Papers

Journal of Ultra Scientist of Physical Sciences - A
Voulume: 20
Issue: 3
Article No. 21
Bugging and Debugging of Software Metrics for an Artificial Immune Recognition System
S. CHITRA
Department of Computer Science and Engineering M. Kumarasamy College of Engineering, Karur, Tamil Nadu (INDIA)
K. THIAGARAJAN
Department of Mathematics, Rajalakshi Engineering College, Thandalam, Chennai, Tamil Nadu (INDIA)
M. RAJARAM
Department of Electrical and Electronics, Thanthai Periyar Govt. College, Tech. Vellore, Tamil Nadu (INDIA)
Abstract :

Software is an integral part of many critical and non-critical applications, and virtually any industry is dependent on computers for their basic functioning. Techniques to measure and ensure reliability of hardware have seen rapid advances, leaving Software as the bottleneck in achieving overall system reliability. Hence there rises a situation for the developers to develop high quality software. Having that in mind it is necessary to provide the reliability of the software to the developers before it is shipped. This can be achieved based on immune system. The immune system that is otherwise known as 'second brain' for its abilities to recognize new intruders and remember past occurrences. Simulating the immune system or translating immune system mechanisms into software learning is an interesting topic on its own. This will produce high quality, reliable results over a wide variety of problems compared to a range of other approaches, without the need of expert fine-tuning.
 

 

Keyword : Artificial Recognition Balls, Artificial Immune Recognition System, Operating systems,, software reliability growth models, Software Failure Rate.
DOI : jusps-A
Paper Download Count : 0
View Count : 632
Share
Facebook Twitter Google Plus LinkedIn Reddit
Article No. 22
Public key cryptography-implementation using R-2R ladder network
Davinder Singh
Lect. Meri - College of Engineering & Technology, Near Sampla, Bahadugarh
Ravinder Rathee
H.O.D, Computer Department, C.R., Polytechnic, Rohtak (INDIA)
Manoj Duhan (duhan.manoj@yahoo.com)
Chairman, Electronics & Commerce Department, GJUS & T, Hisar (INDIA)
Abstract :

Cryptography is the art of achieving security by encoding messages to keep the information non-readable. Cryptography actually is a mathematical scrambling and unscrambling of data to achieve, Confidentiality (Readable only to sender and receiver); Integrity (not modified by any one to integrity of message); Non repudiation (sender can't refuse the claim of not sending); and Entity authentication. While sending or receiving the data, special keys are used to encrypt/decrypt data to verify the original contents. This key makes the process of cryptography secure. Public key systems use two keys such that one key, the public key, can be used to encrypt some text that can then only be decrypted using the securely-held private key. There are two approaches for the generation of encryption/decryption keys i.e. software and hardware. The purpose of this paper is to generate encryption key using hardware technique. To design electronics circuit basic concept is derived from the Knapsack problem. Then R-2R ladder network is used for the implementation of Knapsack algorithm. The electronics circuit design is evaluated using (ORCAD-Pcpise) software and analyzed practically on electronics bread board as well. The circuit implementation aim is achieved through many intermediate steps which are followed as firstly terminology and transformation are defined foe public key cryptography, then the knapsack problem is discussed and after that knapsack algorithm (greedy algorithm) is achieved using the electronics circuits. Some modification also has been discussed to make circuit more practical and more secure.

 

Keyword : Public key, cryptography-implementation, R-2R ladder network
DOI : jusps-A
Paper Download Count : 0
View Count : 610
Share
Facebook Twitter Google Plus LinkedIn Reddit
Article No. 23
Graphs whose sum of independent domination number and chromatic number equals to 2n-6 for any n>3
G. MAHADEVAN (gmaha2003@yahoo.co.in)
Department of Mathematics, Gandhigram Rural University, Gandhigram - 624302 (INDIA)
A. SELVAM AVADAYAPPAN (selvam-avadayappan@yahoo.co.in)
Department of Mathematics, V.H.N.S.N., College, Virudhunagar - 626 001 (INDIA)
M. AMRA PARVEEN (amra_imam@yahoo.co.in)
Department of Mathematics, Gandhigram Rural Universiry, Gandhigram
Abstract :

A subset S of V is called a dominating set in G, if every vertex in V- S is adjacent to at least one vertex in S. A Dominating set is said to be independent dominating set if the induced subgraph < V > is independent. The minimum cardinality taken over all, such independent dominating sets is called the independent domination number and is denoted by gi(G). The minimum number of colours required to colour all the vertices such that adjacent vertices do not receive the same colour is the chromatic number c(G). It was already proved that gi(G) + c(G) £ 2n-1 and corresponding extremal graphs were characterized of order up to 2n-5. In this paper we characterize the class of graphs for which gi(G)+c(G) = 2n-6 for any n > 3.
 

 

Keyword : Independent , Chromatic number , domination
DOI : jusps-A
Paper Download Count : 0
View Count : 630
Share
Facebook Twitter Google Plus LinkedIn Reddit
Article No. 24
Region of interest image coding using cut plane segmentation method for medical image compression
R. Tamilselvi
Research Scholar, Department of ECE, Anna University, Chennai (INDIA)
K. Sarukesi
Professor, Department of IT, Rajalakshmi Engineering College, Chennai (INDIA)
K. Thiagarajan
Lecturer Department of Mathematics, Rajalakshmi Engineering College, Chennai (INDIA)
S. Jayabarathi
Associate Professor, Department of Mathematics, Thiyagarajar College of Engineering, Madurai (INDIA)
Abstract :

In this Paper an algorithm for Cut plane Segmentation method for ROI coding is proposed. Various results for Segmentation, Slicing, Searching and then ROI cut in the image are observed.

Keyword : ROI (Region of Interest), Cut - Plane Method, Searching Algorithm
DOI : jusps-B
Paper Download Count : 0
View Count : 628
Share
Facebook Twitter Google Plus LinkedIn Reddit
Article No. 25
Analysis of the feeding system of a Commercial Mill two associate components and with no provision for shutdown repair 
V. K. Pathak
Department of Mathematics Govt. P.G. College, Dhamtari (INDIA)
B.L. Dewangan
Govt., Polytechnic College, Dhamtari (INDIA)
Abstract :

This paper deals with the performance evaluation of a Commercial mill system involving two essential components viz. one main unit and two associate units. Associate units depend upon main unit for functioning. Only one repairman is used for repairing the failed components of all the units. Taking exponential failure rates and arbitrary, repair rates, various system effectiveness measures such as transition probabilities, mean time to system failure, availability, busy period of repairman are calculated. At last, profit analysis is done on the basis of above measures.

Keyword : feeding system, Mill two associate, components
DOI : jusps-A
Paper Download Count : 0
View Count : 570
Share
Facebook Twitter Google Plus LinkedIn Reddit
Article No. 26
Behaviour Analysis of Feeding System in Sugar Industry 
Satyavati
Research Scholar, J.V. Jain College, Saharanpur (U.P.) INDIA
T.P. Singh (tpsing78@yahoo.com)
Department of Maths, D.A.V. College, Sadhaura
Abstract :

The present paper discusses the operational behaviour of feeding system (i.e. the main functionary part) of the sugar plant. The system consist of three subsystems (having a number of units with different configurations) i.e. the crushing system, bagasse carrying system and the steam generation system. The units of crushing and bagasse system are in series while the units of Boilers and steam generation system are in parallel. Taking constant failure or general repair rates for each subsystem, the steady state availability are evaluated. Availability tables for various failure and repair rates with graphs are given followed by a parameter. 
 

Keyword : Operational behaviour, feeding system, availability- analysis etc.
DOI : jusps-A
Paper Download Count : 0
View Count : 594
Share
Facebook Twitter Google Plus LinkedIn Reddit
Article No. 27
Evolution and Comparison of Machine learning Classifiers with impact Result 
Anil Rajput
Department of Mathematics and Computer Application Sadhu Vaswani College, Bhopal (INDIA)
Ramesh Prasad Aharwal
Department of Mathematics, Govt. P.G. College Bareli Distt. Raisen (INDIA)
Amit Dutta
UTD., Department of Computer Science, Barkatullah University, Bhopal (INDIA)
Abstract :

Machine learning classifiers are mostly used for prediction of system behavior ,Evolution and comparison of different machine learning classifiers used in Data Mining practical in health datasets, how to select the most suited data mining algorithm for a medical application. In this paper we used three medical datasets for our experiment. Experiment performed on WEKA 3.5.7 software which is a newest version of WEKA software. 
 

Keyword : Classification, Data Mining, WEKA, J48, Nau00efve Bays
DOI : jusps-A
Paper Download Count : 0
View Count : 611
Share
Facebook Twitter Google Plus LinkedIn Reddit
Article No. 28
Reliability analysis for two-unit system with ccs failures and human errors 
G.Y. SAGAR (gysagar@gmail.com)
Department of Operations Research and Statistical Quality Control, Sri Krishnadevaraya University, Post - Graduate Centre, Kurnool - 518002 (A.P.) (INDIA)
S.M. VERMA
Department of Operations Research and Statistical Quality Control, Sri Krishnadevaraya University, Post - Graduate Centre, Kurnool - 518002 (A.P.) (INDIA)
Y.R. REDDY
Department of Operations Research and Statistical Quality Control, Sri Krishnadevaraya University, Post - Graduate Centre, Kurnool - 518002 (A.P.) (INDIA)
Abstract :

The present paper deals with the reliability analysis of two-unit identical system, which is affected by common cause shock (CCS) failures and human errors along with individual failures. The influence of CCS failures in addition to human errors is emphasized in the reliability analysis of a system. Expressions for system reliability and mean time between failures (MTBF) are developed when the system is affected by CCS failures as well as human errors. Also, these reliability indices are compared in the presence of CCS failures as well as human errors with that of the situation when CCS failures are affecting the system. Reliability Plots are shown and Numerical illustration of MTBF results is also presented to support the model. 
 

Keyword : Reliability, Mean time Between Failurs (MTBF), Common Cause Shock Failures, Human Errors
DOI : jusps-A
Paper Download Count : 0
View Count : 706
Share
Facebook Twitter Google Plus LinkedIn Reddit
Article No. 29
Harmonic Univalent Functions with Fixed Point and Negative Coefficients 
K. K. Dixit
Department of Mathematics, Janta College, Bakewar, Etawah - 206124
Saurabh Porwalu00a0
Department of Mathematics, Janta College, Bakewar, Etawah - 206124
Abstract :

Let and denote the class of functions , where  and that map the unit disc onto starlike and convex domains respectively satisfying. In this paper, sharp coefficient estimates, distortion properties for functions in and have been obtained. This leads to extreme points.

Keyword : Harmonic , Univalent , Functions, Negative Coefficientsu00a0
DOI : jusps-A
Paper Download Count : 0
View Count : 655
Share
Facebook Twitter Google Plus LinkedIn Reddit
Article No. 30
Dynamical systems for metric spaces 
Bharathi K.
Department of Mathematics, Gulbarga, University, Gulbarga (INDIA)
Shabbir A. (shabirshahir@yahoo.co.in)
Department of Mathematics, Gulbarga, University, Gulbarga (INDIA)
Abstract :

The present paper is an extension work of the Barnsley1 and Devaney3. We introduce Poincare and Shift maps, furthermore we establish and proved some theorems for topological sensitivity and global stability. 
 

Keyword : Global stability, Metric spaces, Poincare map, AMS mathematical subject classification 45 B10.
DOI : jusps-A
Paper Download Count : 0
View Count : 629
Share
Facebook Twitter Google Plus LinkedIn Reddit
Pages 1 2 3 4
Ansari Education And Research Society
Facebook Google Plus Twitter