IJEA - Volume 4 Issue 3 (March 2015)

 


Sr/No/ Title Pdf
1 Cluster-Based Certificate Revocation Scheme for MANET’s
P.Suresh Kumar, M.Aravind, N.Arjun, J.DineshPriyadarshan

Abstract-In addition to mobility, mobile devices cooperate and forward packets for each other to extend the limited wireless transmission range of each node by multi hop relaying, which is used for various applications, e.g., disaster relief, military operation, and emergency communications security is one crucial requirement for these network services. Mobile ad hoc networks (MANETs) have received increasing attention in recent years due to their mobility feature, dynamic topology, and ease of deployment .A mobile ad hoc network is a selforganized wireless network which consists of mobile devices, such as laptops, cell phones, and Personal Digital Assistants (PDAs), which can freely move in the network. MANETs have received increasing attention in recent years due to their mobility feature, dynamic topology, and ease of deployment.

Download
2 Study of Sinkhole Attack and Its Impact on Reactive Routing Protocol in Wireless Sensor Network
Aditya Kumar, Akansha S. Choubey

Abstract:-These days wireless sensor network (WSNs) becomes wide employed in several areas attributable to its affordable, energy potency, high transmission power and straightforward implementation etc. As a consequence of the popularity of WSNs will increase chance of attack on wireless network additionally increase? Sinkhole attack is one in all the vital threat to the wireless sensing element network. In sinkhole attacks a compromised node tries to attack all the routing info from the neighbour nodes by causing a faux routing info and diverts all routing packet to it so as to extract network traffic info might perform selective forwarding or may drop packets. There are numerous solutions provided to beat sinkhole attack problem like novel algorithm to seek out sinkhole attack and sinkhole attack detection based on redundancy mechanism etc. This paper concentrates on sinkhole attack and influence on DSR (reactive) routing protocol. To deal the matter occurs due to sinkhole attack we tend to discuss the various methodologies.

Download
3 Ubiquitous Healthcare system using Big Data Framework
C.Merlin Lagnes, M.B.PrasanthYokesh, N.Vasudevan, D.Rajini Girinath

Abstract:-Ubiquitous healthcare system measure complicated bio signals, the system is developed to obtain data anytime and anywhere. These systems analyse abnormality and activities of body. The system requires long time measurement and accumulated bio signals will have large capacity and typical data structure. Here the bio signals are considered as big data and a ubiquitous healthcare system framework is proposed. The framework includes the bio signal transmission and analysis. For machine compatibility and data interoperability an open standard platform is used for all service process. The result is analysed with collected information from acceleration sensor.

Download
4 Analysis of a Bulk Queuing with Non Reliable Server
Dr. Naveen Kumar

Abstract:-In this paper, we study the optimal operation of a single removable and non-reliable server in a Markovian queuing system under steady-state conditions. The system is in idle state before the arrival of customer and after the arrival of customer it is in working state, it may breakdown and systems goes to vacation during that period. Here, there is bulk arrival of customer and bulk service provided to them.

Download
5 Mitigation of Power Quality Problems by Using D-Statcom
N.NIKITHA

Abstract:-This paper presents the systematic procedure of the modeling and simulation of a Distribution STATCOM (DSTATCOM) for power quality problems, voltage sag and swell based on Sinusoidal Pulse Width Modulation (SPWM) technique. The electronic devices are very sensitive to disturbances and become less tolerant to power quality problems such as voltage sags, swells and harmonics.

Download
6 Improved Efficient Searching Algorithm for Hilbert-B-Tree
Sasmita Mishra, Sarojananda Mishra

Abstract:-This paper illustrates the performance of a searching algorithm for a multidimensional database or spatial database. A new searching algorithm for data is proposed by hybridizing the concept of Hilbert curve with BTree renamed as HB tree by generating the Hilbert curve through L-System strings. The performance of the proposed algorithm has been compared with that of B-Tree, B* Tree, B+ Tree R-Tree and R* Tree. Various chunks of data sizes have been experimented for comparing the performance of our algorithm with that of all other searching methods. The implementation of this algorithm has been made using simple ANSI C program. The performance time of our algorithm gives better result in most of the data sizes than that of other methods which have been depicted in graphs.

Download
7 Comparative study of Compressive and Tensile Behaviour of Polypropylene Fibre Reinforced Concrete (PFRC) of M15 and M20 Mix
Saman Khan, Roohul Abad Khan, Saiful Islam, Sohaib Nazar, Nadeem A Khan

Abstract:-This paper represents comparative experimental study on mechanical performance of polypropylene fibre reinforced concrete (PFRC) under compression and split tensile loading. The cube compressive strength and cylinder split tensile strength of conventional concrete and polypropylene fibre reinforced concrete were determined in the laboratory. The M15 and M20 grades of concrete mixes and polypropylene mono-filament macro-fibers of length 35 mm at volume fractions of 0.0%, 0.5%. 1.0%, 1.5%, 2.0%, 2.5% and 3.0% were used in the research. All specimens were tested at curing age of 28 days. In this paper the relationship between cube compressive strength and cylinder split tensile strength for conventional and polypropylene fibre reinforced concrete were established and compared with standards. The study suggested the significant improvement in compressive and tensile strength for concrete mixes reinforced with polypropylene fibers. The samples with added polypropylene fibers of 1% showed better results in comparison with the others.

Download
8 ZVS Inverter System for an Induction Motor Drive with Interconnection of PV Cell
China Subba Rao Mamidi, Ch Narendra Kumar, Ch. RamBabu

Abstract:-Renewable Energy Sources are increasingly integrated at the distribution level due to increase in load demand which utilize power electronic converters. A novel active clamping zero voltage switching SVM controlled three-phase grid connected inverter is proposed in this paper. The inverter can realize zero voltage switching (ZVS) operation for all switching devices. In addition, the anti-parallel diode reverse recovery current of all switch devices is suppressed well. Space vector modulation can be realized with all the switching devices operating at the fixed switching frequency. And the switching voltage stress of all the power switch devices is equal to the DC link voltage, no additional voltage stresses is added on the power devices. The ZVS inverter can work both under Gridconnected condition and with independent loads. . In grid-connected application, the inverter can achieve ZVS in all the switches under the load with unity power factor or less. The different techniques of modelling and control of grid connected photovoltaic system with objective to help intensive penetration of photovoltaic (PV) production into the grid have been proposed so far in different papers. In this paper SVM can be realized at the fixed switching frequency. And the switching voltage stress across all the power switch devices is the same as the dc link voltage. The ZVS can be achieved in the grid-connected ZVS inverters under the load with unity power factor or less. The reduced switching loss increases its efficiency and makes it suitable for practical applications.

Download
9 Reducing Packet Transmission Delay in Mobile Ad Hoc Networks Using EQOD Routing
Anand.J, Hemalatha.P, Amsavalli.K, Rajini Girinath.D

Abstract:-MANETs (Mobile Ad hoc Networks) are highly mobile wireless ad hoc networks and it’s play an important role in public safety communications, commercial applications and Mission critical Monitoring. Routing information in MANETs is a challenging task, because dynamically changing topology. In this paper, we propose Enhanced QOS Oriented Distributed Routing (EQOD) provisioning with both end-to-end reliability and delay constraints in Ad hoc networks. This paper contains a detailed description of our Methodology. The simulation results using ns2.24 and it’s show that minimized end to end delay in packet transmission, In compared to current routing protocols of MANET.

Download
10 Online Auction Business Model
TejashreeChidanand, Sana Shaikh, ShaguftaWadkar

Abstract:-The online auction business model includes one party that sells products, while another party bids to purchase them. This is strength of the online auction business model that is inherent by the fact that it is "online." The Internet allows sellers and bidders to participate in online auctions from anywhere in the world. This paper is aimed at eliminating the problems faced by the Conventional Auction House as well as the online auction websites. We try to improve the efficiency of the website by improving the user participation by generating an alert through SMS as well as improving the user feedback.

Download
11 Anonymizing User Profiles for Enhanced Knowledge Mining
Srividhya.K, Saminathan.A, Sathiya.S

Abstract:-In this paper the search is based on the user conception. It also deals with the privacy of the user while searching. With an enormous amount and wide variety of data available on the web today, web search has emerged as one of the most important services. In the recent past, the prevalent practice followed by search engines of logging and analysing users' web search queries has received considerable attention from media and public as well as researchers all over the world.

Download