Girl Image
Text

Volume 1, Issue 8

 

 

S.No
Article Title & Author Name
Page
Download
1. AUTOMATED WEB PATROLING WITH EXPLOIT DETECTION OF MALICIOUS SITES
Ms. Rajashree C. Sonawane, Prof. Mrs. S.M.Jaybhaye

Abstract
Client-side attacks are on the rise malicious websites that exploit vulnerabilities in the visitor's browser are posing a serious threat to client security, compromising innocent users who visit these sites without having a patched web browser. Malicious websites are websites which have any kind of content that could be a threat for the security of the clients requesting particular sites. Currently, there is neither a freely available comprehensive database of threats on the Web nor sufficient freely available tools to build such a database. The purpose of an exploit is almost always to introduce some piece of arbitrary code on the victim machine, as a way to achieve a larger attack goal. It is not uncommon to see a malicious web page attempting to exploit multiple browser vulnerabilities in order to maximize the chance of a successful attack. Hence Honey Monkeys, introduce the Monkey-Spider project. Utilizing it as a client honey pot, the portray the challenge in such an approach and evaluate system as a high-speed, Internet scale analysis tool to build a database of threats found in the wild. Furthermore, it evaluates the system by analysing different crawls performed.
01-06
2. DESIGN OPTIMIZATION OF REINFORCED CONCRETE BEAMS USING ARTIFICIAL NEURAL NETWORK
Sara A. Babiker, Fathelrahman. M. Adam, Abdelrahman E. Mohamed

Abstract
This paper presents an Artificial Neural Networks (ANN) model for the cost optimization of simply supported beams based on the designed according to the requirements of the ACI 318-08 code. The model formulation includes the cost of concrete, the cost of formwork and the cost of reinforcement. An example of simply supported beam was design with adopting many cross sections with many span lengths, in order to demonstrate its capabilities in optimizing the beam design. A computer models have been developed for the structural design optimization of reinforced simple beams using NEURO SHELL-2 software and the results obtained were compared and verified with the results obtained by using classical optimization model developed in well known spreadsheets Excel software which it use the generalized reduced gradient (GRG) and the results obtained were showed good agreement with other

Keywords: Reinforced Concrete Beam, Cost Optimization, Artificial Neural Networks, Generalized Reduce Gradient.
07-13
3. A ROBUST PERFORMANCE OF A VOLTAGE SOURCE CONVERTER BASED HIGH VOLTAGE DIRECT CURRENT
Nadir Ghanemi, Djamel Labed

Abstract
In this paper, we presented the modelling of VSC (Voltage Source Converter) of a DC link in the field of Park.
A control strategy based on the separation of active and reactive power is proposed. Simulation in Matlab / Simulink system
proposed under normal operation and faulty operation allows us to evaluate the performance of a VSC HVDC.


Keywords:––VSC, HVDC, decoupled control
14-19
4. PORTABLE AND ECONOMIC SMART GENERIC DATA SERVER FOR SMALL SCALE BUSINESS
Manoj N Revanker, Manoj Kumar M V, Puneetha B H, Prashanth B S

Abstract
Now a day internet plays a very major role in business processes. The internet acts as the kind of the bonding between the customers and an organization (probably business), the customer can obtain the information of his desire by making the single click on organization's website. But, the major infrastructure to carry out this process demands the design, maintenance, hosting of website from the organization side, and it also demands the access to the internet from the customer side (in order to access the internet customer must have to have either personnel computer or any smart phone), but unfortunately we cannot find all the customers with above all mentioned requirements. Therefore, this paper focuses on the issue of building the portable and economic smart data server for small scale business applications. This proposed concept in this paper eliminates the need of internet, hosting, website maintenance, and costly hardware from organization side. And it also eliminates the need of personnel computer, or internet enabled smart mobile phone from customer side. Thus the concept proposed in this paper provides the economic, efficient, portable smart data server for small scale business. To implement this proposed concept the cost involved will be too less, the only requirement is one smart mobile phone (here we used android mobile phone). The prototype has been demonstrated using the android smart mobile phone; this can further be extended to any available smart mobile phones in market.

Keywords:––Broadcast receiver, manifest, SQLite, Context.
20-25
5. PREY-PREDATOR MODELS IN MARINE LIFE
Prof.V.P. Saxena, Neeta Mazumdar

Abstract
The paper discusses the mathematical model based on the prey-predator system, which diffuses in a near linear
bounded region and the whole region is divided into two near annular patches with different physical conditions. The model
has been employed to investigate the population densities of fishes depending on time and position. Finite Element Method
has been used for the study and computation. The domain is discretized into a finite number of sub domains (elements) and
variational functional is derived. Graphs are plotted between the radial distance and the population density of species for
different value of time.


Key words:––Discretization, diffusion, intrinsic growth, Laplace transform, variational form.
26-30
6. AN INVESTIGATION OF NANOTUBE-INTEGRATED BUCKYSHEETS' PROPERTIES
WITH MOLECULAR DYNAMICS MODELING AND ANALYSIS

Y. Ji, C.J. Soong, Y.J. Lin

Abstract
To better understand the mechanical properties of structures strengthened by carbon nanotubes integration
and/or embedding, the Young's moduli of carbon nanotubes and carbon nanotube embedded thin structures are evaluated
using atomic-based mechanics and molecular dynamic (MD) simulation studies in this work. Buckysheets with defined
ingredients with 50 mg SWNT in 500 ml surfactant-NaOH solution have been fabricated in house for the investigation with
the objectives to discovering mechanical properties alteration due to carbon nanotubes integration. The results show that the
Young's moduli of single walled (10, 10) carbon nanotubes are ranging from 0.75 TPa to 0.9 TPa, which yields good
agreement with the relevant data in the literature. For single layer buckysheets of single-walled tubes, the simulations result
in a Young's Modulus around 0.3 TPa. A Four-wall nanotube [(5, 5), (10, 10), (15, 15), (20, 20)] model is built to examine
Young's modulus of multi-walled nanotubes. A slightly lower value than that of the single walled model is obtained. The
Young's modulus of the fabricated buckysheets exhibits similar characteristics as that of the multi-walled nanotubes'. It is
also found that the larger the separation distance between nanotubes in the buckysheet model, the smaller the value of
Young's modulus of the structure. The comparisons of the results between the MD simulations and the previously done
experimental testing on buckysheets' mechanical properties reveal some discrepancies for their Young's moduli. The higher
Young's moduli values for buckysheets obtained in the MD simulations are due to the exclusion of particles impurity,
uneven thickness, imperfect nanotubes' alignments, and so on. The study implies that when the fabrication techniques of
buckysheets are continuously improved, these thin films carbon nanotube-integrated structures being created will possess
higher strengths approaching those of the nanotubes.


Keywords:––Nanotubes, Buckysheets, Engineering properties, Molecular dynamics computation, Young's moduli
31-37
7. SEER-IPLAT: THE ISOLATED PLATFORM FOR SEISMIC MITIGATION
Azlan Adnan, Patrick Liq Yee Tiong

Abstract
This paper presents finite element study of a four-storey steel frame building under Pomona earthquake. Time history of the earthquake ground motion was used to investigate the seismic response of the prototype building that was not designed for any earthquake resistance. The building was designed according to BS 5950: 2000 under vertical load only. A newly proposed seismic isolation platform, namely Seer-iPlat was tested for its feasibility and functionality in mitigating the seismic threat. The system was a modification of existing base isolation technique into isolating only each respective floor instead of the whole building. Such method if proven to be efficient would be beneficial in rehabilitation of existing or older building such as museums, hospital surgery room, and sensitive operational center. As the existing ductility design or seismic isolation approach seemed to be requiring more complicated effort in implementation particularly for existing building, Seer-iPlat would resolve this problem. From the analysis results, it was clearly revealed that by installing Seer-iPlat, the column axial force, storey shear and moment was reduced significantly by 63.2, 67.0 and 71.2 percent respectively. Therefore, it has been proven that Seer-iPlat was effective enough in rehabilitation of existing building in terms of seismic threats.

Keywords:––base isolation, isolation platform, seismic, seismic rehabilitation, steel frame building
38-44
8. 2D BLOCK FOR SPATIAL CONVOLUTION
Dr K Rameshbabu, Phanimadhav.yannam, suranbharahchandra

Abstract
This paper proposes an algorithm based on sub image-partitioning strategy. The proposed Scheme divides a grayscale (or color) image into overlapped 6×6 blocks each of which is partitioned into four small 3x3 non-overlapped sub-images. A new spatial approach for efficiently computing 2-dimensional linear convolution or cross-correlation between suitable flipped and fixed filter coefficients (sub image for cross-correlation) and corresponding input sub image is presented. Computation of convolution is iterated vertically and horizontally for each of the four input sub-images. The convolution outputs of these four sub-images are processed to be converted from 6×6 arrays to 4×4 arrays so that the core of the original image is reproduced. The present algorithm proposes a simplified processing technique based on a particular arrangement of the input samples, spatial filtering and small sub images. This results in reducing the computational complexity as compared with other well-known FFT-based techniques. This algorithm lends itself for partitioned small sub-images, local image spatial filtering and noise reduction. The effectiveness of the algorithm is demonstrated through some simulation examples.

Keywords:––Spatial Convolution, Algorithm, Partitioning, Flipping, Simulation.
45-54
9. EMEDICINE -- ICT IN HEALTH CARE, SOLUTION FOR RURAL INDIA: THE SCENARIO WITH SOFTWARE & EMBEDDED SYSTEM
Dr. Sajidullah S Khan, Onkar S Kemkar

Abstract
Health Care sector in India has witnessed significant growth during the last few years, both in quality and capacity. In spite of such developments, heath care facilities in the country remain inadequate to meet the needs of the citizens, particularly in rural areas, where approximately 70% of the people live. To address this problem, the government has launched major national initiatives such as National Rural Health Mission, establishment of six new AIIMS like institutions, up gradation of existing public hospitals and labs, etc. As the health sector is poised for major growth in next decade, the sheer size of healthcare sector in the country will necessitate extensive use of information and communication technology (ICT) infrastructure, services and databases for policy planning and implementation. Such a framework would require services based on inter-operable and sharable technology, connecting various institutions and service providers. This paper states our vision & proposed solution for rural populace of India.

Keywords:––e-medicine, ehealth, health informatics, telemedicine, solution for rural India, embedded system, bioinformatics, ban
55-60
10. PERFORMANCE EVALUATION OF CONTROL STRATEGIES FOR CMLI BASED STATCOM IN VOLTAGE REGULATION
Dr. Jagdish Kumar

Abstract
In this article, performances of two control strategies are evaluated for cascade multilevel inverter based STATCOM for reactive power compensation and power system bus voltage regulation. In direct control scheme modulation index (switching angles) is varied at constant dc capacitor voltage in order to vary the output voltage of STATCOM while in case of indirect control scheme the dc capacitor voltage is varied at constant modulation index. Due to variation in modulation index, THD produced in output voltage varies while at constant modulation index THD can be kept at minimum level. On the other hand, output voltage variation is slow in case of indirect control scheme due to slow variation in dc capacitor voltage. The above facts have been verified by using digital simulation in MATLAB/SIMULINK environment on an 11-level cascade multilevel inverter based STATCOM under variations of load. The simulated results have been validated through experimental results on 11-level cascade multilevel inverter based STATCOM and it has been found that experimental results are in close agreement with simulated results.

Keywords:––cascade multilevel inverter, dc capacitor voltage, direct control scheme, indirect control scheme, modulation index, total harmonic distortion.
61-69
11. A STUDY OF SQL INJECTION IN BANKING TRANSACTION
Varun Tiwari, Kimmi Makhija, Jyoti Ratra

Abstract
In these days the use of the World Wide Web (WWW) is increasingly rapidly, so there are lot of problems comes from hacking. One of the most important fields of Hacking is Banking Sector. In case of Banking System there are lots of transactions daily, soproviding the security from the attackers is necessary. Now these days the major issues of the security in the Banking Transaction are SQL Injections, which are creating a serious issues regarding the attacks of Banking applications and acquiring the secret information's such as id and Password and accessing the bank databases through the SQL injections. My main motive to presenting this paper is describing the sql injection method, techniques and how to prevent this situation? These methods we can protect transaction from the attack by using SQL injections.These methods are used to denote the parameters that are used to attack by the SQL injections and analyzed by the transactions which cause illegal access. By these methods we can totally protect the applications without any hacking of the database and completely condemned the attacks and it will not generate any wrong transactions as a correct one. In an SQL injection attack, an attacker might insert a malicious SQL query as input to perform an unauthorized database operation. Using SQL injection attacks, an attacker can retrieve or modify confidential and sensitive information from the database.

Keywords:––SQLInjection, Security, Detection and Prevention.
70-75
12. AN OPTIMAL APPROACH FOR TESTING EMBEDDED MEMORIES IN SOCS
P.RameshYadav, B.Prathap Reddy

Abstract
In general, RAM's are playing very important roles in design of SOC's, by improving the yield of RAM's we can improves the yield of SOC. yield of the chip is improves by repairing the RAM's in SOC. so many techniques are came to improve the yield of the SOC. the current paper presents the efficient technique for improves the yield of the SOC, which is called Reconfigurable Built-in self Repair scheme for RAM's in SOC(Re-BISR).in the technique we are using the spare cells (Spare rows/Spare columns) for eliminating the faults in the RAM's. The proposed repair scheme is increasing the repair rate and reconfigurable for less area, used to repair multiple RAM's with different sizes and redundancy. The experimental results show that proposed Re-BISR technique reduces the area and increases the yield of the RAM's.

Keywords:––Built-in self-test, Built-in self-repair, Built-in redundancy-analysis, memory testing, semiconductor memory.
76-80
13. ENERGY STORAGE SYSTEM FOR PASSIVE COOLING, A REVIEW
Anish. R, S.R. Karale

Abstract
Thermal energy storage is one of the key technologies for energy conservation, and therefore, it is of great practical importance. Cold energy storage systems are designed to produce the necessary cooling storage during off peak time in order to utilize advantage of cheaper electric utility rates. This paper investigates the effects of various design and operating factors on the optimal controls of using the cold storage system to minimize the operating costs while maintaining adequate occupant comfort conditions in commercial buildings. The basic operating strategy of the active cold energy storage system is to charge the ice storage by operating the chiller during low electrical charge periods. During the on-peak periods, the ice storage is discharged to meet the building cooling requirements. As a result, it is possible to reduce or even eliminate the chiller operation during on-peak time. This paper is a review of the energy storage cooling techniques used in the recent past.

Keywords:––Air conditioning system, energy saving, phase change material, refrigeration system, thermal energy storage
81-83
14. ENERGY AND CLEAN ENVIRONMENT-INDIAN PERSPECTIVE
Tejinder Kumar Jindal

Abstract
Atmosphere pollution is the major concern today among the environmentalists and technologists. The three major factors responsible for the pollution are power generation, transport and cooking, where major chunk of the fossil fuels is burnt. This huge burning of the fossil fuels also affects the energy security as the fuel reserves will not last long. So the need of the hour is to save the fuel reserve and environment. This is to be achieved by development of the technologies and fuels, which help in minimizing the environmental pollution and widespread use of the alternate sources of energy, which are inherently clean too. In this paper, the possibilities and the breakthroughs achieved in this direction are discussed in the Indian context.
84-90

 

 

Journal Section
Author Section
Reader Section
Follow Us