IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
StaffordMichahial, R.RanjithKumar, Hemath Kumar P, Puneeth Kumar A
PG student, AMC Engineering College, Bangalore, India
Assistant Professor, AMC Engineering College, Bangalore, India
Assistant Professor, AMC Engineering College, Bangalore, India
PG student, AMC Engineering College, Bangalore, India
Prof. Samir Kumar Bandyopadhyay and Barnali Gupta Banik Department of Computer Science and Engineering, University of Calcutta, Kolkata India. Department of Computer Science, St’ Thomas College of Engineering & Technology, Kolkata India.
K.Tamizarasu and Dr. M.Rajaram Asst. Prof., CSE Department, Jayam College of Engineering and Technology, Dharmapuri, Tamil Nadu, India. Professor, Electrical and Electronics Engineering, Anna University of Technology, Tirunelveli, Tamilnadu, India.
Mrs. Sayantani Ghosh, Mr. Sudipta Roy, and Prof. Samir K.Bandyopadhyay Department of Computer Science and Engineering University of Calcutta, 92 A.P.C. Road, Kolkata-700009, India.
U. M. Gokhale, Y.V.Joshi G.H.Raisoni Institute of Engineering and Technology for women, Nagpur (MS), India Walchand College of Engineering Sangli (MS), India
K.DHANASREE, C.SHOBHA BINDU, R.SATISH Associate professor, DRKIST, Andhra pradesh, India. Associate professor, JNTUA, Andhra pradesh, India. Assistant professor, DJRIET, Andhra pradesh, India.
Ghassan A. Abed, Mahamod Ismail, Kasmiran Jumari Faculty of Engineering and Built Environment, The National University of Malaysia
|
Abstract
Improving the Performance of Web Using Semantic Prefetching Methodology
Dr.K.Ramu
Professor
Department of CSE
D.M.I.Collegs of Engineering
Chennai, Tamilnadu, India
k.ramu147@gmail.com
Abstract: The growth of the World Wide Web has emphasized the need for improvement in user latency. One of the techniques that are used for improving user latency is Caching and an- other is Web Prefetching. Web prefetching is one of the techniques proposed to reduce user’s perceived latencies in the World Wide Web. The spatial locality shown by user’s accesses makes it possible to predict future accesses based on the previous ones. A prefetching engine uses these pre- dictions to prefetch the web objects before the user demands them. This paper proposed a semantic based prefetching methodlogy to improve the prefetch hit ration and minimize the user access latency so that the user requested data can be retrieved as fast as possible.
Keywords: Web cache, Web prefetch, Latency, Access time
Performance of Signature Analysis Using Secure Sketch Method and Neural Network Approach
Vidya Kulkarni, S. S. Apte, Bhagyashri Wali
GogteInstitute of Technology, Belgaum,Karnataka
Abstract: This paper presents the Performance of signature analysis using Secure Sketch method and Neural Network approach. Here secure sketch method is suggested [1] which is developed to generate hash values from handwritten data. Individual hash values will be generated by using secure sketch and neural network approach. Performance of the Neural Network (PNN) is higher compared to the secure sketch method based on the collision and acceptance criterions.
Speech synthesizer And Feature Extraction Using DWT With classification By Euclidian Distance and neural network of EEG signals
StaffordMichahial, R.RanjithKumar, Hemath Kumar P, Puneeth Kumar A
PG student, AMC Engineering College, Bangalore, India
Assistant Professor, AMC Engineering College, Bangalore, India
Assistant Professor, AMC Engineering College, Bangalore, India
PG student, AMC Engineering College, Bangalore, India
Abstract: The goal of proposed work is the development of an electroencephalogram (EEG) based BCI system. The overview of this work is, the user thought is extracted from the brain activity of a healthy person. Pre-processing is performed using filters and wavelet transforms to extract the features and classify them to their respective class. The intention of this work is to enhance human interaction with computers, providing a communication channel between human brain and computer. Patients who suffer from severe motor impairments and are unable to speak may use such an EEG based BCI system as an alternative form of communication by mental activity.
Keywords: Brain Computer Interface (BCI), Electroencephalogram (EEG), European data format (EDF), wavelet transform (DWT), Euclidian distance, neural network.
Throughput Improvement in Coarse wavelength division Multiplexing Optical Networks
Pankaj Kaushik, Maninder Pal M.Tech(student), Prof. & Coordinator M.M. Engineering College, Mullana Haryana, India
Abstract: When the information is transmitted over the network there are various reasons due to them there is loss of information such as packet loss, delay, and reduced in the throughput. Some time due to congested networks these reasons affects more to the network. As a result we need any intellectual algorithm or process which is applied the network so that the network could overcome the congestion. In this paper, the proposed work is overcome the solution of congested network so as the network can achieve the better solution of transmission. The proposed approach is applied to the CWDM optical network on ring topology with bypass links. In this paper the reliability of the network is presented in the term of reduced packet loss, average delay rate, packet loss rate of the proposed system where intellectual process is applied to reduced congestion. In first process the network will transmit the information, there will be more information will lost but after applying the intellectual approach to the same network there will be improvement in the networks performance as it is the main requirement in the information transmission.
Performance Analysis in Passive Optical Networks (PONs)
Ruchi Malhotra, Dr. ManindarPal M.Tech(student), Prof. & Coordinator M.M. Engineering College, Mullana Haryana, India.
Abstract: When the data is transferred over the network, a reliable end packet delivery is one of basic requirement of both user and network but there are many major causes that can result packet loss, such as Congestion over the network. Because of this there is requirement of some methodology that can reduce the packet loss and return reliable data transmission over the network. In this paper, the proposed work is representing the solution of the same problem as the major Hypothesis. The Proposed system is the advancement of existing PON- technology with the inclusion of bandwidth utilization as well improving the network throughput by utilizing the bandwidth in an effective way. The proposed system will benefit the higher reliability of data communication in a Private Network. The reliability is presented here in terms of lower packet loss than the existing system. The proposed approach will work dynamically. In first approach, the system will first detect the packet loss and then provide the solution of the problem by reducing the packet loss. Another approach is in aggregation based bottle-neck network where a secure system is implemented using SHA. Thus increase the capacity over network and reduced the packet delay.
Mr. Sujeet Singh, Mr. Ganesh Wayal, Mr. Niresh Sharma Department of Computer Science and Engineering, RKDF, Bhopal, India
Abstract: In the cyber crime investigation, log files are an important source of evidence. The importance of event logs, as a source of information in systems and network management cannot be over accentuated. With the ever-increasing size and complexity of today’s event logs, the task of analyzing event logs has become cumbrous to carry out manually. Now these days recent research has focused on the automatic analysis of these logs files in order to identify suspicious user. This paper through some light on those techniques by which it will easy to retrieve the suspicious user using log files. This paper also shows about web mining and Markov model. .
Keywords: Cyber Forensic, Event Correlation, log file, web mining, Markov Model
LSB Modification and Phase Encoding Technique of Audio Steganography Revisited
Prof. Samir Kumar Bandyopadhyay and Barnali Gupta Banik Department of Computer Science and Engineering, University of Calcutta, Kolkata India. Department of Computer Science, St’ Thomas College of Engineering & Technology, Kolkata India.
Abstract: Information security is becoming very important part of our life now-a-days. Information hiding is the fundamental of information security. Information hiding can be achieved by steganography as well. LSB modification and phase encoding technique are very primitive in steganography. Here these two primitive techniques are revisited to get an idea of how steganography in audio file works.
Keywords: Steganography, Least Significant Bit, Phase Encoding
The Effective and Efficient of AODV Routing protocol for Minimized End-to-End Delay in MANET
K.Tamizarasu and Dr. M.Rajaram Asst. Prof., CSE Department, Jayam College of Engineering and Technology, Dharmapuri, Tamil Nadu, India. Professor, Electrical and Electronics Engineering, Anna University of Technology, Tirunelveli, Tamilnadu, India.
Abstract: Ad-Hoc networking has become a primary concern in order to provide an effective communication between each other without any form of centralized administration. This kind of networking would go-ahead with dynamic asymmetric topologies caused by natural disaster and bears from inherent limitations such as limited bandwidth and power. To overcome this concern a routing protocol is needed. Reactive Routing Protocols is a bandwidth efficient on-demand routing protocol, which means that the originator node initiates the process of route search for a destination node only when it needs to communicate with the destination node. The popular reactive routing protocols are Ad hoc On Demand Distance Vector (AODV) and Dynamic Source Routing (DSR). In this paper, the investigations are done on the efficiency of AODV routing protocol in a bandwidth constrained network by toggling the destination only flag in the AODV header. The throughput is studied and evaluated.
Keywords: component; Ad hoc network, AODV, routing
Design and implementation of 4-bit flash ADC using folding technique in cadence tool
S D.Panchal, Dr. S.S.Gajre, Prof. V.P.Ghanwat SGGS Institute of Engineering and Technology, Nanded, Maharashtra, India
Abstract: In this paper, we design a pipelined flash Analog-to- Digital Converter (ADC) to achieve high speed using 0.18umCMOS technology. The results obtained are also presented here. The physical circuit is more compact than the previous design.Power, processing time, and area are all minimized. This design can be used for modem high speed ADC applications.
Keywords: CMOS comparator, CMOS Analog IntegratedCircuit, Flash Converter, priority encoder.
Intrusion Tolerance: Enhancement of Safety in Cloud Computing
Geethu Thomas, Janardhanan P S M Tech Scholar, Professor Department of Computer Science Rajagiri School of Engineering & Technology
Abstract: Cloud computing is a recent computing model; provides consistent access to wide area distributed resources facing many problems as its usage increases. Enormous loss to both cloud clients as well as cloud service providers happen even with small intrusions. The protection and defense of cloud infrastructure against malicious attacks can be solved by designing ‘intrusion tolerance’. We prove the renewal and confidentiality property of sensitive data by utilizing secret sharing and adding a proxy server. Proxy server acts as an intermediate server between the client system and cloud servers; blocks the intruders by sending the dummy dataset and by analysing their behaviours in the networks.
Keywords: cloud computing, IDS, DoS, intrusion tolerance, proxy server
High Capacity Data Embedding System using Projection Quantization
Navdeep Kaur, Sukhjeet K.Ranade Department of Computer Science and Engineering, Punjabi University, India
Abstract: In this paper, we propose a high capacity data- embedding system in DCT domain and review the existing high capacity data embedding systems both in spatial domain as well as transform domain. The embedding algorithm is based on the quantized projection embedding method with some enhancement to achieve high embedding rates. The embedding is done on the quantized DCT coefficients using the concept of Hadamard Matrix as base vector. The system has very high capacity as comparable to the existing techniques of DCT domain. The system is highly robust and achieves high visual imperceptibility.
Keywords: data embedding, high-capacity data hiding, information hiding, hiding capacity, DCT transformation.
Mrs. Sayantani Ghosh, Mr. Sudipta Roy, and Prof. Samir K.Bandyopadhyay Department of Computer Science and Engineering University of Calcutta, 92 A.P.C. Road, Kolkata-700009, India.
Abstract: As we enter the third decade of the World Wide Web (WWW), the textual revolution has seen a tremendous change in the availability of online information. Finding information for just about any need has never been more automatic—just a keystroke or mouse click away .It can be viewed as one of a class of non traditional Information Retrieval (IR) strategies which attempt to treat entire text collections holistically, avoid the bias of human queries, objectify the IR process with principled algorithms, and "let the data speak for itself." These strategies share many techniques such as semantic parsing and statistical clustering, and the boundaries between them are fuzzy. In this paper different existing Text Mining Algorithms i.e Classification Algorithm, Association Algorithm, Clustering Algorithm is briefly reviewed, stating the merits / demerits of the algorithms. In addition some alternate implementation of the algorithms is proposed. Finally the logic of these algorithms are , merged to generate an algorithm which will perform the task of Classification of a data set into some predefined classes, establish relationship between the classified date and finally cluster the data based on the association between them into groups.
Keywords: Data Mining, Text Mining, Classification, Clustering, Association, Agglomerative, Divisive, Information Retrieval, Information Extraction.
A Semi Fragile Watermarking Algorithm Based on SVD-IWT for Image Authentication
U. M. Gokhale, Y.V.Joshi G.H.Raisoni Institute of Engineering and Technology for women, Nagpur (MS), India Walchand College of Engineering Sangli (MS), India
Abstract: A semi fragile watermarking algorithm based on image scrambling and SVD in the wavelet domain has been presented in this paper. In the proposed algorithm, chaotic signals are generated using logistic mapping and are used for scrambling the original watermark. The initial values of logistic mapping are taken as private keys. The covert image is decomposed into four sub bands using integer wavelet transform; we apply SVD to each sub band, embed the scrambled watermark data by modifying the singular values. Modification in all frequencies allows the development of a robust watermarking scheme that is robust to a wide range of attacks.
Mrs. Saba Siraj, Mr. Ajay Kumar Gupta, Mrs. Rinku-Badgujar Department of Computer Science and Engineering, PGMCOE, Wagholi, Pune India.
Abstract: In the network research area, establishing of network in a real time scenario is very difficult. A single test bed takes a large amount of time and cost. So implementation of a whole network in real world is not easily possible and very costly to. The simulator helps the network developer to check whether the network is able to work in the real time. Thus both the time and cost of testing the functionality of network have been reduced and implementations are made easy. In this paper, we introduce the main features of different simulator and consider their advantages and disadvantages. We hope this survey prove to be a good reference source for those people who feel difficult to select the appropriate network simulators for their research.
Javad Bavaghar Chahardeh Engineering Department Lahijan Branch Islamic Azad University Rasht, Iran
Abstract: researchers are running into the physical limits of speed and scaling in silicon transistor technology, forcing them to look for next –generation devices. The problem with silicon is its poor stability at 10nm and below when it oxidises, decomposes and uncontrollably migrates. The leading candidate to replace silicon being pursued by is graphene. Graphene a single- atom- thick honeycomb lattice of carbon atoms, can transport electrons more quickly than other semiconductors, a quality called electron mobility (100 times greater than silicon), making it ideally suited to atomic-scale, high-speed operation. Also graphene electrical properties can be controlled, switching it among conducting, semiconducting and electrically insulating forms. In this paper a review is given on graphene and the recent research progress of graphene transistors, and how to sidestep the obstacles in the way of using graphene as transistor.
Improvement of TCP Congestion Window over LTE-Advanced Networks
Ghassan A. Abed, Mahamod Ismail, Kasmiran Jumari Faculty of Engineering and Built Environment, The National University of Malaysia
Abstract: Long Term Evolution Advanced (LTE-Advanced) network is the continuation of 3GPP-LTE (3GPP: 3rd Generation Partnership Project) and it targets to advanced develop of the requirements of LTE in terms of throughput and coverage. Then, LTE- Advanced is not new as a radio access technology, but it’s an evolution of LTE to enhance the performance. The direct employment of the existing protocols cannot achieve the requirements of LTE-Advanced due to the large-bandwidth and low-latency links used in this network. Therefore, an enhanced congestion control mechanism is proposed in this article to improve the performance of Transmission Control Protocol (TCP) over LTE-Advanced. The proposed algorithm used a new mechanism based on the available bandwidth of the connection to detect the capacity of network path in order to improve the congestion avoidance mechanism. The work in this paper based on using Network Simulator 2 (NS-2) to model the traffics of LTE-Advanced and tests the proposed mechanism.