Triple Security of File System for Cloud Computing
Research Paper | Journal Paper
Vol.2 , Issue.3 , pp.148-154, Mar-2014
Abstract
Large scale distributed systems such as cloud computing applications are becoming very common. These applications come with increasing challenges on how to transfer and where to store and compute data. The most prevalent distributed file systems to deal with these challenges is the Hadoop File System (HDFS) which is a variant of the Google File System (GFS). However HDFS has two potential problems. The first one is that it depends on a single name node to manage almost all operations of every data block in the file system. As a result it can be a bottleneck resource and a single point of failure. The second potential problem with HDFS is that it depends on TCP to transfer data. As has been cited in many studies TCP takes many rounds before it can send at the full capacity of the links in the cloud. This results in low link utilization and longer download times. To overcome these problems of HDFS we present a new distributed file system. Our scheme uses a light weight front end server to connect all requests with many name nodes i.e Triple Security.
Key-Words / Index Term
Network, Performance, Security, Signature
References
n Efficient Implementation Of The Digital Signature Algorithm P. Kitsos, N. Sklavos And O. Koufopavlou Vlsi Design Laboratory Electrical and Computer Engineering Department University of Patras. Patras, GREECE E-mail: pkitsos@ee.upatras.gr
[2]. An Introduction to Cryptography and Digital Signatures Author: Ian Curry March 2001 Version 2.0M.M. Amin, .M. Salleh, S. Ibrahim, M.R Katmin (2003), �Information Hiding Using Steganography�, 4th National Conference on Telecommunication Technology Proceeding 2003 (NCTT2003), Concorde Hotel, Shah Alam, Selangor, 14-15 January 2003.
[3]. Nameer N. EL-Emam, Hiding a Large Amount of Data with High Security Using Steganography Algorithm Applied Computer Science Department, Faculty of Information Technology, Philadelphia University, Jordan
[4]. Bellare,M., Miner,S.: A Forward-Secure Digital Signature Scheme. In: Wiener, M. (eds.):
[5]. National Institute of Standards and Technology (NIST), Digital Signature Standard, FIPS PUB 186-2, http://csrc.nist.gov/publications/fips/fips186-2/fips186-2.pdf
[6]. Abdalla,M., Reyzin,L.: A New Forward-Secure Digital Signature Scheme. In: ASIACRYPT 2000,LNCS, Vol.1976, pp. 116-129. Springer-Verlag,(2000).
[7]. Anderson,R.: Invited Lecture, Fourth Annual Conference on Computer and Communications Security,ACM, (1997).
[8]. T Morkel, JHP Eloff � Encryption Techniques: A TIMELINE APPROACH� published in Information and Computer Security Architecture (ICSA) Research Group proceeding.
[9]. Text book William Stallings, Data and Computer Communications, 6eWilliam 6e 2005.
[10]. Md. Nazrul Islam, Md. Monir Hossain Mia, Muhammad F. I. Chowdhury, M.A. Matin �Effect of Security Increment to Symmetric Data Encryption through AES Methodology� Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing 978-0-7695-3263-9/08 DOI 10.1109/SNPD.2008.101 IEEE 2008.
[11]. Joan Daemen and Vincent Rijmen, AES submission document on Rijndael, June 1998.
Citation
R. Arya , "Triple Security of File System for Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.148-154, 2014.
Data Leakage Detection Using Information Hiding Techniques
Technical Paper | Journal Paper
Vol.2 , Issue.3 , pp.155-158, Mar-2014
Abstract
This paper is detailed about the proliferation of media sharing through third party vendors and tracking of guilt agent using a key generation and encryption of key in media file using asymmetric key cryptography techniques. Main focus of this paper is on the security provided for proliferation of media which help the admin to track person for leakage. In the process of each key generation is based on timestamp of system, LSB replacement along with encryption of key using RSA algorithm. Stegnalysis is the art of detecting the message�s existence and blockading the covert communication. The Least Significant Bit steganography is a technique in which least significant bit of the image is replaced with data bit.
Key-Words / Index Term
Assymetric Key Cryptograhy,Steganalysis,Least Significant Bit,Watermarking
References
[1] Papadimitriou P and Garcia-Molina, �Data Leakage Detection� Knowledge and Data Engineering, IEEE Transactions on Volume: 23, Issue: 1, Page No (51-63), Jan 2011.
[2] Kumar Ajay, Goyal Ankit, Kumar Ashwani, Chaudhary Navneet Kumar and Sowmya Kamath, �Comparative evaluation of algorithms for effective data leakage detection�, Information & Communication Technologies (ICT), 2013 IEEE Conference, ISBN 978-1-4673-5759-3,Page No(177-182),April 11-12,2013.
[3] Shailender Gupta, Ankur Goyal and Bharat Bhushan �Information Hiding Using Least Significant Bit Stegnography and Cryptography� Vol: 4, No: 6, Page No (27-34), June 2012.
[4] V. Darmstaedter, J. -F. Delaigle, D. Nicholson and B. Macq, �A block based watermarking technique for MPEG-2 signals: Optimization and validation on real digital TV distribution links�, Proceedings 3rd European Conference on Multimedia Application, Services and Technique, ISBN 978-3-540-64594-8,Page No (190-206),May 1998.
[5] J. Lee and Sung-Hwan Jung, �A survey of watermarking techniques applied to multimedia� IEEE International Symposium on Industrial Electronics, Volume: 1, Page No (272-277), June 2001.
[6] Hamid Shojanazeri, Wan Azizun Wan Adnan and Sharifah Mumtadzah Syed Ahmad, �Video Watremarking Technique for Copyright Protection and Content Authentication�, International Journal of Computer Information Systems and Industrial Management Application, ISSN 2150-7988, Volume: 5,Page No(652-660),2013.
[7] B. G. Mobasseri, �Exploring CDMA for watermarking of digital video� Proceedings of the SPIE, Volume: 3675, Page No (96-102), April 1999.
[8] F. Hartung, J. K. Su, and B. Girod, �Spread spectrum watermarking: malicious attacks and counter-attacks,� from Conference Volume:3657 Proceeding SPIE Security and Watermarking of Multimedia Contents, San Jose, CA, Page No (147�158), Jan. 1999.
[9] Mrs. Kavitha, Kavita Kadam, Ashwini Koshti, Priya Dunghav �Stegnography Using Least Significant Bit Algorithm�, International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 Volume:2, Issue:3, Page No (338-341),May-Jun 2012.
Citation
A. Tale, M. Gunjal, B.A. Ahire, "Data Leakage Detection Using Information Hiding Techniques," International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.155-158, 2014.
Enhance Security Issues Using Data Cipher Algorithm in Cloud
Research Paper | Journal Paper
Vol.2 , Issue.3 , pp.159-162, Mar-2014
Abstract
� Cloud Computing is a internet based computing that facilities hardware, network and software resources and provide flexible infrastructure on demand as pay per usage. The benefits of cloud computing is due to its reduced cost, resource sharing and performance. Cloud is based on the difficulty of securing storage data and maintain privacy. The security is the only problem in the cloud .Security is not provided in the cloud ,many companies have their own unique security structure Though , Amazon has its own security structures. The data placed in the cloud is accessible to everyone . To overcome this difficulty ,we have proposed RSA algorithm between cloud service provider and the user. The aim of our proposed work is to enhance security issues and maintain privacy.
Key-Words / Index Term
RSA algorithm , Cloud Computing, Encryption , Decryption, Public Key, Private key ,Security Attributes
References
[1] Shaheen Ayyub and Devshree Roy,�Cloud Computing Characteristics and Security Issues �, International Journal Of Computer Sciences and Engineering,Volume-1,Issue-4,Page no- 18-22, Dec 2013.
[2] Manpreet Kaur and Rajbir Singh,�Implementing Encryption Algorithm to Enhance data Security of Cloud in Cloud Computing �, International Journal of Computer Applications,Volume-17,Issue-18, ISSN-0975-8887, May 2013.
[3] Parsi Kalpana,�Data Security in Cloud Computing Using RSA Algorithm� , International Journal of Research in Computer and Communication Technology ,ISSN 2278-5841,Volume-1, Issue- 4,Page no-143-146, September 2012.
[4] Zhifeng Xiao and Yang Xiao, �Security And Privacy in Cloud Computing � ,IEEE, Volume-15, Issue-2, Page no � 843-858. Second Quarter 2013.
[5] Mandeep Kaur and Manish Mahajan, � Using Encryption Algorithms to Enhance the Data Security in Cloud Computing�, International Journal of Communication and Computer Technologies,Volume-1, Issue- 12, Page no-56-59,January 2013.
[6] Rajesh Piplode and Umesh Kumar Singh ,�An Overview and Study of Security Issues & Challenges in Cloud Computing�, International Journal of Advanced Research in Computer Science and Software Engineering , Volume-2, Issue-9 , Page no- 115-120, September 2012.
[7] Mamta Devi ,�Security and Privacy Concerns in Cloud Computing�, International Journal of Research Review in Engineering Science and Technology, Volume-1, Issue-2, Page no -109-117 , September 2012.
[8] William Stallings, �Network Security Essentials Applications and Standards�, Pearson Education , Third Edition ,2007.
[9] Atul Kahate �Cryptography and Network Security � , Tata MC Graw-Hill Education , Second Edition Page no -320-321 ,2010.
[10] www.google.com.
Citation
J. Singh, R. Rana, "Enhance Security Issues Using Data Cipher Algorithm in Cloud," International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.159-162, 2014.
Hiding Existence of Communication Using Image Steganography
Research Paper | Journal Paper
Vol.2 , Issue.3 , pp.163-166, Mar-2014
Abstract
Now a day, maintaining the security of the secret information has been a great challenge. Sending message habitually through a communication channel like internet draws the attention of third parties and hackers, perhaps causing attempts to break and expose the sent messages. Some solutions to be discussed is how to pass information in manner that the very existence of the message is unknown in order to repel attention of the potential attacker. Besides hiding data for secret communication, an approach of information hiding can be extended to copyright protection for digital media. In this paper, we propose modified LSB technique for Image Steganography to hide secret message i.e. Text, Image, Audio and Video in an Image which makes it harder for unauthorised people to extract the original message.
Key-Words / Index Term
Stego-File, Cover-Image, Modified LSB
References
[1]. Ramanpreet Kaur, Prof. Baljit Singh, �Survey and Analysis of various Steganographic Techniques� , ISSN:2250-3676, Volume-2, Isuue-3, 561-566
[2]. T. Morkel, J.H.P. Eloff, M.S. Olivier, �An Overview Of Image Stegnography�, Information and Computer Security Architecture (ICSA) Research Group Department of Computer Science University of Pretoria, 0002, Pretoria, South Africa.
[3]. Mehdi Hussain and Mureed Hussain, �A Survey of Image Steganography Techniques� , International Journal of Advanced Science and Technology Vol. 54, May, 2013
[4]. Joyshree Nath, Asoke Nath, �Advanced Steganography Algorithm using Encrypted secret message�, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 2, No.3, March 2011
[5]. Shilpa Gupta, Geeta Gujral and Neha Aggarwal, �Enhanced Least Significant Bit algorithm For Image Steganography�, IJCEM International Journal of Computational Engineering & Management, Vol. 15 Issue 4, July 2012 ISSN (Online): 2230-7893, www.IJCEM.org
Citation
S. Nimje, A. Belkhede, G. Chaudhari, A. Pawar, K. Kharbikar, "Hiding Existence of Communication Using Image Steganography," International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.163-166, 2014.
Attack Generation and Vulnerability Discovery in Penetration Testing using Sql Injection
Research Paper | Journal Paper
Vol.2 , Issue.3 , pp.167-173, Mar-2014
Abstract
Now a days the use of the world wide web (www) is increasing rapidly and leading to security breaches of a system so testing the software system has been made iterative. Testing requires effort, time and skilful person. Hacking mostly occur in banking sector and business organizations because they maintain all the conï¬dential information. One of the hacking technique is commonly occur in banking sector is sql injection. Security testing can be done by two ways i.e static analysis which is otherwise known as white box testing and by dynamic analysis which is known as black box testing.In this paper we have shown the penetration testing of web application to detect the sql injection vulnerability. This paper describes the penetration testing processes and mainly focuses on vulnerability discovery, attack generation and obtain the test cases and maintaining a pentester database which store all the attack responses. We have taken an internet banking transaction case study. This paper has the main motivation is to detect the sql injection by the attack generation. In sql injection system the attacker might insert a malicious code in the user input ï¬eld and trying to gain access the confidential and sensitive information from the database and making the database insecure. Penetration testing is widely used to simulate an attack of the web application and then analysis the attack pattern and give better solution to the system. This paper has given an overview of the penetration testing process and sql injection attack and a pentester database.
Key-Words / Index Term
Testing, Security Testing , Penetration Testing, Sql Injection
References
[1] Halfond WGJ, Orso , Improving penetration testing through static and dynamic analysis, Software Testing, Veriï¬cation, And Reliability(2011).
[2] Pulei Xiong, Liam Peyton, A Model-Driven Penetration Test Framework for Web Applications, 2010 Eighth Annual International Conference on Privacy, Security and Trust.
[3] Lashanda Dukes,Xiaohong yuan, A case study on web application security testing with tools and manual testing, 2013.
[4] Halfond WGJ, Orso A. AMNESIA: Analysis and Monitoring for NEutralizing SQL-Injection Attacks, Proceedings of the International Conference on Automated Software Engineering, Long Beach, CA, U.S.A., November 2005;174183.
[5] T. Pietraszek and C. V. Berghe , Defending Against Injection Attacks through Context-Sensitive String Evaluation, In Proceedings of Recent Advances in Intrusion Detection (RAID2005), 2005
[6] Bernard Stepien, Liam Peyton, Pulei Xiong , Using TTCN-3 as a Modeling Language for Web Penetration
[7] www.owasp.org
[8] A. Kie zun, P. J. Guo, K. Jayaraman, and M. D. Ernst, Automatic creationof SQL injection and cross site scripting attacks, in Proc. of ICSE, 2009.
[9] Lei Xu, Baowen, A frame work for web application testing, International Conference on Cyberworlds, 2004.
[10] Nuno Antunes, Marco Vieira, Evaluating and Improving Penetration Testing in Web Services, IEEE,2012.
[11] Halfond WGJ, Viegas J, Orso A, A classification of SQL-injection attacks and counter measures, Proceedings of the International Symposium on Secure Software Engineering, Washington, DC, U.S.A., March 2006.
[12] Halfond WGJ, Orso A, Manolios P. WASP: Protecting web applications using positive tainting and syntax-aware evaluation, Transactions on Software Engineering 2008; 34(1):6581.
[13] G . Buehrer, B. W. Weide, and P. A. Sivilotti, Using parse tree validation to prevent SQL injection attacks, in Proceedings of the 5th international workshop on Software engineering and middleware, 2005, p. 113.
[14] Sutton M, Greene A, Amini P. Fuzzing, Brute Force Vulnerability Discovery, Addison-Wesley: Reading, MA,2007.
[15] Arkin B, Stender S. McGraw G, Software penetration testing. IEEE Security and Privacy 2005; 3(1):8487.
Citation
J. Upadhyaya, N. Panda, A.A. Acharya, "Attack Generation and Vulnerability Discovery in Penetration Testing using Sql Injection," International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.167-173, 2014.
Implementation and Comparison of Image Fusion using Discrete Wavelet Transform and Principal Component Analysis
Research Paper | Journal Paper
Vol.2 , Issue.3 , pp.174-181, Mar-2014
Abstract
Nowadays with rapid development in high technology and modern instrumentation image fusion has become a vital component of a large number of applications. On the basis of three categories Pixel, Feature and decision a no of methods and algorithms have proposed for Image Fusion. This would be an interesting task to take some best recently used methods and analyze which one is better and effective. This Paper considers two fusion techniques Discrete Wavelet Transform (DWT) and Principal Component Analysis, fusion methods for these two techniques has been proposed and also the effectiveness is compared. In DWT the two images to be fused are decomposed at different levels and their approximation and detail co-efficient are calculated, a fusion scheme is used to combine these co-efficient and then Inverse of DWT is taken to reconstruct the image. In PCA the principal components of the two images are extracted and a fusion scheme is proposed to fuse these principal components to reconstruct the image. Finally comparison of these two techniques is performed on the basis of some evaluation criteria and the decision has drawn that which technique is better.
Key-Words / Index Term
Image Fusion, Wavelets, DWT, PCA
References
[1] P.J. Burt and E.H Adelson, �The Laplacian Pyramid as a Compact Image Code�, IEEE Transactions on Communications, Vol. com-31, Issue 4, pp, April 1983.
[2] Y. Yang, D.S.Park, S. Huang and N. Rao, �Medical Image Fusion via an Effective Wavelet-Based Approach�, EURASIP Journal on Advances in Signal Processin, Vol. 2010, pp 1-13, March 2010.
[3] Y. Zhou, A. Mayyas and M. A. Omar �Principal Component Analysis Based Image Fusion Routine With Application To Stamping Split Detection�, Research in Nondestructive Evaluation, 2011.
[4] O. Prakash, R. Srivastava and A. Khare, �Biorthogonal Wavelet Transform Based Image Fusion Using Absolute Maximum Fusion Rule�, IEEE Conference on Information and Communication Technologies, pp, 2013.
[5] S. Li, J. T. Kwok, and Y. Wang, � Multifocus image fusion using artificial neural networks�, Elsevier, pp 994-995, 2002.
[6] U. Patil and U. Mudengudi, �Image fusion using hierarchical PCA�, International Conference on Image Information Processing, pp 5, 2011.
[7] V. R. Lakshmi Gorty, �Continuous generalized hankle-clifford wavelet transformation�, International Journal of Computer Sciences, Vol. 1, Issue 4, pp 1-10, 2013.
Citation
V.K. Mishra, S. Kumar, C. Singh, "Implementation and Comparison of Image Fusion using Discrete Wavelet Transform and Principal Component Analysis," International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.174-181, 2014.
Design and Implementation of Image Fusion System
Research Paper | Journal Paper
Vol.2 , Issue.3 , pp.182-186, Mar-2014
Abstract
Image fusion can be broadly defined as the process of combining multiple input images or some of their features into a single image without the introduction of distortion or loss of information. The aim of image fusion is to integrate complementary as well as redundant information from multiple images to create a fused image output. We introduce the basic principles of image fusion at pixel level, feature, and decision. Design rules and steps of graphical user interface (GUI) are described. Image fusion system based on graphical user interface has been designed and implemented below. We give you part of the overall design of the system and explain their method of use. The system has many functions: image denoising, image enhancement, image registration, image segmentation, image fusion, and evaluation of the merger.
Key-Words / Index Term
Image Fusion, GUI, Pixel level fusion
References
[1] Y. Zhou, A. Mayyas and M. A. Omar �Principal Component Analysis Based Image Fusion Routine With Application To Stamping Split Detection�, Research in Nondestructive Evaluation, pp78-79, 2011.
[2] P.J. Burt and E.H Adelson, �The Laplacian Pyramid as a Compact Image Code�, IEEE Transactions on Communications, Vol. com-31, Issue 4, pp 4, April 1983.
[3] Y. Yang, D.S.Park, S. Huang and N. Rao, �Medical Image Fusion via an Effective Wavelet-Based Approach�, EURASIP Journal on Advances in Signal Processin, Vol. 2010, pp1-12, March 2010.
[4] O. Prakash, R. Srivastava and A. Khare, �Biorthogonal Wavelet Transform Based Image Fusion Using Absolute Maximum Fusion Rule�, IEEE Conference on Information and Communication Technologies, pp577-578, 2013.
[5] Z. Wang, Y. Tie and Y. Liu, �Design and Implementation of Image fusion System�, International Conference on Computer Application and System Modeling, pp 141, 2014.
Citation
V.K. Mishra, S. Kumar, R.K. Gupta, "Design and Implementation of Image Fusion System," International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.182-186, 2014.
Scrum Testing With Backlog Management in Agile Development Environment
Research Paper | Journal Paper
Vol.2 , Issue.3 , pp.187-192, Mar-2014
Abstract
Recent research report shows the wide acceptance of agile development methodology to create qualitative software in short development cycles. It encourages the early development of software with more promising quality. Early testing strategies with multiple test cycle decrease the number of defect in product. In each iteration automated testing minimize the test effort and cost of testing. Basic agile practices like pair programming, continuous integration, small release, simple design and re-factoring make the development procedure more promising. Scrum is most widely used agile framework for developing software within four weeks. It keeps the document light and manage requirements in the form of product backlog. Testing is performed on the features which are developed in scrum process. Tester are more integrated with development team and collaborate with customers for early feedback. Automated tools are used to enhance the communication in distributed team members. Planning and meetings are the heart of agile testing. Design is more flexible to accommodate change in requirements. Testing process includes unit, integration and regression testing with non functional testing. Automated tool s are used for unit and regression testing in scrum process. These tools helped significantly to simplify and speed up the development cycle. In this paper the testing process performed in scrum environment is discussed through testing model. Test strategies like unit and regression testing method is adopted in the process. Management of user requirements through product backlog and sprint backlog is discussed with suitable example. Different methodology of backlog estimation i.e initial estimation technique and planning poker method is discussed in this paper.
Key-Words / Index Term
Agile Software Development, Scrum testing, Backlog management
References
[1]. "Agile Manifesto" agilemanifesto.org/principles.html.
[2]. J. F. Abrantes and G. H. Travassos. Common agile practices in software processes. IEEE International Symposium on Empirical Software Engineering and
Measurement, 2011.
[3]. A. Ahmed, S. Ahmad, D. N. Ehsan, E. Mirza, and S. Z. Sarwar. Agile software development: Impact on productivity and quality. IEEE ICMIT, 2010.
[4]. A. Aitken and V. Ilango. A comparative analysis of traditional software engineering and agile software development. 46th Hawaii International Conference on System Sciences, 2013.
[5]. E. Collins, A. Dias-Neto, and V. F. de Lucena Jr. Strategies for agile software testing automation: An industrial experience. IEEE 36th International Conference on Computer Software and Applications Workshops, 2012.
[6]. E. Collins, G. Macedo, N. Maia, and A. Dias-Neto. An industrial experience on the application of distributed testing in an agile software development environment. IEEE Seventh International Conference on Global Software Engineering, 2012.
[7]. D. D. Gregorio, PMP, and CBAP. How the business analyst supports and encourages collaboration on agile projects. Information Systems, Infrastructure, & Services - Systems Engineering, IEEE, 2012.
[8]. B. Haugset and G. K. Hanssen. Automated acceptance testing: a literature review and an industrial case study. Agile 2008 Conference, 2008.
[9]. T. Hayata and J. Han. A hybrid model for it project with scrum. IEEE, 2011.
[10]. I. Kayes. Agile testing: Introducing prat as a metric of testing quality in scrum. ACM SIGSOFT Software Engineering Notes.
[11]. H. Kniberg. Scrum and XP from the Trenches. C4Media, Publisher of InfoQ.com., United States of America, 2007.
[12]. E. J. Quaglia and C. A. Tocantins. Simulation projects management using scrum. In Proceedings of the 2011 Winter Simulation Conference IEEE, 2011.
[13]. R. A. Razak and F. R. Fahrurazi. Agile testing with selenium. 5th Malaysian Conference in Software Engineering (MySEC) IEEE, 2011.
Citation
S. Harichandan, N. Panda, A.A. Acharya , "Scrum Testing With Backlog Management in Agile Development Environment," International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.187-192, 2014.
Effect of Diethyl Ether and DIMETHYL Ether With Liquefied Petroleum Gas on Combustion And Emissions Characteristics of Diesel Engine
Research Paper | Journal Paper
Vol.2 , Issue.3 , pp.193-198, Mar-2014
Abstract
Producing and using renewable fuels for transportation is one approach for sustainable energy future for the world. A renewable fuel contributes lesser global climate change. In this study the effect of using liquefied petroleum gas (LPG) as a primary fuel with two different ignition enhancers diethyl ether (DEE) and dimethyl ether (DME) on performance, combustion and emissions characteristics of a single cylinder, four-stroke, water-cooled naturally aspirated DI diesel engine was carried out. LPG has a simpler hydrocarbon structure than conventional fuels. DEE and DME are recently reported as a renewable fuel and to be a low-emission high-quality diesel fuel replacement. A single cylinder, four-stroke, water-cooled naturally aspirated DI diesel engine having rated output of 3.7kW at 1500 rpm was used for the experiments. Measurements were made to study the performance, combustion and emissions characteristics and to compare between these two ignition enhancers and conventional diesel fuel. From the results, it is observed that using LPG/DEE was better than LPG/DME on performance, combustion and emissions characteristics of diesel engine and both were better than conventional diesel fuel, especially in a reduction of NO, smoke and particulate emissions. The brake thermal efficiency for both LPG/DEE and LPG/DME lower at full load with a reduction of NO emission than the diesel operation. The maximum reduction in smoke and particulate emissions is observed at high loads, when compared to that of diesel operation; however an increase in CO and HC emissions was observed.
Key-Words / Index Term
Diesel engine, DI, LPG, DEE, DME, Combustion, Emissions, Characteristics
References
[1]. YADAV R, Rajay S. A text book of internal combustion engines and air pollution, 1st ed. Allahabad: Central Publishing House; 2002, p. 672.
[2]. Kontarakis G, Collings N. Demonstration of HCCI using a single cylinder four-stroke SI engine with modified valve timing, SAE transaction 2001-01-2870.
[3]. Nagarajan G, Rao AN, Renganarayanan S. Emission and performance characteristics of neat ethanol fuelled DI diesel engine, Int J Ambient Energy 2002; 23(8).
[4]. Hashimoto K, Ohta H, Hirasawa T, Arai M, Tamura M. Evaluation of ignition quality of LPG with cetane number improver, SAE transaction 2002-01-0870.
[5]. Zhao FF. Homogeneous charge compression ignition (HCCI) engine: key research and development issues. Warrendale, PA, USA:Society of Automotive Engineers, Inc.;2003.
[6]. Kajitani CL, Oguma C, Alam M, Rhee KT. Direct injection diesel engine operated with propane�DME blended fue, SAE transaction 982536, 1998.
[7]. Zhili C, Konno M, Oguna M, Tadanori Y. Experimental study of CI natural gas/DME homogenous charge engine, SAE transaction 2000-01-0329.
[8]. Lida N, Igarashi T. Auto-ignition and combustion of n-butane and DME/air mixtures in a homogeneous charge compression ignition engine, SAE transaction 2000-01-1832.
[9]. Alam M, Goto S, Sugiyama K, Kajiwara M, Mori M, Konno M, et al. Performance and emissions of a DI diesel engine operated with LPG and ignition improving additives, SAE transaction 2001-01-3680.
[10]. Goto S, Lee D, Wakao Y, Honma H, Mori M, Akasaka Y, et al. Development of an LPG DI diesel engine using cetane number enhancing additives, SAE transaction 1999-01-3602.
[11]. Bailey B, Eberhardt J, Goguen S, Erwin J. Diethyl ether (DEE) as a renewable diesel fuel, SAE transaction 972978, 1997.
[12]. Jajoo BN, Mahajan SD, Matale AP. Experimental investigations on the performance and control of smoke emission by dual fuelling diesel engine using LPG. In: Proceedings of IC engines and combustion 2000, New Delhi, India.
[13]. Heywood JB. Internal combustion engine fundamentals, New York: McGraw-Hill; 1998.
[14]. Lida N, Igarashi T. Auto-ignition and combustion of n-butane and DME/AIR mixtures in a homogeneous charge compression ignition engine, SAE transaction 2000-01-1832.
[15]. Doebelin A. Measurement systems: application and design. New York: McGraw-Hill; 1966.
[16]. Holman JP. Experimental methods for engineers, 6th ed. New York: McGraw-Hill; 1994.
Citation
M.M. El-Ghobashy El-Hagar, "Effect of Diethyl Ether and DIMETHYL Ether With Liquefied Petroleum Gas on Combustion And Emissions Characteristics of Diesel Engine," International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.193-198, 2014.
Generation of Testcases from UML Sequence Diagram and Detecting Deadlocks using Loop Detection Algorithm
Research Paper | Journal Paper
Vol.2 , Issue.3 , pp.199-203, Mar-2014
Abstract
In an environment where processes those execute concurrently, speeding up their computation is important. Deadlock is a major issue that occurs during concurrent execution. In this paper, we present an approach to generate testcases from UML sequence diagram for detecting deadlocks during the design phase. This will reduce the effort and cost involved to fix deadlocks at a later stage. Our work begins with design of sequence diagram for the system, then converting it to intermediate graph where deadlock points are marked and then traverse to get testcases. The testcases thus generated are suitable for detecting deadlocks.
Key-Words / Index Term
Software testing, Test cases,Sequence diagram, Concurrency, Deadlock
References
[1] R.V Binder, "Testing Object-Oriented Systems Models, Patterns, and Tools, Object Technology Series". Addision Wesley, Reading, Massachusetts, October 1999
[2] P. Nagarani I, R. Venkata Ramana Chary, "A Tool Based Approach For Automation Of GUI Applications",ICCCNT�12 26th-28th July 2012, Coimbatore, India
[3] N. S. Dsouza, A. Pasala, A. Rickett and O. Estrada,"A code based approach to generate functional test scenarios for testing of re-hosted application", Short Papers of the 22nd IFIP ICTSS, Alexandre Petrenko, Adenilso Simao, Jose Carlos Maldonado (eds.), Nov. 08-10, 2010, Natal, Brazil
[4] Santosh Kumar Swain, Durga Prasad Mohapatra, and Rajib Mall, "Test Case Generation Based on Use case and Sequence Diagram", Journal of Object Technology, vol. 8,No. 3,May-June 2009,PP. 65-83
[5] Monalisa Sarma, Debasish Kundu, Rajib Mall, "Automatic Test Case Generation from UML Sequence Diagrams".15th International Conference on Advanced Computing and Combinations,2007 IEEE
[6] Philip Samuel, Anju Teresa Joseph, "Test Sequence Generation from UML Sequence Diagrams",2008 IEEE
[7] Emanuela G.Cartaxo, Francisco G.O.Neto and Patriticia D.L.Machado,Test Case Generation by means of UML Sequence
Diagrams and Labelled Transition Systems, 2007 IEEE
[8] Monalisha Khandai,Arup Abhinna Acharya,Durga Prasad Mohapatra, A Novel Approach of Test Case Generation for Concurrent Systems Using UML Sequence Diagram978-1-4244-8679-3,2011 IEEE
[9] Debashree Patnaik,Arup Abhinna Acharya, Durga Prasad Mohapatra, Generation Of Test Cases Using UML Sequence Diagram In A
System With Communication Deadlock, Journal of Computer Science and Information Technologies, Vol. 2 (3) , 2011, 1187-1190
[10] Guo Wenming, Fu Xiangling, Feng Jianmei, "A Data-driven Software Testing Tools Integration System", School of Software Engineering, Beijing University of Post and Telecommunication,Beijing,P.R.China,2009
[11] Srinivasan Desican, Gopalaswamy Ramesh, Software Testing principles and practices,3rd Edition, Pearson Publication
[12] Rajib Mall ,Software Testing principles and practices,3rd Edition, Pearson Publication
[13] Srinivasan Desican, Gopalaswamy Ramesh, Fundamentals of Software Engineering,3rd Edition, PHI Learning Private Limited
[14] Tarjan, R. E. ,Depth-first search and linear graph algorithms, SIAM Journal on Computing 1 (2): 146160,1972 doi:10.1137/0201010
Citation
A. Mallick, N. Panda, A.A. Acharya, "Generation of Testcases from UML Sequence Diagram and Detecting Deadlocks using Loop Detection Algorithm," International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.199-203, 2014.