Efficient Map/Reduce secure data using Multiagent System
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.144-149, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.144149
Abstract
Today is an era of digital world where technology and information play a very important role in our lives. Huge amount of data is generated, more than in terms of zetabytes and this data is been transmitted over an internet. Data is from Internet search, mobile devices, Internet of Things which include variety of objects like tablet, sensors, smart phones, digital cameras, tablets, etc., business transactions, Government organization, next generation radio astronomy telescopes, traffic data etc. This result in the raise of big data application. Current technologies i.e. Hadoop is unable to process data and secure the data within a given elapsed time. In this paper we proposed Multiagent Map Reduce Secure Model (MMRSM) using cloud. MMRSM supports both batch processing of data and Streaming of data. The proposed system supports both data security and efficient resource management of processing streaming data with minimum cost and time.
Key-Words / Index Term
Multiagent, Hadoop, Internet of Things, Streaming of data Computing
References
[1] Gartner cloud computing definition,
http://www.gartner.com/itglossary/cloud-computing/
[2] Alexandros Labrinidis, H. V. Jagadish, Challenges and Opportunities of Big Data, Journal proceedings of the VLDB Endowment, Volume 5 Issue 12, August 2012, pages 2032 - 2033.
[3] Big Data, http://en.wikipedia.org/wiki/Big_data
[4] Randal E. Bryant, Randy H. Katz, Edward D." Lazowska, Big-Data Computing: Creating revolutionary breakthroughs in commerce, science, and society" Version 8: December 22, 2008
[5] A. M. Talib, R. Atan, R. Abdullah and M. A. A. Murad, “Towards New Access Data Control Technique Based on Multi Agent System Architecture for Cloud Computing in Software Engineering and Computer Systems Part II,” In: V. Snasel, J. Platos and E. El- Qawasmeh, Eds., Springer Series: Communications in Computer and Information Science 189, Springer-Verlag, pp. 268-279.
[6] R. Rivest, A. Shamir, L. Adleman, "A Method for Obtaining Digital
Signatures and Public-Key Cryptosystems,"Communications of the ACM, vol. 21, iss. 2, pp. 120–126, February 1978.
[7] Sulaiman, R., D. Sharma, W. Ma and D. Tran, 2007. A Multi-agent security framework for e-health services. Knowl. Intell. Inform. Eng. Syst., 4693: 547-554. DOI: 10.1007/978-3-540-74827-4_69
[8] J. Surbiryala, C. Li, and C. Rong, “A framework for improving security in cloud computing,” in 2nd IEEE International Conference on Cloud Computing and Big Data Analysis (ICCCBDA 2017). IEEE, 2017.
[9] Kaur M, Mahajan M. (2013). “Using encryption Algorithms to enhance the Data Security in Cloud”. International journal of communication and computer technologies.
[10] Arora R, Parashar A. “Secure User Data in Cloud Computing Using Encryption”, International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1922-1926
[11] Padhy R, P Patra, M. R., &Satapathy, S. C. “WINDOWS AZURE PAAS CLOUD : AN Overview”. International Journal of Computer Application., Issue 2, Volume 1, February 2012.
[12] N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy- Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data,” Proc. IEEE INFOCOM, pp. 829-837, 2011.
[13] I. Roy, S. Setty, A. Kilzer, V. Shmatikov, and E. Witchel. Airavat: Security and privacy for MapReduce. Technical Report TR-10- 09, UT-Austin, 2010.
[14] K. Zhang, X. Zhou, Y. Chen, X. Wang, and Y. Ruan, “Sedic: Privacy-Aware Data Intensive Computing on Hybrid Clouds,” Proc. 18th ACM Conf. Computer and Comm. Security (CCS ’11), pp. 515-526, 2011.
[15] Philip Derbekoa , Shlomi Dolevb, Ehud Gudesb , Shantanu Sharma "Security and Privacy Aspects in MapReduce on Clouds: A Survey" Elsevier Computer Science Review, May 4, 2016
[16] X. Zhang, C. Liu, S. Nepal, S. Pandey, and J. Chen, “A Privacy Leakage Upper-Bound Constraint Based Approach for Cost- Effective Privacy Preserving of Intermediate Data Sets in Cloud,” IEEE Trans. Parallel and Distributed Systems, to be published, 2012.
Citation
H. Kousar, B.R.P. Babu, "Efficient Map/Reduce secure data using Multiagent System," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.144-149, 2018.
Smart Ration Card with RFID, Biometrics and Sensors
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.150-154, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.150154
Abstract
In this paper, our system is based on a smart ration card. In which we have used sensors, Radio frequency identification, bio metrics and OTP (one time password) to achieve security in existing ration allocation system. For maintaining details of family members RFID card is used. User have to provide thumb impression for authentication. If customer found authenticate then he is allowed to take his allocated ration on that particular month.This ration allocated to customer is approved by taluka admin and provided to shopkeeper. Smart ration card is immune to the theft and forgery ,because the information about allocated ration will be send directly to the higher authority(Government), and customer will received information via OTP.A survey conducted for measuring the problem faced by the people on existing Ration Distribution and after that the idea for the Smart Ration Card System is enacted.
Key-Words / Index Term
AES Algorithm, RFID, Microcontroller (Arduino), Weighing and Level Sensors, One time password
References
[1] Balekar Swati D, Kulkarni Rituja R, “Online Ration Card System by using RFID and Biometrics”, International Journal of Advanced Research in Computer Science and Software Engineering, 2015.
[2] Yogesh Kumar Sharma, Dr. K. B. Shivakumar, “Multi-Modality Biometrics Assisted Smart Card Based Ration Distribution System”,International Journal of Applicaton or Innoviation in Engineering and Management (IJAIEM), 2014.
[3] Parvathy A, V.R. Raj, Venumadhav, Manikanta, "RFID Based Exam Hall Maintenance System``, International Journal of Computer Applications (IJCA), 2011
[4] S.Santhosh, “Design and Development of a Security Modulewith Inbuilt Neural Network Methodologies and anAdvanced Technique on FingerprintRecognition”, International Conference on Circuit, Power and Computing Technologies (ICCPCT), 2014.
[5] M. Agarwal, M. Sharma, B.Singh, Shantanu, ”Smart Ration Card Using RFID and GSM Technique”, International Journal of Computer Application(IJAC), 2014
[6] Md. Wasi-ur-Rahman, Mohammad Tanvir Rahman, Tareq Hasan Khan and S. M. LutfulKabir, "Design of an Intelligent SMS based Remote Metering System", Proceedings of the IEEE International Conference on Information and Automation(ICIA), 2009.
[7] K. Michael, L. Mccathie, “The Pros and Cons of RFID in Supply Chain Management”, Proceedings of the IEEE International Conference on Information and Automation(ICIA), 2005.
[8] Bundesamt fur Sicherheit in der Information Stechink, “Advanced Security Mechanisms for Machine Readable Travel DocumentsExtended Acces”, IEEE International Conference on Information and Automation(ICIA), 2010.
[9] R. H. Clarke, D. Twede, J. R. Tazelaar, and K. K. Boyer, “Radio frequency identification (RFID) performance: The effect of tag orientation and package contents”, Packaging Technology and Science, 2005.
[10] J. Korhonen, T. Ojala, M. Klemola, and P. Väänänen, “mTag– Architecture ForDiscovering Location Specific Mobile Web Services Using RFID and Its Evaluation”, IEEE Computer Society, 2006
[11] H.Y. Chien, SASI, “A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity”, IEEE Transactions on Dependable and Secure Computing, 2007.
[12] Jeff Brown, Bill Shipman, Ron Vetter, “SMS- The Short Message Service", IEEE International Conference on Information and Automation(ICIA), 2007.
Citation
S. S. Thokal, Aarti N. Bhosale, Shweta S. Bhor, Pratima K. Sabale, Pushpak R. Shinde, "Smart Ration Card with RFID, Biometrics and Sensors," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.150-154, 2018.
Study of 9mm Improvised Pistol Pattern & Gunshot Residue with respect to Different Range
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.155-160, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.155160
Abstract
Armed violence is quite common in India and among the other top states; Delhi and its National capital region (NCR) play an imperative role when it comes to seizures of the country made firearms. Thus, Forensic firearm examination of gunshot residue (GSR) has become indispensable. This study presents the characteristics of the seized semiautomatic 9mm Improvised pistol and the gunshot pattern formed on the cloth target after firing in Forensic Science Laboratory, Delhi, India. This study also emphasizes the analysis of GSR particles deposited on the cotton cloth by Improvised Semiautomatic Pistol using standard ammunition at different shooting distance (5cm & 10cm). The collection and analytical method allowed elemental detection of Sb, Ba, Cu, Pb, and Ni on ppm level by Atomic Absorption Spectroscopy (AAS) analysis. In this study we observed that when the muzzle diameter and barrel length were constant, the gunshot pattern varied whereas for gunshot residue, out of all the five elements (Sb, Ba, Cu, Pb, and Ni), only the amount of Sb, Pb and Ni were seen to be increased with increased range from 5cm to 10cm.
Key-Words / Index Term
Gunshot residue, Gunshot pattern, Atomic Absorption Spectroscopy
References
[1] Thejaswi HT, Kumar A, Jegadheeshwaraj (2013) “Desi-Kutta (country made Firearm) and Wound Ballistics A Review”, J Indian Acad Forensic Med 35: 165-9.
[2] THE INDIAN ARMS ACT 1959.
[3] Kohli A, Aaron K and Sonal M. “The Geography of Indian Firearm Fatalities.‟ Mapping Murder: The Geography of Indian Firearm Fatalities”, IAVA Issue Brief No. 2; p. 2, 6.
[4]Dikshit P (2009) “Weaponisation of Indian Society through Illicit Arms Proliferation, Production and Trade. In: Binalakshmi Nepram, (Ed.)”, India and the Arms Trade Treaty. New Delhi: India Research Press; 2009. p. 43-45: 35-36.
[5] Gunpolicy.org [cited 2012 July 19].
[6] Pal A, Pratihari HK (Summer 2014) “Examination of some Indian homemade/improvised firearms and their ammunition”, AFTE Journal 46: 234-7.
[7] Waghmare NP, Suresh R, Puri P, Varshney KC, Anand V, et al. (2012) “Modern Trend of Country Made /Improvised Pistols Used in the Capital of India”, J Forensic Res S1: 1-7.
[8] Jain SK, Singh BP, Singh RP (2004) “Indian homemade firearm-a technical review”, Forensic Sci. Int. 144: 11-8.
[9] Modi JK, Nigam C, Kumar K (1984) “Improvised Firearms versus regular firearms”, Forensic Sci Int 26: 199-205.
[10] Warlow TA (2007) “The Criminal use of improvised and re-activated firearms in Great Britain Northern Ireland”, Sci Justice 47:111-9.
[11] Mendis M (1997) “Sri Lankan shot pistols and Ballistics”, Sri Lankan Sci Justice 37: 259-63.
[12] Bulent Uner H, Gokdagan MR, Cakan H (2003) “Some samples of weapons and instruments used as weapon in criminal offences in Turkey”, Forensic Sci Int 132: 113-6.
[13] Brozek-Mucha, Z., Zadore, G. and Dane, F. (2003) “A Comparative Study of Gunshot Residue Originating from 9 mm Luger Ammunition from Various Procedures”, Science Justice Journal of the Forensic Science Society. 43:229-235.
[14] Plattner, T. Kneubuehl, B. Thali, M. and Zollinger, U. (2003). “Gunshot Residue Patterns on Skin Angled Contact and Near Contact Gunshot Wounds”, Forensic Science International. 138:68-74.
[15] Rosenberg, M. B. and Dockery,C.R. (2008), “Determining the Lifetime of Detectable Amounts of Gunshot Residue on the Hands of a Shooter Using Laser-Induced Breakdown Spectroscopy”, Applied Spectroscopy. 62:11.
[16] Bailey, J.A. Casanova, R.S. and Bufkin K. (2006), “A Method for Enhancing Gunshot Residue Pattern on Dark and Multicoloured Fabrics Compared with the Modified Griess Test”, Journal of Forensic Sciences. 51:4.
[17] Haag, L. C. (2006), “Shooting Incident Reconstruction”, San Diego, California: Academic Press.
Citation
Karen Isha Sahu, Puleno Kennao, A.K.Gupta, Vaibhav Saran, N.P. Waghmare, "Study of 9mm Improvised Pistol Pattern & Gunshot Residue with respect to Different Range," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.155-160, 2018.
Studies on 12% Reinforced Aluminium Based Metal Matrix Composites
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.161-165, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.161165
Abstract
It is always endeavor of ongoing research in material science to take advantage of specific or particular properties of the constituent material present in a composite material. Aluminum based metal matrix composites have been developed to tailor the properties. Aluminum is a preferred choice for metal matrix composites (MMC) for several reasons like low density, high thermal and electrical conductivity and good damping capacity. Aluminium metal matrix composites (Al-MMCs) exhibit improved mechanical properties, when reinforced by ceramics like Al2O3 and SiC. This paper presents an experimental study to produce Al-MMC by powder metallurgy process in which fine aluminum powder reinforced by ceramic particles like SiC and Al2O3 by 12% of its total weight. The green compact was produced using a set of die and punch. The necessary compaction of blended powder obtained using a mounting press. Sintering of green compact carried out at temperature of 95% of melting point of matrix material for 1 hour. The study of density, hardness, compressive strength and dry sliding wear capability of fabricated MMC is attempted. The average hardness of MMC increased by 2-3 times as compared to pure commercial aluminium with deviation of 11% in the density obtained experimentally.
Key-Words / Index Term
Al-Metal Matrix Composites, Powder Metallurgy, Wear Resistance
References
[1] Sharma S.C., Composite Materials, Narosa Publishers 2006
[2] Hull, Derek, and T. W. Clyne. An introduction to composite materials. Cambridge university press, 1996.
[3] Weber, Sebastian, and Werner Theisen. "Sintering of high wear resistant metal matrix composites." Advanced Engineering Materials 9.3 (2007): 165-170.
[4] Vaucher, S., Paraschivescu, D., Andre, C., & Beffort, O. (2002). Selective Laser Sintering of Aluminium-Silicon Carbide Metal Matrix Composites. Diamond, 56, 43.
[5] Nazik, C., Tarakcioglu, N., Canakci, A., Varol, T., & Ozkaya, S. (2014). Enhanced properties of an AA7075 based metal matrix composite prepared using mechanical alloying. Usak University Journal of Material Sciences, 3(1).
[6] Gaard, A., Krakhmalev, P., & Bergstrom, J. (2006). Microstructural characterization and wear behavior of (Fe, Ni)–TiC MMC prepared by DMLS. Journal of Alloys and Compounds, 421(1), 166-171.
[7] Radhakrishna Bhat, B. V., Somaraju, K., Venkataraman, B., & Bhanuprasad, V. V. (1998). Metal Matrix Composites as Potential Armour Materials.
[8] Asuquo, L. O., Ihom, A. P., & Mayaleeke, K. (2013). Morphology and Hardness Improvement of Lead Bearing Alloy through Composite Production: 75Pb-15Sb-10Sn/15% V/V SiO2 Particulate Composite. Leonardo Electronic Journal of Practices and Technologies, 1(12), 59-70.
[9] Mimoto, Takanori, et al. "Mechanical properties and strengthening mechanism of pure Ti powder composite material reinforced with carbon nano particles." (2011).
[10] Zhao, Bo, et al. "High strength Ni based composite reinforced by solid solution W (Al) obtained by powder metallurgy." Materials Science and Engineering: A 456.1 (2007): 337-343.
[11] Chen, Jie, et al. "Microstructure and lattice parameters of AlN particle-reinforced magnesium matrix composites fabricated by powder metallurgy." Acta Metallurgica Sinica (English Letters) 28.11 (2015): 1354-1363.
[12] M.R Bhatt, H Mehta, S.H Buch, "Automatic die design and fatigue life prediction of forming die using AI technique: Expert System", International Journal of Computer Sciences and Engineering, Vol.6, Issue.4, pp.20-30, 2018.
Citation
A.S. Patel, A.M. Sankhla, P.J. Bagga, "Studies on 12% Reinforced Aluminium Based Metal Matrix Composites," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.161-165, 2018.
Analysis of Amplitude Modulation Using labVIEW
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.166-169, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.166169
Abstract
Analog Communication techniques based on modulation of carrier signal are used from years ago and still they are widely used. Amplitude Modulation is one of them. In this paper we had done simulative investigation on effect of modulation index on AM Wave using LabVIEW software.Various cases are being discussed showing effect of modulation index on shape of AM .These different shapes of AM wave have many uses in communication. Power Spectral Density is also calculated also showing effect of modulation index on sideband power. Power Spectral density specifies relationship between power ,modulation index and carrier frequency.
Key-Words / Index Term
Amplitude Modulation, Frequency, Power Spectral Density
References
[1]. C. Uluisik & L. Sevgi, Electron. & Communication. Eng. Dept., Dogus Univ., Istanbul, Turkey, “A LabVIEW-Based Analog Modulation Tool for Virtual and Real Experimentation‟, IEEE Antenna and Propagation Magazine ,Vol.54,Issue.6,December 2012
[2]. Schwartz, M.: Information Transmission, “Modulation and Noise”, McGraw-Hill, New York, 1990.
[3]. Bress, Thomas J. (2013). “Effective LabVIEW Programming”. [S.l.]: NTS Press. ISBN 1-934891-08-8.
[4] K.Sharma, A.Mishra & Rajiv Saxena, “Analog & Digital Modulation Techniques: An overview‟,International Journal of Computing Science and Communication Technologies, Vol.3 , No.1, 2010
[5]. Ji Shujiao, Zhu Ming, Lei Yanmin, „The Simulation Design of Communication System Based on Lab VIEW‟, 2013 2nd International Conference on Measurement, Information and Control.
[6] Korrapati, Raghu B, “Study of Modulation Using Virtual Instruments‟, Allied Academies International Conference. Academy of Information and Management Sciences.Proceedings;Arden 4.1(2000):78-83.
Citation
Nipun Sharma, Palkin Sharma, "Analysis of Amplitude Modulation Using labVIEW," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.166-169, 2018.
Cumulative Image Encryption Approach
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.170-177, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.170177
Abstract
Secret sharing scheme divides colour image into user defined N (positive integer) number of shares with different transference where decryption is being carried out by human visual system using at least K (positive integer) number of shares out of N number of shares. In image key encryption technique the user perform user define BWM&AS operation (bit wise masking and alternate sequence) in between two constitutive bits of each pixel of original image and image key. In this combined approach we introduce two level of encryption using secret sharing scheme followed by Image key encryption technique using BWM&AS operation. Firstly, the original image is encrypted using an image key then that encrypted image is being divided into N number of shares where each of the share is again being encrypted by unique image key in encryption end. In decryption end, we retrieve original shares from the encrypted shares using appropriate image key and generate the original encrypted image by taking K number of share out of N. Lastly, we retrieve the original image by performing BWM&AS operation between the original image key and encrypted image. Thus an attempt is made to enhance the security.
Key-Words / Index Term
Secret Sharing, Human Visual System, Image Key Encryption Technique, BWM&AS Operation
References
[1] M. AL-Laham Mohamad, “Encryption-decryption RGB color image using matrix multiplication”, International Journal of Computer Science & Information Technology (IJCSIT), Vol. 7, No 5, October 2015.
[2] Saksham Wason, Piyush Kumar and Shubham Rathi, “Text and image encryption using color image as a key”, International Journal of Innovative Research in Technology (IJIRT), 2014.
[3] R. Das, S. Kulia , S. Dutta , “ An Approach Of Visual Cryptography Scheme For Color Image By Cumulative Encryption Using Image Partitioning, Text Key Encryption, Image Key Encryption & Digital Enveloping”, International Journal of Engineering Research & Technology, Volume 2, Issue 5, PP-1341-1349, 2013 .
[4] A. Bhakta , S. Maity , R. Das , S. Dutta , “An Approach of Visual Cryptography Scheme by Cumulative Image Encryption Technique Using Image-key Encryption, Bit-Sieved Operation and K-N Secret Sharing Scheme.”, International Journal of Innovative Technology and Exploring Engineering (IJITEE), www.ijitee.org (ISSN: 2278-3075, Vol. 3 Issue 1,) ,pp 20-23 June-2013.
[5] S. Kandar, B.C Dhara., “Random sequence based secret sharing of an encrypted color image”, RAIT, 2012, ISM Dhanbad, INDIA.
[6] S.M.M.Karim, Md. S. Rahaman, Md. I. Hossain, “A new approach for LSB based image steganograpgy using secret key,” IEEE Xplore, DOI: 10.1109/ICCITechn.2011.6164800, Bangladesh, March, 2012. [Computer and Information Technology (ICCIT), Bangladesh, 2011].
[7] M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology-Eurocrypt’94, PP- 1–12, 1995.
[8] Ranjan Parekh, “Principles of Multimedia”, Tata McGraw Hill, INDIA, 2006.
[9] J. Fridrich, “Steganography in Digital Media: Principles, Algorithms, and Applications”, Cambridge University Press, 2009.
[10] Digiatl content for steganography, link” www. garykessler.net / library / steganography.html”.
Citation
R. Das, S. Dutta, "Cumulative Image Encryption Approach," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.170-177, 2018.
Drag Force Coefficient for Various Shapes of Cooling Tower Subjected to Wind Load
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.178-182, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.178182
Abstract
Hyperbolic cooling tower is a tall structure with thin shells subjected to dead load, wind load and ground motion. In absence of ground motion, wind becomes the major factor. In this study three models with different profiles were modelled using Catia and analyzed in Ansys to find drag force and drag coefficient. The results of the models were compared with conventional hyperbolic profile cooling tower. It was found that CT – 2 (Part of the structure has hyperbolic profile and other part is parallel to the vertical axis) has less effect due to wind. The Drag Coefficient of CT – 3 is least when compared to other models but projected area is high, which leads to increase in drag force. The drag force of CT – 2 is 83.2% of conventional cooling tower. Therefore CT – 2 profile is recommended when compared to other profiles.
Key-Words / Index Term
Hyperbolic Cooling Tower, Static Pressure, Drag Force
References
[1] G. Murali, et al., “Response of Cooling Towers to Wind Loads” ARPN Journal of Engineering and Applied Sciences Vol. 7, No. 1, Jan 2012.
[2] Tejas, et al., “Effect of Wind Loading on Analysis of Natural Draught Hyperbolic Cooling Tower”, International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-4 Issue-1, October 2014.
[3] N. Prashanth, et al., “To Study the Effect of Seismic and Wind Loads on Hyperbolic Cooling Tower of Varying Dimension and RCC Shell Thickness”, The International Journal of Science & Technologies (ISSN 2321 – 919X).
[4] Bolishetti Chaitanya, S Sunil Pratap Reddy, Muchakurthi Karthik, “An Experimental Investigation on Effect of High Temperatures on Steel”, International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.156-163, 2017.
[5] Ferrybridge Cooling Tower Collapse – Case Study.
[6] Athira C R, et al., “Linear and Nonlinear Performance Evaluation and Design of Cooling Tower at Dahej”, IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE).
[7] Akhil Nema, et al., “Parametric Earthquake Analysis of Natural Draught Hyperbolic Cooling Tower”, International Journal of Engineering Research Volume No.5, Issue Special 1, pp : 143- 148
[8] IS 11504 – “Indian standard code of practice for of Structural Design of Reinforced Concrete Natural Draught Cooling Towers”, Indian Standard Institution.
[9] IS 875 (1987), “Indian standard code of practice for design loads (other than earthquake) for building and structures, Part 3, Wind loads”, Indian Standard Institution.
[10] IS 456 – 2000 Plain And Reinforced Concrete - Code Of Practice.
[11] BS 4485 (1975), “British standard for water cooling towers, Part 4, Code of practice for structural design and construction” ,British Standard Institution.
[12] https://matzagusto.wordpress.com/2011/12/14/vibrationdamages-towers-case-ferrybridge-cooling-towers-collapse
[13] http://www.risktec.co.uk/knowledge-bank/technical-articles/blownaway--the-end-of-chapelcross-cooling-towers-.aspx
Citation
S. Krishna Kumar, S. Pravin Kumar, "Drag Force Coefficient for Various Shapes of Cooling Tower Subjected to Wind Load," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.178-182, 2018.
Data mining in the academic performance of self – financing arts and science college students using K-Means clustering algorithm
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.183-189, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.183189
Abstract
To impart quality education and to improve the quality of managerial decisions are the main objective of any higher educational institution and also to reduce the drop out ratio to a significant level and to improve the performance of students. To apply data mining techniques by weka software for the academic performance related variables are analyzed. To segment students into groups according to their characteristics cluster analysis was used in this study. This includes the student’s socio economic characters, skill development characters, motivational characters and infrastructural facilities. The application technique will help to classify the best performance of students. The academic performance of 1398 self – financing arts and science college students were selected during their final year of the study. The useful information and related attributes were stored in Educational database and to extract meaningful information and to develop the significant relationship clustering methods were used in this paper. To enhance the quality of educational system by analyzing and improving student’s best performance related characters were identified.
Key-Words / Index Term
Educational data mining, K-Means clustering, Weka Interface, Academic performance
References
[1] Mahesh Singh, Anita Rani, Ritu Sharma, “An optimised approach for student’s academic Performance by k-means clustering algorithm using Weka interface”, International Journal of Advanced Computational Engineering and Networking, Vol.2, Issue.7, pp.5-9, 2014.
[2] Md. Hedayetul Islam Shovon, MahfuzaHaque, “An Approach of Improving Student’s Academic Performance by using K-means clustering algorithm and Decision tree”,International Journal of Advanced Computer Science and Applications,Vol.3, Issue.8, pp.146-149, 2012.
[3] SreedeviKadiyala, Chandra Srinivas Potluri, “Analyzing the Student’s Academic Performance by using Clustering Methods in Data Mining”,International Journal of Scientific & Engineering Research, Vol.5, Issue.6,pp.198-202, 2014.
[4] SnehalBhogan, KedarSawant, PurvaNaik, Rubana Shaikh, OdeliaDiukar, SayleeDessai, “Predicting student performance based on clustering and classification”,IOSR Journal of Computer Engineering (IOSR-JCE),Vol.19, Issue.3, pp.49-52, 2017.
[5] M. Durairaj, C. Vijitha, “Educational Data mining for Prediction of Student Performance Using Clustering Algorithms”,(IJCSIT) International Journal of Computer Science and Information Technologies, Vol.5, Issue.4, pp.5987-5991, 2014.
[6] ShashikantPradipBorgavakar, Amit Shrivasrava, “Evaluating student’s performance using k-means clustering”,International Journal of Engineering Research & Technology(IJERT), Vol.6, Issue.5, pp.114-116, 2017.
[7] T. Prabha, D. ShanmugaPriyaa, “Knowledge discovery of the students academic performance in higher education using intuitionistic fuzzy based clustering”,Journal of Theoretical and Applied Information Technology, Vol.95, Issue.24, pp.7005-7019, 2017.
[8] B. HemaMalini, L Suresh, “Data Mining in Higher Education System and the Quality ofFaculty Affecting Students Academic Performance: A Systematic Review”, International Journal of Innovations & Advancement in Computer Science (IJIACS), Vol.7, Issue.3, pp.66-70, 2018.
[9] M. Muthalagu, “Applied on Clustering Algorithm in Edm”, International Journal of Computer Engineering and Applications, Vol.12, Issue.1, pp.71-76, 2018.
[10] O. J. Oyelade, O. O. Oladipupo, I. C. Obagbuwa, “Application of k-Means Clustering algorithm for prediction of Students’ Academic Performance”, International Journal of Computer Science and Information Security(IJCSIS), Vol.7, Issue.1, pp.292-295, 2010.
[11] Kritika Yadav , Mahesh Parmar, “ Review Paper on Data Mining and its Techniques and Mahatma Gandhi National Rural Employment Guarantee Act”, International Journal of Computer Sciences and Engineering , Vol.5,Issue.4, pp. 68-73, 2017.
[12] Nidhi Sethi, Pradeep Sharma, “International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.3, pp.31-34, 2013
Citation
R. Senthil Kumar and K. Arulanandam, "Data mining in the academic performance of self – financing arts and science college students using K-Means clustering algorithm," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.183-189, 2018.
Comparative Analysis of Hidden Web Crawlers
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.190-194, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.190194
Abstract
Huge data on the internet is not available for the crawler of surface web to index. It can be accessed through search forms when required. This data cannot be accessed by using the hyperlinks present in a web page. Research on hidden web mainly focus on exploring ways to access databases that are usually present behind the search forms. The main effort was to put on how to fill the searched forms with meaningful values. This paper compares different type of hidden web crawler to mention the features and shortcomings.
Key-Words / Index Term
WWW, Hidden Web Crawler, Surface Web, Search forms etc
References
[1] Michael Bergman, “The deep web: surfacing hidden value”. In the journal of Electronic publishing 7(1) (2001).
[2] S. Raghavan, H. Garcia-Molina. Crawling the Hidden Web. In: the proceeding of 27th International conference on very large databases VLDB’01, Morgan Kaufmann publishers Inc. San Francisco, CA, p.p. 129-138.
[3] L Barbosa, J. Freire: Siphoning hidden-web data through keyword-based interfaces. In: SBBD, 2004, Brasilia, Brazil, pp.309-321.
[4] A. Ntoulas, P. Zerfos, J.Cho. Downloading Textual Hidden Web Content through keyword queries. In: 5th ACM/IEEE joint conference on Digital Libraries (Denver, USA, Jun 2005) JCDL05, pp. 100-109.
[5] K.C.Chang, B.He, M.Patel, Z.Zhang : Structured database on the web: Observation and implications: SIGMOD Record, 33(3), 2004.
[6] B.He, M.Patel, Z.Zhang, K.C. Chang: Accessing the Deep Web: A survey. Communications of the ACM, 50(5):95-101, 2007
[7] S.W. Liddle, D.W. Embley, D.T. Scott, S.H. Yau. Extracting data Behind web forms. In: 28th VLDB conference2002, HongKong, China
[8] J. Madhvan, D.Ko, L.Kot, V.Ganapathy, A Rasmussen, A Halevy: google’s deep web crawl, In Proceeding of very large databases VLDB endowment, pp. 1241-1252, Aug 2008.
[9] Komal Kumar Bhatia, A.K.Sharma, Rosy Madaan: AKSHR: A novel framework for a domain specific hidden web crawler. In the proceedings of the first international conference on Parallel, Distributed and Grid Computing, 2010.
[10] A. Bergholz, B. Chidlovskii. Crawling for domain specific hidden web resources. Fourth international conference on web information system engineering (WISE’03) pp. 125-133. IEEE press, 2003.
[11] L. Barbosa, J. Freire. An adaptive crawler for locating hidden-web entry points. In proceeding of WWW, 2007, pp. 441-450.
[12] Sudhakar Ranjan, Komal Kumar Bhatia: “Design of Least Cost (LC) Vertical search based on Domain specific hidden web crawler” International Journal of Information Retrieval Research Volume7, Issue2, pp:19-33, doi:10.4018/IJIRR.2017040102, 2017
Citation
Ashok Kumar, Manish Mahajan, Dheerendra Singh, "Comparative Analysis of Hidden Web Crawlers," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.190-194, 2018.
Analyzing EDFA Performance using different Pumping Techniques
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.195-202, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.195202
Abstract
Wavelength Division Multiplexing (WDM) technology utilizes a multiplexer at the transmitter end and a demultiplexer at the receiver end to split the channels apart. Utilization of Erbium Doped Fiber Amplifier (EDFA) enables us to minimize various problems like insertion loss and dispersion. The EDFA-WDM System performance mainly depends on pumping technique used. We have analyzed various pumping techniques for a WDM system with pump powers from 40-120mW over different lengths of Erbium doped fiber (EDF). The designed system is analyzed in terms of Q-Factor and received power for a wavelength ranging 1530nm-1550nm with 0.5nm spacing. The results of pumping techniques are compared qualitatively to find the efficient performance of EDFA-WDM system.
Key-Words / Index Term
EDFA, WDM, Pump power, Fiber length
References
[1] M. Nakazawa, “Evolution of EDFA from single-core to multi-core and related recent progress in optical communication,” Optical Review, vol. 21, no. 6, pp. 862–874, 2014
[2] Payal ,Dr. (Col.) Suresh Kumar, Deepak Sharma, “A Review of Optical Communication link design using EDFA” International Journal of Enhanced Research in Management & Computer Applications, Volume 6, Issue3, March 2017pp (33-38)ISSN: 2319-7471.
[3] Payal ,Dr. (Col.) Suresh Kumar, Deepak Sharma, “Performance Analysis of NRZ and RZ Modulation Schemes in Optical Fiber Link Using EDFA” International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE),Vol. 7,Issue 8 August 2017 ,pp(161-168) ISSN: 2277 128X DOI: 10.23956/ijarcsse/V7I8/0102.
[4] Suresh Kumar, Abhimanyu Nain, “Simulative Investigation Of WDM Rof Systems Including The Effect Of The Raman Crosstalk Using Different Modulators”, Telecommunications and Radio Engineering, Vol.75, Issue 14 2016, pp(1243-1254) DOI: 10.1615/TelecomRadEng.v75.i14.20
[5] Abhimanyu Nain, Suresh Kumar ,Performance Investigation of Different Modulation Schemes in RoF Systems under the Influence of Self Phase Modulation, DG GRUYTER, Journal of Optical Communication. 2017 (ISSN 2191-6322, ISSN (Print) 0173-4911.DOI 10.1515/joc-2016-0155.
[6] Abhimanyu Nain, Suresh Kumar, S. Singla, “Impact of XPM Crosstalk on SCM-Based RoF Systems”, Journal of Optical Communications 2016, (ISSN 0173-4911) DOI 10.1515/joc-2016-0045
[7] Deepak Sharma, Payal, Rajbir Singh, “Performance Investigation of Dispersion Compensation Techniques in 32-Channel DWDM System” International Journal of Electronics Electrical and Computational Systems (IJEECS) ISSN: 2348 117X Vol. 6 Issue 11, Nov- 2017 pp (420-427).
[8] P. C. Becker “EDFA-Fundamentals and Technology”, Academic Press London
[9] Deepak Sharma, “Design and Analysis of a Hybrid Optical Amplifier using EDFA and Raman Amplifier”, International Journal of Enhanced Research in Management & Computer Applications, Vol. 5 Issue 9, September-2016ISSN: 2319-7471.
[10] Rajbir Singh, Payal, Deepak Sharma, “Performance Evaluation of Different Channels in Optical Communication Systems using Optisystem Simulator.” International Journal of Innovations & Advancement in Computer Science, Vol. 7, Issue 5. ISSN 2347 – 8616
[11] Deepti, Suresh Kumar, Payal, “Optical Communication link design using EDFA with FBG : Theoretical Review”, International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.182-187, 2018 https://doi.org/10.26438/ijcse/v6i3.182187
[12] Payal, Rajbir Singh, Deepak Sharma, “Performance Comparison of Hybrid Optical Amplifiers with Different Modulation Formats” International Journal of Electronics, Electrical and Computational System (IJEECS) Volume 6, Issue 11 November 2017 ISSN 2348-117X
Citation
Payal, D. Sharma, S. Kumar, "Analyzing EDFA Performance using different Pumping Techniques," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.195-202, 2018.