As the continuous development of computer network technology and rapid popularization of Internet application, ecommerce and e-government businesses are used more and more widely. However, at the time that these applications bring great convenience to our work and lives, they also bring increasingly serious security problems. Identity authentication is an important method to ensure safety of various e-commerce activities, e-government business information and internet information. Certificate based digital signature authentication and password authentication are most common at present. But traditional password authentication with basic mode of user name and password authentication faces many security problems . Network Security & Cryptography is a concept to protect network and data transmission over wireless network. Data Security is the main aspect of secure data transmission over unreliable network. Data Security is a challenging issue of data communications today that touches many areas including secure communication channel, strong data encryption technique and trusted third party to maintain the database. The rapid development in information technology, the secure transmission of confidential data herewith gets a great deal of attention. The conventional methods of encryption can only maintain the data security. The information could be accessed by the unauthorized user for malicious purpose. Therefore, it is necessary to apply effective encryption/decryption methods to enhance data security.
- Page(s): 01-04
- Date of Publication: August 2013
- Denial SmithVictoria University Melbourne,
- Sonal BhatiShekhawati Engineering College
Rajasthani Technical University Rajasthan
References
[1] R. Rivest, “The MD5 Message-Digest Algorithm,” RFC 1321, Apr. 1992.
[2] H. Dobbertin, A. Bosselaers and B. Preneel, “RIPEMD-160: A Strengthened Version of RIPEMD, Fast Software Encryption,”LNCS 1039, pp. 71-92, Springer-Verlag, 1996.
[3] W. Stallings, Cryptography and Network Security, 2nd ed.,Now York: Prentice-Hall, 1997.
[4] S. Dominikus, “A hardware implementation of MD4-family hash algorithms,” Proc. 9th Int. Conf. on Electronics, Circuits and Systems, vol. 3, pp. 1143-1146, 2002.
[5] A UNIFIED ARCHITECTURE OF MD5 AND RIPEMD-160 HASH ALGORITHMS Chiu-Wah Ng, Tung-Sang Ng and Kun-Wah Yip Department of Electrical & Electronic Engineering, The University of Hong Kong Pokfulam Road, Hong Kong
[6] Multi-stage Pipelining MD5 Implementations on FPGA with Data Forwarding, Anh Tuan Hoang, Katsuhiro Yamazaki and Shigeru Oyanagi, Ritsumeikan University, 1-1-1 Noji Higashi, Kusatsu, Shiga 525-8577, Japan
[7] Efficient Implementation for MD5-RC4 Encryption Changxin Li1, Hongwei Wu2, Shifeng Chen1, Xiaochao Li2* and Donghui Guo1,21. Dept. of Physics, Xiamen University, Fujian 361005, China2. Dept. of Electronic Engineering, Xiamen University, Fujian 361005, China
[8] High Throughput Implementation of MD5 Algorithm on GPU Guang Hu, Department of Electron and Information, Huazhong University of Science and Technology, Wuhan, China huguang@mail.hust.edu.cn, Jianhua Ma, Faculty of Computer and Information Sciences, Hosei University, Tokyo 184-8584, Japan, jianhua@hosei.ac.jp Benxiong Huang, Department of Electron and Information, Huazhong University of Science and Technology, Wuhan, China, huangbx@mail.hust.edu.cn
[9] New Modified 256-bit MD5 Algorithm with SHA Compression FunctionAlok Kumar Kasgar, Jitendra Agrawal, Santosh Sahu, School of IT School of IT School of IT Rajiv Gandhi Technical University Rajiv Gandhi Technical University Rajiv Gandhi Technical University Bhopal (M.P.) Bhopal (M.P.) Bhopal (M.P.)
Denial Smith, Sonal Bhati "A New Modified 512-bit Approach for MD5 Algorithm" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 8, pp.01-04 2013
Building accurate and efficient classifiers for Medical databases is one of the essential tasks of data mining and machine learning research. Building effective classification systems is one of the central tasks of data mining. One of the most active areas of research in supervised machine learning has been to study methods for constructing good ensembles of learners. This paper aims to establish an accurate ensemble classification model for Medical prediction, in order to make full use of the invaluable information in clinical data, especially which is usually ignored by most of the existing methods when they aim for high prediction accuracies. This paper presents a comparison among the different ensemble classifiers on the database of Wisconsin Breast Cancer (WBC) and Diabetes data sets. In this experiment, we compare ensemble classification techniques in Weka software and comparison results show that Random forest has higher prediction accuracy than those methods. Different methods for breast cancer detection are explored and their accuracies are compared with these results, we infer that the Random forest are more suitable in handling the ensemble classification problem of Medical prediction, and we recommend the use of these approaches in similar ensemble classification problems.
- Page(s): 05-09
- Date of Publication: August 2013
- G. Ravi KumarResearch Scholar, Department of Computer Science & Technology, Sri Krishnadevaraya University, Anantapur-515 003, Andhra Pradesh, India
- Venkata Sheshanna KongaraResearch Scholar, Department of Computer Science & Technology, Sri Krishnadevaraya University, Anantapur-515 003, Andhra Pradesh, India
- Dr. G.A RamachandraAssociate Professor, Department of Computer Science & Technology, Sri Krishnadevaraya University, Anantapur-515 003, Andhra Pradesh, India
References
[1]. A.L. Blum and P. Langley, ―Selection of Relevant Features and Examples in Machine Learning,‖ Artificial Intelligence, vol. 97, pp. 245-271, 1997.
[2]. Bauer E, Kohavi R (1999) ―An empirical comparison of voting classification algorithms: bagging, boosting, and variants‖, Mach Learn 36:105–139
[3]. Breiman, L., ―Bagging predictors‖, Mach. Learn. 24(2):123–140, 1996.
[4]. Breiman, L., ―Random forests‖, Mach. Learn. 45(1):5–32, 2001
[5]. Ching Wei Wang, ―New Ensemble Machine Learning Method for Classification and Prediction on Gene Expression Data‖, Proceedings of the 28th IEEE EMBS Annual International Conference New York City, USA, Aug 30-Sept 3, 2006, pp 3487-3481
[6]. Dietterich TG,‖ Ensemble methods in machine learning. In: Proceedings of Multiple Classifier System‖, vol. 1857. Springer; 2000. pp. 1–15.
[7]. Freund, Y., and Schapire, R. E., ―A decision-theoretic generalization of on-line learning and an application to Boosting‖, J. Comput. Syst. Sci. 55(1):119–139, 1997
[8]. Gulisong Nasierding et al, ―A Triple-Random Ensemble Classification Method for Mining Multi-label Data‖, 2010 IEEE International Conference on Data Mining Workshops, IEEE Computer Society, pp: 49-56
[9]. H. Liu and H. Motoda, eds. Boston,‖Feature Extraction, Construction and Selection", A Data Mining Perspective, Kluwer Academic, 1998, second printing, 2001.
[10]. J. Han and M. Kamber, ―Data Mining—Concepts and Technique‖ (The Morgan Kaufmann Series in Data Management Systems), 2nd ed. San Mateo, CA: Morgan Kaufmann, 2006.
[11]. M.L. Raymer, W.F. Punch, E.D. Goodman, L.A. Kuhn and A.K. Jain,―Dimensionality Reduction Using Genetic Algorithms‖, IEEE Transactions On Evolutionary Computation, Vol. 4, No. 2, 2000
[12]. P.N. Tan, M. Steinbach, and V. Kumar, ―Introduction to Data Mining‖, Reading, MA: Addison-Wesley, 2005
[13]. Robert E. Banfield et al, ‖ A Comparison of Decision Tree Ensemble Creation Techniques‖, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 29, No.1,January 2007, pp 173-180
[14]. Valentini, G., and Dietterich, T. G., ―Low bias bagged support vector machines‖, In: Fawcett, T., and Mishra, N. (Eds.), International conference on machine learning. AAAI press, California, 2003.
[15]. W. Daelemans, V. Hoste, F.D. Meulder and B. Naudts, ―Combined Optimization of Feature Selection and Algorithm Parameter Interaction in Machine Learning of Language‖, Proceedings of the 14th European Conference on Machine Learning (ECML-2003), Lecture Notes in Computer Science 2837, Springer-Verlag, Cavtat- Dubrovnik, Croatia, 2003, pp. 84-95
[16]. Webb, G. I., ―MultiBoosting: a technique for combining Boosting and wagging‖, Mach. Learn. 40(2):159–197, 2000.
[17]. Weka ―Data Mining Software in Java‖, https://www.cs.waikato.ac.nz/ml/weka/
[18]. Witten H.I., Frank E., ―Data Mining: Practical Machine Learning Tools and Techniques‖, Second edition, Morgan Kaufmann Publishers, 2005.
[19]. Xiao-Dong Zeng et al, ―Optimization of bagging classifiers based on SBCB algorithm‖, Proceedings of the Ninth International Conference on Machine Learning and Cybernetics, Qingdao, 11-14 July 2010, pp: 262-267
[20]. Y. Saeys, I. Inza and P. Larranaga, ―A review of feature selection techniques in bioinformatics‖, Bioinformatics-19, 2007, pp. 2507–17.
[21]. Zhang, C. X., Zhang, J. S., and Zhang, G. Y., ―An efficient modified Boosting method for solving classification problems‖. J. Comput. Appl. Math. 214(2):381– 392, 2008
G. Ravi Kumar, Venkata Sheshanna Kongara, Dr. G.A Ramachandra "An Efficient Ensemble Based Classification Techniques for Medical Diagnosis" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 8, pp.05-09 2013
This paper presents the hybrid digital image watermarking technique. Taking the advantages of discrete wavelet Transform (DWT), the host image is decomposed into its significant components. The D component of Singular value decomposition (SVD) of approximate sub image of host image is taken. Watermark image is embedded in D component using Dither Quantization. The proposed algorithm uses advantages of SVD and DWT technique. The algorithm is more secure and robust to various attacks, viz., Gaussian noise, salt & pepper noise, speckle noise, Poisson noise, JPEG compression, median filtering, scaling and rotation. Superior experiment results are obtained from proposed algorithm in terms of Bit Error Rate (BER) and Peak signal to noise ratio (PSNR).
- Page(s): 10-16
- Date of Publication: August 2013
- Ms. Nitika AgarwalScholar, M.Tech, Institute of Engineering and Technology, Alwar, India
- Ms. Neha SinghAssociate Prof., Dept. of ECE, Institute of Engineering and Technology, Alwar, India
References
1. Motameni H., Norouzi M., Jahandar M., Hatami A., “Labeling Method in Steganography”. Proceedings of World Academy of Science, Engineering and Technology, Volume 24, October 2007, ISSN 1307-6884.
2. Pei S., Liu H., “Improved SVD based Watermarking for Digital Images”, Sixth Indian Conference on Computer Vision, Graphics and Image Processing, IEEE Computer Society, 2008.
3. Singh Neha, Nandi Arnab,” Digital Watermarking: Mark this Technology!”.
4. Vallabha V.H.,”Multiresolution Watermark Based on Wavelet Transform of Digital Images”, Multiresolution watermarking of Digital Images, Cranes Software International Limited.
5. Miller Matt L., Cox Ingemar J., Linnartz Jean-Paul M. G., Kalker Ton, “A Review of Watermarking Principles and Practices”. Chapter 18, Digital Signal Processing in Multimedia Systems, Ed. K. K. Parhi and T. Nishitani, Marcell Dekker Inc., 461-485, (1999).
6. Potdar Vidyasagar M., Han Song, Chang Elizabeth, ” A Survey of Digital Image Watermarking Techniques”. 3rd IEEE International Conference on Industrial Informatics , 2005.
7. Sverdlov Alexander, Dexter Scott, Eskicioglu Ahmet M., ” Secure DCT-SVD Domain Image Watermarking: Embeddig Data in All Frequencies”, Unknown.
8. Mohan B. Chandra, Kumar S. Srinivas, “A Robust Image Watermarking Scheme Using Singular Value Decomposition”. Journal of Multimedia, Volume 3, No. 1, May 2008.
9. Mohan B. Chandra, Kumar S. Srinivas, Chhatterji B. N., “A Robust Digital Image Watermarking Scheme Using Singular Value Decomposition (SVD), Dither Quantization and Edge Detection”. ICGST-GVIP Journal, ISSN:1687-398X, Volume 8, issue 1, June 2008.
10. Liu R., Tan Tieniu, “An SVD-Based Watermarking Scheme for Protecting Rightful Ownership”, IEEE Transactions of Multimedia, Vol. 4, No. 1, March 2002.
11. Singh N., Sharma M.M., “Singular Value Decomposition Technique for Digital Image Watermarking”, National Conference on Advances in Wireless and Optical Communication Technique, 2010.
12. Maity Santi P., Kundu Malay K., “ A Blind CDMA Watermarking Scheme in Wavelet Domain”, 0-7803-8554-3, IEEE, 2004, 2633- 2636.
13. Tay P., Havlicek J.P., “ Image Watermarking Using Wavelets”, IEEE, 2002.
14. Hajjara Suhad, Abdallah Moussa, Hudaib Amjad,” Digital Image Watermarking Using Localized Biorthogonal Wavelets”, European Jounal of Scientific Research, Vol.26 No. 4, 2009, 594-608.
15. Ellinas John N., “A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection”, PWASET Volume 25 November 2007, 438-443.
16. Dazhi Zhang, Boying Wu., Jiebao Sun, “A Robust Image Watermarking Algorithm Against JPEG2000”, IEEE Proceedings of International Conference on Communications and Mobile Computing, 2009,430-434.
17. Park Ki Hong, Kim Yoon Ho, Lee Joo Shin, “Watermarking using the local relation of wavelet coefficient”, IEEE Proceedings of Second International Conference on Future Generation Communication and Networking, 2008. 209-212.
18. Sharkas Maha, ElShafie Dahlia, and Hamdy Nadder, “A Dual Digital-Image Watermarking Technique”, Proceedings of World Academy of Science, Engineering and Technology, Volume 5, April 2005, 136-139.
19. Lee Sunil and Yoo Chang D. and Kalker Ton, Fellow, IEEE “Reversible Image Watermarking Based onInteger-to-Integer Wavelet Transform”
20. Brian Chen and G.W.Wornell, “Digital Watermarking and information embedding using dither modulation”, Proceedings of the IEEE workshop on Multimedia Signal Processing (MMSP).
21. Brian Chen and G.W.Wornell, “Preprocessed and postprocessed quantization index modulation methods fordigital watermarking”, Proceedings of SPIE: Security and Watermarking of Multimedia Contents II, Vol.3971.
Ms. Nitika Agarwal, Ms. Neha Singh "A Robust Hybrid Digital Image Watermarking using SVD and DWT technique " International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 8, pp.10-16 2013
Fault diagnosis of circuit is a major problem of theory of circuit networks and especially with the development of electronic technique at high speed, the increasing complexity of electronic equipment and altitudinal integration of electronic circuit, it is of importance in particular. Testing and diagnosis of electronic devices are fundamental topics in the development and maintenance of safe and reliable complex systems. In both cases, the attention is focused on the detection of faults affecting a subsystem whose appearance generally impairs the global system safety and performance. In a complete fault diagnosis procedure, fault detection and isolation must be carried out together; the effectiveness of the procedure depends on fault detection and isolation performance as well as the complexity of the test phase. While there are established techniques to obtain an automatic diagnosis for a digital circuit, the development of an effective automated diagnosis tool for analog or mixed circuits is still an open research field. For more than two decades, the subject of fault location in analog circuits has been of interest to researchers in circuits and systems. In recent years this interest has intensified and a number of promising results has emerged.
- Page(s): 17-25
- Date of Publication: August 2013
- Vaibhav SharmaElectronics & Communication Department Shobhit University/M.Tech student Meerut, India Meerut, U.P, India.
- Vijay MaheshwariElectronics, Informatics and Computer Eng. Shobhit University/M.Tech student Meerut, India Meerut, U.P, India.
References
[2] Walter Hochwald and Jhon D. Bastian “A dc approach for analog fault dictionary determination”,ieee transactions on circuit & system, vol.26,pp.523-529, July 1979.
[3] Ying Deng', Yigang He' and Yichuang Sun “Fault diagnosis of analog circuits with tolerances using artificial neural networks”, ieee, pp.292-295, 2000.
[4] Cesare Alippi, Marcantoonio Catelani, Ada Fort and Marco Mugnaini“SBT soft fault diagnosis in analog electronic circuits: a sensitivity-based approach by randomized algorithms”, ieee transactions on instrumentation and measurement, vol. 51, pp.1116-1125, Oct 2002.
[5] Li Tingjun1, Jiang Zhongshan1, Zhao Xiuli1, Huangqilai1 Zhang Ying 2, “Fault diagnosis of analog circuit based on multi-layer neural networks”, icemi, pp.331-334, 2007.
[6] Qu Haini, Xu Weisheng, Yu Youling “Design of neural network output layer in fault diagnosis of analog circuit”, icemi, pp.639-642, 2007.
[7] Alice. McKeon Antony Wakeling,” Fault diagnosis in analogue circuits using ai techniques”, International test conference, pp.118-123, 1989
[8] K. L. Butler, J. A. Momoh, “ A neural net based approach for fault diagnosis in distribution networks”, ieee , pp.1275-1278, 2000.
[9] V. C. Prasad and N. Sarat Chandra Babu “Selection of Test Nodes for Analog Fault Diagnosis in Dictionary Approach” ieee transactions on instrumentation and measurement, vol. 49, pp. 1289-1297, Dec 2000.
[10] Francesco Grasso, Antonio Luchetta, Stefano Manetti, and Maria Cristina Piccirilli “A method for the automatic selection oft test frequencies in analog fault diagnosis” ieee vol. 56, pp. 2322-2329, Dec 2007.
Vaibhav Sharma, Vijay Maheshwari "Fault Diagnosis of Analog Circuits Using dc Approach and Neural Networks " International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 8, pp.17-25 2013
In Present scenario the Smart Grid is next generation digitally enhanced power system assimilating concepts of modern communications and control technologies which allows much greater robustness, efficiency and flexibility than today’s power systems. In this paper we describe the continuous realization of smart grid in electrical power system, the demand of storage and processor resources becomes increasingly higher which can be achieved through cloud computing. It is an emerging technology that enables rapid delivery of computing resources as a utility in a dynamically scalable, virtualized manner. The Objective of this paper is to improvement in robustness, load balancing and storage capacity is obtained by integrating the electrical power system resources through internal network by cloud computing.
- Page(s): 37-41
- Date of Publication: August 2013
- Dr. Chandikaditya KumawatAcademic Coordinator Sangam University, Bhilwara, Rajasthan, India
- Ankit ToshniwalSangam University, Bhilwara, Rajasthan, India
References
[1]. C. Feisst, D. Schlesinger, and W. Frye, "Smart Grid, TheRole of Electricity Infrastructure in Reducing GreenhouseGas Emissions",Cisco internet business solution group,white paper, October 2008.
[2]. V. C. Gungor, B. Lu, and G. P. Hancke, “Opportunitiesand challenges of wireless sensor networks in smart grid,”IEEE Trans. Ind. Electron., vol. 57, no. 10, pp. 3557–3564, Oct. 2010.
[3]. P. Siano, C. Cecati, C. Citro, and P. Siano, “Smartoperation of wind turbines and diesel generators accordingto economic criteria,” IEEE Trans. Ind. Electron., vol. 58,no. 10, pp. 4514–4525, Oct. 2011
[4]. European Commission, Towards smart power network, ECpublication 2005,https://europa.eu.int/comm/research/energy
[5]. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H.Katz, A. Konwinski,G. Lee, D. A. Patterson, A. Rabkin, I.Stoica, and M. Zaharia,“Above the clouds: A berkeleyview of cloud computing,” University of California atBerkeley, Research Report, Feb. 2009.
[6]. R. H. Katz, “Tech Titans Building Boom,” IEEESpectrum, pp. 40–54, Feb. 2009.
[7]. R. Miller, “NSA Plans 1.6 Billion Dollars Utah DataCenter,” Data Center Knowledge Website, Jun. 2009.
[8]. Amazon simple storage service[OL]https://aws.amazon.com/s3/.2010-9-6
[9]. SuperSmart Grid.https://www.supersmartgrid.net/
[10]. Rajkumar Buyya, Chee Shin Yeo and Srikumar Venugopa, “Market –Oriented Cloud Computing:Vision, Hype, and Reality for delivering IT services as computing utilities”,In the 10 IEEE international Conference on high performance computing and communications.Robert L. Grosman, “The Case for Cloud Computing”, IEEE Computer Society,April 2009:23-27
[11]. Kevin Skapinetz, kskapine, Michael Waidner, wmi. Security and Cloud Computing . Sep, 15,2009, 1-41
[12]. https://csrc.nist.gov/groups/SNS/cloud-computing-v25.ppt
[13]. www.nercomp.org/data/media/cloud%20 overview 1.pdf John Voloudakis
[14]. https://cloudscaling.com/blog/cloud-computing/hybrid-clouds-are-half-baked
[15]. Neal Leavitt, “Is Cloud Computing Really Ready for Prime Time”, IEEE Computer Society, January 2009:15-20
[16]. B. Hayes, “Cloud Computing,” Communications of the ACM, vol. 51, no. 7, pp. 9–11, Jul. 2008
[17]. J. Wood and B. F. Wollenberg, “Power Generation, Operation, and Control”, Wiley-Interscience, 1996.
[18]. U.S. Environmental Protection Agency, Server and Data Center Energy Efficiency - Final Report to Congress, 2007
[19]. Song, Su-Mi; Yoon, Yong Ik, “Intelligent smart cloud computing for smart service, Grid and Distributed Computing, Control and Automation Communications in Computer and Information Science, 2010, Volume 121, 64-73.
[20]. Mohsenian-Rad, Leon-Garcia, “A. Source: 2010” 1st IEEE International Conference on Smart Grid Communications (SmartGridComm), p 368-72, 2010
[21]. Qiuhua Huang; Zhou, M.; Yao Zhang; Zhigang Wu Source: 2010 International Conference on Power System Technology (POWERCON 2010), pp 6 , 2010
[22]. K. ElissaWang, Dewen Song, Yaqi; Zhu, Yongli “Source: Dianli Xitong Zidonghua/Automation of Electric Power Systems”, vol. 34, n 22, p 7-12, November 25, 2010 Language: Chinese
[23]. Berl, A. (Fak. fur Inf. und Math., Univ. of Passau, Passau, Germany); Gelenbe, E.; di Girolamo, M.; Giuliani, G.; de Meer, H.; Minh Quan Dang; Pentikousis, K. Source: Computer Journal, v 53, n 7, pp 1045-51, March 2010
[24]. Zhao, Junhua, Fushuan; Xue, Yusheng, Zhenzhi, “Automation of Electric Power Systems”, vol. 34, n 15, p 1-8, August 10, 2010.
[25]. Igor Muttik, Chris Barton “Cloud security technologies”, Information security technical report, 2009.
Dr. Chandikaditya Kumawat, Ankit Toshniwal "A Review on Cloud Computing with Smart Grid" International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.2 issue 8, pp.37-41 2013
A large diversity of solutions exists to reduce the harmonic emission of the 6-pulse Adjustable Speed Drive in order to fulfill the requirements of the international harmonic standards. Among them, new types of advanced harmonic filters recently gained an increased attention due to their good harmonic reduction performance at the same time with small costs and engineering. In the event that such filters are used to replace existing solutions, the assessment of the harmonic performance before commissioning is a necessity. This assessment is possible by using software tools to compare the performance of different topologies. This paper presents a method to integrate the model of the filter into an existing harmonic calculation toolbox dedicated for harmonic analysis on the 6-pulse converter. The results are linked together into a practical PC software toolbox for harmonic estimation. By using a combination of a pre-stored database and new interpolation techniques the toolbox can provide the harmonic data on real applications allowing comparisons between different mitigation solutions.
- Page(s): 42-47
- Date of Publication: August 2013
- Amit WankhadeMandsaur Institute of Technology, Mandsaur, Madhya Pradesh, INDIA
- Anil Kumar ChaudharyMandsaur Institute of Technology, Madhya Pradesh, INDIA
- C.VeereshMandsaur Institute of Technology, Madhya Pradesh, INDIA
References
[1] W. F. Ray, “The Effect of Supply Reactance on Regulation and Power Factor for an Uncontrolled 3-Phase Bridge Rectifier with a Capacitive Load”, IEE Conf.Publ. No. 273, 1986, pp. 523-526.
[2] W. F. Ray, R. M. Davis, I. D. Weatherhogg, “The Three-Phase BridgeRectifier with Capacitive Load”, IEE Conf. Publ. No. 291, 1988, pp.153-156.
[3] M. Grötzbach, “Line Side Behavior of Uncontrolled Rectifier Bridges with Capacitive dc Smoothing”, Proc. of EPE Conf., 1989, pp. 761 –764.
[4] M. Grötzbach, T. Strasser, L. Lorenz, “Line Side Harmonics of Three- phase Current Controlled Rectifiers in Continuous and Discontinuous Operation Mode”,Proc. of EPE Conf., 1993, pp. 707-712.
[5] S. Hansen, P. Nielsen, F. Blaabjerg, ”Harmonic Cancellation by Mixing Non-linear Single-phase and Three-phase Loads”, IEEE Trans. on Industry Applications, Vol. 36, No. 1, 2000, pp. 152 - 159.
[6] S. Jeong, J. Choi, “Line Curent Characteristics of the Three-PhaseUncontrolled Rectifiers under Line Voltage Unbalance Conditions”, IEEE Trans. On Power Electronics, Vol. 17, No. 6, 2002, pp. 935 – 945.
[7] S. Hansen, “Harmonic Distortion of Rectifier Topologies for AdjustableSpeed Drives“ Ph.D. dissertation, Aalborg University, Institute ofEnergy Technology, 2000, ISBN 87-89179-37-4.
[8] S. Hansen, P. Nielsen, P. Thøgersen, “Harmonic Distortion and Reduction Techniques of PWM Adjustable Speed Drives – A Cost Benefit Analysis”, Proc. of NORpie Conf., 2000, Aalborg, Denmark,pp. 271-277.
[9] D. E. Rice, “A Detailed Analyze of Six-Pulse Converter Harmonic Current”, IEEE Trans. on Industry Applications, Vol. 30, No. 2, 1994, pp. 294-304.
[10] IEEE Std 519-1992 “IEEE Recommended Practice and Requirement forHarmonic Control in Electrical Power Systems“, IEEE, 1993, ISBN 1-55937-239-7.
[11] N. Mohan, T. M. Undeland, W. P. Robbins, ”Power Electronics”, JohnWilley & Sons, 1995, ISBN 0-471-30576-6.
[12] M. Sakui, H. Fujita, “An Analytical Method for Calculating Harmonic Currents of a Three-Phase Diode-Bridge Rectifier with dc Filter”, IEEE Trans. on Power Electronics, Vol. 9, No. 6, 1994, pp. 631-637.
[13] Y. Baghzouz, “An Accurate Solution to Line Harmonic DistortionProduced by ac/dc Converters with overlap and dc-ripple”, IEEE Trans. on Industry Applications, Vol. 29, No. 3, 1993, pp. 536 - 540.
[14] M. Grötzbach, M. Bauta, R. Redmann, “Line Side Behavior of Six-Pulse Diode Bridge Rectifiers with AC-side Reactance and Capacitive load”, Proc. of Power Quality Conf., 1995, pp. 525-534.
[15] L. Asiminoaei, S. Hansen, F. Blaabjerg, “Harmonic calculation toolboxin industry application for adjustable speed drive”, Proc. of APEC'04,2004, Vol. 3, pp. 1628-1634.
[16] S. Hansen, L. Asiminoaei, F. Blaabjerg, ”Simple and Advanced Methods for Calculating Six-Pulse Diode Rectifier Line-Side Harmonics”, Proc. of IAS'03, 2003, Vol. 3, pp. 2056-2062.
Amit Wankhade, Anil Kumar Chaudhary, C.Veeresh "Determination and evaluation of a Harmonics in Adjustable Speed Drives" International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.2 issue 8, pp.42-47 2013
In present scenario, management of human resource is gaining importance as the financial and other resources are always in scarcity and need to be utilised efficiently and effectively. A slight variation in employee‟s performance can largely affect the organisation‟s profits and growth. Hence, it becomes crucial for every organisation to measure the performances of its employees and take corrective measures in order to improve the same for organisational and personnel growth. Today, Performance appraisal is not only a part of Human Resource Development which discuss and review the performance and potential of the employees; rather it is stretching towards the strategic approach and integrating with the business goals and policies. It is characterized as one of the HR practice that can effectively help an organization to meet its retention objectives, in addition to other important business goals. A number of activities which are involved in this process provide foundation for accessing the organisation‟s goal, recruiting new blood, develop the competencies, providing training programmes, evaluate employees‟ performance, and a fit to the compensation package. Overall it acts as a tool to measure the performance of an organisation as a whole. The study in question is an effort to find out the level of performance related activities in „Acumen Capital Markets Ltd., Ernakulam (Kerala)‟.
- Page(s): 48-52
- Date of Publication: August 2013
- Dr. R. R. SoniCoordinator-Curriculum Sunrise University, Alwar (Raj.), India
- Pragya GuptaAssistant Professor KCRI College of Science and Commerce Alwar (Raj.), India
References
1. Charles R. Greer, 2004, Strategy implementation: Reward and Development Systems, ISBN 81-3808-305-1
2. Douglas McGragor, An Uneasy look at Performance Appraisal
3. Singh S. et al. (2011), “A Study of Effect of Performance Appraisal on the Organization and the Employee”
4. www.performace-appraisal.com/news.htm
5. https://appraisals.naukrihub.com
Dr. R. R. Soni, Pragya Gupta "Performance Appraisal - A Retention Tool:A Case Study of ‘Acumen Capital Markets Ltd." International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.2 issue 8, pp.48-52 2013
In this rapidly growing environment of Information Technology, those developers who can rapidly adopt new technology are required the most. Calipso is a content management system (CMS), based on the NodeJS server and MongoDB to perform incredibly fast and flexible operations. Calipso is a latest project, which is still under development. It has a total new idea than other CMS and hence developed a CMS that didn't suffer from any of the issues that attempting to shoehorn content into a relational database leads to.
- Page(s): 53-57
- Date of Publication: August 2013
- Dr. Gaurav Kumar JainAssociate Professor, Department of Computer Science & Information Technology, Regional College For Education Research and Technology, Jaipur, Rajasthan
- Mr. Ravi Ranjan Regional College For Education Research and Technology, Jaipur, Rajasthan
- Mr. Chetan Kumar Saini Regional College For Education Research and Technology, Jaipur, Rajasthan
- Mr. Mahendra Kumar Sharma Regional College For Education Research and Technology, Jaipur, Rajasthan
References
[1.] https://calip.so/
[2.] https://calip.so/section/blog
[3.] https://calip.so/section/github
[4.] https://calip.so/section/guide
[5.] https://calip.so/section/quickstart
[6.] https://calip.so/an-introduction-to-calipso.html
[7.] https://github.com/cliftonc/calipso/wiki/Guide-Index
[8.] https://calip.so/coding-standards.html
Dr. Gaurav Kumar Jain, Mr. Ravi Ranjan, Mr. Chetan Kumar Saini, Mr. Mahendra Kumar Sharma "CALIPSO FOR EARLY ADOPTERS Something new for developers to test" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 8, pp.53-57 2013
Power Supplies are extensively used in various electrical and electronic applications. It requires AC to DC rectification and filtering action, having advantages of high efficiency and power density. The main problem associated with these types of power supplies are injection of harmonic current in supply, which adversely affect the performance of system and more importantly causes poor power factor. Research in improved power quality utility interface has gained importance due to stringent power quality regulation and strict limits on total harmonic distort ion (THD) of supply current, regulated by standards V, 2 IEC 61000-3-2 and IEEE 519-1992. In this paper, the power quality of Power Supplies is analyzed by simulate it and measuring the Total Harmonic Distortion and Power Factor. Analysis of various power supplies has been carried out using MATLA B SIMULINK environment [12].
- Page(s): 58-66
- Date of Publication: August 2013
- Sapna SakavayaMandsaur institute of Technology,Mandsaur, M.P. INDIA
- Arti GosainMandsaur institute of Technology,Mandsaur, M.P. INDIA
- Anil Kumar ChaudharyMandsaur institute of Technology,Mandsaur, M.P. INDIA
References
1. Power Quality issues standards and guide lines‖,IEEE, Vol-32, May96
2. IEEE recommended practices and requirementsFor harmonic control in electric power system standard519-1992.
3. P. Lim, T. Wyatt, C. Bray, ―Prevention and Mitigation of Power Quality Concerns Through Education,‖ PRoc. of PCIM/power quality conf.,Dallas, Texas,U.S.A.,September 1994..
4.Task Force on Probabilistic Aspects of Harmonics,―Time-varying harmonics: Part I—Characterizing measured data,‖ IEEE Trans. Power Del., vol. 13, no. 3, pp. 938–944, Jul. 1998.
5. Task Force on Probabilistic Aspects of Harmonics,―Time-varying harmonics: Part II—Harmonic summationand propagation,‖ IEEE Trans.Power Syst., vol. 17, no.1, pp. 279–285, Jan. 2002.
6. Xiaoyu Wang, Member, IEEE, Jing Yong, Member, IEEE, Wilsun Xu, Fellow, IEEE, andWalmir Freitas, Member, IEEE, ―Practical Power Quality Charts for Motor Starting Assessment‖ IEEE Transactions on power delivery, vol. 26, no. 2, APRIL2011.
7. Lei Zhang, Poh Chiang Loh, Member, IEEE, and Feng Gao, Member, IEEE ―An Integrated Nine-Switch Power Conditioner for Power Quality Enhancement and Voltage Sag Mitigation‖ IEEE Transactions on power electronics,vol. 27, no. 3, pp. 1177, March 2012.
8. Radu Iustin Bojoi, Senior Member, IEEE, Leonardo Rodrigues Limongi, Daniel Roiu, and Alberto Tenconi, Senior Member, IEEE ―Enhanced Power Quality Control Strategy for Single-Phase Inverters in Distributed Generation Systems‖ IEEE Transactions on power electronics, vol. 26, no. 3, pp.798, March 2011.
9. Liu Yingying, Xu Yonghai, Xiao Xiangning, Member, IEEE, Zhu Yongqiang, and GuoChunlin ―A Stages Compensation and Control Strategyfor Series Power-Quality Regulator‖ no. 4, pp. 2807October 2010.
10. Pedro Roncero-Sánchez, Member, IEEE, Enrique Acha, Senior Member, IEEE, Jose Enrique Ortega- Calderon, Member, IEEE, Vicente Feliu, Senior Member, IEEE, and Aurelio Garc-Cerrada, Member, IEEE ―A Versatile Control Scheme for a Dynamic Voltage Restorer for Power-Quality Improvement‖ IEEE Transactions on power delivery vol. 24, no. 1, pp .277January 2009.
11. Sharad W. Mohod, Member, IEEE, and Mohan V. Aware ―A STATCOM-Control Scheme for Grid Connected Wind Energy System for Power Quality Improvement‖ IEEE systems Journal, vol. 4, no. 3, pp.346, September 2010.
12. John Wiley & Sons, ―Power Electronics: Converters, Applications, and Design‖,by Ned Mohan, Tore M Undeland, Riobbins, 3rd edition, 2009.
Sapna Sakavaya, Arti Gosain, Anil Kumar Chaudhary "Study of Power Quality in Power Supplies Using Matlab/Simulink" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 8, pp.58-66 2013
In Linear polynomial phenomenon; the interpolating function is only continuous and not differentiable everywhere. So a cubic spline introduced. In this paper, we have a presented the cubic spline interpolation method for zooming in an image. The fundamental idea behind cubic spline interpolation is based on the engineer’s tool Used to draw smooth curves through a number of points [2]. The cubic spline algorithm is programmed in MATLAB as m-file. Firstly, according to the zooming intensity, sufficient zeroes are inserted between each pixel and then those zeroes are replaced by the respective values generated by the m-file. Finally a zoomed in image in constructed.
- Page(s): 67-72
- Date of Publication: August 2013
- Poonam Sharma Department of ECE, Jaipur National University, Jaipur, Rajasthan, India
- Mr. Anshuman Kalla Department of ECE, Jaipur National University, Jaipur, Rajasthan, India
References
1. Digital Image Processing using MATLAB by R.C. Gonzalez, R.E. Woods and S.L. Eddins.
2. Cubic Spline Interpolation by Sky McKinley and Megan Levine mathwo
3. Cubic Spline Interpolation –from Wolfram MathWorld,
4. Cubic spline interpolation ,MAE5093 .Charles O’ Neill
5. Lilley, D. G., Numerical Methods, Stillwater, OK, 2002.
6. Gerald, C., and Wheatley, P., Applied Numerical Analysis, Addison-Wesley, 1994.
7. Cubic-spline interpolation. 1 S A Dyer, Xin He Xin He in IEEE Instrumentation Measurement Magazine(2001)
8. Cubic spline interpolation:part 2 S A Dyer, Xin He Xin He in IEEE Instrumentation Measurement Magazine(2001)
Poonam Sharma, Mr. Anshuman Kalla "Image Zooming using Cubic Spline Interpolation Method " International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 8, pp.67-72 2013
Network on Chip (NoC) is an approach to designing the communication subsystem between IP cores in a System on a Chip (SoC). NoC improves the scalability of SoCs, and the power efficiency of complex SoCs compared to other designs. The purpose of NOC is to solve the choke point in communication and the clock problem from architecture. Each route in NOC includes some routers, and it takes a few clock periods by passing a router. When the network is in congestion, the package transmission will produce much more time delay. So adopting a appropriate routing algorithm to get the balance between the time delay and throughput rate becomes the key problem.This paper basically review of XY routing algorithm for 2D torus topology of Network on chip architecture for constant bit rate (CBR) random traffic in NIRGAM simulator to reduce the average latency per packet and increase average throughput.
- Page(s): 73-76
- Date of Publication: August 2013
- Priyanka SaoPG Student, M.Tech (VLSI Engg.) SGVU, Jaipur, India
- Rekha AgrawalAssistant Professor, (ECE Deptt.)(SGVU, Jaipur, India)
References
[1] Jin-xiang Wang, Fang-fa Fu, Tian-Sheng Zhang & Yu-Ping Chen,“A Small-Granularity Solution on Fault Tolerant in 2D-Mesh Network-on-Chip”, IEEE, 2010, pp.382-384.
[2] Hamed S. Kia and Cristinel Ababei,“A new Fault tolerant and Congestion-aware Adaptive Routing Algorithm for Regular Networks-on-Chip”, IEEE, 2011,pp.2465-2472.
[3] Ruizhe Wu, Yi Wang & Dan Zhao,“A Low CostDeadlock-free Design of Minimal-Table Rerouted XY-Routing for Irregular Wireless NOCs”, 2010, Fourth ACM/IEEE International Symposium on Networks-on-Chip, pp. 199 – 206.
[4] Mohsen Nickray, Masood Dehyadgari & Ali Afzali-kusha, “Adaptive Routing Using Context-Aware Agents for Networks on Chips ”, IEEE, 2009, pp. 1-6.
[5] Masood Dehyadgari, Mohsen Nickray, Ali Afzali-kusha,Zainalabein Navabi,“Evaluation of Pseudo Adaptive XY Routing Using an Object Oriented Model for NOC”, IEEE, 2005, pp. 204-206.
[6] Manas Kumar Puthal, Virendra Singh, M. S. Gaur, VijayLaxmi, “C-Routing: An Adaptive Hierarchical NoC Routing Methodology”, 2011, IEEE/IFIP 19th International Conference on VLSI and System on Chip, pp. 392 – 397.
[7] Shu Yan Jiang, Hao Liang, Shuo Li, Yong Le Xie, “A Test Method of Interconnection Online Detection of NoC Based on 2D Torus Topology”, IEEE, 2011, pp. 183 –187.
[8] Yang Quansheng, Wu Zhekai, “An Improved Mesh Topology and Its Routing Algorithm for NoC”, IEEE, 2010, pp. 1-4.
[9] A.H. Borhani, A. Movaghar, R. G. Cole, “A New Deterministic Fault Tolerant Wormhole Routing Strategy For k-ary 2-cubes”, IEEE, 2010, pp. 1 – 7.
[10] Xiaoqiang Yang, Huimin Du, Jungang Han, “A Node Coding and the Improved Routing Algorithm in Torus Topology”, IEEE, 2008, pp. 443 – 447.
[11] Slavisa Jovanovic, Camel Tanougast, Serge Weber,Christophe Bobda, “A New Deadlock-Free Fault-Tolerant Routing Algorithm For NoC Interconnections”, IEEE, 2009, pp. 326 – 331.
[12] Xiaohang Wang, Mei Yang, Yingtao Jiang, Peng Liu,“Efficient Multicasting Scheme for Irregular Mesh-Based NoCs”, IEEE, 2010, pp. 384 – 387.
[13] Mehrdad Seyrafi, Arghavan Asad, Amir Ehsani Zonouz, Reza Berangi, Mahmood Fathy, Mohsen Soryani, “A New Low Cost Fault Tolerant Solution for Mesh based NoCs”, 2010 International Conference on Electronics and Information Engineering (ICEIE 2010), pp. V2-207 - V2-213.
[14] Yonghui Li, HuaxiGu, “XY-Turn Model for Deadlock Free Routing in Honeycomb Networks on Chip”, IEEE,2009, pp. 900 – 903.
[15] Wang Zhang, Ligang Hou, Jinhui Wang, Shuqin Geng &Wuchen Wu,“Comparison Research between XY andOdd-Even Routing Algorithm of a 2-Dimension 3X3 Mesh Topology Network-on-Chip”, IEEE, 2009, global congress on intelligent systems, pp. 329-333.
[16] Pan Hao,Hong QiI,Du Jiaqin & Pan Pan,“Comparison of2D MESH Routing Algorithm in NOC”, IEEE, 2011,pp. 791 – 795.
[17] Ville Rantala, Teijo Lehtonen & Juha Plosila, “Network on Chip Routing Algorithms”, TUCS Technical Report No 779, August 2006.
[18] “A Simulator for NoC Interconnect Routing and Application Modeling”, University of Southampton UK and Malaviya National Institute of Technology India, by Lavina Jain, September 1, 2007.
Priyanka Sao, Rekha Agrawal "A Survey of Router Design Algorithms for NoC Platform and their Performance Analysis" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 8, pp.73-76 2013
In a modern power system, due to broader applications of nonlinear loads such as power electronic equipment or arc furnaces, the degree of waveform distorted is increasingly serious now. These loads may cause poor power factors, lead to voltage notch, or result in a high degree of harmonics. The instantaneous response of the active power filter (APF) is very important while compensating rapidly varying balanced, unbalanced and nonlinear loads. Any change in the load affects the dc-link voltage directly. The proper operation of APF requires variation of the dc-link voltage within the prescribed limits. Conventionally, a proportional-integral (PI) controller is used to maintain the dc-link voltage to the reference value. It uses deviation of the capacitor voltage from its reference value as its input. However, the transient response of the conventional PI dc-link voltage controller is slow. In this paper, a fast-acting dc-link voltage controller based on the energy of a dc-link capacitor is proposed. Mathematical equations are given to compute the gains of the conventional controller based on fast-acting dc-link voltage controllers to achieve similar fast transient response. The detailed simulations are carried out on MATLAB environment to validate the proposed controller.
- Page(s): 77-84
- Date of Publication: August 2013
- Dipak Badgujar Anil Kumar Chaudhary C.Veeresh
References
[1] K.A Corzine, and Y.L Familiant, “A New Cascaded Multi-level H-Bridge Drive,” IEEE Trans. Power.Electron., vol.17, no.1, pp.125-131. Jan 2002.
[2] J.S.Lai, and F.Z.Peng “Multilevel converters – A new bread of converters, ”IEEE Trans. Ind.Appli., vol.32, no.3, pp.509-517. May/ Jun. 1996.
[3] T.A.Maynard, M.Fadel and N.Aouda, “Modelling of multilevel converter,” IEEE Trans. Ind.Electron., vol.44, pp.356-364. Jun.1997.
[4] P.Bhagwat, and V.R.Stefanovic, “Generalized structure of a multilevel PWM Inverter,” IEEE Trans. Ind. Appln, Vol.1A-19, no.6, pp.1057-1069,Nov./Dec..1983.
[5] J.Rodriguez, Jih-sheng Lai, and F Zheng peng, “Multilevel Inverters; A Survey of Topologies, Controls, and Applications,” IEEE Trans. Ind. Electron., vol.49 ,no4., pp.724-738. Aug.2002.
[6] Roozbeh Naderi, and Abdolreza rahmati, “Phase- shifted carrier PWM technique for general cascaded inverters,” IEEE Trans. Power.Electron., vol.23,no.3,pp.1257-1269. May.2008.
[7] Bhim Singh, Kamal AlHaddad & Ambrish Chandra, 1999, A Review of Active Filter for Power Quality Improvements, IEEE Trans on Industrial Electronics, 46(5), pp.960970
[8] Mauricio Angulo, Pablo Lezana, Samir Kouro, Jos´e Rodr´ıguez and Bin Wu,”Level-shifted PWM for Cascaded Multilevel Inverters with Even Power Distribution” IEEEPower Electronics specialist conference, 17-21 june 2007, pp.2373-2378.
[9] B. P. McGrath and D. G. Holmes, “Multicarrier PWMstrategies for multilevel inverters,” IEEE Trans. Ind. Electron., vol. 49, no.4, pp. 858–867, August 2002.
Dipak Badgujar, Anil Kumar Chaudhary, C.Veeresh "Active Power Filter with Fast PI Controller using matlab/simulink" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 8, pp.77-84 2013
Employee retention means how to Retain Employees as some private company offer a competitive benefits package, including health and life insurance and a retirement plan some provide employees financial incentives such as raises, bonuses and stock options ,consider hiring a human-resources manager if your company is nearing 100 employees. Make sure employees know what's expected of them and how they can grow within your company, refers to the ability of an organization to retain its employees. Hiring employees is just a start to creating a strong work force. Next, you have to keep them. High employee turnover costs business owners in time and productivity. – Offer a competitive benefits package that fits your employees’ needs. Providing health insurance, life insurance and a retirement-savings plan is essential in retaining employees. But other perks, such as flextime and the option of telecommuting, go a long way to show employees you are willing to accommodate their outside lives. – Provide some small perks. Free bagels on Fridays and dry-cleaning pickup and delivery may seem insignificant to you, but if they help employees better manage their lives, they’ll appreciate it and may be more likely to stick around.
- Page(s): 85-87
- Date of Publication: August 2013
- Pawan KumarResearch Scholar, SJJT University, Jhunjhunu, Rajasthan, India
- Dr. Shiv Ram Singh JhajhariaLecturer Selection Scale N.D.B. Government College, Nohar HMH Rajasthan, India
References
Guides.wsj.com/small-business/hiring-and-managing-employees/how-to-retain-employees.
Blog.softwareadvice.com/articles/hr/5-retention-strategies-for-a-high-performance-environment-1062112
Breaugh, James A., and Mary Starke. "Research on Employee Recruitment: So Many Studies, So Many Remaining Questions." Journal of Management (2000): 305-434. Web. 12 Mar. 2011.
www.eeoc.gov/federal/retention.cfm
Pawan Kumar, Dr. Shiv Ram Singh Jhajharia "Key Factors and Challenges of Employee Retention Policies in Private Sector Firms: An Assessment" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 8, pp.85-87 2013
This paper includes performance and analysis & Characteristics of 3G GSM network on the basis of KPI report. Performance & analysis of GSM network has following features: Blocked Call Analysis, Drop Call Analysis, Speech Quality Parameters, and Speech Quality Analysis, Handover Analysis, Coverage Analysis, Quality of SFH & Non-SFH network, Drop Call Rate, Call setup success rate, Blocked Call Rate, Hopping C/I.
- Page(s): 88-92
- Date of Publication: August 2013
- Ms.Neetu SharmaGovt. Engineering College, Ajmer, Rajasthan, India
- Ms. Neelkamal Chaudhary Govt. Engineering College, Ajmer, Rajasthan, India
- Ms. Abhilasha SharmaMaharana Pratap University of Agriculture and Technology, Udaipur, Rajasthan, India
- Mr. Naveen ChoudharyMaharana Pratap University of Agriculture and Technology, Udaipur, Rajasthan, India
References
[1] Dhiraj Nitnaware, Ajay Verma “Energy Evaluation of Two on Demand Routing Protocol under Stochastic Traffic”
[2] Yogesh Chaba, Yudhvir Singh, Manish Joon. “Simulation based Performance Analysis of On-Demand Routing Protocols in MANETs” 2010 Second International Conference on Computer Modeling and Simulation
[3] Koushik Majumder, Subir Kumar Sarkar” Performance Analysis of AODV and DSR RoutingProtocols in Hybrid Network Scenario”IEEE Xplore
[4] C. K. Toh, Associativity-Based Routing for Ad Hoc Mobile Networks, Wireless Personal Communications, vol. 4, no. 2, pp. 1-36, March 1997.
[5] R. S. Sisodia, B. S. Manoj, and C. Siva Ram Murthy, A Preferred Link- Based Routing Protocol for Ad Hoc Wireless Networks, Journal of Communications and Networks, vol. 4, no. 1, pp. 14-21, March 2002.
Ms.Neetu Sharma, Ms. Neelkamal Chaudhary, Ms. Abhilasha Sharma, Mr. Naveen Choudhary "Analysis & Characteristics of 3G GSM Network" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 8, pp.88-92 2013
INTRODUCTION Shekhawati is a semi-arid historical region located in the northeast part of Rajasthan, India got its name from Shekhawat Rajputs. The inhabitants of Shekhawati are considered brave, sacrificing and hard working people. The region provides the highest number of persons to the Indian Army. The region of Shekhawati is also known as Scotland of India because of its brave, sacrificing and painstaking Jat-Rajput people who are ancient rulers and military men.
- Page(s): 93-99
- Date of Publication: August 2013
- Dr. B.B.S. KapoorHerbal Research Laboratory, Dunger College, Bikaner, Rajasthan, India
- Kamal KishorPh.D Scholar, J.J.T. University, Jhunjhunu, Rajasthan, India
References
1.Acharya, J. (1999). Ecophysiological and phytochemical studies of some arid zone plants, Ph.D. Thesis, M.D.S. University, Ajmer (India).
2.A.O.A.C. (1995). Official method of analysis of Association of Official Agricultural Chemist, Washington, D.C., U.S.A. 16 the ed.,Vol I & II cunnift, P.A. (Ed.)
3. Odishafdc.com/products_medicinal_plants.php
4.Ahmed El Sawi, S; Abd – El Megeed- Hashem, F;al; A.M.(1999). Flavonoids and antimicrobial principles from Adhatoda vasica Nees. Pharmaceutical and pharmacological letters; 9 (2) 52-56
5.Akhtar, M.A.Rubber; Bhatti,M.H. and Aslam, M.(1997). Antibacterial activity of plant diffusate against Xanthomonas compestris Pv Int. Journal of Pest Management. 43:2,149-153.
6.Aminuddin (1977). Production of amino acids in Ephedra foliata suspension culture. Current Science 46: 525-526.
7.Anonymous. (1948-1976) : The Wealth of India-Raw Materials, Vols. 1-11, CSIR, New Delhi.
8.Arora, Versha (2010). “Studies On Ethno-Medicinal, Ecological And Phytochemical Aspects Of Medicinal Plants Of The Jaisalmer District” Ph.D. Thesis. M.G.S. University, Bikaner (India).
9.Awapara, J. (1948). Application of paper chromatography to estimation of free amino acids in tissues. Arch. Biochem. 19: 171-173. Bains, N.S. and Harsh, M.L. (1996). Production of free and bound amino acids from Citrullus lanatus and Withania somnifera, Oikoassay, vol. 13 (1-2): 7-10.
10.Bansal, Renu (2009). “Studies on Ethno-Medicinal, Ecological And Phytochemical Aspects Of Medicinal Plants Of The Nagaur District” Ph.D. Thesis. M.G.S. University, Bikaner (India).
11.Bhojak, S. (1991). Phytochemical investiation of some fodder plants of arid zone of Rajasthan in vivo and in vitro Ph.D. Thesis Ajmer, University Ajmer India.
12.Black C.A. et al. (1965). Methods of soil analysis part I and II, American society of agronomy. Inc. Publisher, Madison, Wisconsin, USA.
13.Black, R.J., Durrum, E.L. and Zewing, G. (1958). A manual of paper chromatography and paper electrophoresis. Academic press, Inc. publishers, New York, pp. 374-375.
14.Chandel,B.S. Shah,N.M. and Tripathi, R.M. (1993). In vitro antimicrobial activity of Acacia arabica. Ind. Journal of Indigenous Medicines. 9;12,1-2,77-79.
15.Chen, J and Montanari, A.M. (1998). Isolation and identification of new polymetbnoxyflavonoids from Dancy tangerine leaves. Journal of agriculture and food-chemistry; 46(4): 1235-1238.
16.Chinoy, J.J. (1962) . Formation and utilization of ascorbic acid in the shoot apex of wheat as factor of growth and development. Indian J. plant physiol. 5: 172-201.
17.Chopra, R.N.; Bhadwar, R.L and Ghosh, S. (1965) : Poisonous Plants of India. Indian Council of Agricultural Research, New Delhi.
18.Chopra, R.N.; Chopra, I.C. and Verma, B.S. (1968) : Supplement of Glossary of Indian Medicinal Plants, CSIR, New Delhi.
19.Das S.K. and A.B. Banerjee (1980). A rapid method for quantification of sterols after thin layer chromatography, Indian J. exp. Biol. 18.969-971.
20.Desai, B.S. and Jasraj, Y.T. (2003) : Herbal resources available for commonest disease-diabetes. pp: 35-43. In Khan, I.A. and Khanum, A (eds.): Role of Biotechnology in Medicinal and Aromatic Plants, Vol. VIII. Ukaaz Publication, Hyderabad.
21.Dey, A.C. (1998) : Indian Medicinal Plants Used in Ayurvedic Preparations. Bishan Singh Mahendra Pal Singh, Dehradun.
22.Dymock. (1883) : Vegetable Materia Media of Western India. Educ. Sco. Press, Bombay, 1. 1008.
23.El-toumy-S.A.A. Marzouk, M.S. Moharram. F.A. and Aboutab. E.A. (2001). Flavonoids of Melalerica quinquenervia Pharmazie, 56(1); 94-95.
24.Ferreres, F., Castaner, M. and Tomas. B.F.A. (1997). Acylated flavonol glycosides from spinach leaves (Spinacia oleracea) Phytochemisty (Oxford) 45 (8); 1701-1705.
25.Gins V.K. Kolesnikov, M.P. Kononkov P.F. Trishin, M.E. and Gins, M.S. (2000). Hydroxyanthroquinones and flavonoids of gariand chrysanthemum Priklandnaya Biokhimia- I- mikrobiologiya, 36 (3); 344-353.
26.Gir, Rohitash (2006). Studies on Phytodiversity and Ecology of waterlogged areas of Rawatsar, district Hanumangarh. Ph.D. thesis, M.D.S. University, Ajmer (India).
27.Grover, J.K.; Yadav, S. and Vats, V. (2002) : Medicinal plants of India with antidiabetics potential. J. Ethnopharmacol
28.Harbone, J.B. (1973) . “Phytocemical methods” Chapman and Hill, London.
29.Harsh, G. (2002) . Studied Phytodiversity and ecology of Kodamdesar pond area of Bikaner district. Ph.D. Thesis M.D.S. University, Ajmer, Rajasthan.
30.Harsh M. L. (1982). Primary and secondary products from medicinal plants of Indian arid zone in vivo and in vitro tissue culture Ph.D. Thesis, University of Rajsthan, Jaipur, India.
31.Harsh M. L. and Maheshwari, A. (2000). Nutritional status of some arid zone plants of Bikaner, Rajasthan. Journal of Env. and pollution. 7(1) pp- 31-37 Jeong, T.M., Yang,S.M. and Nah, H.H.(1978). Sterol compositions of three solanaceous seed oils. Hanguk nanghwa Hakho chiv. 21:51-57.
32.Jia, S.S., Liu, D., Zheng, X.P. and Li, Y.K. (1993). Two new isopreny, flavonoids from the leaves of Glyeyrrhiza uralensis fisch Acta Pharmaceutical sinica 18 (1) 28-31.
Dr. B.B.S. Kapoor, Kamal Kishor "Shekhawati Region of Rajasthan a Place of Ethnomedicinal Plants and Its Phytochemical Studies" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 8, pp.93-99 2013
We propose an information hiding technique which based on pixels’ block. We used pixels contractive relation to hide the information that we want to embed. The characteristic of our method is that to use pixels contractive relation to assist lossy compression process in reducing the image size. There exists many hiding techniques, but most of the techniques cannot tolerate the destruction of lossy compression. Compression will speed up the transmission of the image with the hiding data.We achieve something others cannot do, to implement compression into the transmission of images in order to speed up the process. Data hiding is the process of hiding piece of information into a cover media such as image, video, audio, etc. Various data hiding algorithm has been proposed for different applications, for example, it can be used for covert communication, image authentication, copyright, copy control in DVD, traitor tracing, data integrity, etc. Among these data hiding techniques, robust lossless data hiding has received increasing interest. Robust data hiding is the ability to extract the secret data correctly after compression or any other incidental alteration has been applied to the stego-image. In lossless data hiding the original image is recovered after extraction of data from the stego image. It has been successfully applied to many images, including aerial, texture, miscellaneous, standard images and medical images. Specifically, it has been successfully applied to authenticate lossless compressed JPEG2000 images, followed by possible transcoding. It is expected that this new robust lossless data hiding algorithm can be readily applied in the medical field, law enforcement, remote sensing and other areas, where the recovery of original images is desired. With the fast progression of data exchange in electronic way, information security is becoming more important in data storage and transmission. While storing and transmitting multimedia data are not easy and they need large storage devices and high bandwidth network systems. Compression and encryption technologies are important to the efficient solving of network bandwidth and security issues. This paper focus on dual approach of compression and security where compression is achieved through lossless algorithm (either Huffman coding or LZW) according to size and type of image data and compressed data is encrypted using traditional DES Algorithm.
- Page(s): 100-104
- Date of Publication: August 2013
- Dr. Vivek Sharma Head, Deptt. of CSE (UG & PG) VNS Institute of Technology, Bhopal, MP, India
- Mr. Hariom C. Agnihotri.Research ScholarVNS Institute of Technology, Bhopal, MP, India
References
[1] A. Razzaque, N. V. Thakur, “Image compression andencryption: an overview”, International Journal of EngineeringResearch & Technology , Vol. 1. 5, pp. 1-7, July 2012.
[2] N. G. Bourbakis, “Image data compression-encryption using Gscanpatterns”, IEEE computational cybernetics and simulation ,vol.2 pp. 1117-1120, Oct 1997.
[3]S. S. Maniccam, and N. G. Bourbakis, “SCAN based losslessimage compression and encryption”, IEEE Informationintelligence and system , pp. 490-499, 1999.
[4] H. Cheng and X. Li, “Partial encryption of compress ed images and videos”, IEEE Transactions On Signal Processing, Vol. 48. 8, pp. 2439-2451, August 2000.
[5] E. Celikel and M. E. Dalkilic, “Experiments on a secure compression algorithm”, Proceedings of the International Conference on Information Technology : Coding and Computing , vol. 2, pp 150-152, April 2004.
[6] M. Ito, N. Ohnishi, A. Alfalou and A. Mansour, “New image encryption and compression method based on independent component analysis”, IEEE information an-d communication technologies from theory to application , pp 1-6, April 2008.
[7] Y. You, H. Kim, “Endoscopy image compression and en cryption under fault tolerant ubiquitous environment” IEEE Biomedical circuit and system conference , pp. 165-168, Nov 2009.
[8] D. Maheswari, V. Radha, “Secure layer based compoun d image compression using xml compression” IEEE Computational intelligence and computing resea rch , pp 1-5, Dec 2010.
[9] A. Alfalou, C. Brosseau, N. Abdallah, M. Jridi, “Si multaneous fusion, compression, and encryption of multiple images”, Optics express , Vol. 19. 24, pp 24023-24029, Nov 2011.
[10] G. H. Keat, A. Samsudin, Z. Zainol, “Enhanced perfo rmance of secure image using wavelet compression” World Academy of Science, Engineering and Technology , Universiti Sains Malaysia, pp. 633-636, 2007.
[11] N. V. Thakur, and O. G. Kakde, “Compression mechani sm for multimedia system in consideration of information security” Proceeding of International workshop on machine int elligence research, pp 87-96, 2009.
Dr. Vivek Sharma, Mr. Hariom C. Agnihotri. "Comparative Study of Data Hiding in Encrypted Image using lossless and lossy Compression" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 8, pp.100-104 2013
INTRODUCTION R. K. Narayan was born in Madras (now Chennai), Madras Presidency, British India. His father was a school headmaster, and Narayan did some of his studies at his father's school. As his father's job entailed frequent transfers, Narayan spent part of his childhood under the care of his maternal grandmother, Parvati. During this time his best friends and playmates were a peacock and a mischievous monkey Indian author R.K. Narayan is widely considered to be one of India's greatest English language novelists known for his simple and unpretentious writing style, often compared to William Faulkner. Narayan has been nominated for the Nobel Prize in Literature multiple times but has not yet won the honor. Narayan broke through with the help of his mentor and friend, Graham Greene, who was instrumental in getting publishers for Narayan’s first four books, including the semi-autobiographical trilogy of Swami and Friends, The Bachelor of Arts and The English Teacher. Narayan’s works also include The Financial Expert, hailed as one of the most original works of 1951, and Sahitya Akademi Award winner The Guide, which was adapted for film and for Broadway.
- Page(s): 105-107
- Date of Publication: August 2013
- Pawan Kumar
- Dr. K .K. Arora
References
1. Crossette, Barbara (14 May 2001). "R. K. Narayan, India's Prolific Storyteller, Dies at 94".The New York Times. Retrieved 9 July 2009.
2. Sen, Sunrita (25 May 2001). "Gentle chronicler of the essence of small-town India". India Abroad. Retrieved 12 July 2009.
3. "R K Narayan". London: The Daily Telegraph. 14 May,. Retrieved 25 July 2009.
4. Broyard, Anatole (12 June 1974). "A Monkey and a Peacock; Books of The Times". The New York Times. Retrieved 20 October 2009.
5. Remembering a writer par excellence". The Hindu. 8 July 2005. Retrieved 20 October 2009.
6. Rao 2004, p. 13.
7. Alexander McCall Smith (18 March 2006). "The god of small things". The Guardian(London). Retrieved 10 July 2009.
8. Robinson, Andrew (2 May 1997). "The peopling of Malgudi". Times Higher Education. Retrieved 10 July 2009.
9. Guy, Randor (26 July 2001). "A flood of fond memories". The Hindu. Retrieved 12 July 2009.
10. "Priyadarshan's tribute to R K Narayan". Televisionpoint.com. 3 March 2006. Retrieved 12 July 2009.
1. en.wikipedia.org/wiki/Mangal_Dosha
12. en.wikipedia.org/wiki/The_Guide
13. en.wikipedia.org/wiki/The_Vendor_of_Sweets
Pawan Kumar, Dr. K .K. Arora "Treatment of Human Relationship in R.K.Narayan Selected Novels" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 8, pp.105-107 2013