IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
Research Scholar, Dept. of CSE, CMJ University, Shillong, Meghalaya, India
Associate Professor, Dept. of CSE, VelMultitech Dr. RR Dr.SR Engineering College, Chennai, India
Research Scholar, Dept. of CSE, CMJ University, Shillong, Meghalaya, India
Research Scholar, Dept. of CSE, CMJ University, Shillong, Meghalaya, India
Research Scholar, Dept. of CSE, CMJ University, Shillong, Meghalaya, India
Associate Professor, Dept. of CSE, VelMultitech Dr. RR Dr.SR Engineering College, Chennai, India
Research Scholar, Dept. of CSE, CMJ University, Shillong, Meghalaya, India
Research Scholar, Dept. of CSE, CMJ University, Shillong, Meghalaya, India
M.Tech. Student (Computer Engineering)1, Assistant Professor (Computer Engineering) (Supervisor)
Yadavindra College of Engineering, Punjabi University Guru Kashi Campus, Talwandi Sabo, Bathinda, Punjab, India.
M.Tech. Student (Computer Engineering)1, Assistant Professor (Computer Engineering) (Supervisor)
Yadavindra College of Engineering, Punjabi University Guru Kashi Campus, Talwandi Sabo, Bathinda, Punjab, India.
Assistant Professor, Dept. of ECE, Lord Krishna College of Engineering, Ghaziabad, Uttar Pradesh, India
Assistant Professor, Dept. of ECE, National Institute of Technical Teachers Training and Research, Chandigarh, India
Associate Professor & Member IEEE, Dept. Of CSE, Army Institute of Technology, Pune, India
Professor, Dept. Of CSE, MET's Institute of Engineering, Bhujbal Knowledge City, Nashik, M.S. India
M.Tech (SE), Dept. of CSE, Holy Mary Institute Of Technology And Science,Hyderabad,India.
M.Tech (CSE), Dept. of CSE, Holy Mary Institute Of Technology And Science,Hyderabad,India.
M.Tech, Dept. of CSE, Holy Mary Institute Of Technology And Science,Hyderabad,India.
Dept. of CSE, Holy Mary Institute Of Technology And Science,Hyderabad,India.
Dept. of CSE, Holy Mary Institute Of Technology And Science,Hyderabad,India.
M.Tech. Student (Computer Engineering) 1, Assistant Professor (Computer Engineering) (Supervisor)
Yadavindra College of Engineering, Punjabi University Guru Kashi Campus, Talwandi Sabo, Bathinda, Punjab, India.
1M.Tech (CSE) Student, G. Pulla Reddy Engineering College, KURNOOL, Andhra Pradesh. India.
2Professor, Dept. of CSE, G. Pulla Reddy Engineering College, KURNOOL, Andhra Pradesh. India.
MS.DHARMISTHA D.VISHWAKARMA Research Scholar, Dept. of Electrical Engineering, Faculty of Tech. & Engg. The M.S.University of Baroda. Vadodara, Gujarat, India
Dr S. Saravanakumar, K Ramnath, R Ranjitha and V.G.Gokul
Associate Professor, PhD, Department of CSE, Panimalar Institute of Technology , Chennai
Department of IT (Final year), St Joseph Engineering college, Chennai
Department of CSE (Final year), Panimalar Institute of Technology, Chennai
Department of CSE (Final year), R.M.K.Engineering college, Chennai
|
Abstract
Design and Implement an Association Rule hiding Algorithm for Privacy Preserving Data Mining
Research Scholar, Dept. of CSE, CMJ University, Shillong, Meghalaya, India
Associate Professor, Dept. of CSE, VelMultitech Dr. RR Dr.SR Engineering College, Chennai, India
Research Scholar, Dept. of CSE, CMJ University, Shillong, Meghalaya, India
Research Scholar, Dept. of CSE, CMJ University, Shillong, Meghalaya, India
Abstract: Privacy preserving data mining is a research area concerned with the privacy driven from personally identifiable information when considered for data mining. This paper addresses the privacy problem by considering the privacy and algorithmic requirements simultaneously. The objective of this paper is to implement an association rule hiding algorithm for privacy preserving data mining which would be efficient in providing confidentiality and improve the performance at the time when the database stores and retrieves huge amount of data. This paper compares the performance of proposed algorithm with the two existing algorithms namely ISL and DSR.
Keywords: Confidence, Support, association rules, Item sets
Research Scholar, Dept. of CSE, CMJ University, Shillong, Meghalaya, India
Associate Professor, Dept. of CSE, VelMultitech Dr. RR Dr.SR Engineering College, Chennai, India
Research Scholar, Dept. of CSE, CMJ University, Shillong, Meghalaya, India
Research Scholar, Dept. of CSE, CMJ University, Shillong, Meghalaya, India
Abstract: Data mining has become more concerned with the rapid exploration of metadata in web and with the collection of information and analysis of data, violates the privacy preserving of private data. Privacy Preserving Data Mining is a research area concerned with the privacy driven from personally identifiable information when considered for data mining. With anonymity techniques over the web, it produced good results, across the system in world. Hence more techniques are introduced, to protect the security of sensitive data. In this paper, we provide statistical anonymization methods which can be applied for privacy preserving data mining. This paper also describes about anonymity models, major implementation ways and the strategies of anonymity algorithms.
Keywords: Privacypreserving, anonymization, perturbation, micro-aggregation, synthetic micro data
A Genetic Algorithm for Regression Test Sequence Optimization
Suman, Seema
M.Tech. Student (Computer Engineering)1, Assistant Professor (Computer Engineering) (Supervisor)
Yadavindra College of Engineering, Punjabi University Guru Kashi Campus, Talwandi Sabo, Bathinda, Punjab, India.
Abstract: Regression testing is the process of validating modified software to assure that changed parts of software behave as intended and unchanged parts of software have not been adversely affected by the modification. The regression test suite is typically large and needs an intelligent method to choose those test cases which will reduce the overall test cost. In this situation, test case prioritization techniques aim to improve the effectiveness of regression testing by ordering the test cases so that the most beneficial are executed first. In this approach, a new Genetic Algorithm to prioritize the regression test suite is introduced that will prioritize test cases dynamically on the basis of complete code coverage. Meanwhile, an approach to generating new test cases is presented using PMX and cyclic crossover and analysis is done on the basis of process cost and test cost. The overall aim of this research is to reduce the number of test cases that need to be run after changes have been made.
M.Tech. Student (Computer Engineering)1, Assistant Professor (Computer Engineering) (Supervisor)
Yadavindra College of Engineering, Punjabi University Guru Kashi Campus, Talwandi Sabo, Bathinda, Punjab, India.
Abstract: Vehicular networks are becoming wide technology in traffic system. The entities that are part of a vehicular communication system can be private or public vehicles, road-side infrastructure, and authorities, with the latter considered primarily as network entities. Poorly designed VANETs that permit serious attacks on the network can jeopardize the goal of increased driving safety. The unwanted data can disturb the network communication. The wrong information or inject large volume of data can jam the traffic on roads, this type of data is known as malicious data/unsolicited data. Also, the life safety becomes critical and non trusted behaviour of network. Thus the specific characteristics of VANETs result in hard to address security issues, which make the field of secure inter-vehicular communications. Therefore, we have done work on securing VANET and develop a framework for understanding impact of attack. We tried to detect malicious data under VANET environment. In this thesis work, we will present the techniques that have been proposed so far to ensure accurate data transmission between nodes. VANET have configurable no. of nodes and multiple sensors/actuators. Next, To develop a model of all on board sensors based on their past data set. This may be created by using adapting thresholding, Simulate abnormal behaviour in data arrival rate and volume of data arrival. The Proposed work is related to develop simulator with CAN protocol.
Selection of a Suitable Orthogonal Wavelet and Its Optimum Level of Decomposition for Noise Reduction in Digital Wireless Communication
Krishna Kumar, Garima Saini
Assistant Professor, Dept. of ECE, Lord Krishna College of Engineering, Ghaziabad, Uttar Pradesh, India
Assistant Professor, Dept. of ECE, National Institute of Technical Teachers Training and Research, Chandigarh, India
Abstract: Wireless communication has become one of the fastest growing fields in today’s technological world. Growth in technology has led to unprecedented demand for high speed architectures for complex signal processing applications. In digital wireless communication system the reliability of Orthogonal Frequency Division Multiplexing (OFDM) is limited because of the time-varying nature of the channel. To avoid the effect of ICI(Inter Carrier Interference) cyclic prefix guard intervals were introduced before each block of parallel data symbols, but these guard intervals decreases the spectral efficiency of the OFDM system. To avoid the insertion of guard intervals wavelet based OFDM (OWDM) are used which gives a fine spectral containment of the signal over a wide range of the Bandwidth.
QoS Based Web Services Composition using Ant Colony Optimization: Mobile Agent Approach
Sunil R Dhore, Prof. Dr M U Kharat
Associate Professor & Member IEEE, Dept. Of CSE, Army Institute of Technology, Pune, India
Professor, Dept. Of CSE, MET's Institute of Engineering, Bhujbal Knowledge City, Nashik, M.S. India
Abstract: Web Services are based on distributed technology and provide standard means of interoperating between different software applications across and within organizational boundaries with the use of XML. Web Services technologies allow interaction between applications. Sometimes a single service given alone does not meet user’s needs. In this case, it is necessary to compose several services in order to achieve the user’s goal. In web service composition, a repository of services is given in which input and output parameters of each service are annotated with a concept from ontology. Given request is defined by a set of known input concepts and a set of wanted output concepts. Semantic composer should find a sequence of services, called composition that satisfies the wanted output concept. In this paper, a semantic composer based on ant colony optimization method is proposed. The proposed composer can find optimal composition length in each challenge set in a reasonable time. The result of the suggested composition can be compare with the best result reported in Web service consortium (WSC). The novelty of this work lies with our multi-objective optimal-path selection modelling for QoS-based dynamic web service composition and a new version of ACO algorithm that is proposed to solve this multi-objective optimization problem.
Keywords: Web Service, Web Service Composition, Quality of Service, Multi-Agent System, Service-oriented architecture, Multi Objective Ant Colony Optimization
Embedded Optimum Controller for Process Loop Using Arm Controller
Sonal J Rane
Department of Electrical. Engineering, Faculty of Tech. & Engg., M.S.University of Baroda, Vadodara, Gujarat, India
Abstract: Embedded controllers are often the heart of an industrial control system or a process control application. They may also be at the centre of a portable data acquisition system or remote controller that allows an application to keep running even if its umbilical link to the outside world is cut. At the same as control systems is an important application class of embedded systems, feedback control is also an important basic technology that can be employed in the design of embedded real-time systems. Feedback control is a well established and mathematically well-founded theory that is ideal for handling uncertainties.The importance of reducing power consumption in embedded systems has now been widely recognized, and a large body of work has focused on estimating, managing, and reducing power consumption in various system components. For hardware design, techniques have been developed to estimate and optimize power consumption starting from the algorithm and architectural design phases, down to the circuit design and technology optimization steps. Application, semiconductor technology, cost, and time-to-market trends are causing a shift toward increased software content in embedded systems and systems- on-chip. As a result, designers and users of embedded software must be increasingly aware of power issues. While power dissipation is inherently a property of the underlying system hardware, knowledge of the embedded software that runs on the hardware is useful in order to analyze and improve the system’s power-consumption characteristics. Main Objective of this paper is to design a real-time (minimum time) optimum embedded controller for a closed loop process control system for controlling process temperature employing ARM controllers.
Keywords: Embedded system, process loops, ARM controller, Optimization method, Control system
Dept.of CSE, RKDF Institute of Science & Technology, Bhopal, India
Abstract: Classification is an important subject in data mining and machine learning, which has been studied extensively and has a wide range of applications. Classification based on association rules, also called associative classification, is a technique that uses association rules to build classifier. CMAR employs a novel data structure, association rule, to compactly store and efficiently retrieve a large number of rules for classification. Association rule is a prefix rule structure to explore the sharing among rules, which achieves substantial compactness. To speed up the mining of complete set of rules, CMAR adopts a variant of recently developed FP- growth method. FP-growth is much faster than Apriori-like methods used in previous association-based classification, such as especially when there exist a huge number of rules, large training data sets, and long pattern rules. We use classification using association rules not only to solve classification problems, but also to compare the quality of different association rule mining approaches. In this context we show that the quality of rule sets from the standard algorithm for association rule mining can be improved by using a different association rule mining strategy Above classification rate is 80%( MAX) hence the 20% data are unclassified. This is a challenge in the field of data classification. In this paper, we used multiple relational Bayesian classification algorithm based on genetic algorithm used for optimization of classification rate, generated by association rule.
Keywords: Classification, Genetic algorithms, association rule
M.Tech (SE), Dept. of CSE, Holy Mary Institute Of Technology And Science,Hyderabad,India.
M.Tech (CSE), Dept. of CSE, Holy Mary Institute Of Technology And Science,Hyderabad,India.
M.Tech, Dept. of CSE, Holy Mary Institute Of Technology And Science,Hyderabad,India.
Dept. of CSE, Holy Mary Institute Of Technology And Science,Hyderabad,India.
Dept. of CSE, Holy Mary Institute Of Technology And Science,Hyderabad,India.
Abstract: This paper we propose and evaluate we present, which integrates public key cryptography into url applications without any browser plugins. The public key of is provided by identify basis cryptography, eliminating the need of public key and certificate online retrieval; the private key is supplied by the fragment identifier of the URL. In , two mechanisms are integrated to resolve the above challenges and provide security and privacy for system bounding url users. The first one is Identify Basis Cryptography (IBC), a type of public key cryptography in which the public key can be an arbitrary string. can provide public key encryption and digital signature for the url applications without the need of online searching and retrieving of public keys or certificates. Because the recipient’s email address, which also serves as his public key, can be easily read from the HTTP form in the message sending url page, the implementation of IBC can make easily integrated into any url applications, and run in all browsers even text basis http systems. The other is to provide the private key from the URL fragment identifier. In , the private key is encoded into the fragment identifier component of the url application URL.
Keywords: True Random Number Generator , Pseudo-random Number Generator , Key Pair Extraction, Fragment Identifier, Cryptography.
Design and Implementation of PCM Decommutator On A Single FPGA
G.PRASAD, Dr. N.VASANTHA, Scientist “SF”, National Remote Sensing Centre, ISRO, Hyderabad, India.
Abstract: After frame synchronization, individual measurands are identified according to the frame location. The decommutator identifies and extracts embedded asynchronous data stream (EADS) words. Thus PCM Decommutator is a very crucial subsystem in the satellite data acquisition unit of satellite ground station. A PCM decommutator is designed and implemented on a Stratix FPGA. The Hardware design comprises of four modules. a) Decommutator b) FPGA on chip memory bank c) Data storage on external FIFO banks d) PCI-X Master IP core integrated on the same FPGA. Decommutator will identify and separate the individual parameters from the incoming satellite PCM stream. M4k memory of the Stratix is used to develop a FPGA on chip Memory module to temporarily store small volume of the decommutated data before sending it to a large FIFO on the board. Altera 64bit Master IP core is integrated into the same FPGA to interface the stored data to a higher end server. A software program is written in Visual C++ to read the data from FIFO and store in the server RAID. The validation of the modules is done with an inbuilt data simulator.
Semantic fuzzy Colour Algorithm for Image Retrieval Using Hindi Dialects
Jasmeet kaur, Seema
M.Tech. Student (Computer Engineering) 1, Assistant Professor (Computer Engineering) (Supervisor)
Yadavindra College of Engineering, Punjabi University Guru Kashi Campus, Talwandi Sabo, Bathinda, Punjab, India.
Abstract: Retrieval of an image by segmenting of an image into meaningful regions that can be read by machines and co- related with human language and the labeling of the regions as per concepts is a challenging problem. A framework for simultaneous image segmentation and object labeling leading which focuses on semantic analysis of images stored in the database has been done and it contributes to knowledge-assisted multimedia analysis and has been reducing the gap between semantics and low level visual features. The proposed framework operates at semantic level using possible semantic labels, represented by formal logic as fuzzy sets, to make decisions on handling image regions instead of visual features used traditionally. Contextual information associated with each image is based on a novel semantic processing methodology used , employing fuzzy scale algorithm and taxonomic knowledge representation. So there is a need here is to develop a technique of latent correlation between low level features and high level concepts and merging them in such a way that perspectives , feelings ,expressions about the colour are mapped as human’s can understand. It has been acknowledged that research has produced many algorithms for automatic image segmentation, as well as structuring of contents of the image based on English dialects, a context representation approach to use on top of semantic region growing. We introduce a methodology to improve the results of image retrieval, based on contextual information in hindi language dialects. A novel representation for context is introduced, combining fuzzy extraction and fuzzy scale with characteristics derived from the Semantic of concepts of colour.
Remote Sensing Data as a Service in Hybrid Clouds: Security Challenges and Trusted Third Party Auditing Mechanisms
Ms.G. Divya Zion, Dr. D.Kavitha
1M.Tech (CSE) Student, G. Pulla Reddy Engineering College, KURNOOL, Andhra Pradesh. India.
2Professor, Dept. of CSE, G. Pulla Reddy Engineering College, KURNOOL, Andhra Pradesh. India.
Abstract: Cloud Computing is the next generation platform to provide resources as the services to the end users. In this paper we present a service for Trusted Third party Auditing (TPA) mechanisms. Hybrid cloud connects the private and public clouds, and it is useful when the resource expansion is needed at the private cloud but if there are limitations, then the public clouds resources can be utilized. Here, we present such a model where the data is stored in the cloud storages, in the private cloud. In case of storage expansion, it is proposed to use the public cloud storages. Security is the major concern in the public clouds. The security issues for the data can be addressed using Auditing mechanisms. Here, we present such auditing model based on Merkle Hash Tree. Auditing mechanisms presents the results like data transfer, retrieval and searching mechanism without fully decrypting the data, as well to retain the data integrity, non-repudiation of the data.
Keywords: TPA, Merkle Hash Tree, Data Storage, Cloud Computing
MS.DHARMISTHA D.VISHWAKARMA Research Scholar, Dept. of Electrical Engineering, Faculty of Tech. & Engg. The M.S.University of Baroda. Vadodara, Gujarat, India
Abstract: Networked Control Systems (NCSs) are distributed control systems where sensors, actuators, and controllers are interconnected by communication networks with its protocol followed by them. The general term used for these types of network is wireless sensor network. The use of Wireless sensor network infrastructure requires the ZigBee and IEEE 802.15.4 are standards-based protocols which defines the physical and MAC layers, network and application layers. For sensor network applications, the major criteria are the long life battery based nodes with the low cost and also that must support to the wireless mesh network concept for the compatibility of the different and multiple application environment. In this paper the conceptual study of IEEE 802.15.4 standard and ZigBee standard based wireless sensor network is discussed.
A New Methodology for Search Engine Optimization without getting Sandboxed
Dr S. Saravanakumar, K Ramnath, R Ranjitha and V.G.Gokul
Associate Professor, PhD, Department of CSE, Panimalar Institute of Technology , Chennai
Department of IT (Final year), St Joseph Engineering college, Chennai
Department of CSE (Final year), Panimalar Institute of Technology, Chennai
Department of CSE (Final year), R.M.K.Engineering college, Chennai
Abstract: This research work implies a new methodology of Search Engine Optimization (SEO) without getting sandboxed by search engines like Google, Bing and other. In the past, the algorithm was based on the quantity of back links that a site has. This process involves in implementing safe link building techniques with link velocity as its key without compromising the on page optimization. The latest algorithmic updates are taken in to consideration and the strategy is developed to rank for a keyword. By implementing this method, any organization can take advantage of the traffic from the search engines and have a good online presence. This paper is done based on the basic guidelines recommended by all the search engines for proper indexing without sandboxing. Hence even in the future; this method will not hinder the online progress of any business.