JCT - Volume 4 Issue 12 (December 2015)

 


Sr/No/ Title Pdf
1 Application of Adaptive Mobile Gateway Management in Integrated VANET – 3G Wireless Networks – Review
G Vijay Kumar, G V Raju

Abstract- The main communication challenge of VANET lies in very poor connectivity caused by unbalanced traffic. Deploying more RSU’s may relieve this problem, but it often requires a large amount of investment and elaborate design, especially at the city scale. To minimize the delay and to increase the efficiency of VANET with low cost, will be done by integrating the high data rates of IEEE 802.11p VANET with 3GPP networks i.e.) UMTS networks. In this paper, we introduced a novel architecture that integrates 3G/UMTS networks with VANET networks. Vehicles are dynamically clustered according to related metrics. Here clustering is based on Adaptive mobile gateway mechanism, in which vehicles act as gateways between other vehicles and UMTS networks. Gateways are used to broadcast the information efficiently to vehicles by considering the factors of traffic velocity, direction of movement and speed of vehicles in a network. Simulations are carried out by using NS2 to evaluate the performance of the envisioned architecture.

Download
2 Performance of Brush Less DC motor with Hybrid Controller
T.Sudhir Kumar, P.Lakshmi Narayana, R.Srinivasa Rao

Abstract- Modern power grids involve both conventional and non conventional sources. One of the important sources is wind energy. Wind energy integration to modern power grids are complex. In general doubly fed induction generators are used in wind energy system. The application of superconducting magnetic energy storage (SMES) is used to improve the dynamic response of the wind energy system. The SMES includes converter and chopper units. This paper presents hysteresis controller and artificial neural network controller for controlling the converter and chopper units of SMES. MATLAB environment is used for this work and the effectiveness of the proposed controller is tested under voltage sag and swells conditions.

Download
3 Improving the System Performance using ANN Based SMES Unit under Voltage Sag and Voltage Swell
Y.Hari Krishna, D.Prasad Reddy, K.V.Thulasi Ram

Abstract- Modern power grids involve both conventional and non conventional sources. One of the important sources is wind energy. Wind energy integration to modern power grids are complex. In general doubly fed induction generators are used in wind energy system. The application of superconducting magnetic energy storage (SMES) is used to improve the dynamic response of the wind energy system. The SMES includes converter and chopper units. This paper presents hysteresis controller and artificial neural network controller for controlling the converter and chopper units of SMES. MATLAB environment is used for this work and the effectiveness of the proposed controller is tested under voltage sag and swells conditions.br />
Download
4 Multilevel Inverter Based Hybrid AC/DC Micro grid coordination
Y.Srikanth, S.Ravindra, K.V.Thulasi Ram

Abstract- The coordination control algorithms are proposed for smooth power transfer between ac and dc links and for stable system operation under various generation and load conditions. Uncertainty and intermittent characteristics of wind speed, solar irradiation level, ambient temperature, and load are also considered in system control and operation. In the proposed system switching losses are occurred, this will creates undesirable signals i.e. ripples or harmonics are added to the system voltage. This results the system voltage become disturbed sinusoidal wave. There are two ways to reduce the switching losses; first using of filters, second multilevel converters are used to eliminate the switching losses. Here we are selecting multilevel converter instead of three phase full converter to reducing the total harmonic distortion in the hybrid micro grid.

Download
5 Impressive Voice response system for silence speakers: Language Translation and speech synthesis for Tamil
S. Sindhuja, AP, J. Jayashree, S. Deivanai, K. Nirosha

Abstract- In this paper, we are proposed two parts of interactive voice response system for the mute people. First part is Language Translation or Machine Translation (LT or MT) and the second part is Text to Speech Synthesis (TTS). Machine translation is about automatic translation of one natural language text to another language text with help of computer. In this paper, Combined Machine Translation system (Statistical and rule based machine translation) is proposed for translating sentence from source language sentence to target language sentence i.e. from English to Tamil. The first stage of Machine Translation is to pre – processing the source language sentence that consists of parsing, reordering and compounding. Tamil linguistic tools such as Part-of-Speech Tagger, Morphological Analyzer and Morphological Generator are developed in the second step. Conventionally, rule-based approaches are used for developing Language Translation. Finally, Tamil morphological generator is used for generating a surface word from output factors. In second part of this paper is TTS. Speech synthesis is the artificial production of human speech. A Text-To-Speech (TTS) system converts normal language text into speech automatically. In this, the entered text analyzed first, syllabication is performed based on the syllabification rules and the syllables are stored separately. Then the corresponding speech file for the syllables are retrieved, concatenated and the silence present in the concatenated speech is removed and the synthesized speech is produced with good quality. Finally, the Smoothening with waveform interpolation technique is applied for smooth the transition between concatenated speech segments in order to produce continuous output and the system resembles natural human voice. The most important qualities of a synthesized speech are naturalness and intelligibility.

Download
6 An Efficient Auditing Technique in Cloud Computing
Jitendra Dwivedi, Dr. Jitendra Sheetlani, Kailash Patidar

Abstract- Cloud computing is an interesting era of research, where motivation is to find out the best outcome and productive data security and sharing approach. In this paper work comparison is first performed with available hashing technique which uses for data integrity verification process such as hash function technique , MD4, MD5, SHA-1, SHA-2 and other different technique using which a data modification can get verify and further action can be taken on cloud computing . our work also monitor the key length presented till for the verification is still required enhancement with the symmetric key based encryption algorithm. Thus work present an approach which uses symmetric key based approach and for integrity verification purpose SHA-3 which is the latest possible technique in the field of hashing technique is applied. Experimental setup and result found satisfy that the data security can be enhancing using the proposed technique.

Download
7 A Secure Hashing Architecture Algorithm For Cloud Computing Data Environment
Jitendra Dwivedi, Dr. Jitendra Sheetlani, Kailash Patidar

Abstract- Cloud computing is an interesting era of research, where motivation is to find out the best outcome and productive data security and sharing approach. In this paper work comparison is first performed with available hashing technique which uses for data integrity verification process such as hash function technique , MD4, MD5, SHA-1, SHA-2 and other different technique using which a data modification can get verify and further action can be taken on cloud computing . our work also monitor the key length presented till for the verification is still required enhancement with the symmetric key based encryption algorithm. Thus work present an approach which uses symmetric key based approach and for integrity verification purpose SHA-3 which is the latest possible technique in the field of hashing technique is applied. Experimental setup and result found satisfy that the data security can be enhancing using the proposed technique.

Download
8 An Implementation of Association Rule Mining Algorithm using Map Reduce Technique
Shaik Khasim Saheb, Devavarapu Sreenivasa Rao, T.Venkat Narayana Rao, Surya Narayana Reddy V.

Abstract- With the increase in data transmission, in today’s computing environment the huge amount of data and extracting some meaningful information is becoming a hectic task. Good amount of research is being carried out in order to process huge data. One issue which we came across is cloud and big data are the two different technologies in order to handle bulk amount of data. Cloud computing says that use any number of resources whenever required and it follows one special technique which is pay as you go model on demand basis. Another thing is Big Data which can be used to process waste amount of data. In this paper we have chosen association rule mining algorithm (ARM) which takes data and with the help of some computing resources and storage resources, the data can be processed by the hadoop ecosystem. We have chosen ARM as it helps in finding relation among item sets in the given data. The paper focus on generating association rules on the basis of the frequent item sets which intern derived from the input data and implements frequent item sets generation based on traditional apriori algorithm.

Download
9 On The Binary Quadratic Diophantine Equation
K.Meena, S.Vidhyalakshmi, S.Sofia Christinal

Abstract- In this paper we obtain a sequence of its integral solutions and present a few interesting relations among them. Keywords: Binary quadratic equation, integral solutions.

Download
10 Design and Analysis of a Novel Automobile Navigation System by Using Live Traffic Circumstances
Vijaya Kumar Mahapatro, B. Ramesh Babu, Y.Ramesh Kumar

Abstract- In the current days there was a huge increase of light wheeler and heavy wheeler vehicles in the current society .With the increase of these vehicles, there was a huge traffic problem that occurs for the regular drivers and passengers who travel on those vehicles. As there was a traffic problem the drivers who drive the car shouldn’t keep the engine off state until the traffic clears which is a major consumption problem like wastage of oils. So now a day’s almost all the vehicles like small scale or heavy motored vehicles use navigation systems as a source while driving the vehicles. This navigation system is used to identify the routes that are very shortest from the specified source (I.e. Current location of vehicle) and the destination (I.e. which is opted by the driver. But the major problem with these navigation systems is they can use Global Positioning Systems (GPS) as main source for identifying the routes from google maps, but they fail in identifying the traffic that is available between the roués which we travel. So in this paper for the first time we have implemented a Novel Live Traffic Index Indicator (NLTII) based on air index in which all the paths will be available for the driver based on shortest path with no traffic. By using this proposed NLTII framework all the modern vehicle navigation systems use the advantage of identifying the traffic that was available between the two end points and they can divert in the best path which doesn’t have more traffic. By conducting various experiments on our proposed NLTII system, our simulation results clearly tells that this approach is best suited in the current vehicle navigation systems to reduce the time to travel delay as well as reduces the maintenance cost by optimizing the wastage of fuel consumption.

Download
11 I-WAY: A Network Infrastructure for Implementation of ECommerce
Dr. Sanjay Tejasvee

Abstract- Today electronic commerce (E-Commerce) has become very conventional after many years of its enlargement. However, the latest technological challenges need for tomorrow’s e-commerce organism move ahead. In any country successful implementation of e-commerce depends on its infrastructure. This paper attempts to explore the emerging network infrastructure called I-WAY which can better work out for data- transportation including audio, visual, text, animation and so on towards e-commerce. This presents the growing incorporates commercial active network technologies with their combinational components along with its media. An efficient latest technological network trend will definitely be of assistance to integrate several things and proper implementation of ecommerce in making strategic decisions and thus increase ecommerce’s sustainability and competitiveness.

Download
12 Development of Axle Arm for ARJUN MBT MK-II Track Tensioner
K. Dinesh Kumar, C.Kannan, V.Arivazhagan

Abstract- This project focus on design and developing armored fighting vehicles such as ARJUN MBT, Mk-1, Mk-2, BLT-72 etc at CVRDE, Avadi. The ARJUN MBT Mk-2 is a state-of-art weapon system having superior fire power, invincible armor protection and excellent mobility. The ARJUN MBT Mk-2 is fitted with advanced Running Gears (RG) and suspension systems. In line with the latest configurationally requirement of RG systems and to cater for higher loading conditions, a suitable track tensioner has been under development. The axle arm is one of the critical members in the actuator mechanism working under principle of slider crank mechanism, has been designed and developed as a forged integral piece. Being is a new development; a rigorous stress analysis has been taken up as scope of this particular project work. The design of integral axle arm will be evaluated both analytical and FEA methods, in addition to estimation of fatigue life.

Download
13 Captcha: Graphical password for security
Mira K. Sadar, Pritish A. Tijare, Swapnil N. Sawalkar

Abstract- A captcha is an acronym for Completely Automated Public Turing test to tell Computers and Humans Apart . Captcha is employed for security purpose however there square measure several attacks which might break captchas. This paper proposes captcha as graphical password for security technique which is nothing but combination of captcha and a graphical password and it is click-based password. In this prposed work userhave to click on image, where sequence of clicks on an image is used to derive a password.

Download
14 Performance Evaluation of Vapour Compression Refrigeration System Subjected to Eco Friendly Refrigerants
Prashant Kumar Shukla, K.K.Jain

Abstract- Since there are a large number of refrigerants, which are used to transfer heat from low temperature reservoir to high temperature reservoir by using vapor compression refrigeration system. In these research work performance of the Vapour compression refrigeration system under various situations, and implementing the optimization procedure, a simulation program including all thermal and geometrical parameters considering R404a, R134a and HC mixture as refrigerants have been developed and compare the result. The objective function for optimization has been designed to demonstrate refrigeration processes and to investigate the effects of different types of refrigerants on the performance of theoretical cycle of refrigeration with different conditions.

Download
15 Optimization of Shell and Tube Type Heat Exchanger - A Review
Deval Gumasta, Sushil Kumar Dixit

Abstract- In this work, detail literature survey has been carried out on shell and tube heat exchanger is conducted to identify the governing parameters like transfer coefficient, LMTD, heat transfer rate and pressure drop at different Reynolds number. During the vast literature survey, it can be concluded that the increase in Reynolds number has significant impact on different parameters of shell and tube type heat exchanger.

Download
16 Optimization and Performance Evaluation of Square Duct Subjected To Different Aspect Ratios
Subhash Gautam, Pooja Tiwari

Abstract- To understand the concept of square duct subjected to different types of inserts, a experimental approach is used study the heat transfer co-efficient between tube wall to the adjacent fluid i. e water. Longitudinal strip inserts are prepared at different Aspect Ratios (AR=1, 2, 4) and these inserts are inserted inside the tube to study the enhancement of heat-transfer compared to the bare tube. These strips will act as an obstruction to the fluid flow and create turbulence inside the tube. Heat transfer coefficient is estimated experimentally and regression equation is developed. From the experimental analysis heat transfer coefficient increases by 7 to 8 times for square insert (AR=1), 2.5 to 3 times for rectangular inserts (AR=2&4). It implies that heat transfer enhancement is possible by inserting some inserts inside the tube.

Download
17 Analysis and Mitigation of DVR and UPFC Subjected to Mitigate Power Quality- A Review
Sanjay Shrivastava, Dr A K Sharma

Abstract- Power quality problem is occurring as a non-standard voltage, current and frequency. The power quality has serious economic implications for customers, utilities and electrical equipment manufacturers. Modernization and automation of industry involves increasing use of computers, microprocessors and power electronic systems such as adjustable speed drives. Integration of non-conventional generation technologies such as fuel cells, wind turbines and photovoltaic with utility grids often requires power electronic inter-faces. The power electronic systems also contribute to power quality problem (generated harmonics). The electronic devices are very sensitive to disturbances and become less tolerant to power quality problems such as voltage sags, swells and harmonics. Voltage dips are considered to be one of the most severe disturbances to the industrial equipments. Voltage support at a load can be achieved by reactive power injection at the load point of common coupling. Due to the harmonics are occurring in the system it causes losses and heating of motor.

Download
18 Implementation of Gabor Filter With HMM To Evaluate the Performance of Human Activity
Rajeev Shrivastava, Dr. Shachi Awasthi

Abstract- Human detection based action recognition is a constantly expanding research area due to number of applications for surveillance (behavior analysis), security (pedestrian detection), control (human-computer interfaces), content based video retrieval, etc. It is, however, a complex and difficult-to-resolve problem because of the enormous differences that exist between individuals, both in the way they move and their physical appearance, view-point and the environment where the action is carried out. Fig. 1 shows some images from the KTH’s database, demonstrating the variation of the human poses w.r.t. different camera views and for different actions.

Download
19 Text Mining Using Hierarchical Clustering Algorithm
Shravan Kumar, Naazish Rahim

Abstract- Data mining is the task of discovering interesting patterns from large amounts of data where the data can be stored in databases, data warehouses, or other information repositories. It is also popularly referred to as knowledge discovery in databases (KDD). Data mining involves an integration of techniques from multiple disciplines such as database technology, statistics, machine learning, highperformance computing, pattern recognition, neural networks, data visualization, information retrieval, etc.

Download
20 Designing a Framework for Active Worm Detection
Margret Sharmila.F, G.Brindha

Abstract- To detect and delete the Camouflaging Worm which itself hide from scanning and changes its behavior during scanning process. Active worms use various scan mechanisms to propagate themselves efficiently. The basic form of active worms can be categorized as having the Pure Random Scan (PRS) nature. In the PRS form, a worm-infected computer continuously scans a set of random Internet IP addresses to find new vulnerable computers. Other worms propagate themselves more effectively than PRS worms using various methods, e.g., network port scanning, email, file sharing, Peer-to-Peer (P2P) networks, and Instant Messaging (IM).

Download
21 An Empirical Evaluation of New Security Primitive by Using Pattern Classifiers
D.Srinivas, Mr. K.Ravindra, Y.Ramesh Kumar

Abstract- Now a day’s security plays a very vital role in each and every part of human life. As there was a lot of increase in user’s data, the data should be stored in a secure manner which is a major problem in current society. So in order to provide the security for the data a lot of security primitives have been proposed in literature. But all the security primitives didn’t achieve high level of security in providing data integrity for the data which is stored in their systems or remote systems. Generally a lot of adversary users try to gain access for the information illegally without knowing their identity to others. So in this paper we have implemented a new security model by analysing a set of three security primitives all together to give more security for the data which is to be stored on remote servers or on local machines. The combined set includes bio-metric authentication, spam filtering and intrusion detection system. As an extension to this proposed paper we have also implemented a new concept called as monitoring of user activities by the administrator which is an additional advantage for this paper. Our experimental and simulation results clearly tells that by using this new framework an user can be free from adversary attack during his data storage as well as data retrieving either in his system or in remote servers.

Download
22 Design and Analysis of a NSBFA Algorithm for Mining Poor Quality Images
Sura Paparao, Gowdu Tirupatirao

Abstract- Data mining is the procedure to extract the valuable information from associate degree on over-sized data. Now a day’s almost each and every part of world is increased with internet usage, a surplus amount of information is traversed through web from one user to other. Generally a lot of users extract the valuable information from the web by providing the required input values, but they was failed in extracting some part of the information like weakly labeled facial images. So in this paper we mainly investigate the idea of identifying frail /weakly images and annotate them with the relevant search image if it is matched. For this purpose we have analyzed and developed a new framework known as Novel Search-Based Face Annotation (NSBFA) by mining weakly labeled facial images that were freely obtainable on the online. In this paper along with face annotation we have implemented a new concept as an extension like image search which is replaced in the position of keyword based search. In this image search method, we initially take an image as a input and we get the retrieved output in the form of an image which is most nearest to the input what we have chosen. Once the image is matched the relevant image is annotated with the name and it will be tagged with an annotated name. By conducting various experiments on this proposed system we finally came to an conclusion that our proposed method is implemented for this first time which is not yet implemented till now in Google server also.By using this application we can achieve high level of security in real time environments like army, navy, airpots and so on for identifying and matching weak images with that of our database.

Download
23 Component Testing In Net Beans Environment
Pinki devi, Amandeep kaur

Abstract- Component based software engineering (CBSE) offers fast development of system using fewer resources and efforts. The CBSE gives us the idea of reuse and decrease the development cost. Thus component based testing becomes more complicated if we had not reliable and bug free components. We can find the reliable and bug free components only if the components are tested by a suitable testing tool. Here we tested the three components on the Net beans platform and test its unit cases under JUnit4 testing tool. Because Net Beans has Inbuilt support for JUnit4 tool. It helps in reducing the cost and running time of the software under test. JUnit4 testing tool helps in creating robust and reliable software’s. After testing at the unit level we can apply the integration testing to reduce the running time of the components. By integrating components in a single class it can helps us to reduce the testing time of the components. This work also reports this tool and its features.

Download
24 Placement & Sizing of DG in Distribution network based on Genetic algorithm and LRIC
K.Naresh, P.Lakshmanarayana, K.V.Thulasi Ram

Abstract- Distributed generation plays an important role in the distributed system for reducing the losses in the distributed system. Different types of distributed generations are available and based on the type of DG, the location of DG varies. This paper presents two methods Genetic algorithm and LRIC for the optimal placement of Distributed Generation in distributed network. Genetic Algorithm based optimal placement of DG reduces the losses as well as maintains the voltage profile within the limits. In this paper both proposed methods are compared.

Download
25 Uses of GIS in Disaster Management
Lovepreet Singh Randhawa

Abstract- Geographic Information System is a technology which helps to solve the different issues in different fields. It is designed to retrieve, manage, design and store the spatial data. Different types of disasters occur in the whole world. To control and manage all the data, GIS plays an important role. The phases like preparedness and response, GIS can support great planning for locating significant infrastructure and essential lifelines and many more.

Download
26 Applications of GIS and Remote Sensing: Review
Pavneet Kaur Sangha

Abstract- Geographic Information System (GIS) and Remote Sensing (RS) are the two techniques which are integrated to solve various conflicts. These both are very efficient and powerful tools in science world. The boundless capabilities of joining RS and GIS permit to complete the tasks in a flexible, fast and precise manner, particularly with the availability of large number of satellite images and the development of their value with time. These integrations of these techniques has various applications in different sectors.

Download