Area
Machine Learning

Author
Rabina

Org/Univ
S.S.C.E.T, Badhani,Punjab, India

Keywords
Data mining, weka, Prediction, machine learning.

View AbstractCitationCo-authorsView PDF

Co-authors

Er. Anshu Chopra

Abstract

: Two approaches to building models for prediction of the onset of Type diabetes mellitus in juvenile subjects were examined. A set of tests performed immediately before diagnosis was used to build classifiers to predict whether the subject would be diagnosed with juvenile diabetes. A modified training set consisting of differences between test results taken at different times was also used to build classifiers to predict whether a subject would be diagnosed with juvenile diabetes. Supervised were compared with decision trees and unsupervised of both types of classifiers. In this study, the system and the test most likely to confirm a diagnosis based on the pre-test probability computed from the patient's information including symptoms and the results of previous tests. If the patient's disease post-test probability is higher than the treatment threshold, a diagnostic decision will be made, and vice versa. Otherwise, the patient needs more tests to help make a decision. The system will then recommend the next optimal test and repeat the same process. In this thesis find out which approach is better on diabetes dataset in weka framework. Also use feature selection techniques which reduce the features and complexities of process

Cite this paper

IEEE
Rabina, Er. Anshu Chopra. Diabetes Prediction by Supervised and Unsupervised Learning with Feature Selection, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Rabina, Er. Anshu Chopra (2016). Diabetes Prediction by Supervised and Unsupervised Learning with Feature Selection. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Rabina, Er. Anshu Chopra. "Diabetes Prediction by Supervised and Unsupervised Learning with Feature Selection." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
Computer Networks

Author
Neetika Lalotra

Org/Univ
Punjabi University Patiala, India

Keywords
Call admission control, bandwidth allocation, bandwidth sharing, Multi-cell division.

View AbstractCitationCo-authorsView PDF

Co-authors

Devasheesh Sharma

Abstract

-- The cell migrations take place between the different network operators, and require the significant information exchange between the operators to handle the migratory users. The new user registration requires the pre-shared information from the user’s equipment, which signifies the user recognition before registering the new user over the network. In this thesis, the proposed model has been aimed at the development of the new call admission control mechanism with the sub-channel assignment. The very basic utilization of the proposed model is to increase the number of the users over the given cell units, which is realized by using the sub-channel assignment to the users of the network. The proposed model is aimed at solving the issue by assigning the dual sub channels over the single communication channel. Also the proposed model is aimed at handling the minimum resource users by incorporating the load balancing approach over the given network segment. The load balancing approach shares the load of the overloaded cell with the cell with lowest resource utilization. The proposed model performance has been evaluated in the various scenarios and over all of the BTS nodes. The proposed model results have been obtained in the form of the resource utilization, network load, transmission delay, consumed bandwidth and data loss. The proposed model has shown the efficiency obtained by using the proposed call admission control (CAC) along with the new load balancing mechanism. The proposed model has shown the robustness of the proposed model in handling the cell overloading factors.

Cite this paper

IEEE
Neetika Lalotra, Devasheesh Sharma. Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Neetika Lalotra, Devasheesh Sharma (2016). Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Neetika Lalotra, Devasheesh Sharma. "Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
Mechanical Engineering

Author
Neeraj Kumar

Org/Univ
M.I.E.T. Kurukshetra,Haryana, India

Keywords
Friction stir welding, metal flow, process parameters, mechanical properties

View AbstractCitationCo-authorsView PDF

Co-authors

Virender Kumar

Abstract

The comprehensive body of knowledge that has built up with respect to the friction stir welding (FSW) of aluminum alloys since the technique was invented in 1991 is reviewed on this paper. The basic principles of FSW are described, including metal flow and thermal history, before discussing how process parameters affect the weld microstructure and the likelihood of defects. Finally, the range of mechanical properties that can be achieved is discussed. It is demonstrated that FSW of aluminum is becoming an increasingly mature technology with numerous commercial applications. Keywords - Friction stir welding, metal flow, process parameters, mechanical properties

Cite this paper

IEEE
Neeraj Kumar, Virender Kumar. A Study on Friction Stir Welding of Various Aluminum Alloys, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Neeraj Kumar, Virender Kumar (2016). A Study on Friction Stir Welding of Various Aluminum Alloys. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Neeraj Kumar, Virender Kumar. "A Study on Friction Stir Welding of Various Aluminum Alloys." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
Network Security

Author
Reena Kumari

Org/Univ
Desh Bhagat University, Mandi Gobindgarh, India

Keywords
AODV, Grey hole, MANET, PSO.

View AbstractCitationCo-authorsView PDF

Co-authors

Neha Goyal

Abstract

MANET (Mobile Ad Hoc Network) is a type of ad hoc network that can change locations and configure itself, because of moving of nodes. As MANETs are mobile in nature, they use wireless connections to connect various networks without infrastructure or any centralized administration. While the nodes communicate with each other, they assist by forwarding data packets to other nodes in the network. Thus the nodes discover a path to the destination node using routing protocols. Gray hole attack among the different types of attacks possible in a MANET. Gray Hole attack is one type of active attack which tends to drop the packets during transmission the routing from source to destination .In this paper, we simulate gray hole attack Detection and prevention technique using AODV and AODV+PSO. Performance metrics Packet dropped or packet loss, End to End delay and Average throughput, the performance analysis has been done by using simulation tool ns-2 which is the main infrastructure.

Cite this paper

IEEE
Reena Kumari, Neha Goyal. Review on Rank Base Data Routing Scheme with Grey Hole Detection & Prevention in MANETS, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Reena Kumari, Neha Goyal (2016). Review on Rank Base Data Routing Scheme with Grey Hole Detection & Prevention in MANETS. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Reena Kumari, Neha Goyal. "Review on Rank Base Data Routing Scheme with Grey Hole Detection & Prevention in MANETS." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
Network Security

Author
Suman Brar

Org/Univ
Department of Computer Science and Engineering, GCET, Gurdaspur, India

Keywords
Greyhole, Manet, AODV, attack.

View AbstractCitationCo-authorsView PDF

Co-authors

Mohit Angurala

Abstract

— These Grey Hole attacks poses a serious security threat to the routing services by attacking the reactive routing protocols resulting in drastic drop of data packets. AODV (Ad hoc on demand Distance Vector) routing being one of the many protocols often becomes an easy victim to such attacks. The survey also gives up-to-date information of all the works that have been done in this area. Besides the security issues they also described the layered architecture of MANET, their applications and a brief summary of the proposed works that have been done in this area to secure the network from Grey Hole attacks

Cite this paper

IEEE
Suman Brar, Mohit Angurala. Review on Grey- Hole Attack Detection and Prevention, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Suman Brar, Mohit Angurala (2016). Review on Grey- Hole Attack Detection and Prevention. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Suman Brar, Mohit Angurala. "Review on Grey- Hole Attack Detection and Prevention." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
Wireless Communication

Author
Jagdish Singh

Org/Univ
CTITR Jalandhar, India

Keywords
PCF, DCF, EDCF, Load, Network Load and Data Dropped, Media Access Delay Attempts.

View AbstractCitationCo-authorsView PDF

Co-authors

Joykaran Singh

Abstract

with the enhancement of wireless network, QoS has become major researcher area. IEEE802.11 standard has two sub layers MAC protocols like as Distribution Coordination Function (DCF), Point Coordination Function (PCF). Medium access coordination function basically implements the Distribution Coordination Function (DCF) and Point Coordination Function (PCF) which support just to best effort service but have limited to QoS services. A new standard, Enhanced Distribution Coordination Function (EDCF) is reported .The IEEE 802.11e (EDCF) which defines the MAC procedures to support QoS requirements and that specifies distribution based access scheme to access the shared wireless media. In this paper, Protocols are tested under realistic conditions to perform evaluation of the coordination functions. Various parameters such as load, network load, media access delay, data dropped are tested in wireless network. Furthermore, the simulative observation is reported at data rate of 66Mbps using a physical layer protocols such as IEEE 802.11n to stumble the best one to implement with EDCF to achieved improved QoS.

Cite this paper

IEEE
Jagdish Singh, Joykaran Singh. Comparative Analysis of PCF, DCF and EDCF over IEEE 802.11 WLANs, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Jagdish Singh, Joykaran Singh (2016). Comparative Analysis of PCF, DCF and EDCF over IEEE 802.11 WLANs. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Jagdish Singh, Joykaran Singh. "Comparative Analysis of PCF, DCF and EDCF over IEEE 802.11 WLANs." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
Image Processing

Author
Kamalpreet Kaur

Org/Univ
Punjab Technical University,Punjab, India

Keywords
Medical Images, ROI, Security, Attacks

View AbstractCitationCo-authorsView PDF

Co-authors

Er. Suppandeep Kaur

Abstract

In this article, we focus on the complementary role of watermarking with respect to medical information security (integrity, authenticity …) and management. We review sample cases where watermarking has been deployed. We conclude that watermarking has found a niche role in healthcare systems, as an instrument for protection of medical information, for secure sharing and handling of medical images. The concern of medical experts on the preservation of documents diagnostic integrity remains paramount. Medical image watermarking is an appropriate method used for enhancing security and authentication of medical data, which is crucial and used for further diagnosis and reference. This paper discusses the available medical image watermarking methods for protecting and authenticating medical data. The paper focuses on algorithms for application of watermarking technique on Region of Non Interest (RONI) of the medical image preserving Region of Interest (ROI).

Cite this paper

IEEE
Kamalpreet Kaur, Er. Suppandeep Kaur. Review of Image Watermarking Technique for Medical Images, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Kamalpreet Kaur, Er. Suppandeep Kaur (2016). Review of Image Watermarking Technique for Medical Images. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Kamalpreet Kaur, Er. Suppandeep Kaur. "Review of Image Watermarking Technique for Medical Images." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
Digital Image Processing

Author
Prabhjot kaur

Org/Univ
Punjabi University Regional Centre for Information Technology and Management, Mohali, India

Keywords
Breast cancer, Mammogram, Convolution Neural Network (CNN), GLCM (Gray Level Co-occurrence Matrix), GLDM (Gray Level Difference Method).

View AbstractCitationView PDF

Abstract

Breast Cancer is one of the dangerous diseases which lead in resulting deaths among women. This is due to the presence of cancerous cells that are produced in extra amount of proportion which can replace the neighboring non-cancerous cells or it can infect all over the body. As the breast cancer concerns women mostly at the age of 40, they are asked to attain the regular mammographic screening, since mammography is most reliable method for cancer detection at early stages. Mammogram is the most common method used for breast imaging. It helps in examine the presence of cancer at early stages and help in reducing the mortality rate by 25-30% in screened women. There occur many different types of breast cancer such as: mass, micro calcification clusters, architectural distortion and asymmetry breast tissue. This dissertation carries the masses problem and deals with its shape and texture feature for classification. Various type of techniques and methodologies are present in mammography which helps to find out the presence of cancer and also multiple ways to detect it in its early stage so that the patient affected by it could not lead to death. Mammography is the most common, safe and inexpensive methodology suggested whose standard image database could be used for training the learning machine. In this dissertation nucleus segmentation is used to find out the region of interest (ROI). The result of ROI is further used for extracting the valuable shape and textural features by using geometrical features, GLCM and GLDM for classifying the cancer through the machine learning approach i.e. CNN (Convolution neural networks). CNN remove the overlapping of features obtained after segmentation. Hence, CNN is used to evaluate the performance through defining accuracy, precision, and recall and also compare the results with existing logistic regression and neural network classification technique.

Cite this paper

IEEE
Prabhjot kaur. Mammogram Image Nucleus Segmentation and Classification using Convolution Neural Network Classifier, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Prabhjot kaur (2016). Mammogram Image Nucleus Segmentation and Classification using Convolution Neural Network Classifier. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Prabhjot kaur. "Mammogram Image Nucleus Segmentation and Classification using Convolution Neural Network Classifier." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
Computer Science and Engineering

Author
Updesh Gangwar

Org/Univ
INVERTIS, Bareilly,(U.P.), India

Keywords
Multi Hop, MANET, Routing protocol, Dynamic Source Routing (DSR), Ad hoc On-Demand Distance Vector Routing (AODV), Cluster

View AbstractCitationCo-authorsView PDF

Co-authors

Ravi Shankar Shukla

Abstract

— In the existing system is only find in cluster head using cluster based routing protocol algorithm. This algorithm is not based in energy level of cluster head selection. The cluster head can communicate with other cluster heads, member nodes and gateways. That time the cluster head energy level is low. So the cluster head can’t communicate with other nodes. That the same time the congestion will be occurs and packet can’t be transfer in the nodes. It will take more time to complete the packet transmission. This approach illustrates that the proposed method is a routing protocol. The proposed research we have used no of connection in a group or cluster. Every cluster has a cluster head and the cluster head directly interconnect with the improper place. The results of proposed method are comparison with existing Leach Protocol. Here base connection is located to equal distance of a cluster and it’s directly communicating to the cluster connection. When a cluster or group is selected after that it’s force level is not considered. This method is increasing to life instance of network. As compare LEACH and Proposed method, we have noticed proposed methodhave better force, life time, less delay, better transmission and consumed less time. LEACH Protocol is based on the cluster to make comparison of native parameters so that we design the proposed methodl cluster based. Cluster used no of group to increase the performance. This consist many advantages which are listed below. Existing Number of groups are low. We can analyses more number of groups here. Every group’s stage check in this proposed research. Proposed method routing protocol have better result as compared to LEACH protocol. As cluster-head dies, series is rebuilt to bypass the deceased node. So the initial topology is not affected. Head node receives all the aggregated data moreover transmits further to cluster-head.

Cite this paper

IEEE
Updesh Gangwar, Ravi Shankar Shukla. Hybrid Algorithm for Cluster Head Selection Based on Energy in MANET, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Updesh Gangwar, Ravi Shankar Shukla (2016). Hybrid Algorithm for Cluster Head Selection Based on Energy in MANET. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Updesh Gangwar, Ravi Shankar Shukla. "Hybrid Algorithm for Cluster Head Selection Based on Energy in MANET." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
Computer Science and Engineering

Author
Luv Kumar Pal

Org/Univ
INVERTIS Bareilly,(U.P.), India

Keywords
Data Aggregation, Data Fusion, Congestion Control, Buffer Overflow, End to End Delay

View AbstractCitationCo-authorsView PDF

Co-authors

Anil Panday

Abstract

Energy efficiency is an important metric in resource constrained wireless sensor networks (WSN). Multiple approaches such as duty cycling, energy optimal scheduling, energy aware routing and data aggregation can be availed to reduce energy consumption throughout the network. This thesis addresses the data aggregation during routing since the energy expended in transmitting a single data bit is several orders of magnitude higher than it is required for a single 32 bit computation. Therefore, in the first paper, a novel nonlinear adaptive pulse coded modulation-based compression (NADPCMC) scheme is proposed for data aggregation. A rigorous analytical development of the proposed scheme is presented by using Lyapunov theory. Satisfactory performance of the proposed scheme is demonstrated when compared to the available compression schemes in NS-2 environment through several data sets. Data aggregation is achieved by iteratively applying the proposed compression scheme at the cluster heads. The second paper on the other hand deals with the hardware verification of the proposed data aggregation scheme in the presence of a Multi-interface Multi-Channel Routing Protocol (MMCR). Since sensor nodes are equipped with radios that can operate on multiple non-interfering channels, bandwidth availability on each channel is used to determine the appropriate channel for data transmission, thus increasing the throughput. MMCR uses a metric defined by throughput, end-to-end delay and energy utilization to select Multi-Point Relay (MPR) nodes to forward data packets in each channel while minimizing packet losses due to interference. Further, the proposed compression and aggregation are performed to further improve the energy savings and network lifetime

Cite this paper

IEEE
Luv Kumar Pal, Anil Panday. A Novel Algorithm in 2 Level Aggregations for WSN in Multi Interface Multichannel Routing Protocol, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Luv Kumar Pal, Anil Panday (2016). A Novel Algorithm in 2 Level Aggregations for WSN in Multi Interface Multichannel Routing Protocol. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Luv Kumar Pal, Anil Panday. "A Novel Algorithm in 2 Level Aggregations for WSN in Multi Interface Multichannel Routing Protocol." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
Electronics Engineering

Author
Vinod Bolle

Org/Univ
Wainganga College of Engineering and Management Dongargaon,Nagpur, India

Keywords
Railway bridge and track, , Base station,Zigbee, sensor nodes, Arm controller.

View AbstractCitationCo-authorsView PDF

Co-authors

Santhosh kumar banoth, Puja Khangar

Abstract

Abstract -As railroad bridges and tracks are very important infrastructures, which has direct effect on railway transportation, there safety is utmost priority for railway industry. This project aims at monitoring the tracks on the bridges along with structural health condition of the bridge for accidents reduction. In this paper we introduces railway tracks and bridge monitoring system using wireless sensor networks based on ARM processor. We designed the system including sensor nodes arrangement , collecting data, transmission method and emergency signal processing mechanism of the wireless sensor network.. The proposed system reduces the human intervention, which collects and transmit data . The desired purpose of the proposed system is to monitor railway infrastructure for accident reduction and its safety.

Cite this paper

IEEE
Vinod Bolle, Santhosh kumar banoth, Puja Khangar. Railway Bridge Track Surveying System for Accident Reduction, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Vinod Bolle, Santhosh kumar banoth, Puja Khangar (2016). Railway Bridge Track Surveying System for Accident Reduction. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Vinod Bolle, Santhosh kumar banoth, Puja Khangar. "Railway Bridge Track Surveying System for Accident Reduction." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
WSN

Author
Jaskirat Singh

Org/Univ
Doaba Institute of Engineering & Technology , Kharar,Punjab, India

Keywords
Traffic classification, Network security, SVM, Deep packet inspection.

View AbstractCitationCo-authorsView PDF

Co-authors

Harpreet Kaur Saini

Abstract

In a wireless network it is very important to provide the network security and quality of service. To achieve these parameters there must be proper traffic classification in the wireless network. There are many algorithms used such as port number, deep packet inspection as the earlier methods and now days KISS, nearest cluster based classifier (NCC), SVM method and used to classify the traffic and improve the network security and quality of service of a network.

Cite this paper

IEEE
Jaskirat Singh, Harpreet Kaur Saini. A Review on Traffic Classification Methods in WSN, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Jaskirat Singh, Harpreet Kaur Saini (2016). A Review on Traffic Classification Methods in WSN. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Jaskirat Singh, Harpreet Kaur Saini. "A Review on Traffic Classification Methods in WSN." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
Computer Science and Engineering

Author
Rohit Katoch

Org/Univ
Sri Sai University Palampur,(H.P.), India

Keywords
MANET, Gray Hole Attack, OLSR.

View AbstractCitationCo-authorsView PDF

Co-authors

Anuj Gupta

Abstract

In this era of wireless devices, Mobile Ad-hoc Network (MANET) has become an indivisible part for communication for mobile devices. Therefore, interest in research of Mobile Ad-hoc Network has been growing since last few years. In this paper we have discussed GRAY Hole attack in OLSR routing protocols in MANET. Security is a big issue in MANETs as they are infrastructure-less and autonomous. Main objective of writing this paper is to apply gray Hole attack in MANET& know How its effect on the MANET Environment. This article would be a great help for the people conducting research on real world problems in MANET security

Cite this paper

IEEE
Rohit Katoch, Anuj Gupta. Comparison of Gray Hole Attack in Manet in OLSR Protocol, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Rohit Katoch, Anuj Gupta (2016). Comparison of Gray Hole Attack in Manet in OLSR Protocol. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Rohit Katoch, Anuj Gupta. "Comparison of Gray Hole Attack in Manet in OLSR Protocol." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
IMAGE ENCRYPTION

Author
Lavisha Sharma

Org/Univ
Sri Sai University Palampur,(H.P.), India

Keywords
Cryptography, Huffman Coding, Elliptic Curve Cryptography, Discrete Wavelet Transform.

View AbstractCitationCo-authorsView PDF

Co-authors

Anuj Gupta

Abstract

An abstract is a brief summary of a research article or in-depth analysis of a particular subject or discipline, and is often used to help the reader quickly ascertain the paper's purpose. Images can be encrypted in several ways, by using different techniques and different encryption methods. In this paper, I am using Huffman Coding method for image steganography, Elliptic Curve Cryptography for image encryption and Discrete Wavelet Transform for image compression. In my work I am using steganography, encryption and compression all together on the image data. After applying all these techniques on image data it results in an encryption method which is highly secure. For the implementation of the proposed work we are using Matlab software.

Cite this paper

IEEE
Lavisha Sharma, Anuj Gupta. Image Encryption using Huffman Coding for Steganography, Elliptic Curve Cryptography and DWT for Compression, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Lavisha Sharma, Anuj Gupta (2016). Image Encryption using Huffman Coding for Steganography, Elliptic Curve Cryptography and DWT for Compression. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Lavisha Sharma, Anuj Gupta. "Image Encryption using Huffman Coding for Steganography, Elliptic Curve Cryptography and DWT for Compression." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
Image Processing

Author
Ishu Garg

Org/Univ
Punjabi University of Information and Technology,Punjab, India

Keywords
Lipreading, image, machine learning, ANN.

View AbstractCitationCo-authorsView PDF

Co-authors

Amandeep Verma

Abstract

Two phenomena have determined the emergence of a new research field. First, the drop of costs involved in electronically collecting and storing interpretation of the world has brought the need for sophisticated technique to handle the outcome data collection. The mapping from acoustic to visual information is the focus of this part of the thesis. The challenge is to produce adequately precise movements, in order to convey useful information to the listener in a real-time system with low latency

Cite this paper

IEEE
Ishu Garg, Amandeep Verma. An Improved Visual Recognition of Letters of English Language using Lip Reading Technique, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Ishu Garg, Amandeep Verma (2016). An Improved Visual Recognition of Letters of English Language using Lip Reading Technique. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Ishu Garg, Amandeep Verma. "An Improved Visual Recognition of Letters of English Language using Lip Reading Technique." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
Image Processing

Author
Kanchan Rani

Org/Univ
Bhai Maha Singh College of Engineering (P.T.U), India

Keywords
Image enhancement ,weirner , ACO, PSNR, MSE.

View AbstractCitationCo-authorsView PDF

Co-authors

Er. Gurjot kaur

Abstract

The principal aim of the image enhancement technique is to modify the attributes in an image to make it more suitable for the given task and specific purpose. During the enhancement process the number of attributes to be modified varies from one to more. Digital image enhancement techniques provide the wide range of choices for improving the visual quality of image. The suitable choice of the technique to be applied is influenced by the imaging equipments, task in hand and viewing conditions. In this paper we use approach for image enhancement using weirner filter which optimize by met heuristics like ant colony optimization (ACO).Results is significance improve PSNR improve up to 28.56 and MSE reduce up to 2.54.

Cite this paper

IEEE
Kanchan Rani, Er. Gurjot kaur. Image Enhancement by Adaptive Filter with Ant Colony Optimization, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Kanchan Rani, Er. Gurjot kaur (2016). Image Enhancement by Adaptive Filter with Ant Colony Optimization. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Kanchan Rani, Er. Gurjot kaur. "Image Enhancement by Adaptive Filter with Ant Colony Optimization." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
Wireless Network

Author
Karan Sharma

Org/Univ
Rayat Bahra University,Mohali, India

Keywords
Vanet, Opprunistic network, DTN, Throughput.

View AbstractCitationCo-authorsView PDF

Co-authors

Shelly

Abstract

— VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. It is autonomous & self-organizing wireless communication network, where nodes in VANET involve themselves as servers and/or clients for exchanging & sharing information.

Cite this paper

IEEE
Karan Sharma, Shelly. Vehicular Adhoc Network Routing Improved Throughput by Flower Pollination Optimization Algorithm, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Karan Sharma, Shelly (2016). Vehicular Adhoc Network Routing Improved Throughput by Flower Pollination Optimization Algorithm. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Karan Sharma, Shelly. "Vehicular Adhoc Network Routing Improved Throughput by Flower Pollination Optimization Algorithm." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
Graphs

Author
Ridhi Jindal

Org/Univ
RBU, Mohali, India

Keywords
Graph, color, vertices, edges.

View AbstractCitationCo-authorsView PDF

Co-authors

Meena Rani

Abstract

Graph coloring is an important concept in graph theory. It is a special kind of problem in which we have assign colors to certain elements of the graph along with certain constraints. Suppose we are given K colors, we have to color the vertices in such a way that no two adjacent vertices of the graph have the same color, this is known as vertex coloring, similarly we have edge coloring and face coloring. The coloring problem has a huge number of applications in modern computer science such as making schedule of time table , Sudoku, Bipartite graphs , Map coloring, data mining, networking. In this paper we are going to focus on certain applications like Final exam timetabling, Aircraft Scheduling, guarding an art gallery.

Cite this paper

IEEE
Ridhi Jindal, Meena Rani. Graph Coloring and Its Implementation, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Ridhi Jindal, Meena Rani (2016). Graph Coloring and Its Implementation. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Ridhi Jindal, Meena Rani. "Graph Coloring and Its Implementation." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
Software Engineering

Author
Vinu Lata

Org/Univ
A.K.T.U. ,Lucknow,(U.P.), India

Keywords
Intelligent portfolio, social networking, security, database.

View AbstractCitationCo-authorsView PDF

Co-authors

Mrs. Aaradhna Singh

Abstract

The paper discusses the intelligent running of the website where Portfolio is a tool for creating online portfolio websites used by professionals or creative people like photographers, designers, architects, stylists, models etc. The portfolio gives a compact display of your profile be it your personal aspect or professional. There is a problem which the authors have tried to solve i.e unlike other professional network here user will have a single platform for both personal & professional profiles. Along with many of its unique feature portfolio is a very useful tool for the employers & also for the job seekers. It is a place where user can keep all his/her details i.e. personal & professional details like your hobby, your pictures, your resume if you are a job seeker, your requirement if you are an employer you can keep your requirements here along with all your social media links many more such details information. Here one can search the profiles of existing users will be notified that who has visited the profile. People can also get in touch with others by visiting their profile chatting each other.

Cite this paper

IEEE
Vinu Lata, Mrs. Aaradhna Singh. MY Portfolio: An Intelligent Platform, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Vinu Lata, Mrs. Aaradhna Singh (2016). MY Portfolio: An Intelligent Platform. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Vinu Lata, Mrs. Aaradhna Singh. "MY Portfolio: An Intelligent Platform." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
Security

Author
Harpreet Kaur

Org/Univ
Rayat Bahra University,Mohali, India

Keywords
Data Mining, KDD Cup99, KPCA, Intrusion Detection System, Neural Network, Genetic Algorithm.

View AbstractCitationCo-authorsView PDF

Co-authors

Gaganpreet Kaur Bhalla

Abstract

— An Intrusion Detection System is an application used for monitoring the network and protecting it from the intruder. Intrusion is a set of actions aimed to compromise these security goals. IDS have the computer security goals which are important for the data mining for extraction of data like confidentiality, integrity, and availability. This research study the performance measures of IDS is important for the security purposes. KDD 99 has 41 features. The IDS approached is used with the help of neural network technique of data mining and the Genetic algorithm is used as a classifier. The all features of KDD99 are used in this study. In this research, the feature is selected and extracted instead of using all features. The feature selection is done with the help of Correlation and feature extraction is done with the help of KPCA. The selection of features is according to the Eigen values of the features. The neural network is used for the change the weightage of the error. The neural network is basically runs many times and change weightage according to this.

Cite this paper

IEEE
Harpreet Kaur, Gaganpreet Kaur Bhalla. An IDS by Correlation & KPCA with Neural Network Optimized By Genetic Algorithm, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Harpreet Kaur, Gaganpreet Kaur Bhalla (2016). An IDS by Correlation & KPCA with Neural Network Optimized By Genetic Algorithm. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Harpreet Kaur, Gaganpreet Kaur Bhalla. "An IDS by Correlation & KPCA with Neural Network Optimized By Genetic Algorithm." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
WIRELESS SENSOR

Author
Smridhi

Org/Univ
Guru Jambheshwar University of Science and Technology, Hisar, India

Keywords
Underwater Sensor network, Localization, Architecture, range-based scheme, range-free scheme, architecture

View AbstractCitationView PDF

Abstract

Recently underwater sensor network has attracted great attention of many researchers. Here determining the location of sensor node is very important. The required information will not be useful if sensing nodes are not localized. There are various methods for localization in sensor networks but these are different in case of terrestrial sensor network and underwater sensor network. This paper explores some of the localization schemes in case of underwater sensor network and there comparison is made so that they can be utilized on basis of application requirement.

Cite this paper

IEEE
Smridhi. Introduction to Wireless Sensor, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Smridhi (2016). Introduction to Wireless Sensor. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Smridhi. "Introduction to Wireless Sensor." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
Artificial Intelligence

Author
Aparna Priyadarsini Khadanga

Org/Univ
CUTM, Paralakhemundi, Odissa, India

Keywords
Naturallanguageprocessing (NLP), Syntactic, Symantic, Pragmatic, DiscourseIntegration, Morphological, Lexical, Linguistics, Generation, Machine Learning

View AbstractCitationCo-authorsView PDF

Co-authors

Suvendu Kumar Nayak

Abstract

Language is way of communicating your words Language helps in understanding the world ,we get a better insight of the world. Language helps speakers to be as vague or as precise as they like. NLP Stands for natural language processing. . Natural languages are those languages that are spoken by the people.Natural language processing girdles everything a computer needs to understand natural language and also generates natural language.Natural language processing (NLP) is a field of computer science, artificial intelligence, and linguistics mainly focuses on the interactions between computers and human languages or natural languages. NLP is focussed on the area of human computer interaction. The need for natural language processing was also felt because there is a wide storage of information recorded or stored in natural language that could be accessible via computers. Information is constantly generated in the form of books, news, business and government reports, and scientific papers, many of which are available online or even in some reports. A system requiring a great deal of information must be able to process natural language to retrieve much of the information available on computers. Natural language processing is an interesting and difficult field in which we have to develop and evaluate or analyse representation and reasoning theories. All of the problems of AI arise in this domain; solving "the natural language problem" is as difficult as solving "the AI problem" because any field can be expressed or can be depicted in natural language.

Cite this paper

IEEE
Aparna Priyadarsini Khadanga, Suvendu Kumar Nayak. Natural Language Processing, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Aparna Priyadarsini Khadanga, Suvendu Kumar Nayak (2016). Natural Language Processing. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Aparna Priyadarsini Khadanga, Suvendu Kumar Nayak. "Natural Language Processing." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
HYPERTHYROIDISM

Author
Dr. Ankita U. Mandpe

Org/Univ
Govt. Ayurvedic College Nagpur, India

Keywords
Agni, Bhasmakarog, Pitta prakopa, Hyprethyroidism.

View AbstractCitationCo-authorsView PDF

Co-authors

Dr. G.H. Kodwani, Dr. Meera .A. Aurangabadkar

Abstract

Agni is the fundamental concept of Ayurveda, which has described an important factor of Digestion and Metabolism in our body. Agni converts Food in the form of Energy, which is responsible for all the Vital Functions of our body. According to Ayurveda, रोगाः सर्वेपि मंदाग्नौः.............॥ all diseases occurs due to Mandagni except Bhasmaka Rog. It occurs due to Agni vruddhi which response to Kshudda vriddhi, Dhatu ksheenta with various Pitta prakop Lakshanas, hence Bhasmaka Rog directly effects on Metabolism. In human body, Thyroxin Hormone also plays an important role in Metabolism. If level of this hormone increased, results to increase Appetite, Sweating etc. This high level of thyroxin called Hyperthyroidism and its symptoms are same as Pitta Prakopa Lakshana. So the question arises whether there is any correlation between Bhasmaka Rog and Hyprthyroidism? What are the Lakshanas and Samprapti of both conditions? With the present article, we are trying to study the Lakshana and Samprapti of Bhasmaka Rog with special reference Hyperthyroidism.

Cite this paper

IEEE
Dr. Ankita U. Mandpe, Dr. G.H. Kodwani, Dr. Meera .A. Aurangabadkar. A Comparative Study of Lakshanas and Samprapti of BhasmakRog w.s.r to Hyperthyroidism, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Dr. Ankita U. Mandpe, Dr. G.H. Kodwani, Dr. Meera .A. Aurangabadkar (2016). A Comparative Study of Lakshanas and Samprapti of BhasmakRog w.s.r to Hyperthyroidism. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Dr. Ankita U. Mandpe, Dr. G.H. Kodwani, Dr. Meera .A. Aurangabadkar. "A Comparative Study of Lakshanas and Samprapti of BhasmakRog w.s.r to Hyperthyroidism." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
Vanet

Author
Karan Sharma

Org/Univ
Rayat Bahra University,Mohali, India

Keywords
Vanet, adhoc, wireless, network.

View AbstractCitationCo-authorsView PDF

Co-authors

Shelly Bhalla

Abstract

VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. It is autonomous & self-organizing wireless communication network, where nodes in VANET involve themselves as servers and/or clients for exchanging & sharing information.

Cite this paper

IEEE
Karan Sharma, Shelly Bhalla. Review on Routing Approaches of MANET with Opportunistic Network, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Karan Sharma, Shelly Bhalla (2016). Review on Routing Approaches of MANET with Opportunistic Network. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Karan Sharma, Shelly Bhalla. "Review on Routing Approaches of MANET with Opportunistic Network." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
Gateway DIscovery in MANET

Author
Rahul Mishra

Org/Univ
Madan Mohan Malaviya University of Technology Gorakhpur (U.P.), India

Keywords
MANET, Transient network, Technological Growth, Gateway Discovery.

View AbstractCitationCo-authorsView PDF

Co-authors

Rakesh Kumar

Abstract

MANET (Mobile ad-hoc network) mitigates the requirement of common control or access point for forming a transient network. The extensive growth of wired and wireless devices due to rapid enhancement in technology has led to more emphasis on this network. The tremendous use of mobile devices by the users forms temporary connection between mobile devices which form MANET. This network is although very effective in the sense that it does not need any prior infrastructure but it has limitation too like low bandwidth, frequent disconnection , limited features and low battery problem. MANET also allows internet connection with the help of Internet Gateways .These Gateways are bridge between infrastructure based and MANET based network. Several mechanisms had been proposed for the Gateway Discovery in ad-hoc network. This paper tries to analyze several Gateway discovery mechanism proposed earlier and gives a critical evaluation of those technique. The survey concludes with future scope in this area.

Cite this paper

IEEE
Rahul Mishra, Rakesh Kumar. Gateway Discovery in MANET: A Survey, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Rahul Mishra, Rakesh Kumar (2016). Gateway Discovery in MANET: A Survey. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Rahul Mishra, Rakesh Kumar. "Gateway Discovery in MANET: A Survey." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
Big Data

Author
Meena Rani

Org/Univ
RBU, Mohali, India

Keywords
Big Data, Scale, hetroginity,Visualization.

View AbstractCitationCo-authorsView PDF

Co-authors

Ridhi Jindal

Abstract

Big Data has the potential to revolutionize not just research, but also education. There are few defines phases through which the data is to be processed. There are challenges like Heterogeneity and Incompleteness, scale, timeliness, privacy and human consideration. Through better analysis of the large volumes of data that are becoming available, there is the potential for making faster advances in many scientific disciplines and improving the profitability and success of many enterprises.

Cite this paper

IEEE
Meena Rani, Ridhi Jindal. Big Data: Challenges and Opportunities, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Meena Rani, Ridhi Jindal (2016). Big Data: Challenges and Opportunities. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Meena Rani, Ridhi Jindal. "Big Data: Challenges and Opportunities." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
Cloud Computing

Author
Anuradha

Org/Univ
DCRUST, Murthal, Sonepat, India

Keywords
Data Encryption, cloud computing, Encryption algorithms, security.

View AbstractCitationCo-authorsView PDF

Co-authors

Dr. Suman Sangwan

Abstract

Cloud computing is continuously evolving and considered next generation architecture for computing. Typically, cloud computing is a combination of computing resources accessible via internet. Historically, the clients or the organizations store data in data centers with firewall and other security techniques to protect data against intruders. However, in cloud computing, since the data is stored anywhere across the globe, the client organizations have less control over the stored data. To build the trust for the growth of cloud computing, the cloud providers must protect the user data from unauthorized access and disclosure. Here in this work hybrid approach of encryption techniques and the storage of data are considered in the cloud system. The main advantage of the hybrid scheme is to provide more security in the cloud.

Cite this paper

IEEE
Anuradha, Dr. Suman Sangwan. Implementing Multiple Security in the Cloud Environment, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Anuradha, Dr. Suman Sangwan (2016). Implementing Multiple Security in the Cloud Environment. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Anuradha, Dr. Suman Sangwan. "Implementing Multiple Security in the Cloud Environment." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
Cryptography

Author
Adviti Chauhan

Org/Univ
HPTU,Himachal Pradesh, India

Keywords
Cloud computing, RSA partial, MD5, CSP.

View AbstractCitationCo-authorsView PDF

Co-authors

Jyoti Gupta

Abstract

Cloud computing is one of the emerging technology which is showing continuous advancement in the field of networking. Cloud computing is defined by National Institute of Standards and Technology (NIST)[1] as a model for enabling ubiquitous, on demand network access to a shared pool of configuration computing resources (e.g. computer networks, servers, storage, applications and services) ,which can be rapidly provisioned and release with minimal management effort. It is gaining popularity in all the areas. But still by far cloud computing sharing is behind one expected because of the security concerns (unauthorized access, modification or denial of services, etc). In this research paper, the proposed work plan is to eliminate security concerns using cryptographic algorithm and hashing algorithm.

Cite this paper

IEEE
Adviti Chauhan, Jyoti Gupta. Review on Encrypt the Text by MD5 and RSA in Client Cloud Approach, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Adviti Chauhan, Jyoti Gupta (2016). Review on Encrypt the Text by MD5 and RSA in Client Cloud Approach. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Adviti Chauhan, Jyoti Gupta. "Review on Encrypt the Text by MD5 and RSA in Client Cloud Approach." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
Network Security

Author
Geetanjali

Org/Univ
HPTU,Himachal Pradesh, India

Keywords
Malicious node, gray hole attack, MANET, probability, Arbitrary topology.

View AbstractCitationCo-authorsView PDF

Co-authors

Anupama Kumari

Abstract

Mobile ad-hoc network(MANET) is a wireless network which has robust infrastructure. Mobile nodes can be used to form MANET. Arbitrary topology can be formed by connecting nodes with each other randomly. When source want to transfer packets to destination, a path being discovered for transmission. Sometime packet get dropped in path due to malicious node. Attack by malicious node is called gray hole attack. In this paper we detect the gray hole attack in the MANET. The detection and removal of the malicious node depends on the calculated probability of each node.

Cite this paper

IEEE
Geetanjali, Anupama Kumari. Review on Detection of Gray Hole Attack in MANET, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Geetanjali, Anupama Kumari (2016). Review on Detection of Gray Hole Attack in MANET. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Geetanjali, Anupama Kumari. "Review on Detection of Gray Hole Attack in MANET." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
GPS

Author
Jayanti Khutwad

Org/Univ
NESGOI, Pune, India

Keywords
Web-Based GIS System, GeoSpatial Data Collection, Smart Phone, POP3 Mail Server,Global Positioning System(GPS), Android Application Package(APK),Software Development Kit(SDK).

View AbstractCitationCo-authorsView PDF

Co-authors

Bindu Konde, Ashvini Deokate, Prof A.A.Kadam

Abstract

Hazard is a situation or thing that has the potential to harm people's, property or the environment. Hazardous area cause many people health. So we must to prevent from it. We are develop hazard reporting system to prevent from hazard prob- lem. Important task of the Reporting is Data Collection.The Geo-spatial Data is used to Indicate the Data along with the geographic component.This means that the data set have loca- tion information tied to them such as geographical data in the form of coordinates,address,city,or ZIP code.User report to the organization by using the same data and organization solve that problem.

Cite this paper

IEEE
Jayanti Khutwad, Bindu Konde, Ashvini Deokate, Prof A.A.Kadam. Hazards Reporting based on Real-Time Field Data Collection using Personal Mobile Phone., International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Jayanti Khutwad, Bindu Konde, Ashvini Deokate, Prof A.A.Kadam (2016). Hazards Reporting based on Real-Time Field Data Collection using Personal Mobile Phone.. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Jayanti Khutwad, Bindu Konde, Ashvini Deokate, Prof A.A.Kadam. "Hazards Reporting based on Real-Time Field Data Collection using Personal Mobile Phone.." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
AD-HOC ROUTING PROTOCOLS

Author
Sheetal

Org/Univ
Maharshi Dayanand University, Rohtak, India

Keywords
AODV, DSR, DSDV, MANET, NS-2.

View AbstractCitationView PDF

Abstract

Specially appointed systems are known by heaps of details like multi-jump remote availability, much of the time change system topology and the requirement for productive element steering conventions that assumes an essential part. This paper introduces an execution examination among two responsive steering conventions for versatile specially appointed systems: Dynamic Source Routing (DSR), Ad Hoc On interest separation Vector (AODV).Both conventions were recreated utilizing the apparatus ns-2 and were look at as far as parcel misfortune proportion, end to end delay, with portable hubs changing number of hubs and velocity. Reproduction uncovered that in spite of the fact that DSR splendidly scales to little systems among low hub speeds, AODV is favored because of its more productive utilization of data transfer capacity.

Cite this paper

IEEE
Sheetal. Performance Comparison of Ad-hoc Routing Protocols, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Sheetal (2016). Performance Comparison of Ad-hoc Routing Protocols. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Sheetal. "Performance Comparison of Ad-hoc Routing Protocols." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
software engeenring

Author
Parveen kaur

Org/Univ
GGS College, Kharar, Punjab, India

Keywords
Agile, software engineering, adaptive.

View AbstractCitationView PDF

Abstract

Working software measures the progress. Basically, Agile method involves interleaving the specification, implementation, design and testing. Series of versions are developed with the involvement of and evaluation by the stake holders in each version. Agile methods aim at reducing the software process overheads (like documentation) and concentrate more on code rather than the design. Customer involvement, incremental delivery, freedom of developers to evolve new working methods, change management, and last but not the least simplicity is the basic essence of Agile development. Agile methodologies are well suited for small as well as medium sized projects.

Cite this paper

IEEE
Parveen kaur. Review on Agile Method with Text Mining, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Parveen kaur (2016). Review on Agile Method with Text Mining. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Parveen kaur. "Review on Agile Method with Text Mining." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
Data Mining

Author
Satya Prakash Singh

Org/Univ
Madan Mohan Malaviya University of Technology, Gorakhpur (U.P.), India

Keywords
Web Usage Mining, Data Pre processing, Pattern Discovery, Pattern Analysis.

View AbstractCitationCo-authorsView PDF

Co-authors

Meenu

Abstract

The Quest for knowledge has led to new discoveries and invention. That leads to amelioration of various technologies. As years passed World Wide Web became overloaded with information and it became hard to retrieve data according to the need .Web mining came as a violence to provide solution of above problem. Web usage mining is category of web mining. Web usage mining mainly circulation with discovery and analyzing of usage patterns in order to serve the needs of web based applications. The web usage mining mainly consist of three stages: data preprocessing, pattern discovery and pattern analysis. This paper is focused with the study of different tools and techniques for web usage mining

Cite this paper

IEEE
Satya Prakash Singh, Meenu. Web Usage Mining Tools & Techniques: A survey, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Satya Prakash Singh, Meenu (2016). Web Usage Mining Tools & Techniques: A survey. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Satya Prakash Singh, Meenu. "Web Usage Mining Tools & Techniques: A survey." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
Optimization

Author
Ramandeep Kaur

Org/Univ
Chandigarh University,Chandigarh, India

Keywords
Pid, Optimization, PSO, CTSR.

View AbstractCitationCo-authorsView PDF

Co-authors

Jaspreet Kaur

Abstract

The controller attempts to minimize the error over time by adjustment of a control variable, such as the position of a control valve, a damper, or the power supplied to a heating element, to a new value determined by a weighted sum Where k p, K i and K d all non negative, denote the coefficients for the proportional, integral and derivative terms. Dead timesproducea decrease in the system phase and also give rise to a non-rational transfer function of thesystem making them more difficult to analyse and control. Because of this characteristics dead time control problems have attracted the attention of engineers and researchers who have developed a special type of controller like PID controllers, Smith Predictor(DTC), MPC and various algorithms to control dead times.

Cite this paper

IEEE
Ramandeep Kaur, Jaspreet Kaur. Review on CSTR PLANT Error Optimization, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Ramandeep Kaur, Jaspreet Kaur (2016). Review on CSTR PLANT Error Optimization. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Ramandeep Kaur, Jaspreet Kaur. "Review on CSTR PLANT Error Optimization." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
Computer Science Engineering

Author
Nishan Singh Saklani

Org/Univ
Sri Sai University Palampur, (H.P.), India

Keywords
News Classification, Text classification, Clustering, Machine Learning, Genetic Algorithm, web content mining, Web news extraction, Data pre-processing, packaged information, News Data Set. Ubuntu Python, NLTK, Matlab, Neural Networks, Support Vector Machine.

View AbstractCitationCo-authorsView PDF

Co-authors

Saurabh Sharma

Abstract

Web news extraction is a investigation area which has been widely discovered. It has resulted in some systems which takes good extraction capabilities with little or no human involvement. The present system looks into the perception of web broadcast from a single web site which takes a equivalent format and the idea commonly is not as efficient when multiple web news pages are measured which go to altered sites. My work proposes a web extraction layout which is pretty same for maximum of the web news The purpose of web news extraction is to enhance information retrieval which provisions news articles associated to a particular event for competitive business analysis Researches in this area have shown many methods altered from the other based on the requirement, the extractor should be chosen. . In previous work they use unsupervised learning for extracting the news from web, but it compares the entire news pattern which extract so far. And in previous work did not work on the pattern of text in web which provide important information for classification and analysis of news from the web. Previous work extracting news is not complex process but classification of news take more time in processing. In previous work features will increase exponentially on the basis of unsupervised learning done. We reduce the complexity and increase the accuracy web news extraction by using text from web and classified by Cluster based supervised learning. to study and analysis of text mining and classifier on different parameters. To offered and implement pre-processing of web page by text mining and classified by cluster based supervised leaning. To learning the offered methodology by precision, recall, accuracy and F1 measure. The point of information accessible in the World Wide Web, it performs that the detection of quality data is graceful and simple but it has been a important matter of concern text mining is a field of researches and alterations. Online news classification has been challenge continuously in terms of manual operation. Data mining is procedure of determining interesting knowledge such as patterns, suggestions, changes, variances and important structures, from large amounts of data stored in database, data warehouse, or additional information sources. Information to the wide availability of massive amount of data in electronic form, and pending need for revolving such data into useful information and knowledge for broad application with market analysis, business administration and judgment support, documents mining has involved a great deal of devotion in information business in recent year.

Cite this paper

IEEE
Nishan Singh Saklani, Saurabh Sharma. Extracting News from the Web Pages by using Concept of Clustering with Neural Genetic Approach, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Nishan Singh Saklani, Saurabh Sharma (2016). Extracting News from the Web Pages by using Concept of Clustering with Neural Genetic Approach. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Nishan Singh Saklani, Saurabh Sharma. "Extracting News from the Web Pages by using Concept of Clustering with Neural Genetic Approach." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
Information Technology

Author
Jaspreet Kaur

Org/Univ
Chandigarh Engineering college, Landran,Punjab, India

Keywords
fingerprint,bio metric,authentication.

View AbstractCitationCo-authorsView PDF

Co-authors

Navleen Kaur

Abstract

Fingerprints have long been used as a reliable biometric feature for private identification. Fingerprint classification refers to the matter of assignment fingerprints to 1 of many prespecified categories. Automatic classification may be used as a pre-processing step for fingerprint matching, reducing matching time and complexness by narrowing the search area to a set of a usually large info. Automatic fingerprint identification is one among the foremost vital biometric technologies. so as to expeditiously match fingerprints during a massive info, Associate in Nursing classification theme is critical. Fingerprint classification, that refers to assignment a fingerprint image into variety of pre-specified categories, provides a possible classification mechanism. In observe, but massive intra-class and tiny interclass variations in world pattern configuration and poor quality of fingerprint pictures build the classification drawback terribly tough. A fingerprint classification algorithmic program needs a sturdy feature extractor that ought to be ready to reliable extract salient options from input pictures

Cite this paper

IEEE
Jaspreet Kaur, Navleen Kaur. Efficient Fingerprint Recognition using Wavelet Transforms, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Jaspreet Kaur, Navleen Kaur (2016). Efficient Fingerprint Recognition using Wavelet Transforms. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Jaspreet Kaur, Navleen Kaur. "Efficient Fingerprint Recognition using Wavelet Transforms." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
Electronics and Communication

Author
Sarita

Org/Univ
KITM, Kunjpura, Haryana, India

Keywords
X-Ray, Image Segmentation, Clustering, Classification.

View AbstractCitationCo-authorsView PDF

Co-authors

Vikas Sandhu

Abstract

Photo segmentation is an foremost study subject considering the fact that it plays a major position in photo evaluation, and understanding. Segmenting an snapshot is essentially the most difficult and tricky assignment due to the fact that there exist exclusive objects and a tremendous variants between them using a common framework. Thresholding is likely one of the simplest segmentation strategies. The drawback of thresholding methods is that they may be able to be utilized to a single-band photograph, equivalent to a gray-scale image or a single band of a multi-band photograph. Area headquartered ways have shown to be very useful and effective segmentation methods in photograph processing. Nevertheless, they've over-segmentation tendency, require handbook initialization and are touchy to noise. Clustering system can be used for multi-band pics, however the number of groups need to be founded first. Classification-situated algorithm requires a training phase. Deformable units are less sensitive to noise than the opposite methods awarded in this paper, which make them compatible for problematic clinical picture segmentation problems. Atlas-situated approaches use prior potential in an effort to perform segmentation, but they are time-ingesting.

Cite this paper

IEEE
Sarita, Vikas Sandhu. Survey of Various X-RAY Bone Image Segmentation Approaches, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Sarita, Vikas Sandhu (2016). Survey of Various X-RAY Bone Image Segmentation Approaches. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Sarita, Vikas Sandhu. "Survey of Various X-RAY Bone Image Segmentation Approaches." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
Electronics and Communication

Author
Sumit Sandhu

Org/Univ
KITM, Kunjpura, India

Keywords
Ubiquitous Computing, Gesture Recognition, computer vision.

View AbstractCitationCo-authorsView PDF

Co-authors

Sonia khatri

Abstract

Alerts give a good watching, handy to fully grasp contrasting option to utilising a product unit like a console, mouse, and joystick brutal computer collaboration (HCI).Accordingly, the major factor of movement acknowledgment logical experiences are to fabricate a framework that can admire and have an understanding of targeted human motions naturally and make use of them to move on data (i.E., for informative use as in verbal exchange by way of gestures) or to control gadgets (at the finish of the day., manipulative utilize like in controlling robots without a physical contact). Possibly a standout amongst probably the most important standards for signal dialect acknowledgment is that normal signaling be bolstered by using the acknowledgment motor in order that a person can interface with the framework with none barriers. Considering a grouping of indicators is most likely mixed with co enunciation and inadvertent tendencies, these non-gestural developments must be disposed of from an information video before the recognizable proof of every motion in the association.

Cite this paper

IEEE
Sumit Sandhu, Sonia khatri. Real Time Sign Language Recognition Systems: A Review, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Sumit Sandhu, Sonia khatri (2016). Real Time Sign Language Recognition Systems: A Review. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Sumit Sandhu, Sonia khatri. "Real Time Sign Language Recognition Systems: A Review." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
Wirelesss Network

Author
Ramninder Kaur

Org/Univ
Bahra Group of Institute, Patiala,Punjab, India

Keywords
Ant colony, metaheuristics, Vehicular Ad-hoc network (VANET), QOS

View AbstractCitationCo-authorsView PDF

Co-authors

Harpreet Kaur

Abstract

. A popular example of opportunistic routing is the “delay tolerant” forwarding to vanet nework when a direct path to destination does not exist. The evaluation of this work is twofold. We implemented two prototypes on off -the-shelf hardware to show the technical feasibility of our opportunistic network concepts. Also, the prototypes were used to carry out a number of runtime measure- ments. Then, we developed a novel two-step simulation method for opportunistic data dissemination. The simulation combines real world user traces with artificial user mobility models, in order to model user movements more realistically. We investigate our opportunistic data dissemination process under various settings, including different communication ranges and user behavior pattern In this use Conventional routing in this case would just “drop” the packet. With opportunistic routing, a node acts upon the available information ,In this thesis optimize the routing by centrality information then refine by ant colony metaheuristics.In this method validate our approach on different parameter like overhead, throughput

Cite this paper

IEEE
Ramninder Kaur, Harpreet Kaur. Novel Approach for Routing in MANET by Network Connectivity with Meta Heuristic, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Ramninder Kaur, Harpreet Kaur (2016). Novel Approach for Routing in MANET by Network Connectivity with Meta Heuristic. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Ramninder Kaur, Harpreet Kaur. "Novel Approach for Routing in MANET by Network Connectivity with Meta Heuristic." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
Data Mining

Author
Rucha Kulkarni

Org/Univ
NESGOI,Pune, India

Keywords
Traffic event detection, tweet classification, social sensing, text mining.

View AbstractCitationCo-authorsView PDF

Co-authors

Sayali Dhanawade, Shraddha Raut, Prof.D.S.Lavhkarer

Abstract

Now a days,social networking are more popular.for example,twitter,Facebook etc.social networking are used forevent detection in real time.Real time events are traffic detection,earthquake monitoring.In this paper,we use the the twitter for real time traffic event detection.Firstly,the system extract the tweets from twitter and apply the text mining techniques on that tweets.those techniques are tokenization, stop-word removing,stemming.after that classify that on the basis of class label i.e traffic event or no traffic event.In this paper, we present an online method for detection of real-traffic events in Twitter data.

Cite this paper

IEEE
Rucha Kulkarni, Sayali Dhanawade, Shraddha Raut, Prof.D.S.Lavhkarer. Twitter Stream Analysis for Traffic Detection in Real Time, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Rucha Kulkarni, Sayali Dhanawade, Shraddha Raut, Prof.D.S.Lavhkarer (2016). Twitter Stream Analysis for Traffic Detection in Real Time. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Rucha Kulkarni, Sayali Dhanawade, Shraddha Raut, Prof.D.S.Lavhkarer. "Twitter Stream Analysis for Traffic Detection in Real Time." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
Data Mining

Author
Shubham Goyal

Org/Univ
ASRA College of Engineering and Technology, Bhwanigarh,Punjab, India

Keywords
Opinion Mining, Sentiment Analysis, KNN, Naïve Baye’s Classifier, Food price Crisis.

View AbstractCitationView PDF

Abstract

Opinion Mining is an important concept in today’s world and due to the advent of social media it has become a huge source of database. Since almost everybody in the modern era is involved with some social media platform, the public mood is hugely reflected in the social media today. This thesis proposes to utilize this source of information and predict the sentiments of public towards a particular topic. Food price crisis is being studied here in this thesis and public opinion is predicted for the topic. Twitter data is utilized for the same and live tweets of Indian origin are extracted using twitter API called ‘tweepy’. Oauth is used as handler and tweets are filtered for specific keywords and location using latitude longitude data. The tweets are saved into a database. They first preprocessed for removal of spam, special characters, url, short words etc.The tweets are then stemmed and tokenized and TF-IDF score is calculated for all the keywords. Feature selection is applied on it using Chi-Square and information gain. A term document matrix (TDM) is created which is fed to the classifiers for classification. Two classifiers has been analysed in this thesis: KNN and Naïve Baye’s and a hybrid has been made using them. The results of both the classifier has ben found to be satisfactory while the hybrid-KNN outperforms the Naïve Baye’s Classifiers in terms of accuracy. Thus a novel method is designed for opinion mining of Indian tweets regarding food price crisis.

Cite this paper

IEEE
Shubham Goyal. Sentimental Analysis of Twitter Data using Text Mining and Hybrid Classification Approach, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Shubham Goyal (2016). Sentimental Analysis of Twitter Data using Text Mining and Hybrid Classification Approach. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Shubham Goyal. "Sentimental Analysis of Twitter Data using Text Mining and Hybrid Classification Approach." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
Computer Science

Author
Akshay Bandal

Org/Univ
NESGOI,Pune, India

Keywords
Robotics,Sensors,Local and Wide-Area Networks Internet,Routers,Software Development Kit(SDK).

View AbstractCitationCo-authorsView PDF

Co-authors

Pranay Nate, Rohan Mankar, Rahul Powar

Abstract

We realize that Garbage causes damage to local ecosystems, and it is a threat to plant and human life. To avoid all such situations we are going to implement a project called IoT Based Smart Garbage."When somebody dumps trash into a dustbin the bin ashes a unique code, which can be used to gain access to free Wi-Fi". Sensor check garbage lls in dustbin or not and Router pro- vides Wi-Fi to user. Major part of our project depends upon the working of the Wi-Fi module; essential for its implementa- tion. The main aim of this project is to enhancement of a smart city vision.

Cite this paper

IEEE
Akshay Bandal, Pranay Nate, Rohan Mankar, Rahul Powar. Smart Wifi Dustbin System, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Akshay Bandal, Pranay Nate, Rohan Mankar, Rahul Powar (2016). Smart Wifi Dustbin System. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Akshay Bandal, Pranay Nate, Rohan Mankar, Rahul Powar. "Smart Wifi Dustbin System." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
Computer Science

Author
Pratiksha Bhosale

Org/Univ
NESGOI,Pune, India

Keywords
E-voting, NFC, Security ,Secure Elections.

View AbstractCitationCo-authorsView PDF

Co-authors

Sayali Mokashi, Priyanka Wadkar, Prof P.V.Mahadik

Abstract

The electronic voting is the technology in which the citizens can do the vote using smart phone. It gives functionality to users to give vote from android mobile. E-voting technique have advantages over traditional voting framework like less manpower, it save time, accuracy and transparency ,fast result ,etc. Security pre-requisites E-voting technique has so many challenges associated with voting. Mainly Assimilation and Verification to keep secure voted data. To overcome these challenges we purpose the new e-voting framework in which the NFC tag is used to give more accuracy and transparency in voting framework.The NFC tag store information of voters to check the voter and voters vote in the application. The E-polling technique has three phases.The first involves analyze and verification of user .In second phaseto get OTP and using this OTP user can vote in the framework. In third stage Administrator will count and sort out the votes and declare the result of voting in application.

Cite this paper

IEEE
Pratiksha Bhosale, Sayali Mokashi, Priyanka Wadkar, Prof P.V.Mahadik. Advanced E-voting System using NFC, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Pratiksha Bhosale, Sayali Mokashi, Priyanka Wadkar, Prof P.V.Mahadik (2016). Advanced E-voting System using NFC. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
Pratiksha Bhosale, Sayali Mokashi, Priyanka Wadkar, Prof P.V.Mahadik. "Advanced E-voting System using NFC." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.
Area
Embedded Systems

Author
N. Anju Latha

Org/Univ
Sri Krishnadevaraya University, Anantapur, A.P., India

Keywords
ATmega328, Servo motor, Ultrasonic Sensor.

View AbstractCitationCo-authorsView PDF

Co-authors

B. Rama Murthy, K. Bharat Kumar

Abstract

A sensor is a device that converts one type of energy to another. Arduino is a small microcontroller board with a USB plug to connect to the computer. The Arduino board senses the environment by receiving input from a variety of sensors and can affect its surroundings by controlling LCD, speakers, motors and GS module. Ultrasonic Sensor measure the distance of target objects or materials through the air using “non-contact” technology. They measure distance without damage and are easy to use. The output Signals received by the sensor are in the analog form, and output is digitally formatted and processed by microcontroller. In present work, it is used to detecting an obstacle, along with its exact distance. The internal analog to digital converter is used is calibrated to get almost accurate distance measurement. The measured distance is also displayed on an LCD screen.

Cite this paper

IEEE
N. Anju Latha, B. Rama Murthy, K. Bharat Kumar. Distance Sensing with Ultrasonic Sensor and Arduino, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
N. Anju Latha, B. Rama Murthy, K. Bharat Kumar (2016). Distance Sensing with Ultrasonic Sensor and Arduino. International Journal of Advance Research, Ideas and Innovations in Technology, 2(5) www.ijariit.com.

MLA
N. Anju Latha, B. Rama Murthy, K. Bharat Kumar. "Distance Sensing with Ultrasonic Sensor and Arduino." International Journal of Advance Research, Ideas and Innovations in Technology 2.5 (2016). www.ijariit.com.


Is there a mistake in your details. Please let us know via this form.