IJCTA-Volume 9 Issue 1 / January-February 2018
Title/Author Name
Page No
Efficient Monitoring of Garbage over Wide Area Using WSN
-Jyoti Dinde,Ayesha Shaikh,Eesra Shaikh,Monali Darandale,Mr.S.D.Chame
The use of advanced technological devices in our daily routine made us smart and efficient. Such a transformation is required for any developing city for efficient management of citywide activities and becomes a smart city in our city. We see that the dustbins located at community places are spilling over. It creates unhealthy conditions for people also it makes that place ugly. At the same moment the bad whiff is also spread. To avoid all such situations we are going to implement an application called Garbage collection bin overflow indicator using WSN. We plan to place sensors inside and under the dustbin and it can be monitored by the system such that status of the bins, shortest route can also be planned for garbage collection.
Keywords- Depth Sensor, Load Sensor, Wireless Sensor Network, Moisture Sensor
A Noval Mechanism for Request Distribution in Cluster Based Distributed Networks
-V.Hema,Dr.K Kungumaraj
In distributed networks, the request should be distributed to the servers in the separated networks. The distributed networks are clustered into groups with the heterogeneous systems and servers. In need to fulfill the availability of resources, the distributed systems are formed with resources but the cluster servers should not provide all the resources. The requests are transferred to the server which does not aware of the resources in the distributed networks. The major problem in the cluster based distributed networks is to obtain the load balancing and high latency. The request should be distributed to the servers which are load balanced. If it fails it leads to Denial of Service attacks in the server that needs more availability. There is lack in request distribution strategies to obtain the load balanced and low computational cost to make the server in available. To overcome the request distribution problems, the traditional machine learning techniques like round robin scheduling were used. In this paper, a novel mechanism for request distribution through data migration in cluster based distributed networks with resource aware and load balanced strategies with high latency and low computation cost. To illustrate this mechanism, here the simulations results are used and the algorithm proves through the request distribution in this networks.
Key Terms: Cluster based distributed networks, Availability, Load balancing, and Denial of Service attacks
Ontology for university informatics using Protégé
-Narasimhamurthy G K,Hanumanthappa M
The information on the web is based on HTML which only human can understand and the search for information is based on the keyword. The exponential growth of information on the web requires the development of smart web called semantic web where machine and human can work together. Ontology is the core of the semantic web and is used for knowledge representation. In our work we conceptualize university knowledge through the development of university ontology with the information available on the UGC website and web pages using Protégé. The developed ontology lays a solid basis for university ontology services, such as information exchange among university practitioner and knowledge reuse in the domain of education. It also serves as the domain knowledge for developing different application in information retrieval.
Key words: ontology, Protégé, semantic web, knowledge base, information retrieval
Publication of articles is in progress...
IJCTA © Copyrights 2017| All Rights Reserved.

This work is licensed under a Creative Commons Attribution 2.5 India License.