July - 2013 (Volume-3 ~ Issue-7 ~ Part-3)

Paper Type

::

Research Paper

Title

::

Software Bug Classification and Assignment

Country

::

India

Authors

::

Mradul Singh ||, Sandeep K.

Page No.

::

01-03

::
10.9790/3021-03730103
aned   0.4/3021-03730103 aned
iosrjen   3021-0307-0303 iosrjen

As software development has become a crucial part of any organization, so as to minimize the risk of faults in software, user have to file these bug information repositories. User reports bugs to repositories. Users of these repositories are usually non-technical and cannot assign correct class to these bugs. Triaging of bugs, to developer, to fix them is a tedious and time consuming task. Developers are usually expert in particular areas. For example, few developers are expert in GUI and others are in java functionality. Assigning a particular bug to relevant developer could save time and would help to maintain the interest level of developers by assigning bugs according to their interest. However, assigning right bug to right developer is quite difficult for tri-ager without knowing the actual class, the bug belongs to.

 

Keywords: - classifications, software repositories, software projects, triaging

[1] A. Hotho, A. Nürnberger and G. Paaß, "A Brief Survey of Text Mining," vol. 20, GLDV Journal for Computational Linguistics and Language Technology.
[2] A. E. Hassan, "The Road Ahead for Mining Software Repositories,"
[3] S. Diehl, H. C. Gall and A. E. Hassan, "Special issue on mining software repositories," in Empirical Software Engineering An International Journal © Springer Science+Business Media, 2009.
[4] O. B. Michael and G. C. Robin, "A Bug You Like: A Framework for Automated Assignment of Bugs.," IEEE 17th international conference, 2009.
[5] C. Zhang, H. Joshi, S. Ramaswamy and C. Bayrak, "A Dynamic Approach to Software Bug Estimation," in SpringerLink, 2008.

 

Paper Type

::

Research Paper

Title

::

Laboratory Scale Experiments for Biogas Production using Gas Chromatography Analysis

Country

::

India

Authors

::

Subbarao Chamarthi ||, Purnanand V Bhale ||, N.Srinivasa Reddy ||, Ch Chandra Mouli

Page No.

::

04-07

::
10.9790/3021-03730407
aned   0.4/3021-03730407 aned
iosrjen   3021-0307-0307 iosrjen

A 2 m3 floating dome anaerobic digester has been developed and its performance is compared with that of conventional mild steel dome biogas digester The overall objective of carrying the work is anlalyze the efficiency of biogas production for better performance of the digester tank and to optimize the biogas generation under normal operating conditions. The lab scale experiments are carried out in both the digesters in order to determine the composition of biogas and their efficiency. The gas samples which are collected through gas balloons from the biogas plant are taken to the laboratory for determination of composition of biogas by using gas chromatography. The results reviewed that methane composition is increased from 63.40% to 64.22% which holds good as of performance is considered .The greater methane yields results in better performance of the plant and proves to be more effective when compared to that of mild steel dome digester.

 

Keywords: Anaerobic digester, transparent fibre dome, mild steel dome.methane yield.

[1] Mayank Aggarwal and Vijit Gupta, "Biogas as Future Prospect for Energy Dependency and Rural Prosperity in India: Statistical Analysis and Economic Impact" IEEE Systems and Information Engineering Design Symposium, SIEDS ' pp: 45 - 48, 2009.
[2] Karve .A.D. (2007), Compact biogas plant, a low cost digester for biogas from waste Starch. http://www.arti-india.org.
[3] Hilkiah Igoni, M. F. N. Abowei, M. J. Ayotamuno and C. L. Eze (2008), Effect of Total Solids Concentration of Municipal Solid Waste on the Biogas Produced in an Anaerobic Continuous Digester.
[4] Kumar, S., Gaikwad, S.A., Shekdar, A.K., Kshirsagar, P.K., Singh, R.N. (2004). Estimation method for national methane emission from solid waste landfills. Atmospheric Environment. 38: 3481–3487.
[5] Shalini sing, sushil kumar, M.C. Jain, Dinesh kumar (2000), the increased biogas production using microbial stimulants.

 

Paper Type

::

Research Paper

Title

::

CAE Simulator as a Tool for Mechanical and Temperature Analysis in Common Glasses

Country

::

Brazil

Authors

::

Cristiano Correa Ferreira ||, Everton de Almeida Lucas

Page No.

::

08-14

::
10.9790/3021-03730814
aned   0.4/3021-03730814 aned
iosrjen   3021-0307-0314 iosrjen

This study aimed to analyze the behavior of glass material to mechanical tests in CAE platform of Add-in toolbar of Simulation of Solidworks software. The method used was based on an evaluation of the behavior of glass of different thicknesses and sizes to static testing simulation using the Finite Element Method (FEM). The experiments considered the tension, deformation, and reaction force under the influence of applied loads, as well as the analysis of thermal stress due to different temperatures in glass sheets. Results from analysis presented in the simulator have shown that it is possible to test the mechanical behavior of glass.

 

Keywords: - Glass, mechanical tests, simulation, solidworks, temperature

[1] A. T. Nitsche, M. J. V. dos Santos e E. R. Filho, Um método de transferência de tecnologia baseado no processo de desenvolvimento de produtos, XXIV Encontro Nacional de Engenharia de Produção, Florianópolis (Brasil), 2004, 2823-2830.
[2] T. M. Kiam e N. C. Pereira, Estudo de caso de peça moldada pelo processo de injeção- compressão para termoplásticos utilizando análise computacional. Polímeros: Ciência e Tecnologia, 17 (1), 2007, 16-22.
[3] M. Tufoi, I. Vela, C. Marta, L. Suciu, I. A. Tuta and C. Mituleto, Comparative study of contact stresses and strains at horizontal and vertical continuous casting using conventional and innovative methods of withdrawing profiles, Wseas transactions on applied and Theoretical Mechanics, 5(4), 2010, 252-261.
[4] F. R. Dos Santos, S. C. Ferreira, J. Piaia, Computer aided engineering - CAE, (Universidade do Estado de Santa Catarina, 2004).
[5] Z. Z. Ismail and E. A. Al- Hashmi, Recycling of wast glass a partial replacement for fine aggregate in concrete, Wast Management, 29(2), 2009, 665-669.

 

Paper Type

::

Research Paper

Title

::

A Framework for Authentication in Vehicular Ad-hoc Network using Identity based approach

Country

::

India

Authors

::

R.Nasreen Salma ||, N.Alangudi Balaji ||, Dr.R.Sukumar

Page No.

::

15-19

::
10.9790/3021-03731519
aned   0.4/3021-03731519 aned
iosrjen   3021-0307-0319 iosrjen

In Vehicular Ad-hoc Network (VANETs), security is a primary concern, as it affects traffic safety. Authentication in essence is an important security requirement to avoid attacks on vehicular communication. To provide authentication with some privacy to the users, we propose an authentication framework that uses pseudonyms, which are self-generated are used as key value in communication among vehicles. ID-Based Signature (IBS) Scheme and the ID-Based Online / Offline Signature (IBOOS) Schemes are used, which provides authentication for the basic three types of communication in VANET, namely the vehicle to vehicle (V2V) communication, Vehicle to Roadside (V2R) communication. and Roadside unit to Vehicle (R2V) communication. Simulation result demonstrate that the use of IBS/IBOOS has improved reduced packet delivery ratio and decreased storage latency and hence this approach proves to be very suitable for VANET architecture.

 

Keywords: – Vehicular Ad-hoc Network, Identity Based Signature, Identity Based Online/Offline Signature.

[1] J. P. Hubaux, S.C. Apkun, and J.Luo," The Security and Privacy of Smart Vehicles", IEEE Journal on Security and Privacy, Vol. 2, Issue 3, pp.49 -55, 2004.
[2] M. Raya and J. Pierre, " Securing vehicular ad hoc networks", Journal of Computer Security, vol. 15, no. 1, pp. 39-68, 2007.
[3] X. Lin, X. Sun, P.H. Ho, X. Shen," GSIS : A Secure and Privacy Preserving Protocol for Vehicular Communications", IEEE Transactions on Vehicular Technology, Vol. 56, Issue 6, pp. 3442- 3456, 2007.
[4] J. M. D. Fuentes, A. I. Gonz'alez-Tablas, and A. Ribagorda, " Overview of Security Issues in Vehicular Ad-hoc Networks", in Vehicular Technolgy conference, VTC 2007-Spring, 2007.
[5] P. Kamat, A. Baliga, W. Trappe, "An Identity Based security Framework for VANETs", VANET 06 Proceeding of the 3rd International workshop on Vehicular Ad-hoc networks, pp. 94-95, 2006.

 

Paper Type

::

Research Paper

Title

::

Lateral Extrusion of Spur gears with Involute Profile: Finite Element Analysis and Experimental Investigation

Country

::

India

Authors

::

U.C. Paltasingh ||, S.K. Sahoo ||, P.R. Das ||, K.C. Nayak ||, S. Potnuru

Page No.

::

20-30

::
10.9790/3021-03732030
aned   0.4/3021-03732030 aned
iosrjen   3021-0307-0330 iosrjen

Now a days, manufacturing of machine components with complex flange geometry or segmented protrusions which are very difficult to produce by the conventional forging, can be easily produced by lateral extrusion. Because of the low machining cost, reduced material waste, improved mechanical properties and subsequent increase in the industrial demand of these parts, has accelerated the progress of research in this field. So this paper presents the experimental and dynamic simulation study of lateral extrusion of spur gears with involute tooth profile in terms of load requirement, die filling and material flow. Three dimensional finite element analyses are carried out to investigate the effective stress and strain, die filling, flow patterns and prediction of extrusion loads. Series of experiment has been carried using tellurium lead with three sets of die profile. The comparison between the simulation and the experimental results show good agreement.

 

Keywords: - Extrusion load, Finite element, Flow pattern, Strain effective, Stress effective

[1] R. Balendra and Y. Qin, Injection forging: engineering and research, Journal of Material Processing Technology, 145, 2004, 189–206.
[2] N. R. Chitkara and A. Aleem, Axi-symmetric tube extrusion/piercing using die mandrel combinations: some experiments and a generalized upper bound analysis, International Journal of Mechanical Science, 43, 2001, 1685–1709.
[3] F. Dohmann and M. Laufer, Working accuracy of toothed extrusion dies, Advance Technology Plasticity I , 1990, 335-341.
[4] I. Moriguchi, Cold forging of gears and other complex shapes, Journal of Material Processing Technology, 35, 439-450 (1992).
[5] N. A. Abdul and T. A. Dean, An analysis of the forging of spur gear forms, International Journal of Machine Tools Design and Research, 26(2), 1986, 113 -1 23.

 

Paper Type

::

Research Paper

Title

::

Efficient Multicast Routing Algorithms for Scalable Wireless Network

Country

::

India

Authors

::

Suresh Gowda G J ||, Mr. Mallikarjuna Swamy S ||, Deepak B L

Page No.

::

31-36

::
10.9790/3021-03733136
aned   0.4/3021-03733136 aned
iosrjen   3021-0307-0336 iosrjen

Maintaining the day to day scaling network nodes is challenge. The existing hierarchical and non- hierarchical is handling the growing network nodes randomly with overhead of recursive logic with repeaters and power consumption which comes at cost. The span of individual network which is a cluster of nodes is limited, if there are multiple individual networks which are grouped together, then forms the non- hierarchical structure. The existing algorithms to link the source with the destination is purely random propagation, which uses more number of repeater nodes and looping leading to the consumption more power, which is redundant. To overcome the overhead of purely random propagation algorithm ,there came another algorithm called non-repetitive random propagation ,which uses the concept of distant repeaters ,which also creates redundancy .In order to overcome the above said overheads ,we have devised an optimized algorithm which deals with the problem without using any repeaters and looping. The algorithm uses the concept of minimum eccentricity. Calculating the minimum eccentricity would identify the dominant node which can connect or communicate with rest of the nodes independently reducing the redundancy. The node identified as dominant node should possess maximum battery power and without any selfish behavior such as distributing the available resource impartially with every other node under the coverage area.

 

Keywords: - Mobile ad hoc networks, multicast, wireless networks, protocol.

[1]. L. Ji and M. S. Corson., "Differential destination multicast: a MANET multicast routing protosmall groups," April 2001pp 22-23..
[2]. E. M. Royer and C. E. Perkins., "Multicast operation of the ad hoc on-demand distance vector routing protocol" August 2011 pp 11-12.
[3]. C. Wu, Y. Tay, and C.-K. Toh.. Nath, "Ad hoc multicast routing protocol utilizing increasing id-numbers (AMRIS) functional specification," 2007 pp 102-103.
[4]. X. Zhang and L. Jacob., "Multicast zone routing protocol in mobile ad hoc wireless networks," October 2003.
[5]. Tao Shu, Marwan Krunz, and Sisi Liu,"Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes" Dec 2012 pp 21-22

 

Paper Type

::

Research Paper

Title

::

Study of Microstructure, Impact Strength on Manual Metal Arc Welding Of Gray Cast Iron Using Enife–Ci Filler Metal

Country

::

India

Authors

::

Ravi Butola ||, Jitendra Kumar ||, Vikas Verma ||, Prakash Mahara

Page No.

::

37-42

::
10.9790/3021-03733742
aned   0.4/3021-03733742 aned
iosrjen   3021-0307-0342 iosrjen

The effect on the microstructure obtained in the heat-affected zone (HAZ) and the carbide zone in the weld metal properties of Casted grey cast iron plates (grade-GJLEN 1561) are used as base material. The welding was carried out with manual shielded metal arc welding using ENiFe–CI filler metal. The welds were prepared by using the arc welding process and filler Nickel base filler materials are used in welding as electrode, which is ductile in nature 85 ENiFe-CI is the grade of nickel base filler electrode. For knowing the effect of preheat treatment, the plates were firstly heated to near about 400- 450˚C by the help of gas cutting torch and the post weld heat treatment (PWHT) was limited only for 45 minute at 810oC. The welds were characterized by micro structural analysis, impact test, and tensile test. The Charpy-impact properties of the weldment specimens improved with the PWHT and were somewhat lower than previously developed data on the wrought material.

 

Keyword: - gray cast iron, impact test, microstructure, post weld heat treatment (PWHT), tensile test.

[1] Pascual M., et al., Analysis of the weldability of ductile iron. Materials Letters, 2008, Vol.62: p. 1359-1362
[2] El-Banna E. M., Effect of preheat on welding of ductile cast iron. Materials Letters, 1999, vol.41: p. 20-26
[3] El-Banna E. M., et al., Study of restoration by welding of pearlitic ductile cast iron. Materials Letters, 2000, vol.42: p. 311-320
[4] Pouranvari M., on the weldability of grey cast iron using nickel based filler metal. Materials and Design, 2010, vol.31: p. 3253-3258
[5] Voigt R. C., et al., A study of heat-affected zone structures in ductile cast iron. Welding Journal, 1983, vol.42: p. 82-88

 

Paper Type

::

Research Paper

Title

::

Classification of Infective adulteration by twin Processing besides strewn Computing

Country

::

India

Authors

::

C. Bala Saravanan ||, L.Gladis Flower ||, Bibinu Babu ||, L.M. Gladis Beula ||, N. Saravanan

Page No.

::

43-46

::
10.9790/3021-03734346
aned   0.4/3021-03734346 aned
iosrjen   3021-0307-0346 iosrjen
Ailment epidemics due to polluted nourishment are a foremost concern not merely for the food-processing industry but also for the communal at bulky. Performances for mechanized exposure and classification of germs can be a great help in preventing outbreaks and maintaining the safety of the nation's nourishment supply. Identification and classification of food borne pathogens incontrollable gathering scatter arrays is an inspiring new label-free technique that utilizes image-analysis and machine-erudition tools. However, the piece-extraction tools hired for this tactic are computationally complex, and choosing the right amalgamation of scatter related geographies encompasses extensive testing with unalike feature combinations. In this study, I used terminal clusters to hurry up the nose-extraction process, which enables us to analyze the contribution of different scatter-based features to the overall classification accuracy. A set of 1000 sprinkle decorations representing ten different bacterial strains was used. Zernike and Chebyshev moments as well as Haralick texture geographies were computed from the available light-scatter patterns. The most promising features were first selected using Fisher's discriminate analysis, and subsequently a support-vector-machine classifier with an undeviating kernel was used. With extensive testing, we were able to identify a small subset of features that bent the preferred fallouts in terms of classification accuracy and execution speed. The use of scattered computing for scatter pattern analysis, chin extraction, and selection affords an accurate utilization for huge-scale positioning of a sunny scatter constructed tactic to infectious classification.
[1] R. Naravaneni and K. Jamil, "Rapid detection of food-borne pathogens by using molecular techniques, J.Med.Microbiol" vol. 54, no. 1, pp. 51–54, Jan. 2005.
[2] R. E. Levin, Rapid Detection and Characterization of Foodborne Pathogens byMolecular Techniques. Boca Raton, FL: CRC Press, 2009.
[3] M. Severgnini, P. Cremonesi, C. Consolandi, G. De Bellis, and B. Castiglioni, "Advances in DNA microarray technology for the detection of foodborne pathogens," Food Bioprocess Technol., vol. 4, no. pp. 936–953, Aug. 2011.
[4] B. Bayraktar, P. P. Banada, E. D. Hirleman, A. K. Bhunia, J. P. Robinson,and B. Rajwa, "Feature extraction from light-scatter patterns of listeria colonies for identification and classification," J. Biomed. Optics, vol. 11, no. 3, p. 34006, 2006.

 

Paper Type

::

Research Paper

Title

::

Host to Host Communication in Wireless Sensor Networks Without any Attacks

Country

::

India

Authors

::

V. Chandra Sekhar ||, D. Raman

Page No.

::

47-50

::
10.9790/3021-03734750
aned   0.4/3021-03734750 aned
iosrjen   3021-0307-0350 iosrjen

In a wireless sensor networks, the communication of the network will be affected by the attacks. The most common attacks are denial of service, packet droppers and packet modifiers .In a wireless sensor networks the communication between the hosts is static (the hosts addresses are predefined).If any attacks disrupt the communication then the network performance degrades. To address this problem, a simple yet effective scheme is proposed i.e., the communication between the hosts will be dynamically perform. By this scheme, the performance of the network will be the effective and efficient.

 

Index Terms: - Approximation algorithm, Caching algorithm, Wireless sensor networks.

[1]. Chuang Wang, Taiming Feng, Jinsook Kim, Guiling Wang, Wensheng Zhang, "Catching Packet Droppers and Modifiers in Wireless Sensor Networks," IEEE transactions on parallel and distributed systems, vol. 23, no. 5, ,May.2012, pp.835-843.
[2]. H. Chan and A. Perrig, "Security and Privacy in Sensor Networks," Computer, vol. 36, no. 10, , Oct. 2003, pp. 103-105.
[3]. Bhuse, A. Gupta, and L. Lilien, "DPDSN: Detection of Packet- Dropping Attacks for Wireless Sensor Networks," Proc. Fourth Trusted Internet Workshop, 2005.
[4]. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures," Proc. IEEE First Int'l Workshop Sensor Network Protocols and Applications, 2003.

[5]. M. Kefayati, H.R. Rabiee, S.G. Miremadi, and A. Khonsari, "Misbehavior Resilient Multi-Path Data Transmission in Mobile Ad-Hoc Networks," Proc. Fourth ACM Workshop Security of Ad Hoc and Sensor Networks (SASN '06), 2006.

 

Paper Type

::

Research Paper

Title

::

Essence and Emergence of Routing (As a Best Service)

Country

::

India

Authors

::

Ashis Saklani

Page No.

::

51-57

::
10.9790/3021-03735157
aned   0.4/3021-03735157 aned
iosrjen   3021-0307-0357 iosrjen
This Research Paper emphasize on customize route computation should be offered as a ervice by Third Party Providers.In Internet routing, there is a fundamental tussle between the end users who want control over the end-to-end paths and the Autonomous Systems (ASes) who want control over the flow of traffic through their infrastructure. To resolve this tussle and offer flexible routing control across multiple routing domains, we argue that customized route computation should be offered as a service by third-party providers. Outsourcing specialized route computation allows different path-selection mechanisms to coexist, and evolve over time.
[1]. K. Argyraki and D. R. Cheriton. Active Internet Traffic Filtering: Real-Time Response to Denial of Service Attacks. In Proc. USENIX Annual Technical Conference, 2005.
[2]. J. Bartlett. Optimizing Multi-homed Connections. Business Communications Review, 32(1):22-27, January 2002.
[3]. S. Blake, D. Black, M. Carlson, E. Davies, Z. Wang, and W. Weiss. An Architecture for Differentiated Service. RFC 2475, 1998.
[4]. I. Castineyra, N. Chiappa, and M. Steenstrup. The Nimrod Routing Architecture. RFC 1992, 1996.
[5]. D. D. Clark, J. Wroclawski, K. R. Sollins, and R. Braden. Tussle in Cyberspace: Defining Tomorrow's Internet. In Proc. ACM SIGCOMM, 2002.