Volume II Issue I

Alex Moon January 2013 Page No.: 01-04

In telecommunication and radio communication, spread-spectrum techniques are methods by which a signal (e.g. an electrical, electromagnetic, or acoustic signal) generated with a particular bandwidth is deliberately spread in the frequency domain, resulting in a signal with a wider bandwidth. These techniques are used for a variety of reasons, including the establishment of secure communications, increasing resistance to natural interference, noise and jamming, to prevent detection, and to limit power flux density.

  •  Page(s): 01-04
  •  Date of Publication: January 2013
  •  Alex Moon
    La Trobe University, Victoria, Australia

References

 

[1] Nauka i Zhizn 10, 1958, p. 66
[2]Tekhnika Molodezhi 2, 1959, p. 18-19
[3]https://en.wikipedia.org/wiki/Spread_spectrum
[4] https://www.bee.net/
[5] Nauka i Zhizn 8, 1957, p. 49
[6] Yuniy technik 7, 1957, p. 43-44
[7] https://www.maximintegrated.com

Alex Moon “Spread Spectrum Communications” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 1, pp.01-04 2013

For Full Text Click here
pdf download

Deepika Saxena January 2013 Page No.: 05-07

Nothing has changed the world around us the way digital technology and computers have. Computers have entered every aspect of our life and the environment around us. Real time systems are playing vital role in daily life. In just a few decades ago, real time systems are reshaping the way people live, work, and play. Real time systems come in an endless variety of types, each exhibiting unique characteristics. For example, most vehicles driven today embed intelligent computer chips that perform value-added tasks, which make the vehicles easier, cleaner, and more fun to drive. Even private homes are being filled with intelligent appliances, which facilitate and enhance everyday life. Real- Time systems span several domains of computer science.They are defense and space systems networked multimedia systems, embedded automotive electronics etc. The purpose of this chapter is to give an overview of the broad area of real-time systems. This task daunting because real time systems are everywhere and yet no generally accepted definition differentiates real-time systems from non–real-time systems. A system is defined as being real-time if it is required to respond to input stimuli within a finite and specified time interval. The stimuli being either an event at the interface to the system or some internal clock tick that is, at least notionally, coordinated with the passage of time in the system’s environment. Real-time systems are found in a wide range of applications areas, from simple domestic appliances to multi-media systems, large scale process control and safety critical avionics. In some systems the required response times aremeasured in milliseconds, in others it is seconds or even minutes. .

  •  Page(s): 05-07
  •  Date of Publication: January 2013
  •  Deepika Saxena
    SGI, Sikar, Rajasthan,India

References

 

[1] Audsley and A. Burns, Department of computer Science, University of York, UK
[2] Abeni, L., and Buttazzo, G. 1998. Integrating multimedia applications in hard real-time systems.
[3] Abeni, L., and Buttazzo, G. 2004. Dynamic real-time systems.
[4] A. Aldarmi and Alan Burns, Real-Time Systems, Group Department of Computer Science,The University of York, YO10 5DD,U.K. November 1998
[5] Arezou Mohammadi and Selim G. Akl, Scheduling Algorithms for Real-Time System Technical Report No.2005-499, School of Computing, Queen’s University
[6] Buttazzo,G.C.2003. Rate monotonic vs. EDF: Judgment day.
[7] C.L .Liu, J.W.Layland, Algorithms in Multiprogramming in a Hard Real Time Environment.
[8] D. Stewert, Introduction to Real Time Scheduling Theory, Spring 2000.
[9] Ed. Overton, A Foray into uniprocessor Real Time Scheduling Algorithms and Intractibility December 3,,1997

Deepika Saxena “Performance Analysis of Real Time Scheduling Algorithms using Cheddar” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 1, pp.05-07 2013

For Full Text Click here
pdf download

I.K.Rao January 2013 Page No.: 08-11

Mn, Zn, Fe are dissolved from plant materi8als by mineral acids. Test procedures for medical plant materials dissolved 10mg in 1ml of Ethonal (750g/l) TS, and 4ml of water. Sterile water extract of plant material will dissolve ferric oxide. The role of leaf exudates in the solution of copper from Bordeaux mixture. Our material Hg (Mercury) dissolve directly without any mixing is reported by the author. It is demonstrated before all scientist in the seminar hall. That the plant leaves are prepared as Nano particles and is examined by XRD, XRF, EDAX, DTA and DSC, FTR in this mixture golden silver also looses original properties. The plant leaves are prepared as Nano particles and. It is a new investigation that no paper has published so far on Hg is dissolved in plant leaves solutions.

  •  Page(s): 08-11
  •  Date of Publication: January 2013
  •  I.K.Rao
    Retired Lecturer,
    Govt. Degree College for Women,Srikakulam-532001, A.P, India
    (Affiliated to Andhra University, Visakhapatnam)

References

 

Material dissolve in plant leave solution in Google search page 1 to 3

I.K.Rao ” Materials Dissolve in Plant Leaf Solutions. ” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 1, pp.08-11 2013

For Full Text Click here
pdf download

Parth Bhatiya January 2013 Page No.: 12-17

With the progression of computer networks extending boundaries, Mobile ad hoc network (MANET) has more easy technology to provide anywhere, anytime communication. Due to its deployment nature, MANETs are easier to malicious attack. The absolute security in the mobile ad hoc network is very hard to achieve because of its fundamental characteristics, such as dynamic topology, open medium, limited power and limited bandwidth. The Prevention methods like authentication techniques and cryptography techniques and algorithms alone are not able to provide the security to these types of networks. so, efficient intrusion detection must be made to facilitate the identification and isolation of attacks. In this paper, we have surveyed several techniques for intrusion detection in MANET.

  •  Page(s): 12-17
  •  Date of Publication: January 2013
  •  Parth Bhatiya
    P.G Student,
    L.D.R.P College of Engineering, Gandhinagar, India

References


[1] Y. Zhang, W. Lee, and Y. Huang, “Intrusion Detection Techniques for Mobile Wireless Networks,” ACM/Kluwer Wireless Networks Journal (ACM WINET), Vol. 9, No. 5, September 2003.
[2] P. Albers, O. Camp, J. Percher, B. Jouga, L. M・ and R. Puttini, “Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches,” Proceedings of the 1st International Workshop on Wireless Information Systems (WIS-2002), pp. 1-12, April 2002.
[3] O. Kachirski and R. Guha, “Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks,” Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS’03), p. 57.1, January 2003.
[4] D. Sterne, P. Balasubramanyam, D. Carman, B.Wilson, R. Talpade, C. Ko, R. Balupari, C.-Y. Tseng, T. Bowen, K. Levitt, and J. Rowe, “A General Cooperative Intrusion Detection Architecture for MANETs,” Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA’05), pp. 57-70, March 2005.
[5] Tseng, C.Y., P. Balasubramanyam, C. Ko, R. Limprasittiporn and J. Rowe et al., 2003. A specification-based intrusion detection system for AODV. Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, Oct. 27- 30, ACM Press, Washington, DC, USA., pp: 125- 134. DOI: 10.1145/986858.986876
[6] Vigna, G., S. Gwalani, K. Srinivasan, E.M. Belding-Royer and R.A. Kemmerer, 2004. An intrusion detection tool for AODV-based ad hoc wireless networks. Proceedings of the 20th Annual Computer Security Applications Conference, Dec. 6-10, IEEE Xplore Press, pp: 16-27. DOI: 10.1109/CSAC.2004.6
[7] Viswanatham, V.M. and A.A. Chari, 2008. An approach for detecting attacks in mobile adhoc networks. J. Comput. Sci., 4: 245-251. DOI: 10.3844/jcssp.2008.245.251

Parth Bhatiya “Intrusion Detection in Mobile Ad-hoc Networks: A Survey ” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 1, pp.12-17 2013

For Full Text Click here
pdf download

N. K. Singh, Amod Kumar January 2013 Page No.: 18-23

A field experiment with Maize (Zea mays L.) c.v. Ganga Safed – 2 was conducted at Crop Research Centre of the G. B. Pant University of Agriculture & Technology, Pantnagar, Uttarakhand during Kharif season of 2011 with four planting dates viz P1 (16 May), P2 (31 May), P3 (15 June) and P4 (30 June), three nitrogen levels Viz. N1 (80 kg N/ha), N2 (120 kg N/ha) and two intra-row spacing viz. S1 (10 cm) and S2 920 cm), respectively. Various thermal indices including Growing degree days (GDD), Photothermal units (PTU), Heliothermal unit (HTU), Heat use efficiency (HUE), and Photothermal index (PTI) for Maize were calculated using standard methods for above treatments. The results showed that minimum significant GDD accumulation at various growth stages were observed at P3 sowing date and it was 67.7, 874.2, 982.46 and 1566.27 at emergence, 75 % tasseling, 75 % silking and at maturity, respectively. Also, the minimum GDD was highly significant (1067.21) at 75 % silking at S2 spacing and was 1628.77 at S1 spacing for 75 % tasseling. The HTU was observed to be significantly minimum of 396.9 for P4 at emergence. However, for 75 % tasseling, 75 % silking and at maturity, the minimum values of HTU were observed to be 4692.72, 5403.67 and 8967.66, respectively, at P3 planting. Maximum PTU accumulation of 20494.7 was observed at S1 level at maturity. The effect of planting date, nitrogen level and spacing on PTI. A maximum significant HUE of 49.76 g oC-1 day-1 was observed at P3 planting date. However, maximum significant HUE of 42.65 g oC-1 day-1 was observed at S1 level, while minimum HUE (39.81 g oC-1 day-1)was observed at S2 spacing.
The correlation – regression analysis showed that PTU provided better estimates for emergence (r=0.932) while GDD estimated 75 % tasseling (r=0.999) and maturity (r=0.94) more accurately than HTU and PTU. The thermal indices were found to negatively correlated with yield (r=0.253 for GDD; r=-0.085 for HTU and r=-0.251 for PTU, respectively for the Kharif season. However, a positive correlation (r=0.20, r=002 r=0.20 for GDD, HTU and PTU, respectively) with yield was observed for 15 June sowing Maize.
It can be concluded from this study that minimum of GDD, HTU and HUE for growth, development and yield were found to be optimum for 15 June planting (P3) with 120 kg N / ha and 20 cm row spacing. However, the photothermal index was significantly affected by planting date, nitrogen level and intra row-spacing.

  •  Page(s): 18-23
  •  Date of Publication: January 2013
  •  N. K. Singh
    Institute of Engineering & Technology Alwar (Raj.), India
  •  Amod Kumar
    Department of Soil Science, College of Agriculture
    G. B. Pant University of Agriculture & Technology, Pantnagar – 263145, Uttarakhand, India

References

 

1. Aspiazu, C. and Shaw, R.H. (1972). Comparison of several methods of growing degree day unit calculation for corn. Iowa State College J. Sci. , 46 : 435-42.
2. Major, D.J. ; Johnson, D.R.; Tamer, J.W. and Anderson, I.C. (1975). Maize growth and yield in relation to planting dates in Middle Egypt. Bulletin of Faculty of Agriculture, University of Cairo. 47 (1) : 73-85.
3. Rajput, R.P. (1998). Response of soybean crop to climatic3and soil environment. Ph.D Thesis, IARI, New Delhi.
4. Sastry, P.S.N and Chakravorthy, N.V.K. (1982). Energy summation indices for wheat crop in India. Agric. Meteorology, 27 : 45-48.
5. Varughese, k. and Iruthayaraj, M.R. (1995).Seasonal variation in yield and heat unit requirement of maize (Zea mays L.). Crop Research., 10 (1) : 67-73.

N. K. Singh, Amod Kumar “Thermal Requirment of Maize Influenced by Planting Dates and Intra- Row Spacing” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 1, pp.18-23 2013

For Full Text Click here
pdf download

Kakkatil Binita, Chandan Pal Singh, Surendra Kr.Jangir January 2013 Page No.: 24-27

In this paper, we study how improves performance of query caching for dynamic content web sites. The dynamic web server is composed of a traditional web server attached to an application server. The web servers are typically replicated for load balancing and fault tolerance. The application server performs the necessary computation to determine what data is required from the database. It then queries the database and constructs replies based on the results of the queries. For the purpose of this paper we consider the combination of the web server and the application logic collectively as the front-end and the database as the back-end. We propose and apply a cycle of optimizations for a fully crystal clear dynamic content cache suitable for any web application. We optimize the query cache to handle full and partial coverage of query results at the expense of additional processing. We propose several optimizations that reduce the load on the database leading to higher performance.

  •  Page(s): 24-27
  •  Date of Publication: January 2013
  •  Kakkatil Binita
    Department of Electronics Engineering,
    PIIT,Navi Mumbai, Maharashtra, INDIA
  •  Chandan Pal Singh
    Departmentof CS & IT,
    Jagannath University, Jaipur, Rajasthan, INDIA
  •  Surendra Kr.Jangir
    Departmentof CS & IT,
    Jagannath University, Jaipur, Rajasthan, INDIA

References

 

[1] J. Challenger, P. Dantzig, and A. Iyengar. A scalable system for consistently caching dynamic web data. In Proceedings of the 18th Annual Joint Conference of the IEEE Computer and Communications Societies, New York, New York, 1999.
[2] Q. Luo, S. Krishnamurthy, C. Mohan, H. Pirahesh,H. Woo, B. G. Lindsay, and J. F. Naughton. Middle-tier database caching for e-business. In Proceedings of the 2002 ACM SIGMOD international conference on Management of data, pages 600–611.ACM Press, 2002.
3] Ideal Strategy to Improve Datawarehouse Performance by Fahad Sultan & Dr. Abdul Aziz. (IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 02, 2010, 409-415
[4] Oracle. Oracle9i application server web caching. 2000.
[5] A. Labrinidis and N. Roussopoulos. WebView materialization. pages 367–378, 2000.
[6] K. S. Candan, W.-S. Li, Q. Luo, W.-P. Hsiung, and D. Agrawal. Enabling dynamic content caching for database-driven web sites. In Proceedings of the 2001 ACM SIGMOD international conference on Management of data, pages 532–543. ACM Press, 2001.
[7] K. Yagoub, D. Florescu, V. Issarny, and P. Valduriez.Caching strategies for data-intensive web sites. In Proceedings of the 26th International Conference onVery Large Databases, 2000.
[8] K. Rajamany. Multi-tier caching of dynamic content for database-driven web sites. PhD thesis, Rice University, Houston, Texas, 2000.
[9] MySQL. https://www.mysql.com.
[10] A. Iyengar and J. Challenger. Improving web server performance by caching dynamic data. In USENIX Symposium on Internet Technologies and Systems,1997.
[11] Efficient incremental view maintenance in data warehouses. Ki Yong Lee, Jin HyunSon, Myoung Ho Kim. Korea Advanced Institute of Science and Technology.
[12] Strategy to make superior Data ware house by Vishal Gour in International Conference on advance computing and creating entrepreneurs Feb2010.

Kakkatil Binita, Chandan Pal Singh, Surendra Kr.Jangir “Improve Query Caching for Dynamic Content Web Sites” International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.2 issue 1, pp.24-27 2013

For Full Text Click here
pdf download

Dr. Gaurav Kumar Jain, Mr. Pradeep Sharma, Mukul Verma January 2013 Page No.: 28-32

Widely connected enterprise networks and the Internet have enabled viruses, worms and blended threats to make use of computer networks for propagation, significantly increasing the speed of infection and damage. The Internet, with its ease of sharing and downloading of files, has also increased the risk of infection to the average user. A user may infect a computer by an action as simple as clicking on a downloaded file or an email attachment. Investment on several layers of protection is required for most enterprises for effective protection of computer networks.

  •  Page(s): 28-32
  •  Date of Publication: January 2013
  •  Dr. Gaurav Kumar Jain
    Regional College For Education, Research and Technology
  •  Mr. Pradeep Sharma
    Regional College For Education, Research and Technology
  •  Mukul Verma
    Regional College For Education, Research and Technology

References

 

[1.] https://www.tech-faq.com/network-attacks.html
[2.] www.ehow.com/about_6375469_blaster-worm_.html
[3.] https://blasterworm.net/
[4.] www.expresscomputeronline.com/20080728/securityspecial02.shtml
[5.] https://en.wikipedia.org/wiki/Code_Red_(computer_worm)
[6.] virus.wikia.com/wiki/Nimda
[7.] en.wikipedia.org/wiki/Backdoor_(computing)
[8.] khodenko.tripod.com/Firewalls
[9.] https://pl.safensoft.com/security.phtml?c=587
[10.] www.protocols.com/pbook/h323.htm
[11.] www.webopedia.com/TERM/P/proxy_server.html
[12.] https://en.wikipedia.org/wiki/Application_firewall

Dr. Gaurav Kumar Jain, Mr. Pradeep Sharma, Mukul Verma “Comparison of Firewall, Intrusion Prevention and Antivirus Technologies” International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.2 issue 1, pp.28-32 2013

For Full Text Click here
pdf download

Avinash Pareek, Satyam Pincha January 2013 Page No.: 33-41

Today’s world is moving at an ever increasing pace. New technologies, opportunities, threats all force companies to have the ability to be able to change rapidly in order to stay competitive and survive in increasingly harder business climates. In this paper we look at how new generations working with new types of media can play a vital role in how a company goes about its change management decisions. The focus is centered on the use of social media in a business environment. In this paper we have come to the conclusion that an implementation of social media will yield faster and better communications within a company and also make the company more transparent where every employee’s opinions can be read, documented and saved for future use. This information can later be utilized when carrying out and managing change in a business environment. Social media is a, at least in the field of academia, young phenomena. There has not been an extensive research in the subject, especially not with regard to uses in organizations. For this reason we have chosen to make use of many sources from as diverse fields as possible. We focused on finding at least two, of each other independent sources, wherever possible to verify statements. We also relied on our own experience from working with social media and the knowledge gained through the course of consuming literature on the subject to assess sources. Apart from the sources we have listed in our reference section we have also taken part of much more material to further our own basic knowledge and understanding of social media.

  •  Page(s): 33-41
  •  Date of Publication: January 2013
  •  Avinash Pareek
    Faculty of Engineering,
    Life Sciences and Management, IASE Deemed University Sardarshahr, Rajasthan, India
  •  Satyam Pincha
    Faculty of Engineering,
    Life Sciences and Management, IASE Deemed University, Sardarshahr, Rajasthan, India

References

 

 Accenture (2007, April), User Generated Content is Top Threat to Media and Entertainment Industry, Accenture Survey Finds. Last retrieved 1/6/2009 from https://newsroom.accenture.com/article_display.cfm?article_id=4534
 Arrington, Michael (2008, November) I Can’t Believe Some People Are Still Saying Twitter Isn’t A News Source, TechCrunch. Last retrieved 1/6/2009 from https://www.techcrunch.com/2008/11/27/i-cant-believe-some-people-are-still-saying-twitter-isnt-anews-source/
 Benkler, Yochai (2006), The wealth of networks: how social production transforms markets and freedom, New Haven: Yale University Press.
 Kirkpatrick, Marshall (2008, November), Poll: Internet now considered more reliable than TV, Radio News, Read Write Web Last retrieved 1/6/2009 from https://www.readwriteweb.com/archives/internet_now_reliable.php
 Jenkins, Henry (2008), Convergence Culture: Where old and new media collide, New York: New York University Press.
 MacManus, Richard (2008, October), Report: Social web usage tipped in 2008, Read Write Web Last retrieved 1/6/2009 from https://www.readwriteweb.com/archives/report_social_web_usage_tipped_2008.php
 Noff, Ayelet (2008, October), Why You Should Turn to Social Media During This Economic Crisis, The Next Web. Last retrieved 1/6/2009 from https://thenextweb.com/2008/10/21/why-you-should-turnto-social-media-during-this-economic-crisis/
 Palfrey, John & Gasser, Urs (2008), Born Digital: Understanding the first generation of digital natives, New York: Basic Books.
 Reuters (2008, October), Article, Retrieved 29/10/2008 from https://tech.yahoo.com/news/nm/20081029/wr_nm/us_britain_facebook
 Rothbart, James (2008, November), IT Must Learn To Bend Or Business Will Break, Read Write Web Last retrieved 1/6/2009 from https://www.readwriteweb.com/archives/it_must_learn_to_bend.php
 Rubicon Consulting, Inc. (2008, October), Online Communities and Their Impact on Business Solis, Brian (2008, August), The Conversation Prism Last retrieved 1/6/2009 from https://www.flickr.com/photos/briansolis/2735401175/

Avinash Pareek, Satyam Pincha “Social Media and Business Environment” International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.2 issue 1, pp.33-41 2013

For Full Text Click here
pdf download

Sahil Kadia, A.S. Dhabariya January 2013 Page No.: 42-52

An Edge in an image is the boundary between two different regions. Edge detection is important in image processing and computer vision, particularly in the area of feature detection. An edge often indicates the physical extent of object within the image. An edge detection process ultimately aims to obtain a binary edge map. Edge detection is a fundamental tool for image segmentation. In this paper an attempt is made to study of most commonly used edge detection techniques for image segmentation and also the study of different soft computing approaches base on this techniques .

  •  Page(s): 42-52
  •  Date of Publication: January 2013
  •  Sahil Kadia
    Shrinathji Institute of Technology and Engineering,
    Upali Oden, Nathdwara, India
  •  A.S. Dhabariya
    Asst.Prof., Shrinathji Institute of Technology and Engineering,
    Upali Oden, Nathdwara, India

References

 

[1] E. Argyle. “Techniques for edge detection,” Proc. IEEE, vol. 59, pp. 285-286, 1971
[2] Rafael C. Gonzalez, Richard E.woods,“Digital Image Processing”, Prentice hall Publication.
[3] S. K. Pal, R. A. King, “Image Enhancement Using Fuzzy Sets,” Electronics Letters, Vol. 16, sp. 376-378, 1980.
[4] Muhammad Bilal Ahmad and Tae-Sun Choi, “Local Threshold and Boolean Function Based Edge Detection”, IEEE Transactions on Consumer Electronics, Vol. 45, No 3. August 1999
[5] Chin-Chen Chang, Zhi-Hci Wang, Zhao-Xia Yin ,“A Simple and Efficient Edge Detection Method” Third International Symposium on Intelligent Technology Application ,2009.
[6] Abdallah A. Alshennawy, and Ayman A. Aly, “Edge Detection in Digital Images Using Fuzzy Logic Technique” World Academy of Science, Engineering and Technology 51,pp. 178-186, 2009.
[7] Saman Sinaia, Afshin Ghanizadeh , and SiMi Meriyat Shamsuddin , Emadaldin toza- fari Majd , ” A Hybrid Edge Detection Method Based on Fuzzy Set Theory and Cellular Learning Automata” International Conference on Computational Science and its Applications, 2009

Sahil Kadia, A.S. Dhabariya “A Study of Different Edge Detection Methods and Different Computing Approaches” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 1, pp.42-52 2013

For Full Text Click here
pdf download

Dr. Gaurav Kumar Jain, Mr. Pradeep Sharma, Mukul Verma January 2013 Page No.: 53-60

This paper focuses on the risk issues for wireless LAN from a corporate network perspective, these same issues apply to home networks, telecommuters using wireless, and “public use” networks such as those being set up by Microsoft to allow wireless Internet access at select Starbucks locations. There are several known risks for wireless network, undoubtedly increase in number and sophistication over time. Here we discuss the Internet Security Systems product and services to overcome from these security risks. Internet Security Systems products and services provide a robust security management solution for wireless LANs.

  •  Page(s): 53-60
  •  Date of Publication: January 2013
  •  Dr. Gaurav Kumar Jain
    Associate Professor,
    Regional College For Education, Research and Technology
  •  Mr. Pradeep Sharma
    Regional College For Education, Research and Technology
  •  Mukul Verma
    Regional College For Education, Research and Technology

References

 

[1.] ieee802.org/11
[2.] en.wikipedia.org/wiki/IEEE_802.11b-1999
[3.] compnetworking.about.com/cs/lanvlanwan/g/bldef_lan.htm
[4.] searchwindevelopment.techtarget.com/definition/intranet
[5.] https://fengnet.com/book/Optimizing-Applications/ch05lev1sec3.html
[6.] docwiki.cisco.com/wiki/Simple_Network_Management_Protocolwww.wimax.com/…is-unlicensed-spectrum-what-frequencies-are-they-in
[7.] download.intel.com/technology/itj/q22000/pdf/art_5.pdf
[8.] https://www.iss.net/

Dr. Gaurav Kumar Jain, Mr. Pradeep Sharma, Mukul Verma “Wireless LAN Security 802.11b and Corporate Networks” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 1, pp.53-60 2013

For Full Text Click here
pdf download

Raja Sekhar Mamillapalli, Suraj Kumar Sahu January 2013 Page No.: 61-64

Environment and development are the two sides of the same coin. Advancements in science and technology have accelerated the pace of industrialization. The industrialization is a continuous process and enhances the standard and quality of life of people but leads to environment degradation. Noise, exhaust fumes, wastes of different kinds adversely affects the environment and creates various kinds of health hazards. The Industrialization and environment and creates various kinds of health hazards. The industrialization and environment degradation go hand in hand. Since Industrialization is the basics of development, it cannot be given up. Hands of the clock cannot be turned back. The only option left is to control and manage environment degradation. The environment degradation, in fact started with the propagation of human race. Today environment degradation is a world-wide phenomenon and has become concern for control. The process of environment degradation has accelerated with the development of socioeconomic activities, for example agriculture, industrialization, drugs and pharmaceuticals transport, civil construction including roads and buildings, etc., with growing population, the requirements of food grains and other consumer items increasing greatly, leading to further environment degradation. As long as the assimilation capacity of receiving water system, land, air, etc., is more than the pollution load the importance of environment protection was not critical. But today there are places where rivers are polluted to the extent effluents, for example river Ganges at Kanpur, Mithi river at Mumbai. Industrialization is considered as the barometer of civilization. Increasing economic openness, growing economic interdependence and deepening economic integration in the world economy are the result of Globalization. In this never-ending race of making profit today, most of the organizations are forgetting their duties towards environment. Community awareness, people’s participation and clean production technologies with sustainable development is must for environmental conservation. Every industrial organization and every citizen should be motivated for achieving clean and green environment. Each state, each nation, each continent, the entire world should adopt clean technologies for production.

  •  Page(s): 61-64
  •  Date of Publication: January 2013
  •  Raja Sekhar Mamillapalli
    Assistant Professor,
    Dept of Civil Engg, Sir Padampat Singhania University, Udaipur, Rajasthan, India
  •  Suraj Kumar Sahu
    Assistant Professor,
    Dept of Civil engg, IGIT, Sarang, Orissa, India

References

 

1. Kim, J.J., Introduction to sustainable design, The Masterbuilder, Vol. 3, No. 6, pp. 34-44.
2. Kibert, C.J., Sustainable construction: Green building design and delivery, John Wiley & Sons, Inc., Hoboken, NJ, 2005.
3. Chiras, D., The homeowner’s guide to renewable energy, New Society Publishers, Gabriola Island, Canada, 2006.
4. Smil, V., Energy – A beginner’s guide, Oneworld Publications, Oxford, England, 2006. USGBC- journals

Raja Sekhar Mamillapalli, Suraj Kumar Sahu “Clean Production Technologies for Sustainable Development” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 1, pp.61-64 2013

For Full Text Click here
pdf download

Megha Sharma January 2013 Page No.: 65-74

The world is facing severe energy crises and the mode of conversion of various fuels into utilizable form affect economy, environment and health adversely. Utilization of renewable energy resources particularly solar energy can decrease these to a considerable extent. Solar energy is most promising renewable source for India and all underdeveloped and developing nations which within 40 of equator. Solar energy can be utilized in both direct and indirect form. Utilization of solar energy in the form of solar thermal applications can save a lot of conventional energy resources. In country like India on the one hand solar cooking needs to be promoted while on the other hand there is a need for development of more efficient and user friendly solar cookers. Solar cooking would be popularized only when a good number of models are made available to the masses with appropriate characterizations and performance figures clearly mentioned for each model. Therefore a uniform strict test protocol must be followed for solar cookers. Only then users will have correct choice and would be attracted for maximum use of solar cookers. With this view we have discussed at length various test protocols. With study of L.S.C. clearly reveals that the cooker design developed and studied in the present work has good weather ability, life, thermal performance and cooking performance.

  •  Page(s): 65-74
  •  Date of Publication: January 2013
  •  Megha Sharma
    Assistant Professor, Department of Physics,
    Institute of Engineering and Technology, Alwar (Raj.)

References

 

[1] www.indiasolar.com/solarcookers.htm, 2008.
[2] Sengar N., Thesis: Utilization of solar energy in low-grade energy applications. July (2007).
[3] Funk P.A Solar energy 68, 1-7, 2000.
[4] Mullick S.C., Kandpal T.C. and Saxena A.K., Solar energy 39, 353-360, 1987
[5] Dashora P., Sengar N. & Pareek S., 2005, in Proc. of 2005 Solar World Congress, 6-12 Aug., 2005, Orlando, Florida, USA, Eds. Goswami D.Y., Vijayaraghaven S. & Campbell-Howe R., paper no. 1197.
[6] Kreider J.F. & Kreith F., 1975, Solar Heating and Cooling: Engineering , Practical Design and Economics, McGraw Hill Publication, New York, Ch. 1.
[7] Duffie J.A. & Beckman W.A., Solar Energy Thermal Processes, 1974, John Willy and Sons, New York, Ch. 1.
[8] Nahar N.M., 1987, in Alternative Energy Sources VII, Ed. Veziroglu T.N., Hemisphere Publishing Corporation, USA, pp. 431.
[9] Ghosh G.K., 1997, Solar energy: The Infinite Source, Ashish Publishing House, New Delhi, Ch. 1.
[10] www.ecoworld.com/home/articles2.cfm?tid=418, 2008.

Megha Sharma “Design details of a novel lightweight low cost solar cooker and its experimental study” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 1, pp.65-74 2013

For Full Text Click here
pdf download

Sayli S. Naik, C. G. Dighavkar, Archana S. Patil January 2013 Page No.: 75-83

Cloud computing is current buzzword in the market It is paradigm in which the resources can be leveraged on per use basis thus reducing the cost and complexity of service providers. Cloud computing promises to cut operational and capital costs and more importantly let IT departments focus on strategic projects instead of keeping datacenters running. It is much more than simple internet. The various services provided by cloud computing are Software as a service(SaaS), Infrastructure as a Service(IaaS), and Platform as a Service(PaaS).This paper gives the different models of the cloud computing. This paper contains the detailed study of Software as a Service (SaaS) which includes the characteristics of the SaaS, The requirements of SaaS Service delivery infrastructures, architecture of the SaaS, and gives where the SaaS will best fit and where it may be not best fit.

  •  Page(s): 75-83
  •  Date of Publication: January 2013
  •  Sayli S. Naik
    Computer Science.
    Ashoka Universal School India.
  •  C. G. Dighavkar
    Electronics.
    L.V.H College, Nasik, India
  •  Archana S. Patil
    Computer Science.
    Panchavati College of Managemnt & Computer Science, Nasik, India

References

1. A.Weiss.( Dec. 2007) Computing in the Clouds. netWorker, 11(4):16-25.
2. Al-Fares M et al (2008) A scalable, commodity data center network architecture. In: Proc SIGCOMM
3. Amazon Elastic Computing Cloud, aws.amazon.com/ec
4. Cal Henderson, Building Scalable Web Sites: Building, Scaling, and Optimizing the Next Generation of Web Applications, ISBN: 0596102356.
5. CEMS: low cost, low power servers for Internet-scale services
6. Cloud Hosting, CLoud Computing and Hybrid Infrastructure from GoGrid, https://www.gogrid.com
7. D. Amerheim, et (2009)all Cloud Computing Use Case White Paper.
8. Dedicated Server, Managed Hosting, Web Hosting by Rackspace Hosting, https://www.rackspace.com
9. Edward P. Holden, Jai W. Kang, Dianne P. Bills, Mukhtar Ilyassov, (October 2009) Databases in the cloud: a work in progress, SIGITE ’09: Proceedings of the 10th ACM conference on SIGinformation technology education.
10. Google App Engine, URL https://code.google.com/appengine.
11. https://docs.python.org/py3k/extending/index.html#extending-index. https://en.wikipedia.org/wiki/Platform_as_a_service and https://java.dzone.com/articles/what-platform-service-paas
12. https://java.sun.com/docs/books/jvms/second_edition/html/VMSpecTOC.doc.html
13. https://www.networkworld.com/news/2010/050610-gartner-saas-adoption-on-the.html
14. K. C. Li, C. H. Hsu, L. T. Yang, J. Dongarra, H. Zima, Handbook of Research on Scalable Computing Technologies, ISBN: 978-1-60566-661-7.
15. Python Software Foundation, (2011)”Extending and Embedding the Python Interpreter,”, The Python Software Foundation.
16. Rajkumar Buyya, Chee Shin Yeo, and Srikumar Venugopal, Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities, Grid Computing and Distributed Systems (GRIDS) Laboratory, Department of Computer Science and Software Engineering, The University of Melbourne, Australia.
17. Salesforce CRM, https://www.salesforce.com/platform
18. SAP Business ByDesign, www.sap.com/sme/solutions/businessmanagement/businessbydesign/index.epx
19. Software and Information Industry Association,(2001) “Strategic Backgrounder: Software as a Service,” https://www.siia.net/estore/pubs/SSB-01.pdf.
20. Srikantaiah S et al (2008) Energy aware consolidation for cloud computing. In: Proc of HotPower
21. Sun Microsystems, (2009)Introduction to Cloud Computing Architecture.
22. Tim Linkholm and Frank Yellin,( 1999) “The Java Virtual Machine Specification Second Edition,”, online,
23. VARIA, J.(2009). Cloud Architectures. Amazon Web Services.
24. Vasic N et al (2009) Making cluster applications energy-aware. In: Proc of automated ctrl for datacenters and clouds
25. Wil A.H. Thissen, Paulien M. Herder, Critical Infrastructures: State of the Art in Research and Application (International Series in Operations Research & Management Science, ISBN: 1402076010.
26. Windows Azure, www.microsoft.com/azure
27. Sayli Naik, C.G.Dighavkar(Dec 2012),”Services Provided by Cloud Computing and Various Issues Related With It”, International Journal of latest Technology in Engineering, management and applied Science”(ISSN 2278-2540), Vol 1. Issue X.

Sayli S. Naik, C. G. Dighavkar, Archana S. Patil “Software as a Service(SaaS) Provided by Cloud Computing” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 1, pp.75-83 2013

For Full Text Click here
pdf download

Dr. Gaurav Kumar Jain, Tarun Kumawat, Purabi Samanta January 2013 Page No.: 84-90

Optical network users, whether service providers, enterprises, or government and military agencies, have unique and growing security needs. Today’s optical networks must provide end-to-end protection that is fully integrated with other security services, technologies, and management systems. To provide the greatest flexibility, optical network elements should support advanced AAA services, and provide multiple layers of protection. In this paper we describes the security requirements of optical networks, and the ways in which the Cisco ONS Family of optical network platforms meets the demanding requirements of government agencies, service providers, and enterprises. Cisco Systems has a longstanding reputation as a global leader in network security. Cisco developed the SAFE Blueprint, a comprehensive framework for defending networks, and has incorporated robust security technologies and features into all Cisco network devices, including optical platforms.

  •  Page(s): 84-90
  •  Date of Publication: January 2013
  •  Dr. Gaurav Kumar Jain
    Regional College For Education, Research and Technology
  •  Tarun Kumawat
    JECRC,UDML,College of Engineering
  •  Purabi Samanta
    JECRC,UDML,College of Engineering

References

 

[1.] https://www.cisco.com/en/US/products/hw/optical/index.html
[2.] https://en.wikipedia.org/wiki/Synchronous_optical_networking
[3.] https://en.wikipedia.org/wiki/Passive_optical_network
[4.] https://www.cisco.com/en/US/prod/collateral/optical/ps5724/ps2006/brochure_c02-452560.html
[5.] https://docwiki.cisco.com/wiki/Cisco_Optical_Networking
[6.] https://searchtelecom.techtarget.com/news/1263785/Fiber-optic-network-security-a-necessity
[7.] https://www.paessler.com/manuals/prtg_traffic_grapher/automaticnetworkdiscovery
[8.] https://kerberos.org/
[9.] https://www.kerberos.info/
[10.] en.wikipedia.org/wiki/Public_key_infrastructure
[11.] www.ssh.com
[12.] https://www.cisco.com/en/US/tech/tk59/technologies_tech_note09186a00800945cc.shtml
[13.] https://www.cisco.com/en/US/docs/ios/12_0/security/command/reference/srtacs.pdf
[14.] https://www.cisco.com/en/US/docs/optical/15000r4_5/15454/sonet/reference/guide/r45ectc.html
[15.] https://docwiki.cisco.com/wiki/ONS_15454_Reference_Manual_R8.5.x_–_Cisco_Transport_Controller_Operation
[16.] https://www.tutorgigpedia.com/ed/Transaction_Language_1

Dr. Gaurav Kumar Jain, Tarun Kumawat, Purabi Samanta “Cisco Shielded Optical Networking” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 1, pp.84-90 2013

For Full Text Click here
pdf download

Lalit Shrivastava, Prof. Rakesh Sharma January 2013 Page No.: 91-96

The differential evolution algorithm is used to optimize the control problem of truck trailer backer upper parking. The results are simulated with different parameters, like initial and final position of the TTBU, angles of cabin and trailer. This paper presents an approach to solve truck-trailer backer upper problem which is a bench mark nonlinear problem of the control system. The results are compared with fuzzy-logic approach.

  •  Page(s): 91-96
  •  Date of Publication: January 2013
  •  Lalit Shrivastava
    Research Scholar,
    Department of EI&CE
    Institute of engineering and technology Alwar, Rajasthan (India)
  •  Prof. Rakesh Sharma
    Department of ECE
    Institute of engineering and technology Alwar, Rajasthan (India)

References

 

[1] D. Nguyen and B. Widrow, “The truck backer-upper: anexample of self learning in neural networks”. Proc. IJCNN, vol.2, pp. 357-363, 1989.
[2] S. Kong and B. Kosko, “Comparison of fuzzy and neural truckbacker-upper control systems”. Proc. IJCNN, vol. 3, pp. 349-358, 1990.
[3] J.R. Koza, “A genetic approach to the truck backer upperproblem and the inter-twined spirals problem”. Proc. Int. JointConf. Neural Networks, Piscataway, NJ, vol. 4, pp. 310-318.
[4] M. Schoenauer and E. Ronald. Neuro-genetic truck backeruppercontroller. Proc. First Int. Conf. Evolutionary Comp.,pages 720-723. Orlando, FL, USA, 1994.
[5] R.E. Jenkins and B.P. Yuhas, A Simplified Neural NetworkSolution Through Problem Decomposition: The Case of theTruck Backer-Upper, IEEE Trans. Neural Networks, vol. 4, no.4, pp. 718-720, 1993.
[6] K. Tanaka, T. Kosaki and H.O. Wang, “Backing ControlProblem of a Mobile Robot with Multiple Trailers: FuzzyModeling and LMI-Based Design”. IEEE Trans. Syst., Man,Cybern. Part C, vol. 28, no. 3, pp. 329-337, 1998.
[7] P.A. Ramamoorthy and S. Huang, “Fuzzy expert systems vs.neural networks – truck backer-upper control revisited”. Proc.IEEE Int. Conf. Systems Engineering, pp. 221-224, 1991.
[8] L.-X. Wang and J.M. Mendel. Generating fuzzy rules by learning from examples. IEEE Trans. Systems Man, and Cybernetics, vol. 22, no. 6, pp. 1414-1427, 1992.
[9] A. Ismail and E.A.G. Abu-Khousa, “A Comparative Study of Fuzzy Logic and Neural Network Control of the Truck Backer-Upper System”. Proc. IEEE Int. Symp. Intelligent Control, pp. 520-523, 1996.
[10] D. Kim, “Improving the fuzzy system performance by fuzzy system ensemble”. Fuzzy Sets and Systems, vol. 98, pp. 43-56, 1998.
[11] I. Dumitrache and C. Buiu, “Genetic learning of fuzzy controllers”, Mathematics and Computers in Simulation, vol. 49, pp. 13-26, 1999.
[12] A. Riid and E, Rüstern. “Fuzzy logic in control: Truck backer-upper problem revisited”. Proc. IEEE 10th Int. Conf. Fuzzy Systems, 1. Melbourne, Australia, 2001.

Lalit Shrivastava, Prof. Rakesh Sharma “Application of Differential Evolution in Truck Trailer Backer Upper Control problem” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 1, pp.91-96 2013

For Full Text Click here
pdf download

Mr. Vishal Kumar Sharma, Mr. Vineet Kumar Sharma January 2013 Page No.: 97-100

With the ratification of the IEEE 802.3ab in 2010, 40GbE has displaced 10GbE as the next network speed evolution in the enterprise. As was the case with the migration to 10GbE, the two main hurdles to widespread deployment of 40GbE are high deployment costs and lagging availability of supporting technologies and tools. In the 10G era, the network monitoring switch emerged as one of the technologies that helped enterprises clear the two main hurdles to High-Speed Ethernet deployment. The network monitoring switch is poised to play an even greater role in the 40GbE era. In addition to providing a bridge to High-Speed Ethernet, the network monitoring switch delivers higher network visibility and monitoring efficiency.

  •  Page(s): 97-100
  •  Date of Publication: January 2013
  •  Mr. Vishal Kumar Sharma
    Rajdhani Engineering College, Jaipur, India
  •  Mr. Vineet Kumar Sharma
    Rajdhani institute of Technology and Management , Jaipur, India

References

 

1. A. Reichman and J. Staten, 10 GbE: Its Time is Coming, Forrester, 2008
2. H. Liu et al, Scaling Optical Interconnects in Datacenter Networks, Google, 2010
3. J. D’Ambrosia et al, 40 Gigabit Ethernet and 100 Gigabit Ethernet Technology Overview, Ethernet Alliance, 2010
4. M. Nowell et al, Overview of Requirements and Applications for 40 Gigabit and 100 Gigabit Ethernet, Ethernet Alliance, 2010
5. D. Newman, High-Speed Ethernet Planning Guide, NetworkWorld , 2011
6. J. Duffy, Cisco, others dance around 40G Ethernet for data centers, Network- World, 2010
7. D. Newman, High-Speed Ethernet Planning Guide, NetworkWorld, 2011
8. Andre Kindness, The Data Center Network Evolution: Three Core Network Management Tools, Forrester, 2011.

Mr. Vishal Kumar Sharma, Mr. Vineet Kumar Sharma “The 40 Gigabit Ethernet Era in the Enterprise: Applying Lessons Learned from the Transition to 10 Gigabit Ethernet” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 1, pp.97-100 2013

For Full Text Click here
pdf download

P. K. Das, S. K. Tripathy, N. K. Behera, S. Karna – June 2016 Page No.: 07-13

India has now become the largest producer of milk and hence, more and more milk are required to be processed and converted into powder, thus needing more energy. With the ever increasing volatility in the crude oil market and the rise of crude oil prices to more than 100$ per barrel, there is a need to decrease our dependence on the Non-renewable energy sources and look for Alternative renewable sources. Solar energy is the best alternative as major part of India receives a good intensity of this energy for almost 10 months per year. This will give an added advantage in reducing CO2/CO emissions reducing global warming and will save the precious Ozone Layer.

  •  Page(s): 101-103
  •  Date of Publication: January 2013
  •  Ravi Prakash
    Assistant Manager (R&D)-B.S.A. India Food Ingredient ltd.,Alwar
  •  Anu
    Assistant Professor,
    Electrical Department, I.E.T.,(RTU)(Alwar), Rajasthan, India
  •  Lavina Dudani
    Assistant Professor,
    Electrical Department, I.E.T.,(RTU)(Alwar), Rajasthan, India
  •  Sushil Jangir
    Assistant Professor,
    Electrical Department, I.E.T.,(RTU)(Alwar), Rajasthan, India

References

 

[1] Borade RS (1986). Studies on solar drying of grapes, M.Sc. (Agri.) Dissertation submitted to M.A.U. Parbhani India.
[2] Chaterjee AK, Acharya, RM (1987). Dairy industry in India, a profile. (C.F. Dairy India 1987, Edited by Gupta, P.R.), p. 13.
[3] Dastur NN, Lakhani AG (1971). Chemical composition of khoa. Indian J.
[4] Dairy Sci., 24(4): 220.De Sukumar (1980). Outlines of Dairy Technology. Oxford University Press, New Delhi.
[5] Blanco J. et al. (2002), Advanced Multi-Effect Solar Desalination Technology: The PSA Experience, 11th Int. Symposium on Concentrated Solar Power and Chemical Energy Technologies, Zurich, Switzerland
[6] Collares-Pereira, M. et al. (2003), Advanced Solar Dryer for Salt recovery from brine effluent of Desalination Med Plant, ISES Solar World Congress 2003, Göteborg, Sweden
[7] Welford, W. T. et al. (1989), High collection nonimaging optics, Academic Press, New York
[8] Ghodekar DR, Dudani AJ, Ranganathan B (1974). Microbiological quality of Indian milk products. J. Milk Food Technol., 37(3): 119-122.
[9] Indian Standards, SP: 18- Part XI (1980). Handbook of Food Analysis.
[10] XI. Dairy Products. Bureau of Indian Standards, New Delhi.

Ravi Prakash, Anu, Lavina Dudani, Sushil Jangir “Solar Heat In Milk Powder Plant” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 1, pp.101-103 2013

For Full Text Click here
pdf download

Dr. Gaurav Kumar Jain, Mr. Pradeep Sharma, Mr. Ajay Sharma January 2013 Page No.: 104-108

The market for mobile apps is still relatively young, it has grown exponentially over the past several years and will continue to expand rapidly.
But unfortunately, other than developers, cyber criminals are also looking to capitalize on the explosive growth of mobile apps. They are already hard at work creating malicious software designed to steal users’ information and wreak havoc on the larger apps ecosystem.
However, there is a relatively simple yet highly effective solution to protect mobile apps. By using code signing certificates.

  •  Page(s): 104-108
  •  Date of Publication: January 2013
  •  Dr. Gaurav Kumar Jain
    Regional College For Education,
    Research and Technology
  •  Mr. Pradeep Sharma
    Regional College For Education,
    Research and Technology
  •  Mr. Ajay Sharma
    Regional College For Education,
    Research and Technology

References

 

[1.] https://en.wikipedia.org/wiki/Code_signing
[2.] https://www.symantec.com/code-signing
[3.] en.wikipedia.org/wiki/Mobile_applications
[4.] www.slideshare.net/jimayson/the-mobile-apps-ecosystem
[5.] https://www.telecoms.com/11685/building-a-mobile-app-ecosystem-to-drive-mobile-usage/
[6.] https://www.apple.com/iphone/from-the-app-store/
[7.] https://play.google.com/store
[8.] en.wikipedia.org/wiki/Rogue_security_software
[9.] en.wikipedia.org/wiki/Malware
[10.] https://www.lookout.com/resources/reports/appgenome
[11.] www.webopedia.com/TERM/D/digital_certificate.htm
[12.] searchsecurity.techtarget.com/definition/digital-certificate
[13.] en.wikipedia.org/wiki/Masquerade
[14.] www.comptechdoc.org/independent/networking/guide/netipmasq.html

Dr. Gaurav Kumar Jain, Mr. Pradeep Sharma, Mr. Ajay Sharma “Securing the Mobile App Market” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 1, pp.104-108 2013

For Full Text Click here
pdf download

Syed Nusrat, Farman Ali, Dr. Sachin Kumar January 2013 Page No.: 117-130

This paper is an exploratory survey of TCP congestion control principles and techniques. In addition to the standard algorithms used in common software implementations of TCP, this paper also describes some of the more common proposals developed by researchers over the years. By studying congestion control techniques used in TCP implementation software and network hardware we can better comprehend the performance issues of packet switched networks and in particular, the public Internet.

  •  Page(s): 117-130
  •  Date of Publication: January 2013
  •  Syed Nusrat
    Research Scholar,
    Shri JJT University, Rajasthan, India
  •  Farman Ali
    Research Scholar,
    Shri JJT University, Rajasthan, India
  •  Dr. Sachin Kumar
    Supervisor,
    Shri JJT University, Rajasthan, India

References

 

[1] Amit Aggarwal, Stefan Savage, and Thomas Anderson. Understanding the Performance of TCP Pacing, March 30, 2000, IEEE InfoCom 2000.
[2]M. Allman, V. Paxson, and W. Stevens. TCP Congestion Control, April 1999, RFC 2581.
[3] B. Braden, D. Clark, J. Crowcroft, B. Davie, S. Deering, D. Estrin, S. Floyd, V. Jacobson, G. Minshall, C. Patridge, L. Peterson, K. Ramakrishnan, S. Shenker, J. WrocLawski, and Lixia Zhang. Recommendationson Queue Management and Congestion Avoidance in the Internet, April 1998, RFC 2309
[4]Sally Floyd and Van Jacobson. Random Early Detection Gateways for Congestion Avoidance. IEEE/ACM Transactions on Networking, August 1993.
[5]Sally Floyd. TCP and Explicit Congestion Notification, ACM Computer Communications Review, October 1994, p. 10-23.
[6]Sally Floyd and Kevin Fall. Promoting the Use of End-to-End Congestion Control in Internet. IEEE/ACM Transactions on Networking, August 1999.
[7] S. Floyd and T. Henderson. The NewReno Modification to TCP‟s Fast Recovery Mechanism, April 1999, RFC 2582.
[8] Harris Interactive. P.C. and Internet Use Continue to Grow at Record Pace. Press Release, February 7, 2000.
[9]Van Jacobson. Congestion Avoidance and Control. Computer Communications Review, Volume 18 number 4, pp. 314-329, August 1988.
[10] V. Jacobson and R. Braden. TCP Extensions for Long-Delay Paths, October 1988, RFC 1072.
[11] Van Jacobson. Modified TCP Congestion Control Avoidance Algorithm. End-2-end-interest mailing list, April 30, 1990.
[12] V. Jacobson, R. Braden and D. Borman. TCP Extensions for High Performance, May 1992, RFC 1323.
[13]Scott Jordan. Pricing and Differentiated Services in Internet and ATM, https://www.eng.uci.edu/~sjordan/pubs/Pricing/index.htm, March 11, 1999.
[14]John Kristoff. The Transmission Control Protocol, March 2000.
[15] Jamshid Mahdavi. Private e-mail to John Kristoff, December 12, 1999.
[16]M. Mathis, J. Mahdavi, S. Floyd, and A. Romanow. TCP Selective Acknowledgement Options, October 1996, RFC 2018.
[17] Bob Metcalfe. From the Ether. InfoWorld, December 4, 1995.
[18]David D. Clark. The Design Philosophy of the DARPA Internet Protocols. In Proceedings SIGCOMM „88, Computer Communications Review Vol. 18, No. 4, August 1988, pp. 106-114).
[19] Jon Postel. Transmission Control Protocol, September 1981, RFC 793.
[20]Stefan Savage, Neal Cardwell, David Wetherall, and Tom Anderson, TCP Congestion Control with a Misbehaving Receiver, ACM Computer Communications Review, October 1999.
[21]Jeffrey Semke, Jamshid Mahdavi and Matthew Mathis. Automatic TCP Buffer Tuning, Computer Communications Review, ACM SIGCOMM, Volume 28, Number 4, October 1998.
[22] W. Richard Stevens. TCP/IP Illustrated, Volume 1: The Protocols. Addison Wesley, ISBN: 0-201-63346-9. January 1994.
[23] W. Stevens. TCP Slow Start, Congestion Avoidance, Fast Retransmit, and Fast Recovery Algorithms, January 1997, RFC 2001.
[24]Bob Sullivan. Remembering the Net Crash of ‟88, MSNBC, November 2 1998.

Syed Nusrat, Farman Ali, Dr. Sachin Kumar “TCP Algorithms and Properties to Avoid Congestion” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 1, pp.117-130 2013

For Full Text Click here
pdf download

Durgesh Singh, R.K Agerwal January 2013 Page No.: 110-114

Fuel economy remains the prime factor favoring the application of the diesel engines and the need to improve performance regarding power output or lower fuel consumption or preferably both, has led to research in the engine systems. This research includes design and orientation of the inlet manifold, which is a major factor effecting the performance of the engine. A four stroke compression ignition engine with power 9 H.P and rated speed 1500 rpm is selected for the present work to investigate the performance characteristics. The swirl motion of the air is an important parameter in optimizing the performance of the engine. For better turbulence it is a common practice to leave the surfaces of the inlet manifold rough and unpolished. To achieve this helical threads are arranged in the inlet manifold with variable pitches which creates swirl. The performance characteristics with normal manifold and helical threaded manifold were calculated and compared.

  •  Page(s): 131-135
  •  Date of Publication: January 2013
  •  Durgesh Singh
  •  R.K Agerwal

References

Durgesh Singh, R.K Agerwal “CI Engine with Various Helical Threaded Performance” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 1, pp. 131-135 2013

For Full Text Click here
pdf download

Mr. Tarun Kumawat, Dr. Gaurav Kumar Jain, Mr. Manohar Singh Tanwar January 2013 Page No.: 136-140

Lots of work has been done in the area of signature verification over the past two decades. Signature Verification involves authentication of a person claimed signature in order to determine whether the claimed signature belong to the claimer or not. The signature verification can be done manually or automatically. The handwritten signature is a biometric attribute Biometric identification and verification system are being increasingly adopted in our environment. Well know biometric method include iris, retina, face and fingerprint based identification and verification. Depending on the data acquisition method, Automatic signature verification can be classified as either offline or online signature verification. This paper contains a study on the offline signature recognition system.

  •  Page(s): 136-140
  •  Date of Publication: January 2013
  •  Mr. Tarun Kumawat
    JECRC, UDML, Jaipur, Rajasthan, India
  •  Dr. Gaurav Kumar Jain
    Deepshikha Kala Sansthan, Jaipur, Rajasthan, India
  •  Mr. Manohar Singh Tanwar
    RCERT, Jaipur, Rajasthan, India

References

 

[1]Ashwin C S. Harihar V, Karthick G., Karthick A, Rangaranjan K R Student, PIXBAS “Pixel Based Offline Signature Verification”. Sri Rai Ram Engineering College. Anna University Information technology Chennai doi: 10.4156/aiss.vol2issue3.2
[2]Meenakshi k. Kalera, sargur srihari, Aihua xu cedar “offline signature verification and identification using distance statistical. ”New York, USA
[3]marta Gomez Barrero, Javier gal badally Julian fierrez and Javier.

Mr. Tarun Kumawat, Dr. Gaurav Kumar Jain, Mr. Manohar Singh Tanwar “Method Signature Verification and Identification” International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.2 issue 1, pp.136-140 2013

For Full Text Click here
pdf download

Manoj K Sharma, Sudeep Sharan, Hasina Khatun , A K Sinha Jaunuary 2013 Page No.: 141-145

The three section gyrotron resonator has been fabricated using a single piece of brass and OFHC copper material. The resonator consists of a down taper section, uniform middle section and up taper section with input and output taper angles, 2º and 3º, respectively. To realize the resonator design through fabrication, the inner profile measurement of the weakly tapered open resonator is the foremost important. Therefore, the paper reports the destructive and non-destructive measurement technique to measure inner profile of the resonator. Further, based on the measurement and predicted output power through simulation will help to determine whether the fabricated resonators excite the desire mode and the desire output power.

  •  Page(s): 141-145
  •  Date of Publication: Jaunuary 2013
  •  Manoj K Sharma
    Gyrotron Laboratory, Microwave Tube Area
    Central Electronics Engineering Research Institute (CEERI, CSIR) Pilani, Rajasthan, INDIA-333031
  •  Sudeep Sharan
    Gyrotron Laboratory, Microwave Tube Area
    Central Electronics Engineering Research Institute (CEERI, CSIR) Pilani, Rajasthan, INDIA-333031
  •  Hasina Khatun
    Gyrotron Laboratory, Microwave Tube Area
    Central Electronics Engineering Research Institute (CEERI, CSIR) Pilani, Rajasthan, INDIA-333031
  •  A K Sinha
    Gyrotron Laboratory, Microwave Tube Area
    Central Electronics Engineering Research Institute (CEERI, CSIR) Pilani, Rajasthan, INDIA-333031

References

 

[1] Greogory S. Nusinovich, Introduction to the PhysicsofGyrotron. Maryland: JHU, USA, 2004.
[2] U Singh, A bera, Narendra Kumar and A K Sinha, Synthesized parameters of MIG for 200 kW, 42 GHz gyrotron, Int J Infrared Millimeter Waves, 31(2010), 708-713.
[3] H Khatun, U Singh, N Kumar, A Bera, R RRao and A K Sinha, Design for interaction cavity for 42 GHz CW/Long pulse Gyrotron, Proceeding of IVEC-2009, 94-95.
[4] Liao S. Y., Microwave Devices and Circuits, Prentice-Hall, New Jersey, 1990.
[5] H Khatun, R RRao, A K Sinha and S N Joshi, “Optimization of magnetic field for maximum output power of a 42 GHz cw/long pulse gyrotron”, Proceeding of IVEC-2009.
[6] Anil Kumar, Hasina Khatun, Nitin Kumar, Udaybir Singh, Vimal Vyas and AK Sinha, “Particle-in-cell analysis of beam-wave interaction in gyrotron cavity with tapered magnetic field”, Canadian J of Physics, 88, 11, 2010.
[7] Hasina Khatun, Anil Kumar, Nitin Kumar, Udaybir Singh, A Bera, R RRao and Ashok K Sinha, “Particle-in- Cell simulation of interaction cavity for 42 GHz Gyrotron”,Infrared Physics and Technology(communicated).

Manoj K Sharma, Sudeep Sharan, Hasina Khatun, A K Sinha “Inner Profile Measurement of Weakly Tapered Open Resonator” International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.2 issue 1, pp.141-145 2013

For Full Text Click here
pdf download

Farman Ali, Syed Nusrat , Dr. Sachin Kumar January 2013 Page No.: 146-152

With the rapid growth of the information age, open distributed systemshave become increasingly popular. The need for protection andsecurity in a distributed environment has never been greater. Theconventional approach to security has been to enforce a system-widepolicy, but this approach will not work for large distributed systemswhere entirely new security issues and concerns are emerging. Weargue that a new model is needed that shifts the emphasis from“system as enforcer” to user-definable policies. Users ought to be ableto select the level of security they need and pay only the necessaryoverhead. Moreover. Ultimately, they must be responsible for theirown security.This research is being carried out in the context of the Legion project.We start by describing the objectives and philosophy of the overallproject and then present our conceptual model and design decisions. Aset of technical challenges and related issues are also addressed

  •  Page(s): 146-152
  •  Date of Publication: January 2013
  •  Farman Ali
    Department of Computer Science,
    SJJT University Churu-Bishau Road, Chudella, Jhunjhunu, Rajasthan, India
  •  Syed Nusrat
    Department of Computer Science,
    SJJT University Churu-Bishau Road, Chudella, Jhunjhunu, Rajasthan, India
  •  Dr. Sachin Kumar
    Department of Computer Science,
    SJJT University Churu-Bishau Road, Chudella, Jhunjhunu, Rajasthan, India

References

 

 C. Batini, S. Navathe, Conceptual database design.
 R.V. Binder, Testing Object-Oriented Systems—Models, Patterns, and Tools.
 M. Blaha, W. Premerlani, Object-Oriented Modeling and Design for Database Applications.G. Dhillon, Information Security Management.
 R. Elmasri, S. Navathe, Fundamentals of Database Systems.
 IEEE Standards for software verification and validation.
 M.R. Adam, Security-control methods for statistical database: a comparative study, ACM Computing Surveys.
 BELL751 Bell, D., and L. LaPadula, July 1975,Secure Computer Systems: Unified Exposition And Multics Interpretation, TechnicalReport NTIS AD-A023588, the MITRE Corporation,
 FORD901 Ford, W., J. OKeeffe, and B. Thuraisingham, August 1990, Database Inference Controller: An Overview, Technical Report MTR 10963, Vol. 1, The MITRE Corporation, Bedford,MA (a version accepted for publication in Data and KnowledgeEngineering Journal- North Holland).
 RUB1901 Rubinovitz, H. H., and B. Thuraisingham, August 1990, Secure Distributed Query Processor Overview, MTR 10969, Vol.1, The MITRE Corporation, Bedford, MA ( version published inthe Journal of Systems and Software, Vol. 21).
 Thuraisingham, B., July 1990, Handling ssociation-based Constraints in Multilevel Database Design,Workingaper, The MITRE Corporation (a version presented at the 4th RADC Database Security Workshop).

Farman Ali, Syed Nusrat , Dr. Sachin Kumar “An Approach of Security for Handling the Security Threats for Distributed Systems” International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.2 issue 1, pp.146-152 2013

For Full Text Click here
pdf download

GET OUR MONTHLY NEWSLETTER