No. |
Title and Author |
Area |
Country |
Page |
1 |
Design of Text Detection and Translation System for Camera Based Android Smartphone
-Rahul Bhanudas Panchal ; Rutuja Ganesh Sonawane; Himayat Shaikh; Piyush P. Gawali
In modern technology, the field of digital image processing has grown up to a new dimension due to availability of high resolution cameras. As the technology is growing rapidly, various technologies are being developed for handheld devices like Smartphone and tablets. In recent years, Android platform has gained huge popularity in terms of number of available applications and market share. The goal of our project is to design Android-platform based text detection and translation application that is able to recognize text present in digital image, translate the text from English to various other languages like Arabic, German, French, Russian, Spanish etc. As well as convert the text into speech and allows the audio file to be stored locally for later use. Experimenting with a set of 100 random business card pictures, captured by Smartphone camera, we have achieved a maximum accuracy-rate that is greater than 90%. Moreover, the developed system is more efficient and consumes less memory so as to be suitable for Smartphone devices. Read More...
|
Image Processing, Information Technology |
India |
1-4 |
2 |
Malware detection Based on Behavior in Delay Tolerant Network using Support Vector Machine
-K.M.Rajiha ; D.C.Winnie Wise; S.N.Ananthi
Delay tolerant network (DTN) is widely being used for short range communication as it works well in intermittent connectivity areas. DTN propagates information in its network via opportunistic contacts of its nodes. Proximity malware exploits this propagation nature of DTN. The previous methods for behavioral characterization of proximity malware have used naive Bayes model. To improve detection rate, we propose a Support Vector Machine (SVM) that detects the malware in the delay tolerant networks in an efficient and quick way. SVM is a supervisory learning model that can analyze and classify patterns. It not only recognizes the already existing patterns of malware based on its behavior but also the predictable patterns. SVM is less prone to over fitting, which becomes an advantage and makes it desirable for bigger networks. Read More...
|
network engineeing |
India |
5-7 |
3 |
A Hybrid approach for misbehaviour detection based on trust and distance management scheme
-S.Deepica ; P.Brundha; N.RajaPriya
vulnerable nodes are the biggest threat in Disruption/Delay Tolerant Networks (DTN). The main objective of this paper is to find the vulnerable nodes. Vulnerable nodes means it may be act as Malicious or Selfish or Replica node. In this project the DTrust technique is used as misbehaviour detection scheme. The DTrust is offering a Trusted Authority (TA) to analyse the node’s behaviour based on the collected claim evidences and the distance of each nodes. The malicious and selfish behaviours are detected based on the claim evidences. The replica node is found based on the distance of each node. From the distance we can identify the moving speed of each node. If the speed reaches the maximum threshold that node considered as the replica. The proposed method used in this project performs well than the other existing methods. Read More...
|
network engineering |
India |
8-9 |
4 |
Personlized Web Search Protecting Privacy using Greedy Algorithm
-Meenakshi Rathod ; Reshma Y. Totare; Prajakta Raskar; Pooja Modak; Venuvanshi Bhujbal
The amount of information on the World Wide Web is growing rapidly; search engines must be able to retrieve information according to the user's preference. Current web search engines are built to serve all users, independent of the special needs of any individual user. Personalization of web search is to carry out retrieval for each user incorporating his/her interests. Every user has a distinct background and a specific goal when searching for information on the Web. Thus the goal of Web search personalization is to tailor search results to a particular user based on that user’s interests and preferences. However, effective personalized search requires collecting and aggregating user information, which often raises serious concerns of privacy infringement for many users. Indeed, these concerns have become one of the main barriers for deploying personalized search applications, and how to do privacy-preserving personalization is a great challenge. Thus, a balance must be struck between search quality and privacy protection. Hence, privacy protection in PWS applications that model user preferences as hierarchical user profiles is proposed using a PWS framework called UPS that can adaptively generalize profiles by queries while respecting user specified privacy requirements. Along with Personalized Search and Privacy Protection the Custom Search functionality will also be provided so that the users get relevant information. Read More...
|
Information Technology |
India |
10-13 |
5 |
Song Search Engine Based On Querying By Singing/Humming
-Shruti Mengade ; Pritesh Patil; Prapti Kolpe; Vaishanvi Gawande; Kalyani Budhe
Song Search Engine Based on Querying by Singing/Humming is the system which searches the song for user when given a query in the form of hummed or sung section of melody as a input to system. Searching song by singing /humming section of it is the most natural for user. For this no musical training would be required. User is simply expected to record the acoustic query and system will use the features of recorded query for searching song. Finally the query by singing/humming system will return optimized list of songs in which most probably top most songs will be the song desired by user. Result optimization is obtained by re-ranking algorithms using probabilistic calculation. Re-ranking of the result is advancement in the existing QBSH systems. This module has made the QBSH system more accurate & responsive. Read More...
|
Information Technology |
India |
14-16 |
6 |
Hand Gesture Recognition using Web Camera
-Rahul Ramesh Anantwar ; Rahul Ramesh Anantwar; Vinay Deepak Kudale; Ajay Shitole; Pushpraj landge
In Human-machine interfaces are playing a role of growing importance as computer technology continues to evolve. Keyboards have been replaced by handwriting recognition in Palm and Pocket PC PDAs. Motivated by the desire to provide users with an intuitive gesture input system, we developed a system Human Gesture Recognition to recognize hand gestures representations. Gesture refers to a particular pose and/or movement of the body parts, such as hand, head, face etc., so as to convey some message. Accordingly, one important direction of research in gesture recognition is concerned with hand gestures formed by different hand shapes, positions, orientations and movements. While static hand gestures are modeled in terms of hand configuration, as defined by the flex angles of the fingers and palm orientation, dynamic hand gestures include hand trajectories and orientation in addition to these. So, appropriate interpretation of dynamic gestures on the basis of hand movement in addition to shape and position is necessary for recognition. Read More...
|
computer engineering |
India |
17-18 |
7 |
Automatic Sidestand Mover for Two Wheelers
-Venkatesh. R ; Mainikandan.H; Azariah Pravin Kumar. S; Sundar. D
The side stand of a motor bike can be retracted automatically by using a motor and shaft circuit controlled by a driver circuit. The power supply can be given either by an external source like batteries or by internal power sources. The side stand of a motor bike is connected with the motor using a shaft. This motor is driven and controlled by a driver circuit and a micro controller. The rotation of the side stand and motion of the motor is controlled by the driver circuit which was internally connected with the motor. The motion of the side stand is monitored by a limiting switch . When the starter button is pressed the motor rotates in a direction to lift the side stand up. When the side stand reaches its limit, the power supply is cut off which can be identified using a limit switch. Micro controller and driver circuit are responsible for the direction of rotation of the motor. When the push button is pressed, the polarity of the motor along with the driver circuit gets reversed. Hence the motor rotates in the opposite direction. There will also be a limit switch at the original position of side stand before retraction. The power supply will be stopped as soon as the side stand reach the limiting switch. This technology can be regarded as the lifesaving one. About 80% of the accidents takes place due to the carelessness of this sort. Safety is the first and foremost motivation behind this system. Reduction of human work can also be achieved by this system. The cost and maintenance of the system is also economical. Read More...
|
MECHANICAL ENGINEERING |
India |
25-26 |
8 |
A Survey on Reduce PAPR Noise with Selective Mapping & Partial Transmission Sequence in DVB-T
-ANUJ MISHRA ; Amit Agrawal
In this paper, DVB-T (Digital Video Broadcast - Terrestrial) is the most widely used standard for terrestrial digital television. One of the main drawbacks of the DVB-T systemic the high PAPR (Peak to Average Power Ratio). One way to mitigate the high PAPR is by using Scrambling techniques. They introduce partition of signal and select signal with minimum PAPR as output. This paper analyzes the effect of the scrambling techniques (SLM and PTS) on PAPR reduction in DVB-T systems. The results obtained from the performance analysis can be used for better understanding of PAPR in DVB-T system and lead to development of new options in its reduction. Read More...
|
Electronics And Communication Engineering |
India |
27-29 |
9 |
A Review on Comparative Analysis of VSWR Effect on Microstrip Patch Antenna: Analysis Based on Various Feeding Techniques
-Patel Monika J.
Microstrip rectangular patch antennas are attracting the attention of antenna designer, because of attractive advantages such low profile, light weight, easy of fabrication etc. but it also suffering with some drawbacks of low gain, narrow band width. These drawbacks can be overcome by some extent by taking care in design of antenna. There are many parameters effecting the radiating characteristics of antenna but in present project we are considering feeding of power to antenna because this plays important role. Here we are considering three different feed methods such as coaxial feed, inset feed and cut feed and their effects on radiating characteristics were analyzed on comparing with one to each other. The design was done in Ansoft HFSS version 13. The results of return loss S(3)and VSWR are presented. Read More...
|
Electronics and coomunication |
India |
30-34 |
10 |
An Enhanced Anti-Forensic Technique to Manage the Compact Ability Among Forensic Untraceability and Picture Peculiarity in JPEG Image
-Karthika K ; Damodharan P
Forensic method which determine the forgery in the image. Similarly, Anti-forensic technique which makes fool of the forensics detectors and hides the trace of the operation done in the image. Now, we are proposing the anti-forensic method by using four steps. The first step normalize the image coefficients using total variation in the deblocking artifacts. The second work which uses dithering model for smoothening the image. The third work which again carries the first one with difference in the parameters and the final step is the balancing of the calibrated value in the image. By experimental simulation proves that the proposed work is efficient in terms of untraceability and image peculiarity than the existing system. Read More...
|
Image processing |
India |
35-37 |
11 |
Prediction Based Cloud Bandwidth and Cost Reduction System using lightweight Chunking
-P.Vedhalakshmi ; U.Hema; V.Kavitha
we present PACK, a novel end-to-end traffic redundancy elimination (TRE) system, designed for cloud computing customers. It can be used to identify previously received chunk chains, which in turn can be used as reliable predictors to future transmitted chunks. Cloud-based TRE needs to apply a judicious use of cloud resources so that the bandwidth cost reduction combined with the additional cost of TRE computation and storage would be optimized. PACK’s main advantage is its capability of offloading the cloud-server TRE effort to end clients, thus minimizing the processing costs induced by the TRE algorithm. Unlike previous solutions, PACK does not require the server to continuously maintain clients’ status. This makes PACK very suitable for pervasive computation environments that combine client mobility and server migration to maintain cloud elasticity. PACK is based on a novel TRE technique, which allows the client to use newly received chunks to identify previously received chunk chains, which in turn can be used as reliable predictors to future transmitted chunks. We present a fully functional PACK implementation, transparent to all TCP-based applications and network devices. Finally, we analyze PACK benefits for cloud users, using traffic traces from various sources. Read More...
|
Information Technology |
India |
38-41 |
12 |
Review Paper on Moving Object Tracking In Video Processing
-Jaydeep S. Dadhaniya ; Kirit D. Bhalsod
Real time moving object detection and tracking is one of the important research fields that have gained a lot of attention in the last few years. Tracking is required for security, safety and site management. Cameras installed around us but there are no means to monitor all of them continuously. It is necessary to develop technologies that automatically process those images in order to detect problematic situations or unusual behavior of human or object. Design computer vision base automated video surveillance system addresses real-time observation of object within a busy environment leading to the description of their actions and interactions. Object detection by background subtraction technique. Using single camera we detect and track human behavior. Background subtraction is the process of separating out the foreground objects from the background in a sequence of video frames. If human entity is cross the line design security in mall or public area the object is tracked. It is laborious to track and trace people over multiple cameras. In this paper, we present review for some system for real-time tracking and fast interactive retrieval of persons in video streams from single static surveillance camera. Read More...
|
ELECTRONICS AND COMMUNICATION |
India |
42-45 |
13 |
A Critical Review of Scriptless Timing Attacks and Web Browser Privacy
-Niravkumar B. Jani ; Bakul B. Panchal
Scriptless timing attack is a Cascading Style Sheet (CSS) based side channel attack in which the attacker attempts to compromise the web privacy of user. Attacker analyzes the time taken to render the image on the victim’s web browser. It is based on the fact that rendering process of the resources loaded from remote website is delayed than the resource is loaded from local cache. The attacker uses Cascading Style Sheet features and distinguishes that whether victim have visited the target website or not. Read More...
|
Computer Science Engineering |
India |
46-48 |
14 |
A Review on Removal of Salt and Pepper Noise
-NAGINKUMAR J. CHAUDHARI ; ASHIL R. PATEL
Since last 20 years the Noise Removal techniques have drawn a lot of interest of the researchers, there are types of Noise Removal technique. The process of removing noise from the original image is still a demanding problem for researchers. One of the main tasks of image processing is to distinguish between noise and actual contents so that the un-wanted noise from the image signal can be removed. The distortion of an image by noise is very common that gets introduced during its acquisition processing, compression, transmission, and reproduction. Various terms related to Noise Removal are explored in this paper. Read More...
|
Computer Science And Engineering |
India |
49-51 |
15 |
A Survey on Data Perturbation Techniques for Privacy Preserving in Data Mining
-Devang J. Patel ; Asst. Prof. Swati Patel
In recent years, advance in hardware technology have lead to increase in the capability to store and record personal data about service consumers and individuals. This has lead to concerns that the personal data may be misused for a variety of purposes. It is also very important to find out some useful information from large data sets. So in this paper we address privacy problem during mining large data sets. We introduce a certain transformation methods that deal with the privacy while mining. The goal of our methods are preserving the accuracy of specific data and preserving privacy of original data. Proposed methods provide privacy to only sensitive numerical attributes. This paper focuses on Geometric data perturbation technique for large data sets analyze. Read More...
|
Information Technology |
India |
52-54 |
16 |
Software Effort Estimation and Risk Analysis using Artificial Intelligence Technique
-S.Abbinaya ; M.Senthil Kumar
Software effort estimations are based on prediction properties of system with attention to develop methodologies. Many organizations follow the risk management but the risk identification techniques will differ. In this paper, we focus on two effort estimation techniques such as use case point and function point are used to estimate the effort in the software development. The decision table is used to compare these two methods to analyze which method will produce the accurate result. There are number of artificial intelligence techniques useful for training such as neural network, fuzzy logic, ant colony optimization, knowledge based system and genetic algorithm. In this paper, we used the neural network to train the decision table with the use of back propagation training algorithm and compare these two effort estimation methods (use case point and function point) with the actual effort. By using the past project data, the estimation methods are compared. Similarly risk will be evaluated by using the summary of questionnaire received from the various software developers. Based on the report, we can also mitigate the risk in the future process. Read More...
|
software engineering |
India |
55-59 |
17 |
Generation Of Electricity By Using Speed Breaker Mechanism
-Sanket S. Khodke ; Vikrant M. More; Yashpal A. Malkhede; Abhishek V. Madake
In 21st century human life is completely depends on electricity and a human being needs to consume more and more energy, but unfortunately the conventional energy sources are limited and depleting very fast, that is why it is time to think of alternative and to shift our focus on utilizing the non-conventional energy sources for generation of electricity and also reduce the share of greenhouse gases which is responsible for global warming. So this paper is presenting the study of generation of power from speed breaker and the possible mechanism required for it. Read More...
|
Electrical Engineering |
India |
60-61 |
18 |
Different Mechanisms Used for the Generation of Electricity from Speed Breaker.
-Yashpal A.Malkhede ; Vikrant M.More; Sanket S.Khodke; Abhishek V.Madake
In the present scenario power has become one of the major needs for human life. As day-by-day there is a rapid increase in the population and degradation of the conventional sources, it has become a necessary issue that we must now start depending on the non-conventional sources for the generation of power so as the fossil fuels will be available for a longer period of time. Energy conservation and conversion are the cheapest new sources of energy. The aim of this paper is to show how speed breakers can be now used for generation of power. Read More...
|
Electrical Engineering |
India |
62-63 |
19 |
Switching Loss Reduction in a Cascaded Multilevel Inverter With Reduced Number of Components
-P. Kalayarasan ; K. Nandakumar
A new general cascaded multilevel inverter with single carrier level shift PWM is proposed in this paper. The proposed topology requires a lesser number of dc voltage sources and power switches and consists of lower blocking voltage on switches, which results in decreased complexity and total cost of the inverter. These abilities obtained within comparing the proposed topology with the conventional topologies. Moreover, a new algorithm to determine the magnitude of dc voltage sources is proposed. In which only one carrier signal is used and compared with reference signal. Depends upon the level or RMS value of output voltage, the level of carrier signal is determined. Based on the level determined, the carrier signal is shifted and compared with reference signal. The proposed technique completely eliminates the switching transition in the lower levels. So it reduces switching loss and also improves the power quality. The performance and functional accuracy of the proposed topology using the new algorithm in generating all voltage levels for a 31-level inverter are confirmed by MATLAB simulation and experimental results. Read More...
|
Electrical and Electronics Engineering |
India |
64-70 |
20 |
Electronic Voting System With Finger Print Authentication and ATM technology
-Pratiksha Mohadare ; Akshay Khadke; Bhalchandra Chikate; Pragati Pawar; Ragini Patmase
The main thesis of this project is to develop a Highly Secured Electronic voting machine using Finger print identification method, for finger print accessing we use AADHAR card database and for advanced security, we use ATM technology. In traditional voting system, the voter needs to vote from his/her hometown only. And voters those not able to do that remain deprived of the lack of voting right. With the proposed voting system, any eligible voter can vote from the voting booth from the same area he is present in. At the time of voting in the elections, the e-voting process authentication can be done using finger vein sensing, which verifies the fingerprint with the AADHAR card database that allows voters to cast their votes. Also the voted data and voters details can be sent to the nearby Database Administration unit in a timely manner using ATM System with cryptography technique. Read More...
|
Electronics Enginnering |
India |
71-73 |
21 |
I-Home: Intelligent Home Controlling and Monitoring System using Cloud and Android.
-Prabhjas Singh Bajwa ; Himani Leekha; Himalaya Leekha
In this paper we will be discussing about a low cost and flexible home control and monitoring system using cloud networking for accessing and controlling devices and home appliances remotely using Android based Smart phone app. The framework of the monitoring system is based on combination of pervasive distributed sensing units and information system for data aggregation, interpretation and context awareness. Results are interesting as the reliability of sensing information transmission through the proposed integrated networking architecture is about 89%. The prototype was tested to generate real-time graphical information instead of test bed scenario. Read More...
|
Information Technology |
India |
74-78 |
22 |
Performance Study of Basaveshwar Teaching and General Hospital Wastewater Treatment Plant at Kalaburgi
-Revanna ; Asso.Prof.Dashrath Kolur
In this paper a Sequencing Batch Reactor (SBR) equipped for treating the hospital wastewaters has been studied in order to evaluate the removal of organic matter and other nutrients. The main goal was to examine the performance efficiency of the SBR used to treat hospital wastewater. Process efficiency was evaluated in terms of TS, BOD, COD, NO3-N, Sulphate and Chloride removal. The treatment plant located at the Basaveshwar Teaching and General Hospital Kalaburgi, India. The performance of Treatment Plant for biological nutrient removal was evaluated during 24 sample (06/10/2015 to 26/12/2015) of operation. The influent TS, BOD, COD, NO3-N, Sulphate and Chloride averaged at 680, 290, 435, 10, 43 and 122 mg/l respectively. The final treated effluent TS, BOD, COD, NO3-N, Sulphate and Chloride for the same period averaged 112, 20, 55, 42, 13.17 and 24.5 mg/l respectively. The operating results of the SBR process is both effective and efficient in meeting the water discharge and reuse quality requirements at the hospital. The SBR showed a high TS, BOD and COD removal. The removal efficiencies were high from the start of operation with TS, BOD and COD removal efficiencies of 82± 3% and 92 ± 2% and 86±3% respectively. The adoption of such approach resulted in: (1) Protecting the environment from pollution caused by the improper wastewater disposals, mitigating and reducing of the environmental and health problems and risks; (2) Providing a better management of the wastewater resources by reusing the treated wastewater for gardening purposes (3) Protecting the surface and ground water resources. Read More...
|
Environmental Engineering |
India |
79-85 |
23 |
Analysis of Fitness Function in Designing Genetic Algorithm Based Intrusion Detection System
-Prof. Vithalpura Jahnavi S ; Prof. H.M.Diwanji
Network Intrusion detection system is tool to monitor & identify intrusion in computers networks. The genetic algorithm is employed to derive a set of classification rules from network audit data. Different data sets are used as an audit data .From these data sets only specific features are selected and represented as chromosomes, which represent rules. The weighted sum model, support-confidence framework or reward penalty framework is utilized as fitness function to judge the quality of each rule. Best rule collection or knowledge base improves IDS performance by improving detection rate and reducing false alarm rate. The weighted sum model is generally more helpful for identification of network anomalous behaviors. The support –confidence framework is simply identifying network intrusions or precisely classifying the types of intrusions. Reward penalty technique used to give reward to the good chromosome and to apply penalty on the bad chromosome. This paper gives detail study about research carried out in fitness function of genetic based intrusion detection system. Read More...
|
INFORMATION TECHNOLOGY ENGINEERING |
India |
86-92 |
24 |
Home Automation Security and Storage System Using Cloud Computing
-M.Kanchana ; B.Ajay Kannan; D.Jaiganesh
Home Automation, Security And Storage using cloud network is a system that uses computers or mobile devices to control basic home functions and features automatically through internet from anywhere around the world. An Automated Home is sometimes called a smart home. This network uses a consolidation of a mobile phone application and PC based program to provide the means of user interface to the consumer. The home automation system differs from other system by allowing the user to operate the system from anywhere around the world through internet connection. In this paper we have developed a Home Automation system that employs the integration of multi-touch mobile devices, cloud networking, wireless communication to provide the user with remote control of various lights and appliances within their home. The home automation system differs from other systems by allowing the user to operate the system without the dependency of a mobile carrier. This system is designed to be low cost and expandable allowing a variety of devices to be controlled. The Home Security and Storage system makes use of sensors, video cameras for remote sensing and surveillance, streams live video and records it for future playback and a central device to secure an area. Currently the devices are standalone and not require the users to be physically present to operate the devices with no interaction possible between two different devices. The system is also limited by its computational resources and storage capacity. For this project, I have developed a cloud based client server architecture to address these limitations and also to provide security and sharing functionalities along with remote diagnostics. This project has a device level framework to communicate with and exchange information with a cloud server. The project also addresses the primary limitations of cloud computing namely security, privacy and user control. Read More...
|
Computer Science & Engineering |
India |
93-97 |
25 |
Copy-Move Tampering Detection using SURF
-Vaibhavi Panchal ; Paresh Patel
In the present world, images and videos are the main carrier of information. So that, they are usually provided as essential evidence in many different areas like ranging from mainstream media, journalism and scientific publication, criminal investigation and surveillance system, etc. However, this source of information can be easily tampered by using open source of powerful computer applications like Photoshop, Magisto Video Editor, Cyber Link Director Suite, Corel Video Studio Pro, etc. For making tampering more robust, various transformation like scaling, rotation, lighting changes, blurring etc. applied. Copy-move image forgery is frequently used to tamper the image. In copy-move forgery, a specific area is copied and then pasted into any region of the image. An efficient approach for detecting copy-move tampering is to use visual feature such as Speed Up Robust Features (SURF). This paper presents a tempering detection method based on SURF, which detects the key points and their corresponding features. From the key points, grouping is performed on the matched key points, which shows the copied and pasted regions. Read More...
|
Computer Engineering |
India |
98-100 |
26 |
Test Compaction of Logic Blocks by Sharing of Transparent Scan Sequences Using Walsh Code Algorithm
-Janapriya.A.S ; Sivaganesan.S
An arbitrary design implemented into a field-programmable gate array (FPGA). FPGA contains many logical blocks. An approach provides transparent scan to share tests among different logic blocks whose primary inputs and outputs are included in scan chains even if the blocks have different numbers of state variables. The transparent-scan sequences based on tests for one logic block could detect faults in other logic blocks, with different numbers of state variable. It uses n number of test configuration instead of 2n number of test configuration by walsh code algorithm. Transparent scan enhances the ability to produce a compact test set for a group of logic blocks. The procedure obtains a set of transparent-scan sequences for a group of logic blocks from compacted test sets for the logic blocks in the group. From this set, it selects a subset that detects all the target faults, which are detected by the complete set. Read More...
|
ELECTRONICS AND COMMUNICATION ENGINEERING |
India |
101-104 |
27 |
Privacy Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
-Swati Khilare ; Prof. R. A. Jamadar; Swati Barsagade; Nilima Bhujbal; Kalika Kambale
Multi-keyword ranked search over encrypted cloud data (MRSE) while preserving strict system-wise privacy in cloud computing paradigm. Among various multi-keyword semantics, we choose the efficient principle of “coordinate matchingâ€, i.e., as many matches as possible, to capture the similarity between search query and data documents. Specifically, we use “inner product similarityâ€, i.e., the number of query keywords appearing in a document, to quantitatively evaluate the similarity of that document to the search query in “coordinate matching†principle. However, directly outsourcing data vector or query vector will violate index privacy or search privacy. To meet the challenge of supporting such multi-keyword semantic without privacy breaches, we propose a basic MRSE scheme using secure inner product computation, which is adapted from a secure k-nearest neighbor (kNN) technique, and then improve it step by step to achieve various privacy requirements. Read More...
|
Computer Science and Engineering |
India |
105-107 |
28 |
Traffic Management For Emergency Vehicle Routing
-Ajit Chinchawade ; Ajit Chinchawade; Akshay Patil ; Avinash Dhamdhere; Rajesh Prajapati
An ambulance inward a couple of seconds late can be the difference between life and death for some. As different technologies emerge, various approaches to expediting the movement of emergency, Vehicles have evolved. Horns, sirens and blinking lights were early attempts that are no longer sufficient in most places to clear traffic on the emergency vehicle’s route. In these situations, traffic signal pre-emption has made it possible to guide traffic to move in favour of clearing the emergency vehicle’s route. Early traffic signal pre-emption approaches depended on direct communication between an emergency vehicle’s signal emitter and a corresponding signal receiver on the traffic light it was approaching. Consequently, the position of the vehicle could be detected. Later, (D)GPS was used to more precisely locate the emergency vehicle. This solution was more improved by using competent or uniform ideal path planning algorithms to select the path of the emergency vehicle. In the state-of-the-art in emergency vehicle routing. We implement a graph version of the D*Lite informed search algorithm to efficiently and dynamically plan optimal paths for the emergency vehicle while taking into consideration the real-time updates of congestion levels and other delays to travel time. The results validate our hypothesis demonstrating that traffic management can improve travel time under uncertain congestion conditions, and that incorporating an appropriate traffic light pre-emption mechanism can further improve travel time for an emergency vehicle; potentially saving lives. Read More...
|
Information technology |
India |
108-109 |
29 |
Dearth the Security of Smartphone Messaging Application : Whatsapp
-Kritarth Y. Jhala ; Darsh M. Patel
The domination of social networking applications such as WhatsApp, Facebook, Viber continues to grow exponentially with WhatsApp being the undisputed leader amongst a vast series of social networking and chat messengers with more than 600 million users worldwide and being the number one paid application in more than 131 countries. Arguably privacy is a key draw for social media such as facebook, viber, whatsapp users when it comes to any mobile chat option and as a leader on the market WhatsApp has found itself in some hot water after researchers called out a potential security vulnerability. Generally WhatsApp is a very popular messenger for smart devices only. This paper demonstrates how to capture the password of targate device WhatsApp account using the different gateway level proxies like SSL/TLS proxy, MITM proxy. Once attacker received this password attacker can use it to communicate to the WhatsApp main servers directly or via a local framework. Read More...
|
Computer Science |
India |
110-113 |
30 |
Hybrid Matrix Code for Enhanced Memory Reliability against Multiple Cell upsets
-Sunitha.K ; S.Maria Antony
The advancement in technologies results in reduction of transistor size which makes the devices more vulnerable to noise and radiation effect that causes soft errors. Soft errors or transient error occurs when radioactive atoms decay and release alpha particles into the chip. These alpha particles hit the memory cell and change its state value which affects memory reliability. Soft errors in Memories can cause multiple cell upsets (MCUs) around the location of strike. The memory cells can be protected against MCUs using various Error Correction Codes (ECCs). Decimal Matrix Code (DMC) is a type of ECC that has been recently proposed for memory protection. The main issue of using DMC is that it has more redundant bits and limited error correction capability compared to the proposed work. The Hybrid Matrix code (HMC) is a combination of Matrix Code and Hamming code along with Encoder Reuse technique (ERT) has been proposed to assure reliability in the presence of MCUs and reduces the redundant bits and it corrects more error compared to the existing method. ERT uses HMC encoder itself to be part of the decoder. The ERT is used to minimize the area overhead of extra circuits without disturbing the whole encoding and decoding process. The proposed algorithm is coded in VHDL and simulated using ModelSim and Xilinx ISE 8.1i Simulator. The results obtained show reduced area usage, delay overhead and redundant bits compared to existing method. Read More...
|
ELECTRONICS AND COMMUNICATION ENGINEERING |
India |
114-117 |
31 |
A Review: Automatic Tyre Inflanation System
-Harshal Junankar ; Vishnusagar Bihare; Nishant Giradkar; Chetal Gupta
In ancient time, after the discovery of wheel by man, it has been used extensively for various purposes and it is vital part of human life for ages. These wheels runs human life faster and faster with new technology and one such technology is on board air inflation system used in automobiles. Tyres are the second-highest cost for the trucking industry. The on board air inflation system is used to maintain the pressure of tyres in running condition. The environmental conditions varies according to region, seasons because of this, it require maintaining the tyres pressure for better performance according to conditions. The most important application of this system is in military vehicle. For the military vehicle, the environmental condition, land conditions are continuously varying and they have to face very worst condition like heavy rainfall, snowfall, deserts. At that remote place no such devices are available for maintenances of the tyres. At some crucial times like war conditions or any flood conditions there is no time to filling the air. Thus there arises a need for automatic tyre inflation system. This can be done by employing appropriate technique. This project deals with the design and fabrication of automatic tyre inflation system. Read More...
|
MECHANICAL ENGINEERING |
India |
118-120 |
32 |
Studies on Physicochemical Characteristics And Fertility of Soil By Addition of Banana Peels-Waste Management
-Neha Panwar
Soil is an important ecological factor because it is a complex physical and biological system providing support, water, nutrients and oxygen for the organism. It is a bridge between the inorganic, organic and living world. Soil is a very important material for plants and as well as animals and humans for their activity. It is very essential to determine the soil characteristics to know the soil quality. Here in our study soil sample of garden area of Christian Eminent College, Indore city have been analyzed for 7 days. The present study was undertaken with aim to study the effect of banana peels on physicochemical parameters such as colour, temperature, pH, electrical conductivity, moisture contents, available phosphate, ammonical nitrate content, total organic carbon, and sulphure content. Read More...
|
Environment Engineering |
India |
121-125 |
33 |
Image Scrutinization Based on Visual Appearance Model
-Shah Parth Maheshkumar ; Hardik N Mewada; Dhairya Vyas
Classification between the objects is easy task for humans but it has proved to be a complex problem for machines. The raise of high-capacity computers, the availability of high quality and low-priced video cameras, and the increasing need for automatic video analysis has generated an interest in object classification algorithms. A simple classification system consists of a camera fixed high above the interested zone, where images are captured and consequently processed. Classification includes image sensors, image pre- processing, object detection, object segmentation, feature extraction and object classification. Classification system consists of database that contains predefined patterns that compares with detected object to classify in to proper category. Image classification is an important and challenging task in various application domains, including biomedical imaging, biometry, video- surveillance, vehicle navigation, industrial visual inspection, robot navigation, and remote sensing. Read More...
|
image processing |
India |
126-129 |
34 |
Literature Review on Feasibility study of City Bus Service in Godhra City
-Khatri Pallavi V
Urbanization, growth of cities, increase in population, transportation problems, congestion, accidents, delay, increase in number of vehicles, with extension of urban area trip length have also increased, travel demand increases. Thus it has become necessary to provide city bus service or urban mass transportation system. For growing towns which are growing rapidly and extended and are involved in urban are, thus it have been necessary to provide a convenient mode of transport which should be easy accessible and cheap. Thus, the study defines to study the feasibility, demand of public transportation system. The study area is Godhra city which comes under “A –Class†Municipality and the administrative headquarter of Panchmahal district in central Gujarat, India. Read More...
|
civil engineering |
India |
130-133 |
35 |
Intelligent Firewall System using ANN and Decoy Data
-Aditya Samant ; Sudip Kumar Shrestha; Ashish Agarwal; Rahul Samant
A honey-pot is a non-production system, design to interact with cyber-attackers to retrieve intelligence on attack techniques and behaviors. With the increase in the dependency on the Internet both at the personal and commercial level, intrusion detection becomes a challenging process. The challenge here is not only to be able to actively monitor large numbers of systems, but also to be able to react quickly to different situations. Implementations however falling into 3 major categories: high-interaction, medium-interaction, low-interaction. Honey-d, created by Niels Provos, is an open source project implemented as a small software daemon that creates virtual hosts on a network (low-interaction). High-interaction honey-pot systems are typically hardware replicas of existing operational components that include the appropriate software. These systems do not mimic services, but are deployed with working instances. Our type of system provides a high-interacting solution that is less prone to discovery of its deceptive purpose by network intruders. Therefore these issues can be addressed by our efficiently as the systems are at higher risk of facing an attack from an intruder. The system we speak of will perform interactions in Real time, data and records will be saved on a database primarily will be developed an NIDES(Next Generation Intrusion detection system).The system will provide the modules of port/socket scanning, packet scanning, SQL injection modules in the working manner. As such a system having or running these 3 modules together has not been taught of in the practical manner. Read More...
|
Information Techonology |
India |
134-137 |
36 |
A Survey on Application Collusion Attacks on Android Permission-Mechanism
-Dhavalkumar K. Baraiya ; Prof. Hiteishi Diwanji
Considering the wide range of functionalities provided by smartphones, smartphone-users’ privacy and security of their personal information is of vital importance. Android has been the most targeted platform for malware attacks, due to being the most popular platform, open source system and its vulnerable architecture. In this paper, we have studied about android permission mechanism, collusion attack, and covert and overt communication channels. Collusion attacks allow apps to indirectly execute operations, which they should not be able to execute, based on their declared permissions. For instance, disclosure of users’ private data (e.g., contacts or GPS location) to a destined attacker, by apps that do not have direct access to such data or cannot directly establish remote connections. According to the survey[1], there’s significant potential of collusion attacks and these attacks are really hard to detect, therefore it is considered to be a real threat to smartphone security. Read More...
|
Computer Science and Engineering |
India |
138-142 |
37 |
A Survey on Android Malware and Malware Detection Techniques
-Dhaval Baraiya ; Prof. Hiteishi Diwanji
with the increased use of Android smartphones, the amount and variety of android malware is growing rapidly. Being the most popular platform, open source system and its vulnerable architecture, Android has been the most targeted platform for malware attacks. Most mobile malware is designed to steal users' money, including SMS-Trojans, and lots of backdoors and Trojans. In this paper, we have explored android malware, and analyzed PCA and permission-combination based scheme. We found that PCA based method works efficiently to detect unknown malware in comparison to permission-combination based method. However, neither of these permission based methods can detect colluding attack in which one application communicates with other application by creating overt and covert channel. The findings of the review have been well documented in this paper. Read More...
|
Computer Science and Engineering |
India |
143-147 |
38 |
Improved Direct Torque Control Strategies for Low Speed Range Operation of Induction Motor Drives
-Aboti Ashish Narendrabhai ; Prof. Pritesh R Mankad; Mr.Patel Tejas I
Induction motors are the starting point to design an electrical drive system which is widely used in many industrial applications. In modern control theory, different mathematical models describe induction motor according to the employed control methods. Vector control strategy can be applied to this electrical motor type in symmetrical three phase version or in unsymmetrical two phase version. The operation of the induction motor can be analysed similar to a DC motor through this control method. With the Joint progress of the power electronics and numerical electronics it is possible today to deal with the axis control with variable speed in low power applications. With these technological projections, various command approaches have been developed by the scientific community to master in real time, the flux and the torque of the electrical machines, the direct torque control (DTC) scheme being one of the most recent steps in this direction. This scheme provides excellent properties of regulation without rotational speed feedback. In this control scheme the electromagnetic torque and stator flux magnitude are estimated with only stator voltages and currents and this estimation does not depend on motor parameters except for the stator resistance. The direct torque controlled motor suffers from great torque ripple due to fast response of torque. the motor speed is an important parameter which affects on the motor torque ripple in low speed, applying a forward nonzero voltage vector causes to jump up of motor torque and this leads to a positive ripple in torque response. Read More...
|
ELECTRICAL DRIVES |
India |
148-150 |
39 |
Enhancing Quality of Service over 802.16 Network using Variants of TCP
-Gurvinder Singh ; Gurvinder Singh; Gagandeep Singh; Sumit Kumar
Wireless networks are generally less efficient and unpredictable compared to wired networks, which make QoS provisioning a bigger challenge for wireless communications. The evergreen demand for fast delivery of large volumes of data is one of the challenging task for wireless communication technology. WiMAX is a wireless broadband solution that offers a rich set of features with a lot of flexibility in terms of deployment options and potential service offerings. Its main objective is to provide quality with cost effectiveness. But Delivering QoS is more challenging for mobile broadband than for fixed. The time variability and unpredictability of the channel become more acute, and complication arises from the need to hand over sessions from one cell to another as the user moves across their coverage boundaries. WiMAX to provide high-speed access to the Internet where the transmission control protocol (TCP) is the core transport protocol. Unlike routing, where packets are relayed hop-by-hop toward their destination, TCP actually provides reliable end to-end transmission of transport-level segments from source to receiver. As TCP was designed for wired networks it considers that all packet loss in the network is due to congestion. Wireless medium is more exposed to transmission errors and sudden topological changes. So in this thesis work, we investigate the effects of subscriber’s mean speed on the performance characteristics of three representative TCP schemes, namely TCP-New Reno, Westwood and Cubic, in WiMAX network environment, under the conditions of correlated lossy links, route failures and network congestion using ns2. Read More...
|
computer science |
India |
151-156 |
40 |
A review on feature extraction techniques for speaker dependent voice recognition
-DURGESH SHASTRI
Speaker dependent mode is widely used technique to recognize the voice. Accuracy, low error rate, and easy to build are the key features that makes the speaker dependent mode more comfortable and therefore is widely used to recognize the voice. The feature extraction technique plays key role in voice recognition. A carefully chosen technique will improve the efficiency to recognize the word. This paper contains different available technique of feature extraction will conclude the better technique. Read More...
|
SIGNAL PROCESSING |
India |
157-159 |
41 |
Accurate Tracking of a Target Vehicle in Wireless Sensor Networks
-M.Kanchana ; Divakar S; Manikandan P
A Wireless Sensor Network (WSN) consists of spatially distributed autonomous devices that cooperatively sense physical or environmental conditions, such as temperature, sound, vibration, pressure, motion, or pollutants at different locations. We propose a new tracking framework, called Face Track, which is the common area connecting one or more region, is called a face. Instead of predicting the target location separately in a face, we estimate the target’s moving toward another face. We introduce an edge detection algorithm to generate each face further in such a way that the nodes can prepare ahead of the target’s moving, which greatly helps tracking the target in a timely fashion and recovering from special cases, e.g., sensor fault, loss of tracking. Also, we develop an optimal selection algorithm to select which sensors of faces to query and to forward the tracking data. Read More...
|
Computer Science & Engineering |
India |
166-168 |
42 |
Remote Locking Of Android Phone Throught the SMS and Wipe System
-Kiran Baravkar ; Tushar Dimble
Android offers hundreds of thousands of applications via application markets and users can readily install these app. However, this growth in smartphone usage and the ability to install third-party applications has given rise to several security concerns. In this paper, we present smartphone security mechanisms. Read More...
|
Information Technology |
India |
169-170 |
43 |
Stepper Motor Interfacing Using NI-myRIO
-Anusha.S ; E.Bhuvaneswarri; R.Aasin Rukshna; T.Devasheena
Stepper motors are one of the most indispensable entities of any industrial sector, be it the process industries or the manufacturing industries. Since the invention of wheel by early man, the need for motion has been high and that grew as years passed to indicate the requirement of manufacturing in a flow that is in a moving conveyor belt. Not only in conveyor belts, are stepper motors used in various other units too. Existing stepper motors are programmed through microprocessors, controllers and electrical circuits. LabVIEW a software pioneered by National Instruments has also been used to program them, but using NI-myRIO a new product launched by National Instruments, hasn’t been put to use for such a purpose so far. My-RIO’s extensive abilities has been put to good use in this project where using simple techniques the stepper motor is programmed to operate using a driver circuit according to user’s desired conditions. Read More...
|
Electrical Engineering |
India |
171-174 |
44 |
A Review Study On Performance Modelling of Single Cylinder CI Engine Fuelled with Blend of Diesel and Pyrolysis using Taguchi Method
-Bhatiya Sanketkumar Ashokbhai ; Prof.Dinesh K.Koli
There are many alternative or blend fuels are discovered and tested successfully in existing engine with and without engine modification. Still research is continuing in this area to find best alternative fuel for the existing diesel engine. In this experimental study has been carried out for pyrolysis oil blended with diesel used in single cylinder diesel engine. Blending of pyrolysis oil with diesel in maximum possible proportion helps to reduce the consumption of diesel fuel. The main aim of this experiment is to optimize parameter which gives maximum performance for mechanical efficiency and break thermal efficiency. In this study, the effects of parameters i.e. percentage of pyrolysis oil in diesel blend, injection pressure and load are taken as variable for optimization. As the experiment required simultaneously optimization of four parameters with five levels, taguchi method of optimization is used in this experiment. From this experimental study we will get maximum performance for mechanical and break thermal efficiency for single cylinder CI engine fuelled with blend of diesel and Pyrolysis using Taguchi Method. Read More...
|
MECHANICAL ENGINEERING |
India |
175-178 |
45 |
A Review on Adaptive Modulation and Coding Techniques for OFDM
-Khushboo K. Patel
Wireless communication is observing a fast development in today’s communication era. Planning a good, stable and reliable network can be quite challenging. At the same time, it poses several interesting optimization problems. Here we have analyzed adaptive modulation scheme with their performance in changing channel condition. Different order modulations and different coding schemes, allow sending more bits per symbol, thus gaining higher throughputs and better spectral efficiencies. This paper presents review on various modulation and coding scheme to improve SNR and BER. Here the various modulation types will be implemented in a single Matlab function that can be called with the appropriate coefficients. Read More...
|
Electronics and coomunication |
India |
179-182 |
46 |
Recommendation System using Apriori Algorithm
-Abhishek Oraganti ; Karandeep Singh Talwar; Ninad Mahajan; Pravin Narsale
Recommendation Systems are changing from novelties which were used by a few E-commerce sites, to tools that are almost-shaping the world of E-commerce. Many of the largest commerce web sites are already using recommendation systems to encourage their customers, locate products. A recommendation system learns from a customer and recommends products that he/she will investigate most necessary from the available products. This research work is to recommend a product using Apriori algorithm. This algorithm is mainly used to find frequently purchased items/products. Its aim is to detect association rules. Read More...
|
Information Technology |
India |
183-185 |
47 |
Review on Application of GIS in Water Distribution System Planning & Designing
-Surani Dhara J. ; Prof. G.V.Dihora
Water distribution systems constitute a vital part of civil infrastructure. The purpose of a water distribution system is to ensure the supply of water to the users at specified demand.†Water distribution system is a complex system that integrates several spatial features. Therefore, it is needed to use multi- support geographical information system which has capability of storing; managing and analyzing the large data set. The implementation of GIS can not only reduce the time needed for analyzing information but also can ensure a more efficient use of the resource with high flexibility in time and scale. In the field of water distribution system (WDS) analysis, the problems occurs that, survey of area, lying of a pipe lines and location of ESR. So the solution is that with the use of GIS tools. After the use of GIS tools we can get results like node elevation, length of pipes, location of ESR, and also create “inp†files for hydraulic simulation models. The current paper describes the study of various literatures on such a strategy of combining the use of GIS and various hydraulic simulation models like EPANET, WaterCAD etc. Read More...
|
WATER RESOURCES MANAGEMENT (CIVIL ENGINEERING) |
India |
186-188 |
48 |
Movie RateApp: Online Reviews Mining & Predicting Sales Performance
-Ruman Bagwan ; Chetan Gorane; Aditya Bankar; Vikram Bankar
Nowadays posting online review has become a way of expressing our feeling. With the help of reviews the products sales can be affected hugely. The products Economic Value can get fluctuated. In this paper, we are going to focus on Movie Domain and predict the sales of particular movie. For this purpose we are proposing Autoregressive Sentiment-Aware model for sales prediction (ARSA). An Autoregressive Sentiment and Quality Aware model (ARSQA) assist us to further improve the accuracy of prediction by considering the quality factor. Rigorous Experiment conducted on a large movie data set confirms the effectiveness of the proposed approach. Read More...
|
Information Technology |
India |
189-190 |
49 |
Exploration Potential and Economic Significance of Puga Valley Borax Deposit, Ladakh, India
-Indresh Singh Rathore
Borates are compounds that contain boron, a chemical element. Borax is an important compound of borates. The uses of borates to mankind are known form very early times but common use came in the late 19th century when sizable deposits are discovered in USA, Turkey, and Russia. Borate minerals are now used extensively worldwide in chemical, glass, ceramics, LCD, high-yield crop fertilizers, wood preservatives and speciality products. Majority of the world production of borates is coming from USA and Turkey where thorough exploration has been done and significant deposits are discovered. Many regions especially in Asian and European countries like India, China are yet to be fully explored for commercial mining of borates. Puga valley of Ladakh in India is one of the examples. Preliminary exploration has been carried out in this region by Geological Survey of India (GSI) during 1970s but afterward no one has looked into the exploration and economic significance of this area. Ample scope exists for exploration in this region. Asian countries, in fact, are driving the consumption growth of borates swiftly. The demand and supply is completely met by USA and Turkish producers. India is totally dependent on import to meet domestic need and if Puga valley can be put on production scale, it can nourish India’s demand to some extent. In this paper, an attempt has been made to depict exploration potential and economic significance of the Puga borax deposit, Ladakh, India. Read More...
|
Geological Engineering |
India |
191-195 |
50 |
TLM using System C for Hearing Impairment Algorithm : A review
-Kaustubh A. Mahakalkar ; Mahesh T. Kolte
This is a review paper that tells that Transaction Level Modeling (TLM) is widely recognized and adopted approach for realize ESL in actual practice. TLM models are mostly applicable for broad range of designing tasks for e.g. architecture exploration, system performance analysis, HW/SW partitioning, etc. The key features behind adopting this style of methodology are derived from early functional verification, early software development, and higher system quality. Currently a working group named Open SystemC Initiative (OSCI) is defining a set of terminology for TLM and will also simultaneously develop some TLM standards. Read More...
|
Electronics and Telecommunication |
India |
196-198 |