Volume 4 Issue 12- December 2014
Page | Title | Full Text |
---|---|---|
336-340 | Comparative Study on SPOON and SimBet
Routing in Disconnected MANETs M.Yuvaraj, E.Parthasarathi, P.Inshozan M.E Abstract
Recent advances in portable computing and wireless technologies are opening up exciting possibilities for the future of wireless of wireless mobile networking. A mobile Ad hoc NETwork (MANET) consist of mobile platform which are free to move arbitrarily. They are mainly developed for connected MANETs, in which end-to-end connectivity among nodes is ensured. In this paper, we existing system and also used to a proposed of a P2P content based file sharing system, namely SPOON, for disconnected MANETs, we are used similarity and betweeness between the two nodes and we are calculating simbet utility by using the formula which used for centrality. The simbet routing is the algorithm which is used for calculating the destination nodes position as well the source position and which is also used for how or where we are stored the data in buffer. So this is the proposed algorithm compare to the spoon. Spoon is the existing algorithm which is used for just form community and assigns ambassador. We first tested our system on the GENI Orbit testbed with a real trace and then conducted event-driven experiment with two real traces and NS2 simulation with simulated disconnected and connected MANET scenarios. The test results show that our system significantly lowers transmission cost and improves file searching success rate compared to current methods. Keywords:MANET,SPOON,SimBet,GENI. |
Full Text PDF |
341-343 | Detail and Comparative Study on WSN Security
Architectures E.Parthasarathi,A.R.Bharathidasan,S.Pavithra Abstract
Wireless sensor network (WSN) most widely growing technologyin network due to this WSN well known technology among the research community people. WSN having enormous sensing devices to sensing thenecessary information from current environmental scenario and transmit it to particular place or user. In WSN transmitting the obtained data has lot of security constraints i.e.) lot of security issues in transmission.In this paper we are going to analyses the security constraints need for transmission and mechanismsavailable to satisfy the security constraints. Keywords: Wireless Sensor Networks (WSN),Data security, Survey, Cryptography. |
Full Text PDF |
344-346 | SQL Performance Tuning Ch.V.N.Sanyasi Rao, Tiruveedula Gopi Krishna Abstract
Database performance is one of the most challenging aspects of an organization’s database operations. Database tuning can be an incredibly difficult task, particularly when working with large-scale data where even the most minor change can have a dramatic positive or negative impact on performance. A well-designed application may still experience performance problems if the SQL it uses is poorly constructed. It is much harder to write efficient SQL than it is to write functionally correct SQL. As such, SQL tuning can help significantly improve a system’s health and performance. The key to tuning SQL is to minimize the search path that the database uses to find the data. Keywords— SQL tips, optimizer modes, SQL tuning, index hint. |
Full Text PDF |
347-348 | Conversion of Image to Text Using Tesseract OCR
Engine L.Suriya Kala, Dr P. Thangaraj Abstract
This proposal is to create a solid way to convert the un-modifiable document images into a more flexible text format here the system will accept the raw scanned image of a document and produce the desired text which can be used in any way. To do that we need a strong OCR engine which will do that for us now using the traditional way which is algorithms are time consuming and also need expert knowledge but in this system the whole process is aimed to benefit the novice personalities who are working in common institutions. Keywords : OCR, EmguCV, tessdata |
Full Text PDF |
349-352 | Comparative Study on Spanning Tree Protocol and
Trust Based Routing Protocol A.R.Bharathidasan, M.Yuvaraj , G.Premnath Abstract
A mobile ad-hoc network is a self-configuring network of mobile hosts connected by wireless links which together form an arbitrary topology. MANETs are finding ever-increasing applications in both military and civilian operations. Spanning Tree-enabled switches go through a root election process based on Bridge Protocol Data Unit (BPDU). All other switches then build the shortest, lowest-cost path to the root switch and block ports that are not along these shortest paths, resulting in a loop-free, tree-like topology. Without a protocol such as Spanning Tree, Layer 2 bridged networks are susceptible to broadcast/multicast and/or unknown unicast storms. Trust-Based Routing Protocol with controlled degree of Selfishness for Securing MANET against Packet Dropping Attack. It reduces the searching time of malicious nodes, and the routing protocol avoids the isolated misbehaving node from sharing in all future routes, which improves the overall network throughput. In his paper we are going to compare the study on spanning tree and trust based routing protocol. In this paper also do the performance analysis comparison. Keywords— Mobile Ad Hoc Networks (MANETs), Spanning tree, Trust based routing |
Full Text PDF |
353-357 | Error Control System for Parallel Multichannel
Using Selective Repeat ARQ M.Amal Rajan, M.Maria Alex Abstract
.In Wireless Parallel Multichannel data communication system using Selective Repeat Automatic Repeat Request protocol for Error Control Transmission. We assume the modified scheme for improve the performance of Data Transmission over Selective Repeat ARQ by adding SW ARQ protocol features. We evaluate the resequencing delay and the resequencing buffer occupancy, respectively. Under the assumption that all channels have the same transmission rate but possibly different time-invariant error rates, we derive the probability generating function of the resequencing buffer occupancy and the probability mass function of the resequencing delay. Then, by assuming the Markov error model for each channel, we extend our analysis to time-varying channels. Keywords— In-sequence Delivery, Multichannel Data communications, Resequencing buffer occupancy, Resequencing Delay, SW-ARQ, SR ARQ. |
Full Text PDF |
358-363 | Assessment of Manifestation of Agile
Methodology and Computing T.Venkat Narayana Rao, D.Hiranmayi , G. Shravani Priya , G.Ravi Abstract
Agile methodology is a modern approach in software process to achieve a common business goal. In today’s business environment, normally organizations choose to deliver the projects very fast. They also require adjusting as well as adapting to changing environments. In this regard, traditional software methodologies fail to achieve these requirements. Traditional software mechanisms are sequential which takes much time to deliver the projects. Though, some of the traditional methods are used to deliver the software projects faster, agile methodology have some new challenges in delivering the software products and satisfies the customers by the valuable accurate software products. Agile software methodologies are an incremental and iterative approach used in delivery of accurate software product and assist to respond unpredictability. As numerous areas are overblown, there is huge requirement of applying the agile methodology in software process. This paper focus on study of agile methodologies, a comparative study between traditional methodologies with agile methodologies and process involved in agile methodologies . This paper also emphasis on the best practices of agile methodologies and its exemplars to the readers i.e. how to develop software product in a innovative and agile means and yet with a enhanced business advantage outcome. |
Full Text PDF |
364-366 | Identification of Hole Using Packet Forwarding
Process Based On Localized Node Movement TN.Preethi, B.J.Jayareshma, G.Pandiyan Abstract
The wireless sensor network(WSN), is the monitoring of a specified region of interest(ROI).wireless sensor network is a collection of sensing devices that can communicated wirelessly in each device can sense,process,and talks to its peer.In the proposed system,each and every nodes sending request to the hole manager and those manager receive that all incoming messages based on node movement from one location to the another location.so,its used to reduces time for identifying the hole in network based on sending error messages using packet forwarding algorithm as well as the detection of hole where replaced into the proper nodes due to the movable nodes.based on that algorithm network finds the holes in entire network and remove the holes based on hole healing process.In the existing system,to address the problem of hole detection and hole healing.the distributed hole detection(DHD),is proposed to identify the boundary nodes and discover holes.second,we present a virtual forces-based hole healing algorithm.but it only detect hole in network centre.although more than one DTN have same packet so DTN memory is wasted. Keywords: holemanager,hole detection, mobile WSN,DTN memory,packet forwarding algorithm. |
Full Text PDF |
367-370 | Hyperspectral Data Unmixing and Endmember
Extraction Process Using Vertex Component
Analysis Algorithm Pooja Prakash Sutar Abstract
The hyperspectral images have very huge number of pixel which stores the reflection of light beam from surface of material or object. Variations in the reflectivity of surface materials across different spectral bands provide a fundamental mechanism for understanding features in remotely-sensed multispectral hyperspectral images. Pixel in such images are mixed pixel because of its spatial resolution. A spectral unmixing is performed on mixed pixels, that contain a linear mixture of pure reflectance ground surface materials or objects called as endmember weighted by correspondent abundance fractio. Keywords— Hyperspectral Image, Spectral Unmixing, Dimensionality Reduction, Endmember, Endmember Extraction, Vertex Component analysis Introduction. |
Full Text PDF |
371-375 | Network Evolution in 3G / 4G: Applications and
Security Issues C.Theebendra, S.Yuvabarathi, M.K.Pavithra Abstract
During the 20th century, the key technology was information gathering, processing and distribution. This total technology will depend based on the network systems. Which are nothing but grouping of systems that should be controlled by a server. In business and home applications, mobile users, and in all social issues the networks are used. To enhance the benefits of these networks, we are introducing 3G systems. The aim of the 3G security architecture is to improve on the security of 2G systems.3G systems have additional standards like EDGE and CDMA rather than older systems. It has a high quality voice and video services but has limited in coverage area. Now introducing the 4G technologies to full fill the limitations of 3G. The Fourth generation (4G) will provide access to wide range of telecommunication services, including advanced mobile services, supported by mobile and fixed networks, which are increasingly packet based, along with a support for low to high mobility applications and wide range of data rates, in accordance with service demands in multiuser environment. Keywords -- 3G, 4G, CDMA, EDGE, GPRS, GSM, IMT, ITU, UMTS. |
Full Text PDF |
376-383 | Approaches and Scenarios to Combat Cyber Crime K.Krishna Jyothi, G. Kalyani,T.Venkat Narayana Rao Abstract
In the recent day’s usefulness and importance of the internet has become a new crime tool. This paper focuses on different types of cyber crimes namely: phishing, email spoofing and cyber pornography. It provides a review of cyber crimes and the means to protect from such crimes. The study looks at areas related to cybercrime at present and to review criminological theories that have been applied to the study of cybercrime. Our world only two decades old in terms of digital age, and our understanding of cybercrime is continually changing by looking at our understanding of cybercrime and cyber oppression . The laws are stringent and the enforcement is steady but due to advent of technology all the efforts to crimes are in vain. Crime is no longer restricted to space, time or a set of natives. The cases and exemplars offers a detail narration of real-time cases transpired in Indian and overseas context. The readers would avail a detailed account of kinds of crimes, laws/ acts and section to deal with such crimes. Keywords : offence, service, secret, cyber, attacks. |
Full Text PDF |
384-387 | Performance Comparison between IPV4 And IPV6 M.Jothilakshmi, , M.K.Pavithra, S.Yuvabarathi Abstract
The enormous growth of the internet and the way the addresses were assigned (classes A, B and C), resulted in a serious lack of addresses. There are several methods that avoid the total run out of addresses: PPP/DHCP (address sharing), CIDR (classless inter-domain routing) and NAT (network address translation), but do not seem to be enough in a few years. Nowadays IPv6 over IPv4 tunnels are widely used to form the global IPv6 Internet. This paper demonstrates the two tunnels and show when to immigrate from IPv4 to IPV6.While IPv6 is intended to eventually replace IPv4, they are tightly mingled right now. In this paper will be explained the main characteristics of IPv6 & IPv4, as well as the differences between both protocols, and the mechanisms to migrate the networks from IPv4 to IPv6. After this, we will see the some conclusions about the existence of both protocols and the implications that this has in the way the internet works. .Then the risks of immigration are discussed. KEYWORDS: PPP/DHCP, CIDR, IPv6 , IPv4. |
Full Text PDF |
388-391 | Fuzzy Inferenceing for Coronary Artery Disease
Screening Anu Ragavi.V and Devi Priya.R Abstract
An expert system is a computer software that attempts to mimic the reasoning of a human specialist. Expert systems typically consist of three parts: a knowledge base , an inference engine and interface that allows the user to express the problem in a human language. The traditional medical expert system is simple and widely used system but manual screening of Coronary Artery Disease (CAD) patients is not an easy task because the number of medical experts in comparison with number of patients is less. No clinical risk factors based expert system has been reported to screen the patients at an early stage. Also, the severity of the disease is not predicted from the system. Another con behind medical expert system is that higher level tests like ECG and angiogram are needed to identify the disease where poor people finds difficult to pay and undergo the tests. In the proposed approach, fuzzy expert system is used in place of medical expert system. Fuzzy inferenceing involves Mamdani approach. This approach involves cost effective screening which also identifies the severity of CAD. No higher level tests like ECG and angiogram are needed to identify the disease. The system is useful when the expert strength is less. The proposed fuzzy inferenceing for Coronary Artery Disease screening using clinical parameters identifies the risk percentage efficiently. Keywords: Expert System, Coronary Artery Disease (CAD), Risk Factors, Fuzzy Inferenceing. |
Full Text PDF |
392-394 | Security of outsourced data in cloud using
Dynamic Auditing V. V. Jog , Deepali Pande Abstract
Now a days Cloud is the term which is involved in every aspect of our life . It provides a environment called as scalable environment to store large amount of data and their related processes. It provides a low cost service called as outsource storage and is also independent of platform. Though it provides high data storage but there is always a problem of security of data stored in cloud. In this system we are proposing a system which is capable enough to solve cloud storage security problem. It verifies the integrity of cloud and the data which is outsourced. It also supports timely detection of anomaly and dynamic data operations. Key terms: Retrivability, TPA, metadata |
Full Text PDF |
395-399 | A Replication-Based and Fault Tolerant Allocation
Algorithm for Cloud Computing Torki Altameem Abstract
The very large infrastructure and the increasing demand of services of cloud computing systems lead to the need of an effective fault tolerant allocation technique. In this paper, we address the problem of allocating user applications to the virtual machines of cloud computing systems so that failures can be avoided in the presence of faults. We employ job replication as an effective mechanism to achieve efficient and fault-tolerant cloud. Most of the existing replication-based algorithms use a fixed number of replications for each application which consumes more cloud resources. We propose an algorithm to determine adaptively the number of replicas according to the fault rate of cloud virtual machines. The proposed algorithms have been evaluated through simulation and have shown better performance in terms of turnaround time and throughput. |
Full Text PDF |
400-403 | Data Hiding Scheme in Spatial Domain Shanthakumari.R , Malliga.S and Dheepika.S Abstract
Steganography is the practice of concealing messages or information within other non-secret text or data in a way that only the sender and intended recipient identifies the existence of the message. Technically in simple words, steganography means hiding one piece of data within another. In the existing system, such as in Least Significant Bit(LSB) only 4 bits can be embedded in every 4 pixels and in some systems in addition to the message bits, extra bits are to be embedded for providing security. In the proposed Least Significant Bit Inversion(LSBI) algorithm 6 bits of data is embedded in every 4 pixels. Use of grey code standard to hide the secret data inside the cover medium forms a layer of security. The proposed system is evaluated using the quality metrics like Mean Squared Error and Structural Similarity Index. Keywords: Image Processing, Steganography,Data Hiding, Grey Code Standard and LSBI. |
Full Text PDF |
404-411 | Design and Simulation of UWB Monopole Disk
Antenna Samer N. Naji , Jabir S. Aziz, Lubab A. Salman Abstract
Because of their broadband characteristics ultra-wideband (UWB) antennas continue to capture the interest of many researchers and developers worldwide especially those involved in areas such as high data rate wireless communications, indoor positioning, and through-the-wall imaging. However, these systems are required to work side by side with other narrowband applications such as WiMAX and WLAN systems without causing any performance degradation. For this reason, a monopole disk antenna is presented here to cover the whole IEEE 802.15.4a UWB designation with two band notches at 3.5 and 5/6 GHz for interference-free operation with WiMAX and WLAN systems, respectively. The presented design incorporates a C-slot and a hairpin slot in the radiating disk and microstrip feed line, respectively, to allow for the two band notches. It also incorporates a set of circular cuts in the truncated ground plane on the backside of the substrate to allow for extended freedom in setting out the design parameters for achieving the desired performance. |
Full Text PDF |
412-418 | An Analysis for Big Data and its Technologies Dr.M. Moorthy ,R. Baby,S. Senthamaraiselvi Abstract
“Big Data” is a term encompassing the use of techniques to capture, process, analyse and visualize potentially large datasets in a reasonable timeframe not accessible to standard IT technologies. By extension, the platform, tools and software used for this purpose are collectively called “Big Data technologies”. In this paper, we provide the meaning, characteristics, models, technologies, life cycle and many other aspects of big data. Keywords— Big Data, Hadoop, Map Reduce, HDFS (Hadoop Distributed File System), Cloud Computing. |
Full Text PDF |
419-423 | Swarm Intelligence Techniques as Efficient Tools
for Problem Solving Manjula. KA Abstract
Swarm intelligence is the study of computational systems inspired by the 'collective intelligence' Which is emerged through the cooperation of large numbers of homogeneous agents in the environment like schools of fish, flocks of birds, and colonies of ants. Such intelligence is decentralized, self-organizing and distributed throughout an environment and this has led to the development of a new computing methodology in solving complex problems and finding optimum solutions in many areas including the research areas in information technology. Keywords – natural computing, swarm intelligence, ant colony optimization, particle swarm optimization, bee colony optimization. |
Full Text PDF |
- Home
- Author Instruction
- Editorial Board
- Call for Paper
- Current volume
- Archives
- Indexing
- FAQ
- Publication Fees
- Contact
- Citation Index 0.47
Email: ijcsetonline@gmail.com / editor@ijcset.net