Quality Management – A Secret to Excel
Rajiv Kaushik
Abstract
Total Quality Management is a business philosophy which centered around core ideas or principles like customer focus, continuous improvement, involvement at all levels, in all business segments; human resource management, manufacturing, supplier management, marketing, new product development, sales and service, standardization, business processes and leadership involvement.
Download Full Text
Estimation of Environmental Kuznets Curve and Kyoto Parties: A Panel Data Analysis
Surender Mor and Shivani Jindal
Abstract
The present study investigates the relationship between economic growth and environment quality using panel data on 39 countries which includes Annex 1 and Non-Annex 1 parties under the Kyoto Protocol. The study employs least squares method for testing the Environmental Kuznets Curve hypothesis using secondary data on GDP per capita and CO2 emissions. The Environmental Kuznets Curve hypothesis postulates an inverted ‘U’ shape relationship between income and environmental quality. The empirical findings of the study support the EKC hypothesis and found inverted ‘U’ shape relationship between income and environment with turning point at a level 30088 US $ PPP. Similarly Non-EIT parties and Non-Annex1 parties are also support the EKC hypothesis with turning point levels 37500 US $ and 48125 US $ PPP respectively. However in case on EIT parties there found a ‘U’ shape relationship between income and environment with turning point at a level 29000 US $ PPP. For Indian economy the study reveal a inverted U shape relationship between CO2 emission and growth of per capita GDP with turning point occurring at 49003 US $ PPP. The study reveals that the growth of per capita tends to improve the environmental quality. The study suggests that at a broad level of development per capita emission of CO2 begin to decline. The acceptance of EKC implies that there is an inevitable level of environmental damage that follows up due to economic development of a country at early stages but with significant improvement at later stage of development. This means that nations can opt for present value of higher future growth and cleaner future environment at the cost of current rate if environmental damage.
Download Full Text
Legal Framework and Corporate Governance: An Indian Perspective
Aparna Sharma
Abstract
Corporate Governance has been gaining momentum across the world due to miserable corporate failures, unethical business practices and insufficient disclosure etc. Effective Corporate Governance depends upon two factors. Transparency in the business operations and the second are the legal and administrative framework created by the Government. There is a gap between percept and practice of Corporate Governance. In this paper attempt has been made to elaborate the Corporate Governance mechanisms in the context of the legal framework in India, specifically how Clause 49 of Listing Agreement act as an opportunity for public listed companies to achieve IT Governance; though the amendment to Clause 49 of the Listing Agreement has been the topic of elaborate discussion in the Indian corporate scene. This study seeks to gain insights into the major regulatory changes impacted corporate governance practices in India.
Download Full Text
A New Multi-Resonant Frequency Microstrip Antenna with U-Shaped Patch for Wireless Communication
Vishwajeet Singh Rana, Vinay Kumar, Subodh Kumar Tripathi
Abstract
This paper presents the investigation of a new square patch antenna. In the designed antenna a U-shaped square patch has been constructed, and nelco material substrate is used in the designed antenna for multiple resonances. It is a light weight, low profile, low volume, easily mounted and low fabrication cost antenna. In this proposed antenna, we have achieved 4 resonances of -50.40db, -42db, -27.92db and -21.83db at a frequency of 5.21Ghz, 5.98Ghz, 5.55Ghz and 4.36Ghz respectively. The maximum achieved gain of the designed antenna is 7.
Download Full Text
Router Buffer Traffic Load Calculation based on a TCP Congestion Control Algorithm
Kulvinder Singh
Abstract
In this paper, instead of using the length of queue as a measure of congestion, we use traffic load, defined as the ratio of incoming rate over the outgoing rate at our router. The shape of packet marking probability used is similar to the one of RED, but the intuition of design is that using the traffic load information, will make the queue lesser oscillatory and thus increases the router’s throughput compared to RED. The objectives are then to bring the values of traffic load to one and to keep a nearly empty queue length in the memory buffer, so that the queuing delay is as small as possible. However the idea of the design is heuristic, as in RED. In the stability analysis, we perform here is meant to justify its use and to give guidelines for the design of the parameters. We assume that the network configuration where sources implements the TCP protocol.
Download Full Text
Determination of Stabilizing Parameter of Fractional Order PID Controller Using Genetic Algorithm
PankajRai, VineetShekher, Om Prakash
Abstract
This paper present the development of new tuning method and performance for Genetic Algorithm based Fractional order PID controller ,fractional order PID controller include the conventional order PID controller parameter. The tuning of the PID controller is mostly done using Zeigler and Nichols tuning method. All the parameters of the controller, namely (Proportional gain), (integral gain), (derivative gain) can be determined. Fractional order PID (FOPID) is a special kind of PID controller whose derivative and integral order are fractional rather than integer. To design FOPID controller is to determine the two important parameters (integrator order) and (derivative order).The key challenge of designing of FOPID to determine the values of and . Many random search methods, such as genetic algorithm (G.A) have recently received much interest for achieving high efficiency and searching global optimal solution in space. Due to the high potential for global optimization, GA has received great attention in control system to determine the optimal FOPID controller parameter. This paper proposed a tuning method of FOPID by using Genetic Algorithm.
Download Full Text
Design of Optimization in Object–Oriented Queries
M.C. Nikose, S.S. Dhande and G. R. Bamnote
Abstract
Query optimization is the process of finding the best or rather a reasonably efficient execution plan, thus by minimizing the time of query evaluation & the cost of evaluation to the level accepted by user. When a query jointly addresses very large and small collections, the iteration caused by query operator is driven by large collection and in each cycle a subquery which depends on an element of small collection is evaluated. The result return by subquery for such each element is same. Moreover, such a subquery is unnecessarily evaluated many times. The underlying idea used here is to rewrites such a query so that the loop is performed on small collection and inside each its cycle a subquery addressing a large collection is evaluated.
Download Full Text
Image Restoration Using Filling-In Technique
Priyanka Rajesh Gulhane, V. T. Gaikwad
Abstract
The filling-in of missing information is a very important technique in image processing. While transmission of image if some blocks of image are lost then instead of using common retransmission query protocols, we aim to reconstruct the lost data using correlation between the lost block and its neighbours. Removing a target object and filling the missing regions of an image is the key technology generally applied to image restoration. If the lost block contained structure, it is reconstructed using an image inpainting algorithm, while the same region in the texture image is filled-in with texture synthesis techniques. Depending on the type of missing block, an image inpainting algorithm or texture synthesis technique is applied. Applications of this technique include the restoration of old photographs and removal of superimposed text like dates, subtitles, or publicity. In this paper we proposed a scheme for reconstruction of the lost block from the image. The performance of this method is tested for various images and combinations of lost blocks.
Download Full Text
All Optical Universal logic Gates Design and Simulation using SOA
RekhaMehra, J. K. Tripathi
Abstract
All optical logic gates are the building blocks of optical signal processing devices. In this paper, we propose all optical universal logic gates NAND and NOR gates based on four-wave mixing (FWM) in SOA. Logic levels at the output will be differentiated by the output power. Simulation has been performed at 40 Gb/s and extinction ratio achieved for NOR gate is 7.5dB and for NAND gate is 8.75dB.
Download Full Text
Protection of Data for Unauthorized Access in Wireless Networks Security Aspects
Ravneet Kaur
Abstract
Modern communication networks have been becoming more and more large-scaled and complicated due to rapid development and interconnection among heterogeneous communication networks. Therefore, the management and maintenance of modern communication networks have posed many grand challenges to both industrial and academic communication communities. To overcome these challenges, it is very necessary to find new levels of autonomy and intelligence in designing, deploying, managing, and maintaining communication networks. Embedded software and systems are closely related to our daily life, which reside from smart appliances to unmanned trains. The present paper deals with the Protection of data for unauthorised access in Wireless Networks -security Aspects.
Download Full Text
Use of Parametric and Non-Parametric Techs. For Stock Market Volatility: A Survey
J.K.Mantri, D.Mohanty and BrajaB.Nayak
Abstract
Since the 1960’s there have emerged numerous studies questioning the degree of stock market efficiency. Fields like behavioral-economics, Finance & Computational finance have received much attention for their more flexible & detailed view regarding the volatility of stock markets in the emerging as well as in the development economics .Soft computing approach (Artificial Neural Network: ANN) has been applied to a number of systems in Financial Engineering & in many cases has demonstrated better performance than competing approach. This study is a survey on Parametric and Non- Parametric approaches to investigate the extent of these applications and to document the manner in which the ANN technologies specifically are implemented in stock market.
Download Full Text
Ant Colony Optimization with Classification Algorithms used for Intrusion Detection
Namita Shrivastava Vineet Richariya
Abstract
IDS which are increasingly a key part of system defense are used to identify abnormal activities in a computer system. In general, the traditional intrusion detection relies on the extensive knowledge of security experts, in particular, on their familiarity with the computer system to be protected. To reduce this dependence, various data-mining and machine learning techniques have been used in the literature. During recent years, number of attacks on networks has dramatically increased and consequently interest in network intrusion detection has increased among the researchers. In this paper we have used the terms detection rates and false alarm rates to compare the results of Naïve Bayes algorithm and Support Vector Machine algorithm to find out the results for intrusion detections and by using Naïve Bayes method with Ant Colony Optimization technique try to improve the rates for better detection. The proposed algorithm is used for comparative study we have done in this paper on the basis of which we measure the performance and usefulness of particular methods in detecting specific class of attacks. Experimental results performed using the KDD99 benchmark network intrusion detection dataset indicate that it can significantly reduce the number and percentage of false positives and scale up the balance detection rates for different types of network intrusions.
Download Full Text
Confidentiality & Privacy of Signaling Information elements on GSM Network by using Different Security Algorithms
Preeti, Nitin Jain, Neeraj Singla and Yogesh Kalra
Abstract
GSM security algorithms are used to provide authentication and radio link privacy to users on a GSM network .The encryption algorithm used in the GSM system is a stream cipher known as the A5 algorithm. In this Paper ,we will study about the security mechanisms incorporated in GSM that make it the most secure mobile communication, particularly in comparison to the analog systems . The use of authentication, encryption, and temporary identification numbers ensures the privacy and anonymity of the system's users.
Download Full Text
Multicast Authentication using Batch Signature-MABS
Swathi Sambangi ,P. Vijaya Bharati , Uday Kumar Addanki , Muvva Praveen Kumar
Abstract
Traditional multicast authentication schemes manage the different involvement of the receivers by letting the sender: Choose the block size, divide a multicast stream into blocks, connect each block with a signature, and spread the effect of the Signature across all the packets in the block. The relationship between packets tends to packet loss which is very common via internet and wireless communication. For which we are going to propose novel multicast authentication protocol called MABS (Multicast Authentication Based on Batch Signature) by including two specified schemes MABS-B and MABS-E. Where MABS-B reduces the packet loss by eliminating the relationship between packets ,and due to its efficient cryptographic primitive called batch signature it provides efficient latency, computation and communication overhead .Where MABS-E improve the Dos impact by combining the basic scheme with a packet filtering mechanism while preserving the perfect resilience to packet loss.
Download Full Text
Study of the Critical factor Finding’s regarding evaluation of Green supply chain Performance of Indian Scenario for Manufacturing Sector
Ashish Bhateja , Rajesh Babbar , Sarbjit Singh and Anish Sachdeva
Abstract
The research outcome based on the the Critical factor Finding’s regarding evaluation of Green supply management Performance of Indian Manufacturing Sector. For that objective research mainly carried out for the two major supply chain activities such as Green Sourcing & Procurement, Green Manufacturing & production. The finding will help to identify the critical factor that helps to measure the performance of any organization which is responsible for the impact on the environment due to their activities. To justify these critical factors we conduct a survey covering various clusters of Indian manufacturing and collect some important results in terms of their performance. In the end tried to discuss these facts in terms of cost-profit analysis which helps and motivates manufacturer to shift their steps towards eco-friendly supply chain.
Download Full Text
Optimizing the Web Mining technique using Heuristic Approach
Gunjan Batra,Vijay Laxmi and M. Afshar Alam
Abstract
With the exceptional growth of the Web, there is an escalating volume of data and information available in frequent Web pages. The swift extension of the web leads to several problems such as lacks of organization and structure. Moreover, the content is available in different dissimilar formats. Because of its hasty and muddled growth users are feeling sometimes disoriented, lost in that information overload that continues to expand. Web mining is a very extensive research area promising to solve the issues that arise due to the WWW phenomenon. So the usage of data mining methods and knowledge discovery on the web is now on the spotlight of a boosting number of researchers. The Web mining research overlaps substantially with other areas, such as Databases, IR and AI. In this work we propose research on various web mining concepts and different AI techniques used in Web Mining. We also survey A* searching algorithm that can facilitate the extraction process of web.
Download Full Text
Sustainable Supply Chain Management: Literature Review, Trends, and Framework
Mahmoud Al-Odeh and Jim Smallwood
Abstract
Sustainability concept has been introduced to many fields including management, technology, and supply chain. These days, companies have established different environmental strategies into their strategies to improve their environmental and business operations. One environmental strategy that has been applied in organizations is in supply chain management (SCM) activities. Sustainable Supply Chain Management (SSCM) is an important strategy that supports organizations in improving the overall performance. This research provides a quick review of literature review related to SSCM. The literature review showed that SSCM strategies effects are still unclear and may cause positive or negative economic performance. Therefore, the researcher provides a comprehensive definition for the SSCM. Also, the advantages and barriers for SSCM have been discussed in this research to clarify some of the ambiguity in this field. In addition, the overview for each activity in SSCM has been provided. The importance of technology systems in this field has been shown. Moreover, the subsequence of SSCM activities over the past twenty years has been clarified and summarized. Finally, a framework that helps managers developing SSCM has been introduced.
Download Full Text
A Review on Information Flow in Intrusion Detection System
Yogesh Kumar, Swati Dhawan
Abstract
An Intrusion Detection System (abbreviated as IDS) is a defense system, which detects hostile activities in a network. The key is then to detect and possibly prevent activities that may compromise system security, or a hacking attempt in progress including reconnaissance/data collection phases that involve for example, port scans. One key feature of intrusion detection systems is their ability to provide a view of unusual activity and issue alerts notifying administrators and/or block a suspected connection. This paper explains IDS classification and different phases of Intrusion analysis. This paper also describes the working of each component involved in multi-tiered architecture.
Download Full Text
Impact of Personality of Educational Administrators in Managing the Education Institutions
Rajiv Kaushik
Abstract
Personality of educational administrators has big impact in managing the education institutions. Personality of an individual can be judged by measuring different personality traits like authoritarianism, bureaucratic, machiavellianism, locus of control, type ‘A’ and type ‘B’, self esteem, Introversion, Extraversion, Neuroticism, and psychoticism. Educational administrators in Haryana is having mainly ambivalent to extroversion and are not suffering from neurotic and psychotic symptoms.
Download Full Text