Author Topic: Research Papers - IJSER, Volume 2, Issue 3, March 2011 (Part II)  (Read 3511 times)

0 Members and 1 Guest are viewing this topic.

ijser.editor

  • International Journal of Scientific and Engineering Research
  • Administrator
  • Jr. Member
  • *****
  • Posts: 89
  • Karma: +0/-1
  • Research Paper Publishing
    • View Profile
    • International Journal of Scientific and Engineering Research
Quote
Research Papers Published in March 2011 Edition
Full Paper Download:http://www.ijser.org/ResearchPaperPublishing_March2011.aspx
A Distributed Administration Based Approach for Detecting and Preventing Attacks on Mobile Ad Hoc Networks[Full-Text]
Himadri Nath Saha, Prof. (Dr.) Debika Bhattacharyya, Prof.(Dr.) P. K. Banerjee

In Mobile Ad Hoc Networks (MANET), security is a challenging issue due to the vulnerabilities that are associated with it. Intrusion detection is therefore incorporated as a second line of defense in addition to key based authentication schemes. The range of attacks that can be mounted on MANETs are also wider than in case of conventional static networks. In mobile wireless networks there is no infrastructure as such and so it becomes even more difficult to efficiently detect malicious activities by the nodes inside and outside the network. As a matter of fact, the boundary of the network is not properly defined. Nodes can intermittently come into the network or leave it. Moreover malicious nodes can flood the network with junk packets hampering the network service or intentionally drop packets. But these nodes can subtly manipulate their harmful activities in such a manner that it becomes difficult to declare a node as malicious. On top of that these nodes can cooperate among themselves to fool the other nodes to judge an innocent node as malicious. In this paper, we combine a proactive and a reactive approach to take care of some of the problems relevant to MANETs.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Color Image Segmentation - An Approach[Full-Text]
S.Pradeesh Hosea, S. Ranichandra, T.K.P.Rajagopal

The literature on the color image segmentation is very large and it has been delimited to review some important literature to trace the core issues. On the basis of the identified issues, objectives were drawn to prosecute a fresh study in the color image segmentation. This Literature review helps researcher to understand various techniques, themes, methodologies, approaches and controversies so for applied for color image segmentation. The algorithm combining color and texture information for the segmentation of color images. The algorithm uses maximum likelihood classification combined with a certainty based fusion criterion. It was validated using mosaics of real color textures presented in Color and texture fusion: application to aerial image segmentation.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Integer programming model for Integrated planning of solid waste management in Jaipur[Full-Text]
Archana Gupta, D. C. Sharma

Rajasthan's economic growth has stimulated urbanization, but lack of commensurate investment in urban infrastructure and services has resulted in an overall deterioration of urban quality of life. Jaipur is the capital of the largest state of country, having an inefficient, outdated and unscientific waste management system. Jaipur socio-economic development potential relies on sound environmental management so that tourism may grow and become sustainable. This paper attempts to assess the existing state of municipal solid waste management (MSWM) in Jaipur city with the aim of identifying the main obstacles to its efficient and prospects for improvisation of solid waste management system in the city.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Media used as a inspirational Factor for Future Women Candidates in Politics[Full-Text]
Pankaj Tiwari

Media continues to hold a negative depiction of women when running for elected office leaving to a great exposure. Although previous research has focused on using media exposure as a factor in why women do not run, I state to emphasize how media in fact influences women to run for office in strive for equal representation. There took place a study of three individuals political science majors through an interview process where each participant was asked a series of questions in regards to the correlation between media and their motive in one day running for office. Results stated that although all contestants would hope to see the media in a more positive light, women's portrayal through the media in fact encourages them to stand against the status quo where media can be used as a motivating factor in their decision to run as a potential candidate. By approaching the media's continuing negative bias as inspirational in itself, the media holds a counter effect by inspiring more women to gain interest and increase the number of women candidates for political representation.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Surveillance Robot For Tracking Multiple Moving Targets[Full-Text]
S.Pratheepa, Dr.Purushothaman Srinivasan

Object tracking is a challenging task in spite of all sophisticated methods that have been developed. The major challenge is to keep track of the object of a particular choice. In this work, a new video moving object-tracking method is proposed. The segmentation of the video is done by contextual clustering. Clustering is an important method in data analysis because of its ability to �discover� the inherent features in the data. The fundamental concept in clustering techniques is to group a given set of objects into subsets according to properties associated with each object, so that the members in each individual subset share some similar properly defined features. A multitarget human tracking is attempted.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Sea surface Simulation for SAR remote sensing based on the fractal model[Full-Text]
Ding Guo, Xingfa Gu, Tao Yu, Xiaoyin Li, Jingjun Zheng, Hui Xu

Based on the fractal ocean surface model,electromagnetic scattering model under Kirchhoff Approximation and the raw signal simulation procedure of dynamic scene based on time domain,the sea surface of the SAR remote sensing has been simulated.The images of the wave and complex fractal sea surface are in accordance with the hydrodynamic modulation , the tilt modulation and the velocity bunching modulation. The simulation has been developed in the Matlab programming language.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

USENET: Internetnews Software, Security - Needs and Goals[Full-Text]
Monika Saxena, Praneet Saurabh, Bhupendra Verma

Usenet is a distributed bulletin board system, built as a logical network on top of other networks and connections. By design, messages resemble standard Internet electronic mail messages as defined in RFC822. The Usenet message format is described in RFC1036. This defines some additional headers. It also limits the values of some of the standard headers as well as giving some of them special semantics. Newsgroups are the classification system of Usenet. The required Newsgroups header specifies where a message, or article, should be filed upon reception. In addition to InterNetNews, there are two major Usenet packages available for UNIX sites. All three shares several common implementation details. USENET at first was built with effectively no security. There was limited auditing even to detect abuse, let alone prevent it. Over time abusers came, and this meant in many cases that "privileged" functions had to be in some places either shut down or "put on manual" at great administrative cost to admins. In some cases, actual security using digital signature was applied, for newgroup messages (pgpverify), moderated groups (pgpmoose) and NoCem. PGP was commonly used because it is a widely distributed standalone program capable of doing digital signature.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Preparation, verification and finding out of the Critical Current of thin sample of YBCO Compounds[Full-Text]
Shaikh Md. Rubayiat Tousif, Shaiyek Md. Buland Taslim

This paper is all about superconductors. It deals with the current state of high temperature superconductors (HTS), the application of these materials and possible breakthroughs in the field. It also provides information about how to synthesize YBCO compounds and explains the material from structural point of view. It describes the method of verifying the prepared material is a superconductor or not by observing Meisner effect at 77K. Finally, it describes the technique of finding out the critical current by finding out the resistances of a thin prepared sample of YBCO for temperatures between 77 and 300K.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Recitation Of Load Balancing Algorithms In Grid Computing Environment Using Policies And Strategies - An Approach[Full-Text]
M.Kamarunisha, S.Ranichandra, T.K.P.Rajagopal

Grid computing is a term referring to the combination of computer resources from multiple administrative domains to reach common goal. What distinguishes grid computing from conventional high performance computing systems such as cluster computing is that grids tend to be more loosely coupled, heterogeneous, and geographically dispersed. Grid computing is the next generation IT infrastructure that promises to transform the way organizations and individuals compute, communicate and collaborate. The goal of Grid computing is to create the illusion of a simple but large and powerful self-managing virtual computer out of a large collection of connected heterogeneous systems sharing various combinations of resources. Grid Resource Management is defined as the process of identifying requirements, matching resources to applications, allocating those resources, and scheduling and monitoring Grid resources over time in order to run Grid applications as efficiently as possible. Focus of this paper is on analyzing Load balancing requirements in a Grid environment and proposing a centralized and sender initiated load balancing algorithm. A load balancing algorithm has been implemented and tested in a simulated Grid environment.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Assessment and Comparison of Soil carbon pool under Silvo-pastoral Agroforestry system at Henfaes Research Center, North Wales; UK[Full-Text]
Kasahun Kitila Hunde

As result of increased emission of green house gases, especially increased emission of Co2, Climate change is the main global challenges that many countries are facing. Increasing carbon sequestration through a forestation, reforestation and appropriate land use practices are considered as means to sink the atmospheric Co2 in terrestrial ecosystem. Agroforestry is recognized as a strategy for soil carbon sequestration (SCS) under the afforestation/reforestation activities in different parts of the world, but still little information is available on soil carbon dynamics under agroforestry systems. This study was aimed to determine the soil organic carbon pool under silvo-pastoral agroforestry system. The study was conducted at Henfeas research center in the north Wales, UK where Sycamore (Acer pseudoplatanus L.) and Red alder (Alnus rubra) were planted in 1992 in integration with the grasslands. The soil samples were collected to the depth of 30cm at different depth intervals (0-10, 10-20 and 20-30cm) under five treatments: under and outside the canopy of both Sycamore (Acer pseudoplatanus L.) and Red alder (Alnus rubra) and under the control grassland. The concentration of soil organic carbon (SOC %) under each treatment were analyzed using LOI (loss on ignition method) where soil samples were burned at 450 oc.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Quote
Research Papers Published in March 2011 Edition
Full Paper Download:http://www.ijser.org/ResearchPaperPublishing_March2011.aspx
« Last Edit: April 25, 2011, 05:25:57 pm by ijser.editor »