JCT - Volume 3 Issue 12 (December 2014)


Sr/No/ Title Pdf
1 Study of Concepts and Technology of Various Flexible AC Transmission Systems for Enhancing System Performance
Ms. Shweta Chourasia, Ms Ritu K.R, Prof.Leena Raikwar

Abstract-A major portion of the energy needs of a modern society is supplied in the form of electrical energy therefore the industrial revolution man's demand for and consumption of energy has increased steadily. Industrially developed societies need an ever-increasing supply of electrical power and the demand on the North American continent has been doubling every ten years. Now, more advanced technology is used for reliable and operation of transmission and distribution in power system. To achieve both reliable and benefit economically, it has become clearer that more efficient utilization and control of the existing transmission system infrastructure is required. In this paper we discuss about device and their types which are use to improved utilization of the existing power system. Improvement is provided by the application of advanced control technologies. Power electronics has developed the flexible AC transmission system (FACTS) devices. FACTS devices are effective and capable of increasing the power transfer capability of a line and support the power system to work with comfortable margins of stability. Also cover the advantages of different fact devices and their applications.

2 Comparative Analysis of PRAM-NUMA model and Extended PRAM-NUMA model

Abstract— This paper is concentrate on comparison of two model PRAM-NUMA and Extended PRAM-NUMA model. The Parallel Random Access Machine –Non uniform memory access (PRAM-NUMA) model of computation can be used to implement efficient emulated shared memory(ESM) computers for general purpose parallel applications. This model forces to use conditional and looping control primitives. An Extended PRAM-NUMA model of computation can be used to ignore the conditional and looping control primitives and this model is needed in case of dynamics system. The PRAM-NUMA model is used to solve the problem of Low “Thread-Level Parallelism (TLP)” problem. This model shows that integrating NUMA support to the PRAM implementation architecture can solve this paper. An Extended PRAM-NUMA is used compute the “Thick Control Flow (TCF)”. In this paper, programming of the extended model are also discuss with short example.

3 Power Optimization in One bit Full Adder Circuit
R.Suganya , K.S.Natiyaa

Abstract—The Full Adder circuit is an important component in application such as Digital Signal Processing (DSP) architecture, microprocessor, microcontroller and data processing units. This paper discusses the evolution of full adder circuits in terms of lesser power consumption and higher speed. Starting with the most conventional 28 transistors full adder and then gradually studied different types of full adders.This paper has also included some of the most popular full adder cells like Transmission gate full adder, pass transistor full adder, Static Energy Recovery Full Adder (SERF), Adder9B, GDI based full adder and Self resetting logic(SRL) with GDI full adder. The simulations have been carried out by Tanner EDA tools on 250nm technology.

4 Regression Diagnosis for the Yield estimation in Agriculture
P.Lavanya Kumari

Abstract— Nowadays, technology in precision agriculture produces volumes of data which leads to a data mining that must be solved using appropriate Statistical techniques for valid conclusions. Most of the researchers can able to select the appropriate statistical tools to address the hypothesis under study. Due to moderate knowledge on the philosophy of select statistical techniques they could not use that perfectly. Considerable gains and therefore economic advantages can be achieved by processing the data with fullfledged statistical analysis. One of the tasks that remain to be solved is yield prediction based on physiological parameters (independent variables) of the plant using Multiple Linear Regression (MLR) analysis. In some cases, multiple regression results may seem paradoxical. Even though the overall pvalue is very low, all of the individual p- values are high. This means that the model fits the data well, even though none of the independent variables is statistically significant in predicting the yield. This may be due to the high correlation between the independent variables called multicollinearity. The best solution is to understand the cause of multicollinearity and remove it. This paper helps in ways for identification and elimination of multicollinearity that could result in best-fit model. A recommendation for full-fledged process of regression diagnosis which estimates and eliminates the multicollinearity successfully to get optimal predictors is provided with the help of a case study.

5 A Novel Framework for Effective Video Streaming and Sharing Resources on a Cloud Environment
Tammineni Anil Kumar, H.Swapna Rekha

Abstract—The rapidly increasing power of personal mobile devices (smart phones, tablets, etc.) is providing much richer contents and social interactions to users on the move. This trend however is throttled by the limited battery lifetime of mobile devices and unstable wireless connectivity, making the highest possible quality of service experienced by mobile users not feasible. The recent cloud computing technology, with its rich resources to compensate for the limitations of mobile devices and connections, can potentially provide an ideal platform to support the desired mobile services. Tough challenges arise on how to effectively exploit cloud resources to facilitate mobile services, especially those with stringent interaction delay requirements. While demands on video traffic over mobile networks have been souring, the wireless link capacity cannot keep up with the traffic demand. The gap between the traffic demand and the link capacity, along with timevarying link conditions, results in poor service quality of video streaming over mobile networks such as long buffering time and intermittent disruptions., In this paper by leveraging the cloud computing technology, we propose a new mobile video streaming framework, dubbed AMES-Cloud, which has two main parts: AMoV (adaptive mobile video streaming) and ESoV (efficient social video sharing). AMoV and ESoV construct a private agent to provide video streaming services efficiently for each mobile user. For a given user, AMoV lets her private agent adaptively adjust her streaming flow with a scalable video coding technique based on the feedback of link quality. Likewise, ESoV monitors the social network interactions among mobile users, and their private agents try to prefetch video content in advance. Till now there was no proper device or mechanism to operate in this way in cloud domain, so this is the first time to propose such a new cloud framework for video streaming. By conducting various experiments on real time data sets we finally came to a conclusion that by doing this application we can able to reduce a lot of wastage of space in data base.

6 A Novel Dynamic Resource Allocation for Creating a New Web Site Partitions in Cloud Computing Environment
Ramesh Yajjala, Majji .Venkata Appala Naidu, Boyidi . Suri Babu

Abstract—A major feature of the cloud services is that users’ data are usually processed remotely in unknown machines that users do not own or operate. Cloud computing allows business customers to scale up and down their resource usage based on needs. Many of the touted gains in the cloud model come from resource multiplexing through virtualization technology. In this paper, we present a system that uses virtualization technology to allocate data center resources dynamically based on application demands and support green computing by optimizing the number of servers in use. Virtualization, in computing, refers to the act of creating a virtual (rather than actual) version of something, including but not limited to a virtual computer hardware platform, operating system (OS), storage device, or computer network resources. We introduce the concept of “skewness” to measure the unevenness in the multi-dimensional resource utilization of a server. By minimizing skewness, we can combine different types of workloads nicely and improve the overall utilization of server resources. We develop a set of heuristics that prevent overload in the system effectively while saving energy .By conducting various experiments and trace down simulations , we finally came to a conclusion that by doing this application we can able to reduce a lot of wastage of space in cloud server data base.

7 A novel protocol for web page Personalized recommendation Model by using frequent access Path algorithm
P.Revathi, G. Jyothi

Abstract—The emergence of personalized recommendation technology relieves us of infinite data and the commercialized world by saving us plentiful time and energy on searching information. But the recommendation results are not Satisfactory. In this case it is of vital significance to find new ways or to improve existing technology in order to uplift the quality of personalized recommender system. Here we focus on the frequent access path algorithm used in the recommender model which is very popular in web site recommender system then focus on the frequent access path algorithm used in the recommender model, point out the limitation in this algorithm and then improve it. Web logs record actions and behaviors of users. By mining and analyzing these logs we can find users browsing and access patterns, and this is very important and useful to the web site optimization and recommender Here in this paper we mainly target on the most recent user weblogs that are accessed for purchasing any item, so that if any user chooses any item which is already shopped or not shopped till that time, it is the ability of our application to give suggestions for the user to suggest the most recent product that was sold for more number of users. By conducting several experiments and simulations on this current web-personalization concept on various real time web sites, we finally came to an conclusion that this new frequent access path technique is most suited for users in choosing items pair wise in online more easier than compared with non frequent path identification websites.

8 An New Approach of Performing Computer Inspection on Data Files by Applying Several Clustering Algorithms
Prasada Rao Peeri, B.Shalini

Abstract—The goal of the inspection is to identify defects. In an inspection, a defect is any part of the work product that will keep an inspector from approving it. The process should have entry criteria that determine if the inspection process is ready to begin. This prevents unfinished work products from entering the inspection process. The entry criteria might be a checklist including items such as "The document has been spell-checked‖. Computer Inspection is a branch of information security which examines structured data with regard to a lot of files which are stored already in some parts of the system. The aim is to discover and analyse patterns of fraudulent activities. Data from application systems or from their underlying databases is referred to as structured data. Unstructured data in contrast is taken from communication and office applications or from mobile devices. This data has no overarching structure and analysis thereof means applying keywords or mapping communication patterns. Analysis of unstructured data is usually referred to as data inspection. In computer inspection analysis, hundreds of thousands of files are usually examined. Much of the data in those files consists of unstructured text, whose analysis by computer examiners is difficult to be performed. In this context, automated methods of analysis are of great interest. We present an approach that applies document clustering algorithms to computer data files analysis of all previously stored data in a remote location on a computer. We illustrate the proposed approach by carrying out extensive experimentation with three well-known clustering algorithms (K-means, K-medoids, Single Link, Complete Link, Average Link, and Cosine Similarity Measure) applied on some of the text documents of having different categories like games, sports, living beings, animals, food items, books and so on. In addition, two relative validity indexes were used to automatically estimate the number of clusters. Related studies in the literature are significantly more limited than our study. Our experiments show that the proposed architecture is best suited for forensic analysis of unstructured documents.

9 Technology Development Towards Robust Speech Recognition: A Review
Kapang Legoh, Utpal Bhattacharjee, T. Tuithung

Abstract—In this paper, we reviewed major technological developments during last few decades and the trend towards development of robust Automatic Speech Recognition (ASR) system. Our attempt is to provide a technological perspective to the progress that has been made in the field of automatic speech recognition. It has been the dream of researchers to develop a machine that recognizes speech like human under different adverse environments and understands natural language but reality is that the performance of the system drastically degrades due to adverse conditions like ambient noise, channel and device distortions, speaker variability, session variability, articulation effects etc. Performance of ASR system also falls when the system is trained and tested in mismatched conditions. So, achieving performance at par with human is still a distant dream. In this paper, we report a review on the advances in the speech recognition technology from early development stage (history) to latest technology trends towards robust recognition system. The technology advances discussed are based on the feature domain approach and model adaptation techniques and also a brief review on hybrid model of hidden markov model and artificial neural networks is given.

10 Analysis of Shunt Active Power Filter based on Average Power and Self-adaptive Algorithms
M.Gokila, A.Thiyagarajan, S.Kalpana

Abstract—Presence of Harmonics for a long time in a power supply shapes the performance of a power system. Therefore, estimation of harmonics is very importance while analyzing a power system network. Various filters have been devised to achieve an optimal control strategy for harmonic reduction. This paper discusses the various algorithms to analyze harmonics in the power system. The objective is to estimate the power system voltage magnitude in the presence distortions taking into account the noise by employing different estimation approaches. In this paper, The Design a Shunt Active Power Filter (SAPF) based on Average Power Algorithm (APA) and Self-adaptive Algorithms is discussed. Two components are included in the reference active current. One is the instantaneous active current that should be sent from power system to loads based on APA. The other part, calculated mainly by a filter based on Self-adaptive Algorithm, is the instantaneous active current that should be sent to SAPF to maintain the DC-link voltage invariable and also it combines these two parts to get the final instantaneous reference active current value. Gating signals are generated by the current hysteresis regulator, the inverter compensates the reactive power and restrain the harmonics to make there is only fundamental active current in the power system. Simulations and results are obtained using MATLAB/SIMULINK.

11 A New Fragmented Mechanism for Topology Control in MANETS with Cooperative Communications
Jakka.Lakshmi Priyanka, Katta.Naga Raju , Dr Yella.Venkateswarulu

Abstract—A MANET is a Mobile Adhoc Network which is mainly formed without wires and it is free to move independently in any direction without any fixed boundary conditions. As MANET’s can move independently they can also able to join for any network dynamically based on the receiving network. MANET’s are mainly used for mobile devices for having communication between one other with wireless media, for this cooperative communication has received tremendous interest for MANET communication. Previous work is mainly conducted on link-level and physical layer, so there was been several issues raised by such a type of communication. There will be no concentration of network-level upper layer, such as topology control, routing and network capacity as they were largely ignored. I propose a Capacity- Optimized Cooperative (COCO) topology control scheme, which was mainly designed in order to improve network capacity in MANET’s by taking both upper layer network capacity and physical layer into consideration for data communications. As an extension for this current paper, we have implemented fragmentation, where the data is fragmented meanwhile when travels from Source to destination which will be reconfigured when the authentication will be passed. We have conducted several experiments on the proposed method so that all our simulation results clearly tells that, the proposed new co-operative topology control scheme can substantially improve the network capacity in MANET’s.

12 A new security mechanism for Prevention of DNS spoofing to Isolate phishing attacks
Jagdeep Kaur, Tanupreet Singh, Barjinder Singh

Abstract—Phishing is an internet scam done by Web criminals. It harms the user's confidentiality through Phished Websites. DNS spoofing is also involved in Phishing in which attackers spoof the data by mimicking the original Website. DNS spoofing can inject Fake DNS server in place of Original Server and user directly redirect to a fake server and server get User's passwords and credit card numbers which is harmful for user data. If we prevent DNS spoofing then phishing attack can be isolated so we are working to prevent DNS spoofing In this paper we present a robust algorithm that is combination of (RSA + bit stuffing) for the prevention of DNS server from DNS spoofing. In this algorithm RSA accounts for legacy of user by providing the Digital signature, while bit stuffing is used for digesting the message so that it remain confidential for the intruders, if any changes persists (violation of integrity) destination can't decipher the message with the help of public key of sender. So this way we can provide more robustness for DNS. Simulation has been carried out using NS2.35 Trace files has been analyzed for evaluation purpose. Proposed algorithm describes a generalized approach that works on public cryptosystem along with bit stuffing, public cryptosystem that accounts for authenticity and bit stuffing that deals with message confidentiality by digesting message from arbitrary length size to fixed length. This process overcomes the limitation of RFC 2535.

13 Comparative Analysis of ECC-MAC With Existing MAC Protocol In VANETs
Nancy Sharma, Tanu Preet Singh

Abstract—In order to avoid transmission collisions in VANETs where high mobility and speed are the main characteristics, a MAC protocol is required. The objective of this work is to compare the performance of our proposed technique with existing protocol VERMAC by using simulations and to analyze the impact of mobility and the density of nodes on the behavior of these protocols in a Vehicular Ad hoc Network (VANET). Four performance metrics have been considered that includes Throughput, Latency, packet delivery ratio and Percentage adaptability to speed. The results show that our proposed technique provides significantly better network performance than existing protocol VERMAC .