VOLUME II ISSUE VI
Amanda Cicilato June 2013 Page No.: 01-03
Photovoltaic systems (PV system) use solar panels to convert sunlight into electricity. A system is made up of one or more photovoltaic (PV) panels, a DC/AC power converter (also known as an inverter), a racking system that holds the solar panels, electrical interconnections, and mounting for other components. Optionally it may include a maximum power point tracker (MPPT), battery system and charger, solar tracker, energy management software, solar concentrators or other equipment. A small PV system may provide energy to a single consumer, or to an isolated device like a lamp or a weather instrument. Large grid-connected PV systems can provide the energy needed by many customers. The electricity generated can be either stored, used directly (island/standalone plant), or fed into a large electricity grid powered by central generation plants (grid-connected/grid-tied plant), or combined with one or many domestic electricity generators to feed into a small grid (hybrid plant).Systems are generally designed in order to ensure the highest energy yield for a given investment.
- Page(s): 01-03
- Date of Publication: June 2013
- Amanda Cicilato
Northern Melbourne Institute of TAFE Waterdale Rd,
Heidelberg, Australia
References
1. Jacobson, Mark Z. (2009). “Review of Solutions to Global Warming, Air Pollution, and Energy Security”. Energy & Environmental Science 2 (2): 148. doi:10.1039/B809990C.
2. German PV market. Solarbuzz.com. Retrieved on 3 June 2012.
3. BP Solar to Expand Its Solar Cell Plants in Spain and India. Renewableenergyaccess.com. 23 March 2007. Retrieved on 3 June 2012.
4. Bullis, Kevin (23 June 2006). Large-Scale, Cheap Solar Electricity. Technologyreview.com. Retrieved on 3 June 2012.
5. Luque, Antonio and Hegedus, Steven (2003). Handbook of Photovoltaic Science and Engineering. John Wiley and Sons. ISBN 0-471-49196-9.
6. The PVWatts Solar Calculator Retrieved on 7 September 2012 7. Massachusetts: a Good Solar Market. Remenergyco.com. Retrieved on 31 May 2013.
8. Photovoltaics.sustainablesources.com
9. Wikipedia.org.
10. John Quiggin (January 3, 2012). “The End of the Nuclear Renaissance |”. National Interest.
11. A Comparison of PV Technologies
Amanda Cicilato “Photovoltaic System” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 6, pp.01-03 2013
Milessa Jong June 2013 Page No.: 04-05
The branch of computer science concerned with making computers behave like humans. The term was coined in 1956 by John McCarthy at the Massachusetts Institute of Technology. Artificial intelligence includes
games playing: programming computers to play games such as chess and checkers
expert systems : programming computers to make decisions in real-life situations (for example, some expert systems help doctors diagnose diseases based on symptoms)
natural language : programming computers to understand natural human languages
neural networks : Systems that simulate intelligence by attempting to reproduce the types of physical connections that occur in animal brains.
- Page(s): 04-05
- Date of Publication: June 2013
- Milessa Jong
Royal Melbourne Institute of Technology Melbourne, Australia
References
1. AI complete: Shapiro 1992, p. 9.
2. Nils Nilsson writes: “Simply put, there is wide.
3. CNN. 26 July 2006. Archived from the original on 19 February 2008. Retrieved 26 February 2008
4. Luque, Antonio and Hegedus, Steven (2003). Handbook of Photovoltaic Science and Engineering. John Wiley and Sons. ISBN 0-471-49196-9. Fuzzy logic:
5. Russell & Norvig 2003, pp. 526–527
6. Webopedia.com/TERM/A/artificial_intelligence
7. Nordlander, Tomas Eric (2001). “AI Surveying: Artificial Intelligence In Business” (PDF). (MS Thesis), De Montfort University. Retrieved 2007-11-04.
8 NRC 1999, “Artificial Intelligence in the 90s.
Milessa Jong “Artificial Intelligence” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 6, pp.04-05 2013
Jaya Batra June 2013 Page No.: 06-12
In this era of IT, there is a need of quick response from the technology. Technology which offers quick response is preferred. ith an interface for creating forms with the inbuilt validations. Creating forms is not a big deal but the problem arises when the website goes from static to dynamic that is, when we need to put validations within our website and have to make it secure. In websites, Customer feed backs, product appraises and management appraisals are highly effective market research tools. You can even use the feedback you receive in your website, to shift your advertising efforts, make changes to your packages, switch delivery methods, improve product quality and jst about any thing else, your employees and customers demands. One of the best ways to keep growing in this ever-changing economy is to listen carefully to what people are saying and react quickly to it. This system of Perfect secure form builder features a unique set of functionalities that can be used to measure satisfaction levels.
- Page(s): 06-12
- Date of Publication: June 2013
- Jaya Batra
Student
APIIT SD INDIA Affiliated by Staffordshire University,UK
References
1. PHP classes and Oops Concept, Last Accessed: 5 October 2012, from: https://www.slideshare.net/dotcominfoway/oops-concept-implementation
2. Designing and Static , Last Accessed: 7 October 2012, from: https://findmysolution.blogspot.in/2010/06/php-5-oops-concepts-key-words.html,
3. Java Script, Last Accessed: 15 October 2012, from: https://www.javascriptlint.com/
4. Thread: dynamic plugging for PHP classes (2013) Last Accessed: 18 March 2013, from: https://www.sitepoint.com/forums/showthread.php?379440-Creating-dynamic-plugins-for-PHP-Classes
5. Java Script 1.5 ref , Last Accessed : 20 October 2012 , from : https://developer.mozilla.org/en/docs/Core_JavaScript_1.5_Reference
6. My sql functions, The PHP group (2013) Last Acceded :25 April 2013, from: https://php.net/manual/en/ref.mysql.php
Jaya Batra “Secure Form Builder ” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 6, pp.06-12 2013
Pawan Kumar Garg June 2013 Page No.: 13-16
The software development models follow fixed or iterative design and development approach. There is no scope for dynamic testing in software development process. To make the software development effective and reliable, a new approach is required. We present the new software process model which will address all the concerns and consider each phase of software development as software development process and provide an effective model for software development phases. . Main motive of this technique is to monitor security requirements and identify security threats at each phase. For developing large sized system, still there are some limitations associated with it. It doesn’t have the phase where a developer or organization can impose some security to the code. So the main concern of our technique is security and trademark.
- Page(s): 13-16
- Date of Publication: June 2013
- Pawan Kumar Garg
M.Tech,
Jagan Nath University Computer Science Jaipur, India
References
[1] Boehm B, “A Spiral Model of Software Development and Enhancement”, ACM SIGSOFT Software Engineering Notes”, “ACM”, 11(4):14-24, August 1986.
[2] Ian Sommerville, “Software Engineering”, AddisonWesley, 7th edition, 2004.
[3] CTG. MFA – 003, “A Survey of System DevelopmentProcess Models”, Models for Action Project: DevelopingPractical Approaches to Electronic Records ManagementAnd Preservation, Centre for Technology in GovernmentUniversity at Albany / Suny, 1998.
[4] Steve Easterbrook, “Software Lifecycles”, Universityof Toronto Department of Computer Science, 2001.
[5] Nabil Mohammed Ali Munassar1 and A. Govardhan, “A Comparison between Five Models Of Software Engineering”, IJCSI International Journal of Computer ScienceIssues, Vol. 7, Issue 5, September 2010.
Pawan Kumar Garg “An Additional Sub Phase for Development of Software Process Model ” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 6, pp.13-16 2013
Monika, Dr.Paramjit Singh June 2013 Page No.: 17-21
Delivered software is required to be modified because of some fault, user requirement or because of some new included feature. In such case, when the code of some software is modified, it is also required to test the software again. But instead of testing the complete software again, only few selected test cases are regenerated. It is desired that there should be an effective approach so that an optimized solution for test sequence generation can be found out with low cost. Several researchers have used different techniques for fault optimized and cost effective test sequence generation and one of them is DYNAMIC PRIORITIZATION technique which is used for scheduling test cases in an order so that their effectiveness can be increased at meeting some performance goal. In this paper the work done in the regression testing will be discussed as well as current status of work that has been done on Regression sequence generation and some suggestions for its future perspectives will be discussed.
- Page(s): 17-21
- Date of Publication: June 2013
- Monika
Deptt. of Computer Science and Engineering
PDM College of Engineering, Bahadurgarh, Haryana - Dr.Paramjit Singh
Prof. Deptt. of Computer Science and Engineering
PDM College of Engineering, Bahadurgarh, Haryana
References
[1] Alexey G. Malishevsky, Joseph R. Ruthruff, Gregg Rothermel, Sebastian Elbaum, Cost-cognizant Test Case Prioritization,” Technical Report TR-UNL-CSE-2006-004, Department of Computer Science and Engineering, University of Nebraska–Lincoln, Lincoln, Nebraska, U.S.A., March 2006.
[2] Alexey G. Malishevsky, Gregg Rothermel and Sebastian Elbaum, Modeling the Cost-Benefits Tradeoffs for Regression Testing Techniques, Proceedings of the International Conference on Software Maintenance (ICSM’02), 2002.
[3] Dennis Jeffrey and Neelam Gupta, Test Case Prioritization Using Relevant Slices , In Proceedings of the 30th Annual International Computer Software and Applications Conference, Volume 01, 2006, pages 411-420, 2006.
[4] Eric W. Wong, J. R. Horgan, Saul London, Hira Agrawal Bell Communications Research 445 South Street Morristown, NJ 07960.
[5] Jeffery von Ronne, Test Suite Minimization: An Empirical Investigation, 1999.
[6] Korel B. and Laski J., Algorithmic software fault localization , Annual Hawaii International Conference on System Sciences, pages 246–252, 1991.
[7] Lehmann E. and Wegener J., Test case design by means of the CTE XL, In Proc. of the 8th European International Conf. on Software Testing, Analysis & Review (EuroSTAR 2000), 2000.
[8] Leung H. and White L., A cost model to compare regression test strategies. In Proceedings of the Conferenceon Software Maintenance, pages 201–208, 1991.
[9] Onoma K., W.-T. Tsai, M. Poonawala, and H.Suganuma, Regression testing in an industrial environment, Comm. Of the ACM, 41(5):81–86,1988.
[10] Rothermel G., M. J. Harrold, J. Ostrin, and C. Hong, An empirical study of the effects of minimization on the fault detection capabilities of test suites,in Proc. of the International Conference on Software Maintenance, 1998, pp. 34–43.
[11] Savenkov R.,How to become a software tester. (Roman Savenkov Consulting, 2004)
[12] Sherriff M, Lake M, Williams L. Prioritization of regression tests using singular value decomposition with empirical change records. Proceedings of the The 18th IEEE International Symposium on Software Reliability (ISSRE 2007), IEEE Computer Society: Washington, DC, USA, 2007; 81–90.
[13] Siripong Roongruangsuwan, Jirapun Daengdej, Autonomous System Research Laboratory, Science and Technology, Assumption University, Thailand.(2010).
[14] Swarnendu Biswas and Rajib Mall ,Dept. of Computer Science and Engineering IIT Kharagpur, India – 721302
[15] Yoo S., M. Harman King’s College London, Centre for Research on Evolution, Search & Testing, Strand, London, WC2R 2LS, UK(2007)
Monika, Dr.Paramjit Singh “A Review of Different Approaches used for Sequence Generation in Regression Testing” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 6, pp.17-21 2013
Padvi Mahavir Ajapsing June 2013 Page No.: 22-28
The selected carbon sources which are flower of Madhuka longifolia, flower of Bauhinia variegate , pithy pulp of fruit of Adansonia digitata and flower of Bombax ceaba (100, 150, 200 and 250 g). Were cut in small pieces and crushed in mixture machine with 50 ml distilled water. After make final volume 1000 ml with distilled water, then after 100 ml this solution add in separate 250 ml Erlenmeyer flasks, After add KH2PO4 (100 mg), NaNO3 (400 mg), MgSO4.7H2O (20 mg), and adjust 4.5 initial pH with HCL and 0.1 NaOH. The flask was cotton plugged and autoclaved at 1210 C for 15 minutes. After cooling at room temperature each medium inoculated with 1.0 ml (6.0 X 106) of Aspergillus niger (selected strains i.e. A, B, and C) conidial suspension and incubated at 280 C in static incubator for 8 days. After fermentation, the medium was diluted with distilled water (1:4 W/V). The medium was filtered and the filtrate was used for the subsequent analysis. In this study there were select four Carbons source which are flower of Madhuka longifolia, flower of Bauhinia variegate , pithy pulp of fruit of Adansonia digitata and flower of Bombax ceaba . And there was found that 200 g flower of Madhuka longifolia is best for citric acid production in all this three strains of A. niger which are A, B and C, the A. niger B is best for citric acid production.
- Page(s): 22-28
- Date of Publication: June 2013
- Padvi Mahavir Ajapsing
Research Scholar,
JJT University, Jhunjhunu (Raj.), India
References
1. Alvarez-Vasquez, F., Gonzalez-Alco, C., Torres, N.V. (2000). Metabolism of citric acid production by Aspergillus niger: model definition, steady-state analysis and constrained optimization of citric acid production rate. J. Biotechnology and Bioengineering, 70: 82-108.
2. Bari, M.N., Alam, M.Z., Muyibi, S.A., Jamal, P., Mamun, A. (2009). Improvement of production of citric acid from oil palm empty fruit bunches: Optimization of media by statistical experimental designs. J. Bioresource Technology, 100: 3113-3120.
3. Barrington, S., Kim, J.W. (2008). Response surface optimization of medium components for citric acid production by Aspergillus niger NRRL 567 grown in peat moss. J. Bioresource Technology, 100: 3113-3120.
4. Haq, I., Khurshid, S., Ali, K., Ashraf, H., Qadeer, M.A., Rajoka, I. (2001). Mutation of Aspergillus niger for hyper production of citric acid from black molasses. W. J. Microbiology and Biotechnology, 17: 35-37.
5. Imandi, S.B., Bandaru, V.V.R., Somalanka, S.R., Bandaru, S.R., Garapati, H.R. (2008). Application of statistical experimental designs for the optimization of medium constituents for the production of citric acid from pineapple waste. J. Bioresource Technology, 99: 4445-4450.
6. Jianlong, W., Ping, L. (1998). Phytate as a stimulator of citric acid production by Aspergillus niger. J. Process Biochemistry, 33: 313-316.
7. Kareem, S. O., Akpan, I. and Alebiowu, O. O. (2010). Production of citric acid by Aspergillus niger using pineapple waste. Malaysian Journal of Microbiology, 6 (2): 161-165.
8. Kota, K.P., Sridhar, P. (1999). Solid state cultivation of Streptomyces clavuligerus for Cephamycin C production. J. Process Biochemistry, 34: 325–328.
9. Lee, J.H., Yun, H.S. (1999). Effect of temperature and pH on the production of citric acid from cheese whey by Aspergillus niger. Korea J. Mycology, 27: 383-385.
10. Lofty, W.A., Ghanem, K.M., El-Helow, E.R. (2007). Citric acid production by a novel Aspergillus niger isolate: II. Optimization of process parameters through statistical experimental designs. J. Bioresource Technology, 98: 3470-3477.
Padvi Mahavir Ajapsing “Microbial production of citric acid by Aspergillus niger on flower of Madhuka longifolia, flower of Bauhinia variegate, pithy pulp of fruit of Adansonia digitata and flower of Bombax ceaba” International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.2 issue 6, pp.22-28 2013
Nidhi Chauhan June 2013 Page No.: 35-41
Previous systems have used datagloves, markers or any other input devices for interaction. Hand gesture recognition system provides an alternative to interface devices for human computer interaction (HCI). There are several hand gesture recognition techniques are proposed. In this paper various gesture recognition algorithms are used with Perceptron network.
It will recognize static and dynamic hand gestures. In this paper, overview of various different methods for hand gesture are discussed. It has overview of the recognition processes that is edge detection algorithm and skin color detection algorithm. In this, trained and untrained gestures are used for training and testing respectively and the results yields a satisfactory recognition rate.
- Page(s): 35-41
- Date of Publication: June 2013
- Nidhi Chauhan
Department of Computer Science & Engg.
Suresh Gyan Vihar University, Jaipur(Raj.)
References
1. Sebastian Marcel, Oliver Bernier, Jean Emmanuel Viallet and Daniel Collobert, “ Hand Gesture Recognition using Input – Output Hidden Markov Models”, Proc. of the Fourth IEEE International Conference on Automatic Face and Gesture Recognition, pp. 456 – 461 2000.
2. Xia Liu and Kikuo Fujimura, “ Hand Gesture Recognition using Depth Data”, Proc. of the Sixth IEEE International conference on automatic Face and Gesture Recognition, pp. 529-534, 2004.
3. L. Bretzner, I. Laptev, and T. Lindeberg, “Hand Gesture using multi-scale color features, hierarchical models and particle filtering”, Proc. of the Fifth International conference on Automatic Face and Gesture Recognition, pp. 423- 428, 2003.
4. Pavlovic, et al. visual interpretation of hand gesture for human-computer interaction: a review, IEEE Trans. On Pattern anal. Mach. Intel. 19(7), pp 677- 695, 1997.
5. Attila Licsar and Tamas Sziranyi, “Supervised training based hand gesture recognition system”, Proc. of the 16th International Conference on Pattern Recognition, Vol. 3, pp 30999 – 31003, 2002.
6. E.Stergiopoulou and N.Papamarkos: “A New Technique on Hand Gesture Recognition”, Proc of theIEEE International Conference on Image Processing, 2657-2660, 2006.
7. Byung-Woo Min, Ho-Sub Yoon, Jung Soh, Yun-Mo Yangc and Toshiaki Ejima : “Hand Gesture Recognition Using Hidden Markov Models”, Proc. of the IEEE International conference on Systems, Man and Cybernetics, vol 5, pp. 4232 -4235, 1997.
8. Meide Zhao, Francis K.H. Quek, Member, IEEE, and Xindong Wu, Senior Member, IEEE : “RIEVL: Recursive Induction Learning in Hand Gesture Recognition”, IEEE Transactions on Pattern Analysis and machine intelligence, vol. 20, no. 11, November 1998.
9. Yikai Fang, Jian Cheng, Kongqiao Wang and Hanqing Lu, “Hand Gesture Recognition Using FastMulti-scale Analysis”, Proc. of the Fourth International Conference on Image and Graphics, pp 694-698,2007.
10. Chris Joslin, Ayman El-Sawah, Qing chen, Nicolas Georganas, “ Dynamic Gesture Recognition”, Proc.of the Instrumental and Measurement Technology Conference, pp 1706-1710, 2005.
11. Timi Ojala, Matti Pietikainen and Topi Maenpaa, “Multi-resolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns”, IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 24, pp. 971-987, 2002.
12. https://www.aihorizon.com/essays/generalai/supervised_unsupervised_machine_learning.htm.
Nidhi Chauhan “Different Hand Gesture Recognition Techniques Using Perceptron Network” International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.2 issue 6, pp.35-41 2013
Prakash Kawar Asawat, Krishan Kant Lavania June 2013 Page No.: 42-48
Current scenario of research shows that testing is a valuable area for every project to guarantee its quality and performance at actual behaviour. Before starting to test a system we first known literature about the remaining problem in project, due to this problem the performance and quality of project may not capture its planned area. So we first search out few of common error in the project. For that we need to clarify the concept of defect, error, fault, failure and other relevant to affect the system performance. In this paper we proposed simple and valuable stages for testing to capture common error and increase the performance of system. The paradigm of actual defect helps to classify the fault type. At last we summarize the paper and concluded with features scope.
- Page(s): 42-48
- Date of Publication: June 2013
- Prakash Kawar Asawat
M.Tech, Computer Science Engineering,
Arya College of Engineering Jaipur, Rajasthan, , India - Krishan Kant Lavania
Assosiate Professor -CSE Dept.,
Arya College of Engineering Jaipur, Rajasthan, India
References
[1] Arpita Mittal, Sanjay kumar Dubey, ― Defect Handling In Software Metrics‖, International Journal of Advanced Research in Computer and Communication Engineering Vol. 1, Issue 3, May 2012.
[2] Ghazia Zaineb and Dr. Irfan Anjum Manarvi, ―IDENTIFICATION AND ANALYSIS OF CAUSES FOR SOFTWARE BUG REJECTION WITH THEIR IMPACT OVER TESTING EFFICIENCY‖, International Journal of Software Engineering & Applications (IJSEA), Vol.2, No.4, October 2011.
[3] Sakthi Kumaresh and Baskaran Ramachandran,―DEFECT PREVENTION BASED ON 5 DIMENSIONS OF DEFECT ORIGIN‖, International Journal of Software Engineering & Applications (IJSEA), Vol.3, No.4, July 2012.
[4] Ruihua Chang, Xiaodong Mu and Li Zhang, ―Software Defect Prediction Using Non-Negative Matrix Factorization‖,JOURNAL OF SOFTWARE, VOL. 6, NO. 11, NOVEMBER 2011.
[5] Sannella Change Bursts as Defect Predictors Nachiappan Nagappan_ Andreas Zellery Thomas Zimmermannz Kim Herzigx Brendan Murphy.
[6] Forman, ―Cross-project Defect Prediction: A Large Scale Experiment on Data vs. Domain vs. Process‖, Thomas Zimmermann, Nachiappan Nagappan, Harald Gall, Emanuel Giger & Brendan Murphy, ESEC/FSE’09, August 24–28, 2009, Amsterdam, The Netherlands. Copyright 2009 ACM 978-1-60558-001-2/09/08…$10.00.
Prakash Kawar Asawat, Krishan Kant Lavania “Empirical Study on the Operation of Defects through Novel Testing Rules” International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.2 issue 6, pp.42-48 2013
Dr. Gaurav Kumar Jain, Mr.Pankaj Sharma, Mr. Madhumay Sen June 2013 Page No.: 49-52
I. INTRODUCTION
The network model has different nature as the protocol for this is to be designed in the manner that the infrastructure of the cellular network should be considered [1]. The main challenges regarding this are the mobility of nodes and the scalability of the network [2]. Also the performance measurements in terms of energy and the bandwidth efficiency are unknown [6]. In the wireless ad hoc networks all the nodes transmit data towards the source by passing them through the intermediate relaying nodes. The main concept regarding these relaying nodes is that these nodes require processing energy for their transmission success, thus more the number of nodes more is the requirement of the processing energy [6][3]. Whenever single link situation is considered, there is a tradeoff between the energy efficiency and the bandwidth efficiency for wireless multi hop ad hoc networks [1]. The issue for the multi hop network is regarding the scheduling at the link layer and relaying of data at the network layer. It should always be clear that the data in the network is in the form of packets [6]. The whole network considered to be shared medium between all the nodes that can be source, destination or the relaying nodes. It has also been shown that the per node throughput capacity of ad hoc networks with nodes n decreases with n as Θ (1/n log n) 1/2 [3]. The issue regarding this has been shown as the general capacity cost function of channel capacity for arbitrary input alphabets was studied on single link [4]. In the related work the bits per joule capacity of the network is assumed [3]. The tradeoff between energy and the bandwidth has been analyzed under various assumptions on the channel condition and the interference under a linear equidistant relaying network [1].
- Page(s): 49-52
- Date of Publication: June 2013
- Dr. Gaurav Kumar Jain
Associate Professor,
Deepshikha Kala Sansthan, Jaipur, Rajasthan, India - Mr.Pankaj Sharma
Associate Professor,
SITM, Mathura, UP, India - Mr. Madhumay Sen
Assistant Professor,
Deepshikha Kala Sansthan, Jaipur, Rajasthan, India
References
[1] Dr. R.K. Singh, Tanu Preet Singh, Vishal Sharma:”Dead StateRecovery Based Power Optimization Routing Protocol for MANETs”, HPAGC-2011, CCIS 169, pp.424-429,2011. © Springer-Verlag Berlin Heidelberg-2011.
[2] Sunil Taneja and Ashwani Kush:” A Survey of Routing Protocols in Mobile Ad Hoc abstract”. International Journal ofInnovation, Management and Technology, Vol. 1, No. 3, August 2010.
[3] M.Saravana karthikeyan, M.Murali, Dr.S.Sujatha:“Identifying performance metrics to maximize Manet’s throughput”; 2010International Conference on Advances in Computer Engineering.
[4] Mohamed Tekaya, Nabil Tabbane, Sami Tabbane, “MultipathRouting Mechanism with Load Balancing in Ad HocNetwork”, IEEE, 2010.
[5] Manika Vinay Rali, Min Song, Sachin Shetty:”Virtual wired transmission scheme using directional antennas to improve energy efficiency in Wireless Mobile AdHoc Network”; 978-1-4244-2677-5, IEEE 2008.
[6] https://www. csi.uoregon.edu.
[7] Sehoon Kim, Jinkyu Lee and Ikjun Yeom,” Modeling andPerformance Analysis of Address Allocation Schemes forWireless sensor networks”, IEEE transactions on vehicular technology, vol. 57, NO. 1, JANUARY 2008.
[8] Rekha Patil, Dr. A. Damodaram:”cost basedd power aware cross layer routing protocol for Manet”; 2008 IJCSNS.
[9] Changchun Bae and Wayne E. Stark:”A Tradeoff between Energy and Bandwidth Efficiency in Wireless Networks”;2007 IEEE.
[10] V. Rodoplu and T. H. Meng: “Bits-per-Joule capacity of energy-limited wireless networks,” IEEE Transaction Wireless Communications, vol.6(3), pp.857-865, March 2007.
Dr. Gaurav Kumar Jain, Mr.Pankaj Sharma, Mr. Madhumay Sen “Performance Optimization Of Routing Protocols Using Cross Layer Load Balancing In Ad Hoc Network” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 6, pp.49-52 2013
Kamal, Dinesh Kumar June 2013 Page No.: 53-60
Web Usage Mining is the application of data mining techniques to discover interesting usage patterns from Web data, in order to understand and better serve the needs of Web-based applications. Usage data relates with the identity or origin of Web users along with their browsing behavior at a Web site. Web usage mining is deals with the discovery and analysis of usage patterns from Web data, specifically web logs, in order to improve web based applications. Web usage mining consists of three phases, preprocessing, pattern discovery, and pattern analysis. After the completion of these three phases the user can find the required usage patterns and use these information for the specific needs.
Web usage mining itself can be classified further depending on the kind of usage data considered. They are web server data, application server data and application level data. Web server data correspond to the user level logs that are collected at Web server. Some of the typical data collected at a Web server include IP addresses, page references, and access time as well as pattern of the users and is the main input to the present research. Web usage mining consists of three phases, namely pre-processing, pattern discovery, and pattern analysis.
This paper describes these phases in detail and the current applications of the technique.
- Page(s): 53-60
- Date of Publication: June 2013
- Kamal
Assistant Professor,
BRCMCET, Bahal (Hry.), India - Dinesh Kumar
Assistant Professor,
BRCMCET, Bahal (Hry.), India
References
[1] Agrawal R., Imielinski T., and Swami A. (1993). Mining Associations between sets of items in Massive Databases. In Proceeding of the ACM-SIGMOD International Conference on Management of Data, pp. 207-216, Washingtom D.c USA.
[2] Kosala R., Blockeel H., (2000). Web mining research: a survey. SIGKDD explorations: newsletter of the special interest group (SIG) on knowledge discovery & data mining, ACM 2(1), pp. 1–15.
[3] Cooley R., Mobasher B., & Srivastava J. (1997). Web mining: Information and pattern discovery on the World Wide Web. In Proceeding of the IEEE International Conference on Tools with AI. pp. 558-567.
[4] Masseglia F., Poncelet P., and Teisseire M. (1999). Using data mining techniques on web access logs to dynamically improve hypertext structure. In ACM SigWeb Letters, 8(3): pp. 13-19.
[5] Zhang Huiying, Liang Wei.An (2004). Intelligent Algorithm of Data Pre-processing in Web Usage Mining. In Proceeding of the 5th World Congress on Intelligent Control and Automation. pp. 15-19. Hangzhou, P.R. China.
[6] Yinghui Yang and Balaji Padmanabhan. (2005). GHIC: A Hierarchical Pattern-Based Clustering Algorithm for Grouping Web Transactions. IEEE Transactions on Knowledge and Data Engineering, Vol 17, No. 9.
[7] Yi Dong, Huiying Zhang and Linnan Jiao. (2006). Research on Application of User Navigation Pattern Mining Recommentation. In Proceeding. of the 6th World Cogress on Intelligent Control and Automation. Dalian, China.
[8] Hannah Inbarani H., Thangavel K., and Pethalakshmi A. (2007). Rough Set based Feature Selection for Web Usage Mining. International Conference on Computational Intelligence and Multimedia Applications.
[9] Suneetha K. R., and Krishnamoorthi R. (2009). Identifying User Behavior by Analysizing Web Server Access Log File. IJCSNS International Journal of Computer Science and Network Security, Vol 9, No.4.
[10] Manoj Bahel and Chhay Dule. (2010). Analysis of Frequent Itemset generation process in Apriori and RCS (Reduced Candidate Set) Algorithm. International Journal of Advanced Networking and algorithms. Vol 02, Issue 02. pp. 539-543.
[11] Veeramalai S., Jaisankar S., and Kannan A. (2010). Efficient Web Log Mining Using Enhanced Apriori Algorithm with Hash Tree and Fuzzy. International. Journal of Computer Science and Information Technology (IJCSIT) Vol.2. No.4.
[12] Maja Dimitrijevic and Zita Bosnjak. (2011). Web Usage Association Rule Mining System. Interdiciplinary Journal of Information, Knowledge and Management, Vol 6.
[13] Maja Dimitrijevic and Zita Bosnjak. (2010). Discovering interesting association rules in the web log usage data. Interdisciplinary Journal of Information, Knowledge, and Management, 5,pp. 191-207.
Kamal, Dinesh Kumar “An Overview of Web Usage Mining” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 6, pp.53-60 2013
Devendra Singh Gour, Rachit Jain, Rashmi Tikar, Rinkoo Bhatia June 2013 Page No.: 61-65
A Mobile Ad-hoc Network (MANET) is a wireless network that can be formed without the need for pre-existing infrastructure in which every node can act as a router. In the MANET has the main challenge is the design of robust routing algorithms that adapt to the frequent and randomly changing network topology. In this paper, we compare and evaluate the performance of three types of On demand routing protocols- Ad-hoc On-demand Distance Vector (AODV) routing protocol, Ad-hoc On-demand multipath Distance Vector (AOMDV) routing protocol ,Dynamics Source Routing Protocol(DSR) using the MAC802.16 layer. In this paper we compare three well know On-demand routing protocols AODV, DSR and AOMDV by using three performance metrics packet delivery ratio, average end to end delay and Packet Loss. This comparison has been done by using simulation tool NS2 which is the famous simulator.
- Page(s): 61-65
- Date of Publication: June 2013
- Devendra Singh Gour
Dept. of Electronics & Comm. Engineering,
ITM Universe, Gwalior, MP India - Rachit Jain
Dept. of Electronics & Comm. Engineering,
ITM Universe, Gwalior, MP, India - Rashmi Tikar
DDept. of Electronics & Comm. Engineering,
ITM Universe, Gwalior, MP, India - Rinkoo Bhatia
Dept. of Electronics & Comm. Engineering,
ITM Universe, Gwalior, MP, India
References
[1] Charles Perkins, Elizabeth Royer, and Samir Das.“Ad hoc on demand distance vector (AODV) routing”. IETF RFC No. 3561, July 2003.
[2] Sapna S. Kaushik, P.R. Deshmukh, “Comparison of effectiveness of AODV, DSDV and DSR Routing Protocol in Mobile Ad hoc Networks”, International Journal of Information Technology and Knowledge Management, Vol. 2(2), pp.499-502,2009.
[3] Samyak Shah1, Amit Khandre, Mahesh Shirole and Girish Bhole “Performance Evaluation of Ad Hoc Routing Protocols Using NS2 Simulation”. Conference on mobile and pervasive computing,167-171 coMPc-2008
[4] S.S. Tyagi and R.K. Chauhan, “Performance analysis of proactive and reactive routing protocols for ad hoc networks”, International Journal of Computer Applications (2010).
[5] Amit N.Thakare, Mrs. M. Y. Joshi “Performance Analysis of AODV & DSR Routing Protocol in Mobile Ad hoc Networks” IJCA Special Issue on “Mobile Ad-hoc Networks”MANETs, 2010
[6] D. Johnson, “Dynamic Source Routing for Mobil Ad Hoc Networks”, IEFT MANET Draft, April 2003
[7] Mahesh K. Marina et all “Ad hoc on-demand multipath distance vector routing” Wireless Communications And Mobile Computing 2006
[8] V.C. Patil, Rajashree, V. Biradar, R.R. Mudholkar,S.R.Sawant,“On-Demand Multipath Routing Protocols for Mobile Ad Hoc Networks Issues and Comparison”, International Journal of Wireless Communication and Simulation, Vol. 2(1), pp. 21-38, 2010
[9] R.Balakrishna1, U.Rajeswar Rao2 , N.Geethanjali N2 “Performance issues on AODV and AOMDV for MANETS” (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 1 (2) , 38-43, 2010.
[10] The Network Simulator NS-2 homepage, https://www.isi.edu/nsnam/ns/
Devendra Singh Gour, Rachit Jain, Rashmi Tikar, Rinkoo Bhatia “Performance Analysis of Different on-Demand Routing Protocols for MAC802.16 WIMAX in MANET using ns2 ” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 6, pp.61-65 2013
Neha Saxena June 2013 Page No.: 66-72
Steganography refers to the technique of hiding secret messages into media such as text, audio, image and video without any suspicion, while steganalysis is the art and science of detection of the presence of steganography. It can be used for the benefit of the mankind to serve us as well as by terrorists and criminals for malicious purposes. Both steganography and steganalysis have received a lot of attention from law enforcement and media. In the past, different steganographic techniques with properties of imperceptibility, undetectability, robustness and capacity have been proposed. Newer and more sophisticated steganographic techniques for embedding secret message will require more powerful steganalysis methods for detection. The battle between steganography and steganalysis is never ending. In this paper, an extensive review report is presented for steganography and steganalysis.
- Page(s): 66-72
- Date of Publication: June 2013
- Neha Saxena
References
1. U.C. Nirinjan, and D. Anand, Watermarking medical images with patient information, Proc. of 20th IEEE International Conference of Biological Society, pp. 703-706, 29 October – 1 November 1998.
2. Y. Li, C. Li and C. Wei, Protection of mammograms using blind steganography and watermarking, Proc. of IEEE ISIAS, pp. 496-499, 2007.
3. R. J. Anderson and F.A.P. Pettitcolas, On the limits of steganography, IEEE Journal on Selected Areas in Communication, vol. 16, no. 4, pp. 474-481, 1998.
4. H. Wang and S. Wang, Cyber warfare: Steganography vsSteganalysis, Communications of ACM, vol. 47, no. 10, pp. 76-82, 2004.
5. N. Provos and P. Honeyman, Hide and seek: An introduction to steganography, IEEE Security and Privacy, vol. 1, no. 3, pp. 32-44, 2003.
6. B. Lin, J. He, J. Huang and Y.Q. Shi, A survey on image steganography and steganalysis, Journal of Information Hiding and Multimedia Signal Processing, vol. 2, no. 2, pp. 142-172, April 2011.
Neha Saxena “Complete Study On Different Methods For Producing Stegoimage” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 6, pp.66-72 2013
Ramandeep Kaur, Anuja Sharma June 2013 Page No.: 73-75
Cloud Computing is the result of evolution and adoption of existing technologies and paradigms. The goal of cloud computing is to allow users to take benefit from all of these technologies, without the need for deep knowledge about or expertise with each one of them. The cloud aims to cut costs, and help the users focus on their core business instead of being impeded by IT obstacles. Cloud computing has several distinct characteristics that distinguish it from a traditionally hosted computing environment:
• Users often have on-demand access to scalable information technology capabilities and services that are provided through Internet-based technologies.
• These resources run on an external or third party service provider’s system instead of on locally hosted servers unlike traditional systems directly under the user’s personal or institutional control; cloud computing services are fully managed by the provider.
• Typically, many unaffiliated and unconnected users share the service provider or vendor’s infrastructure.
• Using cloud services reduces the need to carry data on removable media because of network access anywhere, anytime.
- Page(s): 73-75
- Date of Publication: June 2013
- Ramandeep Kaur
Department of Computer Science,
Jaipur Institute of Technology, Jaipur, Rajasthan, India - Anuja Sharma
Department of Information Technology
Global college of Technology, Jaipur, Rajasthan, India
References
1. National Institute of Standards and Technology. Retrieved 24 July 2011.
2. Amazon Web Services. 2013-3-19. Retrieved 2013-3-20.
3. Baburajan, Rajani, “The Rising Cloud Storage Market Opportunity Strengthens Vendors,” infoTECH, August 24, 2011″. It.tmcnet.com. 2011-08-24. Retrieved 2011-12-02.
4. Oestreich, Ken, (2010-11-15). “Converged Infrastructure”. CTO Forum. Thectoforum.com. Retrieved 2011-12-02.
5. Strachey, Christopher (June 1959). “Time Sharing in Large Fast Computers”. Proceedings of the International
6. Conference on Information processing, UNESCO. paper B.2.19: 336–341.
7. wikipedia.org
8. infoworld.com/d/cloud-computing.
9. cloudsecurity.trendmicro.com/us/technology-innovation.
Ramandeep Kaur, Anuja Sharma “Cloud Computing, it’s Security & Services” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 6, pp.73-75 2013
Dr.Gaurav Kumar Jain, Shritosh Kumar, Neelam Gupta, Dipesh Bhardwaj June 2013 Page No.: 76-80
Recently, Vehicular ad hoc network (VANET) can offer various services and benefits to VANET users and thus deserves deployment effort. Intelligent Transportation Systems (ITS) are aimed at addressing critical issues like passenger safety and traffic congestion, by integrating information and communication technologies into transportation infrastructure and vehicles. They are built on top of self organizing networks, known as a Vehicular Ad hoc Networks (VANET), Vehicular communication systems facilitate communication devices for exchange of information among vehicles and between vehicles and roadside equipment. Working in tandem with the fielded Intelligent Transportation Systems (ITS) infrastructure, VANET is expected to enhance the awareness of the traveling public by aggregating, propagating and disseminating up-to -the minute information about existing or impending traffic-related events. In support of their mission, VANET communications, employing a combination of Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) wireless communication are expected to integrate the driving experience into a ubiquitous and pervasive network that will enable novel traffic monitoring and incident detection paradigms. In this paper, we consider that every study should chose the appropriate simulator based on its requirements.
- Page(s): 76-80
- Date of Publication: June 2013
- Dr.Gaurav Kumar Jain,
Associate Professor,
Deepshikha Kala Sansthan, Jaipur, Rajasthan, India - Shritosh Kumar
Assistant Professor,
JECRC UDML, Jaipur, Rajasthan, India - Neelam Gupta
Assistant Professor,
JECRC UDML, Jaipur, Rajasthan, India - Dipesh Bhardwaj
RCERT, Jaipur, Rajasthan, India
References
[1] V. Srivastava, M. Motani, Cross-layer design: a surveyand the road ahead, IEEE Communications Magazine 43 (12) (2005) 112–119.
[2] O. Riva, T. Nadeem, C. Borcea, and L. Iftode, ―Context-Aware Migratory Services in Ad-HocNetworks,‖ IEEE Transactions on Mobile Computing, vol. 6, no. 12, pp. 1313–1328, Dec. 2007.
[3] E. Lieberman, A. Rathi, Traffic simulation, United States Transportation Research Board Revised Monograph on Traffic Flow Theory (2005) 1–23
[4] Vishal Kumar & Narottam Chand, ―Data Scheduling in VANETs : A Review‖, International Journal of Computer Science & CommunicationVol. 1, No. 2, July-December 2010, pp. 399-403
[5] Ghassan M. T. Abdalla, Mosa Ali AbuRgheff and Sidi Mohammed Senouci, ―Current Trends in Vehicular Ad Hoc Networks‖.
[6] Maxim Raya and Jean-Pierre Hubaux, ―Securing vehicular ad hoc networks‖, Journal of Computer Security 15 (2007) 39–68, IOS Publication.
[7] P. Papadimitratos, A. de la Fortelle, K. Evenssen, R. Brignolo, S. Cosenza, Vehicular communication systems: enabling technologies, applications, and future outlook on intelligent transportation, IEEE Communications Magazine 47 (11) (2009) 84–95.
[8] Razvan Stanica ⇑, Emmanuel Chaput, André-Luc Beylot, ―Simulation of vehicular ad-hoc networks: Challenges, review of toolsand recommendations‖ Computer Networks, journal homepage: www.elsevier.com/ locate/comnet2011
[9] H. Stubing, M. Bechler, D. Heussner, T. May, I. Radusch, H. Rechner, P. Vogel, simTD: a car-to-X system architecture for field operational tests, IEEE Communications Magazine 48 (5) (2010) 148–154
[10] Susan A. Shaheen , Project Work ―Dynamics in Behavioral Adaptation to a Transportation Innovation: A Case Study of Carlink–A Smart Carsharing System‖
[11] T. Camp, J. Boleng, V. Davies, A survey of mobility models for ad hoc network research, Wireless Communications & Mobile Computing. Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications 2 (5) (2002) 483–502.
[12] Christoph Sommer, Zheng Yao, Reinhard German and Falko Dressler, ―On the Need for Bidirectional Coupling of Road Traffic Microsimulation and Network Simulation‖.
[13] Josiane Nzouonta, Neeraj Rajgure, Guiling (Grace) Wang, Member, IEEE, and Cristian Borcea, Member, IEEE, “VANET Routing on City Roads Using Real-Time Vehicular Traffic Information”, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 58, NO. 7, SEPTEMBER 2009.
[14] E. Lieberman, A. Rathi, Traffic simulation, United States Transportation Research Board Revised Monograph on Traffic Flow Theory (2005) 1–23 (Chapter 10).
[15] U.S. Census Bureau – Topologically Integrated Geographic Encoding and Referencing System. .
[16] A. Mahajan, N. Potnis, K. Gopalan, A. Wang, Evaluation of mobility models for vehicular ad-hoc.
Dr.Gaurav Kumar Jain, Shritosh Kumar, Neelam Gupta, Dipesh Bhardwaj “The Simulation Tool of Vehicular Ad-hoc Networks” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 6, pp.76-80 2013
Madhukar Vasant Vasave June 2013 Page No.: 81-86
The aim of this study was to determine prevalence of intestinal helminthes infection in children. The stool sample was collected from children from urban as well as rural areas. The sample were collected and transported to field laboratory were ova and cyst tested by using direct saline and iodine wet preparation method infection by at least one intestinal helminthes was found in sample population. The prevalence of Ascaris lumbricoides, Hymenolepis nana, Ancylostoma duodenale and taenia species light to moderate intensity of infection was observed. The age group, rural or urban residence, type of water source, boiled or unboiled water, type of defection site level of personal hygiene and maternal education were associated with helminth infection.
- Page(s): 81-86
- Date of Publication: June 2013
- Madhukar Vasant Vasave
Research Scholar,
Dept. of Zoology J.J.T. University, Jhunjhunu (Rajasthan), India
References
1) Anand K, Kants, Kapoor S. K. et. al, Natritinal status of aldolescent school children in rural north India ind poed 1999; 36:8 10-5
2) Bundy DAP et al Evaluating neasures to control intestinal parasitic infections world Health statistics quarterly 1992, 42
3) Chaturvedi S, Kapil U, Gnanasekran N et al Natrient intake aldolescest girls belonging to poor socio-economic group of rural our of Rajasthan : Ind paed 1983;33:197-201
4) Jayaram Panikar Ck. The text book of medical parasitology jaypee Brothers / medical publishers, New Delhi 1991;207-19
5) Lathem M.C., Stephenson L.S., Holl A., et al parasitic infection anemia and nutritional status study of their inter-relationship and the affect of prophylaxis and treatment of Royal Society for and Tropical medicine and Hygine 1983;77(1):8-41
6) Lwabo N.J., Broker S, Siza J.E., et.al age Potterns in stating and anemia in African School Children a cross sectional study in Tanzania Eur J clin Nut (2000); 54(1):38-40.
7) Nayoba B.S., Basaltkar S.H., Bhat S.D., States of intestinal parasite infection in Lone A rural area of Ahmednagar District of Maharashtra J communis Dis (1992); 24(1):58-9
8) S.A. Wani, F. Ahmad, J.A. Zargar, P.A. Dar, Z.A. Dar & T.R. Jan (2008) intestinal helminthes in a population of children from the Kashmir valley, India, Journal of Helminthology Vol : 28; page 313-317
9) Shahabudin AKM, Talakder K, Talukder MAK et al Aldolescent natrition in a rural community in Bangladesh Ind J pae 2000:67(2):93-8.
10) Steplonson L.S. Helminath parasites, a major factor in malnutrition world Health forum 1994;15.
11) V. G. Rao, M.C. Aggarwal, R. Yodav, S.K. Minocha (2003), intestinal parasitic infections Anemia and under natrition among tribal adolescent of Madhya Pradesh, India Journal of community medicine Vol. XXVIII No. 1 Page : 26-29.
12) World Health Organization, Nutritional anemias Report of a WHO Scientific Group Dep Ser. No. 405 : 1968.
13) World Health organization, prevention and control of intestinal parasitic infection : Report of WHO expert committee Tech Rep Ser No. 49:1987.
Madhukar Vasant Vasave “Parasitic helminthes infection and anemia among growing children in Nandurbar District, Maharashtra” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 6, pp.81-86 2013
Dr. Gaurav Kumar Jain, Mr. Parmeshwar Lal Bhanwariya, Mr. Naresh Kumar Marwal, Mr. Brijesh Kumar Singh June 2013 Page No.: 87-91
I. INTRODUCTION
Accurate super cyclone prediction is an important problem for construction activities in coastal and offshore areas. In some coastal areas, the slopes are very gentle and tidal variation makes waterfront distances in the range from hundred meters to a few kilometers. In offshore areas, accurate super cyclone data is helpful for successful and safe operations. The applications of Wireless Sensor Networks (WSN) contain a wide variety of scenarios. In most of them, the network is composed of a significant number of nodes deployed in an extensive area in which not all nodes are directly connected. Then, the data exchange is supported by multihop communications. Routing protocols are in charge of discovering and maintaining the routes in the network. However, the correctness of a particular routing protocol mainly depends on the capabilities of the nodes and on the application requirements [1].
- Page(s): 87-91
- Date of Publication: June 2013
- Dr. Gaurav Kumar Jain
Associate Professor,
Deepshikha Kala Sansthan, Jaipur, Rajasthan, India - Mr. Parmeshwar Lal Bhanwariya
Assistant Professor,
JECRC UDML,Jaipur, Rajasthan, India - Mr. Naresh Kumar Marwal
Assistant Professor,
JECRC UDML, Jaipur, Rajasthan, India - Mr. Brijesh Kumar Singh
Assistant Professor,
JECRC UDML, Jaipur, Rajasthan, India
References
[1] A. Nanda, A. K. Rath, S. K. Rout, “ Real Time Wireless Sensor Network for Coastal Erosion using Fuzzy Inference System”: International Journal of Computer Science & Emerging TechnologiesVol-1,Issue 2, August 2010, PP. 47-51.
[2] E.R.Musaloiu, A. Terzis, K. Szlavecz,A.Szalay, J.Cogan, and J. Gray, “Life under your feet: A wireless soil ecology sensor network”,2006.
[3] H. Kung, J. Hua, and C. Chen, “Drought forecast model and framework using wireless sensor networks, Journal of Information Science and Engineering, vol. 22, 2006, pp. 751-769.
Dr. Gaurav Kumar Jain, Mr. Parmeshwar Lal Bhanwariya, Mr. Naresh Kumar Marwal, Mr. Brijesh Kumar Singh “Real Time Wireless Sensor Network For Super Cyclone Prediction” International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 6, pp.87-91 2013