for Journals by Title or ISSN
for Articles by Keywords
help
Followed Journals
Journal you Follow: 0
 
Sign Up to follow journals, search in your chosen journals and, optionally, receive Email Alerts when new issues of your Followed Jurnals are published.
Already have an account? Sign In to see the journals you follow.
International Journal of Research in Computer and Communication Technology
   [4 followers]  Follow    
  This is an Open Access Journal Open Access journal
     ISSN (Print) 2320-5156 - ISSN (Online) 2278-5841
     Published by Suryansh Publications Homepage  [2 journals]
  • An Application of Integrated Interface Schema (IIS) Over Multiple WDBS to
           Enhance Data Unit Annotation

    • Authors: P.Vara Prasad, P.Surya Prabhakar Rao, T. Nirosh Kumar
      Abstract: The data unit’s revisits from the fundamental database are typically programmed into the result pages vigorously for human browsing. For the preset data units to be appliance process capable which is necessary for many applications such as deep web data collection and Internet comparison shopping. They need to be taking out and assign meaningful labels. We present an mechanical annotation approach that first supports the data units on a result page into different groups such that the data in the same group have the same semantic. Then for each group we explain it from different aspects and aggregate the different annotations to calculate a final annotation label for it. An annotation covering for the search site is automatically constructed and can be used to annotate new result pages from the same web database.
      PubDate: 2014-11-19
      Issue No: Vol. 3 (2014)
       
  • Leakage Estimation in DFT-based Channel Estimator for OFDM by using
           Minimum Mean Square Estimator

    • Authors: S.Aruna Kumari, A.Ashok Kumar
      Abstract: For high data rate communication with the required Quality of Service (QoS) in 3G and 4G systems, Orthogonal Frequency Division Multiplexing (OFDM) is proposed. We present a novel discrete Fourier transform (DFT)-based channel estimator for orthogonal frequency-division multiplexing (OFDM) systems. The conventional DFT-based estimator zeroes out noise-dominant values in the transform domain, which suffers from a poor performance in the presence of channel leakage. Some improved estimators have been proposed, but these estimators all focus on reducing the leaked energy. We propose to estimate the channel leakage by using the partial minimum mean square error (MMSE) filtering. When the channel delay is sufficiently less than the duration of an OFDM symbol, the partial MMSE filtering can be simplified. We propose several improved adaptive sparse channel estimation methods using Lp-norm normalized LMS (LP-NLMS) and Lp-norm normalized LMS (L0-NLMS). Simulation results show that the proposed channel estimator achieves much better performance than conventional estimators and well approaches the MMSE estimator. Comparing with previous methods, effectiveness of the proposed methods is confirmed by computer simulations.
      PubDate: 2014-11-17
      Issue No: Vol. 3 (2014)
       
  • Performance Analysis Of Vedic Multiplier Using Reversible Logic In Spartan
           6

    • Authors: T Nagaveer, M Neelima, VNM Brahmanandam
      Abstract: A system's performance is generally determined by the performance of the multiplier, because the multiplier is generally the slowest element in the system. Multipliers are key components of many high performance systems such as FIR filters, Microprocessors, Digital Signal Processors, etc. Furthermore, it is generally the most area consuming. Hence, optimizing the speed and area of the multiplier is a major design issue. Vedic multiplier is one such promising solution. Vedic mathematics is the name given to the ancient Indian system of mathematics that was rediscovered in the early twentieth century from ancient Indian sculptures (Vedas). This paper proposes the design of high speed Vedic Multiplier using the techniques of Vedic Mathematics that have been modified to improve performance. Its simple architecture coupled with increased speed forms an unparalleled combination for serving any complex multiplication computations. Tagged with these highlights, implementing this with reversible logic further reduces power dissipation. Power dissipation is another important constraint in an embedded system which cannot be neglected. In this paper we bring out a Vedic multiplier known as "Urdhva Tiryakbhayam" meaning vertical and crosswise, implemented using reversible logic, This paper presents study on high speed Vedic multiplier architecture which is quite different from the Conventional method of multiplication like add and shift. Further, the HDL coding of Urdhva tiryakbhyam Sutra for 8x8 bits multiplication and their FPGA implementation by Xilinx Synthesis Tool on Spartan 6 kit have been done and output has been displayed on LED’s of Spartan 6 kit. Logic verification of these modules has been done by using Modelsim 6.5.bThis multiplier may find applications in Fast Fourier Transforms (FFTs), and other applications of DSP like imaging, software defined radios, wireless communications.
      PubDate: 2014-11-14
      Issue No: Vol. 3 (2014)
       
  • Design Of A Rceat Architecture For Detecting Multi- Bit Error In Rfid

    • Authors: Indugula Anusha Devi, B Bala Krishna, V N M Brahmanandam
      Abstract: Radio Frequency Identification (RFID) plays an important role in Warehouse Management, especially during the automatic identification of items. Unfortunately, a warehouse environment has electromagnetic interferences causing read failures in the RFID system. Here, we will considering networking environment, the cyclic redundancy check is widely utilized to determine whether error have been introduced during transmission over physical links. Cyclic redundancy check is extensively used for encoding and decoding communication channel burst errors, where a transient fault causes several adjacent data errors.  In this method, the transmitter divides of the message by an agreed-upon polynomial called the generator and concatenates the calculated residue to the message. The receiver divides what it receives by the generator again. A zero residue indicates error-free transmission and a nonzero residue is interpreted as an error. In this paper, the RFID system employs the Cyclic Redundancy Check (CRC) as an error detection scheme. This paper presents a proposed Reliable and Cost Effective Anti-collision technique (RCEAT) or Radio Frequency Identification (RFID) Class 0 UHF tag. The RCEAT architecture consists of two main subsystems PreRCEAT and PostRCEAT. The proposed system is designed using Verilog HDL in FPGA SPARTAN 6 device, which has achieved a good validation. The system is simulated   using Modelsim and  synthesized using Xilinx Synthesis Technology.
      PubDate: 2014-11-14
      Issue No: Vol. 3 (2014)
       
  • Preserving Confidentiality through Public Auditing In Secure Cloud Storage

    • Authors: Gattabhi Ramarao Galidevara, RamaKrishna Mamidisetti
      Abstract: Now a day users no longer have physical presence of the outsourced data which makes the data security stronger. Moreover, users should be able to just use the cloud storage as if it is local, without worrying about the its integrity. Therefore several critical security challenges are occur and motivate the researchers for further investigations. Because of this critical issues users can resort to a third party auditor (TPA) to check the integrity of outsourced data. To securely introduce an effective TPA, the auditing process should bring in no new vulnerabilities towards user data privacy, and introduce no additional online burden to user. In this paper, we propose a secure cloud storage system supporting privacy-preserving public auditing. We further extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently. Extensive security and performance analysis show the proposed schemes are provably secure and highly efficient.
      PubDate: 2014-11-10
      Issue No: Vol. 3 (2014)
       
  • Personalized Mobile Search Engine

    • Authors: N Swathi, S Sagarika
      Abstract: We propose a personalized mobile search engine, PMSE, that captures the users’ preferences in the form of concepts by mining their click through data. Due to the importance of location information in mobile search, PMSE classifies these concepts into content concepts and location concepts. In addition, users’ locations (positioned by GPS) are used to supplement the location concepts in PMSE. The user preferences are organized in an ontology-based, multi-facet user profile, which are used to adapt a personalized ranking function for rank adaptation of future search results. To characterize the diversity of the concepts associated with a query and their relevances to the users need, four entropies are introduced to balance the weights between the content and location facets. Based on the client-server model, we also present a detailed architecture and design for implementation of PMSE. In our design, the client collects and stores locally the clickthrough data to protect privacy, whereas heavy tasks such as concept extraction, training and reranking are performed at the PMSE server. Moreover, we address the privacy issue by restricting the information in the user profile exposed to the PMSE server with two privacy parameters. We prototype PMSE on the Google Android platform. Experimental resultsshow that PMSE significantly improves the precision comparing to the baseline.
      PubDate: 2014-11-10
      Issue No: Vol. 3 (2014)
       
  • A Cryptographic Based Implementation Of Secure Hash Algorithm By Using
           Microblaze Processor

    • Authors: Balu Srinivas Jangareddi, G Sridevi
      Abstract: Hash function is simply an algorithm that takes a string of any length and reduces it to a unique fixed length string. Hash functions are used to ensure data and message integrity, password validity as well as the basis of many other cryptographic systems. Due to the tremendous developments within the wired and wireless communications, new algorithms and new security standards are developed. Among these hash algorithms are widely used. Performance in security applications can be improved by accelerating the algorithms in hardware. This encryption subsystem is implemented by an embedded processor combined with specific hardware. In this paper, SHA (Secure Hash Algorithm) application is presented. A Xilinx Spartan-3 FPGA is employed to implement MicroBlaze based embedded system.
      PubDate: 2014-11-10
      Issue No: Vol. 3 (2014)
       
  • High Efficiency and Less Pollutant Power Plants Using Biomass Mixed with
           Municipal Solid Waste and coal Dust

    • Authors: A Raju, S. Madhu
      Abstract: This paper deals with the new component of fuel which is used to generate the power with higher efficiency and lesser pollutants. The new component is the mixture of biomass (husk) and MSW and coal dust in the ratio of 60:40(40% is the mixture of coal dust and MSW).This paper will also discuss about which is the better component of fuel. With the advancement in technology the power consumption is rising steadily. This necessitates that in addition to the existing source of power such as coal, water, petroleum etc. other sources of energy should be searched out and new and more efficient ways of producing energy should be devised. Power generation from biomass and MSW (municipal solid waste) becomes attractive way for energy generation due to their high energy potential and less pollutants. Present work deals with the determination of proximate analysis of different components, such as wood, leaf and nascent branch and energy content of different components ofpaddy husk hypogea (local name-peanut, ground nut) shells are for the biomass and Municipal solid waste (MSW) refers to the stream of garbage collected through community sanitation services. Medical wastes from hospitals and items that can be recycled are generally excluded from MSW used to generate electricity. These biomass components separately mixed with coal dust and MSW in different-different ratio and also their proximate analysis has done and their energy values are determined to find out the best suitable mixture for power generation. Estimation has been made for power generation potential of these biomass species and MSW and coal dust mixed for a small thermal power plant on decentralized basis. As it is evident from result that both the biomass species has less ash content and high volatile matter when mixes with MSW in the ratio of 60:40. In the 60:40 ratios the major component of biomass is the paddy husk and remain part of fuel is MSW and coal dust, due to that when it mixes with coal, the calorific value of mixture increase as the quantity of paddy husk biomass increases in the mixture of coal-biomass.
      PubDate: 2014-11-08
      Issue No: Vol. 3 (2014)
       
  • An Fpga Implementation Of N/N+1 Prescaler For A Low Power Single Phase
           Clock Distribution System

    • Authors: V Satya Deepthi, Sneha Suprakash, USBK MahaLakshmi
      Abstract: In the VLSI design clock distribution in an IC is very important as it deals with 70% of the power consumption. This paper deals with the design of prescaler to reduce the power consumption by the clock. A prescaler is used to reduce a high frequency electrical signal to a low frequency by integer division. Demand for low power circuits increased in conjunction with a higher level of integration. A multiband flexible divider is used to reduce the power consumption. The proposed design consists of a wideband multimodulous prescaler which divides the input frequency. Two flip-flops and different logic gates are embedded between the flip-flops to achieve two ratios and also to reduce the switching power and short circuit power in the prescaler. Prescalers are typically used at very high frequency to extend the upper frequency range of frequency counters, phase locked loop (PLL) synthesizers, and other counting circuits. The design doesn’t require any extra flip-flop, thus saving a considerable amount of power. Reduction of power consumption and delay is very important for high speed low power applications. The proposed prescaler based approach reduces the area and power significantly. A 32/33 prescaler, 47/48 prescaler along with a multimodulous 32/33/47/48 prescaler which incorporates the proposed 2/3prescaler are designed and implemented. The proposed system can be simulated using Modelsim for logical verification, Xilinx ISE tool for synthesizing and the Verilog language is used.
      PubDate: 2014-11-07
      Issue No: Vol. 3 (2014)
       
  • Rxc Based Parity Sharing For Error Correction

    • Authors: Appari Charishma, CH Rajasekhar, J Ganga Ramesh
      Abstract: Single error correction (SEC) code are used to detect and correct single bit errors by using hamming code method.SEC code requires more parity check bits. Product code can be detect and correct the single bit error. Product has the memory overhead problem. In parity sharing reduces the memory overhead and memory access complexity. Parity sharing reduces the parity check bits. Error correction codes are commonly used to protect memories from soft errors, which change the logical value of memory cells without damaging the circuit. Error Correction Codes (ECC) are commonly used to protect memories and registers in electronic circuits. When ECCs are used, it is of interest that in addition to correcting a given number of errors, the code can also detect errors exceeding that number. Error correcting codes led to the Hamming Codes, perfect 1-error correcting codes, and the extended Hamming Codes, 1-error correcting and 2-error detecting codes. The proposed system design using HDL the simulated using model sim and sythesis using xilinx synthesis technology. This approach reduces the memory overhead at the expense of a more complex access procedure. In this letter, an alternative scheme based on the use of parity sharing is proposed and evaluated. The results show that the new approach reduces significantly the memory overhead and is also capable of correcting single bit errors.
      PubDate: 2014-11-07
      Issue No: Vol. 3 (2014)
       
  • Butterfly Design for RADIX-4K DIF FFT

    • Authors: V Venkata Lakshmi Dadala, CH Satya Naresh, R Anil Kumar
      Abstract: VLSI and Digital Signal Processing are the two emerging technologies in the present world. Design of high performance, low area and low power VLSI circuits are needed for the DSP applications. This paper is dealing with FFT which is one of the most used algorithms in digital signal processing.FFT based on radix-2, radix-4 and split radix are most widely used for practical applications due to their simple architecture. This paper presents the 16-point radix-4 FFT algorithm. In FFT algorithm radix-4 can be used for any number of parallel samples which is a power of two. Furthermore, both decimation in frequency (DIF) and decimation in time (DIT) decompositions can be used. In addition to this, the designs can achieve a very high throughput, which makes them suitable for the most demanding applications.
      PubDate: 2014-11-06
      Issue No: Vol. 3 (2014)
       
  • Text Clustering Using Cosine Similarity and Matrix Factorization

    • Authors: R Umamaheswari, KNVVSK Rajesh
      Abstract: Clustering is a useful technique that organizes a large quantity of unordered text documents into a small number of meaningful and coherent clusters, thereby providing a basis for intuitive and informative navigation and browsing mechanisms. Text-clustering is to divide a collection of text-documents into different categories so that documents in the same category describe the same topic such as classical music. Text Clustering efficiently groups documents with similar content into same cluster: Similarity between objects is measured within the use of similarity function. The hierarchical clustering schemes can be effectively used for processing large datasets. In this paper, it is proposed to use the hierarchical clustering technique entitled “sub leader algorithm” along with cosine similarity is to cluster the documents.
      PubDate: 2014-11-06
      Issue No: Vol. 3 (2014)
       
  • Data Possession Using Shipment Equilibrium Model And Mechanism on Multi
           cloud Environment

    • Authors: V Saibhanu, P Bhargava
      Abstract: Shipment equilibrium mechanism is the main building blocks for cloud computing applications which is based on the Map Reduce programming concept. Shipment equilibrium is essential for efficient operations in distributed environments. As Cloud Computing is growing rapidly and clients are demanding more services and better results, shipment equilibrium for the Cloud has become a very interesting and important research area. Many algorithms were suggested for assigning the client's requests to avail Cloud nodes. However, in a cloud computing environment, failure is the norm, and nodes may be upgraded, replaced, and added in the system. Files can also be dynamically created, deleted, and appended. This results in load imbalance, that is, the file chunks are not distributed as uniformly as possible in the nodes.
      PubDate: 2014-11-06
      Issue No: Vol. 3 (2014)
       
  • Technique to the Data Alignment for Accomplishing Accurate Annotation In
           Web Databases

    • Authors: P.Siva Satya Prasad, K. Ravi Kumar
      Abstract: Databases turn out to be web reachable all the way through HTML form-based search interfaces. The data units revisit from the essential database typically programmed into the result pages vigorously for human browsing. For the determined data units to be machine processable which is crucial for many applications such as deep web data collection and Internet comparison shopping. They require to be extorting out and allocate meaningful labels. In an automatic annotation approach that first line up the data units on a result page into various groups such that the data in the similar group have the same semantic. Then for each cluster we annotate it from different features and combined the different annotations to calculate a final annotation label for it. An annotation wrapper for the search site is automatically created and can be used to annotate new result pages from the identical web database.
      PubDate: 2014-11-03
      Issue No: Vol. 3 (2014)
       
  • Design of a System Providing Customizable Content-Based Message filtering
           for OSN’s

    • Authors: N. Alekya, D. Srinivas
      Abstract: For communication and sharing information, Online Social Networks (OSN’s) are being used by everyone is  to  give  users  the  capability  to organize  the  messages  posted  on  their  own  private  space  to  keep away from thesurplus content is displayed. OSNs provide petite support to this necessity up to now. To provide this we propose a system permiting OSN user to have a direct control on the messages posted on their walls.  This  is  proficient  through  a  flexible  rule-based  system  which allocate  users  to  customize  the  filtering  principle  to  be  applied  to  their  walls and  a  Machine  Learning  based  soft classifier which automatically produce membership labels in support of content-based filtering. Mostpopular interactive medium to communicate, share and distribute a considerable amount of human lifeinformation. Every dayand incessant communications entailthe swap of several types of content, including free text,image, audio, and video data.
      PubDate: 2014-11-03
      Issue No: Vol. 3 (2014)
       
  • Effective Load Balancing Technique And Memory Management In Cloud

    • Authors: Ramdevi A, M Jyothi
      Abstract: Cloud computing applications are developed using Map Reduce programming. Cloud computing distributed file system  nodes perform functionality like   computing as well as storage in this   a file is partitioned into a number of chunks allocated in distinct nodes .based on that  Map Reduce tasks can be performed in parallel over the nodes. But in a cloud computing environment, failure is the common means nodes may be upgraded, replaced, and added in the system. Files can also be dynamically created, deleted, and appended. This results in load imbalance in a distributed file system; that is, the file chunks are not distributed as uniformly among the nodes. In this project, introducing distributed load rebalancing algorithm which eliminated load imbalance problem and proposing gossip protocol which maintains dynamic resource management for large scale cloud. It dynamically maximizing the cloud utility under CPU and memory constraints.
      PubDate: 2014-11-03
      Issue No: Vol. 3 (2014)
       
  • LOAD Balancer Strategy Based On Cloud Computing

    • Authors: Radha Krishna Palivela, Chandra Sekhar Reddy
      Abstract: At present cloud computing is one of the utmost platform which delivers storage of data in very lower cost and accessible for all time over the internet. But it has more serious issue like security, load management and fault tolerance. Load balancing in the cloud computing environment has a significant influence on the presentation. Good load balancing makes cloud computing more proficient and increases user satisfaction. This article announces an improved load balance model for the public cloud centered on the cloud segregating concept with a switch mechanism to select different approaches for different circumstances. The algorithm relates the game theory to the load balancing approach to increase the proficiency in the public cloud environment.  
      PubDate: 2014-11-03
      Issue No: Vol. 3 (2014)
       
  • Storage Correctness Verification and Data Regaining In Cloud

    • Authors: G.Parimala Divya, Ramu vikruthi
      Abstract: Users no longer hold physical possession of the outsourced data makes the data integrity protection in cloud computing a formidable task particularly for users with constrained computing resources. Moreover users should be capable to use the cloud storage as if it is local without perturbing about the need to validate its integrity. Consequently enabling public audit ability for cloud storage is of vital importance so that users can way out to a third-party auditor (TPA) to ensure the integrity of outsourced data and be worry free. To securely initiate an effectual TPA, the auditing process should carry in no new vulnerabilities toward user data privacy and bring in no extra online burden to user. Widespread protection and performance analysis show the proposed schemes are provably secure and highly efficient. For data recovery proposing Data regaining algorithm which recovers users data lost by the cloud server.
      PubDate: 2014-11-03
      Issue No: Vol. 3 (2014)
       
  • New Key Management Protocol for WMN’s And Ad Hoc Networks

    • Authors: V.S.V. Deepak, B. Veerendra, B. Lakshmanarao
      Abstract: A foremost challenge in developing systems is to overcome the difficulties of the theoretically incomplete communication from the group to the sender, the unattainability of a completely trusted key generation center and the dynamics of the sender. The prevailing key management patterns cannot deal with these challenges efficiently. The new pattern is a hybrid of traditional transmission encryption and group key agreement. Later the public group encryption key is extracted both the calculation overhead and the communication cost are autonomous of the group size. Also the preparation enables simple yet effective member deletion, addition and malleable strategies. Its durable security against collusion, its continuous overhead and its application approachability without relying on a fully trusted authority reduce our protocol a very favorable solution to many applications.
      PubDate: 2014-11-03
      Issue No: Vol. 3 (2014)
       
  • Effective RCube algorithm for deriving relevant information on the web

    • Authors: R Lalitha, T Rajendra Prasad
      Abstract: The analysis of user search goals can be very useful in improving search engine relevance and user experience. A novel   approach to infer user search goals by examines search engine query logs. A framework to determine different user search goals for a query by clustering the projected feedback sessions. Feedback sessions are constructed from user click-through logs and can professionally reflect the information needs of users. A novel   approach to produce   pseudo-documents to better represent the feedback sessions for clustering. A new criterion “Classified Average Precision (CAP)” to estimate the performance of inferring user search goals. 
      PubDate: 2014-11-03
      Issue No: Vol. 3 (2014)
       
  • HFRECCA : A New Sentence Clustering Technique For Text Mining

    • Authors: P Siva Rama krishna, P Srikanth
      Abstract: Clustering is the process of grouping or aggregating of data items. Sentence clustering mainly used in variety of applications such as classify and categorization of documents, automatic summary generation, organizing the documents, etc. In text processing, sentence clustering plays a vital role this is used in text mining activities. Size of the clusters may change from one cluster to another. The traditional clustering algorithms have some problems in clustering the input dataset. The problems such as, instability of clusters, complexity and sensitivity. To overcome the drawbacks of these clustering algorithms, this paper proposes a algorithm called Hierarchical Fuzzy Relational Eigenvector Centrality-based Clustering Algorithm (HFRECCA) is extension of FRECCA which is used for the clustering of sentences. Contents present in text documents contain hierarchical structure and there are many terms present in the documents which are related to more than one theme hence HFRECCA will be useful algorithm for natural language documents.
      PubDate: 2014-11-03
      Issue No: Vol. 3 (2014)
       
  • Network Processing Of Pt-Topk Queries Using Necessary Set Based
           Algorithmin Wsn’s

    • Authors: P Vinuthna, T SaiDurga
      Abstract: A wireless sensor Network consists of spatially dispersed self-directed sensors to monitor the environment conditions. This work supports in-network top-k query process over uncertain data in a distributed wireless sensor network. We develop the notion of necessary Set for efficient in-network pruning of uncertain data in a distributed setting. Based on the   necessary sets, we propose, necessary set-based, algorithm for in-network processing of PT-Topk queries in a two-tier hierarchical sensor network. For providing privacy proposing locked Q protocol that that prevents attackers from gaining information from both sensor collected data and sink issued queries.
      PubDate: 2014-11-03
      Issue No: Vol. 3 (2014)
       
  • Aida : Minimizing Communication Overhead And Enhance Privacy Of Shared
           Data

    • Authors: G Govardhani, D Srinivas
      Abstract: An algorithm for anonymous sharing of private data among parties is developed. Top-down refinement masks a given table to satisfy broad range of anonymity requirements without sacrificing significantly the usefulness to classification .This assignment is anonymous in that the identities received are unknown to the other members of the group. Top-down Refinement is much more efficient than previously reported approaches, particularly the secure sum algorithm.
      PubDate: 2014-11-03
      Issue No: Vol. 3 (2014)
       
  • Providing High Security For Wsn’s Using Distributed Hash Table (Dht)

    • Authors: V Sarah Grace, Ramu Vikruthi
      Abstract: There have been two novel node clone detection protocols with diverse tradeoffs on network circumstances and performance. The first one is based on a distributed hash table (DHT) by which a completely decentralized, key-based caching and checking system is constructed to catch cloned nodes efficiently. The protocol presentation on competent storage consumption and elevated security level is theoretically deducted through a probability model and the resultant equations with essential adjustments for real application are supported by the simulations. The second distributed detection protocol named randomly directed exploration presents good communication performance for dense sensor networks by a probabilistic bound for forwarding method along with random initial direction and border determination. The simulation results support the protocol aim and show its effectiveness on communication overhead and satisfactory detection probability.
      PubDate: 2014-11-03
      Issue No: Vol. 3 (2014)
       
  • Novel Resource Allocation Algorithm For Cloud System That Supports
           Vm-Multiplexing Technology

    • Authors: P hema venkataramana, Beebi Sufia Sheik
      Abstract: Formulation of a deadline-driven resource allocation problem based on the cloud environment assist with VM resource isolation technology and also suggests a novel solution with polynomial time which could minimize user’s payment in terms of their predictable deadlines. By studying the upper bound of task execution length based on the probably imprecise workload prediction. We further recommend an error-tolerant method to assurance task’s conclusion within its limit. We authenticate its efficiency over a real VM-facilitated cluster environment under special levels of competition. By alteration algorithmic input deadline based on our derived bound, task completion length can at all times be incomplete within its deadline in the sufficient-supply situation. The mean execution length still keeps 70 percent as high as user specified deadline under the severe competition.
      PubDate: 2014-11-03
      Issue No: Vol. 3 (2014)
       
  • Clustering For Nonsentence Data Sets Using Hfrecca (Hieraricalfuzzy
           Generic Clustering Algorithm)

    • Authors: k Anusha, A K Mahalakshmi
      Abstract: Clustering is the process of grouping or aggregating of data items. Sentence clustering mainly used in variety of applications such as classify and categorization of documents, automatic summary generation, organizing the documents, etc. In text processing, sentence clustering plays a vital role this is used in text mining activities. Size of the clusters may change from one cluster to another. The traditional clustering algorithms have some problems in clustering the input dataset. The problems such as, instability of clusters, complexity and sensitivity. To overcome the drawbacks of these clustering algorithms, this paper proposes a algorithm called Hierarchical Fuzzy Relational Eigenvector Centrality-based Clustering Algorithm (HFRECCA) is extension of FRECCA which is used for the clustering of sentences. Contents present in text documents contain hierarchical structure and there are many terms present in the documents which are related to more than one theme hence HFRECCA will be useful algorithm for natural language documents.
      PubDate: 2014-11-03
      Issue No: Vol. 3 (2014)
       
  • Cluster based shifting technique for arrange data units into different
           groups in web databases

    • Authors: Puppala satyavathi, N Venkata Ramana
      Abstract: The techniques of a clustering based shifting method make use of more affluent yet automatically obtainable features. This method is capable of handling a variety of relationships between HTML text nodes and data units, including one-to-one, one-to-many, many-to-one, and one-to-nothing. For the preset data units to be appliance process capable which is necessary for many applications such as deep web data collection and Internet comparison shopping. They need to be taking out and assign meaningful labels. We present an mechanical annotation approach that first supports the data units on a result page into different groups such that the data in the same group have the same semantic. Then for each group we explain it from different aspects and aggregate the different annotations to calculate a final annotation label for it. An annotation covering for the search site is automatically constructed and can be used to annotate new result pages from the same web database. 
      PubDate: 2014-11-03
      Issue No: Vol. 3 (2014)
       
  • Effective Keyword Search on XML data- Using FMADM

    • Authors: Voora V V Eswari Lakshmi Devi, V. Bala Sankar
      Abstract: Efficient state of the art query retrieval systems are implemented over RDBMS databases but not for XML based storages. Fuzzy type-ahead search, though not a new concept for RDBMS based systems, it is a new information-access paradigm for XML based systems. Operations involving the system searching the XML repositories on the fly as the user types in query keywords for producing results. Faster querying and results generation is the vital aspect of using XML storages. Prior systems used LCA-based (Lowest Common Ancestors) algorithms for implementing Fuzzy type- ahead search search and Minimal-Cost Tree based techniques for relevant results over xml data. Minimal Cost Tree approaches are efficient as long as the query keywords are singular or dual utmost. As the number of attributes in the keyword for fuzzy query increases Minimal-Cost Tree construction is a expensive process. So we propose to use Fuzzy Multiple Attribute Decision Making (FMADM) algorithm involving data conflict resolution based on subjective and objective weighting methods. Based on the FMADM algorithm we intend to support multi attribute based queries over xml data with reduced computations. A practical implementation of the proposed system validates our claim.
      PubDate: 2014-11-03
      Issue No: Vol. 3 (2014)
       
  • Secure Transmission and Minimizing Communication Over Head In Cooperative
           Group

    • Authors: S.Devi Parvathi, Ardhani Siva Sravanthi
      Abstract: A mobile ad-hoc network is a self-configuring infrastructure less network of mobile devices connected by wireless. Here the problem is efficiently and securely broadcasting to cooperative groups and trusted key generation center is not fully available.To overcome this problem, reduce number of broadcasts and Communication overhead proposing a new key management technique,sender based algorithm,we present a completely distributed, load adaptive, multi-path routing protocol. For every source-destination pair, the protocol adaptively equalizes mean delays along all utilized routes, and avoids using any paths with greater or equal mean delay.
      PubDate: 2014-11-03
      Issue No: Vol. 3 (2014)
       
  • Ensuring Data Storage Security in a Cloud Computing Using
           ‘MONA’

    • Authors: G.A.K.S.Rajeev Kumar, B.Lakshmana Rao
      Abstract: Due to the frequent change of the membership, sharing data in a multi-owner manner is a major problem in cloud computing. Identity privacy and Privacy preserving from an entrusted cloud is still a challenging issue. By Leveraging Group Signature and Dynamic Broadcast encryption techniques, any cloud user in one group can anonymously share data with other group members. The main aim is to secure data sharing in dynamic groups, there is no fixed attributes whereas multi-owner attributes is possible. Meanwhile, the storage overhead and encryption computation cost of the scheme are independent with the number of revoked users.
      PubDate: 2014-11-03
      Issue No: Vol. 3 (2014)
       
  • DHT - Reducing Energy Cost and Identifying Duplicate Nodes in Wireless
           Sensor Networks

    • Authors: V.Surya Lakshmi Kantham, G.Kalyan Chakravarthy
      Abstract: Wireless sensor networks is a collection of sensor nodes scattered over an area for data collection. But the main problem is the danger of the node clone,which arises due to the low-cost, resource-constrained, distributed sensor nodes. To identify node clone, distributed hash table (DHT) is proposed  which a fully decentralized, key-based caching and checking system.This distributed detection protocol provides good communication performance for large  sensor networks. Sensor-MAC, a new MAC protocol is explicitly designed for wireless sensor networks for reducing energy consumption and detecting the node clone. This protocol also has good scalability and collision avoidance capability.
      PubDate: 2014-11-03
      Issue No: Vol. 3 (2014)
       
  • An application of customizable content-based filtering for unwanted
           messages on OSN walls

    • Authors: Jagannadha Rao Neelam, U. Chandra Sekhar Reddy
      Abstract: The attempt of the present work is consequently to propose and experimentally estimate an automated system called Filtered Wall (FW) which is capable to filter unwanted messages from OSN user walls. We develop Machine Learning (ML) text categorization techniques to automatically allocate with each short text message a set of categories based on its content. One essential issue in today’s Online Social Networks (OSNs) is to give users the facility to control the messages posted on their own private space to avoid that unwanted content is displayed. Up to now OSNs afford little support to this requirement. To fill the gap we propose a system allowing OSN users to have a direct organize on the messages posted on their walls. This is achieved through a flexible rule-based system that let users to adapt the filtering criterion to be applied to their walls and a Machine Learning-based soft classifier automatically labelling messages in support of content-based filtering. The main efforts in building a healthy short text classifier (STC) are concentrated in the taking out and selection of a set of characterizing and distinguish features. Another new technique machine learning text categorization techniques   to automatically assign with each short text message a set of categories based on its content.
      PubDate: 2014-11-03
      Issue No: Vol. 3 (2014)
       
  • Design of The CAN Bus Booster Pack and The Implementation of The CAN
           Protocol on the TIVA C Launch pad Evaluation Board

    • Authors: G. Sri Saiteja, Mr.K.N.V. Khasim
      Abstract: This paperis about the practical design of a CAN Bus Boosterpack and the implementation of the CAN protocol on the TIVA C Launchpad evaluation board. The boosterpack board contains a CAN transceiver that can make communication between applications possible via the CAN controller module, present in the TIVA C Launchpad. The CAN booster pack will be designed around an MSP 2551 CAN transceiver that will be connected through the CAN TX and CAN RX signals of the CAN module on the launchpad. The transceiver will connect the CAN bus between applications and the CAN controller module on the launchpad. The Boosterpack board is designed using the Cadsoft Eagle and the programming of the board is done in the Code Composer Studio (CCStudio) v5.5, and using Tivaware v2.1.
      PubDate: 2014-11-03
      Issue No: Vol. 3 (2014)
       
  • Real Time Vehicle Tracking System Using GPS and GPRS

    • Authors: S. Sahitya, N. Swetha
      Abstract: In this paper web based GPS-GPRS vehicle tracking system was designed and implemented. The current position of the vehicle was acquired by GPS device which is integrated to the target vehicle and the location coordinates are sent through GPRS service provided by the GSM network.  The GPS receiver is used to give latitude and longitude of the current location . The proposed system is built using the microcontroller. This is the heart of the device. This GPS receiver is interfaced with microcontroller through the serial port and used to obtain the current location. The GPS receiver acquires the present position of the location and sends the same acquired values to GPRS through another com port, to display the exact location on Google map.
      PubDate: 2014-11-03
      Issue No: Vol. 3 (2014)
       
  • Survey, Classification and Future Direction for Packet Scheduling in 4G
           Networks to Provide Quality of Service

    • Authors: Vishalakshi Prabhu, G.S. Nagaraja
      Abstract: Packet scheduling is crucial in providing Quality of Service (QoS) at a network node. There is plenty of research related to QoS provisioning in fourth generation (4G) networks because wireless networks have shifted from voice-centric networks to an efficient and flexible data networks. 4G mobile networks are already providing seamless personal mobile communication and QoS guarantee to IP‐based multimedia services. This paper gives a survey and classification of some of the well known scheduling algorithms proposed for 4G systems to achieve “Quality of Service”. Classification is done along three different dimensions which are independent of one another and need not be mutually exclusive. Finally, this paper presents outcomes of survey which includes significant observations, limitations of existing scheduling algorithms and scope for further improvement in achieving QoS in 4G networks.
      PubDate: 2014-11-03
      Issue No: Vol. 3 (2014)
       
  • Design of Low Power FPGA using Autonomous Power Gating and LEDR Encoding

    • Authors: Sandhya Rani P, Venkata Satish. N
      Abstract: The most important key challenge in the IC scaling era is to deliver high performance solutions in the process of minimizing power, area and cost. The main objective of this paper is to reduce power consumption by considering power optimization techniques using Low Power FPGA design. Due to the dynamic properties of power consumptions this paper focuses on some of the power gating techniques that is standby power and dynamic power can be reduced by LEDR (LEVEL ENCODING DUAL RAIL) Encoding. The proposed autonomous fine grain power gating method consists of LUTs. Each LUT has its own sleep transistor & sleep controller. So when any one of LUTs are inactive, they can be set to sleep mode immediately. Another proposed method is LEDR encoding is used to data flow at I/P and O/P of FPGAs. Hence power reduction is achieved by selectively setting the functional units into a low leakage mode when they are inactive.
      PubDate: 2014-11-02
      Issue No: Vol. 3 (2014)
       
  • Predictive Collective Behavior in Social Media Network Using Edge Centric
           Clustering

    • Authors: Morukurthi Sreenivasu, A.Atchyuta Rao, Rakesh Nayak
      Abstract: Aggregate Performance is study of behavior of a person who’s registered in a social network. More number of individuals are connection each other in this networks. The media is facing a major problem for finding the individual behavior prediction. Because of so many people have similar behaviors present in the network; the study of their behavior is so called social learning. Problems rising during social learning because of more scalability. We introduced a new framework which simplifies the study of social learning and handles large amount of data in the social media. In this we   used   efficient   classification   methodologies   and   new features of dividing the social media such as centric based clustering.
      PubDate: 2014-10-31
      Issue No: Vol. 3 (2014)
       
  • NTRU Algorithm Encryption and Decryption Using Huffman Coding

    • Authors: Sivaneni Devi, A.Atchyuta Rao
      Abstract: Sending and receiving secure information over public network has become a challenging task in recent days. DES and AES are used in Government and public domains but still more development is required in this area. In this work Asymmetric key encryption has been proposed, where one key is used to send a message to R is made public and R uses his own private key to decrypt the encrypted message. In recent days NTRU has got more popularity because of its simplicity and security. NTRU Labs have proposed a scheme for secure transmission using ring of truncated polynomials in Zq(x) / (xn -1). We have proved in this paper that a pre-processing the data to be transmitted greatly decreases the time of transmission using Huffman Coding. We have used a matrix version of NTRU Cryptosystems.
      PubDate: 2014-10-31
      Issue No: Vol. 3 (2014)
       
  • Comparison of EEA3 and EEA1 Algorithms in Terms of Encryption Time and
           Throughput

    • Authors: Shri Ramtej Kondamuri
      Abstract: EEA3 (Evolved Packet System Encryption Algorithm 3) and EEA1 (Evolved Packet System Encryption Algorithm 1) are confidentiality algorithms that are used to en/decrypt blocks of data. In this paper we present the encryption results of EEA3 and EEA1 algorithms obtained by using C language. Then they are compared with respect to their encryption times and throughput.
      PubDate: 2014-10-30
      Issue No: Vol. 3 (2014)
       
  • Identifying the top demanding technology trends in the field of software
           engineering

    • Authors: Shikha Anirban
      Abstract: The rapid advancement of technology makes it difficult to choose the right domain for a software developer that will continue to exist in future. New inventions are replacing old technologies every day. Software companies and peoples are struggling hard to learn about every new thing. But their effort is going in vain because of their lack of knowledge about the future market trends. In this paper, I tried to identify and review the top demanding technology trends of software engineering that will control the future software market.
      PubDate: 2014-10-29
      Issue No: Vol. 3 (2014)
       
  • Mobile Cloud Computing: A Emerging Technology, Its Advantages and Issues

    • Authors: Rushi Anil Phutane, Tushar Rane, S. T. Patil
      Abstract: In spite of great advances in the mobile devices as a computing platform, applications is still very limited due to the poor computing capability of mobile devices and limited battery life. In order to overcome these obstacles compute intensive task are offloaded to the cloud to accelerate the computation on the mobile devices and thus improve the performance of application and extend the battery life of Smartphone.
      PubDate: 2014-10-29
      Issue No: Vol. 3 (2014)
       
  • Analyzing Feedback Patterns Using Data Mining Technique

    • Authors: Shaunak Jitendra Chheda
      Abstract: This paper presents a data mining technique that can be used to study which courses a student will more likely be interested in, during his graduation. The raw data was collected from feedback forms of an institution offering various courses. We processed the raw data available and performed t-weight calculations to present useful results.
      PubDate: 2014-10-29
      Issue No: Vol. 3 (2014)
       
  • An optimal output feedback controller design method for the LFC of a
           realistic power system with Multi source power generation

    • Authors: Srinivasulu G, Rama Krishna Vagga, Suvarna Kumari D
      Abstract: In this paper an optimal output feedback controller design method is proposed for the Load Frequency Control (LFC) of a realistic power system. The performance of the proposed controller is demonstrated on the multi-source power system and its dynamic responses are compared with full state feedback controller. Appropriate generation rate constraints (GRCs) are considered for the thermal and hydro plants. In practice, access to all the state variables of a system is not possible and also their measurement is costly and difficult. Usually only a reduced number of state variables or linear combinations thereof, are available. To resolve this difficulty, optimal output feedback controller which uses only the output state variables is proposed. The performances of the proposed controller are compared with the full state feedback controller. The action of this proposed controller provides satisfactory balance between frequency overshoot and transient oscillations with zero steady state error in the multi-source power system environment. The effect of regulation parameter (R) on the frequency deviation response is examined. The sensitivity analysis reveals that the proposed controller is quite robust and optimum controller gains once set for nominal condition need not to be changed for ±25% variations in the system parameters and operating load condition from their nominal values
      PubDate: 2014-10-29
      Issue No: Vol. 3 (2014)
       
  • Optimum Loss allocation in Radial Distribution Systems

    • Authors: Vinod Kumar Y, Shajida Shaik, Jan Bhasha SK
      Abstract: In this paper, the proposed method has the advantage that no assumptions are made in the allocation of real power losses as opposed other algorithms available in the literature. A detailed comparison of the real loss allocation obtained with the proposed ‘Exact method’with two alternative algorithms, namely, pro rata (PR), and quadratic loss allocation schemes are presented. Pro rata procedure is based on the load demand of each consumer, quadratic allocations are based on identifying the real and reactive parts of current in each branch and the losses are allocated to each consumer, and the proposed ‘exact method’ is based on the actual contribution of real power loss by each consumer. A case study based on 30 node distribution system is provided.
      PubDate: 2014-10-29
      Issue No: Vol. 3 (2014)
       
  • Power Management Strategy In Hybrid PV-FC And Wind- Power Generation
           Systems By Using Multi Input Single-Control (MISC) Battery

    • Authors: Pavani Yadav Gonti, S.Siva Prasad
      Abstract: Global energy consumption is dramatically increasing due to higher standard of living and the increasing world population. The world has limited fossil and oil resources. As a consequence, the need for renewable energy sources becomes more urgent. With the fast development of renewable energy technology, it proposes increasing demand for the higher education. This paper proposes a unique standalone hybrid power generation system, applying advanced power control techniques, fed by four power sources: wind power, solar power, Fuel cell, and diesel engine generator, and which is controlled by Multi input Single-Control (MISC) Battery used for commercial power system. As per the characteristic of the source, the proposed converter works under various operating modes which are discussed in this paper. The concept is validated using a laboratory prototype for different operating scenarios with a solar panel as a master source working under MPPT.
      PubDate: 2014-10-27
      Issue No: Vol. 3 (2014)
       
  • Enhancement of Power Quality in Distribution line by Using Distributed
           Power-Flow Controller (DPFC)

    • Authors: P. Jithendar, Giri Babu, S.Siva Prasad
      Abstract: This paper describes the steady-state response and control of power in transmission line equipped with FACTS devices. Detailed simulations are carried out on two-machine systems to illustrate the control features of these devices and their influence to increase power transfer capability and improve system reliability. The DPFC is derived from the unified power-flow controller (UPFC) and DPFC has the same control capability as the UPFC. The DPFC can be considered as a UPFC with an eliminated common dc link. The active power exchange between the shunt and series converters, which is through the common dc link in the UPFC, is now through the transmission lines at the third-harmonic frequency. The interaction between the DPFC, the network and the machines are analyzed.
      PubDate: 2014-10-27
      Issue No: Vol. 3 (2014)
       
  • Enhancement Of Power Quality Under Different Fault Condictions And
           Harmonic Elimination By Using D-Statcom

    • Authors: D. Lakshmi, S Siva Prasad
      Abstract: this paper mainly focuses on power quality with D-STATCOM Due to the non-standard voltage, frequency, and current at distribution side. In this paper the role of D-STATCOM (Distribution Static Compensator) are located at load side in electrical distribution system under normal operating and fault conditions is examine. Here D-STATCOM is used as a FACTS device which can compensate the reactive power. D-STATCOM is a voltage source converter; it can be used to compensate the voltage and make the system stable by compelling and generating reactive power. Here by using D-STATCOM to compensate the problems in distribution system such as voltage sag, voltage instability, in power systems with different fault conditions for LG, LLG, 3-hase, LCL filter The D-STATCOM injects a current into the system to mitigate the voltage sags. LCL Passive Filter was then added to D-STATCOM to improve harmonic distortion and low power factor in power faults. Here Simulink model and control system is designed in MATLAB/SIMULINK.
      PubDate: 2014-10-27
      Issue No: Vol. 3 (2014)
       
  • Enhancement of Power Quality in Multi Feeders by using MC-DPFC

    • Authors: B. Manaswini, S. Vathsal, S. Siva Prasad
      Abstract: According to growth of electricity demand and the increased number of non-linear loads in power grids, providing a high quality electrical power should be considered. In this paper, voltage sag and swell of the power quality issues are studied and distributed power flow controller (DPFC) is used to mitigate the voltage deviation and improve power quality. The DPFC is a new FACTS device, which its structure is similar to unified power flow controller (UPFC). In spite of UPFC, in DPFC the common dc-link between the shunt and series converters is eliminated and three-phase series converter is divided to several single-phase series distributed converters through the line. The case study contains a DPFC sited in a single-machine infinite bus power system including two parallel transmission lines, which simulated in MATLAB/Simulink environment. The presented simulation results validate the DPFC ability to improve the power quality.
      PubDate: 2014-10-27
      Issue No: Vol. 3 (2014)
       
  • Z-source Inverter based DVR for Power Quality Improvement

    • Authors: Goruganti Sravanidevi, S. Siva Prasad
      Abstract: Interest  in Power  Quality  has  been explicitly seen in Electrical Power Engineering since past decade, even though utilities all over the world have for decades worked on the improvement  of  voltage quality,  what  is now  known as  power  quality.  Typical power problems include voltage sag, harmonics, notching, transients like surge, swell, etc.  Control of power quality problems involves cooperation between network operator (utility), customer and equipment manufacturer.  A Dynamic Voltage Restorer (DVR) is a distribution voltage DC-to-AC solid-state switching converter that injects three single phase AC output voltages in series with the distribution feeder and in synchronism with the voltages of the distribution system. A DVR is interface equipment between utility and customer connected in series between the supply and load to mitigate the three major power quality problems, namely, the voltage sags, swells, and interruptions.  The equations are formulated for calculating the voltages and power injected (inverter rating) from each of the three DVR phases (3-phase DVR). The modeling of Z-source based dynamic voltage restorer is carried out component wise and their performances are analyzed using MATLAB software.
      PubDate: 2014-10-27
      Issue No: Vol. 3 (2014)
       
  • Switched Boost Inverter for Standalone DC Nanogrid Applications

    • Authors: S. Venkatesh, S. Vathsal, S. Siva Prasad
      Abstract: Switched boost inverter (SBI) is a single-stage power converter derived from Inverse Watkins Johnson topology. Unlike the traditional buck-type voltage source inverter (VSI), the SBI can produce an ac output voltage that is either greater or less than the available dc input voltage. Also, the SBI exhibits better electromagnetic interference noise immunity when compared to the VSI, which enables compact design of the power converter. Another advantage of SBI is that it can supply both dc and ac loads simultaneously from a single dc input. These features make the SBI suitable for dc nanogrid applications. In this paper, the SBI is proposed as a power electronic interface in dc nanogrid. The structure and advantages of the proposed SBI-based nanogrid are discussed in detail. This paper also presents a dq synchronous-reference-frame-based controller for SBI, which regulates both dc and ac bus voltages of the nanogrid to their respective reference values under steady state as well as under dynamic load variation in the nanogrid.
      PubDate: 2014-10-27
      Issue No: Vol. 3 (2014)
       
 
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
 
About JournalTOCs
API
Help
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-2014