Volume 4 Issue 12- December 2014

 

Page Title Full Text
336-340 Comparative Study on SPOON and SimBet Routing in Disconnected MANETs
M.Yuvaraj, E.Parthasarathi, P.Inshozan M.E
Abstract

Recent advances in portable computing and wireless technologies are opening up exciting possibilities for the future of wireless of wireless mobile networking. A mobile Ad hoc NETwork (MANET) consist of mobile platform which are free to move arbitrarily. They are mainly developed for connected MANETs, in which end-to-end connectivity among nodes is ensured. In this paper, we existing system and also used to a proposed of a P2P content based file sharing system, namely SPOON, for disconnected MANETs, we are used similarity and betweeness between the two nodes and we are calculating simbet utility by using the formula which used for centrality. The simbet routing is the algorithm which is used for calculating the destination nodes position as well the source position and which is also used for how or where we are stored the data in buffer. So this is the proposed algorithm compare to the spoon. Spoon is the existing algorithm which is used for just form community and assigns ambassador. We first tested our system on the GENI Orbit testbed with a real trace and then conducted event-driven experiment with two real traces and NS2 simulation with simulated disconnected and connected MANET scenarios. The test results show that our system significantly lowers transmission cost and improves file searching success rate compared to current methods.

Keywords:MANET,SPOON,SimBet,GENI.

Full Text PDF
341-343 Detail and Comparative Study on WSN Security Architectures
E.Parthasarathi,A.R.Bharathidasan,S.Pavithra
Abstract

Wireless sensor network (WSN) most widely growing technologyin network due to this WSN well known technology among the research community people. WSN having enormous sensing devices to sensing thenecessary information from current environmental scenario and transmit it to particular place or user. In WSN transmitting the obtained data has lot of security constraints i.e.) lot of security issues in transmission.In this paper we are going to analyses the security constraints need for transmission and mechanismsavailable to satisfy the security constraints.

Keywords: Wireless Sensor Networks (WSN),Data security, Survey, Cryptography.

Full Text PDF
344-346 SQL Performance Tuning
Ch.V.N.Sanyasi Rao, Tiruveedula Gopi Krishna
Abstract

Database performance is one of the most challenging aspects of an organization’s database operations. Database tuning can be an incredibly difficult task, particularly when working with large-scale data where even the most minor change can have a dramatic positive or negative impact on performance. A well-designed application may still experience performance problems if the SQL it uses is poorly constructed. It is much harder to write efficient SQL than it is to write functionally correct SQL. As such, SQL tuning can help significantly improve a system’s health and performance. The key to tuning SQL is to minimize the search path that the database uses to find the data.

Keywords— SQL tips, optimizer modes, SQL tuning, index hint.

Full Text PDF
347-348 Conversion of Image to Text Using Tesseract OCR Engine
L.Suriya Kala, Dr P. Thangaraj
Abstract

This proposal is to create a solid way to convert the un-modifiable document images into a more flexible text format here the system will accept the raw scanned image of a document and produce the desired text which can be used in any way. To do that we need a strong OCR engine which will do that for us now using the traditional way which is algorithms are time consuming and also need expert knowledge but in this system the whole process is aimed to benefit the novice personalities who are working in common institutions.

Keywords : OCR, EmguCV, tessdata

Full Text PDF
349-352 Comparative Study on Spanning Tree Protocol and Trust Based Routing Protocol
A.R.Bharathidasan, M.Yuvaraj , G.Premnath
Abstract

A mobile ad-hoc network is a self-configuring network of mobile hosts connected by wireless links which together form an arbitrary topology. MANETs are finding ever-increasing applications in both military and civilian operations. Spanning Tree-enabled switches go through a root election process based on Bridge Protocol Data Unit (BPDU). All other switches then build the shortest, lowest-cost path to the root switch and block ports that are not along these shortest paths, resulting in a loop-free, tree-like topology. Without a protocol such as Spanning Tree, Layer 2 bridged networks are susceptible to broadcast/multicast and/or unknown unicast storms.  Trust-Based Routing Protocol with controlled degree of Selfishness for Securing MANET against Packet Dropping Attack. It reduces the searching time of malicious nodes, and the routing protocol avoids the isolated misbehaving node from sharing in all future routes, which improves the overall network throughput. In his paper we are going to compare the study on spanning tree and trust based routing protocol. In this paper also do the performance analysis comparison.

Keywords— Mobile Ad Hoc Networks (MANETs), Spanning tree, Trust based routing

Full Text PDF
353-357 Error Control System for Parallel Multichannel Using Selective Repeat ARQ
M.Amal Rajan, M.Maria Alex
Abstract

.In Wireless Parallel Multichannel data communication system using Selective Repeat Automatic Repeat Request protocol for Error Control Transmission. We assume the modified scheme for improve the performance of Data Transmission over Selective Repeat ARQ by adding   SW ARQ protocol features.  We evaluate the resequencing delay and the resequencing buffer occupancy, respectively. Under the assumption that all channels have the same transmission rate but possibly different time-invariant error rates, we derive the probability generating function of the resequencing buffer occupancy and the probability mass function of the resequencing delay. Then, by assuming the Markov error model for each channel, we extend our analysis to time-varying channels.

Keywords— In-sequence Delivery, Multichannel Data communications, Resequencing buffer occupancy, Resequencing Delay, SW-ARQ, SR ARQ.

Full Text PDF
358-363 Assessment of Manifestation of Agile Methodology and Computing
T.Venkat Narayana Rao, D.Hiranmayi , G. Shravani Priya , G.Ravi
Abstract

Agile methodology is a modern approach in software process to achieve a common business goal. In today’s business environment, normally organizations choose to deliver the projects very fast. They also require adjusting  as well as adapting to changing environments. In this regard, traditional software methodologies fail to achieve these requirements. Traditional software mechanisms are sequential which takes much time to deliver the projects. Though, some of the traditional methods are used  to deliver the software projects faster, agile methodology have some new  challenges in delivering the software products and satisfies the customers by the valuable accurate software products. Agile software methodologies are an incremental and iterative approach used in delivery of accurate software product and assist to respond unpredictability. As numerous areas are overblown, there is huge requirement of applying the agile methodology in software process. This paper focus on study of   agile methodologies, a comparative study between traditional methodologies with agile methodologies and  process involved in agile methodologies . This paper also emphasis on the best practices  of agile methodologies and its exemplars to the readers i.e.  how to  develop software product in a innovative and agile means and yet with a enhanced business advantage outcome.
Keywords—Agile, Iterative, Traditional methods, Extreme programming, scrum, Feature driven development.

Full Text PDF
364-366 Identification of Hole Using Packet Forwarding Process Based On Localized Node Movement
TN.Preethi, B.J.Jayareshma, G.Pandiyan
Abstract

The wireless sensor network(WSN), is the monitoring of a specified region of interest(ROI).wireless sensor network is a collection of sensing devices that can communicated wirelessly in each device can sense,process,and talks to its peer.In the proposed system,each and every nodes sending request to the hole manager and those manager receive that all incoming messages based on node movement from one location to the another location.so,its used to reduces time for identifying the hole in network based on sending error messages using packet forwarding algorithm as well as the detection of hole where replaced into the proper nodes due to the movable nodes.based on that algorithm network finds the holes in entire network and remove the holes based on hole healing process.In the existing system,to address the problem of hole detection and hole healing.the  distributed hole detection(DHD),is proposed to identify the boundary nodes and discover holes.second,we present a virtual forces-based hole healing algorithm.but it only detect hole in network centre.although more than one DTN have same packet  so DTN memory is wasted.

Keywords: holemanager,hole detection, mobile WSN,DTN memory,packet forwarding  algorithm.

Full Text PDF
367-370 Hyperspectral Data Unmixing and Endmember Extraction Process Using Vertex Component Analysis Algorithm
Pooja Prakash Sutar
Abstract

The hyperspectral images have very huge number of pixel which stores the reflection of light beam from surface of material or object. Variations in the reflectivity of surface materials across different spectral bands provide a fundamental mechanism for understanding features in remotely-sensed multispectral hyperspectral images. Pixel in such images are mixed pixel because of its spatial resolution. A spectral unmixing is performed on mixed pixels, that contain a linear mixture of pure reflectance ground surface materials or objects called as endmember weighted by correspondent abundance fractio.

Keywords— Hyperspectral Image, Spectral Unmixing, Dimensionality Reduction, Endmember, Endmember Extraction, Vertex Component analysis Introduction.

Full Text PDF
371-375 Network Evolution in 3G / 4G: Applications and Security Issues
C.Theebendra, S.Yuvabarathi, M.K.Pavithra
Abstract

During the 20th century, the key technology was information gathering, processing and distribution. This total technology will depend based on the network systems. Which are nothing but grouping of systems that should be controlled by a server. In business and home applications, mobile users, and in all social issues the networks are used. To enhance the benefits of these networks, we are introducing 3G systems. The aim of the 3G security architecture is to improve on the security of 2G systems.3G systems have additional standards like EDGE and CDMA rather than older systems. It has a high quality voice and video services but has limited in coverage area. Now introducing the 4G technologies to full fill the limitations of 3G. The Fourth generation (4G) will provide access to wide range of telecommunication services, including advanced mobile services, supported by mobile and fixed networks, which are increasingly packet based, along with a support for low to high mobility applications and wide range of data rates, in accordance with service demands in multiuser environment.

Keywords -- 3G, 4G, CDMA, EDGE, GPRS, GSM, IMT, ITU, UMTS.

Full Text PDF
376-383 Approaches and Scenarios to Combat Cyber Crime
K.Krishna Jyothi, G. Kalyani,T.Venkat Narayana Rao
Abstract

In the recent day’s usefulness and importance of the internet has become a new crime tool. This paper focuses on different types of cyber crimes namely: phishing, email spoofing and cyber pornography. It provides a review of cyber crimes and the means to protect from such crimes.  The study looks  at areas related to cybercrime  at present and to review criminological theories that have been applied to the study of  cybercrime.   Our world only  two decades  old in terms of  digital age, and our  understanding of cybercrime is continually changing by looking at our understanding of cybercrime and cyber oppression . The laws are stringent and the enforcement is steady but due to advent of technology all the efforts to crimes are in vain. Crime is no longer restricted to space, time or a set of natives. The cases and exemplars offers a detail narration of real-time cases transpired in Indian and overseas context.  The readers would avail a detailed account of kinds of  crimes, laws/ acts and section  to deal with such crimes.

Keywords : offence, service, secret, cyber, attacks.

Full Text PDF
384-387 Performance Comparison between IPV4 And IPV6
M.Jothilakshmi, , M.K.Pavithra, S.Yuvabarathi
Abstract

The enormous growth of the internet and the way the addresses were assigned (classes A, B and C), resulted in a serious lack of addresses. There are several methods that avoid the total run out of addresses: PPP/DHCP (address sharing), CIDR (classless inter-domain routing) and NAT (network address translation), but do not seem to be enough in a few years. Nowadays IPv6 over IPv4 tunnels are widely used to form the global IPv6 Internet. This paper demonstrates the two tunnels and show when to immigrate from IPv4 to IPV6.While IPv6 is intended to eventually replace IPv4, they are tightly mingled right now. In this paper will be explained the main characteristics of IPv6 & IPv4, as well as the differences between both protocols, and the mechanisms to migrate the networks from IPv4 to IPv6. After this, we will see the some conclusions about the existence of both protocols and the implications that this has in the way the internet works. .Then the risks of immigration are discussed.

KEYWORDS: PPP/DHCP, CIDR, IPv6 , IPv4.

Full Text PDF
388-391 Fuzzy Inferenceing for Coronary Artery Disease Screening
Anu Ragavi.V and Devi Priya.R
Abstract

An expert system is a computer software that attempts to mimic the reasoning of a human specialist. Expert systems typically consist of three parts: a knowledge base , an inference engine and interface that allows the user to express the problem in a human language. The traditional medical expert system is simple and widely used system but manual screening of Coronary Artery Disease (CAD) patients is not an easy task because the number of medical experts in comparison with number of patients is less. No clinical risk factors based expert system has been reported to screen the patients at an early stage. Also, the severity of the disease is not predicted from the system. Another con behind medical expert system is that higher level tests like ECG and angiogram are needed to identify the disease where poor people finds difficult to pay and undergo the tests. In the proposed approach, fuzzy expert system is used in place of medical expert system. Fuzzy inferenceing involves Mamdani approach. This approach involves cost effective screening which also identifies the severity of CAD. No higher level tests like ECG and angiogram are needed to identify the disease. The system is useful when the expert strength is less. The proposed fuzzy inferenceing for Coronary Artery Disease screening using clinical parameters identifies the risk percentage efficiently.

Keywords: Expert System, Coronary Artery Disease (CAD), Risk Factors, Fuzzy Inferenceing.

Full Text PDF
392-394 Security of outsourced data in cloud using Dynamic Auditing
V. V. Jog , Deepali Pande
Abstract

Now a days Cloud is the term which is involved in every aspect of our life . It provides a environment called as scalable environment to store large amount of data and their related processes.  It provides a low cost service called as outsource storage  and is also independent of platform.  Though it provides high data storage but there is always a problem of security of data stored in cloud. In this system we are proposing a system which is capable enough to solve cloud storage security problem. It verifies the integrity of cloud and the data which is outsourced. It also supports timely detection of anomaly and dynamic data operations.

Key terms: Retrivability, TPA, metadata

Full Text PDF
395-399 A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing
Torki Altameem
Abstract

The very large infrastructure and the increasing demand of services of cloud computing systems lead to the need of an effective fault tolerant allocation technique. In this paper, we address the problem of allocating user applications to the virtual machines of cloud computing systems so that failures can be avoided in the presence of faults. We employ job replication as an effective mechanism to achieve efficient and fault-tolerant cloud. Most of the existing replication-based algorithms use a fixed number of replications for each application which consumes more cloud resources. We propose an algorithm to determine adaptively the number of replicas according to the fault rate of cloud virtual machines. The proposed algorithms have been evaluated through simulation and have shown better performance in terms of turnaround time and throughput. 

Keywords—  Fault tolerant, Replication, Cloud Computing, Fault rate.

Full Text PDF
400-403 Data Hiding Scheme in Spatial Domain
Shanthakumari.R , Malliga.S and Dheepika.S
Abstract

Steganography is the practice of concealing messages or information within other non-secret text or data in  a way that only the sender and intended recipient identifies the existence of the message. Technically in simple words, steganography means hiding one piece of data within another. In the existing system, such as in Least Significant Bit(LSB) only 4 bits can be embedded in every 4 pixels and in some systems in addition to the message bits, extra bits are to be embedded for providing security. In the proposed  Least Significant Bit Inversion(LSBI) algorithm 6 bits of data is embedded in every 4 pixels. Use of grey code standard to hide the secret data inside the cover medium forms a layer of security. The proposed system is evaluated using the quality metrics like Mean Squared Error  and Structural Similarity Index.

Keywords: Image Processing, Steganography,Data Hiding, Grey Code Standard and LSBI.

Full Text PDF
404-411 Design and Simulation of UWB Monopole Disk Antenna
Samer N. Naji , Jabir S. Aziz, Lubab A. Salman
Abstract

Because of their broadband characteristics ultra-wideband (UWB) antennas continue to capture the interest of many researchers and developers worldwide especially those involved in areas such as high data rate wireless communications, indoor positioning, and through-the-wall imaging. However, these systems are required to work side by side with other narrowband applications such as WiMAX and WLAN systems without causing any performance degradation. For this reason, a monopole disk antenna is presented here to cover the whole IEEE 802.15.4a UWB designation with two band notches at 3.5 and 5/6 GHz for interference-free operation with WiMAX and WLAN systems, respectively. The presented design incorporates a C-slot and a hairpin slot in the radiating disk and microstrip feed line, respectively, to allow for the two band notches. It also incorporates a set of circular cuts in the truncated ground plane on the backside of the substrate to allow for extended freedom in setting out the design parameters for achieving the desired performance.

Full Text PDF
412-418 An Analysis for Big Data and its Technologies
Dr.M. Moorthy ,R. Baby,S. Senthamaraiselvi
Abstract

“Big Data” is a term encompassing the use of techniques to capture, process, analyse and visualize potentially large datasets in a reasonable timeframe not accessible to standard IT technologies. By extension, the platform, tools and software used for this purpose are collectively called “Big Data technologies”. In this paper, we provide the meaning, characteristics, models, technologies, life cycle and many other aspects of big data.

Keywords— Big Data, Hadoop, Map Reduce, HDFS (Hadoop Distributed File System), Cloud Computing.

Full Text PDF
419-423 Swarm Intelligence Techniques as Efficient Tools for Problem Solving
Manjula. KA
Abstract

Swarm intelligence is the study of computational systems inspired by the 'collective intelligence' Which is  emerged through the cooperation of large numbers of homogeneous agents in the environment like schools of fish, flocks of birds, and colonies of ants. Such intelligence is decentralized, self-organizing and distributed throughout an environment and this has  led to the development of a new computing methodology in solving complex problems and finding optimum solutions in many areas including the research areas in information technology.

Keywords – natural computing, swarm intelligence, ant colony optimization, particle swarm optimization, bee colony optimization.

Full Text PDF

 

 

 

 

 

IJCSET Menu

Downloads