A new generation for new youth with high speed internet, online games, online video chat and many more features which are not possible 10 year back but now it is possible with 5G. 5G mobile communication systems based on beam-division multiple access and relays with group cooperation mobile communication systems based on beam-division multiple access.
- Page(s): 01-03
- Date of Publication: Feburary 2013
- Amanda CicilatoNorthern Melbourne Institute of TAFE Waterdale Rd, Heidelberg, Australia
References
1).https://www.123helpme.com/preview.asp?id=65665 2). en.wikipedia.org/wiki/5G. 3).https://www.radio-electronics.com/info/cellulartelecomms/5g-mobile-cellular/technology-basics.php 4)https://xploreout.blogspot.in/2012/07/5g-technology.html 5)https://www.futuretimeline.net/21stcentury/images/mobile-phones-2020.jpg.
Amanda Cicilato "5G (Fifth Generation)" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 2, pp.01-03 2013
Vulnerability scanning is one of the optimistic information security technologies in the Internet and network security area. However, the current vulnerability scanner (VS) products vary extensively in the way that they can detect vulnerabilities, as well as in the number of vulnerabilities that they can detect. Often, VS products also declare their own vendor-specific vulnerability category, which makes it difficult to study and compare them. Although Common Vulnerabilities and Exposures (CVE) provides a means to solve the different vulnerability names used in the different VS products; it does not standardize vulnerability categories. This paper presents a way to classify the vulnerabilities in the CVE repository and proposes a solution for standardization of the vulnerability categories using a data-clustering algorithm.
- Page(s): 04-16
- Date of Publication: Feburary 2013
- Bhanudas S.PanchabhaiDepartment of Computer Science, R.C.Patel Arts, Science and Commerce College, Shirpur Dist.Dhule (Maharashtra), India
- Dr.Ashok N.PatilVasantrao Naik Arts, Science College, Shahada, Dist.Nandurbar (Maharashtra), India
References
[1] Gollmann G., Computer Security, pp. 5-9, John Wiley & Sons, Inc., 1999, ISBN0- 471-97844-2. [2] Pfleeger C. P., Security in Computing, Prentice Hall, 2003, ISBN 0-13-035548-8. [3] Tiwana A., Web Security, pp. 112-135, Digital Press, 2000, ISBN 1-55558-210-9. [4] Bace R.G., Intrusion Detection, pp. 37-43, Macmillan Technical Publishing, 2000, ISBN 1-57870-185-6. [5] Menezes A.J., Van Oorschot P.C., Vanstone S.A., Handbook of Applied Cryptography, CRC Press, 1996, ISBN 0-8493-8523-7. [6] VENTER, H.S.; ELOFF, J.H.P., Harmonizing Vulnerability Categories, South African Computer Journal; pp. 24-31; No. 29; Computer Society of South Africa South Africa, 2002, ISSN 1015-7999. [7] Nessus, https://www.nessus.org/ 29/04/2004. [8] Baker D. W., Christey S. M., Hill W. H., Mann D. E., The Development of a Common Enumeration of Vulnerabilities and Exposures, Second International Workshop on Recent Advances in Intrusion Detection, 1999. [9] Kujawski P, Why Networks Must Be Secured, Cisco Systems, Inc., 2003. [10] SAINT Corporation, https://www.saintcorporation.com/ 02/05/2004. [11] MOREnet, https://www.more.net/services/rva/categories.html 02/05/2004. [12] MITRE Inc., https://www.cve.mitre.org/, 27/04/2004 [13] Engelbrecht A. P., Computational Intelligence, An Introduction, pp. 61-71, John Wiley & Sons, Inc., 2002, ISBN 0-470-84870-7. [14] Angeline, P. J. and Pollack, J. B., Competitive environments evolve better solutions for Complex tasks. In Forrest, S., editor, Proceedings of the Fifth International Conference on Genetic Algorithms, pp. 264-270, San Mateo, CA. Morgan Kaufmann, 1993. [15] Pedersen, T., and Bruce, R., Distinguishing word senses in untagged text. Proceedings of the Second Conference on Empirical Methods in Natural Language Processing, pp. 197-207, 1997. [16] Kirk J. S., Chang D. J., and Zurada J. M., A Self-Organizing Map with Dynamic, Architecture for Efficient Color Quantization. Proceedings of the International Joint Conference on Neural [17] Han J., Kamber M., Data Mining: Concepts and Techniques, pp. 105-130, Morgan Kauffmann Publishers, 2001, ISBN 1-55860-489-8.
Bhanudas S.Panchabhai, Dr.Ashok N.Patil "Organize Vulnerabilities by Data Clustering Techniques" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 2, pp.04-16 2013
This paper discusses and revolves around providing an agent-based text-mining document search-engine architecture and implementing two algorithms one of which will be used for document-weighting and other which can be used for document-ranking. The main challenge lies in defining the factor on which the algorithms work and hence the „weight of the document‟ has been defined as the deciding factor. While browsing the internet, people use different Search Engines such as Google, Yahoo, and Bing etc. In India Internet access is not easily available everywhere especially to the person who knows a little about computers. But there will be people who are especially seeking proper and genuine information related to their queries in a particular domain such as cancer diseases in medical science, data mining techniques in computer science, etc. Hence effort is made here is to develop a web-browser based document search-engine which incorporates novel algorithms for document-weighting and document-ranking and hence provide a good way to find out relevant documents with ease. With incorporating of Quality assurance activities in the software development phases ensures all required issues are addressed and implemented to achieve quality product development.
- Page(s): 17-23
- Date of Publication: Feburary 2013
- Devendrasingh ThakoreResearch Scholar, JJTU, India
- Dr. Akhilesh R. UpadhyayDept.of EC Engg., Sagar Institute of Research and Technology – Bhopal, 462041(M.P.), India
References
1. “IDM: An Intelligent Software Agent Based Data Mining Environment” by Ranjit Bose and Vijayan Sugumaran. 2. “A Framework of an Automated Data Mining System Using Autonomous Intelligent Agents” by J.Rajan and Dr. V.Sarvanan 3. “Importance of proper weighting methods” by Chris Buckley 4. “The Anatomy of a Large-Scale Hypertextual Web-Search Engine” by Sergey Brin and Lawrence Page.
Devendrasingh Thakore, Dr. Akhilesh R. Upadhyay "Analysing and Improving Quality Assurance in Document Search-Engine Incorporating a Document-Ranking Algorithm for Text-Mining " International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 2, pp.17-23 2013
With nearly twenty years of hopeful rhetoric about becoming “strategic partners” with a “seat at the table” where the business decisions that matter are made and with a great deal of normative writing about the role HR should play the truth of the matter is most HR professionals aren't even close. The majority of HR executives remain, to all extent and purposes, neither strategic nor leaders. Studies, books and Articles argue that HR needs to become a strategic partner (Ulrich, 1997; Brockbank, 1999; Lawler & Mohrman, 2000a). But there is relatively little evidence to suggest that HR is making any structural and competency changes it needs, to provide increasing value –added contributions to the business. A great deal has changed in the global business environment but has HR organization made the corresponding changes? Is HR becoming a strategic partner or not? What does becoming a strategic partner necessitate? And is the HR function more effectual when it is a strategic partner? The answers to these questions are decisive to the future development and direction of the HR function in organizations. In today’s economic climate, smart companies agree people are their most important asset and one of their key competitive advantages as everything else may be replicated. However, as rapid globalization continues to impact the market, the talent market is becoming increasingly competitive. Forces have converged to support the idea of HR as more of a strategic partner. Corporations are undergoing dramatic changes with upcoming challenges of attracting and retaining the best talent, steadily improving people productivity and dealing with a diverse workforce in the midst of increasing globalization. Perhaps one the most important changes are the rapid deployment of information technology and the increasing amount of knowledge work that organizations do. Also increasingly important are the rapidly changing business environment and the increasing complexity of modern organizations. These and other changes have created a growing consensus that effective human capital management is critical to an organization's success (Jackson, et al., 2003). As a result, more and more companies are striving to change the role of their Human Resource department from a passive compensation, benefits and compliance role to an entity which is a highly proactive partner initiating a leadership role in helping to frame the company’s operating strategies to meet corporate objectives. The paper on enabling strategic HR: the road ahead looks into the current state of strategic HR thereby suggesting changes as to how HR can make the transition? What is needed in order for HR to become more of a strategic partner? The paper discusses the various steps the companies can take to increase the strategic value-add of HR and the role HR organization and HR professionals may instill to become more of a strategic partner
- Page(s): 24-34
- Date of Publication: Feburary 2013
- Prof Manju Nair Professor, International School of Informatics & Management Technical Campus, Jaipur, Rajasthan, India
References
Prof Manju Nair "Enabling Strategic HR: The way forward " International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 2, pp.24-34 2013
High Voltage Direct Current (HVDC) technology has characteristics which make it especially attractive in certain transmission applications. The number of HVDC projects committed or under consideration globally has increased in recent years reflecting a renewed interest in this field proven technology. New HVDC converter designs and improvements in conventional HVDC design have contributed to this trend. This paper provides an overview of the rationale for selection of HVDC technology and describes some of the latest technical developments. Most commercial HVDC plants now operating are equipped with the same type of control system, the so-called individual phase control system. This system is simple and the operating experience is excellent. This may be the case when theHVDC transmission is connected to a very weak ac network or to a generator station with large variations in frequency.
- Page(s): 35-39
- Date of Publication: Feburary 2013
- Sushil Kr. SolankiAsst. Proff. KNGDMEC Modinagar, India
- Shweta AgrawalM.Tech scholar I.E.T. Alwar, , India
- Pankaj KhandelwalM.Tech scholar S.K.I.T. Jaipur, India
References
[1] B. Jacobson, Y. Jiang-Hafner, P. Rey, G. Asplund, ”HVDC with Voltage Source Converters and Extruded Cables for up to ± 300 kV and 1000 MW,” Cigre Session 2006, B4-105. [2] L. Ronstrom, B. D. Railing, J. J. Miller, P. Steckley, G. Moreau, P. Bard, J. Lindberg, ”Cross Sound Cable Project Second Generation VSC Technology for HVDC,” Cigre Session 2004, B4-102. [3] D. McCallum, G. Moreau, J. Primeau, D. Soulier, M. Bahrman, B. Ekehov, “Multiterminal integration of the Nicolet Converter Station into the Quebec-New England Phase II transmission system,” Proc. Cigre Session 1994 [4] Ekstrom, A. and Liss, G.: “A Refined HVDC Control System,” IEEE Trans. Power Systems, Vol. 89, 1970, pp. 723-732 [5] M. Bahrman, D. Dickinson, P. Fisher, M. Stoltz, ”The Rapid City Tie – New technology tames the East-West interconnection,” Proc. Minnesota Power Systems Conf., Nov. 2004. [61 A. Mase, H. Hirose, "HVDC System Performance and Control Method Applied in AC Weak System", IEE Conference on High Voltage DC and/or AC PowerTransmission, pp.80-86, November 19-23, 1973 [7] S. Horiuchi, K. Goto, T. Sakai, K. Sekiya, H. Konishi, T. Nakamura, "Development of High- Reliability Control/Protection Equipment for Bulk-HVDC Power Transmission", IPEC-Tokyo, IE Japan, ppl38-147, March 27-31, 1983. [8] V. K. Sood, HVDC and FACTS Controllers: Applications of Static Converters in Power Systems, Kluwer Academic Publishers, 2004. [9] N. G. Hingorani, and L. Gyugyi, Understanding FACTS: Concepts and Technology of Flexible AC Transmission Systems, IEEE Press, 2000. [10] A. P. Malozemoff, D. T. Verebelyi, S. Fleshler, D. Aized, and D. Yu, "HTS Wire: Status and Prospects", Proceedings of ICMC 2002, Xi'an China, 16 - 20 June 2002, pp. 424-430. [11] V. Karasik, K. Dixon, C. Weber, B. Batchelder, G. Campbell, and P. Ribeiro, "SMES For Power Utility Applications: A Review of Technical and Cost Considerations", IEEE Trans. on Applied Superconductivity, Vol. 9, No. 2, June 1999, pp. 541-546. [12] J-L Rasolonjanahary, E Chong, J Sturgess, A Baker, C Sasse, "A Novel Concept of Fault Current Limiter", 8th IEE International Conference on AC and DC Power Transmission, Savoy Place, London, 28 - 30 March 2006.
Sushil Kr. Solanki, Shweta Agrawal, Pankaj Khandelwal "H.V.D.C. Technology Overview & Applications" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 2, pp.35-39 2013
This is the world of fast growth and quick results, where everybody wants to attain the development and progress without much hard work and neglecting the emotions harshly which later affects the relationships. Huge accelerating advances in science and technology have resulted in exceptional progress in the world in all the streams and directions. It has been observed that the skilled professionals who are almost perfect in their subjects, but are unhappy and unsatisfied even after the hard work and productive results at the workplaces due to minor or major issues associated in their lives due to the lack of control on their emotions which further leads to the frustration and unrest in their lives .Poor Emotional Quotient may results in strained relationships too. The taste of success and achievement is affected due to the stress felt in dealing with certain problems in the personal and official life. Todays’ lifestyle is leading us to face immense emotional pressures which overall affect the quality of life. My paper will deals with the emotional challenges faced by our Professionals in their lives. Strong emotional competency can give them the strength, confidence and satisfaction to handle any emotional issue associated with them, and will bring more joy, peace, happiness and a sense of achievement in their workplaces and personal lives. The Emotional Intelligence also termed as Emotional quotient has gained a prominent mark in analysing the traits of good leaders and professionals. High Emotional Quotient is the trait of a balanced individual and helps in handling the day today issues more smartly and tactfully , which in turn gives more peace and joy in their lives.
- Page(s): 40-49
- Date of Publication: Feburary 2013
- Prof. Ashu BhardwajGuest Faculty (MNIT Jaipur) & Soft-Skills Trainer
References
1. Allport ,G.W. Personality: A psychological interpretation. New York : Holt, 1937. 2. Allport,G.W. The ego in contemporary psychology. Psychology review,1943. 3. Arkoff, A. Adjustment and mental Health. New York : McGrraw- Hill, 1968. 4. Branden, N. Psychotherapy and the objectivist ethics New York :Nathaniel Branden institute, 1965. 5. Brown, R.T. Journal of Experimental Psychology,1964- psycnet.apa.org. 6. Coleman C. James, Psychology and Effective Behaviour.liinios, United states of America: Scott and Foresman,1969. 7. Daniel Goleman, Working with Emotional Intelligence, Bloomsbury Publishers ,1988 8. D. Deerlove, leading with Feelings , The Times , September 30, 1999,Section 4,pg 7 9. D. Golema, Working with Emotional Intelligence, Bloomsbury Publications ,1988 10. Eriksen, Behaviour therapy and the neuroses. London Pergaon Press, 1960.Heider, Fritz Attitudes and Cognitive Organization. The Journal of Psychology (1946). 11.Grinker ,R R (Ed) Toward a Unified theory of Human Behavior.New York :Basic books, 1956. 12. Heider, Fritz (1958). The Psychology of Interpersonal Relations. John Wiley & Sons, (1958) 13. Grinker,R.R.(Ed) Toward a unified theory of human Behavior. New York : Basic Books, 1956. 14.James ,W. The Principles of Psychology New York : Holt, 1980. 15. J D. Mayer and P. Salovey, What is Emotional Intelligence. Basic Books, Educational Implications 1997. 16.Jeanne Segal , The Language of Emotional Intelligence New York: Tata McGraw, 2008 17.Jourard, S.M. Personal Adjustment. (2nd ed.)New York Turner. R .M. Behavior Research & Therapy. Elesevier, 1979. 18. Jit S Chandan ,Organizational Behavior (3rd ed) Vikas Publishing Delhi 2005 19.Stagner, R. Psychology of Personality. New York: McGraw – :Macmilan .1963. 20. Watson, J.B. Behaviorism. (Rev.ed) New York: Norton,(1930)
Prof. Ashu Bhardwaj "Develop Your Emotional Intellligence for a Better Life" International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.2 issue 2, pp.40-49 2013
The Genetic Algorithm (GA) and its many versions have been popular in the academy and the industry mainly because of their intuitiveness, ease of implementation, and the ability to effectively solve highly nonlinear, mixed integer optimization problems that are typical of complex engineering systems. The drawback of the GA is its expensive computational cost. Particle Swarm Optimization (PSO) is a relatively recent heuristic search method whose mechanics are inspired by the swarming or collaborative behavior of biological populations. PSO is similar to the GA as these two evolutionary heuristies are populations-based search methods. In other words, PSO and the GA move from a set of points (population) to another set of points in a single integration with likely improvement using a combination of deterministic and probabilistic rules. This paper attempts to examine the claim that PSO has the same effectiveness (finding the true global optimal solution) as the GA but with significantly better computational efficiency (less function evaluations) by implementing statistical analysis and formal hypothesis testing. The major objective of this paper is to compare the computational effectiveness and efficiency of the GA and PSO using a formal hypothesis testing approach.
- Page(s): 50-58
- Date of Publication: Feburary 2013
- Mr. Madhumay SenAsst. Professor, RCERT, Sitapura, Jaipur, Rajasthan. India
- Dr. Gaurav Kumar JainAsst. Professor, RCERT, Sitapura, Jaipur, Rajasthan. India
- Mr. Ravi RanjanAsst. Professor, RCERT, Sitapura, Jaipur, Rajasthan. India
References
1) Goldberg. D.E. (1989). Genetic Algorithms in search, Optimization and Machine Learning, Addison-Wesley. 2) Kennedy, J. and Eberhart, R., “Particle Swarm Optimization,” Proceedings of the IEEE International Conference on Neural Networks, Perth, Australia 1995, pp. 1942-1945. 3) Kennedy, J. and Eberhart, R., Swarm Intelligence, Academic Press, 1st ed., San Diego, CA, 2001. 4) Yuhui Shi., Particle Swarm Optimization. Electronic Data Systems, Inc. IEEE Neural Network Society Magazine, 2001. 5) R. Poli. Analysis of the publications on the applications of particle swarm optimization. Journal of Artificial Evolution and Applications, Article ID 685175, 10 pages, 2008. 6) R. Poli, J. Kennedy, and T. Blackwell. Particle swarm optimization. An overview. Swarm Intelligence, 1(1): pp 33-57, 2007.
Mr. Madhumay Sen, Dr. Gaurav Kumar Jain, Mr. Ravi Ranjan "A Study of Genetic Algorithm with Optimization " International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.2 issue 2, pp.50-58 2013
High speed photo-detector are a key building block, which allow a large bandwidth upto several GHz for telecommunication application such as local area network, long distance communication upto several kilometers without signal degradation with high switching speed and high quantum efficiency. In this review paper, the recent progress in development and integration of Ge photo-detector on Si based photonics will be comprehensively reviewed along with a proposed structure of GaAs MISFET photo-detector for future research trends.
- Page(s): 59-66
- Date of Publication: Feburary 2013
- Suresh PatelJunior Telecom Officer, BSNL, Jamnagar, Gujrat, India
- Rakesh Kumar SaxenaDepartment of Electronic Instrumentation and Control Engineering, Institute of Engineering & Technology, Alwar, Rajasthan, India
References
1. Michel, J.; Liu, J.; Ahn, D.; Sparacin, D.; Sun, R.; Hong, C.; Giziewicz, W.; Beals, M Kimerling, L.; Kopa, A. Advances in fully CMOS integrated photonic devices Proc. SPIE 2007 doi:10.1117/12.706586 2. Liu, J.; Sun, X.; Camacho-Aguilera, R.; Kimerling, L.; Michel, J. Ge-on-Si laser operating at room temperature Optic. Lett 2010 35, 679-681 3. Liu, J.; Beals, M.; Pomerene, A.; Bernardis, S.; Sun, R.; Cheng, J.; Kimerling, L.; Michel, J. Waveguide-integrated, ultralow-energy GeSi electro-absorption modulators Nat. Photon 2008 2,433-437. 4. Colace, L.; Masini, G.; Assanto, G.; Luan, H.; Wada, K.; Kimerling, L. Efficient high-speed near-infrared Ge photodetectors integrated on Si substrates Appl. Phys. Lett 2000,76,1231-1233 5. Wang, J.; Loh, W.Y.; Zang, H.; Yu, M.B.; Chua, K.T.; Loh, T.H.; Ye, J.D.; Yang, R.; Wang, X.L.; Lee, S.J.; Cho, B.J.; Lo, G.Q.; Kwong, D.L. Integration of tensile-strained Ge p-i-n photodetector on advanced CMOS platform In proceeding of the 4thIEEE conference on Group IV Photonics2007 Tokyo, Japan, 19–21 September 2007; pp 1-3. 6. Jutzi, M.; Berroth, M.; Wohl, G.; Oehme, M.; Kasper, E. Ge-on-Si vertical incidence photodiodes with 39-GHz bandwidth IEEE Photon. Technol. Lett 2005, 17,1510-1512. 7. Liu, J.; Michel, J.; Giziewicz, W.; Pan, D.; Wada, K.; Cannon, D.; Jongthammanurak, S.; Danielson, D.; Kimerling, L.; Chen, J. High-performance, tensile-strained Ge pin photodetector on a Si platform Appl. Phys. Lett 2005,87,103501-103504. 8. Zang, H.; Lee, S.; Loh, W.; Wang, J.; Chua, K.; Yu, M.; Cho, B.; Lo, G.; Kwong, D. Dark-current suppression in metal-germanium-metal photodetectors through dopant –segregation in NiGe-Schottky barrier IEEE Electr. Dev. Lett 2008,29,161-164. 9. Zang, H.; Lee, S.; Loh, W.; Wang, J.; Yu, M.; Lo, G.; Kwong, D.; Cho, B. Application of dopant segregation to metal-germanium-metal photodetectors and its dark current suppression mechanism Appl. Phys. Lett 2008, 92, 051110:1-051110:3. 10. Zang, H.; Lee, S.; Yu, M.; Loh, W.; Wang, J.; Lo, G.; Kwong, D. High-speed metal-germanium-metal configured PIN-like Ge-photodetector under photovoltaic mode and with dopant-segregated Schottky-contact engineering IEEE Photon. Technol. Lett 2008, 20, 1965-1967. 11. Ang, K.; Zhu, S.; Wang, J.; Chua, K.; Yu, M.; Lo, G.; Kwong, D. Novel silicon-carbon (Si: C) Schottky barrier enhancement layer for dark-current suppression in Ge-on-SOI MSM photodetectors IEEE Electr. Dev. Lett 2008, 29, 704-707. 12. Ahn, D.; Hong, C.; Liu, J.; Giziewicz, W.; Beals, M.; Kimerling, L.; Michel, J.; Chen, J., Krtner, F. High performance, waveguide integrated Ge photodetectors Opt. express2007, 15, 3916-3921. 13. Koester, S.; Schow, C.; Schares, L.; Dehlinger, G.; Schaub, J.; Doany, F.; John, R, Ge-on-SOI-detector/Si-CMOS-amplifier receivers for high-performance optical-communication application J. Lightwave Technol 2007, 25, 46-57. 14. Koester, S.; Schaub, J.; Dehlinger, G.; Chu, J. Germanium-on-SOI infrared detectors for integrated photonic applications. IEEE J. Sel. Top. Quantum Electr 2007, 12, 1489-1502. 15. Masini, G.; Capellini, G.; Witzens, J.; Gunn, C. A 1,550nm, 10 Gbps monolithic optical receiver in 130 nm CMOS with integrated Ge waveguide photodetector. In Proceedings of the 4th IEEE International Conference on Group IV Photonics2007, Tokyo, Japan, 19–21 September 2007 pp. 1-3. 16. Vivien, L.; Rouvière, M.; Fédéli, J.; Marris-Morini, D.; Damlencourt, J.; Mangeney, J.; Crozat, P., El Melhaoui, L.; Cassan, E.; Le Roux, X. High speed and high responsivity germanium photodetector integrated in a Silicon-On-Insulator microwaveguide Opt Express 2007, 15 9843-9848. 17. Kato, K. Ultrawide-band/high-frequency photodetectors IEEE Trans. Microwave Theory 1999, 47, 1265-1281. 18. Sze, S.; Ng, K Physics of Semiconductor devices Wiley-Blackwell: Boston, MA, USA, 2007 . 19. Dosunmu, O.; Cannon, D.; Emsley, M.; Kimerling, L.; Unlu, M. High-speed resonant cavity enhanced Ge photodetectors on reflecting Si substrates for 1,550-nm operation. IEEE Photon Technol. Lett 2005, 17, 175-177. 20. Dosunmu, O.; Emsley, M.K.; Cannon, D.D.; Ghyselen, B.; Kimer ling, L.C.; Unlu, M.S. Germanium on Double-SOI Photodetectors for 1,550 nm operation Lasers and Electro-Optics Society (LEOS): Piscataway, NJ, USA, 2003; In Proceedings of the 16th Annual Meeting of the IEEE Tucson, AZ, USA, 27–28 October 2003; Volume 852, pp. 853-854. 21. Fama, S.; Colace, L.; Masini, G.; Assanto, G.; Luan, H. High performance germanium-on-silicon detectors for optical communications. Appl. Phys. Lett 2002, 81, 586-589. 22. Colace, L.; Balbi, M.; Masini, G.; Assanto, G.; Luan, H.; Kimerling, L. Ge on Si pin photodiodes operating at 10 Gbit/ s Appl. Phys. Lett 2006, 88, 101111-101114. 23. Dehlinger, G.; Koester, S.; Schaub, J.; Chu, J.; Ouyang, Q.; Grill, A.; Technologie, I.; Villach, A. High-speed germanium-on-SOI lateral PIN photodiodes. IEEE Photon.Technol. Lett 2004, 16, 2547-2549. 24. Klinger, S.; Berroth, M.; Kaschel, M.; Oehme, M.; Kasper, E. Ge-on-Si p-i-n photodiodes with a 3-dB bandwidth of 49 GHz IEEE Photon. Technol. Lett 2009, 21, 920-922. 25. Kang, Y.; Liu, H.; Morse, M.; Paniccia, M.; Zadka, M.; Litski, S.; Sarid, G.; Pauchard, A. Kuo, Y.; Chen, H. Monolithic germanium/silicon avalanche photodiodes with 340 Ghz gain-bandwidth product Nat. Photon 2008, 3, 59-63. 26. Pavesi, L.; Lockwood, D., Silicon Photonics Topic in applied Physics, Springer-Verlag: Berlin Germany, 2004; Volume 94. 27. Ang, K.; Ng, J.; Lim, A.; Yu, M.; Lo, G.; Kwong, D. Waveguide-integrated Ge/Si avalanche photodetector with 105 GHz gain-bandwidth product. In Proceedings of Optical Fiber Communication Conference and Exposition and the National Fiber Optic Engineers conference( OFC/NFOEC/2010), Los Angeles, CA, USA, 21–25 March 2010. 28. Assefa, S.; Xia, F.; Vlasov, Y. Reinventing germanium avalanche photodetector for nanophotonic on-chip optical interconnects Nature 2010, 464, 80-84. 29. Jau-Yi Wu, Hwei-Heng Wang, Yeong-Her Wang, and Mau-Phon Houng,”A GaAs MOSFET with liquid phase oxidized Gate,” IEEE Elect. Dev. Lett., vol.20, No.1,pp.18-20,January 1999 30. C.Baack, G.Elze and W.Walf, “GaAs MESFET :A high speed optical detector,” electron. Lett.13, pp.193, 1977. 31. J.C. Gammel and J.M. Ballantyne ”The OPFET : a new high speed optical detector ,” proc. IEDM , 24, pp. 120-123, 1978. 32. C.H.Liu, T.K. Lin, S.J.Chang,” GaAs MOS capacitors with photo CVD SiO2 insulator layers “science direct, solid state electronics 49(2005) pp.1077-1080.
Suresh Patel, Rakesh Kumar Saxena "Development from PIN to GaAs Based MISFET Photo-Detector: A Review" International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.2 issue 2, pp.59-66 2013
Cadmium (Cd) nanowires have been synthesized by electrodeposition method with in confined nanochannels of polycarbonate porous membrane. Cadmium nanowires are highly conductive and cheaper in cost. Cadmium nanowires were fabricated by using the membranes of diameters of 100 nm. The characterization of nanowires was done by X-Ray diffraction and I-V analysis.
- Page(s): 67-70
- Date of Publication: Feburary 2013
- Samiksha Mehta Department of Physics, I.E.T, Alwar, Rajasthan, India
References
1. Iijima S., “Helical microtubules of graphitic carbon”, Nature, vol. 354, pp 56-58, 1991. 2. Singh Ranjeet, Kumar Rajesh, Sharma S. K. & Chakarvarti S. K., “Non-galvanic synthesis of Ag2Se nanowires using anodic alumina membrane as template and their characterization”, Digest Journal of Nanomaterials and Biostructures, vol.1 (4), pp. 149-154 ( 2006) 3. Kumar Vijay, Kumar Sunil, Kumar Sanjeev & Chakarvarti S. K., “Optical studies of electrochemically synthesized CdS nanowires”, Journal of Materials Science: Materials in Electronics, vol. 22 (4), pp. 335-338 (2011) 4. Garg.R, Mehta.S, Kaur.A, Chauhan.R.P, “Template Based Synthesis of Low Dimensional Structures of Copper and Their Characterization”, IJERD Vol. 3, Issue 4, PP. 01-04 (2012) 5. J.Birchley, T.Haste, H.Bruchertseifer, R.Cripps, S.Guntay, and B.Jackel, ). Fabrication of Single Crystalline Cadmium Nanowires by a Facile Low Temperature Vapor Phase Method Nuclear Eng. Design 235, 1607 (2005) 6. X.Duan, Y.Huang, R.Agarwal, and C.M.Lieber, "Single-Nanowire Electrically Driven Lasers”, Nature 421, 241 (2003) 7. J.Hu, L.S.Li, W.Yang, L.Manna, L.W.Wang, and A.P.Alivisatos, “Growth and morphology of cadmium chalcogenides: the synthesis of nanorods, tetrapods, and spheres from CdO and Cd(O2CCH3)2”, Science 292, 2060 (2001) 8. A. Huczko, Template-based synthesis of nanomaterials; Appl. Phys. A 70, 365 (2000) 9. Cao G. & Liu D., “Template-based synthesis of nanorod, nanowire, and nanotube arrays”, Advances in Colloid and Interface Science, vol. 136, pp. 45–64,(2008) 10. L. D. Pra, E. Ferain, R. Legras, S. D. Champagne, Fabrication of a new generation of track- etched templates and their use for the synthesis of metallic and organic nanostructures, Nucl. Instr. and Meth., B196, 81 (2002) 11. E. Ferain, R. Legras, “Track-etch templates designed for micro- and nanofabrication”, Nucl. Instr. and Meth., B208, pp.115 (2003) 12. Kumar S. & Chakarvarti S. K., “Electrodeposition of copper nanowires in ion-crafted membranes as templates”, Digest Journal of Nanomaterials and Biostructures, vol. 1(4), pp.139 – 143 (2006)
Samiksha Mehta "Fabrication of Cadmium Nanowires By Electrodeposition Method" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 2, pp.67-70 2013
We use the term information technology or IT to refer to an entire industry. In actuality, information technology is the use of computers and software to manage information. In some companies, this is referred to as Management Information Services (or MIS) or simply as Information Services (or IS). The information technology department of a large company would be responsible for storing information, protecting information, processing the information, transmitting the information as necessary, and later retrieving information as necessary.
- Page(s): 71-75
- Date of Publication: Feburary 2013
- Er Vipin LaddhaOfficer Incharge, CIMCA Swami Keshwanand Rajasthan Agricultural University, Bikaner, Rajasthan, India
References
1. https://en.wikipedia.org/wiki/Information_technoloy 2.https://jobsearchtech.about.com/od/careersintechnology/p/ITDefinition.htm
Er Vipin Laddha "Latest information technology trends defining the world" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 2, pp.71-75 2013
1. IntroductionIndustry Institute interaction can be defined as a systematic way to identify the common areas of interest of industries and institutes and work together for mutual benefit. To survive in the competitive market, production of „quality product‟ is very essential. Industries have accepted the fact but the technical institutes have not yet realized this. For the technical institutes, the final product is engineers/technocrats either for employment or for self-employment, whose skills and attitudes meet international standard in relevant technologies established by the industry, which will contribute to the society actively. In a broad sense, industries are the main customers for their product. To survive in this competitive age, it is necessary for the technical institute to maintain quality of their product, by improving quality of education. At the same time industry is also facing major crisis. Till around 1995, the industry was willing to spend time and money to train the fresh engineers to make them suitable for the job. However with changing economic policies, globalization and liberalization at world level, industries came under heavy pressure. Thus, now they have started putting pressure on the institutes to run job oriented, skills based, and competency based, and competency based programs. Thus the institutes should identify the industries (customers) needs. Incorporate the required changes in the curriculum and in the system and it should be continuous process. To identify the needs of industries, industry institute interaction is a must.
- Page(s): 76-82
- Date of Publication: Feburary 2013
- Mr. Pankaj SharmaAssociate Professor,SACHDEVA INSTITUTE OF TECHNOLOGY - Farah - Mathura - Uttar Pradesh, India
- Mr. Madhumay Sen Asst. Professor, RCERT, Sitapura, Jaipur, Rajasthan, India
- Dr. Gaurav Kumar Jain Asst. Professor, RCERT, Sitapura, Jaipur, Rajasthan, India
References
B.M Naik (2000)- Industry-University Partnership, Global Trends and relevance for India. Institute News, volume 38(17). Ravikala Kamath and Deepa Sharma (1999)- industry-university Partnership a Double Benefit. Institute News, volume 37. Sarena, V.P (1990)-An ideal Institute System, University News, volume 3. Dr. R.S Dalu (2004)- Industry Institute interaction : need in technical institute, The Indian Journal of Technical Education, Vol. 27 No. 2.
Mr. Pankaj Sharma, Mr. Madhumay Sen, Dr. Gaurav Kumar Jain "Industry – Institute Interaction In Modern Area " International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 2, pp.76-82 2013
In recent years practitioners in a wide variety of fields—scientific cooperation, academic research, business, management, education, health, culture, politics, Ambassadorial , development, and others—have realised just how important intercultural communication is for their everyday work. Fast travel, international media, and the Internet have made it easy for us to communicate with people all over the world. The process of economic globalisation means that we cannot function in insulation but must interact with the rest of the world for viability. The global nature of many widely diverse modern problems and issues such as the environment, administration of the Internet, poverty and international terrorism call for cooperation between nations. Intercultural communication is no longer an option, but a indispensable. Because important decisions in business, politics, education, health, and culture these days usually effect citizens of more than one nation, the question of whether communication between people of different nations is effective and whether all parties emerge with the same understanding is of crucial importance. Individuals who deal with people from other cultures want to learn how to improve their performance through improving their communication skills. Numerous resources have aggravated up to meet this emerging market in the business, academic and international relations communities
- Page(s): 83-90
- Date of Publication: Feburary 2013
- Dr. K.L .BhardwajProfessor, Department of Humanities & Social SciencesInstitute of Engineering &Technology MIA, Alwar-301001(Rajasthan), India
- Punit Shukla Assistant Professor, Department of English, Poornima College of Engineering Sitapura, Jaipur (Rajasthan), India
References
1. Andy Gillett (1997). Intercultural communication. ARELS Arena, 16 2. Archer, C. M. (1986). Culture bump and beyond. In J. M Valdes (Ed.), Culture bound (pp. 170-178). Cambridge: Cambridge University Press. 3. Bloor, M. & Bloor, T. (1991). Cultural expectations and socio-pragmatic failure in academic writing. In P. Adams, B, Heaton & P. Howarth (Eds.), Socio-cultural issues in English for academic purposes. London: Macmillan. 4. Bowers, R. (1992). Memories, metaphors, maxims and myths: Language learning and cultural awareness. ELT Journal, 46, 5. Brislin, R. & Yoshida, T. (1994). Intercultural communication training: An introduction. Thousand Oaks, CA: Sage Publications. 6. Davies, E. E. (1987). A contrastive approach to the analysis of politeness formulas. Applied Linguistics, 8. 7. Intercultural Communication Tips: www.oregon.gov 8. Jordan, R. R. (1997). English for academic purposes. Cambridge: Cambridge University Press. 9. O‘ Sullivan, K. (1994). Understanding ways: Communicating between cultures. Syney, Australia: Hale & Ironmonger. 10. What is intercultural communication? www.kwintessential.co.uk 11. Wolfson, N. (1981). Compliments in cross-cultural perspective. TESOL Quarterly, 15
Dr. K.L .Bhardwaj, Punit Shukla "Areas of Intercultural Communication" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 2, pp.83-90 2013
The power estimation for a processor is key task in the design based on RISC architecture. In this paper we have proposed, power estimation of 64-bit RISC as performance measure with processor with the help of BIST (built in self test) parameters design using VHDL. The results are analyzed using Xilinx ISE and IUS with features of depiction the 64-bit RISC processor with accepted MIPS Architecture, instruction data path, modules of decoder, instruction set, pipelining Architecture are analyzed. Implementation of design
- Page(s): 91-96
- Date of Publication: Feburary 2013
- Surendra BajiaResearch Scholar, JNU, Jaipur, Rajasthan, India
- Shally goyalAssistant Professor, JNU, Jaipur, Rajasthan, India
References
[1] Sharma, R., V.K. Sehgal, N. Nitin, P.Bhasker andI. Verma, “Design and Implementation of a 64-bitRISC Processor Using VHDL”. In the 11thInternational Conference on Computer Modelling andSimulation, UKSIM '09, Cambridge, pp: 568-573.2009. [2] Sulik, D., M. Vasilko, D. Durackova and P. Fuchs,“Design of a RISC Microcontroller Core in 48 Hours”.London Olympia Retrieved from https://wenku.baidu.com/view/b22c84fc910ef12d2af9e7b4, (Accessed on: Nov. 15, 2011) [3] Charles, E.G. and M.M. Veljko, “RISC Principles,Architecture and Design”. Computer Science PressInc. 1989 [4] White paper,. “The MIPS32-24KE Core Family:High Performance RISC Cores with DSPEnhancements”. MIPS Technologies Inc. retrievedfrom https://www.mips.com/media/files/whitepapers/24ke.pdf, (Accessed on: Nov. 07, 2011). [5] Yasin, F.M., A.L. Tan and M.I. Reaz,. “The FPGAPrototyping of Iris Recognition for BiometricIdentification Employing Neural Network”Proceedings of the 16th IEEE InternationalConference on Microelectronics, pp: 458-461, 2004 [6] Chen, S., B. Mulgrew and P.M. Grant, “Aclustering technique for digital communicationschannel equalization using radial basis functionnetworks”. IEEE Trans. Neural Networks, 4: 570-578.1993. [7] Reaz, M.B.I., M.T. Islam, M.S. Sulaiman, M.A.M.Ali, H. Sarwar and S. Rafique, “FPGA andTechnologies”, PDCAT Proceedings, pp: 912-915.2003. [8] Alvarez, J., O. Lopez, F.D. Freijedo and J. Doval-Gandoy, “Digital Parameterizable VHDL Module forMultilevel Multiphase Space Vector PWM”. IEEETrans. Indus. Electron., 58(9): 3946-3957. 2011. [9] Akter, M., M.B.I. Reaz, F.M. Yasin and F.Choong, “Hardware implementations of imagecompressor for mobile communications. J. Communi.Technol. Electron.”, 53(8): 899-910. 2008. [10] J.L. Hennessy, "VLSI Processor Architecture,"IEEE Trans. Computers, vol. C-33, no. 12, Dec. 1984,pp. 1221-1246. [11] M. Jaumain, M. Osee, A. Richard, A. Vander Biest, P. Mathys, “Educational simulation of the RiSC processor,” ICEE International Conference on Engineering Education, 2007 [12]H. ElAarag, “A complete design of a RISC processor for pedagogical purposes,” Journal of Computing Sciences in Colleges, vol. 25, Issue 2, pp. 205-213, 2009.
Surendra Bajia, Shally goyal "Power Estimation for the 64 -bit RISC Based Processor: As performance Measure" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 2, pp.91-96 2013
Cloud computing is the latest effort in delivering computing resources as a service. It represents a shift away from computing as a product that is purchased, to computing as a service that is delivered to consumers over the internet from large-scale data centres – or “clouds”. “Cloud” computing – a relatively recent term, builds on decades of research in virtualization, distributed computing, utility computing, and more recently networking, web and software services. It implies a service oriented architecture, reduced information technology overhead for the end-user, great flexibility, reduced total cost of ownership, on-demand services and many other things. Whilst cloud computing is gaining growing popularity in the IT industry, academia appeared to be lagging behind the rapid developments in this field. This paper is the first systematic review of peer-reviewed academic research published in this field, and aims to provide an overview of the swiftly developing advances in the technical foundations of cloud computing and their research efforts. Structured along the technical aspects on the cloud agenda, we discuss lessons from related technologies; advances in the introduction of protocols, interfaces, and standards; techniques for modelling and building clouds; and new use-cases arising through cloud computing.
- Page(s): 97-101
- Date of Publication: Feburary 2013
- Amarnath Paswan[CSE], JECRC UDML College of Engineering, Kukas, Jaipur, Rajasthan, India
- Neelam Gupta[CSE], JECRC UDML College of Engineering, Kukas, Jaipur, Rajasthan, India
- Naresh Kumar Marwal[CSE], JECRC UDML College of Engineering, Kukas, Jaipur, Rajasthan, India
References
[1] Sun Microsystems, Introduction to Cloud Computing Architecture, 2009 [2] KHAJEH-HOSSEINI, A., SOMMERVILLE, I. and SRIRAM, I. "Research Challenges for Enterprise Cloud Computing," (unpublished).( Submitted to 1st ACM Symposium on Cloud Computing, Indianapolis, Indiana, USA, June 2010, under paper id 54) [3] IBM, Staying aloft in tough times, 2009 [4] PLUMMER, D.C., BITTMAN , T.J., AUSTIN, T., CEARLEY, D.W., and SMITH D.M., Cloud Computing: Defining and Describing an Emerging Phenomenon , 2008 [5] STATEN, J., Is Cloud Computing Ready For The Enterprise?, 2008. [6] MELL, P. and GRANCE, T. 2009. Draft NIST Working Definition of Cloud Computing. [7] Open CirrusTM: the HP/Intel/Yahoo! Open Cloud Computing Research Testbed. Retrieved December 1, 2009, from https://opencirrus.org/ [8] KEAHEY, K., TSUGAWA, M., MATSUNAGA, A. and FORTES, J. 2009. Sky Computing. Internet Computing, IEEE 13, 5, 43-51. [9] SOTOMAYOR, B., RUBé, A., LLORENTE, I. and FOSTER, I. 2009. Virtual Infrastructure Management in Private and Hybrid Clouds. Internet Computing, IEEE 13, 5, 14-22. [10] SRIRAM, I. 2009. A Simulation Tool Exploring Cloud-Scale Data Centres. In 1st International Conference on Cloud Computing (CloudCom 2009), pp. 381-392. [11] BUYYA, R., RANJAN, R. and CALHEIROS, R. N. 2009. Modelling and simulation of scalable Cloud computing environments and the Cloud-Sim toolkit: Challenges and opportunities. In High Performance Computing & Simulation, 2009. HPCS'09. International Conference on, 1-11. [12] CHUN, B.-G. and MANIATIS, P. 2009. Augmented Smart Phone Applications Through Clone Cloud Execution. In Proceedings of the 12th Workshop on Hot Topics in Operating Systems (HotOS XII). [13] GANON, Z. and ZILBERSHTEIN, I. E. 2009. Cloud-based Performance Testing of Network Management Systems. In Computer Aided Modelling and Design of Communication Links and Networks, 2009. CAMAD '09. IEEE 14th International Workshop on, 1-6. [14] MATHEW, R. and SPRAETZ, R. 2009. Test Automation on a SaaS Platform. In Software Testing Verification and Validation, 2009. ICST '09. International Conference on, 317-325. [15]WILSON, M. 2009. Constructing and Managing Appliances for Cloud Deployments from Repositories of Reusable Components.
Amarnath Paswan, Neelam Gupta, Naresh Kumar Marwal "Research Agenda in Cloud Computing" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 2, pp.97-101 2013
In the computational complexity theory, Clique Cover is a graph-theoretical NP-complete problem. It has applications in diverse fields such as compiler optimization [Rajagopalan et al. 2000], computational geometry [Agarwal et al. 1994], and applied statistics [Piepho 2004; Gramm et al. 2007]. In this paper we have implemented some data reduction rules to reduce the problem set and then applied search tree algorithm to these reduced data sets to find the optimal solution in polynomial time complexity.
- Page(s): 102-108
- Date of Publication: Feburary 2013
- AnuAssistant Prof., EE Institute of Engineering and Technology, Alwar (Rajasthan), India
- Jaya PriyadarshniAssistant Prof, EE, Institute of Engineering and Technology, Alwar (Rajasthan), India
- Bhavanesh SharmaAssistant Prof, EE, Institute of Engineering and Technology, Alwar (Rajasthan), India
- Hansha Rani GuptaAssistant Prof. , EC, Alwar Institute of Engineering and Technology, Alwar (Rajasthan), India
References
Data Reduction, Exact, and Heuristic Algorithms for Clique Cover by Jens Gramm , Jiong Guo ,Falk Hffner Rolf Niedermeier Fast Exact and Heuristic Methods for Role Minimization Problems by Alina Ene,William Horne ,Nikola Milosavljevic. A HARDWARE ALGORITHM FOR THE MINIMUM P -QUASI CLIQUE COVER PROBLEM by Shuichi Watanabe, Junji Kitamichi, Kenichi Kuroda. Reducibility among Combinatorial Problems by Richard Karp. Approximating the minimum clique cover and other hard problems in subtree filament graphs by J. Mark Keila , Lorna Stewartb On-line algorithm for the minimal b-clique cover problem interval graphs by B. Kouakou. Polynomial-Time Data Reduction for DOMINATING SET by JOCHEN ALBER, MICHAEL R. FELLOWS and ROLF NIEDERMEIER. A Stochastic Local Search Approach to Vertex Cover by Silvia Richter, Malte Helmert, and Charles Gretton. www.nada.kth.se www.new.dli.ernet.in www.geometrylab.de www.liafa.jussieu.fr ieeexplore.ieee.org www.portal.acm.org.
Anu, Jaya Priyadarshni , Bhavanesh Sharma, Hansha Rani Gupta "Data Reduction and Exact Algorithm for Clique Cover" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 2, pp.102-108 2013
A joint ISO/CCITT committee known as JPEG (Joint Photographic Experts Group) standard for continuous-tone still images, both grayscale and color. Image compression is a widely addressed researched area. Still Image Compression is an important issue in Internet, mobile communication, digital library, digital photography, multimedia, and many other applications. A DCT-based method is specified for “lossy’’ compression, and a predictive method for “lossless’’ compression. JPEG features a simple lossy technique known as the Baseline method, a subset of the other DCT-based modes of operation. Image compression attempts to reduce the number of bits required to digitally represent an image while maintaining its perceived visual quality. JPEG compression can be applied to movies as well; it is simply done one frame at a time.
- Page(s): 109-113
- Date of Publication: Feburary 2013
- Ashish AmeriaAssistant Professor JECRC UDML, Jaipur, Rajasthan, India
- Garima OjhaAssistant Professor JECRC UDML, Jaipur, Rajasthan, India
- Parmeshwar lal BhanwariyaAssistant Professor JECRC UDML, Jaipur, Rajasthan, India
References
1. Dr. S.N. Sivanandam1, Mr. A. Pasumpon Pandian2 and Ms. P. Rani 3 “Lossy Still Image Compression Standards”: JPEG and JPEG2000 – A Survey 2. Images and Its Compression Techniques – A Review Sindhu M1, Rajkamal R2. “International Journal of Recent Trends in Engineering”, Vol 2, No. 4, November 2009 3. Prabhakar.Telagarapu, V.Jagan Naveen, A.Lakshmi..Prasanthi, G.Vijaya Santhi “Image Compression Using DCT and Wavelet Transformations” International Journal of Signal Processing, Image Processing and Pattern Recognition Vol. 4, No. 3, September, 2011 4. Ben O’Hare and Matthew Wisan JPEG Compression December 16, 2005 5. Pao-Yen Lin “Basic Image Compression Algorithm and Introduction to JPEG Standard’ 6 Gregory K. Wallace Multimedia Engineering, Digital Equipment Corporation Maynard, Massachusetts “The JPEG Still Picture Compression Standard” Submitted in December 1991 for publication in IEEE Transactions on Consumer Electronics
Ashish Ameria, Garima Ojha, Parmeshwar lal Bhanwariya "“JPEG Image Compression Standard”" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 2, pp.109-113 2013
The clouds of information technology are commonly referred to as “Cloud Computing”. Cloud computing is the next big thing after the internet and it will revolutionize the way IT services are provided. Cloud computing is a general term for anything that involves delivering hosted services over the internet. This article explains what is cloud computing, why do you need to know about it, what are the risks, what are the benefits, how will it impact businesses, how will it impact auditors, should business analysts use cloud computing, what are the challenges and opportunities for enterprises and for business analysts.
- Page(s): 114-128
- Date of Publication: july 2013
- Mr. Madhumay Sen Asst. Professor, RCERT, Sitapura, Jaipur, Rajasthan, India
- Dr. Gaurav Kumar JainAsst. Professor, RCERT, Sitapura, Jaipur, Rajasthan, India
- Mr. Ravi RanjanAsst. Professor, RCERT, Sitapura, Jaipur, Rajasthan, India
References
(1). www.cloudsecurityallliance.org/ (2). www.nist.gov/itl/cloud/index.cfm (3). www.opencloudconsortium.org/ (4). www.opencloudmanifesto.org/ (5). www.cloud-standards.org/wiki/ (6). www.howstuffworks.com (7). www.cloudcomputing.sys-con.com/ (8) www.microsoft.com/cloud (9) www.isaca.org/cloud (10) www.cloudsecurity.org/ (11) www.cloudaudit.org/
Mr. Madhumay Sen, Dr. Gaurav Kumar Jain, Mr. Ravi Ranjan "Solar Heat In Milk Powder Plant" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 2, pp.114-128 2013
This paper review of Support Vector Clustering (SVC), which is inspired by the support vector machines, can overcome the limitation of clustering algorithms. SVC algorithm has two main steps[1]. a) SVM Training and b) Cluster Labeling .SVM training step involves construction of cluster boundaries and cluster labeling step involves assigning the cluster labels to each data point. Solving the optimization problem and cluster labeling is time consuming in the SVC training procedure. Many of the research efforts have been taken to improve the efficiency of cluster labeling step. Preprocessing procedures used for SVC to reduce SVC training set are Heuristics for Redundant-point Elimination (HRE) and Shared Nearest Neighbor (SNN) technique result in loss of data Due to fewer efforts taken by researchers to reduce execution time and accuracy of SVC training procedure.
- Page(s): 129-136
- Date of Publication: Feburary 2013
- Pradeep JhaArya Institute of Engineering and Technology, Jaipur, Rajasthan, India
- Krishan Kant LavaniaArya Institute of Engineering and Technology, Jaipur, Rajasthan, India
- Surendar SharmaArya Institute of Engineering and Technology, Jaipur, Rajasthan, India
References
[1] R. X. Donald, C. Wunsch, “Clustering”, IEEE Press Series on Computational Intelligence, 2009, pp. 172-187. [2] Fedrik Gran, “Pattern recognition using Support Vector Machine”, A Master Thesis, Matematikcentrun, LTH, 2002, pp. 5-24. [3] J. S. Wang, J. C. Chiang, “An Efficient Data Preprocessing Procedure for Support Vector Clustering”, Journal of Universal Computer Science, 2009, pp. 705-721. [4] A. Jain, M. Murty, P. Flynn, “Data Clustering: A Review”, ACM Computing Surveys,1999, pp. 264-323. [5] A. Ben-Hur, D. Horn, H.T. Siegelmann, V. Vapnik, “Support Vector Clustering”, Journal of Machine Learning Research 2, 2001, pp. 125-137. [6] A. K. Jain and R. C. Dubes, “Algorithms for clustering data”, Prentice Hall, Englewood Cliffs, NJ, 1988. [7] Dennis Decoste, Bernhard Scholkopf, “Training Invariant Support Vector Machines”, Kluwer Academic Publishers, Netherlands, Machine Learning, 46,161-190, 2002.
Pradeep Jha, Krishan Kant Lavania, Surendar Sharma "Support vector clustering: An Evolutionary algorithm" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 2, pp.129-136 2013
The most important corporate resource over the next few years will be talent: smart, sophisticated business people who are technologically literate, globally astute, and operationally agile. human resource management process comprises the following programs: human resource planning, recruitment, selection, professional development, performance appraisal, and compensation. Human resource planning involves identifying staffing needs, forecasting available personnel, and determining what additions or replacements are required to maintain a staff of the desired quantity and quality to achieve the organization’s goals. The human resource planning function involves three different elements: job analysis, forecasting demand and supply, and legal restraints. Good human resource planning involves meeting current and future personnel needs. The manager ensures that personnel needs are met through ongoing analysis of performance objectives, job requirements, and available personnel, coupled with knowledge of employment laws. and manpower availability. In the current climate, organisations are constantly seeking new ways of cutting their operating costs. For the recruitment industry, new technology is increasingly being relied upon to help the industry contain financial pressures and increase productivity. Humans are considered as the most crucial, volatile and potentially unpredictable resource which an organization utilizes. Manpower planning seeks to make the links between strategy, structure and people more explicit. The purpose of manpower planning is to get a better matching between manpower requirement.
- Page(s): 137-139
- Date of Publication: Feburary 2013
- Nidhi MalhanPHD Scholar, Shri JJT University, Jhunjhunu, Rajasthan, India
References
1) Fred C. Lunenburg, Human Resource Planning: Forecasting Demand and Supply, INTERNATIONAL JOURNAL OF MANAGEMENT, BUSINESS, AND ADMINISTRATION VOLUME 15, NUMBER 1, 2012 2) Deepti Sethi(2005), A Dissertation presented in part consideration for the degree of ‘International MBA’,university of Nottingham. 3) Marc Orlitzky, Recruitment Strategy, Oxford Handbook of Human Resource Management. 4) Muhammad Ali, Zulfqar Ahmad and Javed Iqbal, Human resource planning: A key to internal and external fit, African Journal of Business Management Vol.6 (27), pp. 7938-7941, 11 July, 2012 5) Dharamvirsinh Parmar and Dr. Prashant Makwana, Approaches and Techniques in Manpower Planning, International Conference on Management, Humanity and Economics (ICMHE'2012) August 11-12, 2012 Phuket (Thailand) 6) Anna B. Holm, E-recruitment: Towards an Ubiquitous Recruitment Process and Candidate Relationship Management 7) New technology to save recruiters time and money, Recruitment Journal article
Nidhi Malhan "A Study on Innovative Recruitment Techniques and It’s Impact on Job Seekers Vector Control of Induction Motor Drive" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 2, pp.137-139 2013