Archive

Speed Performance Degradation of Electrooptic Modulator Devices by Neutrons Irradiations at High temperature Effects
Ahmed Nabih Zaki Rashed

Abstract
In the present paper, we have deeply investigated the transmission efficiency degradation of electrooptic modulator devices in thermal irradiated hard environments over wide range of the operating parameters. It is well known that the radiation-induced electrooptic modulator defects can modify the initial doping concentrations, creating generation-recombination centres and introducing trapping of carriers. Additionally, rate of the lattice defects is thermally activated and reduces for increasing irradiation temperature as a result of annealing of the damage. Both the ambient temperature and the irradiation dose possess sever effects on the electro-optical characteristics and consequently the performance characteristics of electroptic modulator devices. As well as we have deeply developed the modelling basics of electrooptic modulator devices, which may be used to analyzed the modulator quantum efficiency, dark current, modulating voltage, modulating frequency, 3-dB bandwidth, transmitted signal bandwidth, modulator quality factor, modulator sensitivity, modulator sensitivity bandwidth product, switching voltage, modulator device performance index, operating switching time and speed response of these irradiated electrooptic modulator devices after different irradiation fluences.
Download Full Text

Use Case Based Testing A business oriented test methodology
Lakshmi Prasad Parimi and Veerabhadraiah Sandru

Abstract
For any product or IT based organizations, the delivery quality is always a driving factor to achieve their business goals. IT products and applications increasingly comprises of application penetration, complex business processes, continuous growth of requirements, external and internal dependencies. To reduce IT spends and to manage their growing requirements and business Goals, customers are refining their quality processes more aligned to business objectives. Use case based testing is a structured business oriented approach which addresses the above mentioned challenges.

Use case is a series of end user actions on a system to achieve a business goal. Use case based testing helps in achieving the delivery quality with business oriented approach in line with the business Goals.

This White paper explains how the use case based testing forms the basis for business oriented test approach. Also a quick glimpse on the use case benefits, creation and its applicability.


Download Full Text

Routing in Mobile Ad hoc Network
Asma Ahmed, A. Hanan, Shukor A. R., Izzeldin M.

Abstract
Mobile ad-hoc networks (MANET) are characterized as networks without any physical connections. In these networks there is no fixed topology due to the mobility of nodes, interference, multipath propagation and path loss. Hence a dynamic routing protocol is needed for these networks to function properly. Many Routing protocols have been developed for accomplishing this task. MANET routing protocols can be categorized as Proactive or Table-driven Routing Protocols Reactive or On Demand routing protocols and Hybrid routing protocols. This paper presents the three types of routing protocols in MANET and makes a comparative discussion of the features of each type of that routing protocol.
Download Full Text

Transmission Characteristics and Performance Analysis of Silica doped and Plastic Optical Fibers in Optical Communication systems
Ahmed Nabih Zaki Rashed

Abstract
This paper has proposed the development of transmission capacity and characteristics of the bit rates of local area advanced optical communication networks over wide range of the affecting parameters. Dispersion characteristics in high-speed optical transmission systems is deeply analyzed over a span of optical wavelengths from 1.3 µm up to 1.65 µm. Two different fiber structures for dispersion management are investigated, where two types of fabrication material link of single mode fiber made of Germania doped Silica and plastic fibers are suggested. As well as we have analyzed the soliton transmission technique to be processed to handle both bit rate and product either per link or per channel for cables of multi-links. Two multiplexing techniques are applied, dense wavelength division multiplexing (DWDM) and space division multiplexing (SDM), where maximum number of transmitted channels of 960 channels are processed to handle the product of bit rate either per channel or per link for cables of multi-links over wide range of the affecting parameters. As well as dispersion characteristics and dispersion management are deeply studied where two types of optical fiber cable core materials are used. a new novel technique of chromatic dispersion management in optical single-mode fiber is introduced to facilitate the design of DWDM performance in advanced optical communication networks. The design parameters are: the relative refractive index difference of the core and clad, ambient temperature, and the percentage of germania doped in silica fibers. The three design parameters are kept within their technological limits of interest. The thermal effects of the refractive-index of the fabrication core materials are taken into account to present the effects on the performance of optical fiber cable links.
Download Full Text

Virtualization Use Cases In Testing
Pallavi Kodali, Veerabhadraiah Sandru and Lakshmi Prasad Parimi

Abstract
In today’s context, main challenges for IT organizations and Enterprises with respect to Testing is to achieve agility while reducing costs or keeping costs under control and enabling more testing with the existing resources.

In order to support the above needs, in the recent times, various Dynamic systems technologies either have evolved or expanded in terms of capabilities. Some of the relevant/useful technologies in this context are Virtualization and Cloud Computing.

This paper offers a brief summary of Virtualization Technologies and Outlines how these can be utilized with respect to testing needs. Also included are implementation best practices, challenges and recent trends which would further enhance the deployment of these technologies in lieu of testing needs.


Download Full Text

Identifying the Reputation & Assessing the Software Service Quality at the Time of Project Development
Panchamukesh Ch, Venkateswarlu B

Abstract
At the time of integration of the software while developing a project the reputation and the quality of execution is tough to identify and which is very risky. As the software industry is introduced with a new type of service delivery model known as SaaS(Software as a service),the problem has increased a lot . Existing system be inclined to rely on rating from customer to experiences of past service which may create major issues in terms of subjectivity and rating unfairness. Few previous works have been considered quality and reputation for selection of services bur none have done service rating process through automation. We proposed an automated quality and reputation framework for rating and selecting a service. In this paper the management of risk has been formulated in context of development of the project using third party software service components and credibility is calculated by a measured reputation system.
Download Full Text

Investigations in Brute Force Attack on Cellular Security Based on Des and Aes
Neeraj Kumar

Abstract
In this paper the Brute force attack on cellular security based on DES and AES is carried out. It is shown that AES is more secure against brute force attack as compare to DES and A5 encryption algorithms. In the existing GSM network, A5 encryption algorithm is used which does not provide good security because of short length of encryption key. As a result, a new encryption algorithm is required to improve the security of GSM. So, AES algorithm is being proposed to improve the security of GSM instead of A5.
Download Full Text

Performance Evaluation of Convolutional coded WiMAX System for BPSK & QAM Modulation Techniques
Kanchan Sharma, Anagha Chougaonkar

Abstract
The telecommunication industries insisted on new technology with high transmission abilities standardized by IEEE 802.16 also referred as WiMAX .It has two patterns fixed(802.16d-2004) and mobile(802.16d-2005) which are based on OFDM. This paper is about study and implementation of Convolutional coded WiMAX system comparing different modulation schemes such as BPSK and QAM. The performance has been concluded based on BER and SNR through MATLAB Simulation.
Download Full Text

Testability Of Software System
Manu Phogat, Dharmender Kumar

Abstract
This paper investigates factors of the testability of object-oriented software systems. The starting point is given by a study of the literature to obtain both an initial model of testability and existing OO metrics related to testability. The goal of this paper is to define and evaluate a set of metrics that can be used to assess the testability of the classes of an Object Oriented System.
Download Full Text

Analysis of Multicarrier Systems in Presence of Channel Estimation Error
Charumitra Agrawal, Rekha Gupta

Abstract
Communication systems face several challenges like noise problem, inter-symbol interference caused by dispersive channel and limited system or resource efficiency. These problems become more severe in broadband wireless communication systems which suffer from lower Signal-to-Noise Ratio (SNR) of the received signal due to larger link loss. The solution to all these problems lies in the field of multicarrier transmission techniques. This paper evaluates the performance of two very popular multicarrier schemes: OFDM and MC-CDMA in presence of channel estimation error at the downlink. Typically the error rate performance of a system is evaluated taking the assumption that perfect channel state information is available. Practically, this is not the case, and some sort of channel estimation methods have to be implemented in addition to the usual detection and equalization schemes of multicarrier systems. Even the channel estimation is usually imperfect due to the presence of interference and noise, and lead to the need for estimation of error therein.
Download Full Text

A Pragmatic Approach to Compare Various Sorting Techniques
Tanu Babbar and Mandeep Juneja

Abstract
Sorting is an operation that segregates items into groups according to specified criterion. It means arranging the elements of the array in ascending or descending order. There are many different algorithms, each one having certain advantages and disadvantages that have to be weighed against each other in the light of the particular application. Here we mainly focus on comparisons of various sorting techniques on the basis of their computational complexity, memory usage, time required, stability and their adaptability. We also explain some more factors of sorting like how each algorithm operates, that there is no best sorting algorithm. The advantages and disadvantages of each algorithm, worse-case asymptotic behavior is not always the deciding factor in choosing an algorithm and the initial condition (input order and key distribution) affects performance as much as the algorithm choice.
Download Full Text

A Survey on Multimedia Data Mining
Shirish B. Patil, Saurabh Bonde, B.B.Meshram

Abstract
Multimedia Data Mining is the sub branch of Data Mining. Multimedia Data mining further classified according to the multimedia data type that are image, audio, video. Mostly, Multimedia data mining covers the mining of image data, mining of audio data and mining of video data. Image-driven data mining methods are described for image content classification, segmentation and attribution, where each pixel location of an image-under-analysis is the centre point of a pixel-block query that returns an estimated class label. Feature attribute estimates may also be mined when sufficient attribute strata exist in the data warehouse. Novel methods are presented for pixel-block mining, pattern similarity scoring, class label assignments, and attribute mining. Audio mining is a technique by which the content of an audio signal can be automatically analyzed used and searched. It is most commonly used in the field of automatic speech recognition, where the analysis tries to identify any speech within the audio. User has needed to retrieve meaningful information from their digital collections. To help users find and retrieve relevant video more effectively and to facilitate new and better ways of entertainment, advanced technologies must be developed for indexing, filtering, searching, and mining the vast amount of videos.
Download Full Text

Comparative Study of IP-Traceback Systems for DoS and DDoS Attacks
Suchita Patil, Pradnya Rane, Pallavi Kulkarni and B. B. Meshram

Abstract
This paper gives the idea of Vulnerabilities present in protocols, Also detail study of DoS attacks and the scenario of how DoS attacks can happen on internet its defense mechanisms. There are many solutions proposed by many author to avoid DoS and DDoS attacks and that are discussed in this paper. This paper provides classification of attacks, and the defense mechanisms that can be used to detect the DDoS and DoS attack.
Download Full Text

Connected Digits Recognition using Distance Calculation at each Digit
Amit Garg, Nikita and Poonam

Abstract
Speech recognition is related to the detection of speech by comparing with some patterns. A key question in the speech recognition is how the speech patterns are compared to determine their similarity (i.e., the distance between patterns). The goal of speech recognition is to separate the acoustic events of interest (i.e., the speech to be processed) in a continuously recorded signal from the other parts (e.g. background). In the art of fluent or connected digits recognition, isolated digits are used as the reference patterns. The technique of Dynamic Time Warping (DTW) is the most reliable technique to identify the digits in the string of connected digits. This technique will be used by applying it at each level or frame where each frame is assumed to have only one digit out of many digits in the test string.
Download Full Text

Feature based image retrieval of images for CBIR
Pradnya Rane, Pallavi Kulkarni, Suchita Patil and B.B.Meshram

Abstract
Extensive use of images in various applications gives immense importance to Content based image retrieval. There are many ways to retrieve image from image database depending upon various image features like DCT coefficients, mean, median entropy etc. Histogram [6] is very simple and old approach for image retrieval. This paper describes a combined approach to content based image retrieval considering DCT- coefficients of R, G, B planes separately and basic image features. The idea in this study to evaluate the effect of above image features to query image. Again the comparison of Database image and query image is done on the basic of similarity measures such as Euclidian distance in above specified methods. Finally a threshold is obtained based on sample basis. We applied our approach to a database of 25 JPG images which includes 10 dinosaurs and 10 flowers. We have determined the capability of automatic indexing by analyzing image contents as features. The results are far more accurate than conventional image indexing. Hence, there exists a tradeoff between accuracy and computational cost.
Download Full Text

Information Security in Banking and Financial Industry
Vishal R. Ambhire, Prakash S. Teltumde

Abstract
It summarizes the influence elements introducing the concept of information technologies in financial and banking industries and analysis the relationship of information technology risk factors. By using the case study, research design and methods, and investigative study is conducted. IT security management practice is discussed. The potential vulnerabilities that exist in the system with reference to data leak, suggestions to safeguard from such threats are presented. It explores why information security should be a priority for businesses and deals with how a security expert can model potential losses for their organization. This paper identifies four security issues (access to information system, secure communication, security management, development of secure information systems).
Download Full Text

Survey on Modular Attack on RSA Algorithm
Satish N. Chalurkar, Nilesh Khochare, B.B.Meshram

Abstract
This paper is devoted to the analysis of various cryptanalysis attack .This cryptanalysis attack mainly happens on the encrypted message which is to be passed over communication channel. The cryptanalysis attack is used to get the key from the encrypted message. Mod operation in the RSA algorithm plays an important role to break this algorithm. The Side Channel attack which includes Timing attack and power analysis is used to break the RSA algorithm. There are various types of symmetric algorithm are discussed in this paper, which is to be used to break the encrypted message.
Download Full Text

Survey on SQL Injection attacks and their Countermeasures
Nilesh Khochare, Satish Chalurkar, Santosh Kakade and B.B. Meshramm

Abstract
SQL injection is most common methodology employed by a hacker to exploit vulnerabilities in software applications. Vulnerabilities are basically weak links in the software that exposes unauthorized data or information to a user. SQL injection occurs when the user input is incorrectly filtered for embedded SQL statements. The technique is powerful enough not only to expose the information to the user but also modify and delete the content which could prove disastrous to the company. There are many ways to prevent SQL attacks such as using dynamic SQL, using automated SQL test tools, by escaping user input.
Download Full Text

Tying Web Project Estimation with Risk Management
Pradnya B. Rane, Suchita Patil, Pallavi Kulkarni and B.B.Meshram

Abstract
Web project management is about using web services that are geographically distributed, where project managers and team members are located in different cities, states and countries. It plays an important role in any organization for saving money and utilizing time efficiently. The project goals must be followed in terms of costs, time, scope, risk, effort and quality. Also, Modern software development, with an emphasis on web and distributed development, with limited face-to-face interaction among team members presents specific challenges and risk areas to the software industry which need to be considered and managed. On this background, this paper focuses on tying different web project estimation methods, with different risks involved and risk resolution techniques into an integrative framework for managing risks in distributed contexts. We can also combine these methods to minimize the impact of risk involved.
Download Full Text

Handling Mobility in WiMAX
Pranit Chandrakant Patil, Pramila M. Chawan

Abstract
World Wide Interoperability for Microwave Access (WiMAX) is a telecommunications technology aimed to providing wireless data over wider coverage area in a variety of ways, from point to point links to full mobile cellular type access. It is based on IEEE Std. 802.16 attempts to bring quality of services, high data rates and coverage to wireless computer networks. Mobility of wireless communication is increase with wireless MAN standard 802.16. The attractive feature of WiMAX for wireless communication is mobility among homogeneous networks and heterogeneous network. Homogeneous mobility is the moving of MS between the networks of same technology. In Heterogeneous mobility MS is moving between the different network such as mobility handling between Wi-fi and WiMAX. In this paper we discuss both heterogeneous and homogeneous networks with respect to mobility handling for 802.16. In this paper we review the various approaches for achieving mobility in WiMAX network.
Download Full Text

Formal Specification Concepts in Critical Analysis
Prakash S. Teltumde, Pawan Kumar I. Patil and Vishal R. Ambhire

Abstract
With the growing significance of computer systems within industry and wider society, techniques that assist in the production of reliable software are becoming increasingly important. The complexity of many computer systems requires the application of a battery of such techniques. One of the most promising approaches are formal methods. The paper gives an idea of formal specification and use of Z. It also contains use of formal specification in critical system may be in air traffic control, prevent mobile attacks. Also case study have been explained in detail .This paper describes the conceptual and formal models.
Download Full Text

Mathematical Model for Expediting the Execution of Projects under Uncertainty
Ashok Mohanty, Biswajit Satpathy and Jibitesh Mishra

Abstract
Many project-based organizations manage a number of simultaneous projects that share resources from a limited pool. Conflicting interests and competition among projects for limited resources is a major problems of managing multiple projects. Due to uncertainty factors the progress of work of some projects may lag behind its schedule. So expediting some select projects is an important control action. Expedition of projects and resource allocation are based on their priority level. Normally, prioritization of projects is done by informal and intuitive method. But it is desirable to follow a formal basis for taking these decisions, for which a simple mathematical model has been developed and presented in this paper. Application of model has been illustrated with a typical example.
Download Full Text

Genetic Algorithm Model for Multi-factory Supply Chain Inventory Optimization involving Lead Time
Radhakrishnan Perumalsamy , Jeyanthi Natarajan

Abstract
Efficient and effective management of inventory throughout the supply chain significantly improves the ultimate service provided to the customer. Efficient inventory management is a complex process which entails the management of the inventory in the whole supply chain. The dynamic nature of the excess stock level and shortage level over all the periods is a serious issue when implementation is considered. In addition, consideration of multiple factories manufacturing the same product leads to very complex inventory management process. The complexity of the problem increases when lead times of stocks are involved. In this paper, these issues of inventory management have been focused and a novel approach based on Genetic Algorithm has been proposed in which the most probable excess stock level and shortage level required for inventory optimization in the supply chain is distinctively determined so as to achieve minimum total supply chain cost.
Download Full Text

Maintaining CRM in Apparel Retailing through Touch points: A Factor Analysis Approach
Swati Singh, Manju Lamba

Abstract
Customer Relationship Management is the most talked about business mantra these days. With the advent of CRM in late 1990s, marketers opine that proper vigil and analysis of customer data might bring wonders for the organization. Indian apparel retail sector is booming, leading to intense competition. The war is to attract new customers but most importantly to retain the old ones. The companies are tailoring CRM initiatives to increase their customer base. The role customer point is crucial in maintaining long term profitable relationships with the customers. This research attempts to study various touch points related to apparel retailing. The study aims at establishing the importance of customer touch points in CRM. The empirical study establishes the important touch points from customer’s point of view.
Download Full Text

Innovation Management in India
Rajiv Kaushik

Abstract
Innovation Management is used not only for developing new products but also for improving the way jobs are done to meet the organization’s mission. In 21st century emerging economies are putting tough challenges to developed economies in technology and ideology with a new set of consumer circumstances they have never encountered before. For nurturing a dynamic innovation culture organisations have to invest in right governance which should be market focussed, collaborative and adaptive. Pumping more corporate revenues into R& D wouldn’t automatically translate into more triumphs on new discoveries. Quantity does not imply quality. Corporate must strive to improve the quality of their firm’s R&D output.
Download Full Text

Experimental Study of TCP Congestion Control Algorithms
Kulvinder Singh

Abstract
The ongoing TCP congestion algorithm doesn't acquire full advantage of high delay, large-scale bandwidth environments. The forth chapter involves assessing alternative transmission control protocol congestion algorithms and comparing them with the presently employed congestion algorithm. The destination was to discover if an alternative algorithm could allow for broader throughput with minimum impact on active network traffic. The alternative congestion algorithms employed were Scalable TCP and HighSpeed TCP. Network research laboratory experiments were execute to record the functioning of each algorithm under different network forms.
Download Full Text

Research Design through Product Life Cycle Management
Rajiv Kaushik

Abstract
Product and Life Cycle Management (PLM) has emerged as a tool to counter the problems which couldn’t be solved merely by using CAD or CAM. PLM helps in supporting product planning, collaborative product development, validation and manufacturing planning etc. PLM can cater the designing need of the parent company through a number of designing centers spread geographically across the globe. PLM give designer to do list. PLM leads to business sustainability and transforming innovations.
Download Full Text

end faq