Sr/No/ |
Title |
Pdf |
1 |
Impact of Exogenous Abscisic Acid Pretreatment on the
Antioxidant Activity of Suaeda maritima under Salinity
Stress
G. anbarasi, S.T. Somasundaram
Abstract — Salinity stresses are a serious menace to agriculture
productivity. Salt stress exerts its negative effects first and
foremost by causing water shortfall which further leads to the
formation of Reactive Oxygen Species (ROS). These ROS are
capable of causing oxidative damage to different cellular
compounds which includes membrane lipids, protein and nucleic
acids. Plants generally utilize different antioxidant enzymes such
as superoxide dismutases (SOD), Catalase (CAT), Ascorbate
peroxidase (APX), Glutathione-S- transferase (GST) and
glutathione peroxidases (GPX) to scavenge ROS. The plant
hormone abscisic acid (ABA) also acts as a free radical scavenger
and more important in overcoming stress than in acting as a
simple osmolyte. Thus, this present study focused on the effect of
exogenous abscisic acid on enzymatic scavenging activities of
antioxidant enzymes such as SOD, POD, CAT, APX and GST to
control ROS levels were studied in the leaves of salt tolerant
variety of S.maritima.
|
Download
|
2 |
Classification and Comparison of routing
Protocols in Wireless Sensor Networks
N.Sivakumar, V.Yuvaraj, S.Vasanthakumar
Abstract — The recent advances and the convergence of micro electromechanical
systems technology, integrated circuit
technologies, microprocessor hardware and
nanotechnology, wireless communications, Ad-hoc
networking routing protocols, distributed signal
processing, and embedded systems have made the concept
of Wireless Sensor Networks (WSNs). Sensor network
nodes are limited with respect to energy supply, restricted
computational capacity and communication bandwidth.
Most of the attention, however, has been given to the
routing protocols since they might differ depending on the
application and network architecture. To prolong the
lifetime of the sensor nodes, designing efficient routing
protocols is critical. Even though sensor networks are
primarily designed for monitoring and reporting events,
since they are application dependent, a single routing
protocol cannot be efficient for sensor networks across all
applications. In this paper, analyze the design issues of
sensor networks and present a classification and
comparison of routing protocols. This comparison reveals
the important features that need to be taken into
consideration while designing and evaluating new routing
protocols for sensor networks.
|
Download
|
3 |
Survey on Crop Yield Prediction Using Agriculture
Dataset
Vaishnavi S, Jayapritha S, Dharani M, Gowtham S
Abstract — Agriculture plays a major role in Indian
economy and it is a main source of income. Data mining
plays an important role in agriculture. The proper
selection of crops for sowing is very important for good
yield prediction. In olden days farmer’s experience on a
particular field and crops are considered for yield
prediction. So there is a need to transfer the huge
amount of data available in the lab and agricultural
universities into information which helps the farmers
predict the good yield. This can be made possible with
the data mining techniques.
|
Download
|
4 |
Design and Simulation of 1D DHT for
communication based applications
Rajni Jounjare, Poonam Sinha, R. P. Singh
Abstract — The data in time domain can be converted or
transformed into frequency domain with the help of one of the
transforming technique like Discrete Hartley Transform using
real values. For highly modular and parallel processing of data
applications in VLSI design, DHT can be used. We have
proposed a new algorithm for calculating DHT of length 2N,
where N=3 and 4. As an [We have implemented multiplier as an
improvement in place of simple multiplication used in
conventional DHT. This paper gives a comparison between
conventional DHT algorithm and proposed DHT algorithm in
terms of delays and area.
|
Download
|
5 |
Analysis of selected anthropometric parameters and
physical fitness components among various age categories
of Handball players
R. Balasubramani, C.Santhaarsan, S.Rameshkumar
Abstract — The purpose of study was to find out the
analysis of selected Standing Height, Body Weight, Leg
Length, Arm Length, Arm span, Hand length, Hand
span Speed, Muscular strength, Explosive power,
Agility compents among various age categories of
handball players. For this study 16 to 18 years, 19 to 21
and 22 to 24 years of male Handball players 40 each
were randomly selected from, various school and college
in tamilnadu. The subjects had past playing experience
of at least three years in Handball and only those who
had represented their respective school College were
taken as subjects. The subject’s age ranged between 16
and 24 years. A series of physical fitness tests was
carried out on each participant. These included height
assessed by stadiometer, weight assessed by weighing
machine, Leg Length, Arm Length, Arm span, Hand
length, Hand span assessed by small bone caliper
centimeters. Speed assessed by 30mts dash, muscular
strength assessed by sit-ups, explosive strength assessed
by vertical jump, agility assessed by shuttle run. The
collected data from the three groups of the selected
variables were statistical analyzed to test the
significance of the mean difference and the groups on
selected criterion variables one-way analysis of variance
(ANOVA) was used. In case of significance pair of
group was high among others as post-hoc test,
(Turkey’s HSD test) was applied of mean difference
observed on the criterion measure to find out which.
|
Download
|
6 |
Survey on Web Usage Mining Techniques
R.Umamaheswari, K.Saraswathi
Abstract — Web usage mining is the part of web mining
techniques. This web usage mining(WUM) can be used
to identifies the data from the web log servers.The
WUM involves three types, Data Preprocessing ,
Pattern Discovery & Pattern Analysis. world wide web
it provides the lot of information . The web mining is
used to discover and extract useful information from
the web sites.web mining is used to gather the important
information from customers visiting the site.Web
mining can be classified into three types Web Content
Mining, Web Structure mining, Web Usage Mining.
Web content mining is used to search information of
resource available in online. Web structure mining is
used to structure of hyperlink with in the web itself.
Web usage mining is used to used to log data stored in
the web server.
|
Download
|
7 |
Fuzzy Inventory Model without Shortages using
Triangular Fuzzy Numbers
S. Rexlin Jeyakumari, S.Merline Laura
Abstract — In this paper, we studied Economic
Order Quantity (EOQ) inventory model
without shortages. Our goal is to determine
optimal order quantity for the proposed model.
The purchasing cost, ordering cost, holding cost
and screening rate are fuzzified. The function
principle is used for fuzzy operation. We also
provide an expression of the optimal order
quantity for the case that all of the four
parameters are triangular fuzzy numbers. A
numerical example is provided to illustrate the
proposed model and assess the effects of
fuzziness of the parameters on the optimal
solution..
|
Download
|
8 |
The Novel Approaches on Big data and the Hadoop
Environment
R. Ganeshkumar, Dr. A. Marimuthu
Abstract — The term big data is very large data sets
that may be analyzed computationally to reveal
patterns, trends and associations especially relating to
human activities and communications. These large
data sets processed its size (volume), complexity
(variety), speed of data (velocity), potential value
(value), noises (veracity) make them difficult to
capture, manage, analyzed and increasing its
processing speed. To analyze this huge amount of data
Hadoop framework can be used. Hadoop is an opensource
software for distributed storage and distributed
processing of very large data sets on computer clusters
built from product hardware. The heart of Apache
hadoop consist of a storage part is called HDFS
(Hadoop Distributed File System) and processing part
called Map Reduce. The technologies used by big data
application to handle the enormous data are hadoop
framework, Map Reduce, HDFS, HPCC and Apache
Hive. These technologies handle large amount of data
in GB (Giga Byte),TB (Tera Byte),PB (Peta Byte),EB(
Exa Byte),ZB (Zeta Byte),YB (Yotta Byte),BB (Bronto
Byte) and GB (Geop Byte).
|
Download
|
9 |
Machine learning as a last line of defense against spam
emails
Elkhmasi Mustafa Asma
Abstract — In this paper various learning based algorithms for
classification of text messages as spam or non-spam. A number of
learning based algorithms was tested with the emphasis on the
importance of extraction of "good" feature vectors in order to
improve the performance of classifiers. We did not focus in our
paper on the feature extraction itself. The analysis of the testing
results showed that, in terms of accuracy, there is no benefit in
utilization of support vector machine algorithms or ensemblelearning
algorithms compared to the naïve Bayesian algorithm.
The tests have also shown that improvement of performance of
NB can be achieved by extracting more meaningful classification
features.
|
Download
|
10 |
Cost Optimization Techniques for Software Testing
Avinash Yadav
Abstract — Software Testing is an area of software
engineering where software is to be tested with several
techniques. As it is well known that software testing is
supported by various test cases. All test cases are used to
manipulate software for proper utilization of resources and
minimize the software cost as well as less execution time. In
this paper, it has been focused on the various existing software
testing and optimization techniques, proposed by various
authors. To optimize the software, Identification,
characterization and automatic prioritization of test cases in
software testing are being used by optimization techniques.
|
Download
|
11 |
Wireless Network: A Study On Phishing Attacks
Saurabh Varma
Abstract — Many of us connect to Wireless Fidelity (Wi-
Fi) without knowing what specific threats one is
vulnerable. The list of vulnerabilities is large by nature,
and most of these ignored by users. Computer
networking has made collaboration necessary to both
attackers and defenders. Phishing attacks combine
technology and social engineering to gain access to
restricted information. The most common phishing
attacks today send mass email directing the victim to a
web site of some perceived authority. This paper is
focused on wireless network and phishing attacks.
|
Download
|
12 |
Performance Evaluation of a Proactive Multipath
Routing Protocol for Mobile Ad Hoc Networks
Shubham Tiwari, Saurabh Varma
Abstract — Researchers has been developed various routing
protocols for Mobile Ad-hoc Networks (MANETs). Each
protocol proposed and designed so far has its own merits
and demerits. Researchers are trying continuously to
develop advance routing protocols that can route messages
towards their destination in an efficient way while
consuming minimum amount of bandwidth and battery.
In this work we are considering two well known MANET
routing protocols, (1) Ad-hoc On-demand Distance Vector
routing protocol, (2) Optimized Link State Routing
protocol, and we have combined their preferred properties
to formulate a new Hybrid routing protocol. In this paper
we have proposed a routing protocol in hybrid category
with the target of increasing the packet delivery ratio
(PDR), throughput and decreasing end-to-end delay. Our
extensive simulation based experimental studies shows
that the performance of proposed Hybrid Multipath
Progressive Routing Protocol is better than the AODV,
OLSR and ZRP on above and many other parameters. We
have simulated the results on Exata Cyber 1.1.
|
Download
|
13 |
Software Testing Process-Analytical Study on
Challenges & Proposed Solutions
Avinash Yadav
Abstract — Service oriented architecture (SOA) is
one of the latest software architectures. This
architecture is created in direction of the
business requirements and removed the gap
between softwares and businesses. The software
testing is the rising cost of activities in
development software. SOA has different
specifications and features proportion of the
other software architectures. First this paper
reviews SOA testing challenges and existing
solution(s) for those challenges. Then that
reports a survey of recent research to SOA
systems testing, that covers both functional and
non-functional testing. Those are presented for
different levels of functional testing, including
unit, integration, and regression testing.
|
Download
|
14 |
Performance Study of Node-Disjoint Multipath Routing
for Mobile Ad-hoc Networks based on QoS
Shubham Tiwari, Anil kumar, Avinash Yadav
Abstract — Recently, quality-of-service routing in dynamic, wireless
multi-hop ad hoc networks becomes a hot research topic, and various
QoS protocols are proposed Even so, popular QoS routing protocols
rarely provide multiple routes. Once links break due to node mobility,
establishment of new routes leads to large control overhead and more
end -to-end delay. In MANETs to support multimedia applications
such as video and voice require an efficient routing protocol and
quality of service (QoS) mechanism. Node-Disjoint Multipath Routing
Protocol (NDMR) is a practical protocol in MANETs: it reduces
routing overhead dramatically and achieves multiple node-disjoint
routing paths. In MANETs QoS support is an important issue as besteffort
routing is not efficient for supporting multimedia applications.
This paper presents a novel adaptation of NDMR, QoS enabled
NDMR, which introduces agent-based SLA management. This
enhancement allows for the intelligent selection of node-disjoint routes
based on network conditions, so fulfilling the QoS requirements of
Service Level Agreements (SLAs).
|
Download
|
15 |
A Review, Challenges and Mitigations of Cyber
Attacks
RAJESH RAO K, Dr.G.N.K.SURESH BABU
Abstract — The objective of this paper is how to
protect data from the cyper attacks and provides
cyber security to on line users (ICT-Information
and Communication Technology). Now a day’s all
the organizations completely depends on line data
and huge volume of transactions done through on
line only. For example, Net Banking (money
transfer from one account to another), Ticket
Booking and on line purchasing through ECommerce
portals. Since the volume of
transactions done through online is increasing day
by day we have to protect our data and customer
data safer from the attackers. This paper is to
throw light on factors that implementation of
cyber security. Cyber security is a set of people,
process and technical practices aimed at
protecting critical infrastructures, digital business
and sensitive information from internal and
external threats or negligence. This paper
investigates practical solutions to the
implementation of cyber security.
|
Download
|
16 |
Design of Directional, High Bandwidth, High Gain
Antenna for 2.4 GHz WiFi Data Card
Gaganpari, Devyanshu Rao
Abstract — With increase in the automation and communication
in our daily life, wireless technology has evolved a lot. For this
reason, WiFi technology has also received a lot of attention
from scientists and engineers from various domains.
Miniaturization of WiFi transceivers has also lead to the
researches in reducing the size of antennas involved. The work
here targets wall mounted mini WiFi access points commonly
available nowadays. Present work designs an antenna that is
small in size and is also at the same time very good in its
performance. It has always been a challenge for antenna
designers to improve gain and bandwidth at the same time.
This antenna design manages to achieve very good gain and
bandwidth. The antenna design is inspired from parasitic
antennas. It is a directional antenna with operating frequency
ranging from 2.32 GHz to 3.32 GHz. Bandwidth of 1 GHz is
achieved. Maximum gain is more than 5 dB.
|
Download
|
17 |
Design and implementation of high speed and area
efficient hybrid subtractor using M.G.D.I Technique
Ankita Jain, Utsav Malviya
Abstract — Subtractors form one of the important
components of every contemporary integrated
circuit. The basic requirement of the subtractor is
that it should be fast and efficient in terms of power
consumption and chip area. Optimization of several
devices for speed and power is a significant issue in
low-voltage and low-power applications. These
issues can be resolved by incorporating Modified
Gated Diffusion Input (MGDI) technique. The
current work proposes the design of a full subtractor
using Modified Gate Diffusion Input (MGDI)
procedure which is proposed to consume low power
in conjunction with lesser delay time and fewer
transistors while maintaining proper output-voltage
swing. Here four design of full subtractor has been
designed using MGDI technique. All these design
are based on 65nm CMOS foundry. The software
used to design schematic circuit is DSCH tool and
for layout generation Microwind has been used.
|
Download
|
18 |
Analyzation & Implementation of Full Subtractor Circuits
Designs Using Modified Gate Diffusion Technique
Ankita Jain, Utsav Malviya
Abstract — This paper mainly focused on designing Full
Subtractor by a new technique called MGDI technology.
Here two basic design of full subtractor has been designed
using MGDI technique. The software used to design
schematic circuit is DSCH tool and for layout generation
Microwind has been used.
|
Download
|
19 |
Design of Arinc Serial-communication protocol using
Verilog HDL
Rachit Nema, Raj Gaurav, Abhishek Singh
Abstract — In following paper we write serial communication
protocol for ARINC 429 with the help of Libero SoC v11.6 using
Verilog HDL (Hardware Description Language) finite state
machine logic and get some simulation results.
|
Download
|
20 |
Review on Input Vector Monitoring concurrent BIST
Architecture Design for a Multiplier
Kritika Sharma, Aman Saraf
Abstract — The problem arises at the time of testing in VLSI
circuits and systems can be handled with the help of Built-In
Self-Test (BIST) technique that constitute an attractive and
practical solution. Input vector monitoring coexisting BIST
schemes perform testing concurrently with the operation of the
circuit. This paper presents a novel input vector monitoring
concurrent BIST scheme that compares auspiciously to
previously proposed schemes with respect to the required
hardware overhead.
|
Download
|
21 |
Power Controlling Through Internet of Things in Mobiles
Ganta rama mohan Reddy, E.Madhusudhana Reddy, S. Vikram Phaneendra
Abstract — Normally any electronic product states will be
changed based on the switch. Every switch will be work on
the manually operated. At that time two problems are
occurred. Number one is power attacking to human and one
more problem is we are not operated from the outside of
home. In this paper proposed methodology is by using
Internet of Things (IoT) we can control the electronic
equipment’s. Here we are using ardino chip that will be
inserted at the stating of the electronic product power
supply. Ardino chip has attaching Ethernet shell is
presented. Ethernet shell will be helpful for supporting the
Internet. At this time we can operate the electronic products
from any place and also no chance for power attacking.
|
Download
|
22 |
Effect of Growth Regulator and Irrigation on Fruit
Cracking and Yield of Litchi in the Hilly Area
S. N. Mozumder, S. M. Faisal, D. Sultana, Z. A. Firoz, Dr. Shailendra Nath Mozumder
Abstract — The experiment was conducted at the Hill
Agricultural Research Station, Ramgarh,
Khagrachari Hill District during July, 2010 to June,
2011. A factorial complete randomized design was
followed with three irrigation levels (at 7, 15 days
intervals and control) and four chemical treatments
viz. GA3 100ppm, Ethephone 18 mmole/l, 1%
ZnSO4 and control with three replications. Both the
factors irrigation and chemical showed significant
effect on most of the yield attributes and fruit
characters. Irrigation significantly increased litchi
yield by increasing number and size of the fruits as
well as reduced cracking. Ethephone and GA3
reduced cracking whileZnSO4increased number of
fruit and yield. Edible portion (%) seed size and
TSS had minimum variation with irrigation or
chemical spray. Any one of the three chemicals
(Ethephone, ZnSO4or GA3) spray with weekly
irrigation increased marketable yield of litchi in the
hilly areas of Bangladesh.
|
Download
|
23/td>
|
Study on Applications of String Searching and
Matching Algorithms
P.Sundari, S.Deepasamili
Abstract — The experiment was conducted at the Hill
Agricultural Research Station, Ramgarh,
Khagrachari Hill District during July, 2010 to June,
2011. A factorial complete randomized design was
followed with three irrigation levels (at 7, 15 days
intervals and control) and four chemical treatments
viz. GA3 100ppm, Ethephone 18 mmole/l, 1%
ZnSO4 and control with three replications. Both the
factors irrigation and chemical showed significant
effect on most of the yield attributes and fruit
characters. Irrigation significantly increased litchi
yield by increasing number and size of the fruits as
well as reduced cracking. Ethephone and GA3
reduced cracking whileZnSO4increased number of
fruit and yield. Edible portion (%) seed size and
TSS had minimum variation with irrigation or
chemical spray. Any one of the three chemicals
(Ethephone, ZnSO4or GA3) spray with weekly
irrigation increased marketable yield of litchi in the
hilly areas of BangladeshMany organizations gather huge amount of
data to maintain their business and decision making
process. The data gathered from different sources can
have data features problems. These types of problem
become familiar when different databases are
combined. The data in the combined structure need to
be cleaned for appropriate decision making. Cleansing
of data is one of the major critical problems. In this
survey, focus is on one of the major issues that varies
duplicate detection and search process using string
searching and string matching algorithms.
|
Download
|
24 |
Factors Influence Performance of Direct Methanol Fuel Cell –
A Review
J.Dinesh a, M.Easwaramoorthi, M.Muthukumar
Abstract — The review paper includes introduction of the Direct
Methanol fuel cell (DMFC) and Description of water
management and methanol crossover problems in DM fuel cell.
DM fuel cells are working at low temperature and atmospheric
pressure. As DM fuel cell has high efficiency, they are widely
used for mobile and stationary applications. The performance
of DM fuel cell depends on temperature, pressure, humidity and
transport phenomena inside the cell, membrane conductivity,
water management, methanol crossover, flow field design
parameters. There are several technical problems to be solved in
order to achieve practicability and popularization. Especially,
water management and methanol crossover inside a DM fuel
cell is essential for high performance operation. This paper
shows the recent work done for improvement of the
performance of DM fuel cell. With the help of this studies, we
observe that the fuel cell performance develop by Increasing the
relative humidity, temperature, pressure and using the various
flow fields. The aim of this study is to explore the factors
influence performance of DM fuel cell.
|
Download
|
25 |
Knowledge Based Resource Provision And Allocation
In Cloud Using Auction Method
Sabitha.S, Sandhiya.M, Sri Hari.R, Vidya.S
Abstract — Cloud computing is one of the fastest emerging
technology. Cloud is a wide pool of resource, which
provides resources based on the users request. As there
were more resources there may occurs wastage. So the
cloud providers enter in to the auctioning of resources.
Allocation of resource is one of the most challenging
issues in resource management for cloud computing. In
this paper auction based approaches is presented to
deal with a problem of resource allocation at IaaS layer
of cloud among rational users and to incentivize selfish
providers. The proposed mechanism calculates the
usage of VM instance allocated to the user for a
particular period of time and efficiently allocates the
VM instance for future purpose.
|
Download
|
26 |
Automated Testing Tool for Different Coverage Metrics
Shiva prasanth A , Dhanalakshmi S, Shilpa S, kalyanisankar S
Abstract — Software testing is a critical element of
software quality assurance and represents the
ultimate review of specification, design and coding. It
is an important activity carried out in order to
improve the quality of the software. The main aim of
this testing approach is to find the errors and to make
the working of the software in efficient manner. Thus
testing can be carried out by finding the test cases. A
good test case is one that should have the high
probability of finding the errors. There are different
testing approaches and they are path coverage,
branch coverage, code coverage.It is a popular
approaches to measure the thoroughness of test
suites. For each testing approach there are different
tools available. In this paper we proposed the
technique that are used to find the coverage metrics
and common tool that can test all the coverage.
|
Download
|
27 |
Energy Dissemination Clustering for Mobile Sink
Based Heterogeneous Wireless Sensor Networks
Neha Thakur, Manoj Kumar, Santosh Kushwaha
Abstract — In Wireless Sensor Network, the energy efficiency is
the key issue for designing the protocol because sensor nodes
have one time battery backup. There are many modern protocols
which extend the lifetime of the wireless sensor network by
efficiently using battery power of the sensor node. In this paper,
we propose Energy Dissemination Clustering for Mobile Sink
Based Heterogeneous Wireless Sensor Networks. We analyze and
compare the performance and results of modern protocols like
LEACH, SEP, ESEP, TEEN and EDDEEC with proposed work.
The simulation result shows that performance and throughput of
our proposed work gives the effective and significant energy
efficiency as well as more network lifetime compared to other
protocols.
|
Download
|