JCT - Volume 4 Issue 5 (May 2015)


Sr/No/ Title Pdf
1 Zeros of a Polynomial with Restricted Coefficients
M. H. Gulzar

Abstract-In this paper we give some generalizations and extensions of the Enestrom- Kakeya Theorem on the bounds for the zeros of a polynomial in the complex plane. Our results contain many known results as special cases and many other interesting results can also be obtained for different values of the parameters involved.

2 Design and Implementation of Raspberry Pi based Commercial Embedded Webserver
Yuvaraj S, Ramani G

Abstract— The internet usage among people grown dramatically in the last few years due to the convenient and new technologies to use internet. Introduction of laptops, smart phones and tablet PC's changed the way that people using internet and access it in finger tips with less efforts. Due to the increase in internet traffic, volume of data flow and security risks, it is harder time for the commercial business entities to manage the Webservers. Even the small corporate units have to rely completely on bulk server, security monitor, frequent maintenance and skilled personnel to manage the website of them to provide web based services to their customers or visitors. Proposed strategy makes use of Raspberry Pi Embedded Webserver to meet the On-Demand traffic, routing, network monitor, server logging, security reporting requirements. Basically, the Advanced RISC Machine architecture core provides structured built-in functions for it to use with the embedded applications. ARM11 processor embedded on the board of Raspberry Pi, a compact board with ports, pins and Ethernet provisions. All the contents of website is loaded in the micro SD card which is inserted in the slot provision on board. By connecting and configuring this compact single board micro computer with the router and internet, whole system work as an Embedded Webserver. When connected to a monitor/laptop/TV screen through HDMI port will display the functionalities, GUI, progress and is really useful in tuning to run like ordinary Webserver.

3 Hybrid Solar Rickshaw
Gohil Dhruv, Vataliya Nihar, Khoradiya Kalpesh, Kalpesh Ranipa

Abstract—In all over the world the energy crisis is a main issue. In the 21th century, when fossil fuels seemed to be the ideal energy source and vast quantities of fossil fuels have been used like petroleum, coal, and natural gas etc. The main aim to do our project is to reduce the pollution and reduce their harmful effect on climate as well as on our day to day life. This purposed model is consisting of solar panel; an efficient MPPT (maximum power point tracking) for charging system, charge is controller by 2- batteries & 2-DC in shunt motor.

4 Congestion Management Using Facts Devices
S.A. Galane, P. R. Rane

Abstract— Now a days all our basic needs are relates with electricity. The demand for electricity is tremendously increasing day by day. Due to insufficient transmission capacity, one or more transmission line may operate beyond their limits thereby causing transmission congestion and voltage instability problems. So Congestion in transmission line is one of the technical problems which arise in deregulated environment. Due to the congestion in the network, it is not possible to transmit all the contracted power. Thus increased power demand has forced the power system to operate very closer to its stability limits. So Congestion in transmission line is one of the technical problems which arise in deregulated environment. In this paper Thyristor Controlled Series Capacitor (TCSC) and Static VAR Compensator (SVC) are used to relieve congestion, designed in Power Word Simulator17. A reduction of total system reactive power loss sensitivity index method is used to find optimal location of FACTS device for congestion management.

5 Circuit Sketch Recognition
Kanzariya Kalpesh, Kalpesh Ranipa

Abstract— Recognizing circuit sketch is very useful for electrical engineers. In this project, we use topology based segmentation method to segment circuit sketch, and classify each component using the Fourier descriptors as feature vector for Support Vector Machine. An accuracy rate of over 90% is achieved for each component.

6 BER Performance for SISO and SIMO Technique Over Rayleigh Fading Channel
Tajinderpal Singh, Roopjeet Kaur, Shalini Bahel

Abstract—In this paper, comparison has been made between the variation of the bit error rate with respect to different values of signal to noise ratio using different modulation schemes with single input single output and single input multiple output reception techniques in the additive white Gaussian noise and Rayleigh fading environment. Single input multiple output reception technique combine different branches to improve signal to noise ratio. The combining technique that is used to improve the signal to noise ratio is maximal ratio combining.

7 New Routing Protocol for Energy Conservation with Power Consumption Optimization in MANET
Harpreet kaur, Harminder kaur

Abstract—As with the advancement in technology, diverse sensing and mobility capabilities have become readily available to devices and consequently mobile adhoc networks (MANETs) are being deployed to perform a number of important tasks. The energy efficiency at individual nodes is the key concern in MANET. We propose a hybrid protocol comprising of LEACH and EPAR (efficient Power Aware Routing) i.e. LEPAR (Leach efficient Power Aware Routing). In contrast to conventional power aware algorithms, LEPAR identify the capacity of node not just by its residual battery power, but also by the expected energy spent in reliably forwarding data packets over a specific link. This protocol must be able to handle high mobility of nodes which often cause change in the network topology. Our proposed scheme reduces for more than 10% of the total energy consumption LEPAR algorithm adaptively balanced the load in the network & gives better results in term of network lifetime.

8 Survival Analysis of Faulty classes in object oriented programming
Gagandeep singh, Kuljeet kaur, Anil Rai

Abstract—Paper highlights the patterns of Faultiness exist in open source software. Lifespan of class in different version of software is studied and Results are collected in file. Class is categorized into 4 main categories named as BPCNR, NBPCNR, BPCR, and NBPCR. Data sets used are the Faulty classes or classes having some kind of Anti patterns in them. Survival analysis detects effective treatment for classes which make classes bug free. Bug fixing changes are termed as treatment and are categorized as structural changes, nonstructural, and both chg type changes.

9 QoS Metrics for the Web
Sonam, Hardeep Singh

Abstract—This paper has concentrated on different quality measurements for web administrations. Web measurements are the estimation, accumulation, examination and introduction of web information for purposes of understanding and enhancing web use. The survey has demonstrated that the there are two sorts of web measurements i.e. quality and structural. Quality Metrics portrays both useful (functional) and non-practical (nonfunctional) qualities of Web Services. Quality measurements incorporate execution, reusability, openness, accessibility, interoperability, adaptability and security and so on. Structural measurements can be additionally used to gauge practicality prerequisites. Illustrations of some structural measurements incorporate unpredictability, and pace of page stacking. Structural measurements portrays basically in regards to various types of coupling metric. The general objective of this paper is to investigate the different QoS measurements of web.

10 Iterative Block Level Principal Component Averaging fusion using DCT
PrabhDeep Kaur, Mandeep Kaur

Abstract—The key objective of vision fusion would be to merging information from multiple images of exactly the same view in order to deliver only the useful information. This paper has offered a novel image fusion technique which has integrated the PCA and DCT based approach to enhance the results further. The proposed technique is designed and implemented in MATLAB using image processing toolbox. Medical images has also been used for experimental purpose. The comparisons has clearly shown that the proposed technique outperforms over the available one.

11 Effects of Cinnamon Consumption in Diabetic Patients
Salma Dafa allah Ibrahim, Mohamed Alhassan Ali Shayoub

Abstract—Diabetes mellitus is the most common metabolic disorder worldwide. Traditional herbs and spices can be used to control blood glucose concentrations. Cinnamon has gained popularity as a herbal treatment for diabetes because it is availability, effectiveness, relative safety and it is inexpensive.

12 A Composite Model for Weather Prediction using Cluster of Neural Networks
Naveen L, Kiran Gowda C, Rahul Bhat R , Rajith V Gopal, Kavitha R, Kiran M

Abstract—Weather forecasting is the application of science and technology to predict the state of the temperature for a future time and a given location. The weather temperature has been predicted using the features extracted over different periods. Although artificial neural networks have been used for weather forecasting, they are not able to provide accurate results. Consequently some researchers proposed to use Cluster models of neural networks for the prediction task. In this paper, we propose a new Composite model using Cluster of neural networks and we address the redundancy issue by introducing a modular model in which feature selection module is first applied to the data. When we combine two or more neural networks, redundancy is occurred. We introduce mutual information approach which helps in solving the problem of combing results. The proposed model results in the end of the paper shows an outperformance when compared to similar models in literature.

13 Medical Image Fusion Based On Sparse Fusion Method Using DWT
Kiran Gowda C, Nandish UG, Kusuma D.G, Ragavendra S, Shruthi S.V, Venkatesh A

Abstract—Image fusion is a process of combing the multiple source images using different sensors into single fused image which contains all the information for further processing. In this project, fusion algorithm is taken as hybrid from Orthogonal Matching Pursuit (OMP) and Principal Component Analysis (PCA). Firstly, common component and multiple innovative components are taken from source images. Secondly, the sparse PCA method is employed to fuse innovative components via OMP. Then weighted average fusion method is employed to fuse the sparse PCA result with common component to preserve the edge information and high spatial resolution. Finally multilevel fusion where the image undergoes fusion twice was using efficient DWT and I-DWT technique that provide improved output image that contain both high spatial resolutions with high quality spectral content. We demonstrated this method mainly on medical images and experimental results proves the robustness of purposed method.

14 An overview of Indoor Localization Technologies and applications
Peter Ayuba, Tella Yohanna, Gabriel Lazarus Dams

Abstract—The problem associated with Global Positioning System has led to the development of several localization systems that used different technologies. In this paper, we present an outline of the various indoor localization technologies and applications, a challenge for an integral technology and technique for effective and efficient indoor localization.

15 Deterioration Process of Concrete Structures near Sea Shore Constructions
G. Rema, S. Durairaj

Abstract—This paper presents a probabilistic model aimed to predict the service life of deteriorating concrete structure. The damage evolution is modeled as a Semi-Markov process with one step of memory. Specific attention is paid to the use of the model in the assessment of the time-variant probabilistic performance of the concrete structure in the highly aggressive environment. Illustration is given with 100 concrete structures near the sea shore in the Kanyakumari coastal area. The houses are very close to the sea shore.

16 An Approach for Network Security Situation Awareness
Shivam, Deependra kr.Jha, Sitesh Kr.Sinha

Abstract—In Network multi capacity wireless network need to be work on, where we assume that m static base stations and n mobile users are placed in an ad hoc network. A general mobility model is adopted, such that each user moves within a bounded distance from its home-point with an arbitrary pattern. In addition, each mobile node serves as a source of multicast transmission, which results in a total number of n multicast transmissions. We focus on the situations in which base stations actually benefit the capacity improvement, and find that multicast capacity in a mobile hybrid network falls into several regimes. For each regime, reachable upper and lower bounds are derived. Work defined by us is going to research on the required analysis and work in the situation or condition based on the environmental network which is best situation and routing approach to get maximum output while working with the Network.

17 A Secure Attribute-Based Encryption Scheme For Cloud Users Information Packets Access Control In Cloud Computing
Rahul Panth, Shweta Shrivastava, Vineet Ricchariya

Abstract—Cloud computing and its services is an emerging and edge technology in today’s trends, to provide scalable, decentralized and cost efficient services. In cloud we have numerous services such as SaaS, PaaS, and IaaS to achieve today’s complex scenarios. While using cloud we are able to store cloud users information packets to archive the security on those cloud information packets, cloud computing also provide services such as “Pay-as-you-Use” and by this we obtained a efficient approach in the huge network for the accessibility of those cloud user information packets. Attribute based encryption (ABE) scheme is similar to Public-Key Cryptography, it is slightly different but proved to be a next approach of Public-Key Cryptography. The major issues with ABE (Attribute based encryption) are cloud knows the access policy for every record which is stored in cloud scenario and concurrency problem occurs in user information packets while using this technique. We proposed a new scheme to overcome this entire problem with the addition of Lazy re-encryption and proxy re-encryption with KP-ABE (Key Policy – Attribute Based Encryption).Our proposed scheme provides lower maintenance and operation cost, higher resource utilization through virtualization, the proposed scheme is more effective and efficient.

18 SUSIE: Search Using Services and Information Extraction
Kamini Khatik, Ayonija Pathre, Sitesh kr.Sinha

Abstract—Search/Retrieve Web service (SRW) is a web service for search and retrieval. SRW provides a SOAP interface to queries, to augment the URL interface provided by its companion protocol Search/Retrieve via URL (SRU). Queries in SRU and SRW are expressed using the Contextual Query Language (CQL). Information extraction (IE) is concerned with extracting structured data from documents. IE methods suffer from the inherent imprecision of the extraction process.

19 Outlier & Pattern Detection Techniques over Categorical KDD Dataset
Akash Jain, Sitesh Kr.Sinha

Abstract—In a Database, outlier is remaining objects which are remained in mining of data. Outlier detection is the process to detecting dataset or instances which are arise in a system for its unusual behavior. Effective detection of outliers can moderate to the discovery of valuable messages in the data.

20 Preventing Sybil Attack Using Anti-Image Spamming Technique
Abhishek Gaur, Ratnesh Kumar Dubey, Vineet Ricchariya

Abstract—Sybil Attack as of multiple identities for malicious intent named after the famous multiple personality disorder patient "Sybil”. This particular attack has been used by spammers to create multiple websites or id’s with identical domain names with junk and duplicate content. These pages have no quality content and are created just with the intention to create spam and drive traffic .All these webpages are interlinked to each other in order to boost their search engine traffic. In Sybil attack each node can be preferred to as a separate webpage that the spammer creates, and each of these webpages interlink to each other thus forming a network similar to link farms. The spamming webpages link to other nodes and thus create a huge linked for improving popularity. In this paper we are introduce anti-image spamming technique for preventing to Sybil attack to attackers .Our objective is to work on to the real time research desired scenario where the work is needed to be done. Sybil attack is one of the scenario where a work has been done to deal with Sybil attack efficiently in some of the field but still there are more has to be done which we want to carry forward with the help of spamming image detection and prevention technique with the help of image anti-spamming technique. In our main objective is to remove or block unwanted Sybil attack on the basis of images.

21 A Secure Auditing Approach in Homomorphic Encryption in Cloud Computing
Abhishek Amin, Pankaj Pandey

Abstract—Cloud computing and data storage maintenance is effective criteria to maintain data keep in usable mode in the cloud platform. Due to data outsourcing to the cloud area, untrusted cloud servers, and the data access control becomes a challenging issue in cloud storage systems. Cloud Computing is the most recent trends in the market for the data security where the efficient encryption technique need to be describe, here in this paper we discuss about the various techniques being used and being performed for data security where homo morphic encryption technique is one. Our attribute revocation method can efficiently achieve both forward security and backward security. The analysis is assumed to show that our proposed data access control scheme is secure in the random oracle model and is more efficient than previous works.

22 Google Android Operated Smart Home Automation
Mrunal L. Datir, Rajesh B. Pandhare

Abstract—This paper is to design a highly secured Multi-way Home Automation system that allows the user to control all the Electric and Electronic devices from any Android Smart phone using Voice Recognition technology. The system also allows the user to control the Home appliances using Bluetooth commands from any android operated phone or tablet.

23 Data Security with Armstrong Numbers Using Modified RSA Public Key Cryptosystem (Using Two Key Pairs & Lychrell Numbers)
Ratna Pavani Pakalapati, Vakapalli Durga Vara Prasad, V.Lakshmi Prasanna

Abstract—In this paper we have implemented the proposed technique to provide maximum security for data over the network and minimize time consumption in encryption and decryption. RSA is a well known public key cryptography algorithm and was one of the first great advances in public key cryptography. In this technique we used Unimoduler matrix of Armstrong numbers and two key pairs, one small size key pair for data encryption and one large size key pair to encrypt key component(n=p*q) of small size key pair. In this system every communicating party needs just two key pairs for communicating with any number of other communicating parties. Once someone obtains key pairs, he /she can communicate with anyone else.

24 Authentication Technique Using Visual and Textual Passwords against Key Loggers, Shoulder Surfing and Dictionary Attacks
Sesha Pallavi Indrakanti, Ratna Pavani Pakalapati

Abstract—Now a day’s security plays a very important role in each and every part of human life. As the security plays a major role in almost all domains including banking, data storage centers and so on, but still there was many hackers who try to access the valuable data through many hacking techniques. Textual based password authentication is the most commonly used password authentication technique. But, textual passwords are vulnerable to security attacks like key loggers, shoulder surfing, dictionary attacks etc. By stealing such textual passwords, an attacker can easily gain access to a system. On the other hand, graphical based password authentication schemes are resistant to attacks such as key loggers, dictionary attacks etc; but are highly vulnerable to shoulder surfing. By combining these two password schemes, a more secure password authentication scheme can be constructed, which can overcome the vulnerabilities of both the authentication techniques. By conducting various experiments and simulations on this proposed paper, we finally came to a conclusion that this is the best approach for providing security over various IPAttacks.