International Conference on Innovation and Advance Technologies in Engineering
(Volume-14)

EXTC

Paper Type :: Research Paper
Title :: A Review of Photonic and Its Advances in Fundamental Sciences and Engineering for Different Technologies of Light
Country :: India
Authors :: Ms Jyoti Mali
Page No. :: 01-05

The job of light in our lives is both unavoidable and primordial. Bright light presumably had a job in the very birthplaces of life, and light-determined photosynthesis underlies everything except the most crude of living things today. For people, locate is the most critical of the faculties for seeing our general surroundings. Without a doubt, the exceedingly advanced vertebrate eye is a standout amongst the most lovely light identifiers at any point made. However light is affecting the manner in which we live today in manners we would never have envisioned only a couple of decades prior. As we move into the following century, light will play a considerably increasingly basic job—regularly the focal job—in the manners in which we convey, in the act of medication, in accommodating the country's resistance............

Keywords: Photonics, light harvesting, optical communication, nano lasers, nanotechnology, light engineering.

[1]. Maxwell, J.C. A dynamical theory of the electromagnetic field. Phil. Trans. R. Soc. Lond. 1865,doi:10.1098/rstl.1865.0008.
[2]. Born, M.; Wolf, E. Principles of Optics; Cambridge University Press: Cambridge, UK, 2002.
[3]. Liang, X.; Graf, B.W.; Boppart, S.A. Imaging engineered tissues using structural and functional optical coherence tomography. J. Biophotonics. 2009, 2, 643–655.
[4]. Linninger, A.A. Biomedical systems research—New perspectives opened by quantitative medical imaging. Comput. Chem. Eng. 2012, 36, 1–9.
[5]. Svanberg, S. Biophotonics-techniques and applications. Laser Photon. Rev. 2013, 7, A43–A44.


Paper Type :: Research Paper
Title :: Zero Volatage Switching Operation of a Boost Converter
Country :: India
Authors :: Suraj Bharadwaj Tripathy || Sangeeta Kotecha || Priyanka Tripathi
Page No. :: 06-13

The power converters are known as one of the most widely used in any electrical applications. However, design of a power converter taking inductor current ripple into existence is one of the major concerns while designing a boost converter. A huge inductor ripple current may destroy the entire circuit resulting a huge amount of losses. Hence, a topology should be adopted to minimise the over current in a power converter circuit because of the inductive element.A gate switching drive in case of a boost converter results induction over current which cause excessive switching loss.In this paper a zero voltage switching topology is designed which allows the MOSFET to switch on whenever it senses a zero voltage.Thus the switching losses can be minimised.

[1]. Tim Ardley,Specification Of The Over Voltage Protection Circuit,IEEE,2013.
[2]. W. Phipps, Martin R. Harrison, Richard DukeThree-Phase Phase-Locked Loop Control Of A New Generation Power converter,IEEE,2006.
[3]. Laszlo Huber, Member, IEEE, Brian T. Irving,Review And Stability Analysis Of PLL-Based Interleaving Control Of DCM/CCM Boundary Boost PFC Converters,IEEE,2009.
[4]. Pei-Hsin Liu,A Novel Phase Lock Loop (PLL)-Based Interleaving Structure For Variable-Frequency Controlled Voltage Regulators,ieee,2015.


Paper Type :: Research Paper
Title :: Propagation Path Loss Modeling in Millimeter Wave Bands for 5G Cellular Communications
Country :: India
Authors :: Prof Jyoti Dange || Dr.R.P.Singh || Dr. Vikas Gupta
Page No. :: 14-17

This paper presents a probabilistic position millimeter-wave path loss model supported real- world 30GHz mm wave frequency measurements. The probabilistic path loss approach uses a free path line-of-sight propagation model and for non-line-of-sight conditions uses a close-in free house reference distance pathlossmodel. The probabilistic model employs a coefficient operate that specifies the line-of- sight likelihood for a given transmitter-receiver separation distance. Results show that the probabilistic path loss model offers just about identical results whether exit or not .One uses a non-line-of-sight close- in free house reference distance path loss model, with a reference distance of onemeter, or a floating- intercept path loss model. This letter additionally shows that site-specific environmental data could also be used to yield the probabilistic coefficient function for selecting between line-of-sight and non-line-of- sight conditions.

Keywords: 5G network; millimetre wave; pathloss model

[1]. S. Y. Seidel, K. Takamizawa, and T. S. Rappaport,( May 1989) "Application of second-order statistics for an indoor radio channel model," in IEEE 39th Vehicular Technology Conference, pp. 888–892 vol.2.
[2]. S. Jaeckel et al.( June 2014), "QuaDRiGa: A 3-D multi-cell channel model with time evolution for enabling virtual field trials," IEEE Transactions on Antennas and Propagation, vol. 62, no. 6, pp. 3242–3256,.
[3]. Y. Yu et al.(Dec. 2015), "Propagation model and channel simulator under indoor stair environment for machine-tomachine applications," in 2015 AsiaPacific Microwave Conference, vol. 2, , pp. 1–3. 4. T. S. Rappaport et al.( May 1991), "Statistical channel impulse response models for factory and open plan building radio communicate system design," IEEE Transactions on Communications, vol. 39, no. 5, pp. 794–807,.
[4]. Wireless Valley Communications, Inc., SMRCIM Plus 4.0 (Simulation of Mobile Radio Channel Impulse Response Models) Users Manual, Aug. 1999.
[5]. V. K. Rajendran et al., "Concepts and implementation of a semantic web archiving and simulation system for rf propagation measurements," in 2011 IEEE Vehicular Technology Conference (VTC Fall), Sept 2011, pp. 1–5.


Paper Type :: Research Paper
Title :: 5g Radio Head- Next Generation Technology
Country :: India
Authors :: Gauri Salunkhe || Akanksha Bhargava || Jyoti Dange
Page No. :: 18-21

In the near prospect, beyond 4G has the major objectives or difficulty that need to be addressed are improved capacity, better data rate, decreased latency, and enhanced quality of service. To meet these demands, radical improvements need to be made in cellular network architecture. This paper presents the consequences of a detailed study on the fifth generation (5G) cellular network structural design, challenges and some of the solution for promising technologies that are supportive in improving the structural design and gathering the demands of users. In this comprehensive review focuses 5G cellular network architecture, huge various input many output technologies, and device-to-device communication (D2D). Next, to with this, some of the promising technologies that are addressed in this paper include intrusion supervision, variety sharing with cognitive radio, ultra-dense networks............

Keywords: 5g design,5g radio head,baseband and edge computing.

[1]. [1] R. Baldemairet al, ""Evolving wireless communications: Addressing the challenges and expectations of the future,‟‟IEEE Veh. Technol. Mag.vol. 8, no. 1, pp. 24–30, Mar. 2013.
[2]. T. Rappaport, Wireless Communications: Principles and Practice, Englewood Cliffs, NJ, USA: Prentice-Hall, 1996.
[3]. T. Halonen, J. Romero, and J. Melero, Eds., GSM, GPRS, and EDGE Performance: Evolution towards 3G/UMTS. New York, NY,USA: Wiley, 2003.VOLUME 3, 20151229A. Gupta, R. K. Jha: Survey of 5G Network: Architecture and Emerging Technologies
[4]. J. G. Andrews, A. Ghosh, and R. Muhamed, Fundamentals of WiMAX.Englewood Cliffs, NJ, USA: Prentice-Hall, 2007.
[5]. B. Furht and S. A. Ahson, Eds, Long Term Evolution: 3GPP LTE Radioand Cellular Technology. Boca Raton, FL, USA: CRC Press, 2009, ch. 12, pp. 441–443


Paper Type :: Research Paper
Title :: Analysis of Variations in Data Recognition Rate using Neural Logic Min-Max Algorithm
Country :: India
Authors :: Sarang Kulkarni || Mamta Meena || Nikita Patil || Prof. Mahendra Patil
Page No. :: 22-27

This paper presents a method of recognition of signatures by Fuzzy Min-Max Neural Networks and analyses the effect of moment invariants on signature recognition by comparing the accuracy of recognition. In addition, database is also tested by fuzzy min-max neural networks for recognition of signatures resulting more accurate results. Image processing and fuzzy neural network toolboxes are used in person identification system provided by MATLAB. For the identification of signatures database is created for five persons with the thirty times repetitions. These signatures are preprocessed by scanning the images and then converting them to standard binary images. The features are selected and extracted which gives the information about the structure of signature. This paper also investigates the performance of the system by using fuzzy min max neural networks classifier.

Keywords: Fuzzy min max neural networks, handwritten signatures, artificial neural network, Multi layer perceptrons, HU's seven moment invariants

[1]. B. M. Chaudhari, A. A. Barhate, and A. A. Bhole; "Signature Recognition Us-ing Fuzzy Min-Max Neural Network", Proceedings of the IEEE International Conference on Control, Automation, Communication and Energy Conservation. Tamilnadu, pp. 17, 2009.
[2]. I. A. Ismail, and M. A. Ramadan, "Automatic Signature Recognition and Verification Using Principal Comp onents Analysis," Proceeding of IEEE International Conference on Computer Graphics, Imaging and Visualisation, Penang, Malaysia, pp.356-361, 2008.
[3]. A. K. Jain, A. Ross, and S. Prabhakar, "An Introduction to Biometric Recognition," IEEE Transaction on Circuits and Systems for Video Technology, Vol. 14, No.1, PP. 4- 20, 2004
[4]. F. Bortolozi. E. R. Justino., A. E. Yocoubi, and R. Sabourin, "An Off-line Signature Verification System Using HMM and Graphometric Features", 4th IAPR International Workshop on Document Analysis Systems, pp. 211-222, 2000.
[5]. P. K. Simpson, "Fuzzy min-max neural network-Part I: Classification,"IEEE Trans. Neural Netw,vol. 3, no. 5, pp. 776–786, Sep. 1992.


Paper Type :: Research Paper
Title :: Mixed Reality for Special Education
Country :: India
Authors :: Tanvi Kapdi || Foram Shah
Page No. :: 28-30

Special able students of our society needs equal opportunity to develop and participate to the society and grow financially. Virtual reality gives students with disabilities the opportunity to practice everyday "real world" skills in a safe environment. One of the biggest benefits to train students in this way is that students can learn from realistic scenarios without the risk of practicing an unfamiliar skill in an uncontrolled real-life situation. Students are even able to take virtual field trips, visiting places in their communities which they would not normally be able to experience. Based on the current research study and understanding it was found that MR systems would provide better applicability in their treatments.

[1]. O. M. d. Saúde. Classificação Internacional de Funcionalidade, Incapacidade e Saúde (CIF), Lisboa: Direcção-Geral da Saúde, 2004.
[2]. Rocha T. Acessibilidade e Usabilidade na Internet para Pessoas com Deficiência Intelectual , Universidade de Trás os Montes e Alto Douro, Vila Real, 2008.
[3]. INR, "O que é a CIF," [Online]. Available: http://www. inr.pt/content/1/55/que-cif. [Accessed 15 October 2014].
[4]. Beyer HO. Tecnologias, desenvolvimento de projetos e inclusão de pessoas com deficiência , Revista da Educação Especial, vol. 1, 2006; p. 46-51.
[5]. Santos DCO. Potenciais dificuldades e facilidades na educação de alunos com deficiência intelectual , vol. 38, 2012.


Paper Type :: Research Paper
Title :: Multi-Feature Content Based Image Retrieval System
Country :: India
Authors :: Kunal Shriwas || Manoj Mishra || Mohan Kumar || Bhavin Shah || Nilesh Gode
Page No. :: 31-35

The Content-Based Image Retrieval (CBIR) techniques comprise methodologies to retrieve images over the image data set being studied according to the type of the image. The main purpose of CBIR consists in classifying images avoiding the use of manual labels related to understanding of the image by the human being vision. Numerous techniques have been developed for content-based image retrieval in the last decade. In this paper, we discuss some of the key contributions in the current decade related to image retrieval.

Keywords: Content Based Image Retrieval (CBIR), Color, Texture, Shape, edge histogram descriptor (EHD), Precision, Recall.

[1]. M. Flickner, H. Sawhney, W. Niblack, J. Ashley, Q. Huang, B. Dom, M. Gorkani, J. Hafner, D. Lee, D. Petkovic, and P. Yanker, "Query by image and video content: The QBIC system," IEEE Computer, vol. 28, no 9, pp.23-32, Sep. 1995.
[2]. A. Gupta, and R. Jain, "Visual Information Retrieval," Comm. Assoc. Comp. Mach., vol. 40, no. 5, pp. 70–79, May. 1997.
[3]. S. Mukherjea, K. Hirata, and Y. Hara, "AMORE: A World Wide Web Image Retrieval Engine," Proceedings of World Wide Web, vol. 2, no. 3, pp. 115-132, June. 1999.
[4]. A. Natsev, R. Rastogi, and K. Shim, "WALRUS: A Similarity Retrieval Algorithm for Image Databases," IEEE Transaction On Knowledge and Data Engineering, vol.16, pp. 301-318, Mar. 2004.
[5]. A. Pentland, R. Picard, and S. Sclaroff , "Photobook: Content based manipulation of image databases," International Journal of Computer Vision, vol.18, no 3, pp.233–254, June 1997.


Paper Type :: Research Paper
Title :: Automated Analysis of Freeware Installers Promoted By Download Portal
Country :: India
Authors :: Asst. Prof. Bhavna Arora || Asst. Prof. Nida Parkar || Asst. Prof. Priti Rumao
Page No. :: 36-46

Freeware is proprietary software that can be used free of charge. A popular vector for distributing freeware is download portals, i.e. websites that index, categorise, and host packages. download portals can be abused to distribute doubtlessly unwanted applications (doggy) and malware. The abuse may be due to doggy and malware authors importing their ware, by means of benign freeware authors joining as affiliate publishers of pay-according to-installation (PPI) services and other associate programs, or by means of malicious down load portal owners. The authors perform a scientific observe of abuse in download portals. They build a platform to move slowly down load portals and apply it to down load 191 okay home windows freeware installers from 20 download portals..........

Keywords: VirusTotal, Freeware, Softonic, Freemium, Rogueware.

[1]. Kotzias, P., Bilge, L., Caballero, J.: 'Measuring PUP prevalence and PUP distribution through pay-per-install services'. USENIX Security Symp., Austin, TX, USA, August 2016
[2]. Thomas, K., Crespo, J.A.E., Rastil, R., et al.: 'Investigating commercial pay- per-install and the distribution of unwanted software'. USENIX Security Symp., Austin, TX, USA, August 2016
[3]. CNET: http://download.cnet.com, accessed November 2017
[4]. Softonic: https://www.softonic.com/, accessed November 2017
[5]. Tucows: http://tucows.com, accessed November 2017
[6]. Bruce, J.: 'Defining rules for acceptable adware'. Virus Bulletin Conf.,.


Paper Type :: Research Paper
Title :: Intrusion Detection Algorithm Based on Convolution Neural Network
Country :: India
Authors :: Asst. Prof. Priti Rumao || Asst. Prof. Bhavna Arora || Asst. Prof. Nida Parkar || Asst. Prof. Samira Nigrel
Page No. :: 47-53

With the quick advancement of system innovation, dynamic safeguarding of the system interruption could really compare to previously. So as to improve the knowledge and precision of system interruption identification and lessen false cautions, another profound neural system (NDNN) show based interruption recognition technique is structured. A NDNN with four concealed layers is demonstrated to catch and group the interruption highlights of the KDD99 and NSL-KDD preparing information. Tests on KDD99 and NSL-KDD dataset demonstrates that the NDNN-based strategy improves the execution of the interruption recognition framework (IDS) and the precision rate can be gotten as high as 99.9%, which is higher when contrasted and different many interruption location strategies. This NDNN model can be connected in IDS to make the framework progressively secure.

[1]. Dong, H.S., An, K.K., Choi, S.C., et al.: 'Malicious traffic detection using K- means', J. Korean Inst. Commun. Inf. Sci., 2016, 41, (2), pp. 277–284
[2]. Al-Yaseen, W.L., Othman, Z.A., Nazri, M.Z.A.: 'Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system', Expert Syst. Appl., 2017, 67, pp. 296–303
[3]. Kaur, A., Pal, S.K., Singh, A.P.: 'Hybridization of K-means and firefly algorithm for intrusion detection system', Int. J. Syst. Assur. Eng. Manage., 2017, 9, (4), pp. 1–10
[4]. Tahir, H.M., Hasan, W., Said, A.M., et al.: 'Hybrid machine learning technique for intrusion detection system'. 'Computer science for improving the quality of life'. Int. Conf. Computing and Informatics, Icoci, Istanbul.


Paper Type :: Research Paper
Title :: Lighting Two Candles With One Flame: An Unaided Human Identification Protocol With Security Beyond Conventional Limit
Country :: India
Authors :: Asst. Prof. Nida Parkar || Asst. Prof. Bhavna Arora || Asst. Prof. Priti Rumao || Asst. Prof. Chandana Nighut
Page No. :: 54-64

Structuring an effective convention for staying away from the danger of account based assault in nearness of an amazing meddler remains a test for over two decades. Amid confirmation, the nonappearance of any safe connection between the prover and verifier makes things much increasingly powerless as, subsequent to watching an edge test reaction pair, clients' mystery may effortlessly get determined because of data spillage. Existing literary works just present new systems with guaranteeing better angles over past ones, while disregarding the perspectives on which their proposed plans adapt ineffectively. Obviously, the greater part of them are a long way from acceptable either are found a long way from usable or absence of security highlights. To conquer this issue, we initially present the idea of "spillage control" which puts a bar on the common data spillage rate and significantly helps in expanding both the ease.............

Keywords: Authentication, Password, Information spillage, Recording assault, Threat recognition, Threat aversion, Usability.

[1]. Asghar, H.J., Li, S., Pieprzyk, J., Wang, H., 2013. Cryptanalysis of the convex hull click human identification protocol. International Journal of Information Security 12, 83–96.
[2]. Asghar, H.J., Pieprzyk, J., Wang, H., 2010. A new human identification protocol and coppersmiths baby-step giant-step algorithm, in: International Conference on Applied Cryptography and Network Security, Springer. pp. 349–366.
[3]. Bai, X., Gu, W., Chellappan, S., Wang, X., Xuan, D., Ma, B., 2008. PAS: predicate-based authentication services against powerful passive adversaries, in: Computer Security Applications Conference, 2008. ACSAC 2008. Annual, IEEE. pp. 433– 442.
[4]. Bonneau, J., Herley, C., Van Oorschot, P.C., Stajano, F., 2012. The quest to replace passwords: A framework for comparative evaluation of web authentication schemes, in: Security and Privacy (SP), 2012 IEEE Symposium on, IEEE. pp. 553–567.
[5]. Broder, A., Mitzenmacher, M., 2004. Network applications of bloom filters: A survey. Internet mathematics 1, 485–509.