JCT - Volume 5 Issue 5 (May 2016)

 


Sr/No/ Title Pdf
1 Performance and Emission in a Single Cylinder CI DI Diesel Engine Using Dee with Different Piston Bowl
K.Balasubramanian, Rahul Surendran, Shravanth Bharadwaj.C

Abstract- This research work is conducted with an optimal quantity of 5 ml of DEE in a litre of Diesel gives significant improvement in both performance and better control over Emission levels when it is tested by replacing the piston with standard bowl, Re entrant and stud button bowl in Kirloskar make single cylinder Diesel engine. Brake Thermal Efficiency, SFC Peak Pressure, EGT and HRR have better variations with each other by using these configurations. NOx, HC, CO and smoke emissions level are also significantly reduced.

Download
2 A Survey to Optical CDMA Systems – Part I: Optical Orthogonal Encoding
Ram Chandra Singh Chauhan, Yatindra Nath Singh, Rachna Asthana

Abstract- Optical CDMA (Code Division Multiple Access) is an enhanced version of wideband CDMA to access the optical communication channel with huge amount of bandwidth. The OCDMA technique is very promising as it has the capability of transmitting data at 10–100 Gbps data rates. In this survey paper various optical coding schemes and incoherent and coherent OCDMA system have been discussed. It is concluded here that the different optical orthogonal coding schemes are able to generate only some of the optical orthogonal codes existing for code length ‘n’ and weight ‘w’ for specific values of auto correlation and cross correlation constraints λa and λc respectively.

Download
3 A Survey to Optical CDMA Systems – Part II: Performance Improvement Schemes
Ram Chandra Singh Chauhan, Yatindra Nath Singh, Rachna Asthana

Abstract- Optical CDMA (Code Division Multiple Access) is an enhancement of wideband CDMA to access the optical communication channel having huge bandwidth. The OCDMA technique is very promising as it has the capability of transmitting data at 10–100 Gbps data rates. This survey paper describes the Optical CDMA, its advantages and disadvantage. Apart from the well known multiple access interference reduction schemes, spectral efficiency maximization techniques, and some security performance improvement methods have been also described here. These different performance improvement methods also have their limitations. There is requirement of such schemes which improve the bit error rate (BER), spectral efficiency and security performances simultaneously in the same Optical CDMA system.

Download
4 Review of Implementation of Fast buffering and filtering operations on FPGA
Arun Mahajan, Prabhjot Singh

Abstract- Noise removal from images forms an important aspect and widely researched area in recent times. Salt and pepper noise on images tends to degrade the quality of the image. Median filter is an important and simplest filter for the elimination of salt and pepper noise. Many new techniques have been evolved in recent years and implemented mostly on MATLAB environment. The implementation of these techniques and filters on FPGA requires buffering of image into the memory of the hardware so that windowing operations must be performed. In this paper a review of various techniques for buffering and filtering operation is presented and compared in terms of their timing complexity.

Download
5 Floating Point Multiply Add Unit Design- A Review
Sachin Raghav, Dr.Rinkesh Mittal

Abstract- In the modern digital era floating point operations in digital systems forms an important part of research in recent years. Many researchers have proposed various floating point units and compare their results with the existing approaches. Implementing a floating point unit in digital systems requires the operands to be converted into the IEEE 754 single precision or double precision format. Also both the multiply and add operations must be implemented in unison in order to save the resources in FPGA. In this paper a survey of various implementation methodologies proposed by researchers and digital designers is presented and compared. The papers also focus on the end results of implementation of these units in terms of area utilized and speed of operation.

Download
6 Design and Development of a Vehicle Theft Control Unit using GSM Module
Rajesh Dey, Chameli Mitra, Kanynika Mitra, Rajeshwar Paul, Payel Ghosh, Arnab Dey, Dr Achintya Das

Abstract- Main purpose of this project is the design & development of a vehicle theft control system, which is used to prevent the theft of a vehicle. The developed system is used by an embedded system based on Global System of Mobile communication (GSM) technology. The developed system is used by an mobile phone that is embedded in the vehicle with an interfacing to Engine Control System(ECS) which is in turn, communicated to the ECS. In that project we deal with the security of the vehicle. When the GSM modem receives this message from the particular mobile then the vehicle. Engine gets stopped .The mobile number from which the message is sent, should be the authorized mobile number. The authorized mobile number should be fed into this system through the keypad and the number which is stored in the EEPROM. The system can be implemented using arduino. This is more secured, easily available and also low cost.

Download
7 Web mining framework for user profile evaluation
M.Nagaraj, D.Suresh

Abstract- This is an innovative work for the field of web usage mining. The main feature of the paper, this is a complete framework and findings in mining Web usage patterns from Web log files of a real Web site that has all the difficult aspects of real-life Web usage mining, including developing user profiles and external data describing an ontology of the Web content. Presenting a method for discovering and tracking evolving user profiles. Profiles are also enriched with other domain-specific information facets that give a panoramic view of the discovered mass usage modes. An objective validation plan is also used to assess the quality of the mined profiles, in particular their adaptability in the face of evolving user behavior.

Download
8 Estimation of Error in Bourdon type pressure Gauge using Dead Weight Tester
Saiful Islam, Mohd Danish, Roohul Abad Khan

Abstract- Stability of the pressure measuring instruments over the years is one of the important parameters in defining the quality of results quantitatively. Indeed, several commercial instruments are available for pressure measurements, whenever such instruments are used for precise and accurate pressure measurements, it is obligatory on the part of measurement authority to indicate the accuracy of results. In the present investigation, we have studied dead weight tester to calibrate Bourdan type pressure gauge, After Experimental work it is found that the gauge is giving better result at lower reading and as we increase weight the gauge reading seems to give significant changes in the result with respect to actual pressure.

Download
9 A Review of Log Based Intrusion Detection and Prevention System
Aastha Goswami, Deepak Singh Rajput

Abstract- In the recent years, Intrusion Detection materializes the high network security. Thus tries to be the most perfect system to deal with the network security and the intrusions attacks. Monitoring activity of the network and that of threats is the feature of the ideal Intrusion Detection System. Intrusion Detection System is classified on the basis of the source of Data and Model of Intrusion. There are some challenges faced by the Intrusion Detection System. In order to detect these malicious activities, organizations deploys Intrusion Detection and Prevention Systems (IDPSs) in their corporate networks. They generate huge amount of low quality alerts and in different formats when an attack has already taken place. Thus Alert and event correlation is required to preprocess, analyze and correlate the alerts produced by one or more network intrusion detection systems and events generated from different systems and security tools to provide a more concise and high-level view of occurring or attempted intrusion.

Download
10 A Novel Approach of Providing Privacy to Encrypted Cloud Data by Using Multi Keywords
GunaSravan Kompalli, Y.Ramesh Kumar

Abstract- In current day’s cloud computing has become one of the fascinating domains which are used by almost all MNC and IT companies. Generally this is formed by interconnecting a large number of systems connected all together for remote servers hosted on internet to store, access, retrive data from remote machines not from local machines. As the cloud server has the capability to store a lot of valuable data on its memory block, a lot of users can connect with the centralized location to access, retrieve and modify the data which is stored on the cloud server. Till now there was no mechanism available to store the data in a encrypted manner in all public clouds and even private clouds. So in this paper we have implemented a new concept called as encrypting the data at client side before storing that in the cloud locations. Also as a highest form of security we have integrated a new security primitive like Novel Multi Keywords Ranked Search (NMKRS) over encrypted cloud data in order to give high level of security for the cloud data. By using this NMKRS the data can be downloaded if the user substitutes the series of multi keywords that are placed while data storing by the cloud owner.Initailly the data owner will upload a file which he want to store securely in the cloud with a set of multiple keywords as input, now if the data user want to retrieve or access the same data he need to verify his identify and then download the data with the help of set of assigned keywords. If the user who want to retrieve the data, substitutes wrong identities then the data will not be decrypted and it remains in a encrypted manner. By conducting various experiments on our proposed model, our simulation results clearly tells that this is the first time to implement this type of model to give more level of security for accessing the data to and from remote cloud server.

Download
11 Analysis of Performance of a Novel Visual Authentication Protocol over Various Attacks
Kancharana Asha Kiran, Nagireddy Vyshnavi, G. Sankara Rao

Abstract- In current day’s security plays a very vital role in each and every aspect of human life. As security plays a very crucial role in all aspects of life, a lot of illegal users try to access the information of unknown users illegally. To avoid this problem there were various new techniques proposed in order to store the data safely on remote machines.Eventhough there was no exact system which clearly provides complete security over the local and remote system storage. So it is a big challenge to design a secure authentication protocols. As we all know that till today each and every user try to provide password based security for their accounts, as it doesn’t achieve high security because of guessing or dictionary attacks. There is no system which has multi level of security to provide secrecy for the sensitive data. In this paper we for the first time have implemented a novel security system by involving the visual authentication protocols for storing the data safely inside the system. For this we have taken image as primary security for storing and accessing the data. Also we have implemented a new pattern mechanism which was implemented for the first time in order to provide more security for the sensitive data. By conducting various experiments on the proposed approach we finally came to a conclusion that this technique was implemented for the first time in order to give high level of security for the sensitive data.

Download
12 Design and Analysis of a Novel Approach for Finding Minimum Number of Representative Pattern Sets
Raju Sunkari, M.Kranthi Kumar, Ramesh Challagundla

Abstract- In current day’s data mining has become one of the fascinating domains in which each and every organization use this in some or some other way to process their raw data. It is also described as the computational process of discovering patterns in large data involving methods at the intersection of artificial intelligence , ML approach, statistics , and database systems. The overall goal of the data mining process is to extract information from a data set and transform it into an understandable structure for further use. Generally there is a concept called as pattern mining where this is used for mining a large volume of data in order to find the frequent item sets as well as order of frequency. Also this FP Mining is very difficult to understand and further analysis of generated patterns is complex. As this is a complex task now we need to find out the smallest set of representative patterns to defend all other patterns. In this paper we have used an algorithm to find the minimum pattern set called as MINRPSet. By using this algorithm we can able to retrieve the patterns efficiently from a tree of nodes. All the patterns generated after applying the constraint may have a set cover problem; greedy set cover algorithm is used to avoid the set cover problem. By conducting various experiments on our proposed algorithm, we finally came to an conclusion that the greedy algorithm gives the minimum number of representative pattern sets.

Download