N. M. Z. Hashim , N. M. T. N. Ibrahim,Z. Zakaria Fadhli Syahrial , H. Bakri,
Development New Press Machine using Programmable Logic Controller
N. M. Z. Hashim , N. M. T. N. Ibrahim,Z. Zakaria Fadhli Syahrial , H. Bakri,
The Press Machine is a project that is designing a new way to improve the previous press machines in industries which has a few weaknesses in safety while operating processes. This will create a lot of problem to the operators which have the higher risk to have an accident. The new press machine is a project to improve previous press machine which have weakness in safety while operating it. This matter creates a lot of problem and at the same time the operators and technician have the higher risk to have an accident in industries. The solution for this problem is a development of a new program of machine which running same operation but the machine is more safety and easy to setup when machine pressing the radio panel using external timer. This machine controlled by the Programmable Logic Controller (PLC). It consists of 5 pneumatic cylinders which each cylinder have their own function. This project contains in 2 states of operations which in automatic and manual mode. In automation mode, all the operation will begin automatically after the operators pressed the 2 switch simultaneously. In manual mode, the operator need to press (switch on) in every state condition to complete the operation. That mean, every state operation has its own switch for the operation. The result showed press machine is able to press the component and device, push it to pick up unit then it will be hold by the pickup unit before it placed on the target place. For the future work, this system should be building with a larger machine as the press components. It will give more power to press the device. The suggestion that can carry out from this research is to use a circuit that can make the Direct Current (DC) current more stable and linear. This project uses the DC current from the motorcycle battery because it more safety for this project
Sadiki Lameck Kusyama, Dr. Michael Kisangiri, Dina Machuve,
Survey on Intelligent Transport System (ITS) application for vehicle speed limit monitoring and accident reporting
Sadiki Lameck Kusyama, Dr. Michael Kisangiri, Dina Machuve,
Today’s transport system has evolved from horse driven carriages and paved roads to a more complex road transport system made up of a variety of vehicles and other infrastructure, all put in place in order to support safe and efficient mobility of vehicles. The next step to further improve the transportation system of today is to make the vehicles and roadside infrastructure more intelligent by making them communicates with each other. This new ability will help find new solutions to current problems like traffic congestion, vehicle accident, monitoring of adherence to traffic rules and alerting the responsible authorities of any traffic rule violation or accident for immediate management. Speed limit violation and inefficiency accident information dissemination in public road transport are recognized as one of the causes leading to traffic accidents and the failure of emergency Medical Services personnel to reach the victim during the socalled “Golden Hour” after the accident in Tanzania. This paper surveys the current system being used for speed management and Accident Reporting management in Tanzania. It also suggests recommendations for the implementation of systems that will effectively influence driving speeds and accident reporting management thereby significantly increase public transport safety
N. M. Z. Hashim , N. H. Mohamad Z. Zakaria , H. Bakri, F. Sakaguchi,
Development of Tomato Inspection and Grading System using Image Processing
N. M. Z. Hashim , N. H. Mohamad Z. Zakaria , H. Bakri, F. Sakaguchi,
Nowadays the food quality is became a major issue in health care. It is difficult to find the best food quality by ourselves in the market. This system was created to specify the quality of specific product. Quality is commonly related with product and it is very important to satisfy the customer’s desire. The system is focus on the quality of food which has impact on our health. For this proposed system, a tomato is been used as the product that to be tested for food quality. This paper explained a technique for automatically detecting tomatoes skin surfaces in digital color images. The system describes two-step process which the first is detecting regions which are likely to contain tomatoes skin in the color images and then extracts information from these regions which might indicate the location of a tomato in the image. An inspection and grading system for tomato that has been loaded as an image and after that the image passed through the brightness process. After the image taken from webcam and already loaded onto the system then the system will process the both images (captured and input) by reading the color in each of pixel images. The processes of the images in this system needed to display the percentages value of color in order to classify the grade of tomato. Matlab software and its image processing toolbox have been used in images processing and analysis. As the result, Graphic User Interface (GUI) for tomatoes inspection and grading system by using Matlab software version 7.0.4 are achieved. For the future recommendation this system can be upgraded by adding the various types of fruits or vegetarians.
Sadiki Lameck Kusyama, Dr. Michael Kisangiri, Dina Machuve,
Automatic vehicle over speed, accident alert and locator system for public transport (Buses)
Sadiki Lameck Kusyama, Dr. Michael Kisangiri, Dina Machuve,
Over speed limit violation done by public transport (buses) is a common problem in most of major roads in Tanzania. This has been reported to be one of the traffic accident causes in Tanzania. Moreover road accidents in Tanzania have been incessant and to bar the loss of life due to accidents is more crucial. This research work proposed and implemented a prototype called Automatic Vehicle Over Speed Accident Alert and Locator System (AVOAALS). The system uses GPS and GSM network, especially GPRS function of the GSM network. The system monitors the speed and accident event of the bus. Once an event is detected, the system leads the current position of the bus using GPS. The event, bus registration number and position data are sent to the control database server as SMS via GPRS services of the GSM Network. The event, bus registration number and position data are then stored in the data base. SMS application software was developed using Microsoft visual studio package. Microsoft SQL saver was used for storing data because of its high performance query engine, tremendously fast data insert capability and strong support for specialized web functions. Using this SMS application software, end user was able to receive SMS on any standard mobile phone about event, position of the targeted object, date and time of event. The administrator at the control data base server was able to extract reports about accident and over speed offenders. This system is very much useful for monitoring speed limit violations, reckless driving, and minifying the accident occurrence as well as optimizing rescue operations. The system was implemented using Sunrom’s GPS receiver with active antenna, GSM modem SIM900D, PIC18F4520 Microcontroller, mobile phone handset Nokia 110 and laptop computer. Prototype was tested and worked perfectly notifying nearby police station, hospital and fire station whenever appropriate event occurred. This work extends the utilization of mobile communication coverage on major roads in Tanzania to enhance road safety.
N. M. Z. Hashim , N. B. Hamdan Z. Zakaria, R. A. Hamzah A. Salleh,
Flood Detector Emergency Warning System
N. M. Z. Hashim , N. B. Hamdan Z. Zakaria, R. A. Hamzah A. Salleh,
Floods occur most commonly when water from heavy rainfall, from melting ice and snow in the country that having cold weather, or from a combination of these exceeds the carrying capacity of the river system, lake, or ocean into which it runs. Due to the effect, many study been conducted as to get ready with a system to alarm people from this disaster. The objective of this project is to match the software (Visual Basic.6) with the system, design the circuit and create a programming code using the Peripheral Interface Controller (PIC) 16F877A microcontroller and apply the GSM Mobile in transmitting the data from one place to another place. Result showed, data was finally sent via Global System for Mobile Communications (GSM) mobile, where it was act as a modem for the system. All three level sensors were also detected the water level. The data from sensor and PIC also were appeared at the control centre. This project can be improved with upgrading the component in Graphical User Interface (GUI) with more function button to make sure it will be more friendly user and interesting. The system is proposed to have the GSM modem will be as a transmission modem in order to have larger coverage, thus it also easily connected to the computer
N. M. Z. Hashim, A. F. Jaafar Z. Zakaria3, A. Salleh R. A. Hamzah,
Smart Casing for Desktop Personal Computer
N. M. Z. Hashim, A. F. Jaafar Z. Zakaria3, A. Salleh R. A. Hamzah,
mputer cooling is the process of removing the heat from computer components. Since a computer system's components produce large amounts of heat during operation, this heat must be dissipated in order to keep these components within their safe operating temperature. In addition to maintain normal function, varied cooling methods are introduced to either achieve greater processor performance, or else to reduce the noise pollution caused by typical This project is proposed as to develop a system that can detect the temperature from the hardware system. This project is a standalone temperature and fan monitoring and control unit for the Personal Computer (PC). The main objective of this project is to overcome the problem that occurs when the system is running for a long time and temperature of the hardware is increase. The ability of this project is this project can control and maintain the value of temperature. This project will turn off the main power if the temperature is overheating. LM35S sensors are used to capture two different temperatures and detect if there are any increases in the temperatures. The main control of this circuit is the Peripheral Interface Controller (PIC) 16F876A to control Direct Current (DC) fans and Light Emitting Diode (LED) when certain temperature was detected. The results showed the system was working successfully as the aim in the objectives. For further improvement in the future, this project can be applied in industrial sector e.g. as temperature controllers in industry include plastic extrusion and injection molding machines and thermo-forming machi
A System for Monitoring and Reporting Excessive Passengers in Public Buses Case Study: Tanzania
Kilavo Hassan, Anael Sam, Dina Machuve,
In Tanzania, there has never been a technology for automatic monitoring and reporting excessive passengers in public buses. Despite having some stationing police at different locations for manual check up, the increase in prevalence of excessive passengers still persists. The finding of this study indicates that many deaths and injuries when accidents occur are caused by two major factors which are passengers overloading and not wearing seat belts. Many people are losing their lives and some are severely injured when accidents occur. The purpose of this work has been to develop a system for monitoring and reporting excessive passengers in public transport in Tanzania. It is based on Passive Infrared Sensor (PIR), Global Positioning System (GPS), and Global System for Mobile Communication (GSM) modem. The system is connected with SQL Server database which receives and stores all information. The system monitors the number of passengers boarding in public buses and reports to the respective authorities when a certain preset number is exceeded. This helps to control excessive passengers. Hence reduce the number of deaths and severe injuries when accidents occur, also helps eradicating bribery as through manual check the bus attendant can bribe the traffic police officer, communications to the traffic police officer will be improved as well as the bus owners, and improves the current system for manual check. Finally the passengers can find a sufficient level of mobility and satisfy their important needs for the efficient movement under safe and comfortable conditions. Keywords-Microcontroller, GSM Modem, PIR, GPS
Web security is in general taken as providing safeguard at the borders of an organization by keeping out impostors. For this purpose password based verification system with public key cryptography is a common standard. Passwords however have their own weaknesses; not only weak passwords can be easily guessed but the strong ones can be broken through too. Sometime people use access cards or identity cards for authentication purpose which can easily be stolen or forged. So designing a high security using passwords, identity cards or access cards still remain an open problem. Biometric characteristics of an individual however are unique and do not change over time that makes biometrics well suited for authentication. There are a large number of applications of biometric system for authentication based on finger prints, hand geometry, iris and voice exist, such as forensics, driver license and passport control etc. Since the internet growth is increasing rapidly, restricted access to sensitive data on the Web to unauthorized users is needed. A hand geometry based system has been proposed here to authenticate users for imposing access restriction to web. This method has been tested on 100 individuals. This technique can be used for e-commerce, e-banking applications etc.
Abubakar, G, Ibrahim, H., Mustafa M., Apugo-Nwosu, T. U., Nwobi B E I., Akuso, S. A. and Agboun D T
Kinetic And Correlation Studies Between Varying Corrosion Parameters And Corrosion Rate Of N-80 Oil Well Tubular Steel In 15% Hydrochloric Acid Pickling Solution Using Ficus Abutilifolia Plant Extract
Abubakar, G, Ibrahim, H., Mustafa M., Apugo-Nwosu, T. U., Nwobi B E I., Akuso, S. A. and Agboun D T
The varying effects of temperature, time and inhibitor concentrations on the corrosion rate of N-80 oil well tubular steel in 15% hydrochloric acid with and without leave extract of Ficus Abutilifolia have been investigated. The time, temperature and concentration of inhibitor were varied in the range 1-2.5 hrs at 0.5 hr interval, 45oC-90 oC at 15 oC interval and 0.1 – 0.9 v/v% at 0.1v/v% interval respectively. Standard deviation, effect of variables at 95% confidence interval, factorial design, and Arrhenius kinetics approach were used to correlate the corrosion parameters and corrosion rate. The obtained results indicate that temperature increase enhances corrosion rate while increase in inhibitor concentration and time decreases corrosion rate. It was found also that temperature and inhibitor concentration are the most important control parameters for corrosion process. The kinetic and statistical approaches were in good agreement.
Abubakar, G* ., Ibrahim,H., Apugo-Nwosu T.U.,Mustafa,M.,Akuso,S. A.,Agboun D T Nwobi, B.E. and Ayilara, S. I.,
Corrosion Inhibition Studies Of Ficus Abutilifolia On N-80 Oil Well Tubular Steel In 15% Hydrochloric Acid Solution
Abubakar, G* ., Ibrahim,H., Apugo-Nwosu T.U.,Mustafa,M.,Akuso,S. A.,Agboun D T Nwobi, B.E. and...
The corrosion inhibition of oil well tubular steel(N-80 steel) in well acidizing solution (15% Hydrochloric acid) by extract of Ficus Abutilifolia (FA) was studied using weight loss technique. Maximum inhibition efficiency (and surface coverage) was obtained at an optimum concentration. However, increase in temperature decreased the inhibition efficiency at the temperature range studied. The inhibition efficiencies were compared to a standard oil well acidization corrosion inhibitor, Propargyl Alcohol. Optimum inhibition efficiency for the tubular steel in the presence of Ficus Abutilifolia were 57.40% at 60oC and 52.57% at 90oC while those for Propargyl Alcohol were 90.97% at 60oC and 67.50% at 90oC. The phenomenon of physical adsorption has been proposed from the heat of adsorption values of all inhibitors studied (-9.35686 to -2.65846kJ/mol). Activation energy values indicates a surface reaction.
A Review on “Adaptive Contriving Routing for Multihop Wireless Ad Hoc Networks
Mubina Begum,C RamaKrishna, Sasmita Behera,
A distributed adaptive opportunistic routing scheme for multihop wireless ad hoc networks is proposed. The proposed scheme utilizes a reinforcement learning framework to opportunistically route the packets even in the absence of reliable knowledge about channel statistics and network model. This scheme is shown to be optimal with respect to an expected average per-packet reward criterion. The proposed routing scheme jointly addresses the issues of learning and routing in an opportunistic context, where the network structure is characterized by the transmission success probabilities. In particular, this learning framework leads to a stochastic routing scheme that optimally “explores” and “exploits” the opportunities in the network.
A Software Test Data Generation Tool for Unit Testing Of C++ Programs Using Control Flow Graph
Goodubaigari Amrulla,
Software quality and assurance in a software companyis the only way to gain the customer confidence by removing all possible errors. It can be done by automatic test case generation. Taking popularly C++ programs as tests object, this paper explores how to create Control flow graphs of a C++ program and generate automatic Test Cases. It explores the feasibility and non- feasibility of path basis upon no. of iteration. First C++ is code converted to instrumented code. Then test cases are generated by using Symbolic Testing and random Testing. System is developed by using C#.net in Visual Studio 2008. In addition some future research directions are also explored
An Optimal Energy Efficient Video Distribution Over Cooperative Wireless Networks
K. Mohan Satya Narayana Reddy, K. Sathi Reddy,
Recently supporting real-time video transmission services with diverse QoS constraints has become one of the essential requirements for wireless communications networks. Consequently, how to efficiently guarantee QoS for video broadcast attracts more and more research attention. However, the unstable wireless environments and the popular layer structured video signals impose a great deal of challenges in delay QoS provisionings. Due to the highly varying wireless channels, the deterministic delay QoS requirements are usually hard to guarantee. As a result, statistical delay QoS guarantees, in terms of effective bandwidth or capacity and queue-length-bound or delay-bound violation probabilities, have been proposed and demonstrated as the powerful way to characterize delay QoS provisioning for wireless traffics. Besides QOS, many energy-efficiency techniques for wireless networks can be found in the literature, which include lowerlayers adaptation, optimization and end-users applications specifically designed to save energy. Thus energy-efficiency is becoming a key factor for the successful deployment of wireless networks. The development and validation of mechanisms for energy- efficient video broadcasting require the measurement of the energy consumption needed for video transmission. This paper presents an optimal energy efficient video transmission for cooperative wireless networks.
Analysis Of Full Bridge Boost Converter For Wide Input Voltage Range
Ch. Abhilash, R. Shirisha, Khaja Rafi,
A family of isolated dc/dc converters for wide input-voltage range is proposed in this paper, and the full-bridge(FB) boost converter, being one of the typical topologies, is analyzed. Due to the existence of the resonant inductor (including the leakage inductor), the FB-boost converter can only adopt the two-edge-modulation (TEM) scheme with the FB cell being leading-edge modulated and the boost cell being trailing-edge modulated to minimize the inductor current ripple over the input-voltage range, and a phase-shift-control-schemebased TEM is proposed which realizes phase-shifted control for the FB cell to achieve zero-voltage switching. In order to improve the reliability and efficiency of the FB-boost converter, a three-mode dual-frequency control scheme is proposed, in which the FB-boost converter operates in boost, FB-boost and FB modes in low, medium and high input voltage regions, respectively, and for which the expression of the inductor current ripple is derived in this paper. A 250–500 V input, 360 V output, and 6 kW rated power prototype is fabricated to verify the effectiveness of the design and control method.
Empirical Study on Migrating Data From Relational Databases To Object-Oriented Technology.
Dr Leelavathi, Rajamanicakam,
Tremendous changes have been taking place in information technology for a few decades. Due to the rapid evolution in this area, the demand for innovation in this area is much higher than elsewhere. This requires large effort of companies to respond quickly to market conditions in order to organize work and conduct business more efficiently. In particular, companies have to reengineer existing form of new key technologies like WWW or E-Commerce. A typical scenario in many companies when applying a reengineer process is That on the one hand, a large body of data is captured in relational or even hierarchal or network databases, and on the other hand object oriented applications have to be developed. Thereby, a new object model is constructed which represents the current state of the company’s business processes. However, the new object model and the existing relational database’s model usually do not go well together. In other words, a large semantic gap between both models must be bridged. The approach proposed in this paper is database migration. Basically, this approach comprises two tasks. In the first task, the relational database schema is reengineered. The schema is transformed into a well designed and intuitively understandable object oriented schema, which the new applications can adapt. Afterwards, the data are (automatically) migrated into an object oriented DBMS. An algebra is proposed for a formal definition of data migration process. The schema transformation process is subdivided into three sequential phases. In the first phase, the relational schema is transformed (automatically) into an SOT schema. This initial SOT schema is then redesigned resulting in the adequate object oriented schema. Finally, in the third phase t resulting SOT schema is (again automatically) transformed into an object oriented schema according to the ODMG standard. The data migration process is generated automatically for each schema transformation phase. In order to implement schema transformation, the concept of transformation rule is proposed. The transformation rules define elementary restructuring operations within the SOT model. A basic set of transformation rules has been proposed which can be extended. Finally, a prototype has been implemented as a proof of concept.
: Collaborative writing describes a full length writing assignment completed in pairs or small groups. Collaborative writing (CW) transforms the usually solitary work of writing and editing college papers into a group endeavor. Instructors value such assignments because of their real world relevance. After all, in most workplaces writing is typically produced by a team or goes through multiple hands for revising purpose. Even in academia we often collaborate on research and co-author journal articles with the colleagues. Giving students the opportunities to practice writing and editing with others is a prudent step in preparing them for the world after their graduation. This paper reports on architecture for supporting collaborative writing that was designed with both pedagogical and software engineering principles in mind, and a first evaluation. The overall aim of this paper is to demonstrate how our system, called iWrite, effectively allows researchers and instructors to learn more about the students’ writing activities, particularly about features of individual and group writing activities that correlate with quality outcomes.
This paper aims to describe a computational algorithm for automatic recognition of vehicle registration plate from recorded video. There is extensive research and literature on different ways to implement automatic recognition of vehicle registration plate. Popular methods involve the use of technologies like computer vision, image precession, artificial neural networks and fuzzy logic systems. Some of these have been implemented, but none so far have been able to guarantee high levels of accuracy. Also, most of these systems work on still images captured from a camera. In this approach, we begin by obtaining frames having image of moving car from the video using motion detection. The region containing the number plate is then identified by the Canny edge detection algorithm and Hough transformation. Segmentation of the plate is then undertaken, using histogram analysis, to obtain the separate characters. Neural techniques are then applied to recognize the individual characters. With further work on the components of such a system and their successful integration, a largely automated system can be developed for traffic and law enforcement purposes. The deployment of such a system in different states or countries carries with it its own unique issues, and there is a need to configure the system to properly function in the required domain..
*Madhu Mohan Reddy P, Suresh Babu C Purusotham S Sundara Murthy M,
New Algorithm for Minimum Spanning Network Connectivity Problem
*Madhu Mohan Reddy P, Suresh Babu C Purusotham S Sundara Murthy M,
Minimum Spanning Network Connectivity possesses self adaptcity. In order to construct telecommunications, wireless communications, routing is one of the key challenging issues to be addressed. In this paper, A new Algorithm for Minimum Spanning Network Connectivity is proposed. This algorithm is proposed based on the Pandit’s approach. Proposed new algorithm incorporates with drainage system in a city, Vehicle routing, Linked with different rivers etc. Thus new algorithm aims to choose optimal minimum spanning network connectivity from nodes to the destination. This algorithm is compared with previously suggested algorithms to performance differences. Extension experimental evaluations are performed from suitable numerical example. It is shows that the new algorithm for minimum spanning network connectivity provides better than the previously suggested algorithms.
An Adaptive Energy Efficient Packet Forwarding Method for Wireless Sensor Networks
Sangeetha tamilmozhi, Dr. R. Pugazendi,
In Wireless Sensor Network (WSN), Sensor nodes have limited processing capabilities, therefore simplified protocol architecture should be designed to make communications simple and efficient. Due to this limited power supply, every solution elaborated for these networks should be aimed at minimizing the energy consumption. In previous approach, the original data packets are split into a number of sub-packets equal to the number of disjoint paths from source to destination. This approach is applied sequentially in that network which takes more computational time. The proposed approach splits the original messages into several packets such that each node in the network will forward only small sub-packets. The splitting procedure is achieved by applying the Chinese Remainder Theorem (CRT) algorithm. This approach is applied in entire network which takes low computational time. The objective is to improve the energy in wireless sensor network.
Traffic Flow Prediction Based on Optimized Type-2 Neuro-Fuzzy Systems
Mojtaba Paricheh , Assef Zare,
A correct predict of traffic flow is an important issue in intelligent transportation systems (ITS). Because traffic flow influenced by nonlinear various factors such as driver behavior ... Constitutes a non-linear robust system that changes with time. In this paper, traffic system of azadi- Hojat intersection in Mashhad city intended and actual data from years 2009 and 2010 have been collected from SCATS system. Since ANFIS is a fuzzy - Adaptive Neural system so with their training, there may be an optimal controller, the number of additional parameters that give for adjust the system with training, A set of conditions gets. In this paper, a method for long-term prediction of upper and lower bounds of traffic volume using type-2 fuzzy systems based on type-1 Neuro-fuzzy systems are presented. For this purpose, at first , effective inputs selected and type-1 fuzzy systems training with them. Then equivalent fuzzy type 2 system with that replaced and in final, type-2 fuzzy system parameters are optimized by genetic algorithm. The results show that the prediction based on type-2 fuzzy logic is admirable.
Review of "Achieving Secure, Scalable, and Finegrained Data Access Control in Cloud Computing"
U.JyothiK., Nagi Reddy, B. Ravi Prasad,
Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this paradigm also brings forth many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers, which are not within the same trusted domain as data owners. To keep sensitive user data confidential against untrusted servers, existing solutions usually apply cryptographic methods by disclosing data decryption keys only to authorized users. However, in doing so, these solutions inevitably introduce a heavy computation overhead on the data owner for key distribution and data management when fine-grained data access control is desired, and thus do not scale well. The problem of simultaneously achieving fine-grainedness, scalability, and data confidentiality of access control actually still remains unresolved. This paper addresses this challenging open issue by, on one hand, defining and enforcing access policies based on data attributes, and, on the other hand, allowing the data owner to delegate most of the computation tasks involved in fine-grained data access control to untrusted cloud servers without disclosing the underlying data contents. We achieve this goal by exploiting and uniquely combining techniques of attribute-based encryption (ABE), proxy re-encryption, and lazy re-encryption. Our proposed scheme also has salient properties of user access privilege confidentiality and user secret key accountability. Exten-sive analysis shows that our proposed scheme is highly efficient and provably secure under existing security models.
As the peers participating in Unstructured networks interconnect randomly, they rely on flooding query messages to discover objects of interest and thus introduce Remarkable network traffic. Empirical measurement studies indicate that the peers in P2P networks have similar preferences, and have Recently proposed unstructured P2P networks that organize participating peers by exploiting their similarity. The resultant networks may not perform searches efficiently and effectively because existing overlay topology construction algorithms often create Unstructured P2P networks without performance guarantees.A novel overlay formation algorithm for unstructured P2P networks, is unique in that it poses rigorous performance guarantees. Theoretical performance results conclude that in a constant probability, searching an object in this proposed network efficiently takes hops (where c is a small constant), and the search progressively and effectively exploits the similarity of peers. This overlay approach requires a minimal number of communication over the network and provides tunable parameters to maximize performance for various network topologies. It provides a powerful technique for the aggregates of various topologies and data clustering, but comes with limitations based upon a given topologies structure and connectivity. For topologies with very distinct clusters of peers, it becomes increasingly difficult to accurately obtain random samples due to the inability of random-walk process to quickly reach all clusters.
The least significant bit (LSB) based approach is a popular type of steganographic algorithms in the spatial domain. The advantage of LSB is its simplicity to embed the bits of the message directly into the LSB plane of cover-image and many applications use this method. In this paper we try to give an overview of different LSB methods and there advancements.
Images have large data capacity. For storage and transmission of images, high efficiency image compression methods are under wide attention. In this paper we implemented a wavelet transform, DPCM and neural network model for image compression which combines the advantage of wavelet transform and neural network. Images are decomposed using Haar wavelet filters into a set of sub bands with different resolution corresponding to different frequency bands. Scalar quantization and Huffman coding schemes are used for different sub bands based on their statistical properties. The coefficients in low frequency band are compressed by Differential Pulse Code Modulation (DPCM) and the coefficients in higher frequency bands are compressed using neural network. Using this scheme we can achieve satisfactory reconstructed images with increased bit rate, large compression ratios and PSNR.
Comparison Of SINR In FemtoCell & MacroCell Network In MacroCell Environment
Kanak Raj Chaudhary, Rachna Arya,
Femtocells (HeNB) are deployed within macrocell coverage area to increase performance of indoor user. In order to cover, all indoor users, HeNBs make a network, known as femtocell network. Since, HeNBs use same spectrum, they are causing interference on both MeNB users (MUE) and among HeNB users (HUE). The performance of the femtocell network depends on the SINR of HUEs of respective HeNBs, which eventually depends on the interference produced on it. In order to improve the performance, we need to minimize the interferences among them. In this paper, we first study the SINR performance of HUEs in presence macrocell. We also analyze the outage probability in femtocell network. Finally, consider the power consumption of femtocell network.
Association Rule Mining on Type 2 Diabetes using FP-growth association rule
dita Rane Madhuri Rao
To diagnose diabetes disease at an early stage is quite a challenging task due to complex inter dependence on various factors. There is a critical need to develop medical diagnostic decision support systems which can aid medical practitioners in the diagnostic process. For detection of diabetes at an early stage, data mining association algorithm is being used. Detecting the cause of diabetes is very important in order to stop diabetes. The data set is taken from Nirmay Diabetes Super Speciality Center repository containing total instances 900 and approximately 30 attributes of type 2 diabetes mellitus. Proposed method explores step-by-step approach to help the health doctors to explore their data and to understand the discovered rules better. The discovery of knowledge from medical databases is important in order to make effective medical diagnosis. Most of the rules focus on the improving mining efficiency but, for the medical research, mining efficiency is not the most important factor, and there is a need to find more useful association rule and abandon more useless association rule. We proposed a modified equal width binning interval approach to discretizing continuous valued attributes. The approximate width of desired intervals is chosen based on the opinion of medical expert and is provided as input parameter to the system. First we have converted numeric attributes into categorical form based on above techniques. FP-growth association mining is used to generate rules which are useful to identify general association in the data.
IPv6, the latest revision of the Internet Protocol, is intended to replace IPv4, which still carries the vast majority of Internet traffic as of 2013. The advent of IPv6 changes not only the network components, but also the security field shifts. We see new types of attacks or at least variations of the attacks we know from IPv4. Although IPv6 was designed with the aim of superseding its ancestors; it is defected in its ability to provide security to its users, anonymity being one such issue. Anonymity is preferred by internet users, and in IPv4, this has been achieved to some extent using NAT. However in IPv6, the protocol reintroduces a transparent end-to-end connectivity, thus eliminating masquerading feature that was previously obtained via NAT. The documented methods of mapping MAC and IPv6 addresses also exposes the users to be easily identified. The preference of anonymity would have to trade off with the performance. This brings the issue of challenges in preserving anonymity in IPv6. This article provides an overview of the IPv6 security vulnerabilities that arise with the launch of IPv6 and a possible solution to overcome the problem with anonymity. We propose the use of a “default deny” policy in firewall that forbids any request not explicitly mentioned by the user.
ATM (Asynchronous Transfer Mode) has been advocated as an important technology for all types of services and networks. Most people believe that ATM will be the standard for the future B-ISDN (Broadband Integrated Services Digital Network). To ensure the success of ATM, lots of the design issues have been standardized by ATM Forum. Due to the success of ATM on wired networks, wireless ATM (WATM) is a direct t result of the ATM "everywhere" movement. While ATM supports for different traffic characteristics and QOS requirements, WATM networks provide wireless extension to the ATM-based B-ISDN networks by adding mobility support functions. This paper reviews the important aspects of wireless ATM and the handoff related issues. It reviews the basic concepts and benefits of ATM. Then the important features of WATM, service models, protocol model, the key characteristics of WATM and the global activities on WATM are dealt. The paper focuses on the survey of Handoff techniques in WATM and related issues. The Handoff requirements, various strategies and open issues are discussed.
Modeling and Predicting Total Ozone Column and Rainfall in Kodaikanal, Tamilnadu By Arima ProcessAmongst all weather happenings, ozone plays the very important role in human life as well as climate change. The understanding of Total Ozone Column (TOC) and
Amongst all weather happenings, ozone plays the very important role in human life as well as climate change. The understanding of Total Ozone Column (TOC) and rainfall variability helps the agricultural management in planning and decision- making process. The important aspect of this research is to find a suitable time series seasonal model for the prediction of total ozone column and annual-rainfall in Kodaikanal,Tamilnadu. In this study, Box-Jenkins model is used to build an ARIMA model for predicting the monthly total ozone column and rainfall in Kodaikanal, Tamilnadu with a total of 12 years data. Keywords: ARIMA, Rainfall, Seasonality, Total Ozone Column
Image mosaicing is the act of combining two or more images.It aims to combine images such that no obstructive boundary exists around overlapped regions. Emphasis is given on to create a mosaic image that contains as little distortion as possible from the original images, as well as preserving the general appearance of the original image. Multiresolution representation technique is an effective method for analyzing information contents of signals, as it processes the signals individually at finer levels, to give more accurate results that contains much less distortion. Laplacian pyramid, Gaussian pyramid and Wavelet transform are types of Multiresolution representations. In the proposed work, I have use wavelet transform, Laplacian pyramid using Gaussian pyramid as transforms function in context of simplicity and working satisfactorily in real time domain. Application areas of this subject are widespread in the fields like signal analysis, image coding, image processing, computer vision and still counting. The work in this project will be focused on designing a model which balances the smoothness around overlapped region and the fidelity of blended image to the original image.
With the growth in the communication, there is an increase in the transmission of data across the various medium; security is the key issue that needs to be addressed. Various steganography techniques are used to hide actual message secretly to provide control over the medium where data is sent. This paper is intended to propose an image steganography technique that will hide four bits of data in first component (blue) of a pixel in 24 bit RGB image. Security is employed in the secret key as secret key will decide the location where data is to be stored in the digital image and its length will depend upon the message length.
OVERVIEW ON PASSENGERS OVERLOAD CONTROL IN PUBLIC BUSES CASE STUDY: TANZANIA
Kilavo Hassan, Anael Sam, Dina Machuve,
Passengers overload in public buses has been a problem in Tanzania. Despite some stationing police at different locations for manual check being in place, the overloading of passengers still persists. The current system doesn’t work efficiently as the check is done at random, and it is difficult during the rainy seasons and at night and it is costs and needs labor power. The findings indicate that many deaths and injuries when accidents occur, they cause deaths and injuries mainly if there is passenger overloading or if the passengers are not wearing seat belts or both. Many people lose their lives and some are severely injured when accidents occur in these public buses. This paper checks an overview on the current system and proposes a new system which uses new technology for controlling passengers overload in public buses to overcome to challenges of the current system. The proposed system will help in controlling excessive passengers and hence reduce the number of deaths and severe injuries. It will also reduce the possibilities of bribe and reduce cost and labor power. Finally the standard and comfortable passenger system for public buses can then be attained.
A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it could take years to find it. Depending on the password's length and complexity, there could be trillions of possible combinations. To speed things up a bit, a brute-force attack could start with dictionary words or slightly modified dictionary words because most people will use those rather than a completely random password. These attacks are called dictionary attacks or hybrid brute-force attacks. Brute-force attacks put user accounts at risk and flood your site with unnecessary traffic. Hackers launch brute-force attacks using widely available tools that utilize wordlists and smart rule set to intelligently and automatically guess user passwords. Although such attacks are easy to detect, they are not so easy to prevent
Comparative Analysis of CMOS Transmission Gate Based Adders
Swaranjeet Singh,
The adder is the most commonly used arithmetic block of the Central Processing Unit (CPU) and Digital Signal Processing (DSP), therefore its performance and power optimization is of utmost importance. In realizing modern Very Large Scale Integration (VLSI) circuits, low-power and high-speed are the two predominant factors which need to be considered. There always exists a trade-off between the design parameters such as speed, power consumption, and area We designed three different types of 4-bit transmission gate based adders namely Ripple Carry Adder, Carry Select Adder and Carry Lookahead Adder We compared the different adders on basis of no. of transistors, the average power consumption and delay. The simulation results are taken for 180nm technology with the help of Tanner (T-spice) simulation tool.
Prevention of Credit Card Fraudulence in Point-of-Sale Terminus
Manoj , Prabhakar,
The credit card fraudulence has become more vulnerable threat in recent days. The period between the credit card theft and blocking of it is sufficient for intruder to get away with all amount in it by swiping in POS (Point-Of-Sale) Terminus and stealing the entire amount in it. It can be prevented by taking the cumulative average of first 'n'(eg 10) transactions that has done by the user in that credit card through POS and when the next transaction has been done, if the Standard Deviation of amount usage is more than average of first 'n' transactions, then the banks should enable PIN(Personal Identification Number) for that particular transaction and if the PIN entered is wrong, the card will be blocked and the user should go to bank in person and reveal his identity and activate the card again
Nowadays cyber crime is the most concerning issue for all developed and developing countries ,because it harm governmental confidential data as well as people in daily life transactions. In this paper I had covered some type of cyber crime with the help of print and electronic media by quoting some current cases happened related to cyber crime. In next section , statistics of crime cases are discussed which were happened in last few years and compared crimes happened in 2012 with previous years and also discussed what type of crimes are on increase and decrease
Novel Approach for Secured Data Delivery in Congested Wireless Sensor Network
Divya Hiran, Dr. Jitendra Kumawat,
Wireless Sensor Networks has turn out to be an explorative area of research since last few years, due to energy constraints of sensors. Reduction of energy is a vital part of the research in this field. Congestion control is a key problem in mobile ad-hoc and sensor networks. In case of congestion system require more power to deliver data. The standard Transmission Control Protocol congestion control method is not able to handle the special properties of a shared wireless multi-hop channel. In particular the frequent changes of the network topology and the shared nature of the wireless channel pose significant challenges. Many approaches have been proposed to overcome these difficulties. In this paper, we present an overview over Congestion Aware Routing and propose a new protocol to introduce secured transfer of data and avoid loss of low priority packets which is a bottleneck of Congestion Aware Routing.
The Internet routing system plays an essential role of gluing together tens of thousands of individual networks to create a global data delivery substrate. Over the years many efforts have been devoted to securing the routing system, the weak trust model in Border Gateway Protocol (BGP) introduces severe vulnerabilities for Internet routing including active malicious attacks and unintended misconfigurations. Although various secure BGP solutions have been proposed, the complexity of security enforcement and dataplane attacks still remain open problems. We propose TBGP, a trusted BGP scheme aiming to achieve high authenticity of Internet routing with a simple and lightweight attestation mechanism. TBGP introduces a set of route update and withdrawal rules that, if correctly enforced by each router, can guarantee the authenticity and integrity of route information that is announced to other routers in the Internet. To verify this enforcement, an attestation service running on each router provides interfaces for a neighbouring router to challenge the integrity of its routing stack, enforced rules, and the attestation service itself. If this attestation succeeds, the neighbouring router updates its routing table or announces the route to its neighbours, following the same rules. Thus, a router on a routing path only needs to verify one neighbour’s routing status to ensure that the route information is valid. Through this, TBGP builds a transitive trust relationship among all routers on a routing path. We implement a prototype of TBGP to investigate its practicality.
Data warehouse, online transaction processing system (OLTP) and on-line analytical processing (OLAP) are basically main need of the database collection in business, corporate fields and many areas. Nowadays many services, products and new techniques are available and offering many ideas in the DBMS. This paper is research about the data warehousing with OLAP and OLTP with the basic need and main parts of the business database management. The main here consider that Data warehouse usage, process, Data warehouse with Meta data, online transaction processing system (OLTP), on-line analytical processing (OLAP) and also OLTP vs. OLAP with advantages and disadvantages
H. T. Rathoda, B. Venkateshb Shivaram. K. Tc , Mamatha. T. Mb
Numerical Integration Over Polygonal Domains using Convex Quadrangulation and Gauss Legendre Quadrature Rules
H. T. Rathoda, B. Venkateshb Shivaram. K. Tc , Mamatha. T. Mb
This paper presents a numerical integration formula for the evaluation of òò W IIW ( f ) = f (x, y)dxdy , where f ÎC(W) and W is any polygonal domain in 2 Â . That is a domain with boundary composed of piecewise straight lines. We then express å å å = = = ÷ ÷ ø ö ç ç è æ II = II = II - M n p Q M n P T f f f N n n p 1 2 1 0 ( ) ( ) ( ) 3 in which PN is a polygonal domain of N oriented edges l (k i 1, i 1,2,3,..., N), ik = + = with end points ( , ), i i x y ( , ) k k x y and ( , ) ( , ) 1 1 = N+1 N+1 x y x y . We have also assumed that PN can be discretised into a set of M triangles, Tn and each triangle Tn is further discretised into three special quadrilaterals ( 0,1, 2) Q3n- p p = which are obtained by joining the centroid to the midpoint of its sides. We choose xy Tn = Tpqr an arbitrary triangle with vertices ((x , y ), a = p,q,r) a a in Cartesian space (x, y). We have shown that an efficient formula for this purpose is given by ( ) ( ) (4 ) ( ( , ), ( , )) , 3 1 ( ) ( ) f c x h f x u v y u v dxdh e e e S T pqr n ÷ ø ö ç è æ II = òò + + å= where, ( , ) ( ) ( ) , ( , ) ( ) 1 ( ) 3 ( ) 1 ( ) 2 ( ) 1 ( ) z u v z z z u z z v z x y e e e e e e = + - + - = (( , , ), 1,2,3) (( , , ),( , , ),( , , )) ( ) 3 ( ) 2 ( ) 1 p q r q r p r p q e e e z z z e = = z z z z z z z z z ( ) 48 , pqr area of Tn c = T u [1/ 3,1/ 2,0,0][M , M , M , M ] = 1 2 3 4 , [1/ 3,0,0,1/ 2][ , , , ] , 1 2 3 4 T v = M M M M = (x,h) = (1+ xx )(1+hh ) 4,{(x ,h ), b = 1,2,3,4} = {(-1,-1),(1,-1),(1,1),(-1,1)} M b M b b b b b and S = {(x, h) -1£ x, h £1} is the standard 2- square in (x,h) space. Using Gauss Legendre Quadrature Rules of order 5(5)40, we obtain the weight coefficients and sampling points which can be used for any polygonal domain, W = PN or Tn or Qm ( m = 3n - 2,3n -1,3n). Boundary integration methods are also proposed which are helpful in verifying the application of derived formulas to compute some typical integrals
An Allocation of Exploited Resources for Potent Parallel Data Processing In Cloud
Prof.Santosh Kumar. B, AnandKumar A.K,
In recent years ad-hoc parallel data processing has emerged to be one of the killer applications for Infrastructure-as-aService (IaaS) clouds. Major Cloud computing companies have started to integrate frameworks for parallel data processing in their product portfolio, making it easy for customers to access these services and to deploy their programs. However, the processing frameworks which are currently used have been designed for static, homogeneous cluster setups and disregard the particular nature of a cloud. Consequently, the allocated compute resources may be inadequate for big parts of the submitted job and unnecessarily increase processing time and cost. In this paper we discuss the opportunities and challenges for efficient parallel data processing in clouds and present our research project Nephele. Nephele is the first data processing framework to explicitly exploit the dynamic resource allocation offered by today’s IaaS clouds for both, task scheduling and execution. Particular tasks of a processing job can be assigned to different types of virtual machines which are automatically instantiated and terminated during the job execution. Based on this new framework, we perform extended evaluations of MapReduce inspired processing jobs on an IaaS cloud system and compare the results to the popular data processing framework Hadoop.
Data-intensive e-science collaborations often require the transfer of large files with predictable performance. To meet this need, we design novel admission control (AC) and scheduling algorithms for bulk data transfer in research networks for e-science. Due to their small sizes, the research networks can afford a centralized resource management platform. In our design, each bulk transfer job request, which can be made in advance to the central network controller, specifies a start time and an end time. If admitted, the network guarantees to complete the transfer before the end time. To improve the network resource utilization or lower the job rejection ratio, the network controller solves optimization problems in making AC and scheduling decisions. Our design combines the following elements into a cohesive optimization-based framework: advance reservations, multipath routing, and bandwidth reassignment via periodic
As the Internet takes an increasingly central role in our communications infrastructure, the slow convergence of routing protocols after a network failure becomes a growing problem. To assure fast recovery from link and node failures in IP networks, we present a new recovery scheme called Multiple Routing Configurations (MRC). Our proposed scheme guarantees recovery in all single failure scenarios, using a single mechanism to handle both link and node failures, and without knowing the root cause of the failure. MRC is strictly connectionless, and assumes only destination based hop-by-hop forwarding. MRC is based on keeping additional routing information in the routers, and allows packet forwarding to continue on an alternative output link immediately after the detection of a failure. It can be implemented with only minor changes to existing solutions. In this
Review On Secure and Distributed Reprogramming Protocol
Ruchika Markan, ,Gurvinder Kaur,
Wireless reprogramming is very important in sensor networks. Reprogramming is defined as the process of loading a new code image or relevant commands to sensor nodes. For security reasons every code update must be authenticated to prevent an attacker from installing malicious scripts in the network. A number of protocols have been defined for reprogramming the wireless sensor networks. SDRP is the first distributed reprogramming protocol in which multiple authorized network users can simultaneously and directly reprogram sensor nodes without involving the base station. The protocol uses identity-based cryptography to secure the reprogramming and to reduce the communication and storage requirements of each node. Preserving data privacy is a challenging problem in wireless sensor networks. On comparison, Elliptic Curve Integrated Encryption Scheme (ECIES) provides great solution for security and authorization in the sensor network.
Mining Association Rules for Web Crawling using Genetic Algorithm
J. Usharani Dr. K. Iyakutti,
With the recent advancement of Internet and Web Technology, web search has taken an important role in our ordinary life. A Web crawler is a software program that automatically retrieves the Web pages when a query is placed in the search engine. To discover interesting patterns or relationship between data in large database Association rule mining is used. Association rule mining can be an important data analysis method to discover associated web pages. The Apriori algorithm is a proficient algorithm for determining all frequent web pages. The Frequent web pages form the Association rules. We proposed a novel approach - genetic based apriori algorithm for web crawling. The proposed method yields promising results compared to the ordinary apriori algorithm and we present empirical results to substantiate this claim.
The advantage of Mobile Ad-hoc Networks (MANETs) is to form a wireless network in the absence of fixed infrastructure. . In defining and managing trust in a military MANET, we must consider the interactions between the composite cognitive, social, information and communication networks, and take into account the severe resource constraints. We provide a survey of trust management schemes developed for MANETs and discuss generally accepted classifications, potential attacks, performance metrics, and trust metrics in MANETs. Finally, we discuss future research areas on trust management in MANETs based on the concept of social. AODV node is able to discover multiple loop-free paths as candidates in one route discovery. These are evaluated by two values hop count and trust values. In this paper we discuss about trust value and improves the packet ratio
Literature Survey on Energy Consumption Control for Wireless Mobile Ad-hoc Network
Krishan Kumar YK Jain
Energy consumption control in wireless ad-hoc networks is a more difficult problem due to non availability of access point in network. A node can be both a data source and a router that forwards data for other nodes. There is no centralized entity such as an access point to control and maintain the power control mode of each node in the network. There are number of challenges offered by mobile adhoc network environment like limited power, route failure, synchronization, security etc. Nodes in the mobile ad-hoc network environment have limited battery power. Extra amount of energy is needed by router to forward and to relay packets. In this paper, literature survey is carried out on energy consumption issues for wireless ad-hoc network.
Performance Evaluation of Dynamic Fuzzy Voter Used In Safety Critical Systems
P.Babul Saheb, K.Subbarao,
Several voting algorithms have been described to arbitrate the results of redundant modules in fault-tolerant systems. The inexact majority and weighted average voters are widely used in control and safety-critical applications. Inexact majority voters require an application-specific ‟voter threshold‟ value to be specified, whereas weighted average voters are unable to produce a benign output when no agreement exists between the voter inputs. A major difficulty with inexact majority voters is the need to choose an appropriate threshold value, which has a direct impact on the voter performance. The problem of all documented weighted average voters is their inability to produce a benign output in cases of complete disagreement between the voter inputs. Both types of voters are unable to cope with uncertainties associated with voter inputs originated from erroneous software, noisy environment, or noisy hardware modules. A voting scheme based on fuzzy set theory was introduced which softens the harsh behaviour of the inexact majority voter in the neighbourhood of the „voter threshold‟ and handles uncertainty and some multiple error cases in the region defined by the fuzzy input variables. A set of fuzzy rules determines a single fuzzy agreeability value for each individual input which describes how well it matches the other inputs. The voter is experimentally evaluated from the point of view safety and availability and compared with the inexact majority voter in a Triple Modular Redundant structured framework. It is predicted that the fuzzy voter can be invaluable in at least two cases 1) as a substitute for the inexact majority voter in applications in which a small degradation in the safety performance of the system is acceptable at the cost of a large increase of its availability and a considerable decrease of its benign outputs 2) when arbitrating between the responses of dynamic channels of control systems which may include some uncertainty. Automatic fuzzy parameter selection based dynamic fuzzy voter for safety critical systems with limited system knowledge. Existing fuzzy voters for controlling safety critical systems and sensor fusion are surveyed and safety performance is empirically evaluated. The major limitation identified in the existing fuzzy voters is the static fuzzy parameter selection. Optimally selected static fuzzy parameters work only for a particular set of data with the known data ranges. Dynamic voter is designed in such a way that it can be plugged in and used in any safety critical system without having any knowledge regarding the data produced and their ranges.