IOSR Journal of Computer Engineering (IOSR-JCE)

National Conference On Discrete Mathematics & Computing (NCDMC-2017)

Volume 1

Paper Type : Research Paper
Title : Novel Technique to Detect Over Speeding Vehicles
Country : India
Authors : Anjaly Anto.M B.Tech || Anu Antony B.Tech Student || Bintesh P.B

Abstract: Now-a-days we hear news about accidents on highways very frequently. And in most of the cases main reason of accident is over-speed. So in order to avoid such kinds of accidents there should be some system which properly checks over-speeding of vehicles. Current techniques use camera image processing and it leads to people being aware of it and reduce speed there. In our novel technique an approach is used to counter it. We have used two sensors in this project. These sensors detect the vehicle speed. Condition is that, the two sensors should be installed at a certain distance apart.

Keywords - Speed detection; RFID; sensor; over speed

[1] B. Coifman and M. Cassidy, "Vehicle reidentification and travel time measurement on congested freeways," Transportation Research Part A: Policy and Practice, vol. 36, no. 10, pp. 899-917, December 2002.
[2] Chris Stauffer,W.E.L Grimson.Adaptive Background Mixture Models for Real time Tracking. Computer Vision and Pattern Recognition 1999:246-252.
[3] M. W. Jin. "Research and implement with three key technologies of noise radar "[D]. Beijing: Communication and Information System, Peking University, 2001. 5.
[4] Yong-Kul Ki and Doo-Kwon Baik, "Model for Accurate Speed Measurement Using Double-Loop Detectors The IEEE transactions on Vehicular Technology, Vol55, No 4, page 1094-1101, July 2006.


Paper Type : Research Paper
Title : Data Mining Applications in Healthcare
Country : India
Authors : Arun Pushpan || Ali Akbar N

Abstract: Data mining provides a variety of latest method for data analysis and discover new useful knowledge.In different research areas,data mining is gaining popularity due to its infinite methodologies and applications to mine the information. Data mining techniques plays a vital role for uncovering new trends in healthcare organization which is also for all the parties associated with this field.Usage of such data mining techniques on medical data determine useful trends and patterns that are used in analysis and decision making. This survey features various data mining techniques such as classification, clustering.............

[1]. Sarvnaz Karimi, Chen Wang, Alejandro Metke jimenez, Raj Gaire, Text and Data Mining Techniques in Adverse Drug Reaction Detection, ACM, 2015.
[2]. Hian Chye Koh, Gerald Tan, Alejandro, Data Mining Applications in Healthcare, Journal of Healthcare Information Management Vol. 19, No. 2.
[3]. Marina Evrim Johnson, Nagen Nagarur, Multi-stage methodology to detect health insurance claim fraud , Springer, 2015.
[4]. Syed Umar Amin, Kavita Agarwal, Dr. Rizwan Beg, Genetic Neural Network Based Data Mining in Prediction of Heart Disease Using Risk Factors, Proceedings of 2013 IEEE Conference on Information and Communication Technologies, 2013.
[5]. Dr. Shailendra Narayan Singh, Monika Gandhi, Predictions in Heart Disease Using Techniques of Data Mining, 2015 1st International Conference on Futuristic trend in Computational Analysis and Knowledge Management,IEEE, 2015.


Paper Type : Research Paper
Title : Music Plagiarism Detector
Country : India
Authors : Fawaz K || Dr.Rekha || K James

Abstract: Music plagiarism detector is an alternative approach for music genre classification which converts the audio signal into spectrograms and then extracts features from this visual representation. The idea is that treating the time-frequency representation as a texture image we can extract features to build reliable music genre classification systems. The proposed approach also takes into account a zoning mechanism to perform local feature extraction, which has been proved to be quite efficient. The feature include MFCC, energy, entropy etc. In this we suggest a method for indexing the features...............

Keywords- Music listening, music quality measures,Mfcc, Energy,entropy.

[1]. Md. Rashidul Hasan, Mustafa Jamil, Md. Golam Rabbani Md. Saifur Rah-man,", speaker identification using melfrequency cepstral coeficients,"3rd international conference on electrical and computer engineering ICESE
[2]. ,2004,Dhaka,Bangladesh Avery Li-Chun Wang,An industrial strength-Audio Search Algorithm Avery Li-Chun Wang"industrial strength- Audio Search Algorithm"IEEE/ACM Transactions On Audio, Speech,and Language Processing, MARCH 2006
[3]. Shu Tamura,Shin-ichi Ito,Momoyo Ito and Minoru Fukumi " lq Method to Evaluate Similarity of Music by Music Features"IEEE/ACM Transactions On Audio, Speech,and Language Processing November 9-12, 2015


Paper Type : Research Paper
Title : IOT based Road Pothole and Hump Identification using Ultrasound Waves
Country : India
Authors : Harikrishnan P M || Dr. Varun P Gopi

Abstract: The major problems still exsist in Indian transporta-tion system is the maintenance of roads. Well maintained roads contribute to the major portion of the countrys economical devel-opement.The Identification or detection of pavement anomalies such as potholes and humps can not only help the drivers to avoid meeting with accidents or vehicle damages, but also helps the municipal authorities for the correct maintainance of the roads. This work is an atempt to produce and implement an IOT based cost effective module to detect/identify the potholes and humps along the roads.Ultrasonic distance sensors are used for the identification of the potholes and humps and also to measure their depth and height, respectively. The measured informations are stored in Thingspeak.com an IOT open server for future analysis.

Keywords: Ultrasonic sensor, Pothole and Hump detec-tion,ESP 8266, IOT, Arduino

[1]. Yi-Ta Chuang,Chih-Wei Yi, , and Chia-Sheng Nian,"Toward Crowdsourcing-Based Road Pavement Monitoring by Mobile Sensing Technologies,"IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 16, NO. 4, AUGUST 2015.
[2]. Varaprasad Golla,, Santosh Hebbar, Praveenraj Pattar, and Rajeshwari Madli , "Automatic Detection and Notification of Potholes and Humps on Roads to Aid Drivers,"IEEE SENSORS JOURNAL, VOL. 15, NO. 8, AUGUST 2015.
[3] Seung-Ki Ryu,and Taehyeong Kim, "and Analysis of Pothole Detection Methods,"Journal of Emerging Trends in Computing and Information Sciences, Vol. 5, No. 8 August 2014.
[4] Swetha R,Amrutha S Raibagi,and Surabhi Anand B,"Ultrasonic anti crashing system for automobiles,"International Journal of Advanced Research in Computer and Communication Engineering, Vol. 2, Issue 4, April 2013.
[5] Kodai Nishii,Hiroyuki Hisamatsu,and Yoshiaki Taniguchi, "of a Bicycle-Mounted Ultrasonic Distance Sensor for Monitoring Road Surface Condi-tion,"7th International Conference on Computational Intelligence, Com-munication Systems and Networks


Paper Type : Research Paper
Title : Packet Dropping in Wireless Ad Hoc Networks
Country : India
Authors : Shanida T K || Smitha Karunan

Abstract: Wireless ad hoc networks have gained much im-portance due to its simplicity and low cost of deployment. The decentralized management of this network makes it susceptible to various attacks. Packet dropping is one of the major security issue. Moblie ad hoc networks is a kind of ad hoc wireless networks in which nodes are mobile. This paper presents a survey on packet dropping, packet dropping attack detection techniques, MANET and packet dropping in MANET. The paper concludes with the necessity of motivating a malicious node in case of malicious packet dropping in wireless ad hoc networks.

[1]. Kennedy Edermacu, Matin Euku and Richard Ssekibuule, "Packet Drop Attack Detection Techniques in Wireless Ad Hoc Networks: A Review", International Journal of Network Security and Its Applications(IJNSA), Vol.6, No.5, September 2015.
[2]. E.S Phalguna Krishna, M.Ganesh Karthik, I.D. Krishna Chandra, "A Survey Report on Stealthy Packet Dropping",International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 4, April 2012.
[3]. Issa Khalil and Saurabh Bagchi, "Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure", IEEE Transactions on Mobile Computing, Vol 10, No.8, August 2011.
[4]. Tao Shu and Marwan Krunz, "Privacy-Preserving and Truthful Detec-tion of Packet Dropping Attacks in Wireless Ad Hoc Networks", IEEE Transactions on Mobile Computing, Vol.14, No.4, April 2015.
[5]. Mohit Kumar and Reshmi Mishra, "An Overview of MANET: History, Challenges and Applications", Indian Journal Of Computer Science and Rngineering(IJCSE).


Paper Type : Research Paper
Title : Searching On the World Wide Web: A Survey
Country : India
Authors : Najira Salam || Syamily K R

Abstract: Searching for information is a crucial element in our lives. It is mostly the case that by issuing the same query, users search for various informations in a search engine. Thus it is very important to satisfy the needs of large number of users by providing a limited result set. Thus the idea of search result diversification was introduced to cover the different intents of user. Apart from providing diversified search results, it is also very important to increase the search experience of users. Query facets can be used to provide some useful knowledge about the query without browsing large number of pages. Thus it is very important to integrate the idea of providing search experience as well as diversified search results to users. This paper presents a survey on different types of search mechanisms and diversification algorithms.

[1]. aHu S, Dou ZC, Wang XJ, "Search Result Diversification Based on Query Facets", IEEE TRANSACTIONS ON KNOWLEDGE AND DATA EN-GINEERING,2016.
[2]. Zhicheng Dou,"Automatically Mining Facets for Queries from Their Search Results", IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING,2016.
[3]. Jianxlin Li, Chengfi Luii,"Context Based Diversification for Keyword Queries over XML Data", IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING,2016.
[4]. Jansen B J, Spink A, Saracevic.T, "Real life, real users, and real needs: A study and analysis of user queries on the web", in Proc. of Int'l Conf. on Very Large Data Bases, pp. 487-499, 1994.
[5]. Carbonell J, Goldstein J,"The use of MMR, diversity-based reranking for reordering documents and producing summaries.", in Proc. of ACM SIGMOD Int'l Conf. on Management of Data, pp. 1-12, 2000.


Paper Type : Research Paper
Title : Review and Analysis of Acceleration Vibration Signal Processing Methods for Road Surface Monitoring
Country : India
Authors : Harikrishnan P M || Dr. Varun P Gopi

Abstract: Identification of the road surface anomalies and roughness levels is essential for the proper monitoring, which inturn improves the driving comfert and passenger safety. Several methods based on Image Processing and signal processing has been used to monitor the road surface conditions such as existence of potholes, humps, and road roughness. It includes 3D Re-construction, Vision based detection, Ultrasonic sound based detection and Vehicle vibration analysis. These methods may contribute to not only the prior information to the passengers and also improves...........

Keywords— Accelerometer, Kalman filter, Gausisan Mixture model, Pothole and Hump detection, Double integration

[1]. Seung ki Ry, Taehyeong Kim"Review and analysis of pothole detection methods,"journal of emerging trends in computing and information sci-ence,2014.
[2]. Xiao Ai,Zhen Zhang, and C.K Chan, "An efficient algorithm for pothole detection using stereo vision,"IEEEinternational Conference on Acousitc, Speech ans signal Processing,, 2003.
[3]. Santhosh Hebbar,Rajeshwari Madli, Varaprasad Golla,and Praveenraj Pattar "Automatic Detection and Notification of Potholes and Humps on Roads to Aid Drivers,"IEEE SENSORS JOURNAL, VOL. 15, NO. 8, AUGUST 2015.
[4]. Ramsay Faragher. "Understanding the basis of the kalman filter via simple and intuitive derivation,"IEEE Signal Processing Magazine, September 2012.
[5]. Jonathan Cofino,Fatemeh Abyarjoo, Armando Barreto,and Francisco R. Ortega, "a Sensor Fusion Algorithm for 3D Orientation Detection with Inertial/Magnetic Sensors,"Electrical and Computer Engineering Depart-ment. Florida International University. Miami, FL. USA


Paper Type : Research Paper
Title : An Improved Watermarking Technique for Relational Data
Country : India
Authors : Vineeth A V || Ali Akbar N

Abstract: The rapid development of the Internet and its related techniques has allowed the tremendous ability to access and redistribute digital multimedia contents. In which, protecting ownership and controlling the copies of digital data have great importance. Watermarking technique have ownership rights over shared relational data and providing a means for tackling data tampering. When ownership rights are imposed using water-marking, the data undergoes certain modifications. As a result, the data quality gets decreased. The main aim is to maintain the ownership of Relational Database and also minimizing distortion.............

[1]. Jun Ziang Pinn and A. Fr. Zung, "A new watermarking technique for secure database", International Journal of Computer Engineering Applications, Vol. I, No. I.
[2]. P. W. Wong and N. Memon, "Secret and public key image watermarking schemes for image authentication and ownership verification", IEEE Trans. Image Process., vol. 10, no. 10, pp. 15931601, Oct. 2001.
[3]. Saman Iftikhar, M. Kamran, and Zahid Anwar, "RRW A Robust and Reversible Watermarking Technique for Relational Data ", IEEE Transactions On Knowledge And Data Engineering, Vol. 27, No. 4, APRIL 2015.
[4]. Udai Pratap Rao, Dhiren R. Patel, Punitkumar M. Vikani, "Relational Database Watermarking for Ownership Protection", 2nd International Conference on Communication, Computing and Security ,2011.
[5]. G.Shyamala, I.Jasmine Selvakumari Jeya, M.Revathi "Secure and Reliable Watermarking in Relational Databases", International Journal of Computer Trends and Technology (IJCTT) volume 11 number 1May 2014


Paper Type : Research Paper
Title : Gesture Controlled Speaking Assistance for Dump and Deaf
Country : India
Authors : Rishad E K || Vyshakh C B || Shameer U Shahul

Abstract: Our project mainly addresses to facilitate deaf and dumb persons life style. Dumb and deaf people communicate with common people throughout the world using hand gestures. But common people face difficulty in understanding the gesture language. To overcome these real time issues system is developed. This is a user friendly, cost effective system which reduces communication gap between dumb and deaf with ordinary people. The proposed system captures a hand gesture using the high definition Pi camera. Image processing of captured gesture is done on Raspberry pi 2. Amplified audio corresponding to each processed gesture is the final output.

Keywords: Image processing, Hand gesture,Python,open CV

[1] A. Anagnostopoulos and A. Pnevmatikakis,, "realtime mixed reality system for seamless interaction between real and virtual objects,"in Proc. 3rd Int.. Conf. on Digital Interactive Media in Entertainment and Arts (DIMEA 08), VNew York, NY, USA, 2008, pp. 199204
[2] C.-H. Su, H.-S. Chiu, and T.-M. Hsieh, "efficient image retrieval based on HSV color space," in 2011 Int.. Conf. on Elect. Control Eng. (ICECE), Sep. 2011, pp. 57465749
[3] D. O. Gorodnichy and A. Yogeswaran, "Detection and tracking of pianist hands and fingers," in Proc. 3rd Can. Conf. Computer and Robot Vision,2006
[4] http://www.python.org/about/gettingstarte
[5] httpS://sourceforge.net/projects/scipy/


Paper Type : Research Paper
Title : Sensing, Processing and analysis of Low Frequency Sound and Footfall Vibration for Detection of Intruding Elephants
Country : India
Authors : Dlbin G || Dr. Thnjuclin Ahnmcd V.I

Abstract: In this...........

Keywords – Rumbles..........

[1] Matthias..............


Paper Type : Research Paper
Title : Satellite Image Mining in Real-time Data Analytical Architecture
Country : India
Authors : Safmina Yousef || Smitha Karunan

Abstract: Remote sensors generates the huge amount of data from satellites. Nowadays, there is a large demand for real-time data for remote sensing applications and to extract useful information from the satellite image. This paper examines different mining approaches in various satellite image applications. A two level merging approach is used to extract the sea area. But, the performance is lower due to the lack of feature extraction. The hierarchical region merging approach is used to automatically extract the sea and land area. The merging approach can be better characterized by supervised information combined with the feature extraction...............

Keywords:- Hadoop Distributed File System (HDFS), Synthetic Aperture Radar (SAR), Scale Invariant Feature Transform (SIFT), LANDSAT, Remote data.

[1] A. Paul, J. Wu, J.-F. Yang, and J. Jeong,"Gradient-based edge detection for motion estimation in H.264/AVC," , IET Image Processing, vol. 5, no. 4, pp. 323327, Jun. 2011.
[2] J. Shi, J. Wu, A. Paul, L. Jiao, and M. Gong, "Change detection in synthetic aperture radar image based on fuzzy active contour models and genetic algorithms " , Math. Prob. Eng, vol. 2014, 15 pp, April 2014.
[3] Tanuja A, Swetha Ramana , VTU Belgaum, India, "Analyzing Big Data using Hadoop " , International Journal for Innovative Research in Science and Technology, Volume 3, Issue 03, August 2016.
[4] A. Labrinidis and H. V. Jagadish, "Challenges and opportunities with Big Data " , in procedings of 38 th International Conference on Very Large Data Bases Endowment, Turkey, Aug. 2731, 2012, vol. 5, no. 12, pp. 20322033.


Paper Type : Research Paper
Title : Packet Dropping in Wireless Ad Hoc Networks
Country : India
Authors : Shanida T K || Smitha Karunan

Abstract: Wireless ad hoc networks have gained much im-portance due to its simplicity and low cost of deployment. The decentralized management of this network makes it susceptible to various attacks. Packet dropping is one of the major security issue. Moblie ad hoc networks is a kind of ad hoc wireless networks in which nodes are mobile. This paper presents a survey on packet dropping, packet dropping attack detection techniques, MANET and packet dropping in MANET. The paper concludes with the necessity of motivating a malicious node in case of malicious packet dropping in wireless ad hoc networks.

[1]. Kennedy Edermacu, Matin Euku and Richard Ssekibuule, "Packet Drop Attack Detection Techniques in Wireless Ad Hoc Networks: A Review", International Journal of Network Security and Its Applications(IJNSA), Vol.6, No.5, September 2015.
[2]. E.S Phalguna Krishna, M.Ganesh Karthik, I.D. Krishna Chandra, "A Survey Report on Stealthy Packet Dropping", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 4, April 2012.
[3]. Issa Khalil and Saurabh Bagchi, "Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure", IEEE Transactions on Mobile Computing, Vol 10, No.8, August 2011.
[4]. Tao Shu and Marwan Krunz, "Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks", IEEE Transactions on Mobile Computing, Vol.14, No.4, April 2015.
[5]. Mohit Kumar and Reshmi Mishra, "An Overview of MANET: History, Challenges and Applications", Indian Journal Of Computer Science and Rngineering(IJCSE).



IOSR Journals are published both in online and print versions.