-
A novel technique for creating Semantic Database for Hidden Web
Manvi ; Komal Kumar Bhatia; Ashutosh Dixit; Rinki Kardam
Computer Engineering
Year: 2015, Volume:1, Issue : 11
Pages: 299 - 305
Today a lot of valuable information on WWW lie behind the search forms. This information is known as Hidden Web. To extract this information user has to fill various forms with appropriate values. Traditionally user has to type in these values manually. For automatically filling these types of interfaces precisely relevant information is needed. A database that stores semantic information about objects and their relations may solve this problem. This database can be defined with the help of Ontology which defines common vocabulary. With the help of RDF attached with web pages, ontology can be created and stored in database. The accurate and meaningful information retrieved from RDF of web pages can be stored and used later for filling up above form interfaces. In this work, a database that will help user to fill the form automatically with the values has been created with the help of ontology for book domain.
Read More...
-
Comparision Of Two Different Materials For Connecting Rod Using Ansys
T. Arun Kumar Reddy ; M.SACHIDHANANDAM
Mechanical Engineering
Year: 2015, Volume:1, Issue : 11
Pages: 306 - 313
The function of the connecting rod is to convert the reciprocating motion of the piston into the rotary motion of the crankshaft. To reduce the obliquity of the rod with the cylinder axis, its length should be kept as large as possible. Reduced obliquity decreases the oscillating angular motion of the rod about its small end, thereby decreasing the piston side-thrust and improving the reciprocating balance of the engine. The connecting rods are generally made by forged steel or duralumin or carbon steel. The connecting rods these days are also cast from malleable or spheroidal graphite cast iron. In the present work, the modeling of connecting rod is developed using CATIA V5/R20. Later, the analysis is carried out for different end conditions of connecting rod using ANSYS12 software package. From the analysis, the Forged steel has more factor of safety, reduce the weight, increase the stiffness and reduce the stress and stiffer than other material like carbon steel.
Read More...
-
BOOK RECOMMENDATION SYSTEM
Ms. Sushama Suresh Rajpurkar ; Ms. Darshana Rajnikant Bhatt; Ms. Pooja Malhotra
Information Technology
Year: 2015, Volume:1, Issue : 11
Pages: 314 - 316
Recommendation systems are widely used to recommend products to the end users that are most appropriate. Online book selling websites now-a-days are competing with each other by many means. Recommendation system is one of the stronger tools to increase profit and retaining buyer. The book recommendation system must recommend books that are of buyer’s interest. This paper presents book recommendation system based on combined features of content filtering, collaborative filtering and association rule mining.
Read More...
-
COMPRESS-ENCRYPT VIDEO STEGANOGRAPHY
SWETHA V ; LIJI L DOMINIC; AMBIKADEVI AMMA T
Computer Engineering
Year: 2015, Volume:1, Issue : 11
Pages: 317 - 321
Preserving the secrecy of confidential information has its own importance right from the early era of computing. Steganography is the art of hiding the messages inside other harmless medium in such a way that an enemy cannot even sense the presence of the secret message. But if the presence of information behind media is revealed or detected, the objective of steganography is violated and security is compromised. This paper proposes and analyzes a methodology for video steganography that pre-processes the text before hiding it behind a cover video. In pre-processing process, the text is first compressed and then modified using a key. The proposed method combines the idea of video steganography, cryptography and compression techniques which provide enhanced security. The RC4 is used for encrypting the compressed text and 4LSB method is used to conceal the processed text inside the cover media, while the purpose of compression is to enhance security and increase embedding capacity.
Read More...
-
Privacy-Preserving Access Control Mechanism for Relational Data
Shijith T P ; Sreelakshmi R; Ambikadevi Amma T
Computer Engineering
Year: 2015, Volume:1, Issue : 11
Pages: 322 - 326
The Access control mechanism avoids the unauthorized access of sensitive information. It protects the user information from the unauthorized access. The privacy protection mechanism is a much important concern in the case of sharing the sensitive information. The privacy protection mechanism provides better privacy for the sensitive information which is to be shared. The generally used privacy protection mechanism uses the generalization and suppression of the sensitive data. It prevents the privacy disclosure of the sensitive data. The privacy protection mechanism avoids the identity and attributes disclosure. The privacy is achieved by the high accuracy and consistency of the user information, ie., the precision of the user information. In this paper, it proposes a privacy persevered access control mechanism for relational data. It uses the accuracy constrained privacy preserving access control mechanism for relational data framework here. It uses the concept of imprecision bound for the privacy preserving access control mechanism. The imprecision bound is set for all queries. For the privacy protection mechanism it uses the combination of both the k-anonymity method and fragmentation method. The k-anonymity method uses the suppression and generalization. Here it uses the clustering method for fragmentation. It also proposes the heuristic method for anonymization process.
Read More...
-
A HOST BASED INTRUSION DETECTION SYSTEM USING IMPROVED EXTREME LEARNING MACHINE
MEGHA RAJ ; Shijoe Jose; Ambikadevi Amma T
Computer Engineering
Year: 2015, Volume:1, Issue : 11
Pages: 327 - 332
HIDS is very challenging due to high false alarm rate. Host based systems are based on building some reference models from execution traces to characterize the system behavior. These models are then used to classify the normal as well as abnormal behavior. Most of the popular techniques are based on using Extreme Learning Machine (ELM).First analyze the discontiguous patterns of system calls and extract the important feature using ELM. This method provides powerful solution to IDS problems. For dynamic nature interpret the semantic structure between system calls and programming languages. However the use of ELM requires long training time due to the large size of typical system call traces which makes ELM computationally infeasible. So in order to overcome this problem this paper introduces a new host based intrusion detection system using Improved Extreme Learning Machine (I-ELM), in an attempt to reduce the training overhead problem while increasing the detection rate. The key concept is to apply N-gram extraction algorithm. This method mainly focuses on mining the frequent common patterns (N-grams) in the system call traces instead of considering each trace. Thus the length of training sequence is reduced significantly compare to traditional ELM while keeping the accuracy rate.
Read More...
-
Deadline Constrained Task Scheduling with a Sequential Game in Cloud
Sunaina Sangeet Thottan ; Shyjith M B; Ambikadevi Amma T
Computer Engineering
Year: 2015, Volume:1, Issue : 11
Pages: 333 - 336
Developing and manipulating a virtual environment like Cloud Computing for processing tasks running on different applications in different systems is very much popular now a days. Task Scheduling from number of applications is becoming a complicated issue while dealing with this scenario. In most cases a single objective is calculated to schedule the task to the available sites with respect to the convenience of cloud provider. Cost, processing rate, resource utilization, performance, overhead storage and bandwidth are the most commonly selected objectives for scheduling heterogeneous tasks to the available virtual sites. This scenario generates a condition in which satisfaction of one objective leading to serious performance outflow in another objective. Introducing a scheduling technique considering multiple objectives a new method including a sequential game with number of stages for scheduling heterogeneous tasks running on different applications for the performance enhancement is formulated in this work. Allocation of tasks to available site is processed after computing the minimum cost and execution time requirements, considering storage and bandwidth utilization in sites within the deadline and grouping tasks in to different Bag of Tasks (BoT).
Read More...
-
PHOTOVOLTAIC DRIVEN THERMOELECTRIC REFRIGERATOR FOR CAR HEAT DISSIPATION DURING SUNNY DAYS
Ashiq Georgi Abraham ; Bobby Jacob; Davie George Vinu; Dean John Vinu; Sreejith R
Mechanical Engineering
Year: 2015, Volume:1, Issue : 11
Pages: 337 - 342
This project outlines the implementation of photovoltaic driven refrigerator in cars powered from solar panels with a battery bank. People normally don’t tend to park cars under the sunlight during afternoon time as it causes great discomfort to the person when entering the vehicle after sometime. In order to prevent this thermoelectric module is placed to dissipate the heat that gets built up in the car cabin. This thermoelectric module is powered using nonconventional method, i.e. using solar energy. Hence not using any energy produced by the engine. This method does not cool the cabin but keep it maintained at an optimum temperature. Different from conventional refrigeration systems, thermoelectric refrigeration, based on the Peltier effect, does not require any compressor, expansion valves, absorbers, condensers or solution pumps. Moreover, it does not require working fluids or any moving parts, which is friendly to the environment and results in an increase in reliability. Thermoelectric refrigeration replaces the three main working parts with: a cold junction, a heat sink and a DC power source. The Peltier effect is a temperature difference created by applying a voltage between two electrodes connected to a sample of semiconductor material. This phenomenon can be useful when it is necessary to transfer heat from one medium to another. Solar energy is the most low cost, competition free, universal source of energy as sunshine's throughout. This energy can be converted into useful electrical energy using photovoltaic technology.
Read More...
-
Study of Fluid Flow and Heat Transfer In Rectangular Micro Channel
SUNIL BHARATI ; SOHAIL BUX
Mechanical Engineering
Year: 2015, Volume:1, Issue : 11
Pages: 343 - 349
The computational fluid dynamics (CFD) model equations are solved to predict the hydrodynamic and thermal behaviour of the exchanger. The geometry of the problem and meshing of it have been made in ANSYS 14.0. The models have been solved by ANSYS Fluent 14.0 solver. Water and its Nano fluids with alumina (A2O3) are used as the coolant fluid in the micro channel heat sink. The relation between heat transfer coefficient and thermal conductivity of the fluid i.e. h ∠k is proved in the present study. Thus use of Nano fluids has been found beneficial both in laminar and turbulent zone. The result shows that Nano fluids help to increase the heat transfer coefficient by 15% and 12% respectively in laminar and turbulent zone. The entrance length for the fully developed velocities depends on Reynolds number. The temperature rise between outlet and inlet depends on the Reynolds number, Re and Peclet number, Pe Temperature distribution is found to be independent of radial position even for Pe<<1.0. The hydrodynamic and thermal behaviour of the system have been studied in terms of velocity, pressure and temperature contours. The velocity contours at the exit show that wall effect penetrates more towards the center and the thickness of the zone with maximum velocity shrinks with increase in Re. The pressure drop across the channel increases with increase in Re. The experimental work done by Lee and Mudawar (2007) has been predicted by the present CFD results. The hydrodynamics and thermal behaviour of a rectangular micro channel are studied here. The variation wall temperature, pressure drop in the channel and the friction factors calculated using ANSYS Fluent can well predict the experimental data. The effect of Re on the behaviour the channel are also studied. Its behaviour also has been analyzed with the help of temperature, pressure and velocity contours.
Read More...
-
Performance Improvement In Disruption Tolerant Network With Co-operative Caching
Chithra K P ; Manoj M; AmbikadeviAmma T
Computer Engineering
Year: 2015, Volume:1, Issue : 11
Pages: 350 - 354
Disruption Tolerant Networks (DTNs) consist of mobile devices or nodes that contact each other opportunistically. Due to its high error rates and unpredictable node mobility, only intermittent network connectivity exists in DTNs, and the subsequent difficulty of maintaining end-to-end communication links makes it necessary to use "store-and-forward" methods for data transmission. This paper proposes a novel approach to support cooperative caching in DTNs, which enables the sharing and coordination of cached data among multiple nodes and reduces data access delay. The basic idea is to cache data at specific locations called network central locations (NCLs), which are being easily accessed by other nodes in the network. Due to the limited caching buffer of the central nodes, multiple nodes near a central node may be involved for caching, and ensure that popular data are always cached nearer to the central nodes via dynamic cache replacement based on query history. The NCL selection is based on a probabilistic selection metric. By placing the NCL on the content query path and clustering the nodes together, the data access performance can be improved.
Read More...