Version-4 (July-August 2015)
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An Energy Efficient Traffic Routing On Wake-Up Process in Wireless Sensor Network |
Country | : | India |
Authors | : | K V Umashankar || Dr.C.Chanadrasekar |
Abstract: Wireless network consists of distributed sensor nodes to monitor the physical conditions and establish the traffic system. Every node in WSN sends and receives the packet, resulting in wastage of bandwidth.However, bandwidth effective sensor node is not effective in improving the energy-saving protocol in wireless sensor network. The wake-up process with high energy consumption leads to maximal overhead count on packet transmission channel. To reduce the energy consumption in wireless sensor network, Energy Efficient Traffic Routing based on the Point Synchronization Fitness Functioning (EETR-PSFF)mechanism is proposed in this paper.
[1]. Ruqiang Yan, Hanghang Sun and YuningQian, "Energy-Aware Sensor Node Design With Its Application in Wireless Sensor Networks," IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, VOL. 62, NO. 5, MAY 2013
[2]. GholamHosseinEkbatanifard, Reza Monsefi, Mohammad H. Yaghmaee M., Seyed Amin Hosseini S, "Queen-MAC: A quorum-based energy-efficient medium access control protocol for wireless sensor networks," Computer Networks., Elsevier journal
[3]. KoushikSinha, Bhabani P. Sinha, and DebasishDatta," An Energy-Efficient Communication Scheme forWireless Networks:A Redundant Radix-Based Approach", IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 10, NO. 2, FEBRUARY 2011
[4]. EyuphanBulut, Ibrahim Korpeoglu," Sleep scheduling with expected common coverage in wirelesssensor networks", Wireless Networks, Springer, July 2010
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Name Entity Detection and Relation Extraction from Unstructured Data by N-gram Features on Hidden Markov Model and Kernel Approach |
Country | : | India |
Authors | : | Naincy Priya || Amanpreet Kaur |
Abstract: In recent years Name entity extraction and linking have received much attention. However, correct classification of entities and proper linking among these entities is a major challenge for researcher. We propose an approach for entities and their relation extraction with feature including lexicon, n-gram and parts of speech clustering and then apply hidden markov model for entity extraction and CRF with kernel approach to detect relationship among these entities.
[1]. Daljit Kaur and Ashish Verma, Name Entity Recognition by New Framework using Machine learning Algorithm, IOSR Journal of Computer Engineering, Volume 16, Issue 5, Ver. IV, September-October 2014.
[2]. Navneet Kaur AulaKh and Er.Yadwinder kaur , Review Paper on Name Entity Recognition of Machine Translation, International journal of advanced Research in computer science and software engineering, Volume 4, Issue 4, April 2014.
[3]. Roman Prokofyev, Gianluca Demartini, and Phillipe Curde Mauroux Effective Named Entity Recognition for Idiosyncratic Web Collections, International World Wide Web Conference Committee, April 7–11, 2014.
[4]. Abhishek Gattani, Digvijay S. Lamba, Nikesh Garera, Mitul Tiwari, Xiaoyong Chai, Sanjib Das, Sri Subramaniam, Anand Rajaraman, Venky Harinarayan, AnHai Doan, Entity Extraction, Linking, Classification, and Tagging for Social Media: A Wikipedia-Based Approach, International Conference on Very Large Data Bases, Vol. 6, No. 11, 26th- 30th August, 2013.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Use of Non Monetary Incentives to Improve Service Delivery in Public Institutions In Tharaka Nithi County |
Country | : | Kenya |
Authors | : | Lucy Kagwiria Mwirigi || Florence Karambu Angaine |
Abstract: Service delivery is of critical importance for the organisations which are offering services as their core product. It is what the clients pay for and determines their retention as well as growth and profitability of the organization. For public institutions, the quality of the service offered by them has not been of very keen interest due to the monopolistic nature of the services they offer and lack of incentives. Thus this study focused on use of non monetary incentives to improve service delivery in public institutions. The study will be useful to the public institution as well as other private and non-governmental institution in enhancing quality services. Descriptive research design was used.
[1]. Musungu, L. L. & Nasongo, J. W. (2008). The head-teacher‟s instructional role in academic achievement in secondary schools in Vihiga district, Kenya. Department of Educational Planning and Management, Kenya and Department of Educational Foundations, Masinde Muliro University of Science and Technology, Kenya
[2]. Allen and Cale (2013); "Financial Stability Analysis Using Aggregated Data". Bis.org
[3]. Deshields W. Oscar , Kara Ali and Kaynak Erdener (2005) Determinants of business student satisfaction and retention in higher education: applying Herzberg's two‐factor theory [4]. Pollitt K., Allonisius G.A & Eliud H. (2004). Public Management Reform: A Comparative Analysis. Revised edition. Oxford: Oxford University Press.
[5]. Wendy P. & Mary M. (2006) Career Development and Systems Theory: Connecting Theory and Practice ,Sense Publishers
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A New Approach and Algorithm for Baseline Detection of Arabic Handwriting |
Country | : | Saudi Arabia |
Authors | : | Abdullah Baz || Mohammed Baz |
Abstract: Automatic baseline detection of handwritten Arabic words is a crucial task for OCR. It is extensively used in many preprocessing processes such as text normalization, skew/slant correction, and letters segmentation. Due to its importance, many techniques and algorithms were proposed in the literature to meet this need. However, most of the proposed methods cannot correctly detect the baseline of words that are skewed, short, have stacked-letters, and/or have unbalanced letters sizes.
[1] Märgner, V.; El Abed, H., Guide to OCR for Arabic Scripts (Springer London).
[2] Lorigo, L.M.; Govindaraju, V., Offline Arabic handwriting recognition: a survey, Pattern Analysis and Machine Intelligence, IEEE Transactions on, 28(5), 2006, 712-724.
[3] Pechwitz, M.; Margner, V., Baseline estimation for Arabic handwritten words, Frontiers in Handwriting Recognition, 2002. Proceedings. Eighth International Workshop, 2002, 479-484.
[4] Farooq, F.; Govindaraju, V.; Perrone, M., Pre-processing methods for handwritten Arabic documents, Document Analysis and Recognition, 2005. Proceedings. Eighth International Conference on, 1(29), 2005, 267-271.
[5] Al-Shatnawi, A.; Omar, K., Detecting Arabic handwritten word baseline using Voronoi Diagram, Electrical Engineering and Informatics, 2009. ICEEI '09. International Conference on, 2009, 18-22.
[6] Abu-Ain, T.; Sheikh Abdullah, S.; Bataineh, B.; Omar, K.; Abu-Ein, A. A Novel Baseline Detection Method of Handwritten Arabic-Script Documents Based on Sub-Words, Soft Computing Applications and Intelligent Systems, Communications in Computer and Information Science, 67-77.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Analysis of Iris Recognition Based On FAR and FRR Using Hough Transform |
Country | : | India |
Authors | : | Simranjit Kaur || Sourav Garg |
Abstract: Iris recognition is an identification method of biometric that uses pattern-recognition techniques. It is one of the most biometrical techniques used for personal identification. In this paper, we give a brief overview of different methods used in iris recognition system and use houghman transform and rubber sheet method for increasing accuracy by calculating metrics like FAR and FRR.
Keywords: Biometrics, Canny edge detection, FAR, FRR, Houghman Transform, Normalization Basic Rubber Sheet Model
[1]. Namrata P. Joshi, Roopal K. Lamba, Devang U. Shah, Bhargav V. Ghadia, Implementation of Various Approaches for Iris Image Normalization, Institute Of Technology, Nirma University, Ahmedabad –382 481,IEEE,08-10 dec, 2011
[2]. J. Daugman, "How iris recognition works‟, Proceedings of 2002 International Conference on Image Processing, Vol. 1, 2002.
[3]. Emmanvel Raj.M.Chirchi, Dr.R.D.Kharadkar, Improvement of Iris Pattern Authentication System using Cumulative Sum Algorithm, International Journal of Engineering and Innovative Technology, ISSN: 2277-3754, Vol 2, Issue 5, Nov 2012.
[4]. Anu Sharma Dr. Vijay Kumar Banga, Improving Performance Of An Iris Recognition System Using Correlation Based Matching, International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 2 Issue 4, April -2013.
[5]. Dolly Choudhary, Ajay Kumar Singh, Shamik Tiwari, A Statistical Approach for Iris Recognition Using K-NN Classifier, I.J. Image, Graphics and Signal Processing, 2013, 4, 46-52 Published Online April 2013 in MECS.
[6]. Alinka P. Takale, Vanaja Roselin. E.Chirchi, Iris Recognition: Cumsum Based CPA Approach, -International Journal of Advanced Computational Engineering and Networking, ISSN: 2320-2106, Volume- 1, Issue- 5, July-2013.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Fuzzy Logic based Individual Crop Advisory System based on Weather Input Data |
Country | : | India |
Authors | : | Swati P. Pawar || Sarika A Hajare || Prajakta A. Satarkar |
Abstract: Weather has the most significant influence on agriculture. Various weather phenomenon such as cloudiness, precipitation, temperature, and wind have significant influence on agri-management decisions, management practices and cost of cultivation. Therefore, there is need for development of crop specific advisory to an individiual farmers based on various crop parameters such as type of crop, age of crop, location of crop etc. However, existing advisories are region specific and gives vague advisory and also not available for specific location. This paper is focused on giving overview of development of fuzzy logic based to generate automatic advisory based on type of crop, location of crop and age of the crop.
[1]. V. Rao., G. Rao., A. Rao., & M.K. Rao., (2009) ―Synergizing agro meteorology for managing future agricultural in India‖ Journal of Agro meteorology 11 (Special Issue) : 11-17.
[2]. Rathore L., Parvinder M., (2008) ―Project Report on Economic Impact Assessment of Agrometerological advisory Service of NCMRWF‖ National Centre for Medium Range Weather Forecasting, Ministry of Earth Sciences, Government of India.
[3]. Anurag., Diwan Singh., and Surender singh., (2009) ―Application of Geographical Information System in agrometeorology‖ Journal of Agrometeorology 11, 208-216.
[4]. Surender Singh., Diwan Singh., and V Rao., (2009) ―Web based Agrometeorological information system for sustainable agricultural development‖, Journal of Agrometeorology 11, 234-237.
[5]. Weiss A., Van L., and Bernardi M., (2000) ―Communicating agrometeorological information to farming communities‖, Agricultural and Forest Meteorology 103, 185–196.
[6]. Sue Walker., ―Dissemination of Agrometeorological Information‖, University of the Free State, Bloemfontein, South Africa, 145-155.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Data Hiding Inside the Image Using Uniform Embedding Techniques |
Country | : | India |
Authors | : | J. S. Harini |
Abstract: The main aim of steganography is to hide data in the text media such as image, text, audio and video so that it cannot be identified by others. One of the advantages of steganography is that it can be used to transmit the secret messages without knowing the fact of transmission being discovered.
[1]. (Piyush Goel),Data Hiding in Digital Images: A Steganographic Paradigm
[2]. (Dr. Oleg Victorov), Enhancement of A Steganographic algorithm for Hiding Text Messages in Images
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An Improved Feature Vector storage metric for fast Android Malware Detection Framework |
Country | : | India |
Authors | : | Mohit Sharma || Meenu Chawla || Vinesh Jain || Jyoti Gajrani |
Abstract: Android based devices are rapidly flourishing day-by-day, due to its ease of use and popularity. As a result, the number of malware attacks on Android is also increasing. This paper is based on the Text Mining approach for analyzing Android malware families. The proposed methodology is motivated by the method introduced by Guillermo Suarez-Tangil which aims to automate malware analysis process based on DENDROID. The main issue in this regard is the storage of Family Feature Vectors (FFV) which is stored as sparse matrix. Therefore, this work presents a novel concept of Compressed Row Storage (CRS) to store the statistical features intellectually.
[1] "IDC", "Smartphone OS Market Share, Q1 2015", http://www.idc.com/prodserv/smartphone-os-market-share.jsp
[2] Khalid Alfalqi, Rubayyi Alghamdi and Mofareh Waqdan: Android Platform Malware Analysis, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 6, No. 1, 2015.
[3] Android Introduction: Platform Overview, Mihail L. Sichitiu, 2011 SECURITY RESPONSE: Mobile Adware and Malware Analysis: Symantec 2013.
[4] Guillermo Suarez-Tangil, Juan E. Tapiador, Pedro Peris-Lopez and Jorge BlascoAlis: Dendroid: A Text Mining Approach to Analyzing and Classifying Code Structures in Android Malware Families. Expert Systems with Applications, Elsevier, July 2013.
[5] androguard, Reverse engineering, Malware and goodware analysis of Android applications ... and more (ninja!), https://code.google.com/p/androguard/.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | PAPR Reduction in OFDM Model |
Country | : | India |
Authors | : | Er.Stephy Gupta || Er. Rajnish Kansal |
Abstract: Multipath reflects the signal with different phases. The best solution of multipath fading is OFDM.Orthogonal frequency division multiplexing (OFDM) has been focused on in high data rate wireless communication research. But the high peak to average power ratio (PAPR) is one of the main obstacles of OFDM. For better transmission, even single – carrier waves are being replaced by multi – carriers. Multi carrier systems like CDMA and OFDM. In the OFDM system, orthogonally placed sub – carriers are used to carry the data from the transmitter end to the receiver end. Presence of guard band in this system deals with the problem of ISI. . But the large Peak – to – Average Power Ratio of these signal have some undesirable effects on the system.
Keywords: OFDM, PAPR, CCDF, Multipath fading, BER.
[1]. M. Schwartz, "Mobile Wireless Communications" Cambridge University Press, 2005.
[2]. Tao Jiang and Yiyan Wu,"AnOverview: Peak to Average power Ratio Reduction Techniques for OFDM signals", IEEE Transactionon Broadcasting, Vol.54, no.2, 2008,pp.257-268.
[3]. S. H. Han, J. H. Lee, "An Overview of Peak – to – Average Power Ratio Reduction Techniques for Multicarrier Transmission", IEEE Transaction on Wireless Communication, April 2005.
[4]. D. Gerakoulis; P.Salmi. "An interference suppressing OFDM system for wireless communications," ICC 2002. IEEE International Conference onCommun. YoU, pp.480-484, 2010.
[5]. Cherif Rezgui, Slaheddine Jarboui –"A PAPR reduction technique based on Golay sequences and Fractional Fourier Transform for OFDM Systems", 2012 IEEE
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Study on A Hybrid Approach of Genetic Algorithm & Fuzzy To Improve Anomaly or Intrusion |
Country | : | India |
Authors | : | Er.Kamaldeep Kaur || Er. Simranjit Kaur Dhindsa |
Abstract: This paper describes a technique of applying Genetic Algorithm (GA) and fuzzy to network Intrusion Detection Systems (IDSs). A brief overview of a hybrid approach of genetic algorithm and fuzzy to improve anomaly or intrusion is presented. . This paper proposes genetic algorithm and fuzzy to generate that are able to detect anomalies and some specific intrusions. The goal of intrusion detection is to monitor network activities automatically, detect malicious attacks and to establish a proper architecture of the computer network security. Experimental results demonstrate that we can achieve better running time and accuracy with these modifications.
Keywords: anomaly, clustering, fuzzy algorithm, fuzzy set., genetic algorithm, intrusion detection.
[1]. Shingo Mabu, Member, IEEE, Ci Chen, Nannan Lu, Kaoru Shimada,and Kotaro Hirasawa, Member, IEEE, "An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming" in January 2011.
[2]. Monowar H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita , "Network Anomaly Detection: Methods, Systems and Tools" in 2014.
[3]. Z. Bankovi´c, D. Stepanovi´c, S. Bojani´c, and O. Nieto-Taladriz, "Improving network security using genetic algorithm approach," Comput. Elect.Eng., vol. 33, pp. 438–451, 2007.
[4]. A. Sundaram, "An introduction to intrusion detection," Crossroads,vol. 2, no. 4, pp. 3–7, April 1996.
[5]. V. Chandola, A. Banerjee, and V. Kumar, "Anomaly Detection : A Survey," ACM Computing Surveys, vol. 41, no. 3, pp. 15:1–15:58,September 2009.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Genetic Algorithm For Scheduling JobsWith Burst Time And Priorities |
Country | : | India |
Authors | : | Shuchi Juyal Bhadula || Bhanvi Rohilla || Bhaskar Nautiyal |
Abstract: Scheduling play extremely important role in our day-to-day life, same as the performance of system is highly affected by the CPU scheduling. For the better scheduling the performance is depend upon the parameter of jobs (arrival time, burst time, priority etc). In this paper we proposed a method for process scheduling using a deadline aware approximation algorithm (Genetic Algorithm) to provide efficient process scheduling, where required schedule is nearby or equal to SJF schedule. We made a comparison among PreemptivePriority algorithm, Preemptive SJF algorithm and GA in terms of number of test case and Total-Turnaround-Time (TAT). The results demonstrate that GA approach produces solutions very close to the optimal SJF algorithm and far better than Priority algorithm.
Keywords: CPU Scheduling, Optimization, Genetic Algorithm, Crossover.
[1]. D. E. Goldberg, Genetic Algorithms in Search. Optimization and Machine Learning, Addison Wesley, 1989.
[2]. J. H. Holland, Adaptation in Natural and Artificial Systems. Ann Arbor, MI: Univ. Michigan Press, 1975.
[3]. K. A. De Jong, ―Adaptive system design: A genetic approach,‖ IEEE Trans. Syst., Man, Cybern., vol. SMC-10, pp. 566–574, 1980.
[4]. Linet Ozdamar, ―A Genetic Algorithm Approach to a General Category Project Scheduling Problem‖ IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART C: APPLICATIONS AND REVIEWS, VOL. 29, NO. 1, FEBRUARY 1999.
[5]. Annie S. Wu, Han Yu, Shiyuan Jin, Kuo-Chi Lin, and Guy Schiavone, Member, IEEE, ―An Incremental Genetic Algorithm Approach to Multiprocessor Scheduling‖, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 15, NO. 9, SEPTEMBER 2004.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Integration of Search Interfaces in Deep Web Databases for Specific Domains |
Country | : | India |
Authors | : | Deepak Kumar || Dhanesh kumar || Dr. Mahesh Kumar |
Abstract: The amount of information on Deep Web is growing rapidly, as most of the organizations put their content online behind the search forms. The information behind the search forms is often of very high quality and can be extremely valuable to many users. Therefore there has been increased interest in retrieval of deep web data. The conventional crawlers retrieve only publicly indexable web ignoring the large amount of high quality information deep behind search forms hence there is a need to build a deep web crawler that can crawl to deep web. But the main challenge for a deep web crawler is to model a query interface and to generate meaningful queries for the search interfaces.
[1]. A. K. Sharma, Komal Kumar Bhatia: "Automated Discovery of Task Oriented Search Interfaces through Augmented Hypertext Documents" accepted at First International Conference on Web Engineering & Application (ICWA2006).
[2]. A.K.Sharma and Komal Kumar Bhatia, A Framework for Domain-Specific Interface Mapper (DSIM)
[3]. AnHai Doan:Learning to Map between Structured Representations of Data. PhD thesis, University of Washington..
[4]. Luciano Barbosa, Juliana Freire, "Combining Classifiers to Identify Online Databases", WWW2007/track
[5]. T. Mitchell. Machine Learning. McGraw Hill, 1997.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | New Dynamical Key Dependent S-Box based on chaotic maps |
Country | : | Iraq |
Authors | : | F. J. Luma || H. S. Hilal || A. Ekhlas |
Abstract: The strength and security of cryptographic algorithms is determined by substitution non-linear S-boxes, so the construction of cryptographically strong S-boxes is important in the design of secure cryptosystems. In In this paper, an efficient method for designing dynamical key dependent S-boxes based on 2D logistic map and 2D cross map. S-box is a nonlinear transformation where each byte of the State is replaced by another byte using the substitution table. Each individual byte of State is mapped into a new byte by using 2D cat map. One S-box is used for each message.
[1]. Jakimoski G, Kocarev L. ―Chaos and cryptography: block encryption ciphers‖. IEEE Trans Circ Syst—I 2001;48(2):163–9 boxes based on chaotic maps, Chaos Solitons Fractals, 23(2): 413-419.
[2]. Tang, G., X. Liao and Y. Chen, 2005. ―A novel method cryptography for designing S-boxes based on chaotic maps‖, Chaos 40(1): 505-519. Solitons Fractals, 23(2): 413-419.
[3]. Tang, G. and X. Liao, 2005. ―A method for dynamical S-boxes based on discretized chaotic map‖, Chaos Solitons Fractals, 23(5): 1901-1909.
[4]. Chen, G., Y. Chen and X. Liao, 2007. ―An extended method for obtaining S-boxes based on three- dimensional chaotic baker maps‖, Chaos Solitons Fractals, 31(3): 571-579.
[5]. Muhammad Asim et al. "Efficient and Simple Method for Designing Chaotic S-Boxes‖, ETRI Journal, Volume 30, Number 1, February 2008.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Study of Glass fiber Optimized Strengthened Polymeric Composite Material Using End Mill Taguchi Concept |
Country | : | India |
Authors | : | Manoj Kumar Nayak || Ashok Kumar Pradhan |
Abstract:Creation and assembling process manages discussion of crude materials contribution to completed
item according to required dimensional details and effectively utilizing late innovation T he metal cutting
fundamental pursue high metal expelling rate and best item quality the serious issue in accomplishing high
efficiency and best quality is short life expectancy of hardware To improve the apparatus life numerous new
material are grown so needs to fulfill the market need and serious cost for this there ought to be legitimate
authority over different cost engaged with machining na medications as material cost, work cost and toolin g
cost. The material expense can be constrained by utilizing extraordinary material which meets every single
required property with marked down cost. The current work is centered around the influenc e of cutting pace,
feed rate and profundity of.......
[1] Reddy Sreenivasulu Optimization of Surface Roughness and Delamination Damage of GFRP Composite Material in End Milling
using Taguchi Design Method and Artificial Neural Network,Reddy Sreenivasulu Procedia Engineering 64 ( 2013 ) 785 – 794
[2] B.V.Kavada*, A.B.Pandeya, M.V.Tadavia, H.C.Jakharia a A Review Paper on Effects of Drilling on Glass Fiber Reinforced
Plastic2nd International Conference on Innovations in Automation and Mechatronics Engineering, ICIAME 2014
[3] Procedia Technology 14 ( 2014 ) 457 – 464M.A. Amrana,b*, S. Salmaha, N.I.S. Husseina, R. Izamshahb, M. Hadzleyb,
Sivaraosb,M.S. Kasimb, M.A. Sulaimanb Procedia Technology 14 ( 2014 ) 457 – 464
[4] Harsh Y Valeraa*, Sanket N Bhavsara Experimental Investigation of Surface Roughness and Power Consumption in Turning
Operation of EN 31 Alloy Steel Procedia Technology 14 ( 2014 ) 528 – 534
[5] Surinder Kumar1*; Meenu Gupta2; P.S. Satsangi3 and H.K. Sardana4 Modeling and analysis for surface roughness and material
removal rate in machining of UD-GFRP using PCD tool International Journal of Engineering, Science and Technology Vol. 3, No.
8, 2011, pp. 248-270.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Comparative Study on Service Oriented Architecture using Frequent Data Item sets |
Country | : | India |
Authors | : | Durga Shankar Baggam || Bibhu Prasad Sahu |
Abstract:The Service Oriented Architecture (SOA) is an architectural model for building flexible, modular,
and interoperable software applications. The underlying concepts of SOA based on the concepts of software,
the object oriented programming, and some other models. The SOA model allows to merging of various of
distributed applications regardless of their implementation details, deployment location, and initial objective of
their development. The main objective of the SOA architecture is that reusability of software within different
applications and processes. Service oriented architecture is essentially based on various collection of services.
All the services must be defined to allow to utilize the context those are need for different purposes. Once
defined and deployed, services operate independently........
Keywords— Architecute ,frequent, Itemsets, Apriori, pattern.
[1] Mrs. C. Beulah Christalin Latha , Dr. (Mrs.) Sujni Paul , Dr.E.Kirubakaran , Mr. Sathianarayanan "A Service Oriented Architecture
for Weather Forecasting Using Data Mining", Int. J. of Advanced Networking and Applications,Volume: 02, Issue:02, Pages:608 -
613, 2010.
[2] Jayant Kayastha,N. R. Wankhade, "A Survey Paper on Frequent Itemset Mining Techniques", International Journal of Advanced
Research in Computer Science and Software Engineering, Volume 6, Issue 12, December 2016.
[3] Mohammed Sabri, Sidi Ahmed Rahal, "APESS - A Service-Oriented Data Mining Platform: Application for Medical Sciences", I.J.
Information Technology and Computer Science, 2016.
[4] Yasemin Atilgan and Firat Dogan, "Data Mining on Distributed Medical Databases: Recent Trends and Future Directions", IT
Revolutions 2008, LNICST 11, pp. 216–224, 2009. © ICST Institute for Computer Sciences, Social-Informatics and
Telecommunications Engineering 2009
[5] Sayyada Sara Banu, Mohammed Waseem Ashfaque, Dr.Perumal Uma, Quadri S.S Ali Ahmed, "Data mining techniques on Mobile
computing Management and Service Oriented Architecture of web Services" , International Journal of Electrical, Electronics an d
Computer Systems (IJEECS), ISSN (Online): 2347-2820, Volume -3, Issue-2 2015.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Convergence Research Journey from Service-Oriented Architecture to Cloud Computing |
Country | : | India |
Authors | : | Khitish Kumar Gadnayak || Ayeskanta Mohapatra |
Abstract:Cloud computing is one of the emerging technology which is used to deploring essential services
without getting the knowledge regarding the infrastructure behind it. It also provides flexibility to releases the
burden of maintaining an adequate environment and quality and focusing on the business competency. Service-
Oriented Architecture (SOA) is a technology that enables various functions of cloud computing. This paper
focuses the main features of SOA. The migration from SOA to cloud computing is discussed. This paper also
represents the main features and characteristics of cloud computing.
Keywords— SOA; cloud computing.
[1] LonnekeDikmans and Ronald van Luttikhuizen, "SOA made Simple", Packt Publishing, ISBN: 978-1- 849684-16-3, 2012.
[2] Guido Schmutz, Peter Welkenbach and Daniel Liebhart: "Service Oriented Architecture- An Integeration Blueprint", Packt
Publishing, ISBN: 978- 1-84968-104-9, 2010.
[3] Mike P. Papazoglou, "Service-oriented Computing- Concepts, Characteristics and Directions", Proceeding of the Fourth
International Conference on Web Information Systems Engineering of IEEE, 2003.
[4] Xiaolong Yang and Huiming Zhang, "Cloud Computing and SOA convergence Research", Fifth International Symposium on
Computational Intelligence and Design of IEEE 2012.
[5] Thomas Erl: "SOA- Principles of Service Design", Prentice Hall, ISBN-10: 0-13-234482-3, 2007..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Review of Flyback Micro Inverter for Integration of Fuel Cells with Single Phase Grid |
Country | : | India |
Authors | : | Namrata Mishra || Arvind Tripathy |
Abstract:Sustainable power source is going to assume a significant job later on vitality situation. All the
current topologies utilize number of middle of the road arranges before change of DC contribution to the AC
yield to the lattice side. For this sort of transformation, effectiveness is low and number of intensity parts are
likewise extremely high. In this paper, a minimal effort high effectiveness basic DC-AC flyback inverter is
proposed. The proposed converter comprises of a straightforward flyback converter followed by a basic full
extension inverter with inactive snubber in the essential. The methods of activity of the converter alongside the
plan of the converter with the snubber is talked about. Exploratory outcomes from reproductions are introduced
too.
Key words: Single Phase Grid, Micro Inverter, Fuel Cells
[1]. EPIA; Global market outlook for Photovoltaics, Report 2013-2017.
[2]. German Advisory Council on Global Change, WBGU Berlin; www.wbgu.de; Renewable Energy Policy Network for the 21st
Century, Renewables, Global Status Report 2006.
[3]. Kjaer S. B., Pedersen J. K. and Blaabjerg F., "A review of single-phase grid-connected inverters for photovoltaic modules," IEEE
Trans. on, Ind. Appl., vol. 41, pp. 1292-1306, 2005.
[4]. Li Q. and Wolfs P., "A Review of the Single Phase Photovoltaic Module Integrated Converter Topologies with Three Different DC
Link Configurations," IEEE Trans. on Power electron. vol. 23, pp. 1320-1333, May 2008.
[5]. Calais M., Myrzik J., Spooner T. and Agelidis V. G., "Inverters for single-phase grid connected photovoltaic systems-an
overview,"in proc. IEEE PESC, 2002, pp. 1995-2000.