• ijmece issn number
  • open access journal
  • impact factor
  • Home
    Current Issues
    Previous Issues

    Volume-7 Issue-4

    Title: Multimedia Based Answering Framework in Mobile Cloud Computing

    Authors: P.Calduwel Newton and T.Cynthia

    Abstract: Multimedia Based Answering Framework (MBAF) is a framework that combines Text Based Answering Technique (TBAT), Image Based Answering Technique (IBAT) and Voice Based Answering Technique (VBAT) to answer semantically for farmers? queries. MBAF can be consumed as cloud service in mobile applications as well as web applications. Combining the answering techniques, help farmers to ask any mode of queries in single application. This framework is proposed as a cloud service, so that it can be utilized as a service in any kind of applications. To handle the requests in a distributed way, MBAF uses load balancers. Datasets used here are ontology, trained model by TensorFlow and Agent service by DialogFlow.

    Download file

    Title: High Speed In-Field Test for Faults in FIFO Buffers of NoC Router

    Authors: K Sharon Kamal and V Rajitha Rani

    Abstract: First-in-First-out (FIFO) buffers are getting progressively well-liked as buffer store between subsystems. On continuous usage they result in faults and failure. Over the time the intermittent faults become permanent faults. A test procedure with pipelining is enforced on the information in FIFO buffers. The test detects the faults thereby reducing the delay exploitation through pipelining. The performance of pipelining is measured in terms of delay in conjunction with area by synthesizing the circuit.

    Download file

    Title: Wi-Fi 6 Technology- A Review

    Authors: Ram Krishan

    Abstract: Wi-Fi 6 is a next generation technology which is based on the IEEE 802.11ax standard. This technology will enable the connectivity of next generation Wi-Fi. Wi-Fi 6 will deliver the capacity, coverage and performance to effectively meet the increasing and evolving use of the Wi-Fi technology. Wi-Fi 6 is the new terminology to easily understand Wi-Fi network devices and its connectivity. This paper will review the various key features and new generational methodology of Wi-Fi 6.

    Download file

    Title: The Modern Approach towards Better Agriculture Management with Comparative Study of Micro Controllers

    Authors: Shikha Ujjainia, Pratima Gautam and S. Veenadhari

    Abstract: In the digital era, the IoT devices are kept their feet everywhere in the world. Irrespective of any field such as Engineering, Medical, E-Commerce, Defence and the last but not least Agriculture the importance of IoT applications is being widely realized. The IoT devices are helpful in finding out the better environment for higher crop yields in less time and investment. Many IoT boards or micro controllers are recently available commercially all across the globe. The aim of this paper is to select the best microcontroller suitable for acquiring the information in real time. In this study two microcontrollers are compared which are mostly used by students and researchers to develop an IoT device based decision systems. The analysis of microcontroller is based on some specific criteria like processor speed, hardware design, software design etc. In this study the real time taken by different sensors and sending the data to cloud is being analyzed and compared.

    Download file

    Title: A survey on application of data mining techniques for agricultural data analysis

    Authors: Nishchal Adil, Somesh Dewangan and Kusum Sharma

    Abstract: India leads the world in production of milk, pulses and jute. In terms of agriculture production, India has gained second position all around the world. The farming sector and its associated industries such as lumbering, forestry, and fishing contribute high percentage towards the GDP of the country. As half of the manpower of India is employed in this sector, it is the largest source of livelihood in India. However, India still has many concerns related to agriculture. Use of data mining technologies in agriculture can help farmers in decision making and help them yield in a better way. In this review paper, the role of data mining and their related work by several authors in context with agriculture field has been discussed. It conjointly discusses diverse applications of data mining targeted to solve agricultural issues. To help other researchers to get information of current scenario of data mining techniques and applications in context to agriculture field, the work of various authors has been consolidated in this paper.

    Download file

    Title: Design and Implementation of Automated Rotating Bridge using PLC

    Authors: Sanjoy Biswas and Uttam Basu

    Abstract: Obstacle avoidance & light following robot can be used for Industrial purpose & Military operation. The major components include an Arduino Uno R3, Servo motor, BO motor, L298N motor driver, LDR module, Ultrasonic HCSR-04 sensor & holder, Chassis body, Battery & battery holder. The system is controlled by the Arduino Uno R3 module which is an advance version of a microcontroller and a part of embedded system. In this work, we have designed a robot, which is compact, autonomous and fully functional. It is a proposed model which can be used in such an environment, which may be vulnerable and risky to human being. It has four types of functions. The functions are light following, obstacle detection and controlling from an android device through Bluetooth or Wi-Fi module& capture the video clips of that area. Obstacle avoider light follower robot detects the light (such as the light of flashlight) and follows light on travelling path. Also it can detect the obstacles while it is moving and make the passes by the obstacles. The robot has two light detection sensors which are prepared with LDRs and an infrared obstacle detecting sensor. The sensitivity of the light sensor can be set by using the trim pots.

    Download file

    Title: Blockchain based Smart Contract for Sealed-Bid Auction

    Authors: B L V Vinay Kumar and Dr K Raja Kum

    Abstract: In this growing world, Internet has changed so much to an extent that it turned into a powerful tool in every aspects of our lives. E-auction is one of those things which helps the bidders to take part in an auction online over the air. In a sealed bid third parties need to pay an extra cost to help the buyers and sellers carry out their exchange without any hassle. But there can be a breach of trust by the third parties. Owners of the auction or the company that is auctioning can have direct entry to it when the auction is run on a decentralized platform. When the users auction off something on the chain, the smart contract takes control of the auctioned asset and thereafter it manages the bids associated. In this paper, we execute a smart contract for a verifiable sealed-bid auction on the Ethereum blockchain. The type of auction used is sealed-bid in which the bidders submit their bids privately and each bidder can participate only once. As per the biddings received, the highest bidder wins and pays the highest corresponding highest submitted bid. Additionally, before the auction ends the bidder can withdraw the bid after submitting it. In such a case the bidder will have another chance to place the bid. This smart contract implementation abides by the true essence of a sealed-bid, to be precise, no information about the biddings is leaked to the bidders except for the highest bid.

    Download file

    Title: Data Migration: Types and Challenges

    Authors: Stuti Nareshkumar Garg, Pratibha Bhahulkar, Prof. Ketan Rathod and Prof. Amita Garg

    Abstract: Database migration has been an ongoing issue since data has been collected. Inevitably, new systems are designed which are intended to be more efficient, user friendly, inclusive, and current than older systems. In some cases, new systems are developed simply to replace older systems, and the justification may be new software trends, financial constraints or windfalls, new management initiatives, user complaints, or other reasons. In other some instances, new systems are developed to replace older ones that have become too complex or outdated and which resist further modification and evolution. This paper deals with the process of data migration in detail, along with the types and the challenges faced during migration and primarily on cross platform migration.

    Download file

    Title: Analysis of Cognitive Radio Spectrum Sensing Techniques over Nakagami-m Fading Channel

    Authors: Mohammad Shahnawaz Shaikh and Dr. Pavan Kumar Khare

    Abstract: As the demand of wireless communication increases exponentially, with the same ratio scarcity of spectrum also originates. To overcome this spectrum scarcity a novel approach, Cognitive Radio (CR) shows development of an opportunistic and promising technology. This paper explores implementation and analysis of the CR spectrum sensing techniques such as Matched filtering, Energy detection and Cyclostationary feature detection on MATLAB platform by simulation. We analyze performance of these techniques over, Nakagami-m fading channel with AWGN channel for both the BPSK and QPSK modulation.

    Download file

    Title: A Novel Key Technique for Wireless Sensor Networks

    Authors: Naeem Naik

    Abstract: Key management is one in all the foremost vital issues of any secure communication. With the increasing demand for the transmission security in wireless detector networks (WSNs), it's pressing to introduce the secure and reliable key management scheme into the WSNs. during this paper, we have a tendency to projected a hierarchical key management theme to make sure the security of the network services and applications in WSNs. Scrutiny to the cluster key management protocol, our projected methodology will save a lot of computing and transmission energy through hierarchical style. Moreover, we improve the OFT (one-way hash perform tree) by CRT (Chinese Remainder Theorem) in order that it will be utilized in the large-scale WSNs. we have a tendency to designed some experiment to guage the protection and performance of this methodology, and also the experimental results show that the projected methodology are able to do satisfying results.

    Download file

    Title: User Perspective Based APP Recommendation System

    Authors: Sarun K T, K R Remesh Babu, Praveen A N and Elizabeth Shelry

    Abstract: Now huge numbers of smart phone applications are part of our daily life. Since there are several applications with different features, users often experience difficulty in selecting the best mobile application for their exact purpose. It is also observed that and these applications may not be useful for particular user needs. Identifying an exact application for the user needs from a large catalogue is pretty hard. Hence a good recommendation system plays a key factor in selecting these applications. It is also a fact that for a user it is time consuming and burden to read all the reviews about each search suggestion. These reviews may not be always genuine, and fraudulent reviews are very common. In the proposed user perspective based APP recommendation system (UPBARS) suggests applications based on individual interests. Here usage statistics of each application is considered as the measure of user likeness towards an application. In this proposed method collaborative filtering is used to identify similar users based on their likeness. Once similar users are clustered, application liked by the clustered users form a candidate for the recommendation. Each candidate is ranked using a deep neural network model based on user perspectives as input features. The feature includes privacy preferences, size, functional category, in-app interests, ad-content, ratings, and user demography. The score for each application represents the probability that a user likes the application. The experimental result shows the effectiveness of the proposed method.

    Download file

    Title: Low Power 4-Bit Arithmetic Logic Unit Using Full-Swing GDI Technique

    Authors: N Kiran Kumar

    Abstract: Power dissipation and space of the circuit area unit the most problems within the industry, this paper provides a style of 4-Bit Arithmetic Logic Unit (ALU) exploitation Full-Swing GDI Technique, that thought of a good technique for low power digital style whereas reducing the realm of the circuit compared to alternative logic designs. The projected ALU style consists of 2x exploitation 65nm TSMC method. The results show that the projected style consume less power exploitation less range of transistors, whereas achieving full swing operation compared to previous work

    Download file

    Title: Design of low power, mixed logic 2x4 decoders using FinFET

    Authors: Parvesh kumar and Neelam Rup Prakash

    Abstract: This paper presents the design of 2x4 decoders using mixed -logic design methodology which combines the transmission gate logic and pass transistor logic with the static CMOS using FinFET. FinFET?s have emerged as the successor to the MOSFET technology because of the increased leakage current and various short channel effects that limits the use of MOSFET at deeply scaled technology nodes. Two circuits for the decoder are presented here: a 14 transistor circuit for reduction of transistor count and power dissipation and a 15 transistor circuit for high power delay performance. Decoders are designed using both MOSFET and FinFET technologies and the results (power dissipation, delay) are compared. 32nm technology is chosen for the circuits and the simulations are done using HSpice software.

    Download file

    Title: Multitaper ?MFCC features for Speech Recognition under noisy environments

    Authors: P.Sunitha and Dr.K.Satya Prasad

    Abstract: Environmental noise is a key factor which affects the performance of the speech recognition system and results in poor recognition accuracy. This paper explores a new method for speech recognition system under noisy environments. The recognition accuracy of a speech recognition system strongly depends on feature extraction and classification techniques. To overcome this problem, the proposed method uses speech enhancement module as a pre-processing operation to reduce the background noise. Later feature extraction was done on enhanced speech using low variance multi-taper spectrum estimation and further classification, training and testing was done using HTK tool kit. Performance of the proposed method was evaluated in terms of recognition accuracy which shows its superior performance when compared to other feature extraction techniques like LPCC (in time &frequency domains), MFCC under noisy and enhanced speech cases.

    Download file

    Title: Practical Calculations of Reliable Long Range High Frequency Radio Communications in Libya

    Authors: Mohamed Yousef Ahmed Abou-Hussein

    Abstract: The Radio frequency transmission between 2 And 30 MHZ by conventional high-frequency (HF) radio; utilization of HF waves and their medium of transportation require the ionospheres. The ionospheres represent the most exclusive means by which long-distance radio communication can be transmitted without the need of repeaters and with relatively low-transmitter power is carried on by using the optimum transmission operating frequency. The aim of this research is to investigate in the long range HF radio communication in Libya at different times of a day as well as in different seasons of a year. The central radio propagation laboratory (CRPL) method of iono-spheric prediction of the National Bureau of Standards (NBS) in USA was used in practical calculations of reliable HF radio communication links in Libya. The results show that the predicted frequencies are changeable between 2 to about 19 MHz during daytimes and seasons over different routes between various points in Libya. The conclusion: the predicted frequencies are changeable, to suit changing in propagation conditions of the E-ionospheric reflecting layer related to the day times, seasons of the year and solar activity. Therefore, the optimal utilization of point to point HF radio communication systems will be obtained under ionospheric influence in Libya.

    Download file

    Title: Energy Efficient LED Driver

    Authors: Pritam Prakash Kadam and Jyoti S. Rangole

    Abstract: This paper describes the high efficiency LED driver with dimming facility incorporated in it. This dimming facility will help to reduce in power saving of LED street light during night time. The design of a current programmable LED driver with efficiency of 92?1% is described in this paper. One major challenge of designing such a LED driver is need for supporting a wide range of output voltages. Thus each LED fixture is powered by a compatible driver of corresponding wattage. There is possibility of circuit damaging in case of incompatibility due to higher voltages or current or flickering may occur in light. This problem can be avoided by having a single driver compatible with all the LED light fixtures .The various parameters related to LED drivers are taken into consideration while designing for a better performance.

    Download file

    Title: Design of a Voltage Reference Circuit

    Authors: Dr. Jasbir Kaur and Shivani

    Abstract: This paper describes the design of a reference voltage, implemented using 180nm CMOS technology. Firstly, the design has been made using a simple current mirror. This circuit generates a reference voltage of 1.1948V. It can operate between -40oC to 125oC. Total variation of reference voltage within this temperature range is 0.62mV which is 0.05189% of the reference voltage. Secondly, the circuit is made using a better current mirror, i.e. a cascode current mirror for better matching purpose. This circuit generates a reference voltage of 1.10857V. It can also operate between -40oC to 125oC. Finally, the variation of the reference voltage with the variation of supply voltage is analyzed.

    Download file

    Title: FBMC (Filter Bank Multicarrier) Based MIMO (Multiple Input Multiple Output) System for E-health care Applications.

    Authors: Uzma, Javaid A.Sheikh and G.M.Bhat

    Abstract: One of the main concern for e-health care system is the proper reception of the medical data that needs to be transmitted for better tele-diagnosis. For achieving this purpose, we introduce Filter Bank Multicarrier (FBMC) based Multiple Input Multiple Output (MIMO) system for the transmission of image data (medical image). FBMC offers various ways to overcome the known limitations of OFDM of reduced spectral efficiency and strict synchronization requirements. MIMO on the other hand provides the link reliability with the use of multiple antennas at the both end of the transmission link, thus leads to least erroneous reception of the medical image at the receiver. The performance has been further improved by changing the diversity order of the system. The designed communication system can even be integrated with the 5G communication standards. A MATLAB programme has been developed for the simulation of such a communication system, were the data to be transmitted is taken to be the medical image. The performance of the said system has been verified in terms of the Bit Error Rate (BER) and Power Spectral Density (PSD). The Peak Signal to Noise Ratio (PSNR) of the transmitted image and the image received at the receiver has also been calculated.

    Download file

    Title: Strategic Analysis of Compliance, Governance and Security for Sales force

    Authors: T. Geetha Lakshmi and M. Kavitha

    Abstract: Sales force is one of major leading CRM (Customer Relationship Management) software which is benefits from cloud. It has more than 1000?s applications to support various features like generating new leads, acquiring new leads, increasing sales and closing the old deals. It is designed to manage the organization's data focused on customer related application and sales related details. It also offers features to personalize its native data structures and GUI to suit the specific needs of a business. More recently, it has started offering the IOT (internet of things) connectivity to the CRM platform. Large companies have established policies for corporate governance, and many others follow security policies to safeguard consumer or financial information. This paper we focus on Sales force Data, Metadata, and Tooling API to generate powerful reports that help achieve better compliance, governance, and security. Sales force Shield provides additional native capabilities and other useful services.

    Download file

    Title: Studies on Secure Energy Efficient Routing Algorithm in WSNs

    Authors: Rajiv Ranjan Tewari and Snehi Saraswati

    Abstract: The evaluation of minimum spanning tree is helpful in the transmission of route data to a sink node during huge scale sensor network. In this route,a node may compromised and compromised node may be included and false data can be injected. It is also possible that the compromised node can change the existing data. In these circumstances, a Compromised node Locator protocol (COOL) is to be used to provide a security in Wireless sensor networks. COOL is su cient to remove compromised node from the WSNs. In case of detection of compromised node, this protocol can help to prevent more damages from unnatural/ unbehaved node.This constructs an energy saving and reliable WSNs. There is a need of technique or algorithm in which a path should be formed having minimum spanning tree by which the COOL protocol (security) in WSNs is to be maintained. It is challenging task to combine COOL protocol and MST (minimum spanning tree) and creates an energy conserving and secure WSNs. During these process sensor nodes communicates through our sink nodes. All other nodes send the data through routing by the sink node. The hash values are to be used to check the consistency of nodes.

    Download file

    Title: An Efficient Scheme for Spammer Identification Using Multiclass Classification in Mobile Cloud

    Authors: M. Kavitha and T. Geetha Lakshmi

    Abstract: In machine learning and cyber security fraternity, spam identification methods have been studied for several years. Spammer has been growing since mobile devices usage increases. With the growth of mobile network, spammers have organized into multiple categories for the purpose of benefit maximization, which has caused data Imbalance problem. It is very difficult to categories spammers from multi users owing to the classification of multi-dimensional data. To Avoid this problem, in this paper proposes a Spammer identification Multiclass Classification Scheme based on scikit-learn (SIMCCSL) that utilizes machine learning for industrial mobile networks. We greatly improve the performance of our proposed multi category classification based on scikit-learn. It is a high-level framework designed for supervised and unsupervised machine learning algorithms. Simulation results show that SIMCCSL outperforms these previous schemes in terms of recall, precision, and time complexity.

    Download file

    Title: Application of Spatially WeightedSoftClustering Methods for the Detection of DiabeticRetinal Abnormalities in Multiple Kernel domain

    Authors: R.Ravindraiah and S.Chandra Mohan Reddy

    Abstract: Microvascular discrepancies linked with persistent hyperglycaemia triggers vision threatening Diabetic Retinopathy (DR). It is a metabolic inability to control the blood glucose levels. It is originated with less production of pancreatic secretion or the body resistance to make use of it. The progression of the condition can be slowed with proper diet supervision and periodic medical administer. DR will lead to complete vision loss in the victim?s having prolonged history of diabetes, who do not taken mere steps to manage it. The condition is characterized with blocked or ruptured blood vessels (BVs) leaking blood, protein and fat based particles into the retinal fundus. These particles are get clotted and are called as Exudates, which obstruct the light flow onto the retina and hence affects the vision. Due to the lack of blood supply, new BVs are triggered to nurture the retina. These new BVs are more sensitive and can get easily ruptured, which makes the complication more severe. Instinctive methods aids the clinicians in easy identification and conclusions regarding the state of the pathology. This paper presents a spatial weight induced soft clustering methods for the detection of lesions in DR fundus images using a novel kernel domain. The performance of these methods are compared with the existing state of art methods and is observed statistically optimum.

    Download file

    Title: Automated Vehicle Tyre Monitoring System

    Authors: Ananda M and Adithya Prathipna M K

    Abstract: This research work presents a system which automatically monitors the tyre condition of vehicles, namely pressure and temperature and using ESP32 microcontroller and sensors like pressure sensor and temperature sensor to monitor the overall wellbeing of a vehicle tyre. This work considers the physical parameters which affect the health and functioning of tyres and present an optimal way to monitor tyre condition. The system consists of two parts, one of which is directly screwed onto the valve stem of tyres and the other is placed inside the vehicle to relay information to the driver about the tyre condition. Data transfer between the isolated modules on tyres and the onboard module happens wirelessly. Issues such as reduced or increased tyre pressure and overheating of tyres can be detected using this system by necessary computations at the main controller and indicated to the driver.

    Download file

    Title: Big Data Analytics Application For Smart Grid Failure Detection-A survey

    Authors: Paramanand.S.Patil and Anand.S.Melinmani

    Abstract: Data analytics are now playing a more important role in the modern industrial systems, driven by the development of information and communication technology, an information layer is now added to the conventional electricity transmission and distribution network for data collection, storage and analysis with the help of wide installation of smart meters and sensors. This paper reviews potential applications of big data analytics for smart grid failure detection.(2) Until now there has been no unified definition of Smart Grid, but some characteristics of Smart Grid are identified as self-healing, Interaction, Optimization, Compatibility, Integration. due to involvement of modern intelligent devices in the said characteristics nature of smart grid generate enormous data and this data need to be analyzed in detecting fault condtion,self healing,futre prediction of smart grid. Data analytics involve Diagnostic analytics aim to understand the cause of events and system behavior and tries to identify challenges and opportunities. and predictive analytics are used to make probabilistic predictions to identify trends with the aim to determine what might happen in the future. This paper reviews these data analytics methods which can be used in smart grid failure detection and future research opportunities in this field.(1)

    Download file

    Title: Comparative Study of Band Pass Filters Used in Wireless Communication

    Authors: Mr. Sunil Gagare and Dr. Dolly Reney

    Abstract: Advances in microwave filter design methods has proved its significance for use in wireless communication systems. Modern wireless communication systems require microwave filters to have stringent specifications such as compact size, robust, conformal, light weight and more importantly cost effective while maintaining its electrical characteristics. Micro-strip filter design and reconfigurable filters present a better prospectus in this regards as it meets the specifications of modern wireless communication applications. Tunable filters can provide control over parameters such as frequency, bandwidth and selectivity while reducing the need of number of switches sandwiched between electrical components. Meta-materials have provided a new dimension for designing microwave filters.In this paper, we present a critical and through review on design methods for reconfigurable band-pass filters for next generation wireless technologies such as 4G, 5G and IOT.

    Download file

    Title: Moving Object Detection Methods in Video Analysis: A Review and Comparative Evaluation of AGMM and MCSHM

    Authors: Snehal S. Shirke and Sachin B.Jadhav

    Abstract: Moving object detection is very essential task in various computer vision applications. Moving object can be detected by various methods i.e. Background subtraction, frame differencing, optical flow method etc. All these are traditional methods which are widely used.. Some of these traditional methods are based on stable background; and hence they cannot be applied to dynamic background. Multiple color space histogram model is a great solution to this problem. Also Adaptive Gaussian Mixture Model is applicable to the dynamic scenes. In this paper we discuss these two methods. And results of both the models are compared here.

    Download file

    Title: Functions of generalized Besov space and their approximations by Haar Wavelet with applications in solution of Numerical Integration

    Authors: Shyam Lal and Neha Patel

    Abstract: In this paper, approximations of function f belonging to generalized Besov space by Haar Wavelet expansion have been determined. These estimators are new sharper, better and best possible in Wavelet Analysis. Numerical integrations have been calculated using Haar Wavelet expansions. It is observed that the value of integrations obtained by Haar Wavelet expansions and exact integration are almost same. This is a main achievement in Wavelet Analysis.

    Download file

    Title: Web Service Reliability and Prediction Using CUCKOO Search Clustering

    Authors: Pallavi Tiwari and Dr. S Srinivasan

    Abstract: The web services, a novel paradigm in software technology, have innovative mechanisms for transcription services over diversified environment. It is capable to allow businesses, to adapt quickly changes in the business environment and the desires of different customers. The rapid introduction of new web services in a dynamic business environment can unfavourably affect the service quality and user satisfaction. Subsequently, assessment of the quality of web services is of paramount importance in selecting a web service for an application. In this paper proposed a time-effectiveness, reliability prediction approach of Web Service (WS) which employs a neighbourhood-based approach for identifying similar neighbours (Web services or service users) to predict the web service reliability. Services are categorized based cuckoo search. This collaborative reliability prediction method obtains better reliability prediction accuracy than other approaches. The Cuckoo Algorithm is used which is proved to be well converged and makes quick calculations. The simulation conducted on different types of network typologies proved that it is a practical and influential algorithm.

    Download file