Volume 4, Issue 9, September 2013 Edition


IJSER Research Group https://www.ijser.org/forum/index.php Register for IJSER Research Forum      IJSER Xplore IJSER Xplore Research Paper Database

Pages   [1] [2] [3] [4] [5] [6] [7]
 



The role and the application of cryptography in the realization of electronic transactions in m-banking[ ]


Banking systems are one of the most complex systems in the field of information technology, where besides their functionality, speed, optimization and auditing, it is required a high level of security. This is expressed more in situations where the interaction with customers is obligatory, such as balance check, checking the executed invoices, etc. In this way, data security ensures privacy and the protection of personal data. Frequently, data is exposed to a threat by users who are not supposed to be. In this article we will explain the cryptography role in mobile banking by analyzing the enhancement of security in electronic transactions execution through cell phones. Further, we propose an idea for implementing new application using authentication parameters, such as, username and password, and an additional parameter of SIM card, where the encryption and decryption of messages takes place.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Single Phase Shunt Active Filter with Fuzzy Controller for Harmonic Mitigation[ ]


This paper presents a single phase shunt active filter with fuzzy controller for harmonic mitigation .Shunt active filter is an efficient method for reducing harmonic content in power system. Instantaneous pq theory is used for the generation of reference controller signal and hysteresis controller is used for the production of gate signal. In this paper a comparative assessment of the performance of the conventional PI controller and fuzzy controller for harmonic mitigation is presented. Multilevel inverters are also discussed for harmonic mitigation. The simulation results show that the proposed fuzzy controller can give superior results with lower THD when compared to the PI controller. The results also validate that as the number of inverter level increases, the performance gets improved.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Ethnobotanical Usages of Grasses in Central Punjab-Pakistan[ ]


Poaceae (Gramineae) constitutes the second largest family of monocotyledons, having great diversity and performs an important role in the lives of both man and animals. The present study was carried out in eight districts (viz., Pakpattan, Vehari, Lahore, Nankana Sahib, Faisalabad, Sahiwal, Narowal and Sialkot) of Central Punjab. The area possesses quite rich traditional background which was exploited to get information about ethnobotanical usage of grasses. The ethnobotanical data on the various traditional uses of the grasses was collected using a semi- structured questionnaire. A total of 51 species of grasses belonging to 46 genera were recorded from the area. Almost all grasses were used as fodder, 15% were used for medicinal purposes in the area like for fever, stomach problems, respiratory tract infections, high blood pressure etc., 06% for roof thatching and animal living places, 63% for other purposes like making huts, chicks, brooms, baskets, ladders stabilization of sand dunes.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Real Time Routing Protocol for Detection of Time Critical Events in Wireless Sensor Networks[ ]


Many applications of Wireless Sensor Network (WSN) are designed for vital event monitoring and to ensure timeliness and reliability for the measured environmental values. The communication protocol needs to prioritize the real time data and ensure the timely delivery of the data to the sink node. In this paper, a routing protocol for WSN has been proposed with congestion and delay aware mode to realize a highly reliable information delivery with timeliness to the sink. In case of occurrence of congestion, it is mitigated by data rate adjustment. The effectiveness of the proposed protocol depends upon how successfully the management packets are delivered, which carries the vital congestion and delay information. A simulation is conducted to investigate the result of the proposed protocol. The results of the proposed protocol have been compared with the similar known technique.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Optimization study design of a reinforced concrete building in the seismic critical region in Morocco[ ]


Earthquakes are a natural geological activity. They cause major destruction. The acquire means prevention is required to mitigate their adverse effects and impacts on humanity. One of these ways is the new generation of seismic codes including RPS 2011 in Morocco used to size the new structures and verify the vulnerability of existing action against earthquakes constructions. This paper focuses on the discovery of the economic impact of the new progress of Moroccan seismic regulations, using data acceleration and speed according to the seismic response spectrum in the two most critical areas of Morocco: Rif and Tanger regions. In recent years, these two areas have a very important step in the real estate sector, which in case of poor convergence of good design can be seriously affected and cause great losses.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Agile and Traditional Requirements Engineering: A Survey[ ]


In the past few years, there has been an increasing awareness of the important role of requirements engineering (RE) in a project’s success, in both research and industry. Developing consistent requirements specifications that meet the customers’ needs, in traditional development, is likely to be infeasible. For one reason, customers do not usually have a clear picture of what they really want. Secondly, the business domain could be changing quickly, especially if it heavily depends on technologies. Agile software development (ASD), on the other hand, supports iterative and incremental development and emphasises customers’ involvement in the development process. We argue that adopting ASD in RE overcomes the limitations of the traditional development. ASD, however, is no silver bullet and its adoption comes at a price. This paper helps the reader to: (1) get a quick yet a comprehensive grasp of RE in traditional and ASD; (2) understand the synergies/commonalities between the two approaches in handling RE; (3) recognise the associated challenges of adopting ASD; and (4) identify the current prominent agile RE research areas.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Microarray Analysis and In silico Drug Designing for Inhibition of Survivin Expression for Treatment of Colon Cancer[ ]


Colon cancer is the most common malignancy and the leading cause of cancer related death worldwide. Recent microarray data in the public database demonstrate significant gene expression and epigenetic alterations in tumor conditions. The present study aims at identifying a potential therapeutic target for colon cancer through microarray data analysis and suggests promising leads which could be developed as drugs. To obtain a significant target, a complete list of differentially expressed genes was derived by statistical analysis of colon cancer against normal gene expression data. Using computational network biology approach, a network of all significant genes was built and analyzed on the basis of association of the nodes with cancer pathways. On analysis of nodes predominantly associated with colon cancer pathways, NCI cancer gene index annotation, Survivin was identified as a potential target. Using structure based virtual screening approach two promising leads were identified for Survivin with appreciable docking scores favorable energies.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Impact of Reconfiguration of an electrical Distribution Network on Online Losses[ ]


The reduction of on-line losses constitutes one of major concerns of the managers of the electrical distribution networks today, be-cause these losses take part in the large financial losses recorded by those and several solutions are considered within this framework for their minimization. The authors of this article choose the reconfiguration of the distribution network of the Beninese Company of Electrical energy (SBEE) by moving the switches open on the network. The method exploited by the authors is the topological optimization which requires the topological model of all the elements of the network. Their electric model made it possible to the authors progressively to calculate the load flow in the network. The use of software NEPLAN made it possible to the authors to appreciate the measurement of the impact of this reconfiguration on the network of SBEE.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Multi - Stage Retrial Queueing System With Bernoulli Feedback[ ]


An M/G/1 retrial queueing system with k stages of heterogeneous services and feedback is considered. Primary customers get into the system according to Poisson process. If the server is free, an arriving customer receives first stage service immediately otherwise, he enters a retrial orbit. After the completion of the first stage, the customer may proceed to second stage with probability θ1, or feedback to the retrial group with probability p1 or depart the system with probability 1 - θ1 - p1 = q1. In general, after the completion of the ith,( i = 1, 2, . . . k-1 ) stage, the customer may opt (i+1)th stage with probability θi, or feedback to the retrial group with probability pi or depart the system with probability 1 - θi - pi = qi. The customer in final stage will feedback to the retrial group with probability pk or depart the system with probability 1 - pk = qk. It is assumed that the service times and the retrial times are arbitrarily distributed. The condition under which the steady state exists is investigated. Performance measures are obtained. A stochastic decomposition is presented.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Predicting EFL Learners’ Emotional Intelligence and Critical Thinking Ability through Big-Five Personality Traits: A Study on Psychological Characteristics of EFL Learners[ ]


This study investigates the relationship among EFL learners’ Big-Five personality traits, emotional intelligence (EI), and critical thinking (CT). A group of 211 male and female EFL university students were randomly selected and given three questionnaires: The NEO-FFI, Bar-On Emotional Quotient Inventory, and Peter Honey critical thinking appraisal. Analysis of the results showed that, there was a significant relationship between students’ personality traits with their EI and CT skills. Multiple regressions revealed that Conscientiousness predicted 4 percent of CT, Openness to Experience predicted 7.2 percent, and finally, Neuroticism predicted 9.8 percent of CT. Regarding EI, Neuroticism predicted 40 percent of EI; conscientiousness predicted 48 percent, extroversion predicted 50 percent, and finally Openness to Experience predicted 51.8 percent of EI. Thus, it can be concluded that five-factor personality traits can have predictive role in fostering EI and CT of EFL learners.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Modeling and Simulation of a time series Forecasting Models and Analysis in a Manufacturing Industry[ ]


This work was used to address the problem of predicting precisely the optimum production plastic yield on there monthly products in Finoplastika manufacturing industry. Data on production yield were collected from the industry covering a period of three years and were applied to precisely determine optimum production yield in the industry. The model was developed based on there historical data. The model was generated using a simulating programme and a tool known as Matlab tool. The model was therefore used to suggest optimum monthly production output for different product types investigated. This will prevent the incident of under producing or over producing as identified.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Comparision Of Standardize Precipitation Index With Different Time Scales In Bangladesh[ ]


Drought, which is the major issues of today’s world have several inverse impacts on economy, society and ecology. The severity of the drought is related to main usage of water and can be expressed in different indexes. These indexes could give different information for the drought analysis and one of them is the Standardized Precipitation Index (SPI).The SPI is the most widely used drought index to provide good estimations about the intensity, enormity and spatial scope of droughts. In this study, the analysis of drought events has been carried out by applying the SPI. The daily rainfall data of 34 different rain gauge stations from different locations of Bangladesh have been selected for the SPI analysis. The data ranges are varied from the year 1948 to 2007. Total monthly rainfalls for all stations are calculated from the daily rainfall data. From monthly precipitation data, the SPI is calculated by using the software ‘SPI_SL_6’ of National Drought Mitigation Center, Zimbabwe for different time scales. Based on the SPI values, the intensity of drought category is estimated for total data and two periods (1968~1987 and 1988~2007) in different locations of Bangladesh. The investigation has been carried out for diverse cumulative months as 3, 6, 9, 12 and 24. SPI patterns were found to be changed due to change of time scales for available rainfall data. It is observed that with increasing the time scales, the numbers of fluctuating cycles are decreased but the duration of each fluctuating cycle is increased. The numbers of drought events were found higher for mild drought, and the drought numbers were gradually decreased with the severity. The least number of droughts were found to be occurred in extreme category. With decreasing the SPI time scales, the difference in number of drought events between two periods are decreased. The mild and moderate droughts have been increased from period 1 (1968~1987) to period 2 (1988~2007) but extreme droughts are decreased. The total numbers of drought events have been increased in period 2 compared to period 1 in different locations of Bangladesh. It is found that in a station where 30 years rainfall data is not available, 20 years rainfall data can be used for calculating the SPI values to characterize a drought.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Responses of Maize (Zea mays L.) Genotypes to Brackish Water at Seedling Stage[ ]


Seedling growth and ion content of different maize genotypes was assessed at solution culture at different concentration of brackish water to determine their tolerance ability. Growth was recorded as shoot fresh / dry weight, root fresh / dry weight, root / shoot length and leaf analyses for major inorganic ions (Na+, K+ & Cl-). Results showed reduction in growth parameters in all treatments but it was greater in T5 which contain combination of highest EC, SAR and RSC. The concentration of sodium and chloride ions in leaf sap increased while that of potassium decreased under brackish water salinity as compared to fit water. Among genotypes Sahiwal-02 and Akbar restricted the uptake of Na+ and preferred K+ uptake and thus maintained high K+: Na+ ratio and performed better in all types of brackish water.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Query Execution and Effect of Compression on NoSQL Column Oriented Data-store Using Hadoop and Hbase[ ]


Column oriented data-stores has all values of a single column stored as a row followed by all values of the next column. Such way of storing records helps in data compression since values of the same column are of the similar type and may repeat. Intend of the paper is to see and analysize the effect of compression on NoSQL column oriented data-store. To perform this work, HBase - a Hadoop database was chosen. It is one of the most prominent NoSQL column oriented datastore and is being used by big companies like Facebook. Effect of compression and analysis has been performed with three compression codecs, Snappy, LZO and GZIP using only human readable text data. Hadoop Map Reduce framework has been used for loading the bulk data. Performance evaluation on compressed and uncompressed tables has been done by executing queries using advanced HBase API. Results shows that using compression in NoSQL column oriented data-store like HBase increases the performance of the system overall. Snappy performs consistently well in saving CPU and network and memory usage. Second runner up is LZO. Whereas GZIP is not optimal choice where speed and memory usage is main concern but can work perfectly well where size disk space is a constraint.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Groundwater Salinity/Sodicity Impact on Soil Characteristics and Crops of Wheat and Maize[ ]


A field experiment was conducted to study the effect of brackish water on plant growth and yield of wheat and maize genotypes at the farmer field. Two salt tolerant genotypes for each crop were selected from previous hydroponic and lysimeter studies. Wheat-maize cropping system was followed using tubewell brackish water alone and with chemical (gypsum) and organic (FYM) amendments. The results revealed that treatments have significant effect on all growth and yield parameters and follow the trend of T1>T4 >T5 > T2 >T3. Maximum reduction in wheat grain and maize fodder yield observed in T3 where high EC, SAR and RSC water was applied that was 39&57% for 1st year and 89 & 74% for 2nd year respectively. Data revealed that use of gypsum and FYM along with brackish water improve the wheat grain yield and maize fodder as compared to T3. More adverse effect of brackish water was observed in clay texture as compared to others. Among genotypes SARC-1 and Sahiwal-2002 performed better in all treatments and textures especially under brackish water treatments.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Wi-Fi Location Tracker System[ ]


The purpose of this paper is to create a platform independent, software-only, indoor geolocation solution. System utilizes the existing 802.11b Wireless Local Area Network infrastructure without using the GPS or proprietary tags. System is design using object-oriented techniques and implemented in Java with platform independent modules clearly abstracted. The project illustrates a simple path and location tracking system within an organization based on its available infrastructure of Wi-Fi networks. The location tracking algorithm compares runtime signal strength values of mobile device to pre-recorded cali-bration values that provide an approximate determination of the location in the service area and by using the histories of access points used by mobile device system provide moved path of the mobile device, and is also able to track multiple

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Variation of OPC-Rice Husk Ash-Saw Dust Ash Composites Strength under Prolonged Curing[ ]


This work investigated the variation of OPC-Rice Husk Ash (RHA)-Saw Dust Ash (SDA) composites strength under prolonged curing. 165 concrete cubes, 165 sandcrete cubes, and 165 soilcrete cubes of 150mm x 150mm x 150mm were produced at percentage OPC replacement with RHA-SDA of 0% (control), 5%, 10%, 15%, and 20% and crushed to obtain their compressive strengths at 3, 7, 14, 21, 28, 50, 90, 120, 150, 180, and 210 days of curing. The compressive strength values of the OPC-RHA-SDA ternary blended cement composites at all percentage replacement of OPC with RHA-SDA were much lower than the control values at 3-21 days. For concrete, the control strength values rose to 23.50N/mm2 at 28 days and 30.50N/mm2 at 210 days. The strength values for 10% and 15% replacement of OPC with RHA-SDA were respectively 22.50N/mm2 and 20.80N/mm2 at 28 days and 31.50N/mm2 and 30.60N/mm2 at 210 days. Thus, whereas the control concrete attained 130% of its 28-day strength at 210 days, 10% OPC replacement with RHA-SDA attained 140% of its 28-day strength at 210 days and 15% OPC replacement with RHA-SDA attained 147% of its 28-day strength at 210 days. Sandcrete and soilcrete strength variations were similar to but more pronounced than that of concrete. The continued more rapid increase in strength of OPC-RHA-SDA composites compared to purely OPC composites between 28 and 210 days suggests that OPC-RHA-SDA ternary blended cement structural members could be designed using some suitably higher strength values than the 28-day strength if they would not be fully loaded for some reasonable period after construction.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Microbiological and physico-chemical quality of groundwater from artisanal sites of mining exploitation in the South-West of Côte d’Ivoire: case of the area of Hiré[ ]


Artisanal mining exploitation has direct or indirect effects on the chemical composition of groundwater of the area of Hiré. Then, the quality of groundwater is rapidly due to natural processes, and anthropogenic activities. The objective of this study was to analyze the groundwater quality of boreholes of Hiré on the basis of physico-chemical and microbiological parameters. 12 samples of boreholes were sampled for this study. The samples were analyzed in-situ for pH, Temperature (T), Dissolved Oxygen (DO), Total dissolved solids (TDS), Electrical Conductivity (EC), salinity (Sal.), Oxydo-reduction (Eh) and Turbidity were done with calibrated portable field meters (multi-meter HACH). Major ions such as Na+, Ca2+, K+, SO42-, NO3-, Cl- etc were analyzed using ion-chromatography, and Atomic Absorption spectrometer. Samples of these boreholes were collected and measured for the total chromium, cobalt, copper, cadmium tin, and lead by Atomic Absorption spectrometer. The results showed that the groundwater in the study area are fresh and low in TDS (127-434 mg/L) and generally mildly acidic to alkaline (pH 6.25-8.10). The groundwater quality of the study area is suitable for domestic purposes, since most of the parameters measured were within the WHO recommended values for drinking water. However microbiological parameters (Escherichia coli and total coliforms) showed an elevated concentration in most of the samples. That pollution came from anthropogenic activities like artisanal mining exploitation. The Piper diagram shows one major water type namely Ca-Cl and is moderately mineralized.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Survey on Routing Requirements of IPv6 based Low Power and Lossy Network Applications[ ]


Class of networks made up of many embedded devices in which links between nodes are unstable and also have limited power, memory and processing resources are called as Low Power and Lossy Networks (LLNs).Routing over LLNs is one of the greatest challenges of current technology.IPv6 has become the standard for LLNs. Protocol like RPL has specifically been designed for IPv6 based LLNs. In this paper we present a survey on routing requirements of IPv6 based Low Power and Lossy Network applications such as Urban routing, Home automation routing, Building automation routing and Industrial routing.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Optimization of Operational parameters for Enhancement of Oil Recovery from Mustard Seeds Using Mechanical Expression[ ]


The experiments were carried out with the objectives to determine the various operational parameters for better recovery of oil from two varieties of Mustard seed i.e. PBR-91 and RLC-1. The experiments were designed using response surface methodology for making various combinations of moisture content (6, 9, 12, 15 and 18%w.b.), heating time (2,4, 6, 8 and 10 min), heating temperature (40,60,80,100 and 120°C) and enzyme concentration (1, 2, 3, 4 and 5%) and the experiments were conducted using single chamber oil expeller. The effect of independent variables i.e. moisture content, enzyme concentration and heating temperature on oil yield and residual oil in cake of PBR-91 and RLC-1 variety were found significant however the effect of the heating time was found non-significant in both the varieties. The moisture content had a significant effect on the acid number and peroxide value. The optimum condition for maximum oil recovery are 9% moisture content, 4% enzyme concentration, 60°C heating temperature and 8 minutes heating time for PBR-91 variety whose predicted value for oil recovery is 29.82%, acid number 0.8315 and peroxide value of 5.42whereas for RLC-1 variety are 9% moisture content, 4% enzyme concentration, 60°C heating temperature and 4 minutes heating time whose predicted value for oil recovery is 29.00%, acid number 0.69 and peroxide value 4.70. There is 8% increase in the yield of the oil for PBR-91 extracted at optimum parameter level whereas in RLC-1 there is 8.89% increase in the oil yield compared to untreated seeds.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Efficient Energy Aware Location Based Routing[ ]


Wireless Ad Hoc networks have several characteristics different from wired networks which make them completely different networks. Whereas network topology of wireless networks constantly changes, resources like bandwidth and energy are also limited. As power is very important factor for the proper working of Ad Hoc networks, need of the time is to research about efficient utilization of power. In the paper, we improve LAR (Location-Aided Routing), one of the most famous location based routing methods, which uses GPS technique to get information about the location of mobile node. Our new protocol considers both areas of routing and power. At first, propose a more efficient routing method which finds more stable paths .Secondly, a power aware method is proposed to have a prior knowledge about the remaining battery backups of all the intermediate nodes so that the nodes with battery backups equal to greater than the minimum threshold power are the part of path between source and destination.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Role of Information Technology in Indian Power Sector for reducing the AT&C losses[ ]


Industries are using Information Technology (IT) as a tool for managing its strategic, tactical and operation activities. This is true to power sector also in which IT is used to handle large amount of information to carry out efficient operation for revenue and commercial management, distribution and automation, consumer relationship management, Outage Management , Power Management, Load Forecasting, Transmission and Distribution (T&D), Aggregate Technical and Commercial (AT&C) losses reduction. The main purpose of this paper is to identify the AT&C losses in all states of India and T&D losses in other countries and the different reasons for these losses. In this paper different technical and non technical losses have been identified and according to that numbers of Information Technology solutions are available to reduce these AT&C and T&D losses which will improve the efficiency of power distribution system. This paper also focuses on the project initiated by Government of India namely R-APDRP (Restructured Accelerated Power Development and Reform programme) for reduction in AT&C losses.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Computer Assisted X-Ray Analysis System for Detection of Onset of Tuberculosis[ ]


This paper presents an initial analysis of the chest radiograph for the detection of pulmonary tuberculo-sis(PTB).In this, we propose to collaborate with the clinicians in National Institute of Research in Tuberculosis (NIRT) to come out with a software system to determine whether a patient has Tuberculosis or not, using image processing techniques applied to his digital x-ray image.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Smart Grid-A Pragmatic Vision for Blackout Free Future[ ]


Smart Grid is an emerging and promising technology that will prove inalienable in the near future. The need for improvement of efficiency of electricity transmission and distribution can be achieved to a greater extent with the use of smart grids. This paper deals with the features a grid should have, need of Smart Grids, Smart Grids and its key features such as Self Healing, Bi-Directional flow of electricity, and the problems it can solve. Paper gives a detailed overview of various technological components of smart grid like Distribution Automation, Personal Energy Management and Advanced Metering Infrastructure. The paper also puts through the visualisation of electricity theft tracking and its stoppage. The urge to move onto an economically feasible and efficient grid technology is put forward and the visualised infrastructure of the Smart Grids is included. The Self Healing technique, as the name suggests, is a unique feature which incorporates grid communication thus help in rectifying any fault in electric grids in no time which has been rightly put forward in the paper. Also it would help in reduction of harmful emissions to the environment by reducing power loss.Bi-Directional flow of electricity is the inducement of dual relationship between the User and the Provider, thereby helping in the decentralisation of electricity production.Finally, the visualised application of Smart Grids is in electrical theft tracking. This would help in reducing large economic losses suffered by Indian electricity board and raising the quality of supply at the user end. The effective implementation of this application would help in building a smarter future.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Extended Kalman Filter for Channel Estimation in Rayleigh Fading Environment and Fadingless Environment[ ]


Channel estimation is used for finding the channel state information. It characterizes the effect of the physical channel on the input sequence. They may or may not contain a training sequence for the data recovery purpose. The methods which include training sequences are called data (pilot) based channel estimation methods and the rest are blind channel estimation methods. Data based channel estimation methods offer low complexity and good performance. But since they use training sequences to estimate the channel, there is also wastage of bandwidth. So we can use a method using the Extended Kalman Filter method, where a limited length training sequence is transmitted. This filter allows predicting the state of the system before the frame is actually received. So it has a significant gain in performance when compared to the data-only estimator. In this project study, the estimation of channel is done using Extended Kalman Filter, which is an extension of our normal Kalman filter. This predicts the estimates of the state based on some updation processes considering the weights. The weights are different for different states depending upon their certainities of error. Also the total harmonic distortion of the updated state is calculated to limit it within a particular value. The estimation has been done here with and without the presence of fading. The fading considered is the Rayleigh fading.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Energy Efficient Level-By-Level Offset Based Wake up Pattern with Hybrid Data Gathering Protocol in a WSN[ ]


Energy consumption is the major problem in a wireless sensor network (WSN).In order to reduce the energy consumption, level by level offset based wake up pattern with hybrid data gathering protocol is introduced in this paper. This paper analyses the energy consumption in different nodes. The main purpose of WSN is to collect data for processing, communi-cating and reporting. For data reporting time driven and event driven schemes are used. There is a hybrid data gathering protocol that dynamically switches between the event driven and time driven data reporting schemes. By using this hybrid data gathering protocol with sleep scheduling, we can detect an event of interest in the near future with low energy consumption. Also we can predict the dissemination pattern of an event.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Minimizing Navigation Cost Using Genetic Algorithm Based Best Edge Cut Algorithm[ ]


With the dramatically quick and explosive growth of information available over the Internet, World Wide Web has become a powerful platform to store, disseminate and retrieve information as well as mine useful knowledge. Due to the properties of the huge, diverse, dynamic and unstructured nature of Web data, Web data research has encountered a lot of challenges. The most important problem when searching queries on biomedical databases is information overload. In this paper, the proposed approach gives the solutions for information overload and also ensures that the navigation is effective. Ranking and categorization manage the information overload. The proposed technique provides a novel search interface that facilitates end users to have effective navigation of query results that are presented in the form of concept hierarchies. Moreover the query results are presented in such a way that the navigation cost is minimized and thus giving rich user experience in this area. And also propose an efficient genetic algorithm based Best-Edge cut algorithm for relatively small trees. The empirical results revealed that the proposed navigation system is effective and can be adapted to real world systems where huge number of tuples is to be presented. In contrast, previous works expand the hierarchy in a predefined static manner, without navigation cost modeling.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
The Comparative Study of Adaptive Channel Equalizer Based on Feed Forward Back Propagation, Radial Basis Function Neural Network(RBFNNs) & Least Mean Square (LMS) Algorithm[ ]


Artificial Neural networks (ANNs) have been extensively used in many signal processing applications. Linear & Nonlinear adaptive filters based on a variety of neural network models have been used successfully for system identification in a wide range of applications. Due to their capacity to form complex decision regions, ANNs have been most popularly applied, in particular, for channel equalization of digital communication channels. The mean square error (MSE) criterion, which is usually adopted in neural learning, is of interest in the channel equalization. In this paper, we introduce a novel approach to adaptive channel equalization using feed forward & Radial Basis Function neural network (RBFNNs) that exploits the principle of discriminative learning while minimizing error function. The performance of proposed method has been compared with gradient based algorithms such as LMS (Least Mean Square) which are often characterized by slow convergence. ANNs technique using fast learning feed forward configuration based on Back Propagation Algorithm, offers high speed of convergence w.r.t. LMS adaptive filtering algorithm. Computer simulation for the equalization of QAM signals in AWGN transmission channel is presented, which demonstrates the effectiveness of the proposed technique vis-a-vis LMS algorithm.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
An approach for Anomaly based Intrusion detection System using SNORT[ ]


An Intruder is a hacker in Network which always try to access security methods so that it performs unnecessary/unauthorized activities. The Attackers can be of two types are Active attacker and Passive attacker’s. The active attackers during attack make changes on network Rules/ Regulations. The Passive Attackers only see the network behaviour and does not make any changes. Intrusion detection means detecting unauthorized use of or attacks upon a System or Network. An IDS is the high-tech equivalent of a burglar alarm, one that is configured to monitor Information gateways, hostile activities, and known intruders. There are two general approaches to detecting intrusions: anomaly detection (also called behaviour-based) and signature based (also named misuse or pattern based) [1]. Signature based techniques identify and store signature patterns of known intrusions. Pattern recognition techniques are efficient and accurate in detecting known intrusions, but cannot detect novel intrusions whose signature patterns are unknown. Anomaly detection techniques can detect both novel and known attacks if they demonstrate large differences from the norm profile. Since Entropy or anomaly detection techniques signal all anomalies as intrusions, false alarms are expected when anomalies are caused by behavioural irregularity instead of intrusions. Hence, pattern recognition techniques and anomaly detection techniques are often used together to complement each other. We detect anomalies using SNORT. The Snort is an open source Software that is used to detect Network Anomalies/ attackers.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Impact of Education and Health on Economic Development in Pakistan: A Case Study of Multan City[ ]


The present study was conducted to analyze the role of health and education on the state’s overall development by reviewing the available literature on the said topic and by examining the primary data from survey conducted in Multan city. Random techniques were the key measuring rod of collecting the data from the sample population. A comprehensive questionnaire was prepared. The results showed that educated and healthy persons and families were participating more effectively in development of their job specifically and of the region generally as compared to those who were un-educated, less educated or had poor health.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Electrical Car/Vehicle: Future Prospects for Electromobility[ ]


Electric cars are automobiles, which are powered by the electric engine and electric energy. The development of the electric vehicles is a very perspective and important process. Scientists and engineers managed to create electric engines which are no less effective than the ordinary engines used today. It is obvious that electric cars are more ecologically safe and require less energy for work. In the very close future electric cars will replace ordinary cars, because the natural resources, like oil will be completely exhausted. In numerous cities across the country, the personal automobile is the single greatest polluter, as emissions from millions of vehicles on the road add up. Car pollution is one of the biggest polluters the solution is to have much more efficient vehicles that produce fewer emissions with every mile. So what would be the best thing for cars to run off of in the future? Electric vehicles are the answer to this problem. Electric vehicles or EVs, are vehicles that are powered by an electric motor instead of an internal combustion engine (Frequently). EVs use electricity as the fuel instead of gasoline or some other combustible fuel. The power for the vehicle is stored in many large batteries in the bottom of the car, then from there the power goes to a power regulator where it is changed from DC power to AC power. The engine only has one moving part, which send the power directly to the wheels. Therefore it does all the primary functions of a gas engine with no emissions. (Automobile) With technology like this one might guess who is going to jump on the electric vehicle bandwagon right away.EVs provide fast acceleration by delivering power instantly to the wheels by providing high torque at low speeds, they give a feel of smooth and quick responsiveness (Technology).

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Correlation of testosterone with glycemic indices and lipid profile of the male patients with type 2 diabetes mellitus[ ]


Type 2 diabetes mellitus (T2DM) is one of the most common metabolic disorder associated with defects in hormonal control at the cellular level. Testosterone had been identified as a marker of stress in many cases, and has been found to influence the age related diseases like cardio vascular diseases (CVD), hypertension etc. Studies on the role of testosterone, if any, in glycemic control and lipid profile in normal and diabetic subjects are scanty. The present study was under taken to correlate the effects of total testosterone (TT) on glycemic control and lipid profile. The fasting blood glucose (FBG), glycated haemoglobin (HbA1c) and lipid profile of 97 patients and 30 age matched controls were correlated with their respective TT levels. There was a negative correlation in FBG, HbA1c and all lipid fractions except HDL-cholesterol (HDL-C) with TT in the study and control subjects (p<0.001). HDL-C was found to be positively correlated (p<0.001) with TT levels. It was observed that there is a significant correlation of serum TT with glycemic indices and lipid profile in the patients with T2DM.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Scope of Automated Organizing Network in Telecom Industry[ ]


Self-Organizing Networks (SON) is a collection of functions to the radio and network components to interact among themselves to configure, tune, optimize and healing of cellular system in real time. It is considered to be a necessity in future mobile networks and operations, due to the increased cost pressure and minimizing trend of human intervention. This paper describes scope, architecture of reference model, evaluations on the use of some of the most important SON components. We also included the application of a revolutionary algorithm; genetic algorithm. The application of this algorithm in telecommunication network optimization has presented and shown with the effective choice of some important parameter values involved in optimization and the implementation strategies. Nowadays mobile networks are getting more complex to configure, optimize and maintain. SON functions will perform to give cost savings and performance benefits from the very beginning of a network deployment to its life-cycle.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Mobility Assisted Routing In MANET Using AODV[ ]


One of the major challenges in mobile ad hoc networks (MANETs) is link failures due to mobility. In order to reduce packet loss due to link failures, an algorithm that takes care of mobility needs to be integrated in routing protocols. The proposed algorithm estimates the route’s Route Life Time (RLT), and allows routing protocol to send maximum number of packets that can traverse the route successfully during this RLT period. It also increases the network throughput and packet delivery ratio of MANETs by estimating the maximum number of packets that can traverse through the route before it breaks because of mobility. The algorithm includes mobility information and is combined with the existing AODV (Ad hoc On demand Distance Vector) routing protocol to reduce packet loss in MANETs.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Notes On Fixed Point Theorems In Fuzzy Metric Spaces[ ]


Bijendra singh et al [11] proved a common fixed point theorem in fuzzy metric spaces for semi compatible and weak compatible mapping. In this paper we obtain a common fixed point theorem for six self maps for compatible of type (ß) with new implicit contractive condition in fuzzy metric space.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
An Implementation and Performance Evaluation Study of AODV, MAODV, RAODV in Mobile Ad hoc Networks[ ]


Mobile ad hoc network (MANET) is a new pattern of wireless networks, offering unrestricted mobility without any centralized infrastructure such as base station or mobile switching centers. Moreover, it is an autonomous system in which collection of mobile self organizing nodes connected by wireless links are free to move randomly and often act as routers at the same time by forming a multi-hop network. The MANETs are finding more likely importance due to the flexibility, ease and speed with which these networks can be deployed as well as reconfigured. This allows the use of this kind of networks in special circumstances, such as military battle field, natural disaster recovery, emergency medical services, etc. On one hand the security sensitive applications of MANETs require high degree of security; on the other hand they are inherently vulnerable to security attacks, the inherent features of MANETs make them more vulnerable to a wide variety of attacks such as DoS Attack. A malicious node drops packets solely to disrupt the network performance and prevent other nodes from accessing any network services. We represent the simulation study with DoS attack scenarios in the context of a different network nodes using AODV routing protocol. In this paper we will propose a feature to secure AODV against Denial of Service (DOS) attacks that protect data from the intrusion by malicious nodes.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Designing an Adaptive Neural Network Based Controller for Automatic Landing Maneuver[ ]


This paper introduces an adaptive controller based on Neural Networks (NN) and dynamic inversion use for a nonlinear six-degrees-of freedom of a modern aircraft in presence of wind patterns. Adaptive single hidden layer NN are employed for on-line learning and modeling error compensation. The approach utilizes an observer type adaptive neural network loop for an estimation of the correct aircraft model. The network weight adaptation rule is derived from Lyapunov stability analysis that guarantees boundedness of the NN weights and the system tracking errors. Performance is verified through numerical simulations. This paper deals the issue of aircraft landing maneuvers from the neural net-based adaptive control perspective. Generally this part of flight needs to be strongly assisted by human pilot. The results of simulation show that the designed controller can operate and satisfy the related task in landing maneuver.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Modeling and Variables Estimation of a Two-phase Stepper Motor by using Extended Kalman Filter[ ]


This paper presents the detailed mathematical and Simulink model of a two-phase stepper BLDC motor in the machine variables, proving the rotor's position role in supplying the motor. Then an extended Kalman filter (EKF) is designed to estimate the motor state variables: stator currents, and the rotor position and velocity, on the basis of noisy measurements of stator currents, since it has a nonlinear function with time. The temperature change effects on the motor's performance are verified. Simulation results show that the motor's rotor position and velocity can be estimated in a satisfactory accuracy by the proposed method.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Comparison of methods for detecting outliers[ ]


An outlier is an observations which deviates or far away from the rest of data. There are two kinds of outlier methods, tests discordance and labeling methods. In this paper, we have considered the medical diagnosis data set finding outlier with discordancy test and comparing the performance of outlier detection. Most of the outlier detection methods considered as extreme value is an outlier. In some cases of outlier detection methods no need to use statistical table. The suggested outlier detection methods using the context of detection sensitivity and difficulties of analyzing performance for outlier detections are compared.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Computation of Academic Performance of Engineering Students[ ]


In engineering education, with an evaluation system comprising of both the continuous internal evaluation and the semester-end examination/external examination, the ‘percentage of pass’ may not be sufficient for rigorous analysis. In this proposed analytical approach, an attempt has been made to identify the important factors that could affect the performance of engineering students, quantify them and develop a mathematical expression for the purpose of analysis. This may help for self-appraisal, determination of deviations and remedial measures to be taken for the overall improvement in academic performance, teaching and learning process, and growth of the technical institutions/engineering colleges.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Defensive Mechanism for Deterring Reactive Jamming Attacks in WSN[ ]


Reactive Jamming Attacks had evolved as a major security threat during the last decade due to its massive destructions to genuine wireless sensor communications until a jammer node defending scheme was developed. This scheme deactivates reactive jammers by efficiently identifying all trigger nodes whose transmissions invoke jammer nodes. In this existing solution the jamming zone identification procedure is carried out only during the initial time of operation but an attacker can come into existence at any point of time during the operation and also certain jammers show their behavior during very late time. Hence the existing solution may fail to identify such jammers. To avoid the problem faced in this existing solution, in this paper we propose and develop an energy efficient detection mechanism which identify trigger nodes frequently and deter these jamming attacks. Simulation results are included to validate the performance of this framework.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Determination of heavy metals in surface and ground water in an around (Agrang Block) Raipur District, Chhattisgarh, India[ ]


The study was carried out to assess surface and ground water quality of the (Arang Block) Raipur District, Chhattisgarh. The study area is situated between latitude 21.195 and longitude 81.967 . Water quality is one of the most important concerns. The heavy metals up to ppm. levels in drinking water quality may be cause serious health problems and also cause cancer. In this study we make an attempt to know the concentration of three heavy metals in ground water and surface water in different locations of (Arang Block). For this study 36 water samples were collected in pre-monsoon May-Jun 2013. These samples were subjected to analysis for three elements like Pb, Cr and Ca by using UV-VIS-NIR. Spectrophotometer is most advanced technique for determination of trace metal concentration. The concentration of these metals was compared with drinking water quality limits given by the World Health Organization (WHO) 4th edition in 2011.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
The Influence Of Ultrasonic Amplitude And Temperature On Transesterification Of Jatropha Curcas Oil[ ]


Transesterification of Jatropha oil with methanol was carried out in the presence of sodium hydroxide catalyst. Ultrasonic energy from Ultrasonic Processor (UP50H) was used to induce the transesterification of the oil. The ultrasonic processor has a frequency of 30 kHz and power of 50W.The influence of the ultrasonic amplitude and temperature of reaction using UP50H was investigated on the yield of biodiesel from jatropha oil. The maximum obtainable amplitude of the device is 125µm and the amplitude was varied from 60 to 90 % of the maximum.The influence of reaction temperature was considered from 40 to 60 0c at a catalyst concentration of 0.5 %w/w of oil and a reaction time of 30 minutes. The highest yield of from this work was achieved at amplitude of 100 µm (80%) and a temperature of 500c for three mole ratio used. The biodiesel obtained was comparable to diesel standard.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Optimization of the use of fungal enzymes amylase and glucoamylase to enhance the nutritional and functional properties of rice flour[ ]


Filamentous fungi have been widely used to produce hydrolytic enzymes for industrial applications. Amylase and glucoamylase were produced using Aspergillus oryzae under solid state fermentation. The enzymes obtained were partially purified using isopropanol and rice flour was treated with these hydrolysing enzymes. Enzymatic pretreatment conditions were optimized using Response Surface Methodology (RSM). Effect of different parameters such as slurry concentration, enzyme concentration, time and temperature was studied. Enriched rice flour was obtained by treating 7 % slurry with 1 ml of enzyme at 55 °C for 40 min. This enriched rice flour was analysed for its nutritional, functional, toxic residues and microbiological parameters. Protein content of the enzymatically treated rice flour increased from 8.03 % to 20.79 % (2.5 fold enhancement) and ash from 0.69 % to 1.40 %. Fat content of both, untreated and treated rice flours, differed insignificantly but crude fiber was hydrolysed from 2.50 to 0.42. Moisture content of the treated rice flour decreased from 12.40 % to 11.85 %. The digestibility coefficient of in vitro digestibility also increased from 644.63 to 1351.67 in treated rice flour. Microbiological count of treated rice flour decreased whereas contaminating organisms (coliforms and salmonella) and toxic residues (aflatoxins) were not detected.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Rapid, Economical and Selective Complexometric Determination of Iron (III) in its synthetic alloys using 3 hydroxy-3 phenyl-1-(2,4,6-tribromophenyl) triazene.[ ]


The present study describes a simple, selective, rapid and economical method for the determination of iron (III) in its synthetic alloys using 3-hydroxy -3- phenyl-1- (2,4,6- tribromophenyl) triazene as metallochromic indicator in the P^H and temperature range of 2.5-3.0 and ?20 -60?^0 c respectively. The colour and shape of the synthesized indicator was light yellow shinning needles having melting point of ?59?^0 c. It was crystallized from ethanol. The results of elemental study showed that, the values of C, H, N obtained experimentally agrees very well with those obtained theoretically. The colour at the end point changes from violet to light yellow using EDTA as a titrant. There is no interference in either determination from common metal and anion ions other than Pb(II), Cr(II), Mo(VI), Mn(II), U(vI), Cu(II), Cd(II), F^-, ?PO?_4^(3-), ?C_2 O?_4^(2-), ?HPO?_4^(2-). Reproducible and accurate results are obtained for 5.59 -1.12mg of Iron with relative error less than ±1.79% and standard deviation not more than 0.10%. The results of the test method and reference method (Atomic absorption spectrophotometric) showed that, there is no statistical difference in the results by the two methods.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Implementation of Holographic View in Mobile Video Calls[ ]


Implementation of holographic video calls in mobile devices using of hologram projectors additional to TFT displays. Here we use hologram projectors for video calls by storing video as holographic images through the method of Computer Generated Holography. Hologram video calls are not in usage, they are simply under research condition. Hologram makes video calls in 3D virtual display. In order to bring hologram usage in mobile phones by means of hologram projectors in the way of computer generated holography. Computer Generated Holography (CGH) is the method of digitally generating holographic interference patterns. A holographic image can be generated e.g. by digitally computing a holographic interference pattern and printing it onto a mask or film for subsequent illumination by suitable coherent light source. Alternatively, the holographic image can be brought to life by a holographic 3D display (a display which operates on the basis of interference of coherent light), bypassing the need of having to fabricate a "hardcopy" of the holographic interference pattern each time. Consequently, in recent times the term "computer generated holography" is increasingly being used to denote the whole process chain of synthetically preparing holographic light wave fronts suitable for observation. Holographic computer displays for a wide range of applications from CAD to gaming, holographic video and TV programs, automotive and communication applications (cell phone displays) and many more. 3D hologram images are set in the video frames by hologram projectors while we make a video calls. By using the hologram projectors in the mobile phones. Holographic images are stored in the frames in video. While making the video call 3D hologram video will be displayed through hologram micro projector. Voices are transmitted through microphones and speakers.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Challenges and future trends in e-Governance[ ]


E-governance is the application of information and communication with proper planning, execution, training and good management, the Cloud infrastructure can greatly reduce overall costs for government departments maintaining and anaging E-Services for E-Governance, and help in efficiently utilizing the tax payer’s money. The strategic importance of EGovernance Standards is now widely recognized globally. Standards and specifications with well defined formats help to achieve interoperability of information and communication systems. This paper discusses about the software architectures deployed in the design of e-governance that is broadly classified into architectural framework and conceptual framework. The discussion is also extended to the usage of e-governance in civil services in different countries followed by future trends.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Construction Of F-diagram[ ]


In this work we study how to construct the f-diagrams and the product of two f-diagrams and also the definition of Brauer Algebra.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Quantitative Measures To Improve Process Potential Through Process Capability[ ]


Quality improvement in an industry is done by an important tool which is widely used is Process capability analysis. Today producing high quality products at minimum cost is very challenging. This cannot be done without a systematic approach and this approach is contained within what has been called “Statistical Quality Control” (SQC) or “Industrial Statistics.” The segment of statistical quality control discussed here is the process capability study.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Mathematical technique for transforming the view of a Signal from Time-based to Frequency-based using Fourier Analysis[ ]


Signal analysts already have at their disposal an impressive arsenal of tools. Perhaps the most well-known of these is Fourier analysis, which breaks down a signal into constituent sinusoids of different frequencies. Another way to think of Fourier analysis is as a mathematical technique for transforming our view of the signal from time-based to frequency-based.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Emergence of drug resistance in bacteria: An insight into molecular mechanism[ ]


In spite of an enormous success of antibiotics as chemotherapeutic agents, infectious diseases continue to be a leading cause of mortality worldwide. The bacteria have the capability to regenerate in approximately every 30 minutes with a fresh possibility to mutate and adapt to a brand new environment. The widespread use of prescription antibiotics places a selective pressure on bacteria that favours the survival of the fittest and more adapted strain on less susceptible strains. The adapted strains of bacteria are competent in such a way that antibiotics can no longer bind to the bacterial receptor or enter the bacterial cell to harm bacterial propagation and reproduction. Destroying or inactivating the antibiotic, pumping out the antibiotic and modifying the antibiotic target are some of the important mechanisms which confer bacterial resistance. This review article discusses few of the molecular modes of antibiotic action and bacterial resistance mechanisms.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Estimation of Genetic Diversity in Six Lentil (Lens culinaris Medik.) Varieties using Morphological and Biochemical markers[ ]


Morphological characters and Electrophoretic SDS-PAGE analysis were performed to established genetic diversity for six important lentil varieties of Bangladesh and to elucidate their genetic relationships. Analyses of variance of morphological characters showed significant differences among varieties. The resulted protein banding pattern showed 57.12% polymorphism and could be considered as general biochemical finger print of the lentil. Dissimilarity index reveals maximum dissimilarity between BARI masur-3 and BARI masur-6 when morphological traits were observed but when seed storage protein profile was observed, distantly related varieties showed the lowest similarity were BARI masur-1 and BARI masur-5. Two dendrograms constructed based on UPGMA using both morphological traits data and SDS-PAGE profiles, revealed two main separate genetic clusters. Principal component analyses supported the result of dendrogram, which proved that BARI masur-1 and BARI masur-5 is the most distant variety among six. So these two varieties can be considered as valuable gene resources for further breeding programs.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Secure Smart Grid Device For Home Area Networks Using Wireless Application Protocol[ ]


The use of Internet and Mobile user reliance on Internet services, along with advancement of portable computing devices and wireless communication networks has been growing tremendously. This growth pattern is also seen in the day to day accidents that occur primarily due to negligence. House hold monitoring has become tedious to mankind and there is a need of a computing service that serves this purpose. In order to provide such an end-to-end solution, an open architecture is required to provide the intelligent network solution. To ensure the Secure and efficient communication between human being and managed devices for Smart Grid and Smart Home, this project propose the architecture and design of a secure access gateway (SAG) for home area networks. Wireless Application Protocol (WAP) is a widely used mobile Internet access solution, enabling users browse on the go. This paves way to a secure access gateway at homes and building controllable smart homes through WAP.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Performance Analysis Of Reactive & Proactive Routing Protocols For Vehicular Adhoc - networks[ ]


Today the world is moving towards wireless system. Wireless networks are gaining popularity to its peak today, as the users want wireless connectivity irrespective of their geographic position. Vehicular ad-hoc networks (VANETs) are considered to be the special application of infrastructure-less wireless Mobile ad-hoc network (MANET). In these networks, vehicles are used as nodes. The thesis works is based on comparison between Ad hoc on demand Distance Vector routing protocol (AODV) and Destination sequenced distance vector routing (DSDV) in VANET on the basis of packet delivery ratio and average delay. Researchers are continuously publishing papers on performance work on VANET hence we worked on the issue. The tools which we used for the work of performance are TRACEGRAPH and NETWORK SIMULATOR (NS2).

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Framework for Predicting Query Response Time at Application Development Stage[ ]


In a typical database application environment, emphasis has been given on promising Service level Agreements (SLAs) for perceived query elapsed response time; the SQL queries are tested on the small size of database at application developmentstage, which may be a fraction of the production database. As time progresses the database grows and the earlier optimized queries may not hold SLA anymore. Once the application is deployed, it becomes difficult to modify the application or alter the production system. In this paper, we have discussed a framework for predicting the SQL query response time with growth of the database while being transparent to the production hardware, storage subsystem and DB Server. We have discussed various factors which can impact query response time and are also affected by the increase in the data size. We have presented a theoretical model for predicting the elapsed response time of SQL queries and also discussed a case study of Oracle 10g for implementing the proposed framework.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
USB Device Authentication for the Security of Linux System[ ]


In the world of information age, the data stored in the computer is most valuable assets to any organization. It may include most valuable data, personal informations, confidential files and folders. Due to this security is must, like anyone can use a mass storage device and copy these valuable assets. And if it happened, the result will be dangerous and irreversible. So control the USB devices, that what data they handle. So a authorized devices list is created if authorized device is plug, it is acceptable otherwise it is deny with a message that “This device is not authorized”.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------


Pages   [1] [2] [3] [4] [5] [6] [7]