......

..

IJCTA-Volume 6 Issue 2/ March-April 2015
S.No
Title/Author Name
Page No
1
Recommender System For E-Shopping Using Users’ Tipping Point
-Archana Kollu,Manisha Phadatare,Priya Shewale,Shipa Vishwakarma,Anagha Landge
Abstract
E-commerce is one of the rapidly growing fields now-a-days. With today’s trend, attraction of users towards online shopping is increased. In the field of online shopping, previously it was considered that users make the purchase decisions depending on their own choice. But the extensive studies have proved that the decision of user is affected by various parameters like products rating, its price and users’ own priority. The recommender system works on these parameters and suggests relevant products to the user. This powerful technique is used for filtering the large amount of products according to users’ choice. In this paper we identify the use of recommender system for online shopping of electronic product. A significant motivation behind this work is to help user to make their purchase decision easy as well as to increase sales volume of online mobile shopping. In this work we are using two effective recommendation algorithms to check the effect of products rating and to find users type. Proposed technique will give more effective results than existing technique.
Keywords—Bass Model, Recommender System, Tipping Points
157-159
PDF
2
A Combined First Order Logic Representation for SOS Based Distributed Social Network
-
Naval kishor shahi,R.Hariharan
Abstract
Social network is connected multi node via internet where social activity is done through the social network provider distributed social network. Special type of network system in which component located on network computer communicate and co-ordinate their action by passing messages. the nodes interact with each other in order to achieve a common goal. This system will work over there characteristics like can currency of component lack of a global clock and independent failure of component. In This focused to rectify the above draw backs combined first order logic representation for SOS based distributed social network .this tells with the algorithm first order logic ,and TTL means first order predicate logic is composed of statement that are assumed to be true. The statements are composed of a atomic symbols. It is summarized reasoning in which each Sentence or statement is broken down in to a Segment or predict. SOS is very potation to asked frequently question by the user. We have also deployed a pilot version of SOS for use in a small group in Clemson University. The feedback from the users shows that SOS can provide high-quality answers.
Keywords:fist order logic, system of system, social network.
160-164
PDF
3
Multiphase Intrusion Detection Technique in PEER to PEER Network
-PriyaVengatesh,R.Kannan
Abstract
A number of approaches for network-based botnet detection has been recently proposed as Botnets are found to be taught-to-commit several malicious activities, such as establishing distributed denial-of-service (DDoS) attacks, sending spam, or stealing private information. In this regard we propose a framework which can classify & identify effectively which are likely-to-be bots through Anomaly Detection, Understanding the communication threshold mean time, and finally filtering them from the network. As botnets are controlled through control-server, this control-server utilizes DDNS to locate the command-servers and thus detecting their threshold time inside the networks is vital for every framework against upcoming smart botnets.
Key words: Anomaly detection, Thresh holding, Filtering, Clustering, Network Traffic. Botnet Attack.
165-170
PDF
4
Comparative Study of GPS Positioning for Vehicles with Algorithm in Global and Local Position
-Manoher Kumar Bishwas,K Kumar
Abstract
GPS is the way for find out the position or anything exists which is related to machine. They interact with the machine and find out the actual position of related environment.GPS is called as global positioning system.This paper proposes “deals with the to find out such types of vehicle which is registered on the internet. Mechanism is done through the android mobile. Android phones are already enabled of tracking the location, wherever mobile will go that will track the person and by the help of phones, vehicle will be tracked out. Thus, owner of the vehicle from anywhere can find his vehicle. This project can be further enhanced by integrating a GPS system, which will give exact position of the vehicle in terms of its latitude and longitude.The Android mobile interfaced to the receiver and receives the message and finally they produce the output of which activates a mechanism that inform the vehicle status. The aim of this project is to use wireless technology to near the owner of the vehicle about any unauthorized entry. This is done by sending status to the anthor other mobile using android smart phones.
Keywords: Android mobiles, GPS, Wireless medium,vehicle,security
171-176
PDF
5
Adomian Decomposition and Modi ed Variational Iteration Methods for Linear Fractional Integro-Di erential Equations
-M.H.Saleh,D.Sh.Mohamed,M.H.Ahmed,M.K. Marjan
Abstract
In this paper, we present a comparative study between the modi ed variational iteration method and Adomian decomposition method. The study outlines the signi cant features of the two methods, for solving linear fractional integro-di erential equations. From the computational viewpoint, the variational iteration method is more ecient, convenient and easy to use.
keywords: Fractional integro-di erential equations, Adomian decomposition method (ADM),Modi ed variational iteration method (MVIM), Caputo fractional derivative
177-187
PDF
6
Design of Two Dimensional (2D) Platform Control System
-Kalid Mohammed Idrees,Abdulrasoul Jabar Alzubaidi
Abstract
The goal of this paper is to design a reconfigurable control system. The implemented design tools are based on static random access memory field programmable grid array (SRAM FPGA) circuit board and a very high speed integrated circuit hardware description language (VHDL). The design steps start with software development which consists of HDL processes where VHDL program that describes the architectural behavior of the control system. An HDL synthesis is the second step, which converts the design in behavioral description file into gates. These steps are followed by implementation techniques and downloading the design from PC onto FPGA via a joint test action group (JTAG) cable. The results show that the overall average delay timing between inputs to outputs is relatively very small. Thus the use of FPGA and VHDL to deploy stepper control system efficiently improves its reliability, flexibility, and real time data processing. In particular this paper has developed a steppers control system based on FPGA so as to manage and improve the process performance of a control system. In addition, the proposed steppers control system allows reconfiguration after the control system is deployed. Finally, it can be concluded that the proposed control system can be effectively implemented in so many application areas.
Keywords: FPGA , VHDL , JTAG, 2D platform , control system , stepper motors.
188-193
PDF
7
Solution for Screening the Theft Handsets and Tracking the Missing Ones
-Abdelraheem Mohamed Elkhalifa,Abdelrasoul Jabar Alzubaidi
Abstract
Mobile phone theft has become a growing problem worldwide, with hundreds of thousands of phones reported stolen each year. In many countries, GSM handset theft has become a major factor in rising street crime, particularly among young people .A stolen GSM handset can be reused with a different subscriber's SIM card, possibly in a different mobile network.. Upon subscribing to a network and obtaining a legitimate SIM card with subscriber information, the perpetrator will initially buy an inexpensive handset and later steal a better model from another subscriber. The SIM card is then switched and the network operator is unaware that a stolen handset is being used.
The telecommunications industry is working hard to make this crime less attractive to thieves. Screening solutions, along with jointly shared databases of stolen handset numbers, can effectively render a stolen handset useless across all networks. Once the consumer reports the theft to the network operator, it can be cancelled much like a stolen credit card.
The Equipment Identity Register (EIR) is a database employed within mobile networks. The database holds records for 3 types of mobile; namely black, grey and white. Besides, there is also a 4th category i.e. "Unknown". EIR provides an additional level of security which is performed on the mobile equipment itself, as opposed to the mobile subscriber. When a mobile requests services from the network its IMEI (International Mobile Equipment Identity) may be checked against the EIR, to assess which category of mobile it falls under. It is a tool to deny services or track problem equipment.
Keywords : GSM , SIM card, database , EIR ,IMEI.
194-199
PDF
8
Microcontroller Based Design for Tele-Sensing and Extinguishing Fire
-Hany abdelhady Almedhegi,Ameen babekr abdelnaby,Abdelrasoul Jabar Alzubaidi
Abstract
Remote sensing (or Tele-sensing) have a wide variety of applications. Security is one of these applications .Different design technologies are implemented. This paper sheds the light on this challenging issue to steady and propose an intelligent electronic circuit design solutions for the remote sensing operations. An electronic circuit design based on using a microcontroller is proposed. A real time sensing and response electronic circuit is implemented to fulfill this task .The system design is programmable (i.e. intelligent) and hence the electronic actions established in the design can be modified easily. An electronic interface circuit is deigned to be connected to the microcontrollers .The task of the electronic interface circuit is to acquire data from the sensors and to give commands to the electronic and electrical devices connected to the circuit.
Keywords : microcontrollers, remote control , Tele-sensing , interface circuit , smart sensors.
200-206
PDF
9
Safety Margin in Radio Frequency (RF) Exposure
-Abdelrasoul jabar Alzubaidi
Abstract
All radio base stations (RBS’s) are Radio Frequency (RF) transmitters. Very high RF exposure levels can be harmful. To protect people against such harmful effects, RF exposure limits with wide safety margins are specified by the national and international health authorities. Because it is possible for RF exposure levels to exceed the recommended exposure limits in the areas defined by compliance distances, it is important that RBS antennas are installed so that the general public does not have access to such areas. For configurations and antennas other than those specified by this paper, it is necessary to estimate RF exposure levels and specify the requirements for an RBS antenna site. The methods presented here are used to estimate RF exposure levels and the dimensions of the areas from which the general public must be excluded. The methods are also applicable for determining compliance distances for occupational exposure. These and other calculation and measurement methods are described in standards such as EN 50383 and EN 50400, IEEE C95.3 and CEPT ECC/REC/(02)04. This paper is intended for engineering personnel who create site installation documentation for RBSs used in the mobile phone systems. The paper also explains how to estimate RF exposure levels and compliance distances (minimum separations between antennas and people) for RBS radio configurations and antennas.
Keywords :. Radio Frequency (RF), RF exposure levels, antennas , standards such as EN 50383 and EN 50400, IEEE C95.3 and CEPT ECC/REC.
207-214
PDF
10
Retrieval of Similar images using Bag of Visual Words (BoW) Framework
-R.Ramkumar,P.Prasenna
Abstract
Scalable image search supported visual similarity has been a lively topic of analysis in recent years. Progressive solutions typically use hashing strategies to insert high-dimensional image options into performing house, wherever search may be performed in period of time supported performing distance of compact hash codes. Not like ancient metrics (e.g., Euclidean) that provide continuous distances, the performing distances square measure separate number values. As a consequence, there square measure typically an outsized variety of pictures sharing equal performing distances to a question, that for the most part hurts search results wherever fine-grained ranking is extremely vital. This paper introduces associate approach that permits query-adaptive ranking of the came pictures with equal performing distances to the queries. this can be achieved by first of all offline learning bitwise weights of the hash codes for a various set of predefined linguistics thought categories. we have a tendency to formulate the burden learning method as a quadratic programming downside that minimizes intra-class distance whereas conserving inter-class relationship captured by original raw image options. Query-adaptive weights square measure then computed on-line by evaluating the proximity between a question and therefore the linguistics thought categories. With the query-adaptive bitwise weights, came pictures may be simply ordered by weighted performing distance at a finer-grained hash code level instead of the initial performing distance level.
Keywords— Image processing, bag of visual words, scalability, hash codes, weighted Hamming distance.
215-221
PDF
11
E-Doctor: A Web Based SVMs for Automatic Identification of Health Problems
-Vamsi Krishna P,Phani Kumar Damodara
Abstract
This paper proposes E-doctor; a web-based application that makes automatically identifies the nature of illness by examining the symptoms about health problems. Here we are using a supervised learning model that is Support Vector Machines (SVMs), which analyze data and proceed to decisions, based on their knowledge. The role of system administrator is to define specific characteristics of each health problem and educate the SVM by entering sample files of statistical data. After entering the sample files, medical staff can enter the patient’s reports information and w-doctor is automatically identify the nature of problem/prediction by means of answering if the patient has a specific health problem or may have in future. Here the statistical information plays an important role on deciding about a patient’s condition. The experiments are done by heart symptoms and Thyroid symptoms and the result was satisfactory. .
Keywords: Automatic diagnosis , Medical, SVM
222-229
PDF
12
Multiplicationless DFT Calculation Using New Algorithms
-Jaya Krishna Sunkara,Chiranjeevi Muppala
Abstract
New telecommunication systems are based more than ever before on digital signal processing. High speed digital telecommunication systems such as OFDM and DSL need real-time high-speed computation of the Discrete Fourier Transform. Thus there is a need of innovative methods to improve the speed. In this paper, we propose new methods to implement DFT in an efficient way. The proposed schemes come with the simplest and efficient way to solve the complex DFT calculation with less number of multiplications and additions. The methods proposed change the DFT and FFT algorithms by considering the values of input signal. The simulation results have verified that the number of complex additions and multiplications have reduced drastically when compared to the direct evaluation and FFT.
230-234
PDF
13
High Utility Itemset mining using UP growth with Genetic Algorithm
from OLAP System

-A.Saranya,D.Kerana Hanirex
Abstract
Frequent pattern mining play an important role for analysing vast amount of data in data mining. In practice, Frequent pattern mining cannot meet the challenges of real world problems due to items differ in various. Hence an emerging technique called Utility-based data mining is used in data mining processes.The utility mining not only considers the frequency but also see the utility associated with the itemsets.The main objective of utility mining is to extract the itemsets with high utilities, by considering user preferences such as profit,quantity and cost. In our proposed approach, we are using UP growth with Genetic Algorithm. The idea is that UP growth algorithm would generate Potetially High Utility Itemsets and Genetic Algorithm would optimize and provide the High Utility Item set from it. On comparing with existing algorithm, the proposed approach is performing better in terms of execution time.
Keywords—Utility mining, High utility itemsets, UP Growth, Genetic Algorithm, Frequent itemset mining
235-239
PDF
14
Survey of Public Auditing of Shared Data with Multiple Third Party Auditor with Efficient user Revocation in the Cloud
-G.Shreedevi,K.G.Arunkumar
Abstract
In cloud computing, users remotely store their data into the cloud and use on-demand high-quality applications by using a shared pool of configurable computing resource. When users put their data of large size on the cloud, the data integrity protection is challenging. With information storage and sharing services within the cloud, users will simply modify and share information as a bunch. Enabling public audit for cloud data storage security is important. To make sure shared data integrity is verified publically, users within the cluster got to figure signatures on all the blocks in shared information. Different blocks in shared information are usually signed by totally different users owing to information modifications performed by different users. For security reasons, once a user is revoked from the cluster, the blocks that were signed by this revoked user should be re-signed by existing user. The proposed systems have a tendency to propose a completely unique public auditing mechanism for the integrity of shared information with economical user revocation in mind. By utilizing the thought of proxy re-signatures, we can have a first third party auditor to create initial verification key and creating revocation list. Additionally, another third party to re-sign blocks on behalf of existing users throughout user revocation, in order that existing users don't have to transfer and re-sign blocks by themselves is often ready to audit the integrity of shared information while not retrieving the complete information from the cloud. Moreover, this mechanism is in a position to support secured multiple auditing tasks at the same time.
240-243
PDF
15
Ontological Approach for Context Aware Modeling and Reasoning in Sensor Network
-Pooja Mohan,Manpreet Singh
Abstract
With the advent of Mobile and Pervasive computing, the applications and services are required to adapt dynamically according to changing environmental situations. Context aware system senses the change in computational surroundings and dynamically adapts their behaviour to environmental change without any user intervention. Using contexts such as time, location people and activity, WSNs know which information is significant to transmit. It helps to retrieve the system information easily. In this paper, we propose a context ontology model for sensor network environment. We execute queries on our ontology using rules defined in SWRL and infer those rules by rule engine. The proposed model has the provision of context reasoning, reusability and sharing of knowledge.
Keywords: Ontology; Sensor; rules; context; OWL; SWRL
245-248
PDF
16
Secured Application for Generating Acoustic Signal for Blind People
-Phursutkar Prachi,Bajaj Apurva,Veer Priyanka,Choramle Tai,Prof.G.M.Bhandari
Abstract
Visionless people face many difficulties in their daily activities. This paper is basically designed to facilitate blind people for autonomous navigation. It is based on ‘image to sound’ conversion. The mobile camera is used to captures the image in front of the blind user. This image is then equated with the database and the processed information is fetched by blind user through a set of earphones. Color information of the object is also measured and it is informed to the blind user through the set of headphones.
Keywords— Color identification, edge detection, gray scale, object identification
249-254
PDF
17
A New Maximum Power Point Tracking Method for PV System
-Gangavarapu Mamatha
Abstract
In the past decades, there has been a huge growth in the use of the renewable energy sources. Photovoltaic energy is one of these sources but, the high cost and low conversion efficiency have limited the use of such endless energy source. Also the output power of a photovoltaic system (PV) is nonlinear and it is affected by weather conditions, therefore the maximum power point tracking (MPPT) was invented to extract the maximum power from each PV array. In this paper two methods are critically reviewed; Perturb & Observe method (P&O) and a new technique of tracking the maximum power point based on P&O are introduced in this paper. In this technique, from the available P-V curve[8]-[10] the present value i.e, power and voltage,obtained is compared with the prior and post value which decreases the probability of error as observed in conventional P&O method. The performance of the the modified P&O method is evaluated and compared with the conventional MPPT method in MATLAB.
Keywords:[MPPT] maximum power point tracking;[P&O]Perturb and Observe; [PV] Photovoltaic panel.
255-264
PDF
18
Innovative Application of Android Smart-Phone for Identification of Selected Fabric Weave Designs
-Diana Starovoytova Madara,Saul Namango,Edwin Ataro,Simiuy Sitati, Erick Oyondi,David Tuigong
Abstract
Identification of a fabric weave design can be done through a manual or an automatic computerised process. Besides both methods being destructive, each has its own limitations, such as being prone to human error as monotonous and requiring high level of attentiveness for the former, and for the latter demanding relatively high capital investment and being energy intense operation. This study aimed at developing an innovative mobile phone application that will automatically and non-destructively identify selected fabric weave designs. Images of the fabric weave designs were acquired using the mobile phone default camera. The acquired images were used as an input to an Artificial Neural Network (ANN) which used Multilayer Perception and Forward Propagation method to calculate the weighted factors and generate the desired recognition results as an output. The ANN was trained independently by Neuroph Studio 2.6.9 using 100, 200, 300 and 400 images. Android Software Development Kit (S.D.K), Java Runtime Environment (JRE) and XML programming languages together with Eclipse IDE for Android were used for application development. NetBeans IDE was used for PHP programming, while Windows movie maker Software was used during procedural design. The trained network was tested using 40 samples on Samsung Galaxy Ace S5830 mobile phone of Android platform. This study has demonstrated that the developed mobile phone application is capable to identify plain and twill fabric weave designs with effectiveness of recognition of the designs of 67.5%. Recommendations were made for the improvement of efficiency of image recognition and for other related issues.
265-272
PDF
19
Portable Micro controlled Nephelometer (PMN) for Potassium Determination
-Abdelrasoul Jabar Alzubaidi
Abstract
This paper presents a design for the measurement of Potasium in the water. A low-cost portable microcontrolled nephelometer for the determination of potassium in water is proposed. The nephelometer was constructed using two LEDs (light emitting diodes) as radiation sources at 465 nm and 880 nm, two photodiodes as photo detectors, and a peripheral interface controller for data acquisition and processing of the nephelometer. The nephelometer was used to determine potassium ions by monitoring the precipitate formed from the reaction between K+ and tetraphenylborate anion in a basic medium in the presence of polyvinyl alcohol. The analytical curve was linear in the potassium concentration range. A relative standard deviation of 0.2 % was obtained. Fast and reliable responses, low power consumption are other attractive features of the proposed nephelometer.
Keywords: microcontroller, LEDs , nephelometer (PMN), light emitting diode, sodium tetraphenylborate .
273-280
PDF
20
Location Secure System Design
-Abdelrasoul Jabar Alzubaidi
Abstract
This paper deals with the issue of securing locations. Different approaches are suggested for the design of an electronic circuit to fulfill this application. This work proposes an intelligent circuit design based on implementing a microcontroller and a computer .The microcontroller is interfaced to an ultrasonic radar module for motion detection . The ultrasonic radar module works on the Doppler principle for motion detection. The computer on the other side is interfaced to a GSM module in order to send sms to the location owner plus security personnel in case of an intrusion detection. A web camera is connected to the computer to capture and record images and videos for future investigations. An LCD is connected to the microcontroller . It is used for display and during the program development of the system. A keypad is connected to the microcontroller to be used during the program development as well as for arming and disarming the system operation.
KEYWORDS: . microcontroller , computer (pc) , ultrasonic radar module , GSM module , LCD keypad , web camera
281-287
PDF
 
 
IJCTA © Copyrights 2010| All Rights Reserved.

This work is licensed under a Creative Commons Attribution 2.5 India License.