In today's competitive manufacturing environment, it's essential to get the most out of your existing assets. That's why manufacturers depend on Technologies for manufacturing process improvement consulting services, perform in-depth operations analysis, evaluate your overall performance and recommend an appropriate productivity improvement strategy. There should be a deep process and technology expertise needed to provide a unique solution to meet needs.
- Page(s): 01-03
- Date of Publication: November 2013
- Steve DimonScholar, Monash University, VIC, Australia
References
[1] ovit.hu/userfiles/forgacsolo_uzem_angol. [2] mavtechglobal.com/services/strategic-manufacturing-solutions/productivity-improvements. [3] gsb.columbia.edu/faculty/abartel/info_tech. [4] werc.org/assets/1/workflow_staging/Publications/421 [5]https://arxiv.org/abs/1212.2291 [6] Landes, David. S. (1969). The Unbound Prometheus: Technological Change and Industrial Development in Western Europe from 1750 to the Present. Cambridge, New York: Press Syndicate of the University of Cambridge. ISBN 0-521-09418-6 [7] JR Love - Antiquity and Capitalism: Max Weber and the Sociological Foundations of Roman Civilization Routledge, 25 April 1991 Retrieved 2012-07-12 ISBN 0415047501 [8] JG Douglas, N Douglas - Ancient Households of the Americas: Conceptualizing What Households Do O'Reilly Media, Inc., 15 April 2012 Retrieved 2012-07-12 ISBN 1457117444 [9] M Weber - General Economic History Transaction Publishers, 1981 Retrieved 2012-07-12 ISBN 0878556907 [10] Demosthenes, Robert Whiston - Demosthenes, Volume 2 Whittaker and Company, 1868 Retrieved 2012-07-12
Steve Dimon "Productivity Improvement of a Machining Plant" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 11, pp.01-03 2013
Gesture recognition is a topic in computer science and language technology with the goal of interpreting human gestures via mathematical algorithms. Gestures can originate from any bodily motion or state but commonly originate from the face or hand. Current focuses in the field include emotion recognition from the face and hand gesture recognition. Many approaches have been made using cameras and computer vision algorithms to interpret sign language. .
- Page(s): 04-06
- Date of Publication: November 2013
- Varun DhawanScholar, IIT Bombay
References
1. Matthias Rehm, Nikolaus Bee, Elisabeth André, Wave Like an Egyptian - AccelerometerBased Gesture Recognition for Culture Specific Interactions, British Computer Society, 2007 2. Henriksen, K. Sporring, J. Hornbaek, K. " Virtual trackballs revisited", IEEE Transactions on Visualization and Computer Graphics, Volume 10, Issue 2, paged 206- 216, 2004 3. K. Ouchi, N. Esaka, Y. Tamura, M. Hirahara, M. Doi, Magic Wand: an intuitive gesture remote control for home appliances, International Conference on Active Media Technology, 2005 (AMT 2005), 2005 4. Thomas G. Zimmerman, Jaron Lanier, Chuck Blanchard, Steve Bryson and Young Harvill. https://portal.acm.org. "A HAND GESTURE INTERFACE DEVICE.
Varun Dhawan "An Approach for Human Gesture Recognition" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 11, pp.04-06 2013
In ad hoc networks the communicating nodes do not necessarily rely on a fixed infrastructure, which sets new challenges for the necessary security architecture they apply. In addition, as ad hoc networks are often designed for specific environments and may have to operate with full availability even in difficult conditions, security solutions applied in more traditional networks may not directly be suitable for pro- tecting them. A short literature study over papers on ad hoc networking shows that many of the new generation ad hoc networking proposals are not yet able to address the security problems and they face. Environment-specific implications on the re- quired approaches in implementing security in such dynamically changing networks have not yet fully realized.
- Page(s): 07-17
- Date of Publication: November 2013
- KamalAssistant Professor, MDU Rohtak, India
- Dinesh Kumar Assistant Professor, MDU Rohtak, India
- Kanishka Raheja M.Tech Scholar, MDU Rohtak, India
References
[1]E. Ayanoglu, C.-L. I, R. D. Gitlin, and J. E. Mazo. Diversity coding for transparent self-healing and fault-tolerant communication networks. IEEE Transactions on Communications, 41(11):1677–1686, November 1993. [2]M. Castro and B. Liskov. Practical Byzantine fault tolerance. In Proceedings of the 3rd USENIX Symposium on Operating System Design and Implementation (OSDI’99), pages 173–186, New Orleans, LA USA, February 22–25, 1999. USENIX Association, IEEE TCOS, and ACM SIGOPS. [3]Y. Desmedt. Threshold cryptography. European Transactions on Telecommunications, 5(4):449–457, July–August 1994. [4]Y. Desmedt and Y. Frankel. Threshold cryptosystems. In G. Brassard, editor, Advances in Cryptology— Crypto’89, the 9th Annual International Cryptology Conference, Santa Barbara, CA USA, August 20–24, 1989, Proceedings, volume 435 of Lecture Notes in Computer Science, pages 307–315. Springer, 1990. [5]Y. Desmedt and S. Jajodia. Redistributing secret shares to new access structures and its applications. Technical Report ISSE TR-97-01, George Mason University, July 1997. [6]A. Ephremides, J. E. Wieselthier, and D. J. Baker. A design concept for reliable mobile radio networks with frequency hopping signaling. Proceedings of the IEEE, 75(1):56–73, January 1987. [7]P. Feldman. A practical scheme for non-interactive verifiable secret sharing. In Proceedings of the 28th Annual Symposium on the Foundations of Computer Science, pages 427–437. IEEE, October 12–14, 1987. [8]M. J. Fischer, N. A. Lynch, and M. S. Peterson. Impossibility of distributed consensus with one faulty processor. Journal of the ACM, 32(2):374–382, April 1985. [9]Y. Frankel, P. Gemmel, P. MacKenzie, and M. Yung. Optimal resilience proactive public-key cryp- tosystems. In Proceedings of the 38th Symposium on Foundations of Computer Science, pages 384–393, Miami Beach, FL USA, October 20–22, 1997. IEEE. [10]Y. Frankel, P. Gemmell, P. MacKenzie, and M. Yung. Proactive RSA. In B. S. Kaliski Jr., editor,Advances in Cryptology—Crypto’97, the 17th Annual International Cryptology Conference, Santa Bar- bara, CA USA, August 17–21, 1997, Proceedings, volume 1294 of Lecture Notes in Computer Science, pages 440–454. Springer, 1997. [11]M. Gasser, A. Goldstein, C. Kaufman, and B. Lampson. The digital distributed systems security archi- tecture. In Proceedings of the 12th National Computer Security Conference, pages 305–319, Baltimore, MD USA, October 10–13, 1989. National Institute of Standards and Technology (NIST), National Computer Security Center (NCSC). [12]R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust and efficient sharing of RSA functions. In N. Koblitz, editor, Advances in Cryptology—Crypto’96, the 16th Annual International Cryptology Conference, Santa Barbara, CA USA, August 18–22, 1996, Proceedings, volume 1109 of Lecture Notes in Computer Science, pages 157–172. Springer, 1996. [13]R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust threshold DSS signatures. In U. M. Maurer, editor, Advances in Cryptology—Eurocrypt’96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12–16, 1996, Proceedings, volume 1233 of Lecture Notes in Computer Science, pages 354–371. Springer, 1996.
Kamal, Dinesh Kumar, Kanishka Raheja "Security in Ad Hoc Networks " International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 11, pp.07-17 2013
This paper reviews some of the arrangements and connection requirements for a permanent-magnet generator. It illustrates the importance of winding reactance minimization when using a diode bridge rectifier. It uses modern CAD methods to design a small PM generator and verifies the performance using simulation software. The design is modified to improve the generator size. This highlights that increasing the electrical loading in an attempt to reduce the generator size can lead to a large reduction in power factor, where a controlled rectifier would have to be used instead of a diode bridge rectifier.
- Page(s): 18-23
- Date of Publication: November 2013
- Kundan Kumar Gwalior Institute of Technology, Gwalior, MP, India
- Mahaveer Singh Gwalior Institute of Technology, Gwalior, MP, India
- Shashikant Mishra Gwalior Institute of Technology, Gwalior, MP, India
- Anil Kumar Choudhary Gwalior Institute of Technology, Gwalior, MP, India
References
Kundan Kumar, Mahaveer Singh, Shashikant Mishra, Anil Kumar Choudhary "Design of Brushless Permanent Magnet Generators for Use in Small Renewable Energy Systems " International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 11, pp.18-23 2013
Social Media sites such as blogs and social networks permit people to form connections with other users and brands and share content such as messages, news, video and photos. Sites such as Facebook, Twitter and YouTube have knowledgeable unprecedented growth over the last few years and are some of the most talked about destinations on the web. Social media offers an opportunity to connect and interact with your customers, analysis about your product, promote your brand and drive traffic to your website. Getting involved in social media can also create a more human face to your business. The companies which have not realized the role of brands in global competition for the past two decades has lost some of their market power and also lost the customers. Today, the companies producing technology or analytics products really need "branding" as a key in order to differentiate themselves from their global challengers. Therefore, the companies focusing on producing innovative and technology products should invest on "branding" and should implement an effective "brand management" strategy.
- Page(s): 24-33
- Date of Publication: November 2013
- Vikas SomaniHead of MCA Department, Institute of Technology & Management, Bhilwara(Raj.), India
- Neetu Ranawat Assistant Professor, Kanchan Devi College of Computers Science, Bhilwara(Raj.), India
References
[1] Achrol, R.S. and Kotler, P., 1999. Marketing in the Network Economy, Journal of Marketing, vol.63, Special Issue 1999, pp. 146-163. [2] Applegate, Lynda, et al., 2001. Creating Business Advantage in the Information Age. McGraw-Hill/Irwin, New York, New York. [3] Briggs, R. and Hollis, N., 1997. Advertising on the Web: Is there Response before Click-Through?: Journal of Advertising Research, pp. 33-45. [4] Carpenter, P., 2000. eBrands. Building an Internet Business at Breakneck Speed. Harvard Business School Press,Boston, Massachusetts. [5] Dubberly, H., 2000. A model of brand, Gain: AIGA Journal of Design for the Network Economy 1. [6] Geissler, U. and Will, M., 2001, Corporate Branding of E-Business Ventures. Proceedings of the 34th Hawaii International Conference on System Sciences. Maui, Hawaii, pp. 1-10. [7] Kambil, A., et al., 2001, Marketing in Electronic Commerce, IEEE. [8] Han, Taedong, 2005. Exploring Price and Product Information Search Behavior in e-Market. Proceedings of the International Conference on Information Technology: Coding and Computing.
Vikas Somani, Neetu Ranawat "Social Media Impact on Small Medium Enterprises" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 11, pp.24-33 2013
Recruitment is the process of identifying and attracting potential candidates from within and outside an organization to begin evaluating them for future employment. Once candidates are identified, an organization can begin the selection process. This includes collecting, measuring, and evaluating information about candidates’ qualifications for specified positions. Organizations use these processes to increase the likelihood of hiring individuals who possess the right skills and abilities to be successful at their jobs.
- Page(s): 34-38
- Date of Publication: November 2013
- Dr. Trilok Kumar JainDean, ISBMSuresh Gyan Vihar University,Jaipur, Rajasthan, India
- Nidhi MalhanPHD Scholar JJT University Rajasthan, India
- Rinku SinghalSt. Kabir Institute of Professional Studies, Ahmedabad, Gujrat, India
References
1. James A. Breaugh and Mary Starke, Research on Employee Recruitment: So Many Studies, So Many Remaining Questions, Journal of Management 2000, Vol. 26, No. 3, 405–434 2. Andrea Broughton ,Beth Foley ,Stefanie Ledermaier ,Annette Cox, The use of social media in the recruitment process Ref: 03/13, ISBN 978-1-908370-32-7 3. Ghazala Ishrat, A comparative study of Recruitment & Selection, Training and Development policies in Indian MNCs and Foreign MNCs”, IOSR Journal of Business and Management (IOSR-JBM),e-ISSN: 2278-487X. Volume 7, Issue 5 (Jan. - Feb. 2013), PP 29-43 4. RECRUITMENT AND SELECTION PRACTICES IN A SELECTED ORGANISATION, Journal of Management Practice, 4(1), 166-177 © Penny Clark 5. Navdeep Kumar , Pankaj Garg, Impact of OnlineRecruitment On RecruitmentPerformance, ASIAN JOURNAL OF MANAGEMENT RESEARCH Online OpenAccess publishing platform for Management Research, ISSN 2229 – 3795,pg 328-335
Dr. Trilok Kumar Jain, Nidhi Malhan, Rinku Singhal "Recruitment a big challenge" International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.2 issue 11, pp.34-38 2013
A Mobile Ad-hoc Network (MANET) is composed of Mobile Nodes (MNs) without any infrastructure. MNs self-organize to form a network over radio links. In this environment, multicast routing protocols are faced with the challenge of producing multi-hop routing under host mobility and bandwidth constraint. Multicast routing plays a significant role in MANETs. In recent years, various multicast routing protocols with distinguishing feature have been newly proposed. In order to provide a comprehensive understanding of these multicast routing protocols designed for MANETs and pave the way for the further research, a survey of the multicast routing protocols is discussed in detail in this paper. Qualitatively, based on their primary multicast routing selection principle, we show that all these protocols could be placed under one of two broad routing selection categories: multicast routing based on application independence and multicast routing based on application dependence.
- Page(s): 39-50
- Date of Publication: November 2013
- KamalAssistant Professor, MDU Rohtak, India
- Dinesh KumarAssistant Professor, MDU Rohtak, India
- Kanishka RahejaM.Tech Scholar, MDU Rohtak, India
References
[1]H. Deng, W. Li, and D. P. Agrawal, ―Routing security in wireless adhoc networks,‖ IEEE Commun. Mag., vol. 40, no. 10, pp. 70–75, Oct.2002. [2]M. Younis and S. Z. Ozer, ―Wireless ad-hoc networks: Technologies and challenges,‖ Wireless Commun. Mobile Computing, vol. 6, no. 7, pp. 889–892, Nov. 2006. [3]S. Guo and O. Yang, ―Energy-aware multicasting in wireless ad-hoc networks: A survey and discussion,‖Computer Commun., vol. 30, no.9, pp. 2129–2148, June 2007. [4]X. Chen and J. Wu, ―Multicasting techniques in mobile ad-hoc networks,‖The Handbook of Ad-hoc Wireless Networks, pp. 25–40, 2003. [5]L. Junhai and Y. Danxia, et al., ―Research on routing security in MANET,‖ Application Research of Computers, vol. 25, no. 1, pp. 243–245, Jan. 2008.© 2013, IJARCSSE All Rights ReservedPage | 860Ravi et al., International Journal of Advanced Research in Computer Science and Software Engineering 3(9), September - 2013, pp. 856-862 [6]A. Shaikh, J. Rexford, and K. G. Shin, ―Evaluating the impact of stale link state on quality-of-service routing,‖IEEE/ACM Trans. Networking,vol. 9, no. 2, pp. 162–176, Apr. 2001. [7]J.-S. Chou, C.-H. Lin, and C.-H. Chiu, ―An identity-based scheme for ad-hoc network secure routing protocol from pairing,‖ WSEAS Trans.Computers, vol. 5, no. 6, pp. 1214–1221, June 2006. [8]C. Liu, Y. Shu, and Y. Zhou, et al., ―A comparison of DSR, MSR and BSR in wireless ad-hoc networks,‖ SPIE, vol. 6011, pp. 601–610, 2005. [9]M. K. Marina and S. R. Das, ―Ad-hoc on-demand multi-path distance vector routing,‖ Wireless Commun. Mobile Computing, vol. 6, no. 7, pp.969–988, Nov. 2006. [10]C. W. Wu and Y. C. Tay, ―AMRIS: A multicast protocol for ad-hoc wireless networks,‖ in Proc. IEEE MILCOM, 1999, vol. 1, pp. 25–29. [11]E. M. Royer and C. E. Perkins, ―Multicast operation of the ad-hoc ondemand distance vector routing protocol,‖ inProc. ACM MOBICOM,Aug. 1999, pp. 207–218. [12]J. Xie, R. Rajesh, and A. McAuley, et al., ―AMRoute: Ad-hoc multicast routing protocol,‖ Mobile Networks and Applications, Multipoint Communication in Wireless Mobile Networks, vol. 7, no. 6, pp. 429–439,Dec. 2002. [13]J. J. Garcia-Luna-Aceves and E. L. Madruga, ―Core-assisted mesh protocol,‖ IEEE J. Select. Areas Commun., vol. 17, no. 8, pp. 1380–1394, 1999. [14]M. Gerla, S. J. Lee, and W. Su, ―On-demand multicast routing protocol(ODMRP) for ad-hoc networks,‖ Internet draft, draft-ietf-manet-odmrp-02.txt, 2000. [15]L. Ji and M. S. Corson, ―A lightweight adaptive multicast algorithm,‖in Proc. IEEE GLOBECOM, 1998, pp. 1036–1042. [16]K. Chen and K. Nahrstedt, ―Effective location-guided tree construction algorithms for small group multicast in MANET,‖ in Proc. IEEEINFOCOM, 2002, vol. 3, pp. 1180–1189. [17]L. Ji and M. S. Corson, ―Differential destination multicast-A MANET multicast routing protocol for small groups,‖ in Proc. IEEE INFOCOM,2001, vol. 2, pp. 1192–1201. [18]L. Li and C. Li, ―A hierarchical QoS multicast routing protocol for mobile ad-hoc networks,‖ Chinese J. Electronics, vol. 15, no. 4, pp.573–577, Oct. 2006. [19]M. Kumar, V. Senthil, C. Venkatesh, and A. M. Natarajan, ―Performance comparison of multicast protocol for physically hierarchical ad-hoc networks using neural concepts,‖ ICSP, vol. 2, pp. 1581–1584, 2004. [20]H. Ammari, El-Rewini, and Hesham, ―A multicast protocol for mobile ad-hoc networks using location information,‖ ASWN, pp. 174–183, 2004. [21]R. Friedman and G. Kliot, ―Location services in wireless ad-hoc and hybrid networks: A survey,‖ Department ofComputer Science, Technion, Haifa, Israel, no. 4, pp. 1–15, Apr. 2006. [22]L. A. Latiff, A. Ali, and C.-C. Ooi, ―Location-based geocasting and forwarding (LGF) routing protocol in mobile ad-hoc network,―AICT/SAPIR/ELETE, pp. 536–541, 2005. [23]M. Transier, H. Fussler, and J. Widmer, et al., ―A hierarchical approach to position-based multicast for mobile ad- hoc networks,‖ Wireless Networks,vol. 13, no. 4, pp. 447–460, Aug. 2007. [24]L. Canourgues, J. Lephay, and Soyer, et al., ―STAMP: Shared-tree adhoc multicast protocol,‖ in Proc. IEEE MILCOM, Oct. 2006, pp. 1–7. [25]B. Kaliaperumal, A. Ebenezer, and Jeyakumar, ―Adaptive core-based scalable multicasting networks,‖ in Proc. IEEE INDICON, Dec. 2005, pp. 198–202. [26]H. Dhillon and H. Q. Ngo, ―CQMP: A mesh-based multicast routing protocol with consolidated query packets,‖ inProc. IEEE WCNC, 2005, vol. 4, pp. 2168–2174. [27]Y. O. Soon, J.-S. Park, and M. Gerla, ―E-ODMRP: Enhanced ODMRP with motion adaptive refresh,‖ in Proc. ISWCS, 2005, pp. 130–134. [28]E. R. Inn Inn and W. K. Seah, ―Distributed steiner-like multicast path setup for mesh-based multicast routing in ad- hoc networks,‖ IEEE TIME, pp. 192–197. [29]J. Biswas, M. Barai, and S. K. Nandy, ―Efficient hybrid multicast routing protocol for ad-hoc wireless networks,‖IEEE LCN, pp. 180–187, Nov.2004. [30]L. Layuan and L. Chunlin, ―A QoS multicast routing protocol for clustering mobile ad-hoc networks,‖ Computer Communications, vol. 30, no. 7, pp. 1–13. [31]L. Jiageng, D. Cordes, and J. Zhang, ―Power-aware routing protocols in ad-hoc wireless networks,‖ IEEE Wireless Commun., vol. 12, no. 6, pp.69–81, Dec. 2005. [32]W. Cheng, C. Wen, and K. Feng, ―Power-controlled hybrid multicast routing protocol for mobile ad-hoc networks,‖ in Proc. IEEE VTC, 2006,vol. 3, pp. 1087–1091. [33]M. X. Cheng and J. Sun, et al., ―Energy-efficient broadcast and multicast routing in multi-hop ad-hoc wireless networks‖ Wireless Communications and Mobile Computing, vol. 6, no. 2, pp. 213–223, Mar. 2006. [34]A. Davidian, ―Network coding: An overview,‖ Institute for Communications Engineering (LNT), vol. 13, no. 7 pp. 1–19, Jan. 2005. [35]D. S. Lun, Ahmed, and Ebad, et al., ―Network coding for wireless applications,‖ in Proc. SPIE, 2005, pp. 258–260. [36]Y. C. Wu, A. Philip and S.-Y. Kung, ―Minimum-energy multicast in mobile ad-hoc networks using network coding,‖ IEEE Trans. Commun.,vol. 53, no. 11, pp. 1906–1918, Nov. 2005. [37]B. Sun and L. Li, ―Reliable adaptive multicast protocol in wireless adhoc networks,‖ J. Systems Engineering Electronics, vol. 17, no. 1, pp.187–192, Mar. 2006.Ravi et al., International Journal of Advanced Research in Computer Science and Software Engineering 3(9), September - 2013, pp. 856-862 [38]N.-C. Wang and S.-W. Chang, ―A reliable on-demand routing protocol for mobile ad-hoc networks with mobility prediction,‖ Computer Commun.,vol. 29, no. 1, pp. 123–135, Dec. 2005. [39]R. Vaishampayan and J. J. Garcia-Luna-Aceves, ―Robust tree-based multicasting in ad-hoc networks performance,‖ in Proc. IEEE IPCCC, 2004, vol. 23, pp. 647–652. [40]L. K. Law, S. V. Krishnamurthy, and M. Faloutsos, ―A novel adaptive protocol for lightweight efficient multicasting in ad-hoc networks,‖ Computer Networks, vol. 1, no. 3, pp. 823–834, Feb. 2007. [41]A. B. Mnaouer, L. Chen, and C. H. Foh, et al., ―OPHMR: An optimized polymorphic hybrid multicast routing protocol for MANET,‖ IEEE Trans. Mobile Computing, vol. 6, no. 5, pp. 503–514, May 2007. [42]H. M. P. Shekhar, M. A. Arun Kumar, and K. S. Ramanatha, ―Mobile agents aided multicast routing in mobile ad- hoc networks,‖ in Proc.IEEE ICACT, 2005, vol. 2, pp. 765–770. [43]J. J. Y. Leu, M.-H. Tsai, and C. Tzu-Chiang, et al., ―Adaptive poweraware clustering and multicasting protocol for mobile ad-hoc networks,‖UIC, vol. 2006, pp. 331–340. [44]Y. Luo, J. Wang, and J. Chen, et al., ―Algorithm based on mobility prediction and probability for energy-efficient multicasting in ad-hoc networks‖ Computer Research and Development, vol. 43, no. 2, pp.231–237, Feb. 2006. [45]G. Song, V. Leung, and O. Yang, ―A distributed minimum energy multicast algorithm in MANETs,‖ in Proc. WoWMoM, vol. 2006, pp.134–140. [46] A. Ballardie, P. Francis, and J. Crowcroft, ―Core Based Trees (CBT): An Architecturefor Scalable Inter-Domain Multicast Routing,‖ Proc. ACM SIGCOMM’93, pages 85–95, October 1993. [47] S. Deering, C. Partridge and D.Waitzman, ―Distance Vector Multicast Routing Protocol,‖ RFC-1075, November, 1988.
Kamal, Dinesh Kumar, Kanishka Raheja "A Overview on Multicast Routing Protocols for Mobile Ad-Hoc Networks" International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.2 issue 11, pp.39-50 2013
The primary goal of this paper is an initiative approach for minimizing the uncertainty and potential loss associated with a software project. Another goal is to provide insights to support decisionmaking. The risk analysis and assessment is beneficial approach and often very important approach for corporate endeavors and smaller scale or very large scale projects development industry. Research paper can be reviews to analyses and assessments of risk in software development projects. It describes how to analyze and assessment of software risks on their projects. The risk management is very important for all software projects and so that the overall impression of different risks in design is minimized. Although the risk management is a best practice in the software development industry for reducing the surprising factor.
- Page(s): 51-60
- Date of Publication: November 2013
- T. BalajiAssistant professor, Dept. of Computer Science, Govt. Arts College, Melur - 625106, India
References
[1] L. Sarigiannidis and P. Chatzoglou, "Software Development Project Risk Management: A New Conceptual Framework," Journal of Software Engineering and Applications, Vol. 4 No. 5, 2012, pp. 293-305. [2] James Collofello, “Software Risk Management”, Arizona State University, 2012. [3] J. H. Iversen, L. Mathiassen and P. A. Nielsen, “Managing Risk in Software Process Improvement: An Action Research Approach,” MIS Quarterly, Vol. 58, No. 13, 2012, pp. 395-433. [4] Don Gotterbarn and Simon Rogerson, “Responsible Risk Analysis for Software Development”, Communications of the Association Systems vol. 75, pp 730-750, 2012. [5] Alex Down, Michael Coleman, Peter Absolon, “Risk Management for Software Projects”, London, McGraw-Hill Book Company, 2012. [6] Carnegie Mellon SEI, “Risk Management Overview”, 2011. [7] Geoffrey G. Roy and Terence L. Woodings, “A Framework for Risk Analysis in Software Engineering”, IEEE 2011. [8] Karl E. Wiegers, “Know Your Enemy: Software Risk Management”, Software Development Magazine, 2011. [9] [Gilb-88] Tom Gilb, “Principles of Software Engineering Management”, Wokingham, England: Addison-Wesley, 2011. [10] [Boehm-89] Barry W. Boehm, Tutorial: “Software Risk Management”, Les Alamitos, CA, IEEE Computer Society, 2011. [11] B. Boehm, “Software Risk Management”, IEEE CS Press, 2010. [12] Dale Karolak, “Software Engineering Risk Management: Finding Your Path Through the Jungle”, IEEE Computer Society. [13] Elaine Hall, “Managing Risk”, Addison Wesley Publications. [14] Roger L. Van Scoy, “Software Development Risk: Opportunity”, Software Engineering Institute, CMU/SEI-92-TR-30. [15] Software Risk Management Magazine (https://www.sei.cmu.edu) [16] Software Risk Management Resources (https://www.rdware.com)
T. Balaji "A Relative Performance Evaluation of Risk Analysis and Assessment Factor For Software Development Projects" International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.2 issue 11, pp.51-60 2013
Security over the years has been a source of concern to organizations and companies. This has caused quite a significant amount of capital being budgeted for improvements on security systems, simply because it has been discovered that the access control system mechanism is an important part of an organisation. One of the important security systems in building security is door access control. The door access control is a physical security that assures the security of a building by limiting access to the building to specific people and by keeping records of such entries With the emergence of smart cards, industry has become more interested in techniques to establish the correctness and security of the applications developed. Typical smart card applications like door locks, electronic purses and health care information holders contain privacy-sensitive data. This paper does not deal with security aspects like data leakage, but investigates functional behavior and possible abnormalities such as null pointer exceptions. Proper functional behavior and safety properties are a first step towards secure applications. This paper provides a general introduction to the state-of-the-art of formal methods for the development of safety-critical systems. The idea is to combine two program verification approaches: the functional verification at the source code level and the verification of high level properties on a formal model built from the program and its specification. For functional specification we have used PROMELA and for verification SPIN is used in this paper.
- Page(s): 61-65
- Date of Publication: November 2013
- Neha ChopraM. Tech* BMSCE Sri Mukatsar Sahib, Punajb, India
- Mamta GargM. Tech BMSCE Sri Mukatsar Sahib, Punajb, India
References
1.J-R. Abrial. The B-Book: Assigning Programs to Meanings. Cambridge University Press, 1996. 2.Fr´ed´eric Badeau and Arnaud Amelot. Using B as a High Level Programming Language in an Industrial Project: Roissy VAL. In ZB 2005: Formal Specification and Development in Z and B, number 3455 in Lecture Notes in Computer Science. Springer, 2005. 3.Patrick Behm, Paul Benoit, Alain Faivre, and Jean- MarcMeynadier. M´et´eor: A Successful Application of B in a Large Project. In Jeannett M. Wing, Jim Woodcock, and Jim Davies, editors, Proceedings of FM’99: World Congress onFormal Methods, Lecture Notes in Computer Science, pages 369– 387. Springer-Verlag, 1999. 4.Dines Bjørner. New Results and Current Trends in Formal Techniques for the Development of Software for Transportation Systems. In Proceedings of the Symposium on Formal Methods for Railway Operation and Control Systems (FORMS’2003), Budapest/Hungary. L’Harmattan Hongrie, May 15-16 2003. 5.Christel Baier and Joost-Pieter Katoen. Principles of Model Check- ing. The MIT Press, 2008. Special issue on the Mondex challenge. Formal Aspects of Comput- ing, 20(1), 2008. 6.John Fitzgerald and Peter Gorm Larsen. Modelling Systems – Prac- tical Tools and Techniques in Software Development. Cambridge University Press, The Edinburgh Building, Cambridge CB2 2RU, UK, Second edition, 2009. 7.S. Gerhart, D. Craigen, and T. Ralston. Observations on industrial practice using formal methods. In Proceedings of the 15th Inter- national Conference on Software Engineering, pages 24–34. IEEE Computer Society Press, April 1993. 8.Anne E. Haxthausen, Marie Le Bliguet, and Andreas A. Kjær. Modelling and Verification of Relay Interlocking Systems. In Christine Choppy and Oleg Sokolsky, editors, 15th Monterey Workshop: Foundations of Computer Software, Future Trends and Techniques for development, number 6028 in Lecture Notes in Computer Science. Springer, 2010. Invited paper. 9.Till Mossakowski, Anne Haxthausen, Donald Sannella, and Andrzej Tarlecki. Casl, the Common Algebraic Specification Language. In Logics of Specification Languages, EATCS. Springer, 2008. 10.Anne E. Haxthausen and Jan Peleska. Formal Development and Verification of a Distributed Railway Control System. IEEE Trans action on Software Engineering, 26(8):687–701, 2000. 11.S. Rajan, N. Shankar, and M. K. Srivas. An integration of model checking with automated proof checking. pages84–97. Springer- Verlag, 1995. 12.Jim Woodcock, Peter Gorm Larsen, Juan Bicarregui, and John Fitzgerald. Formal Methods: Practice and Experience. ACM Com puting Surveys, 41(4):1–36, October 2009. 13.L. Aertryck, L. Benveniste, D. Le Metayer, CASTING: A Formally Based Software Testing Generation Method, IEEE Computer Society, Nov. 1997. 14.M. Alberda, P. Hartel, E. de Jong, Using Formal Methods to Cultivate Trust in Smart Card Operating System, In Proceeding of CARDIS'96, pp. 111-132, Amsterdam, Netherlands, Sept. 1996. 15.P. Bieber , J. Cazin, V. Wiels, G. Zanon, P.Girard, J-L. Lanet, Electronic Purse Applet Certi_cation, inWorkshops on Secure
Neha Chopra, Mamta Garg "Formal Methods for the Development of Smart Card Security Applications" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 11, pp.61-65 2013
Many of the latest big data technologies are developed by big data startups from around the world that have found a way to deal with the vast amounts of data. They have developed disruptive big data technology that can be used by organizations to obtain valuable insights and turn data into information and wisdom. Of course, also the large existing IT players have developed substantial amounts of big data technology in the recent years. Especially large corporations that want an all-inclusive package installed use those technologies. There are also many different types of analysis that these startups perform and each will have a different impact or result. Some technologies integrate data from different sources directly into a platform, skipping the need for additional data warehousing, while being able to deliver real-time interactive charts that are easy to interact with or to understand. These PaaS (Platform as a service) or DaaS (Data as a Service) solutions allow end-users to work with the data without requiring technical knowledge. There is unanimous agreement that big data is revolutionizing commerce in the 21st century. When it comes to business, big data offers unprecedented insight, improved decision-making and untapped sources of profit. Sometimes, ad hoc tools and applications are the best solution, especially when the objective is to provide information for very specific requirements.
- Page(s): 66-71
- Date of Publication: November 2013
- Dinesh Kumar Assistant Professor, MDU Rohtak, India
- KamalAssistant Professor, MDU Rohtak, India
- Kanishka Raheja M.Tech Scholar, MDU Rohtak, India
References
1. White, Tom (10 May 2012). Hadoop: The Definitive Guide. O'Reilly Media. p. 3. ISBN 978-1-4493-3877-0. 2. "Data, data everywhere". The Economist. 25 February 2010. Retrieved 9 December 2012. 3. "IBM What is big data? — Bringing big data to the enterprise". www.ibm.com. Retrieved 2013-08-26. 4. "Big Data Definition". MIKE2.0. Retrieved 9 March 2013. 5. Bernhard Warner (April 25, 2013). "'Big Data' Researchers Turn to Google to Beat the Markets". Bloomberg Businessweek. Retrieved August 9, 2013. 6. Kalil, Tom. "Big Data is a Big Deal". White House. Retrieved 26 September 2012. 7. Kusnetzky, Dan. "What is "Big Data?"". ZDNet. 8. Hellerstein, Joe (9 November 2008). "Parallel Programming in the Age of Big Data". Gigaom Blog.
Dinesh Kumar, Kamal, Kanishka Raheja "An Outline Of Big Data Tools & Technologies" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 11, pp.66-71 2013
Different types of pre-employment screening have always been part of the hiring process. Organizations have conducted background checks, contacted references, and met with applicants during the screening and interview process. Today, however, more and more organizations, large, medium, and small, are trying to find ways in which to reduce employee turnover rates in search of the absolute best qualified candidates. This means stepping-up the pre-employment screening process.
- Page(s): 72-76
- Date of Publication: November 2013
- Dr. Trilok Kumar JainDean, ISBM,Suresh Gyan Vihar University, Jaipur, Rajasthan, India
- Nidhi Malhan PHD Scholar JJT University, Rajasthan, India
- Rinku Singhal St .Kabir Institute of Professional Studies, Ahmedabad, Gujrat, India
References
1. Vanessa A. de la Llama, Isabel Trueba, Carola Voges, Claudia Barreto and David J. Park. At Face(book) value: uses of Facebook in hiring processes and the role of identity in social networks. Int. J. Work Innovation, 2012, 1, 114-136 2. The Ethics of Pre-Employment Screening Through the Use of the InternetMichael Jones, Adam Schuckman, Kelly Watson 3. Mary Kay R. Krupa , Viterbo University ,Dahl School of Business, May 2011, Pre-Employment Screening: How Businesses are Utilizing Social Networking Sites to Screen Applicants 4. Susan J. Stabilet, THE USE OF PERSONALITY TESTS AS A HIRINGTOOL: IS THE BENEFIT WORTH THE COST?,pg.279-313 5. Beth E.H. Lory, Employer Use of Facebook as a Tool in Pre-Employment Screening of Applicants 6. Benefits and Ethical, Legal, and Privacy Implications, St. Catherine University St. Paul, Minnesota,May 3, 2011
Dr. Trilok Kumar Jain, Nidhi Malhan, Rinku Singhal "New Screening Methods Getting Use to Get More Applicant " International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 11, pp.72-76 2013
Electricity generation by wind is eco-friendly, cheap and hence the best option over conventional power generation system. Induction generator is preferred in wind power generation but has synchronization issues hence its performance analysis is essential. This paper deals with voltage stability of Squirrel cage induction generator in wind power generation. Analysis of voltage stability is made for steady state and fault condition. STATCOM is connected at load bus to improve voltage stability. Simulation is carried out in MATLAB environment assuming constant wind velocity and load. Analysis is also made for power flow.
- Page(s): 77-81
- Date of Publication: November 2013
- K.B. PorateAssistant Professor, Department of Electrical Engineering, Priyadarshini College of Engineering, Nagpur, India.
- N. S. Urkude Assistant Professor, Department of Electrical Engineering, Rajiv Gandhi College Engineering and Research, Nagpur, India.
- R. A. Gathe Assistant Professor, Department of Electrical Engineering, Rajiv Gandhi College Engineering and Research, Nagpur, India.
References
[1] Chen Z, Y. Hu and F. Blaabjerg,“Stability improvement of induction generator based wind turbine system”, Transaction of IET-Renewable power generation, vol.1 (1), pp. 81-93, March 2007. [2] Omar Noureldeen,“ Low Voltage Ride through Strategies for SCIG Wind Turbines Interconnected Grid”, International Journal of Electrical & Computer Sciences IJECS-IJENS, vol.11(2) ,pp. 59-64, April 2011. [3] Z. Saad-Saoud, M.L. Lisboa, J . B. Ekanayake, N. Jenkins, G. Strbac, “Application of STATCOMs to wind farms”, Transaction of IET-IEE proceedings-Generation, Transmission and Distribution, vol.145(5), pp. 511-516, Sept 1998. [4] M.Mohammadha Hussaini and Dr. R. Anita, “Dynamic response of wind power generators using STATCOM”, Transaction on International conference of advance in recent technology in communication and computing, vol.2 (4), pp. 297-304, Oct 2010. [5] Nedzmija Demirovic, Sejid Tesnjak “Dynamic analysis of wind farm using induction Generator wind turbines” 14th International Research/Expert Conference”Trends in the Development of Machinery and Associated Technology” September 2010. [6] A.Praveen Varma, k. Bala Chakri: Study of grid connected induction generator for wind power applications, Thesis, 2012. [7] M.Chiranjeevi, O.Venkatanatha Reddy, “A BESS-STATCOM Based Control Scheme for Grid Connected Wind Energy System for Power Quality Improvement”, International Journal of Engineering Research and Applications, Vol. 2, Issue 2, pp.1224-1228, Mar-Apr 2012. [8] JBVSubrahmanyam,Ch.Srikanth,S.RadhaKrishna Reddy, Ch.Kamal, GR.Shalini, “Dynamic Stability Improvement of an Integrated Grid Connected Offshore Wind Farm and Marine Current Farm Using a STATCOM”, International Journal of Engineering and Technology, Volume 2, no. 5, pp. 818-828, May 2012. [9] Muyeen, S.M, Ali R.Takahashi, T.Murata and J.Tamura,“Wind generator output power smoothing and terminal voltage regulation by using STATCOM/ESS”, IEEE transaction on power tech, pp. 1232-1237, July 2007. [10] Y. Hu, Z. Chen, “Study of Induction Generator based Wind Turbine Systems”, The International Conference on Electrical Engineering 2009, 5-9 July, 2009Shenyang, China.
K.B. Porate, N. S. Urkude and R. A. Gathe "Performance Analysis of Squirrel Cage Induction Generator using STATCOM" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 11, pp.77-81 2013
Underwater sensor networks stems from the potential to use long term sensing devices to monitor the large mass of oceans on the planet . To accomplish this, the sensor nodes must have the ability to self- configure the communication network and provide energy-efficient data transmission. To this end, researchers have began devising MAC-layer protocols that minimize energy consumption for data transmission. Simulation results have demonstrated that information-directed routing is a significant improvement over a previously research as measured by sensing quality such as localization, tracking accuracy and using Ad hoc network communication quality such as success rate in routing around sensor nodes.
- Page(s): 82-87
- Date of Publication: November 2013
- Scholar P.G.KulurkarM.Tech, CSE Dept., SIRT, Bhopal(MP), India
- Prof.Rajesh K.ShuklaProfessor, CSE Dept., SIRT, Bhopal(MP), India
References
[1] Zaihan Jiang, Underwater Acoustic Networks - Issues and Solutions, International journal of intelligent control and systems, VOL. 13, NO. 3, SEPTEMBER 2008, 152-161 [2] Vaishali Sahu , Gaurav Sharma, Rajeev Paulus Study of Performance Variation of AODV Routing Protocol for Various Parameter Patterns using Qualnet Simulator,vol- 02,sept-2012 [3] Lanbo Liu, Shengli Zhou, and Jun-Hong Cui Prospects and Problems of Wireless Communication for Underwater Sensor Networks, WILEY WCMC SPECIAL ISSUE ON UNDERWATER SENSOR NETWORKS (INVITED),pp.977- 994 July 2008 [4] S. Roy, T. M. Duman, V. McDonald, and J. G. Proakis,High rate communication for underwater acoustic channels using multiple transmitters and space-time coding: Receiver structures and experimental results, IEEE Journal of Oceanic Engineering, vol. 32, no. 3, pp. 663-688, Jul. 2007. [5]B. Peleato and M. Stojanovic, A Channel Sharing Scheme for Underwater Cellular Networks, in IEEE Oceans' 07, Aberdeen, Scotland, 2007. [6] M. Stojanovic, Frequency reuse underwater: capacity of an acoustic cellular network, In Proceedings of the second workshop on Underwater networks Montreal, Quebec, Canada: ACM, 2007. [7] Akkaya K. and Younis M., A Survey on Routing Protocols for Wireless Sensor Networks, Ad Hoc Networks (Elsevier), vol. 3, pp. 325-349, May 2005. [8]https://en.wikipedia.org/wiki/OSI_model_Layer_7_Applicatio n_ layer, September, 2008. [9] M. Abolhasan, T. Wysocki, and E. Dutkiewicz, “A review of routing protocols for mobile ad hoc networks," Ad Hoc Netw. (Elsevier), vol. 2, pp. 1-22, Jan. 2004. [10] K. Akkaya and M. Younis, “A survey on routing protocols for wireless sensor networks," Ad Hoc Netw. (Elsevier), vol. 3, no. 3, pp. 325-349, May 2005. [11] A. P. Dolc and M. Stojanovic, Optimizing the Transmission Range in an Acoustic Underwater Network, In OCEANS'07, Vancouver, Canada, 2007. [12]F. Salva-Garau and M. Stojanovic, Multi-cluster Protocol for Ad Hoc Mobile Underwater Acoustic Networks, In Proceedings of MTS/IEEE OCEANS. San Francisco, CA, Sep. 2003. [13]. I. F. Akyildiz, D. Pompili, and T. Melodia, Underwater acoustic sensor networks: Research challenges, Ad Hoc Networks, pp. 257-279, 2005.www.ijltemas.in [14] I. F. Akyildiz, D. Pompili, and T. Melodia, Underwateracoustic sensor networks: Research challenges, Ad Hoc Networks, pp. 257-279, 2005. [15] D.Damodahran and P.Sivakumar International Journal of Computer Applications (0975 - 8887) Volume 68- No.4, April 2013 [16] Vaishali Sahu and Rajeev Paulus International Journal of Computer Applications (0975 - 8887) Volume 54- No.6, September 2012 [17] M. S. Corson and A. Ephremides A Distributed Routing Algorithm for Mobile Wireless Networks, ACM J Wireless Networks(1,)1. Jan1995 [18] D.Johnson and D. Maltz. Dynamic source routing in ad_hoc wireless networks, In Computer Communications Review -Proceedings of SIGCOMM Aug 1996 [19] Manjula.R.B, Sunilkumar S. Manvi Issues inUnderwater Acoustic Sensor Networks- International Journal of Computer and Electrical Engineering, Vol.3, No.1,February, 2011 1793-8163
Scholar P.G.Kulurkar, Prof.Rajesh K.Shukla "Time Synchronization in Underwater Sensor Networks Using AODV Routing" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 11, pp.82-87 2013
This paper applicable for improving power quality by regulation of voltage and frequency of an isolated Pico-hydropower generation. Based on a capacitor excited asynchronous generator and feeding linear load and electronic load controller. The electronic load controller based on a three phase uncontrolled diode bridge rectifier with a chopper and an auxiliary load. The 24 pulse ac-dc converter is designed and developed for harmonic current reduction to meet the power quality requirements. The complete electromechanical system is modeled and simulated in MATLAB using Simulink and simpower system block set. The simulated results are presented and compared with conventional 6-pulse and 12 pulse and 18 pulse to demonstrate the capability of the electronic load controller for regulating voltage and frequency of an isolated asynchronous generator driven by uncontrolled Pico-hydro turbine.
- Page(s): 88-97
- Date of Publication: November 2013
- Mr. Y.R.Ikhe
- Mr. S.M.Apte
- Mr. R. S. Somalwar
References
[1]. O. Ojo, O. Omozusi, and A. A. Jimoh, ―The operation of an inverter assisted single phase induction generator,‖ IEEE Trans. Ind. Electron., vol. 47, no. 3, pp. 632–640, Jun. 2000. [2]. D. Henderson, ―An advanced electronic load governor for control of micro hydroelectric generation,‖ IEEE Trans. Energy Converse.,vol. 13, no. 3, pp. 300–304, Sep. 1998. [3] R. C. Bansal, ―Three phase isolated asynchronous generators: An overview,‖ IEEE Trans. Energy Convers., vol. 20, no. 2, pp. 292– 299, Jun. 2005. [4]. N. P. A. Smith, ―Induction generators for stand-alone micro-hydro systems,‖ in Proc. IEEE Int. Conf. Power Electron. Drive Energy Syst. Ind. Growth. New Delhi, India, 1996, pp. 669–673 [5]. S. S. Murthy, B. Singh, S. Gupta, A. kulkarni, and R. Sivarajan, ―Water,IEEE Guide for Harmonic Control and Reactive Compensation of Static Power Converters, IEEE Standard 519-1992.
Mr. Y.R.Ikhe, Mr. S.M.Apte, Mr. R. S. Somalwar "Power Quality Improvement by using ELC in an Isolated Hydropower generation" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 11, pp.88-97 2013