IJAIR- Volume 3 Issue 6 (June 2014)

 


Sr/No/ Title Pdf
1 Antibacterial Potential of Luprops tristis - the Nuisance Rubber Plantation Pest from Western Ghats of India
Bindiya E. S., Roselin Alex, Cikesh P. C, Karthikeyan P, Sarita G Bhat and Chandrasekaran M

Abstract- Insects hold potential for deriving novel bioactive substances against multiple drug resistant bacteria that pose serious challenges for the clinical management of several microbial mediated diseases. In this context, Luprops tristis, a rubber plantation litter pest with a high population in the moist South Western Ghats of India was explored for possible bioactive substances. In-vitro studies showed that all the Gram positive (Staphylococcus aureus NCIM No. 2079; Bacillus cereus NCIM No. 2217; and Lysinibacillus BTTS10) and Gram negative species (E.coli NCIM No. 2574; Salmonella typhi BTC12; Klebsiella pneumonia NCIM No.2957) tested were sensitive to this compound. The minimum inhibitory concentration was 0.067mg mL-1 for S. aureus, L. fusiformis and 6.7mg mL-1 for E.coli, S. typhi, K. pneumoniae. The extract was partially purified by column chromatography. FT-IR showed the presence of alkenyl (C=C) & carbonyl (=CO) groups. GC MS indicated the presence of [(hexadecyloxy) methyl]-, oleic acid, butylated hydroxytoluene and hexadecanoic acid.

Download
2 Appraisal of Extraction Protocols for Metagenomic DNA from Fish Gut Microbiota
Tina K. J, Bindiya E. S, Raghul Subin S, Sarita G. Bhat

Abstract-The gut microbiota composition in fishes is highly diverse and complex. Complete cataloguing of this microbial community demands the use of metagenomic approaches. Obtaining DNA in sufficient quantity and purity is crucial in metagenomic analysis. The present study compares the existing DNA extraction protocols to ascertain the appropriate method for fish gut metagenomic analyses. Gut contents removed aseptically from intact Sardinella longiceps were used for DNA isolation. DNA isolation methods for fish flesh, saline soil, mouse gut and fish bacteria, coded as A, B, C and D were compared to the protocols for Gram positive and Gram negative bacteria of Qiagen DNeasy Blood & Tissue Kit and the protocol of QIAamp DNA Stool Minikit, coded as E, F and G, respectively. The concentration and purity of the DNA obtained was analyzed in terms of OD 260/280 and 260/230 ratios and the processing times were also compared. The 16S rDNA was amplified, to consider its suitability for further analysis. All the seven protocols yielded DNA, with different yields. Method A and B gave the maximum yield. In terms of purity, commercial kit based methods and method C were ideal. All the methods, except methods C and F gave PCR amplicons. Processing time was found to be the least for method G. The different methods varied widely in performance with respect to yield and purity, the final choice of method depends on the requirement of the researcher, which may be a high yield or purity or short processing time of the sample

Download
3 Enhanced Data Security using Visual Data Hiding process
Shailesh Kumar, Er. Archana Singh

Abstract—Image cryptography is an art of hiding information in images or transforming images to obtain to hide any visual information. The image cryptography is a traditional domain of information hiding and may be very old between various cryptographic techniques. In this modern age image cryptography is a mathematical model by which the information is manipulated in other human un-recognizable format. Basically that can be categorized in two basic classes first partial image encryption, and secondly the complete image encryption technique. In this paper the image cryptographic approach is explored and investigated for their authenticity. In addition of that a new cryptographic model is proposed and implemented. The basic idea is taken from a partial image encryption technique namely visual cryptography, and the idea is extended to find a complete image cryptographic scheme. Therefore, additional mathematical operators are utilized for achieving new cryptographic data model. Moreover it, the previous image cryptographic models are only suitable to encrypt image data. That is also extended to find a solution for text and image both kinds of data.The proposed cryptographic model is implemented using java technology. After implementation the performance of the proposed system is evaluated over different performance parameters i.e. computational complexity, space complexity and data validity. The calculated results demonstrate the acceptability of the proposed cryptographic model due to their less resource (memory and time) consumption, high data validity for image and text data both.

Download
4 Optimum Design Of Rocket Nozzle For Enhancement Of Thrust Using Cfd
Allama prabhu S , Dr. K S Shashishekar & H V Harish

ABSTRACT: Analysis of flow through C-D nozzle has been carried out , ideal gas equation used for designing the nozzle, based on that design flow analysis carried out. The inlet boundary conditions were specified according to the available experimental information from journal. Numerical study has been conducted using two-dimensional axis-symmetric model at different divergence angle .Governing equations were solved using the finite-volume method in ANSYS CFX-13 software. The nozzle geometry has been calculated theoretically by using boundary conditions parameters. The present study is aimed at investigating supersonic flow at different divergence angle, and different area ratio keeping throat dia intact, since the variations in the parameters like the Mach number, pressure, are being analyzed and nozzle design will be optimized. Further for different altitude analysis has been carried out (5000, 10000, 20000, 25000 & 50000 feet). A Computational Fluid Dynamics (CFD) software package, ANSYSCFX-13, was used to simulate the compressible, viscous gas flow-field in seven nozzle shapes, including the heat transfer analysis. The results of turbulence models, k-ε were computed for different divergent angle, different area ratio and compared. Further based on Mach number and thrust, nozzle design has been optimized .Model and meshing done by ICEM-CFD, analysis done by CFX-13 and results obtained by CFD-POST. Geometry has been redesigned theoretically, by analyzing the flow parameters and hence optimizing the geometry of nozzle.

Download
5 Study of Chelation Behavior of Mixed-ligand Ternary and Mixed Metal-Mixed ligand Quaternary Complexes of Toxic Metal Hg (II) and Cd (II) Ions Involving 2-Aminosuccinic acid and 5-methyluracil
K.Kumar and D.K. Dwivedi

The ternary and quaternary chelates formed by metal – ligand interaction of Hg (II) and Cd (II) ions with 2-Aminosuccinic acid and 5-methyluracil have been studied at silver-silver chloride electrode by the potentiometric technique. The stability constants of Hg (II)- 2-Aminosuccinic acid- 5-methyluracil, Cd (II)- 2-Aminosuccinic acid - 5-methyluracil and Hg (II) – Cd (II)– 2-Aminosuccinic acid - 5-methyluracil were determined using SCOGS computer programme and the complex formation were elucidated with the aid of species distribution curves. The molar ratios of ternary and quaternary chelates were kept as 1:1:1 and 1:1:1:1 respectively.

Download
6 A Study on AA 6063 Coated With Yttria Stabilized Zirconium
K.R.Ramyesh , A.Prabhu , S.Suresh Kumar

Abstract— In this study aluminium alloys 6063 were selected, and yttria stabilized zirconium coating is given. The plasma-sprayed ceramic coatings technology was used to reduce heat losses to a minimum during coating. The aluminium alloys were subject to many test before and after coating. Initially microstructure analysis and Optical Emission Spectroscopy test were taken to ensure that the sample chosen has similar chemical composition or not. After passing the initial test, the YSZ coating is given to test sample and supportive test was carried out. Surface topography of yttria stabilized zirconium coated substrate was investigated by SEM analysis. The evaluation of adhesion of coating over the substrate is made by using scratch tester and the result obtained was 5B (ISO comparison report). The hardness of the coated substrate was measured by micro vicker’s hardness tester and the value increased from 97 to 208VHN. Furthermore abrasion test was carried out to ensure there is a reduction in abrasion loss and the result obtained was 0.07gm loss for uncoated sample and 0.05gm loss for coated sample which results in increasing the life of the component.

Download
7 Enhanced TTP Architecture in Securing Web Service
Srinath K S, Prabhakar M

Abstract-Web Services use various security standards and protocols. The conventional frameworks applying XML Encryption use DOM-based XML processing. The DOM API is tree-based and therefore the whole document must be parsed before data can be encrypted or decrypted. XML encryption specifies how XML elements should be encrypted to provide message confidentiality. In this paper, a SAX based streaming for XML processing that reduces the memory consumption and execution time for parsing is used. DES is used for generating cipher and Base 64 encoding is used to encode the cipher in character format. A Trusted Third Party authority is also proposed to provide authentication using X.509 certificates. The system has been tested for different attack scenarios and the results found to be satisfactory.

Download
8 Study of heat exchanger by using Fluid Structure Interaction Method
Shashank Wankhede, Dr. K. S. Zakiuddin

Abstract — In this study, the research is planned in finding how to calculate the fluid induced stresses over shell and also to calculate heat transfer and pressure drop in shell side using fluid structure interaction (FSI) method. Comparison will be carried out for performance parameters like computational time and accuracy of results between hex and tetrahedral element types using Ex-Sight software for FSI method.

Download
9 CloudStash: An Efficient Technique to Provide Security to Multi-Clouds
Suman V Chinivar, Sirisha G N, Sushma K V

Abstract - Cloud computing is rapidly growing in many organizations. Cloud computing has many features of storing and sharing their data over the cloud network. The various ways of storing and sharing the data has made cloud computing very popular among various organizations. According to IDC survey; security is the major issue that the cloud is facing. Protecting the cloud using normal key management technique opens the risk of attackers hacking the key and confidential data. To address these issues, we propose the CloudStash scheme. Here, we apply the secret sharing scheme directly on the file to store multi-shares of the file. Then we apply hash and sign techniques to provide highly secure cloud by addressing the issues like confidentiality, data integrity, availability and key management.

Download
10 Survey on Information Retrieval Algorithm
Sandeep Kaur, Nidhi Bhatla

Abstract— Document retrieval systems find information to given criteria by matching text record (documents) against user queries. A document retrieval system consists of a database of documents, an optimal matching algorithm to build a full text index, and a user interface to access the database. A document retrieval system has two main tasks: Find relevant documents to user’s queries, evaluate the matching results and sort them according to relevance, using algorithms such as the Kuhn munkres Algorithm. The retrieval method consists of text extraction and segmentation from different text document formats and source code documents into logical and semantic segments. These segmented documents are used to calculate the similarity against the user queries.

Download
11 Denial Of Service Attacks (DDOS) Detection And Prevention Based On Packets Flow Of The Website
R.Rajalakshmi , A.Mani , B.Raja

Abstract -Nowadays, In a fast moving growth of Distributed Service over internet by a Distributed Denial of service (DDoS) is more challenge due to a critical threat over the internet and botnets are gradually arise. More latest and improved environment on Bot Masters aided to disable detectors by frequently watching and updated to recover flash crowds. Botnets are usually the engines behind Denial of Service Attacks (DDoS). Sophisticated botmasters attempt to disable detectors by mimicking the traffic patterns of flash crowds. This poses a critical challenge to those who defend against DDoS attacks.Ultimate and foremost planning to defend against DDoS attacks by flash crowds. To propose a most relevant and correcting the problems through Discrimination method and corresponding algorithm results to found optimized results.

Download
12 Comparative Study on Semantic Web Service With and Without OWL-S
Yamuna B R

Abstract— The composition of complex services at design time is a well-understood principle which is nowadays supported by many broadly available tools. It’s already beyond the human ability to analysis them and generate the composition plan manually. This paper proposes a framework for dynamic and personalized composition of web services using an approach that integrates not only functional attributes of web services, but also nonfunctional attributes such as service requirements, quality of service (QoS), and some implementation details are also presented. In this work we present initial focuses on the issue of automated service composition in conjunction with the semantic web. In this report we propose a composition that automatically handle the integration of web services through the use of an Ontology Web Language (Owl-S). The adhoc queries of user are split into meaningful query terms and each term is evaluated against service available (through WSDL and OWL-S description). The comparison results have been revels that the false positive rate and false negative rate for different numbers of services with and without OWL-S as shown. Analysis rate is high in case of without using OWL-S as compared with OWL-S.
Download
13 Performance Evaluation Of A Single Phase Brazed Plate Heat Exchanger
Bharath Kumar K, R.S Vijayakumar

Abstract— Brazed plate heat exchanger (BPHE) is one of the most efficient and compact type amongst all of the heat exchangers. The geometry and the geometrical parameters play a very important role on the design and on the performance of the BPHE. Therefore, a slight change in the geometry of the BPHE can vary the performance adversely. Hence, a good and efficient mathematical method is necessary to capture the true performance which would be unique for that particular geometry of the BPHE. The BPHE performance parameters include thermal performance and hydraulic performances. The thermal performance measures the rate of heat transfer or the heat transfer efficiency and the hydraulic performance measures the pressure drop over the BPHE. The present report is on modeling the heat transfer efficiency of the heat exchanger by optimizing the Calculated Overall heat transfer coefficient in accordance with the Required Overall heat transfer coefficient. The RequiedOHTC is calculated from the actual temperature program, heat transfer area available and the heat load on the heat exchanger. The developed method relates the parameters or non-dimensional numbers influencing the heat transfer and pressure drop against Reynolds number. The constants developed from this relation are unique for the specific tested BPHE model and Reynolds number region. However, the prediction can be extended for different heat transfer areas, temperature programs and varying heat loads but for the specified Reynolds number region and the BPHE. The pressure drop modeling involves only the pressure drop in the channels of the BPHE but not the entire pressure drop that occurs between the inlet and outlet of the BPHE which might include the pressure drop in the pipes, pipe bends, connections etc. The pressure drop in the fluid channels influences the heat transfer area requirement in case of applications where there is strong dependence of fluid properties on local pressure.

Download
14 Comparison of Point Operations over Edwards Curve and its Variants
Dr. S. Joseph Robin

Abstract – In this paper the point operation of Edwards Curves, Twisted Edwards Curve and Binary Edwards Curves are discussed. The computational efficiency are also calculated in terms of point addition, doubling and scalar multiplication.

Download
15 Fuzzy Clustering of Web Documents Using Equivalence Relations and Fuzzy Hierarchical Clustering
Neha Arora, Devendra Kumar

Abstract—WWW is a fertile area for data mining research,[1] as huge amount of information is available in the form of unstructured and semi structured text databases[2] .It becomes typical to mine the relevant content or information from the web. So method of document clustering has been introduced as a methodology for improving document retrieval process. Clustering is a useful method for the textual data mining. Traditional clustering technique uses hard clustering algorithm in which each document use to belong to only one and exactly one cluster which creates problem to detect multiple themes of the documents. Clustering can be considered the most important unsupervised learning process which deals with finding the clusters according to logical relationship or consumer preferences. A cluster can be a structure in a collection of unlabeled data. The analysis of clusters deals with organizing the data objects into various clusters which has least inter cluster similarity and more intra cluster similarity [4]. Many clustering algorithms have been proposed by researchers. Partitioning clustering and hierarchical clustering are two main approaches to clustering. This paper summarizes the agglomerative hierarchical clustering method and presenting the clusters in the form of a dendrogram. Then Birch multiphase hierarchical clustering is applied in which clustering features are measured using clustering feature tree.

Download
16 Implementation Of A FPGA Based General Parameterizable Modulator
Avni Shah, S.B.Somani

Abstract— This paper deals with design anddevelopment of a generalized parametrizable modulator (GPM) that can perform Gaussian minimum shift keying(GMSK) modulation and Quadrature Phase Shift Keying(QPSK) modulation in a reconfigurable baseband modulatorfor software defined radio (SDR) architecture. GMSK is the underlying modulation scheme for the Global System for mobile(GSM) standard, while QPSK technique is the basic modulationscheme for Code Division Multiple Access (CDMA) standard. Although GMSK is an inherently non-linear modulation technique, the present work uses a linearly approximated GMSK technique to take the advantage of the simplicity of the filter structure. The normalised error in amplitude as a function of modulation index and bandwidth time product has been simulated thus capable of working at a data rate that satisfies the requirements of almost all 2G and 3G air interface standards.The proposed GPM architecture is implemented on a Spartan 3E starter kit.

Download
17 A Review On Analysis Of Different Cloud Servers On The Basis Of A Sophisticated Job Scheduling Approach
Karan Sood, Jasmeet Singh Gurm

Abstract-- The term cloud computing has come into this world as an evolution of the century. An idea to keep the entire data of a user over one server so that the user can access it from anywhere has taken a tremendous step towards the safety and security of the user’s data. A cloud data centre is termed as sophisticated architecture where user’s can relies over the preservations of the data from external theft. The cloud computing server has its disadvantages also. For a server to contain the entire data of millions of users in a safe manner is a hectic job. In the same manner , if a process is given to the cloud server , the way it responds is a major concern in rating up the servers for the performance evaluation. This paper focuses on the analysis of the different cloud computing platforms over different aspects and this paper also deals with the scheduling algorithms which are common for the last couple of years.

Download
18 A Review On Energy Efficient Scheduling In Green Cloud Computing
Manveer Singh, Jasmeet Singh Gurm

Abstract-- Green Cloud system is now in focus due to its energy consumption minimization system as the entire world is suffering from the global warming process. In the cloud server networks it becomes essential for a system to save energy in terms of processing of a request from one end to another. Disabling dead processes may be another optimistic approach in such a case .This paper focuses on different types of approaches which can be used in the minimization of the energy consumption of the cloud networks.
Download
19 Comparative Analysis of Koch Curve Fractal Antenna With CPW Feeding Techniques for Wireless Application
Babita, Simranjit Kaur

Abstract-- In this paper a high gain Koch Curve fractal shape antenna for wireless applications is proposed. With the increasing needs of multiband, high gain, very directive antennas and good capability of integration of various wireless technologies, the antenna’s research can be oriented following different ways. The antenna is microstrip line fed and its structure is based on fractal geometry where the resonance frequency of antenna is lowered by applying iteration techniques. The antenna size inclusive of the ground plane is compact and has a wide operating bandwidth. The antenna exhibits omnidirectional direction radiation coverage with a gain better than 2.0 dBi in the entire operating band.
Download
20 Design and Synthesis of Crop Cutting Machine
R.S.Warghane, Prof.D.M.Mate, Dr.C.N.Sakhale

Abstract-- This Nowadays, agriculture especially in Maharashtra soybean crops has some problem such as how to increase the productivity and profit, how to reduce the cost and how to solve the problem come from foreign workers. Harvesting of soybean crops is also done by huge harvester machine but, it also has some limitations like high cost, applicable for large farm-fields. On the basis of these constraints for crop cutting a new engine driven crop cutter is designed. It works on shearing cutting principle. It composed of fixed blade disposed on the lower portion of a frame; movable blade guided through bushes reciprocates over it. A crank and slotted lever assembly driven by engine through gearbox which imparts cutting force. The reciprocating blades consist of double edge sharpened knives to cut crops during both forward and return stroke. The belt conveyor mechanism is provided to guide and transfer the crops accumulated on the reciprocating blade assembly to the collecting tank. As the engine driven crop cutting machine is designed for soybean which is strongest crop in all crops and the blades are designed with the side clearance for variety of crops diameter the machine can be conveniently used for multiple crop cutting. As in given crop cutter the machine is designed for crop cutting only with some further modification in design thresher mechanism can also be incorporated for direct seeds extraction.
Download
21 Prevention of Intrusion using Cloud Services for the Smartphones
I.B.Rajeswari, Prof.Dipti Patil

Abstract-- In recent years, smart phones are getting more complex and more powerful. Since smart phones use the same software architecture as in PCs, they are vulnerable to similar classes of security risks such as intrusion and hacking. This project proposes an intrusion detection and prevention for smart phone using cloud services which continuously performs an in-depth forensics analysis on the smart phone to detect any misbehaviour such as wrong passwords and intrusion. In case misbehaviour is detected, the proposed engine decides upon and takes optimal response actions to prevent the occurrence of ongoing attacks. Despite the computational and storage resource limitations in smart phone devices, the engine can perform a complete and in-depth analysis on the smart phone and data storage, since all the investigations are carried out on an emulated device in a cloud environment. To address the critical challenge of keeping smart phone secure, cloud services has been proposed to prevent the intrusion and block the attack immediately.
Download
22 Design, analysis and optimization of connecting rod of ginning machine
Ms.Riddhi A. Chopde, Prof.S.T.Warghat

Abstract-- The connecting rod is the intermediate member between power transmitting and power receiving element. Also in some special cases like ginning machine connecting rod is used to convert the rotary motion into reciprocating motion. Sometimes the cross-section of the component gives the good or bad performance of the machine. The design is carried out by changing the cross-section of the connecting rod and by changing the material of connecting rod. For this purpose, after study of the various materials, SGI and EN31 are chosen for connecting rod. The proper finite element model is developed by CAD software CATIA V5. The analysis has been performed by FEA software ANSYS 14.0., so as to ensure its strength and weakness during the operation under given condition. By optimizing the connecting rod for weight and cost reduction it is found that for new I –section connecting rod of SGI the weight reduction is 17% and cost reduction is16%. For new EN31 connecting rod the weight reduction is 13 % and there will be cost increment is 26 %. Therefore SGI is more preferable than EN31 for connecting rod.
Download
23 Effect Of Varied Modes Of Yogic Practices On Selected Physiological Variables Among Obese School Girls
V. Raj Kumar, S. Nagarajan

Abstract-- The purpose of the study was to find out the effect of varied modes of yogic practices on selected physiological variables among obese school girls. To achieve the purpose of the present study, 570 girls in the age group of 14 to 17, studying in schools were selected as subjects, by using purposive sampling method. Initially the height and weight of girls were measured and the body mass index was calculated. Based on the BMI of selected subjects (N= 570) the subjects on or above 25 were further screened and totally 79 students were found as obese girls. Among the selected subjects (N = 79, BMI<25) 60 subjects were randomly assigned into three groups 20 subjects each. The experimental group I underwent the training of asanas group (AG), the experimental group II underwent the training of suryanamaskar group (SNG). The group III used as control group (CG) and keep off from any form of physical training all the two experimental groups were treated with their respective training for about 3 days a week for 12 weeks of training period. In the present study, pre-post randomized experiment design was adopted. The three groups were statistically analysed by using analysis of covariance (ANCOVA). In case of significance of mean difference was observed on the criterion measure, as a post – hoc test, the Scheffe’s test was applied to find out which pair of group is high among the others. The asana group has showed better performance on resting heart rate, systolic blood pressure and diastolic blood pressure than the other two groups. The suryanamaskar group also showed better performance on breath holding time than the control group.
Download
24 Effect Of Explosive Plyometric Training On Selected Physiological Variables Among Polytechnic Students
P.Pradeep Kumar, Dr.K.Chandrasekaran

Abstract-- The purpose of the present study was to find out the effect of explosive plyometric training on physiological variables among polytechnic students. To achieve the purpose of the present study, thirty men students from KLN Polytechnic College, Madurai, Tamilnadu, India were selected as subjects at random and their ages ranged from 16 to 19 years. The selected subjects are divided in to two groups. The experimental group participated explosive plyometric training for eight weeks. The control group was not undergone any training other than their daily routine. The criterion measures such as anaerobic power, vital capacity and resting pulse rate were tested before and after eight weeks and statistically analysed by using analysis of covariance (ANCOVA) at 0.05 level. The explosive plyometric training group showed better performance on anaerobic power, vital capacity and resting pulse rate than the control group
Download