JCT - Volume 8 Issue 2 (February 2019)

 


Sr/No/ Title Pdf
1 A Review of Descendants of LEACH Protocol
Reshma G and Jeejo K P

ABSTRACT - This paper highlights the various LEACH based protocols in Wireless Sensor Network. Wireless Sensor Networks make use of power constraint sensor nodes. So preserving the network lifetime is one of the major concerns in designing proper communication protocol. LEACH is a clustering based protocol that can be employed to increase the overall network lifetime. In LEACH Cluster Heads (CH) are rotated randomly for evenly distribution of the energy load among the sensors in the network. It incorporates data aggregation scheme into routing protocol to reduce the amount of information that CHs should transmit to Base Station (BS).
Keywords— WSN, LEACH, Clustering, Energy efficiency. .
Page No. 101 - 104 .

Download
2 A Review on Methods for Transportation of Objects inside a Warehouse
Aswathy Vidyasagar and Roshan Prem

ABSTRACT -The paper highlights about the different methods for grasping and placing an object inside a warehouse. There are many different methods for identifying an object and also for the movement of the robot. The task of the robot is to place the object from initial stage to final stage and it can be controlled by using different controllers. Robots are used to develop machines that can substitute for human and hence reduce the labour cost and delivery time. It have been applied in many situations and for lot of purposes.
Keywords— Radio frequency identification [RFID], Quick response [QR] code, Electronic product code [EPC]. (CCM).
Page No. 108 -112 .
Download
3 Review on Ant Colony Optimization Algorithm in Wireless Sensor Networks
Shabeeba E and Harikrishnan N

ABSTRACT -Biological systems contribute convenient paradigms for designing wireless sensor networks. This paper reviews the algorithm derived from powerful biological system, called Ant colony optimization algorithm. ACO is a population-based model used to discover approximate solutions to difficult optimization problems. It imitates the real ant colony behavior, and uses simple agents called artificial ants, they create optimum route between source and destination. Since energy efficient data routing in wireless sensor networks is one of the key requirements, Ant colony optimization algorithm reduces network energy consumption, network lifespan is prolonged and it can effectively save the energy of nodes.
Keywords— WSN, routing algorithm, Ant colony optimization algorithm (ACO), Real ant colony behavior, Prolonged lifetime, reduces network energy consumption.
Page No. 108-112 .
Download
4 A Review of Packet Filtering Method in Networks
Sneha K P and Snigdhamol M S

ABSTRACT -Network intrusions such as worms, Trojans and DDoS attacks are a big threat for computer networks and have already become more sophisticated to detect and defend. To address this problem, intrusion detection systems (IDSs) have been implemented at large with the purpose of defending against various attacks. These detection systems usually identify an intrusion through comparing observable behaviour against suspicious patterns. The term ‘overhead’ means that incoming packets exceed the maximum handling capability of an IDS. Hence developed an adaptive blacklist-based packet filter to reduce packets via a statistic-based method.
Keywords— IDS, Adaptive blacklist based packet filter, Statistic based method.
Page No. 113-115 .
Download
5 Comparative Study on Homomorphic Encryption and Soft Encryption
Farsana Rasheed C and Satheesh N Kaimal

ABSTRACT - Encryption is the method of taking data represented in one form and representing it in another form. There are different types of encryption techniques. Homomorphic encryption and soft encryption are among them. Homomorphic encryption uses the information in its encrypted form instead of decrypting before use. Homomorphic encryption supports a means for sturdily transmitting and storing secret information across and in a computer system. Soft encryption is an encryption approach used to encrypt data and it is hard to break by brute force method. This paper gives an overview about homomorphic encryption and soft encryption.
Keywords— Mobile Adhoc Network (MANET), homomorphic encryption, soft encryption.
Page No. 117-119 .
Download
6 A Literature Survey on Different Design of Composite Leaf Springs And It's Optimization Techniques
Neelesh Dwivedi , Prof. Tanmay Awasthi

ABSTRACT - Abstract— In the survey paper discuss the different design of composite leaf spring and different optimization of better design. These are different optimization algorithms, suite sometimes and have been successfully applied for many engineering design problems. While Stochastic Algorithms are in nature with probabilistic translation rules. These are gaining popularity due to certain properties which deterministic algorithms do not have. Genetic Algorithms (GA), Artificial Neural Network (ANN), Ant Colony Optimization (AGO), Particle Swarm Optimization (PSO) and Simulated Annealing (SA) method. In this survey paper discuss the different algorithms for the analysis of this problem.
Keywords— Leaf Springs, Genetic Algorithms (GA), Artificial Neural Network (ANN), Ant Colony Optimization (AGO), Particle Swarm Optimization (PSO) and Simulated Annealing (SA) etc
Page No. 120-124
Download