JCT - Volume 5 Issue 4 (April 2016)

 


Sr/No/ Title Pdf
1 Client Side Solution for Protection of Web Applications from Cross Site Scripting Attack
P.Risha Hebiya, J.Ganesh

Abstract- Cloud computing is an important model for delivering valuable business services to the cloud users. Cloud service consider as online Storage where the data is remotely stored, managed and backed up. The user to store their personal files and business oriented data in online and access them from anywhere via the internet. Cross Site Scripting (XSS) is a widespread breed of web vulnerabilities which allows attacker to inject malicious code from their untrusted websites that are being accessed by the multiple user. When the user want to access those affected website at the time the malicious script will be automatically downloaded into the each user web browser and then the script will be executed. Then the attacker to collect the user credential information from that malicious code execution. So that, to prevent XSS vulnerabilities (First Order attack) by using cloud cross site scripting filter approach which contains multiple function. The cloud audit server performs the user authentication and monitors the stored data in cloud. The results shows proposed mechanism to enhanced the data storage security in cloud and efficiently detect the scripting vulnerabilities.

Download
2 Implementation of 6T SRAM Using NWL Technique
Rahul Uttam Salve, Prafful Dubey

Abstract- Memory arrays are an essential building block in any digital system. As the size of embedded system is shrinking with reduction in operating voltage, it has led to increased design challenge for the embedded engineer to meet the optimal demand of low power design of SRAM memory system. The aspects of designing an SRAM are very vital to designing other digital circuits as well. The majority of space taken in an integrated circuit is the memory. SRAM design consists of key considerations, such as increased speed and reduced layout area and also power dissipation is major issue and plays an important role in CMOS SRAM design due to increased integration. Semiconductor memory arrays are capable of storing large quantities of digital information which are essential to all digital systems. The ever increasing demand for larger data storage capacity has dri ven memory development towards more compact design and consequently toward higher storage densities. In thi s paper we have implemented SRAM using 0.12 μm using CMOS technique. The complete implementation and verification is done on the Tanner tool, Schematic of the SRAM cell is designed on the S-Edit and net list simulation done by using T-spice and waveforms are analyzed through the W-edit. The circuit is characterized by using the 0.12μm technology which is having supply voltage 0f 1.2volt

Download
3 Experimental Investigation Of Re Entrant Bowl Piston Using Diesel Additives in CI DI Diesel Engine
Dr.K.Balasubramanian, Varadharajan Srinivasan

Abstract- Re-entrant bowl induces better squish motion in the combustion chamber which enhances mixing of the fuel with air, results in significant improvement in engine performance and reduces the emissions. Compression ratio is increased by 6% from the conventional engine with hemispherical bowl piston.

Download
4 Bridgeless Critical Conduction Mode Boost Power Factor Correction Converter Using ANFIS
Gokilamani.S, Prabhakaran.S

Abstract- Critical mode boost power factor corrector converters are widely used because of its low switching loss and simple control. In this paper, power factor correction of boost converter has been obtained using a quantitative analysis and the advantage of the digital control (ATMEGA8 controller). Also, in order to improve the efficiency and power factor in a high input and light load condition, circulating currents are reduced in the inevitable dead angle with a gate turning-off technique using (ANFIS) technology.

Download
5 Visualizing Of Skin Color Using a Commercial Smart Phone by Multispectral Wiener Estimation
Vinoth KR, A.Rajamurugan

Abstract- Mobile Pervasive Computing has wide application in many fields .My proposed work is one of the applications of mobile pervasive computing engineering in medical field. To identify the morphological nature of cancerous cell by image processing techniques. In our work it deals with the treatment of Skin cancer .Due to the real-time performance requirement a simple model Wiener was adopted instead of more accurate methods based on complex modeling. Our work is a new approach for Skin Cancer detection and analysis for given photograph of patient’s cancer affected area which can be used for automatic the diagnosis and therapeutic treatment of skin cancer. Skin cancer can be analyzed and simulated by using MATLAB software and then it is implemented through smart phone.

Download
6 Hiding Secret Messages in Images
Souma Pal, Samir Kumar Bandyopadhyay

Abstract- Digital media offers several distinct advantages such as high quality, easy editing, high fidelity copying, compression etc. But this type advancement in the field of data communication in other sense has hiked the fear of getting the data snooped at the time of sending it from the sender to the receiver. So, Information Security is becoming an inseparable part of Data Communication. In order to address this Information Security, Steganography plays an important role. Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message. This paper reviewed of the steganography techniques appeared in the literature.

Download
7 Efficient Signature Scheme for Secure Electronic Transaction
G. Jai Arul Jose, Adalia Martin

Abstract- Secure Electronic Transaction (SET) is an important E-commerce protocol designed to provide security of credit card purchases over internet. Many companies were involved in developing the initial specification, including IBM, Microsoft, Netscape, RSA, Terisa, and Verisign. Beginning in 1996, there have been numerous tests of the concept, and by 1998 the first wave of SET-compliant products was available. Important innovation introduced in SET is the dual signature. The purpose of the dual signature is to link two messages that are intended for two different recipients. In this case, the customer wants to send the order information (OI) to the merchant and the payment information (PI) to the bank. The merchant does not need to know the customer's credit card number, and the bank does not need to know the details of the customer's order. Currently, the dual signature is signed and verified by the traditional RSA or ECDSA signature schemes. This paper will introduce “certificateless” signature scheme which use bi-linear pairing for verifying process that will avoid the use of Certificate Authority or Key Distribution Centre.

Download
8 Proactive Approach for SQL Injection Attack
Govinda.K, Saikiran. U

Abstract- Now a days hacking and penetration testing attacks are very common all over the world and all major companies like Google, Microsoft, and Yahoo are spending millions of dollars on to prevent these kind of penetration testing attacks. One of the most serious attacks is SQL injection attack because this give a serious security threat to Web applications which contain very valuable information such as bank account details, passwords and data related to other website information. To penetrate into the system hackers found new ways to do this .Attacks which will allow attackers to obtain unrestricted access to the databases lying underneath the applications and to the potentially valuable information including confidential information and password related information these databases contain. Though researchers and web security analysts have proposed several methods to cease the problems caused due to SQL injection, still there are attacks still going on. Many researchers and web security professionals are familiar with only a limited range of techniques known to attackers who are trying to take advantage of SQL injection vulnerabilities. As a result, many solutions proposed to the problem in the literature solve only few attacks related to SQL injection and analyze existing detection and prevention techniques against SQL injection attacks. To address this problem, this paper presents an extensive review of the different types of SQL injection attacks known to date and also to propose the best attack vector and also best way to protect ourselves from these attacks.

Download
9 E-Alert: Bank Alert Messaging Unit Using IOT
Govinda.K, Nirmal kumar, Prushothman, Raghul Aravind

Abstract- This paper presents an emergency alarm in a bank, which is mostly deployed in locker unit to automate the human movement using internet of things (IOT). So If any unauthorized person try to enter into the restricted place the motion will be detected and an alarm will be triggered, message and mail will be sent to the administrator. So the administrator of the bank can receives the alert message through e-mail and SMS, so they can immediately take measures to rescue the bank.

Download
10 Efficient Management of Unstructured Data in Big Data Environment
T.Jhansirani, D.Satyanarayana

Abstract- Unstructured data is commonly referred to as information that does not have a predefined data model or is not organized in a predefined way. The world creates 2.5 quintillion bytes of data per day from unstructured data sources like sensors, social media posts and digital photos, resulting in irregularities that make this type of data more difficult to understand compared with data stored in a fielded form in databases. Unstructured data accounts for at least half of all data stored by organizations, and with the growth of social-media sites and the use of online video and images for business applications, the volume of unstructured data is likely to grow significantly. This paper exposes storage issues, real cost of storing and file archiving solution for efficiently managing unstructured data in Big data environment.

Download
11 A Novel Cascaded Multilevel Inverter Using Mcpwm With Minimum Switches
T.Yuvaraja, K.SathyaSree

Abstract- Multilevel inverter presents attractive advantages in high power applications. The proposed method is 15- level multilevel inverter which has number of modules in series. Each module has one switch and one parallel connected diode. The proposed method involves less number of switches with more number of voltage levels. In this paper, MCPWM technique is proposed to reduce the THD value less than 2% and increases the efficiency. It drastically reduces the switches for high number of levels and improves the total harmonic distortion (THD).

Download
12 Design and Implementation of SEPIC converter for Solar Energy Conversion System Using Hill Climbing MPPT Algorithm
P.Venkatesan, Dr.S.SenthilKumar

Abstract- In this paper, the PV systems are designed to meet the load requirement in the best possible manner. In order to maximize the power output the system components of the photovoltaic system should be optimized. For the optimization maximum power point tracking (MPPT) is a promising technique that grid tie inverters, solar battery chargers and similar devices use to get the maximum possible power from one or more solar panels. We propose a system architecture that provides a fast and conditionally stable maximum power Point tracking scheme with high tracking efficiency is proposed for photovoltaic applications. This is achieved through the method of hill climbing MPPT technique used in power converters. We describe the design and implementation of a high-efficiency Single Ended Primary Inductance MPPT converter, along with digital control techniques that ensure both local and global maximum power extraction. The simulation results by MATLAB/SIMULINK investigate in detail the concept of Maximum Power Point Tracking (MPPT) which significantly increases the efficiency of the solar photovoltaic system.

Download
13 Solar Energy Conversion System using Ripple free MPPT for Grid connected PV system
P.Venkatesan, S.Senthilkumar

Abstract- This project presents a control methodology of three phase grid connected PV system and its control schemes for applications in distributed generation (DG) systems. The system utilizes a two stage energy conversion topology composed of a DC-DC boost converter and five level-three phase voltage source inverter (VSI). The DC-DC converter is used to extract maximum power from the PV array and boost its output voltage. A maximum power point tracking (MPPT) technique is proposed in which hysteresis algorithm is used, with direct control method in which duty cycle is adjusted to achieve the maximum power point (MPP). The VSI is used for converting the maximum power extracted by DC-DC converter to AC power by giving the gate pulse from voltage source controller. Simulation results on MATLAB/Simulink software are carried out to confirm the system operation. The Efficiency of MPPT and DC link voltage on the entire PV system is increased.

Download
14 Solar energy conversion using modern multi-level inverter for simple lighting system
A.Subramani, Dr.S.SenthilKumar

Abstract- In this paper has large power capability related with less output harmonics and less switching losses because in this type of multilevel inverter less number of switches, capacitors, power diodes are used. The modern multilevel inverter is used to simple lighting system. This paper present a multilevel inverter configuration which is designed by bi directional switched between capacitive voltage sources. This paper the result achieved by 13 levels by using only 9 switches and 6 capacitors only. The modified inverter can produce better sinusoidal by increasing output voltage level. This has been avoided by the flickering effect for the lightning system.

Download
15 Induction Motor Fed L-Z Source Inverter Using Closed Loop Controller for Variable Speed Drives
Deepa.N, Jamuna.P

Abstract- This paper presents LZSI which only contains inductors and diodes in Z-source network with closed loop controller. The inverter uses a unique inductor and diode network for boosting its output voltage, provides a common ground for the dc source and inverter, especially in prohibiting the inrush current at start up and the resonance of Zsource capacitors and inductors. The inverter can increase the boost factor through adjusting shootthrough duty ratio and increasing the number of inductor. The working principle of the proposed L ZSI is analysed in detail. The closed loop speed controller is used to sense the speed and checks the error speed. It is used in variable speed drives .Simulation and experimental results are given to demonstrate the operation features of the inverter.

Download
16 An optimization scheme for data transmission in MANET
Swarnika Tiwari, Praveen Yadav

Abstract- MANET is an important area of research where the packet delivery ratio and overhead ratio relay count is important factor, which claims as routing protocol to work with number of packets and its simulation. In our dissertation the base work is considered as Ant colony optimization from the base paper which works with the phonemes finding and further upon marking the node ,best possible node can be find out and packet transmission process can be perform using existing algorithm. The further issues associate with the existing algorithm is increasing overhead and packet drop while delivering the large number of packet , also while dealing with large size packet , it does not process large data size packet. Thus in order to overcome the dues here EQOS Ant colony optimization technique is proposed by our work, which claims and process the work in divide and conquer paradigm along with the Ant colony feature. As it takes use of the replica based concept and further the packet replication and transmission is performed using the proposed algorithm. The existing and proposed approach were implemented using One simulator and further the algorithm is executed for 5000 second as simulation time and result were observed by the reports module. Finally the result observed as packet delivery ratio, relay and overhead ratio were computed via both the simulated algorithm. Thus the approach driven by us, outperform a best work among the studied in the field of network which make use of Ant colony Approach. A comparison analysis for the existing and proposed technique over the parameters called relay, Overhead and PDR is presented which provides an enhanced QoS (Quality of Service) In MANET.

Download
17 Optimization of Investment and Storage Constrained Multi- Item Inventory Model with Quality and Environmental Concern
W. Ritha, P. Bharathi

Abstract- This paper has introduced the EOQ in deterministic stock model of multi-item when the target capacity is subjected to venture and limit of deficiency space limitations. The requirements are thought to be dynamic if the left hand side does not fulfil the right hand side condition. In this way, Lagrange Technique is utilized to locate the new multi-item EOQ in every four models with every limitation to accomplish the new model of EOQ. In order to provide good quality of items screening cost is included. Additionally in consideration of environmental issues disposal cost is included to make the model into practical application. Numerical example is provided to validate the model.

Download
18 A Consignment stock inventory model with the imperfect production process and energy usage for transportation and production
W.Ritha, I.FrancinaNishandhi

Abstract- The supply chain management is mainly focussed on environmentally consciousness. We present a consignment stock inventory model with the imperfect production process and also we further developed the model under following concepts. Usually vendor supplies the product to the buyer in an equal number of lots and assume that the stock is 100% defect free. But in natural each lot contains a fraction of defective items. So this paper is based on the consignment stock inventory model with imperfect quality items. And we are all known that the energy is essential for every process. Furthermore we developed the model under the energy usage for transportation and production. Mathematical model and numerical examples are presented for the proposed model.

Download
19 Power Quality Improvement Using TCSC and STATCOM
Uma.S, Parthiban.S

Abstract- Voltage stability analysis is essential for a secure power system operation. A lot of works have been developed for this analysis method to improve voltage stability. To investigates the enhancement of voltage stability using Flexible Alternative Current Transmission System devices. The objective is to enhance voltage stability based on static analysis. The continuation power flow methods are proposed in case of the increasing loading of contingency. Continuation Power flow is the analysis to determine the steady-state complex voltages at all buses of the network and also the real and reactive power flows in every transmission line. In this project, the proposed approach is based on Thyristor Controlled Series Compensator comparison with Static Synchronous Compensator compensation to increase the steady state voltage stability margin of power capability. For this project, Newton-Raphson method are being use to analyze this project. When Flexible Alternative Current Transmission System device are applied into the system, it can assist to reduce the flows in heavily loaded lines by controlling the reactance in the transmission lines. The IEEE 6 bus system is simulated to test the increasing loadability.

Download