JCT - Volume 5 Issue 9 (September 2016)


Sr/No/ Title Pdf
1 Raspberry Pi based Robotic Arm with Wi-Fi Controlled Visual Feedback

Abstract- This paper proposes a method for controlling a Robotic arm using an application build in the android platform. The android phone and raspberry pi board is connected through Wi-Fi. As the name suggests the robotic arm is designed as it performs the same activity as a human hand works. A signal is generated from the android app which will be received by the raspberry pi board and the robotic arm works according to the predefined program. The android application is the command centre of the robotic arm. The program is written in the python language in the raspberry board.the different data will control the arm rotation.

2 A Review Paper on Second Generation Current Conveyors
Vijay, Dr. Rinkesh Mittal

Abstract- In the modern day analog circuit design, current conveyors are widely used than Op-amps, due to its optimized characteristics like low power, low voltage, higher slew rate, compactness. In this paper, the CMOS current conveyor design approaches, used by various researchers have been reviewed. The researchers have proposed enhanced current conveyor design and compare their results with existing approaches. Many designers have presented the optimized current conveyor circuits as compared to existing results. Two types of topologies i.e. Translinear loop and Differential loop are used by designers to design current conveyors. This paper discusses many parameters like static and dynamic behaviour improvement, electronically tuned current conveyors, novel current conveyors, Meta heuristic techniques etc. mentioned by researchers. These current conveyors are used to design multifunction filters, oscillators, integrators, differentiators, radio frequency designs etc. The researchers have improved the linearity, compactness, Q-factor, series resistance, programmable gain and bandwidth.

3 Pattern Search Algorithm for Bioinformatics
A.Geethanjali, L. Sharmila

Abstract- Pattern matching becomes an important task in today’s world. Automatic Health Information (AHI) and additional temporal databases cover buried patterns that expose important reason and result event. Commonly used for various algorithms to search the pattern. We indicate that all the allowance planned to supervise classes of persons. In most previous algorithm takes a large amount of time to search multiple histories and its many irrelevant events in personal histories. We announce a new approach temporal pattern search is used to search multiple pattern easily and reveal the information takes a rapid amount of time. It Searches the pattern event regularly and checks with the previous item and next presence item. If the present item matches with the previous item, it will come under present item else under the absence. TPS takes rapid amount of time to search multiple histories and it avoids many irrelevant events in personal histories. TPS develops an appropriate binary search over a set of time-sorted array event.

4 CBNST: An enhanced Sybil Attack resilient mechanism for Restricting Sybil Attacks in Peer to peer E-commerce
Urvashi Tripathi, S.R.Yadav

Abstract- Peer to peer e-commerce applications provide an enhanced and flexible mechanism to access content of the ecommerce vendor. But these applications are vulnerable to various security risks and cyber attacks. Sybil attack is an attack which is generally performed over such applications to get unauthorized acceded of the resources. Multiple fake identities are created by the malicious user to perform Sybil attack. A NST (Neighbour Similarity Trust) based scheme provides enhanced functionality to detect Sybil attack. But that technique uses a time consuming and complex procedure to detect such attacks. A new CBNST (Cluster Based Neighbour similarity trust) is proposed in this paper to provide an efficient mechanism to detect Sybil attack in peer to peer e-commerce. A performance comparison of the existing and proposed technique is govern in section IV which shows proposed technique provides enhanced functionality to detect Sybil attack in Peer to peer networks.