Accepted Papers

  • ERP Robotic System
    Ashwini Dhamankar and Pooja Chankeshwara, Cummins College Of Engineering, India
    Enterprise resource planning (ERP) gives a company an integrated real-time view of its core business processes such as production, order processing, and inventory management. The aim of this project is to provide standalone ERP Robotic system and extend the functionalities of existing system. We are developing ERP system which will be integrated with robot. We are implementing two modules Sales & Distribution and Material Management where Customer can place his/her order, Company will process customer’s order in which company may interact with Supplier for required raw material and deliver the product to customer.
  • USB Storage device control in Linux
    Tushar Kute and Kabita Ghosh, Sandip Institute of Technology and Research Centre, India
    The world of communication is moving towards standardization of hardware ports. All kind of communication is now using USB as the port as it is universally recognized hardware medium of communication. It is become flexible and easy to us kind of things with portable USB storage devices to copy data from one system to another system. It is possible to copy data within seconds with the help of portable USB flash memory devices. It has leaded insecurity of data storage on computer system. Various surveys has shown after network copy only USB data copy has made data insecure on computer . It is also the source of malwares in the system. To disable the USB ports is not the solution to this problem because almost all peripheral devices now uses the USB ports for communication. So, we have implemented a system which has complete USB storage enable and disable control for Linux operating system. The administrator will decide the storage devices connected to USB must be enabled or disabled . We experimented the algorithm on Linux kernel version 3.9 onwards on Debian based distributions. We have got 100% success rate of the said system with 0% performance degradation.
  • Teeline Shorthand Character Recognition Using Artificial Neural Network
    Nirmala M and Nandhini V, Sona College of Technology, India
    This paper demonstrates the use of neural networks for developing a system that can recognize Teeline shorthand character and converted into respective English alphabets. In this paper we discuss implementing the architecture in real world character recognition. Each Teeline shorthand character is represented by binary values that are used as input to a simple feature extraction system, whose output is fed to our neural network system. The Artificial Neural Network is trained using Back Propagation algorithm.Which compromises Training, Calc- ulating Error, and Modifying Weights. A problem encountered with a 20 x 20 matrix is time-consuming training, which is conquered with Manual Compression.
  • Success Factors of Formal Languages for Industrial Use
    Irfan Ahmed 1, Sadia Hayat 1, Yasir Hafeez 2 Saiqa Bibi 2 and Zartasha Gul 2,University Institute of Information Technology,Pakistan
    Formal Methods comprise a clump of tools and practices depending upon mathematical models and formal logics which are brought into play to itemize and verify requirements and designs for software and hardware systems. Formal Languages are used for safety critical applications but their use in industry can also lead us to successful industrial application development. We have highlighted the success factors that how the formal languages can be used in industrial application development. Some success factors include ease of modelling; maximize automation, automatic verification improvement and improvement in result analysis etc. It has ever been the myths that usability of Formal Languages is for only critical systems, producing much cost and high level of understanding of mathematics etc. The purpose of this research is to promote the use of formal languages to improve usability of formal techniques in industrial use.
  • Implementation and Performance Analysis of DCT-DWT based watermarking algorithms for Video
    Alka N. Potkar and Saniya M. Ansari,Dr. D.Y.Patil School of Engineering,India
    Digital video watermarking was introduced at the end of the last century to provide means of enforcing video copyright protection.Video watermarking involves embedding secret information in thevideo. We propose Digital video Watermarking by proposed transform Algorithm based on DCT-DWT watermarking. By this method we can do secure image transmission. In this paper we proposed implementation and performance analysis of two different watermarking schemes based on DCTDWT.Discrete cosine transform (DCT) achieves good robustness against compression and other signal processing attacks due to the selection of perceptually significant transform domain coefficients. To check effectiveness of both techniques for Imperceptibility and robustness PSNR,MSE and NCC parameters are used.The experimental results demonstrate that the watermarking method has strong robustness against some common attackssuch as cropping,Gaussian noise adding, Salt & pepper noise adding.
  • Survey on “EAACK-A Secure Intrusion-Detection System For MANET’S”
    Dhanraj Walunj1and Dakshata Argade2,1Saraswati college of Engineering,India and 2Terna College of Engineering,India
    MANET is a collection of wireless mobile nodes forming a network without using any existing infrastructure. The migration to wireless network from wired network has been a global trend in the past few decades. The mobility and scalability brought by wireless network made it possible in many applications. Among all the contemporary wireless networks, Mobile Ad hoc NETwork (MANET) is one of the most important and unique applications. On the contrary to traditional network architecture, MANET does not require a fixed network infrastructure; every single node works as both a transmitter and a receiver. Nodes communicate directly with each other when they are both within the same communication range. Otherwise, they rely on their neighbors to relay messages. The self-configuring ability of nodes in MANET made it popular among critical mission applications like military use or emergency recovery. However, the open medium and wide distribution of nodes make MANET vulnerable to malicious attackers. In this case, it is crucial to develop efficient intrusion-detection mechanisms to protect MANET from attacks. With the improvements of the technology and cut in hardware costs, we are witnessing a current trend of expanding MANETs into industrial applications. To adjust to such trend, we strongly believe that it is vital to address its potential security issues. In this paper, we propose and implement a new intrusion-detection system named Enhanced Adaptive ACKnowledgment (EAACK) specially designed for MANETs. The results will demonstrate positive performances against Watchdog, TWOACK and AACK in the cases of receiver collision, limited transmission power and false misbehavior report. Compared to contemporary approaches, EAACK demonstrates higher malicious-behavior-detection rates in certain circumstances while does not greatly affect the network performances.
  • Eye Controlled Switching using Circular Hough Transform
    Sagar Lakhmani,Accenture Services Private Limited,India
    The paper presents hands free interface between electrical appliances or devices. This technology is intended to replace conventional switching devices for the use of disabled. It is a new way to interact with the electrical or electronic devices that we use in our daily life. The paper illustrates how the movement of eye cornea and blinking can be used for switching the devices. The basic Circle Detection algorithm is used to determine the position of eye. Eye blinking is used as triggering action which produces binary output through the parallel port of computer. This output is used for switching the particular device.
  • Improving Connectivity in Mesh Nodes
    Fanny May Joseph and A.Neela Madheswari,KMEA Engineering College,India
    Network partitioning is one of the unique challenges that occur in mobile ad-hoc networking environments. Team members might need to work in groups scattered in the application terrain in the case of crisis management and battlefield communication but the limitation makes MANETs unsuitable for such applications. Mission-critical information has to be delivered to the right person at the right place and time in order to support decision making processes in the case of emergency Response and Battle Command Systems. In the proposed Autonomous Mobile Mesh Network (AMMNET).forms multiple groups with a single node designated as the lead node responsible for inter group communication. The AMMNET designate a second node as the successor to the first node responsible for continuing intergroup communication in case of the lead node failure.
  • Multitasking with Monolithic MiniOS, a miniature operating system for Embedded Systems
    Sourav Maji and Shuva Jyoti Kar,Ericsson India Global Services Pvt Limited,India
    Embedded microcontrollers are often programmed in plain C and lack support for multithreading and real-time scheduling. This can make it very cumbersome to implement multitasking applications which require less computation per task. Need for apparent parallelism in the operation of more than one independent task is found in applications involving control systems and robotics where waiting for an input from one application must not hinder the processing of others. We have developed a Monolithic Operating System, named “MiniOS” for the Atmel ATmega16L AVR to show that it is feasible to use a priority based round robin scheduling even in a tiny 8-bit processor with 1 KB of RAM [11]. There is not sharp demarcation between the internal kernel data structures and the data used for the scheduler. This is purposely kept to make optimal performance of a low speed cpu coupled with a very small area of memory. Its usage is demonstrated in three applications each shedding light on the features, the operating system hosts. In the first we spawn three different tasks with different priorities, where they print out mutually exclusive characters on the console via the USART [8]. This demonstrates the idea of multitasking and the concept of saving states when a task is scheduled in and out by context switch and the working of the priority scheduler. The second demonstrates the usage of the delay subroutine which is a slight modification of the first in which three tasks of same priority are spawned and a delay of certain interval is injected in one. The third demonstrates the features of interprocess communication and a method of prioritizing various tasks with three tasks, where one task is an interface to the console for input and output and other two tasks are meant as counters implemented by LED’s.
  • Security Weaknesses On A Mutual Authentication And Key Agreement Scheme In Global Mobile Networks
    Prosanta Gope1 and Tzonelih Hwang2
    User mobility is a feature that raises many issues related to security. One of them is the disclosure of a mobile user's real identity during the authentication process, or the other procedures specific to global mobile networks (GLOMONET). Such disclosure allows an unauthorized third-party to track the mobile user's movements and current whereabouts. In this article, we address some problems of mutual authentication and key agreement with user anonymity for GLOMONET. Recently, Qi et al. proposed such scheme, which is claimed to be a slight modification of He et al.'s protocol based on smart card. However, we reveal that both the schemes still suffer from certain weaknesses which have been overlooked previously and thus they cannot achieve desired security.
  • Decoupling Object-Oriented Languages from Wide-Area Networks in Lamport Clocks
    Mario Luigi, University of Helan,
    Scatter/gather I/O must work. After years of robust research into the producer-consumer problem, we confirm the simulation of hierarchical databases, which embodies the practical principles of fuzzy operating systems. In order to fix this quagmire, we validate that while Byzantine fault tolerance and Scheme can collude to realize this objective, DNS and gigabit switches are largely incompatible.

  • Analysis of Routing Protocols for Ad Hoc Network using NS2
    Rahul Desai and B P Patil,Army Institute of Technology,India
    NS2 is discrete network simulator which is used for simulating various types of networks such as wired, wireless and ad hoc network. Different traffic patterns are generated and different mobility models are used to evaluate various performance metrics such as packet delivery ratio and delay etc. This paper describes the use of NS2 simulation tools starting from installation, compilation, various necessary tools such as XGraph, BonnMotion, cbrgen and setdest tools used along with NS2 to support and evaluate the network.
  • Cooperative Reinforcement Learning Approach for Routing in Ad Hoc Networks
    Rahul Desai and B P Patil,Army Institute of Technology,India
    Most of the routing algorithms over ad hoc networks are based on the status of the link, and recent transmissions on the link are used to detect the status of link (up or down). They are not capable of adapting the run time changes such as traffic load, delay and delivery time to reach to the destination etc, thus though provides shortest path, these shortest path may not be optimum path to deliver the packets. Optimum path can only be achieved when quality of links within the network is detected on continuous basis instead of discrete time. Thus for achieving optimum routes we model ad hoc routing as a cooperative reinforcement learning problem. In this paper, agents are used to optimize the performance of a network on trial and error basis. This learning strategy is based work in swarm intelligence: those systems whose design is inspired by models of social insect behaviour. This paper describes the algorithm used in Cooperative reinforcement learning approach and performs the analysis by comparing with existing routing protocols.
  • Security Camera for Motion Detection and Online Asset Management
    Abhinandan Shirahatti1 and Prakash Unki2,1Jain college of Engineering, India, 2Dr. P G Halakattit college of Engineering, India
    The most important factor in our life is our security. Whether it be for our home, or for our family, or, perhaps even the office, security precautions are becoming more necessary today. With this objective in mind many gadgets have been modeled to provide us with greater security. The most prominent of all the security devices are security cameras. This project also includes a module in which a particular drive or folder can be monitored for the changes. E.g.: if you select a drive to monitor every change made in the drive will be notified.
  • Ensuring Data Storage Security in Cloud Computing
    Abhinandan Shirahatti1 and Prakash Unki2,1Jain college of Engineering, India, 2Dr. P G Halakattit college of Engineering, India
    Cloud Computing has been treated as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services in trustworthy way is highly challengeable. This unique model brings about many new security challenges, which have not been well known. This activity studies the problem of ensuring the integrity of data storage in Cloud Computing. In particular, we consider the task of allowing a third party auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. The introduction of TPA eliminates the involvement of the client through the auditing of whether his data stored in the cloud are in real undamaged in any way, which can be important in achieving economies of scale for Cloud Computing. since services in Cloud Computing are not limited to archive or backup data only. This paper proposes data storage security in cloud based on auditing. Extensive security and performance analysis show that the proposed schemes are highly efficient and provably secure.
  • Dynamic Query Forms with Query Refinement and Ddatabase Encryption
    Meenu Joy,Adi Shankara Institute of Engineering and Technology, India
    In the present circumstances real world databases contain thousands of attributes and relations. Access the information from this corpulent database is a nontrivial task and is an exploring area. Queries are using for database access, but it is a thought-provoking task to the end user because, dearth of familiarity with query language and illiteracy of underlying schema. The new system uses the allowance of query by form methodology. In which the user is granted with a query form that will help the user to iteratively search the database and query enhancement is provided to the user by means of feedback or response. Ad hoc queries can also gratified by using this proposed system. Query enhancement by response is provided by ranking the attribute used in the form. Ranking is mean by precision and recall. To provide the security to the system and make it efficient for private database an encryption is applied.
  • Efficient FPGA Placement and Routing using Stochastic Tunneling
    Rajesh Eswarawaka, Noor Mahammad Sk and Eswara Reddy B, Jawaharlal Nehru Technological University, India
    This paper is entirely about the Genetic Algorithms And Its Application To The Field Programmable Gate Arrays (FPGA) Placement And Routing technique describing how different algorithms have been evolving for the purpose of the efficient placement and routing of the FPGA components reducing the heat and improving the performance inside the chip. Also in this project we tried to develop the genetic tunneling algorithm by combining the existing genetic annealing and the stochastic tunneling algorithms as part of the research hoping that it further improves the performance.
  • Cryptographic Steganography
    Vikas Yadav, Vaishali Ingale, Ashwini Sapkal and Geeta Patil, Army Institute of Technology, India
    The fingerprint images compression based on geometric transformed presents important research topic, these last year’s many transforms have been proposed to give the best representation to a particular type of image “fingerprint image”, like classics wavelets and wave atoms. In this paper we shall present a comparative study between this transforms, in order to use them in compression. The results show that for fingerprint images, the wave atom offers better performance than the current transform based compression standard. The wave atoms transformation brings a considerable contribution on the compression of fingerprints images by achieving high values of ratios compression and PSNR, with a reduced number of coefficients. In addition, the proposed method is verified with objective and subjective testingIn the cryptographic steganography system, the message will first be converted into unreadable cipher and then this cipher will be embedded into an image file. Hence this type of system will provide more security by achieving both data encoding as well as data hiding. In this paper we propose an advanced steganocryptic system that combines the features of cryptography and steganography. In this proposed steganocryptic system we will encrypt the message into cipher1 by using Kunal Secure Astro-Encryption and we again encrypt this cipher to cipher2 by using grid cipher technique. Advantage of Kunal Secure Astro-Encryption is that it generates random useless points in between, thus fixed size messages can be generated providing more security compared to other cryptographic algorithms as the number of characters in original message cannot be found from encrypted message without the knowing the black holes. Now we will embed this cipher2 into image file by using visual steganography .In this proposed steganocryptic system we will use modified bit insertion technique to achieve visual steganography. This proposed system will be more secure than cryptography or steganography techniques[digital steganography] alone and also as compared to steganography and cryptography combined systems.
  • Hybrid Memetic Algorithm For FPGA Placement and Routing Using Parallel Genetic Tunneling
    Rajesh Eswarawaka, Noor Mahammad Sk and Eswara Reddy B, Indian Institute of Information Technology Design and Manufacturing, India
    Field Programmable Gate Array (FPGA) is a Programmable chip or flexible and reusable circuits that can be configured or reconfigured by the designer, which can be used to quickly implement any digital circuits. One of the major step of FPGA design which determines the arrangement of logic blocks is the Placement. In this step, the logic functions are assigned to specific cells of the circuit. The quality of the placement of the logic blocks determines the overall performance of the logic implemented in the circuits. In this paper we proposed a combination of parallel genetic algorithm and stochastic tunneling technique to solve the placement problem. The Parallel Genetic algorithm treats every logic block as an active individual such that each logic block applies the Genetic algorithm simultaneously and does the local hill climbing to reach towards its best solutions and finally simulated annealing is done for the local improvement of the best solution such that it converges to a global optimum.
  • Vehicular Mechnicle Condition Determination and Traffic Density Estmation Using Acoustic Signal
    Minal Bhandarkar,Tejashri Waykole, G.S.Moze College of Engineering, India
    In this paper we will estimate the vehicular traffic density by using acoustic or sound signals. Here we will estimate three probable conditions of traffic that is heavy flow traffic (0-10km/h), medium flow(20-40km/h), and free flow(above 40km/h) traffic. Cumulative sound signals consist of various noises coming from various part of vehicles which includes rotational parts, vibrations in the engine, friction between the tires and the road, exhausted parts of vehicles, gears, etc. Noise signals are tire noise, engine noise, engine-idling noise, occasional honks, and air turbulence noise of multiple vehicles. These noise signals contains spectral content which are different from each other, therefore we can determine the different traffic density states and mechanical condition of vehicle. For example, under a free-flowing traffic condition, the vehicles typically move with medium to high speeds and thereby produces mainly tire noise and air turbulence noise. Here we uses SVM and ANN classifiers.
  • Mechanical Condition Determination of Vehicle using Acoustic Signal
    Bhumika J. Barai, Rahul nawkhare ,Wainganga College of Engineering and Management, India
    Vehicles may be classified by a number of different criteria and objectives. However, comprehensive classification is elusive, because a vehicle may fit into multiple categories; there are numerous ways of categorizing vehicles. Numerous jurisdictions establish vehicle classification according to the vehicles construction, engine, weight, type of fuel and emissions, as well as the purpose for which they are used. Vehicular acoustic signal have long been considered as unwanted traffic noise. However Vehicles of different types generate dissimilar sound patterns even in similar working conditions. Sound patterns generated by moving vehicles vary depending on their types and hint information necessary to classify the vehicles. Various sound sources include engine, rotating parts and exhaust system. Other factors influencing variation of sound are condition of the vehicle, environmental conditions, road conditions, maintenance of the vehicle and so on. Different types of noise coming from different vehicles mix in the environment and identifying a particular vehicle is a challenging one. In this work acoustic signals generated by different category of vehicles will be used to detect its presence and classify its type. Many acoustic factors can contribute to the classification accuracy of ground vehicles. Acoustic signal classification consists of extracting the features from a roadside acquired acoustic signal, and of using these features to identify classes the acoustic signal is liable to fit.