JCT - Volume 4 Issue 2 (February 2015)


Sr/No/ Title Pdf
1 Performance Evaluation of DCT & BWT Based Technique for Color Image Fusion Techniques
Harkamal preet kaur, Sunny Dhawan

Abstract-The fused image will be more informative for human as well as machine also. This paper has considered well know transform domain based color image fusion techniques. Both techniques are designed and implemented in MATLAB using image processing toolbox. Different kind of images has been considered for experimental purpose. The comparison between these two techniques has shown that the DCT based technique is better than the BWT based image fusion. This paper ends up with the suitable future directions to enhance the image fusion techniques further.

2 Review Paper On Fog Computing
Mahesh Gawde, Abhijit Gurav, Vinit Sinkar

Abstract— Cloud Computing ensures that data on the cloud is protected from data theft attack. Cloud computing has change the way we use computers and access and store our personal and business information. With this kind of new computing and communications paradigms new data security challenges arise.

3 Integrated Email System: Secure Design
Akash Dande, Manali Belwalkar, Divya Joshi, Neha Singh

Abstract—The inherent simplicity of email system has become the prime factor for its popularity. With the increase in information rate, there has been exponential rise in the security threats as well. Email though has inherent simplicity but it has an inherent weak security as well. Email systems are vulnerable to various types of attacks and threats including SMTP –auth attacks, denial of service attacks and also it can act as medium for phishing attacks. This paper will explain inherent weakness in email infrastructure and methodologies to improve the security of the email infrastructure and also will highlight good and weak practices in varying aspects of email infrastructure design paradigm.

4 Human recognition and action Identification of person in the video Using multi target tracking
Aswini.M, Femila Goldy.R, Rajini Girinath.D

Abstract— Tracking a group of targets in video sequences has been used for security monitoring, traffic flow measuring, and accident detection on highways. It is aimed to obtain a record of the trajectory of the moving objects such as humans or vehicles over space and time by processing the data. The number of problems arises in the moving target detection in which the object can undergo non-rigid deformations, rotations or occlusions. In multiple target tracking, initially the video is loaded and converted in to frames based on the video data. After that, Pre-processing is applied to the video frame to filter the noise, and adjust the neighbourhood pixels in the frame. Then video is converted into grayscale image using the background subtraction method and the moving objects are estimated and identified. Finally the boundary box is applied to the moving object in the video. The resulting identified object is then compared with the image dataset to recognize the person in the video. The dataset is used to store the images of the authenticated persons. Then the group of person’s action is identified by compared with the action dataset.

5 Intrusion detection on websites
Sneha Jadhav, Sanket Patil, Ashish Khobragade, Aaquib Nadkar, Prof.Chetana Dodke

Abstract—Now-a-days new threats are constantly emerging to the security of information systems. Intrusion detection plays a vital role in ensuring the integrity of the system. This can be done using Honeypots. The exact definition of Honeypots has always been in controversies and arguments. Honeypot is usually located either inside or outside of the firewall. It helps us to learn the vulnerabilities of the system, as well as we can trace the attacker’s techniques he uses to attack our system. Honeypot thoroughly monitors all possible trials of the attackers and also alerts the network administrator of the possible intrusion. All the abnormal activity that takes place on the network is traced by Honeynets. Honeynets provides an additional layer of security to the network; this becomes a very useful tool in network forensics and intrusion detection. The main properties of honeynets are Data control and Data capture.

6 A Review on Data Hiding in Digital media using Steganography and Cryptography
Ravneet Kaur,Tanupreet Singh

Abstract—For Security Cryptography and steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence. These two techniques share the common goals and services of protecting the confidentiality, integrity and availability of information from unauthorized access. Using cryptography with steganography provides highest level of security or resistance against attackers. In this paper we will overview the use of basic data hiding techniques and review on combination of steganography and cryptography.

7 Particle Filter Based State and Parameter Estimation of Fading Channel
M. Sathya, K.Shobana

Abstract—In this paper, we estimate and identify timevarying long-term fading channel using Particle filter. The proposed system captures the characteristics (dynamics) of the fading channels using recursive stochastic differential equation. Estimation and identification of particle filter algorithms based on received signal strength. Expectation maximization (EM) algorithm that Estimate and identify the power path-loss of the fading channel and its parameters, respectively. Accuracy of the proposed system is measured using Monte Carlo Simulations and corresponding simulation result is provided.

8 Student Performance Prediction Using Fuzzy Probabilistic Neural Network
Vaishali Khairnar, Rutali Bandivadekar, Ashutosh Kaddi, Rajesh Gaikwad

Abstract—Conventional classroom is still the main learning method used all over the world. However there are several problems attached to this method as there are a vast number of students in every classroom and it becomes difficult for teacher to concentrate on performance of each student. Many methods have been applied to classify students that are based on the OF-THEN rules and pattern recognition. Moreover, there are no researches that measure basic values by considering intelligence and non-intelligence performances.

9 VLSI Architecture for Improving the Energy Efficiency and Power Dissipation in Battery Powered Portable Devices
K.Shobana, M. Sathya

Abstract—VLSI Architecture for improving the energy efficiency and power dissipation in battery powered portable devices paper presents the architecture and the Verilog design of a Two Dimensional Fast Discrete Cosine Transform (2-D Fast DCT) for JPEG (Joint Photographic Experts Group) image compression is done. By this the power consumption is achieved in battery powered portable devices. The 2D-DCT architecture is used as the core of a JPEG The target throughput of 19 Mpixels/s, which is required for VGA@30fps, is achieved by applying a 12.5 MHz clock. Synthesis results for a 350 nm technology estimate total power as 3.08 mW, and core area as 2.1 mm2. The proposed architecture shows to be at least 50% more energy efficient than the related work.

10 Localization and time-synchronization for Acoustic mobile underwater networks
T.Jennifer, P.Suthanthira Devi, Mary Joseph, M.B.Prasanth Yokesh

Abstract—Underwater localization is a key element in most underwater communication application. Acoustic communication of Mobile underwater networks face with several uncommon interrogation like long propagation, high transmission power consumption and node mobility. Slow signal propagation allows multiple packets to synchronously travel through the underwater channel, which is oppressed to improve the overall throughput. Since GPS signals are highly attenuated in water, accurate ranging based techniques for localization has to be developed. As an end, a MAC protocol called DOTS is used as passively local information to increase the chances of concurrent transmissions while reducing the likelihood of collisions. Localization algorithm and Sequential algorithm for time-synchronization and localization in the underwater acoustic channel is made to resolve the problem. Relying on the assumption that nodes are equipped with selfnavigation systems and that these systems are accurate for use in short periods of time. Simulation results demonstrate that our algorithm compensates for time synchronization and signal propagation speed concerns, and attain good localization accuracy using only two anchor nodes.

11 High Quality data Retrieval using Meta Information
P. Suganya, N.Vasudevan ,D.Rajini Girinath,S.Praveen Kumar

Abstract— Text Clustering has become an increasingly important issue because of the tremendous amount of unstructured data available in online forums such as web, social networks and information networks. In many application domains metadata associated along with the documents. Meta information may be links in the document, document provenance information. In some cases, Meta information be difficult when some of the information be noisy. To improve the quality of the data and to retrieve data efficiently clustering technique used. To implement efficient clustering, datasets chosen from large databases. Datasets may be any type depends on application as feature reduction done by principal component analysis. With the analysis process, efficient clustering is created with noiseless data. The proposed retrieval approaches are well suited for data extraction in an efficient manner.

12 A Collaborative Filtering Approach And Content Based Filtering Combining Clustering Based Correlations
Sindhuja.I, P.Karthick

Abstract—Recommender systems are widely used for involuntary personalization of information on web sites and information recovery systems. Collaborative Filtering (CF) and Content-based Filtering (CB) is the most accepted recommendation technique, but several CF and CB systems still endure from troubles like data rating availability and space dimensionality for neighborhood selection. In this paper, we present a new CF approach (PSN-CF) and CB approach that uses usage traces to model users. These traces are used for approximation ratings that will be working to produce clusters. Then, the PSN-CF and CB evaluates navigational correlations between users within these clusters. Predictions are performed in a following step. The performance of PSN-CF and CB is evaluated in terms of accuracy and time processing on a real usage dataset. We show that PSN- CF and CB highly improves the correctness of predictions in terms of MAE. Moreover, the use of clustering and positive sequences before computing the navigational correlations contributes to an important reduction of time processing.

13 Performance Evaluation of Various Edge Detection Techniques
Anamika Maurya, Rajinder Tiwari

Abstract—Edge detection is a preliminary step in many applications of image analysis. Edge detection methods transform original image into edge image benefits for the change of gray tones in the image. Edge detection is the methods of segmenting images in to regions of discontinuity. It plays an important role in practical aspects of our life as well. There exists no universal edge detection method which works well under all conditions In this paper we have studied and evaluated various edge detection techniques and in this paper we also tried to find out a new approach based on the one of the most efficient techniques for edge detection, which is entropy-based and on comparing them we can see that canny and proposed edge detector performs better than all other edge detectors on various aspect. Our proposed method gives the best result. It evaluates the performance of each algorithm with MATLAB R2010a. The PSNR, Entropy and MSE results are numeric value, based on that performance of algorithm identified.

14 Efficiency Improvement of Photovoltaic Panel by Tracking Method
Tushar M wadghule, Yogesh R Chavan, Sushil S More

Abstract—Due to the limited supply of non-renewable fuels, to find the alternative of new energy resources is essential. Besides, fossil fuels have many side effects such as acid rain and global warming. Renewable energies are the better solution for our health and the health of our earth; it is just the future source of energy! Sustainable energy sources like solar, wind, and fuel cells are becoming increasingly important as environmental friendly alternatives to the traditional energy sources. Among the various renewable energy systems, solar energy systems have the merits such as it is abundant, clean without any environmental pollution problems and infinite in mass so becoming one of the future energies. In Solar, Photovoltaic (PV) generation is becoming increasingly important as a renewable source since it exhibits many merits such as cleanness, little maintenance and no noise. However, these environmental friendly sources are difficult to tap, store, and use. Successful application of these sustainable sources depends on being able to maximize efficiency in both conversion and energy storage. But we have to improve the rate and optimize this source. The dual maximization scheme presented utilizes two techniques of maximizing available solar energy. In usual residential applications solar panels are kept fixed at a particular tilt angle. This limits the area of exposure of PV panels to sun over entire course of day and will generate maximum power only for a short time of span, from 11am to 2pm. solar energy available during rest of the day is not extracted at its maximum. In a system where we need maximum possible efficiency, this usual method will not be applicable. The proposed system not only extracts maximum power using MPPT, but also from the mechanical tracking system for the whole day from 6am to 6pm.While the mechanical tracking is not only the solution because it only tracks the sun position and doesn’t response to change in atmospheric condition and solar Insolation. So electrical tracking is used which compare the energy produced with the rating of solar panel for which it is designed. So electromechanical tracking of PV panel improves efficiency. The partial shading effect causes the Hot spot which may burn cell. By using bypass diode implantation it can be mitigate but it creates the local and global maxima. So electrical tracking fails to indentify the true or global maxima. So different partial shading mitigation techniques are used in conjunction with electrical tracking.

15 User defined volume selection with automatic Bottle filling capping system based plc using WSN
G.Sathish Kumar

Abstract—In most of packing industries filling plays an vital role. Filling is a task carried out by a machine that packages liquid products such as cold drinks or water .Traditional methods of bottle filling involved placing bottles onto a conveyor and filling only one bottle at a time of process. This method is time consuming and expensive. Our paper aims at filling and capping bottles simultaneously with user defined volume. The filling and capping operation takes place in synchronized manners. It can also include a user-defined volume selection menu through which the user can input the desired volume to be filled in the corresponding bottles. The entire system is time saving and more flexible. The filling and capping operations are controlled using a Programmable Logic Controllers (PLC’S). This is because PLC’s are very flexible, reduces complexity, cost effective and space efficient. By programming the PLC we control the entire system. SCADA (Supervisory Control and Data Acquisition) is used to monitor the process. Each operation of output can be send through GSM via text to a corresponding authorized person.

16 Java clone finder: cost efficient syntax Tree based clone detection in java for Maintenance purpose
Er.Mohammed Ahmed, Chauhan Sawatantra, Shaikh Farooque,Prashant Upadhyay

Abstract—A huge amount of money is spent on maintenance of software after its development which needs to be reduced. Software maintenance activities mainly comprise of finding problems repeatedly and application of solutions to these problems .A software system might contain a bug at several places and tracking down all instances of this bug in similar code fragments individually is a tedious task. Such problems might arise and increase the cost of maintenance activities. This paper proposes, JAVA CLONE FINDER which is a software capable of detecting duplicate code fragments i.e. code clones in the source code .It does this by creating abstract syntax tree of the source code by fetching the syntax tree from eclipse compiler and displaying the common syntax tree via some GUI .JAVA CLONE FINDER is a cost efficient solution for reducing the efforts in the software maintenance activities which in turn reduces maintenance cost.

17 Stochastic Model by Using Gamma Distribution to Estimate the Gallbladder Volumes and Ejection Fractions
Dr. P. Senthil Kumar, A. Dinesh Kumar, M. Vasuki

Abstract—The relationship between gallbladder motility and weight loss is not well defined. The aim of this study was to evaluate the relationship between percent of weight loss and gallbladder motility during weight reducing programs in obese women. Here we investigate the problem that considering a non stationary gamma process to model the component deterioration and a gamma distributed failure threshold. Two lifetime models are proposed for comparison on an application concerning deterioration.

18 Voice Operating Mouse And OS
Maheshkumar Erravoni, Atulkumar Keyal, Kiran Borse, Prof. Suvarna Pansambal

Abstract—Physically disabled and mentally challenged people are not able to use computer systems. So, researchers have developed software that helps people to use computer with their voice. This system is a new step towards human computer interaction. This system will increase the speed of work as there will be no need to use keyboard. This software can be used to operate entire computer on user’s voice commands. User of the software can command the operating system to perform various tasks such as Movement of Mouse, Typing of Keys, Starting an application, Clicks of Mouse, Turn off, restart computer, Directly open a drive of computer, Control “WINAMP”, Run a Power point slide and much more. Here the user has to just speak a command and the associated task will be performed. The hardware required here is a Simple Microphone. This paper gives the Literature Survey of the method used to operate PC using voice.

19 Packet-Hiding methods for preventing selective jamming attacks using Randomized Frequency Hopping technique
Prof.S. Gomathi, Prof.P.Sakthi priyanka, Prof.C.Radha, Dr.S.Prabha

Abstract—The current trend in wireless network is to share important data among the nodes through some form of wireless network. There are several off-the shelf components that help in stopping the sharing of vital data through the process called jamming. Jamming is simply the cause of a Denial of Service attack. A simple example of this process is when a malicious node can transmit a lot of data to a particular node in the network to stop the reception of data sent by another legitimate node in the network. There are several other types of jamming like radio signal jamming, continual transmission of interference signal, etc. while we deal with data jamming. Here we provide a system with several nodes connected through Wi- Fi and an illegitimate node sends lot of data to stop the communication of the legitimate nodes in the network. This system consists of technique to provide a non-interrupted transmission between the legitimate nodes and to protect the data during transmission through encryption and to provide an e-mail notification about the jamming node.

20 Decision Support System for Medical Diagnosis Using Data Mining
Er.Asadullah Shaikh, Ahsan Ali Udaipurwala, Abrar Hazari, Mohd Asif Ansari

Abstract—Industries in healthcare gathers a large amount of data that has not been appropriately mined and which is not feasible. Research of these covered patterns and relationships among them have not been put into use. The main motto of our project based on Medical diagnosis is to prepare knowledge based aspects with the help of collecting data regarding various kinds of diseases such as heart disease and diabetes. Another aspect of our research is to develop decision support systems in medical field to ease the workload of the physicians. In our proposed system, we make use of different algorithms such as ID3 algorithm and CART algorithm which classifies the above mentioned diseases to compare the usefulness and how effective it is.

21 A role of facts devices in optimal power flow (OPF) – A Case Study
T. Hariharan

Abstract—This paper presents about the Optimal Power Flow case Study. Optimal Power Flow (OPF) problem is a combination of economic load dispatch and power flow problem. OPF finds economic real power generation schedule for each generator and satisfies real and reactive power balance which is the objective of power flow problem. Nature of OPF problem is a complex, nonlinear and bounded to many constraints. In a power system load flow is analysed to know the real and reactive power flow in the lines connecting buses, bus voltage magnitude, and phase angle. This information is necessary to know the operating state and the level of security. Load flow analysis is required for a power system planning and operation. Economic operation of power system requires adjustment in real power generation of generators. In this paper presents the Optimal Power Flow using Facts Devices as a case study.

21 A Comparison of Group Key Management Schemes in Multicast Networks
Kiruthikaa K V, Suresh V

Abstract—Key management is the base for providing common security services such as data secrecy, authentication and integrity for group communication to work in dynamic network environments. A group key management supports protected communication between members of a secure group. In this paper, we analyze the issues of key management and review several typical group key management schemes in multicast networks. Finally we discuss the new research directions in group key management.

23 A System to Filter Unwanted Messages from OSN User Wall
Karishma Kuchekar, Komal Panchal, Neha Raut, Shweta Sharma

Abstract—In today’s world peoples are using online social networks (OSN) widely. They use OSN to keep in touch with friends and family. They use OSN to express the feelings, share thoughts, information, images, videos and audios. Due to this misuse of OSN services got increased and domineer are on rise. Therefore the need of prevent situation is not only to avoid unwanted wall post but also to prevent nobility in relationship. In this paper we are presenting a system which block unwanted posts on basis of different categories that prevent the messages to display on wall. System can also prevent unwanted messages to get publish on OSN user wall. We can block a user temporary or permanently bases in the system. A blacklist can get maintained dynamically and can be updated on bases of user need. A machine learning technique (MLT), policy based personalization and Black list mechanisms are used to apply on user wall.

24 Automated Patient’s Data Acquisition and Alert System Using GSM
A.Prasath, P.Dhakshinamoorthi, P.Vignesh

Abstract—This paper, presents a Wireless Sensor Network (WSN) for acquiring the patient’s physiological conditions continuously and provides an alert system using GSM technology. Here the physiological conditions of the patient's such as temperature, blood pressure, heart beat are acquired by sensors. These acquired parameters are compared with the data base which has the normal level of ordinary humans. An intelligent Wireless GSM system is used for transmitting the acquired signal levels when they are reaching a critical stage. This system can be implemented in ICUs which requires the immediate alerting systems for 24x7. Here a buzzer and LED lights are used for providing the alert systems. Similarly the GSM module directly gives a message to the doctor’s cell phone that particular patient’s particular parameter is in critical. Due to this alert message, Doctor can do the fast assessment of the patient’s health.

25 Rapid Ticket Issuing Code for the Rural Bus Passengers
Uddip Yalamanchili, Errolla Venkataiaiah

Abstract—Efficient mobility of people is one of the key factors for the progress and prosperity of a society and the nation. Public Transport services play a major role in reducing the poverty and keeping deprivation at check in rural areas. Apart from offering the rural population a viable and convenient way to market their agricultural produce, it also enables them to access other sources of income such as engagement in informal services nearby urban nodes and formal employment in manufacturing, food processing, transport and other industries, etc. Certain inherent characteristics of the bus transport system make it the ideal mode for meeting the huge and increasing demand for passenger transport services. These days many passengers are not having proper denomination for the ticket especially during bus journeys.

26 An Improved Algorithm for Collision Avoidance System among Vehicles
S. Selvendran, Dr. S. Vasantharathna, Dr. E. Chandira Sekaran

Abstract—This paper proposes an Intelligent approach for Collision Warning and Avoidance between vehicles in straight roads and also at intersection roads using Vehicle to Vehicle (V2V) communication and Vehicle to Infrastructure (V2I) communication. It comprises of a wireless automotive communication protocol where automobiles send messages to each other with information about what they are doing. This data would include speed, geographical location, and direction of travel, braking and loss of stability. Vehicles may happen to collide with each other in intersection roads or in highways due to the improper functioning of drivers. Then by using V2V and V2I communication, vehicles automatically gets the control from the driver and acts to the emergency situation by applying the brakes or changing the lane etc. This system considers safety and better traffic management by using a Dedicated Short Range Communication (DSRC) called ZigBee (802.15.4) as a wireless protocol, Ultrasonic sensor, Compass sensor, Object sensor, and RF Transceiver which are controlled by using ATmega162V microcontroller. In this paper a prototype for Collision avoidance system is shown by using a Robotic Cars with the sensors implemented on it.

27 Tandem Queuing Model with blocking and Catastrophes
P.Swamynathan, G.Eswara Prasad, V.S.Mathu Suresh

Abstract—Consider two non-identical servers Markovin queue with blocking and no waiting time for the customers. The arrival processes of customers who attending both servers follow Poisson distribution. Similarly the service times are distributed exponentially at server 1 and server 2. In addition that the queuing system is disturbed by catastrophes. The steady state probabilities, expected queue length and probability of lost customers are mathematically derived and the corresponding numerical values and curves are exhibited.

28 Finding Optimal Path Using Android and GPS
Mayuri Suryavanshi, Rahul Sehgal, Ruchita Pandey

Abstract—Passenger must know the route and fare of their journey in advance so that they can decide the optimal path depending on the time and money thus this application will guide the user throughout his travel. It is an android application used for calculating fare of auto rickshaw, taxi and train. It helps the user against faulty meters and keeps the track of his route as well as the estimated time for journey. Auto and taxi fare is calculated based on optimal path with the help of GPS tracking system, thus helping the user to decide the mode of transport based on fare. This application is simple and can be accessed with ease. The Global Positioning System (GPS) is a navigation system based on satellite working due to a network of 24 satellites orbiting the earth. GPS works in all-weather conditions around all over the world, 24 hours a day. Usage of mobile phones is increasing and so the applications. Thus this application provides optimal path and fare to the user on mobile device. This android application also helps the user to find cost of ticket of local trains between the stations. So basically it covers all three public transports.

29 A Novel Approach for Redemption of Trapezoidal Rule
Md. Saiful Islam, Tushar Kanti Saha

Abstract—Numerical integration is one of the important parts of numerical analysis. Several methods are used for finding numerical value of a definite integral such as Simpson’s 1/3 rule, Simpsons’s 3/8 rule, Trapezoidal rule, etc. Still there exists some weakness of these rules to find exact result. In this paper we are going to explore a new way for approximating the integral of a function over a given domain by modifying Trapezoidal rule. Throughout this approach we have been able to show a major improvement of Trapezoidal rule for calculating approximate value of a definite integral.

30 SIAM - A Proposed Model to Improve the Performance of Software Professionals
Tushar Kanti Saha, Md. Saiful Islam

Abstract—Throughout this article, we have introduced the new model for increasing individual performance of software professional as well as software firm through motivation. It is a challenging issue to train every professional and manage its cost to get highest output. We can train a professional to get an expected output but highest output is a dream. So improving individual performance through intra-organization coordination is better practice so that organization’s performance can be improved. To carry out this objective we have named the model as “Sharing Individual Ability Model (SIAM)” for software professionals. This model has some elements for sharing namely knowledge, task, strategy and resource. The model is worked through some levels named problem detection, asking for help and future use. We have also shown here its implementing procedure in a software firm.