-
Attainment of Student's Performance Prediction
J. Namratha ; J. Natasha; Mr. S. Parameswaran
Pages: 1 - 3
A nation's development is emphatically measured by the nature of its education framework. Education part has seen ocean change in its working. Today it is perceived as an industry and as an industry it is confronting challenges. The difficulties of advanced education being diminishing in students prosperity rate and their leaving the course without consummation. An early expectation of student's disappointment may help the administration give convenient advising and in addition mining to expand the achievement rate and understudy maintenance. Data mining are broadly utilized as a part of instructive field to discover new concealed examples from understudy's information which are utilized to comprehend the issue. Grouping is one of the forecast sort classifiers that orders information in view of the preparation set and uses the example to arrange another data. Point of the venture is to build up an internetworking application that utilizations data mining method to anticipate the student’s execution in view of their conduct.
Read More...
-
On Board Unit Based Authentication for Vehicle To Vehicle Communication in VANET
S. Geerthana ; M. Karunya; T. Mathuvanthi; M. Kavusalya
Pages: 4 - 10
The VN Layer is a cluster-based approach to handle communications in MANET, and the virtual nodes to tackle the challenges raised by the mobility of the physical nodes (PNs). We present several enhancements to the reference implementations of the VN Layer and the adaptation of AODV to work with VNs, proving by means of simulation experiments. Our solutions achieve better performance in terms of overhead, packet delivery fraction, and latencies in VANET scenarios. In our work we proposed about using the extra OBU and authentication unit with the RSU. We can reach the nearby unit of the sector which gives us security. By using DSR algorithm we simulate our work using Network simulating version-2 sector (NS2). By this work we can do many applications that gives security, improves the packet delivery ratio, it may reduce the delay and traffic collision.
Read More...
-
Flipped Classroom with In-Video Quiz Programming
Dr. R. Subha ; D. Bala Gayathri; V. Aswini; V .Diviya Lakshmi
Pages: 11 - 16
In recent years, the way of learning has extended its popularity in the field of engagement with lecture content. Ethical practice of facilitating learning and improving performance by creating an integrated environment. Technological tools and media the assists in the communication of knowledge, and its development and exchange. The techniques needed to develop the integrated environment as Presentation, White board, Text chat and Voice chat. Remote connection directly supports both client and server to communicate within a network. The techniques used to rectify the systematic errors that occurred in programming Language based lectures.
Read More...
-
Design and Implementation of Automatic Solar Grass Cutter
P. K. Arunkumar ; M. Vibesh Ram; E. Rajesh Kumar; A. Manivasagam
Pages: 17 - 21
Lawn is the area in front of some houses and buildings which is covered with grass for attractive purpose. A grass cutter is a tool or a machine which is used to trim the grass in the lawn in front of house and other places. The grass cutter will cut at even height and give a uniform and neat surface look to the viewers. This paper summarizes the new way of grass cutting and advancement compared to the existing system. This project overcomes the idea from internal combustion engines and conventional electric lawn mowers. This grass cutter will reduce the pollution in the environment.
Read More...
-
Smart Locker for Home Keys using Android Application
P. Deepak Kannan ; S. Prem Nazeer; M. G. Vishnu
Pages: 22 - 25
In today`s life style, it is very difficult to keep and carry our home keys to the places, where we are travelling for official works. It is the fact, that there are many possibilities for misplacing the keys. Whenever there is a situation of opening the home doors without our presence at the time of arrival of guest is also to be considered as mandatory. To overcome these problems “Smart Lockers for Home Keys using Android Application†is the only solution. In this project a GSM controlled smart locker is developed. Opening and closing of locker system is controlled by the SMS sent by any two family members. Placing and taking out the keys can be intimated through SMS to the family members. Locker will be opened when the controller receives SMS signal. The system is highly protected, when someone tries to break the system as well as the main door, it will give an alert signal to the family members and to the security.
Read More...
-
Multimodal Biometric Authentication using Face and Fingerprint
Gayathri. R ; Viji. A
Pages: 26 - 32
This paper implements the multimodal biometric authentication using face and fingerprint. Main purpose is to provide high security by authenticating the user and allow access to the information or site only for authenticated user. The system using two verification schemes namely the fingerprint verification and face recognition. System is designed in java by using fingerprint algorithm and eigenvalue algorithm for face and fingerprint verification. Fingerprint algorithm extracts the minute points in fingerprint region and eigenvalue calculates the feature point in user face.
Read More...
-
A Multi-Input Bidirectional DC-DC Converter for Elevator Applications
K. S. Seetharaman ; R. Senthilram; S. Seshasai; R. Padmavathi
Pages: 33 - 36
This paper deals about a bidirectional DC-DC converter fed by a BLDC motor drive. The converter has three inputs, one of which is a bidirectional battery input allowing both charging and discharging operations. The other two are unidirectional power inputs, of which one is a Renewable energy source (PV panel) and the other being a DC source. The converter works on independently controlled power switches for different modes of operation. The bidirectional DC-DC converter feeds the input to the BLDC motor. More importantly, it helps to regain the energy lost during the braking operation by storing it in a battery for further and future use, thereby incorporating the concept of regenerating braking in the project. The simulation result, of the design proves the authenticity of the proposal.
Read More...
-
Solar Powered Lithium-ion Battery Pack for Street Light Application
Rohit N ; Sai Rushyant G; Sivabalan D; Dhivya B
Pages: 37 - 41
This paper deals with the generation of electric power with the help of a solar panel and storing it in a battery for a single use application. A lithium ion battery pack is used for its higher depth of discharge and better nominal voltage in comparison to the conventional lead-acid battery packs. A charge controller works to charge and discharge depending on the state of charge. The primary load is an LED street lights in rural settings, with poor energy infrastructure and lack of access to grid supply. An MPPT algorithm is implemented for tracking the maximum power from PV panel under all conditions, which is programmed with Perturbed and Observe algorithm. A DC-DC converter helps to regulate the input voltage for the load. A study is done to observe and compare the effects of a Buck converter and a SEPIC converter in such a circuit.
Read More...
-
Automated Health Care Management System using Big Data Technology
Rohini. M ; Greeshma. B; Mr. Prabhu. K
Pages: 42 - 45
Generally Automation plays an important role in the global economy and in daily experience. The Automated Healthcare Management System is an automated system that is used to manage patient information and its administration. In existing system challenges at large scale performing large-scale computation is difficult. To work with this volume of data requires distributing parts of the problem to multiple machines to handle in parallel. Whenever multiple machines are used in cooperation with one another, the probability of failures rises. In a single-machine environment, failure is not something that program designers explicitly worry about very often: if the machine has crashed, then there is no way for the program to recover anyway. This paper addresses the problem of data quality in electronic patient records using a computerized patient records report system with Apache HIVE and abstraction of Map reduce of big data technology. We analyzed which patient is spending more money than the others with the Map reduce. We got the data to be processed from traditional system to Hadoop via ETL's. We organized this with Oozie scheduler in Hadoop. The data what you are going to analyze is an semi-structured data. After uploading their data to cluster anyone can access them again provided they got to be in the cluster or can also use virtual machines that contain the right software to analyze them without any need for conversion.
Read More...
-
Smart Healthcare Monitoring using IoT
Balakiruthika. K ; Nandhini. S; Mr. Prabhu. K
Pages: 46 - 48
Envision doctors leveraging a variety of small, powerful wireless monitors connected through the IoT, to reach and track patient health in India’s most remote communities, where healthcare facilities are almost non-existent. IoT devices can be used to enable remote health monitoring and emergency notification systems. IoT aims to provide means to access and control all kinds of ubiquitous and uniquely identifiable devices, facilities and assets. A lot of threats, attacks and vulnerability are occurred in wireless surroundings because of their limited resources such as small memory and low computation capability in wireless sensor network. RFID is often utilized as a prerequisite for the IoT in healthcare system. We surveyed and analyzed the technologies and characteristics of RFID and its application based on IoT Healthcare organizations must consider the critical role of the network in managing and analyzing these gigantic volumes of data coming from all those health and fitness devices.
Read More...
-
Providing Mutual Anonymity for Structured P2P Networks
R. Jennie Bharathi ; A. T. Dharshini; J. Janani Sri; P. Jayasudha
Pages: 49 - 53
Peer to Peer (P2P) networks are known for their scalability and efficiency, widely implemented in transmission. P2P networks are used in sharing of files and hence preserving anonymity is very much important. There are a lot of methods to provide anonymity but these methods are only for unstructured Peer to Peer networks. Hence, we propose a method to provide mutual anonymity in structured P2P networks. With this method a more secure platform is developed for the transmission of packets between the nodes.
Read More...
-
An Embedded Biometric-Compression Authentication Scheme for Banking Applications
G. Sekar ; C. J. Chisnah; S. Aswathy; M. Gokul Priya; M. Kalpana
Pages: 54 - 60
As the world becomes increasingly more digital, the number of passwords people have to manage is becoming a serious problem. In order to handle these serious problem, Biometric authentication came to exists. This Paper acquaints a highly buffered Banks using Biometrics which also abate the memory space of Bank’s Centralized Database Center by EZW (Embedded Zerotree Wavelet) Algorithm. EZW is simple and efficient. EZW finds its applications in Image Compression, Remote Sensing, Medical applications like ECG, EEG. The Proposed System combines the advantages of Biometrics (Finger Print Recognition) and Compression (EZW Algorithm). Arduino ATMEGA328 and R305 fingerprint sensor hardware are used to implement the Finger print verification and storage system. The security level of accessing the banking locker system can be improved and the memory space of the bank’s centralized server can be reduced.
Read More...
-
Traffic Congestion Control with Automatic Signal Clearance
Devi P ; Bhargavi Venu; Devipriya Ravichandran; Fousiya Dasthakeer; Menaka Manoharan
Pages: 61 - 68
The existing conventional traffic signal timing methods does not result in an efficient control of congestion. This paper presents an intelligent traffic control system for congestion control, paves way for the emergency vehicle and detects the stolen vehicle at four lanes. The RFID tag is stuck to every individual vehicle, placed at a location making it impossible to remove or destroy. RFID readers with arduino, reads the tag attached to vehicles. The reader counts the number of vehicles passing it for a specific duration. By determining the congestion, the green light is turned on for the path with highest number of vehicles. If the RFID tag read belongs to a stolen vehicle, then a message is sent to the police control room using GSM SIM900 module. The arrival of the emergency vehicle is detected using XBEE and the green light is turned on for that particular path.
Read More...
-
Fully Automated Valet Car Parking System
Mr. T. Joby Titus ; S. Abisheik; V. Balakrishnan; Jemy Sam; M. Mohan
Pages: 69 - 72
This paper presents the designing of a system for the automated parking of cars in which human involvement is eliminated. The car can be lifted by using robotic arm which is connected with dc motors. The PIR sensor detects the presence of car. The RFID reader reads the tag value which contains user’s information is attached to the user’s vehicle. The robotic arm which is controlled by arduino starts operating once the user parks the vehicle in entrance slot. The parking information will be sent as a text message to the user through GSM. While returning, the user has to call the registered number to get back his car.
Read More...
-
Prototype Valet Car Parking Robot
Mr. V. Ganesh ; M. S. Adil Ahamed; C. Arvindsamy; S. Moorthi
Pages: 73 - 79
This paper explains the design of a autonomous parking robot that parks the vehicles to the vacant slot. Various levels have been used for parking the vehicles. The system will first recognise the type of vehicle that is arriving into the parking area and park it in the corresponding slot. The visitor’s vehicle will be parked in the slots that are very close to the exit. The vehicles of residents will be parked in the corresponding slot which is allocated for them. The slot number of the vehicle will be displayed in an LCD.
Read More...
-
IoT Based Vehicle Emission Monitoring System
Abinayaa Balasundaram ; Aiswarya Udayakumar; Baladharshini Gopalan; Kaaviya Bhaskaran; Barkathnisha Abdul Muthalip
Pages: 80 - 84
The main source of atmospheric taint happens due to automobiles. Using empirical scrutiny, ritual mechanized air monitoring system has high rigor, but uneconomical and single datum class make it unfeasible for large-scale furnishing. In order to eject the issues in ritual systems we have introduced Internet of Things (IoT) into the field of environmental barrier. This paper is to introduce vehicle emission monitoring system using Internet of Things (IoT) which is a green thumb for tracking down vehicle causing taint on the city roads and measures multifarious genres of toxic wastes, and its level in air. This paper puts forward a kind of real-time air pollution monitoring system at any time anywhere using Gas Sensor. The measured data is shared to vehicle proprietor via text message, and agencies of national environment. This assay shows that the system runs abiding, an economical and can be controlled tractably, it can smell out the vehicle exhaust in real-time, and can improve the detecting level and accuracy of the exhaust monitoring system. This system provides good outcomes in monitoring the air pollution exclusively in the urban areas.
Read More...
-
Secure Bank Locker System with Biometrics
Ms. D. Binu ; M. Arun Athithyan; G. K. Felins; A. Mohammed Anish; D. Sathish Kumar
Pages: 85 - 89
This paper presents the implementation of a multi-level security model for bank lockers. Our proposed system incorporates the biometrics and an OTP. The first level of this system is biometric authentication. In the next level of validation, it uses one time password followed by force based substantiation for deciphering the locker. All the levels will be synchronized by a microcontroller circuit and the locker will be unlocked after validating all the levels. The banks having this type of guaranteed lockers are mostly preferred by the customers due to the traits.
Read More...
-
RFID Based Patient Monitoring and Mobile Alert System in Health Care Organization
Dr. R. M. S. Parvathi ; M. Aisswaryya; R. S. AiswaryaDevi; K. Ambika; A. MaviVarshini
Pages: 90 - 93
In this paper we have designed and implemented a new integrated system to monitor the patient‘s health periodically using modern technology. Biological parameters are the one which determines whether the patient is in normal or in abnormal condition. Body Temperature, Heart Beat Rate, ECG data are some of the human biological parameters which are used to monitor human health condition. In addition to this RFID based patient monitoring system is used where the data‘s of the patient are acquired automatically by means of RFID reader and tag. The parameters which are measured through sensors describes the status of her/his health fitness. Our proposed system is able to send alarming message about the patient‘s critical health data through email reports. On analyzing the e-mail the healthcare professionals can provide necessary medical care. The information is processed using LabVIEW which is interfaced with the SMTP protocol for sending messages to the concerned doctors.
Read More...
-
Analysis of Cloud Computing with LXC Containers and Docker
M. Dhinesh Kumar ; V. Nagaraj; M. Nandhini
Pages: 94 - 97
The application services are provided to the customers by deploying the application in cloud. This saves lots of expenditures in terms of building servers and also ensures easy scalability. Cloud computing uses virtual machines to provide several instances of the application. Virtual machines loads a full OS with its own memory management and enable applications to be more efficient and secure while ensuring their high availability. In a virtual machine, valuable resources are emulated for the guest OS and hypervisor, which makes it possible to run one or more operating systems in parallel on a single machine or host. This in return consumes large storage space and CPU resources. Docker overcomes this with using Linux containers. Docker is an open platform; it’s a mechanism that helps in isolating the dependencies per each application by packing them into containers. Containers are scalable and safer to use and deploy as compared to previous approaches like VMs. Docker containers are executed with the Docker engine rather than the hypervisor. Containers are therefore smaller than Virtual Machines and enable faster start up with better performance, less isolation and greater compatibility possible due to sharing of the host’s kernel.
Read More...
-
E-Recruitment Process
Dr. J. Shanthini ; M. Akila; A. Dhanashree; P. Janani; C. M. Lekshmi
Pages: 98 - 104
‘E- Recruitment’ is aimed at developing a web-based distributed recruitment process for the HR. The main objective of the system is to simplify the recruitment process, through automized recruitment process for identifying the prospective employee with required characteristics. The features of this system includes creating vacancies, storing application data, Scheduling interviews, storing Interview results for the applicant and finally hiring of the applicant. E- Recruitment is a process in which jobseekers can register themselves by attending the screening test for registration. After the registration they can search and apply for the jobs in several domains and location wise within a company. Based on the domain, online technical test will be conducted for the candidates. The shortlisted candidate will receive the E-mail alert for further process. The system makes it friendly to distribute, share and manage the examination entities with higher efficiency and easiness. Provide an innovative, cost efficient and effective recruitment system. Increases the quality and quantity of applicants being applied for various vacancies.
Read More...
-
Smart Voting System using UIDAI
Mrs. Nandhini M ; Mr. Vasanthakumar M
Pages: 105 - 110
Smart Voting System using UIDAI (Unique Identification Authority of India) is a new technique to do the election process. This technique uses Aadhar information to perform the election process. The system needs Aadhar identification card instead of Voter identification card. The software is created named as “Smart Voting System Software†to do the election process. The Software of SVS is installed in a system and the system will be connected with input & output devices such as Barcode reader, Finger print scanner. Barcode reader reads the Aadhar card information of a voter by reading a barcode present in Aadhar card and makes it as a login ID for the voter and a voter will asked for his/her thumb (finger) print for verify the voter. A thumb (finger) print of a voter is obtained by a finger print scanner device and the verification of Aadhar card identification number and finger print is verified over the Aadhar server. After verification, voter will be re-directed to the candidate display page this page contains logo or the symbol of the candidate party, party name of the candidate, there the voters can select the candidate by clicking the candidate profile from the list of candidates of their own wish and the click made by the voters is considered as vote. The vote of a voter is registered in the database at the particular selected candidate’s section. Once the voters enrol his/her vote the login ID will be logged out and login ID gets disabled from the database. When the login ID is disabled, then the candidate cannot vote for the next time. This reduces the bogus voting process (i.e. same person voting more than once in an election). If the election is held on any particular region of India, then the Aadhar ID of the peoples of that particular region is alone added in the server. The people out of those regions cannot be vote in other regions. All citizens of India have Aadhar card but only the people who cross 18 years are allowed to vote, so in that particular region the people who cross 18 years, their Aadhar ID numbers are added to the database during election. These processes avoid bogus voting.
Read More...
-
Computer Aided Emergency Service System
Santhoshi A ; Manjula T; Pavithra R
Pages: 111 - 115
Blood Donation and Blood Transfusion Services (BTS) are crucial for saving people’s lives. Blood banks suffer frequent shortage of blood; hence, advertisements are frequently seen on social networks urging healthy individuals to donate blood for patients who urgently require blood transfusion. The Computer Aided Emergency Service System (CAESS) is a web application which allows the user to search donors of specific blood group based on their location, in a short period of time. This system not only display the list of donors but also facilitated with tracking the location of the nearby donors and providing SMS alerts to them, so that the patient can be served with blood soon. If no nearby donors are found, the user can make use of the hyperlinks of other nearby blood banks, which helps the user to search donors. In order to donate blood through the portal, one has to register himself by providing all the required details. These details must be valid and true so that they can be tracked at the time of emergency. Once all the details are approved by the Admin, the donor will be added to the list of registered donors. GPS module is included in order to locate the donors. Thus, the CAESS is readily scalable, efficient and adaptable to meet the complex need of blood bank who is key facilitators for the healthcare sector. Also this system achieves high productivity when compared with other similar systems. Hence the life at threat can be saved quickly.
Read More...
-
Secured Media Access
Mohan K S ; Mohan Raj S; Logesh M; Arunkumar R; Boominathan V
Pages: 116 - 119
Photo sharing is an attractive feature which popularizes Online Social Networks (OSNs). Unfortunately, it may leak users’ privacy if they are allowed to post, comment, and tag a photo freely. To prevent possible privacy leakage of a photo, we design a mechanism to enable each individual in a photo be aware of the posting activity and participate in the decision making on the photo posting. For this purpose, we need an efficient system that can recognize everyone in the photo. In the project the person who tries to tag another person in the photo must send a tag request. The tag request is sent as alert message to the registered mobile number of the user. Once the tag request is accepted by the tagged person the photo can be viewed by all other members of the group. The registered users can add members to white list. The persons in the white list are trusted persons of the users. The tag requests sent from the white list members are automatically accepted and it is allowed to view by other users.
Read More...
-
Smart Alert - A Web Application for College Faculties
Anu Priya P ; Monica Devi P; Sangeetha K
Pages: 120 - 123
With the advance in time and technology there is a need for faster dissemination of information. Connected, personalized, intelligent information appliances are becoming increasingly important in our business and private lives. These appliances include devices such as cell phones, two-way pagers, personal organizers, screen phones; etc. The data which are being sent through this system is trustworthy and reliable. Smart Alert Application for College Faculties is a web application which provides a simple interface for the efficient communication among the faculties. The system is developed for colleges for the easy interaction among the faculty members of various departments and also for maintaining the faculty details such as their personal details, details on their journals published and so on. It also sends notification to the faculties about the important activities, events, workshops, conferences which are going to be held in the various departments of the college. It also notifies about the exam schedules and exam duties, campus recruitment information. It sends remainders for the birthdays of other faculties.
Read More...
-
Wi-Fi Controlled Autonomous Robot for Military Applications
Mr. Senthil Kumar C ; Mr. Karventhan N; Ajay Krishna M
Pages: 124 - 129
A system with abilities of remote monitor and remote controlled based robots, wireless application platform is designed for an autonomous mobile robot (ROBO-R). The construction of network environment real-time image transfer for autonomous and manual control program of the autonomous mobile robot of the remote wireless monitor and control system are presented by using internet and cell phone network. It is realized to monitor and operate the ROBO-E remotely and wirelessly by using a developed application through internet. The existing work shows that the home appliances are controlled in the absence of an android phone by sending a normal SMS (Short Message Service). The goal is to design and build a Wi-Fi technology based robot controlled car via, mobile device. The proposed work can be modified quite easily to include a spy camera that can stream the videos to use it over Wi-Fi technology, with the help of android mobile device. The advantage of using robot controlled car led to be useful in reserved areas for military purposes, to capture and live stream images and videos to the mobile device. The proposed work force to be well suited for solar cells than effectively regular lithium-ion battery, which increases the working more powerful of robots.The proposed work also led to add a new feature called electronic power slayer (or) bomb diffuser, which is a future work to be done. The work can be mainly used in defense purposes, when the unmanned robot is used for surveillance to detect a bomb in reserved areas. If the bomb is identifier the bomb diffuser will diffuse the bomb using short circuit. The additional work added to the proposed work is peltier, which is used for power generation. The proposed work had enhanced with better Wi-Fi which would enable long distance communication. A robot is usually an electro mechanical machine that is guided by computer and electronic programming. Many robots have been built for manufacturing purpose and can be found in factories around the world. Designing of latest inverted robot which can be controlled using mobile app for android mobile and Wi-Fi communication to interface controller and android.
Read More...
-
Hubness Based Cluster Boosting In Data Mining
Ms. Vasuki. J ; Ms. Priyanka. R; Ms. Savitha. B; Ms. Swathi. V; Mr. Roopakseshadri A. S
Pages: 130 - 134
Data mining is the non-trivial process of extracting information from the very large database. Clustering plays a vital role in handling low dimensional data and high dimensional data in database. Low dimensional data is easy to cluster but high dimensional data is difficult. In addition clustering is difficult due to increasing sparsity in data. To eradicate this problem, a novel Hubness Based Cluster Boosting (HBCB) approach to address limitations in cluster boosting approach. Here hubness refers a data point which may frequently occur among the group. Hubness based clustering technique is thus used to improve the effectiveness and accuracy.
Read More...
-
A Hybrid Parallel Ant Swarm Optimization Algorithm using Cloud Environment
K. Rajakumari ; B. Kirubha Nandhini; M. Pandiyan; V. Shobana
Pages: 135 - 138
Cloud computing can be defined as a type of distributed system consisting a collection of interconnected and virtualized computers that are dynamically provisioned. One of the resource management issues is related to task scheduling. A hybridization of PSO(Particle Swarm Optimization) algorithm and PACO (Parallel Ant Colony Optimization) algorithm that solve the same problem based on execution time and cost and increasing the efficiency. The Parallel implementations improve the efficiency of population-based metaheuristics. By splitting the population into several processing elements, parallel implementations of metaheuristics allow to reach high quality results in a reasonable execution time, even when facing hard-to solve optimization problems. Parallel algorithms use several computing elements to speed up the search, and also introduce a new exploration pattern that is often useful to improve over the result quality of the sequential implementations. The implementation is done by using cloudsim and is expected to get improved throughput, reduced execution time and reduction in cost.
Read More...
-
Enhanced K-Nearest Neighbor Classification over Encrypted Data on Cloud
T. Tharun ; T. Tharun; M. Ramachandramoorthi; M. Udhayamoorthi
Pages: 139 - 144
Data Mining has wide applications in many areas such as banking, medicine, scientific research and among government agencies. Classification is one of the commonly used tasks in data mining applications. For the past decade, due to the rise of various privacy issues, many theoretical and practical solutions to the classification problem have been proposed under different security models. However, with the recent popularity of cloud computing, users now have the opportunity to outsource their data, in encrypted form, as well as the data mining tasks to the cloud. Since the data on the cloud is in encrypted form, existing privacy-preserving classification techniques are not applicable. In this paper, we focus on solving the classification problem over encrypted data. In particular, we propose a secure k-NN classifier over encrypted data in the cloud. The proposed protocol protects the confidentiality of data, privacy of user’s input query, and hides the data access patterns. To the best of our knowledge, our work is the first to develop a secure k-NN classifier over encrypted data under the semi-honest model. Also, we empirically analyze the efficiency of our proposed protocol using a real-world dataset under different parameter settings. The proposed system mainly focuses on information security in insurance company. They can encrypt the customer information and stored it in database. When data are encrypted, any data mining tasks becomes very challenging before decrypting data. Classification can apply to the customer records. This protects the customers’ sensitive information.
Read More...
-
Student Academic Report for Faculties
K. Rajakumari ; V. Aswini Priya; J. Mahesh Kumar; N. Rathiesh
Pages: 145 - 150
The Internet plays very important role in everyone’s life in all aspects and has enabled a great amount of information to be readily available and easily accessible. It has promoted several changes in the world, including in the education area and providing all the information whenever and wherever possible. Nowadays, there is a great amount of educational and training systems, which provide different functionality according to specific administrative, pedagogical and technological approaches. This paper describes a generic architecture for the faculties to monitor the students’ progress and other details regarding their online trainings. Then this architecture is discussed according to web technology, enabling a better understanding of the involved technological aspects of monitoring systems.
Read More...
-
Optimizing Spatio Temporal DRP for WRSNs using Heuristic Based Constraints
Mr. Thirukrishna. J. T ; Ms. Divyasree. G; Ms. Nivetha. S; Ms. Ramya. R; Mr. Suriya. R
Pages: 151 - 155
In Sensor Networks, Network Utility Maximization (NUM) problems rectified by using static-routing Rechargeable Sensor Networks (RSNs) with the link and battery capacity constraints. The NUM problems are very challenging as these two constraints are typically coupling in RSNs, which cannot be directly tackled. Existing works either do not fully consider the two coupled constraints together, or heuristically remove the temporally-coupled part, both of which are not practical, and will also degrade the network performance. The proposed system is attempted to jointly optimize the sampling rate and battery level by carefully tackling the Spatial temporally-coupled link and battery capacity constraints. The above mentioned problem, decouple the original problem equivalently into separable sub-problems by means of dual decomposition. Then, by implementing distributed algorithm in the context of joint rate and battery control, called Decouple Spatial temporally. The Coupled Constraint (DSCC), which can converge to the globally optimal solution. Numerical results, based on the real solar data, demonstrate that the proposed algorithm always achieves higher network utility than existing approaches. In addition, the impact of link/battery capacity and initial battery level on the network utility is further investigated.
Read More...
-
Automation of Student Registration Process for Choice Based Credit System
Dr. Nithya L. M ; Ms. Beena S; Ms. Sindhuja G
Pages: 156 - 161
Choice based credit system (CBCS) is a programme in which the students have a choice to choose from the prescribed courses, which are referred as core or elective courses and they can learn at their own pace. This selection of courses, faculty and enrolment is automated through online. Course registration process is very much crucial and important in a CBCS. In the manual system the students can enroll a course by visiting the respective staff for each and every course. The faculty cannot identify whether the particular student had studied the pre-requisite course or not. Manual registration process consumes more time because each student need to go in search of each faculty for enrolment of the course. Thus it results in waste of time and energy for each and every student. In the proposed automated CBCS registration system, all the student details are registered in the database. As it is developed as a web application, students can also register at their home. Students can login and view the course details and can enrol to that particular course. Only few courses have pre-requisite condition which the students must satisfy before enrolling to that particular course. Students can view the details of faculty and can enroll to the respective course. There is a limitation that each faculty can have only 60 students. The allocation of students is based on First Come First Serve basis. Students can earn a minimum of 18 credits to a maximum of 30 credits per semester as per their wish and convenience. At the end of the programme the students must earn the total credits as per the regulation.
Read More...
-
Online Living Campus (OLC) Application
Rajesh Kumar J ; Paarttipaabhalaji; Rohini. B; Uma D
Pages: 162 - 165
The main purpose of an organization is to foster a spirit of loyalty and to promote the general welfare of our society. An organization is an entity comprising multiple people, such as a Project “Online Living Campus (OLC) Application†is based on the area “Real Time Systemsâ€. A real time system is any information processing activity or system which has to respond to externally generated input stimuli within a finite and specified period. A real time system is one whose logical correctness is based on both the correctness of the outputs and their timeliness. In contrast, real time processing involves a continual input, process and output of data. Data must be processed in a small time period. In existing system, the motion is detected based on threshold frequency. With the help of threshold frequency, it calculates the frames and based on the frame difference it detects the motion. Also the CCTV system does not provide alerts of burglary happening at particular time. So there is a need of a system which will record the situation only if there is some movement happening in front of the camera and send alerts to the respected user. A major disadvantage for CCTV cameras is that they can only monitor a limited area. Criminals can vandalize the cameras in various ways, such as sticking gum or spraying something on the lens. They may even be able to change the angle of the camera. Criticism from the general public is usually about the lack of privacy and high cost to install for personal use. By implementing the system in real time and testing the system on a large number of long sequences, authenticated person can stop alert for fix time to enter into secured area by remote login. The proposed system will simulate the entire view of live streaming, human motion detection, etc. and modelled with some advanced features like snapshots, video recap, email and push notifications and so on. The UI of the system also have flexible options like pi shutdown /reboot button, contrast and brightness controller, etc.
Read More...
-
Challenges and Opportunity in Internet of Things (IoT)
G. Nivetha ; M. Udhayamoorthi; K. Theebak Kumar; C. Senthil Kumar
Pages: 166 - 173
The Internet of Things continues to develop, further potential is estimated by a combination with related technology approaches and concepts. Such as Cloud computing, Future Internet, Big Data, robotics and Semantic technologies. The idea is of course not new as such but becomes now evident as those related concepts have started to reveal synergies by combining them. However, the Internet of Things is still maturing, in particular due to a Number of factors, which limit the full exploitation of the IoT Overcoming those hurdles would result in a better exploitation of the Internet of Things potential by a stronger cross-domain interactivity, increased Real-world awareness and utilization of an infinite problem-solving space. Here the subsequent chapters of this will present further approaches and solutions to those questions.
Read More...
-
Detecting the Selfish Node in Wireless Sensor Network through Collaboration Filtering
T. Shanmugapriya ; Abarna. C; Tamilselvi. S; Samyuktha. P.
Pages: 174 - 177
Computer networking is the practice of interfacing two or more computing devices with each other for the purpose of sharing data. Computer networks are built with a combination of hardware and software components. Networking is simply an information exchange between you and another person. It involves establishing relationships with people who can help you advance your career in many ways. A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions. A WSN system incorporates a gateway that provides wireless connectivity back to the wired world and distributed nodes. The node failure is detected using EEACK method. Enhanced Adaptive Acknowledgement (EAACK) specially designed for MANETs. EAACK demonstrates higher malicious behavior detection rates in certain circumstances while does not greatly affect the network performances. EAACK is consisted of three major parts, namely, ACK, secure ACK (S- ACK), and misbehavior report authentication (MRA). EAACK requires all acknowledgment packets to be digitally signed before they are sent out and veriï¬ed until they are accepted. So it uses the DSA and RSA algorithm. The node failure is detected using probabilistic approach in the proposed system. Probabilistic approach is the combination of localized estimation, localized monitoring and node collaboration. Binary feedback and non-binary feedback are the algorithms used in this approach. The node failure detection using node collaboration leads to confusion for the source node. The size of the trace file increases due to different information’s. The information from the different nodes will not be similar which leads to confusion to the source node. The size of the trace files increase. A gathers information from its neighbors, and uses the information jointly to make the decision. The first scheme incurs lower communication overhead than the second scheme. On the other hand, the second scheme fully utilizes information from the neighbors and can achieve better performance in failure detection and false positive rates.
Read More...