IJETER | International Journal of Emerging Technologies in Engineering Research (IJETER)

Welcome to International Journal of Emerging Technologies in Engineering Research (IJETER)


Volume 3, Issue 3, December (2015)

S.No Tile & Authors Full Text
1 Interactive Tri Index Based Fuzzy Type Ahead Search in XML Data
Laxman Dethe, Prof. Sunita Barve
Abstract – This paper we are written to store XML data in XML formats for Security purpose. Here we compute the problem of efficiently creating ranked result for keyword search query in XML document. In old methods there are Xlink Xpath and Xquery are query methods available to search data in XML file of XML DB. Here the method new users are not able to understand syntax of query when accessing the query, in this steps first write query, put forward to the system and retrieve relevant results. In case of keyword search there is the fuzzy type ahead search over XML data that user write a keyword search on fly way and access a new information pattern, This method are optional to old methods ,The users didn’t need to know knowledge of XML query languages and its syntax. We are also adding a user study confirming that keyword-based search in SQL for a range of DB retrieval task. The query time, the text index carry keyword-based searches with giving interactive answer. Successful keyword search is valuable for top-k in XML document, these are user simply manage, semantic and steer into documents. The effective XML keyword based search with significance ranking is an approach that contains ambiguities, because a keyword can seem in a name tag or a text value of each XML node. The top-k queries on high multi-attribute data sets are basic operations in information retrieval and top-k order application. We have used top-k it can be find approximate answer in top ranking system in XML document more successfully and efficiently.
Download
2 Combined technique of MMSE Estimator and Kalman Filter to suppress CFO Effect in LTE Uplink Transmission
Tannishtha, Ms.Gagandeep Kaur Cheema
Abstract – The third generation partnership project (3GPP) Long Term Evolution (LTE) is the newest technology to deal with the increasing need of mobile broadband services. Single-Carrier Frequency-Division Multiple Access (SC-FDMA) technology is being used for uplink (UL) transmission. But SC-FDMA system is also susceptible to CFO, comparable with other Orthogonal Frequency Division Multiple (OFDM) based systems which is generally occurs due to Doppler shift and oscillator mismatch. The numerous CFOs of the received signals will disrupt the orthogonality between the various subcarriers. Consequently, the generation of ICI and MAI into the received signals will occur. Thus the performance of the system will be sincerely degraded. To suppress the effect of CFO, the new hybrid technique of MMSE Estimator and Kalman Filter is proposed. Simulations results show that the algorithm is effective in the presence of CFO. The value of BER diminishes to some extent by applying proposed technique and results in significant improvement in the system performance.
Download
3 Fabrication and Performance of Fiber Reinforced Composite Material by Using Sunhemp Natural Fiber
Murali Krishna Yantrapati, Narendra Kumar Jinka
Abstract – Engineering achievement has always been closely associated with the availability of suitable materials of construction. Materials with unusual combinations of properties that cannot be meet by the conventional metal alloys, ceramics and polymeric materials. Materials of aerospace under water and transportation are particularly used in the properties like low density, stiffness, abrasion and impact resistance the composite materials can achieve these properties. We have chosen the natural fiber as the reinforcement having better properties than artificial fibers which are abundantly available in nature. So we studied the properties of natural fibers and selected sun hemp fiber because of easily availability and its maximum tensile strength. We fabricated this natural fiber in random oriented distribution. Finally the tensile and flexural tests are conducted and proved these natural fibers are superior to artificial fibers which are also degradable. We had selected the sun hemp as natural fiber because it has maximum tensile stress as compared to other fibres like jute, coir etc., and finally these tests are proved that it has more tensile strength and flexural strength than other fibres.
Download
4 Fuzzy Logic Control for Renewable Source DC-DC Boost Converter using MATLAB
G.C.Sowparnika, A.Sivalingam, M.Thirumarimurugan
Abstract – DC- DC boost converters are switched power converters. In this article, the boost converter for 300V is designed. The main drawback of the power converter is the unlimited supply of voltage and current. In order to control the output voltage with variations in the input voltage, a Fuzzy Logic Controller (FLC) is designed. The output response of the open loop model of the converter and the FLC system is compared using the simulation results. This article also gives the overall design procedure for the boost converter and its controller transfer function.
Download
5 Design and Analysis of Piston, Piston Rings and Cylinder Liners by Using Aluminium-Flyash-Alumina Composite
Saigowtham Ponnathi, Lokanadham R
Abstract – The cylinder liner and piston rings having frictional losses in the account of 20% of mechanical losses. The frictional losses can be reduced in the piston rings and cylinder liners, it causes higher efficiency and lower fuel consumption. The piston, piston rings and cylinder liners can also work at the higher temperatures and higher pressures and it reduces the frictional losses. In this project the design of piston, piston rings and cylinder liners are modelled in CATIA V5. The design of the engine parts is complex and efficiency is related to the type of material. The material is taken as ALUMINIUM-FLYASH-ALUMINA composite. Here the analysis is made in the ANSYS software where structural and thermal analysis of the piston can be determined.
Download
6 Anti-Phishing System Using Visual Cryptography
Vikas Sahare, S.A Jain, Manish Giri
Abstract – With the coming of web, different online assaults has been expanded and among them the most famous assault is phishing. Phishing is an endeavor by an individual or a gathering to get individual private data, for example, passwords, credit card data from clueless exploited people for character theft, financial increase and other false exercises. Fake web sites which seem fundamentally the same to the first ones are being hosted to accomplish this. In this paper we have proposed another approach named as “Anti-phishing system using visual cryptography in cloud” to take care of the issue of phishing. Here an image based confirmation utilizing Visual Cryptography is implemented. The utilization of visual cryptography is investigated to safeguard the privacy of a picture captcha by breaking down the image captcha into two shares (known as sheets) that are put away in separate database servers (one with client and one with server) such that the first picture captcha can be uncovered just when both are all the while accessible; the individual sheet pictures do not uncover the character of the first picture captcha. When the original picture captcha is uncovered to the client it can be utilized as the secret word. Utilizing this site cross checks its character and proves that it is a certified site before the end clients.
Download
7 Analysis of Different Cloud Servers on Basis of Job Scheduling Approach
Tejinderjit Singh, Parminder Singh
Abstract – Cloud Computing is the evolving paradigm with changing their definitions but in this research project, it is defined in the term of a virtual infrastructure which can be provides the shared information and services of communication technology, via the internet “Cloud” for access of “external multiple users” through use of the Internet or the “large-scale private networks”. Cloud Computing is providing a computer user access to the Information Technology services i.e., data servers, storage, applications, without requiring understanding of a technology or even the ownership of infrastructure. To comprehend the Cloud Computing, an analogy to electricity computing grid is to be useful. The power company maintains and also owns infrastructure, the distribution company disseminates electricity, and consumer merely uses the resources without ownership or the operational responsibilities. The Cloud Computing is receiving great deal of attention, both in the publications and the users, from individuals at home to the U.S. Government. The Cloud Computing is a subscription-based service where one can obtain networked storage space and the computer resources. One is the way to think of Cloud computing to consider their experience with email. All email clients, if it is Gmail, Yahoo!, Hotmail, & so on, takes care of housing all of the hardware and software necessary to support personal email account. When someone wants to access their email, one is open their web browser, go to email client, and log in. In this the most important part of the equation is having internet access.
Download
8 Identification of Scalar Meson Field with Perfect Fluid in Bimetric Theory for a Spherically Symmetric Cosmological Model
R.N.Patra, R.C.Sahu, R.R.Swain
Abstract – The eigen values of scalar meson field and perfect fluid for a spherically symmetric homogeneous metric in Bimetric theory has been compared. It is found that the scalar meson field does not represent the perfect fluid for the space time. However the equivalency of these two fields is true in general theory of relativity in Bimetric theory. Some physical and geometrical properties of both the models are also discussed.
Download
9 Comparative Study of Storage Stability of Sweet Potato and Yam Flours
Ogbonnaya Chukwu, Aishat Omobola Lawal
Abstract – The storage stability of sweet potato (Ipomoea batatas) and yam (Discorea alata) flours was investigated. Sweet potato and yam tubers purchased from Kure Market Minna, Nigeria were processed into sweet potato and yam flours of initial moisture contents of 4.32%, and 4.33% respectively. The processed flours were packaged in plastic containers and stored at 23ºC and 65% RH. Proximate composition and microbial analysis of the flour samples were carried out at one week interval for a period of two weeks. Results showed that the moisture, ash, crude fibre and fat contents of yam flour at the end of two weeks storage period were relatively higher than that of sweet potato flour. The protein and carbohydrate contents of yam flour were slightly lower than those of sweet potato flour. Results also showed that the bacterial count of sweet potato flour ranged between 72 × 103 cfu/g and 81 × 103 cfu/g while that of yam flour ranged between 61 × 103 cfu/g and 141 × 103 cfu/g after two weeks of storage. The fungal count of sweet potato flour was relatively higher than that of yam flour after two weeks of storage. Subject to the results of the proximate composition analysis and microbial safety, yam flour would be recommended for the production of pastries by food industries either alone or in combination with other flours for good quality attributes, microbial safety and longer shelf life.
Download
10 A Novel Approach for Dimension Reduction of Data Instance Using Genetic & Greedy Feature Selection Method
Ujjawal Singh, Prof. Megha Mishra, Dr. V.K.Mishra
Abstract – Data mining application has massive advantages, as historical data have huge number of features. Feature selection has been broadly deliberated in supervised learning, whereas it is still comparatively infrequent researched in case of unsupervised learning. Every data mining application has common issue; dataset has huge number of features which is immaterial or redundant to the data mining job in hand which pessimistically affects the performance of the fundamental learning algorithms, and makes them less efficient. There is trouble of useless increase in dimension is strongly related to obsession of recording or measuring data at a far granular level then it was done earlier. There is no doubt that this is a hot problem. It has started gaining more importance lately due to surge in data. Henceforth reducing the dimensionality of dataset is primary and important job for data mining applications and machine learning algorithms so that computational burden of the learning algorithms can be minimized. In this paper we will compare the GFS (Greedy Feature Selection) , our proposed method and different feature selection algorithms discussed so as to find out factors which affect the performance of existing algorithm. In our proposed method we have integrated the Genetic feature selection method and GFS.
Download
11 Biometric Verification by Fusing Hand Geometry and Palmprint Features for Personal Authentication
Wen-Shiung Chen, Lili Hsieh, Yao-Shan Chiang
Abstract – This paper presents a biometric recognition system with fusion of hand geometry and palmprint of a human hand based on wavelet transform and statistical moments for personal authentication. The proposed system consists mainly of four modules: image acquisition, image preprocessing, feature extraction, and recognition modules. Image preprocessing module uses some image processing algorithms to localize the region of interest of palmprint and hand geometry from input images. The feature extraction module adopts the gradient direction (i.e., angle) and quadratic spline function of wavelet transform as the discriminating texture features in palmprint, and the statistical moments calculated from hand geometry. The system generates the palmprint feature codes using a coding technique: binary gray encoding. Experimental results show that the proposed recognition system has an encouraging performance on our own hands database. The recognition rates up to 94.17%, 95.50%, 96.67%, and 98.33%, respectively, using different feature extraction methods may be achieved.
Download
12 Avoid Spectrum Scarcity by Using Dynamic Spectrum Access and Sequence Based Rendezvous Method
K.Sivanesan, I.Shahanaz Bhegum
Abstract – Cognitive broadcasting network (CRN) is used to solve the underutilization problem of licensed spectra and overcome spectrum scarcity. Each secondary user has the capability to detect the spectrum holes and operate on these channels. As Enhanced Alternative Hop and Wait will generate a unique alternate CH series for each Secondary User to hop on, Secondary users need to be assigned unique IDs for identifying. The problem formulation intends to develop a new blind rendezvous method which can thoroughly satisfy the blind rendezvous criteria with shorter TTR. The design considerations are Asynchronous environment, Rendezvous guarantee, Asymmetric model, Heterogeneous of roles, Rendezvous performance. The rendezvous guarantee Secondary users that any two Secondary users can rendezvous within finite time slots. In this paper, to easily verify the performance of blind rendezvous methods, both the source secondary users and target secondary users are Secondary user to be available in the system. The time slotted communication system important to provide both shorter TTR and more rendezvous in a time unit. Secondary users have to discover the number of available channels of its target which is hard to achieve. Enhanced Alternative Hop and Wait has the smallest standard deviation of rendezvous interval, which indicates the transmission jitter is lower and communication is stable. A small standard deviation of channel access times shows that Enhanced Alternative Hop and Wait uses all common channels equally, which not only can avoid the single point of failure problem but also use the broadband resource efficiently.
Download
13 Secure Management with SCADA-IDS Framework for Power System Delivery
K. Bharath, P. Balasubramanian
Abstract – Digital security has turn out to be high need in Industrial Automation (IA).Here reliable operation is to guarantee the safe, steady and dependable in power network delivery. Lack of clarity advancement can be effectively uprooted by utilizing the IDS system. Access control procedure is basically introducing the anomalous attacks. The system gives a progressive way to deal with a coordinated security framework, including distributed IDSs. In this paper, SCADA-IDS with whitelist and behavior-based SCADA proposed and exemplified so as to recognize known and unknown digital attacks from inside or outside SCADA frameworks. At last, the proposed SCADA-IDS is executed and effectively approved through a progression of practical situations performed in a SCADA-specific test bed developed to replicate cyber-attacks against a substation LAN. From the perspective of SCADA system operators, to compare the performance and accuracy of proposed solutions, the lack of openly available test dataset is a bottleneck. However, for research in the community to progress, such a dataset would be valuable. The propose system will to create new dataset to mitigate vulnerable attack from cyber-crime side to save the higher level records and system. Further to improve system performance a hybrid structure of compromised framework with IDS series of realistic situations will be proposed. Digital signature technique has been used to ensure the information which they are going to communicate on each other on networking area. Authenticating value will get sign by sending side and it will re-evaluate by using destination area.
Download
14 Design of 3D-EBG for L band Applications
Dr.Jammi Ashok, N.L.Pratap, Estifanos Yohanes
Abstract – Three dimensional electromagnetic band gap structures is proposed in present paper. This 3DEBG exhibits universal band gaps, therefore do not allow propagation states in any direction. In order to understand it's operating characteristics, its surface properties are such as (i) surface wave band gap (ii) In phase Reflection (iii) Impedance and (iv) Transmission co-efficient are measured with the help of electromagnetic simulation software. The FEM based simulation software results are presented with detailed description. The proposed structure is operating at 1.9GHz and exhibiting with a surface wave suppression band gap of 240MHz and Inphase reflection band gap of 50MHz.
Download
15 Storing of Unstructured data into MongoDB using Consistent Hashing Algorithm
Saranraj Sankarapandi , Dr.M. Sai Baba, S.Jayanthi, E.Soundararajan
Abstract – In the modern world network users or internet users are increasing incredibly day by day because of that more and more unstructured data’s are producing and consuming over the network. And how to maintain those data and improve the availability and scalability of the storage system becomes a considerable challenge. Nowadays some of the NoSQL databases are supported the unstructured data management and provide different advantages for the unstructured data management e.g. CassandraDB, CoughDB, MongoDB, DynamoDB etc. MongoDB that is providing the most flexible query functions for the unstructured data management compared to the other databases like Dynamo Db, Cassandra DB. The main objective of this paper is to store a large amount of unstructured data into the MongoDB with using the Consistent hashing algorithm. The consistent hashing algorithm is one of the algorithm for the storing the documents into the database using the consistent hash ring.
Download






Publication Process

Accepted papers will be published online immediately,upon receiving the final version from the authors.

Paper Submission

There is no deadline for paper submission. Authors are requested to send their unpublished manuscripts to: ijetereditor@gmail.com

Copyright

COPYRIGHT © EverScience Publications