|Research Topic||Paper ID|
|Preventing Ddos Attack Using Sf with Thumb Impression
V.Shyamaladevi, Dr.R.Umarani, M.Aishwarya
Abstract: The theoretical performance of linear and nonlinear collusion attacks under the assumptions that orthogonal or regular-simplex fingerprints are used, and that the detector performs a linear correlation test in order to decide whether a user of interest is among the colluders. The colluders create a noise-free forgery by applying a mapping f to their individual copies, and then add a noise sequence e to form the actual forgery. They seek the mapping f and the distribution of e that maximize the probability of error of the detector. The performance of mappings such as linear-averaging and interleaving can be compared in this framework. It is also shown that impulsive noise attacks are far more effective than Gaussian attacks. Digital fingerprinting schemes are devised for traitor tracing. In applications such as copyright protection, the goal is to deter users from illegally redistributing the digital content. Each user is provided with his own individually marked copy of the content. Although this makes it possible to trace an illegal copy to a traitor, it also allows for users to collude and form a stronger attack. One form of such attacks is linear averaging, where the colluders average their copies and add noise to create a forgery. Averaging reduces the power of each fingerprint and makes the detector’s task harder. Another collaborative attack is interleaving, where the colluders form a pre-forgery by contributing samples from their copies and contaminating the pre-forgery with noise.
|An Efficient way of Record Linkage System and Deduplication using Indexing techniques, Classification and FEBRL Framework
Nishand.K, Ramasami.S, Dr. T.Rajendran
Abstract: Record linkage is an important process in data integration, which is used in merging, matching and duplicate removal from several databases that refer to the same entities. Deduplication is the process of removing duplicate records in a single database. In recent years, data cleaning and standardization becomes an important process in data mining task. Due to complexity of today’s database, finding matching records in single database is a crucial one. Indexing techniques are used to efficiently implement record linkage and deduplication. In this paper, three indexing techniques namely blocking index, sorting indexing and bigram indexing are used with a modification of existing techniques that reduces the variance in the quality of the blocking results. In addition to the indexing techniques, six comparison techniques and two classifiers are used. There is a potential for large performance speed-ups and better accuracy to be achieved by using indexing techniques along with comparison and classifier techniques.
|Performance Enhancement of MIMO-OFDMA: A Review Paper
Kavita Devi, Dr. Rajneesh Talwar
Abstract: OFDM multi-carrier modulation is expected to be the enabling technology for 4G wireless systems. One of the features that make OFDM the primary choice for 4G is its MIMO compatibility, because MIMO has a very significant potential of enhancing wireless systems for capacity, data rate, and coverage aspects. In this paper, the challenges of MIMO OFDM measurements are addressed and requirement of transmitting power control by user is discussed. Downlink power and uplink power is limiting factor in the performance of MIMO OFDMA system. An adequate power controlling mechanism based on closed loop of base station is solution to this problem.
|Discrimination of Indian Tea Varieties using UV-VIS-NIR Spectrophotometer and Pattern Recognition Techniques
Santosh Kumar, P C Panchariya, Bhanu Prasad, AL Sharma
Abstract: The food and water is an important and an extremely important beverage for all living beings. Inspite of food and water, there are other drinks in our daily life as soft drinks, cola, fruit juices, coffee, and tea etc. Tea is one of the popular beverages, not only for its taste but also for its beneficial medicinal properties for human beings. There are many different tea species or clones among the world and in India. India is one of the largest tea producers in the world and also the world’s largest tea-drinking nation. There are lots of tea varieties available in the Indian market and all are having different taste, flavor and colors. The proposed paper gives the identification of most of the teas by means of UV-VIS-NIR spectrophotometer along with the clustering and classification techniques. UV-Vis-NIR spectroscopy is a reasonably fast and accurate technique that can be used as a replacement of conventional sensory evaluation methods and time-consuming chemical methods. UV-VIS-NIR spectra were recorded by measuring the absorption spectra in the range 240-2600nm. The spectral features of each category are reasonably differentiated by principal component analysis and the pattern recognition techniques for clustering and classification. Principal component analysis (PCA), a common chemometric method used for data reduction and visualization. Here nine varieties of teas are tested, and their spectral differences provide enough qualitative spectral information for the discrimination.
|A Modified Secure Digital Image Steganography Based on Dwt Using Matrix Rotation Method
Ashish Chawla, Pranjal Shukla
Abstract: Steganography, the secret image is embedded in the cover image and transmitted in such a way that the existence of information is undetectable. The digital images, videos, sound files and other computer files can be used as carrier to embed the information. In this paper, we propose a modified secure and high capacity based steganography scheme of hiding a large-size secret image into a small-size cover image. Matrix Rotation is performed to scrambles the secret image. Discrete Wavelet Transform (DWT) is performed in both images and followed by Alpha blending operation. Then the Inverse Discrete Wavelet Transformation (IDWT) is applied to get the stego image. We have investigated the performance of our scheme by comparing various qualities of the stego image and cover image and also compared old methods like Arnold Transform with this one. The results show that the proposed algorithm for modified steganography is highly secured with certain strength in addition to good perceptual invisibility.
|Utilization of GA and HPSO for allocation: A Systematic Review
Roop Jyot Kaur, Rajeev Kumar, Reeta Bhardwaj
Abstract: Allocation affects our daily routine work as it decides the sequence for completion of task. Similarly, it affects output response by sequence of placements. Allocation is a NP-hard problem and has more than one solution. The selection depends on the type of problem to be solved. Allocation deals with placements of jobs (to minimize response time) in execution process, distribution of resources (to use them optimally), space management, data division etc. This paper presents an overview of the techniques (GA and HPSO) of allocation which affect the time and cost for the results based on the placing for execution (scheduling).
|Performance Analysis of Space Time Block Coded Spatial Modulation (STBC_SM) under dual diversity Condition
Sailesh Dubey,Aniket Kulshreshtha, Vinit Shrivastava
Abstract: STBC_SM is a technique which uses the fundamental of both Spatial modulation and Space time block codes to provide a high rate of spectral efficiency as well as transmit diversity. In this paper we have evaluated the performance of STBC_SM under varying antenna conditions so that to study the effect of receive diversity on STBC_SM. The overall performance is compared under different conventional diversity technique.
|A Hybrid Approach using ANN and ACO for Prostate Boundary detection from Ultrasound Images
Richa Kaushal, Vikas Gupta
Abstract: Prostate cancer is a form of cancer that develops in the prostate, a gland in the male reproductive system. Most prostate cancers are slow growing. However, there are cases of aggressive prostate cancers. The cancer cells may metastasize (spread) from the prostate to other parts of the body, particularly the bones and lymph nodes. Prostate cancer may cause pain, difficulty in urinating, problems during sexual intercourse, or-erectile dysfunction . Other symptoms can potentially develop during later stages of the disease. Rates of detection of prostate cancers vary widely across the world, with South and East Asia detecting less frequently than in Europe, and especially the United States. Prostate cancer tends to develop in men over the age of fifty . Globally it is the sixth leading cause of cancer-related death in men (in the United States it is the second) . The main barriers in the detection process of prostate Cancer are the judgment about the boundary or the prostate. As a misinterpretation in this case may cause bigger problems. Number of researchers are working on this field of detection of prostate boundary and proposes many new ideas . The main reason of misinterpretations may be considered as individual human bias, the visibility of the ultrasound images in the presence of some kind of noise etc. In this paper we proposes a hybrid approach in combination of Artificial Neural Network and optimization technique Ant Colony Optimization (ACO) for the detection of boundary of prostate which will help us in the treatment process. Here Neural Network helps us in prediction or selection of pixels under consideration and ACO provides us the way to move throughout the Ultrasound image for the detection of Prostate boundary on the basis of certain assumptions or the requirements of prostate boundary.
|Big Data, Bigger Implementation using Oracle and Hadoop
Ronak Juneja,Rashmi Arora,Sadhana G.
Abstract: Big data-means many different things to different people, but it’s no longer confined to the technology only. Today it has become a business priority, giving its ability to profoundly affect the commerce and others. This paper includes enlightens study and implementation of big data and its various techniques to handle it. This paper provides discussion about big data, its dimensions and its significance in the upcoming world. There are various domains under which the study of big data in included. These domains basically divide the application big data all over. The oracle approach to handle the big data through oracle big data appliance x3-2 have been discussed in the paper. The Oracle Big Data Appliance is an engineered system optimized for acquiring, organizing and loading unstructured data into Oracle Database 11g. It combines optimised hardware components with new software solutions to deliver the most complete big data solution.The last section of the paper discusses about hadoop, which handles huge volumes of data across a large number of nodes. Hadoop operates by dividing a “task” into “sub-tasks” that it hands out redundantly to back-end servers, which all operate in parallel on a common data store.
|Medical Application Based on Wireless Sensor Network
Niraj Patil, Asip Mulla
Abstract: Sensor networks have great potential to impact many aspects of medical care. By outfitting patients with wireless, wearable vital sign sensors, collecting detailed real-time data on physiological status can be greatly simplified. Medical sensor networks must support multicast routing topologies, node mobility, a wide range of data rates and high degrees of reliability, and security. We proposed to look at the possibility of adding scope selection to the current implementations of data dissemination to add robustness and scalability, better utilization and limited bandwidth. This leads to energy saving at the same time it promote autonomy of the network which would facilitate deployment of wireless sensor network in more diverse scenarios.
|Profit Maximizing Approach in Data Mining using Modified Weighted Association Rule Mining Algorithm
Ramesh Yadav, Snehal, Aafaq Wali
Abstract: This research paper proposes a Modified Frequent Pattern-Growth algorithm, a new type of Weighted Association Rule Mining algorithm, which takes into account the weights of items as well as their support counts while discovering weighted association rules. This is generalization of the weighted association rule mining. The main issues of weighted association rules mining investigated in this work are – how good are weights as compared to support counts, and the problem of reducing the amount of association rules for achieving conciseness. The experimental results show a series of six experiments in which Weighted Association Rule Mining (WARM) method outperforms traditional Associated Rule Mining (ARM) method in all confidence levels.
|Study of Energy Efficient Routing Protocols of Wireless Sensor Networks and their further researches: a Survey
Pallavi Jindal, Vikas Gupta
Abstract: Wireless sensor networks are deployment of micro, less expensive sensors to obtain the certain scenario of an environment by combining the data of different nodes. In the wireless sensor network the end user can remotely monitor physical events in the environment depending upon the desired application where the region can vary from a small to large region and where the deployment of sensor nodes varies from a limited number to large number by considering the energy conservation as major consideration .Micro-sensors are loaded with a sensor module equipped with a sensors(image sensors, object tracking, environmental monitoring) capable of sensing some quantity about environment ,a radio module for communication, a battery to provide energy for operation ,a digital module for processing the signals from the micro-sensors .The main two function performed in the wireless sensor networks are gathering the information from the autonomous micro-sensor nodes and passing it to the base station that has uninterrupted power supply. In this paper we have done review study of advances made in Low energy adaptive clustering hierarchy protocol a cluster hierarchy protocol and Geographic adaptive fidelity protocol which is location based protocol and how further researches are better than classical protocol.
|Implementation of Honey Bees Foraging Optimization for Image Stegnography
Sunil Khullar, Dharminder Kumar,Mankiran Kaur
Abstract: Honey Bee Foraging Optimization is a swarm based meta-heuristic algorithm introduced, and simulates the foraging behavior of honey bees. Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. This paper intends to give an overview of image steganography & Honey Bee Foraging Optimization (HBFO). It attempts to identify a good steganographic algorithm based on Honey Bee Foraging Optimization (HBFO).
|A Study on Growth Impact of General Insurance Companies, Period 2007 – 2011
Neha Jain, Dr. R. k. Shrivastava
Abstract: It can be said that the insurance industry as a whole has recorded profound growth after liberalization and privatization of the sector, though the reforms have adversely affected the underwriting results of all the public sector general insurance companies, thanks to their increase in expense ratio and claim ratio in the post-reform period. In the post-reform period, the comparative profitability analysis of the public and private sectors reveals that the public sector general insurance companies have exhibited higher underwriting losses than the private sector companies but the higher investment income of the public sector has compensated their higher underwriting losses which resulted into their higher profitability than the private sector general insurance companies. The liberalization process and the competitive environment acted as a catalyst in the general insurance sector and inculcated efficiency in most of the public insurers and made them more efficient as compared to their private competitors, though private players are reducing the gap very fast by providing better service quality to their customers. The latest market share figures indicate that in such a short span of time, private players have captured market share to the extent of forty-one per cent, which is an eye opener. It is high time for the public insurers to completely reorganize their business model and service delivery to survive in the market.
|Crossbreed Algorithm to Enhance Security for Multimedia Content: An Overview
Abstract: The study that we conduct an in depth survey on multimedia storage security research activities with cloud computing. In this we focus on different security techniques for multimedia content. We describe many key concepts and solution planned with in the current literature and illustrates doable extension and futurist analysis opportunists. Our review work primarily focuses on understanding varied cloud security measures by characteristic distinctive security necessities and second to aim to grant a comparative study of all the viable solutions that would be used against the potential threats. However, securing the cloud server is that the prime necessity to the user once mistreatment cloud computing. Completely different mechanisms and techniques are planned during this regard. This paper’s main goal is to replicate the importance of security in cloud computing and supply with doable description of the prevailing counter measures to secure cloud computing. To ensure the security of data we proposed different security techniques.
|Performance Evaluation of Online Image Compression Tools
Rupali Sharma, Naresh Kumar
Abstract: The growing content of multimedia on the world wide web thrive the need to study online image compression. Though many online image compression tools are available but the knowledge of the best tool still is an undiscovered area. This research is about analyzing as to which is the best online image compression tool available and to develop a framework using neural network so that large number of images and large number of online image compression tools can be evaluated for their performance. To evaluate the performance of these tools Objective measurement technique is applied by calculating some image quality parameters namely Peak Signal Noise Ratio, Mean Square Error, Normalized Correlation, Maximum Difference. The results of these image quality parameters are rated on Likert scale from 1 to 5 and the average Likert scale points are processed to be fed to Back Propagation Neural Network Model to classify and evaluate the performance of these online image compression tools.
|Soft Computing Implementation for Mobile Ad-hoc Network Optimization using Bacteria Foraging Optimization Algorithm
Aruna, Vikas Gupta
Abstract: A mobile ad hoc network (MANET) is a network that has many free or autonomous nodes, often composed of mobile devices or other mobile pieces, that can arrange themselves in various ways and operate without strict top-down network administration. It is often used to describe solution that are developed on the fly for a specific purpode.In computer networking an ad hoc networking refers to a network connection established for a single session. In Mobile ADHOC Networks (MANET) the mobile transceivers or sensors are randomly deployed in the sensor field which brings the problem of coverage for all or some of the nodes. As the coverage problem can increase overall effective distance of all nodes from the sensor which further affects overall throughput & power required by the system. It is a unique problem and in maximizing coverage, the sensors need to be placed in a position such that the sensing capability of the network is fully utilized to ensure high quality of service. The main goal of the paper is to implement a new soft computing technique , which is inspired from the earlier living beings the “Bacteria” and is known as Bacteria Foraging Optimization. As it works same as the bacteria find out their food in a specific set of area it is generally called BFO.
|A Review Paper on Detection of Foreign Fibres and Cotton Containments
Damandeep kaur, Sunil khullar
Abstract: It is very important to detect the impurities in cotton as in aspect of important aspect of modern industrial manufacturing. It is very difficult to detect the foreign fibres and impurities in cotton due to their unpredictable shape,size,position and material. The major contaminants or impurities found in cotton are glass ,rust, paper ,oil ,greese ,bird feather ,nylon straps plastic film, nylon , jute, dry cotton , bird feather, glass, paper, metal wires and various foreign fibers like silk,nylon, polypropylene of different colors and someof white color may or may not be of cotton itself. After analyzing cotton contaminants and its characteristics adequately, This paper presents various techniques for detection of white foreign fibers and contaminants from cotton. For machine vision system YCbCr color space has been implemented previously in which performance parameters like speed of detection and time for detection need to be improved and also the problem of detection of white foreign fiber need to be consider, and also work is done by using hue and intensity techniques..So various , automated systems can detect different types of contaminants. So This paper presents a review of various image processing techniques that can be used for detecting contaminants in cotton fiber.
| Image Fusion using HIS,PCA and Wavelet Technique
Amarjot Kaur, Sunil Khullar
Abstract: Image Fusion is a process of combining the relevant information from a set of images into a single image, where the resultant fused image will be more informative and complete than any of the input images. Image fusion techniques can improve the quality and increase the application of these data. This paper presents a literature review on some of the image fusion techniques for image fusion like, Wavelet transform based fusion, Principal component analysis (PCA) based fusion and HIS technique. In this wavelet transform of different images are appropriately combined by taking inverse wavelet transform of fused wavelet coefficients. Max. area selection rule & consistency verification step are used for feature selection.The Intensity Hue Saturation transformation, a method mainly used for merging multi resolution and multispectral data and for contrast stretching applications, has never been applied. In this study, a method is presented by which transforming the RGB values of a three channel composite to HIS values.
| Creating Powerful Power Point Presentation
Abstract: The paper is written with a motive to explain how to create a powerful power point presentation in the organisations. The organisations hold lectures on regular basis for the training and development or for discussing the performance of the firm or for planning and making future strategies, etc. For this purpose, the employees gather in the conference room. The speaker always uses power point slides as an aid while speaking. This way, the data can be explained easily to the available audience. In this paper, I’ll discuss how to design and structure a powerful power point presentation and then some tips are given for making an impressive presentation.
| Leadership Styles in Managing People
Abstract: Leadership means directing and motivating the employees and directing them towards achieving the organisational and personal objectives.Management is the way of achieving the goals that can add value to the organisation. In today’s competitive environment, management and leadership go hand in hand. They help the employees to achieve the competitive advantage over their competitors. It is very difficult to find both the qualities of a successful manager and a charismatic leader, thus the organisations invests in both. This paper deals with the role and importance of the leaders in an organisation. The role of the managers and the leaders are also compared. And finally, different leadership styles are discussed.