JCT - Volume 4 Issue 8 (August 2015)

 


Sr/No/ Title Pdf
1 An Empirical Analysis of Health Related Issues Caused by the Stress and its Significant Impact on Personal and Professional Life of Mumbai Police Force (MPF)
Jai Singh Chandramani, Chandrahauns R.Chavan

Abstract-In this paper the researcher identified the health related issues which are caused by the stress and its significant impact on personal and professional life of Mumbai Police Force (MPF). The researcher personally had taken different view from the constable, head constable, Police Sub Inspector, and Inspector and identified the effects of stress on health, which are stated as heart attack, diabetes, blood pressure, suicide or death, insomnia (sleeping disorder), depression, stomach ulcer, and others which has significantly affected the personal and professional life of Mumbai Police Force (MPF). The researcher also trying to cover all possible phases of the health issues which are caused by stress and their supporting factors.

Download
2 A Dynamic Approach to Reduce the Stress Levels and its Controlling Parameters among Mumbai Police Force (MPF)
Jai Singh Chandramani, Chandrahauns R.Chavan

Abstract-In this paper the researcher identified the ways to reduce the stress among Mumbai Police Force (MPF) which are stated as family counseling, mental health interventions, psychological help, well scheduled duty hours, weekly leave, family welfare plan, children education provisions, and new recruitment to minimize the burden of current staff. The researcher personally had taken different views from the constable, head constable, Police Sub Inspector, and Inspector and identified the controlling parameters of stress level among Mumbai Police Force (MPF) which has significantly impact on their personal and professional life.

Download
3 Value Conflict among Cross- Cultural Undergraduates In Relation To Their Spiritual Intelligence
Tina

Abstract-This research was conducted to study Value conflict among cross-cultural undergraduates in relation to their spiritual intelligence. The main objectives of the study are to study relationship between value conflict and spiritual intelligence of cross-cultural undergraduates, to find out difference in value conflict of cross-cultural undergraduates, to find out difference in spiritual intelligence of crosscultural undergraduates, to find out difference in value conflict among cross-cultural undergraduates having high spiritual intelligence and to find out difference in value conflict among cross-cultural undergraduates having low spiritual intelligence. Keeping in view the nature and objectives of the research problem, descriptive method was used by the investigator. Purposive sampling technique was employed to select a sample of 150 cross cultural undergraduates comprising of 50 Indians, 50 Bhutanese and 50 undergraduates from Zambia. Two self-constructed scales, scale on Value Conflict and scale on Spiritual Intelligence was used for data collection. For the purpose of analysis of data, the responses of cross-cultural undergraduates were analysed by using Pearson’s coefficient of correlation and one way ANOVA. The findings revealed that there exists a relationship between value conflict and spiritual intelligence of crosscultural undergraduates, there exists no significant difference in value conflict of cross-cultural undergraduates, there exists significant difference in spiritual intelligence of cross-cultural undergraduates, there exists no significant difference in value conflict among cross-cultural undergraduates having high spiritual intelligence and there exists no significant difference in value conflict among cross cultural undergraduates having low spiritual intelligence.

Download
4 Efficient Data Access in DTN using Cooperative caching
S.Jyotsna, S.Suresh Kumar

Abstract-Disruption Tolerant Networks (DTNs) carries with it mobile devices that contact one another opportunistically. During this paper, propose the first approach to support cooperative caching in DTNs, that alter the sharing and coordination of cached knowledge among multiple nodes and reduces knowledge access delay. The basic plan is to on purpose cache knowledge at a collection of network central locations (NCLs), which may be simply access by different nodes within the network. Propose Associate in nursing economical technique that ensures acceptable NCL choice supported a probabilistic choice metric and coordinates multiple caching nodes to optimize the exchange between knowledge accessibility and caching overhead. The chosen NCLs attain high possibilities for prompt response to user queries with low overhead in network storage and communication. A utility-based cache replacement theme to dynamically change cache locations supported question history, and this theme achieves sensible exchange between the info accessibility and access delay. A Contact period Aware Approach a unique caching protocol reconciling to the difficult surroundings of DTNs. To derive Associate in nursing reconciling caching certain for every mobile node per its specific contact pattern with others, to limit the amount of knowledge it caches. During this method, each the space for storing and therefore the contact opportunities area unit higher used. Intensive tracedriven simulations show that our cooperative caching protocol will considerably improve the performance of information access in DTNs.

Download
5 Securing Sensitive Data in Public Cloud Storage Systems
T.Deepanjali, Vishnu Prasad Goranthala

Abstract-Current approaches to enforce fine-grained access management on confidential information hosted within the cloud area unit predicated on fine-grained cryptography of the info. Below such approaches, information homeowner’s area unit answerable of encrypting the info afore uploading them on the cloud and re-encrypting the info whenever utilizes credentials amendment. Information homeowners so incur high communication and computation prices. A lot of overriding approach ought to delegate the {enforcement social management} offline-grained access control to the cloud, therefore to reduce the overhead at the info homeowners, whereas reassuring information confidentiality from the cloud. We have a tendency to propose associate degree approach, predicated on 2 layers of cryptography that addresses such requisite. Below our approach, the info owner performs a coarsegrained cryptography, whereas the cloud performs affine-grained cryptography on prime of the owner encrypted information. A difficult issue is the way to decompose access management policies (ACPs) specified the 2 layer cryptography is performed. We have a tendency to show that this quandary is NPconsummate and propose novel optimization algorithms. We have a tendency to utilize Associate degree economical cluster key management theme that fortifies communicatory ACPs. Our system Assures the confidentiality of the info and preserves the privacy of users from the cloud whereas deputation most of the access management social control to the cloud.

Download
6 Provides Security & Integrity to Cloud Data
K.Divya, Vishnu Prasad Goranthala

Abstract-Cloud storage services can be regarded as a typical service in cloud computing, which involves the delivery of data storage as a service, including database-like services and network attached storage, often billed on a utility computing basis, e.g., per gigabyte per month. We propose a two-level auditing architecture, which only requires a loosely synchronized clock in the audit cloud. Then, we design algorithms to quantify the severity of violations with two metrics: the commonality of violations, and the staleness of the value of a read. Finally, we devise a heuristic auditing strategy (HAS) to reveal as many violations as possible.

Download
7 Securing User Locations in Geo-Social Networks
J.Haritha, Fasi Ahmed Parvez

Abstract-Geo social networks square measure the new trend within the social networking currently every day. With the advance within the sensible phone and web technology they are achieving additional quality than before. These geo social networking sites create use of the placement info of the users. Therefore location privacy of the users may be a terribly huge concern. While not adequate privacy protection, however, these systems is simply victimized, e.g., to trace users or target them for housebreaking. Thereforeprivacy should be provided so as to preserve the placement of the users. During this paper we have a tendency to compare totally different location privacy settings which will be introduced in geo social applications and different strategies that square measure currently adopted to produce security to the users..

Download
8 Peer to Peer Distributed Data Management in Cloud
Farzana Begum, K. Rajesh Khanna

Abstract-The corporate network is usually used for sharing data among the collaborating corporations and facilitating collaboration during a bound trade sector wherever corporations share a typical interest. It will effectively facilitate the businesses to cut back their operational prices and increase the revenues. However, the inter-company information sharing and process poses distinctive challenges to such an information management system together with quantifiability, performance, throughput, and security. During this paper, we tend to gift Best Peer++, a system that delivers elastic information sharing services for company network applications within the cloud supported Best Peer—a peer-to-peer (P2P) primarily based information management platform. By desegregation cloud computing, database, and P2P technologies into one system, Best Peer++ provides a cost-effective, versatile and climbable platform for company network applications and delivers information sharing services to participants supported the wide accepted pay-as-you-go business model. we tend to value Best Peer++ on Amazon EC2 Cloud platform. The benchmarking results show that Best Peer++ outperforms Hadoop dB, a recently projected largescale processing system, in performance once each systems area unit used to handle typical company network workloads. The benchmarking results conjointly demonstrate that Best Peer++ achieves close to linear quantifiability for outturn with regard to the amount of peer nodes..

Download
9 Modulation theorem for Laplace Weierstrass transform with some properties
S.S. Mathurkar, D. D. Pawar

Abstract-Our object in this paper is to establish modulation theorem for Laplace Weierstrass transform. And also develop some properties for the same.

Download
10 An application of second order Ramanujan numbers
S.Vidhyalakshmi, A.Kavitha, M.A.Gopalan

Abstract-We search for four non-zero distinct integers such that the sum of any two of them is a perfect square by applying triple coincidence among second order Ramanujan numbers.

Download
11 A Survey: Enabling data security and Integrity Verification of cloud data Storage
Jitendra Dwivedi, Jitendra Sheetlani

Abstract-Cloud computing era is the recent trend in data storage and computing at other end in IT market where cloud provide a reliable and fast computing. Cloud are ease to access and various security encryption techniques been added to the cloud. Three layer architecture provide a best security model among the tradition storage technique. HLA and AES technique is recently used encryption technique where data store in encrypted form which can be unpack by the original user towards the data scheme, an efficient auditing and hashing technique such as MAC, SHA been introduced by the several research article. In this paper we discuss about the various technique used in this era and the proposed dynamic auditing can be perform in cloud computing for ensuring the data integrity. A verification technique for data store is going to perform well in our proposed research work.

Download
12 Travelling Based Hybrid Recommender System
Monika khandelwal, Mukesh Kumar, Sitesh Sinha

Abstract-One of the major data mining application is recommender system .It is the intelligent systems that suggest us about what we are searching for and make our searching process much easier. That also suggest us data resides in system related to our search .these recommender system are generally application specific and work on certain parameters. In this present work we defining a hybrid recommender system suggested the user about the location that they should visit after intelligent analysis.in this way by this system we give user an analytical way to visit different location .in this present work we are defining three element of hybridization to get the concept of hybridization. First element motion awareness, it basically perform the analysis based on the user location second element is the users choice, that will be concern about users past experience of visit and third one is temporal analysis which is concern about time stamp. So it will need to provide proper information about the spatial features and season of the landscapes and also about the climate of location so in this way it is vital to know about the location by which we make a right choice.

Download
13 Preventing Sybil Attack Using Anti-Image Spamming Technique
Salil Puri, Mukesh Kumar, Sitesh Kr. Sinha

Abstract-Sybil Attack as of multiple identities for malicious intent named after the famous multiple personality disorder patient "Sybil”. This particular attack has been used by spammers to create multiple websites or id’s with identical domain names with junk and duplicate content. These pages have no quality content and are created just with the intention to create spam and drive traffic .All these webpages are interlinked to each other in order to boost their search engine traffic. In Sybil attack each node can be preferred to as a separate webpage that the spammer creates, and each of these webpages interlink to each other thus forming a network similar to link farms. The spamming webpages link to other nodes and thus create a huge linked for improving popularity. In this paper we are introduce anti-image spamming technique for preventing to Sybil attack to attackers .Our objective is to work on to the real time research desired scenario where the work is needed to be done. Sybil attack is one of the scenario where a work has been done to deal with Sybil attack efficiently in some of the field but still there are more has to be done which we want to carry forward with the help of spamming image detection and prevention technique with the help of image antispamming technique. In our main objective is to remove or block unwanted Sybil attack on the basis of images.

Download
14 Enhancing QoS on DSR using secure Algorithms
Swarnika Tiwari, Sandeep Monga

Abstract-In this paper we are presenting a technique for routing & regarding the Quality of services, we are using various encryption algorithm for the use to keep maintaining & transforming their data securely using DES, digital signature & plain cipher text algorithm.

Download
15 Efficient Card Fraud Detection Technique Using Hybrid Approach
Vivek rai, Satyendra Singh Thakur

Abstract-Due to the rise and rapid growth of ECommerce, use of credit cards for online purchases has dramatically increased and it caused an explosion in the credit card fraud. As credit card becomes the most popular mode of payment for both online as well as regular purchase, cases of fraud associated with it are also rising. In real life, fraudulent transactions are scattered with genuine transactions and simple pattern matching techniques are not often sufficient to detect those frauds accurately. Implementation of efficient fraud detection systems has thus become imperative for all credit card issuing banks to minimize their losses. Many modern techniques based on Artificial Intelligence, Data mining, Fuzzy logic, Machine learning, Sequence Alignment, Genetic Programming etc., has evolved in detecting various credit card fraudulent transactions. A clear understanding on all these approaches will certainly lead to an efficient credit card fraud detection system. This paper presents a survey of various techniques used in credit card fraud detection mechanisms and evaluates each methodology based on certain design criteria.

Download
16 A Novel Skewness Algorithm for Dynamic Resource in Cloud Environment by Means of Virtualization
Subhalaxmi Annamreddi, Enapakurthi Sateesh, Vechalapu Alekya

Abstract-Cloud Computing is one of the fascinating domain in recent research area where all the data is usually processed remotely in unknown machines those users do not own or operate. As cloud computing has increased user attention in storing their valuable data but limits in allocating resources dynamically. As the utilization of cloud server resources is not done properly in the current cloud there was a lot of problem faced by all cloud users while allocating cloud server to access the data. So in this paper we have implemented a new concept called as Virtualization to allocate the cloud resources dynamically based on individual user demands and supports green computing by optimizing the number of servers in use. Generally the term “virtual” means not actual, where all the resources are stored in virtual manner not really installed on the current hardware. We also introduce a new concept called as “skewness” in order to estimate the unevenness of a server in the multi-dimensional utilization. By conducting various experiments on these new virtualization techniques, we finally came to a conclusion that this is the approach which is implemented for the first time on cloud servers in order to optimize the allocation of cloud servers dynamically and reduce the allocation cost.

Download
17 Improving Security using Graphical Passwords based on AI Problems
Zareena, S.Suresh Kumar

Abstract-Textual passwords are the foremost common methodology used concerning authentication. However matter passwords are accountable to eves dropping, manuscript attacks, community engineering and shoulder browsing on. New security primitive betting on exhausting AI issues, namely, a completely unique category of graphical parole systems engineered over Captcha knowledge, that decision Captcha as graphical passwords (CaRP). CaRP is each equally a Captcha and a graphical parole theme. CaRP conjointly provides a completely unique approach to treat the well-known photograph hotspot drawback within fashionable graphical code systems, such since Pass Points, which regularly leads to weak parole alternatives. CaRP is not a remedy, however it offers affordable security furthermore as usability and seems to suit well having some sensible applications for up on-line security and implement for Text may well be combined with footage or colors to get session passwords concerning authentication. Session paroles are often utilized just one occasion and whenever a replacement password is often generated. The 2 techniques are projected to get session passwords creating use of text and colors that are immune to neck surf riding. These strategies are appropriate for private Digital Assistants for steer away from the any vulnerable attackers.

Download
18 Design of Advanced SiGe Bicmos Inverter for High Speed Register Files Using Mentor Graphics
Shilpa Sharma, Priyanka Verma

Abstract-The register file is the core component having high-performance processors due to its direct impact on the cycle per instruction of CPU. SiGe HBT and bicmos technology is used for high-clockrate processors that used in high-speed registers files. The NFETs and PFETs show on-current degradation and negligible transconductance. The NFETs reduced shallow trench isolation leakage as compare to NFETs implemented in prior SiGe Bicmos processors.

Download
19 Enhanced Cryptography Technique: By Integrating Color and Arm Strong Numbers for Data Transfer
Medisetty Revathi, Aswadhati Sirisha, Santosh Kumar Sharma

Abstract-Now a day’s security plays a very important role in almost all aspects of human life. As security plays a very important role in current days, there was many security primitives evolved in order to give high level of security to the data.Eventhough many security primitives are available in real world scenario a lot of third party users try to get access illegally over the hidden data. Cryptography is the first and early process that has been evolved in order to provide security for the data by encrypting the plain text into cipher text with any of the following techniques like public/private key cryptography. For implementing these cryptography algorithms we require S-Box as major source for transformation and substitution, which is almost known for all the hackers who try to get access of the hidden data with the hacking codes. So in this paper for the first time we try to implement the security using color and arm strong number as input keys for the data which is to be hidden. So by using this color as input it will take 3 RGB values as input for the hidden data and Armstrong number additionally gives more security for the data by doing exclusive-or operation on the data. By performing various experiments on the proposed method, our simulation results on various types of hidden data clearly tells that our proposed novel color as security is having high level of security when compared with primitive cryptography algorithms.

Download
20 A Novel Prototype for Route Navigation by Using GPS along with Google Maps
NVS Lavanya, Sk.Althaf Rahaman, Santosh Kumar Sharma

Abstract-Now a day’s car navigation system is considered as one of the most important application of several navigation system used by drivers. Global Positioning Systems (GPS) are being used as main source for a wide variety of applications. Navigation systems use google maps as source for vehicle route navigation. Almost in all navigation systems there was only route navigation displayed from the specified source and destination. There was no facility of displaying routes which are having no traffic or at least less traffic, this leads the drivers to drive in the way almost which is having more traffic and in turn leads to delay. Also there was no facility of displaying the routes in a shortest path. So in this paper we try to implement a Novel Live Traffic Indicator based on air index in which all the paths will be available for the driver based on shortest path with no traffic. By performing various experiments on the proposed method, our simulation model clearly states that this model is the first time to be implemented in car navigation systems that reduces a lot of delay for the drivers who are very new to city.

Download
21 Design and Analysis of NSD Approach on WSN in order to filter out the Impact of Attackers during Data Transmission
Enapakurthi Sateesh, CH.Sunil

Abstract-A wireless sensor networks (WSNs) is a group of specialized nodes which uses a radio to monitor and record the physical or environmental conditions. Now a day’s wsn’s are increasingly used in many applications, such as volcano occurrence and fire monitoring system, urban sensing, and perimeter surveillance. As these are increasing its usage in almost every field like volcano identification, fire alarm alert system and so on, there were some problems that occur during its usage. The main problem we consider while using these WSN is data aggregation which is nothing but adding some partial results that is not original at the intermediate nodes during message routing. As the data aggregation is a new concept which will be invoked at the time of network re-assignment time, which sometimes releases a lot of loss during diffusion. So inorder to reduce this loss of data aggregation during diffusion we have proposed a new concept in this paper which provides almost a loss-resilient aggregation framework also known as Novel Synopsis Diffusion (NSD).In this paper we have implemented this new NSD method inorder to address the problem of various attackers who try to create a problem or loss during transmission. For implementing this proposed concept we need to use the novel predicate logic inorder to expect the network loss during diffusion at the time of selecting the nodes. As an extension we have implemented this proposed new NSD technique on a network simulator which was purely implemented in java inorder to show the performance of network failures. By conducting various experiments on the proposed NSD technique we can able to identify the packets loss as well as delivery rate of packets between source and destination and also able to prove that this is the technique which was implemented for the first time inorder to optimize the loss during diffusion. As a proof of concept we have proved the proposed concept on Java using network simulink.

Download
22 Design and Analysis of an Automatic Network Testing System to Detect Network Failures
Vadapalli Geetha, S. Neeraja, Ramesh Challagundla

Abstract-Troubleshooting computer networks is becoming increasingly challenging, mainly driven by the increase in the complexity of the networks. Administrators follow some complex, tedious processes and tools like SNMP; Ping &Traceroute to make sure that the network is operating as designed and to identify faults. Typically, an administrator invokes these tools manually after seeing some signs of fault. This work presents an Automatic Network Testing System (ANTS) that automatically generates test packets to verify the network based on the network topology and the operational configuration. It periodically sends those test packets to identify faults as soon as they occur without any manual intervention. ANTS can detect both functional and the performance faults. Once a fault is detected, ANTS uses Fault Localization to localize the fault source to a specific link or a specific configuration that is failing. This work also adds Sensitivity customization, which enables for example an organization to customize ANTS to give more priority to firewall testing for their security needs while another organization with liveliness critical business can customize the same for liveliness/QoS. Once customized for sensitivity, the tool automatically identifies those test packets related to their need and sends only those packets more frequently. The system also provides Rapid Recurring Fault Detection capability. When this is enabled, test packets that detected failures in the past are sent frequently than the other test packets. Sensitivity customization and Rapid Recurring Fault Detection allow the users to use the system to detect the failures that are important to their business and the failures that have more probability of occurrence. Example Results from various experiments conducted on the proposed system show that this tool could potentially be used by the network administrators to automatically identify & locate the faults/problems in the network thereby saving their time and energy.

Download