July - 2013 (Volume-3 ~ Issue-7 ~ Part-5)

Paper Type

::

Review Paper

Title

::

Efficient Storage of Large Scale Data in Cloud Computing

Country

::

India

Authors

::

B. Vamshi Krishna || D. Raman

Page No.

::

01-10

::
10.9790/3021-03750110
aned   0.4/3021-03750110 aned
iosrjen   3021-0307-0510 iosrjen

Keeping critical data safe and accessible from several locations has become a global preoccupation, either being this data personal, organizational or from applications. As a consequence of this issue, we verify the emergence of on-line storage services. In addition, there is the new paradigm of Cloud Computing, which brings new ideas to build services that allow users to store their data and run their applications in the Cloud. By doing a smart and efficient management of these services's storage, it is possible to improve the quality of service ordered, as well as to optimize the usage of the infrastructure where the services run. This management is even more critical and complex when the infrastructure is composed by thousand of nodes running several virtual machines and sharing the same storage. The elimination of redundant data at these services's storage can be used to simplify and enhance this management. This review study presents a solution to detect and eliminate duplicated data between virtual machines that run on the same physical host and write their virtual disks data to a shared storage. Finally, a study that compares the efficiency of two different approaches used to eliminate redundant data in a personal data set is described.

 

Keyword: - Cloud Computing; Data Redundancy; Virtual machines.

[1]. M. Armbrust, A. Fox, R. Grifith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. Above the clouds: A Berkeley view of cloud computing.Technical report, University of California at Berkeley, 2009.
[2]. P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xian and the art of virtualization. In SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles, pages 164-177. ACM, 2003.
[3]. M. Brantner, D. Florescu, D. Graf, D. Kossmann, and T. Kraska. Building a database on s3. In SIGMOD '08: Pro-ceedings of the 2008 ACM SIGMOD international conference on Management of data, pages 251_264. ACM, 2008.
[4]. A. Z. Broder. Some applications of Rabin's fingerprinting method. In Sequences II: Methods in Communications, Secu- rity, and Computer Science, pages 143_152. Springer-Verlag, 1993.

[5]. R. Buyya, C. S. Yeo, and S. Venugopal. Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities. In HPCC '08: Proceedings of the 2008 10th IEEE International Conference on High Performance Computing and Communications, pages 5_13. IEEE Computer Society, 2008.

 

Paper Type

::

Research Paper

Title

::

Detection of Abnormal Attributes Based on Corelation Markov Detection Method For Forensic Web

Country

::

India

Authors

::

Sujeet Singh ||, Jitendra Jatav ||, Gourav Shrivastava.

Page No.

::

11-15

::
10.9790/3021-03751115
aned   0.4/3021-03751115 aned
iosrjen   3021-0307-0515 iosrjen

Crime investigation in the web environment is a tedious job. Event logging and event logs play an important role in modern IT systems criminal investigation which is generated when end user with each other in web environment and stored in various logs like firewall log file at side ,network log file at gateway and web log file at server side. But log file is not to be over emphasized as a source of information in systems and network management. Whereas conduct efficient investigation and gathering of use full information need to correlate different log file. Task of analyzing event log files with the ever-increasing size and complexity of today's event logs has become cumbrous to carry out manually. Nowadays latest spotlighted is automatic analysis of these logs files. In this paper a novel methodologies based on relational algebra to build the chain of evidence and used to preprocess the real generated data from logs and classify the user based on markov model.

 

Keywords: - cyber forensic; log file correlation; markov chain ,cyber crime;

[1]. Risto Vaarandi "Tools and Techniques for Event Log Analysis", Faculty of Information Technology, Department of Computer Engineering, Chair of System Programming, Tallinn University of technology,2005
[2]. Muhammad Kamran Ahmed, Mukhtar Hussain and Asad Raza "An Automated User Transparent Approach to log Web URLs for Forensic Analysis" Fifth International Conference on IT Security Incident Management and IT Forensics 2009.
[3]. Raymond Kosala, Hendrik Blockeel, Web Mining Research: A Survey,ACM SIGKDD Explorations Newsletter, June 2000, Volume 2 Issue 1.
[4]. L. Baum et. al. A maximization technique occuring in the statistical analysis of probablistic functions of markov chains. Annals of Mathematical Statistics, 41:164–171, 1970.
[5]. Katherine A.Heller,YEE Whye The And Dilan , "Infinite Hierarchical Hidden Markov Models" in Proceedding Of the12th International conference on AISTATS,2009

 

Paper Type

::

Research Paper

Title

::

Optimal DG Allocation and Sizing for Mitigating Voltage Sag in Distribution Systems Using Particle Swarm Optimization

Country

::

India

Authors

::

Sneha patel ||, A.K. Sharma ||, PG Scholer,

Page No.

::

16-23

::
10.9790/3021-03751623
aned   0.4/3021-03751623 aned
iosrjen   3021-0307-0523 iosrjen

The necessity for clean electric power without any power quality problems has persuaded distribution companies to overcome these issues. Sag/swell, flicker and harmonics are these ones. Among them, voltage sag is one of the most important problems. This phenomenon imposes a bad effect on domestic and industrial loads, especially on sensitive ones. An alternative is use of distributed generation (DG) because of its positive impacts such as voltage support, improved reliability, small size and losses reduction, together with improving voltage sag. An approach is proposed based on Particle Swarm Optimization (PSO), capable to establish the optimal DG allocation and sizing on a distribution network. The objective function is the summation of cost of injecting energy of DGs, fixed installation cost of DGs and number of percentage of buses Experiencing voltage sag in a vulnerable zone that multi plied by number of faults for every kind of faults. The results show that the appropriate placement of DG results in improvement of the aforementioned indices.

 

Keywords: - Distribution Networks, PSO Algorithm, Voltage Sag, Optimal DG Placement and Sizing

[1]. Lalitha M. Padma, Reddy V. C. Veera,Usha V., Reddy N. Sivarami, Application Of Fuzzy and PSO for DG Placement for Minimum Loss in Radial Distribution System, ARPN Journal of Engineering and Applied Sciences 2010, Vol. 5, No. 4, pp. 30-37
[2]. Walid El-Khattam, Hegazy Y. G.,Salama M. M. A., Investigating Distributed Generation Systems Performance Using Monte Carlo Simulation, IEEE Transactions On Power Systems 2006, Vol. 21, No. 2, pp. 524-532.
[3]. Mithulananthan N., Oo Than, Phu Le Van, Distributed Generation Placement in Power Distribution System Using Genetic Algorithm to Reduce Losses, Thammasat Int. Journal of Science and Technology, Vol.9, No. 3, pp. 55-62.
[4]. Hajizadeh Amin, Hajizadeh Ehsan, PSOBased Planning of Distribution Systems with Distributed Generations, International Journal of Electrical, Computer, and Systems Engineering, 2008, pp. 33-38.

[5]. Shayeghi H., Bagheri A., Considering DG in Expansion Planning of Subtransmission System, International Conference on Advanced Science, Engineering and Information Technology 2011, pp. 357-362.

 

Paper Type

::

Research Paper

Title

::

Text Summarization Using Demographic Algorithm with Clustering Method

Country

::

India

Authors

::

Priyanka katlana ||, Shweta Pandey

Page No.

::

32-37

::
10.9790/3021-03753237
aned   0.4/3021-03753237 aned
iosrjen   3021-0307-0537 iosrjen

Text summarization is a data mining process of extracting the summary or zest from one or more documents. A summary is nothing but the actual theme of the document or set of documents. Most commonly document summery is considered to be the sentences or words from set of documents or a single document that appear more number of times in the document with corresponding to the other words. But a report on solar power may emphasis on several aspects of solar energy and may not actually have the term solar power repeated many a times. Therefore sophisticated algorithms are needed to extract the summary from the documents. There have been several algorithms on Text and Document summarizations, utilization various aspects of similarity measures, clustering, lexical rules and distance measures. It is understood from the literature that no single technique can give best interpretation or desired result in the summarization process. Therefore in this work we propose a summarization technique with document clustering and to improve its efficiency we will include demographic algorithm in this technique.

 

Keywords: - Demographic Algorithm, Condorcet, Sentence clustering, Similarity Measures, summarization, content-based searching, Entropy etc.

[1] M. Balabanovic and Y. Shoham. Fab: Content-based, collaborative recommendation. Communications of the ACM, 40, 1997
[2] M.J. Pazzani. A framework for collaborative, content-based and demographic filtering. Artificial Intelligence Review, 13:393{408, 1999.
[3] Paul Resnick, Neophytos Iacovou, Mitesh Sushak, Peter Bergstrom, and John Riedl. Grouplens: An open rchitecture for collaborative ¯ltering of netnews. In ACM 1994 conference on Computer Supported Cooperative Work, pages 175{ 186, New York, NY, 1994.
[4] S. Brin and L. Page. "The anatomy of a large-scale hyper textual Web search engine".
[5] Computer Networks and ISDN System. 30(1–7): 107–117. 1998.

 

Paper Type

::

Research Paper

Title

::

Comparative Analysis of Multipulse AC-DC Converter Using Zig-Zag Transformer

Country

::

India

Authors

::

Ms.Shruti Gour ||, Mr .Saurabh Gupta

Page No.

::

38-42

::
10.9790/3021-03753842
aned   0.4/3021-03753842 aned
iosrjen   3021-0307-0542 iosrjen

This paper presents a novel configuration of separate zigzag transformers based 18-pulse AC –DC converter for improving the ripple factor & isolation of three phase uncontrolled rectifier, this approach eliminates the complexity required to design a complicated auto transformers or isolated multi winding transformer as used with other systems. The paper also presents the comparison among 12 pulse and 6 pulse AC - DC converter for different parameters like ripple factor, harmonic distortion in input current for unbalanced supply voltage, efficiency of the converters, power factor variations of input power supply all these parameters are compared for no load light loads & full load conditions we further extend our simulation for measuring the effects of different type of filters like L, C & LC the simulation results shows some useful & interesting results which can be used for developing or selecting the best configuration for practical developers.

 

Keywords: - 18-Pulse ac–dc converter, zigzag transformer, three phase rectifier.

[1] P.Vas, Sensorless vector and direct torque control, Oxford University Press, 1998.
[2] IEEE Guide for harmonic control and reactive compensation of Static Power Converters, IEEE Std. 519-1992.
[3] D. A. Paice, Power Electronic Converter Harmonics: Multipulse Methods for Clean Power, New York, IEEE Press, 1996.
[4] A. Uan-Zo-li,, F.Wang,D. Boroyevich, F. Lacaux andcA.Tardy,"Comparison of prospective topologies for aircraft autotransformer-rectifier units," Proc. IEEE, IECON'03, Nov.2003, Vol.2, pp.11211-1127.
[5] D.A. Paice, "Optimized 18-pulse type, AC-DC, or DC/AC, converter system", U.S. Patent No. 5,124,904, June 23, 1992.

 

Paper Type

::

Research Paper

Title

::

Traffic Light Control System for Emergency Vehicles Using Radio Frequency

Country

::

Malaysia

Authors

::

N. M. Z. Hashim ||, A. S. Jaafar ||, N. A. Ali ||, L. Salahuddin ||, N. R. Mohamad ||, M. A. Ibrahim

Page No.

::

43-52

::
10.9790/3021-03754352
aned   0.4/3021-03754352 aned
iosrjen   3021-0307-0552 iosrjen

Traffic congestion problem is a phenomena which contributed huge impact to the transportation system in country. This causes many problems especially when there are emergency cases at traffic light intersections which are always busy with many vehicles. A traffic light controller system is designed in order to solve these problems. This system was designed to be operated when it received signal from emergency vehicles based on radio frequency (RF) transmission and used the Programmable Integrated Circuit (PIC) 16F877A microcontroller to change the sequence back to the normal sequence before the emergency mode was triggered. This system will reduce accidents which often happen at the traffic light intersections because of other vehicle had to huddle for given a special route to emergency vehicle. As the result, this project successful analyzing and implementing the wireless communication; the radio frequency (RF) transmission in the traffic light control system for emergency vehicles. The prototype of this project is using the frequency of 434 MHz and function with the sequence mode of traffic light when emergency vehicles passing by an intersection and changing the sequence back to the normal sequence before the emergency mode was triggered. In future, this prototype system can be improved by controlling the real traffic situation, in fact improving present traffic light system technology.

 

Keywords: - PIC 16F877A, Radio Frequency (RF), Sequence Control, Traffic Light

[1] Levi L. Rose, "Emergency Traffic Control System with Security Transmission Coding", United States Patent, April 5th, 1997.
[2] Michael R. Smith, Paul J. Davidson and Henry L. Pfister, "Emergency Vehicle Warning and Traffic Control System", United States Patent, October 4th, 1998.
[3] Willbur L. Mitchell, "Traffic Light Control For Emergency Vehicles", United States Patent, April 17th, 1994.
[4] William E. Brill, "Emergency Vehicle Detection System", United States Patent, March 26th, 2002.
[5] Carl J. Obeck, "Traffic Signal Control For Emergency Vehicles", United States Patent, May 7th, 1998.

 

Paper Type

::

Research Paper

Title

::

The Process of Swatch Analysis for different Textile Fabric

Country

::

Bangladesh

Authors

::

Amit Saha ||, Anup Saha

Page No.

::

53-56

::
10.9790/3021-03755356
aned   0.4/3021-03755356 aned
iosrjen   3021-0307-0556 iosrjen

The Textile Sector has been modernized by different ways. Much more production facilities are increasing day by day to meet the present demand of textile goods. Worldwide use of textile has taken a new dimension. On this prospect textile buyers & producers are making sure of good quality of their products. The fabric swatch analysis is done the important role in this sector. All types of fabric can be analyzed by this way. Here, Swatch analysis has been used for defining woven & denim fabric. The difference between fabrics comes out by this way. Here shows how to identify fabric easily by different tasks with simple mathematical formula.

 

Keywords:- Swatch Analysis, Fabrication, Construction & Weave Plan.

[1] Rahman. Moshiur. "Fabric Manufacturing Technology Part-2", Books Fair Publications. 2010
[2] Rahman. Moshiur. "Fabric Manufacturing Technology Part-3", Books Fair Publications. 2011
[3] Website: http://en.wikipedia.org/wiki/Computer-aided_design (last modified on 11Jan 2013 at 07:15, Retrieved: 24 Jan 2013)
[4] Rahman. Moshiur. "Fabric Manufacturing Technology Part-4", Books Fair Publications. 2012