Manuscripts

Recent Papers

Dynamic Job Ordering and Slot Configurations for Mapreduce Workloads

In the dynamic MR process apart from the three concepts present in the paper, we are going to introduce clustering approach. In addition to the multi data center processing, we are going to add clustering concept. Because we are going to split the data and process the data in multiple data centers. If we combine the similar data’s into clusters using the k-means algorithm. By clustering the data we can able to process the data in short execution time. After preprocessing, we split our process into multiple files and apply clustering process. Here we are going to use k-means clustering algorithm which is a standard algorithm, which helps to process the data in a short execution time. We improve the performance of a MapReduce cluster via optimizing the slot utilization primarily from two perspectives. First, we can classify the slots into two types, namely, busy slots (i.e., with running tasks) and idle slots (i.e., no running tasks). Given the total number of map and reduce slots configured by users, one optimization approach (i.e., macro-level optimization) is to improve the slot utilization by maximizing the number of busy slots and reducing the number of idle slots. Second, it is worth not in that, not every busy slot can be efficiently utilized. Thus, our optimization approach (i.e., micro-level optimization) is to improve the utilization efficiency of busy slots after the macro-level optimization. Particularly, we identify two main affecting factors: Speculative tasks based on these, we propose DynamicMR, a dynamic utilization optimization framework for MapReduce, to improve the performance of a shared Hadoop cluster under a fair scheduling between users.

Published by: Prathamesh Chaudhari, Gaurav S. Salve, Nilesh Ghadge, Harish Barapatre

Author: Prathamesh Chaudhari

Paper ID: V3I2-1361

Paper Status: published

Published: March 28, 2017

Full Details

A Literature Review on Lean Manufacturing Techniques

Lean manufacturing is a proper technique to identifying and eliminating waste through continuous improvement. In lean manufacturing do more with less: time (production time, waiting time etc..), inventory, men, and money. At present time, Lean Manufacturing has become a worldwide technique. It is very successful in drawing the attention of companies of all sizes. Many organizations are following Lean technologies and experiencing drastically improvements in quality, production, customer service, and profitability. Process improvement is an iterative method of seeking the elimination or reduction of non-value adding work embedded in a process. Non-value-adding work is described as elements of work that a customer is unwilling to pay for. The Lean manufacturing technique is meant to convert non-value added activity into value added activity. Lean manufacturing has its effect on the manufacturer and the customers alike. A lean organization understands customer value and focuses its key processes to continuously increase it. The ultimate goal is to provide perfect value to the customer through a perfect value creation process that has zero waste.[2] This paper gives the literature survey on various type of industry to apply the lean manufacturing. And introducing about lean .what is lean manufacturing, why it is needed, and method of lean manufacturing that reduces waste. And also to introduces about different lean tools.

Published by: Arpit Jayswal, N. D Chauhan, Rahul Sen

Author: Arpit Jayswal

Paper ID: V3I2-1360

Paper Status: published

Published: March 28, 2017

Full Details

Automatic Irrigation System Using Internet of Things

An automated irrigation system was developed to optimize water usage for agricultural crops. The system has a distributed wireless network of soil moisture, humidity and temperature sensors placed in the root zone of plants. A central control unit handles sensor information, triggers actuators and transmit data on the internet so the user can monitor the field in real time from any remote location. An algorithm was developed depending on the threshold values of the soil moisture, humidity and temperature and is programmed into the central control unit to control the quantity of water fed to the field for irrigation. The whole system is powered by solar energy. Sensing unit and central control unit are connected with each other via a wireless link. Because of low energy consumption, low cost, and energy autonomy, the system have potential to be useful in water-limited geographically isolated areas.

Published by: Azim Khan, Shubham Singh, Shiva Shukla, Atul Pandey

Author: Azim Khan

Paper ID: V3I2-1351

Paper Status: published

Published: March 28, 2017

Full Details

Raspberry Pi Home Automation Using Android Application

The project presents a low cost and flexible home control and monitoring system using a Raspberry PI module and a Static Relay, with internet connectivity for accessing and controlling devices and appliances remotely using Smartphone android application. The proposed system does not require a dedicated server PC with respect to similar systems and offers a novel communication protocol to monitor and control the home environment with more than just the switching functionality. To demonstrate the feasibility and effectiveness of this system, devices such as Static relays and a wifi router can be integrated with the home control system.

Published by: Himani Singh Dhami, Nidhi Chandra, Nishank Srivastava, Avanish Pandey

Author: Himani Singh Dhami

Paper ID: V3I2-1350

Paper Status: published

Published: March 28, 2017

Full Details

Buck-Boost Operation Using a Z-Source Inverter

An impedance-source (or impedance-fed) power converter (abbreviated as Z-source) and its control method for implementing dc-to-act, ac-to-dc, ac-to-ac, and dc-to-dc power conversion are presented in this paper. This impedance converter employs a unique impedance network (or circuit) to couple the converter main circuit to the power source, hence provides a unique feature that cannot be obtained in the traditional converters where a capacitor and inductor are used, respectively. The Z-source converter overcomes the conceptual and theoretical barriers and limitations of the usual source converter (known as a V-source converter and I-source converter) and provides a novel power conversion concept. The Z-source concept can be applied to all ac-to-ac, dc-to-ac, dc-to-dc, and ac-to-dc power conversion. To describe the control and operating principal, this paper explains an example: a Z-source inverter for dc-ac power conversion needed in fuel cell applications.Experimental results and simulation are presented to demonstrate the new features.

Published by: Aman Sharma, Shanti Dev Singh, Rahul Yadav, Shaista Fatima

Author: Aman Sharma

Paper ID: V3I2-1344

Paper Status: published

Published: March 27, 2017

Full Details

Detection and Analysis of Network & Application Layer Attacks Using Honey pot With System Security Features

Information security in the sense of private and social interactions has become a top priority in digitalized modern world in parallel to the new technological developments. Many approaches, tools, and expertise are used to provide the information security to the information systems. A honeypot is an active defense system for network security. It is able to trap attacks, record intrusion information about tools and activities of the hacking process, and prevents attacks outbound the compromised system. Integrated with the other security solutions, the honeypot is able to solve many traditional dilemmas. We expatiate key components of data capture and data control in a honeypot and give a classification for honeypot according to security goals and application goals. A honeypot is Java based deception tool having influential services (FTP etc.), it is a “Rule & Anomaly” based intrusion detection engine and a network-based administration and monitoring tool. This paper analysis the attack detector with existing system drawback which presents proposed approach more efficiently. Additional system security features are also added based on accessing the system securely. Features like detection of an intruder based on the timestamp and log-in details are considered. Tracking of the user is based on the system log and other databases pre-defined for secure accessing.

Published by: Akshay Harale, Sanket Tambe, Ganesh Kothawale

Author: Akshay Harale

Paper ID: V3I2-1342

Paper Status: published

Published: March 27, 2017

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X