Volume 4, Number 13, Pages 375 - 460, July - September, 2016

Table of Contents

Previous | Next

About the Cover

The paper proposes a Virtual reality system for modeling and optimization of rapid prototyping process for an agricultural tractor component. The system aims to reduce the manufacturing risks of prototypes early in a product development cycle, and hence, reduces the number of costly design- build test cycles. It involves modeling and simulation of RP in a virtual system, which facilitates visualization and testing the effects of process parameters on the part quality of automobile prototypes. Modeling of RP is based on quantifying the measure of part quality, which includes accuracy, build time and efficiency with layer thickness. A mathematical model has been developed to estimate the build-time of the selective laser sintering (SLS) process of SLA 5000. The model incorporates various process parameters like layer thickness, bed temperatures and sinter factor. It has been integrated with the virtual simulation system to provide a testbed to optimize the process parameters for virtual fabrication of a modified R.S.Arm (Ref: Matta AK, Ranga Raju D, Suman KNS. Modeling and optimization of Rapid prototyping for an agricultural tractor component. Discovery Engineering, 2016, 4(13), 375-378).

ANALYSIS

Modeling and optimization of Rapid prototyping for an agricultural tractor component

Matta AK, Ranga Raju D, Suman KNS

The paper proposes a Virtual reality system for modeling and optimization of rapid prototyping process for an agricultural tractor component. The system aims to reduce the manufacturing risks of prototypes early in a product development cycle, and hence, reduces the number of costly design- build test cycles. It involves modeling and simulation of RP in a virtual system, which facilitates visualization and testing the effects of process parameters on the part quality of automobile prototypes. Modeling of RP is based on quantifying the measure of part quality, which includes accuracy, build time and efficiency with layer thickness. A mathematical model has been developed to estimate the build-time of the selective laser sintering (SLS) process of SLA 5000. The model incorporates various process parameters like layer thickness, bed temperatures and sinter factor. It has been integrated with the virtual simulation system to provide a test-bed to optimize the process parameters for virtual fabrication of a modified R.S.Arm.

Discovery Engineering, 2016, 4(13), 375-378

Full Text | PDF

ANALYSIS

A Quick Switch – Switching on/off from anywhere anytime

Shashank Kumar Singh, Supravat Mondal, Bijoy Kumar Mandal, Syed Zahir Hasan

The main part of automation is controlling of appliances and the main objective of Home automation is to provide a wireless communication link of home appliances to the remote user. This paper “Quick_Switch-Switching ON/OFF from anywhere anytime” is based on interface between the hardware device and the software integrated development environment (IDE). In this paper, we have used two software IDEs namely the Arduino IDE and the Processing IDE. Apart from that, we have used HTML coding to create our desired website. This website gets its actual data or instruction from PHP coding construct which is programmed as per our requirement. In the hardware section, we have used an Arduino microcontroller to which is an interfacing unit with the equipments to be controlled. The 5v DC Arduino is interfaced with the 220v AC equipments with the help of a relay circuit which performs the desired task of DC to AC conversion. The final working of the system is as the Toggle virtual switch in the webpage, when it is clicked ON, the 220v equipment gets to active and when it is clicked OFF, the 220v equipment becomes disabled.

Discovery Engineering, 2016, 4(13), 379-387

Full Text | PDF

ANALYSIS

A Survey on Travel Package Recommendations Using Cocktail Approach

Aarthi K, Meenakshi Devi P

The online travel information imposes increasing challenges for tourists who have to choose from a large number of available travel packages for satisfying their personalized needs. The Tourist Area Season Topic (TAST) model can represent travel packages and tourists by different topic distribution, where the topic extraction is conditioned on both the tourists and the intrinsic features such as locations and travel seasons of the landscapes. Based on this topic model representation, we propose a cocktail approach to generate the lists for personalized travel package recommendation. We extend the TAST model to the Tourist Relation Area Season Topic (TRAST) model for capturing the latent relationships among the tourist in each travel group.

Discovery Engineering, 2016, 4(13), 388-392

Full Text | PDF

ANALYSIS

Elegant back scratcher: for efficient repercuse deep-web interfaces with classifier

Sathya V, Selvarani N, Kavitha M

As deep web grows at a very fast lick, there has been increased interest in techniques that help efficiently locate deep-web interfaces. However, due to the large volume of web resources and the dynamic nature of deep web, achieving wide coverage and high efficiency is a challenging issue. We propose a three-stage fabric, namely Elegant backscratcher, for efficient repercuse deep web interfaces that combines pre-query and post-query approaches for classifying deep-web forms. In the first stage, Elegant backscratcher performs site-based searching for center pages with the help of search engines, avoiding visiting a large number of pages. To achieve more accurate results for a focused grovel, Elegant backscratcher ranks websites to prioritize highly relevant ones for a given topic. In the second stage, Elegant backscratcher achieves fast in-site searching by excavating most relevant links with an adaptive link-ranking. To eliminate bias on visiting some highly relevant links in hidden web directories, we design a link tree data structure to achieve wider coverage for a website. In the third stage, Elegant backscratcher combines pre-query and post-query approaches that classifies the deep-web forms. To achieve faster and accurate results in the form of classifier. Our experimental results on a set of representative domains show the agility and accuracy of our proposed backscratcher fabric, which efficiently retrieves deep-web interfaces from large-scale sites, achieves higher repercuse rates and accurate form of classifier than other backscratcher.

Discovery Engineering, 2016, 4(13), 393-399

Full Text | PDF

ANALYSIS

An Efficient Crypto Based Security Authentication System for Detecting Deduplication on Cloud Storage

Suriya L, Dhurga Devi M, Meenakshi Devi

Security and privacy are very important issues in cloud computing. In this previous scheme uses a key approach and does not support authentication. Deduplication is the process of matching records from several databases that refer to the same entities. various indexing techniques have been developed for Duplication and deduplication. They are aimed at reducing the number of record pairs to be compared in the matching process by removing obvious nonmatching pairs, while at the same time maintaining high matching quality.To propose a survey of variations indexing techniques. As more sensitive data is shared and stored by thirdparty sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data is that it can be selectively shared only at a coarse-grained level. We develop a new cryptosystem for fine-grained sharing of re-encrypted data that we call Key-Policy Attribute-Based Encryption (KP-ABE). In our cryptosystem, cipher texts are labeled with sets of attributes and private keys are associated with access Particle Swarm Optimization algorithm structures that control which cipher texts a user is able to decrypt. We demonstrate the applicability of our construction to sharing of audit-log information and broadcast reencryption with TPA. Our construction supports delegation of private keys which subsumes Hierarchical Identity-Based Re- Encryption (HIBR). These experiments highlight that one of the most important factors for efficient and accurate indexing for Deduplication and security is the proper definition of blocking keys.

Discovery Engineering, 2016, 4(13), 400-405

Full Text | PDF

PERSPECTIVE

Soft Computing in Data Mining: A Tool for Computational Web Intelligence (CWI)

Tawseef Ayoub Shaikh, Rashid Ali, Aadil Rashid

Data Mining discovers patterns and trends by extracting knowledge previously not known from large databases. Soft Computing techniques such as fuzzy logic, neural networks, genetic algorithms, rough sets, probabilistic reasoning, learning theory, chaos theory etc. aims to reveal the tolerance for imprecision and uncertainty for achieving tractability, robustness and low-cost solutions. Web has become the primary medium for information distribution. It has got uses in commercial, entertainment or educational purposes and thus its popularity resulted in heavy traffic in the Internet. Web Intelligence (WI) deals with the scientific exploration of the new territories of the Web. Being a new field of computer science, it combines artificial intelligence and advanced information technology in the context of the Web, and goes beyond each of them. Since most of the data on the web is unstructured, unlabelled, heterogeneous, distributed, uncertain and vague, so the Soft Computing techniques merged with Data mining becomes an ideal choice for mining this data. Data mining has a lot of scope in e- Applications. The key problem is how to find useful hidden patterns for better application. In this paper, we explore soft computing techniques used with data mining to achieve web intelligence.

Discovery Engineering, 2016, 4(13), 406-412

Full Text | PDF

ANALYSIS

An Energy based Secure Data Aggregation in Heterogeneous Wireless Sensor Networks

Anitha G, Senthil Prakash T, Prakadeswaran S

Heterogeneous WSNs grow in application area and are used more frequently; the need for security in them becomes predictable and very important. However, the intrinsic characteristics of WSNs invite constraints of sensor nodes, such as limited energy, processing capability, and storage capacity, etc. Consequently, many security protocols and techniques have been developed to meet this challenge. Data aggregation is an important method to reduce the energy consumption in Heterogeneous wireless sensor networks (HWSNs). However, in aggressive environments, the aggregated data can be subject to several types of attacks, and provide security is necessary in HWSN. The proposed system focus cluster based routing the cluster heads can exactly aggregate the cipher texts without decryption; thus, transmission overhead and energy also reduced. As Heterogeneous wireless sensor networks are usually deployed in remote and hostile environments to transmit sensitive information, sensor nodes are prone to node compromise attacks and security issues such as data confidentiality and integrity are extremely important. Hence, wireless sensor network protocols, e.g., data aggregation protocol, must be designed with security in mind. This paper investigates the association between security and data aggregation process in Heterogeneous wireless sensor networks.. This paper proposes a Secure and energy balanced data aggregation based on Elliptic Curve Cryptography (SecE-LEACH). The design of ECC is based on the principles of privacy homomorphic encryption (HE). The Data aggregation in cluster based heterogeneous wireless sensor networks based on tree disjoint method is first adopted to divide the tree into subtrees of similar sizes, and a HE based aggregation is performed in each sub tree node to generate an aggregated sub tree node result. Then the sub node sends the aggregated data to base station (BS) by comparing the aggregated count value. Finally cluster approach to solve the energy balance of each sun tree nodes. Extensive analysis and simulations result show that cluster based ECC can achieve the highest security level on the aggregated result with appropriate energy consumption compared with other EC-ElGamal schemes.

Discovery Engineering, 2016, 4(13), 413-420

Full Text | PDF

REVIEW

Cluster Head Selection algorithms in MANET – A Review

Sathish S, Saranya M

Mobile Ad hoc NETwork (MANET) is a collection of mobile nodes that are arbitrarily located so that the interconnections between nodes are dynamically changing. In MANET mobile nodes forms a temporary network without the use of any existing network infrastructure or centralized administration. A routing protocol is used to find routes between mobile nodes to facilitate communication within the network. The main goal of such an ad hoc network routing protocol is to establish correct and efficient route between a pair of mobile nodes so that messages delivered within the active route timeout interval. Route should be discovered and maintained with a minimum of overhead and bandwidth consumption. Cluster-based control structures provides more efficient use of resources for large dynamic networks. In order to build the hierarchical structure the clustering concepts is used in Mobile ad hoc network. In this paper, we study and analyze some of the existing clustering schemes and classify the algorithm such as Identifier Neighbor based clustering, Topology based clustering, Mobility based clustering, Energy based clustering, and Weight based clustering, area based clustering, and Artificial Intelligence Based Clustering. This classification helps to better understand of MANET clustering algorithms in effective way.

Discovery Engineering, 2016, 4(13), 421-427

Full Text | PDF

REVIEW

A Review on Thin Film Deposition Techniques

Lekshmi Vijayan, Shreekrishna Kumar K

Over the past thirty years, research into the applications of thin film technology has intensified rapidly. The history of thin films probably started about three centuries ago, with the observation of the fascinating colures of thin films of oil floating on the surface of water. Thin film science and technology play a crucial role in the high-tech industries. Any coating less than 1μm can be called as a thin film. Films having thickness more than these are commonly called thick films. In recent years, thin film science has grown in to a major research area. Although the study of thin film phenomenon dates back well over a century, it is only over the last few decades that they have been used to a significant level in practical applications. The major exploitation is still in the field of microelectronics. Thin film technologies are being developed as a mean to substantially reduce the cost of electronic systems. During the last many decades the methods of forming thin films materials have increased significantly. In general, thin films are deposited by physical vapour deposition (PVD) and chemical vapour deposition (CVD).

Discovery Engineering, 2016, 4(13), 428-432

Full Text | PDF

ANALYSIS

Design and analysis of circular microstrip patch antenna by artificial learning methods

Nagarajan P, Sujatha C

This paper described the design of circular Microstrip patch antenna by using artificial learning methods. The circular microstrip patch antenna having gain at 5.85GHz frequency which has application in wireless communication. Microstrip antennas are mainly designed for GPS, Radio frequency identifications (RFID) is a rapidly developing technology for automatic target identifications. The objective of this paper is to design circular microstrip patch antenna by using artificial neural network algorithms like Feed Forward Back Propagation Algorithm (FFBPN), Resilient Back-propagation (RPROP), Levenberg -Marquardt (LM) and Radial Basis functions (RBF) for obtain the resonant frequency of circular microstrip antenna. The model of ANN algorithm was developed and implemented in MATLAB, which determine the parameters contains dielectric constant, substrate thickness, width, length and radius of the patch are given to obtain optimized resonant frequency. In these desire resonant frequency circular microstrip antenna is designed by using HFSS.

Discovery Engineering, 2016, 4(13), 433-439

Full Text | PDF

PERSPECTIVE

Enhancing the Performance of Cloud Computing through Virtualization

Ab Rashid Dar, Ramya M, Ravindran D

Initially the concept of internet was to carry a small experiment in mid-1970s where people can send small messages to each other. But gradually this idea transitioned into what is known today as World Wide Web. This leads to the evolution of personal computers. Now users were sending different multimedia like voice, video, photos, text messages etc. over internet. In 1990’s the emergence of Cloud computing came into the real existence with the availability of Digital Subscribers Line, because DSL provides the very fast internet speed because of high bandwidth. Cloud computing at present times is talked too much and is becoming popular due to its versatile nature and becomes a buzz word. It is a type of computing based on the internet where people access, interact with their vital data and store it over cloud. It can provide the services to even large and small scale industries. The on demand nature of cloud makes it as a unique which allows the clients to use the services according to their needs. In this paper, the focus is being given how the Virtualization is enhancing the Cloud Computing environment. Mostly virtualization technique is implemented in the IaaS delivery model as compared to two other delivery models like SaaS and Paas.

Discovery Engineering, 2016, 4(13), 440-445

Full Text | PDF

ANALYSIS

Elastic Buffer for Virtual Channels in Heterogeneous Switching NOC

Gowthaman TV, Mugilan D

The Network on Chip is the recent pattern, adopted in all types of systems on chip (SoCs) for reducing the complexity of system integration at the IP assembly level and from logical design to physical verification stage. On-chip network also enhances the system performance by partitioning the system cores and parallelizing the process. NOC provides the best solution to the wire delays and hence low latency period and high throughput has been achieved. The architecture of the router buffer is a critical design feature that affects both performance and implementation. Buffer architectures to support multiple Virtual Channels called Elastistore, which minimize the requirements of buffering without waiving the performance. A Virtual channel is the time multiplexed physical channel have different traffic flits, provided that separate buffer space for each flits. Elastistore having only single register per VC, round trip time appeared in NoC link is achieved by a large sized shared buffer. Elastistore integrated NoC gives efficient design at low cost along with similar performance. Area and delay of the router architecture were reduced considerably along with better network performance.

Discovery Engineering, 2016, 4(13), 446-449

Full Text | PDF

ANALYSIS

Secure Image Sharing On Social Website

Aashika N, Jenifer R, Sujitha S

Now-a-days Sharing photos through social networks have become increasingly popular as well. The dramatic growth of the media, privacy concerns from a user’s view have degraded because of easier information retrieval and communication among other features. Uploading should be effortless for single and entire collections of images. To improve the security of information shared in the social media sites, We propose an Adaptive Privacy Policy Prediction (A3P) system, Which is used to help users to mine the user details, policies and details of their images. We examine the role of social context, image content, metadata and Specific data as possible indicators of users’ privacy preferences. To provide security to the user image by hiding image from the unauthorized user. No one can view the image without the knowledge of the owner. Images are stored based on three key terms. Which are content based, metadata based and specific based. Generate random id for each user and each image, which is used for maintaining the site. The hidden image can be viewed by the person whose key request was accepted. With the secret key, the person can view his friend’s private image.

Discovery Engineering, 2016, 4(13), 450-456

Full Text | PDF

ANALYSIS

Drying the moisture grains in intelligence warehouse

Ramya SP, Krishnaveni B

The aim of this paper is to safeguard the harvested grains from being spoiled by insects, microbial attack, air and water which decrease the quality as well as quantity of threshed (harvested) grains. Storage is one of the biggest problems in an agricultural country like India where million tones of harvested grains is lost by different factors headed above. This warehouse consists of an automatic roof which is made up of panel of solar cells which has sensors for rain, sunlight and wind (for preventing it from dust and different unwanted particles which causes alteration in the quality of grains). This roof has sliding doors to allow sunlight and process the drying of stored grains.This paper is designed with fire sensor and gas sensor which activates on the occurrence of fire which leads to a great amount of loss. Farmers have wide range of diversity to select suitable paddy crops. However, the cultivation of the paddy crop for optimum yield and quality produce is highly technical. The purpose of the automatic door set up is to protect the grains and dry them in direct sunlight naturally. The pneumatic cylinder and solenoid valve system powered by solar energy acts as the control system. During the day time it senses the sun light and opens the door automatically and allows the sun light into the grains. At the same time it senses the dark at the night time and closes the door automatically.

Discovery Engineering, 2016, 4(13), 457-460

Full Text | PDF