IJAIR- Volume 5 Issue 10 (October 2016)


Sr/No/ Title Pdf
1 Impact of Exogenous Abscisic Acid Pretreatment on the Antioxidant Activity of Suaeda maritima under Salinity Stress
G. anbarasi, S.T. Somasundaram

Abstract — Salinity stresses are a serious menace to agriculture productivity. Salt stress exerts its negative effects first and foremost by causing water shortfall which further leads to the formation of Reactive Oxygen Species (ROS). These ROS are capable of causing oxidative damage to different cellular compounds which includes membrane lipids, protein and nucleic acids. Plants generally utilize different antioxidant enzymes such as superoxide dismutases (SOD), Catalase (CAT), Ascorbate peroxidase (APX), Glutathione-S- transferase (GST) and glutathione peroxidases (GPX) to scavenge ROS. The plant hormone abscisic acid (ABA) also acts as a free radical scavenger and more important in overcoming stress than in acting as a simple osmolyte. Thus, this present study focused on the effect of exogenous abscisic acid on enzymatic scavenging activities of antioxidant enzymes such as SOD, POD, CAT, APX and GST to control ROS levels were studied in the leaves of salt tolerant variety of S.maritima.

2 Classification and Comparison of routing Protocols in Wireless Sensor Networks
N.Sivakumar, V.Yuvaraj, S.Vasanthakumar

Abstract — The recent advances and the convergence of micro electromechanical systems technology, integrated circuit technologies, microprocessor hardware and nanotechnology, wireless communications, Ad-hoc networking routing protocols, distributed signal processing, and embedded systems have made the concept of Wireless Sensor Networks (WSNs). Sensor network nodes are limited with respect to energy supply, restricted computational capacity and communication bandwidth. Most of the attention, however, has been given to the routing protocols since they might differ depending on the application and network architecture. To prolong the lifetime of the sensor nodes, designing efficient routing protocols is critical. Even though sensor networks are primarily designed for monitoring and reporting events, since they are application dependent, a single routing protocol cannot be efficient for sensor networks across all applications. In this paper, analyze the design issues of sensor networks and present a classification and comparison of routing protocols. This comparison reveals the important features that need to be taken into consideration while designing and evaluating new routing protocols for sensor networks.

3 Survey on Crop Yield Prediction Using Agriculture Dataset
Vaishnavi S, Jayapritha S, Dharani M, Gowtham S

Abstract — Agriculture plays a major role in Indian economy and it is a main source of income. Data mining plays an important role in agriculture. The proper selection of crops for sowing is very important for good yield prediction. In olden days farmer’s experience on a particular field and crops are considered for yield prediction. So there is a need to transfer the huge amount of data available in the lab and agricultural universities into information which helps the farmers predict the good yield. This can be made possible with the data mining techniques.

4 Design and Simulation of 1D DHT for communication based applications
Rajni Jounjare, Poonam Sinha, R. P. Singh

Abstract — The data in time domain can be converted or transformed into frequency domain with the help of one of the transforming technique like Discrete Hartley Transform using real values. For highly modular and parallel processing of data applications in VLSI design, DHT can be used. We have proposed a new algorithm for calculating DHT of length 2N, where N=3 and 4. As an [We have implemented multiplier as an improvement in place of simple multiplication used in conventional DHT. This paper gives a comparison between conventional DHT algorithm and proposed DHT algorithm in terms of delays and area.

5 Analysis of selected anthropometric parameters and physical fitness components among various age categories of Handball players
R. Balasubramani, C.Santhaarsan, S.Rameshkumar

Abstract — The purpose of study was to find out the analysis of selected Standing Height, Body Weight, Leg Length, Arm Length, Arm span, Hand length, Hand span Speed, Muscular strength, Explosive power, Agility compents among various age categories of handball players. For this study 16 to 18 years, 19 to 21 and 22 to 24 years of male Handball players 40 each were randomly selected from, various school and college in tamilnadu. The subjects had past playing experience of at least three years in Handball and only those who had represented their respective school College were taken as subjects. The subject’s age ranged between 16 and 24 years. A series of physical fitness tests was carried out on each participant. These included height assessed by stadiometer, weight assessed by weighing machine, Leg Length, Arm Length, Arm span, Hand length, Hand span assessed by small bone caliper centimeters. Speed assessed by 30mts dash, muscular strength assessed by sit-ups, explosive strength assessed by vertical jump, agility assessed by shuttle run. The collected data from the three groups of the selected variables were statistical analyzed to test the significance of the mean difference and the groups on selected criterion variables one-way analysis of variance (ANOVA) was used. In case of significance pair of group was high among others as post-hoc test, (Turkey’s HSD test) was applied of mean difference observed on the criterion measure to find out which.

6 Survey on Web Usage Mining Techniques
R.Umamaheswari, K.Saraswathi

Abstract — Web usage mining is the part of web mining techniques. This web usage mining(WUM) can be used to identifies the data from the web log servers.The WUM involves three types, Data Preprocessing , Pattern Discovery & Pattern Analysis. world wide web it provides the lot of information . The web mining is used to discover and extract useful information from the web sites.web mining is used to gather the important information from customers visiting the site.Web mining can be classified into three types Web Content Mining, Web Structure mining, Web Usage Mining. Web content mining is used to search information of resource available in online. Web structure mining is used to structure of hyperlink with in the web itself. Web usage mining is used to used to log data stored in the web server.

7 Fuzzy Inventory Model without Shortages using Triangular Fuzzy Numbers
S. Rexlin Jeyakumari, S.Merline Laura

Abstract — In this paper, we studied Economic Order Quantity (EOQ) inventory model without shortages. Our goal is to determine optimal order quantity for the proposed model. The purchasing cost, ordering cost, holding cost and screening rate are fuzzified. The function principle is used for fuzzy operation. We also provide an expression of the optimal order quantity for the case that all of the four parameters are triangular fuzzy numbers. A numerical example is provided to illustrate the proposed model and assess the effects of fuzziness of the parameters on the optimal solution..

8 The Novel Approaches on Big data and the Hadoop Environment
R. Ganeshkumar, Dr. A. Marimuthu

Abstract — The term big data is very large data sets that may be analyzed computationally to reveal patterns, trends and associations especially relating to human activities and communications. These large data sets processed its size (volume), complexity (variety), speed of data (velocity), potential value (value), noises (veracity) make them difficult to capture, manage, analyzed and increasing its processing speed. To analyze this huge amount of data Hadoop framework can be used. Hadoop is an opensource software for distributed storage and distributed processing of very large data sets on computer clusters built from product hardware. The heart of Apache hadoop consist of a storage part is called HDFS (Hadoop Distributed File System) and processing part called Map Reduce. The technologies used by big data application to handle the enormous data are hadoop framework, Map Reduce, HDFS, HPCC and Apache Hive. These technologies handle large amount of data in GB (Giga Byte),TB (Tera Byte),PB (Peta Byte),EB( Exa Byte),ZB (Zeta Byte),YB (Yotta Byte),BB (Bronto Byte) and GB (Geop Byte).

9 Machine learning as a last line of defense against spam emails
Elkhmasi Mustafa Asma

Abstract — In this paper various learning based algorithms for classification of text messages as spam or non-spam. A number of learning based algorithms was tested with the emphasis on the importance of extraction of "good" feature vectors in order to improve the performance of classifiers. We did not focus in our paper on the feature extraction itself. The analysis of the testing results showed that, in terms of accuracy, there is no benefit in utilization of support vector machine algorithms or ensemblelearning algorithms compared to the naïve Bayesian algorithm. The tests have also shown that improvement of performance of NB can be achieved by extracting more meaningful classification features.

10 Cost Optimization Techniques for Software Testing
Avinash Yadav

Abstract — Software Testing is an area of software engineering where software is to be tested with several techniques. As it is well known that software testing is supported by various test cases. All test cases are used to manipulate software for proper utilization of resources and minimize the software cost as well as less execution time. In this paper, it has been focused on the various existing software testing and optimization techniques, proposed by various authors. To optimize the software, Identification, characterization and automatic prioritization of test cases in software testing are being used by optimization techniques.

11 Wireless Network: A Study On Phishing Attacks
Saurabh Varma

Abstract — Many of us connect to Wireless Fidelity (Wi- Fi) without knowing what specific threats one is vulnerable. The list of vulnerabilities is large by nature, and most of these ignored by users. Computer networking has made collaboration necessary to both attackers and defenders. Phishing attacks combine technology and social engineering to gain access to restricted information. The most common phishing attacks today send mass email directing the victim to a web site of some perceived authority. This paper is focused on wireless network and phishing attacks.

12 Performance Evaluation of a Proactive Multipath Routing Protocol for Mobile Ad Hoc Networks
Shubham Tiwari, Saurabh Varma

Abstract — Researchers has been developed various routing protocols for Mobile Ad-hoc Networks (MANETs). Each protocol proposed and designed so far has its own merits and demerits. Researchers are trying continuously to develop advance routing protocols that can route messages towards their destination in an efficient way while consuming minimum amount of bandwidth and battery. In this work we are considering two well known MANET routing protocols, (1) Ad-hoc On-demand Distance Vector routing protocol, (2) Optimized Link State Routing protocol, and we have combined their preferred properties to formulate a new Hybrid routing protocol. In this paper we have proposed a routing protocol in hybrid category with the target of increasing the packet delivery ratio (PDR), throughput and decreasing end-to-end delay. Our extensive simulation based experimental studies shows that the performance of proposed Hybrid Multipath Progressive Routing Protocol is better than the AODV, OLSR and ZRP on above and many other parameters. We have simulated the results on Exata Cyber 1.1.

13 Software Testing Process-Analytical Study on Challenges & Proposed Solutions
Avinash Yadav

Abstract — Service oriented architecture (SOA) is one of the latest software architectures. This architecture is created in direction of the business requirements and removed the gap between softwares and businesses. The software testing is the rising cost of activities in development software. SOA has different specifications and features proportion of the other software architectures. First this paper reviews SOA testing challenges and existing solution(s) for those challenges. Then that reports a survey of recent research to SOA systems testing, that covers both functional and non-functional testing. Those are presented for different levels of functional testing, including unit, integration, and regression testing.

14 Performance Study of Node-Disjoint Multipath Routing for Mobile Ad-hoc Networks based on QoS
Shubham Tiwari, Anil kumar, Avinash Yadav

Abstract — Recently, quality-of-service routing in dynamic, wireless multi-hop ad hoc networks becomes a hot research topic, and various QoS protocols are proposed Even so, popular QoS routing protocols rarely provide multiple routes. Once links break due to node mobility, establishment of new routes leads to large control overhead and more end -to-end delay. In MANETs to support multimedia applications such as video and voice require an efficient routing protocol and quality of service (QoS) mechanism. Node-Disjoint Multipath Routing Protocol (NDMR) is a practical protocol in MANETs: it reduces routing overhead dramatically and achieves multiple node-disjoint routing paths. In MANETs QoS support is an important issue as besteffort routing is not efficient for supporting multimedia applications. This paper presents a novel adaptation of NDMR, QoS enabled NDMR, which introduces agent-based SLA management. This enhancement allows for the intelligent selection of node-disjoint routes based on network conditions, so fulfilling the QoS requirements of Service Level Agreements (SLAs).

15 A Review, Challenges and Mitigations of Cyber Attacks

Abstract — The objective of this paper is how to protect data from the cyper attacks and provides cyber security to on line users (ICT-Information and Communication Technology). Now a day’s all the organizations completely depends on line data and huge volume of transactions done through on line only. For example, Net Banking (money transfer from one account to another), Ticket Booking and on line purchasing through ECommerce portals. Since the volume of transactions done through online is increasing day by day we have to protect our data and customer data safer from the attackers. This paper is to throw light on factors that implementation of cyber security. Cyber security is a set of people, process and technical practices aimed at protecting critical infrastructures, digital business and sensitive information from internal and external threats or negligence. This paper investigates practical solutions to the implementation of cyber security.

16 Design of Directional, High Bandwidth, High Gain Antenna for 2.4 GHz WiFi Data Card
Gaganpari, Devyanshu Rao

Abstract — With increase in the automation and communication in our daily life, wireless technology has evolved a lot. For this reason, WiFi technology has also received a lot of attention from scientists and engineers from various domains. Miniaturization of WiFi transceivers has also lead to the researches in reducing the size of antennas involved. The work here targets wall mounted mini WiFi access points commonly available nowadays. Present work designs an antenna that is small in size and is also at the same time very good in its performance. It has always been a challenge for antenna designers to improve gain and bandwidth at the same time. This antenna design manages to achieve very good gain and bandwidth. The antenna design is inspired from parasitic antennas. It is a directional antenna with operating frequency ranging from 2.32 GHz to 3.32 GHz. Bandwidth of 1 GHz is achieved. Maximum gain is more than 5 dB.

17 Design and implementation of high speed and area efficient hybrid subtractor using M.G.D.I Technique
Ankita Jain, Utsav Malviya

Abstract — Subtractors form one of the important components of every contemporary integrated circuit. The basic requirement of the subtractor is that it should be fast and efficient in terms of power consumption and chip area. Optimization of several devices for speed and power is a significant issue in low-voltage and low-power applications. These issues can be resolved by incorporating Modified Gated Diffusion Input (MGDI) technique. The current work proposes the design of a full subtractor using Modified Gate Diffusion Input (MGDI) procedure which is proposed to consume low power in conjunction with lesser delay time and fewer transistors while maintaining proper output-voltage swing. Here four design of full subtractor has been designed using MGDI technique. All these design are based on 65nm CMOS foundry. The software used to design schematic circuit is DSCH tool and for layout generation Microwind has been used.

18 Analyzation & Implementation of Full Subtractor Circuits Designs Using Modified Gate Diffusion Technique
Ankita Jain, Utsav Malviya

Abstract — This paper mainly focused on designing Full Subtractor by a new technique called MGDI technology. Here two basic design of full subtractor has been designed using MGDI technique. The software used to design schematic circuit is DSCH tool and for layout generation Microwind has been used.

19 Design of Arinc Serial-communication protocol using Verilog HDL
Rachit Nema, Raj Gaurav, Abhishek Singh

Abstract — In following paper we write serial communication protocol for ARINC 429 with the help of Libero SoC v11.6 using Verilog HDL (Hardware Description Language) finite state machine logic and get some simulation results.

20 Review on Input Vector Monitoring concurrent BIST Architecture Design for a Multiplier
Kritika Sharma, Aman Saraf

Abstract — The problem arises at the time of testing in VLSI circuits and systems can be handled with the help of Built-In Self-Test (BIST) technique that constitute an attractive and practical solution. Input vector monitoring coexisting BIST schemes perform testing concurrently with the operation of the circuit. This paper presents a novel input vector monitoring concurrent BIST scheme that compares auspiciously to previously proposed schemes with respect to the required hardware overhead.

21 Power Controlling Through Internet of Things in Mobiles
Ganta rama mohan Reddy, E.Madhusudhana Reddy, S. Vikram Phaneendra

Abstract — Normally any electronic product states will be changed based on the switch. Every switch will be work on the manually operated. At that time two problems are occurred. Number one is power attacking to human and one more problem is we are not operated from the outside of home. In this paper proposed methodology is by using Internet of Things (IoT) we can control the electronic equipment’s. Here we are using ardino chip that will be inserted at the stating of the electronic product power supply. Ardino chip has attaching Ethernet shell is presented. Ethernet shell will be helpful for supporting the Internet. At this time we can operate the electronic products from any place and also no chance for power attacking.

22 Effect of Growth Regulator and Irrigation on Fruit Cracking and Yield of Litchi in the Hilly Area
S. N. Mozumder, S. M. Faisal, D. Sultana, Z. A. Firoz, Dr. Shailendra Nath Mozumder

Abstract — The experiment was conducted at the Hill Agricultural Research Station, Ramgarh, Khagrachari Hill District during July, 2010 to June, 2011. A factorial complete randomized design was followed with three irrigation levels (at 7, 15 days intervals and control) and four chemical treatments viz. GA3 100ppm, Ethephone 18 mmole/l, 1% ZnSO4 and control with three replications. Both the factors irrigation and chemical showed significant effect on most of the yield attributes and fruit characters. Irrigation significantly increased litchi yield by increasing number and size of the fruits as well as reduced cracking. Ethephone and GA3 reduced cracking whileZnSO4increased number of fruit and yield. Edible portion (%) seed size and TSS had minimum variation with irrigation or chemical spray. Any one of the three chemicals (Ethephone, ZnSO4or GA3) spray with weekly irrigation increased marketable yield of litchi in the hilly areas of Bangladesh.

23/td> Study on Applications of String Searching and Matching Algorithms
P.Sundari, S.Deepasamili

Abstract — The experiment was conducted at the Hill Agricultural Research Station, Ramgarh, Khagrachari Hill District during July, 2010 to June, 2011. A factorial complete randomized design was followed with three irrigation levels (at 7, 15 days intervals and control) and four chemical treatments viz. GA3 100ppm, Ethephone 18 mmole/l, 1% ZnSO4 and control with three replications. Both the factors irrigation and chemical showed significant effect on most of the yield attributes and fruit characters. Irrigation significantly increased litchi yield by increasing number and size of the fruits as well as reduced cracking. Ethephone and GA3 reduced cracking whileZnSO4increased number of fruit and yield. Edible portion (%) seed size and TSS had minimum variation with irrigation or chemical spray. Any one of the three chemicals (Ethephone, ZnSO4or GA3) spray with weekly irrigation increased marketable yield of litchi in the hilly areas of BangladeshMany organizations gather huge amount of data to maintain their business and decision making process. The data gathered from different sources can have data features problems. These types of problem become familiar when different databases are combined. The data in the combined structure need to be cleaned for appropriate decision making. Cleansing of data is one of the major critical problems. In this survey, focus is on one of the major issues that varies duplicate detection and search process using string searching and string matching algorithms.

24 Factors Influence Performance of Direct Methanol Fuel Cell – A Review
J.Dinesh a, M.Easwaramoorthi, M.Muthukumar

Abstract — The review paper includes introduction of the Direct Methanol fuel cell (DMFC) and Description of water management and methanol crossover problems in DM fuel cell. DM fuel cells are working at low temperature and atmospheric pressure. As DM fuel cell has high efficiency, they are widely used for mobile and stationary applications. The performance of DM fuel cell depends on temperature, pressure, humidity and transport phenomena inside the cell, membrane conductivity, water management, methanol crossover, flow field design parameters. There are several technical problems to be solved in order to achieve practicability and popularization. Especially, water management and methanol crossover inside a DM fuel cell is essential for high performance operation. This paper shows the recent work done for improvement of the performance of DM fuel cell. With the help of this studies, we observe that the fuel cell performance develop by Increasing the relative humidity, temperature, pressure and using the various flow fields. The aim of this study is to explore the factors influence performance of DM fuel cell.

25 Knowledge Based Resource Provision And Allocation In Cloud Using Auction Method
Sabitha.S, Sandhiya.M, Sri Hari.R, Vidya.S

Abstract — Cloud computing is one of the fastest emerging technology. Cloud is a wide pool of resource, which provides resources based on the users request. As there were more resources there may occurs wastage. So the cloud providers enter in to the auctioning of resources. Allocation of resource is one of the most challenging issues in resource management for cloud computing. In this paper auction based approaches is presented to deal with a problem of resource allocation at IaaS layer of cloud among rational users and to incentivize selfish providers. The proposed mechanism calculates the usage of VM instance allocated to the user for a particular period of time and efficiently allocates the VM instance for future purpose.

26 Automated Testing Tool for Different Coverage Metrics
Shiva prasanth A , Dhanalakshmi S, Shilpa S, kalyanisankar S

Abstract — Software testing is a critical element of software quality assurance and represents the ultimate review of specification, design and coding. It is an important activity carried out in order to improve the quality of the software. The main aim of this testing approach is to find the errors and to make the working of the software in efficient manner. Thus testing can be carried out by finding the test cases. A good test case is one that should have the high probability of finding the errors. There are different testing approaches and they are path coverage, branch coverage, code coverage.It is a popular approaches to measure the thoroughness of test suites. For each testing approach there are different tools available. In this paper we proposed the technique that are used to find the coverage metrics and common tool that can test all the coverage.

27 Energy Dissemination Clustering for Mobile Sink Based Heterogeneous Wireless Sensor Networks
Neha Thakur, Manoj Kumar, Santosh Kushwaha

Abstract — In Wireless Sensor Network, the energy efficiency is the key issue for designing the protocol because sensor nodes have one time battery backup. There are many modern protocols which extend the lifetime of the wireless sensor network by efficiently using battery power of the sensor node. In this paper, we propose Energy Dissemination Clustering for Mobile Sink Based Heterogeneous Wireless Sensor Networks. We analyze and compare the performance and results of modern protocols like LEACH, SEP, ESEP, TEEN and EDDEEC with proposed work. The simulation result shows that performance and throughput of our proposed work gives the effective and significant energy efficiency as well as more network lifetime compared to other protocols.