Nowadays electricity has become the most important aspect of life without which no work can be performed or completed. So this paper introduces about electricity management via Android application. As to manage electricity in a very efficient way, we are providing postpaid and prepaid billing system to customer. Also task of human intervention will get reduced as there will be no manual reading. The meter reading will be transmitted wirelessly to the local server along with the meter number. This data will be fetched by the server and generate bill automatically .The user will be able to view updated power consumption as well as billing information in provider web services. When bill is generated SMS alert will be send to the owner's mobile number. If in case the owner has not paid his bill, cut-off warning messages will be send to users via e-mail and SMS.
: Insurance is a business of risk. Hence, risk analysis in insurance is very important. Insurance means insurance companies taking over risks from customers. Level of risks determines insurance premiums. Insurers consider every available quantifiable factors to develop profiles of high and low insurance risk. Insurances involving factors with greater risk of claims are charged at a higher rate. With much information at hand, insurer can evaluate risk of insurance policies at much higher accuracy. However, advancement in the insurance industry has been hampered by a lack of investment in data mining technology. In its absence, product designers are forced to work with limited detailed data about policyholders and claim histories. Instead, they rely on data summarizations (actuarial tables summarize data), supplemented by intuitive feelings to guide the development of new policy products, creative rating structures and appropriate premium charges. This paper presents a data mining approach and its application to insurance risk analysis. Our model uses decision tree techniques to analyze risk levels into categories (classes) based on past insurance claim history. The real dataset used contains information about policies and insurance claims on those policies. Company can now use this information to adapt its premium policy.
With the speedy growth in mobile communication, mobile phone has become a common part for most people. Short messaging service (SMS) is a convenient technology for a user to get the needed information delivered on demand. Different SMS based FAQ retrieval systems are available in which user gives query in SMS language and retrieve ranked result answers from FAQ database where FAQ database contains questions and answers for these questions which are specified by experts. This paper describes a survey of various SMS based FAQ retrieval systems for various domains.
A Smart Real Time Ridesharing And Travel Assistance
Aarthi R
: India is the second populous country in the world. India’s population is about 1.1 billion with an overall density of 336 people per square kilometer. Indian public transport supports various mode of transport such as transport by land, water, air. More than 30% of Indian population is car owners. Traffic is mainly high during peak hours within the cities [2]. In order to reduce traffic congestion, a real time ridesharing is proposed. This method is implemented by developing an android application which is user friendly and has high mobility. Real-time ridesharing is an extension of carpooling to best suite one's preferences using the data collected from social networking. It enables users especially colleagues, classmates, to share their vehicles for travelling to the same destination or nearby destination. In addition to ridesharing, the system gives real time navigation guidance in a map. Users can set their travel to be private or make it available to some of their friends using privacy settings. The concept facilitates to include taxis or rickshaws and also other public transport systems which can set their visibility to public. In case of public transport, passengers can request to board a particular vehicle by looking up the available services in the admin processes and the requests from various users, notifies to them the nearest stopping. Implementation requires integration from social networking sites, location identified using GPS, intelligent processing of the data collected and history maintenance. For ease of use this is incorporated in mobile phones which make use of collection of social networking information and GPS data. This system supports the use of mass public transport system and travelling together which in future may become mandatory to control the depletion of fuel, make the environment green and to control traffic.
Digital watermarking has become a promising research area to face the challenges created by the rapid growth in distribution of digital content over the internet. To prevents misuse of this data Digital watermarking techniques are very useful in which a Secret message called as a watermarks which can be a logo or label is embedded into multimedia data imperceptibly which would be then used for various applications like copyright protection, authentication, and tamper detection etc.. Based on the requirement of the application the watermark is extracted or detected by detection algorithm to test condition of the data.
Wani Suraj R, Ghaywat Vivek V , Naik Akshay D Mandlik Sachin B
IVR System for three phase motor protection, Control and Alert system using GSM
Wani Suraj R, Ghaywat Vivek V , Naik Akshay D Mandlik Sachin B
Control systems have received exceptional attention in the industrial sector as they manage and regulate various systems. This paper is focused on the development of an IVR system for three phase motor control. A new approach is proposed for designing the protection and control unit of the three phase motor using the IVR systems. The main objective is to control the motor from a remote place u sing the mobile DTMF tone and also to receive the motor status feedback through SMS. GSM is found to be the most convenient, cost efficient network to be used for the transmission of the feedback signals at the motor end along with the generation of control signal by mobile DTMF. This control signal and the feedback SMS is transmitted through the GSM modem. Thus, this paper serves as an introduction to a new control technique of a three phase motor which can be effectively used for industrial purposes along with providing an SMS based alert system.
Performance Analysis of Fault Tolerance using Clustering Scheme for Wireless Sensor Network
Swati P. Wankhede, A. N. Thakare
Wireless Sensor Networks (WSNs) are used in many applications in military, ecological, and health-related areas. These applications often include the monitoring of sensitive information such as enemy movement on the battlefield or the location of personnel in a building. Fault Tolerance is therefore important in WSNs. The reliability of wireless sensor networks (WSNs) is affected by faults that may occur due to various reasons such as malfunctioning hardware, software glitches, dislocation, or environmental hazards. A WSN that is not prepared to deal with such situations may suffer a reduction in overall lifetime, or lead to hazardous consequences in critical application contexts. One of the major fault recovery techniques is the exploitation of redundancy, which is often a default condition in WSNs. Another major approach is the involvement of base stations or other resourceful nodes to maintain operations after failures. We present a selforganizing, singlehop clustering scheme, which is based on partitioning sensor networks into several disjoint cliques. Clustering sensor nodes into small groups is an effective method to achieve fault tolerance, scalability, load balancing, routing etc. Here, each node obtains a list of its neighbour’s connectivity as well as their degree of connection at first. Then, the node with highest degree of connection initiates clique formation process and makes the cluster. Among all the members of the cluster, the node with maximum energy is selected as cluster head (CH).Simulations results obtain so far recovers the faults occurred in the WSN and also provide energy efficient network.
Vishal S. Deshmukh, Saurabh M. Titre,Salim A. Chavhan, , Shyam D. Bawankar
Design and Implementation of Multiple LED Notice Boards by Using ZIGBEE Technology
Vishal S. Deshmukh, Saurabh M. Titre,Salim A. Chavhan, , Shyam D. Bawankar
Now days the world becomes so fast that it is important to be with its speed hence we can achieve our aim. It is done by the use of correct, speedy, highly pronounced, reliable system. LED created notice board is maintained at high classified and usable place mainly in big organization where the crowd is first attraction. Due to the manual process of advertisement of notice on notice board there is enough wastage of time, so by use of LED notice board the previous problem is overcome also increases the little bit of profession. The proposed system consist of bunch of LED which is arranged in rectangular box and hence connected with various IC’s by using required technology, also ZigBee is high paramount and imperative prototype which is used at transmitter and receiver. Frame up and package deal of LED must be befitting as it creates ‘VIVIDITY TO VISION’. The whole notice board is connected to ‘master computer’ where slave computers are follower of master computer; both are responsible for directing the message on notice board. Two assortment of microcontroller is arranged at trance-receiver side. So in this paper we build the system in such way only author prized people can run it with the help of software and total system is running under the wireless technology. Keywords- wireless technology, ZigBee, LED
Big-O Test of RSA Algorithm Complexity in Civil DataBase ( SIN / eID )
Jutono Gondohanindijo, Eko Sediyono
Analysis of Algorithms is the area of computer science that provides tools to analyze the efficiency of different methods of solutions. The time efficiency of the algorithms can be characterized by growth rate functions ( Big-O ). Big-O represents how fast does an algorithm grow with respect to N number of steps. The algorithm that will be discussed are taken from computer programs that implemented the RSA Encryption in a Single Identification Number (SIN) or the e-ID CARDS in Indonesia which is a unique identification number that is integrated with the combined data from a variety of government agencies and private sector. RSA Encryption program used to maintain the security and confidentiality of messages, data, or information in a computer network, so that can not be read or understood by just anyone. In this paper, the authors analyze the proper cryptographic system application applied to the integrated data base in SIN (e-ID). Scoring algorithm is based on: execution time (from the most dominant functions), memory usage/resources, the simplicity and clarity of the algorithm. The steps of analysis algorithms developed by specifying a type/nature of the input data, measuring the execution time (Running Time) of each function, analyze mathematically with the data test Big-O with graphs and tables of Polynomial to determine its average case.
Development Of A Circulation Library System(Case Study Of T.Y Danjuma Library - Acu)
Oguntoke Kawthar, Ayeni Joshua , Makinde Oladayo
In order to achieve an easier method of book circulation in libraries, designed and implemented circulation management systems are being pushed as a replacement for the conventional library cards. Library cards can be easily tampered with, lost or passed on to another student. Therefore, automated circulation management system will provide a centralized database of books and management of library circulation activities. This project is intended to have a database where data about the books in the library will be stored and new arrivals will also be registered. Names of students that intend to borrow books in the library will be registered in the circulation system and duration of lease of books would be included. The project aims at automating (designing and implementing) the circulation unit of the library using the T.Y.Danjuma Library of AjayiCrowther University as case study.
A Comprenssive Survey On Different Methods For Detecting Salient Object
Manish M. Paliwal, Prashant N. Chatur
This survey paper consists of various image processing techniques used for the detection of the salient region. The paper also includes the comparative study of these techniques like precession recall analysis and the relative advantages and disadvantages. The major topic of our interest is the Salient Region of the object which is an important factor in most of the areas like cognitive psychology and neurobiology. The various technique are different in there logic and performance the involved. Comparing to all the techniques on there both positive and negative sides the paper presented here is the best in my behalf to its domain knowledge
Performance Evaluation of AODV and DSR Protocols in MANET
Prachi Mishra, Neelesh Gupta
MANETs are being widely used and it is the technology that is attracting a large variety of applications. Routing in MANETs is considered a challenging task due to the unpredictable changes in the network topology, resulting from the random and frequent movement of the nodes and due to the absence of any centralized control. Efficient routing protocols can provide significant benefits to mobile Ad-Hoc networks in terms of both performance and reliability. In this paper, we evaluate the performance of two reactive routing protocols, Ad hoc On demand Distance Vector (AODV) and Dynamic Source Routing (DSR). The major goal of this study is to analyze the performance of well known MANETs routing protocol in random mobility case. Hence it becomes important to study the impact of mobility on the performance of these routing protocols. The simulation has done in NS-2 simulator and the performance is analyzed with respect to performance matrices like Average End-to-End Delay, Normalized Routing Load (NRL), Packet Delivery Fraction (PDF), and Throughput and also measures the performance of TCP and UDP packets. Simulation results verify that AODV gives better performance as compared to DSR
Rohit Sutar , Ashish Malunjkar , Amit Kadam Pravin Jadhav , Prof. Shalini Wankhade
Decision Trees for Uncertain Data
Rohit Sutar , Ashish Malunjkar , Amit Kadam Pravin Jadhav , Prof. Shalini Wankhade
Traditional decision tree classifiers work with data whose values are known and precise. We extend such classifiers to handle data with uncertain information. Value uncertainty arises in many applications during the data collection process. Example sources of uncertainty include measurement/quantization errors, data staleness, and multiple repeated measurements. With uncertainty, the value of a data item is often represented not by one single value, but by multiple values forming a probability distribution. Rather than abstracting uncertain data by statistical derivatives (such as mean and median), we discover that the accuracy of a decision tree classifier can be much improved if the “complete information” of a data item (taking into account the probability density function (pdf)) is utilized. We extend classical decision tree building algorithms to handle data tuples with uncertain values. Extensive experiments have been conducted that show that the resulting classifiers are more accurate than those using value averages. Since processing pdf’s is computationally more costly than processing single values (e.g., averages), decision tree construction on uncertain data is more CPU demanding than that for certain data. To tackle this problem, we propose a series of pruning techniques that can greatly improve construction efficiency.
Identify Obstacles of Different Types in the Path of UGV Using Region Based Image Segmentation
Rajinder Kaur, Amanpreet Kaur
— Unmanned ground vehicle is a smart autonomous vehicle that is mainly capable to do tasks without the need of human operator. An automated vehicle work during off road navigation and mainly used in military operation such as detecting bombs, border patroling.These types of automated vehicles are required even in driving road vehicles where human errors cause major fatal loss of life and property. For this purpose the functionality of unmanned ground vehicle can be enhanced by using region based image segmentation which will help to identify the obstacles that come in the path of UGV.In this paper, Region based image segmentation algorithm is proposed to identify obstacles (car, human, tree etc).This method is compared with edge based image segmentation method based on three parameters (angle of projection, angle of disjunction and angle of disjunction). Based on comparisons, region based image segmentation algorithm is capable of producing more accurate results as compared to edge based segmentation algorithm.
Heart Rate Frequency Detection System Based On Digital Signal Processing
Pandipriya.J, Jegan Antony Marcilin
Digital signal processing and data analysis are frequently used techniques in biomedical engineering research. This paper illustrates exploitation of digital signal filtering on electrocardiogram (ECG). Proposed filters are spotlighted on eliminating supply network 50 Hz frequency and breathing muscle artefacts. Furthermore, this manuscript contains depiction of three heart rate frequency detection algorithms from ECG. Algorithms are focued on statistical and differential mathematical methods. All of the methods are compared on stress test measurements. All described methods are suitable for next simple implementation to a microprocessor for real-time signal processing and analysing.
Social Sensing: An Exploratory Investigation for Smart City
Rajesh Kumar Sahu, Lokesh Kumar, Vinod Kumar
In the era of information technology, Social sensing [1][3] is a latest useful technology for collecting the information which is directly associated with the human and other social resources. Most common example of social sensors are smart phones( mobile), in the smart phone , there exists many in-built sensors like GPS, Bluetooth, Wi-Fi and other location finding apps, temperature mapping sensors. The sensor are not used only in mobiles but also in automobiles vehicles like Bus, Car, Oven, Television, microwave etc. in smart kitchen to make smart home. The main concept is to make knowledge based society and intelligent system on the national and international level. Smart city is todays as well as future demand in the modern society for every country to arrange and run the social system in proper, efficient and effective manner. In this paper, the efforts have been made for various aspects of a smart city design and Implementation.
An Efficient Pairwise Key Establishment Scheme for Wireless Sensor Networks Using ORP
Gisha N, Jeena Sara George Sushitha Susan Joseph
Wireless sensor network has many application such as environment sensing, building safety monitoring, earthquake prediction etc. Security is critical issue in sensor networks. A fundamental security service is to establish pairwise key shared between two sensor nodes, which is basis of other security such as encryption and authentication. The prime problem in key management is to establish secure keys between the sensor nodes. To avoid this pairwise key establishment is used. This scheme consists of two key pools. One key pool is hashed value of keys in another key pool. With the one-way hash function, this scheme can make attackers get less key information from the compromised sensor nodes. Along with this Otway Rees protocol is used to provide integrity and authenticity. If direct path between two sensors are not present, then by using this protocol it is easy to find key with the help of intermediate node.
Recommender Systems (RSs) can be found in many modern applications and that expose the user to a huge collections of items and helps user to decide on appropriate items, and ease the task of finding preferred items in the collection. Recently Recommender systems are gaining popularity in both commercial and research community, where many algorithms have been used for providing recommendations. There are many evaluation metrics used for comparing this recommendation algorithms. The literature on recommender system evaluation offers a large variety of evaluation metrics and choose most appropriate evaluation metric among them. Error-based metrics likes MAE, RMSE and Ranking-based metrics like Precision and Recall are discussed in this paper. Using this evaluation metrics evaluate the performance of recommender systems.
This work proposes a steganalysis scheme based on Hopping cluster algorithm. The proposed scheme focuses on detection of the steganography algorithm used rather than detection of hidden message only. Even hidden message can also be detected using this alogorithm. Experimental results shows that message can also be detected but if once steganography algorithm is detected all the images steganographed can be detected very easily so this algorithm is quite effective than previous algorithms.
Priti R. Chandak, Vipul P.Giradkar Amol T.Wadmalwar
Design of FIR filter using Matlab Simulink and Xilinx system generator
Priti R. Chandak, Vipul P.Giradkar Amol T.Wadmalwar
This paper presents the design of 6-Tap FIR filter using Matlab simulink and Xilinx system generator for removal of noise from input signal. The implemented structure of 6 tap FIR filter uses the input signal with 48 Hz of frequency including noise. We designed structure uses sampling frequency of 100 Hz with oversampling concept, passband frequency of 0.31 Hz while the stopband frequency is of 2 KHz. This is a single rate FIR filter structure for 6 tap. The main objective of this designed filter is to reduce the noise from given signal. This Filter is designed using the FDA tool with 1 dB passband attenuation & 60 dB stopband Attenuation.
Mobile ad-hoc network support dynamic topology handling due to their variable nature of communicating nodes. Here the motion of nodes is random in a specified range of the network. As the mobile nodes containlight weighted protocols for supporting transmissions, it requires some more controls over the topological aspect. The traditional topology control mechanism can be categorised according to their use like mobility sensitive, energy awareness, QoS based etc. An efficient protocol is that which dynamically handles all this issues effectively with better use of bandwidth. Problem:The aim is to investigate the shortcomings of current solutions with respect to the dynamic topology handling issues through QoS based transmissions, and bring forth new solutions to improve the performance of the network as a whole or for the individual nodes. With respect to the issue of mobility, and traffic distribution, the work focuses to investigate the factors that affect the rerouting time in proactive routing protocols. That is, the time duration needed to reroute and restore a broken communication path due to node mobility.
Credit Card Fraud Detection Using an Efficient Enhanced K- Mean Clustering Algorithm
Madhav Prasad Namdev, Anil Kumar, Varun Bansal
The purpose of this paper is to study the Different types of frauds in credit card industry and the, effect of credit card frauds on card holders, merchants, issuers.As credit card becomes the most prevailing mode of payment for both online as well as regular purchase, fraud relate with it are also accelerating. Fraud detection is concerned with not only capturing the fraudulent events, but also capturing of such activities as quickly as possible. The use of credit cards is common in modern day society. Fraud is a millions dollar business and it is rising every year This will also signify how a comprehensive fraud detection system could help maintain the cost of detecting fraud, and Losses due to fraud, i.e., the total cost of fraud, under manageable levels. The main focushere will be mostly on Visa and MasterCard type transactions.
Data Security & Availability in Multi-Cloud Storage with Cooperative Provable Data Possession
Vrushali K Gaikwad, Ramesh Kagalkar
When storage of the data in necessary over cloud data integrity verification is one of the biggest security issue . Provable data possession is one of the method available for checking the integrity of data. In this paper, we have concentrated on the creation of an efficient PDP method for distributed cloud storage, in which we consider the existence of multiple cloud service providers maintaining and storing client’s data in cooperative manner. This cooperatively working PDP method is based on indexing hierarchy & homomorphic variable response method. We show the security of our scheme based on trusted third party and zero-awareness proof structure, which can fulfill reliability of awareness, completeness, and properties.
Survey on A Methodology for Sensitive Attribute Discrimination Prevention In Data Mining
Naziya Tabassum Qazi , Ms.V.M.Deshmukh
– Today, Data mining is an increasingly important technology. It is a process of extracting useful knowledge from large collections of data. There are some negative view about data mining, among which potential privacy and potential discrimination. Discrimination means is the unequal or unfairly treating people on the basis of their specific belonging group. If the data sets are divided on the basis of sensitive attributes like gender, race, religion, etc., discriminatory decisions may ensue. For this reason, antidiscrimination laws for discrimination prevention have been introduced for data mining. Discrimination can be either direct or indirect. Direct discrimination occurs when decisions are made based on some sensitive attributes. It consists of rules or procedures that explicitly mention minority or disadvantaged groups based on sensitive discriminatory attributes related to group membership. Indirect discrimination occurs when decisions are made based on non sensitive attributes which are strongly related with biased sensitive ones. It consists of rules or procedures that, which is not explicitly mentioning discriminatory attributes, intentionally or unintentionally, could generate decisions about discrimination.
Krishna P. Tayade, Omkar R. Chorghe , Mr. Swapnil R. Sawan Ravi C. Munde , Mr. Akshay R. Misal
Factor Authentication for Banking System by using Android based Smart Phones
Krishna P. Tayade, Omkar R. Chorghe , Mr. Swapnil R. Sawan Ravi C. Munde , Mr. Akshay R. Misal
: This is an Android based Smartphone Application for mobile payments or electronic wallet services. This work includes the mobile payment device and the paying client. This two device featuring 3 factor authentication and ad hoc network makes the transaction more secure as compared to the traditional credit card payment. The 3 factor authentication feature includes the IMEI(International Mobile Equipment Identity) authentication, facial bio-metric authentication and user authentication. The facial bio metric authentication is used to authenticate the user so that the unauthorized person should not be able to perform the transaction.
Survey on Improving System Security using BGP and IP Prefix Hijacking
Trishula A.Hajare, D.A.Chaudhari
Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information between autonomous systems (AS).The protocol is often classified as a path vector protocol but is sometimes also classed as a distance vector routing protocol. The Border Gateway Protocol does not involve traditional Interior Gateway Protocol (IGP) metrics, but makes routing decisions based on path, network policies and/or rule-sets configured by a network administrator. The Border Gateway Protocol plays a key role in the overall operation of the Internet and is involved in making core routing decisions. The Border Gateway Protocol is the successor to the Exterior Gateway Protocol (EGP) and is currently the most widely used exterior gateway protocol by Internet service provider (ISP) due to the fact that BGP allows for fully decentralised routing.
An Efficient Solution To Task Scheduling And Memory Partitioning For Uniprocessor
Jenish Ponraj Peter.J B.E, Navaneethan.S M.E
— A real time operating system (RTOS) is a specified time constraint in the real time application. A process of RTOS using Open Mp, multiple tasks are concurrently running on the system. A large number of embedded applications required multiple concurrent real-time tasks. In a concurrent real-time tasks, the task scheduling and memory allocation are done on Uni-processor. These two functions are performed separately; tasks are scheduled first and then partitioned among the processors. So, it requires an additional memory and also the waste of time period for every task. Instead of cache memory, using SPM (Scratch Pad Memory) the execution time of embedded applications will be accurately prefixed. (RR) Round Robin Scheduling is used to complete a task. Every task had a scratch pad number for the allocation. Depending upon the Round Robin scheduling and Scratch pad number the task should be completed within a given time period
A Survey of Trust Management using types of Uncertain Reasoning in Network Environment
Kadiwala shabnam , Swapnil R.Andhariya
: A unified trust management scheme that enhances the security in MANETs using uncertain reasoning is proposed. In the proposed scheme, the trust model has two components: trust from direct observation and trust from indirect observation. With direct observation from an observer node, the trust value is derived using Bayesian inference, which is a type of uncertain reasoning when the full probability model can be defined. On the other hand, with indirect observation from neighbor nodes of the observer node, the trust value is derived using the Dempster-Shafer theory, which is another type of uncertain reasoning when the proposition of interest can be derived by an indirect method. Performance of a routing protocol including this trust management scheme is evaluated under attack. Trust management considers the capability of the node along with its behavior while calculating the trust. Hence the performance of the routing protocol is improved when both behavior and capability is considered for trust evaluation.
Pooja D. Pawar, Sheetal S. Rai, Madhuri V. Sherawade
Online Mobile Cloud Based Compiler
Pooja D. Pawar, Sheetal S. Rai, Madhuri V. Sherawade
Now a days Cloud computing is a very popular and rising technology using which it is easy to access on-demand network resources in a convenient manner. Mobile cloud computing is the availability of cloud computing services in a mobile ecosystem. Mobile cloud computing means services are provided by a cloud and anyone can accessed through mobile platforms. This paper introduce C/C++/JAVA compilers which make it easy to compile and execute programs anytime anywhere by using their android smartphone. The main aim of this application is that their is no need to install any software/compilers in their phones. Anyone can access these C/C++/JAVA compilers remotely through network.
M Haider, S Shill , L Begum QMR Nizam, M Haider, S Shill , L Begum QMR Nizam
External radiation dose measurement in private nuclear medicine and diagnostic x-ray facilities in Bangladesh
M Haider, S Shill , L Begum QMR Nizam, M Haider, S Shill , L Begum QMR Nizam
The application of ionizing radiation in medical sectors for imaging and treatment of patient is expanding day by day. Xray machines are very common modalities in medical facilities which provide diagnostic information about the human organs. On the other hand, different kinds of radioisotopes are utilized for imaging of patient organ in nuclear medicine. Some isotopes are also used for treatment purposes. However, during handling of radiological devices/radioisotopes radiation professional, patient, public may receive unwanted radiation exposure which can be harmful for them. However, there is an exposure limit for the occupational and public. Usually, there are two kinds of biological effects of radiation, one is deterministic and another stochastic. There is threshold level of radiation dose for the first one to occur but for the second one no limit of radiation dose. Even at small amount of dose stochastic effect may occur in the form of a genetic disorder and cancer disease. Therefore, assessment of radiation dose is always vital in the medical radiation facility. In the current study radiation dose is measured in some x-ray and nuclear medicine facilities by using two GM counters. It has been observed that occupational receive more radiation doses in nuclear medicine facilities compared to x-ray where as public receive fairly less amount of dose from the nuclear medicine activities. On the other hand, public is more vulnerable to radiation in x-ray facilities compared to nuclear medicine. Therefore, from the radiation safety point of view, to limit the exposure level of the concerned personnel is very important hence the adequate shielding arrangements should be in place according to national and international requirements.
Specification of software components gives a brief definition of various operations that can be performed by a component. Specification of software components is needed for various purposes for example to know all the context dependencies and for knowing its internal structure. There are various levels at which specification of software components can be done. This paper first defines specification of software components , then it discusses various levels at which it is done. An approach is presented with an example to specify components .Then a review of various methods used by researchers is described.
istribution Based Model to Improve the Tradeoff between Reliability and Energy Efficiency
V.Krishnapriya, S.Naveena
The green computing is environmentally responsible for all computers and any other technology related resources .Green computing by implementation, includes energy efficiency central processing units (CPUs) ,peripherals and servers. In addition green computing is also used to control energy consumption and improve the disposal of electronic waste (e-waste) .disk drives increases more power , one of the most critical issues of designing modern disk systems is data reliability. The factors that affect the reliability of disk systems is the disk utilization and ages. In the existing work a novel approach called safe utilization zone is introduced to obtain reliability. The energy consumption is obtained by integrating the existing energy consumption algorithm with the novel algorithm. In the proposed work, a novel approach to mixed read/write workloads is introduced. This approach is used to achieve the trade-off between reliability and energy-efficiency and to balance the energy and reliability
Storing of confidential data has become a most important thing these days. It is necessary that the data stored must remain secured and should be accessed at the client’s request. Cloud computing helps us to store our files on the cloud. Hence it is very efficient and helpful for a client’s point of view. But there are some security issues in this type of data storage. Thus by using encryption and decryption techniques we can encrypt and decrypt the files as per the need of the client.
ITS Cluster Based Efficient Exemplar Image Inpainting Technique
Kiran R.Sole, Swati Patil
An Image Inpainting is the art to reconstruct an image by removing scratch, noise, object or any other defect. Fill the region of missing information from a signal using surrounding information and re-form signal is the basic work of Inpainting algorithms. There are various methods to do image Inpainting like exemplar based image Inpainting in which patch of particular size is get selected and that patch is used to fill missing part of an image by calculating highest priority. In this confidence value and data value that is collectively known as priority value of that patch is calculated. And after this most similar patch from the source region is detected and pasted on highest priority patch. Existing technique gives high computation time by searching similar patches in whole source region again and again. Also target region needs to be selected by user. So proposing method can provide better computation efficiency on traditional image Inpainting algorithm for automatic detection and removal of scratch in an image. In this approach whole image clustered using Iterative Threshold Selection algorithm and scratch will be detect automatically. After detecting scratch automatically highest priority patch will be calculated. Due to clustering highest priority patch need not to be search in whole source region again and again, it just need to take most similar patch from this cluster. So due to this source region can be minimized for optimal patch to search. So proposing method can provides better speedy approach for removal of scratch in an image than existing method.
Enhancing Data Security in Neural Network Computing Using Biometrics
C.R., Kavitha
Neural Network most probably known as ”Artificial Neural Network (ANN)” is an information processing model, that is analogous to the way the biological nervous systems processes information. Neural networks can be used to extract patterns and detect trends that are too complex to notice by either humans or other computer techniques. In today’s network world, maintaining the security of information or physical property is becoming both increasingly important and difficult. From time to time we hear about the crimes of Credit Card Fraud, Computer break in by hackers or security breach in a company or government buildings. In most of these crimes, the criminals were taking advantages of a fundamental flaw in the conventional access control systems. The systems do not grant access to “ Who we are ”, but give details about “ What we have ”, such as ID cards, keys, passwords, PIN numbers, or mother’s and maiden name. None of these mean are not really define us but rather they merely authenticate us. It goes without saying that if someone steals, duplicates, or acquire these identity then, he or she will be able to access our data or our personal property anytime they want. Recently, developed technology became available to allow verification of “true” individual identity. This technology is based on a field called “BIOMETRICS” with Neural Networks.
Expansion Of Current Wi-Fi Implementation Through Energy Efficient Way
Nithin, S.Sivan
In Present days WiFi provide easy access to internet through portable devices such as smartphones, tablets. This technique implement the current WiFi implementation in the way to design that allow mobile devices to advertise and discover small chunk of information in very energy efficient way. This is easily possible in the crowded environments. This mechanism is also known as energy efficient discovery in a WiFi network. Another way this is says implementation of current WiFi in driver level implementation.
Query Recommendations for Interactive Database Exploration
Sruthi T.K
Query Recommendation for Interactive Database Exploration (QueRIE) is a recommendation system that supports interactive database exploration. The users who are not familiar with the database schema may face great difficulty in performing this job. This system aims at assisting non expert users of relational databases by generating personalized query recommendations. QueRIE tracks the querying behavior of previous users and identifies similar patterns. These similar query patterns are used to generate recommendations. There are three approaches used in this work for generating query recommendations viz., suggested query by dictionary mapping, tuple based and fragment history. And also the performance is analyzed among the three approaches.
Dynamic Route Allocation for Guaranteed Data Delivery in Mobile Ad Hoc Networks using DPRP & VDVH
Ruchee Sadani, Shreya Jain
-Mobile Ad hoc networks (MANET) carried out multi-hop communication in an environment with no fixed infrastructure, by means of mobile nodes and changing network topology. In mobile ad hoc networks (MANETs), nodes move freely and so the topology of the nodes is highly dynamic. The process of routing the data packets to the destination is a challenging task.Provoked by this issue, this paper presents the new approach a Dynamic Position Based Routing (DPRP) protocol which implemented in the distributed architecture and takes advantage of the stateless property of geographic routing and the broadcast nature of wireless medium dynamically.In the case of communication hole, a Virtual Destination-based Void Handling (VDVH) scheme is further proposed to work together with DPRP. Both theoretical analysis and simulation results show that DPRP achieves excellent performance even under high node mobility with acceptable overhead and the new void handling scheme also works well.
Privacy-Preserving Public Auditing for Shared Data in the Cloud
C. M. Jadhav, .S.D. Shabade
—With cloud storage services, it is commonplace for data to be not only stored in the cloud, but also shared across multiple users. However, public auditing for such shared data — while preserving identity privacy — remains to be an open challenge. In this paper, we propose the first privacy-preserving mechanism th at allows public auditing on shared data stored in the cloud. In particular, we exploit ring signatures to compute the verification information needed to audit the integrity of shared data. With our mechanism, the identity of the signer on each block in shared data is kept private from a third party auditor (TPA), who is still able to publicly verify the integrity of shared data without retrieving the entire file. Our experimental results demonstrate the effectiveness and efficiency of our proposed mechanism when auditing shared data.
Frequent Pattern Mining is a simple Point Of Sale Application for any Supermarket which has a good amount product and a point of sale billing. The paper is on Frequent Pattern Mining Billing. Frequent Pattern Mining is the place where customers come to purchase their daily using products and pay for that. So there is a need to calculate how many products are sold and to generate the bill for the customer. In my paper I have 3 users. First is the data entry operator who will enter the products in database. Second one is the administrator who can see the report of any product. Third one is the bill calculating operator who will calculate the bill and print.
A Combined Effective Time Dependent Matrix Approach to Analyze the Men Affected by Cardiovascular Disease (CVD) in Chennai
M. Clement Joe Anand, M. Lathamaheswari
The objective of this paper is to find out the peak age of Men affected by cardiovascular disease in Chennai. For that we have collected the data and analyzed the same disease. For the first time in 1998, fuzzy matrix theory was developed by W.B. Vasantha and V. Indira to study the passenger transportation. To study this problem, they divided and defined four types of matrices called Initial Raw Data Matrix, Average Time Dependent Data matrix (ATD Matrix), Refined Time Dependent Data matrix (RTD Matrix) and Combined Effect Time Dependent Data Matrix (CETD Matrix). In the year 2003 the same technique was used by W.B. Vasantha to study the migrant laborers who were affected by HIV/AIDS. In 2012 and 2013, A. Victor Devadoss, M. Clement Joe Anand and A. Felix have studied dimensions of personality of men and women separately using this model. A CETD Matrix Approach to analyze the dimensions of personality of person in 2014 by the same authors. Now we use this model to study the Men affected by cardiovascular disease in Chennai.
Email communication is one of the most effective and popular way of communication today. Sending and receiving of messages for exchange of information is done by people every day. E-mail communication is popularly used way of communication. E-mail data that are now becoming most important way of inter and intra organizational written communication for many companies. Clustering is defined as creating group of similar objects. The cluster shows the similar emails exchanged between the users and for finding the text similarities to cluster the users, we are using the Pattern i.e., by considering the different Threshold value the similar words exchanged between the users, Threshold value shows the frequency of the words used and we have graphically represented the cluster in the form of Bar charts.
Identity-Based Encryption for Preserving Privacy In Cloud For Publish/Subscribe System
D.Devisri, J.Ramya, T.Kalaichelvi
The provisioning of basic security mechanism such as authentication and confidentiality in the publish/subscribe system. Authentication in this system is difficult to achieve due to the loose coupling between publishers and subscribers. Likewise, Confidentiality of events and subscriptions conflicts with content-based routing. To ensure authentication and confidentiality in broker less publish/subscribe system we adopt pairing based cryptography mechanism. Furtherly, broadcasting encryption algorithm is adapted to provide subscription confidentiality by clustering subscribers according to their subscription by providing a private key with their credentials. Sowe adapt identity based encryption for providing private key to the subscribers with their credentials based on their identity (e.g. e-mail). This technique enables efficient routing of encrypted events, provides thorough analysis of various attacks on subscription confidentiality and a fine grained key management. Moreover, the evaluations show that providing security is affordable w.r.t. 1) throughput of the proposed cryptographic primitives, and 2) delays incurred during the construction of the publish/subscribe overlay and the event dissemination.
Efficient Validation and Source Aloofness in Wireless Sensor Networks
Priya.G.S, Muthulakshmi.B
Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being forwarded in wireless sensor networks (WSNs). For this reason, many key management techniques have been developed for message authentication, based on either symmetric-key cryptosystems or public-key cryptosystems. Most of the authentication schemes have the limitations of security, in addition to lack of scalability and resilience to node compromise attacks. To address these issues, a polynomial-based scheme was recently introduced. The polynomial schemes have the weekness to build in threshold value determined by the degree of the polynomial. In the proposed system, a scalable authentication scheme is SAMA based Modified Elgamal Signature (MES). It enabling intermediate nodes authentication and allows any node to transmit an unlimited number of messages without suffering the threshold problem. In addition this scheme can also provide message source privacy
- Image Registration is process of aligning two different images of same scene taken at a different time, from different view point, or may be different capturing device. There are various methods have been proposed for image registration processing in last some years. But they are not commonly used in practice because of several drawbacks. The goal of the paper is to review and understand image registration process and its different methods.
Anup V. Adke, Akash N. Nawale Pravin N. Jadhav Vijayandra A. Yeole, Kavita S. Kumavat
A Novel Approach For Authorized Deduplication
Anup V. Adke, Akash N. Nawale Pravin N. Jadhav Vijayandra A. Yeole, Kavita S. Kumavat
: Now a day’s data deduplication is one of the relevant data compression techniques for removing duplicate copies of repeating data, and has been broadly used in cloud storage to reduce the amount of storage space and save bandwidth. To defend the privacy of sensitive data while supporting unrepeatable, the convergent encryption procedure has been suggested to encrypt the data before outsourcing. To well protect data confidence, first attempt to officially address the problem of authorized data deduplication. Dissimilar from out-of-date deduplication organizations, the variance rights of users are further considered in duplicate check besides the data itself. We also present some new deduplication constructions supporting authorized duplicate check in hybrid cloud architecture. Security analysis proves that our scheme is secure in terms of the definitions indicated in the proposed security model. As evidence, implementation contains a prototype of our proposed authorized duplicate check scheme and conduct tested experiments using our prototype. System show that our suggested legal replacement check scheme acquires minimal overhead compared to normal operations.
Security Lock System for Fake Traits Based on Image Processing
G. pratibha
As the number of security issues increased from day to day,we have to improve the security in efficient way.In the biometric signal based security system the major problems is to ensure the actual presence of real trait in contrast toa fake ,self-manufactured,synthetic,reconstructed traits.In this paper we propose a security lock system which provide security with combination of fingerprint,iris and palm images as biometric input.And we also include the authentication system for fake traits like silicon,playdoh,gelatin images by adding liveness assessment in a fast,userfriendly and non-intrusive manner through the image quality assessment method.In this paper we include 25 image quality features extracted from one image to differentiate the legitimate and impostor samples.Its suitable for real time security system in colleges,government sectors,private sectors,etc.This method is very efficient compared to previous state-of-the-art approaches.The cost of the method is very much reduced because the hardware is required to take the input only and the entire system is based on image processing software.The time consumption is also reduced as the recognition system is based on image processing software and we take only one image as input.And the security is very efficient as we take 25 different features in one images like MSE,NAE,AD,MD,etc.
Image enhancement is the method by which we try to develop an image so that it looks subjectively better. We do not really know how the image should look, but we can tell whether it has been improved or not, by considering, for example, whether more detail can be seen, or whether unwanted flickering has been removed, or the contrast is better etc. Satellite images are used in many applications such as Geosciences lessons, stargazing, and terrestrial info systems. One of the most chief quality aspects in images comes from its resolution. Interpolation in image handling is a familiar method to increase the resolution of a digital image. The technique resolution enhancement is used as a process that enlarges the given input in the way that the output is sharper. The performance of the technique over performs all available state-of-art methods for image resolution improvement. In image Resolution enhancement method a bicubic interpolation technique have been used.
Priyanka Jamdar, Supriya K. Bendale Jyoti G. Hulsure
Secure Mechanism for Credit/Debit Card Transaction Fraud Detection by using Fingerprint Authentication System
Priyanka Jamdar, Supriya K. Bendale Jyoti G. Hulsure
As credit card is becoming more efficient for online financial transaction, at the same time fraud associated with it is also increasing. This method is to increase the security level of the society against the fraudsters. This paper is totally concerned with the feature of fingerprint authentication which makes the transaction more secure as compared to the traditional Credit/Debit card payment. Here we are going to implement fingerprint biometric authentication for identifying and verifying person. The fingerprint biometric authentication is used to authenticate the original user so that the unauthorized person should not be able to perform the transaction. If any suspicious transaction will occurred then proposed system blocked the current transaction and will notify the valid user on respective available information.
Survey on Efficient Retrieval of Nearest Neighbor over Relational Database by using Keywords
Nikita R. Barge, . Pravin R. Barapatre
Many applications have need of finding objects nearby to a specified location that contain a set of keywords. Predictable spatial queries, consider for the object geometric include nearest neighbor retrieval and range search. From this find out the predicate of spatial and predicate of associate texts. Academic research in this area has attention mainly on techniques for extracting geographic knowledge from the web . At this moment in time the finest way out to such queries is based going on IR2-tree , which showing seriously impact its efficiency. IR2-Tree is combination of R-Tree with superimposed text signatures. For retrieving more efficient data we used the relevance feedback methods. This method makes this approach more efficient, robust as well as reliable. In real time applications such as medical, banking et. Geographic search engine query processing is different as it require a arrangement of text and spatial data processing techniques. In support of case, consider all the restaurants, a nearest neighbor query would as an alternative put for the restaurant that is the closest along with those contain steak, spaghetti, brandy all at the same time. Also motivate the by support and develop new method that is spatial inverted. These proposed techniques best the IR2-tree in query response time.
Speed Control and Direction Control of Dc Motor Using Arm7
K.A.Wadile, S.R.Chillarge , D.D.Jadhav
An armature voltage control is used to control the supplied voltage of an armature of a 2kw separately excited DC motor. A buck regulator is used to vary the supplied voltage of the motor. A pulse width modulation (PWM) generator is implemented to supply the signal to the gate of the switch of the buck regulator. A series or cascade compensator is placed to control the duty cyclone of the pulse width modulation (PWM) generator in the closed loop control system. Pulse width modulation has one additional advantage which is that the pulse reaches the full supply voltage. It will produce more torque in a motor easily overcome motor resistance.SST 433 MHZ transmitter and STR 433MHZ receiver are the RF module used here.AT the end of the transmitter, four switches are provided to control the speed and direction of the DC motor which is located at the receiver side.
On Demand Load Balance Secure Routing Scheme For Mobile ADHOC Network
Shishir Patra, Jajati Mallick
Mobile Adhoc Network (MANET) is a special type of wireless network. It is characterized by dynamic topology (infrastructure less), multi-hop communication, limited resources (bandwidth, CPU, battery, etc.) and limited security. In this paper, we focus on the situation that occurs when specialized, sensitive data are sent to the Internet from MANET nodes. These special data types are especially susceptible to security risks such as information leak and data falsification. Therefore, it is necessary for such special data to be forwarded by a secure/trusted gateway which is under control of a trusted network administrator. However, there can be multiple gateways deployed in a MANET, where the cost ineffectiveness makes it difficult for a network administrator to simultaneously manage every gateway. An optimum mechanism is used to select an appropriate gateway out of the multiple gateways based on multiple node metrics: remaining energy and gateway load for interconnected Mobile Ad hoc Network (MANET) with infrastructure network. To choose an optimum gateway node, we use the Multiple Criteria Decision Making (MCDM) method called Simple Additive Weighting (SAW) for the optimum gateway node. SAW method calculates the weights of gateway node by considering these two metrics. Node with the highest weight will be selected as a gateway. Because of the risk of forwarding special data through an unmaintained gateway, we propose a routing protocol, which allows a source node to have all data forwarded to the Internet through a trusted gateway. To achieve the desirable performance, we have implemented routing protocol called Dynamic MANET On demand (DYMO), which works in consideration of application data. Through simulations, we evaluate our protocol in comparison with the conventional DYMO protocol. We conclude through the simulation results that our protocol get better performance in terms of packet delivery ratio and transmission delay
An Effective Load Balancing In Long Term Evaluation Self Optimization Network Using Multi Objective Optimized Algorithm
R.Nandhini, S.Uma Maheswari
A self-optimizing network is an effective method for network management and maintenance in Long Term Evolution, which supports the co channel deployed heterogeneous networks and significantly increases the quality of service. The Zone based Load Balancing uses several game theoretic approaches to carry out load balancing but it results in uncoordinated load distribution among multiple cells. It may cause the problem of hidden cell case and slow convergence issues. Along with this problem the Nash Equilibrium used in game theory algorithm cannot be obtained, it may continuously finding solution for long duration. It can be solved by introducing the innovative method of meta heuristic search algorithm called Multi objective Bat Algorithm. It is very promising and could outperform the existing algorithms. The Multi Objective Bat algorithm combined with the priori expert knowledge reduces search space and computational time required for designing the MLB controller. The Multi Objective Algorithm provides the best optimization solution in short period of time and the problem of slow convergence time gets eliminated.
An Efficient Image Forgery Detection Method with Dempster Shefer’s Theory for Detecting Jpeg Anti-Forensics
K.Karthika, P.Damodharan
-With rapid development of high-quality cameras and powerful photo-editing tools significantly reduces the difficulty to make visually plausible fake images. The JPEG format is widely used as one of the most popular lossy image compression formats is used by various advanced digital cameras and image editor and processing software tools. Earlier work identified traces of the image JPEG compression history or JPEG anti-forensic processing with reasonable loss of image quality. This aims at removing from a given image the footprints in both the spatial and frequency domain left by JPEG compression. However, efficient forensic Undetectability not obtained. To deal with this problem the present work proposes different forgery detection algorithm such as Ststic image Format Analysis algorithm, lossy compression technique Effect and Place/Transfer Forgery. The result of this algorithm is combined by using Dempster-Shafer combiner which is based on the Dempster-Shafer theory as a framework within which the results of different tools are considered and taken decision. Experimental result of proposed system efficiently detects the Undetectability forgeries when and provides better result when compare with earlier methods.
Task Ranking Based Allocation of Scientific Workflows in Multiple Clouds with Deadline Constraint
T.Gayathri, B.Vinitha Subashini
The advent of Cloud computing as a new model of service provisioning in distributed systems, progress researchers to investigate its benefits and drawbacks in executing scientific applications such as workflows. One of the effective problem in Clouds is workflow scheduling, the problem of satisfied the QoS of the user like deadline as well as minimizing the cost of workflow execution. Existing work QoS based workflow scheduling algorithm based on a novel concept called Partial Critical Paths, which tries to minimize the cost of workflow execution while meeting a user defined deadline. Today cloud provider’s mainly concentrate about the increasing their revenue. This will lead to the selfish behavior which may cause the QoS violation of cloud users. In the existing work, workflow scheduling is done in only single cloud where there may be the situation occurs in which enough resources are present to satisfy the user demand. And also the priority of tasks is not considered in the scheduling of tasks. In that case the existing work will still continue to process the user demands in order to increase their revenue. To address this problem, a novel replication aware dynamic workflow scheduling is introduced with the consideration of ranking of tasks for multi cloud. The main objective of this algorithm is to dynamically allocate the workflow across multiple cloud domains with the consideration of reduction of cost for processing those workflows as well as satisfying the QoS requirement of user. This is achieved by ranking the tasks based on their load level and its successor tasks load level. The experimental results prove that the proposed methodology can provide the better result than the existing methodology.
Arshad Shaikh, Sanjay Mali Suraj Tambe , Akshay Yadav
Mobile barcode system with Inventory management and Employee work tracking using Google Analytics
Arshad Shaikh, Sanjay Mali Suraj Tambe , Akshay Yadav
The paper includes three aspects ,firstly we are going to replicate the commercial barcode scanner (i.e HC2D barcode and QR-code) on the mobile device which operates on Android. Secondly using this application in Inventory management and Employee work tracking. Thirdly using Google Analytics for product tracking, automatic report generation. Our main goal is to decode the barcode images in real-time, quickly and efficiently. This involves improving the image decoding algorithms and choosing efficient image manipulation and barcode libraries .Here our focus is basically on implementing reader for HC2D barcode. The HC2D is a high capacity two dimensional barcode. Barcode represents data using lines, rectangles and spacing between them. For reading the HC2D barcode, the bit representation of the barcode is obtained by scanning the image of the barcode with scanner machine only. A HC2D barcode is a 2D barcode which consists of a black square pattern on white background. The HC2D barcode contains information in the vertical direction as well as the horizontal direction. Here we propose a system to read a HC2D barcode in real time mode using the embedded camera device in mobile phones. The proposed system consist of algorithm to work on code area found by the 2 vertical line, one horizontal line and dash line detection of H2CD barcode. Thus our proposed system works in real time environment and eliminates all the drawbacks of earlier systems.
Design and Analysis of Low Power Pulse Triggered Flip-Flop
V.Kavipriya, K.Sedhuramalingam
This explicit pulse triggered flip flop consist of a pulse generator and a true single phase clock latch based on a signal feed through scheme. The pulse generator is built with two CMOS inverters along with transmission gate logic which reduces the complexity of the circuit. The Pulse generation logic used in the explicit mode by a single pulse generator is shared for many number of flip flop at a time result in reduction of power not only this overall transistor count and delay can also been reduced.. And this flip flop can achieve better D-Q delay and by using this explicit pulse triggered flip flop a synchronous counter is constructed and power dissipated is very less.
Literature Review on Fem Analysis Of Disc Brake System
N. B. Shinde , B.R. Borkar
This paper reviews numerical methods and analysis procedures used in the study of automotive disc brake. It covers Finite element Method approaches in the automotive industry, the complex Contact analysis. The advantages and limitations of each approach will examine. This review can help analysts to choose right methods and make decisions on new areas of method development. It points out some outstanding issues in modeling and analysis of disc brake squeal and proposes new conceptual design of the disk braking system. It is found that the complex Contact analysis is still the approach favored by the automotive industry
Geometry Based Efficient Routing Protocol In Wireless Sensor Networks
Radhika A. Narwaria, S.R.Gupta , S.M.Balwani
Wireless Sensor Network (WSN) has gained tremendous research attention recently due to their extensive applications. As sensor nodes being battery operated, many researchers have made attempts to prolong the lifespan of the WSN by reducing the-per node energy consumption and efficiently utilizing the sensor nodes. Since the sensors operate on battery of limited power, it is a great challenging aim to design an energy efficient routing protocol, which can minimize the delay while offering high-energy efficiency and long span of network lifetime. This is the survey on different deployment schemes on irregular geographical target area, we propose to include the concept of voronoi diagram based approach in WSNs, to provide a way of dividing an irregular geographical area into a number of regular regions. In this regions, we deployed sensor nodes, among all these nodes CH(cluster head) is selected based on residual energy level of sensor nodes in a cluster. Then fused data of CH will be transmitted to sink node through multihop routing.
Krishna Tayade, Sujata Kale , Anjoo Chaurasiya Mrunalee Deshmukh
Virtual Mouse using Eye Tracking and Face in various Illumination Environment.
Krishna Tayade, Sujata Kale , Anjoo Chaurasiya Mrunalee Deshmukh
This project aims to gift an application that’s ready of communication the standard mouse with the external body part as brand new thanks to act with the pc. Countenance (nose tip and eyes) are detected and half tracked in time period to use their actions as mouse events. In our work we tend to compensate people that have hands disabilities that stop them from victimization the mouse by planning an application that uses countenance (nose tip and eyes) to act with the pc. It will be applied to a large vary of face scales our basic strategy for detection is quick extraction of face candidate with a Six-Segmented Rectangular (SSR) filter and face verification by a support vector machine (SVM). A motion cue is employed in a very easy thanks to avoid learning false candidates within the background. In face trailing the patter ns of between-the eyes(BTE) are half-tracked with change example matching.
Detecting Attack Packets by Using Darpa Dataset on Intrusion Detection System
Sarika Rameshwar , rathi
today lot of valuable data is generated using many computers based application and stored back to the company database. But unfortunately, the threat to the same data is also increasing rapidly. So, development of a proper Intrusion Detection System which provides a right alarm is a hot topic today. A set of rules are used by Signature based Network Intrusion Detection Systems (NIDS) to detect hostile traffic in network segments or packets, which are so important in detecting malicious and anomalous behavior over the network like known attacks that hackers look for new techniques to go unseen.Theproblem of network intrusion detection is not just to identify theattacks connections, but also to know what type of an attack theconnection belongs to. The paper aims to build an innovative functional framework to NIDS. This framework can be used to audit NIDS.This framework shows that a proof of concept showing how to categorize the attacks.
Comparative Study of Error Performance in Modulation Schemes for VLC Systems
Ankita Choubey deepak sharma
— Wireless communication technology is emerging very fast with reliable communication lead to emergence of very numerous technologies. There are various modulation schemes suitable in optical wireless communication like OOK, PPM, DPIM, DHPIM, and OFDM. As modulation techniques is categorized into bandwidth & power efficient but for error performance there are few assumptions where there is no bandwidth limitation. In this paper we analyze the error rate in AWGN channel for these modulation techniques & the combined result shows that DPIM, DH-PIM & OFDM are applicable for future applications.
Clipping Technique for BER and PAPR Reduction in OFDM System
J. P. Panwar, .Y.K.Jain
Peak to Average Power Ratio (PAPR) is one of most detrimental aspects in any wireless communication system using multicarrier modulation technique like OFDM, which cause power degradation and spectral spreading. Due to the simplest way for PAPR reduction, clipping technique has been proposed and seems to be promising for use in commercial system. In this paper, we mainly focus on Amplitude clipping and filtering method. Later in this paper, simulation result shows the PAPR and BER performance with clipping and filtering with different clipping ratios. The BER of the original OFDM signal is approximate at SNR = 10 dB. With clipping, BER is increased to just higher than at the SNR = 10 dBandtheBERperformance improves a little bit with filtering.
BER and PAPR Reduction in OFDM System By Using Companding Technique
J. P. Panwar, Y.k.jain
One of the challenging issues for OFDM is its high Peak to Average Power Ratio (PAPR) which limits its applications in wireless communication systems using multicarrier modulation technique as OFDM, which reduces the efficiency of transmit high power amplifier. In this paper, we introduced companding technique with different value of µ. Later in this paper, simulation results show the PAPR and BER performance and then comparison by changing modulation scheme without any technique and with companding technique are evaluated.
A Novel Non Linear Distortion Suppressed, Pre-Compensation for A 10.7-Gb/S System Employing A Directly Modulated Laser
V.S.R.Kumari, Muppalla Papa Rao
A Novel Framework for investing the electronic compensation for a 10.7-Gb/s system using a directly modulated LASER (DML) approach. The significant usage of digital signal processing and large signal rate equations helps in reducing the non linear distortion which outcomes from direct modulation of laser and to generate an appropriate modulating current. After successful generation of modulation current the proposed scheme is then utilized in a novel look up table optimization scheme for electronic dispersion precompensation. Finally the simulation results shows that the proposed theoretical work shows the compensation of 250km approximately using a 21.4GSa/s DIGITAL TO ANALOG CONVERTER and simultaneously 350km approximately using a 42.8GSa/s DAC. Finally the proposed work shows that approximately using a 42.8GSa/s DIGITAL TO ANALOG CONVERTER is sufficient forexploiting the full potential for ELECTRONIC PRE-COMPENSATION using a DML.
New Compressive Sensing Inter Cluster Data Aggregation Based Ileach Protocol For Homogenious Wsns
Mandeep Kaur, Harmandeep Singh
In the application based WSNs circumstance, vitality and transmission capacity of the sensors are esteemed assets and vital to consume competently. Data collection at the sink by individual sensor nodes results in flooding of the requests which results in most extreme energy use. To decrease this issue another data aggregation technique has been used in this paper which has enhanced the execution of the iLEACH principle by utilizing the LZW compressive sensing based between cluster based data accumulation; additionally called mixture data aggregation strategy, where gathering of nodes will be carried out on the principle of the available clustering procedures and gathering of cluster heads is likewise done to use the peculiarities to utilizes the cluster head based data aggregation. The proposed technique serves to diminish the energy utilization issue, furthermore transmission of the aggregated data in proficient way. The proposed technique has been designed and implemented in MATLAB by considering various issues of the WSNs. The comparison among the iLEACH and LEACH has shown the effectiveness of the proposed technique.