Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Udayakumar, R.
- Web Portal Visits Patterns Predicted by Intuitionistic Fuzzy Approach
Abstract Views :415 |
PDF Views:0
Authors
Affiliations
1 School of Computing, Bharath University, Selaiyur, Chennai-600073, IN
2 School of Computing Sciences, Bharath University, Selaiyur, Chennai-600073, IN
1 School of Computing, Bharath University, Selaiyur, Chennai-600073, IN
2 School of Computing Sciences, Bharath University, Selaiyur, Chennai-600073, IN
Source
Indian Journal of Science and Technology, Vol 6, No S5 (2013), Pagination: 4549-4553Abstract
Web mining is applied to reflect the importance of webpages and to predict the web domain visits of various users. An IF-inference system is developed for this purpose. This paper presents basic notions of web mining with fuzzy inference systems based on the Takagi-Sugeno fuzzy model. At first, it scans the sequences of visits in database once, finds all the weighted frequent items, and produces a sparse matrix for that sequence item set from which basic statistics like moving averages and exponentially smoothing averages are calculated. Then we construct a IF-inference system using intuitionistic approach for predicting the web domain visits. We obtain the results of such system.Keywords
Web Mining, If-inference System, Web Domain Visits, Fuzzy Logic, Prediction, Sparse Matrix, Moving Averages, Exponential SmoothingReferences
- Cooley R, Mobasher B et al. (1997). Web mining: information and pattern discovery on the world wide web, Proceedings of the 9th IEEE International Conference on Tools With Artificial Intelligence, (ICTAI ’97), Newport Beach, CA.
- Zaine O, and Han J (1998). WebML: Querying the world wide web for resources and knowledge, Proceedings of the International workshop on web information and data management, WIDM´98, Bethesda.
- Kuncheva L I (2000). Fuzzy classifier design, A Springer Verlag Company, Germany.
- Bandemer H, and Gottwald S (1995). Fuzzy sets fuzzy logic, fuzzy methods, John Wiley and Sons Inc., New York.
- Olej V (2003). Modeling of economics processes by computational intelligence, Hradec Kralove, (in Slovak).
- Trešl J (1999). Statistical methods and capital market, 1st edition, Prague, (in Czech).
- Montiel O et al. (2008). Mediative fuzzy logic: A new approach for contradictory knowledge management, Soft Computing, vol 20, No.3, 251–256.
- Guillaume S (2001). Designing fuzzy inference systems from Data: An Interpretability-oriented review, IEEE Transactions on Fuzzy Systems, vol 9, 426–442.
- Available From: http://www.wseas.us/e-library/transactions/computers/2010/88-321.pdf
- Fuzzy Logic Toolbox™ User’s Guide© Copyright 1995–2012, The Math Works, Inc.
- Available From: http://archive.ics.uci.edu/ml/datasets/MSNBC.com+Anonymous+Web+Data.
- Availbale From: http://www.mathworks.in/help/matlab/ref/ sparse.html
- Kumaravel A, and Pradeepa R (2012). On constructing regular expression of web page traversals for efficient filtering, IEEE Conference Publications, 156-160.
- Introducing an Efficient Programming Paradigm for Object-oriented Distributed Systems
Abstract Views :358 |
PDF Views:0
Authors
Affiliations
1 Department of Information Technology, Bharath University, Chennai-600073
2 School of Computing, Bharath University, Chennai-73, IN
1 Department of Information Technology, Bharath University, Chennai-600073
2 School of Computing, Bharath University, Chennai-73, IN
Source
Indian Journal of Science and Technology, Vol 6, No S5 (2013), Pagination: 4596-4603Abstract
Implementing a distributed process using object oriented programming is challenging especially for clusters of nodes ensuring the availability. Java happens to be well suited for writing object oriented programs for applications which needs modularity and high degree of cohesion [2]. In this paper our objective is to propose appropriate programming paradigms for loosely coupled distributed and object-oriented systems with a specific focus on parallel programming and client-server object computing. We select a prototype tool made based on the research outcome as found in [1] for this purpose. This research prototype tool 'Vishwa' provides a very good starting point for graduate students, engineers and scientists in academia, industry and government to present their tasks using the aspects of parallel and distributed computing. The learning curve is shorter in the domain of grid due to the simplicity in deploying and processing with this tool. We also demonstrate with a case study for bringing out the easiness in splitting the given job into subtasks and executed in this type of grid environment.Keywords
Grid Computing, Distributed Computing, Object Oriented Programming, Speedup Ratio, MiddlewareReferences
- Janakiram D (2010). Grid Computing, Research Monograph Tata Mcgraw-Hill Publishers.
- Srinivas V, and Janakiram D (2009). Node capability aware replica management for peer-to-peer grids, IEEE Transactions on Systems, Man, and Cybernetics Part A: Systems and Humans, vol 39, No. 4, 807–818.
- Berman F, Fox G et al. (2003). Grid computing: making the global infrastructure a reality, 1st Edn., Wiley Series.
- Joseph, Joshy, and Fellenstein Craig (2003). Grid Computing, Prentice Hall PTR.
- Joseph J, Ernest M et al. (2004). Evolution of grid computing architecture and grid adoption models, IBM Systems Journal, vol 43(4), 624–645.
- Baker M, Apon A et al. (2005). Emerging Grid Standards, IEEE Computer, vol 38(4), 43–50.
- Eddy Carona et al. (2007). Definition, modeling and simulation of a grid computing scheduling system for high throughput computing, Future Generation Computer Systems, vol 23(8), 968–976.
- Parashar M, and Browne J C (2005). Conceptual and Implementation Models for the Grid, Proceedings of the IEEE, vol 93(3), 653–668.
- Atiknson M, Chervenal A et al. (2004). Data Access, Integration and Management, The Grid: Blueprint for a New Computing Infrastructure, Morgan Kauffmann.
- Chawathe Y, Ratnasamy S et al. (2003). Making Gnutella-like P2P Systems Scalable, SIGCOMM’03, Available From: http://dcg.ethz.ch/lectures/ws0506/seminar/papers/scalable_p2p.pdf
- Rowstron A, and Druschel P (2001). Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems, IFIP/ACM International Conference on Distributed Systems Platforms (Middleware), 329–350.
- k-anonymity Based Privacy Preserving for Data Collection in Wireless Sensor Networks
Abstract Views :463 |
PDF Views:0
Authors
Affiliations
1 Bharath University, Chennai-600073
2 Dept of MCA, Jerusalem College of Engineering, Chennai
3 Dept. of Information Technology, Bharath University, Chennai-600073
1 Bharath University, Chennai-600073
2 Dept of MCA, Jerusalem College of Engineering, Chennai
3 Dept. of Information Technology, Bharath University, Chennai-600073
Source
Indian Journal of Science and Technology, Vol 6, No S5 (2013), Pagination: 4604-4614Abstract
In this paper, k-anonymity notion is adopted to be used in wireless sensor networks (WSN) as a security Framework with two levels of privacy. A base level of privacy is provided for the data shared with semi trusted sink and a deeper level of privacy is provided against eavesdroppers. In the proposed method, some portions of data are encrypted and the rest is generalized. Generalization shortens the size of the data transmitted in the network causing energy saving at the cost of information loss. On the other hand, encryption provides anonymization with no information loss and without saving energy. Thus, there is a tradeoff between information loss and energy saving. In our system, this tradeoff is intelligently managed by a system parameter, which adjusts the amount of data portions to be encrypted. We use a method based on bottom up clustering that chooses the data portions to be encrypted among the ones that cause maximum information loss when generalized. In this way, a high degree of energy saving is realized within the given limits of information loss. Our analysis shows that the proposed method achieves the desired privacy levels with low information loss and with considerable energy saving.Keywords
Anonymity, Wireless Sensor Networks, Data PrivacyReferences
- Pfitzmann A, and Khntopp M (2000). Anonymity, unobservability, and pseudonymity - A proposal for terminology, Designing Privacy Enhancing Technologies, Lecture Notes in Computer Science, vol 2009/2001, 1–9.
- Chaum D (1988). The dining cryptographers problem: Unconditional sender and receipent untraceability, Journal of Cryptology, vol 1(1), 65–75.
- Chaum D (1981). Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the Associations for Computing Machinery, vol 24(2), 84–88.
- Pfitzmann A, Pfitzmann B et al. (1991). ISDN-Mixes: untraceable communication with very small bandwidth overhead, Proceedings of the GI/ITG Conference on Communication in Distributed Systems, 451–463.
- Gulcu C, and Tsudik G (1996). Mixing e-mail with BABEL, Symposium on Network and Distributed Systems Security (NDDS ’96).
- Reiter M K, and Rubin A D (1999). Anonymous web transactions with crowds, Communications of the ACM, vol 42(2), 32–48.
- Reed M G, and Syverson P F (1998). Anonymous connections and onion routing, IEEE Journal on Selected Areas in Communications, vol 16 (4), 482–494.
- Kong J, Hong X et al. (2003). An anonymous on demand routing protocol with untraceable routes for mobile ad hoc networks, Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking & Computing, 291–302.
- Samarati P, and Sweeney L (1998). Generalizing data to provide anonymity when disclosing information, Proceedings of the 17th ACM SIGMOD-SIGACT-SIGART Symposium on the Principles of Database Systems.
- Fung B C M, Wang K et al. (2009). Privacy-preserving data publishing: a survey on recent developments, ACM Computing Surveys.
- Meyerson A, and Williams R (2004). On the complexity of optimal k-anonymity, Proceedings of the 23rd ACM SIGMOD-SIGACTSIGART Symposium on the Principles of Database Systems, 223–228.
- Yick J, Mukherjee B et al. (2008). Wireless sensor network survey, Computer Networks, vol 52(12), 2292–2330.
- Carman D W, Kruus P S et al. (2000). Constraints and approaches for distributed sensor network security, NAI Laboratories, Technical Report 00-010.
- Michener C D, and Sokal R R (1957). A quantitative approach to a problem in classification, Evolution, vol 11, No. 2, 130–162.
- Chan H, Perrig A et al. (2003). Random key predistribution schemes for sensor networks, Proceedings of 2003 Symposium on Security and Privacy, 197–213.
- Du W, Deng J et al. (2005). A pairwise key predistribution scheme for wireless sensor networks, ACM Transactions on Information and System Security (TISSEC), vol 8(2), 228–258.
- Heinzelman W, Kulik J et al. (1999). Adaptive protocols for information dissemination in wireless sensor networks, Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom’99).
- Intanagonwiwat C, Govindan R et al. (2000). Directed diffusion: a scalable and robust communication paradigm for sensor networks, Proceedings of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom’00).
- Fung B C M, Wang K et al. (2005). Top-down specialization for information and privacy preservation, Proceedings of the 21st International Conference on Data Engineering, 205–216.
- Sweeney L (2002). Achieving k-anonymity privacy protection using generalization and suppression, International Journal of Uncertain, Fuzziness Knowledge-Based Systems, vol 10(5), 571–588.
- Culler D, and Estrin M S D (2004). Overview of Sensor Network, Computer, vol 37(8), 41–49.
- Sweeney L (2002). A model for protecting privacy, International Journal on Uncertainty Fuzziness and Knowledge-based System, vol 10(5), 557–570.
- QOS Aware Privacy Preserving Location Monitoring in Wireless Sensor Network
Abstract Views :433 |
PDF Views:0
Authors
Affiliations
1 Dept. of IT, Bharath University, Chennai-600 073
2 Dept. of Computer Applications, Jerusalem College of Engg., Chennai-600 100
3 Department of Information Technology, Bharath University, Chennai-600073
1 Dept. of IT, Bharath University, Chennai-600 073
2 Dept. of Computer Applications, Jerusalem College of Engg., Chennai-600 100
3 Department of Information Technology, Bharath University, Chennai-600073
Source
Indian Journal of Science and Technology, Vol 6, No S5 (2013), Pagination: 4648-4652Abstract
Sensor networks have been widely employed in many real-time applications. One of the most obvious challenges appearing to threaten the successful deployment of sensor networks is privacy issues including source-location privacy which cannot be adequately addressed by general security mechanisms. Focusing on this important kind of privacy, among many approaches proposed in literatures, self-adjusting phantom routing is a very successful one. But it still has some weaknesses. In this paper, we propose an improved version of it to enhance its performance. This method can decrease energy consumption and communication cost while increase the accuracy of the aggregate locations by minimizing their monitored areas.Keywords
Sensor Network, Privacy, Context Privacy, Source-LocationReferences
- Ozturk C, Zhang Y et al. (2004). Source-location privacy in energy-constrained sensor network routing, Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks SASN ‘04, 88–93.
- Kamat P, Zhang Y et al. (2005). Enhancing source-location privacy in sensor network routing, Distributed Computing Systems, ICDCS 2005, Proceeding 25th IEEE International Conference, 599–608.
- Zhang L (2006). A self-adjusting directed random walk approach for enhancing source-location privacy in sensor network routing, Proceedings of the 2006 International Conference on Wireless communications and mobile computing IWCMC ‘06, 33–38.
- Son B, Shin S et al. (2007). Implementation of the realtime people counting system using wireless sensor networks, International Journal of Multimedia and Ubiquitous Engineering (IJMUE), vol 2, No. 3, 63–80.
- Culler D, and Estrin M S D (2004). Overview of sensor networks, IEEE Computer, vol 37, No. 8, 41–49.
- Gedik B, and Liu L (2008). Protecting location privacy with personalized k-anonymity: Architecture and algorithms, IEEE TMC, vol 7, No. 1, 1–18.
- Kalnis P, Ghinita G et al. (2007). Preventing location-based identity inference in anonymous spatial queries, IEEE TKDE, vol 19, No. 12, 1719–1733.
- Samarati P (2001). Protecting respondent’s privacy in microdata release, IEEE Transactions on Knowledge and Data Engineering, vol 13, No. 6, 1010–1027.
- Sweeney L (2002). k-Anonymity: A model for protecting privacy, International Journal of Uncertainty, Fuzziness, and Knowledge-Based Systems, vol 10, No. 5, 557–570.
- Gedik B, and Liu L (2005). A customizable k-anonymity model for protecting location privacy, Proceedings of IEEE International Conference on Distributed Computing Systems (ICDCS ’05), 620–629.
- Meyerson A, and Williams R (2004). On the complexity of optimal k-anonymity, Proceedings of ACM Symposium, Principles of Database Systems (PODS ’04), 223–228.
- Aggarwal G, Feder T et al. (2005). Anonymizing Tables, Proceedings of International Conference on Database Theory (ICDT ’05), 246–258.
- Gedik B, and Liu L (2005). Location privacy in mobile systems: a personalized anonymization model, Proceedings of 25th IEEE International Conference on Distributed Computing Systems (ICDCS ’05), 620–629.
- Hoh B, Gruteser M et al. (2006). Enhancing Security and Privacy in Traffic-Monitoring Systems, IEEE Pervasive Computing, vol 5, No. 4, 38–46.
- Terrovitis M, and Mamoulis N (2008). Privacy preservation in the publication of trajectories, Proceedings of Ninth International Conference on Mobile Data Management (MDM ’08), 65–72.
- Thermal Properties of Doped Azopolyester and its Application
Abstract Views :422 |
PDF Views:0
Authors
Affiliations
1 Electronics Communication Engineering, Bharath University, Chennai-600073, IN
2 Automobile Engineering, Bharath University, Chennai, IN
3 Computer Science Engineering, Bharath University, Chennai, IN
4 Information Technology, Bharath University, Chennai, IN
1 Electronics Communication Engineering, Bharath University, Chennai-600073, IN
2 Automobile Engineering, Bharath University, Chennai, IN
3 Computer Science Engineering, Bharath University, Chennai, IN
4 Information Technology, Bharath University, Chennai, IN
Source
Indian Journal of Science and Technology, Vol 6, No S6 (2013), Pagination: 4722-4725Abstract
The thermal properties of doped Azopolyester were obtained by solution casting technique. Many theories have been suggested by various thermal stability mechanisms in organic solids. Since the polymers of the present study behave like semiconductors, these theories may be extended to explain thermal stability. In this section, the thermal stability theories proposed by O'Dwyer, TGA analysis, and measurements were discussed. The thermal stability properties reveal that the conductivity is appreciable in the temperature ranging from 30°C to 70°C (303 to 343K) and when it is more than 70°C (343 K) the conductivity is drastically reduced and polymeric blends undergo a gradual weight loss in the temperature ranging from 400-800°C due to attributed loss of volatile solvents trapped in the polymer. These studies are done with the help of O'Dwyer basic theory of thermal stability.Keywords
TGA, Thermal Properties, Azopolyester, Conductivity, TGA AnalysisReferences
- Mori T, Namba T et al. (1994). Electrical breakdown of ethylene-acrylic acid copolymer and blend polymer films, IEEE International Symposium on Conference Record of the 1994, Pittsburgh, USA, 217–220.
- Klein N (1978). Electrical breakdown mechanisms in thin insulator, Thin Solid Films, Elsevier, vol 50, 223–232.
- Weaver C, McLeod J E S et al. (1965). Thermal properties of conjugated polymers, Journal of Physics D: Applied Physics, vol 16, 11–16.
- Zelm M, and Physik Z (1968). Electron avalanches in pellets, Journal of Applied Physics, vol 46, 2946–2987.
- Copper R, Elliot C T et al. (1966). A photographic study of electrical breakdown of polymer, Journal of Applied Physics, vol 17(17), 169–195.
- Klein N (1971). Switching and breakdown in films, Thin Solid Films, vol 7(3–4),149–177.
- Sawa G (1979). Conditions for complete self healing breakdown in glow discharge polymerized styrene films, Thin Solid Films, vol 59(2), 131–141.
- Sapieha S, Kriyszewski M et al. (1972). International Microsymposium on polarization and conduction in insulating polymers, Bratislava, vol 36, 119–124.
- Kriyszewski M, Jablonski W et al. (1972). International Microsymposium on polarization and conduction in insulating polymers, Bratislava, vol 41(67), 119–125.
- Ya V, Airazov et al. (1971). Electrical breakdown and plasma –polymerized styrene thin films, Souvenir Physics Technology, vol 16, 1782.
- Segui Y, Ai Bui et al. (1974). Charge transport in thin polymer films, Thin Solid Films, vol 22(1), 47–140.
- Nagao M, Sawa G et al. (1977). Pre breakdown currents due to filamentary thermal breakdown in polyimide films, IEEE Transactions on Electrical and Electronic Engineering, 97A, 279–355.
- Ieda M (1980). Carrier injection, space charge and electrical breakdown in insulating polymers, IEEE Transactions on Electrical Insulation, vol E1–15(3), 206–224.
- Muramoto Y, Nagao M et al (1995). Self healing breakdown of polyimide thin films in the cryogenic temperature region, Cryogenics, vol 35(11), 791–793.
- Coppards R W, Bowman J et al. (1990). The effect of aluminium inclusions on the dielectric breakdown of polyethylene, Journal of Physics D: Applied Physics, vol 23, 1554.
- Paul P, Budenstenin et al. (1969). Origin and evolution of sculptured thin films, Vacuum Science Technology, vol 6, 235–289.
- Hossain M M (1993). Effect of humidity on the breakdown strength and diffusion characteristics of polymer film, Bulletin of Materials Science, vol 16(6), 699–707.
- Forlani F, and Minnaja N J (1969). Electrical breakdown in thin dielectric films, Journal of Vacuum Science and Technology, vol 6(4), 518–526.
- Goldstein R M, and Leonhard F W (1967). Dielectric breakdown study of thin LaZo3 films, Proceedings of 17th electronic components, Washington DC.
- Balasubramanian T, Narayandass S K et al. (1997). Optical and transport properties of alloy thin films, Indian Journal of Engineering and Materials Sciences, vol 17(35), 149–153.
- Amarjit Singh (1983). Dielectric breakdown study of thin LaZo3 films, Thin Solid Films, Elsevier, vol 105(88), 163.
- Dharmadhikari V S, and Goswami A (1982). Dielectric properties of electron beam evaporated NdZo3 thin films, Thin Solid Films, vol 87(13), 117–123.
- Balasubramanian T, Naryandass S K et al. (1996). Space charge limited conduction in polyaniline films, Bulletin of Indian Vacuum Society, vol 27(16), 23–32.
- Chambell C K (1970). Some dielectric properties of electron beam evaporated yttrium oxide thin films, Thin Solid Films, vol 6(3), 197–202.
- Wiktorcz yk T, and Wesolowska C (1980). Dielectric properties of yttrium oxide films deposited by electron beam evaporation, Thin Solid Films, vol 71(20), 15–27.
- Mahalingam T, Radhakrishnan M et al. (1980). Dielectric behaviour of lanthanum oxide thin film capacitors, Thin Solid Films, vol 74(3), 27–34.
- Goswami A, and Varma R R (1975). Dielectric behaviour of oxide films, Thin Solid Films, vol 28(2), 157–165.
- Koleshko V M, and Babushkina N V (1979). Thin films of rare earth metal silicates, Thin Solid Films, vol 62(3), 337–339.
- Forlani F, and Minnaja M (1964). Physics of thin film ferroelectric oxides, IOP Science: Reports on Progress in Physics, vol 34(1), 311–316.
- Performance Analysis of Resilient FTTH Architecture with Protection Mechanism
Abstract Views :463 |
PDF Views:0
Authors
Affiliations
1 Department of Information and Technology, Bharath University, Chennai-600073, IN
2 Information Technology, Bharath University, Chennai-600 073
3 Dept. of IT, Bharath University, Chennai, IN
1 Department of Information and Technology, Bharath University, Chennai-600073, IN
2 Information Technology, Bharath University, Chennai-600 073
3 Dept. of IT, Bharath University, Chennai, IN
Source
Indian Journal of Science and Technology, Vol 6, No S6 (2013), Pagination: 4737-4741Abstract
Fiber-To-The-Home [FTTH] is an alternate technology for broadband access networks. Passive optical network (PON) is considered the most promising solution due to the relatively low deployment cost. Current time division multiplexing [TDM] PON architectures are economically feasible, are band limited. The WDM PONs currently available offers enough bandwidth for the present and also for future multimedia broadband services. The purpose of this paper is to simulate resilient access network architecture with a cable route protection function based on hybrid wavelength division multiplexing and time division multiplexing passive optical network (WDM/TDM-PON) systems. Hybrid WDM-TDM PON combines the advanced features of both TDM PON and WDM PON. The reuse of existing optical fiber cable networks allows the introduction of duplicate routes for the shared portions of PONs by using a few optical fiber cables with simple structures. In this work, the hybrid WDM/TDM PON based Ladder network is simulated and the transmission characteristics evaluated. Simulation is done by using Optsim ver.5.3.Keywords
Time Division Multiplexing, WDM-TDM, Hybrid, Passive Optical NetworkReferences
- Tsubokawa M, Honda N et al. (2011). Resilient FTTH architecture with Ladder and Grid network structures, Journal of Optical Communications and Networking, vol 3(11), 839–849.
- Kumar J, Arora M et al. (2012). Performance analysis of WDM-PON at 10Gb/s, International Journal of Engineering and Advanced Technology, vol 1(3), 214–216.
- Nakamura H (2012). λ-tunable WDM/TDM PON using DWBA towards flexible next-generation optical access networks, Progress in electromagnetic research symposium proceedings, vol 10(1), 507–510.
- Feng H, Chae C et al. (2011). Cost-effective and powerefficient extended-reach WDM/TDM PON systems, Optical Fiber Communication Conferences.
- Nowak D, and Murphy J (2010). FTTH: The Overview of existing technologies, SPIE Proceedings, vol 5825.
- Shumate P W (2008). Fiber–to–the home, Journal of Lightwave Technology, vol 26(9), 1093–1103.
- Tsubokawa M, and Kumozaki K (2008). Evolution of next generation access, World Telecommunications Congress, New Orleans, vol 202, 839–849.
- Vukovie A, Maamoun K et al. (2007). Performance characterization of PON technologies, SPIE proceedings , vol 66(1), 34–41.
- Lee K, Mun S et al. (2009). Reliable wide area wavelength division multiplexing passive optical network using novel protection scheme, IEEE Photonics Tehnology Letters, vol 18(3), 523–525.
- Nakamura H, Suzuki H et al. (2006). Reliable wide area wavelength division multiplexing passive optical network accommodating gigabit Ethernet and 10-Gb ethernet services, Journal of Lightwave Technology, vol 24(5), 2045–2051.
- Sun X, Chan C et al. (2006). A survivable WDM PON architecture with centralized alternate path protection switching for traffic restoration, IEEE Photonics Technology Letters, vol 18(4), 631–633.
- Bock C, and Prat J (2005). WDM/TDM PON Experiments using the AWG Free spectral range periodicity to transmit unicast and multicast data, Department of Signal Theory and Communications, vol 13(8), 2887–2891.
- Optical Ring Architecture Performance Evaluation using Ordinary Receiver
Abstract Views :376 |
PDF Views:0
Authors
Affiliations
1 Department of Information and Technology, Bharath University, Chennai-600073
2 Information Technology, Bharath University, Chennai-600073
3 Dept. of IT, Bharath University, Chennai, IN
1 Department of Information and Technology, Bharath University, Chennai-600073
2 Information Technology, Bharath University, Chennai-600073
3 Dept. of IT, Bharath University, Chennai, IN
Source
Indian Journal of Science and Technology, Vol 6, No S6 (2013), Pagination: 4742-4747Abstract
Wavelength division multiplexing is an accepted technique to exploit the fiber bandwidth in metro network. Designing innovative architectures for metro network often means finding cost effective combinations of electronic and optic technologies and new network paradigms suited for constraints caused by available photonic components and subsystems. The three different and architectures included in this project the bulk of raw data in the optic domain while the implementation of the complex network formation is in the electronic domain. All the three ringO architectures perform λ monitoring. The basic ringO architecture is based on WDM fiber ring. The three ring architectures are designed and simulated using OptSim 5.3 software.Keywords
PON, Ring Topology, Node Architecture, Photodiode Array, LASER ArrayReferences
- Bianciotto A, Carena A et al. Experimental WDM Packet Networks for Metro Applications: the RingO and Wonder Projects, PhotonLab and LIPAR Advanced Laboratories Dipartimento di Elettronica, Politecnico di Torino C.so Duca degli Abruzzi 24, 10129, Torino, Italy.
- Carena A, De Feo V et al. (2004). RingO: an Experimental WDM Optical Packet Network for Metro Applications, IEEE journal on selected areas in communications, vol 22(8), 1561–1571.
- Turuk A K, and Kumar R (2004). A scalable and collision free Mac protocol for all optical ring network, vol 27(15), 1453–1463.
- Su C, Chen L et al. (1997). Theory of burst-mode receiver and its applications in optical multiaccess networks, vol 15(4), 590–606.
- Burmeister E F, Blumenthal D J et al. (2006). Optical Buffering for Next-Generation Routers, Opto-Electronics and Communications Conference.
- Ring Network. Available From: http://en.wikipedia.org/wiki/ Ring_network
- Encyclopaedia of Laser Physics and Technology – amplified spontaneous emission. Available From: http://www.rpphotonics. com/amplified_spontaneous_emission.html
- Encyclopaedia of Laser physics and technology-wavelength tunability. Available From: http://www.rp-photonics.com/wavelength_ tuning.html
- Rsoft application gallery. Available From: http://www.rsoftdesign. com/products.php
- Yang H, Herzog M et al. (2004). Metro WDM networks: performance comparison of slotted ring and AWG star networks, IEEE Journal on Selected Areas in Communications, vol 22(8), 1460–1473.
- Georgiadis L, Guerin R et al. (1993). Throughput properties of fair policies in ring networks, IEEE/ACM Transactions on Networking, vol 1(6), 718–728.
- Lafata P (2012). Protection of passive optical network by using ring topology, 35th International Conference on Telecommunications and Signal Processing (TSP), 105–110.
- Gifford, and Kawachi, Polarization dependent loss measurement of passive optical components - application note.
- Carter B (2001). Using Texas instruments spice models in PSpice, Application Report, SLOA070, Texas Instruments, Dallas, TX. University of Pennsylvania Department of Electrical and Systems Engineering PSPICEA brief primer.
- Synthesis and Structural Characterization of Thin Films of SnO2 Prepared by Spray Pyrolysis Technique
Abstract Views :521 |
PDF Views:0
Authors
Affiliations
1 Deptartment of Information Technology, Bharath University Chennai-600073
2 Information Technology, Bharath University, Chennai-600 073
3 Department of ETC, Bharath University, Chennai-600073, IN
1 Deptartment of Information Technology, Bharath University Chennai-600073
2 Information Technology, Bharath University, Chennai-600 073
3 Department of ETC, Bharath University, Chennai-600073, IN
Source
Indian Journal of Science and Technology, Vol 6, No S6 (2013), Pagination: 4754-4757Abstract
Thin films of Tin dioxide (SnO2) thin films are a special class of metal oxides that combine high electrical conductivity with optical transparency. Such Transparent Conducing Oxide (TCO) provides an important component for optoelectronic applications. Spray pyrolysis deposition for thin film preparation is a simple and relatively cost effective technique. This work consists of the synthesis of thin films of tin dioxide using automated spray pyrolysis technique and its structural characterization. Tin oxide films were prepared from different concentrations of the precursor solution. These films were found to be transparent at low concentration of the precursor solution. Characterization of these prepared films using X-ray diffraction technique is presented and discussed. Spray deposited thin films of tin dioxide have a number of applications, mainly as electrode materials in solar cells.Keywords
Transparent Conducting Oxide, Physical Vapour Deposition, Chemica Vapour Deposition, Transparent Conducting Oxides, Atomic Layer EpitaxyReferences
- Perednis D, and Gauckler L J (2005). Thin film deposition using spray pyrolysis, Journal of Electroceramics, vol 14(2), 103–111.
- Seshan K (2002), Handbook of thin-film deposition processes and techniques- principles, methods, equipment and applications, Chapter 2, Noyes Publications.
- Muranoi T, and Furukoshi M (2001). Properties of stannic oxide thin films produced from the SnC14-H2O and SnC14-H2O2 reaction systems, Thin Solid Films, vol 48(3), 309–318.
- Tomar M S, and Garcia F J (1981). Spray pyrolysis in solar cells and gas sensors, Progress in Crystal Growth and Characterization of Materials, vol 4(3), 221–248.
- Batzill M, and Diebold U (2001). The surface and materials science of tin oxide, Progress in Surface Science, vol 79(2-4), 47–154.
- Bernardus van A M (2000). Chemical vapour deposition of tin oxide thin films, Ph.D Thesis, Technische Universiteit Eindhoven.
- Baco S, Chik A et al. (1999). Study on optical properties of tin oxide thin film at different annealing temperature, Journal of Science and Technology, vol 4, 61–72.
- Assia S, Ratiba O et al. (1999). Optical reflectance of pure and doped tin oxide: from thin films to poly-crystalline silicon/ thin film device, International Journal of Chemical and Biological Engineering, vol 2(1), 48–51.
- Delgado R D (1998). Tin oxide gas sensors: an electrochemical approach, Ph.D Thesis, Universitat De Barcelona.
- Sears W M, and Gee M A (1997). Mechanics of film formation during the spray pyrolysis of tin oxide, thin solid films, vol 165, 265–277.
- Patil G E, Kajale D D et al. (1998). Spray pyrolysis deposition of nanostructured tin oxide thin films, ISRN Nanotechnology, vol 2012.
- An Integrated Agent System for E-mail Coordination using Jade
Abstract Views :347 |
PDF Views:0
Authors
Affiliations
1 School of Computing, Bharath University, Chennai-600073
2 Information Technology, Bharath University, Chennai-600073, IN
3 Information Technology, Bharath University, Chennai-600073
1 School of Computing, Bharath University, Chennai-600073
2 Information Technology, Bharath University, Chennai-600073, IN
3 Information Technology, Bharath University, Chennai-600073
Source
Indian Journal of Science and Technology, Vol 6, No S6 (2013), Pagination: 4758-4761Abstract
With growing usage of computer applications there is growing dependence of business over computer aided services like e-mails. The CRM or E-Mail based marketing companies are becoming pervasive. There is always a greater need to prioritize the e-mails which has direct impact on the ROI - Return on Investment to run these companies in a way that to customers satisfied. In this paper, a method is proposed to prioritize the unread E-Mails based on users' interest and priority. This is implemented in this system using agent technology. The Agent mechanism is guided using JADE Middleware and it's underlying architecture. The Intelligent agent used here can learn the interest and priority of the user and use this knowledge to rearrange the unread mails. The Text corpus in the mail would undergo tokenization and each token would be matched with knowledgebase by the agent. The 90 percent precision of the prioritization. Thereby, the E-Mails are ranked according to interest and priority of the user.Keywords
Intelligent Agent, Tokenization, E-Commerce, Artificial IntelligenceReferences
- Shen Y, and Jiang J (2003). Improving the performance of Naive Bayer’s for text classification, CS224N Spring Report.
- Koller D, and Sahami M (1997). Hierarchically classifying documents using few words, Machine Learning International Workshop, Technical Report.
- McCallum A, and Nigam K (1998). Comparison of event classification for event models for text classification, AAAI-98 Workshop on Learning for Text Categorization.
- Woolridge M, and Jennings N R (1995). Intelligent agents: theory and practice, Knowledge Engineering Review, vol 10, No. 2.
- Sahami M, Dumais S et al. (1998). A bayesian approach to filtering junk E-mail, AAAI-98 Workshop on Learning for Text Categorization.
- Russell S J, and Norvig P (2003). Artificial intelligence: a modern approach, 2nd Edn., Prentice Hall, 375–398.
- Grefensette G, and Tapaninian P (1994). What is a word, what is a Sentence? Problem of tokenization, Rank Xerox Research Center, Grenoble Laboratory, France.
- Shen W, Hao Q et al. (2006). Applications of agent based systems in intelligent manufacturing: an overview, Advanced Engineering Informatics, vol 20(4), 415–431.
- Caire G, Lavarone G et al. (2011). Jade Tutorial, Jade Programming for Android, Available From: http://jade. tilab.com
- Leonardo (2001). Intermedia in Electronic Images, MIT Press Journal, vol 34(1), 49–54.
- Chromatic Dispersion Compensation in Optical Fiber Communication System and its Simulation
Abstract Views :620 |
PDF Views:0
Authors
Affiliations
1 Department of Information Technology, Bharath University Chennai-600 073
2 Information Technology, Bharath University, Chennai-600 073
3 Department of ETC, Bharath University, Chennai-600073, IN
1 Department of Information Technology, Bharath University Chennai-600 073
2 Information Technology, Bharath University, Chennai-600 073
3 Department of ETC, Bharath University, Chennai-600073, IN
Source
Indian Journal of Science and Technology, Vol 6, No S6 (2013), Pagination: 4762-4766Abstract
Chromatic dispersion is a critical factor that limits the quality of transmitted optical signal in high speed fiber optic communication systems. Chromatic dispersion occurs due to the propagation delay spread of different spectral components of the transmitted signal. This leads to the pulse broadening of transmitted signal. In order to operate the fiber optic communication system with a sufficiently low bit error rate and to minimize the performance degradation caused by pulse distortion and broadening, dispersion compensation is needed. The purpose of this project is to compensate the chromatic dispersion using fiber Bragg grating and optical phase conjugation techniques. Simulation results will be obtained using OPTSIM software version 5.3. Effect of chromatic dispersion in an optical fiber link was analyzed. Simulation using Fiber Bragg grating by varying its grating period and linear chirp coefficient was obtained.Keywords
(DCF)Dispersion Compensating Fiber,(OPC)Optical Phase Conjugator,(FBG)Fiber Bragg GratingReferences
- Thirumaran S, Devi S K N et al. (2012). International Conference on Devices, Circuits and Systems (ICDCS), 34–37.
- Stepanek L (2012). Chromatic dispersion in optical communications, Journal of Electrical and Electronic Engineering, vol VII, No. 2, 142–151.
- Dabhade S S, and Bhosale S (2012). Fiber bragg grating and optical phase conjugator as dispersion compensator, International Journal of Advanced Electrical and ElectronicsEngineering, vol 1(1), 15–19.
- Bhowmik K, Ahamed M et al. (2012). Reduction of dispersion in optical fiber communication by fiber bragg grating and optical phase conjugation techniques, International Journal of obile Network Communications & Telematics (IJMNCT), vol 2, No.3, 49–58.
- Arora O, Punia S et al. (2011). Symmetrical dispersion compensation for high speed optical links, International Journal of Computer Science Issues, vol 8(6), No.1, 371–376.
- Spolitis S, Bobrovs V et al. (2011). Realization of combined chromatic dispersion compensation methods in high speed WDM Optical transmission Systems, Department of Telecommunications Engineering, vol 10, 33–38.
- Analysis of Polarization Mode Dispersion in Fibers and its Mitigation using an Optical Compensation Technique
Abstract Views :494 |
PDF Views:0
Authors
Affiliations
1 Department of Information Technology, Bharath University, Chennai-600073
2 Department of ETC, Bharath University, Chennai-600073, IN
1 Department of Information Technology, Bharath University, Chennai-600073
2 Department of ETC, Bharath University, Chennai-600073, IN
Source
Indian Journal of Science and Technology, Vol 6, No S6 (2013), Pagination: 4767-4771Abstract
The maximum channel density for digital transmission can be achieved by increase the bit rate. When the bit rate cross the 2.5Gbps , the PMD degrade the transmission characteristics. PMD occurs in single mode fiber and because of PMD it impossible to transmit data reliability at high speed. This effects results the widening the pulses and reduce the capacity of transmission of the fiber. This work analyzes the effect of PMD in optical fiber in one hindered km link fiber. The eye diagram, Q value and bit rate for analyzing the PMD. Also an optical compensation technique by which the effect of PMD can be reduced is also analyzed. bit error rate can be achieved by simulating with OptSim 5.3, which includes the algorithms to guarantee the maximum possible accuracy and correct results.Keywords
Local Area Network (LAN), Wavelength Multiplexing (WDM), Principle Rate of Polarization (PSP), Optical Fiber Communication (OFC)References
- Borzycki K (2012). Temperature dependence of polarization mode dispersion in tight-buffered optical fibers, Journal of Telecommunications and Information Technology, 56–66.
- Kogelnik H, R M Jopson et al. (2006). Polarization-mode dispersion, Chapter 15, Optical Fiber Telecommunications, vol IV B, Kaminow I P, Li T (Eds.), Academic Press, San Diego, CA.
- Agarkar A M, Joharapurkar P (2010). PMD & DGD performance analysis in SMF due to fiber irregularities, International Journal of Computer Applications, vol 12, No. 6.
- Jamaludin M, Abas A F et al. (2005). Issues on polarization mode dispersion (PMD) for high speed fiber optics transmission, Suranaree Journal of Science and Technology, vol 12(2), 98–106.
- Kashyap K, and Singh H (2010). Study the effects and compensation of polarization mode dispersion at different bit rates, IOSR Journal of Engineering, vol 2(7), 32–40.
- Bulow H, Xie C et al. (2009). PMD Compensation/ Mitigation Techniques for High-Speed Optical Transport,Wiley Periodicals, Bell Labs Technical Journal, vol 14(1), 105–124.
- Manohari R G, and Sabapathi T (2011). Analysis and reduction of polarization mode dispersionin an optical fiber, International Conference on Recent Advancements in Electrical, Electronics and Control Engineering.
- Waddy D S, Chen L et al. (2010). A novel dynamical polarization mode dispersion emulator, IEEE Photonics Technology Letters, vol 1, No. 8, 534–536.
- Chauvel G (2008). Anritsu Corporation, Dispersion in Optical Fiber, vol 11, No.4, 12.
- High Data Rate for Coherent Optical Wired Communication using DSP
Abstract Views :426 |
PDF Views:0
Authors
Source
Indian Journal of Science and Technology, Vol 6, No S6 (2013), Pagination: 4772-4776Abstract
The aim of this research is the development and analysis of digital signal processing techniques for enhancing performance in coherent optical communication systems. While much of the current digital techniques are identical to those found in the digital wireless literature, we will investigate improvements in performance to be obtained by tailoring modulation and DSP post-processing algorithms to the optical. The combination of polarization-multiplexing and quadrature phase shift-keying (PM-QPSK or DP-QPSK) is emerging as one the most promising solutions to reach bit rates of 100 Gbps and higher. At the receiver end, the use of digital signal processing (DSP) [1, 2] results in significant deployment improvement over the traditional implementation. This application note shows a practical design of a 100 Gbps DP-QPSK transmission system using coherent detection with digital signal processing for distortion compensation.Keywords
Digital Signal Processing, QPSK, Optical Receiver- Optical Performance of Doped Azopolyester and its Application
Abstract Views :457 |
PDF Views:0
Authors
Source
Indian Journal of Science and Technology, Vol 6, No S6 (2013), Pagination: 4783-4788Abstract
Theoretical and experimental investigations on the optical behavior of thin films mainly deal with band gap, optical reflection, transmission, absorption and their relation to the optical constants. The optical transmittance spectra are recorded from 100 to 1000nm wavelength using a Hitachi UV-VIS-NIR spectrophotometer (Model-JASCO V-570) using a doped Azopolyester thin films were observed. Unpolarized radiation at room temperature with a resolution of 2nm was used in this study. Unpolarized radiation at room temperature with a resolution of 2nm was used in this study. The measurements were made on films of typical uniform thickness of 5μm deposited on glass substrate. The substrate absorption was corrected by introducing an uncoated cleaned glass substrate in the reference beam. The study of optical absorption / transmittance is a useful method for the investigation of optically induced transitions which provide information on the band structure and energy gap in both crystalline and non-crystalline materials. Finally optical applications of doped Azopolyester in fiber optic cable were used in telecommunication is discussed.Keywords
Optical Parameters, Doped Azopolyester, Band Gap, Lattice Bonding, Band Structure- Highly Secured Online Voting System over Network
Abstract Views :779 |
PDF Views:0
Authors
Source
Indian Journal of Science and Technology, Vol 6, No S6 (2013), Pagination: 4831-4836Abstract
Internet voting systems have gained popularity and have been used for government elections and referendums in the United Kingdom, Estonia and Switzerland as well as municipal elections in Canada and party primary elections in the United States. Voting system can involve transmission of ballots and votes via private computer networks or the Internet. Electronic voting technology can speed the counting of ballots and can provide improved accessibility for disabled voters. The aim of this paper is to people who have citizenship of India and whose age is above 18 years and of any sex can give their vote through online without going to any physical polling station. Election Commission Officer (Election Commission Officer who will verify whether registered user and candidates are authentic or not) to participate in online voting. This online voting system is highly secured, and its design is very simple, ease of use and also reliable. The proposed software is developed and tested to work on Ethernet and allows online voting. It also creates and manages voting and an election detail as all the users must login by user name and password and click on his favorable candidates to register vote. This will increase the voting percentage in India. By applying high security it will reduce false votes.Keywords
Internet Voting, e-voting, Face Recognition, Image Processing, Secured Network, JDBC- Optimal Replenishment Policy for Items with Inflation Rate and Time Dependent Demand with Salvage Value
Abstract Views :129 |
PDF Views:3
Authors
Affiliations
1 Department of Mathematics, PSNA College of Engineering and Technology, Dindigul - 624622, Tamilnadu, IN
2 Department of Mathematics, SBM College of Engineering and Technology, Dindigul - 624805, Tamilnadu, IN
1 Department of Mathematics, PSNA College of Engineering and Technology, Dindigul - 624622, Tamilnadu, IN
2 Department of Mathematics, SBM College of Engineering and Technology, Dindigul - 624805, Tamilnadu, IN
Source
Artificial Intelligent Systems and Machine Learning, Vol 6, No 5 (2014), Pagination: 193-197Abstract
In this article, we have formulated an optimal replenishment policy for non-instantaneous deteriorating items with inflation rate and time dependent demand. The salvage value associated with the deterioration is also considered. Shortages are allowed and are partially backlogged. Optimal solution of the shortage point, order quantity and cycle time are attained in order to minimize the total cost. Numerical examples are provided for the proposed model.Keywords
Inventory, Time Dependent Demand, Deterioration, Shortage, Salvage Value.- A Survey on Cache Consistency Schemes Adopted in Manets
Abstract Views :233 |
PDF Views:0
Authors
Affiliations
1 Department of Information Technology, Jerusalem College of Engineering, Chennai - 600100, Tamil Nadu, IN
2 Department of Information Technology, Bharath University, Chennai - 600073, Tamil Nadu, IN
1 Department of Information Technology, Jerusalem College of Engineering, Chennai - 600100, Tamil Nadu, IN
2 Department of Information Technology, Bharath University, Chennai - 600073, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 32 (2015), Pagination:Abstract
Mobile Ad hoc Network is a wireless communication network. It is a self configuring infrastructure less network of mobile devices. The mobile nodes in general access data from remote source from a wireless network. Hence any mobile nodes access latency is increased. To avoid this latency, mobile node cooperatively cache data in their local cache memory. Since Mobile Ad hoc Networks are dynamic in nature we must maintain consistency between the remote source and caching nodes. Some of the cache consistency schemes like pull based or client based and push based or server based are used to improve consistency of data. However, the main issue of concern is maintaining consistency such that the data at the server and the caching nodes are exact replicas at any point of time. Hence, this survey describes various schemes used to improve consistency between the server and the caching nodes to reduce delays and network latencies. Moreover hybrid schemes that can make use of the advantages of both the push based and pull based schemes can be implemented for maintaining cache consistency.Keywords
Cache Consistency, Cache Node, Mobile Ad hoc Network, Pull Based- Identifying and Blocking High and Low Rate DDOS ICMP Flooding
Abstract Views :177 |
PDF Views:0
Authors
Affiliations
1 Department of Information Technology,Jerusalem College of Engineering, Chennai - 600100, Tamil Nadu, IN
2 Department of Information Technology, Bharath University, Chennai - 600073, Tamil Nadu, IN
1 Department of Information Technology,Jerusalem College of Engineering, Chennai - 600100, Tamil Nadu, IN
2 Department of Information Technology, Bharath University, Chennai - 600073, Tamil Nadu, IN