Articles


Detection and Localization of Versatile spoofing Attackers in WSN

Kiran Kumar P N, Venkatesh D, T. Ramamohan

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 08 (2014), 2 October 2014

Wireless spoofing strikes are easy to launch and can dramatically significance the efficiency of networks. Although the recognition of a node might possibly be verified by means of cryptographic authentication, typical security approaches are not always desirable because of their extra specifications. In this paper ,We are suggest to use spatial knowledge, a physical character related with each node, hard to falsify, except for reliant on cryptography, considering the reason for one detecting spoofing attacks; Two discovering the number of attackers when multiple competitors masquerading as the similar node identity; and Three localizing multiple competitors. We are suggesting to use the spatial association of received signal strength (RSS) acquired from cord less nodes to discover the spoofing attacks. We then build up the trouble of discovering the number of attackers in form of a multiclass detection problem. Cluster-based strategies are designed to determine the number of attackers. As soon as the training facts are located, we examine using the Support Vector Machines (SVM) process to further improve the accuracy of discovering the number of attackers. In addition, we have designed an integrated recognition and localization strategy that can localize the positions of various attackers. We have ranked the strategies through two test beds using both a WiFi  and ZigBee networks in two real workplaces. Our experimental results show that our proposed techniques can achieve over 90 percent Hit Rate and Accuracy while working out the array of attackers. Localization outputs implementing a standard couple of algorithms provide effective confirmation of high accuracy of localizing multiple competitors.

Keywords – wireless spoofing attacks, localization, and cluster based strategies  

BER and SER Based Performance Analysis of BPSK and QPSK Modulation Schemes with OFDM in Rayleigh Fading Channel

Neha Mukul, Shailendra Singh Pawar, Mohd. Sarwar Raeen

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 08 (2014), 2 October 2014

BER is a key property of the digital communication system. Various types of modulation methods are used in the digital information transmission system. BER can be demarcated as the number of received bits of  a  data  stream  over  a  communication  channel  that  can  be  affected  due  to  noise,  interference  and  distortion or  bit synchronization errors. OFDM can be seen as either a modulation technique or a multiplexing technique. One of the main reasons to use OFDM is to increase the robustness against frequency selective fading or narrowband interference. In a single carrier system, a single fade or interferer can cause the entire link to fail, but in a multicarrier system, only a small percentage of the subcarriers will be affected.  The BPSK digital modulation technique for OFDM system over AWGN and Rayleigh fading channels.  From  comparison we  can  observe  that  the  OFDM- BPSK  modulation  has  no  any  specific advantage  over  a  conventional  BPSK  modulation  scheme  in  AWGN  channel  but  OFDM-BPSK  modulation  in  AWGN channel has great advantage over OFDM-BPSK modulation in Rayleigh fading channel.  The  performance  of  BER  of  BPSK  over AWGN  and  Rayleigh  channel  is  compared.  Simulation  of  BPSK  signals  is carried  with  both  AWGN  and  Rayleigh  channel. The work provides link level performance analysis of non-line of sight QPSK-OFDM data transmission over Rayleigh fading channels. Two scenarios have been considered in this thesis. Firstly, the performance of BPSK-OFDM and QPSK-OFDM over the AWGN and Rayleigh channel was obtained.

Keywords: OFDM,QPSK,BPSK,AWGN,RAYLEIGH CHANNEL

Flexural Strength of ICBPs utilizing Waste Brick Kiln Dust as a Partial Replacement of Cement adding Waterproofing Superplasticizer as a Admixture

Sharda Sharma, Shiv Kumar Yadav

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 08 (2014), 2 October 2014

Now a day’s construction of Interlocking concrete block pavements( ICBPs) generally called paver block  is going to increase rapidly with very high rate due to having easy laying, consuming less time, easy in installation and mainly due to found in a lot of variety and shapes which gives better surface finishing and attractive look. Demand of ICBPs increasing day by day for different categories like Non-traffic, Light-traffic, Medium-traffic, Heavy-traffic and Very heavy-traffic and applications likes Building premises, monument premises, landscapes, public garden, parks, domestic drives, Pedestrian plazas, shopping complexes ramps, car parks, office driveways, housing colonies, office complexes, rural roads with low volume traffic, City streets, small and medium market roads, low volume roads etc. In this experimental study we considering flexural strength for M-35 grade of paver block with partial replacement of cement with brick kiln dust (B.K.D.) at six different percentages like 5 %, 10  %,  15  %,  20  %,  25  %  and  30  % and comparison with conventional  mix that is 0 % of replacement of cement also adding 2 % waterproofing superplasticizer by weight of cement added at 7, 14 and 28 days.

Index Terms—Brick Kiln Dust (B.K.D.), Flexural Strength, OPC 43 grade cement, Superplasticizer.

Efï¬cient Spectrum Sensing for Cognitive Radio Networks via Joint Op-timization of Sensing Threshold and Duration using MATLAB/SIMULINK

Kiran Abasaheb Kanade, Prof.A.H. Ansari

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 08 (2014), 2 October 2014

Frequency band is valuable in communication media. Different Telecommunication regularity authority have the rights to assign the spectrum to the users and the policy to assign spectrum till date is static frequency allocation policy due to such policies scarcity of the spectrum present. It is required to implement the dynamic frequency allocation techniques (DSS) to improve the spectrum usage. There are different techniques for spectrum sensing like energy detection, matched filter, cyclostationary, compressive, cooperative etc. Every method has its loops and holes, Energy detection method is useful and very simple method for spectrum sensing. In energy detection method output of energy detector compares with predefined threshold value In this implementation analysis like different other parameters like ROC, probability of detection (Pd), False alarm probability (FAP), Power spectral density (PSD). The simulation results shows that use of DSS avoids the wastage of bandwidth, probability of false alarm can be attained as well as receiver operating characteristic can be monitored, the simulation results are verified.Index Terms—Cognitive radio, spectrum sensing, Energy detection, Matlab /Simulink simulation

Fractional Order Control System

Swati Singh, Ankita Kosti

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 08 (2014), 2 October 2014

Abstract:

This paper includes the study of fractional order PID control system. In this firstly the study of step input signal in time domain for getting transient response using normal control system is done. Then with the use of fractional order syetem same analysis is done and the two resuls are being compared. With the use of fractional order control system, improved response is obtained.

Wavelet Based Image Compression

Ritu, Puneet Sharma

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 08 (2014), 2 October 2014

Images require substantial storage and transmission resources, thus image compression is advantageous to reduce these requirements. Image compression is a key technology in transmission and storage of digital images because of vast data associated with them. This research suggests a new image compression scheme with pruning proposal based on discrete wavelet transformation (DWT). The effectiveness of the algorithm has been justified over some real images, and the performance of the algorithm has been compared with other common compression standards. The algorithm has been implemented using Matlab. Experimental results demonstrate that the proposed technique provides sufficient high compression ratios compared to other compression techniques.

Keywords: Image compression, DWT

A Survey on Power Consumption in Routing Protocols of MANET

Gurpreet Kaur, Upasna Garg

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 08 (2014), 2 October 2014

A mobile ad- hoc network (MANET) is autonomous, self organizing and self–configuring network with the capability of rapid deployments in response to application needs. Since all sensor nodes in wireless sensor networks work by their own fixed batteries, if any node runs out of battery, the sensor network cannot operates normally. In this condition we should employ the routing protocol which can consume the energy of nodes successfully. Many protocols for energy efficient routing in MANET networks have been suggested but LEACH and PEGASIS are most well known protocols. However LEACH consume energy heavily in the head nodes and the head nodes tend die early and PEGASIS –which is known as a better energy efficient protocol has long transfer time from a source to sink node. We proposed hybrid protocol of LEACH and PEGASIS ,  which uses the clustering mechanism of LEACH and the chaining mechanism of PEGASIS.     

Keywords:-LEACH, PEGASIS, clustering, routing protocol, cluster, cluster head.

Result Analysis for Data hiding in Motion Vectors of Compressed Video Based on Steganography

Deepika R. Chaudhari

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 08 (2014), 2 October 2014

This thesis apply steganography algorithm in a video. In earlier steganography method spatial or transformed domain is used for data hiding. But in future method we are using compressed video to hide the secrete message; we use motion vectors to encode and reconstruct both the forward predictive (P)-frame and bidirectional (B)-frames in compress video. Motion vectors are calculate by means of macro block guess mistake, which is different from the approaches based on the motion vector attributes such as the magnitude and phase viewpoint, etc. A greedy adaptive threshold is look for for each frame to achieve robustness while maintain a low prediction error level. Secrete information bits are replace with the least significant bits of motion vectors. This algorithm was experienced on special types of videos. The future method is establishing to perform well and is compare to a motion vector attribute-based method from the writing.

Index Terms—Data hiding, Motion vectors, Motion Picture Expert Group (MPEG), Steganography

Control of Power Flow in Transmission Line Using UPFC

Priyanka Rajput, C. S. Sharma

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 08 (2014), 2 October 2014

Electrical power systems is a large interrelated network which requires a careful design to maintain the system with constant power flow operation without any limitations. Flexible to improve the system stability of a power system. Unified Power Flow Controller (UPFC) is a flexible device in the FACTS family , which has the ability to  together control all the transmission parameters of power systems i.e. voltage, impedance and phase angle which determines the power flow of a transmission line. This project shows a case study to control the power flow of a power system with UPFC. In this paper we see how the upfc raise the transmission capability and decrease the power blocking in the transmission line , this study shows the results that we get by implementing a transmission system in  MATLAB. The results of the network with and without UPFC are compared in terms of active and reactive power flow in the transmission line at the bus to analyze the performance of UPFC.

Keywords :  FACTS  , UPFC , AC transmission line , statcom , sssc

Analysis of J48 Algorithm in Classification-Ebola Virus

J Uma Mahesh, K.V. Naganjaneyulu, P. Likitha, K.N.S. Sindhu Aishwarya

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 08 (2014), 2 October 2014

Data mining is the rising research area to overcome various queries and classification. It is one of the major problems in the area of data mining. In this article, we used J48 algorithm of the WEKA interface. It can be utilized for testing various datasets. J48 algorithm is based on C4.5 decision based learning. Weka is a collection of machine learning algorithms for data mining tasks. The algorithm can be applied directly to a data set or called from your own java code. Ebola virus is affected to the human kind from the affected animals. Proper care must be taken while contacting with the blood or bodily fluids of the affected animals. Proper care must be taken in case of clothing and cooking meat. Fruit bats are the main carriers of this virus. This disease has high risk of death. In this paper publication, the symptoms indicating Ebola have been analyzed in order to identify and cure the victims of the Ebola virus.

Keywords: Data Mining, WEKA, J48, Ebola virus, Decision Tree,

Remote Adaptive Sensing Based Malicious Node Detection and Security in MANET’S

Vittal S, B. Nagalakshm, Venkatesh .D

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 08 (2014), 2 October 2014

The technology of networks is shifted to non-wired networks which are widely accepted in the recent years. Addition of components to the wireless network a varied uses in many areas and one such use is found in mobile ad hoc network (MANET).All the hosts in the network have a dual functionality of both sending and receiving messages within Transmission range. Any failure of single node in the network will not harm the network functionality, has the capacity of rebuilding itself, and therefore its finds its use in defense and many other applications. but  still there exists threat of location of nodes is not centralized .Any attack of a virus or any other threats to the network which can be self-replicating is called as an intrusion and such intrusion must be detected and also prevented .This is required in case of MANETS’S are use in various commercial applications. This intrusion detection system is named as RAMND for MANET’S with which higher security can be achieved.

Keywords— Elliptic Curve Cryptography, Mobile Ad hoc Network, Remote Adaptive Sensing Based Malicious Node Detection and Security in MANET’S

A Study on Stomatal Complex of Certain Epiphytic Orchids

Prashantha Kumar H G, Krishnaswamy K

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 08 (2014), 2 October 2014

 In the present study stomatal complexes of nine species of epiphytic orchids were studied. All the leaf of selected orchids  are leathery in texure, Hypostomatic condition is predominant, The minimum stomatal index was recorded in Oberonia santapaul 3.83, where  as maximum is in Polystachea  flavascence 17.45. Highest  stomatal frequency was found in Eria mysorensis 12238.32 and  least stomatal frequency is recorded in Gastrochilus acaulis  2725.53 In the present study three major types of stomata,such as paracytic,anomocytic and anisocytic type  of stomata were recorded.

Comparative Study of VOC Sensors Based on Ruthenated MWCNT/SnO2 Nanocomposites

Vladimir Aroutiounian, Zaven Adamyan,Artak Sayunts, Emma Khachaturyan, Arsen Adamyan, Klara Hernadi, Zoltan Nemeth, Peter Berki

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 08 (2014), 2 October 2014

Thick-film VOCs sensors based on ruthenated multi-walled carbon nanotubes coated with tin-dioxide nanoparticles nanocomposite structures (MWCNTs/SnO2) are prepared using three methods: hydrothermal synthesis, sol–gel technique and their combined process. Properties prepared nanocomposite powders are characterized by TEM and SEM techniques. It is shown that the optimal conditions for applications as acetone, toluene, ethanol and methanol vapors sensors in view of high response and selectivity relative to each other depend on choice of material synthesis method, mass ratio of the nanocomposite components and selected operating temperature. MWCNTs/SnO2 sensor structures having the mass ratio of the components 1:4 and 1:24 exhibit selective sensitivity to acetone and toluene vapors at 150oC operating temperature, respectively. The samples with 1:200 mass ratio of the nanocomposite components show the selective and response to acetone vapor exposure in the range of 200-250oC operating temperatures. The high sensitivity to ethanol and methanol vapors at 200oC operating temperature was revealed for the sensor structures made by all three proposed methods with the 1:8, 1:24, 1:50 and 1:66 ratio of the components.

Keywords: MWCNTs/SnO2, VOCs, sensor acetone, toluene, ethanol, methanol

Effect of Fuel Injection Pressures on Performance Characteristics and Emission Analysis of D.I Diesel Engine Running on Honne Oil and Diesel Fuel Blend

R. Bhaskar Reddy, B. Siddeswara Rao

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 08 (2014), 2 October 2014

In future demand for fossil fuels and environmental effects, a number of renewable sources of energy has been studied in worldwide. An attempt is made to apt of vegetable oil for diesel engine operation, without any change in its old construction. One of the important factors which influence the performance and emission characteristics of D.I diesel engine is fuel injection pressure. In this project honne oil has to be investigated in a constant speed, on D.I diesel engine with different fuel injection pressures.

The scope of the project is to investigate the effect of injection pressures on a blend of 50% honne oil with 50% diesel and compare with pure diesel on performance and emission characteristics of the diesel engine. Two tested fuels were used during experiments like 100 % diesel and a blend of 50% honne oil mixing in the diesel. The performance tests were conducted at constant speed with variable loads.

From experiment results it was found that with honne oil- diesel blend the performance of the engine is better compared with diesel. The break thermal efficiency and mechanical efficiencies were found to be maximum at 200 bar injection pressure with both honne oil- diesel blend, compared with 180 bar and 220 bar. The brake specific fuel consumption was to be minimum at 220bar compared with 180 bar and 200 bar. Hydro carbon emissions of honne oil-diesel operation were less than the diesel fuel mode at all fuel injection pressures.

Keywords—Direct injection diesel engine;Fuel injection pressure; Honne oil; Gas analyser.

Market Reaction to “Share Buy-Back†of Reliance Industries Limited

Hari Krishna Mudipalli, Prof. D.V. Ramana

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 08 (2014), 2 October 2014

Indian corporations currently view share buy-backs as an effective capital management tool that has the potential to increase shareholder value. As a consequence, the level of buy-back activity has intensified in recent years with many corporations engaging in this practice. Share buy-backs were introduced in India in the year 1998. All major corporate have given attention to this concept and today India is a well known face in the financial market for this reason. Companies in India can buy-back their share either through open market route or through tender offer route. Majority of companies have been using the open market route through stock exchange. It was found out that RIL has underperformed the benchmark with poor returns prior to the announcement of buy-back, indicating undervaluation of shares and positive abnormal return in the post announcement indicating signaling effect of share buy-back during 2011-2013. This paper examines the reaction of market on the announcement of share buy-back of RIL.

Keywords: Share Buy-back, Reliance Industries Limited (RIL), Market reaction

Experimental Study on the Hardened Properties of Concrete by Using Soft Drink Bottle Caps as Partial Replacement for Coarse Aggregates

Darshan Narayana, Rajani V Akki, Sharath B P

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 08 (2014), 2 October 2014

Cement concrete is the most extensively used construction material in the world because of its great workability and can be moulded to any shape. Ordinary cement concrete possesses a very low tensile strength, limited ductility and little resistance to cracking because of the presence of internal micro cracks, which leads to failure of the concrete. In this modern age, civil engineering constructions have their own structural and durability requirements, depending upon its purpose and for this, modification in traditional cement concrete is must. Addition of different types of fibers to concrete in specific percentage improves the mechanical properties, durability and serviceability of the structure. It is learnt that Steel Fiber Reinforced Concrete (SFRC) has its superior resistance to cracking and crack propagation. Hence an attempt is made to study the influence of cut bottle caps as a steel fiber concrete as partial replacement for coarse aggregates and studying the parameters like compressive strength, split-tensile and flexural strength of conventional and steel fiber reinforced concrete Therefore it can be seen that compressive, split-tensile and flexural strength of fiber reinforced concrete has been increased as compared to conventional concrete by replacing coarse aggregates with bottle caps.

Key Words: Bottle Caps, Steel fibers, fiber reinforced concrete, compressive, split-tensile and flexural strength.

Design and Analysis of Micro-Mixer for Enhancing Mixing Performance

Supriya Sunil Ghadge, Nitin Misal

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 08 (2014), 2 October 2014

Design and analysis of various micro-mixers for enhancing the mixing performance is presented in this. The shape of micro channels is an important design variable to achieve the desired mixing performance. However, if obstacles and wavy channels are included into the channel design, mixing improves. Micro-mixer with obstacles located at the centre of the channel with different configurations is used to enhance mixing performance, so as to reduce the mixing length. Different shapes of obstacles such as rectangle, square and rhombus are analysed by comparing it with plain Y shape circular chamber mixer. For the same boundary conditions, the rectangular obstacles at the centre of the chamber, generally gives minimum mixing length.

Keywords: Micro-mixer, Y channel, Mixing Performance, COMSOL Multiphysics.

Security Considerations in Wireless Ad-hoc Networks Using Commitment Schemas

M. Kiranbabu, D. Varun Prasad

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 08 (2014), 2 October 2014

The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional interference with wireless transmissions can be used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Although the attack models are classified as both external and internal with the latter being more serious because the “always-on†strategy employed in external model has several disadvantages. In an internal threat model an adversary is assumed to be aware of network secrets and the implementation details of network protocols at any layer in the network stack. The adversary exploits his internal knowledge for launching selective jamming attacks in which specific messages of “high importance†are targeted. Although RREQ, RREP, RERR, RREP-ACK are primary Message Formats in reactive protocols, the adversary selectively targets RREQ and RREP packets in the network to launch jamming attacks. Prior approaches concentrated on using commitment schemes that are cryptographic primitives to hide the RREQ and RREP packets from the purview of the adversary. These approaches being successful, I propose to use them along with intrusion detection techniques for identifying compromised routers to increase overall network security significantly by marginalizing the working boundaries of an adversary, thus risking exposure. A practical implementation validates our claim.

Stability Analysis of ‘L-Shaped’ PSC Box Girder Bridge

Mr. S. B. Dhobale, Prof. K. S. Upase

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 08 (2014), 2 October 2014

The structural behaviour of box girder is complicated, which is difficult to analyse in its actual conditions by conventional methods. Prestress technology has been a part of the ‘Bridge Design Practice Manual’ since the1960 edition. Over the years, revisions and updates have been made. Again, there is a need for updating. This edition reflects revised friction coefficients and detailed computer output.

In present study a two lane, two cell box girder bridge made up of prestressed concrete is analysed for moving loads as per IRC:6 recommendations, Prestressed Code (IS: 1343) and also as per IRC: 18 specifications. The analysis of PSC box girder using ‘SAP 2000-12 Bridge wizard’. The various span/depth ratios considered to get the proportioning depth at which stresses criteria and deflection criteria get satisfied.

The contribution of prestressing steel is incorporated, while the material and geometric nonlinear analysis of plane prestressed concrete frames including the time dependent effects due to load & temperature history, creep, shrinkage, and aging of concrete and relaxation of prestress were also considered. For the construction stage analysis, many sophisticated computer programs for the analysis of segmentally erected prestressed concrete bridges considering the time-dependent effects of concrete has been developed to predict the bridge response.

Prestressing tendons may be stressed, prestressed, and removed, while a traveling formwork can be modelled. However, most computer programs have some limitations in wide use because of complexities in practical applications.

Keywords: Concrete Box Girder Bridge, Prestress Force, Eccentricity, Prestress Losses, Reinforcement, Tendons, Flexure strength, shear strength,Analysisand computation. SAP Model.