IJAIR- Volume 4 Issue 3 (March 2015)


Sr/No/ Title Pdf
1 Violence against women
Sonali Jhunjhunwala, Dr. Vijoy Kumar Singh

Abstract —Violence against women (abbreviated VAW) is, collectively, violent acts that are primarily or exclusively committed against women. Sometimes considered a hate crime, this type of violence targets a specific group with the victim's gender as a primary motive. This type of violence is gender-based, meaning that the acts of violence are committed against women expressly because they are women, or as a result of patriarchal gender constructs. The UN Declaration on the Elimination of Violence against Women states that:"violence against women is a manifestation of historically unequal power relations between men and women" and that "violence against women is one of the crucial social mechanisms by which women are forced into a subordinate position compared with men."Kofi Annan, Secretary-General of the United Nations, declared in a 2006 report posted on the United Nations Development Fund for Women (UNIFEM) website that:Violence against women and girls is a problem of pandemic proportions. At least one out of every three women around the world has been beaten, coerced into sex, or otherwise abused in her lifetime with the abuser usually someone known to her.Violence against women can fit into several broad categories. These include violence carried out by „individuals‟ as well as „states.‟ Some of the forms of violence perpetrated by individuals are rape; domestic violence; sexual harassment; coercive use of contraceptives; female infanticide; prenatal sex selection; obstetric violence and mob violence; as well as harmful customary or traditional practices such as honor killings, dowry violence, and female genital mutilation, marriage by abduction and forced marriage. Some forms of violence are perpetrated or condoned by the state such as war rape; sexual violence and sexual slavery during conflict; forced sterilization; forced abortion; violence by the police and authoritative personnel; stoning and flogging. Many forms of VAW, such as trafficking in women and forced prostitution are often perpetrated by organized criminal networks. The World Health Organization (WHO), in its research on VAW, categorized it as occurring through five stages of the life cycle: “1) pre-birth, 2) infancy, 3) girlhood, 4) adolescence and adulthood and 5) elderly”In recent years, there has been a trend of approaching VAW at an international level, through instruments such as conventions; or, in the European Union, through directives, such as the directive against sexual harassment, and the directive against human trafficking.

2 Exploration of discrete information from Benchmarking Perspective: Electronic Products Evaluation Approach
Bharti sahu, Divyanshu Rao, Ravi Mohan

Abstract—There are a number of kinds of electronic gadgets existing in the world of gadgets for making the life of people faster, rapid, simpler and quicker. Whenever we go to the market we come across numerous types of newest gadgets of different kinds and most of them are very positive, practical, useful, productive and fruitful. The new gadgets keep appearance to the market with latest and sophisticated features every day in the market. In this paper we are considering the case of selection of electronic gadget. The important research field in decision science and operations research is multiple attribute decision making commonly called (MADM). The main intention of this paper is to expose the utility of grey numbers. The case proposed here deals to determine the preference of the electronic product in the situation of various alternatives available or to choose the best alternate in the multi criteria decision making platform with the situation where the data is complex and difficult to assess in term of quantity. A case study problem is revealed to show advantages of the proposed model. Grey numbers applications and uses have been suggested for finding the optimum solution in this literature. RR model technique based on grey numbers is used in this learning.

3 Flow and Menace of E-Wastes and Their Adverse Implications on Health and Environment
Bharti sahu, Divyanshu Rao, Ravi Mohan

Abstract—There has been increasing use and dependence on electrical and electronic gadgets like mobile phone, personal computers, laptops, server, data storage devices, photo copying machines, TV (CRT/LED/LCD), washing machine, refrigerators and air conditioners, etc. resulting into generation of large quantities of E-waste. The high rates of obsolescence of the above mentioned items coupled with steady rise in the demand have also resulted in substantial growth in e-waste generation. Individual demand for electrical and electronic equipment is rising at a substantial velocity across developing countries. Electronic wastes can contain more than a thousand assorted substances, many of which are fatal. These may be in form of heavy metals or chemicals such as mercury, lead, cadmium, chromium, magnetic properties and antimony (flame retardants), including poly brominated biphenyls, polyvinyl chloride, polychlorinated biphenyls, and polybrominated diphenyl ethers. This paper have shown the empirical findings regarding waste dumping, human health, impact of chemical wastes and focuses on adopting a policy of Reduce –Reuse- Recycle-Recover –Dispose during various phases of the life cycle of the electronic instrument. The work reveled here tries to communicate some facts and figures about the concerned ewastes. The main objective of this study concentrates on examining the effort applied to calculate generation and collection of used electronics generated. This analysis provides insights on the quantities of used electronics generated and collected. The learning tries to frame and compute the harm and damage shared to the environment by e-waste. This study presses the urgent need for initiating the course of action to tackle the Problems of the recycling and disposal of hazardous e-waste. The key findings from this study depicts introduction of recycling locator in the developing countries.

4 Classification of Background Subtracted Videos Using Neural Network-Learning Classifier
C.K.Bharathi, D.Suresh

Abstract—In this project we present the concept of effective classification for background subtracted videos by using learning classifier-feed forward neural network with back propagation to conquer the open problem in the context of the complex scenarios.eg:- while picturing the videos in some application like cloudy (or) misty areas the object in video will be less clarity with naked eye even after the background subtraction also. In context of existing system the back ground subtraction is to apply the video brick extraction at any location of the scene, which is in the avi format. Next is to find the threshold value of bricks by using spatial-temporal information of the video based on the intensity. The threshold values separate the foreground and background of the bricks by applying background subtraction. It will get rid of the background of the each and every frame and finally run as video. Here we proposed the effective classification for the output video that has underwent by background subtraction & reveal the type of the object more precisely then existing system by using learning classifier–feed forward neural network with back propagation.

5 Survey of Load Balancing and Service Discovery for Mobile Ad hoc Networks
V.Revathi, M. Buvana, R.Satheesh Kumar, K.Muthumayil

Abstract-Recently, Service Discovery protocols in MANET have gained special attention from the research centers. In existing method, Service discovery protocols in mobile networks does not guarantee load balancing on routing paths between service providers and service requesters. It does not guarantee the performance attributes to service requesters and service providers. It permit to satisfy some performance attributes specified in client requests and to report on its performance evaluation such as, Success rate, Connection rate, Average response time, Bandwidth usage, Average load.

6 Design of Tri-car
V. Subrahmanyam, Y. Venkateswara Rao, B. Anjani Kumar

Abstract -This is an attempt made to ease the task of internal transportation of people like pilgrims, inspection teams, disabled persons in public places like temples, parks, industries, airports, hospitals etc. The tri-car to be designed is a concept vehicle driven by hub motor placed in front wheel and is powered by Lithium-ion battery. The vehicle is designed to be made with box sections of mild steel and perforated GI sheets to make it lighter. The vehicle is designed to carry three people.

7 Design FIR digital filter Using Neural Network
Yogesh Babu Indoriya, Anil Mourya, Karuna Markam

Abstract-The paper presents the design of FIR filter using FDA tool and compare different filter that is Bartlett window, Chebyshev window and Kaiser window the using algorithm that is feed-forward back propagation and feedforward distributed time delay using neural network. As the simulation results shows, the proposed neural based method is capable of archiving a better performance for filter design.

8 Comparative Study of Noise Suppression in ECG Signal by using different FIR Digital Filter
Anil Mourya, Arvind Ambey, R. P. Narwaria

Abstract-This paper deals with the application of the FIR digital filter on the ECG signal. In this paper different FIR filters are utilized. In this paper using ECG Arrhythmia data set from MITBIH database.

9 16 Bit×16 Bit multiprecision with operands scheduler
Rajarajeshwari.G, Praveenkumar.B, Anuinfancia.J

Abstract-The throughput of various applications such as Fourier Transform (FT), discrete cosine transforms, digital filtering and Digital` Signal Processing (DSPs) depends on multiplier. Hence multipliers are the most crucial arithmetic functional unit among these applications. If the multipliers are too slow, the performance of entire circuits will be reduced. In this paper we present a flexible multiprecision multiplier that combines variable precision, Parallel Processing (PP), and dedicated operand scheduling to provide optimum performance for variety of operating conditions. All the building blocks such as adders, multipliers, subtractors of proposed multiprecision multiplier can either work as independent small precision multiplier or work parallel to perform higher precision multiplier. Finally the proposed flexible multiplier can further benefit from an operand scheduler that rearranges input data, hence reduce the number of transitions of the supply voltage and minimize overall power consumption of the multiplier.

10 Response Time Analysis of Mixed Messages in CAN
S. Arthy, M. Vanitha

Abstract─Controller Area Network (CAN) is a network protocol that allows multiple processors in a system to communicate efficiently with each other. Microprocessors became small enough and powerful enough to start appearing everywhere, not just inside personal computers. A CAN system sends messages using a serial bus network, with the individual nodes (processors) in the network linked together in a daisy chain. Every node in the system is equal to every other node. Any processor can send a message to any other processor, and if any processor fails, the other systems in the machine will continue to work properly and communicate with each other. In modern vehicle technology CAN is used to reduce point to point wiring harness for vehicle automation and for data communication. To overcome the drawbacks of analog vehicle driving interface, this paper presents the development and implementation of a digital driving system for a semi-autonomous vehicle to improve the driver-vehicle interface. This offers increased flexibility and expandability. This system uses sensors to measure temperature, distance from the other car, presence of alcohol in car, position monitoring, theft monitoring and etc., and sends a warning signal to the driver if any of the parameter goes out of range to avoid accidents. In addition to this if accident occurs in any remote area then using vibration sensor, accident is detected and SMS is send immediately using GSM and preventing him from potentially getting into a serious problems.

11 Design for Test Ability in timely testing of VLSI circuits
S. Asvini, C.Nirmala

Abstract -Even though a circuit is designed error-free, manufactured circuits may not function correctly. Since the manufacturing process is not perfect, some defects such as short-circuits, open-circuits, open interconnections, pin shorts, etc., may be introduced. Points out that the cost of detecting a faulty component increases ten times at each step between prepackage component test and system warranty repair. It is important to identify a faulty component as early in the manufacturing process as possible. Therefore, testing has become a very important aspect of any VLSI manufacturing system. Two main issues related to test and security domains are scan-based attacks and misuse of JTAG interface. Design for testability presents effective and timely testing of VLSI circuits. The project is to test the circuits after design and then reduce the area, power, delay and security of misuse. BIST architecture is used to test the circuits effectively compared to scan based testing. In built-in self-test (BIST), on-chip circuitry is added to generate test vectors or analyze output responses or both. BIST is usually performed using pseudorandom pattern generators (PRPGs). Among the advantages of pseudorandom BIST are: (1) the low cost compared to testing from automatic test equipment (ATE). (2) The speed of the test, which is much faster than when it is applied from ATE. (3) The applicability of the test while the circuit is in the field and (4) the potential for high quality of test.

12 A Survey of Clustering and Classification on Security in Data Mining
Pradeep G, Arulprakash P, Kavitha G

Abstract-Data mining is the process that extracts classifies andanalyzes valid and useful information from large volumes of dataprovided by multiple sources. The data mining has been widelyapplied into various areas, one of which is to investigate potentialsecurity threats. In the literature, various data mining techniquessuch as classification and clustering have been proposed to detectintrusions, DoS attacks, and malware. This paper surveysdifferent data mining techniques applied to detect securitythreats and analyzes their advantages and disadvantages.Through comparison, we discuss open research issues aboutsecurity

13 Fuzzy Tree Structured Modeling Recommender system on Business E-Services

Abstract—In an existing proposals monitor information obtained at, recommender systems use background data, such as historical data consisting of ratings from users, and input data, such as features of items or user ratings, to initiate a recommendation. User preferences and item features have been represented as fuzzy sets. Recommendations are made with incomplete and uncertain information.

14 Drift Control in High Rise Buildings
Awad Ravindra B, Prof. M.R.Wakchaure, Awad Sushma

Abstract— Drift is a dominant feature in High-Rise building due to Lateral loads (i.e. wind or earthquake loads) are mainly responsible for drift, which very often dictates the selection of structural systems for high rise building. Now a day’s lot of research work is going on in static nonlinear pushover analysis. In present work, two multi storey buildings representing shear wall frame structure as a Model M1 and Column Beam frame Structure as a Model M2, both are fourteen storeys have been modeled using software package ETABS and SAP2000 for earthquake zone V in India. To study Drift demand based on analysis results and compared in this results in conditions that two parameters( i.e. wind and earthquake )satisfy for controlling Drift demand within an allowable level are discussed.

15 Real Time Monitoring For Drowsiness Detection Using EEG System

Abstract—Now a day’s driver drowsiness effect severe accidents. Normally many factors are there for detecting drowsiness such as analysis of physiological signals Electroencephalogram (EEG), Electrocardiogram (ECG) etc., Driver behavior monitoring. The reliable detection of drowsiness is an important factor in this system. An accurate Real time monitoring of driver’s drowsiness by warning system to driver, is implemented in this paper. Wireless and wearable EEG Dry electrode used for recording EEG signal. If a person mentally sleeping with eyes open for few seconds, then the level of brain signal will get change than the normal level. EEG is used to detect the abnormal conditions related to the electrical activities of the brain. Eye blinking level can be monitoring by eye blink sensor such as open or close status of eye. Object sensor used for detecting any obstacles are there, in front of the vehicle. Simulation result exposed in PROTEUS VSM Software using PIC microcontroller. The signal values are transmitted through ZigBee module. When implement, monitoring the bio-signals and driver performance like eyelid movement will increase the accuracy of drowsiness detection system. These methods are very sufficient for this drowsiness detection system.

16 Maximizing Network Lifetime using Energy-Efficient Methods with Modifiable Sensing varieties in Wireless Sensor Networks
Subashini.S, Praveen Kumar

Abstract—We cram the aim of exposure problem for wireless sensor networks where every sensor node is capable of regulating its sensing sort. Our aspire is to amplify the network lifetime by increasing the quantity of wrap sets as many as possible. A wrap set is a split of all sensor nodes that can wrap each intention node. As an alternative of maintenance of all the sensor nodes dynamic at once, network lifetime can be extended by generating a number of wrap sets that will examine the network sequentially. We extend two polynomial time algorithms that utilize an efficient contribution procedure on spherical lists of sensor nodes for structure a diversity of wrap sets. Our proposed algorithms locate greatest number of wrap sets and devour as low power as possible for each sensor node. Our simulation results exhibit that the future algorithms better existing MRSW [1] algorithm in terms of number of wrap sets while conserving major amount of energy among the sensor nodes.

17 Design and implementation of Circularly Polarized Square Loop- Antenna
Sanjay Kumar, S.Bashyam, E.Siva Kumar, Samar Jeet Shukla

Abstract-A circularly polarized (CP) square-loop antenna is designed and discussed. It is shown that improved return loss and voltage standing wave ratio (VSWR) can be achieved by adding a parasitic loop inside the original loop. The accepted value of return loss is less than -10dB and the range of voltage standing wave ratio are 1 to 2. Antenna is fed by a microstrip transmission line called microstrip line feed. Square – loop antenna are usually used as linearly polarized antennas. Square-loop antenna can also radiate a circularly polarized wave if a gap is introduced on the loop.

18 A Secure Scheme for Monitoring Safety in Vehicular Adhoc Network
Anitha.N, Banumehala.R, Chrislin Reni.V.S, Devika.M

Abstract— Vehicle ad-hoc networks has significantly used in automobiles for an effective communication with one another. The de-centralized nature of this network provides an extensive range of applications which makes passenger safety and comfort. Providing security in a physical environment is considered to be the main issue to cope with. Vehicle-to-vehicle communication is the wireless transmission of data between the vehicles. It is more efficient and it enables 360 degree awareness of the surrounding threats. To overcome this issue a popular approach is recommended in VANET, is that cars are connected together via V2V,which are able to share data with one another, so that there is, less possibility of collision and other mischievous behavior i.e. drunken drive. Although there are many proposed solutions for improving securities in VANET but security still remains a delicate research subject. The main objectives of this paper are to improve the security issues in VANET.

19 Confinement and the coordination for Acoustic Movable Submarine Networks
T.Jennifer, P.Sudhandhira Devi, Mary Joseph, M.B.Prasanth Yokesh

Abstract-Submarine confinement is a key element in most underwater communication application. Acoustic communication of movable submarine networks face with many unmatched inquisitive like long arch, high communication power consumption and convergence mobility. Unrushed signal enlargement allows multiple packets to coordinate travel through the submarine channel, which is harsh to improve the overall throughput. Since GPS signals are highly extremely thin in water, accurate ranging based techniques for localization has to be developed. Confinement algorithm and Sequential algorithm for time-coordination and localization in the underwater acoustic channel is made to resolve the problem. Relying on the assumption that nodes are equipped with self-navigation systems and that these systems are accurate for use in short periods of time.

20 Self-Defense for Fire Fighters using Automatic and Robust Multilateral Breadcrumb System

Abstract- This project describes the design, characteristics and implementation of an automatic and robust multiuser breadcrumb system for firefighter applications. A new reliability model that consists of an optimized redundancy degree for breadcrumbs, a decision support system for wireless link estimation, a height effect solver to handle the gap in link quality after breadcrumbs drop from the dispenser, and an adaptive transmission power control to handle link quality variation problems in harsh environments have been proposed.

21 An Efficient Comparator Architecture Based Franklin Majority Logic Technique
Saranya R, Thanga Selvi E

Abstract-A digital comparator or magnitude comparator is a hardware electronic device that takes two numbers. Comparators are used in the central processing units and microcontrollers. Quantum dot cellular automata referred to simply the high performance technology in digital circuits. In general Regular comparators are optimaized based on the majority gate process. This scheme designed to contraption in QCA the novel equations proved. The design difficulty of the comparators perceived is reported in terms of number of MGs and inverters need in the general designs. To use the Franklin logic in majority gate technique, thereby reduce the complexity level of the comparator. the Franklin majority logic technique is to reduce the gate pattern count in the majority gate. Franklin logic is to optimize the general Boolean equation of the majority gate logic. The QCA modules are designed using the Franklin majority logic architecture, Which is developed in VHDL language.

22 Literature Review on Case study of Business Process Reengineering
Ashok Jagtap, T Q Quazi

Abstract-The business Process reengineering is an tool to achieve dramatic output for any business. The main focus is to controlling of the process related with time, where time has been more important element to control the process. This paper has related to survey of a BPR tool used for dramatic changes in the business.

23 Wi-Fi Offloading Model for Increasing Per-User throughput using MAPR Protocol in Heterogeneous Networks
Thiyagarajan C, Balakrishnan G

Abstract-Now-a-days, internet services have become typical through which people can able to adore anytime and anywhere internet (broadband) wireless communication services. With the growth of smart phones, laptops and tablets, network traffic has exponentially increased. Offloading the network traffic through various other devices such as Wi-Fi access points have been conceived to be frequent remedy for this problem. Therefore, in this paper, we examine the Wi-Fi Access Points (Wi-Fi AP) deployment in a metropolitan network area for better offloading of Wi- Fi network traffic and proposed a protocol named Multi Access Point Routing (MAPR). MAPR increases the per user throughput and network coverage as well. In network simulation, we introduce offloading ratio, per user throughput, network coverage that our proposed algorithm can attain with multiple access points (APs). The simulation results show that our proposed MAPR protocol provides better performance when compared to other Existing protocol in terms of increased per user throughput and coverage.

24 Auditing Cloud Consistency
Nireka C, Saraswathi M

Abstract— Cloud storage services are used throughout worldwide. Cloud service provider (CSP) maintains data cloud on CaaS model; it maintains multiple replicas for each data on distributed servers. Here the drawback is that due to multiple replication technique it does not provide strong consistency. We use Consistency as a service (CaaS) model with large data cloud and multiple audit cloud. In audit cloud we propose two level auditing architecture with loosely synchronized clock. In this paper, we propose an algorithm to reduce the violations on the storage system. We finally propose a heuristic auditing strategy (HAS) technique to avoid from violations and staleness. Using real cloud deployment to verify the heuristic auditing strategy (HAS).

25 A New Hybrid PAPR Reduction Scheme Using Amplitude Clipping and PTS
Akshay Gupta, Dr. Sarita Singh Bhadauria

Abstract -OFDM technique is comprehensively assumed in varied modern way communication systems due to its high data rate transmission capability and toughness to the multipath blurring channel. One noteworthy detriment of the OFDM signal is towering PAPR. Huge diversity of magnitude of OFDM signal represents a major drawback for strengthening of signal in mobile communication systems. This paper reveals a hybrid PAPR lessening using PTS and amplitude clipping .This paper identifies a thought regarding lessening of PAPR as far as its CCDF.

26 Automated Number Plate Recognition System using MATLAB

Abstract—Number Plate Recognition finds a numerous application such as paid parking airport, railway station etc. By making the recognition automated, we can reduce man power, time & cost and also we can increase reliability and efficiency of the system. India we can easily develop an automated number plate recognition system for all weather conditions. It is intended to use segmentation algorithms for locating number plate and segment the character. It is intended to use pixel value projection & number plate calibration and optical character recognition as some of the tools to recognize number plate.

27 Virtualization of Applications and Automation of Services in Cloud Environment
Geetha.B.G, Tamil Iniyan.S, Raguram.T.J, Santhiya.S

Abstract—The use of cloud computing has been increased rapidly in modern technology. Cloud computing provides many major benefits in terms of low cost, virtualization of resource and accessibility of data. Ensuring the virtualization of resources is a major factor in the cloud environment, as users often store important information with cloud storage providers but these providers may be untrusted. Due to the lack of trustiness among the cloud provider we are going to build our own private cloud environment. In this cloud environment we virtualize the applications which are deployed in cloud server using Xen server. Due to large number of concurrent user of cloud environment which leads to failure in server. This failure is overcome by load balancing concept.

28 Metamaterial based Antenna for Performance Enhancement and Bandwidth Improvement for WLAN Application at 5.2 GHz Frequency
Hitesh Joshi, Vivek Bajpai, Umesh Barhadia

Abstract—Microstrip patch antennas are mostly known for their versatility in terms of possible geometries that makes them applicable for many different situations. The lightweight construction and the suitability for integration with microwave integrated circuits are two more of their numerous advantages. Patch antenna has a narrow bandwidth so it has a complexity in tunings, so there is a requirement to increase the bandwidth of patch antenna and increase directivity of antenna and reduces return loss by new proposed triangular cut I shaped antenna which work on 5.2GHz frequency. In This paper simple rectangular microstrip patch antenna with DNG metamaterial to enhance bandwidth 170.8 MHz at 5.2 GHz. Directivity of SRMPA is 7.17dbi and directivity of proposed antenna is 10.1dbi simple rectangular microstrip patch antenna which works on IEEE 802.11b and IEEE 802.11g standard applications. This antenna is mounted on rectangular patch with air gap to enhance bandwidth for WLAN applications. Simulations are completed utilizing 3D EM Simulator Computer Simulation Technology Microwave Studio (CST-MWS). MATLAB is used for the verification of Double Negative properties of the proposed DNG structure.

29 The Spectrum Handoff for Cognitive Radio Ad Hoc Networks
Yuvaraj.T , Sangeetha.K.K

Abstract—In cognitive radio networks (CRN) unlicensed users may observe heterogeneous spectrum availability. We consider unlicensed users are not aware of network topology, spectrum availability and time synchronization information. Thus, it is extremely challenging that broadcasts can be successfully conducted without knowing the spectrum availability information in advance. In addition, since broadcast collisions often lead to the waste of network resources, they should be efficiently mitigated in multi hop scenarios. QB2IC is proposed with the aim of having a high success rate and short broadcast delay.

30 Dynamic Key Generation and Prevent Link from Adversary in Wireless Communication

Abstract—Integrating information network into power system for vision of smart grid, but also introduces many security problems. The presence of adversary is detected by the intrusion detection system. The packets transmission is protected from it by breaking the link in the network. The smart meter and the control center are equipped with intrusion detection.

31 Cluster Based Routing Protocol in Heterogeneous Wireless Sensor Networks
G.V.M.Vasuki, M.RatnaVardhini, M.Aswini, K.Saranya, G.Pranathi

Abstract—Wireless Sensor Networks abide of hundreds of tiny, inexpensive, ability accountable sensor nodes. Acquisition is a arduous assignment in such ambiance mainly due to the different constraints the wireless sensor networks ache from. LEACH and PEGASIS assumes a akin administration of sensor nodes in the accustomed area. Leach’s Clustering advice algorithm will ends up by allotment added array affiliate nodes .This could accomplish array arch nodes a bound active out of energy. PEAGSIS reduces activity burning if compared to bleed but it will not advance the arrangement lifetime .To Achieve a bigger able arrangement by abbreviation activity burning and convalescent arrangement lifetime we proposed Clustering Based Acquisition Protocol. It is a LEACH based acquisition agreement advised for assiduity arrangement lifetime. In this Scheme, array based acquisition agreement based aloft the LEACH algorithm, balance activity of sensor nodes is advised to abstain asymmetric activity burning of the sensor bulge and to extend the all-embracing arrangement lifetime after achievement degradation. To access the lifetime of network, the proposed algorithm uses a anticipation function.

32 Enhancing Security and Privacy Protection in Information Brokering In Distributed Database
Saradha.S, Balakrishnan G

Abstract—Integrated databases are the collection of different kinds of databases; it allows several databases to work as a single article and allows applications to look at data in a more amalgamated way without having to duplicate it. Here the components/systems interact with each other in order to attain a common goal. In droopily coupled user's liability is to create and maintain the confederacy and there is no control enforced by the federated system and its administrators. The associations of these types of databases are done by Information Brokering Systems (IBSs) via a brokering overlay and the brokers have the responsibility to make course-plotting decisions to direct client queries to the requested data servers. The brokering overlay is the responsibility for global resource management and managing allocation of services. IBSs believe that brokers are trusted and to limit the control and access to host systems for the defense of transmitted data is done only in server-side. But privacy of data location and data consumer can still derived from metadata such as query and access control rules exchanged within the IBS, in this paper a PPIB emerge has been proposed to preserve privacy of several persons routing decision among a chosen set brokering servers in the IBS.

33 Privacy Protection in Personalized Web Search Using Exponential Ratio
Poornima S, Shunmugha vel V

Abstract—This paper presents a scalable way for users to repeatedly build rich user profiles. These profiles summarize a user’s welfare into a hierarchical organization according to specific welfare. Two parameters for specifying privacy requirements are designed to help the user to choose the comfortable and degree of detail of the profile in order that is exposed to the search engine. Experiments showed that the user profile improved search quality when compared to regular MSN rankings. More outstandingly, results verified our proposition that an important development on search quality can be achieved by only sharing some higher-level user profile information, which is potentially less responsive than detailed personal information.

34 Predictive Analytics of a Large Scale Model Using Computational Approach

Abstract—This work presents a new predictive analysis and suggests an automatic classification approach which uses a new statistical model to automatically predict the classification to the web log events. This method uses Apriori algorithm for generating frequent item sets, uses KNN clustering approach for clustering frequent item sets and implements SVM classification technique to automatically predict the web log events.

35 Variation of Static and Dynamic head at Different Discharge using Venturimeter
Saiful Islam, Mohd Kafeel

Abstract—In this study, tests were performed to determine the effects of Variation of Discharge on Static Head, Dynamic Head as well as total head at different diameter of Venturimeter. The results showed by Venturi meters validate Bernoulli’s Principle.

36 A New Mathematical Model for Finding the Mean IGF-I Concentrations in GHD Patients
Dinesh Kumar A, Vasuki M, Sanjoop Lal K, Pranav M K

Abstract—The purpose of the study was designed to evaluate the effect of GH replacement on bone mineralization in post pubertal GHD patients who had been treated with GH until final height. The purpose of this work was to evaluate, by using standard Brownian motion process with sojourn times, mean IGF-I concentrations in male and female GHD patients.

37 Examination Anxiety among school Students in Relation to their School Environment

Abstract—This study was conducted to evaluate examination anxiety among school students in relation to their school environment. The objectives of the study were to study the difference in examination anxiety of school students in relation to different dimensions of school environment & to study the relationship between examination anxiety and school environment. Descriptive survey method was used in this study to obtain pertinent and precise information. The sample of this study included 100 school students by using simple random sampling from the district of Hoshiarpur. The two standardized tools were used by the investigator to evaluate the examination anxiety among school students in relation to their school environment. For the purpose of drawing out the results the investigator used statistical techniques like t- test, mean and correlation. The conclusions of the study are there exists no significant difference in examination anxiety of school students receiving high and low creative stimulation, there exists significant difference in examination anxiety of school students receiving high cognitive encouragement and less cognitive encouragement, there exists no significant difference in examination anxiety of school students under high permissiveness and low permissiveness, there exists no significant difference in examination anxiety of school students receiving high acceptance and low acceptance, there exists no significant difference in examination anxiety of highly rejected students and students with low rejection, there exists no significant difference in examination anxiety of students under high control and low control, there exists no significant relationship between examination anxiety and school environment.

38 Design and development of Very High Secure Encryption (VHSE) method for secure Communication
Tulika pandey, Devyanshu rao

Abstract—To enhance the security of user Signal in the transmission, we present an adaptive and dynamic data encryption method to encrypt user signal in the devices itself. Firstly, the adopted signal encryption algorithm is not static and uniform. For each encryption, this algorithm is adaptively and dynamically works and develops encryption system. Basically the work proposed a new method which is greatly depends on the Digital Signal Processing and method adopted use if FIR filters to develop cipher signal, for secure signal communication it is requires the cipher the signal and generate ciphered signal with the help of key. The measurement of encryption can be done by Cipher observation of avalanche of output. The proposed VHSE method is an appropriate solution for highly secure with less hardware requirement and high throughput data transmission.

39 Underwater Image Enhancement using Image Dehazing Wavelength Compensation (IDWC) method
Soniya shrivastava, Devyanshu Rao

Abstract—Underwater environments generally cause colour cast or colour scatter while photography. Colour scatter is due to haze effects appearing when light reflected from thing which absorbed or may be scattered several times by particles of water. This cause lowers the visibility and less contrast of the image.

40 An efficient adaptive RNS filter design on high speed FPGA
Divyansh namdev, Rakesh Patel

Abstract—Over the past few years Digital Signal Processing has gained in popularity in the field of communication. The rise in the popularity of digital signal processing is due to the many advantages it possesses, such as high noise immunity, low cost, high speed, and flexibility. In recent times, many innovative methods are being developed to make communication devices as small and portable as possible. Hence efficient hardware implementation plays a key role in making communication devices more portable. FIR filters are the basic components used to manufacture communication devices. The hardware implementation of the RNS filter can be done using Look-Up-Table (LUT) in the block RAM's in FPGA's of the Xilinx Virtex FPGA's. The RAMs generated by the core generator are used for this purpose. The implementation was done on an example filter, to compare it with other implementations. The result of this thesis is a highly efficient hardware realization of the desired FIR filter. The implementations of the Digital FIR filter in Residue umber System. CLBs are the basic building block of the FPGA. Residue Number System implen1entation utilizes the block RAMs present around the FPGA chip, which are generally not used by the communication circuitry. The hardware savings is obtained by using Block RAMs to implement the filter instead of CLBs. Conventional methods of implementations are faster than Residue Number System implementation, but that is the trade-off to the savings in hardware.

41 Current Trends of Advanced Data Structures in Real Time
Manas Kumar Yogi, V.Arthi

Abstract— This paper presents four advanced data structures which are used in various applications for technological needs as well as for researching the time needed for efficient storage and retrieval of data. We discuss the data structures which are not primitive but use the principles of primitive data structures like trees. Our intention is to create awareness among data structures enthusiasts the indispensible advantages of such data structures like tries, treaps, bloom filters, ropes.

42 Original Article: Modified Lord’s Operation for Hydrocele: Comparative Analysis
Rajesh Narayan

Abstract—Idiopathic vaginal hydrocele is the most common type of hydrocele. Lord’s plication is indicated in small hydroceles. Jaboulay’s eversion of sac is indicated in large hydrocele with or without thick sac. Excision of sac is advocated for thickened sac. In this study plication was carried in 100 cases and comparative analyzed with 100 cases of control (eversion of sac+ excision of sac) Postoperative hematoma, Infection, fever and wound abscess were assessed. Plication, in comparison to eversion of sac and excision of sac, is the easier, simpler technique and takes smaller incision and lesser operating time is undertaken. The post-operative hematoma is mainly due to stripping of the hydrocele sac from the surrounding tissues which results in the generalized oozing. Modified Lord’s operation in which the surrounding tissues is not opened up eliminates the causation of post-operative hematoma.

43 A Novel Fuzzy Clustering Algorithm for Text Processing
B.Srikanth, M.Deepthi, K.Haripriya, S.B.S.S.Eeswari, B.Srilakshmi

Abstract—In comparison with hard clustering methods, in which a pattern belongs to a single cluster, fuzzy clustering algorithms allow patterns to belong to all clusters with differing degrees of membership. The objective of text summarization is to extant the most significant information in a shorter form of the original text while keeping its foremost content and assistances the user to rapidly understand huge volumes of information. Text summarization statements together the problem of choosing the most significant units of text and the problem of generating coherent summaries. This procedure is suggestively different from that of human based text summarization since human can seizure and relates deep connotations and themes of text documents while automation of such ability is very problematic to implement.

44 Area and speed efficient Floating point unit implementation on Hybrid FPGAs
Ankita Dixit, Atuliika Shukla, Ravi Mohan Sairam

Abstract—Proposed design an Area and Speed optimized FPU for modern computing of advance processors, as we aware that in most of the DSP (Digital Signal Processors) We have proposal to merge Mitchell & Wallace techniques for designing FM & FA sub-modules and to design top module of design hierarchy including coarse grain logic modules WB’s along with FA & FM. There top module is a 16 bit FPU module.

45 Improving Network Performance through RWA in Optical Networks
Priyadarshini R K, Arunachalam M

Abstract— In optical WDM networks, data streams are transmitted along with light paths for fast transmission. The light path must be routed through a path with minimum blocking probability at the same time the wavelength selection ought to be taken into account as it is a major issue in resource management. This paper deals with the study of various wavelength assignment strategies and analysis of their performance and blocking probability. Existing algorithms leads to increased blocking ratio due to unbalanced wavelength utilization concern. This letter also proposes a new algorithm to attain minimum blocking probability that maximizes the throughput.

46 A Classification Approach Of Meteorological Data For Detecting Severe Weather Patterns
N.Niharika, E.Poovammal

Abstract—The Early detection of possible occurrences of severe convective events would be useful in order to control, the environmental and socio- economic damages which are affected by natural calamities. However, the enormous volume of meteorological data available becomes difficult, for analysis by the meteorologists. An approach for the classification of meteorological data has been introduced which is based on the frequency of occurrence of the values of different variables provided by a weather forecast model by implementing Decision Tree Algorithm, KNN algorithm and SVM Algorithm and getting the relevant values for the same dataset for the mentioned three algorithms. It is possible to identify patterns that may be associated to severe convective activity. Hence, the information attributes are variables which results from the weather forecast model Eta, whereas the decision attribute is given by the density of occurrence of cloud-to-ground atmospheric electrical discharges which are usually referred to the level of detecting the activity.

47 Education of Tribal Children in India A case study
G.Anbuselvi, P.John Leeson,

Abstract—Tribes are the people with different way of living and community life. They are living in definite geographical area. They have their own culture, customs, religious belief etc which make them different from other tribal community. The literacy scenario of the Scheduled tribes in general is below the literacy rate of the general population of the country. As per 2001 census the literacy rate among tribal (47.10%) is found to be far below the over all literacy of the country (64.84%). This paper focuses the education of tribal children and the hurdles they faces.

48 VLSI Implementation of Modified Guided Filter for Edge Preservation
V.Monika, P.Prem Kumar

Abstract—Filtering is widely used in the image and video processing application for various technologies. Field Programmable Gate Array (FPGA) technology has become a viable target for the implementation of real time algorithms is suitable for the video image processing applications In this paper a explicit image filter called guided filter is proposed to remove the noise in images smoothing and sharpening of images .We proposed the systolic array architecture for modified guided filter. The guided filter is derived from the local linear model computing the filtered output by considering the content of guided image can be the input image or different image. The guided filter can be using as the edge preserving smoothing operator. Transfer the structure of filtering image to the filtering output enabling and filtering application like dehazing and guided feathering. Computer vision and computer graphics applications, include edgeaware smoothing, HDR compression, image matting. Avoid halo effect by using the weighted least square filter. FPGA can be used to implement any logical function that an ASIC could perform. VLSI Implementation for modified guided filter to achieve the high speed, low power consumption and reduce area.

49 Performance Evaluation of DSR Protocol in VANETs and MANETs Using NS2
Y.Sameera, V.Muralikrishna, S.Lakshmi, S.Sravani, M.Diwakar

Abstract—In this project we are analyzing a reactive protocol Dynamic Source Routing in VANETS as well as VANETS. Though a Vehicular Ad-hoc Network is a type of Mobile Ad-hoc Network that is used to provide communications between vehicles which are within the transmission range, using onboard units and also between fixed infrastructure and vehicles using road side units. Routing protocols differ in their functionality and does not give unique results in both the scenarios due to different traffic conditions. We are simulating three performance metrics using network simulator they are throughput and end-to-end delay. The differences between characteristics and architectures have been studied and using these results a comparative analysis can be made between VANETS and MANETS.

50 Wireless Sensor Networks to Transmit Data across Various Intermediaries
AJ.Gowtham kumar, V.Arun, A.Ragavan

Abstract—Secure data transmission is a critical issue for wireless sensor networks (WSNs). Clustering is an effective and practical way to enhance the system performance of WSNs. In this paper, we study a secure data transmission for cluster-based WSNs (Wireless sensor network), where the clusters are formed dynamically and periodically.

51 Threats and weakness in TCP/OBS networks & overcoming land attack
Ratna Praveen Almanda, M.Sampath kumar, S.Jhansi Rani

Abstract—Optical Internet has become a strong development and its commercial use is growing quickly. Due to clearness/open honesty and virtual sharing they provide transmission of data with ultra-fast data rate with the help of optical burst switching technology, which transmits data in the form of bursts. But it has some security problem. Like if, one of the OBS nodes in the optical network is damaged/is broken into, it causes the weakness. This purpose is to identify the weakness named as burst hijacking attack and provide prevention. TCP/OBS networks are networks for communication over internet in future and Optical Burst Switching (OBS) is providing solutions for this network. In these networks the data move is moved in the form of bursts. Even though OBS has an advantage of moving data with good speed, it suffers from security weaknesses. For bursty traffic, OBS is the best as it switches at the packet level effectively when compared with the other switching ways of doing things. We also try to discover the weakness in the TCP/OBS networks and their countermeasures for the same is dealt separately using the ns2 machine for test run and checking of the security limits/guidelines. Improving the internet traffic is always an important research issue in the field of network traffic classification, although different approaches are available for the traffic over heads during the network traffic, they are not best. In this paper we propose a muchimproved classification approach for internet traffic by carefully studying the behavior of the nodes for allowing or this connection of the incoming node by figuring out and calculating the probabilities of the factors with respect to the node.

52 Secure Key Generation Scheme Is Used For Data Transmission in DNA Cryptography

Abstract—Cryptography is the art of writing in secret code in such a way that no one can understand except the intended viewer. The information can be encoded in a DNA sequence and computed. DNA stores huge amount of information and perform immense parallel computation, DNA can process large number of problems in a fraction of second. Original plaintext is converted to American Standard Code for Information and placed in a 4 * 4 matrix. Matrix manipulation operation is performed in cycle. Left to right flipping operation is performed in the first step. Up to down flipping operation is performed in the second step of the manipulation cycle. An Exclusive OR operation is done with the resultant matrix and the initial key. Generated key is then Exclusive OR with the result of matrix manipulation to generate mini cipher. Base 4 conversions are done with the mini cipher text that forms the sequence of 0, 1, 2, 3. Reshaping operation is performed to modify the data sequence. DNA digital coding is done with reshaped data by replacing 0, 1, 2, 3 as DNA bases Adenine, Cytosine, Thymine, Guanine that gives the cipher text. DNA computing is very difficult to decode the data without precise knowledge of the key and gives high security layer.

53 Review on Singer Identification Technique Using ANN
Shruti, Bharti Chhabra

Abstract—sThe voice recognition system is most prominent technique of identification of human voice. This is used for security purposes. Recent research concentrates on developing systems that would be much more robust against variability in environment, speaker and language. The unique qualities of a singer’s voice make it relatively easy to identify a song of particular artist. The identity of a singer can be identified automatically using Automatic Singer Identification System. The acoustic features extracted from songs in a database of popular music. This paper focus on the basic concept of the feature extraction and classification in speech identification system. This paper also focuses on the previous research work done in the area of speech recognition and singer identification system.

54 Original Article: Composition of Urinary Calculi by X-Ray Diffraction
Rajesh Narayan

Abstract—Urinary calculi are an age-old anguish of the human race. Accurate knowledge of the qualitative and quantitative composition of the urinary calculi is vital for understanding their etiology and for development of prophylactic measures.

55 A Cluster Based Scalable and Efficient Group Key Management Scheme in Multicast Networks
Kiruthikaa K V, Sathis Kumar K

Abstract—Key management is the base for providing common security services such as data secrecy, authentication and integrity for group communication to work in dynamic network environments. A group key management supports protected communication between members of a secure group. The group membership may vary over time. A group key management ensures that only members of a secure group can gain access to group data and can authenticate group data. The proposed work identifies a scalable and an efficient key management scheme by the comparison of these key management schemes. This scheme provides the new research directions in group key management by making use of variable key lengths in order to reduce the computation cost and communication cost.

56 Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
M.Muthuraj, Mr.R.Mohankumar

Abstract—Identification approach to provide authentication and confidentiality in a broker-less and confidentiality are the main objective of any distributed system the pub/sub system. Our approach allows subscribers to maintain credentials according to their subscriptions. Private keys assigned to the subscribers are labeled with the credentials. A publisher associates each encrypted event with a set of credentials. We adapted identity-based encryption (IBE) mechanisms 1) to ensure that a particular subscriber can decrypt an event only if there is a match between the credentials associated with the event and the key; and 2) to allow subscribers to verify the authenticity of received events. 1) Extensions of the cryptographic methods to provide efficient routing of encrypted events by using the idea of searchable encryption, 2) “Multicredential routing” a new event dissemination strategy which strengthens the weak subscription confidentiality, and 3) a thorough analysis of different attacks on subscription confidentiality.

57 Analysis of Various Treatments of Obesity Using Fuzzy Vikor Method
A. Sahaya Sudha, M. Thenmozhi

Abstract—The aim of this paper is to control the obesity in different types of treatment. Obesity is a leading preventable cause of death worldwide, with increasing rates in adults and children. Dieting and Exercising are the main treatment for obesity. In this paper, the weights are assumed by using linguistic variables and then the fuzzy numbers are converted into crisp values, and finally the ranking order is determined by VIKOR METHOD.

58 A Neighbor Based Dynamic Estimate Rebroadcasting Approach for Efficient Routing In Mobile Adhoc Networks
P.Divya Bharathi, Mr.V.Shunmugavel

Abstract—Broadcasting in MANET is an effective mechanism for route discovery, but the routing overhead associated with the broadcasting can be quite large, especially in high dynamic networks. The proposed new dynamic estimate rebroadcasting algorithm is able to ensure a correct reception of transmitted information on dynamic links and to determine efficient routes to reach the desired destinations. In fact, to reach the challenge of responding to time and space variations of mobile environments, efficient powerful dynamic routing protocols must be designed with an aim of enhancing the overall system performance and reduce the time delay. The proposed routing protocol estimates the Route discovery along with Neighbor knowledge summarized with following benefits Minimum hop and delay to destination while broadcasting, 2) Fast adaptability to link changes, 3) dynamic routes selection based on distance, 4) Distributed operation, 5) Loop avoidance 6) Calculate the delay by random selection approach 7) Routing table calculation to avoid routing overhead.

59 A Novel Secure Mining of Association Rules with Subgroup Discovery in Vertically Distributed Databases
K.Kokilavani, V.Nandhini, V.Mohan Aravinth, T.Kalaikumaran

Abstract— We propose a protocol for secure mining of association rules in vertically distributed databases. The current protocol is that of Kantarcioglu and Clifton two protocols to be used. In Our protocols, are based on the Fast Distributed Mining (FDM) algorithm of Cheung et al. In order to improve the performance of the system, proposed the subgroup detection concept in this system. In this setting, all sites use the same set of attributes and the quality of every subgroup depends on all databases. The approach finds patterns in the union of the databases, without disclosing the local databases. To the best of our knowledge, this is the first secure approach that tackles any of the supervised descriptive rule discovery tasks. In proposed scenario we will do the vertical distributed database which is nothing but different columns of a table distributed to different sites.

60 Improving the Efficiency of Itemset Mining Using K-Means Clustering Techniques
N. Megala, R. Krishnakumari, N. Raj Kumar, S. Raja Ranganathan

Abstract—Sets of items that occur together is called itemsets. Discovering the high efficiency itemsets from a large set of data base refers to discovery of itemsets. The proposed work is to find frequently used items and infrequently used items from the large database. It is planned to identify strong rules discovered in databases using different measures of interestingness. Finding infrequent items are more interesting than finding frequent ones. The proposed system describes the complete process of identifying the frequently used and infrequently used products in an organization. K-means clustering algorithm is used efficiently to retrieve the frequent products and infrequent products from the large set of database. The knowledge database consists of huge data items. Mining the set of items is a challenging task. The key role in web mining is clustering and retrieving the most efficient itemsets.

61 Small Delay Testing and Characterization using Adaptive Frequency with AC-Plus Scan Method
Suganya P, Thanga Selvi E

Abstract—In this paper, we propose a new methodology called AC-plus scan method, to detect the Small Delay Defect. Small delay defects could cause a device to malfunction in the field due to escaping traditional delay testing. It is often necessary to detect. To solve this problem, the three test modes are proposed called ACplus scan. All-digital phase locked loop is used to generate test clock on the chip. AC-plus scan can be executed on an in-house wireless test platform called HOY system. The proposed AC-scan system to detect the small delay defects in a circuit. It used three modes to detect the SDD in circuit under test. First test mode provides a way to detect longest path delay; it could greatly reduce the test time by 81.8%. Second test mode is designed for volume production test and it could detect Small Delay Defect effectively. Third test mode is used to extract waveform structure of the circuit.

62 Rapid Prototyping of Wireless Augmentative & Alternative Communication System for Speech and Hearing Impaired Subjects
Asha Rani.N, Venkateshappa, Naveen H

Abstract—Helping the deaf and dumb to communicate has traditionally been the province of those whose interests lie in the fields of speech and hearing. However, the deaf and dumb have learned to substitute the medium of vision for the more difficult or impossible. Various degrees of deafness are recognized. Some authors prefer to use the term “hearing-impaired” rather than “deaf” to indicate that they are concerned with a wider class than the profoundly deaf. Deaf and dumb people have developed a complex and ingenious language of signs and finger-spelling, together with an ability to infer spoken words from lip movements. Engineers in the field of television and picture coding can therefore be of direct help to the deaf and dumb in enabling them to communicate at a distance. Here In this paper attention is given to the requirement of picture communication system which enables the deaf and dumb people to communicate over distances. Based on the combination of advanced RISC microprocessor (ARM), touch screen with graphical LCD module and text to speech converter is adopted herein.

63 A Detailed Review of Error Correction Codes for Reliable and Efficient Memory Chips against Multiple Cell Upset
Nisha C, Karthikeyan S

Abstract—This paper reviews the error correction techniques for the detection of MCUs (Multiple Cell Upset) in SRAM memory designs. Radiation particles can impact registers or memories generating soft errors. These errors can modify greater than one bit causing a MCU which consists of errors in registers or memory cells that are physically close. These MCUs produces adjacent bit errors which may affect a single word, Hamming codes are commonly used to protect memories or registers from soft errors. But, when multiple errors occur, a Hamming code will not detect them. The novel decimal matrix code (DMC) based on divide-symbol improves memory reliability with lower delay overhead. DMC is compared to well-known codes such as the existing Hamming, BCH, MC codes. Here DMC utilizes decimal algorithm to obtain the maximum error detection capability.

64 Automatic Control Access and Failure Detection for Irrigation Using WSN
M.Meena Sundari, S.M.Uma

Abstract—This project presents Automatic Control Access and Failure Detection for Irrigation Using WSN. In Controller, LCD display is used to view sensor data, connected to power system. After getting data from the sensor, the controller checks it with required soil moisture value, that amount of Water is automatically irrigated to the Field by using Smart Neural Network. Corresponding Feedback Message is send to registered mobile phone. Using Behavior Based Adaptive algorithm, if any damage in Sensor, Controller, Water Pump and Warning Message will automatically send to the User’s Mobile. If water is filled more than required level of soil moisture, water is automatically released from the Field by using Outlet Pump. In case of signal problem, message will deliver slowly User can remote accessing and controlling of the irrigation motor using Steepest Descent Algorithm of Response Surface Methodology for Automation and view the information in the system connection of internet in Home. Systems propose Remote Access of the motor and also access that irrigation process by system through internet of web interface.

65 Curriculum and Professional Development
Adnan Omar, Muhammed Miah, Emmanuel Nkabyo

Abstract—Information technologies (IT) are developing rapidly and industry leaders depend on the educational system for a qualified workforce. Educators have the responsibility of designing curricula and practical activities that prepare students for the corporate world. Understanding today’s work requirements as well as the effects of curriculum on student’s professional readiness is essential in achieving this goal. This research, based on survey analyses of work experiences of alumni and current industry data investigates how well the Computer Information Systems (CIS) program of a four year institution prepares its graduates for the requirements of the IT industry. More than one-third (36.7%) of the participants had positions related to managing information, and 3.3% were involved in software development, which has the highest job growth projection. From a list of technical skills, 6% of respondents were involved in cyber security which ranked highest, 88% in hiring priority of IT employers. The results serve as a baseline for improving student learning outcomes.

66 Social Network for Course Delivery: A Case Study On Facebook
Muhammed Miah, Adnan Omar

Abstract—The 21st century continues to usher in technological advances that change the nature of communication, socialization, and private versus public information. One such change is the prominence that social networking currently enjoy, especially among the younger generations. Social networking has been defined as online spaces where individuals present themselves, articulate their social networks, and establish or maintain connections with others. While there are numerous types and variations of social networking web sites, the most widely used is Facebook. Online social networking sites such as Facebook is extremely popular as indicated by the numbers of members and visits to the sites. It allows students to connect with users with similar interests, build and maintain relationships with friends, and feel more connected with their campus. The foremost criticisms of online social networking are that students may open themselves to public scrutiny of their online personas. This research is aimed at educators working with students within schools, colleges, universities; work based learning, and formal and informal learning settings. It looks at the way in which Facebook can be used as a tool to: support subject teaching across the curriculum, supports out of school hours learning, encourage informal social learning, enable easy communication between students, teachers and parents; and support the development of digital citizenship skills. This research aims to be practical and hands on. Innovative uses of Facebook as a course delivery media are studied. A Facebook page used to deliver course materials and students are surveyed to find out the effectiveness of using social network after they use that Facebook page for their courses. The survey results are analyzed and recommendations made to make is useful.

67 Power Optimization of Dual Voltage FPGA Using Body Biasing Method
B.sankar, Mr.C.N.Marimuthu

Abstract—Proposed method could be developed by using Dual Mode Logic Switches and Body Biasing with voltage FPGA method to reduce the furthermore power reduction ratio.

68 An Overview of Mobile Cloud Computing
Pratik Sheshrao Yawale

Abstract—A various applications based on mobile cloud computing have been developed and served to users, such as Google’s Gmail, Maps and Navigation systems for Mobile, Voice Search, and some applications on an Android platform, MobileMe from Apple, Live Mesh from Microsoft, and MotoBlur from Motorola.

69 Drowsy and Distracted Driver Alert System Using Neural Network
R.Pragadeeswari, R.Sugantha Lakshmi

Abstract—Drowsy Driving-a combination of sleepiness and driving has become a worldwide problem that leads to severe accidents. A real time non-intrusive method for detecting the drowsiness of driver has been described in this project. The system uses the webcam to capture the video images of the driver in order to detect the drowsiness. Computer vision and machine learning algorithms are used to monitor and detect whether the driver is drowsy or not. Visual feature like eye which characterizes the drowsiness of the driver is detected with the help of image processing techniques. In such a case when drowsy is detected, the warning signal is issued to alert the driver. A neural network based algorithm is used to determine the level of drowsiness by measuring the eye opening and closing and warns the driver accordingly.

70 Cluster Based Revocation Scheme to Improve QoS in Wireless Sensor Networks
M.Meena, R.Kumaran, S. Mathan Kumar, A.Jayanthi

Abstract—In general, QoS is the quality of service that a network offers to the user or application. From the network perspective, it has been measured as how to provide QoS constrained sensor data while optimally utilizing sensor resources. Providing QoS in networks is an important research area. In the existing system, to provide QoS constraints in data transfer, Efficient QoS aware Geographic Opportunistic Routing Protocol prioritizes the candidates in the path from source to destination with respect to energy, latency and time complexity. But it didn’t satisfy the delay constrained and also there is a data loss while transferring the data. To overcome this we proposed Cluster based Revocation scheme to detect and revoke the authority given to those nodes which loses the data because of energy loss by maintaining the list of accusing and accused nodes through Area Head invention. This significantly improves energy efficiency and latency.

71 Structural Monitoring and Fault Detection in Wind Turbine Using WSN
A.Noorul Rishwana Begum, J.Jegan

Abstract—Wind turbine has the monstrous potential to produce the renewable energy without reliance on any fossil fuel technology. In this paper practical monitoring system of wind turbine is proposed. Which is used to averts the unplanned downtime because of the component failure, used to avoid the unwanted accidents due to the inefficient monitoring of faulty mechanical parts in wind turbine, also used to detect the intrusion occurrence in wind turbine from that can prevent valuable asserts from theft. Flexible and less expansible Wi-MMS sensor is injected in to the turbine structure for conditional monitoring. GMM algorithm is used to find the faults in the mechanical parts of wind turbine. Modified genetic algorithm which is used to detects both the structural issues and intrusion occurrence in wind turbine. In this paper the sensed information by the sensors from turbines are processed efficiently from that structural issues, faulty parts and intrusion occurrence in wind turbine is identified. WSN technologies are used to provide information to practical monitoring system.

72 Monitoring of control system with PLC using Wireless sensor networks

Abstract—A main aim of proposed system is to monitor and control a PLC based system wirelessly for an industry with wired PLC, it can be achieved using GSM & Zigbee module. In some cases no person is required to do the process manually. Person can need only to send the reply about the process that is to be carried out and PLC will check the status of the SMS sent by person and take the action according to it. Status of field is sent to user by PLC via ZIGBEE module based on the input status of the sensors that are placed at the field an these simulation of this project will be carried out by using INTOUCH HMI. To verify the functionality and monitor the temperature and humidity sensor levels INTOUCH HMI symbol factory tool is used and these system designs is implemented in windows scripts with C language can be generated by using INTOUCH HMI. For implement this project I am going to use GSM SIM300 module, DVP 10SX PLC, Switches as a sensors, Motors as an output and RS485 to RS232 converter.

73 Detecting Malicious Node in Wireless Mesh Network Using EAMMNET Ack Technique
V.Kanimozhi, V.Meena, S.Rajasekar, S.Stewart Kirubakaran

Abstract—An AMMNET is a mesh-based infrastructure that ahead data for mobile clients. The mobile mesh node of an AMMNET is to follow the mesh clients in the application environment to guarantee connectivity for both intra and intergroup communications. In existing system network partitioning occurred and distributed client tracking algorithm is the solution to deal with forceful nature of client mobility. In AMMNET there is a possibility for malicious attack in the node so the technology called Enhanced Autonomous Mesh Network (EAMMNET) has been introduced using AODV algorithm and ACK scheme for increasing the throughput for all clients.

74 Image Denoising Using Fully Synchronized Adaptive Filter
S. Swathi, V.Magudeeswaran

Abstract—Interest in adaptive filters continues to grow as they begin to find real-time applications such as, echo cancellation, channel equalization, noise cancellation and many other adaptive signal processing applications. Adaptive filtering is one of the most precious areas in digital signal processing to remove background noise and distortion.. In this paper, a fully synchronized adaptive filter has been implemented for real time image denoising based on Register Transfer Level (RTL) and we are using kernel based processing, i.e. the processing of the entire filter window can be done at one pixel clock cycle. It is supported by arrangement of input data into groups. So that the interior clock of the design is a multiple pixel clock which have given in the targeted system. Finally, the performance of a fully synchronized adaptive filter is evaluated in terms of PSNR (Peak Signal to Noise Ratio) and MSE (Mean Square Error) and calculated the Area, Power, and Speed. The performance of Adaptive filter is better than the other filter and it improves the Image Quality and Speed.

75 Growth, Optical, Thermal and Mechanical Studies of L-lysine Doped Sodium Acid Phthalate Crystal
M. Lawrence, J. Felicita Vimala

Abstract—L-lysine doped sodium acid phthalate (SAP) is a semi organic crystal which was grown by slow evaporation method at room temperature using water as solvent. The grown crystal was subjected to various characterisation studies. The single crystal X-ray diffraction study shows the crystal belongs to orthorhombic system. The FTIR spectrum was taken to analyse the presence of functional groups qualitatively. The optical absorption spectrum reveals that the crystal has good transparency in the entire visible region. The TA/DTA curves show the thermal stability of the grown sample. The mechanical hardness of the material was measured by micro-hardness tester. The SHG efficiency of the grown crystal confirmed its NLO behaviour and photo electronic applications.

76 Survey on Fault Dependency Matrix Construction Using Ontology Based Text Mining
J.Jenifa, T.Balachander

Abstract—Fault dependency (D)-matrix is a systematic diagnostic model to capture the hierarchical system-level fault diagnostic information. It is constructed to find the dependency between the symptoms, failures and the faults in automobiles. In automotive domain, overwhelming volume of textual data is recorded in the form of repair verbatim collected during the fault diagnosis process. Here, the aim of knowledge discovery using text mining task is to discover the best-practice repair knowledge from millions of repair verbatim enabling accurate FD. However, the complexity of text mining problem is to identify and recover several types if noises. An ontology-based text mining system is proposed, which uses the diagnosis ontology for annotating key terms. The stemmed terms are extracted in different formats, which are used to identify the field anomalies. The extracted data are further used by the FP growth algorithm to cluster the repair verbatim data such that the best-practice repair actions used to fix commonly observed symptoms associated with the faulty parts can be discovered. Finally a matrix is constructed to analyze the faults by arranging the symptoms, faults and failures in rows and column.

77 Security based data transfer and privacy storage through watermark detection using DWT process
Gowtham.T, Pradeep Kumar.G

Abstract—Digital watermarking has been proposed as a technology to ensure copyright protection by embedding an imperceptible, yet detectable signal in visual multimedia content such as images or video. In every field key aspect is the security—Privacy is a critical issue when the data owners outsource data storage or processing to a third party computing service. Several attempts has been made for increasing the security related works and avoidance of data loss. Existing system had attained its solution up to its level where it can be further able to attain the parameter refinement. In this paper improvising factor been made on the successive compressive sensing reconstruction part and Peak Signal-to-Noise Ratio (PSNR).Another consideration factor is to increase (CS) rate through de-emphasize the effect of predictive variables that become uncorrelated with the measurement data which eliminates the need of (CS) reconstruction.

78 Evaluation of Fuzzy Performance Measures for Single and Multiple Working Vacations
K Julia Rose Mary, Francinaa C

Abstract—The main aim of this paper is to construct a membership function of a performance measure for a single working vacation and multiple working vacations queues when the inter-arrival time and service time are fuzzy numbers. The basic idea is to reduce queue into a family of crisp queues by applying the α-cut approach and Zadeh’s extension principle. A pair of parameteric program is formulated to describe the family of crisp queues, through which the membership function is derived.

79 Analysis of Hadoop Performance by Data Partioning Techniques
M.Dhivya, Mr. Balachander

Abstract—The existing hadoop environment faces few impinge like remote read, skew, process slow down and spoil time which are adverse effects of poor data splitting mechanism. Performance of hadoop environments is highly influenced by data partition technique. This paper analyses three data splitting mechanism that can be a measure of the entire above mentioned de scopes. Locality based data partition mechanism splits data from same node into same split such that remote read process slow down and spoil time can be given rid off. Skew based partition is exercised so that based on the histogram value data with same median value is put into same cluster so that data skew, computation skew, record skew can be eradicated. The third approach is round robin based partition in which partition is based on priority so that process slowdown is snuffed off.

80 Face Detection and Authentication Using Local Directional Number Pattern and Neural Network
R.Catherine kezia, D. Malathi

Abstract—Face detection and authentication is a challenging problem in computer vision and it is widely used in fields such as biometrics and human-computer interactions. In this paper, we have used a local directional number pattern and neural network to detect and recognize faces. A feature descriptor called the Local Directional Number Pattern (LDN) can also be used for face and expression recognition. The LDN is a gray scale texture pattern code which is assigned to each pixel of an input image. It represents the spatial structure of the texture and its intensity transitions. LDN uses directional information which is more stable against noise. In this method a compass mask has been used – Kirsch mask. It is used to extract the directional information for face and expression recognition. We have proposed a Forward Feature Selection (FFS) algorithm to extract the features from the face. Back propagation algorithm is used to train the neural network with extracted features.

81 Comparative Study to design and implement highly efficient 640x480 pixels based Image Compression Unit
Mr. Shubhdeep Bhatt, Dr. Vinod Kapse, Mr. Abhishek Gupta

Abstract—Image Compression Unit is a digital co-processor that compresses bmp or jpg images in form of jpg to jpg or bmp to jpg to jpg.JPEG Encoder plays a key role in digitized image compression unit, being used in many places such as for sending of multiple images through email, multiple-images disk storage etc. Among many parameters speed is the most prominent factor for JPEG Encoder being used recently. So it’s imperative to have a very high speed Encoder that can enhance efficiency of those modules which are truly dependent upon JPEG Encoder to perform image compression operations. After deep study and thorough analysis we have seen that speed of this unit can be enhanced by enhancing speed of buffer being used to store data. At algorithmic level Ping-Pong buffer provides much better result in comparison to other conventional buffer. Furthermore 2-D DCT provides much better results in comparison to other transformations such as F.T., D.W.T. with respect to speed. We also found that the 2-D DCT with Ping-Pong buffer provides better outcome. Then 2-D DCT with Ping-Pong buffer has been proposed for the JPEG Encoder unit design that is able to perform image compression operation at high speed.

82 A Review on CBIR Unit Implementation Using Combination of Local and Global Variables for Feature Extraction
Mr. Abhishek Gupta, Ms. Arpita

Abstract—In current scenario due to rapid growth of multimedia, internet and availability of large image archives has attracted to put efforts in providing a tool for efficient, effective and accurate search, retrieval and management of visual data using visual contents of the image data or information to segment, index and retrieve most relevant images from the image database. For this purpose a most common approach which is used called as Content-Based Image Retrieval (CBIR) systems. Main objective of these systems is to operate on image database and, in response to input visual queries, similar images get retrieved. Application potential of CBIR for fast and effective retrieval of images is enormous, expanding use of computer technology to a management tool. In this review paper after introducing CBIR method we have proposed a new approach to have more accurate and reliable outcome in form of retrieved images.

83 A Review on Designing and Implementation of Speed optimized Arithmetic Execution Unit for Digital Processors
Mr. Abhishek Gupta, Mr. Praveen Tiwari

Abstract—This proposed work is devoted to design high speed Arithmetic Execution Unit that would be able to perform not only arithmetic operations like addition, subtraction, and multiplication, square and square-root but also Multiplyaccumulate operations. As all of us know that MAC Unit is a digital co-processor which can performs multiply then accumulate operation. MAC Unit is the key element of digital signal processors to perform various sophisticated tasks like as FFT, DFT, resolving various complex equations and Convolution etc. along with this it is also used in various configurations like as IIR, FIR etc. Every digital domain based technology depends upon the operations performed by MAC Unit either partially or whole. Similarly Arithmetic unit (AU) is the heart of Central Processing Units (CPUs), to perform various general purpose operations. Speed is the most prominent factor of processor and controllers being used recently. To meet this major concern of “speed” we need particular high speed MAC and AU. That’s why it is highly required to design high speed MAC and AU, which can enhance the efficiency of those modules which lies upon the operations performed by MAC and AU. The speed of MAC and AU greatly depends upon the speed of multiplier. At algorithmic and structural level there are so many multiplication algorithms exist now-a-days. After a thorough study and proper analysis till date we have seen that Vedic multiplication technique is the best algorithm that gives much better result in comparison to others in terms of speed. Further we have analyzed different existing Vedic multiplication hardware, and compared those with respect to speed. And found that the Vedic multiplier with Carry Save Adder gives better outcome. We are still seeking for other methods which can provide the better result than this Vedic multiplier with Carry Save Adder. So our research work would mainly bias towards designing very high speed multiplication unit. On that basis we will deploy other modules of proposed Arithmetic Execution Unit, that is mainly combination of AU and MAC unit so that a single execution unit can work in all cases either it is digital signal processing or general purpose works in better way. This proposed Arithmetic Execution Unit would be able to perform different arithmetic operations at high speed. To design proposed arithmetic execution unit verilog hardware description language (HDL) will be used. For synthesis purpose Xilinx synthesis tool (XST) of Xilinx ISE-9.2i would be used. For the behavioral simulation purpose ISE simulator will get used.

84 A Review on Security in Cloud Using High Performance AES and OTP Approach
Ms. Anshita, Mr. Abhishek Gupta

Abstract—Now-a-days Cloud computing become requirement of each organization. As it provides a Virtual platform to consumers to acquire most tedious and complex software services on one by one basis, which in past required a high level of maintenance at customer’s end considered as SAAS (Software As A Service), that is one of the main service provided by cloud computing it has a feature of multi tenancy that virtually provides the services on one by one basis but physically all user utilize the services at same time. But also there is another face of coin which is related to the security concerns, which is decreasing the trust of organizations and individual customers to avail benefits of Cloud Computing. Many organizations may still be hesitant to introduce SaaS mainly because of the trust and security concerns, they may observe more risks than benefits in introducing this service. As if any software is being used then data must be shared by consumer in many cases either in the form of storage or communication. This data can be a very sensitive in nature. Hence it’s imperative to work upon security concerns of this. In this proposal work we have discussed about security constraints to enhance the security in SAAS layer using OTP and AES for communication and security prospects respectively, which can help to regain more trust of individuals and organizations.

85 A Review on Information Security in Cloud Computing
Mr. Abhishek Gupta, Ms. Unnati

Abstract—Cloud computing is a platform through which information can be placed and accessed from anywhere remotely, and this provides a more flexibility than any-other traditional database. Apart from that cost cutting is also an advantageous part as it’s not required to spend capital to maintain and update infrastructure. But information security is the main threat for cloud service consumers as they don’t know where their data has been placed in cloud, only because of that most of the enterprenurers and organizations doesn’t prefer to use cloud to place their sensitive information. So it’s imperative to maintain proper security concerns co-related to information, to regain trust of potential customers. In this paper work we have discussed about information security and then proposed a new approach to increase level of information security.

86 A Review on Design and Implementation of Speed efficient Advanced Encryption Standard using Ancient Vedic Multiplication Technique
Mr. Abhishek Gupta, Ms. Aakanksha Namdeo

Abstract—This research work is devoted to design high speed Advanced Encryption Standard. AES is a digital algorithm based device which ultimately provides secure transactions in banking and co-related areas, where ever secured transactions are required. Nowadays, as majority of secure transactions occurs on smart phones and other handheld devices, it’s imperative to have an algorithm that consumes less area and that without compromising with overall performance. At algorithmic and structural level there are so many techniques persists, but after a thorough study work we have analyzed that AES is one of the best algorithm. Apart from that we have seen that Vedic multiplier with CSA gives much better result in comparison to other conventional multipliers and so that we have proposed to use this Vedic multiplier with CSA to enhance the AES speed further.

87 A Review on Security in data storage for IaaS Layer in Cloud
Mr. Abhishek Gupta, Ms. Rachna Raghuwanshi

Abstract—Cloud computing is a platform that provides a very convenient way for on-demand network access to a shared pool of configurable computing resources that can be rapidly deployed with minimal management overhead and great efficiency. But issue with cloud that, it’s an insecure computing platform from the perspective of the cloud consumers, for which the system must design mechanisms which not only protect sensitive information using encrypted data based on enabling computations, but also protect consumers from malicious behaviours via enabling the validation of the computation result. That’s why we are working towards designing of these aspects to have better security in data storage of cloud.

88 A Review on Designing and Implementation of High Performance Automated System for Tumor Detection
Mr. Abhishek Gupta, Ms. Priyanka Jain

Abstract—Tumor is an uncontrolled growth of tissues in any part of body. Different types of tumors have different Characteristics treated differently accordingly. Out of different types of tumors, brain tumor is inherently serious and life-threatening because of its character in the limited space of the intracranial cavity (space formed inside the skull). After a deep study and analysis we have found that in most of developed countries the number of people who have brain tumors were died due to the fact of inaccurate detection of brain tumor. MRI or CT scan that is directed into intracranial cavity produces a complete image of brain that is visually examined by physicians for detection & diagnosis of brain tumor. But this detection method resists the accurate determination of stage & size of tumor. To avoid that, it’s imperative to have computer aided methods for segmentation (detection) of brain tumor. In this review paper we have discussed current issues being faced for brain tumor’s size and dimension. During our research we will work in this area to enhance the accuracy of malignant tumor detection.

89 A Review on Design and Implementation of Highly Energy Efficient Protocol for Wireless Sensor Networks
Mr. Abhishek Gupta, Ms. Deepali Sahu

Abstract—Wireless network contains of a large number of nodes and consecutive links to connect them so that whenever a data packet is being transmitted from one node to another node it goes through multiple links/paths. Furthermore WSN generally consists of a huge amount of distributed nodes which organizes them in form of a multi-hop wireless network. Among many problems that persists in WSN, out of them a major concern is co-related with energy as every node is operated by battery. As each Node composed of small battery so the energy associated with this node is very less. To have large network life time every node need to minimize their energy consumption that’s why replacing and refilling of battery is very costly and cumbersome in nature. So it’s imperative to work upon some techniques and algorithms through which the energy associated with each node can be conserved. This work of energy conservation work can be performed by proper control of transmission power of every node. In this proposal work based review paper first we have introduced about wireless sensor networks and then showcased our proposal work to implement a protocol to enhance the performance of the protocol in sensor network.

90 A Review on Design and Implementation of Energy efficient Virtual Machine Management in Cloud Computing Environment
Mr. Abhishek Gupta, Ms. Anamika

Abstract—This research work is devoted to provide energy efficient Virtualization Machine Management in the Cloud Computing Environment. As all of us know that Cloud Computing is a platform which ultimately provides a place where any enterprenurers or organization can place their data, software and other things virtually using updated infra provided by cloud service provider. In which Virtualization Machine Management is the key element of Cloud Computing, which is used by many enterprenurers or organization, to manage those virtual machines which is being used to perform above maintained operation. Energy/Power is the most prominent factor of this Virtualization Machine Management being used recently. To meet this major concern of “Energy/Power” we need particular energy efficient Energy/Power efficient Virtualization Machine Management algorithms. That’s why it is highly required to design Energy/Power efficient Virtualization Machine Management algorithms, which can enhance the efficiency of cloud servers being used to manage hosted applications. Now-a-days at algorithmic and structural level there are so many algorithms exists, which we will study during our research work and after implementing those algorithms we will further analyze that which algorithm provides better outcomes at practical grounds and then we will investigate that what can be done to further enhancing efficiency of that algorithm. To implement algorithms for analysis we will use the Cloud hypervisor.

91 Improved 2ACK Scheme Using Credit-Based Approach
V.Vijayalakshmi, T.Vigneshwaran, J. Anandaraj

Abstract—A MANET (Mobile Adhoc Network) could be an assortment of individual mobile nodes that communicate with one another via wireless link. In some cases the node that refuses to share its resources with the opposite for its own advantages square measure referred to as self-loving or misbehaving nodes. Attributable to these nodes in MANETS performance of the network gets affected like scarcely accessible batter-based energy and node misbehaviors might exist. In this paper we tend to use improved 2ACK theme is employed to spot these misbehaving nodes in MANETS. It sends two-hop acknowledgement packets in opposite aspect of the routing path. Here we'll be victimization the AODV (Ad Hoc On-Distance Vector Routing) protocol. The projected improved 2ACK theme conjointly reduces the overhead of ACK’s caused by 2ACK theme (older version).Analytical and simulation results square measure conferred to judge the performance of the projected theme.

92 Prevention and Seriousness Estimation of Automotive Accidents
T.Yazhmozhi, Mrs.K.Abhirami

Abstract—Latest communication technologies are incorporated into modern vehicles that provides a chance for the salvage of people, who are wounded in the traffic accidents. To develop the overall rescue process, a fast and exact estimation of the severity of the accidents is essential. This is a key point to help emergency services for better estimate the required resources. Our proposed system uses a novel intelligent system, which is able to automatically discover road accidents, alert them through GSM modem, and also has the prevention mechanism to manage the speed of the vehicle in accident situation. If suppose any accident occurs then the SMS alert will be send to the police control room. Accident severity is estimated based on the concept of data mining and knowledge inference. Our system considers the most related variables that includes the vehicle speed, the type of vehicles involved, the impact speed, and the status of the airbag that can characterize the severity of the accidents. As a result, a complete Knowledge Discovery in Databases (KDD) process, with a sufficient selection of applicable features, that permits generating estimation models, which is used to predict the severity of new accidents.

93 Performance Analysis of Real Data Communication System Using Digital Modulation Schemes through Wimax Physical Layer over AWGN Channel
Aastha Hajari, Devesh Kishore, Prof Pratibha Nagich

Abstract—This paper investigates several modulation techniques for WiMAX based OFDM system including BPSK, QPSK, 8PSK and various levels of QAMs. The system performance is gained by dynamically choosing the modulation technique based on the channel conditions. The performance of OFDM system is accessed by using computer simulations performed using MATLAB r2012a

94 A Review of Vision Based Fire Detection Techniques
Supriya Bhargava, Anand Vardhan Bhalla, Rajendra Patel

Abstract—In this paper a survey of various fire detection methods based on image processing is highlighted. Till today several methods have been developed to detect fire. Traditional methods use the chemical properties of fire like Heat, temperature, Smoke to generate the output based on the decision made. This sensor based fire detection method has many drawbacks which hinders the fire detection at earlier stages. With the development in the field of image processing various methods making use of visual properties of fire for fire detection have been developed. These image processing methods has proved to be much more efficient in fire detection at earlier stages, due to which they had replaced the traditional methods of fire detection at most of the places.

95 Rain Streaks Detection and Removal from Color - Image Video Using Multi-Set Feature
B. Anandhalakshmi, G. Mathurambigai

Abstract—Rain streaks detection and removal from color image-video is a challenging problem. The rain streak removal is considered as image denoising task. The dictionary learning can be also used for removal of rain streaks for the succeeding frames in the clip, which is useful to both reduce the computational complexity and maintain the temporal consistency of the video. The proposed Color image-video based rain streaks removal framework based on the sparse representation. Then the high frequency part was decomposed into rain and non-rain component by using the learning sparse representation based dictionaries. To separate a rain streaks from high frequency part using the muti set feature.The multi set feature, including HOG (Histogram Oriented Gradients), DOF (Depth of Field), and eigen color. The high frequency part and muti set features is applied to remove the most rain streaks. The DOF feature is used to help to identify the main subjects to preserve in a rain image. The rain streaks are usually neutral color, where the eigen color feature is used to analyse the key features of the rain streaks. The both DOF and Eigen color features are used to identify and separate the non-rain component from the misidentified rain component of an image. Rain removal is a very useful and important technique in applications such as security surveillance, audio/video editing and investigations.

96 Segmenting Color Images Using FIDTRS FCM
Ms.M.Monica, Mrs.G.Mathurambigai

Abstract—Segmentation divides digital image into multiple regions in order to analyze the image and also used to differentiate different objects in an image. A new approach for color image segmentation is developed by combining Fuzzy interval decision theoretic roughest model with fuzzy C means algorithm. The FCM algorithm has the limitation that it requires the initialization of cluster centroids and the number of clusters. In order to have good segmentation results the pre-segmentation technique is necessary so adopt the Turbopixel algorithm to split the color image into many small regions called super pixels. Based on color image color histogram feature extraction use Bhattacharyya coefficient to measure the similarity between super pixels, which is in preparation for clustering validity analysis. It is the main focus that to obtain cluster centroids and the number of clusters. The approach is according to the hierarchical clustering validity analysis algorithm using FIDTRS model. The FCM algorithm is utilized to achieve the result of color image segmentation.

97 Identification of Malware Nodes in Heterogeneous Network Using EAACK
Sasikala V,Aghila R

Abstract—Mobile Ad hoc Network (MANET) is a collection of mobile nodes equipped with both wireless transmitter and receiver that communicates with each other via bidirectional wireless links either directly or indirectly. As malware attacks becomes more frequently in mobile networks, deploying an efficient defense system to protect against infection and recover the infected nodes from spreading and outbreaks. The technical challenges are mobile devices are heterogeneous in terms of operating system; the malware infects the targeted system. This work is aimed to investigate the problem of how optimally distribute the content-based signatures of malware, which helps to detect the corresponding malware and disables further propagation, to minimize the number of infected nodes. The Proposed scheme uses an Encounter based distributed algorithm that achieves optimal solution and performs efficiently in realistic environments.

98 Sleep scheduling algorithm in energy efficient routing scheme with improvement in performance for wireless ad hoc networks
S. Linksha Veni, R. Karthick, K.Nivash, A.Chandrasekar

Abstract—A wireless mobile ad hoc network (MANET) is a decentralized type of wireless network. A mobile ad hoc network is structure-less network of mobile devices connected without wires. MANET’s are power repressed since nodes operate with inadequate battery energy. Thus, energy utilization is crucial in the design of new ad hoc routing protocol. A promising routing scheme called Sleep scheduling is used in mobile networks, in which nodes are sleep scheduled to trim down energy consumption of nodes, which results in the prolonged lifetime of the network. In this paper, we focus on sleep scheduling for geographic routing in wireless mobile networks and propose two geographicdistance- based connected-k neighbourhood (GCKN) sleep scheduling algorithms.

99 A survey on alert based link error reduction and malicious packet dropping reduction in Wireless Ad Hoc Network
K.Pavithra, A.C.Manikandan, T.Maragatham

Abstract—Multi-hop wireless networks forwards the packet to the destination from the source which causes the two severe problems likely malicious packet drop and link error. In many cases the malicious packet drop are part of route that is comparable to the channel error rate. The impacts of lost packets are more due to malicious drop than the link error, algorithms that based on packet loss rate detection are not satisfactory. The correlation between lost packets is identified to improve the detection. The Existing system it mainly focuses on High malicious packet dropping and the number of dropped packets is higher than that of link error, but impact of link error are not negligible. In this paper we propose an algorithm for detection of selective packet drop by insider attackers that provide a truthful and publicly verify decision statistic to support detection decision and uses homomorphic linear authenticator (HLA) cryptographic scheme that provides the privacy for the publicauditing problem. Also it uses LEACH for the reduction of the power consumption in the clusters in multi-hop wireless network.

100 User Clustering and Item Clustering using Collaborative Filtering Recommendation Algorithm
Sindhuja.I, P.Karthick, Rajini Girinath.D

Abstract—Personalized recommendation systems are able to assist cluster to discover exciting videos and they are universally employed with the upgrade of electronic business. Many recommendation systems utilize the collaborative filtering technology, which has been established to be one of the majority responsibility well techniques in recommender systems in recent years. With the regular increase of clients and products in electronic business systems, the time consuming nearby neighbor collaborative filtering explore of the target customer in the total customer space resulted in the not a success of ensuring the real time requirement of recommender system. At the same time, it suffers from its broke quality when the amount of the records in the user record increases. Inadequate of basis data set is the most important reason causing the broke quality. To solve the problems of scalability and inadequacy in the collaborative filtering, this paper recommend a personalized recommendation approach joins the user clustering technology and item clustering technology. Users are clustered support on users’ ratings on items, and each users cluster has a cluster interior. Based on the similarity between target user and cluster centers, the nearest neighbors of intention user can be found and smooth the calculation where necessary. Then, the proposed approach exploits the item clustering collaborative filtering to generate the recommendations. The recommendation combining user clustering and item clustering collaborative filtering is more scalable and more exact than the established one.

101 A Survey on Source Location Privacy in Wireless Sensor Networks
V. Gobinath, K. Bergin Shyni

Abstract—A wireless Sensor Network (WSN) consists of a large number of sensor nodes mostly deployed in places where monitoring the objects. In such cases the adversaries has to be locate the monitoring objects by using traffic information. In this paper, the various source location privacy preserving schemes in Wireless Sensor Networks are discussed.

102 Low Power Test Pattern Generator Using LT-LFSR for High Fault Coverage Based on BIST Architecture
G.Jayapoornima, Mrs.N.A.Pappathi, R.Indhumathi

Abstract—This BIST scheme which is based on LT-LFSR based TPG is proposed. Now a day there is a dramatic increase in scale of integration. To avoid this, use a Built-In Self-Test (BIST) technique to provide an attractive solution to test the VLSI circuits and systems .BIST allows at speed testing and eliminates the necessity of high bandwidth test interaction. Other benefits of BIST include reduced cost effective system maintenance and product development cycle.

103 Diverse Adaptations of Hybrid Algorithm for Optimization
M. Nandhini

Abstract—Most of the real-life applications have many constraints to optimize the allocation of different resources. They are considered as constrained optimization problems (COPs). Due to the toughness of these problems, improving the quality of solutions with an approach is finding difficult. To overcome these and for balancing the diverse and intensive nature of solution space while finding solutions, hybridization of any two optimization approaches is done and is applied for the various domain of computer science such as data mining, operating system and networking etc. In this work, the necessity for hybridization along with three different versions in the adaptations of hybridizations in the recent past are surveyed and discussed.

104 Effect of different packaging material and storage duration on postharvest life of tuberose (Polianthes tuberose L.) cv. Kalyani Double
Pragnyashree Mishra

Abstract—Packaging plays an important role in extending freshness, value addition and reducing damage. This investigation was carried out at NDUAT, Faizabad. After harvesting spikes are made bundles wrapped in six different wrapping materials and stored at 100C for 0 hour, 24 hrs and 48 hrs. After storage the spikes were kept in distilled water for vase life studies. Here three parameters such as days required for 50% floret opening, wilting of lowest floret and vase life are taken. Vase life was recorded when 50% florets got wilted. Maximum days to opening of 50% florets was noticed in W1S0 (4.66 days) and minimum days to opening of 50% florets followed by W6S0 (3.52 days). No significant variation in number of days to wilting of lowest floret was recorded among different treatments. , maximum days to wilting of lowest floret (4.34 days) was found in spikes wrapped with polypropylene 200 gauge and stored at 100C for 48 hours (W4S2). Maximum vase life of 8.52 days was recorded in spikes packed with polypropylene 200 gauge and stored at 100C for 48 hours (W4S2) while minimum vase life (6.34 days) was noticed in news paper wrapping and storage for 24 hours at 100C (W6S1).

105 Securing Cloud Using Fingerprint with Improved Performance
M.Bahyalakshmi, S.Malarvizhi, R.Lathapriya, R.Mary Emaglet

Abstract—Cloud computing has the ultimate use of sharing the resources with the help of internet. It concerns mainly with the QOS (Quality of Service) and reliability issues. In this paper, Fingerprint biometrics is integrated with cloud to secure the data transferred or stored in the cloud. The proposed system of security has improved performance over the existing techniques. The fingerprint of an individual is processed to extract its features and is matched with the input fingerprint which is checked for authentication. In a proposed system the combination of cross correlation and minutiae extraction algorithm is used.

106 Rapid Wall Technology: An Initial Step to the Sustainable Development
Ramesh Kapse, Hemant Salunke, Upendra Saharkar

Abstract—Erection of precast construction unit is a composite motorized operation for the uninterrupted forum of building &induction of prefabricated elements and factors. Precast construction has many advantages over the conventional practice by costing pre definite size of the members in the factory. In this technique structural members specially made of concrete that has been cast into form prior being transported to its construction location for final installation work. It satisfies demand of sustainable housing for the population in the arising country. Construction processes will be faster by adopting this technology which provides high quality. This paper states the different kinds of precast construction system, its main characteristics, instruments required for the construction work and its installation process for different type of parts.

107 An Advanced Approach for Improving Performance in Big Data Applications Using Cache
Blessy Trencia Lincy.S.S., Mrs.Varalakshmi.K.

Abstract—Big Data is the huge volume of data that cannot be processed by the traditional data management systems. Hadoop is a technological solution for big data. Many big data applications generate a large amount of intermediate data and these information is thrown away after the completion of the processing. Thus a cache framework can be used for big data applications where the tasks submit their intermediate results to the cache and cache partition is made and accordingly the results stored here can be effectively used. The secondary cache plays a vital role in the concept related to eviction policies. By using this approach the duplicate computations can be avoided and the overall computation time of the MapReduce jobs can be greatly decreased, improving the performance of the operation done.

108 Multi-View and Multi-Posture Human Recognition for Video Surveillance Framework
Chairmakani.C, J.P Ananth

Abstract—Video Surveillance has been used in many applications including elderly care, Offices, Shopping malls, Showrooms and dwelling nursing etc. This manuscript intends to develop an intellectual video surveillance system to enable remote monitoring of real time scenarios. This system introduces intelligent analysis of single person activity to enhance the security system in shopping malls, showrooms, offices, home and also enriches the current video surveillance systems through an automatic identification of abnormal behaviour of the person. The relevant data is recorded and alert is given to the user by calling PHONE Calls of the owner as well as nearest police station and also sending message or mail to the owner. The customer can view the particular video. This organization maintains the sanctuary situation at bureau, retail area, home and this reduces the incidence of burglary cases and enhances social stability.

109 Performance Analysis of XCP over Heterogeneous Network
Esha Sharma, A Jeyasekar

Abstract—TCP is basically designed for wired network. Hence it needs to change when it is used over wireless network i.e. heterogeneous network. In heterogeneous network packet loss happens for two main reason i.e. network congestion and wireless link error. Thus distinguishing them becomes a very important factor. If the packet loss is due to the congestion it can determined by probability method and threshold based method. Here we use congestion probability method. In this method Congestion Experienced (CE) bit sent by the intermediate node is used for predicting the congestion. Congestion based probability method is used by TCP variants in heterogeneous network. But eXplicit Congestion Control Protocol (XCP) is providing better performance than TCP variants in heterogeneous network. In this project we try to implement probability based method in XCP to predict the congestion in heterogeneous network.

110 Silent Sound Technology-Speech Interaction
Ms Hrituja D. Gujar, Prof.V.N.Dhage

Abstract—In this world there is lots of technology that are tries to reduce the noise pollution and make the environment better to live in. But whenever we are talking on a cell phone in a crowd, then we are yelling because of lots of disturbance and noise around us and you will not talk properly. Now there is no need to squall to forward your message and wasting our energy anymore. [1] For this purpose a new technology known as the “Silent Sound Technology” has been developed that will put an end to the noise pollution. The Silent sound technology is a completely new technology which can prove to be a perfect solution for those who have lost their voice but wish to speak on mobile When this technology is used, it decipher your every lip movement and internally converts the electrical pulses into sounds signals by neglecting surrounding noise and send it to another side. This technology allow people to make silent calls without disturbing others, thus now due to this technology we can speak anything with our friends or family in private without anyone eavesdropping and at the other end, the listener can hear a clear voice.[1] Silent Sound technology aims to detect every movement of the lips and convert them into sounds, which could help people who lose voices to speak. [1] Such technology is very useful when you are in important meeting and you got an urgent call or you are in public area and want to talk some confidential things but there is no lip reader. Silent sound technology comes forward by using Electromyography (EMG) and Ultrasound SSI methods. This technology works with 99% efficiency, and will be seen in the market in another 5-10 years and once launched it will have a drastic effect and with no doubt it will be widely used.

111 Web Facial Images for Search Based Face Annotation and Facial Gesture Detection
B. Indumathy, G. Mathurambigai

Abstract—In this popular World, High Mega pixel cameras and the development of tools in media for internet-based photo sharing have witnessed an explosion of the vast number of digitalized photos which are clicked and stored by consumers. A Huge part of photos shared by users in the web are human images mainly their faces. Many of these images were tagged with names, but some of this were not tagged properly.

112 Arranging a Communal of MapReduce Jobs for Minimizing Their Makespan
S Jasmine, S Pandiaraj

Abstract—The main aim of this paper is to increase the utilization of MapReduce clusters to minimize their cost. Cloud computing offers option for business to rent MapReduce cluster in a suitable size, consume resources as a service, etc. and pay only for that particular resources which they have used. A separate analysis for evaluating performance benefits can be done on a set of MapReduce jobs that are executed periodically on fresh data's. We observe that the order in which these jobs are executed can have a significant impact on their overall completion time as well as cluster resource utilization. Our objective is to automate the design of a job schedule that minimizes the completion time on such a set of MapReduce jobs. We introduce a simple technique where each MapReduce jobs are represented as a pair of map and reduce stage durations.

113 Low Power Critical Path Delay Design Using Reversible Logic Gates
V.Kavitha, R.Yamini, S.Sarmila, Anila Ramachandran

Abstract—It has been proposed to design data path with low area. The basic gates such as AND, OR, and EXOR are not reversible. This paper presents various designs of reversible logic gates used for reversible operation & the applications as carry bypass and select adder Block. These gates are then used to design four bit Carry bypass and select Adder blocks. Toffoli gate is much better in terms of low power dissipation.

114 Sustaining Privacy Protection in Personalized Web Search with Temporal Behavior
Dinesh.R, Deepa.M, Naveen.R, Naveenkumar.M

Abstract—The web search engine has long become the most important portal for ordinary people looking for useful information on the web. Users might experience failure when search engines return irrelevant results that do not meet their real intensions. Such irrelevance is largely due to the enormous variety of users’ contexts and backgrounds, as well as the vagueness of texts. Personalized web search (PWS) is a general category of search techniques aiming at providing better search results, which are constructed for individual user needs. User has to collect the information and analyzed to figure out the user intension behind the issued query. Model user preferences as hierarchical user profiles.

115 Power Loss Minimization Using PSO & VPSO of A Transmission Line after Placing TCSC
Neha Jain, Aarti Bhandarkar

Abstract—In this paper PSO-based optimal power flow is proposed on IEEE 30-Bus system. First we have taken IEEE 30 Bus, optimized it by TCSC and checked Voltage Profile, and then PSO is implemented on it for minimized active power. Finally Vectorized PSO (VPSO) is applied for further improvement. PSO based optimization has been done after, optimally placing TCSC. A 30-bus power system was considered as a test case for benchmarking. For Further implementation test data is used with both the algorithms PSO and VPSO. Results shows 0.9 % improvement with PSO (70 Iterations) and 0.8 % improvement with VPSO (40 Iterations) in active power losses, hence overall improvement is 1.7 % reduction in losses.

116 MSK using OQPSK Implementation of IEEE 802.15.4 ZigBee for Throughput Calculation
Deepti Yadav, Pankaj Sahu

Abstract—ZigBee technology was developed for special wireless networks where Bluetooth & Wi-Fi technologies are not showing where we need to transmit low data rate information in comparatively large area (10-100 m) [1]. We can use ZigBee transceiver system instead of other technologies. In this paper we have implemented Mesh topology for ZigBee. Bit Error Rate by using OQPSK modulation is implemented & compared with MSK modulation. Results shows BER for MSK is better than OQPSK. PER is also calculated. In this paper, the design methodology and simulations of ZigBee / IEEE 802.15.4 has been done by using MATLAB.

117 Design & Simulation of Residential Grid Connected PV system with Im proved P & O MPPT Technique
Monica Gupta, Dr. R.P. Bhatele

Abstract—This paper deals with design of a grid connected PV system with MPP technique modified Perturb and Observe technique which is the most suitable for grid connected systems. This paper presents the modelling of a Photovoltaic cell, Boost dc to dc converter, dc to ac inverter and simulation study of a grid connected PV system. In this paper various design strategies for grid connected PV systems with MPPT has been implemented and a design for new grid connected 6 cell PV systems with MPPT is proposed. Various design parameters are calculated for MATLAB/SIMULINK model.

118 Modelling and Analysis of MPPT Techniques for Grid Connected PV Systems
Monica Gupta, Dr. R.P. Bhatele

Abstract—This paper evaluates the most commonly used MPPT techniques and finds which MPPT technique is most suitable for grid connected systems. This paper presents the modelling of a Photovoltaic cell, dc to dc converter, and simulation study of a grid connected PV system. In this paper various design strategies for grid connected PV systems with MPPT has been surveyed and a design for new grid connected PV systems with MPPT is proposed.

119 Automatic License Plate Detection and Recognition Using Neural Network
Pragya Bagwari, Swapnil Bagwari, Sumit Pundir

Abstract—Automatic Number Plate Recognition (ANPR) is an image-processing technology and an important field of research that identifies vehicles by their number plates in which the number plate information is extracted from vehicle's image. In order to reduce problems such as low quality and low contrast in the vehicle images, image recognition is done by the two different methods first is OCR without neural network and another is OCR in which the backend is neural network and the best one is selected. ANPR consists of 4 phases: Pre-processing, number plate extraction, character segmentation, character recognition. The objective of this research is to explore the potential of using the neural network for number- plate reading. Experiments have been conducted for this algorithm, and 150 images taken from various scenes were employed, including diverse angles and different lightening conditions. The algorithm based on neural network which can quickly and correctly detect the region of license plate and the license plate detecting rate of success is 98.78%.

120 Coding Formulation and Power Control for State Estimation with Wireless Sensor Networks
Preethi k, Sivanranjani M, Gnanavel S

Abstract—The idea behind MDC is to create separate descriptions, which are individually capable of reproducing a source to a specified accuracy and, when combined, are able to refine each other [6]. For that purpose, when using MDC, the source vector ym(k) is mapped to Jm(k) descriptions sim(k) i ∈ {1, . . . , Jm(k)}that are independently entropy coded and transmitted separately to the GW.

121 Analysing Sentimental Influence of Posts on Twitter Data
B.PremKumar, K.Varalakshmi

Abstract—The basic task in sentiment analysis is to classify the sentiment of an input text at the document whether the expressed comment/review is positive, negative or neutral. It collects useful information from the twitter website and efficiently perform sentiment analysis of tweets.This is useful for customers who want to research the popularity of products, or companies to know about the reach of the product. The training data consists of twitter messages obtained through Twitter API. Naive Bayesian classifier is used to classify the tweets which can achieve high accuracy when trained using the feature vector and the publicly available dataset. This paper also describes the preprocessing steps of the dataset needed in order to get better results. The main feature of this paper is the novel feature vector of weighted unigrams.

122 A Web Based Industrial Automation by Using Android Application
Siraj.P.A, Dr Marimuthu C.N, G.Prabhakaran

Abstract—Household appliance control using cell phone through global system for mobile communication (GSM) technology is common in nowadays. The cellular communications is essential for such remote controlling activities. SMS (short message service) technology can be used to control household appliances from distance. In industrial sector the automation is only for a particular device. So one cannot have an access to the entire industry. In this situation the work presented here is a solution to the current system. The presented project builds an application and also has a direct connection to the World Wide Web. This allows one to work from away by using smart phone and internet. It can be made online for 24 hours surveillance and backing up of activities happening inside the industry.

123 Compressive Data Aggregation gathering Energy Efficient for Wireless Sensor Network
M.Karkuzhali, V.Sridevi

Abstract—A clustering method that uses the hybrid compressive sensing for sensor networks. The sensor nodes are organized into clusters. Within a cluster, nodes transmit data to the cluster head without using compressive sensing. A data gathering tree spanning all cluster heads is constructed to transmit data to the sink by using the compressive sensing method. One important issue for the hybrid method is to determine how big a cluster. If the cluster size is too big, the number of transmissions required to collect data from sensor nodes within a cluster to the cluster head will be very high. But the cluster size is too small, the number of clusters will be large and the data gathering tree for all cluster heads to transmit their collected data to the sink will be large, which would lead to a large number of transmissions by using the compressive sensing method. In this regard, we first propose an analytical model that studies the relationship between the size of clusters and number of transmissions in the hybrid compressive sensing method, aiming at finding the optimal size of clusters that can lead to minimum number of transmissions. And then we centralized LEACH algorithm based on the results obtained from the analytical model. Finally we present a distributed implementation of the clustering method. Distributed method is efficient in terms of the low communication cost and effective in reducing the number of transmissions.

124 An Energy Balanced Routing Method Based On Improved Forward Factor for Wireless Sensor Network

Abstract—It is well known that wireless sensor networks (WSNs) is a self-organization wireless network system constituted by numbers of energy-limited micro sensors under the banner of industrial application (IA). Due to limited energy and communication ability of sensor nodes, it seems especially important to design a routing protocol for WSNs so that sensing data can be transmitted to the receiver effectively. They quantify the forward transmission area, define forward energy density, which constitutes forward-aware factor with link weight, and propose a new energy-balance routing protocol based on forward-aware factor, thus balancing the energy consumption and prolonging the function lifetime. The cluster head selection is done based on the forward aware factor and received signal strength. Furthermore, a spontaneous reconstruction mechanism for local topology is designed additionally. We analyses the result in NS2 simulator to increase the network life time and avoid energy consumption for retransmission of data in the network and latency.

125 A pair-wise key generation for higher key rate in multiple antennas
S.Suganthi, A. Malathi, D. Rajini Girinath

Abstract—Most of the key generation in wireless fading channels requires a direct wireless link between genuine users so that they can obtain interrelated observations from the mutual wireless link. But in the proposed model the key generation problem in the two-way relay channel, requires no direct channel between the key generating terminals. The relay first establishes a pairwise key by using channel link. Higher rated key is generated by using an effective key generation scheme, so that the active attackers do not know any information and it helps in achieving a substantially larger key rate than that of a direct channel mimic methodology. In addition to provide better security the effects of an active attacker is considered for the key generation protocol. Likewise, the establishments of maximal attacker’s power under which the proposed scheme can still attain a nonzero key rate.

126 Permission Checks On Large Scale Android Framework
K.Vasandkumar, G.K.Sandhia

Abstract—The security and integrity on Android is maintained with the help of permissions to the resources of Android Smartphone which has to be mentioned explicitly by an application defined by its developer. These permissions has to be reviewed by users before granting the permission upon installing the applications in their smartphone. Applications are limited with access to the resources only which they have requested permissions for and which are granted by users already at the time of installation. If the application has more permission granted than what they actually need, then that might lead to probable malicious attacks or intrusions. Android itself is based on a permissionbased security framework where the methods and its respective permissions has to be stated precisely by the developer at the time of developing the application. These methods and permission has to be mapped for proper analysis on such framework which is of large scale. An advanced class-hierarchy analysis is done to extract the mapping of methods and permissions. The extracted mapping is used to determine the permission gap in the applications with both the under or overestimated permissions in consideration. Early mapping and determination of permission gap leads to a more secure and fully functioning application.

127 Relationship between Various Dimensions Of Occupational Stress and Teacher Effectiveness among Secondary School Teachers
Amit Kauts, Vijay Kumar Chechi

Abstract—The present study aims at studying the relationship between various dimensions of occupational stress and teacher effectiveness of among teachers working in secondary schools of Jalandhar and Ludhiana districts of Punjab, India. The study ought to bring to focus the role of occupational stress in the effectiveness of teachers. It helps to understand and frame remedial policies to reduce the occupational stress among teachers. Using a multi-stage random sampling method, a sample volume of 739 teachers was determined. Two main instruments were used to measure the study variables: a 60-item Occupational Role Questionnaire from Occupational Stress Inventory Revised (OSI-R) by Samuel H Osipow, 1998 on occupational stress (six scale: Role Overload, Role Insufficiency, Role ambiguity, Role Boundary, Responsibility, and Physical Environment, and a 60-item Teacher Effectiveness Scale by Kumar and Mutha, 1985. The pearson product moment correlation was used to establish the relationship. The study results revealed that (a) stress contributes negatively on the teaching effectiveness; (b) the teachers in general and particularly high age teachers & those working in government schools perceive that they are not able to cope up with the workloads; (c) they become ineffective in performing the duties of the teacher; experience and qualification does not have an influence on relationship between teaching effectiveness and occupational stress. The findings concludes that teachers are stressed and it is adversely affecting their teaching effectiveness and their overall well being, a loss that results in added costs in training and hiring for the field of education. The government authorities in particular shall take steps to minimize the workload of the teachers and plan for in-service trainings at proper intervals to take care of pre requisites for changes in curriculum.

128 Self-Localized Small-Sized Ground Robotic Vehicles
Devapatla Harini

Abstract—When a vehicle is performing autonomous tasks whether it may in indoor environment or outdoor environment it is needed to find the real time location of the vehicle. We are proposing and implementing a technique Self Localized Small- Sized Ground Robotic Vehicles which gives accurate real-time 3D positions in any type of environments. Like other location finding schemes it does not require any external references, costly hardware, strict calibration, and it is able to operate under various types of environments. It finds the local relative movement by a set of integrated inexpensive sensors and by using infrequent GPSaugmentation it corrects the localization drift.

129 Improving Secure Data Communication in the Trusted Environment
B. Vidhya, Mary Joseph, D. Rajini Girinath, A. Malathi

Abstract—Wireless Sensor Network (WSN) have been deployed in many important applications like Military, civilian and industrial applications. The major threat to WSN is security. Securing the data transfer in the trusted environment ensures that data completeness and integrity to be maintained thoroughly. To secure the data from adversary, several techniques have been proposed and that data needs to be transferred to the destination without any modification. Data integrity and completeness is the key for exchanging the data in WSN communication medium. Top-k query mechanism has been used to identify the major areas which were impacted by the adversary. The proposed approaches which are suitable for validating the data are aggregate signature, elliptic curve encryption for encrypting and decrypting the content. The techniques implemented are well suited to transfer the details in WSN. curriculum.

130 A Novel Biometric Recognition Using Sclera Vein and Finger Vein Fusion
Dharisanapriya.R, Rukumani khandhan.C

Abstract—Biometric recognition techniques are mainly used for human identification and authentication. A comprehensive approach for multi biometric recognition is designed by fusion of finger vein and sclera vein. Sclera vein and finger vein is a new parallel vein recognition method using a two-stage parallel approach for registration and matching. The proposed method can achieve dramatic processing speed improvement without compromising the recognition accuracy. The proposed approach combines finger vein approach and sclera vein approach. The frequency based approach is used to achieve the combination of both approaches which is based on identical biometric vector. Two new score-level combinations, holistic and nonlinear fusion is to be developed and investigated, then comparatively evaluate with more popular score-level fusion approaches to ascertain their effectiveness in the proposed system. The process offers a state-of-the-art advancement of multi biometrics, offering an original view point on features fusion. Consecutively, a hamming-distance-based matching algorithm deals with the combined homogenous biometric vector. Thus, the multimodal system achieves interesting results with several commonly used databases.

131 Secured Energy Aware Route Discovery Using Neighbour Verification Path Quality Protocol in Manet
Keerthana.M.S, Poornima.R

Abstract—A mobile ad hoc network is an autonomous collection of mobile devices (laptops, smart phones, sensors, etc.) which communicate with each other over wireless links and cooperate in a distributed manner in order to provide the network functionality. In the type of network, it is operating as a standalone network or with one or multiple points of attachment to cellular networks or the Internet, paves the way for numerous new and exciting applications. Application scenarios include, but are not limited to: emergency and rescue operations, conference or campus settings, car networks, personal networking, etc. Nodes are mobile, topology can be very dynamic. Nodes must be able to relay traffic on communicating nodes might be out of range. A MANET can be a standalone network or it can be connected to the external networks (Internet).

132 An Architecture model for smart city using Internet of Things
K.Priyanka, P.Suji, R.Rajasekar

Abstract—The Emerging Internet Of Things (Iot) That Effectively Integrates Computational Elements Controlling Physical Entities To Create Smart Environments Will Undoubtedly Have Excessive Amount Of Applications In The Near Future. Meanwhile, It Is Also The Key Technological Enables To Create Smart Cities, Which Will Provide Great Benefits To Our Society. In This Paper, Four Different Iot Network Architectures Of Various Smart City Applications Are Presented And Their Corresponding Networks Quality Of Service (Qos) Requirements Are Defined. A New Network Paradigm, Participatory Sensing, Is Thus Discussed As A Special Case.

133 Survey on Cost Cut down in Cloud Computing
Sathya Sofia.A, Ganesh Kumar.P

Abstract—Businesses that are just entering the cloud computing field would do well to rely on cloud financial management services to get a broad overview of the costs involved in the cloud. Many such services offer an estimate of the possible expenditure the company could incur on deploying resources to public, private and hybrid clouds, as well as those of maintaining an IT team. This information would eventually help companies choose the most cost-effective option for them. Data centers hosting Cloud applications consume huge amounts of electrical energy contributing to high operational costs and carbon footprints to the environment. Therefore, we need Green Cloud computing solutions that can not only minimize operational costs but also reduce the environmental impact. In this paper, various cost efficient methods of cloud computing is discussed.

134 Application of Adaptive Filter in Noise Cancellation System Using Least Mean Square Algorithm
R.Shofia Preethi, T.Jayachandran

Abstract—Adaptive filtering is a wide area of researcher in present decade in the field of communication. The LMS algorithm is the most popular method for adapting a filter. The Least Mean Square adaptive filter is used here to reduce area-delay product, power-delay product and this paper also deals with cancellation of noise on speech signal using least mean square (LMS) algorithm. As received signal is continuously corrupted by noise where both received signal and noise signal both changes continuously, then this arise the need of adaptive filtering.