Author Archives: Kamran Khan

Study of Assembly Line Scheduling, an Application of Dynamic Programming

Sanjukta Mohanty1 and Prafulla K. Behera2

View:    Abstract |  HTML Full Text |  PDF |  XML|

This papers describes the design and implementation of an optimized base scheduling algorithm for multiple assembly lines (i = 1,2,…..,n) to solve manufactureing problems in a factory. The scheduling goal is to delivery products just in time in case of rush order comes in and when the customer wants the product to be manufactured as quickly as possible. If the demand of the product is high, then to increase the production rate in few time, the multiple assembly line scheduling technique can be applied. 

Hide Abstract

Living of Student in the Internet Age

K.K. Dwivedi*, Mayaram Atal, Ashish Rastogi, H.C. Katariya and R.K. Shrivastava

View:    Abstract |  HTML Full Text |  PDF |  XML|

The goal of this study is to learn about the impact of internet on the routine life of college students and the impact of that use on their further lives. For obtaining the results the researchers have used these three approaches. Firstly survey is randomly conducted on college students at a wide range in last two years at Govt. and private colleges and universities. Second approach is to observe 17 different educational institutions of Madhya Pradesh. At last additional material is based on the findings of surveys.

Hide Abstract

The EVAS Model: Solving E-Voting Problems in Nigeria

O.S. Ogunseye¹, O. Folorunso¹, J.O. Okesola² and J.R. Woodward³

View:    Abstract |  HTML Full Text |  PDF |  XML|

E-voting is said to have a lot of loop holes. Solving these problems first starts with their definition as either technical or procedural. In this paper we look at the problem from the procedure perspective and we identify some issues that previous models do not cater for. The model we proposed allows for high-level monitoring of the balloting process and takes advantage of the semantic search process to ensure security of the e-voting procedures through over-the-board authentication . The model also solves the old problem of recounting of the ballots/votes.

Hide Abstract

Distributed Remote Architectures CORBA

Hasrat Jahan¹ and Manmohan Singh²

View:    Abstract |  HTML Full Text |  PDF |  XML|

An emerging trend in the Signal and Image Processing (SIP) community is the appearance of middleware and middleware standards that can be readily exploited for distributed computing applications by the SIP community. High performance computing and High Performance Embedded Computing (HPEC) applications will benefit significantly from highly efficient & portable computational middleware for signal & image processing. Open middleware standards such as VSIPL, MPI, CORBA, encoding and SOAP –based messaging protocols. More specifically, we will be focused on the appropriate use of such technologies for implementing new SIP applications, or extending legacy applications through the use of these technologies. The three middleware standards we have selected all have certain commonalities. All are based around the concept of a client application using the services available on a remote machine, or server. A remote executable object that implements one or more exposed interfaces provides these services. The object’s interface represents a contract between the client and the server. This interface is written as a Java interface for Java RMI, in IDL for CORBA, and in WSDL for web services. In the latter two cases, the more generic descriptions can be translated intospecific language imp lementations,

Hide Abstract

Detection and Classification of EEG Waves

Hemant K. Sawant and Zahra Jalali

View:    Abstract |  HTML Full Text |  PDF |  XML|

The Electroencephalograph (EEG) signal is widely used to analyze neural activity within the human brain for detection of any abnormalities. Since the EEG signal is dynamic by nature and changes constantly a highly sensitive yet robust system is required to monitor the activities. In this work, EEG waves are analyzed and then classified using first the Discrete Wavelet Transform DWT, used for time-frequency analysis, followed by Fast Fourier Transform (FFT) that captures the rhythmic changes in EEG data. The process uses DWT for classifying EEG wave’s frequencies, where as FFT is implemented to visualize these waves.

Hide Abstract

A Knowledge-Based Visual Analytics Query System

Olusegun Folorunso, Adesina Temitayo Bello, Adesina S. Sodiya and Lateef O. Yusuf

View:    Abstract |  HTML Full Text |  PDF |  XML|

The present visual analytics query system that is being used to process large quantities of information with complex analytic reasoning processes does not support intelligent selection of best visual display and task analysis. In this paper , Knowledge-Based Visual Analytics Query System (KBVAQS) architecture was designed to support and correct the challenges. The architecture consists of three main parts which include the application layer, logic layer and back layer. These parts were used for querying and displaying data graphically based on User request. In the application layer, the administrator and ordinary users interact directly with the system through the user interface provided by the system. Graphical display based on the decision table is provided and some task analyses are given for the user to interpret. The logic layer handled the full functionality of the implementation while the back layer was used for record keeping. The implementation was achieved by employing object oriented programming language C-Sharp with the data base created in Microsoft Structured Query Language. The effectiveness of KBVAQS tool has been evaluated in surveys carried out at the Nigerian Stock Exchange which deals with stock markets. It shows that users generally viewed KBVAQS tools more positively than using existing Intelligent Visual Query Algorithm (IVQA) technique. These differences were significant to p<0.05. The mean interactions precision and calculated value using expert judge relevance rating show a significant difference between KBVAQS tool and IVQA performance 2.47 against 1.73 for precision with calculated t= 6.33. The hypothesis testing revealed that KBVAQS user performed better and achieved acceptable results.

Hide Abstract

Use of XML in HL7

K.S. Mann¹ and Preeti Saini²

View:    Abstract |  HTML Full Text |  PDF |  XML|

In hospitals, the ability to send and receive healthcare data including patient information and the various lab reports are required . The information is stored in non standard formats. The information must be converted from one format to another for the transmission .In order to achieve this ,all healthcare information must be sent in a specialized health care language. In healthcare, important or mean-ingful data can beeasily identified by XML markup or tags and stored as electronic documents. The XML is useful because of its variable length of the nested structures.XML is well-formed document format, it can be easy to be parsed and managed.

Hide Abstract

Network Intrusion Detection Using Correlation Functional Dependency

Nitin D. Shelokar1 and S.A. Ladhake2

View:    Abstract |  HTML Full Text |  PDF |  XML|

We will learn the concept of intrusion detection system in real time. This seminar will give brief idea to have our data to be in secured system i.e free from hackers. We will elaborate the types of intrusion detection system and get into concept of real-time system to detect any intruder coming into the system. An intrusion detection system is used to detect several types of malicious behaviors that can compromise the security and trust of a computer system. We have also discussed the real time intrusion detection system in brief with the efficiency related to instruion detection systems. Data processed by the IDS may be a sequence of commands executed by an user, a sequence of system calls launched by an application (for example a web client), network packets, and so on. Finally, the IDS can trigger some countermeasures to eliminate attack cause/effect whenever an intrusion is detected.

Hide Abstract

SOA-RTDBS: A Service Oriented Architecture (SOA) Supporting Real Time Database Systems

Olusegun Folorunso¹*, Lateef O. Yusuf¹ and Julius O. Okesola²

View:    Abstract |  HTML Full Text |  PDF |  XML|

With the increase of complexity in Real-time Database Systems (RTDBS), the amount of data that needs to be managed has also increased. Adoption of a RTDBS as a tightly integrated part of the SOA development process can give significant benefits with respect to data management. However, the variability of data management requirements in different systems, and its heterogeneity may require a distinct database configuration. We addressed the challenges that face RTDB managers who intend to adopt RTDBS in SOA market; we also introduce a service oriented approach to RTDBS analytics and describe how this is used to measure and to monitor the security system. A SOA approach for generating RTDBS configurations suitable for resource-constrained real-time systems using Service Oriented Architecture tools to assist developers with design and analysis of services of developed or new systems was also explored.

Hide Abstract

Appraise the Recitation of Intrusion Detection System at Training Time

Anurag Lal

View:    Abstract |  HTML Full Text |  PDF |  XML|

Network Intrusion Detection aims at distinguishing the behavior of the network. It is an inseparable part of the information security system. Due to rapid development of attack pattern it is necessary to develop a system which can upgrade itself as new threats are detected. Also detection rate should be high because the rate with which attack is carried out on the network is very high. In response to this problem AdaBoost Based Algorithm is proposed which has high detection rate as well as low false alarm rate. In this algorithm decision stumps are used as weak classifier. The decision rules are provided for both categorical and continuous features. Weak classifier for continuous features and weak classifier for categorical features are combined to form a strong classifier. Strategies for avoiding the over fitting are adopted to improve the performance of the algorithm.

Hide Abstract

Review of FAT Data Structure of FAT32 File System

Wasim Ahmad Bhat and S.M.K. Quadri

View:    Abstract |  HTML Full Text |  PDF |  XML|

FAT file system is the most primitive, compatible and simple file system which still sustains in this era on digital devices, such as mini MP3 players, smart phones, and digital cameras. This file system is supported by almost all operating systems because of its simplicity and legacy. This paper presents review of the basic design technique, constraints and formulas of the most important and building block data structure of FAT32 file system; the FAT data structure.

Hide Abstract

Secure Data Aggregation Using Mobile Agents in Wireless Sensor Networks

Bhavna Arora Makin¹ and Devanand Padha²

View:    Abstract |  HTML Full Text |  PDF |  XML|

Data aggregation is a widely used technique in wireless sensor networks. The security issues, data confidentiality and integrity, in data aggregation become vital when the sensor network is deployed in a hostile environment. There have been many related work proposed to address these security issues. In this paper, we introduce the concept of mobile agents for secure data aggregation in sensor networks. We propose an algorithm that can be used to track a malicious node in the network and hence maintain data confidentiality and data integrity in data aggregation.

Hide Abstract

Development and Implementation of Mobile Augmented Reality Systems Application (Live Streaming Through Mobile)

K.H. Wandra¹* and Ketan Kotecha²

View:    Abstract |  HTML Full Text |  PDF |  XML|

These instructions give you guidelines for preparing papers for conferences or journals. Use this document as a template if you are using Microsoft Word. Otherwise, use this document as an instruction set. The electronic file of your paper will be formatted further at World Enformatika Society. Define all symbols used in the abstract. Do not cite references in the abstract. Do not delete the blank line immediately above the abstract; it sets the footnote at the bottom of this column. Page margins are 1,78 cm top and down; 1,65 cm left and right. Each column width is 8,89 cm and the separation between the columns is 0,51 cm.

Hide Abstract

Static Analysis and Run-Time Coupling Metrics

Mandeep Kaur, Parul Batra and Akhil Khare

View:    Abstract |  HTML Full Text |  PDF |  XML|

The relationships between coupling and external quality factors of object-oriented software[1] have been studied extensively for the past few years. For example, a clear empirical relationship between class-level coupling and the fault-proneness of the classes have been identified by several studies. A number of statistical techniques, principally Agglomerative Hierarchical Clustering (AHC) analysis, Byte Code Instrumentation are used to facilitate the identification of such objects. Dynamic coupling indicates the strength of association established by a connection from one software module to another at runtime. Despite the rich body of research in the field of software measurement, dynamic coupling measurement for Aspect Oriented software is still missing. A dynamic coupling measurement framework for AspectJ[10] programs is presented in this paper. The framework consists of a suite of measures for both method-level and class-level coupling relations. This paper also presents a new approach towards static analysis, in particular class analysis to the computation of dynamic coupling measures and is designed to work on incomplete programs.

Hide Abstract

Video Indexing and Retrieval – Applications and Challenges

M. Ravinder, T. Venu Gopal² and T. Venkat Narayana Rao³

View:    Abstract |  HTML Full Text |  PDF |  XML|

Video data indexing and retrieval which applies tags to large video databases, is useful as a complementary means for applications which are having multi media content and need faster search responses. Well-ordered and effective management of video documents depends on the availability of indexes. Manual indexing is not viable for large video collections in this modern era of information super highway. There is a want for a techniques and frameworks that can store, handle, search and retrieve the data from the huge media archive. This paper discusses about application areas, emerging challenges of video indexing & retrieval, and some future directions for video indexing, video retrieval management system.

Hide Abstract

VPN and IPSEC Server With IDS

Anil Rajput¹, Manmohan Singh²,Naveen Kher³*,Shumali Kankane4 and Pawan Meena5

View:    Abstract |  HTML Full Text |  PDF |  XML|

Virtual Private Networking, or VPN, is a technology that lets people access their office's computer network over the Internet while at home or traveling. Accessing a network in this way is referred to as remote access. (For comparison, another common form of remote access is dialing in to the office network over a telephone line.) But VPN is useful for more than just remote access. It can also be used to link two separate offices over a distance. This is sometimes called a "persistent VPN tunnel", or "site-to-site VPN".

Hide Abstract

Handwritten Libretto Recognition Using Multilayer and Cluster Neural Network

Anurag Lal

View:    Abstract |  HTML Full Text |  PDF |  XML|

There are different techniques that can be used to recognize handwritten digits and characters. Two techniques discussed in this paper are: Pattern Recognition and Artificial Neural Network. Both techniques are defined and different methods for each technique is also discussed. Bayesian Decision theory, Nearest Neighbor rule, and Linear Classification or Discrimination is types of methods for Pattern Recognition. Shape recognition, Character and Handwritten Digit recognition uses Neural Network to recognize them. Neural Network is used to train and identify written digits. After training and testing, the accuracy rate reached 99%.This accuracy rate is very high.

Hide Abstract

Effectiveness of Software Testing Techniques on a Measurement Scale

Sheikh Umar Farooq and S.M.K. Quadri

View:    Abstract |  HTML Full Text |  PDF |  XML|

Testing remains the truly effective means to assure the quality of a software system of nontrivial complexity. An important aspect of test planning is measuring test effectiveness. To make testing more successful we need to choose effective testing techniques. To compare testing techniques we need to place software testing techniques on a measurement scale which can define the relative merits of the existing testing techniques, but due to differences in software’s and its allied parameters this task seems to be complex, if not impossible.

Hide Abstract

Fiber Bragg Grating (FBG) is Used as Modeling and Simulation for Temperature Sensor

Manish Saxena¹* and Anubhuti Khare²

View:    Abstract |  HTML Full Text |  PDF |  XML|

This paper deals with mathematical modeling, design and application of Fiber Bragg Grating as temperature sensor .In this paper we used the MATLAB and filter characteristics simulation software as a tool for simulation results. The fabrication of Fiber Bragg Grating, their characteristics and fundamental properties are described. The reflectivity of FBG is described using simulation results. This paper also presents the simulation results of FBG as temperature and gas sensor. From the plotting analysis it can be concluded that for reduce the width of reflection spectrum we can take long grating.

Hide Abstract

Packet Loss Detection Using CPR and WCPR in Diverse Platforms

Anurag Lal¹ and Vivek Dubey²

View:    Abstract |  HTML Full Text |  PDF |  XML|

In this paper loss of packets in TCP is detected using two diverse methods CPR (Constant Packet Re-arranging) and WCPR (Without Constant Packet Re-arranging) in diverse platforms. This paper proposes a new version of the TCP which gives the high throughput when the packet rearranging occurs and in another case if the packet rearranging is not occurs then in that case also it is friendly to other version of the TCP. The key feature of Constant packet rearranging is that duplicate ACKs are not used as an indication of packet loss. Instead the timer is used to detect the packet loss From a computational view-point, CPR is more demanding than WCPR. Because CPR does not rely on duplicate acknowledgments, packet rearranging (including out-or-order acknowledgments) has no effect on CPR performance.

Hide Abstract

Subanta Pada Analyzer for Sanskrit

Smita Selot¹, A.S. Zadgaonkar² and Neeta Tripathi³

View:    Abstract |  HTML Full Text |  PDF |  XML|

Natural language processing has wide coverage in application areas like machine translation , text to speech conversion , semantic analysis , semantic role labeling and knowledge representation .Morphological and syntactic processing are components of NLP which process each word to produce the syntactic structure of the sentence, with respect to its grammar .Semantic analysis follows syntactic analysis. One of the key task in morphological analysis is identifying the correct root word from its inflected form.In Sanskrit language, these inflected word follow the rules which are used to separate the root word from its suffix.These extracted suffix carry sufficient amount of syntactic and semantic information with them .To develop such word splitter, rules called sandhi rules given in the grammar of the Sanskrit language has been used.The challenge in the problem lies is in identifying the junction point or breaking point of the word as multiple junction can be obtained within the word .Developed system maintains database of all possible suffix , which are then used for splitting the word . The algorithm for the same is presented in the paper with the solutions to problem faced while developing the module.

Hide Abstract

Analysis of AES Hardware and Software Implementation

R. Velayutham¹ and D. Manimegalai²

View:    Abstract |  HTML Full Text |  PDF |  XML|

In November 2001 NIST published Rijndael as the proposed algorithm for AES(Advanced Encryption Standard). The result of new attack methods shows that there may be some missing part in the design of S-box and key schedule with AES algorithm. The problem is the weakness of linearity existing in the S-box and key schedule. In order to keep away from the new attacks and implement the AES in software and hardware provides higher level of security and faster encryption speed; we analyze in detail the AES algorithm and propose a new implementation scheme for increasing complexity of nonlinear transformation in design of S-box. Implementation scheme with Java and the use of reconfigurable coprocessor as a cryptography hardware is proposed.

Hide Abstract

A Metrics Suite for Measuring Class Interaction at Run Time Through DCM

Akhil Khare¹, Harsh Lohani² and Pallavi Khare³

View:    Abstract |  HTML Full Text |  PDF |  XML|

The first step taken while developing software, by an analyst is to construct a sequence diagram which describes the interaction that must occur between classes. The sequence diagram does not show the interaction of classes at run time. It shows static coupling, i.e. it only acknowledges the number of interactions between the classes. There have been many studies done regarding the relationship between coupling and external quality factors of object-oriented software. A common way to define and measure coupling is through structural properties and static code analysis. However, because of polymorphism, dynamic binding, and the common presence of unused or dead code in commercial software, the resulting coupling measures are not precise as they do not perfectly reflect the actual coupling taking place among classes dynamically. This paper proposes the use of the estimated frequency of the use cases and propagates these frequencies through the sequence diagram to estimate dynamic coupling. This can be done by using Dynamic Clustering Mechanism (DCM) in which classes which interact with high frequency are clustered or grouped together (called as hot spots), which are highly dynamically coupled. With this evaluation we will be able to determine which hot spot are indeed relevant and actually deserves close attention from the designer w.r.t design of each class.

Hide Abstract

Contrast Enhancement in Gray-Scale Images Using Background Approximation by Blocks and Morphological Operations

A.I. Beena and B. Arthi

View:    Abstract |  HTML Full Text |  PDF |  XML|

The goal of image enhancement is to improve the visual appearance of the image. For this purpose we are using two methods to compute the image background using morphological transformations. Contrast enhancement in grey level images with poor lighting can be achieved by two operators based on Weber’s law. The one operator employs information from block analysis and the other utilizes the opening by reconstruction. The contrast operators can normalize the grey level of the input image to avoid the abrupt changes in intensity among different regions.

Hide Abstract

Optimized Equilibrium Attention of Impure and Pure Agents Between High Concentrated Particles and Low Concentrated Particles in Reverse Osmosis Using the Principles of Genetic Algorithm

Saurabh Mukherjee¹, Nitin Paharia¹ and Ritu Tiwari²

View:    Abstract |  HTML Full Text |  PDF |  XML|

Drinking water is known as another life for any living being. For rest of the animal they have the natural separators to separate the pollutant and the safe material, but for human it is not so. Safe drinking water is a big problem area in Indian and other developing countries. Due to massive pollution present in drinking water, it becomes immensely important to find a cost effective solution for the safe drinking water. Various Public water treatment plants are doing well in this task but there is a huge gap between the demand and supply. Even if the water underwent through treatment, it is always questionable whether it is safe to drink or not. Various private sector jumps in the market claiming to give safe and soft drinking water. Some private players are doing well but cost still plays a big factor to reach common person. The present paper is an attempt to propose a novel model to clean the dirty water with some constraints in a specified domain.

Hide Abstract

Soft Computing in Bioinformatics: Methodologies and Applications

Kiran Kumar Reddi¹* and M.V. Basaveswara Rao²

View:    Abstract |  HTML Full Text |  PDF |  XML|

Bioinformatics, an area that has evolved in response to this deluge of information, can be
viewed as the use of computational methods to handle biological data. It is an interdisciplinary field
involving biology, computer science, mathematics and statistics to analyze biological sequence data,
genome content & arrangement, and to predict the function and structure of macromolecules. Soft
computing is a consortium of methodologies that work synergistically and provide, in one form or
another, flexible information processing capabilities for handling real life ambiguous situations. Its aim,
unlike conventional (hard) computing, is to exploit the tolerance for imprecision, uncertainty, approximate reasoning and partial truth in order to achieve tractability, robustness, low solution cost, and close resemblance with human like decision-making. The paper will focus on soft computing paradigm in bioinformatics with particular emphasis on research.

Hide Abstract

Software Prefetching Using Jump Pointers in Linked Data Structures

Arushi Arora, Swati Priya and Akhil Khare

View:    Abstract |  HTML Full Text |  PDF |  XML|

During linked data structures(LDS) traversals, prefetching improves the performance by reducing memory latency. We will discuss about the jump pointer prefetching which hides additional load latency by using an extra pointer to prefetch objects further than a single link away. Jump pointers can be implemented in Binary tress by adding jump pointers at creation time and in LDS by adding jump pointers at traversal time. Prefetch Arrays are also used to store jump pointers. It has two approaches hardware and software. Both the approaches have highly improved the performance of prefetching with the use of jump pointers. Prefetching in pointer-based codes(java programs) is difficult because separate dynamically allocated objects are disjoint, and the access patterns are thus less regular and predictable. However, according to experimental results, the largest performance improvement is 48% with jump- pointers in java programs, but consistent improvements are difficult to obtain.

Hide Abstract

Issues of Service Oriented Architecture – A Survey

Himanshu Agarwal1, Ashish Seth2 and Ashim Raj Singla3

View:    Abstract |  HTML Full Text |  PDF |  XML|

SOA is a Buzzword today and much is said about it, the actual goal of SOA is to help align IT capabilities with business goals .Another important goal of SOA is to provide an agile technical infrastructure that can be quickly and easily reconfigured as business requirement change. Until the emergence of SOA based IT systems, business and government organizations were faced off with difficult trade off between the expanses of custom solution and the convenience of packaged applications. In this paper we have argued that how service based information systems are different from component based systems. Further we have identified the line of division between two approaches and pointed out the issues of SOA adoption in an organization.

Hide Abstract

Leaf Recognition for Plant Classification Using GLCM and PCA Methods

Abdolvahab Ehsanirad and Sharath Kumar Y. H.

View:    Abstract |  HTML Full Text |  PDF |  XML|

In this paper, the image processing techniques has been used in order to classify the plants by applying on the leaves images. To extract the leaves texture features, the Gray-Level Co-occurrence matrix (GLCM) and Principal Component Analysis (PCA) algorithms have been considered. The Algorithms are trained by 390 leaves to classify 13 kinds of plants with 65 new or deformed leaves images. The result indicates that the accuracy for the GLCM method is 78% while the accuracy for the PCA method is 98%.

Hide Abstract

Implementation of VRML, STL File Parser with Passive Stereo Vision

R.S. Kamath1 and R.K. Kamat2

View:    Abstract |  HTML Full Text |  PDF |  XML|

In this current implementation, the software is able to browse the VRML and STL files. The 3D scenes are rendered by reading .wrl and .stl files, with an inclusion of properties: applying various lights, material colors, options for solid, wire frame, points and lines viewing, texture mapping, transformation, different camera views etc. A stereoscopic display is a prime part of this implementation that accounts for virtual reality. The passive stereo is a low cost 3D visualization technique. It enables the user to enter a world of Virtual Realism. This paper will highlight the technical details of STL, VRML files, the method of parsing such files, rendering the model and passive stereo vision of respected model.

Hide Abstract

Development of Digital Spectral Library and Classification of Rice Crop Using Compressed ASTER L1 B Satellite Data

Shwetank¹, Kamal Jain² and Karamjit Bhatia³

View:    Abstract |  HTML Full Text |  PDF |  XML|

In the present study Multispectral Image Processing (MIP) technique is applied on ASTER (Advance Spaceborne Thermal Emission and Reflection Radiometer) L1 B high resolution (15 m/ pixel) satellite data. A comprehensive spectral library of rice crop varieties : Hybrid-6129 (IET 18815), Pant Dhan-19 (IET 17544), Pusa Basmati-1 (IET-18990) and Pant Dhan-18 (IET-17920) has been developed with Blue (0.56 nm), Red (0.66 nm) and NIR (0.81 nm) spectral bands. The PCA (Principal Component Analysis) transformation with correlation matrix is applied for feature extraction to select an optimum subset of data in term of classification accuracy. Four PC (Principal Component) images selected for conventional spectral and integrated image classification. The integrated image Spectral/ NDVI (Normalized Difference Vegetation Index) is developed using Spectral and NDVI bands classified using ML (Maximum Likelihood) classifier. The conventional spectral classification accuracy for rice mapping is 79.5%, which improves up to 84.5% with Spectra/NDVI imagery data.

Hide Abstract

Software Quality Measurement: A Revisit

Mazhar Khaliq¹, Riyaz A. Khan² and M. H. Khan³

View:    Abstract |  HTML Full Text |  PDF |  XML|

This paper presents a review on software quality measurement. An effort has been made to put forth the demand and dependency of quality software in our modern society. The demand has increased the size and complexity of computer software system during the past decades. The software industry is responding to the demand for high quality product by spending resources to improve the quality of software product. A brief discussion on quality and software quality has been given. Further, the discussion on measurement and software quality measurement are presented. Finally, it throws the light on the role of various software quality models and software metrics for software quality measurement. 

Hide Abstract

JPEG Compression Steganography

Akhil Khare¹, Meenu Kumari¹ and Pallavi Khare²

View:    Abstract |  HTML Full Text |  PDF |  XML|

In any communication, security is the most important issue in today’s world. Lots of data security and data hiding algorithms have been developed in the last decade, which worked as motivation for our research. In this project, named “JPEG Compression Steganography”, we have designed a system that will allow an average user to securely transfer text messages by hiding them in a digital image file using the local characteristics within an image. This project is a combination of steganography and encryption algorithms, which provides a strong backbone for its security. The proposed system not only hides large volume of data within an image, but also limits the perceivable distortion that might occur in an image while processing it. This software has an advantage over other information security software because the hidden text is in the form of images, which are not obvious text information carriers. The project contains several challenges that make it interesting to develop. The central task is to research available steganography and encryption algorithms to pick the one the offer the best combination of strong encryption, usability and performance. The main advantage of this project is a simple, powerful and user-friendly GUI that plays a very large role in the success of the application. 

Hide Abstract

An SCDFT Aspect of Renormalized Phonon- Induced HTSC in Doped HTSCD Mg1-Xalxb2

M.C. Shah, Abdul Gaffar Lone, Irshad Ahmad Mir, Tanveer Ahmad Wani and Tara Prasad

View:    Abstract |  HTML Full Text |  PDF |  XML|

The electronic and superconducting state characterization of high phase transition temperature (Tc) superconducting (HTSC) diboride (HTSCD) pure MgB2 and doped Mg1-xAlx B2 has been made with renormalization effects in multiband configuration with non-linear, anharmonic E2 g optical phonon induced HTSC by employing the first principles calculations within density functional theory (DFT) for SC (SCDFT) in low temperature lattice dynamics.

Hide Abstract

Emerging Information Communication Technologies to Modernize College Libraries

Vipul Bansal

View:    Abstract |  HTML Full Text |  PDF |  XML|

This paper is based on application of Information communication technology in library services to meet the user’s requirement in present scenario and importance of information communication technologies in modern library system. Use of information communication technology in college libraries provides instant and easy access to information that leads towards the modernization of college library services.

Hide Abstract

Analyzing Service Integration Between UMTS and WLAN Network

Kamaljit I. Lakhtaria

View:    Abstract |  HTML Full Text |  PDF |  XML|

Much of interest has been involved in integrating UMTS and WLAN networks in order to take full advantage of the two. In such an integrated network, UMTS subscribers can access to UMTS services through 3G or WLAN access networks. This is highly desirable because network operators will use WLAN hotspots to increase network coverage, while offering subscribers with high-speed connections to 3G networks. To achieve this goal, a mechanism for service continuity between UMTS and WLAN is required. 3GPP has defined architecture for WLAN access to 3GPP system, but intersystem handover has not been yet investigated. Based on this architecture, this paper proposes a solution for seamless handover between UMTS and WLAN. Results obtained from the implementation of the proposed mechanism on our experimental system are also described.

Hide Abstract

CFD Analysis of Slot Jet Impingement Cooling on Concave Surface

R.E. Shelke¹* and L.B. Bhuyar²

View:    Abstract |  HTML Full Text |  PDF |  XML|

2 dimensional CFD simulation of slot jet impingement cooling on concave surface is reported using Ansys FLUENT Post software at specified geometry and boundary conditions. Realizable k-ª model has been used for resolving the turbulence.It has been observed that the results obtained from CFD model are in good agreement with that of the experimental results.

Hide Abstract

Identifying a Generic N-Tier Architecture Framework for Web-Based Applications

Y. Prasanth, V. Gowthami Uttam, G. Anusha and G.Sindhu Priya

View:    Abstract |  HTML Full Text |  PDF |  XML|

N-Tier architecture is becoming increasingly important because of its scalability, availability and flexibility. There are different frameworks for testing tools which perform performance, load, stress, navigation, regression testing etc. The better framework should be in such a way that it should perform all the testing mechanism. For that purpose we are studying three of the testing tools Win Runner, LoadRunner and QTP which performs different testing mechanisms having several features. This paper proposes a framework which performs all the testing mechanisms

Hide Abstract

Application of SPSS Software in Preparing Correlation Matrix

Vibha Agrawal¹ and Nilofar Iqbal²

View:    Abstract |  HTML Full Text |  PDF |  XML|

A number of studies have already been carried out for the physic-chemical analysis of paper mill effluents which are generally using wood and non-wood (bamboo, baggage etc.) as fibrous raw material for paper manufacturing process. This study deals with a paper mill which is using cotton comber and cotton linter as raw material for paper manufacturing. Effluents generated in the paper mill at different stages were sampled and analyzed. The degree of relationship between the variables under consideration is measured through the correlation analysis. The effect of correlation is to reduce the range of uncertainty. The prediction based on correlation analysis is likely to be more valuable and near to reality.

Hide Abstract

Data Allocation in a Mobile Computing Network with Minimized Response Time and Communication Cost

Shaheen Ayyub and Sanjeev Jain

View:    Abstract |  HTML Full Text |  PDF |  XML|

In this paper, we devise data allocation algorithms that can utilize the knowledge of user moving patterns for proper global data allocation in a mobile computing system. By employing the data allocation algorithms devised, the occurrences of costly remote accesses can be minimized and the performance of a mobile computing system is thus improved. The issue we addressed here is to allocate right data at right location while minimizing communication cost and response time of the network.

Hide Abstract

Shape Optimization of Pedestals Using Artificial Neural Network

Sangeeta Yadav¹, K. K. Pathak² and Rajesh Shrivastava³

View:    Abstract |  HTML Full Text |  PDF |  XML|

In this study, shape optimisation of steel pedestals are attempted using neural network. Considering different geometrical parameters, finite element analyses of pedestals are carried out. Using these results, a back propagation neural network is trained. Successfully trained networks is further used for shape optimisation of newer problems. Thus optimised pedestals are further validated with finite element analyses counterparts and found to be in close match. 

Hide Abstract

Overview of the Artificial Neural Networks and Fuzzy Logic Applications in Operational Hydrological Forecasting Systems

Jitendra P. Dave¹ and Divyakant T. Meva²

View:    Abstract |  HTML Full Text |  PDF |  XML|

Damage due to flooding has increase in many countries in the last years, and due to the global climate change, which is now recognized as a real threat, an increase in the occurrence of flooding events and especially of flash flooding events is likely to continue into the future. In those conditions and because building new flood defences structures for defending vulnerable areas has serious financial implications, the timely forecasting of floods is becoming more important for flood defence and in general for water management purposes. The complexity of natural systems and of hydrological processes that influence river levels evolutions make the traditional modelling approaches, based on mirroring natural processes with physically based equations very difficult. Despite the fact that in the last decades the Operational Hydrological Forecasting Systems were significantly developed, becoming more and more complex systems, ingesting and processing in real time a great amount of data from automated hydrometrical and meteorological stations networks and high resolution grided data from radars and satellites, together with the use of distributed hydrological models, the warning and forecasts improvements are not very significant, in many cases the performance of the new physically based distributed models being comparable with the “older” conceptual lumped models. The paper presents an overview of some alternative and complementary modelling approaches, artificial neural networks and fuzzy logic systems, possible applications for the improvements of the Operational Hydrological Forecasting Systems, and presenting also some example of rainfall-runoff modelling implementations.

Hide Abstract

A New Green Approach to 2,3–Dihydro-1H-1,5 –Benzodiazepines

Asieh Yahyazadeh¹*, Jafar Abbasi², Farshid Salimi and Mohamad Saeed Daneshmandi³

View:    Abstract |  HTML Full Text |  PDF |  XML|

Reaction of some diamines and ketones in the presence of catalytic amount of dodecylbenzene sulfonic acid leads to the formation of 2,3–dihydro -1H-1,5-benzodiazepines in good yields. It seems that dodecylbenzene sulfonic acid has two roles: first it acts as a surfactant to dissolve starting materials in water, and second it acts as an acidic catalyst to activate carbonyl groups.

Hide Abstract

Modularizing the Cross Cutting Concerns Through Aspect-Oriented Programming

Syed Imtiyaz Hassan¹ and S.A.M. Rizvi²

View:    Abstract |  HTML Full Text |  PDF |  XML|

No one process, technique, language, or platform is good for all situations. Object oriented is not an exception. There are many situations, which the traditional Object-Oriented Programming (OOP) can’t deal and implement as it should be. One of them is cross-cutting concerns like logging or security that affects multiple implementation modules. Using object-oriented techniques cross-cutting concerns are difficult to map in a single class and hence they are scattered throughout the code. Due to scattering resulting systems are harder to design, understand, implement, and evolve. Aspect-oriented programming (AOP) is one of the ideas that can be used to modularize the crosscutting concerns better than previous methodologies. The present paper discusses the problems caused by crosscutting concerns and then shows how AOP can solve the said problem with the help of a sample code implemented in AspectJ. This paper also demonstrates how one can use Eclipse IDE to implement AOP.

Hide Abstract

Rule-Based Metadata Extraction for Heterogeneous References

Bolanle Ojokoh

View:    Abstract |  HTML Full Text |  PDF |  XML|

References form an essential part of electronic scholarly publications. Accurate and automatic reference metadata generation provides scalability, interoperability and usability for digital libraries and their collections. This paper deals with automatic metadata extraction from the references of general digital documents using rule-based approach. It encompasses automatic extraction of metadata from book and journal references. The system consists of four major components: a means of providing reference input (by uploading the file or providing the set of references in the window provided by the browser), the text converter for converting documents into standard text format, the parser for automatically extracting metadata such as reference style, author, title, journal, volume, number (issue), year, and page information and author, title, publisher, place of publication, year and pages information from book and journal references of the converted documents using pre-defined regular expressions, and the browser for displaying the results. The experimental results show that the proposed framework can be used to extract metadata from different reference styles of book and journal references effectively.

Hide Abstract

Decision Tree Approach for Predicting Customers Credit Risk

K. Venkat Rao¹,T. Jyothirmayi² and M. V. Basaveswara Rao³

View:    Abstract |  HTML Full Text |  PDF |  XML|

This paper aims at constructing the customer data warehouse which adopts an improved ID3 decision tree algorithm to implement data mining in order to predict the risk class of the customer. The obtained results are compared with experimental results in order to verify the validity and accuracy of the developed model.

Hide Abstract

A Security Analysis of GSM Security Using ECC Technique

Tarun Kumar

View:    Abstract |  HTML Full Text |  PDF |  XML|

GSM (Group Special Mobile or System for Mobile Communications) is the PAN-EUROPEAN standard for digital cellular communication. GSM provides enhanced features when compared with the older analog-based wireless systems. A GSM network is more vulnerable to unauthorized access and eavesdropping when compared with the traditional fixed wired networks due to the mobility of users, the transmission of signals through open-air and the requirement of low power consumption by a mobile user. This paper focuses on the security techniques used within the GSM standard as well as current GSM security system vulnerabilities. In this paper, we proposed two new security protocols for GSM using Elliptic Curve Public Key Cryptography (ECC) technique and a security analysis of the proposed protocol.

Hide Abstract