IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
PG Scholar, Dept of PG studies in Engineering, S.A Engineering College, Chennai, India
Assistant professor, Dept of PG studies in Engineering, S.A Engineering College, Chennai, India
PG Scholar, Dept of PG studies in Engineering, S.A Engineering College, Chennai, India
PG Scholar, Dept of PG studies in Engineering, S.A Engineering College, Chennai, India
PG Scholar, Dept of PG studies in Engineering, S.A Engineering College, Chennai, India
Assistant professor, Dept of PG studies in Engineering, S.A Engineering College, Chennai, India
PG Scholar, Dept of PG studies in Engineering, S.A Engineering College, Chennai, INDIA
PG Scholar, Dept of PG studies in Engineering, S.A Engineering College, Chennai, INDIA
Assistant professor, Dept of PG studies in Engineering, S.A Engineering College, Chennai, INDIA
1Lecturer, Dept. of CSE, Anand Institute of Higher Technology, Kazhipattur, Chennai, India
2Associate Professor, Dept. of CSE, Anand Institute of Higher Technology, Kazhipattur, Chennai, India
3Assistant Professor, Dept. of CSE, Anand Institute of Higher Technology, Kazhipattur, Chennai, India
Sujitha, Priyanka, Prof T.Venkat Narayana Rao, Shireesha Dara
Students, B.Tech, IV Year, Department of C.S.E, Guru Nanak Institutions Technical Campus, Hyderabad, India
Professor, Department of C.S.E, Guru Nanak Institutions Technical Campus, Hyderabad, India
Assistant Professor, Department of C.S.E, Guru Nanak Institutions Technical Campus, Hyderabad, India
Assistant Professor & UGC-NET Coordinator, Departmet of Computer Science, Tamil University ((Established by
Government of Tamil Nadu), Thanjavur-613010, India
Assistant Professor, Department of computer Science,A.M.JAIN College, Meenambakkam, Chennai-
Research Scholar,Karpagam University,Coimbatore-641021,India
Rizwan Ahmed, Dr. Rajiv V. Dharaskar, Dr. Vilas M. Thakare
Research Scholar, G. H. Raisoni College of Engineering, Nagpur, India
Director,MatoshriPrathisthan Group of Institution, Nanded, India
Professor and Head, SGB Amravati University, Amravati, India
M.E(Scholar), Computer Technology and Application, SSCET, Bhilai, India
M.E(Scholar), Computer Technology and Application, SSCET, Bhilai, India
Senior Asst. Professor, Computer Science and Engineering, SSCET, Bhilai, India
Student, Dept.of Electronics and tele-communication, D.Y.Patil College Engg and Tech, Kolhapur, India
Associate professor, Dept. of Electronics and tele-communication,D.Y.Patil College Engg and Tech, Kolhapur, India
M.E. Scholar , Dept of CS & IT, SSCET,,Bhilai, India
M.E. Scholar , Dept of CS & IT, SSCET,,Bhilai, India
Sr. Asst.Prof. , Dept of CS & IT, SSCET,,Bhilai, India
A.H. Kulkarni, Dr. H.M.Rai, Dr. K.A.Jahagirdar, P.S.Upparamani
Associate Professor Department of Information Science & Engineering, GIT, Belgaum, India
Ex-Professor- National Institute of Technology, Kurukshetra, India
Associate. Professor, University of Agricultural Sciences, Dharwad, India
Asst. Professor, Department of Information Science & Engineering, GIT, Belgaum, India
Mr. K. SURESH KUMAR, Dr.Y. RAJASREE RAO, Dr. K.MANJUNATHACHARI
1Electronics & Communication Engineering, SSJ Engineering College, Hyderabad, India.
2Electronics & Communication Engineering, SRIDEVI WOMEN’S Engineering College, Hyderabad, India.
3Electronics & Communication Engineering, GITAM University, Hyderabad campus, India.
M.E Scholar, Dept of Computer Science and Engineering, SSBT‟s COET, Bambhori - Jalgaon, India
Associate Professor & Head , Dept of Computer Engineering, SSBT‟s COET,Bambhori - Jalgaon, India
Student, Computer Science and Engineering, Ramdeobaba College of Engineering and Management, Nagpur, India
Assistant Professor, Computer Science and Engineering, Ramdeobaba College of Engineering and Management, Nagpur,
India
Department of Computer Science and Engineering, R.V College of Engineering, Bangalore, Karnataka, India
Department of Information Science and Engineering, R.V College of Engineering, Bangalore, Karnataka, India
Department of Computer Science and Engineering, R.V College of Engineering, Bangalore, Karnataka, India
Department of Electrical and Electronics, R.V College of Engineering, Bangalore, Karnataka, India
Department of Electronics and Communication Engineering, VITS (N9), Karimnagar-505001, Andhra Pradesh, INDIA
Department of Electronics and Communication Engineering, KITS (28), Karimnagar-505001, Andhra Pradesh, INDIA
Astt.Professor, Deptt of Computer Science & Engineering, M. V N University, Palwal, India
Manager -IT, Technical Textile Business, SRF Limited, Gurgaon, India
Assistant Professor (P.G.D.C.S.T., D.C.P.E., H.V.P.M., Amravati-MS, INDIA)
Associate Professor and Head (P.G.D.C.S.T., D.C.P.E., H.V.P.M., Amravati-MS, INDIA)
Assistant Professor, Dept. of Computer Science, Periyar University College of Arts and Science, Salem, India
Associate Professor, Dept. of Computer Science, Sri Saradha College For Women, Salem, India
Faculty of Computer Engineering Department, Hongik University, Seoul, Korea
|
Abstract
Comparison and Analysis of NAM and Acoustic Speech Using Wavelet Transform
RADHIKA.R, VANITHA LAKSHMI.M, AADITYA VELAVA.V.A
PG Scholar, Dept of PG studies in Engineering, S.A Engineering College, Chennai, India
Assistant professor, Dept of PG studies in Engineering, S.A Engineering College, Chennai, India
PG Scholar, Dept of PG studies in Engineering, S.A Engineering College, Chennai, India
Abstract: Non-Audible Murmur (NAM) is a very quietly uttered speech received through the body tissue with the use of special acoustic sensors (i.e., NAM microphone) attached behind the talker’s ear. Analysis of NAM speech has been made only using HMM (Hidden Markov Model) and GMM (Gaussian Markov Model). In this paper, study of analysing acoustic speech and NAM speech will be made using Wavelet transform. Since, wavelets have the great advantage of being able to separate the fine details in a signal. It allows complex information such as music, speech, and patterns to be decomposed into elementary forms at different positions and subsequently reconstruct it with high precision. Upon analysing the Normal speech, NAM speech will also be analysed using the same wavelet transform. The accuracy of words obtained from the two methods will be compared to determine the efficiency of using Wavelet transform in recognizing NAM speech.
Keywords: NAM (Non-Audible Murmur), HMM (Hidden Markov Model), GMM (Gaussian Markov Model), NAM Microphone
Estimation of Reverberation Time Using Lpc Filter and Maximum Likelihood Estimator and Drr
JAYASHREE.R, MANJU KRISHNA, M.VANITHA LAKSHMI
PG Scholar, Dept of PG studies in Engineering, S.A Engineering College, Chennai, India
PG Scholar, Dept of PG studies in Engineering, S.A Engineering College, Chennai, India
Assistant professor, Dept of PG studies in Engineering, S.A Engineering College, Chennai, India
Abstract: This paper presents a speech-model using the Linear Predictive (LP) residual signal and Maximum Likelihood Estimator (MLE). With this model an accuracy of the reverberation time estimation can be improved. During past decade, the reverberation time estimation was performed using only maximum likelihood detector, which resulted in excess time of estimation. For the purpose of estimating room acoustics, it is very essential to calculate the reverberation time more accurately. The study shows that Direct-to-Reverberation Ratio can also be calculated in accordance to the estimation of Reverberation Time. These two parameters can be made useful in the application of hearing aid.
Keywords: LP, Reverberation Time (RT), MLE, Direct-to-Reverberation Ratio(DRR), Hearing aid.
Study On Ber Improvement In Mimo Systems Using Adaptive Modulation
JENIFER.J.R, PREMNATH.S.P, ARUNACHALAPERUMAL.C
PG Scholar, Dept of PG studies in Engineering, S.A Engineering College, Chennai, INDIA
PG Scholar, Dept of PG studies in Engineering, S.A Engineering College, Chennai, INDIA
Assistant professor, Dept of PG studies in Engineering, S.A Engineering College, Chennai, INDIA
Abstract: Increasing demand in high transmission capacity has to be satisfied by a better use of existing frequency bands and channel conditions. One of the recent technical breakthroughs, which will be able to provide the necessary data rates, is the use of multiple antennas at both link ends. Spatial Modulation (SM) is used in wireless systems, which can offer good data rates and error performance with a moderately low system complexity. Adaptive modulation schemes for fading channels are usually required to fulfil certain long-term average BER targets. Performance of SSK modulation increases for increasing values of the target bit rate and of the number of antennas at the receiver. This modulation has the same robustness to channel estimation errors as conventional modulation schemes. Hence a new modulation called CoMP (Coordinated MultiPoint)–SSK modulation is proposed. CoMP-SSK modulation can provide very high bit rates at the cost of network cooperation. In this paper bit error rate performance of some popular modulation schemes have been studied and compared with their results.
Preserving Privacy and Integrity in Sensor Network with Proto-filter
A.S.Balaji S.Roselin Mary R.Femila Goldy
1Lecturer, Dept. of CSE, Anand Institute of Higher Technology, Kazhipattur, Chennai, India
2Associate Professor, Dept. of CSE, Anand Institute of Higher Technology, Kazhipattur, Chennai, India
3Assistant Professor, Dept. of CSE, Anand Institute of Higher Technology, Kazhipattur, Chennai, India
Abstract: The architecture of two-tiered sensor networks, where storage nodes serve as an intermediate tier between sensors and a sink for storing data and processing queries, has been widely adopted because of the benefits of power and storage saving for sensors as well as the efficiency of query processing. However, the importance of storage nodes also makes them attractive to attackers. SecureQ Proto-filter acts as protocol as well as filter. SecureQ prevents attackers from gaining information from both sensor collected data and sink issued queries. To improve performance, SecureQ will be used to reduce the communication cost between sensors and storage nodes. SecureQ also allows a sink to detect compromised storage nodes when they misbehave. To preserve privacy, SecureQ uses a novel technique to encode both data and queries such that a storage node can correctly process encoded queries over encoded data without knowing their values. To preserve integrity, Truth confirmation algorithm to generate integrity verification information so that a sink can use this information to verify whether the result of a query contains exactly the data items that satisfy the query.
Keywords: Integrity, privacy, range queries, sensor networks
Telemedicine – A Revolutionary Paradigm in Rural Health Care Services
Sujitha, Priyanka, Prof T.Venkat Narayana Rao, Shireesha Dara
Students, B.Tech, IV Year, Department of C.S.E, Guru Nanak Institutions Technical Campus, Hyderabad, India
Professor, Department of C.S.E, Guru Nanak Institutions Technical Campus, Hyderabad, India
Assistant Professor, Department of C.S.E, Guru Nanak Institutions Technical Campus, Hyderabad, India
Abstract: Telemedicine is an innovative process of synergizing benefits of satellite communication technology in health care services. The information technology with Biomedical Engineering and Medical Sciences is utilized to deliver the health care services to the remote, distant and underserved regions of the country. The main aim of Telemedicine is providing Telemedicine Technology and connectivity between remote/rural hospital and super specialty hospital for tele consultation. This paper proposes the utilization of a mobile telemedicine framework that addresses this dilemma. This paper also focuses on use of web services and mobile application as the client access the application and get consultation based on the patient information, which include expert medical advises .
Secure Multiparty Electronic Payments in Mobile Computing
Dr.K.Ravikumar, A.Udhayakumar
Assistant Professor & UGC-NET Coordinator, Departmet of Computer Science, Tamil University ((Established by
Government of Tamil Nadu), Thanjavur-613010, India
Assistant Professor, Department of computer Science,A.M.JAIN College, Meenambakkam, Chennai-
Research Scholar,Karpagam University,Coimbatore-641021,India
Abstract: As Mobile communications become increasingly sophisticated and ubiquitous .traditional mobile billing with its implicit trust relationships Will no longer be adequate .with a large number of different sizes mobile Networks, a huge variety of value added service provider and many millions Of roaming user, it is desirable to remove any unnecessary trust in order to Increase security and provide incontestable charging. Billing allowance each Party involved in a call to eventually receive a share of the revenue generated. An examination of network billing techniques reveals a number of critical shortcomings and emerging problem. Address these issue by designing a multi-party electronic payment scheme that allows are parties involved in a Call to be paid in real-time. The mobile user releases an ongoing stream of low valued micro payment tokens into the network in exchange for the requested Services. Dynamic pricing is supported by the association of a pricing contract With the call which specifies the cost of leg of the call route. Any user with a mobile device and monetary value can use and pay for network access and services in any mobile network into which they roam. The need to authenticate the user or contact a distant home network for billing purposes. Extensions to the basic scheme provide mobile wallet functionality and allow user-to-user payments. In addition solutions are designed to cope with frequent handovers between independent piccolos, to aggregate several payment streams into one in the core network, and to inter-work with networks using legacy billing techniques. A detailed survey of micropayment techniques forms part of the design Process and a number of a new micro payment contribution result from observation made. In order to choose appropriate techniques for payment a performance comparison of micropayment schemes is presented based on benchmark measurement taken for the underlying cryptographic algorithms. The multi-party micropayment protocol is prototyped wireless environment where it is used to pay for user traffic from existing internet applications. the proposed scheme has the potential to revolution mobile communication by allowing the emergence of many independent inexpensive high speed picocell networks and by allowing any network entity to sell value added services. Mobile user will be able to select the most appropriate access network and services wherever they roam, paying all parties for resources as they are provided.
Keywords: Micropayment, Multi-party, Mobile computing, Security, Authentication.
Digital evidence extraction and documentation from mobile devices
Rizwan Ahmed, Dr. Rajiv V. Dharaskar, Dr. Vilas M. Thakare
Research Scholar, G. H. Raisoni College of Engineering, Nagpur, India
Director,MatoshriPrathisthan Group of Institution, Nanded, India
Professor and Head, SGB Amravati University, Amravati, India
Abstract: The Google’s Android mobile platform has quickly risen from its first phone in October 2008 to the most popular mobile operating system in work by early 2011[21]. The explosive growth of the platform has been significant win for consumers with respect to competition and features. However forensic analysis and security engineers have struggled as there is lack of knowledge and supported tools for investigating these devices [1, 2]. This paper presents efficient generalized forensics framework for acquisition and subsequent analysis of these devices.
Keywords: Digital Evidence, Mobile Forensics, Smartphone, Android, Mobile Forensic tools
Embedded Systems: Zigbee Based Advanced Controlling System
Dr. Quazi Farheen, Dr.N.V.Kalyankar
Asst.Proff., Dept. of Computer Science & I.T., Yeshwant Mahavidayalaya, Nanded,Maharashtra,India
Principal, Yeshwant Mahavidayalaya, Nanded Maharashtra, India
Abstract: We are standing on the threshold of an exciting new age of information technology that will change our lives and the future forever. Soon we shall see more and more digitization of appliances, and these will be fuelled by human need. Embedded systems and Information appliances have virtually entered every sphere of our life and they will truly change the way we live. This paper, discuss an embedded platform that can be used to design and implement embedded control systems in a rapid and cost-efficient fashion. This platform is built on ZigBee and GSM technology. Therefore, the system development cost can be minimized. Since the platform provides a unified environment in which the users are able to perform all phases of the development cycle of control systems, the development time can be reduced while the resulting performance may potentially be improved. In addition to industrial control, the platform can also be applied to many other areas such as optimization, image processing, instrument, and education. The future work includes test and application of the developed platform in real-world systems where real sensors and actuators are deployed.A novel architecture of computer lab automation system is proposed and implemented; using relatively new wireless communication technology, which is Zigbee.The use of Zigbee technology, helps the lower expenses.
Companion Devices and Sharing the Content Between Companion Devices and Set Top Box
Santosh Kumar K S, Manjunath A E, PardhaSarathy CH., ShivakumarB.M
Student, M.Tech (CSE), RVCE,Bangalore, India
Assistant Professor,CSE, RVCE,Bangalore, India
Student, M.Tech (CSE), RVCE, Bangalore, India
Student, M.Tech (CSE), RVCE, Bangalore, India
Abstract: Companion devices have become common in households. The Set Top Box is being geared up to interact with them. This document tries to describe the interactions between the various devices in the home network. The focus shall be on the activity of the consumers.
Keywords: Companion Devices, Set Top Box, Streaming, Secondary storage.
A Survey on Image Classification Approaches and Techniques
Pooja Kamavisdar, Sonam Saluja, Sonu Agrawal
M.E(Scholar), Computer Technology and Application, SSCET, Bhilai, India
M.E(Scholar), Computer Technology and Application, SSCET, Bhilai, India
Senior Asst. Professor, Computer Science and Engineering, SSCET, Bhilai, India
Abstract: Object Classification is an important task within the field of computer vision. Image classification refers to the labelling of images into one of a number of predefined categories. Classification includes image sensors, image pre-processing, object detection, object segmentation, feature extraction and object classification.Many classification techniques have been developed for image classification. In this survey various classification techniques are considered; Artificial Neural Network(ANN), Decision Tree(DT), Support Vector Machine(SVM) and Fuzzy Classification
A Performance Comparison of Energy Efficient AODV Protocols in Mobile Ad hoc Networks
P. S. Karadge, Dr.S.V.Sankpal
Student, Dept.of Electronics and tele-communication, D.Y.Patil College Engg and Tech, Kolhapur, India
Associate professor, Dept. of Electronics and tele-communication,D.Y.Patil College Engg and Tech, Kolhapur, India
Abstract: Energy Conservation is a very important design issue for mobile ad hoc networks (MANET) since mobile nodes are powered by batteries with limited capacity. The typical routing protocols of MANETs are mainly the shortest path routing protocols and do not consider the energy aware issue. Power failure of a node affects the overall network lifetime. So this paper describes improvement of the conventional routing protocol by utilizing high energy paths in the network. We present a comparative analysis of existing AODV protocol and energy efficient AODV protocol which is modified to improve network lifetime as well as packet delivery ratio. Simulation results indicate that the routing scheme of proposed method is more efficient than existing well-known routing protocols.
Keywords: MANET, Energy efficient Routing, Power Consumption, Residual energy.
M.E. Scholar , Dept of CS & IT, SSCET,,Bhilai, India
M.E. Scholar , Dept of CS & IT, SSCET,,Bhilai, India
Sr. Asst.Prof. , Dept of CS & IT, SSCET,,Bhilai, India
Abstract: Edge is a basic feature of an image. Edges can be defined as boundary between two different regions in an image. Edge detection refers to the process of identifying and locating sharp discontinuities in an image. Edge detection process significantly reduces the amount of data and filters out useless information, while preserving the essential structural properties in an image. Since computer vision involves the recognition and classification of objects in an image, edge detections is a vital tool . In this paper , the main aim is to study edge detection process based on different techniques.
Keywords: Edge-detection, Image segmentation, Canny operator, Gradient method, Zero crossing
A STUDY ON HUMAN EAR DETECTION FOR BIOMETRIC IDENTIFICATION
Ms. Aradhana Singh, Mr. Sonu Agrawal, Ms.Pooja Kamavisdar
Asst. Prof., Dept. Of Computer Science & Engg., CSIT, Durg, India
Sr. Asst. Prof., Dept. Of Computer Science & Engg., SSCET, Bhilai, India
Dept. Of Computer Science & Engg., SSCET, Bhilai, India
Abstract: This paper proposes an efficient and template based technique for automatic ear detection in a side face image. The technique first separates skin regions from non-skin regions and then searches for the ear within skin regions. Ear detection process involves three major steps. First, Skin Segmentation to eliminate all non-skin pixels from the image, second Ear Localization to perform ear detection using template matching approach, and third Ear Verification to validate the ear detection using the Zernike moments based shape descriptor. To handle the detection of ears of various shapes and sizes, an ear template is created considering the ears of various shapes and resized automatically to a size suitable for the detection.
A Leaf Recognition Technique for Plant Classification Using RBPNN and Zernike Moments
A.H. Kulkarni, Dr. H.M.Rai, Dr. K.A.Jahagirdar, P.S.Upparamani
Associate Professor Department of Information Science & Engineering, GIT, Belgaum, India
Ex-Professor- National Institute of Technology, Kurukshetra, India
Associate. Professor, University of Agricultural Sciences, Dharwad, India
Asst. Professor, Department of Information Science & Engineering, GIT, Belgaum, India
Abstract: Plants are among the earth's most useful and beautiful products of nature. Plants have been crucial to mankind's survival. The urgent need is that many plants are at the risk of extinction. About 50% of ayurvedic medicines are prepared using plant leaves and many of these plant species belong to the endanger group. So it is indispensable to set up a database for plant protection. We believe that the first step is to teach a computer how to classify plants. Leaf /plant identification has been a challenge for many researchers. Several researchers have proposed various techniques. In this paper we have proposed a novel framework for recognizing and identifying plants using shape, vein, color, texture features which are combined with Zernike movements. Radial basis probabilistic neural network (RBPNN) has been used as a classifier. To train RBPNN we use a dual stage training algorithm which significantly enhances the performance of the classifier. Simulation results on the Flavia leaf dataset indicates that the proposed method for leaf recognition yields an accuracy rate of 93.82%
Power Efficient and Fast Updating Approach for TCAM-Based Forward Engine
Mr. K. SURESH KUMAR, Dr.Y. RAJASREE RAO, Dr. K.MANJUNATHACHARI
1Electronics & Communication Engineering, SSJ Engineering College, Hyderabad, India.
2Electronics & Communication Engineering, SRIDEVI WOMEN’S Engineering College, Hyderabad, India.
3Electronics & Communication Engineering, GITAM University, Hyderabad campus, India.
Abstract: Ternary Content-Addressable Memories (TCAMs) are becoming popular for designing high-throughput forwarding engines on routers. They are fast, cost-effective and simple to manage. However, a major drawback of TCAMs is their large power consumption. This paper presents architectures and algorithms for making TCAM-based routing table more power efficient. The proposed architecture and algorithms are simple to implement, use commodity TCAMs, and provide worst- case power consumption guarantees (independent of routing table contents). The most existing TCAM-based forwarding engines involve shifting TCAM entries when the forwarding table is updated, typically incurring a lengthy update duration. And also proposed a TCAM-based longest prefix forwarding engine with fast updating. The key idea behind the design is to maintain the forwarding table in a TCAM according to the Minimum Independent Prefix Set.
Keywords: TCAM, Delay, Network algorithm, memory architecture, bit selection, prefixes.
Comparative Study of Web Mining Algorithms for Web Page Prediction in Recommendation System
Rahul Neve, K.P Adhiya
M.E Scholar, Dept of Computer Science and Engineering, SSBT‟s COET, Bambhori - Jalgaon, India
Associate Professor & Head , Dept of Computer Engineering, SSBT‟s COET,Bambhori - Jalgaon, India
Abstract: This paper shows the comparative study and implementation of recommendation system based on two different web mining algorithms. The proposed system is designed for web page prediction in recommendation system as well as it is helpful for the study of web mining algorithm to get frequent sequential access pattern from web log file of web server. The experiments are conducted based on the implementation of the algorithms (GSP and Prefix Span) and results are noted down in which it is found that pattern growth based algorithm(Prefix Span) is efficient than apriori based algorithm (GSP) for web log sequential access pattern mining.
Keywords: Web Mining, Sequential access pattern, Data Mining, Web usage mining.
Digital Image Inpainting Using Cellular Neural Network and Contour Tracking Using Run Length Coding
Usha Kiran, Om Prakash Yadav
Assistant Professor, Dept.of CSE, CSIT, Durg, India
Associate Professor2 , Dept.of CSE, CSIT, Durg, India
Abstract: Digital Image Inpainting is challenging and interesting research area, because one has to restore the area which is not visible but important to visually complete the image. This technique has found widespread use in applications such as restoration, error recovery, multimedia editing, and video privacy protection. Because of the strong human visual perception, a very effective technique is required for digital image inpainting. Most automatic techniques are computationally intensive and unable to repair large holes. Existing methods use interpolation methods where surrounding information is not adequate for image interpolation and chain codes for contour matching for small damaged area reconstruction. But, reconstructed image has not given up to the mark results. This paper proposed an effective inpainting technique in order to improve the inpainting result. The method proposed in this paper uses Run Length Coding for shape tracking along with CNN approach, because Run Length coding track the shape of an image, which is better than the several methods available for shape tracking.
Keywords: Image inpainting, Cellular Neural Network, Digital images, contour matching, Run Length Code
A Study of Brain Magnetic Resonance Image Segmentation Techniques
Neha Tirpude, R. R. Welekar
Student, Computer Science and Engineering, Ramdeobaba College of Engineering and Management, Nagpur, India
Assistant Professor, Computer Science and Engineering, Ramdeobaba College of Engineering and Management, Nagpur,
India
Abstract: In recent times, biomedical imaging & medical image processing have become one of the most challenging fields of engineering & technology. Imaging modality like MRI provides detailed information about the anatomy, it also helps in monitoring disease, and it is beneficial for effective diagnosis. It also plays a key role in the tracking of the disease and its progressive treatment. Image segmentation is an important step for further post-processing of medical images. This paper provides an introduction to the field of image processing and gives details about how image segmentation techniques may be applicable to the different imaging modalities available. In the case of MRI of brain, image segmentation constitutes a basic step for detection of tumor. This paper provides a survey of various image segmentation methods that have been applied to brain MRI images, to segment the brain into its constituent parts, including the tumor (if present).
Keywords: image segmentation, magnetic resonance imaging, brain, tumor, imaging modality
A Survey on Emerging trends in Requirement engineering for a Software development Life cycle
Swarnalatha K. S, Dr G N Srinivasan
Department of Computer Science and Engineering, R.V College of Engineering, Bangalore, Karnataka, India
Department of Information Science and Engineering, R.V College of Engineering, Bangalore, Karnataka, India
Abstract: Requirement Engineering is an important phase of any software development. This paper reviews the area of requirements engineering. It outlines the key concerns to which attention should be devoted by both practitioners, who wish to "reengineer" their development processes, and academics, seeking intellectual challenges. It presents an assessment of the state-of-the-art and draws conclusions in the form of a research agenda.
Keywords: Requirement Engineering, SDLC, Value Modelling, Gathering, Orientation
3D Security Cloud Computing using Graphical Password
Ms. Sneha Vasant Thakare, Ms. Deipali V. Gore
ME student (CSE), Computer, P.E.S. Modern College of Engineering, Pune, India
Professor, Computer, P.E.S. Modern College of Engineering, Pune, India
Abstract: Cloud computing is an emerging, on-demand and internet- based technology. It provides variety of services over internet such as, software, hardware, data storage and infrastructure. To utilize these services by authorized customer and to secure a data on the cloud, it is necessary to have strict security checking system. The 3D security checking system by using the multi-level authentication technique generates the password in multiple levels to access the cloud services. This system is able for thwarting Shoulder attack, Tempest attack, and Brute-force attack, dictionary attacks and many more which are present at client side, with the use of strong techniques in the Graphical password.
Keywords: 3D security, Cloud Computing Authentication, Graphical password, multi-level authentication
An Interactive Tool for Knowledge Representation and Sharing On Android Operating System
Manjunath A E, Vinay Hegde, Prapulla S B, Dr N.K.Srinath
Department of Computer Science and Engineering, R.V College of Engineering, Bangalore, Karnataka, India
Abstract: Android is an operating system for mobile devices such as smart phones and tablet computers. It is developed by the Open Handset Alliance led by Google. Android uses the Dalvik virtual machine with just-in-time compilation to run compiled Java code. Android has a large community of developers writing applications ("apps") that extend the functionality of the devices. We aim at developing a note sharing application, whiteboard which will be a handwriting note taker that features natural digital ink, an easy to work user interface (UI) and a comprehensive toolset that will increase the benefits of android users. The main aim of this paper is to be to develop the above features in order to enable users to take down quick notes without searching for any extra resources like a notebook, pen etc. This will make note taking to android users as easy as storing and accessing contacts. We also provide sharing facilities through e-mail which enhances the capabilities of this application.
Keywords: Android, digital notebooks, JAVA, Frames. Secondary storage
Implementing Kannada Optical Character Recognition on the Android Operating System for Kannada Sign Boards
Manjunath A E, Sharath B
Department of Computer Science and Engineering, R.V College of Engineering, Bangalore, Karnataka, India
Department of Electrical and Electronics, R.V College of Engineering, Bangalore, Karnataka, India
Abstract: This paper focuses on an application that performs Kannada OCR (Optical Character Recognition) in hand held devices. The objective is to make use of the visual capabilities of the built in camera of Android devices to extract text from Kannada sign boards, newspapers etc., and use the same platform to implement the OCR technology with the help of kohonen’s algorithm. Another aim of this application is to find the meaning of the word detected on the Internet. With the help of an initial, sample data, the Kohonen network is trained. The image taken is further processed by initially thinning the characters in the image using the Hilditch algorithm. The image is processed, eliminating small distortions present. The image is then converted to into a greyscale image, which is segmented and the result is displayed along with a vocal output. These characters may be edited by the user and its meaning is then displayed in English.
Keywords: Optical Character Recognition, JAVA, JVM, Android, Image Processing
Recursive filter Based Channel Estimation and Correction
K.Sreedhar, A.Venu, A.Hariprasad
Department of Electronics and Communication Engineering, VITS (N9), Karimnagar-505001, Andhra Pradesh, INDIA
Department of Electronics and Communication Engineering, KITS (28), Karimnagar-505001, Andhra Pradesh, INDIA
Abstract: Communications through frequency-selective fading channels suffer inter-symbol interference (ISI), which limits the data rate. Complex equalizers are usually needed to compensate for the channel distortion. Orthogonal Frequency Division Multiplexing (OFDM) divides the channel spectrum into many sub-bands, each of which carries low-rate data. Since each sub- channel is narrow band, communications through it experience only flat-fading. The sub-channels are separated with the minimum space required by channel Orthogonality. Therefore, a large number of low-rate data streams can be transmitted in parallel and aggregate to a high-rate one. Channel estimation and prediction algorithms are developed and evaluated for use in broadband adaptive OFDM downlinks over fading channels for vehicular users. Accurate channel estimation may be obtained by using a combined pilot aided and decision-directed approach based on Recursive filtering and prediction. The correlation properties of the channel in both time and space are taken into account. Kalman performance at much lower computational complexity is attained with recently developed constant gain adaptation laws. We present and evaluate a state-space realization of such an adaptation law, with computational complexity of the order of the square of the number of parallel tracked pilot subcarriers. In an adaptive OFDM system, prediction of the channel power a few milliseconds ahead will also be required. Frequency-domain channel estimates can be transformed to the time domain, and used as regressors in channel predictors based on linear regression. We also make a preliminary evaluation of the direct use of complex channel prediction in the frequency domain for channel power prediction.
Astt.Professor, Deptt of Computer Science & Engineering, M. V N University, Palwal, India
Manager -IT, Technical Textile Business, SRF Limited, Gurgaon, India
Abstract: This paper presents an overview of speech recognition technology. This report presents an overview of speech recognition technology, software, development and applications. It begins with a description of how such systems work, and the level of accuracy that can be expected. Present work is aimed at developing suitable speech recognition for hindi language, for the people who are physically hampered and cannot able to operate the computer through keyboard and mouse. In this paper we are using a HMM (hidden Markov model) to recognize speech samples to give excellent results for isolated words. It consists of isolated words that are separated by silences. The advantage of discrete speech is that word boundaries can be set exactly while with continuous speech; words will be spoken without silences.
Data Communication in Ad-hoc Network: The challenges and issues
Mr. Nitin V. Wankhade, Dr. S. P. Deshpande
Assistant Professor (P.G.D.C.S.T., D.C.P.E., H.V.P.M., Amravati-MS, INDIA)
Associate Professor and Head (P.G.D.C.S.T., D.C.P.E., H.V.P.M., Amravati-MS, INDIA)
Abstract: The mobile users are increasing with a tremendous speed and users of mobile are expecting extensive value added services apart from the basic communication between the mobile users. Data communication in mobile has many challenges and the effective data communication shall support the mobile users in exploiting the different facilities through this ad-hoc network. This paper presents the different approaches for data communication in ad-hoc network used for mobile and also presents the threats, challenges and issues in this type of data communication.
Keywords: Data Communication, mobile database, mobile database communication, mobile ad-hoc network.
Dept of CSE, Adhiyamaan College of Engineering, Hosur, T.N, India
Abstract: An efficient and fully robust group key agreement protocol (GKA) enables a group of authenticated users to communicate over a reliable broadcast communication medium. All non-faulty nodes will form a cyclic group and hence have the same view of the message which is broadcasted and the faulty nodes cannot view that message. The standard encryption-based group key agreement protocol can be robust against an arbitrary number of node faults, because the performance deteriorates if some nodes fail during the protocol execution..By making each node to enter with the help of a nonce which is an arbitrary number that is used only once in a cryptographic communication and it will protect the malicious insiders that may disturb the group communication. The elliptic curve digital signature algorithm is used for establishing the group key and the proposed protocol has O(log n)-sized messages and expected round complexity close to 2, assuming random node fault and also it is secure under the (standard) Decisional Square Diffie-Hellman assumption.
Keywords: Group key agreement, fault-tolerance, security, Secure Communication, nonce.
Assistant Professor, Dept. of Computer Science, Periyar University College of Arts and Science, Salem, India
Associate Professor, Dept. of Computer Science, Sri Saradha College For Women, Salem, India
Abstract: Information Security is the process by which an organization protects and secures data communications and storage. Biometrics is a field of science which deals with the positive identification of unique individuals based on their physiological or behavioural characteristics. Each biometric has its strength and weakness. No single biometric is expected to effectively meet the requirements of all applications. Biometric products provide improved security over traditional electronic access controls. While some technologies have gained more acceptance then others, it is beyond doubt that the field of access control biometrics has gained a measure of acceptance. In certain situations, the user might find one form of biometric identification is not exact enough for identification. Unimodal biometric system have to contend with a variety of problems such as noisy data, spoof attacks, non-universality, intra-class variations etc. These limitations can be overcome by Multimodal biometric system. Multimodal biometric technology uses more then one biometric identifier to compare the identity of the person for better security. This article describes about Multimodal Biometric technologies, modules and levels of fusions, design issues and modes of operations etc.
Peak-to-Average Power Ratio Reduction in OFDM system using Block Coding technique
Ashish K. Thakre, Snehal B. Meshram
Lecturer, Dept of Electronics, SDMP., Nagpur, Maharashtra, India
M-Tech 4th Sem, Communication Engg., YCCE Nagpur, Maharashtra, India
Abstract: One of the challenging issues for Orthogonal Frequency Division Multiplexing (OFDM) system is its high Peak-to- Average Power Ratio (PAPR). In this paper, we review and analysis different OFDM PAPR reduction techniques, based on computational complexity, bandwidth expansion, spectral spillage and performance The proposed scheme is termed sub-block complement coding (SBCC). Performance results obtained with SBCC are given and compared with that of the standard complement block coding (CBC), cyclic coding (CC), simple block coding (SBC), modified simple block coding (MSBC) and simple odd parity code (SOPC) for the same purpose. The results show that, at the same coding rate 3/4, the proposed scheme can achieve almost the same performance as the cyclic code but with lower complexity. But under the same coding rate, the PAPR reduction obtained by using SBCC is better than the rest schemes. The flexibility on choosing the coding rate and low complexity makes that the proposed scheme SBCC is more suitable for the large frame size with high coding rate and can provide error detection..We also discuss some methods of PAPRReduction.
Keywords: Sub-block complement coding(SBCC), (OFDM)Orthogonal frequency division multiplexing, high power amplifier (HPA), peak-to-average power ratio (PAPR)
Experimental Evaluation of pNFS Protocol using Network Direct Attached Hard Disk Drives for Mass Storage System
Han-gyoo Kim, Kee-cheol Lee
Faculty of Computer Engineering Department, Hongik University, Seoul, Korea
Abstract: Experiments were performed to investigate the storage I/O performance of pNFS file system protocol using network direct attached hard disk drives as its storage subsystem. Comparison experiments were done to NFS4.0 and NFS4.1 with pNFS in order to further investigate the scalability of the two network file systems. It is found that NFS4.1 preserves the scalability as storage capacity is increased while NFS4.0 loses its scalability rapidly as its storage capacity is increased. It is also found that NFS4.1 shows, on average, over 4 times higher I/O speed than NFS4.0 when both systems uses the same set of network direct attached hard disk drives in our experiments.