i-manager's Journal on Computer Science (JCOM)


Volume 2 Issue 3 September - November 2014

Research Paper

TCP Friendly Rate Control for Real-Time Traffic in Wired Environment

Balakoteswara* , Shoba Bindu C**
* M.Tech Student, Computer Science and Engineering Department, JNTUA College of Engineering, Anantapuramu, Andhra Pradesh, India.
** Associate Professor, Computer Science and Engineering Department, JNTUA College of Engineering, Anantapuramu, Andhra Pradesh, India.
Balakoteswara, P., and Bindu, C.S. (2014). TCP Friendly Rate Control for Real-Time Traffic In Wired Environment. i-manager’s Journal on Computer Science, 2(3), 1-5. https://doi.org/10.26634/jcom.2.3.3310

Abstract

The authors are in search of a reliable, congestion control, real-time media traffic supportable protocol which is not yet available. Previously, for this purpose the authors were taking help of Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP is a reliable, congestion control protocol which works fine for low bandwidth scenarios and UDP is an unreliable protocol but works fine in high bandwidth scenarios. A protocol that opts in both situations high and low bandwidth scenarios is required. One such a protocol TCP Friendly Rate Control (TFRC) is designed by Internet Engineering Task Force People (IETF) and it is a reliable, congestion control protocol. TFRC is a rate based approach and well suitable for real-time video traffic because of smooth sending rate and friendliness with TCP flows achieved in it. This paper shows the complete study of TFRC, and performance of TFRC is compared with TCP flows such as TCP SACK, TCP Vegas, TCP Reno, and TCP Tahoe and also with UDP in wired environment.

Research Paper

Validation of Encrypted DNA Sequences:an Algorithmic SDV Approach

V.Hari Prasad*
Professor, Department of Computer Science and Engineering, Government Polytechnic College, Andra Pradesh, India.
Prasad, V.H. (2014). Validation of Encrypted DNA Sequences: An Algorithmic SDV Approach. i-manager’s Journal on Computer Science, 2(3), 6-10. https://doi.org/10.26634/jcom.2.3.3311

Abstract

While technology keeps growing, the world keeps shrinking, and this transformation is possible through compression. Earlier, computers occupied a room, now people are conveniently carrying in their hand. These massive developments are possible through compression in internet and other real time applications. Many English text compression algorithms fail to compress genetic sequences due to “the specialty of encoded text in genetic sequences”. In addition to that in text compression very rare code word repetitions occur, where as, in DNA (Deoxyribo Nucleic Acid) the repetitions of codewords are more and more. So there may be a possibility that the compression ratio and gain will be more in DNA (Genomic) sequences. This assumption makes true when the Human genome project is deciphered. Many State-of-theart compression algorithms are existing in connection with DNA sequences. Existing techniques are focused on compression rate, compress gain, time and space as metrics, and questions arise such that whether encoded and decoded sequence is valid or not?. The resultant answer is validation. Validation is highly required for resultant sequence. In this paper, the proposed novel methodology SDV (Shift Distance Validation) an algorithmic approach is employed, to test the validity of decompressed sequences which is more important in security applications.

Research Paper

Performance Evaluation of TCP Congestion Control Mechanisms in Wired Networks

S. Bandi* , Balakoteswara**, Shoba Bindu C***
*-** PG Scholar, Department of Computer Science and Engineering, Jawaharlal Nehru Technological University Anantapuramu, Andra Pradesh, India.
*** Associate Professor and Head of the Department, Department of Computer Science and Engineering, Jawaharlal Nehru Technological University Anantapuramu, Andra Pradesh, India.
Bandi, S., Balakoteswara, P., and Bindu, C.S. (2014). Performance Evaluation of TCP Congestion Control Mechanisms In Wired Networks. i-manager’s Journal on Computer Science, 2(3), 16. https://doi.org/10.26634/jcom.2.3.3312

Abstract

Transmission Control Protocol (TCP) is the transport layer protocol which is reliable and connection oriented. The beauty of TCP is its congestion control feature. TCP delights the packet losses as an indication of the congestion. TCP is widely used on the internet. There are various congestion control mechanisms that are available based on four basic approaches, such as slow-start, congestion avoidance, fast retransmit and fast recovery. Several TCP variants are used to control and avoid the congestion; these are TCP Tahoe, TCP Reno, TCP Vegas, and TCP New Reno. In this paper, the authors have evaluated the performance of various TCP congestion control algorithms with different Constant Bit Rate (CBR) traffic from the following aspects, based on the number of packets sent, number of packets lost and number of packets dropped. To calculate Packet Delivery Ratio (PDR), average end-end delay and average packet loss are calculated. In order to evaluate the performance of various TCP variants, the authors have used NS-2 simulator and the graphs have been generated using Xgraph.

Research Paper

Security Features of Users for Online Social Networks

Radhakrishna* , K. Chandra Sekharaiah**
* Associate Professor, Department of Computer Science and Engineering, V.S. Lakshmi Engineering College for Women, Andra Pradesh, India.
** Professor, School of Information Technology, Jawaharlal Nehru Technological University, Hydrabad, Andra Pradesh, India.
Krishna, A.R., and Sekharaiah, K.C. (2014). Security Features of Usersfor Online Social Networks. i-manager’s Journal on Computer Science, 2(3), 17-24. https://doi.org/10.26634/jcom.2.3.3313

Abstract

In recent years, Online Social Network (OSN's) have a great growth and a fabulous usage for thousands of millions of users on the Internet. These OSNs have become a main forum for digital social interactions and sharing of Information among users, but they does not have a proper facility of providing security and privacy apprehensions. Users manage these OSN’s access to share data, and presently there is no method to provide proper privacy concerns over the usage of data by multiple users. In this paper, the authors have suggested an approach in how to allow and protect the shared data of multiple users associated in OSN’s. The authors have designed a method to declaim these sense of multiple use conditions, including a method of policy specification of multiple users, and how to use this method of security of user's data. In this paper, the authors have included a logical representation of users access control model, which allows many users to work or extend this model. Proof of concept of approach of safety for an application on face book has been discussed and usability study and evaluation of the method, has been provided.

Research Paper

Rivalizing Maneuver of Mouse With Biometric Authentication

S. Mythili* , P.Hamsagayathri**
*-** PG Scholar, Department of Electronics and Communication Engineering, Bannari Amman Institute of Technology, Sathyamangalam, India.
Mythili, S., and Hamsagayathri, P. (2014). Rivalizing Maneuver of Mouse With Biometric Authentication. i-manager’s Journal on Computer Science, 2(3), 25-31. https://doi.org/10.26634/jcom.2.3.3314

Abstract

This paper proposed an alternative for the use of computers by physically challenged and paralyzed people. It explains the basic idea of a Human machine interface which can be used to control the mouse using head-tilt [4], [5] and eyeblink [9]. The use of this mouse which is a emulating device does not required much energy since, it uses simple head movement and eye blink [1]. This device or Goggle uses three axes sensor for detecting the movement of the head according to which, the movement of the cursor can been done [8]. A photo sensor detects eye blinking [6]. The Infra Red (IR) transceiver consists of a 935nm IR transmitter and a phototransistor mounted on the same unit. This detects a strong increase in the reflected signal upon intentional long blink as compared to normal eye blink. This also uses palm vein pattern recognition as a biometric authentication for secured use of the computer. Palm vein authentication has a high level of accuracy since, it is located within our body and does not change over time. Hence, it cannot indulge in any kind of forgeries.

Research Paper

Low Power Consumption in Variable Stage Pipeline Processor Using Fine Grain Prediction Mechanism

K. Kanimozhi1*
PG Graduate, Department of Electronics and Communication Engineering, Saveetha Engineering College, Chennai, India.
Kanimozhi, K. (2014). Low Power Consumption in Variable Stage Pipeline Processor Using Fine Grain Prediction Mechanism. i-manager’s Journal on Computer Science, 2(3), 32-37. https://doi.org/10.26634/jcom.2.3.3315

Abstract

This paper proposes a fine-grain-mode prediction for variable stage pipeline processor. Fine-grain controller adjusts the pipeline depth at every several tens of cycles and also predicts the suitable pipeline depth using a processor counter like as a cache hit counter or an each instruction counter. This method is used for variable stage pipeline (VSP) processor. A VSP processor varies in the pipeline depth dynamically according to workload. Based upon the workload the fine grain mode prediction unifies the pipeline stages. So, the power consumption reduces and increases its performance. A similar approach was proposed by Yao et al [3]. After 1 year the fine-grain control was proposed but their approach does not consider for the detailed mechanism to change pipeline depth with small penalty. To take advantage of fine-grain controlling of pipeline unification, it is essential to change pipeline depth without incurring a large penalty. This mode predictor is used for 7-stage pipeline processor. So that unification of the processor has been done and analyzing operation performed in the processor. This method is essential to change pipeline depth without incurring a large penalty.