JCT - Volume 5 Issue 2 (February 2016)

 


Sr/No/ Title Pdf
1 Energy Efficient Techniques for Transmission of Data in Wireless Sensor Networks
Dr. M. Senthil Kumar

Abstract- In this paper, wireless sensor networks have made the practical deployment of various services possible, which until a few years ago was considered extremely costly or labor intensive. The proposed model named as routing and multicast tree based technology has been designed for under water sensor networks. The protocol implementation for the application at hand must take care that power management strategies are employed at all layers beginning from proper hardware installation to proper selection of operating system. It provides a mathematical model for determining the optimal number of nodes in each cluster, so that the network is always an energy balanced state after the proposed multi hop data dissemination takes place. This paper informs the latest strategies and techniques of sensor management schemes and other technical issues.

Download
2 Reduce Network Latency Downtime and Improve Web Service Retrieval Time Using Zone Based Frequency Partition Technique
S.Jayamoorthi, A.Gokul, V.Ashwath Vickram, S.Chandru

Abstract- In past few years the network users rapidly increased in the entire region especial in our Asian region then will be a more amount user the Internet services. But the Bandwidth & frequency used by all the region server for over the global is not equal so that variations identified in the following criteria such as frequency, bandwidth, time delay, latency, response time, etc. For this analysis the Downloaded time for receiving data from US server is 0.4 second sat the same time data we received from our region will takes 0.16 seconds approximately. In order to overcome this issues proposed method called zone passed frequency partitioning technique(ZBFPT) to regulates the data flow between all the regional server in almost equal i.e, 12.4 mlli sec variations approximately while implementing this concept in real time scenario. In our simulation work it is observed that 20% of overall improved efficiency rate. (In future is implemented with in every region network service provider to ISP/Server to improve the response time).

Download
3 A High spectral Efficiency Transmission with iterative Polar modulation in optical Network
M.S.V.Vara Prasad, K.S.V.Sambasivarao, K.Krishna Murthy

Abstract- The significance and importance of a fiber-optic communication increases with a revolutionary advancements in optical transmitters, detectors, high purity optoelectronic material components, optical sources makes the fiber optic technology the fastest growing communication technology in the world. This revolution causes to produce improved bit error rate, low loss, reliable and secured communications. In multiple services, the UWB wired and wireless communications have been developed tremendously to meet the low complex, low cost, low power consumption, high data rates specifications. In the present work, an attempt is made to use with and without reuse modulation scheme based using MATLB /SIMULINK model. Observations are made at different SMF distance and noted the values of BER and SNR. In WDM PON system IPQAM gives better performance as compared to other format. We are interested to perform the error probability and signal to noise ratio analysis using MATLAB graphical user interface. By increasing signal to noise ratio the error probability decreases linearly from maximum to minimum with respect to that the channel capacity varies. In IPQAM the above said observations is much more linear, from this we conclude the IPQAM format gives the very high improved channel capacity in OFDM Communications system. IPQAM Technique is use full in OFDM and also coded OFDM optical communication networks. Comparatively IPQAM gives more channel capacity in optical networks than QAM. The above modulation techniques such as QAM and IPQAM modulations propagate the signal in different way in high speed optical transport network. Additionally the IPQAM allows a further understanding the issues of now a day’s optical transmission system.

Download
4 Performance of Optical Interleave Division Multiple Access Using Convolutional Codes
Surendra Kr Sriwas, M K Shukla, R Asthana, J P Saini

Abstract- In this paper, the performance of Optical Interleave Division Multiple Access (OIDMA) using convolution encoding technique is presented. Optimum multiple channel capacity is achievable only when entire bandwidth is devoted to coding. Convolution encoding technique is a low rate encoding technique. For maximizing the coding gain the combination of two operations coding and spreading using low rate codes are done. The graphs between bit error rate (BER) and no of simultaneous users in optical IDMA with convolution encoding technique are plotted by using MATLAB simulation. The implementation of convolution codes in an optical IDMA system provides significant improvement in system performance.

Download
5 Maintaining the Confidentiality of Images: A New Perspective Based on Digital Watermarking
Yogendra Kushwaha, Narendra Kumar Gupta

Abstract- Digital watermarking is a technique that secures important information by multimedia objects such as image, text or other digital objects. In this paper a chunk-based fragile watermarking technique based on partitioning around medoids (PAM) clustering algorithm has been proposed. This algorithm is superior enough to recover from the tapered region of an image. In the proposed algorithm, images are divided into chunks and each chunk has assigned 36 bits, consists of 32 recovery bits and 4 authentication bits. Mapping of these 36 bits for each chunk are pseudo randomly mapped with some other chunk by applying the same secret key. At the receiver side the extracted image is compared with authentication bits and from mapping bits, tampered chunk with extracted recovery bits provide significant information to again recover the host image. Performance of the proposed algorithm in comparison to Discrete Cosine Transform (DCT), Singular Value Decomposition (SVD) and Discrete Wavelet Transform (DWT) is checked over the experimental results obtained from PSNR, MSE and recovery time. It is found that the proposed algorithm shows its superiority over other state of the art algorithms for maintaining the confidentiality of an image.

Download
6 Computation of Runoff in King Khalid University
Saiful Islam, Dr Ram Karan Singh, Roohul Abad Khan

Abstract- Many hydrologic methods are available for estimating peak flows from a basin, and no single method is applicable to all basins. The Rational Method is commonly used to estimate the design-storm peak discharge. The concepts of the Rational Method are sophisticated and considerable engineering knowledge is required to select representative hydrologic characteristics, such as time of concentration and runoff coefficient, which will result in a reliable design In this paper rational method has been used to compute the runoff generated in King Khalid University, Graiger Campus. The various components comprising the university ie., Buildings, Library, Workshop, Canteen, Store, Auditorium, Sport building, Administrative block, Animal Centre, tent, Masjid, Parking, Grass , Soil, Tiles, Mosaic, Road Bituminous are taken into account while computing runoff. The input parameter required for runoff computation is Rainfall intensity, Area and Runoff Coefficient. The runoff coefficient (C) is a key parameter for the rational method.)The computed runoff is found to be maximum in the month of April and minimum in the month of October.

Download
7 Identifying threat from SMS Messages Using Text Classification technique
Dr.S.Sagar Imambi, Sk.Rafi, Sd.Rizwana

Abstract- The impact of SMS messages in our daily life is now more obvious than ever. Each minute, millions of plain text or enriched messages are being sent and received around the world. To recongnise spam message among them, is one of the important challenges in internet applications. Earlier Statistical methods are used to characterize user behavior, classifying spam and detecting novel email viruses. Later on data mining has emerged to address these problems. Data mining is used to classify structured data. However, previous techniques have not examined problems with the classification of unstructured text and they need some improvements. In this paper, we present prototype based classification algorithm which incorporates the Global relevant weighing schema. We experimentally proved that, with our proposed classification algorithm it is possible to detect threat messages with high accuracy.

Download
8 Impact of Big data in Cloud Environment
T.Jhansirani, D.Satyanarayana

Abstract- With the rapid growth of emerging applications like social network analysis, semantic Web analysis and bioinformatics network analysis, a variety of data to be processed continues to witness a quick increase. Effective management and analysis of largescale data poses an interesting but critical challenge. Currently big data is a solution to this challenge which deals with the data that have high Volume, high Velocity, high Variety and high Veracity also known as 4V's of Big Data which includes data includes emails, system logs, internal documents, business process events, and other structured, unstructured, and semistructured data.

Download
9 Software Clone Management-An Insight
Sandeep Bal, Sumesh Sood

Abstract- In the current programming scenario, most Software systems contain sections of copied code which ultimately results in software code cloning. Such cloning trends can be seen in different versions of the same software or different software which provide similar kind of services to its users. This situation arose due to the copy-and-paste programming practice. Software maintenance is an ongoing process which works side by side as the system is improved/ updated on timely basis. The concept of software clone management is also a part of such maintenance work. In this paper, an insight to the clone management has been shown where various aspects of clone management are discussed in the form of approaches, metrics, tools and techniques.

Download
10 Implementation of PMC to Enhance Memory Reliability against MCU
T.Maheswari, V.Logeswari

Abstract- This paper presents a high level technique to protect SRAM memories against multiple upsets based on correcting codes. Transient multiple cell upsets (MCUs) are becoming major issues in the reliability of memories exposed to radiation environment. To prevent MCUs from causing data corruption, more complex error correction codes (ECCs) are widely used to protect memory, but the main problem is that they would require higher delay overhead. The only drawback of the existing DMC is that more redundant bits are required to maintain higher reliability of memory. The proposed technique used parity matrix code to assure reliability in presence of multiple bit flip and reduce more redundant bit and its correct more error compare to existing system.

Download