Volume 6 Issue 6- June 2016

 

Page Title Full Text
179-184 Customized Elliptic Curve Cryptography Based Ant Colony Optimization for Internet Polling System
P.Lakshmi,J. Vidhyanandhini
Abstract

he hopeful determination framework is requiring of each majority rule government and the organization shaped is reliant on the consequences of the applicant choice. The competitor determination process clears the way for each voter to choose a delegate among themselves who can manage the just framework towards the welfare of the general public. The Polling framework has watched numerous viable changes in the course of recent decades, right from the conventional paper ticket surveying to electronic Polling and now towards the Internet Polling. Be that as it may, the balloter decision is a dependable and certain Polling where in manual framework he used to stamp on his preferred image. This requires a security calculation that could oppose the assaults and keep the information secrecy furthermore validate Elector in on the web. Modified Elliptic Curve Cryptography is utilized for both authentication and confidentiality. Parallel Multi-core Ant colony optimization is utilized to produce the private keys utilized as a part of ECC by ideally utilizing multi-core processors.

Keywords— Internet Polling (I-Polling), electronic Polling, data confidentiality, authenticate elector, Modified Elliptic Curve Cryptography (MECC), Parallel Multi-core Ant colony optimization (PMACO.


Full Text PDF
185-189 Hybrid Based Approach to Enhance the Accuracy of Sentiment Analysis on Tweets
G. Vaitheeswaran, L. Arockiam
Abstract

The opinion of others toward a product or event plays an important role in the decision-making process. In recent times, the explosion of social media over the web has a rich impact on an individual's and the organization's decision-making process about certain content. Twitter which is a leading micro-blogging website allows the people to post their opinions, state of mind, or status toward products or any events such as politics and sports. Sentiment analysis performs an essential role to extract the content of the tweets. This research work consists of two components: a lexicon builder and a sentiment classifier. The proposed hybrid based Senti_iLexi_iClassi approach is the combination of lexicon and machine learning based approaches. In sentiment analysis, the context-dependent word is a major problem. To solve this problem, the existing contextual valence shifter (CVS) method is improved and used to assign polarity values using the proposed Context Polarity Measure (CPM). To find the polarity of context-dependent text, the n-grams model is used. The tweets are classified more accurately and produces better results.

Keywords— sentiment analysis, context dependent word, hybrid based approach, retweet count, support vector machines.


Full Text PDF
191-194 SIP implementation for Ad-hoc network
Satish Kale, Dr. Vaishali Khairnar
Abstract

Telecommunication services are transforming from their traditional circuit-switched networks into packet-based networks that facilitate new services that combine data, voice, and video information. Voice over IP (VoIP) uses the Internet Protocol (IP) to transmit voice as packets over an IP network. The growth of this technology is due to the integration of voice and data traffic over wireless infrastructure that leads to Mobile VoIP (mVoIP). This paper deals with the implementing voice over Internet protocol (VoIP) over mobile devices using android platform. First, the paper discusses the factors involved in making a cheaper call. After a discussion of serving telecommunication service to achieve mobility

Keywords— VoIP, mVoIP, voWi-Fi, SIP.


Full Text PDF
195-202 Quality Of Service Routing Based On Bandwidth Estimation For Mobile Ad Hoc Networks
M. Manimekalai, S. Anitha
Abstract

Routing protocols for Mobile Ad hoc Networks (MANETs) have been investigated broadly as of late. A lot of this work is focused at finding a practical route from a source to a destination without considering current network activity or application prerequisites. Accordingly, the network may effortlessly get to be over-burden with an excessive amount of activity, and the application has no real way to enhance its execution under a given network movement condition. While this might be worthy for information exchange, some constant applications require QoS support from the network. We trust that such QoS backing can be accomplished by either finding a route to fulfill the application necessities or offering network criticism to the application when the prerequisites can't be met.
In this paper, we propose a QoS-aware routing in view of data bandwidth estimation to give data about the present network status to the application layer. Our proposed QoS-aware routing protocol joins an affirmation control plan and an input plan to meet the QoS necessities of ongoing applications. The novel piece of this QoS-aware routing protocol is the utilization of the surmised data bandwidth estimation to respond to network activity. Our methodology actualizes this plan by utilizing two data bandwidth estimation techniques to locate the remaining bandwidth accessible at every hub to bolster new streams. We recreate our QoS-aware routing protocol for hubs running the IEEE 802.11 MAC. Consequences of our trials demonstrate that the packet conveyance proportion builds extraordinarily and packet postponement and vitality dissemination diminish fundamentally, while the general end-to-end throughput is not affected, contrasted and routing protocols that don't give QoS support.

Keywords— QoS, Packet Delay, Routing Protocol, Energy, MANET


Full Text PDF
203-207 Load Balanced Data Gathering by Clustering in Wireless Sensor Network
V. Vetriselvi,S. Radhika
Abstract

These days wireless sensor networks are enjoyed because of observing the nearness of circumstance in numerous applications like modern, natural detecting, human services and so on. Energy ability is an essential perspective in wireless sensor networks to defeat this issue the proficient procedure of clustering is utilized to accomplish more information transmission, long system lifetime, less tedious procedure, minimize energy usage. In this paper propose multi cluster head groups, multi cluster heads by means of Load Balanced Clustering and Dual Data Uploading and sensor. It is dependable to keep up the energy and information transmission from every sub hub. In every cluster head gather information and energy level structure sub hubs then transmit to the cluster head. Here Multi User-Multi info multi output (MIMO) is utilized for multi information transmission to the sink, every hub associated their cluster heads and sending parcel to the sink by means of cluster heads and gathering heads. Sink appoint Id to every hub for ID reason which hub transmit information. In spite of the fact that the transmission of bury cluster, every cluster head cluster information is assembled by Sensor then transport the information to the static information sink. Sensor is the portability of versatile hubs used to redesign the energy in which the hubs have low energy. On the off chance that sensor has low energy then it is stimulated by sink is the base station controls the whole system .As the Simulation results display that the proposed load adjusted clustering keeps up the energy level and in addition more information social affair to build the system life time.

Keywords—Wireless Sensor Network, Multi Cluster Head and Cluster Head Cluster (CHG), Energy Capability , Sensor.


Full Text PDF
208-211 Automatic Monitoring System for a Precision Agriculture Based On Wireless Sensor Networks
Manikandan .K , Rajaram. S
Abstract

CropfarminginIndiais labour intensive and obsolete. Farming is still dependent on techniques which were evolved hundreds of years ago and doesn't take care of conservation of resources. The newer scenario of decreasing water tables, drying up of rivers and tanks, unpredictable environment present an urgent need of proper utilization of water. We have the technology to bridge the gap between water usage and water wastage. Technology used in some developed countries is too expensive and complicated for a common farmer to understand. Our project is to give cheap, reliable, cost efficient and easy to use technology which would help in conservation of resources such as water and also in automatizing farms. We proposed use of temperature and moisture sensor at suitable locations for monitoring of crops. The sensing system is based on a feedback control mechanism with a centralized control unit which regulates the flow of water on to the field in the real time based on the instantaneous temperature and moisture values. The sensor data would be collected in a central processing unit which would take further action. Thus by providing right amount of water we would increase the efficiency of the farm. The farmer can also look at the sensory data  and decide course of action  himself. We have made the interface of our project keeping in view the educational and financial background of average Indian farmer.
Inthis paper we are proposed a low cost and efficient wireless sensor network technique to acquire the soil moisture and temperature from various locations of farm and as per the need of crop controller take the decision to make irrigation ON or OFF.

Keywords: Soil moisture sensor, temperature sensor, wireless sensor network, Microcontroller


Full Text PDF
212-217 Unicast Delivery Delay Study for MANET with Erasure Coding and F-Cast Relay
V. Jayaraj ,S.Hemalatha , A. Revathi
Abstract

The Mobile Ad Hoc Networks (MANETs) are a class of framework less self-sorting out systems comprising of cell phones speaking with each other over shared remote connections. Because of their particular elements of power, self-association, brisk organization and reconfiguration, MANETs hold awesome guarantees for some vital application situations, similar to calamity alleviation, war zone interchanges, and wide territory detecting, and are along these queues progressively turning into a basic segment for the people to come (5G) systems. To productively bolster these basic applications with stringent execution prerequisites, it is of awesome significance to altogether comprehend the key execution of such systems, similar to the Delivery delay and throughput limit. This paper concentrates on the execution investigations of an essential class of MANET's with eradication coding and packet excess (f-cast) i.e each coded packet at source node is transmitted to at most f unmistakable transfer nodes. This paper, gives a unicast Delivery delay study with deletion coding and packet excess.

Keywords— Mobile Ad Hoc Networks (MANET), Packet Delivery Delay, Packet Redundancy, Unicast.


Full Text PDF
218-222 PAAS Framework Implementation of Cloud Computing With Google Application Engine - A Review
Amrita Sekhon
Abstract

Cloud Computing is a paradigm shift that implies computing using the Internet by sharing computer resources in place of using storage or software of a local PC. It is the latest fab of the computer world. Amazon, Google, IBM and Microsoft are the big players in the game of cloud computing. Amazon has currently built the world's largest marketplace and is a major mover in this revolution of cloud computing. It is hosting a large number of other businesses on its cloud service infrastructure. Microsoft too entered the cloud computing scenario thus simplifying migration for all types of Windows. Cloud computing provides virtualized and dynamically scalable resources as a service across the Internet. According to the official definition given by NIST(National Institute of Standards and Technology) in 2011, "cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction." The NIST defines three service models of cloud computing namely Software as a Service (Saas), Infrastructure as a Service (Iaas) and Platform as a Service (Paas). This paper tries to evaluate the pros and cons of implementing cloud computing as Paas framework with GAE (Google Application Engine).

Keywords: Cloud Computing, Google Application Engine (GAE), Software as a Service (Saas), Infrastructure as a Service (Iaas), Platform as a Service (Paas), Google Computing Engine (GCE), Content Delivery Network (CDN)


Full Text PDF
223-227 Performance Evaluation of Bee Swarm Inspired Hybrid Routing Protocol Parameters for Applications in Vehicular Ad-Hoc Networks
Kamaljeet Kaur, Vinod Kumar
Abstract

Abstract—Vehicular Ad-hoc Networks (VANET's) is entice substantially from the inquisition community and the automotive industry to enhance the design and development of the Intelligent Transportation System (ITS) Technology, who facilitate the vehicles to interact with each other and the road side units, which helps to elevate the safety measures in vehicles and transportation productivity. Lately one of the interesting and developing domains in VANET is to improve road safety by providing timely and accurate information to drivers and authorities. Towards the attainability of timely dissemination of messages, various routing protocols have been proposed. We present a Hybrid Bee Swarm Routing protocol for VANET's. Aforementioned routing protocol is unicast and a multi-path which assures road safety services by disseminates packets with minimum delays and high packet delivery. Finally to manifest the capability and the performance of the proposed routing protocol in VANET is evaluated in terms of packet delivery ratio, end-to-end delay and normalized overhead ratio.

Keywords— Vehicular Ad-hoc Network, routing optimization, AODV routing protocol, Bio-inspired computing, Bee swarm Routing Protocol, Genetic Algorithm, Performance.



Full Text PDF
228-232 Graph Search Process in Social Networks and it's Challenges
Preeti Narooka, Dr. Sunita Chaodhary
Abstract

Social networking sites are grabbing attention of millions of users and it resulted into creation of humongous data on these networking sites. Number of users on any networking sites denotes the complexity and size of the data. These developments have thrown a challenge in front of computer scientists to optimize the search operations on these social networking sites. This paper outlines the Graph theory as a tool for search operation on social networking sites & for optimization of search graph operation map reducing technology is discussed. In this paper on one side, different traditional system of social networking and graph algorithm are elaborated. On the other side, various application and different issues related to the graph algorithm and social networking are discussed in detail.
Keywords: - Social Networks, Graph, Big Data, Cloud, Graph Searching



Full Text PDF
233-239 Security Issues On Cloud Computing
Neelam Sharma, Sonia Batra
Abstract

Cloud computing is basically up gradation to grid computing. It is very amazing technology because we can store data remotely on the cloud server it means it is location independent and service avail on rental basis also. According to NIST [1] Cloud computing is a model for convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Rather than lots of features it is also having security issues. Sometimes the data kept on cloud can be misused or stolen. So in this review paper we basically discuss about the issues develops due to security and the solution given by different researchers. Security is one of the most vis-à-vis issue of Information technology Issue. To keep structural or user data is primary concern. If organization's data is not safe on cloud then there is no use of ever-changing from old technology to cloud technology. There are lot of Non-Profit Organization (NPO) which are helping and creating responsiveness about security issues of cloud computing. One of such organization is CSA (Cloud Security Alliance) that issue a report in each year regarding most popular security issues in cloud computing. CSA reports they identified nine infamous security threats to cloud which can harm user’s individual data without knowing them. Here we discuss these types of issues in this paper.

Keywords— Cloud Computing, Security, Encryption, Decryption




Full Text PDF
240-242 A Review on Personalized Product Recommendation in Social Commerce
Yatin Chopra, Manusmriti
Abstract

Recommender systems or recommendation systems are a subclass of information filtering system that seek to predict the ‘rating’ or ‘preference’ that user would give to an item. These systems are best known for their use in e-commerce websites where they use input about a customer’s interest to generate a list of recommended items. Many applications use only the items that customers purchase and explicitly rate to represent their interests, but can also use other attributes, including items viewed, demographic data, subject interests, and favorite artists. A variety of techniques have been proposed for performing recommendation, including content-based, collaborative, and hybrid techniques.

Keywords: Recommender Systems, Information filtering, E-commerce, User preferences, Content-based recommenders, Collaborative recommenders, Hybrid recommenders.





Full Text PDF
243-246 Implementation of Social Hybrid Product Recommender
Manusmriti
Abstract

Recommender systems represent user preferences for the purpose of suggesting items to purchase or examine. They have become fundamental applications in e-commerce and information access, providing suggestions that effectively prune large information spaces so that users are directed toward those items that best meet their needs and preferences. This paper surveys the landscape of actual and possible hybrid recommenders, and introduces Social hybrid product recommender, a system which combines multiple similarity matrices derived from heterogeneous implicit (User-item rating network) and explicit social networks (Friends network).

Keywords: Friends network, user-item rating network, recommender systems, e-commerce





Full Text PDF
247-249 A Review of Various Routing Protocols in MANETs
Yogita Khasa, Pooja
Abstract

Mobile Ad hoc Networks (MANETs) are composed of autonomous mobile nodes with communication capability that is often deployed in an unattended environment, thus leaving them vulnerable. Research concerning in MANETs routing is gaining much attraction because of its never ending improvement. There is no centralized hierarchy in MANETs, so nodes itself behave as routers. In this paper we provide an overview of a wide range of the existing routing protocols with a particular focus on their characteristics and functionality. Also, the comparison is provided based on the routing methodologies and information used to make routing decisions. The performance of all the routing protocols is also discussed. Further this study will help the researchers to get an overview of the existing protocols and suggest which protocols may perform better with respect to varying network scenarios

Keywords - Mobile ad hoc networks, Routing Protocols comparison.






Full Text PDF
250-253 An Approach to Improve Web Performance via Markov Prediction Model
Shikha Yadav, Urvashi
Abstract

Web prefetching is a prominent solution to reduce the network resources consumed by Web services as well as the access latencies perceived by Web users. Unlike Web caching, which exploits the temporal locality, Web prefetching utilizes the spatial locality of Web objects. Specifically, Web prefetching fetches objects that are likely to be accessed in the near future and stores them in advance. In this context, a sophisticated combination of these two techniques may cause significant improvements on the performance of the Web infrastructure. Considering that there have been several caching policies proposed in the past, the challenge is to extend them by using data mining techniques. In this paper, we present a clustering-based prefetching scheme where a graph-based clustering algorithm identifies clusters of ‘‘correlated’’ Web pages based on the users’ access patterns. This scheme can be integrated easily into a Web proxy server, improving its performance. Through a simulation environment, using a real data set, we show that the proposed integrated framework is robust and effective in improving the performance of the Web caching environment. Reducing the web latency is one of the primary concerns of Internet research. Web caching and web prefetching are two effective techniques to latency reduction. A key method for intelligent prefetching is to rank potential web documents based on prediction models that are trained on the past web server and proxy server log data, and to pre-fetch the highly ranked objects. The PROPOSED APPROACH is three level approach in which we have combined markov model along with association mining and clustered approach. For this method to work well, the prediction model must be updated constantly, and different queries must be answered efficiently.
Keywords: Markov, association mining, Clustering, Web Mining.






Full Text PDF
254-259 An Approach to Improve Web Performance via Markov and C-Means Algorithm
Shikha Yadav, Urvashi
Abstract

Optimization of Web page search and the web page access is always the major issue for a web user, because of this there is always some scope to improve the web page access based on user requirement. One of such approach is given by web page pre-fetching. The pre-fetching concept is about to avail the web page to user before the user demand. It means as the user is visiting some page the next page that he will visit will be copied to the user cache. Web prefetching is an attractive solution to reduce the network resources consumed by Web services as well as the access latencies perceived by Web users. Unlike Web caching, which exploits the temporal locality, Web prefetching utilizes the spatial locality of Web objects. Specifically, Web prefetching fetches objects that are likely to be accessed in the near future and stores them in advance. In this context, a sophisticated combination of these two techniques may cause significant improvements on the performance of the Web infrastructure. Considering that there have been several caching policies proposed in the past, the challenge is to extend them by using data mining techniques. In this paper, we present a clustering-based prefetching scheme where a graph-based clustering algorithm identifies clusters of ''correlated'' Web pages based on the users' access patterns. Reducing the web latency is one of the primary concerns of Internet research. Web caching and web prefetching are two effective techniques to latency reduction. A key method for intelligent prefetching is to rank potential web documents based on prediction models that are trained on the past web server and proxy server log data, and to pre-fetch the highly ranked objects. The PROPOSED APPROACH is three level approach in which we have combined markov model along with association mining and clustered approach. For this method to work well, the prediction model must be updated constantly, and different queries must be answered efficiently.

Keywords: Markov, association mining, C-means, Web Mining.






Full Text PDF
260-266 Extensible Multi Agent System for Heterogeneous Database
A.Ramar , M.Elamparithi
Abstract

Very often data relevant to one search is not located at a single site, it may be widely distributed and in many different forms. Similarly there may be a number of algorithms that may be applied to a single Knowledge Discovery in Databases (KDD) task with no obvious “best” algorithm. There is a clear advantage to be gained from a software organization that can locate, evaluate, consolidate and mine data from diverse sources and/or apply a diverse number of algorithms. Multi Agent Systems (MAS) often deal with complex applications that require distributed problem solving. Since Multi Agent Systems are often distributed and agents have proactive and reactive features, combining Data Mining (DM) with Multi Agent Systems for Data Mining (DM) intensive applications is therefore appealing. This framework promotes the ideas of high availability and high performance without compromising data or Data Mining algorithm integrity.

Keywords:  Knowledge Discovery in Database, Multi Agent Systems, Extendible Multi Agent Data mining System.







Full Text PDF
267-278 A Unified Phase-Shift Modulation for Optimized Synchronization of Parallel Resonant Inverters in High Frequency Power System
Cina Jose, N.Siva Kumar
Abstract

This project present advanced configuration for Symmetric multilevel voltage source inverter is proposed. The Authority of the proposed inverter versus the conventional Cascaded H-bridge inverter and the most recently introduced ones, is verified with provided comparisons. The proposed Inverter is able to generate the desired voltage levels using a Lower number of circuit devices including power semi-conductor Switches and related gate driver circuits of switches. This modular structure uses reduced number of Devices, including its power semiconductor switches and gate Driver circuits of switches. As a result, the total cost is considerably reduced and the control scheme gets Simpler. Moreover, reduced amount of on-state switches in the Suggested configuration decreases voltage drops even, the suggested multilevel Inverter has the lowest amount of power losses. Finally simulation and experimental results are compared with each other and the provided comparison shows that the obtained results are in good Agreements.







Full Text PDF

 

 

 

 

 

IJCSET Menu

Downloads