Gaussian Mixture Model with Relevance Feedback
G.Asha Sowjanya and Mrs.S.Jhansi Rani
Content Based Medical image retrieval can assist physicians in binding information supporting their diagnosis. Systems that allow to search for medical images need to provide tool for quick and easy navigation as the time for information search is very easy to find the images. Relevance feedback is a powerful tool for information retrieval. Content-based image retrieval with relevance feedback schemes based on Method Fuzzy Logic Gaussian Mixture model didn’t require much time when compared to GMM. Also FLGMM gives efficient clustering. It gives best result for overlapped data sets. It is used to retrieve the medical image effectively and efficiently. Results show the potential of relevance feedback techniques in medical image retrieval and the superiority of the proposed algorithm over commonly used approaches. This technique users to retrieve a similar query images from a database.
The purpose of this research is to build a machine learning model to predict the genre of a song. This paper analyzes a song as a wave and determines the factors involved and predicts the genre. Application of the model is primarily to automatize the process of genre identification which shall aid in building of music recommendation systems.
An adapted decision based unsymmetrical trimmed mean filter cascaded with Gaussian filter (ADCG) algorithm for the retrieval of gray scaled image which is induced by a very high density Salt and Pepper (impulse) noise is proposed and tested in this paper.
The proposed calculation supplants the noisy pixel by trimmed mean quality when other pixel values, 0's and 255's are available in the selected window and when all the pixel qualities are 0's and 255's then the noisy pixel is supplanted by mean estimation of the considerable number of components present in the selected window. This proposed methodology shows preferred results over the Standard Median Filter (MF), Decision Based Algorithm (DBA), Modified Decision Based Algorithm (MDBA), Progressive Switched Median Filter (PSMF) and Modified Decision Based Unsymmetrical Trimmed Median Filter (MDBUTMF). The proposed methodology is tried against distinctive pictures and it gives better PSNR that is Peak Signal-to-Noise Ratio.
Implementation of Surveillance robot with the feature of semi automatic recharging capability
T.AMULYA, M.VEDACHARY, P. SRILAXMI
This paper presents the design and implementation of a surveillance system with semi automatic battery recharging capability for the prolonged activities of robots. A battery recharge station is proposed to implement battery off‐line recharging when it’s drained. The surveillance robot is a wheeled robot with an onboard camera and a rechargeable battery case in the front. It communicates with the user wirelessly through Wi-Fi network. As the system powered up the surveillance robot will move across the area avoid obstacles using infra red sensor and by exporting the battery voltage values over web for user reference, when on board battery is low then the threshold value, the robot will stop then the user can route the robot to the docking station using web based controls. After the battery is completely charged the robot will be unlocked from docking station and continuous its surveillance. The experimental results show that the system is working with 95% accuracy. The proposed system is proved to be efficient in security applications that need the robots to work continuously over a long period.
MYCIN was the one of the initial expert systems to perform with the level of expertise of a human expert and to provide users with complete explanation of its logical reasoning. MYCIN played a benchmark of most of the expert systems which were developed after MYCIN. Moreover, the techniques which were developed for MYCIN expert system have become most widely available design in the various small expert system building tools. It was designed to aid doctors in proper diagnosis and treatment of bacteremia infections. MYCIN was strictly a research system. The present paper provides summary of rule application concepts of MYCIN expert system.
Chanda Sivakantha Reddy (PG Scholar) , B. Naga Rajesh Assistant Professor , . Chandra Sekhar Assistant Professor
Performance Evaluation Analysis Of An Interference Alignment Based Precoding In Mimo-Ofdm System
Chanda Sivakantha Reddy (PG Scholar) , B. Naga Rajesh Assistant Professor , . Chandra Sekhar...
Although tremendous progress has made in the past years to eliminate the inter-block interference (IBI) but still it is considered as area of concern in orthogonal frequency division multiplexing system. We proposed interference alignment based channel independent precoding in MIMO OFDM system. We showed that when the number of receive antennas (nr) is not more than the number of transmit antennas (nt), our proposed precoding is more bandwidth efficient than the conventional zero-padded or CP added MIMO systems, such as, ZP-only, CP-OFDM and SC-FDE system and When the number of receive antennas is more than the number of transmit antennas, it was shown that the IBI in an MIMO OFDM system can be completely eliminated without any CP or zero-padding or precoding, when the OFDM block size is not too small. In this paper, we consider only CP based block transmission system.
Speech Enhancement using Spectral Subtraction-type Algorithms: A survey on Comparison
Pinki, Sahil Gupta
The term “Speech Enhancement” refereed as to improve quality or intelligibility of speech signal. Speech signal is often degraded by additive background noise like babble noise, train noise, restaurant noise etc. In such noisy environment listening task is very difficult at the end user. Many times speech enhancement is used for pre processing of speech for computer speech recognition system. In this method, the noise spectrum is estimated during speech pauses, and is subtracted from the noisy speech spectrum to estimate the clean speech. This is also achieved by multiplying the noisy speech spectrum with a gain function and later combining it with the phase of the noisy speech. The drawback of this method is the presence of processing distortions, called remnant noise. A number of variations of the method have been developed over the past years to address the drawback. These variants form a family of spectral subtractive-type algorithms. The aim of this paper is to provide a comparison and simulation study of the different forms of subtraction-type algorithms viz. basic spectral subtraction,Modified Spectral Subtraction , multi-band spectral subtraction, iterative spectral subtraction, and spectral subtraction based on perceptual properties.
The corporate network those are working in same sector needs to share information frequently and facilitates collaboration. Certain companies with common interest effectively shares data to reduce operational cost and increases revenues. In this Project, we develop a system which provides functionality among these companies to share data with security , scalability, high performance and high throughput .It also provides elastic data sharing among these companies in a network Based P2P data management with the help of Bootstrap peer. Bootstrap peer acts as a entry point for join and departure of nodes and it also provides access control to those peer and also it manages metadata of whole network .By integrating data base and P2P technology, BestPeer++ gives low cost, flexible and scalable platform for data sharing.
This paper deals with loading artificial functions to a robot based on scheduling. Here, scheduling is the one which is used to avoid the delay between appplications. Based on RTOS scheduling has been done. Using zigbee communication the indications are given to the monitoring section. The semantic time scheduling is done to run all applications at a time without any time delay. The paper involves two sections 1. Robot module and 2. Monitoring section. The robot section deals with the data receiving from sensor nodes without any delay. The robotic section runs with RTOS and LPC2929 and acts as master node to which sensors are connected. In the monitoring section the data will be received from the sensor nodes .
Enhancing Security On Mosaic Images Using Cryptographic Algorithm And Compression Technique-A Review
Ms. Nilam Gandhe, Prof. Mr. Mayur Dhait
A new technique is proposed for secure image transmission, which automatically transforms large-volume secret image into secret-fragment-visible mosaic image of the same size. The mosaic image is obtained by dividing the secret image into fragments and transforming their color characteristics to be those of the corresponding blocks of the target image. It looks similar to an arbitrarily selected target image and may be used as a camouflage of the secret image. We proposed a approach to enhance security of the mosaic image by providing better Encryption logic which provide faster encryption. And for the sake of transmission we proposed JPEG lossless compression technique which provide good compression ratio.
The Challenges of National e-ID for Kurdistan Region government for Multi-purposes
Mazen Ismaeel Ghareb
Kurdistan in Iraq is a non industrial region in in Iraq. Since 1992, Kurdistan parliament has declared some rules and regulating in diverse areas omit Assemblage technologies and bearing electronics scheme. The National E-ID project brings an optimized frequent platform for Carpet Region Authorities to interact with varied authorities, agencies and transact electronically, and has been set up to promote comprehensive citizenship, impelling governance, the cashless action and efficient ontogeny. With the integration of driver’s license, voter registration, health insurance, tax and pensions into one platform, the project is expected to transform both the way the government interacts with the public and the future development of Kurdistan Region Iraq KRI. The National e-ID project has been brought in to address these issues. The need for a trusted identity system has also been fuelled by such factors as the growing threat of kidnappings and terrorist attacks, rapid growth in the telecoms industry, the population is declining inclination to travel long distances to access government services, and the recent government policy shift towards a cashless economy with a focus on information and communication technologies. Since 2010 this project has been announced, it but till this moment it does not apply yet. A core element of the project is the new multi-purpose e-ID card combining several applications, including MasterCard’s prepaid payment technology and Cryptovision’s biometric identification technology using Public Key Infrastructure. This study tries to investigate similar E-national ID system and shows signs of this project as a starting point of E-Government and how it can be integrated into other public and private services to save time and money for our KRI citizens, adding more give a general recommendation for future usage of this system.
With the growing expansion of information on World Wide Web, web sites are facing challenges to meet their customers’ needs to present them with the information they are interested in. Recommender systems have emerged as a solution to this issue. Recommender system makes predictions for the users based on the analysis of their past behaviour. It is majorly classified in three categories which include: content based collaborative filtering and hybrid recommender system. Recommender systems have become an integral part of internet. They are becoming popular in the area of data mining, information filtering and e-commerce. In this paper, we have presented our study of various recommender techniques. We have also described the limitations of various recommendation techniques
Review of Social Collaborative Filtering Recommender System’s Methods
Pratibha Yadav, Kumari Seema Rani Sonia Kumari
Recommender Systems plays a vital role in e-commerce. The goal of recommender system is to present the user with the personalized information that matches with the user’s interest. Now a days, user’s interest is leaning towards social networks. Social Networking Sites provide users a platform to connect and share their information with other users who share similar interests with user. The popularity of social networking sites is increasing day by day. Recommender systems are now using the social information for their analysis and prediction process. Collaborative filtering approach is assumed to be the broadly approved technique of recommender system. Collaborative filtering method recommends an item to a user based on the preferences of other users who share analogous interest with the active user. In this paper, we have presented a study of collaborative filtering based social recommender system.