Volume 2 Issue 3- March 2012
S.No | Title | Page |
---|---|---|
1. | Data Integrity Maintenance in Dynamic Cloud Data Storage N.Pandeeswari,P.Ganesh Kumar, R.Sivakami Abstract
Cloud computing has been often viewed as a next generation of IT enterprise. The cloud makes the users to store the data remotely in cloud storage and reduces the burden of storage and maintenance. And it also moves the application software and databases to the centralized large storage, where the management of data and services are not fully trustable. This brings many new security challenges on storing the data remotely without having any backup .While the prior works, often lacks with the efficient integrity verification and dynamic data operations. In this work, it is proposed to verify the integrity of data and allowing dynamic data operations such as block insertion, modification and deletion. It is proposed to use homomorphic tokens based on RSA-Signatures to verify the integrity of remotely stored data and in this the Merkle –hash tree is used for authenticating the data. Further this scheme is extended to do batch auditing i.e., doing multiple auditing tasks simultaneously. The performance and security analysis shows that the proposed scheme is highly efficient and provably secure. |
929-932 Full Text PDF |
2. | General Approach to Classification: Various
Methods can be used to classify X-ray images N. Subhash Chandra, B.Uppalaiah, G. Charles Babu, K. Naresh Kumar, P. Raja Shekar Abstract
X-Ray is one the oldest and frequently used devices, that makes images of any bone in the body, including the hand, wrist, arm, elbow, shoulder, foot, ankle, leg (shin), knee, thigh, hip, pelvis or spine. A typical bone ailment is the fracture, which occurs when bone cannot withstand outside force like direct blows, twisting injuries and falls. Fractures are cracks in bones and are defined as a medical condition in which there is a break in the continuity of the bone. Detection and correct treatment of fractures are considered important, as a wrong diagnosis often lead to ineffective patient management, increased dissatisfaction and expensive litigation. The main focus of this paper is a review study that discusses about various classification algorithms that can be used to classify x-ray images as normal or fractured. Keywords— X-ray, Classification, Machine Learning, Fusion classifier. |
933-937 Full Text PDF |
3. | A Frequency Synthesis of All Digital Phase
Locked Loop S.Saravanakumar, N.Kirthika Abstract
All Digital Phase locked loops (ADPLL) plays a major role in System on Chips (SoC). Many EDA tools are used to design such complicated ADPLLs. It operates on two modes such as frequency acquisition mode and phase acquisition mode. Frequency acquisition mode is faster compared to Phase acquisition, hence frequency synthesis is performed. The CMOS technology is used to design such a complex design in Micron Technology. The frequency of the ADPLL is synthesized using feed forward compensation techniques. All the parameters of ADPLL (Power consumption, area, locking time) are obtained using 0.18μm technology. The synthesis of ADPLL with Digitally Controlled Oscillator (DCO) and modified Digitally Programmable Delay Element (DPDE) are done and it is found that ADPLL with DPDE consumes less power compared to ADPLL with DCO. |
938-942 Ful Text PDF |
4. | Call Admission Control to improve QoS in
MANETs K. Sabeetha, P. Sheela Angeline
|
943-948 Full Text PDF |
5. | A Low Power Asynchronous FPGA with Power Gating and Dual Rail Encoding K.Naveena, N.Kirthika Abstract
A low power Asynchronous FPGA with LEDR encoding and 4-Phase dual Rail Encoding is designed in this paper. 4-Phase Dual Rail encoding is to achieve small area and LEDR encoding is to get high throughput and low power. LEDR encoding is done at input and 4-phase dual rail encoding is done at the output, which reduces power. Power gating is done to each Logic Block, which shuts down power to the block which is ideal. Power reduction is achieved by selectively setting the functional units into a low leakage mode when they are inactive. The circuit is simulated using Xilinx tool and programmed using verilog language.
|
949-952 Full Text PDF |
6. | 2D Key Exchange Scheme Using Morphological
Dilation Priya Nandihal and Bhaskara Rao.N Abstract
A new scheme for Diffie-Hellman type key exchange is presented. This method uses morphological dilation process to provide secure exchange of a 2D key between two users. Keywords— 2D key, key exchange, morphological dilation, imge as a key. |
953-957 Full Text PDF |
7. | Introduction to Artificial Intelligence Nikita A. Kangude, Sanil B. Raut Abstract
This paper covers the introduction, history and applications of Artificial Intelligence. In this paper we have dealt with exact definition of artificial intelligence, its origin and the various theories that approach to get the clear idea of principles of AI. Various applications of artificial intelligence in fields like aviation, finance, medicine, games, etc. have been discussed precisely. A latest application of “SURVEILLANCE CAMERA SYSTEM” is presented. In this camera system principle of AI has been used smartly. The system functions autonomously without any manual input and has provided a base to create more intelligent security systems. The paper concludes that the next big revolution in the field of science will be brought about by artificial intelligence. Keywords— Artificial Intelligence, Fuzzy Logic, Neural Networks, Expert Systems. . |
958-962 Full Text PDF |
8. | A Survey and Taxonomy of scheduling algorithms
in Desktop Gri Jayoti Bansal, Shaveta, Paramajit Singh Abstract
Desktop Grids have proved to be a suitable platform for the execution of Bag-of-Tasks applications but, being characterized by a high resource volatility, require the availability of scheduling techniques able to effectively deal with resource failures and/or unplanned periods of unavailability. Scheduling BoT applications on Desktop Grids has thus attracted the attention of the scientific community, and various schedulers tailored towards them have been proposed in the literature However, due to the wide variety of approaches to this problem, it is difficult to meaningfully compare different systems since there is no uniform means for qualitatively or quantitatively evaluating them. It is also difficult to successfully build upon existing work or identify areas worthy of additional effort without some understanding of the relationships between past efforts. In this paper, taxonomy of approaches to the resource management problem in Grid environments is presented in order to provide a common terminology and classification mechanism necessary in addressing this problem. |
963-967 Full Text PDF |
9. | Survey on Fault Tolerance Techniques on Grid Geeta, Shaveta, Paramjit Singh Abstract
In a grid environment there are thousands of resources, services and applications that need to interact in order to make possible the use of the grid [1] as an execution platform. Since these elements are extremely heterogeneous, volatile and dynamic, there are many failure possibilities, including not only independent failures of each element, but also those resulting from interactions between them. Because of the inherent instability of grid environments, fault-detection and recovery is another critical component that must be addressed. The need for fault-tolerance is especially sensitive for large parallel applications since the failure rate grows with the number of processors and the duration of the computation.In this paper we will discuss the various fault management stratigies that will help to achieve the fault tolerance and is good reference to researcher. |
968-971 Full Text PDF |
10.. | An Efficient Architecture for Consistency
Maintenance and Peer Synchronization in
Distributed Systems Bollimuntha Kishore Babu,Attaluri Rajesh Abstract
P2P is a popular technology used for file sharing. File replication and Consistency maintenance are the techniques used in P2P for high system performance. File replication methods specify replica nodes without considering consistency maintenance which may lead to high overhead for unnecessary file replications and consistency maintenance. Consistency maintenance methods update files without considering file replication dynamism which may not give the accuracy of replica consistency. Instead of passively accepting replicas and update messages, we develop a mechanism which combines both file replication and consistency maintenance. This mechanism is very efficient in file replication and consistency maintenance at low cost. In this mechanism, accepting replicas and updates is based on file query rate and update rate. Peer-to-Peer architectures for content and knowledge management foster the creation of communities of workers in which effective knowledge and information sharing takes place. In such communities, workers have similar capabilities in providing other workers with data and/or services and are autonomous in managing their own knowledge objects. Since objects are typically shared among a set of workers, problems regarding concurrent access to content, content consistency and synchronization of peers arise. This paper describes a hybrid architecture for the management of data consistency and peer synchronization. The designed framework combines centralized, yet dynamic, mechanisms for metadata management and peer-to-peer mechanisms for data transfer. |
972-977 Full Text PDF |
11. | New Process Model: Yes Confident Software
Development Process Model S.Thulasi Krishna, K. Rajesh Kumar Reddy Abstract
An overview of the more common system development process models used to guide the system analysis, design development and maintenance of information. Generally we have many different techniques and methods used to software development life cycle. Project and most real word models are customized adaptations of the generic models while each is designed for a specific purpose or reason, most have similar goals and share many common tasks. This paper will explore the similarities and difference among these various models and also discovery new process models. Index Terms- process model, Rup, and v process model, B&F model, F-model. |
978-982 Full Text PDF |
12.. | Multicasting through Hop-by-Hop Routing Protocol
Using Modified Recursive Unicast U.Raghunath Reddy, K.Sekhar, P.Prabhavathi Abstract
IP Multicast is a hotly debated topic since many years. For this many reasons are responsible. Hence, the Internet is likely to be organized with both unicast and multicast enabled networks. Thus, it is of utmost importance to design protocols that allow the progressive deployment of the multicast service by supporting unicast clouds. This paper proposes HBH (Hop-By-Hop multicast routing protocol) which uses modified recursive unicast approach for Multicasting. HBH adopts the channel abstraction to simplify address allocation and implements data distribution using recursive unicast trees, which allow the transparent support of unicast only routers. Additionally, HBH is original because its tree construction algorithm takes into account the unicast routing asymmetries. As most multicast routing protocols rely on the unicast infrastructure, these asymmetries impact the structure of the multicast trees. HBH outperforms other multicast routing protocols in terms of the delay experienced by the receivers and the bandwidth consumption of the multicast trees. |
983-989 Full Text PDF |
13. | New Aggregation Operator for Triangular Fuzzy
Numbers based on the Arithmetic Means of the
L- and R- Apex Angles Manju Pandey, Nilay Khare, S.C. Shrivastava Abstract
In this paper a new aggregation operator for a class of LR Fuzzy Numbers i.e., Triangular Fuzzy Numbers (TFNs) in which the L- and R- apex angles of the piecewise continuous linear membership function of the composite or resultant or aggregate TFN are the arithmetic means of the corresponding L- and R- apex angles of the individual TFNs is proposed. The L- and R- apex angles have been treated independently. Computation of the aggregate is demonstrated with a numerical example. Corresponding arithmetic and geometric aggregates have also been computed. Keywords— LR Fuzzy Number, Triangular Fuzzy Number, Apex Angle, L-Apex Angle, R-Apex Angle, Aggregation Operator, Arithmetic and Geometric Mean |
990-992 Full Text PDF |
14. | Non Linear Programming Computation
Outsourcing in the Cloud Bhavsingh Maloth, Juveriah Suman, G.Saritha, A.Chandrasekhar Abstract
Cloud Computing is termed with great potential in providing robust computational power to the society at low cost. This enables customers with limited computational resources to outsource the large computation workloads to the cloud, and to enjoy massive computational power, bandwidth, and storage economically. Connecting the cloud to an intrinsically insecure computing platform from the viewpoint of the cloud customers, must model mechanisms not only protect sensitive information by enabling computations with secured encrypted data, but also protect customers against malicious behaviors by including the validation of the computation result. Such a functionality of general secure computation outsourcing was shown to be feasible in theory recently, but to design mechanisms that are practical efficient remains a very challenging problem. Nonlinear programming problems are in more general difficult than linear programming problems, and often hence the way out found is only a local optimum. The way out methods for nonlinear programming models varies, which can result to different nonlinear solvers giving different local optima for to same problem. |
993-997 Full Text PDF |
15.. | Discrete Keyword Search in Cloud Computing over Attribute Based Encryption Bhavsingh Maloth,K.Pavan Kumar , G.Nirusha, C.Vijaya Mohan Abstract
|
998-1006 Full Text PDF |
16. | Energy-Efficient Routing in Wireless Sensor Networks to Improve the LIfe Time of Sensor Nodes B.Sunil KUmar, S.Naisha Sultana, B.Khader Hussain. K.Puneeth Abstract
Energy-efficient routing is a critical problem in multihop WSN due to the severe power consumption of wireless nodes, the research on routing algorithm is pivotal in the architecture of WSN. This paper analyzes the implementation and existing issues in LEACH. Specifically for node energy and the network lifetime, it proposes an energyefficient routing algorithm based on cycle-switching cluster head. It improves node energy efficiency, balances energy consumption of all sensor nodes, enhances reliability of data transmission and increase network lifetime in comparison to LEACH. Simulation results showed that the algorithm is efficient. Moreover, the protocol increases the balance of energy dissipation, scalability and reliability of WSN. Keywords: routing protocol; clustering; network lifetime; minimum cost |
1007-1011 Full Text PDF |
17. | An Algorithm for Mining Frequent Itemsets K.Jothimani, S.Antony Selvadoss Thanmani Abstract
The problem of mining frequent itemsets in streaming data has attracted a lot of attention lately. Even though numerous frequent itemsets mining algorithms have been developed over the past decade, new solutions for handling stream data are still required due to the continuous, unbounded, and ordered sequence of data elements generated at a rapid rate in a data stream. The main challenge in data streams will be constrained by limited resources of time, memory, and sample size. Data mining has traditionally been performed over static datasets, where data mining algorithms can afford to read the input data several times. The goal of this article is to analyze the factors for mining frequent itemsets in theoretical manner. By comparing previous algorithms we propose new method using analytical modelling to determine the factors over data streams. Keywords— Data Mining, Data Streams Frequent Itemset Mining, Sliding Window. |
1012-1015 Full Text PDF |
18. | Improving QoS in 3G Wireless Mobile N/W Using Call Admission Control Scheme V.S.Kolate, B.S.Sonawane, A.S.Bhinde Abstract
Call admission control schemes play more important role in wireless cellular networks. They are used for achieving some desired quality of service parameters. The design of call admission control algorithms for mobile cellular networks is especially challenging given the limited and highly variable resources, and the mobility of users encountered in such networks. This paper discusses different schemes for providing Quality of Service (QoS) in cellular networks. |
1016-1019 Full Text PDF |
19. | Impulsive Stabilization of a Class of Stochastic Functional Differential Equations with Time Delays H.X.Yao, Y.W.LI Abstract
This paper investigates the pth moment globally uniformly exponential stability of a class of impulsive stabilization of stochastic delay differential equations,and the pth moment exponential stability criteria is established by using theLyapunov–Razumikhin method. Keywords—Stochastic delay differential equations; Exponential stability;Lyapunov-Razumikhin method;Impulsive control |
1020-1023 Full Text PDF |
20. | Empirical Analysis of the Relation to Output,
Money Supply and Inflation H.X.Yao,, Juan-juan Huang Abstract
The central bank needs to predict the
macroeconomic conditions in the future when it makes a new
monetary policy. Namely, we make the optimal monetary policy
with a comprehensive analysis on the domestic output, money
supply and inflation rate. This article selects the datum of the
National Bureau of Statistics of China, the People's Bank of
China, and the Customs Statistics Information Network as the
sample data for analysis and study .It is found that the
estimation of the nominal output and the rate of inflation by
FM model among the four kinds of variable structure
model—Polynomial model、WG model, RS model and FM
model is most consistent with the actual situation. At last, it is
verified that a condition of opening Taylor rules doesn’t accord
with China's national conditions which is based on the Vensim. |
1024-1028 Full Text PDF |
- Home
- Author Instruction
- Editorial Board
- Call for Paper
- Current volume
- Archives
- Indexing
- FAQ
- Publication Fees
- Contact
- Citation Index 0.47
Email: ijcsetonline@gmail.com / editor@ijcset.net