February 2011 Issue Vol.1 No.2



Performance Evaluation on the Basis of Energy in NoCs

Lalit Kishore Arora, Rajkumar

Abstract: The classical interconnection network topologies such as point-to-point and bus-based, recently has been replaced by the new approach Network-on-Chip (NoC). NoC can consume significant portions of a chip’s energy budget, so analyzing their energy consumption early in the design cycle becomes important for architectural design decisions. Although numerous studies have examined NoC implementation and performance, few have examined energy. This paper determines the energy efficiency of some of the basic network topologies of NoC. We compared them, and results show that the CMesh topology consumes less energy than Mesh topology.

Keywords: Network-on-Chip, Interconnection Networks, Topologies, Multi-core processor.

Implementation of Authentication and Transaction Security based on Kerberos

Prof R.P. Arora, Ms. Garima Verma

Abstract: Kerberos is a network authentication protocol. It is designed to provide strong authentication for client/server applications by using secret-key cryptography. Kerberos was created by MIT as a solution to network security problems. The Kerberos protocol uses strong cryptography so that a client can prove its identity to a server (and vice versa) across an insecure network connection. After a client and server have used Kerberos to prove their identity, they can also encrypt all of their communications to assure privacy and data integrity as they go about their business.

In this paper we tried to implement authentication and transaction security in a Network using Kerberos. This project is embedded with Authentication Server application and used to derive a 64 bit key from user’s password. This key is used by authentication server, to encrypt ticket granting ticket + session key. The key generated by authentication server will be used by the client at the time of transaction through the transaction server to authenticate that transaction client is valid or not

Keywords: secret key , cryptography, authentication, ticket, session key etc.

A Web Based Information & Advisory System for Agriculture

Shrikant G. Jadhav , G.N. Shinde

Abstract: The business of farming has entered a new era –an age where key to success is perfect, timely information and careful decision- making . Now when the production is stagnating it has become essential that the farmers collect important and updated information about any of the crop and to get the proper advice regarding the farming.

This paper introduces the IT initiatives in India for Agriculture like AGMARKNET, DACNET and also discuss a web based information and advisory system for agriculture which is implemented using HTML and javascript. The paper focus on the development methodology used and system functions, constraints and obstacles for the system.

Keywords: Agriculture, AGMARKNET, DACNET, Advisory service, farmers guide, software engineering

Handoff scheme to enhance performance in SIGMA

B.Jaiganesh, Dr.R.Ramachandran

Abstract: Mobile Internet Protocol(MIP), an industry standard for handling mobility, suffers from high handover latency and packet loss, in addition to change in network infrastructure. To overcome these problems, we proposed a new approach called Seamless IP diversity based Generalized Mobility Architecture (SIGMA). Although SIGMA achieved a low latency handoff, use of IP diversity resulted in some instability during handoff. In this paper, we propose a new handoff policy, called HANSIG-HR, to solve the instability problem of SIGMA. HANSIG-HR is based on Signal to Noise Ratio (SNR), hysteresis and route cache flushing. Our experimental results show that HANSIG-HR improves the stability of SIGMA.

Keywords: Hand off Latency, MIP, SIGMA, Throughput, SNR, HANSIG, HANSIG-H,and HANSIG-HR.

Cultural Issues and Their Relevance in Designing Usable Websites

Alao Olujimi Daniel, Awodele Oludele, Rehema Baguma, nd Theo van der Weide

Abstract: Cultural characteristics of users play a significant role in their interactions and understanding of web based systems. Hence consideration of cultural issues in the design of a web based system can improve the usability of such a system. The relation between culture and the internet is symbiotic, that is, experience obtained from using the internet (with its rich cultural diversity) can also have an influence on the local culture. This makes culture a moving target. However to-date, not much research has been done about what cultural issues influence the usability of websites and the level of influence.

This paper examines theoretically the cultural issues that influence web design/usability and the significance of this influence to the general usability of a website and also establish how culture can be utilized to develop more usable websites. Thus the main contribution of this study is to identify what characterizes usable websites with reference to cultural needs of the user, specific web features applicable to cultural dimension that that can enhance cultural understanding and help web designers to customize the web sites to specific cultures.

Keywords: Human Computer Interaction (HCI), Web Usability, Culture/User Centered Design, Cultural dimensions.

Software Cost Regressing Testing Based Hidden MORKOV Model

Mrs. P.Thenmozhi, Dr. P. Balasubramanie

Abstract: Maintenance of software system accounts for much of the total cost associated with developing software. The nature of the modifying the software is a highly error-prone task which is the main reason for the cost. Correcting fault by changing software or add new functionality can cause existing functionality to regress, introducing new faults. To avoid such defects, one can re-test software after modifications, a task commonly known as regression testing. Re-execution of test cases developed for previous versions is typically called Regression test. However, is often costly and sometimes even infeasible due to time and resource constraints. Re-running test cases that do not exercise changed or change-impacted parts of the program carries extra cost and gives no benefit. This paper presents a novel framework for optimizing regression testing activities, based on a probabilistic view of regression testing. The proposed frame- work is built around predicting the probability that each test case finds faults in the regression testing phase, and optimizing the test suites accordingly. To predict such probabilities, we model regression testing using a Hidden Morkov Model Network (HMMN), a powerful probabilistic tool for modeling uncertainty in systems. We build this model using information measured directly from the software system. The results show that the proposed framework can outperform other techniques on some cases and performs comparably on the others. This paper shows that the proposed framework can help testers improve the cost effectiveness of their regression testing tasks.

This paper examines theoretically the cultural issues that influence web design/usability and the significance of this influence to the general usability of a website and also establish how culture can be utilized to develop more usable websites. Thus the main contribution of this study is to identify what characterizes usable websites with reference to cultural needs of the user, specific web features applicable to cultural dimension that that can enhance cultural understanding and help web designers to customize the web sites to specific cultures.

Keywords: Software testing, Testing tools, Regression testing, Software maintenance.

A Fast Selective Video Encryption Using Alternate Frequency Transform

Ashutosh Kharb, Seema, Ravindra Purwar

Abstract: With commercialization of multimedia data over public networks security of multimedia data is a challenging issue. Further multimedia data is generally very large therefore it requires efficient compression to save transmission cost. In this manuscript a modified 4 point butterfly method is proposed to compute DCT for encoding of frames in video data. It has been experimentally compared with existing technique based on parameters like PSNR, compression ratio, execution time of each frame, time taken for evaluating DCT method. Also it has been shown theoretically that the proposed technique take lesser time than the existing method.

This paper examines theoretically the cultural issues that influence web design/usability and the significance of this influence to the general usability of a website and also establish how culture can be utilized to develop more usable websites. Thus the main contribution of this study is to identify what characterizes usable websites with reference to cultural needs of the user, specific web features applicable to cultural dimension that that can enhance cultural understanding and help web designers to customize the web sites to specific cultures.

Keywords: DCT, motion estimation, selective encryption, spatial compression, video encoding.

Impact of Variable Speed Wind Turbine driven Synchronous Generators in Transient Stability of Power Systems

Dr.D. Devaraj,R.Jeevajothi

Abstract: With commercialization of multimedia data over public networks security of multimedia data is a challenging issue. Further multimedia data is generally very large therefore it requires efficient compression to save transmission cost. In this manuscript a modified 4 point butterfly method is proposed to compute DCT for encoding of frames in video data. It has been experimentally compared with existing technique based on parameters like PSNR, compression ratio, execution time of each frame, time taken for evaluating DCT method. Also it has been shown theoretically that the proposed technique take lesser time than the existing method.

With the scenario of wind power constituting up to 20% of the electric grid capacity in the future, the need for systematic studies of the impact of wind power on transient stability of the grid has increased. This paper investigates possible improvements in grid transient stability while integrating the large-scale variable speed wind turbine driven synchronous generator. A dynamic modeling and simulation of a grid connected variable speed wind turbine (VSWT) driven synchronous generator with controllable power inverter strategies suitable for the study was developed, tested and verified. This dynamic model with its control scheme can regulate real power , maintain reactive power, generate voltage, and speed at different wind speeds. For this paper, studies were conducted on a standard IEEE 9 bus system augmented by a radially connected wind power plant (WPP) which contains 28 variable speed wind turbines with controllable power inverter strategies. Also it has the potential to control the rotor angle deviation and increase the critical clearing time during grid disturbance with the help of controllable power inverter strategy.

Keywords: Variable speed wind turbine, direct drive synchronous generator , rotor angle deviation and critical clearing time, transient stability, grid connected.

Read complete February 2011 Issue