JCT - Volume 4 Issue 3 (March 2015)


Sr/No/ Title Pdf
1 Effect of Barium on Structural, Dielectric and Ferroelectric properties on PLZT ceramics
R.K. Sharma

Abstract-Ba-doped PLZT ceramic compositions with the chemical formula Pb0.9(La1_zBaz)0.1Zr0.65Ti0.35)0.975O3 in which z=0, 0.02, 0.04 and 0.06 were prepared using a mixed oxide method. Grain size and apparent density decreased with increasing acceptor (Ba) content in the PLZT system. The optimum dielectric properties (εRT, εTc and tanδ) were observed in PLZT and decreased with Ba substitution. Ba substitution in the PLZT system influenced the ferroelectric remnant polarization (Pr) and spontaneous (Ps) polarization, both the coercive field (Ec) and remnant polarization (Pr) decreased in Ba-doped PLZT composition.

2 Reduction of area and delay in Binary comparator
V.Joel Ebenezer, G.Nandhakumar

Abstract— Reduction of Gates in a comparator helps in the reduction of area and also indirectly reduces the delay of the comparator. In general two types of gates are used in the designing of comparators. The concept of majority gates which was introduced in prior existing technique helped in the reduction of gates. This was implemented in Quantum-dot cellular automata (QCA). QCA is a coplanar structural nanotechnology tool which has many disadvantages. Majority gate concept is being implemented in Xilinx and the count of Gates was reduced to 69 from 83 for a 32 bit comparator.

3 Multi-hop Stable Selection with Mobile Sink in Wireless Sensor Network
Sahil kapoor, Anil Sagar, Mohit Marwaha

Abstract—Wireless sensor networks are remote networks and works in ad-hoc manner. Sensors collect the information sensed by them and send it to cluster head. All such cluster heads pass on the information to the sink where it is further compiled and processed as per the need of the underlying application .In our research, we will propose a cluster based novel multihop stable election protocol extended which does multihop communication between CHs and sensor nodes towards the sink. Multihop communication is used to form cluster head communication with other sensor nodes and concept is based on nearest sink available. If sink is available nearer than cluster head then data will sent to sink and if cluster head is present nearer more than sink then communication will be done with cluster head. Mobile sinks will be configured manually according to the density of the nodes available for sensing purposes. For example we can place number of mobile sinks for two clusters which includes 15 nodes each. Cluster heads will based on routing protocol will send the information to the nearest mobile heads available. Further in future, mobile sinks can be used for authentication processes also.

4 Phytochemical analysis of leaves extract of Eucalyptus camaldulensis Dehnh
Azza Dawoud H.Dawoud, Mohamed El Hassan Shayoub

Abstract— Petroleum ether, Chloroform, Ethanol and water extracts of Eucalyptus camaldulensis leaves were carried out so as to quantify the phytochemical yields in such samples, the percentage yields obtained through the soxhlet (Petroleum ether, Chloroform, Ethanol) extraction for the Eucalyptus camaldulensis leaves were 1.54%, 3.82% and 9.34% respectively , while the percentage yields for the aqueous extract was 6.54%. The result of the phytochemical screening showed the presence of tannins, sterol, triterpenoids, saponins, flavonoids, and phenolic compounds. There were a complete absence of alkaloids, Anthraquinone glycoside and cyanogenic glycoside. The occurrence of these biologically active chemicals in Eucalyptus camaldulensis plants may justify their wide medicinal uses.

5 In Vitro Study of Aqueous and Ethanolic Extracts of Eucalyptus Camaladulensis on Glucose Uptake by Isolated Rat Hemi-Diaphragm
Azza Daword H.Dawoud, Mohamed El Hassan Shayoub

Abstract— In the present investigation, the aqueous and ethanolic extracts of leaves of Eucalyptus camaldulensis were evaluated for anti-diabetic activity. The anti-diabetic activity was studied using the Glucose uptake by isolated rat hemi-diaphragm in vitro model. By a comparison of all groups with the a control group the percentage of glucose uptake by rat hemi diaphragm in the absence of insulin were found to be (79%) and (116.2%) for aqueous and ethanolic extract, respectively, and these percentages were found to be more than that percentage achieved by insulin only (69.7%). while the most highest percentage of glucose uptake by rat hemi diaphragm given by a group treated with ethanolic extract +insulin ( 218. 8%), followed by group treated with aqueous extract +insulin (169.7%). Results strongly suggested that Eucalyptus camaldulensis has the potential for the treatment of diabetes mellitus.

6 Literature Survey on Dynamically Maintaining a Distributed Collection of Elements in a Legitimate Method
D. Saravanan

Abstract—Trace back of Denial of service attacks can be used to improve the security of communication between the server and the client. And, because of their importance, they have become an integral part of modern network security technology. Internet Security Current solutions are often used in order to collect the study and after the attacks signs are static methods. Accessibility of information, detecting hacking. Persons using the hacker's IP network entropy variations of their home. Host-based systems to determine whether an attempted attack was successful, in fact, and which encodes local attacks, privilege attacks and attacks are can detect. However, such systems large number of hosts is the need for security, especially when it can be difficult to deploy and. Moreover, these systems are unable to detect network attacks against multiple targets.

7 Enhancing Cloud Storage Security and Privacy by Using Hybrid Cryptography
Mohit Marwaha, Amit Verma

Abstract—The Cloud computing is blend of conventional computing technology and network technology like grid computing distributed computing, parallel computing, web hosting and so on. It tries to develop a powerful computing platform at relatively low cost by using the advanced business models like SaaS (Software as a Service), PaaS (Platform as a Service), IaaS (Infrastructure as a Service) to hand out the powerful computing capability to the user. Cloud computing provides a new model for IT service delivery and it typically involves over-a-network, on-demand, self-service access, which is dynamically scalable and elastic, utilizing pools of often virtualized resources making cloud computing the next big thing after internet. But question Questions about cloud data protection, data privacy and other Security issues may continue to linger and are cited as the most substantial roadblock for cloud computing uptake. We are trying to develop an encryption based system to contour these problems [17].

8 Joins and Semi-Joins in Distributed Query Processing
Amit Verma, Mohit Marwaha

Abstract—A distributed database system is the combination of two different technologies used for data processing: Database Systems and Computer Networks. In a distributed database environment, data is stored at different sites connected through a network. A distributed database management system (DDBMS) supports the creation and maintenance of distributed databases. An objective of a DDBMS is to present a simple and unified interface to the users so that they can access the databases as if there were a single database.

9 Literature Survey on Developments in Intelligent Transport Systems: Use of Wireless Sensor Network in Traffic Management System
Roma Kudale

Abstract—Intelligent Transport System (ITS) is used to manage traffic in an efficient way which has different application. Objective of ITS is to analyse , evaluate and integrate , develop new algorithm and use communication technologies to achieve traffic efficiency, improvement in environmental quality, to save energy and time also to enhance safety and comfort for drivers and commuters. In this paper, I represent survey on latest developments in ITS and propose methodology model that can be applied in Indian conditions.

10 Secured Connectivity of Optimal Increase in Multi-hop Wireless Ad Hoc Networks
Subashini.S, Praveen Kumar.S

Abstract—We reflect on the trouble of how to increase secured connections after deployment of multi-hop wireless ad hoc networks. Two advance features, based on graph extension troubles with nonlinear edge costs, are evaluated. The Initial way is based on launching a secret key using only secret keys that are secured for the links. This type of problem is in NP-hard and does not accept polynomial time approximation scheme PTAS since minimum cut sets to be extended which do not admit constant costs. The next way is to connect between a pair of nodes in a mode of increasing the power level between them physically. This problem can be evaluated as the optimal key beginning problem with interference constraints with biobjectives: (i) increasing the coexisting key establishment flow, (ii) lowering the cost of intermediate nodes. We show that both problems are NP-hard and MAX-SNP (i.e., it is NP-hard to approximate them within a factor of 1 + ² for ² > 0) with a reduction to MAX3SAT problem. Thus, we intend and employ a fully distributed algorithm for authenticated key establishment in wireless sensor networks where each sensor knows only the neighborhood hop node. Our witness based approaches find witnesses in multi-hop two neighborhood nodes to authenticate the key establishment between them which do not share a key and which are not joined through a secured path.

11 Tapping Huge Eco-Tourism Potential Areas of Manipur for Sustainable Growth
Arambam Sanatomba Singh

Abstract—The State of Manipur has good prospects for the growth and development of eco-tourism because of her huge untapped eco-tourism potential areas which scattering in all the four valley and five hill districts. Due to lack of tourism infrastructural facilities, introduction of Inner Line Permit System and internal strife of Law and Order situation, etc., posed great problems on the way of growth and development of ecotourism in the State. For sustainable growth of eco-tourism needs proper tapping of the existing eco-tourism potential areas with the introduction of eco-tourism policy and guidelines for attracting the tourist goers. With this end in view, the present study aims at (i) to identify the existing huge eco-tourism potential areas; (ii) to make an assessment of the trend and volume of tourist traffic flows; and (iii) to make suggestions for sustainable growth of eco-tourism in the State of Manipur.

12 RFID Technology Using In Library and Information Centers

Abstract—The impact of information technology on libraries has been profound. This is a technology for processing and transmitting information on libraries. Many have become enthusiastic and expert proponents for the value of Information and Communication Technology based services [Gorman, 2002]. Among the various technologies, the RIFID seemed to be domination in the information industry as a means to improve efficiency in library activities and services. In fact, this is one the significant technologies of the new millennium that had invaded the libraries.

13 On Some Fourier Cosine Series Involving Products of General Class of Multivariable Polynomials and Multivariable I -Function
Yashwant Singh, Vineeta Malsariya

Abstract—In the present paper, we introduce an even function on the interval, and investigate an integral formula to evaluate the Fourier cosine series involving products of general class of multivariable polynomials [11] and multivariable I -functions due to Prasad [10]. Finally, we obtain new special cases and make their applications.

14 3d Image Cropping For Various Displays
Anand.J, Hemalatha.P, Amsavalli.K, Rajini Girinath.D

Abstract—Stereoscopic photos should be carefully adapted to view effectively on the displays other than originally intended. Existing image manipulation techniques, such as cropping works well for images containing a single important object, and down sampling works well for images containing low frequency information. However, when these techniques are automatically applied to images with multiple objects, the image quality degrades and important information may be lost. Our algorithm addresses the case of multiple important objects in an image. The retargeting algorithm segments an image into regions, identifies important regions, removes them, fills the resulting gaps, resizes the remaining image, and re-inserts the important regions. Our approach lies in constructing a topologically constrained epitome of an image based on a visual attention model that is both comprehensible and size varying, making the method suitable for display-critical applications. Our experiments on a wide variety of stereoscopic photos demonstrate that our method can robustly produce display dependent stereoscopic photos that deliver pleasant viewing experiences.

15 Zeros of Polynomials
M. H. Gulzar

Abstract—The theorems of Cauchy and Enestrom- Kakeya are well known in the theory of the distribution of zeros of a polynomial and give bounds for all the zeros of a polynomial. In this paper we find bounds for the number of zeros of a polynomial in a given disk under certain conditions on the coefficients of the polynomial.

16 An Approach to Improve the Throughput OF ZigBee Cluster Tree Network
Trupti Satavse, Vijayalaxmi Kadrolli

Abstract—ZigBee is a unique communication standard that is mainly used for short distance communication applications. It supports three topologies namely-Star, Mesh and Cluster Tree. Among which cluster tree is widely used; because it can support power saving operations and lightweight routing. However rigid routing and poor bandwidth utilization, this topology lacks the capability to handle increased traffic load. In such case it becomes mandatory to introduce new framework for ZigBee cluster tree network. In this paper we suggest to use an Adoptive Parent Based Framework along with Distributed Algorithm-PPR that will help to utilize bandwidth effectively and improve the throughput.

17 PB FCFS Algorithm for Scheduling and Backfilling in Grid Computing
G G Girija vasumathi

Abstract—Grid computing is combination of coordinated resource sharing and problem solving in dynamic, multi-institutional virtual organizations. It is used to aggregate the power of widely distributed resources, and provide non-trivial services to users. To achieve this goal, an efficient Grid scheduling system is fundamentally important. Many of the existing tasks scheduling algorithms are commonly used for reservation, backfilling. Due to these algorithms insufficiency, the system resource utilization rate and the response time will be decreased significantly. In order to improve the system resource utilization rate and reduce the response time, a new task scheduling Priority Backfilling First Come First Serve (PB-FCFS) algorithm has been proposed. This algorithm combines backfilling, FCFS scheduling and adopts the dynamic priority strategy in task scheduling. The simulation results show that the PB-FCFS algorithm reduces the task run time and improves the system throughput and resource utilization rate.

18 Mammogram calcification classifications based on wavelet transform
K.C.Aarthi, A.Rajeswari

Abstract—Cancer affects people globally with breast cancer being a leading killer. Breast cancer is due to the uncontrollable multiplication of cells resulting in a tumour or neoplasm. Tumours are called ‘benign’ when cancerous cells do not ravage other body tissues and ‘malignant’ if they do so. As mammography is an effective breast cancer detection tool at an early stage which is the most treatable stage it is the primary imaging modality for screening and diagnosis of this cancer type. Due to the significance of an automated image categorization to help physicians and radiologists, much research in the field of medical images classification has been done recently. This paper presents an automatic mammogram classification technique and classifies it into normal and abnormal.

19 Automated Method of Preventing Packet Losses in Mesh Network
G.Rajasekharam, Inala Vishnu Vineela, Chavvakula Leela Mounika, Gunuru Chandana Priya, Bonthalakoti Vishnu Priya

Abstract—Now a day’s networking plays a very important role in each and every human life. As the network is gaining its popularity in usage by various users, the major problem that was faced by network user is the ability to control the defects that was caused by network during communication. Now a day’s administrators mainly rely on rudimentary tools like Ping, Trace route for debugging the network problems. As the current procedures are always manual it is very difficult for each and every user to trace route errors at all times. So in this paper we have implemented an Automated Test Packet Generation where each and every packets will be tested before it is been transferred to the destination node. By conducting various experiments, our simulation result clearly tells that ATPG is the tool which was designed for the first time in order to balance the network problems.

20 A New Protocol for Making User Profile Anonymous in Mobile Social Networks
Murapaka Radha Ramesh, Bhupathi Nagendra Kumar

Abstract—A social network is a social structure made up of a set of social actors (such as individuals or organizations) and a set of the dyadic ties between these actors. These social networks are generally spread all around the world through internet. Online Social Networks (OSNs) are today one of the most prominent interactive medium to communicate, share, and disseminate a considerable amount of human life information. In this paper we mainly study the concept of profile matching between various OSN users, this is done mainly in 3 ways in this entire paper.

21 Novel Protocol for Optimizing Client-Server Assignment problem in Distributed Networks
Bhupathi Nagendra Kumar, Murapaka Radha Ramesh

Abstract—A distributed system consists of a collection of autonomous computers linked by a computer network and equipped with distributed system software. By conducting several experiments of this proposed optimization of client-server, our simulation results clearly tells that by performing this optimization principle, the network users can avoid the network cuts that will be occurred during the data transfer.

22 Sequence Selection of Captcha as Graphical Password Scheme against Spyware
Ms. D.Aparna, Vantaku Ramyasreeja, Molleti Madhavi, Lagudu Sushma, Vutakoti Sairakesh

Abstract—Now a day’s security plays a very important role in each and every part of human life. As the security plays a major role in almost all domains including banking, data storage centers and so on, but still there was many hackers who try to access the valuable data through many hacking techniques. So in this paper we have implemented a new technique of giving security for the valuable data with the help of CAPTCHA technique. Although captcha is a technique which was under implementation since from last 2 years, it achieved a high level of security in maintaining details from admin side. So the same captcha technique is now used in a different way for providing security for the user data by integrating captcha as graphical password combine called as CARP.