JCT - Volume 3 Issue 9 (September 2014)

 


Sr/No/ Title Pdf
1 A Survey on the Stochastic Vehicle Routing Problem and Solution Method for Car Pooling Application
S.Chitra Devi, Dr.C.Sundar

Abstract—Car pooling is a transportation alternative to address congestion i.e., sharing a vehicle toward a common destination, based on a priori agreements. Carpooling is one method that can be used to resolve a variety of problem that continue to be affect urban areas, ranging from energy demands and traffic congestion to environmental pollution. Most of the existing method used stochastic other disturbance arising from variations in vehicle travel times for carpooling. In this paper multiple stochastic factors (particularly other regular incidents such as stochastic variations in the amount of demand) to form a more complicated stochastic model. To perform this Chance constrained formulation Programming (CCP) approach is proposed for the problem with stochastic demand and travels time parameter, under mild assumptions on the distributions of stochastic parameter.

Download
2 A Survey on the Detection, Mitigation and Security Model for Disruption Tolerant Network
P.Rajalakshmi, Dr.C.Sundar

Abstract— In adversary environments most popular connection scenarios between with each other and access the confidential information. The enforcement of authorization policies using DTN technology are becoming successful solution for composed of intermittently on military networks. In environments which are meant to those connected nodes. In a DTN with a malicious node transmit to its destination..Such as includes bulk of data and no involved on the military networks. In this paper to introduce RWG framework (GSF) for survivability in ICMANETS. GSF aim to survive the system detection, diagnosis and mitigation. RWG protocol to exploiting the external storage node. This survey entitles the above problem and solution is proposed.

Download
3 Survey of Fault Based Algorithm in Manet
Neha Arora, Dr. Puneet Goswami

Abstract— Mobile ad hoc networking allows portable mobile devices to establish communication path without having any centralized infrastructure. As there is no centralized infrastructure and the mobile devices are moving randomly, this gives rise to various kinds of problems such as routing and detecting faulty mobile nodes in the network. The nodes may fail because of battery discharge, crash or limitation in age. Fault diagnosis in Mobile Ad-hoc Networks (MANETs) is very challenging task. In fact, fault-diagnosis becomes an important building block to establish dependability in MANET.

Download
4 Hybrid Converter Topology with AC Drive Using Fuzzy logic Technique
Naga Nancharaiah Badde, Rama kumar.M.S, Mahendra Chand Bade

Abstract— This paper proposes a single-phase to three-phase drive system composed of two parallel single-phase rectifiers, a three-phase inverter, and an induction motor. The proposed topology permits to reduce the rectifier switch currents, the harmonic distortion at the input converter side, and presents improvements on the fault tolerance characteristics. The complete comparison between the proposed fuzzy control strategy and PI control strategy of hybrid converter topology has been carried out in this paper. Compared to the conventional topology, the proposed system will reduce the rectifier switch currents, the THD of the grid current with same switching frequency. The results are discussed clearly.

Download
5 Workflow Scheduling Algorithms in Grid and Cloud Environment – A Survey
Vijay Prakash, Anju Bala

Abstract—With the development of computer and internet, new challenges are arising day by day. One of those challenges is increasing in demand of connectivity and resource handling. Cloud computing is an emerging technology which handles these data and resources dynamically with the help of internet and central servers. Workflow has been used for effective execution of various grid and cloud application. Workflow has been defined as directed acyclic graphs (DAGs) that allows proper management of resources with use of efficient scheduling approach. Scheduling focused on execution of tasks of workflow in a correct sequence according to some constraint defined. In this paper, we have surveyed various existing workflow scheduling algorithms in the grid and cloud environment on the basis of different scheduling parameters. Most of these existing algorithms focused on makespan and cost as the scheduling parameter. So there is a need to consider another scheduling parameters such as maximum number of relationships between the parent and child tasks of a workflow and proper resource utilization.

Download
6 Classical and Novel Diagnosis Techniques for Early Breast Cancer Detection – A Comparative Approach
T.Venkat Narayana Rao, A.Govardhan

Abstract—Breast irregularity is defined with broad variety of features and could be easily missed out or misread by the radiologists while reading huge number of mammographic images supplied in screening methods. Breast cancer is lone and lodest common malignant diseases amongst women. It is very vital to provide patients early diagnose and action. Since this disease has been identified, studied and analysed but yet still this disease is deemed dreadfull diseases of all times. In the present medical science, there are plenty of newly developed methods and algorithms to obtain timely discovery of breast cancer. Most of these techniques make use of highly accpeted technologies such as medical image processing. This paper is a study and an attempt to emphasize on availability of breast cancer detection methods based on image processing. This paper also offers an outline on affordability, feasiblity, reliability and broad details of results of each technique.

Download
7 Capacity problems and structural paradoxes of the installed wind power plants in Hungary
Fogarassy, C., Tóth, L., Zsarnóczai, J. S.

Abstract—Nowadays, there are significant development projects and ideas related to increasing wind power plant efficiency. In Hungary, wind energy capacity increased between 2006 and 2010. The quota was fulfilled at the end of this period, and there weren't any new investments ever since, even though there would be a huge demand for new projects [12, 13]. A KF *8760 (hrs/year) variable shows the nominal utilization hours, which is hn/year (f.e. 8760 x 0,23 = 2018 hrs/year for a Pn performance). According to domestic calculations, the operation of a wind power plant is economically efficient for a nominal performance (Pn) of 2000hn/year, and the investment returns in 9-10 years with KÁT (feed-in tariff system) subsidy. The current wind energy capacity is 330MW, which is mainly supplied by modern units, designed for the wind patterns unique to Hungary. Energy production is quite good due to this, namely 740 GWh/year, and the capacity factor of 24.1% is good as well, making our system the 4th best in Europe (based on 2012 data). With this, we save about 220 million m3 of natural gases every year, and avoid ~400 000 tons of CO2 emission [15]. It's a fact that wind power plants - after an investment return time of 9-10 years - produce cheap energy. From a financial viewpoint, wind power plant utilization is an investment which has one of the most promising perspectives. Our analysis points out that the ambitious project of Hungary, planned to conclude by 2020 - namely, increasing the utilization of renewable energy - is unlikely to be successful without wind energy utilization.

Download
8 Survey on reliable auditing services for multistorage clouds
P.Jeyaram, P.Ashly angel

Abstract—Cloud computing provides various resources for the client to perform the activities through internet. Outsourced storage is used to client store large amount data because client difficult to store entire data in personal system. Reliable auditing services for multi-storage clouds used to test out the quality of stored data. It is efficient method for check data integrity. Our audit system is used for make sure authenticate integrity of the untrusted and outsourced storage. Audit services based on techniques on index hash table, random sampling, cryptography, and fragment it is used in the dynamic operation. Our system used to check integrity of data without downloading the entire date. This paper describe dynamic link list method for updating index hash table and dynamic operation in multi-storage cloud this is used for retrieve data or archives quickly from cloud and reduce communication cost.

Download
9 Survey on Clustering for Data mining Text Clustering for Digital Analysis
P.Seethamani, S.Christina Magneta and Dr.C.Sundar

Abstract—The computer analysis, hundreds of thousands of files are regularly examined. A large amount of the data in those files are contains of unstructured text passage, whose analysis by computer examiners is complicated to be performed. In this framework, computerized methods of analysis are of great attention. In exacting, algorithms for clustering documents can smooth the progress of the discovery of new and useful knowledge from the documents less than analysis. We illustrate the proposed approach by carrying out widespread testing with clustering algorithms K-means++, and CSPA applied to Text-document for document analysis. In adding together, two qualified validity indexes were used to automatically estimation of the large number of clusters. Correlated studies in the narrative are significantly more restricted than our study.

Download
10 A Survey on the Misbehaving nodes and Counter Measures to avoid them
R.PandiyaRajan, D. Dennis Ebenezer

Abstract—The modern era communication is one of the main aspects in day-today life. Specifically, wireless communication has attracted lot of users with is dynamic infrastructure and ease of use. Disruption Tolerant Network (DTN) is on added to wireless technology as technology improves, the shortcomings also growing. One such drawback in DTN is breaking the communication without forwarding the messages to the neighbouring node. A node that does this is labelled as selfish node. In this proposed project a system connected to the network checks whether the system contains selfish node or not, and this checking is done by two method, one is partial selfish node and another is fully selfish node. If a node is selfish, some on alternative path for destination must be chosen. While choosing the alternative path the selfish node can be eliminated. By using the selfish node detection method, it is easy to reduce the impacts of selfishness. Selfish node is detected by the help of selfishness alarm, and this alarm is called as false alarm. After completing the selfish node detection is done the result can be produced with the help of two comparative charts, the charts are response chart and accuracy chart. By using this method, there will be an increase in the data accessibility with high accuracy, reduced time the query delay time, and also it reduces the impact of selfishness.

Download
11 A Survey on the Methods for Security, Integrity and Privacy Preserving For Data Cloud Storage
L.Sara Anantha Kumari, Suma Sira Jacob

Abstract—Data Storage in cloud via an internet connection is easy which provides easy access of the stored data without any underlying architectures. But the data stored in the cloud must be highly secured so that only the data owner or the member of the group can view, update and save back the data. To ensure the security of the stored data, two properties must be satisfied viz. integrity and privacy. Here a survey of the available methods for providing data integrity and privacy preservation is presented so as to find a possible way to improve the cloud data security.

Download
12 A Survey On Security aspects of MANET Challenges, Issues, Attacks and Countermeasures
K.Santhosh kumar and R.Ramya

Abstract—Mobile Ad hoc Networks named as MANET is a cutting-edge advancement in the era of wireless technology and it is defined by collection of mobile nodes that are connecting together over a structure less wireless medium and it does not require any centralized control and also no need of dedicated routers for forwarding the packets instead of each node act as a router where the communication taken place. Nodes in the networks are roaming freely as it wants so it leads to dynamic topology moreover it has special feature called self-organization meaning that it can be deployed easily whenever and wherever required. Because of these unique characteristic, it offers plenty of applications as well as it also leads to security violations.Security is a prominent factor both in wired and wireless technologies and success of any application depends on how the security is implemented for that application. While communication each node should depends on other nodes that is expecting coordination form others to complete a particular task successfully in MANET but achieving such coordination is always impossible. In this paper we first discuss the challenges of MANET and turn to issues of MANET with respect security. Then we present various types of attacks, and how the attacks are executed by the way what are all the bit falls. Finally we discuss the security solutions in order to overcome these attacks.

Download
13 Enhanced Cryptography Technique: By Integrating Color and Arm Strong Numbers for Data Transfer
N.Akhila, D.Sowmya Sree, K.Praveen Kumar

Abstract-Security is the degree of resistance to, or protection from, harm. It applies to any vulnerable and valuable asset, such as a person, dwelling, community, nation, network or organization. In real time environment, data security plays a vital role where the following factors like confidentiality, authentication, integrity, non-repudiation have given a high importance. We clearly know that cryptography is a major technique for providing confidentiality for the transmitted data through some network media. In this paper we have implemented a new technique to encrypt the data using a key involving Armstrong numbers and colors as the two level password. Three set of keys are used to provide secure data transmission with the colors acting as vital security element thereby providing authentication for the storage data. By performing various experiments on the proposed method, our simulation results on various types of storage data clearly tells that our proposed technique is having high level of security when compared with existing cryptography algorithms.

Download
14 Tweet Alert System: Development of New Real Time Event Detection and Earth Quake Reporting System
Sri Lakshmi Poornima Gorle, P.Srinivasu Varma

Abstract-Twitter is categorized as a micro blogging service. Micro blogging is a form of blogging that enables users to send brief text message updates or micromedia data such as photographs or audio clips. In recent days twitter has received much attention from different users around the world. An important characteristic of Twitter is its real-time nature. We investigate the real-time interaction of events such as earthquakes in Twitter and propose an algorithm to monitor tweets and to detect a target event. To detect a target event, we devise a classifier of tweets based on features such as the keywords in a tweet (I.e. „Shaking „and „Earthquake‟), the number of words, and their context. As an application, we develop an earthquake reporting system for use in Japan. Because of the numerous earthquakes and the large number of Twitter users throughout the country, we can detect an earthquake with high probability (93 percent of earthquakes of Japan Meteorological Agency (JMA) seismic intensity scale 3 or more are detected) merely by monitoring tweets. Our system detects earthquakes promptly and notification is delivered much faster than JMA broadcast announcements.

Download
15 Blocked Protocol: A New Filter to Block Un- Deliberative Content in Social Networks
J.Santoshi Kumari, Chinna Babu Galinki

Abstract-Online Social Networks (OSNs) are today one of the most popular interactive medium to communicate, share, and disseminate a considerable amount of human life information. With this OSN each and every user communicates with one other who was located in different regions around the world.Eventhough the social network is gaining its popularity in usage by various OSN users, the major problem that was faced by OSN user is the ability to control the message content posted on their own private space to avoid that unwanted content is displayed. Now a days a lot of users are posting very rude messages on their private walls and even post the same on others wall. To solve this problem, in this paper, we have proposed a very new filtering protocol allowing all participating OSN users to have a direct control on the messages posted on their walls. This protocol was implemented by using automatic identification of un-parliamentary words from the total message by using a Machine Learning (ML) based soft classifier algorithm which labels the messages into blocked content based on the category.

Download
16 Analysis of Various Pre-processing and Clustering Algorithms on Text Data Sets for Finding Similarity through Computer Inspection
Mukkapati L Koteswararao, Bommireddy Dinesh Reddy

Abstract-Forensic Data Analysis (FDA) is a branch of Digital forensics. It examines structured data with regard to incidents of financial crime. The aim is to discover and analyse patterns of fraudulent activities. Data from application systems or from their underlying databases is referred to as structured data. Unstructured data in contrast is taken from communication and office applications or from mobile devices. This data has no overarching structure and analysis thereof means applying keywords or mapping communication patterns. Analysis of unstructured data is usually referred to as forensics. In computer forensic analysis, hundreds of thousands of files are usually examined. Much of the data in those files consists of unstructured text, whose analysis by computer examiners is difficult to be performed. In this context, automated methods of analysis are of great interest. We present an approach that applies document clustering algorithms to forensic analysis of computers seized in police investigations. We illustrate the proposed approach by carrying out extensive experimentation with three well-known clustering algorithms (Kmeans, K-medoids, Single Link, Complete Link, Average Link, and Cosine Similarity Measure) applied on some of the text documents of having different categories like games, sports, living beings, animals, food items, books and so on. In addition, two relative validity indexes were used to automatically estimate the number of clusters. Related studies in the literature are significantly more limited than our study. Our experiments show that the proposed architecture is best suited for forensic analysis of unstructured documents.

Download
17 A New Scalable Mechanism for Storing PHR Records in Cloud Server using Attribute Based Encryption Scheme
Addepalli Deepak Vijay, CH.Suneetha

Abstract-Now a days cloud computing has increased its popularity by attracting a lot of user’s attention to store their private data in a remote cloud server. As this facility is provided by cloud service providers many schools, offices, hospitals, large scale enterprise organizations try to store their valuable private data in the remote cloud servers which is provided by cloud team. In this paper, we propose a novel patient-centric framework and a suite of mechanisms for data access control to PHRs stored in semi-trusted servers. To achieve finegrained and scalable data access control for PHRs, we leverage attribute based encryption (ABE) techniques to encrypt each patient’s PHR file. Different from previous works in secure data outsourcing, we focus on the multiple data owner scenario, and divide the users in the PHR system into multiple security domains that greatly reduces the key management complexity for owners and users. A high degree of patient privacy is guaranteed simultaneously by exploiting multi-authority ABE. Our scheme also enables dynamic modification of access policies or file attributes, supports efficient on-demand user/attribute revocation and break-glass access under emergency scenarios. Extensive analytical and experimental results are presented which show the security, scalability and efficiency of our proposed scheme.

Download
18 A Novel Mechanism of Preventing Unparlimentary Messages in OSN Networks
Budidha Srinivasu, Bommireddy Dinesh Reddy

Abstract-Online Social Networks (OSNs) are becoming day by day one of the most familiar interactive medium to communicate, share, and disseminate a considerable amount of human life information. As the OSN Network is gaining its popularity ,the major important issue that was faced by OSN user‟s is the ability to control the messages posted on their own private space to avoid that unwanted content is displayed. To solve this problem, in this paper, we proposed a novel filtering system allowing all participating OSN users to have a direct control on the messages posted on their walls. This is achieved by a Machine Learning (ML) based soft classifier algorithm which is used which for automatically labeling messages if it is recognized as block able content.

Download
19 Bi-Queue Scheduling For Brokers In Cloud Computing
Pooja Chandan, Ajay Kumar Dogra

Abstract-Cloud Computing is emerging as an important player in the field of Information Technology. Scheduling is always being an important research domain to respond users requests Broker is the entity which deals with minimizing processing time of the requests and cost. Broker works on scheduling of the requests externally. Therefore in this paper we propose a frame work which utilizes queues to enhance efficiency of the broker by minimizing response time and cost. Further we compare our framework with existing round robin. Our results shows the effectiveness of the framework.

Download