Volume 3 Issue 12- December 2013

 

S.No Title Page
1. Quick Convergence of FFNN by Weight Optimization Technique in Data Mining
S.S.Baskar,L. Arockiam,S.Charles
Abstract

In this paper, we present a new method that provides quick convergence for a feed forward neural networks system using feature selection and weight optimization techniques.  A neural networks system functions on the basis of weights presented to the neurons. These weights are fine tuned to the most possible accurate level using the training data set. But this process is time and resource intensive, and increases exponentially with the increase in number of attributes. Further, the irrelevant attributes present in the attribute set reduces the level of accuracy and increases the computation time. Hence we present a method that initially shortlists the valid candidates and their dependencies and finally assign them with the appropriate weights for providing to the Neural networks system.

Keywords: Feature selection;  Neural Networks; fuzzy association rule mining

434-438
Full Text PDF
2. An Overview of PAPR Reduction Technique for OFDM Signals by using Selective Mapping technique (SLM)
Md. Rashedul Islam, Md. Kislu Noman, Sheikh Rashel Al Ahmed, Nur Hossain Khan
Abstract

Orthogonal Frequency Division Multiplexing (OFDM) is a promising technique used in the wireless broadband communication systems these days. It is a form of multi-carrier modulation technique. High spectral efficiency, robustness to channel fading, immunity to impulse interference, uniform average spectral density, capacity to handle very strong echoes and very less nonlinear distortion are the properties of the OFDM. One major disadvantage of OFDM is that the time domain OFDM signal which is a sum of several sinusoids leads to high peak to average power ratio (PAPR). Number of techniques have been proposed in the literature for reducing the PAPR in OFDM systems. In this paper, we discuss about the selected mapping technique (SML) for reducing the PAPR and the simulation result shows the PAPR reduction of OFDM signals.

Keywords— CCDF, IFFT, OFDM, MIMO, Peak-to-Average Power Ratio, PAPR, SLM, Selection Mapping Technique.

439-442
Full Text PDF
3. Design and Implementation of Web-Based GPS-GPRS Vehicle Tracking System
Khalifa A. Salim, Ibrahim Mohammed Idrees
Abstract

In this paper, an integrated cost effective web-based GPS-GPRS vehicle tracking system was designed and implemented. The system enables enterprises owners to view the present and past positions recorded of the target vehicle on Google Map through purpose designed web site. The current position of the vehicle was acquired by GPS device which is integrated in the target vehicle and the location coordinates are sent through GPRS service provided by the GSM network. The GPS data are sent using Get method of HTTP protocol, the data at server side are stored in a database tables and can be retrieved as request for position browsing on map. A web application is developed using PHP, JavaScript, Ajax, XML, and MySQL with embedded Google Map to retrieve and display on track details.

Keywords—GPS, GPRS, Vehicle Tracking.

443-448
Full Text PDF
4. A Review of Lightweight Security Mechanism for ATM Networks.
Dr Syed Umar, Rajendra kumar J , Anil Kumar J
Abstract

The IP converge the multi-applications over Internet, and ATM will construct global networks for IP development. It is a significant research to associate those projects. The vision is that company or enterprise will have ATM switches on their own site to transfer bulk data across Internet. In this paper, we propose a lightweight security mechanism to support secure communications for ATM Networks. The mostly threats and attacks could be protected through authentication and confidentiality practiced in ATM networks. In our scheme, security parameter exchanges and session key generations are the engine that deployed under security module with in-band control. The security policy will process uncontrollable state with default criteria. We utilize an embed-policy as conflict resolution to promote the reliability of lightweight security system.

Keywords—   Asynchronous transfer mode (ATM), authentication, confidentiality, cryptography, security policy
449-453
Full Text PDF
5. Cerulean Blue Eyes Application for Determining the Human Sensors
S.Muthukumaran,S.Antony Jones,Dr.P.suresh
Abstract

Blue stands for Bluetooth, which enables reliable wireless communication and the Eyes because the eye movement enables us to obtain a lot of interesting and important information. Is it possible to create a computer, which can interact with us as we interact each other? For example imagine in a fine morning you walk on to your computer room and switch on your computer, and then it tells you “Hey friend, good morning you seem to be a bad mood today. And then it opens your mail box and shows you some of the mails and tries to cheer you. It seems to be a fiction, but it will be the life lead by “BLUE EYES” in the very near future.
The basic idea behind this technology is to give the computer the human power. We all have some perceptual abilities. That is we can understand each other’s feelings. For example we can understand ones emotional state by analyzing his facial expression. If we add these perceptual abilities of human to computers would enable computers to work together with human beings as intimate partners. The “BLUE EYES” technology aims at creating computational machines that have perceptual hand sensory ability like those of human beings.
Blue Eyes system consists of a mobile measuring device and a central analytical system. The mobile device is integrated with Bluetooth module providing wireless interface between sensors worn by the operator and the central unit. Human cognition depends primarily on the ability to perceive, interpret, and integrate audio-visuals and sensoring information.

454-456
Full Text PDF
6. Energy Efficiency in Manet
Sarabjeet Kaur, Vikas Gupta, Simratpal Kaur
Abstract

The need to exchange digital information outside the typical wired office environment is growing. A mobile ad-hoc network which does not use a wired network and base station system is composed of a group of mobile and wireless nodes. There are various types of restrictions. The biggest restriction is the confined energy of the batteries. Battery power of the nodes is primarily consumed while transmitting packets. This proposed model uses energy sharing concept in multi-hop ad hoc network to increase the efficiency & lifetime of the system. It also defines that the response time & throughput increases while traffic increases. Therefore our proposal decreases response time, increases power efficiency & increases throughput of the MANET system.

Keywords: MANET, Power Consumed/ Packet, Response Time, Throughput, DPSR

457-459
Full Text PDF
7. Tree Structured Web Template Matching for Deep Web Extraction
R.Vijay, Dr. K. Prasadh
Abstract

Usually, Deep Web contains more accurate and valuable information than based on users’ requests. But, making use of such combined structure of extracted information needs significant efforts because the obtained web pages are utilized for revelation not for exchanging the data. So, extracting the relative data from Web pages from the absolute Web sites has been a primary step for Web information combination. A significant feature of extraction of web pages is that the absolute web pages share the similar template because they are engendered with a predefined outline by stopping data values. Even though many approaches have been planned for deep Web data extraction very few works discuss this problem at a page-level. Mohammed Kayed et. Al., presented approach for web page extraction method by implementing the new approach called FiVaTech, to automatically notice the extracted data of a Web site. But the drawback is that it can be applied only to 2 or 3 set of web pages alone. To increase the number of web pages for web page extraction, in this work, proposed a novel representation of page generation with Tree Based Template Matches (TBTM). TBTM deduce the schema and templates for each individual Deep Web site, which contains either singleton or multiple data records in one Web page. Experimental evaluation is done to estimate the performance of the TBTM scheme with a large set of database for deep web data extraction against existing FivaTech. The performance of the proposed scheme is measured in terms of relativity, number of schemas, execution time and comparison results showed that the proposed TBTM attains 10-12% high in obtaining the relative information over the set of web pages.

Keywords— Deep Web Page, Tree structure, Template Matching, Schema extraction, Data records.

460-465
Full Text PDF
8. A Review of Wireless Sensor Networks: Attacks and Countermeasures
Srikanth Narayanaraju, Dr Syed Umar, Rajendra Kumar
Abstract

We consider routing security in wireless sensor networks. Many sensor network routing protocols have been proposed, but none of them have been designed with security as a goal. We propose security goals for routing in sensor networks, show how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensor networks, introduce two classes of novel attacks against sensor networks — sinkholes and HELLO floods, and analyze the security of all the major sensor network routing protocols. We describe crippling attacks against all of them and suggest countermeasures and design considerations. This is the first such analysis of secure routing in sensor networks.

466-473
Full Text PDF

 

 

 

 

IJCSET Menu

Downloads