IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
A.SANJEEVI KUMAR, DR.A.RAJALINGAM AND B.KOKILA Research Scholar, CMJ University, Shillong, India. Associate Professor, Saveetha Engineering College, Chennai, India. Assistant Professor, Velammal Engineering College, Chennai, India.
Assistant professor, Priyadarshini College of Engineering, Nagpur, India
Professor& HOD, Dept. Of Electronics, Visvesvaraya National Institute of Technology, Nagpur, India
V.V.Jaya Rama Krishnaiah, D.V.Chandra Sekhar, Dr. K.Ramchand H Rao, Dr. R Satya Prasad
Associate Professor, Dept of Computer Science, ASN COLLEGE, Tenali, India
Associate Professor, Dept of Computer Science, TJPS College, Guntur,India
Professor, Department of CSE, ASN college of Engineering, Tenali, India
Associate Professor, Department of CSE, Acharya Nagarjuna University, Guntur, India
Sheetal A. Raiyani, Shailendra Jain, Ashwin G. Raiyani
Department of CSE (Software System), Technocrats Institute of Technology, Bhopal, India
Department of CSE, Technocrats Institute of Technology, Bhopal, India
Department of CE, RK University, Gujarat, India
Bhavya Boggavarapu, Baby sindhura Katragadda, V. P. Krishna Anne
Department of CSE, K L University, Andhra Pradesh, India
Department of ECE, K L University, Andhra Pradesh, India
Department of CSE, K L University, Andhra Pradesh, India
Assistant Professor, Dept. of CSE, D. Y. Patil Institute of Engineering and Technology, Pimpri, Pune, India
Assistant Professor, Dept. of CSE, D. Y. Patil Institute of Engineering and Technology, Pimpri, Pune, India
M.Tech (EC) (4th SEM), Dept. of ECE , Krishna Institute of Engg & Tech, Ghaziabad, India
M.Tech (EC) (4th SEM), Dept. of ECE , Krishna Institute of Engg & Tech, Ghaziabad, India
Professor, Dept. of ECE , Krishna Institute of Engg & Tech, Ghaziabad, India
Department of CSE, Appa Institute of Engineering and Technology, Gulbarga, Karnataka, India
Department of ECE, Godutai College of Engineering for women, Gulbarga. Karnataka, India
PRAMADITYA WICAKSONO Department of Cartography and Remote Sensing, Faculty of Geography, Universitas Gadjah Mada Yogyakarta, Indonesia
|
Abstract
Comparative Performance Investigation of TCP and SCTP Protocols over LTE/LTE-Advanced System
GHASSAN A. ABED, MAHAMOD ISMAIL, KASMIRAN JUMARI Faculty of Engineering and Built Environment, The National University of Malaysia, Malaysia
Abstract: Fourth Generation (4G) of mobile systems is now replacing the 3G and 2G families of standards.Long Term Evolution (LTE) and LTE-Advanced network is the continuation of 3GPP-LTE (3GPP: 3rd Generation Partnership Project) and achieved the next step towards high data rate transfers and support of all multimedia functions and requiremensts. One of the main solutions to improve the performance of the new wireless communication systems is by improving the protocols used over these networks such as Transmission Control Protocol (TCP) and Stream Control Transmission Protocol (SCTP). This paper investigates the comparative performance of TCP and SCTP protocols over LTE and LTE-Advanced systems.
A Realistic Model and Simulation Parameters of LTE-Advanced Networks
GHASSAN A. ABED, MAHAMOD ISMAIL, KASMIRAN JUMARI Faculty of Engineering and Built Environment, The National University of Malaysia, Malaysia.
Abstract: Long Term Evolution Advanced (LTE-Advanced) network is the continuation of 3GPP-LTE (3GPP: 3rd Generation Partnership Project) and it targets to advanced develop of the requirements of LTE in terms of throughput and coverage. Then, LTE- Advanced is not new as a radio access technology, but it is an evolution of LTE to enhance the performance. LTE-Advanced was accomplished in late of 2010 and it enhanced the LTE spectrum flexibility over carrier aggregation, further its extended multi antenna broadcast, where that introduced a supporting for the relaying and provided an enhancement in the part of inter-cell interference coordination in heterogeneous network utilizations. Recently, LTE-Advanced network is the promised candidate for 4G cellular systems to run into top rates of data reaches to 100 Mbps with high mobility and 1Gbps with low mobility, where that are wanted in 4G system. Furthermore, LTE-Advanced must be capable to upkeep broader bandwidth than it provided by LTE. This article offered the designing and the architecture of LTE-Advanced further to the key features with the full configurations and the simulation tools to model the traffic links of it using network simulator 2 (NS-2).
Optimized RTS/CTS Exchange Approach for Better Performance in Multi-Hope WLAN Environment
DIVYA RAI, SANTOSH SHARMA, SHAISTA NAZNEE Maharana Pratap College of Technology, Gwalior, India.
Abstract: The rapid growth of computer network takes the concentration of researchers in this era. When the data would like to transmit from source to destination then RTS/CTS communicate first in order to reduce the packet collision. This communication takes a long time for hand shaking. There is a need of improving the performance of RTS/CTS mechanism. In this paper focus on the problem with RTS/CTS protocol ie performance of RTS/CTS handshaking mechanism degrade if system having few number of hidden node ,to overcome this problem presented paper proposed a methodology with the hidden node and minimized transmission overhead of RTS/CTS handshaking.
Frame Based Prediction for Games in Mobile Devices Using Dynamic Voltage Scaling
A.SANJEEVI KUMAR, DR.A.RAJALINGAM AND B.KOKILA Research Scholar, CMJ University, Shillong, India. Associate Professor, Saveetha Engineering College, Chennai, India. Assistant Professor, Velammal Engineering College, Chennai, India.
Abstract: Mobile devices have major problems with battery life. Dynamic voltage scaling technique is used to solve this problem with low power utilization .Most of the video games are implemented by higher video decoding .In this paper we are implementing frame based prediction algorithm for mobile devices games with different methods of DVS .The workload of application is divided and predicted by past history and every frames are executed with processor without affecting the quality of decoding and power consumption is also achieved.
Keywords: Low power VLSI, Dynamic Voltage Scaling, Computer Games, Workload Characterization, Power-aware Design, Prediction Algorithm.
Improving Software Quality through the Development of Code Readability
Dr.P.SIVAPRAKASAM, V.SANGEETHA
Reader, Sri Vasavi College, Erode, Tamilnadu, India
Assistant Professor, Department of computer Science, Vysya College, Salem, Tamilnadu, India
Abstract: In this paper we present the role of software readability on software development cost. We dispute that the upfront cost of incorporating software readability pays off attractively at later stages in the life cycle, especially at the maintenance phase which is where most of the life cycle cost of software is expended. We explore the concept of code readability and investigate its relation to software quality. We build an automated readability measure and show that it can be 75 percent effective and better than a human, on average, at predicting readability judgments. We also measure the snippets on over million lines of code, as well as longitudinally, over many releases of selected projects. At last, we discuss the suggestions of this study on Programming language design and engineering practice.
Dept. of Electronics and Telecommunication Engineering, Govt. College of Engineering, Aurangabad, (M.S.), India
Abstract: The interactive voice response (ivr) system serves as a bridge between people & computer by connecting the telephone network with instructions. The telephone user can access the information from anywhere at anytime simply by dialing a specified number and following an automated instruction when a connection has been established. The IVR system uses pre-recorded or computer generated voice responses to provide information in response to an input from a telephone caller. The input may be given by means of touch-tone or Dual Tone Multi-Frequency (DTMF) signal, which is generated when a caller presses a key of his/her telephone set, and the sequence of messages to be played is determined dynamically according to an internal menu structure (maintained within the IVR application program) and the user input. The IVR System which will be designed to provide an ideal platform for the operation of start-ups and existing small concern . It will be a highly economical & efficient way to replace the Dialogic card which is very costly and requires a high maintenance and regular up gradation. The IVRS system which will be designed will consist of simple components like microcontroller and some basic application chips interfaced to a PC which will have small software running in the backend while the other jobs are performed on the front end.
Keywords: Dual Tone Multi-Frequency (DTMF), Goertzel algorithm, Speech synthesis, Voice Over Internet Protocol.
Performance Analysis of Wimax System by Increasing Capacity Using Various Compression Techniques
Anuradha.R.kondelwar, Dr.K.D.Kulat
Assistant professor, Priyadarshini College of Engineering, Nagpur, India
Professor& HOD, Dept. Of Electronics, Visvesvaraya National Institute of Technology, Nagpur, India
Abstract: With the tremendous increase in wireless technology and wireless services in the last few decades has put forward the need of an efficient wireless technology that provides high data rates. WiMAX is a promising wireless transmission technology that offers both fixed and mobile broadband wireless accesses, based on methods defined in 802.16 IEEE standards. IEEE 802.16 (WiMAX) standard presents specifications for fixed Line of sight (LOS) communication in the range of 10-66GHz (802.16c), as well as for fixed, portable, Non-LOS communication in the range of 2-11GHz (802.16a, 802.16d). This paper presents an extensive study of WiMAX system. For increasing the capacity in proposed wimax system different data compression techniques are used.The proposed modification to the WiMAX system is tested under AWGN channel. The results show that the proposed modifications in the system increases the SNR, channel capacity, better link reliability and throughput of the system.
Keywords: Fixed broadband wireless access point, Physical layer, MAC Layer, WAN, MAN, BWA, WiMAX, Quality of Service(QoS), OFDM
Assistant Professor
Department of Computer Science and Engineering
Velammal College of Engineering & Technology, Madurai, India.
Abstract: Ad hoc wireless networks in which nodes that can move freely have become key research areas in past and continue to dominate now also. This paper introduces and classifies several protocols in the field of constructing multicast concept in ad hoc wireless networks (MANETs). Classification is performed according to several points of view such as underlying topology structure, topology maintenance approaches, initialization of multicast session, zone management and dependency on unicast routing protocols.
Keywords: Mobile Ad hoc Networks; Multicasting; Routing Protocols; Zone; Mesh topology; Tree topology
Department of CSE, Lovely Professional University, Punjab, India
Abstract: As Zigbee is an standard for wireless personal network. Tree Routing is simple routing where the node communication is restricted to parent-child links only. There is no routing discovery in tree routing as well as routing overhead. But one demerit of tree routing is that end to end delay is increased during packet transmission which resulting more energy usage or energy consumption. After that when deeply study of Extended tree routing or improved tree routing in that neighbor table are implemented but finding the best neighbor node or apt node is not implemented. In the given new strategy it finds or choose the best node or data transmission and then after energy model helps in conservation of energy as well as routing cost balance. It reduces the network cost also. Simulations have been run using NS2. This simulation concludes the trace file which shows the visual transmission of data and energy traces for that network transmission.
Keywords: Energy Model, Cost, Neighbor table, End to End Delay
V.V.Jaya Rama Krishnaiah, D.V.Chandra Sekhar, Dr. K.Ramchand H Rao, Dr. R Satya Prasad
Associate Professor, Dept of Computer Science, ASN COLLEGE, Tenali, India
Associate Professor, Dept of Computer Science, TJPS College, Guntur,India
Professor, Department of CSE, ASN college of Engineering, Tenali, India
Associate Professor, Department of CSE, Acharya Nagarjuna University, Guntur, India
Abstract: The amount of information related to biomedical databases is growing so rapidly that the rate at which researchers can convert it into knowledge cannot keep in pace. In this information age it is easy to store large amounts of data electronically, but the proliferations of documents available are structured and unstructured form. We need a tool to extract information and identification of the key concepts from biomedical documents and Bio-medical databases. Duo Mining is a proposed tool, which mines the data from diabetic type bio-medical documents and databases and converts into the knowledge format, and this paper suggests Data mining architecture in addition with Knowledge discovery process.
Keywords: Duo mining, Type1 Diabetics, Data Mining, Text mining, Biomedical Literature
Advanced Preprocessing using Distinct User Identification in web log usage data
Sheetal A. Raiyani, Shailendra Jain, Ashwin G. Raiyani
Department of CSE (Software System), Technocrats Institute of Technology, Bhopal, India
Department of CSE, Technocrats Institute of Technology, Bhopal, India
Department of CE, RK University, Gujarat, India
Abstract: Millions of visitors interact daily with web sites around the world. Huge amount of data are being generated and these information could be very prized to the company in the field of accepting Customer’s behaviors. In this paper a complete preprocessing methodology having data cleaning, Enhanced preprocessing technique one of the User Identification which is key issue in preprocessing technique phase is to identify the web users. Traditional User Identification is based on the site structure by using some heuristic rules. In most cases relationship between pages are based on the site topology which reduced the efficiency of identification solve this problem we introduced proposed Technique DUI (Distinct User Identification) based on IP address ,Agent ,Referred pages on desired session time. Which can be used in counter terrorism, fraud detection and detection of unusual access of secure data, as well as through detection of frequent access behavior get better the overall designing and performance of future access. Experiments have proved that advanced data preprocessing technique can enhanced the quality of data preprocessing results.
Keywords: Web usage mining, Preprocessing, User identification, Session time, Server log
Maintenance of Entropy through Token Parcelling and Verification of Error Bumping Off For Protection In Cloud Computing
Bhavya Boggavarapu, Baby sindhura Katragadda, V. P. Krishna Anne
Department of CSE, K L University, Andhra Pradesh, India
Department of ECE, K L University, Andhra Pradesh, India
Department of CSE, K L University, Andhra Pradesh, India
Abstract: Secure Maintenance of data implementation through a large cloud, which is considered to be as an internet database, which is dynamic in fashion. It involves all the entropy values which are to be saved as to access it and it is the main threat removing scope in the present scenario which can play a key role in helping the organisation to withstand the effect it is facing from any personnel usage of activities further. As it is envisioned as next generation architecture of IT endeavour. This paper addresses the important aspect of providing quality of service and storage security. To make sure the correctness of users’ data in the cloud which is proposed effectively and flexibility using decentralized scheme opposing to its predecessors by utilizing the similar token with distributed verification of erasure-coded data. Thus proposed scheme achieves the integration of storage, correctness insurance, and data error localization i.e., identification of misbehaving servers including modifications like deletion, insertion, updating and append. Analysis shows that proposed scheme is highly efficient and resilient against tangled failures, malicious data modification attacks.
Extended Visual Cryptography for Color Shares using Random Number Generators
Savita Patil, Jyoti Rao
Assistant Professor, Dept. of CSE, D. Y. Patil Institute of Engineering and Technology, Pimpri, Pune, India
Assistant Professor, Dept. of CSE, D. Y. Patil Institute of Engineering and Technology, Pimpri, Pune, India
Abstract: Visual cryptography is a special image encryption technique. It is different from traditional cryptography, because it does not need complex computation to decrypt. The benefit of the visual secret sharing scheme is in its decryption process where without any complex cryptographic computation encrypted data is decrypted using Human Visual System (HVS). But the encryption technique proposed here uses a new k-n secret sharing scheme for color image where encryption (Division) of the image is done using Random Number generator and to decrypt the image at least a group of k shares out of n shares reveals the secret information, less of it will reveal no information. The concept of visual information pixel (VIP) synchronization and error diffusion is used to attain a color visual cryptography encryption method that produces meaningful color shares with high visual quality. VIP synchronization retains the positions of pixels carrying visual information of original images throughout the color channels and error diffusion generates shares pleasant to human eyes. Comparisons with previous approaches show the superior performance of the new method.
Keywords: Color meaningful shares, digital halftoning, error diffusion, random number, secret sharing, visual cryptography (VC).
VHDL Implementation using Elliptic Curve Point Multiplication
Ajay Kumar, Kunal Lala, Amit Kumar
M.Tech (EC) (4th SEM), Dept. of ECE , Krishna Institute of Engg & Tech, Ghaziabad, India
M.Tech (EC) (4th SEM), Dept. of ECE , Krishna Institute of Engg & Tech, Ghaziabad, India
Professor, Dept. of ECE , Krishna Institute of Engg & Tech, Ghaziabad, India
Abstract: This paper describes synthesizable VDHL implementation of elliptic curve Point Multiplication. Elliptic curves used for ECC are defined over mathematical structures called Galois fields. Based on the theory of ECC, this paper has carried out Modular addition/subtraction, EC Point doubling/addition, Modular multiplicative inversion, EC point multiplier, projective to affine coordinates conversion. Importantly for cryptography, the elliptic curve point multiplication is the operation on which the security of every elliptic curve cryptosystem relies on.
Keywords: Elliptic curve point addition, point doubling, Finite field arithmetic, Point multiplication, FPGA
Pad Dr. D.Y Patil Institute of Institute of Engineering and Technology, Pimpri , Pune, Maharashtra, India.
Abstract: In today’s world most information resources on the World Wide Web are published as HTML or XML pages and number of web pages is increasing rapidly with expansion of the web. In order to make better use of web information, technologies that can automatically re-organize and manipulate web pages are pursued such as by web information retrieval, web page classification and other web mining work. Research and application of Web text mining is an important branch in the data mining. Now people mainly use the search engine to look up Web information. The search engine like Google can hardly provide individual service according to different need of different user. However, Web text mining aims to resolve this problem. In Web text mining, the text extraction and the characteristic express of its extraction contents are the foundation of mining work, the text classification is the most important and basic mining method. Thus classification means classify each text of text set to a certain class depending on the definition of classification system. Thus, the challenge becomes not only to find all the subject occurrences, but also to filter out just those that have the desired meaning. Nowadays people usually use the search engine—Google, Yahoo etc. to browse the Web information mainly. But these search engines involve so wide range, whose intelligence level is low. It is very difficult to mine data further. The development of techniques for mining unstructured, semi-structured, and fully structured textual data has become increasingly important in industry.
Keywords: Text Mining, Extraction, Classification, Stemming, Stopword Removal
A brief study and comparison of Snort and Bro Open Source Network Intrusion Detection Systems
Pritika Mehra
Post Graduate Department of Computer Science and Applications
Khalsa College for Women, Amritsar, Punjab, India.
Abstract: Security administration plays a vital role in network management tasks. The intrusion detection systems are primarily designed to protect the availability, confidentiality and integrity of critical network information systems. There are plenty of IDSes to choose from, both commercial and open source. Since most of the commercial intrusion detection systems are at typically thousands of dollars and they tend to represent a significant resource requirement in themselves, for small networks, use of such IDS is not feasible. Therefore mostly open source IDS are being used. This paper provides a general working behaviour, features and comparison of two most popular open source network IDS - SNORT & BRO.
Keywords: alerts, intrusion, logging, network traffic, open source, packets
Public transport Bus Arrival Time Prediction with Seasonal and Special Emphasis on Weather Compensation changes using RNN
DR. RANJANA DINKAR RAUT, VINEET KUMAR GOYAL
Associate Professor, SGBA University, Amravati, Maharashtra, India
Department of ECE, MJRP University, Jaipur, Rajasthan, India
Abstract: Intelligent Transportation Systems is an application of current information and communications technologies to the transportation area. Bus arrival times are influenced by various factors, (e.g. weather conditions, traffic congestion and natural disasters etc) resulting delay in predefined schedule and inconvenience for passengers due to waiting times for buses. In this research, a set of ANN models, predicting bus arrival times based on seasonal changes, are developed through mining historical data for Jaipur – Delhi route, India. The results obtained are accurate, reduce average waiting and help in developed models which can be used to estimate bus arrival times. Recurrent neural network (RNN) techniques are applied to build an arrival time estimation model. The model exhibits a functional relation between real-time traffic data as the input variables and the predicted bus travel time according to weather conditions as the output variable.
Classification of crops using FCM segmentation and texture, color feature
Anandkumar Patil, Lalitha Y S
Department of CSE, Appa Institute of Engineering and Technology, Gulbarga, Karnataka, India
Department of ECE, Godutai College of Engineering for women, Gulbarga. Karnataka, India
Abstract: The objective of this study is to develop a FCM Segmentation that could distinguish crops as plant, soil and residue parts. This classification will help agronomist to decide crop pattern and cultivation practises. In this paper, collected the 10 different types of crops JPEG images from the fields. And stored as a database. After segmentation, color and texture features are applies to get the features of color and texture of the each crops. And the Euclidian distance algorithm used to identify the crops. Results show that classification accuracy is significantly improved. Hence, finally project has been demonstrated by using the plotted graphs. One for the accuracy of the images and another error rate in the classification of images.
Keywords: Image classification, FCM, Euclidian distance, Feature extraction etc.
The Effect of Sunglint on Satellite-Based Benthic Habitat Identification
PRAMADITYA WICAKSONO Department of Cartography and Remote Sensing, Faculty of Geography, Universitas Gadjah Mada Yogyakarta, Indonesia
Abstract: Benthic habitat mapping using high spatial resolution image exhibits several issues. One of the issues is the occurrence of sunglint on water surface which alter intra habitat spectral variation recorded by the sensor. Prior to further image analysis, sunglint should be removed to avoid any spectral and radiometric confusion. This study aimed at removing sunglint from Quickbird image and analyzes the effect of sunglint on altering benthic habitat spectral variation. Infrared (IR) band was used to normalize the variation of sunglint on visible bands. In order to analyze habitat’s spectral variation due to sunglint, coefficient of variation analysis was performed on raw and corrected Quickbird image. The results showed that NIR band was very effective to remove sunglint from visible bands. In addition, we found out that an average of 64.3% variation within particular habitat class was due to sunglint. Furthermore, we also found that sunglint correction reveals inherent information about benthic habitat that has been previously covered by sunglint.
Keywords: benthic habitat, Quickbird, sunglint, coefficient of variation