ARPN Journal of Engineering and Applied Sciences                ISSN 1819-6608 (Online)
 

 
GoogleCustom Search
 
 
 
ARPN Journal of Engineering and Applied Sciences                                    June 2015  |  Vol. 10  No. 10
   
Title:

Multi-tier load balancing in pervasive computing using power managing approach

Author (s):

R. Vasanthi and R. Prakash

Abstract:

With their growing popularity in the today web services are faced with the deal of handling thousands of users requests every second, each requiring very fast responses. Existing work controls power and application-level performance separately and thus cannot simultaneously provide multi tier web services between the different tiers. The present work fails to define the cost function over the time interval. Providing the solution for multi tier web services, Hierarchy based Load Balancing Approach (HLBA) is used to model the association between the different tiers. Manage the cost function over the time interval using Power Managing Approach (PM) for overcoming the above issues. Performance of Hierarchy based Load Balancing Approach with Power Management (HLBA- PM) provides a more satisfaction to the users for today’s multi-tier dynamic web services. Hierarchy based Load Balancing Approach with Power Management considers the problem of cost function and correlations between the different type of multi- tier.

   

Full Text

 

Title:

Zero point energy conversion for self-sustained generation

Author (s):

P. RajaRajeswari, S. Sakthi, K. Bharathi and S. Srinivasan

Abstract:

In this paper zero point energy conversion is proposed for self-sustained generator applications. Our entire universe balance is based on a magnetic energy lying in a minimum energy point called zero-point. By using an energy conversion machine magneto-gravitic link can be made zero-point energy by taking kinetic energy form i.e. rotational motion .Kinetic energy link is constructed using a special permanent magnet arrangement and it is independent of electricity . It uses perpetual motion and the  kinetic energy is later converted by using a special type low speed axial flux alternator, comprising two rotating discs in-between which the coil is placed from which the power is drawn.

   

Full Text

 

Title:

Automated supervisory control system of urban passenger transport

Author (s):

Andrey Vladimirovich Ostroukh, Nataliya Evgenievna Surkova, Mikhail Borisovich Polgun and Anna Vladimirovna Vorobieva

Abstract:

The article presents scientific and technical aspects of improvement of the effectiveness of the Automated System of Urban Passenger Transport Supervisory Control (ASUPTSC) that are the most crucial elements of modern city passenger transportation management. It is proposed to establish the ASUPTSC on the basis of development of software and technological solutions designed to improve the quality of headways monitoring that ultimately improves the quality of supervisory control and management. The article includes the overview of domestic and international experience of using the automated systems of urban passenger transport supervisory control. The article provides the analysis of the informational support structure for ASUPTSC. The analysis includes the main components of any automated system of supervisory control (ASSC), the basic roles of participants of transport management process. The article provides the analysis of tasks, solved via ASUPTSC, requirements to it, and ASUPTSC architecture.

   

Full Text

 

Title:

Siso fuzzy tuned power oscillation controller for UPFC connected network

Author (s):

S. Sakthi and P. Raja rajeswari

Abstract:

This paper focuses on the design of single input single output fuzzy controller for a Power oscillation controller based UPFC for damping rotor oscillation in power system network. The oscillation due to disturbance cannot damp out only by UPFC, but with single input Fuzzy tuned Damping controller based UPFC can easily damp out the oscillation. Here the proposed system has been implemented in the standard nine-bus system and simulation results are taken by deriving the transient stability algorithm using C compiler software. After the analysis it is found that the Fuzzy based POD controller is very much required for UPFC controller to damp out the power oscillations.

   

Full Text

 

Title:

A channel allocation scheme to avoid channel interference using genetic algorithm and heuristic approach in mobile networks

Author (s): M. Kamaladevi, R. Devika and T. Renugadevi
Abstract:

Channel Interference is the major problem in mobile networks. The reasons for channel interference are improper frequency planning, weather conditions etc. The reproductive stage of Genetic Algorithm is used to avoid channel interference in dynamic mobile channel allocation. This algorithm combines sequential heuristic methods into a genetic algorithm that consists of three assignment strategies. The three strategies are regular interval assignment strategy, greedy assignment strategy which consists of node degree ordering and Frequency Exhaustive Assignment technique and Genetic Algorithm strategy which consists of selection, crossover and mutation.

   

Full Text

 

Title:

Challenges and issues of power distribution automation using multi agent systems

Author (s): Anisha K and Rathina Kumar M
Abstract:

In Today’s world, “WITHOUT POWER CAN’T DO ANYTHING”. Because of electronic technology development depends up on power system. Electric power distribution system has an important role in electrical power systems to deliver the electricity to consumers by multi agent systems (MAS). Automation in the distribution field with MAS allows utilities to implement flexible control of distribution systems, which can be used to enhance efficiency, reliability, and quality of electric service. In this paper, the challenges facing in fault detection, isolation and restoration in the power system are discussed.

   

Full Text

 

Title:

UAV remote control distraction prevention trough synthetic augmented virtual imaging and oculus rift-style headsets

Author (s):

Luca Piancastelli and Raimondo Alberto Bernabeo

Abstract:

A remote control station for Unmanned Aerial Vehicles (UAV) based on oculus Rift-style headsets and joysticks is proposed in this paper. With this solution situation awareness and distraction can be controlled and measured during the flight. With Virtual Augmented Reality (VAR) software it is possible reproduce accurately both the cockpit and the external view thanks to the helmet tracking system. Also the head-up display (HUD) and up-to-date flight instruments can be reproduced. In this way the PF (Pilot Flyng) station can be reduced to helmet, throttle/stick joysticks with force feedback and a few additional LCDs. Another main advantage of VAR headsets is the possibility of reconfiguring the cockpit via software and to use it for several different UAVs. In Figure-5 it is possible to see a logical schema of a VAR station: the pilot inputs via helmets (line of sight direction), flight controls (stick and throttle) and switches on joysticks the data in the AVCS software (Aircraft Visualization and Control System): The Aircraft Visualization and Control System take the data from the aerial vehicles, elaborates them and outputs the external view (external visual system) and the view of instruments (instrument visualization system). These two "images" are overlapped and mixed in a highly hierarchical visualization system, where only the relevant objects are depicted. To do so the external camera images from the aerial vehicle are analyzed and cleaned of all non relevant data. The data from the sensors are also to be included in the synthesizing process. The application of these ideas as discussed in this paper consists of the realisation of a VAR display system for a remotely piloted aerial vehicle. All the instruments are modelled via Head Up Display (HUD) while the external scenery is analyzed and only relevant elements for mission accomplishment or collision avoidance are represented. The PF have the possibility of a 360° field of view. Sound realism and true situation awareness can be then achieved. Software for distraction control and situation awareness can be easily implemented in the system. A synthetic audio interrogation system can keep track of the current state of alert of the PF.

   

Full Text

 

Title:

Application of the method of distribution of the total energy of impact on the bearing elements of the body of the bus when calculating the failure loads

Author (s):

Kalmikov B.Yu., Ovchnnikov N.A., Kalmikova O.M, Guguyev I.K. and Kushnariva I.V.

Abstract:

Article is devoted to solving practical problems in the field of passive safety of buses and in particular the definition of the uneven distribution of potential energy from the bearing elements of the body rollover bus on its side. This non-uniformity due to a significant difference axle load bus has an impact on the definition of failure loads arising from the impact of the roof of the bus on the support surface. Group of authors proposed a method of dividing the total impact energy on the bearing elements of the body of the bus and determining failure loads largest crumple bus rollover.

   

Full Text

 

Title:

New petrophysical model for unconventional high-Co2-content oil reservoirs

Author (s):

Jose Miguel Galindo, Jorge Arturo Camargo, Jose Wilder Losada, Jorge Ivan Chavarro, Freddy HumbertoEscobar and Carolina Charry

Abstract:

It is known the existence of unquantified amount CO2 produced from some fields in the Caguán Putumayo basin in Colombia. The effect of CO2on resistivity and porosity open hole logs have not been evaluated yet; then, it is proposed to build a new petrophysical interpretation model from available open hole logs in order to quantify the CO2 concentration in the Caballosformation in the Caguán Putumayo basin to facilitate a better understanding of the thermodynamic behavior of the reservoir fluids. Knowing CO2significant subsurface concentration allows evaluating not only the impact in hydrocarbon reserves and production costs but also alternative management strategies for produced CO2 to reduce environmental pollution. Reservoir CO2quantification resulted feasible by using porosity and neutron open hole logs superposition only if filtrate invasion is low or moderate. This method detects the residual CO2 saturation; however, special drilling muds with null or low filtrate permits estimating virgin zone porosity. The method applies with no additional costs to all under saturated reservoirs containing CO2 if density and neutron porosity logs are available. Neutron porosity can be replaced by NMR porosity.

   

Full Text

 

Title:

Convective heat transfer of titanium (IV) oxide nanofluids under turbulent flow condition

Author (s):

Budi Kristiawan, Samsul Kamal, Suhanan, Yanuar

Abstract:

This study has experimentally investigated the flow behavior and convective heat transfer coefficient of TiO2 distilled water nanofluids flowing inside a horizontal circular tube at turbulent regime under a uniform heat flux boundary condition. Anatase titanium (IV) oxide nanoparticles of average size approximately 21 nm dispersed into distilled water with volume fraction range from 0.1 to 0.5 vol.% were used as nanofluids.  The observed nanofluids were assumed as time-independent non-Newtonian fluid with their specific values of power law index and consistency coefficient. A new correlation involving the microconvection and microdiffusion effects was proposed to predict Nusselt number. As nanofluid samples behave the non-Newtonian fluid, the drag reduction phenomenon should be theoretically exhibited in turbulent flow regime. This drag reduction phenomenon might be one of the important factors that was responsible on the improvement of heat transfer performance in nanofluids aside from the established heat transfer enhancement mechanisms.

   

Full Text

 

Title:

Cost based multipath routing in wireless sensor network for multimedia data

Author (s):

Vairam T and Kalaiarasan C

Abstract:

A Wireless Sensor Network (WSN) essentially consists of data sensor nodes and video sensor nodes, which senses both sound and motion of events. Routing is the process of moving packets across a network from one node to another. It is usually performed by dedicated devices called routers. Single path routing protocol is used for route discovery and resource utilization. There are some drawbacks like reduced network throughput, network performance, increased traffic load and delay in data delivery. To overcome these problems, multipath routing is preferred. It is the method of using multiple paths in a network. A new system called Cost Based Multipath Routing (CBMR) for multimedia data is proposed based on multipath routing to improve the reliability of data transmission. The need for the proposed system is to provide multipath routing for multimedia data in an efficient manner where the best path is chosen based on the cost. . The proposed system incorporates Real-time Transmission Protocol (RTP) and Multiple Description Coding (MDC) for transmission of multimedia data. Using these techniques, the multimedia data is encoded into trace files at the sender side and the decoding of the trace files is performed at the receiver side. The generated trace files contain information about frames, pixels and headers. This system is applied between the source and sink in a wireless sensor network.  The proposed protocol is simulated using Network Simulator2.

   

Full Text

 

Title:

Air permeability investigation towards automotive tyre pressure sustainability and life saving

Author (s):

Sivaraos, M.J. Raguvaran, A. S. Dahlan, R. Izamshah, M.A. Amran, Hadzley

Abstract:

One of the main reasons for major road accidents which often lead into loss of life’s is the catastrophic tyre failure caused by vehicles running with improper tyre pressure. The phenomena where tyre loses pressure naturally and contracts over time is called air permeation, which is identified to be the main cause of tyre to deflate but rarely can be realised by naked eyes. Properly inflated tyres can safe tyre life up to 20% which is equivalent to nine months of its life span, save fuel from 4% to 10%, increase braking efficiency up to 20%, lightens steering system and ease self-steer. Therefore, this paper reveals the investigation findings by analysing the factors that affect the air permeation that eventually causes pressure loss in an automotive tyre.  The experimentations were performed in both static and dynamic conditions where they were also tested with and without loaded situation to extract precise data of the pressure loss from tyre. The results show that no matter what type of tyre or condition it undergoes, it still experience pressure drop but at different rate subjected to air properties, temperature, tyre materials and mechanical fittings of the wheel.

   

Full Text

 

Title:

A wireless sensor network for polyhouse cultivation using Zigbee technology

Author (s):

Prathiba Jonnala and G.S.R. Sathyanarayana

Abstract:

The required climatic conditions for the polyhouse cultivation can be provided by using this proposed technique. The Zigbee technology has used for implementing the proposed wireless network. Few of the surrounding parameters of ambient temperature, humidity percentage, light intensity range and soil moisture content inside polyhouse are controlled and optimum conditions for crop growth inside polyhouse can be provided with the proposed model using abrupt actuators used. This model has developed with the mesh topology consists various nodes which are deployed inside polyhouse and are controlled by one central monitoring unit (CMU). Based on the crop the threshold values for the sensors and control values for the actuators during day time and night time are programmed in the CMU and it continuously receives the sensors data from all the nodes, and with respect to the programmed values of crop the CMU sends the controlling data to the actuator node for maintaining constant and required environmental conditions. By using this proposed model the necessity of human effort can be reduced and also the suitable weather conditions for the crop production irrespective of the season can be provided for the maximum beneficiary to the farmer.

   

Full Text

 

Title:

Distance routing on mesh network on chip

Author (s):

Elizabeth I and M. RajasekharaBabu

Abstract:

NoC (Network on Chip) is a promising technology for the interconnection network. Performance of an interconnection network depends on the routing logic. We explore the state of art of the existing routing algorithms for mesh connected network. In this paper we have tried to model the distance routing for mesh connect NoC network. The performance of the distance routing is compared with that of the dimension order and odd-even routing algorithms.  Experimental analysis on synthetic traffic shows that our proposed distance routing outperforms the state of the art of routing algorithms by increased link utilization fairness.

   

Full Text

 

Title:

A novel high performance dynamic voltage level shifter

Author (s):

Srinivasulu Gundala, Venkata K. Ramanaiah and Padmapriya K.

Abstract:

Level shifters are interfacing circuits, generally for Low voltage to high voltage translation Level shifters are used and high to low translation inverters are sufficient, but it needs an additional circuitry. In this paper we have presented a novel high performance Dynamic Voltage Level Shifter. It is a unique circuit will perform level-up shift, level-down shift, and Blocking. The type of shift, Level up/down is will be performed automatically based on its input voltage (VIN). The proposed dynamic voltage level shifter has designed and simulated in 90nm technology. Simulation results demonstrate that the proposed level shifter translates voltages between 0.4V to 1V and vice versa, at operating frequencies of 100 KHz, 500 KHz, and 1 MHz. It is observed that the proposed design having static power of 4.6 nW while level up, and 2.8 nW while level down operations. Level up and level down average active power is 20.9 nW.

   

Full Text

 

Title:

Development of the rules base for an expert system choice adaptive learning strategy

Author (s):

Andrey Vladimirovich Ostroukh, Dmitry Ivanovich Popov, Dmitry Grigorievich Demidov and Nataliya Evgenievna Surkova

Abstract:

In this article is described rules data base creation method for selection an optimum education path for employees. Rules are formed on the basis of the intellectual data analysis of open education Institute MSUPA by Ivan Fedorov. Those data contains information about students’ education results with applied remote educational technologies for 10 years. This analyses shows both the most successful and most negative educational method, which could be used by another students by definition others education strategies. Analyses showed the studying sequence of disciplines education plan directly connected with students’ education productivity. Therefore expert system, based on received data will be indispensable tutor’s instrument and helps to automatize support process of electronic education.

   

Full Text

 

Title:

Some new data on isotope stratigraphy of the Permian rocks at the east of the Russian platform

Author (s): N.G. Nurgalieva, V.V. Silantiev, O.S. Vetoshkina, V.A. Ponomarchuk, D.K. Nurgaliev and M.N. Urazaeva
Abstract:

Variations of d13С, d18O, 87Sr/86Sr in carbonate rocks and shells of the Permian age at the east of the Russian platform have been regarded. Trends of these isotope ratios reflect global regression, increasing of regional environments isolation from open sea and an arid climate challenges.

   

Full Text

 

Title:

Numerical analysis on the performance of refrigeration compressors with varying operation frequencies

Author (s):

S. J. Park and Y. L. Lee

Abstract:

Reciprocating compressors have high energy consumption due to friction between component parts. Linear compressors with fewer parts than reciprocating compressors are able to minimize friction and deliver energy efficient performance. This study examines the impact of changing frequencies in compressors used in household refrigerators on overall cooling capacity and COP. For this, two frequency settings of 56.5 Hz and 100 Hz were tested to predict changes in cooling capacity, compression work, and COP. Results from the numerical analysis showed that low frequency resulted in reduced cooling capacity and compression work but enhanced COP. Higher frequency resulted in lower COP but higher cooling capacity, allowing for higher output from the same volume.

   

Full Text

 

Title:

Multiobjective design of induction motor using ant colony optimization

Author (s):

P.S. Prakash and P. Aravindhababu

Abstract:

This paper presents an Ant Colony Optimization (ACO) based design methodology for improving the efficiency besides reducing the material cost of Induction Motor (IM). ACO is inspired from the foraging behaviour of ants, and in particular, how ants can find shortest paths between food sources and their nest. It does not require initial values for the decision variables and uses a stochastic random search that is based on the chemical pheromone trail so that the derivative information is unnecessary. Among the number of design variables of the IM, seven variables are branded as primary design variables and the ACO based design strategy is built to optimize the chosen primary variables with a view to obtain the global best design. The developed methodology is applied in solving two IM design problems and the results are presented with a view of exhibiting the superiority of the developed algorithm.

   

Full Text

 

Title:

Performance analysis of an energy efficient FFT processor using 32nm cmos technology

Author (s):

V. Santhiya and N. Mathan

Abstract:

This paper presents an energy-efficient Fast Fourier Transform (FFT) processor which meets the requirements of DSP applications. Fast Fourier Transform is one of the widely used digital signals processing (DSP) algorithms which analysis the signal in its frequency domain. Modified DOMS-FF (Duration Observation Master Slave- Flip Flop) is introduced to reduce the power dissipation and makes the computation of the result much faster than the existing system. The goal of this work is to get less area and energy efficient FFT processor with build in all requirements necessary for DSP applications.

   

Full Text

 

Title:

An efficient CORDIC using factor sharing method in digital image processing

Author (s):

G. Preethi and V. Vijaya Kumar

Abstract:

CORDIC (Co-ordinate Rotational Digital Computer) plays a major role in shift and add operation in trigonometric, hyperbolic function in shifting and adding cosine, sine, tangent function. In this paper CORDIC is used in Discrete cosine transform as a multiplier unit. DCT is modified using column bypass and row bypass technique to increase the speed and to reduce the delay with less complexity for that purpose a technique called factor sharing method is proposed in CORDIC architecture which is implemented using video compression for real time application. CORDIC using DCT is done using MODELSIM6.4a by taking video compression as a input, where the video is been converted into text file using the MATLAB software.

   

Full Text

 

Title:

A novel arithmetic and logic unit design using unconventional mathematics

Author (s): Nirmal Bhardwaj and V.J.K. Kishor Sonti
Abstract:

The ever increasing demand in enhancing the speed of processors to handle the challenging problems has resulted in the need of an efficient ALU. The speed of ALU greatly depends on multiplier and Vedic mathematics helps in the design of an efficient multiplier using Anurupyena and Urdhva Tiryakbhyam. Using Ekadhikena Purvena and Dwandwayoga a squarer circuit is generated. After designing the proposed Vedic multiplier and Squarer Circuit, it is integrated into an eight bit module of arithmetic logic unit along with the conventional adder, subtractor, and basic logic gates. The performance of the Different Multipliers and Squarer circuit is analyzed using Xilinx ISE 9.1i.From the results it is found that Dwandwayoga Squarer is better than Ekadhikena in terms of time delay but on the other hand Ekadhikena Purvena consumes less power than Dwandwayoga. Among multipliers Anurupyena is better in terms of power consumption than Urdhva Tiryakbhyam but it is having much delay. After synthesizing each module of multipliers they are incorporated into the existing ALU Design.

   

Full Text

 

Title:

Main geochemical association of the sulfides of lead-zinc mineralization in Trepça mineral belt- Badovc mine, Kosovo

Author (s):

B. Durmishaj, S. Hyseni, A. Tashko and M. Zabeli

Abstract:

In this paper presented the distribution of major metals (Pb, Zn, and Ag) and accompanying metals (Bi, Cd, Cu, Sb, As) in Badovc mineral deposit. The main elements of economic importance are zinc (Zn), lead (Pb), and silver (Ag), for which are calculated the industrial reserves of the mineral deposit of Badovc. Besides, the main metals during the technological process extradited other associated components such as gold (Au), cadmium (Cd), bismuth (Bi), etc. With special emphasis, we studied the main geochemical association of lead (Pb) and zinc (Zn) sulfides mineralization. According to the factorial analysis, the result of these geochemical associations is as follows: Pb-Ag-(Bi-Sb); Cd-Cu. In 1% of the content of lead (Pb) has 14.51g/t silver (Ag). Variation coefficient for lead is KvPb = 80.57% and for zinc is KvZn = 81.02%.

   

Full Text

 

Title:

Low power asynchronous FPGA architecture for efficient data transfer

Author (s):

Sathyendran and V.J.K. Kishore Sonti

Abstract:

In recent years, Field Programmable Gate Arrays are used as reconfigurable architecture in various platforms as a special type processor which allows the end user to configure directly. The Logic Blocks and switch matrix provides an extensive use in the reconfigurable computing, that can be configured according to required application which also consumes lots of standby power with reduced throughput. This project investigates in optimizations of reconfigurable FPGA cells that involves in two stages, optimization of Lookup Table (LUT) in Logic Blocks for Large Application and optimization of switch matrix with encoding techniques. The proposed encoding technique combines four-phase dual-rail encoding and LEDR (Level-Encoded Dual-Rail) encoding; Lookup Table consists of 8 inputs which are extensively used for large applications; sleep controller design is used for reducing the standby power consumed by the LUT. The proposed architecture is designed, evaluated and simulated using Xilinx SPARTAN 3E (X3SC50).

   

Full Text

 

Title:

RF receiver subsystem design at 2.4 GHz frequency using microstrip lines

Author (s):

K. Rakesh babu and V.J.K. Kishor Sonti

Abstract:

In this paper, performance analysis of RF subsystems like, band pass filter (BPF), low noise amplifiers (LNA) are performed. The center frequency is 2.4 GHz and the substrate used is FR4. The software used is Advance Designing Software (ADS). Noise Figure of LNA is 1.95 and the return loss of the BPF is -20.2dB. Achieved results are in agreement with theoretical values.

   

Full Text

 

Title:

Decide, detect and classify benign and malignant in mammograms using CV-partitioning method

Author (s):

BV. Kavetha and J. Venu Gopala Krishnan

Abstract:

In recent years, the stage determining and classifying the mammogram as Benign or Malignant is somewhat complicated process in the medical research. In the earlier papers many classification techniques, CAD designs and feature extraction methods are used constantly for mammogram classification, and has its own advantages and limitations. To overcome the limitations, in this paper a novel approach is introduced for accurate classification of Benign and Malignant mammogram. This novel approach functions in three stages, where preprocess the image, decide the image in complete normal or Benign/Malignant and Determine whether the mammogram is Benign or Malignant by comparing the shape, color, texture and size of the extracted abnormal part of the mammogram Images. The experiment results give more than 99.3% of accuracy in classification by a MATLAB Programming method. The performance evaluation of the image is compared with the cv-partition method and feature extraction method.

   

Full Text

 

Title:

Sustainable management (SM) guide in GBI interiors design project tools

Author (s):

Rostam Yaman, Hamimah Adnan Farrah Zuhaira Ismail and Noraini Ahmad

Abstract:

The paper aims to study and measure the applicability of GBI tools for interior design project. The studies specifically focus on one of the GBI Tools assessment criteria which is Sustainable Planning and Management (SM). The SM criteria is chosen as assessment sampling as it make out the main point scoring system in GBI for Interiors Tools. The pilot study is to measure and benchmarked the standards and applicability of the tools. The methodology used is on-site observation and GBIAP score result. Outcome from the research suggest framework criteria are highly applicable and meet Malaysia Green Building Confederation (MGBC) standards. Based on selected related study, it is imperative to apply and highly encouraging to implement green design in interior design as it hold a significant sustainable awareness and marketable values.

   

Full Text

 

Title:

Stock market component analysis using AHP and Markov chain

Author (s):

S. Sudharsun and M. Renganathan

Abstract:

Stock Market is a huge area to perform Research works. Prediction is one of the most important factors in Stock Markets, since the shares of the companies are increasing or decreasing day by day and it is necessary to safeguard the money of the investors. In this paper we have focused on pharmaceutical field by selecting 15 companies within this field. In order to predict the best performing company, AHP is applied and hence the companies are ranked according to their performances. AHP consists of Criteria’s and Alternatives. Fundamental parts of the companies are taken as Criteria’s. Technical Part of the Company is also considered and in order to select the best company Artificial Intelligence is applied after combining both the results of Fundamental and Technical parts. Application of Eigen Vector under Markov Chain is applied to the result of AHP and share holding pattern of the investor after a year is predicted.

   

Full Text

 

Title:

Adaptive load balancing algorithm using modified resource allocation strategies on infrastructure as a service cloud systems

Author (s): Lavanya M, Sahana V, Swathi Rekha K and Vaithiyanathan V.
Abstract:

Cloud computing is set of resources and services offered by the Internet. Cloud computing provides its consumers to access virtualized hardware, scalable, distributed and software infrastructure over the internet. Load balancing is the method which is used to distribute the task among multiple computers. Hence overload can be avoided and can achieve minimum data processing time, optimal resource utilization and minimum average response time. The existing Throttled Load Balancing (TLB) algorithm exhibits some drawbacks. To overcome the drawbacks in TLB this paper proposes an efficient scheduling algorithm, which can support the load balancing and can provide better improved strategies through efficient job scheduling, modified resource allocation techniques and reduce the power usage and context switching between the servers. Enhanced Throttled Load Balancing Algorithm provides improved results to Throttled Load Balancing Algorithm.

   

Full Text

 

Title:

Design and simulation of cylindrical and sheet corner reflector Yagi-Uda antennas for amateur radio application

Author (s):

Akella Jharesh, K. Ch. Sri Kavya and Sarat K Kotamraju

Abstract:

Yagi-Uda antenna is the most familiar high-gain antenna in HF, VHF and UHF bands. It is popularly used by radio amateurs due to its less manufacturing cost and simplicity in construction. In this paper, an additional corner reflector is added to the conventional structure in order to improve the gain and return loss of the antenna. Two types of corner reflectors, namely Cylindrical and Sheet reflectors are proposed and designed using HFSS software. The effects of reflector spacing and corner angle are analyzed at 1 GHz and the results are tabulated. A corner reflector and sheet reflector Yagi-Uda antennas are designed at a VHF frequency of 436MHz and results are presented. These antennas are proven to be more suitable in the environmental conditions in the southern parts of India.

   

Full Text

 

Title:

Feasibility of castella beam as a structural element to receive earthquake load

Author (s): Mara Junus, Parung Herman, Tanijaya Jonie and Djamaluddin Rudy
Abstract:

The purpose of this study was to determine the ability of castella beams can be used as a structural element to resist earthquake load based on earthquake resistant building regulations applicable in Indonesia. This research was carried out through testing castella beams in the form of a portal with cyclic loading. Solid beams steel used is profiles IWF 200 100 5.5 8 fabricated became castella beam. Test beam consists of a solid beam (NB) as a comparison and castella beams (CB). The results showed that in terms of the flexure capacity, beam failure  at the ultimate load, partial ductility and full ductility meet the requirements of SNI 03-1726-2003 on Earthquake Planning Procedures for Building Resilience in Indonesia so castellabeam (CB) can be used as a structural element to receive  earthquake loads.

   

Full Text

 

Title:

Design of an HEMT based low noise L1-band amplifier for GPS reception

Author (s):

Joyal Joy and K.V. Karthikeyan

Abstract:

GPS has evolved from a military project to an invincible element of day to day life. The accuracy of predicting the three factors of location, movement and time transfer by a GPS device depend on its receiver quality. A front end of a receiver primarily consists of amplifiers, filter and mixer. LNA is the most important component of the front end as it dominates the overall noise Figure as per the frii's formula. Here we discuss the complete design of an LNA using Siemens CFY65 HEMT using Agilent Advanced Design systems software at the L1 band of 1.575GHz. We obtain a high gain of 15.85dB and very low noise Figure of 0.58 dB at the design frequency.

   

Full Text

 

Title:

Design and implementation of PLL based frequency synthesizer with self correcting DCO

Author (s):

V. Vinod Kumar and S. Yogalakshmi

Abstract:

A phase-locked loop (PLL) is widely employed in wire line and wireless communication systems. The poor device matching and leakage current vary the common-mode voltage of a ring-based voltage-controlled oscillator (DCO) wide frequency range. It may limit the oscillation frequency range of a DCO and causes a DCO not to oscillate in a worst case. To realize a wide-range PLL, the divider following a DCO should operate between the highest and lowest frequencies. When a PLL works at a higher frequency which the static circuits cannot operate, dynamic circuits are needed. A true-single-phase-clocking (TSPC) divider is widely used to realize a prescaler for this PLL. A TSPC prescaler must work over a wide frequency range to cover the process and temperature variations. For a TSPC prescaler, the undesired leakage currents may limit its frequency range or alter the original states of the floating nodes to have a malfunction. The leakage current and current mismatch in a charge pump (CP) will degrade the reference spur and jitter significantly. In the previous method to overcome the above problems, a self-healing divide-by-4/5 prescaler and a self-healing DCO used. A time-to digital converter (TDC) and a 4-bit encoder are used to quantize the phase error and digitally calibrate the CP. In the existing method the key parameter is to be changed is the modulus value of the prescaler. By changing the value of the prescaler the PLL frequency range will be extended.

   

Full Text

 

Title:

Design of modified 32 bit booth multiplier for high speed digital circuits

Author (s):

P. Nithiyanandham and V. Balamurgan

Abstract:

This paper presents the design and implementation of Advanced Modified Booth Encoding (AMBE) multiplier for both signed and unsigned 32 - bit numbers multiplication the array multiplier and Braun array multipliers perform multiplication operation on unsigned numbers only. Thus, the requirement of the modern computer system is a dedicated and very high speed unique multiplier unit for signed and unsigned numbers. Therefore, this paper presents the design and implementation of AMBE multiplier that can be suitable for the high speed digital logic circuits. The Carry looks ahead Adder (CLA) tree and the final Carry Look ahead (CLA) adder used in combination of CBEL (Common Boolean Enable Logic) to speed up the multiplier operation. Since signed and unsigned multiplication operation is performed by the same multiplier unit the required hardware and the chip area reduces and this in turn reduces power dissipation and cost of a system.

   

Full Text

 

Title:

Multithreshold CMOS sleep stack and logic stack technique for digital circuit design

Author (s):

M. Manoranjani and T. Ravi

Abstract:

Power optimization is the major problem in digital circuit design. In this paper using MTCMOS and stack techniques are proposed. Multi threshold CMOS sleep stack and logic stack, super cutoff sleep stack and logic stack are proposed. Stacking is introduced in MTCMOS concept which decreases leakage power based on the power dissipation of pMOS and nMO Stransistor. MTCMOS technique uses multiple voltages in the circuit which is the main advantage of this. Power dissipation, propagation delay and power delay product are calculated. Constrains like power, delay is compared with the existing techniques. It is proved that proposed technique is better than previous technique. Simulation results are given using HSpice.

   

Full Text

 

Title:

Highly reliable low power MAC unit using Vedic multiplier

Author (s):

J. Elakkiya and N. Mathan

Abstract:

An efficient high performance 64-bit MAC unit (Multiplier-and-Accumulator) is presented. In most of the applications Multiplier and Accumulator plays an important role. The existing method is designed using Braun, dadda, etc., like different multiplier architecture and compared the performance of MAC unit with those multipliers. Hence it is vital to design a high-performance multiplier to meet the needs like high speed, less delay, low cost and reduced power. Therefore the proposed method is 64-bit MAC unit which is designed using Vedic multiplier using URDHVA-TIRYAKBHYAM sutra. The main objective of this work was to get an efficient MAC unit with less delay and reduced power.  Hence the MAC unit is analyzed using XILINX ISE 13.2 in Verilog HDL and simulated using MODELSIM SE 6.3g and QUARTUS II 9.0.

   

Full Text

 

Title:

An over constrained optimization problem: The prolonged autonomy bike (pa bike)

Author (s):

Leonardo Frizziero and Luca Piancastelli

Abstract:

The Prolonged Autonomy e-bike o PA-bike is a e-bike that can use a traditional fuel to charge the battery during run or at rest. In this way it is possible to prolong the autonomy of the e-bike. A fuel cell with a reformer or a traditional very small catalyzed piston engine can be used. In both cases the emissions are very limited and the efficiency is very high, since the "traditional fuel" motors work at constant optimum condition. This paper tries to optimize the PA-bike by assembling commercial components. Outsourcing for bicycles should be very easy since commercial part availability is very high. Customization is a very common practice for bikers, since it does not require authorizations. However the problem proved to be over constrained. The commercial components, in particular the electric motor, proved to be an important boundary condition. The result is a single possible solution, or a category of solutions, all similar. This is due to the fact that commercial components are highly standardized for marketing reasons.

   

Full Text

 

Title:

Factors and antagonisms of development of innovative potential of high-technology lines of industry of Russia in globalization conditions

Author (s):

Alina Y. Kazanskaya and Vitaly S. Kompaniets

Abstract:

Within this investigation it is considered the problem of detection and analysis of development factors of innovative potential of high-technology lines of Industry of Russia. In investigation the following problems were solved: carrying out the analysis of structure and content of actual statistical data; evaluation of achievement of running target indexes of Strategy of Russian Federation innovative development for period till year 2020; revealing and analyzing the factors and antagonisms of innovative development of high-technology lines of economy of Russia. During investigation it has been carried out the generalization of series of indexes of innovative activity in Russian Federation, as a result the typology of innovative activity kinds is improved; the specific singularities of structure and dynamics of indexes of industry high-technology lines are excreted. The conclusions received on poor efficacy of development of innovative potential of Russian industry are confirmed by results of comparison of Russia and some European countries per criterion of expenditures intensity spend on technological innovations and quantum of new in the market innovative goods. In structure of factors, obstructing the technological innovations, the group of "informational" factors, as the most flexible and perspective from point of view of possibilities of development of innovative activity potential is evolved. As one of the examples of "informational" factors development it is highlighted the solution of problem of information support with use of ISP-technology. Singularities of ISP-technology application are surveyed and the possibilities of raising the production efficiency of science-intensive production with their help are estimated. On the basis of revealed modifications in cooperation structure of organizations, which are realizing an innovative activity, the conclusion is drawn on models high potential: the universities - the enterprises - the state (“Triad spiral”), offered by Henry Etzkowitz.

   

Full Text

 

Title:

Implementation of active storage in efficient virtual file system

Author (s):

C. Saranya, V. Loganathan and S. Godfrey Winster

Abstract:

In present decades nearly all the computation tasks use colossal volume of data. Moreover these computation tasks are additionally of elevated performance. These tasks transfer’s data from the storage node to the computing node. The data transfer rate amid storage and compute nodes is elevated and to minimize it the active storage was introduced. Active storage increases the storage node’s processing power and it additionally reduces the web traffic. Active storage was introduced in parallel file system’s like lustre parallel file system, red hat GFS, etc. The proposal is to craft n number of adjacent file system in windows working system. In this the data can be stored and it does not inhabit space in the host system drive or memory. The data stored in the file system ought to inhabit less space for that the data is being compressed and then stored in the file system. The data is additionally safeguarded by encrypting the data before storing it into the file system. This file system is portable to any other system. Our target is to make the file system to an active storage. The file system is projected in such a method that it can present effectual fetching of data from the file system.

   

Full Text

 

Title:

Area minimized FFT architecture using split radix algorithm for length L=radix-3 and radix-2bx3c

Author (s): Karthick S. and Archana T. and Rekha P.
Abstract:

Fast Fourier Transform (FFT) is a most proficient algorithm for computing the Discrete Fourier Transform (DFT). FFT is specially used in analysis of autocorrelation, disambiguation, recognition of patterns, statistics and data analysis. The new proposed algorithm for computing a length L=2Bx3C FFT. It is used to minimize the twist of hardware depict and arithmetic operations. Additionally, the propound fragment design can accomplish by the mixer of radix-3 and radix-2Bx3C FFT algorithm. It is entirely changeable of Split Radix Fast Fourier Transform (SRFFT) algorithm. As a consequence, the new proffer design of length L is used to belittle the area of system on chips and mathematical calculation. More compromise can achieve by combining the two architectures implemented in the same FFT. It naturally furnishes a broad selection of accessible length of FFT’s.

   

Full Text

 

Title: Congestion avoidance using blue algorithm in wireless network
Author (s):

A. Vijayaraj and R.M. Suresh

Abstract:

In the existing system, the problem of TCP in MANET’s environment is packet losses induced by network congestion. In case if congestion occurs it leads to the loss of data. In the proposed system, Blue algorithm is used for avoiding packet loss in TCP with wireless network based on checking size of queue. If the size of queue is maximum, gateway directly forwards the packet to destination through queue. If the size of queue is minimum, gateway compresses the packet and forwards the packet to destination with notification. Thus source node efficiently sends packet to destination via gateway and queue. The destination sends the acknowledgement to source via gateway. Gateway checks the acknowledgement. If acknowledgement is positive, gateway removes the packet from backup or if the acknowledgement is negative, gateway retransmits the packet to destination.

   

Full Text

 

Title:

Classification of sex chromosomes using SVM classifier

Author (s): S. Saranya, P.S. RamaPraba, S. Sathiya Priya and V. Loganathan
Abstract:

Scrutinize of chromosome is a preliminary procedure to detect the most characteristic signs of a disorder that may require for further investigation of medical applications mainly for cancerous. Diagnosis of karryogram is generally very complex, eroding and a time consuming operation. As of now it requires fussy attention to details and calls for meritoriously and trained personnel. Normally chromosomes are essential genomic information carriers which contain 23 pairs. This paper suggests a efficient classifier Support Vector Machine (SVM) for classifying chromosomes of 23 and 24 chromosome which is the sex chromosome in which 23 is X chromosome and 24 is Y chromosome in comparison to the already existing methods such as support vector machine based medial axis and density profiles. The features are extracted based on GLCM (Gray level co-occurrence) feature extraction algorithm which is very effective well known for its high accuracy. X chromosome features and Y chromosome features are extracted based on very effective GLCM algorithm from the segmented image and GLCM features of chromosomes are extracted from the segmented image. As a prerequisite, image segmentation needs to be done by using Fuzzy - C Mean (FCM) procedure to obtain efficient features in coordination with SVM which is used to classify the chromosomes from the available pairs of 23 chromoseomes.  Using this methodology increased the accuracy of classification results. Simulation results are carried out in MATLAB to support the analysis.

   

Full Text

 

Title:

Design and simulation analyses of MEMS gripper with Aluminum and nickel alloys

Author (s):

S. Praveen Kumar, T. Aravind, G. Karman Frances Raj

Abstract:

A novel MEMS based Electro thermal Gripper is proposed in this paper, the gripper tool proposed in this paper is designed to handle the micro objects of about 100-150 microns. The gripper tool proposed in this article is materialized with Nickel Alloy of UNS NO4400. The material proposed for the Gripper has better heat resistant characteristics and can with stand the high potential applications. The gripper designed is working on the basics of Pull actuation method from the middle hinge part due to the applied potential. The gripper tool is actuated for an applied potential of about less than 2 volts and mode shape response of the gripper was analyzed under Dynamic frequency.  Comparative analyses also carried out between the different Gradients of Aluminum and Nickel alloys and applied potential. The yield point criteria analyses have been presented for the gripper with various Gradient of Aluminum and Nickel Alloys. The entire TEM analyses of the gripper tool are carried out with COMSOL multiphysics software.

   

Full Text

 

Title:

Discovery of related e-books using dependency structure matrix (dsm) and library ontology

Author (s):

K. Nanthini and R. Raja Ramya

Abstract:

Ontology is an apparent prerequisite for conceptualization. It can be organized in hierarchical manner that provides whole description about domain and their class interrelationship. Now-a-days colleges maintain lot of e-books for each department because students, research scholars and staffs are preferred to use e-books. This paper mainly focuses on finding associated e-books for their source e-book. The discovery of related e-books is recognized by using ontology based text mining. First, specified pages of e-books are extracted by using java library. An extracted page contents are saved in text file. After that, content pages (tables of contents) are mined using file concept. Next employ filtering to that mined content, because that may holds special characters, chapter number and page number. Using this content page wording, identify the class of e-books ontology. Ontology is used to provide inferences about them. Furthermore perform analysis of e-book’s content pages with one another and update the DSM. DSM shows whether e-books are processed or not. This DSM is converted into graph structure along with their dependency level. Dependency level specifies the map of each e-book. DSM is automatically updated when new books came to library. Graph structure also updated with their dependency levels.

   

Full Text

 

Title:

A dynamic cognitive system for automatic detection and prevention of cyber-bullying attacks

Author (s):

NaliniPriya G. and Asswini M.

Abstract:

The phenomenal growth of the social networking sites has swept over the communication world. The rising popularity of the social networking sites have also contributed to the rise in offensive behaviours, giving birth to one of the most crucial problem called cyber-bullying. Most of the social networking users would have encountered a worst e-day experience .The victims of cyber-bullying, widely being the adolescents, suffer deep scars which has led to suicidal attempts in many cases. Detection of cyber-bullying has also been a challenging issue for the researchers. A few automated methods have been developed which mainly rely on textual features. This work aims to improvise the detection of cyber-bullying  by developing a real-time application combining user based textual features along with the social networking features such as number of circles, number of contacts in the friend’s list, bonding with the friends.

   

Full Text

 

Title:

A dynamic tool for detection of xss attacks in a real-time environment

Author (s):

K.G. Maheswari and R. Anita

Abstract:

With the wide spread application of internet, the web application have become a focal target for the attackers. The cross site scripting attack popularly known as XSS attack takes advantage of the web browser rather than the application itself. This poses serious threat to the developers who got to ensure the security of the web services. Web intrusion detection systems are security programs that help the developers as well as the customers to evaluate whether events and activities occurring in a Web Application are legitimate. The objective of Web IDS is to identify intrusions with high false alarms and low detection rate while consuming minor properties. The proposed work presents an intrusion detection system that analyzes web requests looking for evidence of malicious behaviour and provides a sophisticated query analysis. The injection of vulnerabilities and attacks is indeed an effective way to evaluate security mechanisms and to point out not only their weaknesses but also ways for their improvement. This work tried a solution for the vulnerable web attacks through real time tools such as DVWA and XSS Me.

   

Full Text

 

Title:

A novel method of security and privacy for personal medical record and DICOM images in cloud computing

Author (s):

C. Gunamalai and S. Sivasubramanian

Abstract:

Cloud computing is a emerging technology that allows us access the shared resources which was stored in the cloud data center. Several healthcare centers store the patient’s Personal Medical Record and DICOM (Digital Imaging and Communications in Medicine) images in the cloud data center. Using cloud data center healthcare center would benefit of low cost, availability and disaster recoverability. The main idea of this paper is the various healthcare centers from different places can easily access and use the patient’s information for their treatment. Healthcare center and registered in the outsourcing organization in the cloud. This outsource organization provide access right to registered health care centers through Two Way Authentication. First step is a conformist one where the user enters his user id and password, if it matches with the stored database of the cloud then they proceed of authentication, the second step is the database triggers an application which generates a dynamic password. This pass word is sent to the user on his personal mobile as a message or an e-mail. The second security method is Column Based Encryption (CBE). Using CBE, access policies are expressed based on the attributes of handlers or data, which enables a health center to selectively share their Personal Medical Records and DICOM image among a set of users by encrypting the file under a set of attributes or columns.

   

Full Text

 

Title:

Improving road safety for pedestrians in black spots using a hybrid VANET of vehicular sensors and pedestrian body unit

Author (s):

Dahlia Sam, Esther Evangelin and V. Cyril Raj

Abstract:

With the rapid explosion of population, usage of motor vehicle is also increasing. This has been causing a serious issue in road safety for the past few decades. Road pedestrian injuries and death rate is also rising day by day. The research on traffic accidents shows a clear concentration of crashes happening in Black Spots.  Accident black spots include steep slopes, a hidden junction, sharp corners in straight road, curvy roads concealed warning signs or situations where the oncoming traffic is not visible. The histories of traffic accident in the recent years have established a dependency between the accident and the reaction time of the involved persons. This is mainly due to tensed reactions of the drivers or pedestrians that come spontaneously while facing a real time potentially dangerous scenario. In this paper we provide a solution by proposing a Hybrid VANET based driver alert system. An alert given to the drivers ahead of time gives a better chance for the driver’s toreact in a way as to avoid accidents. The system is designed by integratinga pedestrian body unitalong with the vehicular nodes in a VANET. The signals sent by the pedestrian body unit are received by the vehicular nodes in the VANET and are given as input to the alert system. This alert wills notify the drivers about surrounding pedestrians, which in turn gives him more reaction time. The system was simulated anda laboratory demonstration was also done. It all proved that the system was able to reduce the chances of accident drastically with the alert system.

   

Full Text

 

Title:

Inventive technique, research and development of software analyzing atmosphere in cloud computing equipment for responsible resemblance and allocated systems

Author (s):

S. Ravichandran, M. Umamaheswari and A. Vijayaraj

Abstract:

Software analyzing defines an essential element of the software engineering and an imperative connection that the software growth quality was pledged. The judicious model for software testing can decrease the costs of analyzing in the progressing action in the sequence of analyzing is hence tumbling price of software enhancement. Here an article, to propose prototypical aimed at software analyzing that run throughout every stages of the software growth cycle. It can seek and locate the fault in the software the moment is possible and the situation will shorten the period grasped on behalf of analyzing inside the sequence of that enhancement for the software analyzing effectively, completely related that the pattern these analyzing strategy when improves ERP technique then formerly  obtain the  principle  solution.  Various information systems are extensively consumed in communication humanity, and the extremely responsible system is expanding year afterward year. While the software analyzing for each system develops extra complex because of that improvement then and there intricacy for that technique. The situation is overly incomprehensible check resemblance and allocated methods necessarily while responsible methods for example penetrating servers regularly mode resemblance besides allocated methods. Toward explain that troubles, expect the software analyzing atmosphere going to responsible resemblance then allocated method consuming that cloud processing equipment that is Data-Cloud (D-Cloud). Data- Cloud comprises Eucalyptus because that the cloud managing software, then Fault Virtual Machine founded upon Queue Emulator (QEMU) because the essential software, besides Data-Cloud platform aimed at understanding the analysis state. The Data-Cloud permits because computerizing this method pattern then this analysis method but then completes many analysis situations concurrently, formerly improve the hardware responsibilities adaptable. Here an article, current thought besides proposal for the Data-Cloud, then define exactly adjust this method pattern then analyze state. Moreover, trivial analyze sample so the software analyzing intense Data-Cloud organized. These solution indications this Data-Cloud permits establish this atmosphere was effortlessly, besides toward check this software analyzing of allocated method.

   

Full Text

 

Title:

Preventing data transmission by misbehaving nodes in DTN

Author (s):

B. Sakthisaravanan, R. Meenakshi and V. Priya

Abstract:

Selfish and Malicious nodes (referred as misbehaving) present in the Delay Tolerant Network (DTN) results in insecure data transmission resulting in the packet loss .Currently the misbehaving nodes are identified only after data transmission. For this purpose Information Centric Network (ICN) is used along with DTN .ICN has a property of interactivity and it also supports mobility of nodes. Hence ICN identifies about misbehaving nodes in the path before the data transmission so that alternative path is chosen. Hence ICN avoids misbehaving nodes and the packet reaches the destination safely. This paper will be implemented in two parts. In the first part the misbehaving nodes are identified by DTN .A new load balancing concept is introduced in order to handle traffic. In the second part misbehaving nodes are intimated in advance by ICN and hence alternative path is chosen for the packets so that further transmission by misbehaving nodes is prevented.

   

Full Text

 

Title: Providing privacy and personalization in search
Author (s):

T. Mercy Priya and R.M. Suresh

Abstract:

The Aim of this project is to construct a PWS framework called UPS that can generate a profile for the given user queries. The framework works in two phases, online phase and offline phase. The PWS is a search technique which provides a better search result which will satisfy the user needs. Here a personalized web search is provided without affecting their privacy. This work has supported to expose the user profile at run time with the given user query and to personalize it. For the PWS the semi structured data is indexed with RDF. Here we use two greedy algorithms, namely Greedy DP (Discriminating Power) and Greedy IL (Information Loss). These algorithms are used in the run time generalization.

   

Full Text

 

Title:

Reducing the energy consumption in wireless sensor networks using sink relocation mechanism

Author (s): S. Vidhya T. Sasilatha and Arun Kumaar
Abstract:

Base Station (BS) location and physical topology of a network play an important role in a Wireless Sensor Networks (WSN) because the BS position governs the lifetime of networks. Optimizing the topology reduces the issues that arise due to the location of the destination node. During network formation, some nodes have tends to have that have longer distance to BS. In this case, data has to travel a longer distance to reach a BS. The node failure in WSN occurs majorly due to the exhaustion of the battery and replacing this is a difficult task. Therefore, these long transmissions have effects on network’s lifetime by wasting node’s energy. This can be overcome by relocating the BS using a clustered WSN. This proposed approach discussed about all possible locations to find the optimal position of BS in Low energy Aware Clustering hierarchy (LEACH) which is an energy-efficient protocol and shows the effects of BS Location in the WSN and the obtained results are compared with the original Leach and Leach-B.

   

Full Text

 

Title:

Route reliability ranking algorithm for prefix hijacking attacks in border gateway protocol

Author (s):

C. Siva and S. Arumugam

Abstract:

Prefix-hijacking attack offers malicious parties to gain access to untraceable IP addresses in Intenet. Border gateway protocol (BGP) is the dominant inter domain routing protocol used in Internet. In this paper, to defend against Prefix Hijacking Attack on border gateway protocol (BGP), we propose to design a route reliability ranking (RRR) algorithm. The algorithm is used to authenticate the validation of a routing update based on the common facts of the autonomous systems (AS’s) in the network. After RRR, an incentive based route selection mechanism is performed to identify the suspicious candidates and avoid routes propagated by them. By simulation results, we show that the proposed algorithm is efficient defensive technique for prefix hijacking attack in Internet.

   

Full Text

 

Title:

A self regulating tool to characterize an abnormal retina from a normal retina using neural network

Author (s):

L. Reshma and R. Ramesh

Abstract:

Diabetes Mellitus is the most complicated proliferative health issue all through the world. The International Federation Committee of diabetes had made an analysis with reference to the diabetic sufferer count and had concluded that more than 199 million people deteriorate from diabetic complications globally and it is expected to surge to 366 million by 2030. Diabetes Mellitus is the leading cause for Retinopathy. It is the dominant proliferative eye problem and it is one among the extensive reason for the loss of eyesight. Eyesight problems can be abstained potentially by detecting the signs of retinopathy at an earlier stage. Microaneurosyms and Exudates are the emerging signs of Diabetic Retinopathy. Presently the lesions are observed and detected manually and this detection is not so useful for the mass eye screening programs. A huge group of research community are involved in the process of designing an automatic tool to individualize a deficient retina from the normal retina which provides a complete solution for all the retinal problems and to also solve the issues in terms of time and cost and to satisfy the needs of ophthalmologist. In this paper the necessary region are segmented and are given as the input to the neural network which uses the construction neural network algorithm with back propagation technique in order to classify the retinopathy level. This automatic tool will individualize the patients on the basis of their retinopathy level and it will be useful for the doctors to describe and analyze the inmate conditions more accurately. The prospect of blindness can be probably diminished by detecting the retinopathy at an earlier stage.

   

Full Text

 

Title:

Security and energy efficiency based EC-MAC protocol for sensor wireless networks

Author (s):

R.G. Nishaa and P. Latha

Abstract:

Security as well as energy consumption is the main components of wireless sensor network. Sensor node has the main functional component present in the WSN. In order to improve the efficiency of energy consumption, enhanced version of (EC-MAC) is proposed. Emergency Code-Medium Access Control (EC-MAC) is responsible for emergency purposes. The proposed MAC protocol is designed using the Carrier Division Multiple Access (CDMA) mechanism. CDMA can be used to enable multiple users to access shared medium without interference. The main resource of EC-MAC protocol is well suited to change the topology in MAC protocol during emergency mode. The MAC behaviour changes during the change in the topology and may inject the data detection. In order to address these issues, Fuzzy-Concealing Sink Hole (F-CSH) may be used to find the location of the main sink using the fake sink holes to anticipate the traducer to turn the network to deplete the node energy and abunding the network with bogus data. RSSI may be used to estimate the distance between the two nodes during the data transmission.

   

Full Text

 

Title:

Service recommendation system in social networks

Author (s):

Sandra Elizabeth Salim and R. Jebakumar

Abstract:

Social networks have become an inevitable part of today’s life. The content from social media can be used for a number of purposes; one of the main being recommendation systems (RS). Traditional recommendation systems ignored the concept of social media and its influence on people. There have been a lot of RS in industry since the last decade. In this paper, we have proposed a new system called Service Recommendation in Social Networks (SRSN) based on a keyword approach which overcomes the drawbacks of current generation of RS. It utilizes the concept of user based collaborative filtering algorithm (UCF) in generating recommendations. SRSN is designed to work in big data environments as it is implemented in Hadoop, a map reduce paradigm.

   

Full Text

 

Title: An improved approach for detection and classification of vehicles in video using support vector machines
Author (s): Selvanayaki K. S. and Somasundaram R. M.
Abstract:

Deployment of effective surveillance and security measures is important in these days. The system must be able to provide access and track movement of different types of vehicles and people entering the secured premises, to avoid any mishap from happening. There are many existing approaches which are used for tracking objects. Edge matching, Divide-and-Conquer search, Gradient matching, Histograms of receptive field responses, Pose clustering, SIFT; SURF etc are some of the approaches applied. All these methods are either Appearance based methods or Feature based methods. They lag in one or the other way when it comes to real time applications. So there has been a need for creating a new system that could combine positive aspects of both the methods and increase the efficiency in tracking objects, when it comes to real life scenario. A novel approach for car detection and classification is presented, to a whole new level, by devising a system that takes the video of a vehicle as input, detects and classifies the vehicle based on its make and model. It takes into consideration four prominent features namely Logo of vehicle, its number plate, colour and shape. The classification is done by a very efficient algorithm called Support vector machines. Experimental results show that our system is a viable approach and achieves good feature extraction and classification rates across a range of videos with vehicles under different conditions.

   

Full Text

 

Title:

Experimental investigation of alkali-activated slag and flyash based geopolymer concrete

Author (s):

S. Aravindan and Jagadish. N

Abstract:

This paper investigates about the long term strength and durability properties of Alkali-Activated and Flyash based Geopolymer Concrete comparing with the conventional concrete of M40 grade. The Alkali activators are prepared by combining sodium hydroxide and sodium silicate solution in the ratio of 2.5 and molarities are 12M and 16M by varying two different curing regims namely dry curing and open air curing. Totally nine mixes were prepared with Naoh concentration of 12M and 16M was compares with two curing regims namely open air curing and dry curing . Split tensile strength, flexural strength and durability tests namely rapid chloride permeability tests (RCPT) and sorpitivity tests were conducted on 56 and 90 days. Compressive strength tests were carried out on 14, 28, 56 and 90 days. The investigation resulted that there is increase in strength characteristics with increase in concentration of sodium hydroxide solution and open air cured specimens gained more strength than dry cured specimens. However the sorptivity and rapid chloride permeability test results were not found to perform good due to cracking of surface. When compared with conventional concrete results the strength gained is more in AAS-FA based geopolymer concrete. Also the utilization in construction field is easy since it is Ecofriendly and convenient curing process.

   

Full Text

 

Title:

Efficient server load balancing through improved server health report

Author (s):

Saifullah M. A. and M.A. Maluk Mohammed

Abstract:

To achieve scalability and high availability of the service offered by web server clusters, an efficient server load balancing policy is required. A critical part of the load balancing policy is to find the best available server to assign the load. For that, server load needs to be calculated. In this paper, the parameters required to assess the load of the server are explored. An important load parameter, ‘number of open file descriptors’ is identified to find the load on a server along with existing load parameters, CPU cycles and free memory. The server load reporting is improved by extending SNMP agent to report server resources including ‘number of open file descriptors’. Performance metrics used in test scenarios are: Throughput, HTTP Response Time and Error rate and Normalized Throughput. Tests were done in two different scenarios: normal condition scenario and the other scenario with high load on web servers. The load balancing results of the server cluster by comparing our implementation with known load balancing algorithm used on web-clusters, Round Robin (RR) and state full algorithm Least Connections (LC) are described. Our experimental results show that the previously mentioned algorithms can be outperformed by our proposed adaptive mechanism, Scalable Load BaLancing (SLBL) algorithm. Our experimental results show that the performance of the cluster of web servers is significantly improved by the proposed adaptive algorithm SLBL over the existing algorithms, RR and LC. The average service request rate that can be serviced by the SLBL algorithm is around 1.27 times more than that of LC and around 1.93 times more than that of RR.

   

Full Text

 

Title:

Blowfish encryption algorithm for information security

Author (s):

Saikumar manku and K. Vasanth

Abstract:

In this paper, a Blowfish encryption algorithm for information secruity is designed and analyzed. The work is done for networking and communication application for enhanced network security and defence applications. In the proposed Blowfish algorthim reduce rounds of algorithm and proposed single blowfish round. The design simulation is done by Xilinx ISE software using the language of VHDL. Cryptography is the one of the main categories of computer security that converts information from its normal form into an unreadable form. its ability to secure the protected data against attacks and its speed and efficiency in doing so.

   

Full Text

 

Title:

Numerical solution of sixth order boundary value problems by Petrov-Galerkin method with quartic b-splines as basis functions and sextic b-splines as weight functions

Author (s):

K.N.S. Kasi Viswanadham and S. M. Reddy

Abstract:

This paper deals with a finite element method involving Petrov-Galerkin method with quartic B-splines as basis functions and sextic B-splines as weight functions to solve a general sixth order boundary value problem with a particular case of boundary conditions. The basis functions are redefined into a new set of basis functions which vanish on the boundary where the Dirichlet and Neumann type of boundary conditions are prescribed. The weight functions are also redefined into a new set of weight functions which in number match with the number of redefined basis functions. The proposed method was applied to solve several examples of sixth order linear and nonlinear boundary value problems. The obtained numerical results were found to be in good agreement with the exact solutions available in the literature.

   

Full Text

 

Title:

Design and fpga implementation of soft loop handle fixing machine

Author (s):

K. S. Raja and K. Vasanth

Abstract:

There is a rapid growth in the extreme increase in Industrial production, particularly in the domain of Automation process. This is due to the extensive involvement of Automation which is possible in the industries and the ease of maintenance. This leads to an efficient way of improving the production of the industrial process and reduces number of workers. Hence this paper brings out the flexibility of Field Programmable Gate Arrays which used to control two machines loop fixing machine, bottom sealing and cutting machine. Here we use the pneumatic functions instead of motor which controls the machine through FPGA and helps to reduce the power consumption. The design has been described using VHDL (VHSIC Hardware Description Language) and implemented in hardware using FPGA (Field Programmable Gate Array).

   

Full Text

 

 

 

     

  

   

  

  

  

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

arpnjournals.com   Publishing Policy                                                  Review Process                                           Code of Ethics