JCT - Volume 4 Issue 7 (July 2015)

 


Sr/No/ Title Pdf
1 Advanced ATPG model for test packet Generation in networks
K.Satya narayana, V.V.Lakshmi Swathi, J.Deepthi

Abstract-Now days networks aren't finding any smaller, they are rising in size and it's turning into a tedious job for network administrators to correct the network since they place confidence in traditional tools like ping and trace route for this work. Our paper throws an advance habitual and systematic approach to test and correct a network referred to as Automatic check Packet Generation (ATPG). ATPG produces a model that isn't reliant on policy once reading arrangement from routers. The model is employed to get minimum variety of check packets to hide each link during a network and every statute net. ATPG is competent of work. Each practical and performance issues check packets are sent at regular intervals and separate technique is employed to localize faults. The workings of few offline tools that mechanically generate check packets as well are given. However, ATPG goes on the far side and sooner the work in static checking (Checking aliveness and fault localization).

Download
2 Hand Gesture Controlled Robot' Powered by an Atmel's AVR Series Microcontroller into High Sensitive Spy Robot
Paranji Gowtham, A.Vijaya Prabhu

Abstract-This paper presents the design and construction of a High Sensitive Spy Robot. The use of RF integrated circuits and high speed switching transistors makes the circuit costly and complicated so it becomes paramount to design and construct a cheaper wireless high sensitive microphone using Frequency Modulation as link between robot and receptionist which should be portable, affordable and operate efficiently. The Spy Robot works on a 9v dc power supply which operates on the principle of FM (frequency modulation) band and I2C protocol. The design consists of four parts which include; the input unit (electret microphone), audio amplifier unit, modulator oscillator unit, shake detection unit, and finally the motion control unit. The motion control unit guides the path of robot, shake detection unit checks continuously for external disturbances through I2C protocol. The microphone detects conversations between people and other surrounding disturbances. These are amplified by the audio amplifier; the amplified signal is then transferred to the modulator unit where the signal is superimposed on the carrier wave in a suitable manner. The oscillating unit which is an LC oscillator provides the necessary Radio frequency needed for transmitting the signal through wired antenna. The output is a signal transmitted through a distance of 100m which is transmitted at a frequency of 96.0MHZ.

Download
3 Clustering methods and algorithms in data mining: Concepts and a study
Y. Sunil Raj, A. Pappu Rajan, S. Charles, S. Antony Joseph Raj

Abstract-Fundamental operation in data mining is partitioning of objects into groups. It is an unsupervised learning task to identify finite set of categories expressed as clusters to describe data. Clustering is based on the principle of maximizing the intra class similarity and minimizing the inter class similarity. This paper deals with the concept of data mining and clustering, survey of cluster analysis and techniques and methods already available in data mining in a nutshell, information about existing research on clustering in data mining

Download
4 Remote Sensing Image Retrieval Using Piecewise Defined Pattern Similarities with ASMC
Kiran Ashok Bhandari, Rohini Santoshkumar Gaikwad

Abstract-RSIR using query-by-example technique is proposed. This typically means inclusion of query methods that may allow descriptive semantics, queries that may involve user feedback, systems that may include machine learning and systems that may understand user satisfaction levels. This paper, feature extraction done by advanced split and merge clustering algorithm for spectral distribution and two-dimensional Gabor functions for the textures of equivalent grey scale image. Then formed pattern will be the concatenation of SD spectral distribution and texture Features. Modified Earth Mover’s Distance (EMD) use to restrict to piecewise predefine parts of each vector. Interactive search strategy used as EMD for obtaining centre correspondence between the patterns.

Download
5 A Study on Relationship between Education and Managerial Failure in Public and Private Sector
Jitendra K. Sharma

Abstract-There are numerous principles of management with their own postulates and valid structure. However, there is no single theory which works in all situations. There are cases of managerial failure all across the world. Such failures are due to many reasons; internal and external. While internal factors are within the control of the managers; external factors are beyond control. For instance, if a manager has good substantial technical and administrative skills but he/she lacks interpersonal skills, chances of managerial failure are more. There are various demographic factors related with managerial failure; some are highly relevant for managers of today. This paper explores the linkage between education and managerial failure in public and private sector organisations. Primary data was collected from managers from private and public sector organisations and significant results were obtained.

Download
6 Advanced Personalized Web Search with Furtive User Profile Edifice
Ambati Laxmi Prasanna, Vishnu Prasad Goranthala

Abstract-Web site structures are altered to improve the user navigations. Web personalization method reconstructs the page links with reference to the traversal path and profile of a particular user. User information are collected and analyzed to fetch the user intention behind the issued query. User customizable Privacy preserving Search (UPS) is used to generalize profiles by queries with user privacy requirements. Greedy discriminating power algorithm (GreedyDP) is used to maximize the discriminating power of the user profiles. Greedy Information Loss (GreedyIL) is used to minimize the information loss in user profiles. GreedyIL algorithm achieves high efficiency than the GreedyDP algorithm. The Personalized Web Search (PWS) scheme is enhanced to control topic relationship based expert attacks. The User customizable Privacypreserving Search (UPS) model is enhanced to resist query session based attacks. Query generalization is performed with query priority values. Anonymization and topic taxonomy models are used to improve the personalization process.

Download
7 Sink Mobility using an Efficient Routing Approach for Wireless Sensor Networks
Lingabathula Ravi Kumar, Vishnu Prasad Goranthala

Abstract-A surplus of applications in our daily life uses the assistance of wireless sensor networks. There are numerous applications for wireless sensor networks which are inevitable now a day in our daily life. Majority of such applications which use wireless sensor networks will be in areas where the direct human intervention is impossible. So the limited energy available in such sensors is a threat for prolonging the life of the entire network. As communication process consumes more energy, an energy efficient routing strategy can probably reduce the energy consumption to a great extend. This paper gives an overview of the different routing techniques in which mobile sinks are used to facilitate the routing process which can effectively reduce the energy use. A new routing strategy with mobile sinks and a static sink is proposed and is compared based on the matrices life time and average energy of the nodes with the existing Shortest Hop path (SH) algorithm. The simulation results shows the proposed algorithm is more energy efficient than the existing one.

Download
8 Travel Package Recommendation using Huddling and Typicality Collaborative Filtering
Pappu Ashwini, Mohd. Fasi Ahmed Parvez

Abstract-Recommendation systems are used to predict the ‘rating' or ‘preference' that user would give to an item and are applied in a variety of applications like music, movies, news, research articles, books, social tags, search queries and products in general. This paper focuses on application in tourism. However traditional recommendation system suffers from problems such as data sparsity, recommendation accuracy. A new approach ‘Clustering and Typicality based Collaborative Filtering’ has been detailed out herewith this paper, which includes preprocessing methods i.e. clustering of items and measuring user typicality degree in user groups. After preprocessing the remaining recommendation process is done based on user typicality degree instead of coated items of user or common users of items, as in traditional CF. This method helps to reduce data sparsity and improve the accuracy of prediction.

Download
9 Acids & bases-A theoretical approach
Fatima Sarguroh

Abstract-The title of my Theory is called as acids-bases Theory. The purpose of my Theory is finding acids and bases with their strength in organic and inorganic fields of chemistry. This Theory explains characteristics, properties, relation, structure, strength, neutralization of acids-bases. And also it explains classification of acidbases like covalent acid bonds, and ionic base bonds. Salt is defined as additional product formed by neutralization. Strength of acids and bases defined in terms of electronegativity and electro positivity of atoms or molecules.

Download
10 Six Sense Technology: A New Era in Today’s Life
Satinder Kaur, Simmi Bagga

Abstract-Sixth Sense Technology is multi technology equipment. It has mini-projector along with a camera and a cell phone that acts as the computer connected to the internet. Sixth Sense technology can also obey hand gestures. It is the latest technology based on sensors and computers. The Camera can scans objects around a person while the micro-projector can display the information on any surface that includes the object itself or even hand also. One can also access or manipulate the information using finger gestures. The small device that has a huge number of applications that is portable and easy to carry as one can wear it in hand or in neck. The drawing application lets user to draw on any surface by observing the movement of hands or fingers. Mapping can also be done anywhere with the features of zooming in or zooming out. This paper discusses the main components and working of six sense technology. It also discusses the old apparatus of this technology and its shortcomings.

Download
11 Comparison of Space Time Block Code and Differential Space Time Block Code in Wireless Communication
Mona B Jadav, Sharda Shweta

Abstract-The demand for wireless communication systems with high data rates has dramatically increased in recent years. MIMO system at both the ends multiple Antennas are used is an efficient solution for future wireless communication system. STBC have been proposed by pioneering work of Altamonte’s code. The Alamouti’scode provide full diversity and full data rate in case of two transmit antennas. STBC is concern with maximize the transmitted information rate and minimize the error probability. DSTBC is used when perfect channel is not available at transmitter or receiver. DSTBC is a generalization of differential coding to multiple antenna system.

Download
12 Hop by Hop Message by using Signature and ID Generation for Advanced Refuge in Wireless Sensor Network
B.Sahasa, Vishnu Prasad Goranthala

Abstract-A Wireless Sensor Network (WSN) in general is a collection of small, low-cost, and low battery powered sensor nodes that communicate with each other through wireless link under highly resource constrained hostile environment. The Internet Key- Exchange (IKE) protocols are the core cryptographic protocols to ensure Internet security, which specify key exchange mechanisms used to establish shared keys for use in the Internet Protocol Security (IPSec) standards. For key-exchange over the Internet, both security and privacy are desired. For this reason, many message authentication schemes have been established, created on both symmetric-key cryptosystems and public-key cryptosystems. But it has the limitations of high computational and communication overhead in addition to lack of scalability and resilience to node compromise spells. The proposed scheme is Signature and ID generation, which are used to provide high security to message passing in Internet. This proposed method is an efficient key management framework to ensure isolation of the compromised nodes. Each node will have individual signature, and each message passing between intermediate nodes have one key to authenticate. Message passing between each nodes have an authentication using signature and key. This effective method will give high secure to message passing other than existing methods in Internet.

Download
13 Remote Sensor Network Virtualization through Remote Sensing Poreddy Anusha, Syed Abdul Moeed

Abstract-As Cloud computing is one of the emerging and successful technology in this technological era and because of the limitation of remote sensing the concept called CARS (cloud aided remote sensing) came into existence. We develop cloud-assisted remote sensing techniques for enabling distributed consensus estimation of unknown parameters in a given geographic area. We first propose a distributed sensor network virtualization algorithm that searches for, selects, and coordinates Internet-accessible sensors to perform a sensing task in a specific region. The algorithm converges in linearithmic time for large-scale networks, and requires exchanging a number of messages that is at most linear in the number of sensors.

Download
14 Promote the Confined Quality in Hybrid Wireless Networks
G.Indu, K.Arpitha

Abstract-The succeeding wireless network is Hybrid Wireless Networks. It can provide Quality of Service (QoS) requirements in real time transmission for wireless application. But it stream including critical mission application like military use or emergency recovery. Hybrid wireless networks is unified mobile ad-hoc network (MANET) and wireless infrastructure networks. It inherits invalid reservation and race condition problem in Mobile ad-hoc network (MANET). Whereas open medium and wide distribution of node make vulnerable to malicious attackers in Hybrid wireless networks. How to secure the Quality of Service (QoS) routing in Hybrid wireless networks.

Download
15 Data Transmission for Cluster Based Wireless Sensor Network Using Efficient Cryptography Approach
B.Sindhuja, J.Shyam Sunder

Abstract-This thesis presents a secure transmission of data for cluster-based WSNs (CWSNs), where the clusters are formed dynamically and sporadically. By making use of two Efficient and Trustworthy data Transmission (ETT) protocols for CWSNs, called ETTIBS and ETTIBOOS, by means of the Identity-Based digital Signature (IBS) scheme and the Identity-Based Online/Offline digital Signature (IBOOS) scheme, correspondingly. In ETT-IBS, security relies on the hardness of the Diffie-Hellman problem in the pairing area. ETT-IBOOS additionally decreases the computational operating cost for protocol security, which is critical for WSNs, while its defence depends on the stability of the problem of discrete logarithm.

Download
16 A Familiarity Based Organism for Crawl Web Forums Using Focus
Azmera Rajitha, Vijaykumar Janga

Abstract-In this paper, we present Forum Crawler under Supervision (FoCUS), a supervised web-scale forum crawler. The goal of FoCUS is to crawl relevant forum content from the web with minimal overhead, this crawler is to selectively seek out pages that are relevant to a predefined set of topics, rather than collecting and indexing all accessible web documents to be able to answer all possible ad- hoc queries. FoCUS continuously keeps on crawling the web and finds any new web pages that have been added to the web, pages that have been removed from the web. Index terms: World Wide Web, Web Forum Crawler, Web Search Engine, Crawling Policies.

Download
17 An Efficient Protective Method for Graphical Passwords Using CAPTCHA
Doolam Vinya, Mohd. Fasi Ahmed Parvez

Abstract-Today’s information systems are in a need of obvious identification between communicating entities. The Process of entity identification in general is also called as authentication. The main function of this project is to work on Banking Security. On hard mathematical problems many security primitives are based. Cyber security is an important issue to tackle. Various user authentication methods are used for this purpose. It helps to avoid misuse or illegal use of highly sensitive data. Text and graphical passwords are mainly used for authentication purpose. But due to various flaws, they are not reliable for data security. Texts passwords are insecure for reasons and graphical are more secured in comparison but are vulnerable to shoulder surfing attacks. Hence by using graphical password system and CAPTCHA technology a new security primitive is proposed. We call it as CAPTCHA as gRaphical Password (CaRP). CaRP is a combination of both a CAPTCHA and a graphical password scheme. In this paper we conduct a comprehensive survey of existing CaRP techniques namely ClickText, ClickAnimal and AnimalGrid. We discuss the strengths and limitations of each method and point out research direction in this area. We also try to answer “Are CaRP as secured as graphical passwords and text based passwords?” and “Is CARP protective to relay attack?".

Download
18 Co-Operative Clustering Method for Finest Multicast Capacity Scaling In MANET
Enabothula Mamatha, Vishnu Prasad Goranthala

Abstract-In this project, we are concentrating on capacity-delay scaling optimality for multicast traffic pattern for an i.i.d. mobility model in mobile ad hoc networks. With intelligent cooperation scheme, each destination acts equivalently as relay and helps other destinations get more opportunities of receiving packets with capacity sacrificed. The project work is design and implement the following group schemes and to simulate using NS2. The results are will be compared with using algorithms and without using algorithms to show the increase in the performance of the proposed algorithm.

Download
19 Location Privacy through Altering Pseudonyms
B. Jyotshna, Vishnu Prasad Goranthala

Abstract-In mobile networks, authentication is a required primitive for most security protocols. Unfortunately, a competitor can monitor pseudonyms used for authentication to track the location of mobile nodes. A usually proposed solution to protect location privacy suggests that mobile nodes collectively change their pseudonyms in regions known as mix zones. This approach is too expensive. Self-interested mobile nodes may decide not to cooperate and jeopardize the achievable location privacy. In this paper, we examine non-cooperative behavior of mobile nodes, where each and every node focuses at increasing its location privacy at a least cost. While in practice mobile nodes do not know their contestants’ payoffs, then we consider static incomplete data. With the help of numerical results, we will predict the behavior of selfish mobile nodes.

Download
20 A Novel Protocol to Preserve Privacy in Access Controls in an Event Processing System
H.Sai.Shanmukhi, Ananda Sruthi Mithranandhapurath, Chintakindi Lavanya Ratna Venkata

Abstract-In the present days almost all the event processing systems mainly lack in preserving privacy constraints during its event streams. Due to this lack of privacy problem a lot of shopping sites including small and large logistics users face fraud in online. As this fraud is not restricted till now there were a lot of cyber complaints that are regularly posting on each and every nearest area stations. The main problem in large-scale distributed applications is all the operations are spread over multiple security domains .For example in today’s each and every online shopping sites, we are facing a lot of frauds during content/product delivery by the shipping company. This is mainly because the purchase which is done by the customer is directly reached and delivered to the manufacturer instead of crediting that to any other parties who participate in this online purchase. This problem is mainly advantageous for the third party hackers who wish to miss-use the transaction. So in this present research work, I want to propose a fine-grained access method for processing very complex event processing tasks. Here the access policy was changed in a manner like each incoming event stream by the customer is automatically directed to the shipping company person instead of directing that directly to the manufacturer of that product. So if we choose this type of procedure the customers will not face any type of hacking problem in online. By conducting various experiments on our proposed access policy system, we finally came to a conclusion that this access control policy clearly suits for almost all types of logistics for performing their operations without any misuse in transaction.

Download
21 Extracting Relevant Data from User On- Topic by Using Personalized Ontology Model
Someswara Rama Rao Nidasanametla, Mahanthi Lokesh Sai, Pariti Adithya, Menda Satya Sravya

Abstract-Now a day’s web has become a prominent role in each and every part of human life. As all the users are surfing the web for the information and data processing, it has become a challenge to traverse all URLs in the web documents and to handle these URLs. Ontology is a process of extracting the useful information from the web; several ontologies are proposed for extracting the user profiles. This ontology model also has a facility to post feed back to the global data source based on user search data. Also the proposed paper has a facility to store the favorite links which are accessed by the web users and it is also having a comparison graph for the users and their area of interests. The comparison results show that this ontology model is successful.

Download