Welcome to International Journal of Emerging Technologies in Engineering Research (IJETER)

Volume 4, Issue 1, January (2016)

S.No Tile & Authors Full Text
1 Dynamic Server Consolidation for Virtualized Data Center Using Bin Packing Algorithm
Jaganathan k, I.shahanaz begum, Dr. M. Sai Baba
Abstract – Data center Virtualization has become a key technology used for simplifying the service management and reduce energy costs in data centers. Some of the challenges faced by data centers is to make a decision when, how, and which virtual machines (VMs) have to be consolidated into a particular physical server. It has a straight impact on service response time. Most of the obtainable solutions for server consolidation is excited migrations, which try to minimize the number of physical servers running in VMs. These solutions produce avoid migrations due to changeable workloads that need to VM resizing. We observed that avoiding migration of VMs. Server consolidation is important for data center because user workloads are changing and need to be revisited from time to time. Whenever CPU load changes, VM can be resized and can be migrated to additional physical servers if necessary in this paper proposed a bin packing algorithm, which is activated when a physical server becomes overloaded or under loaded. Based on the CPU utilization of virtual machine in order to arrange descending order in running virtual machine So as to Re-mapping the virtual machine to physical server using live migration for Minimize the number of physical servers used.
2 Optimizing Ontology Alignment for Nuclear Information System
M.Ramesh, P.Karthikeyan, Dr.N.Madurai Meenachi, Dr. M.Sai Baba
Abstract – Ontology is the interrelationship of entities which is used for searching hierarchical data. It is the foundation of the semantic web that plays an important role in enabling interoperability between applications. Ontology mapping is an essential part of the semantic web which have role of finding alignments among the entities of the given ontologies. Ontology mapping is a necessary step for establishing interoperation and knowledge sharing among semantic web applications. The proposed methodology for mapping the ontologies gives more efficiency than existing methodologies. It classifies the given input into classes, subclass and properties using OWLAPI. It matches using S-Match technique in memetic algorithm to get optimized results. As shown by experiments, this approach gives best results than existing methods.
3 Instance Based Matching System for Nuclear Ontologies
Pushpakumar R, Dr. M.Sai Baba, Dr.N.Madurai Meenachi, Balasubramanian P
Abstract – Ontology matching is method interoperability viewer through heterogeneous data resources in the semantic web for mixing data semantically. Instance matching system is one of the important ontology matching systems, in many domains, such as the nuclear, ontologies are becoming gradually large thus presenting new challenges. We have developed a new instance matching system, focused on computational effectiveness and designed to switch ontologies, while maintaining most of the flexibility and extensibility of the Instance matching system. We calculated the efficiency of instance matching system two nuclear Ontologies, obtaining excellent run time results. Instance matching is the best system as measured in positions of F-measure. Similarly in terms of F-measure, instance matching system is good with the best performers in two of the task track that match whole ontologies.
4 Static Typestate Verifier FED with Enriched Models
Immanuel Joshua.F, S. Jayanthi
Abstract – Dynamic specification mining observes program executions to infer models of normal program behavior. What makes us believe that we have seen sufficiently many executions? The TAUTOKO (“Tautoko” is the Ma˜ori word for “enhance, enrich.”) typestate miner generates test cases that cover previously unobserved behavior, systematically extending the execution space, and enriching the specification. To our knowledge, this is the first combination of systematic test case generation and typestate mining—a combination with clear benefits: On a sample of 800 defects seeded into six Java subjects, a static typestate verifier fed with enriched models would report significantly more true positives and significantly fewer false positives than the initial models.
5 Survey-Sharepoint Workflow Using Sharepoint Designer
Madhu Seles T, N. Viveka Priya
Abstract – Workflow is a sequence of steps where each step is banded together, and is designed to automate processes. Many Organizations use workflows in their day-to-day activities to handle various processes. Be it a disappear request or the on boarding of a fresh resource, or the outlet of an employee, or the placing of procedure for IT, overall a process needs to be followed. This process is imbruted using workflows. This is where SharePoint is applicable. It offers numerous ways to create workflows. But it also has various numbers of limitations over there.
6 A Web-Based System for Classifying Social Network Users Using GEPHI
Babu Kannan, Priyadharshini V. Muthurathinam
Abstract – The availability of social network has increasing over the past few years, and also have more chance to perform fast marketing with the social network. The information collected from the different users is used to know the characteristics of social network users. At the same time, a large number of relationships between social network users is increased. The development of the system uses HTML5, JavaScript, PHP, AJAX and other web programming languages for their efficient Applications Programmer Interface (API). There are some of the areas for further development, they are event diary, hobbies, group page and admin control. In future, those developments are to be carried out with all the options required. Final work is classification of users, those classifications are going to be developed with the help of analyzing users behavior and their travel plan ideas shared by the users.
7 Mining an Open Forum with Similar Words Scoring
Rajkumar K, G. AnnaPoorani
Abstract – Many data mining techniques have been proposed so far to mine text documents. However, those are all not giving importance to similarity and relatedness between words. Since most existing text mining methods adopted term-based approaches, they all suffer from the problem of synonymy between words. Synonym is a word or phrase that means exactly or nearly the same as another word or phrase in the same language. This paper presents an innovative and effective text mining technique which includes the processes of detecting and scoring of similar and closely related words, to improve the efficiency of the text mining. Substantial experiments on an open forum demonstrate that the proposed solution achieves encouraging performance. Here similar words refers to the words which are similar by meaning and relatedness refers to the contextual relationship between words.
8 On The Binary Quadratic Diophantine Equation
K.Meena, S.Vidhyalakshmi, R.Janani
Abstract – The binary quadratic equation x2-6xy+y2+24x=0 represents a hyperbola. In this paper we obtain a sequence of its integral solutions and present a few interesting relations among them.
9 Overview on Security of Wireless Sensor Networks in Smart Network
Mohammad Trik, Hossein Mohammadi, Azadeh Rezaimehr, Fardin Mohammadi Darvandi
Abstract – WSNs (Wireless Sensor Networks) have been considered one of the very promising technologies for the implementation of smart grid. And security of WSNs becomes a central concern. The security solutions for generic wireless sensor networks cannot be directly used in smart grid WSNs. In this paper, the applications of sensor networks in electric power systems are discussed and analyzed first. Then, the characteristics of smart grid WSNs are summarized. Threats and security requirements special for wireless sensor networks used in smart grid systems are presented. Based on these works, reference security architecture was proposed to guide the development and the design of the security solutions of wireless sensor networks in smart grid systems, considering the information security requirements of electric power systems. Moreover, open security issues needed solve to protect WSNs applied in smart grid, and research challenges are introduced.
10 Transparency in Remote Method Invocation (RMI) for Distributed Systems: Middleware Layer
Abstract – Remote Method Invocation (RMI) is a mechanism that allows objects located in a different computers in a computer network to interact with each other. The main goal of RMI is to provide the full transparency regarding Distribution. This article gives the overall view of the working procedure of Remote Method Invocation and how it aims to be distribution transparency. Achieving distribution transparency is not an easy task in a distributed systems but this can be done through RMI. RMI is most important and currently most popular concept that need to be known by any one because it is used in so many applications such as internet search engines, social websites, distributed file systems, various mailing systems, online groups etc. This paper demonstrates clearly about RMI and its Transparency.
11 Application of a Reliable Technique for Transmission Lines Protection
Ihedioha Ahmed C.
Abstract – In this research, a protection of transmission lines using Global Positioning Systems (GPS) is presented. The proposed idea has the feature of unit protection relays to protect large power transmission grids based on phasor measurement units. The principle of the protection scheme depends on comparing positive sequence voltage magnitudes at each bus during fault conditions inside a system protection center to detect the nearest bus to the fault. Then the absolute differences of positive sequence current angles are compared for all lines connecting to this bus to detect the faulted line. The new technique depends on synchronized phasor measuring technology with high speed communication system and time transfer GPS system. The simulation of the interconnecting system was applied using Matlab Simulink. The new technique can successfully distinguish between internal and external faults for interconnected lines. The time of fault detection were estimated by 0.00345 msec for all fault conditions and the relay were also evaluated as a backup relay based on the communication speed for data transferring.
12 Home Automation Using Global System for Mobile Communications (Gsm)
Ihedioha Ahmed C., Eneh Ifeanyichukwu I.
Abstract – The development of the new technologies in the field of electronics has brought tremendous changes in the day to day life of every human being. They have entered the fields like industry, medicine, telecommunication and also home automation. Modern houses are gradually shifting from conventional switches to centralized control system. The system has been experimentally tested for both sensing and controlling purposes first with serial port of the Personnel Computer (PC), then in a real time using Global System for Mobile Communications (GSM). The method discussed in the paper is novel and has achieved the target to control home appliances remotely using the SMS-based system satisfying user wishes and necessities.
13 Robust Digital Image Watermarking for Copyright Protection with SVD-DWT-DCT and Kalman Filtering
Samreet Kaur, Ravneet Kaur Sidhu
Abstract – Information security is a widely used concept in internet technology. Digital image Watermarking is a way to achieve information security. Digital Image Watermarking hides information in the original image without affecting much quality of the image. Copyright protection or rightful ownership is the main purpose of performing digital image watermarking. Watermarking techniques mainly focus on the robustness of image which simply means to improve imperceptibility. In this paper, a digital image watermarking technique SVD-DWT-DCT with Kalman Filtering has been proposed that works in frequency. Experimental evaluation of the technique on the basis of PSNR, MSE has shown that the SVD-DWT-DCT with Kalman Filtering gives better results in contrast to SVD-DWT-DCT technique.
14 Implementation of AES on FPGA Using Application-Specific Instruction Processor
P.Kokila, T.G.Dhaarani, S.Nandhini, P.Premkumar
Abstract – This paper presents two designs for the advanced encryption standard on field-programmable gate arrays (FPGAs) which occupies low area. The first design is an 8-bit application-specific instruction processor, which supports key expansion (currently programmed for a 128-bit key), encipher and decipher. The design utilizes less than 60% of the resources of the smallest available Xilinx Spartan II FPGA (XC2S15). The average encipher-decipher throughput is 2.1 Mbps when clocked at 70 MHz The design has numerous applications where low area and low power are priorities. The second design, using the Xilinx PicoBlaze soft core is included to provide an embedded 8-bit microcontroller comparison baseline.
15 Data Prediction and Optimized Clustering For MPSO and CSO Based Clustering
S.S.Saravana Kumar, G.Divya
Abstract – Cat Swarm optimization (CSO) is one in every of the new heuristic optimization algorithms that supported swarm intelligence. Previous analysis shows that this algorithmic program has higher performance compared to the opposite heuristic optimization algorithms: Particle Swarm optimization (PSO) and weighted-PSO within the cases of perform diminution. During this analysis a brand new CSO algorithmic program for bunch drawback is projected. The new CSO bunch algorithmic program was tested on four totally different datasets. The modification is created on the CSO formula to get higher results. Then, the accuracy level of projected algorithmic program was compared to those of K-means and PSO bunch. The modification of CSO formula will improve the performance of CSO bunch. The comparison indicates that CSO bunch may be thought-about as a sufficiently correct bunch technique.
16 Study of Fluoride Concentration in the ground water of Atrauliya Nagar Panchayat Area of Azamgarh District
Shafqat Alauddin, Shailendra Yadav
Abstract – Ground water contains fluoride ions dissolved from geological formations. Fluoride at optimal level decreases the incidence of dental caries and is also necessary for maintaining the integrity of oral tissues but at the same time when taken in excess during development stages can cause adverse effects like dental fluorosis, skeletal fluorosis , mottling of teeth, osteoporosis etc. Therefore, the concentration of fluoride should be within permissible limit as prescribed by various organizations such as WHO, ICMR and BIS. Hence, it becomes very important to study the fluoride concentration in the ground water used for drinking purpose. In the present study, fluoride content has assessed by standard analytical procedures and found in the range 0.211 to 0.619ppm at different sampling stations of Atrauliya Nagar Panchayat during Jan 2014 to Nov 2014.
17 Application of Enhanced Clustering For Different Data Mining Techniques
P.Suganyadevi, J.Savitha
Abstract – Iris data are rather very complex and it is very difficult to predict the behavior of runoff based on temporal data sets. This paper has been proposes a Modified approach K-Means clustering and enhanced pca algorithm which executes K-means algorithm this Algorithm approach is better in the process in large number of clusters and its time of execution is comparisons base on K-Mean,DBSCAN algorithm approach. If the process experimental result is using the proposed algorithm it time of computation can be reduced with a group in runtime constructed data sets are very promising. Modified Approach of K Mean Algorithm and enhanced pca is better than K Mean and dbscan for Large Data Sets.
18 A Review on Medical Image Compression Techniques
SeyyedHadi Hashemi-Berenjabad, Saeid Mojarrad
Abstract – Hospitals and clinical environments are moving towards computerization, digitization and centralization, resulting in prohibitive amounts of digital medical images. Advance in telecommunication and information technology and emergence of electronic management systems are other reasons that resonating image problems. Therefore, Compression techniques are essential in archival and communication of medical images. In this paper we present a brief review on medical image compression methods which are applicable in telemedicine, e-health, and teleconsulation systems.
19 Tunnelling Authenticated Data from Raspberry PI and Message Intimation via GSM
Abstract – A credit card sized single board computer named raspberry pi which is built using ARM11 processor that plugs into your TV or any display and a keyboard. The paper deals with a system which maintains the attendance records automatically. This system comprises of a fingerprint reader to manage the attendance of the person. The attendance generated is stored in the database and the information is passed via SSH tunnel to the server system. Also the attendance report is sent as message to the person’s mobile periodically. This finger print system is secured in maintaining the attendance in any organization. The recorded finger print detail is shown on the display of raspberry pi. Also a GSM/GPRS module is used to send intimation to person’s mobile about the attendance data stored in server.
20 A Ternary Quadratic Diophantine Equation
K.Geetha, Manju Somanath, M.A.Gopalan
Abstract – The Quadratic Diophatine equation with three unknowns represented by x2+y2=10z2 is analyzed for finding its non-zero distinct integral solutions. Different patterns of solutions of the equation under consideration are obtained. A few interesting properties among the solutions are presented.

Publication Process

Accepted papers will be published online immediately,upon receiving the final version from the authors.

Paper Submission

There is no deadline for paper submission. Authors are requested to send their unpublished manuscripts to: ijetereditor@gmail.com


COPYRIGHT © EverScience Publications