Archive

Design and Analysis of Load Balancing Clusters in wireless Adhoc Network
K.K.Tripathi, Gopindra Kumar, Neeraj Tyagi

Abstract
Ad hoc networks are a collection of nodes which move freely and independently and communicate with other node through wireless links. These networks are logically represented as a set of clusters by grouping nodes which are in close proximity with one another. Clusterheads form the backbone and this clusterhead is used to route packets from one node to other nodes in the cluster. Independent nodes are supposed to have non-deterministic mobility pattern. Different heuristics use different policies to select clusterheads.Many of these strategies are in favor of some node and these nodes show greater responsibility and try to deplete their energy faster, it lead them to drop out of the network. Therefore, there is a need of load-balancing among clusterheads so that all nodes have the opportunity to serve as a clusterhead. I present a load balancing approach (heuristic) to increase the life of a clusterhead as max. as possible before the exemption of this node as clusterhead . This helps in equal distribution of the responsibility of acting as clusterheads among all nodes. Thus, the approach (heuristic) insures fairness and stability
Download Full Text

Digital Watermarking for Protection of Intellectual Property
Prachi Khanzode, Siddharth Ladhake and Shreya Tank

Abstract
Digital watermarking is the process of embedding information into a digital signal in a way that is difficult to remove and protect the copyright of media signals. This paper aims to provide a universal review and background about the watermarking definition, purpose, techniques and types of concept and the main contributions in this field. It starts with a general view of digital data, the Internet and the products of these two, namely, the multimedia and the e-commerce. Then, it provides with some initial background and history of digital watermarking. This paper presents an extensive and deep literature review of the field of digital watermarking and watermarking algorithms. It also highlights the future prospective of the digital watermarking .
Download Full Text

Neural Networks Touching New Horizons in Video Games
Neetu Nasheir Duhan

Abstract
Neural Networks are touching new horizons in video games. While a detailed description of neural systems seems currently unattainable, progress is made towards a better understanding of basic mechanisms. Neural networks offer some key advantages over more traditional AI techniques. First, using a neural network may allow game developers to simplify the coding of complex state machines or rules-based systems by relegating key decision-making processes to one or more trained neural networks. Second, neural networks offer the potential for the game's AI to adapt as the game is played. Modern video games are usually played in real time, allow very complex player interaction and provide a rich and dynamic virtual environment. Neural Net can use a technique for increasing the probability that a population will remember old skills as they learn new ones. This paper is presenting Learning, Augmented Topology and many facets of neural network with video games.
Download Full Text

Increment of Cyber Crimes against Our Securities
Kulvinder Singh

Abstract
The cybercrimes, or crimes perpetrated using digital technology and infrastructure, are a rapidly growing problem. Yet digital evidence can be tied to more conventional crimes, so helping both police administrators, corporate executives and the public understand cyber complexities is important. Various types of offenses under computer crimes also reflect the extent to which computers have entered our lives. Our research is about a variety of issues, including their levels of experience and training, their job functions, and the problems they experience in their day-to-day work. We find that the largest organization worldwide dedicated to the advancement of training, education and information sharing information between law enforcement and corporate cybercrime investigators.
Download Full Text

Network Intrusion Detection System for Denial of Service Attack based on Misuse Detection
Munish Sharma and Anuradha

Abstract
In a wireless network system the security is a main concern for a user. It is basically suffering from mainly two security attacks i) Virus Attack ii) Intruders. Intruder does not only mean it want to hack the private information over the network, it also includes using a node bandwidth and increasing the Delay of Service for other host over the network. This paper is basically based on such type of attack. This paper reviews the comparison of different Intrusion Detection System. On the behalf of the reviewed work we proposed a new Network Intrusion System that will mainly detects the most prominent attack of Wireless Network i.e. DoS Attack. The proposed system is an intelligent system that will detect the intrusion dynamically on the bases of Misuse Detection which has very less false negative. The system not only detects the intruders by the IP address, it detects the system with its contents also.
Download Full Text

 

Impact of Brand Equity on Customer Purchase Decisions: An Empirical Investigation
Ashutosh Nigam, Rajiv Kaushik

Abstract
With stiffening of competition among different car companies it become extremely important for marketers to focus on branding of their products. Brand equity is important tool for associating a brand and influencing customers in making purchase decisions for particular brand of hatchback cars. Factor analysis is used to understand the underlying factors influencing customers in positive purchase intension. The study throws light on various factors of brand equity marketers much focus on to attract and retain their prospective and existing customers. The study concludes that right marketing mix in marketing strategy a pivotal role in customer purchase decision criterion.
Download Full Text

Broadcasting Protocol & Routing Characteristics With Wireless ad-hoc networks
Puneet Garg, Raman, Parveen Khasa

Abstract
The mobile ad hoc network (MANET) has recently been recognized as an attractive network architecture for wireless communication. Reliable broadcast is an important operation in MANET (e.g., giving orders, searching routes, and notifying important signals). However, using a naive flooding to achieve reliable broadcasting may be very costly, causing a lot of contention, collision, and congestion, to which we refer as the broadcast storm problem A set of metrics for describing these characteristics, for example for characterizing routing scenarios in simulations, analysis, and tested implementations. Based on these metrics, we perform a detailed simulation analysis of the routing characteristics of the three most common simulation models for generating unidirectional links in ad hoc networks: the random-power model, the two-power model, and the three-power model.
Download Full Text

Data Communication using Pulse Shaping techniques in wireless signal processing approach-In depth review
A S Kang, Vishal Sharma

Abstract
One of the most challenging issues facing deployment of 3G technology is how to make the network architectures compatible with each other. New signaling techniques are being designed specially to enhance today’s 2G networks, deliver unprecedented functionality for 3G, and successfully derive the future generation of wireless systems, thus delivering immediate and long term benefits to subscribers. With the architecture of each generation of wireless devices addressed in the development of advance technologies, subscribers can easily evolve their systems without additional network modification, significantly reducing cost and implementing time. The present paper provide the in depth review of Data Communication using Pulse Shaping techniques in wireless signal processing approach.
Download Full Text

Technology Based On Touch: Haptics Technology
Nisha Sharma, Swati Uppal and Sorabh Gupta

Abstract
In experiment psychology and physiology, the word haptic refers to the sense of touch. So, haptic technology does for the sense of touch what CG does for vision. Haptic may refer to haptic technology, haptic communication, haptic perception. Haptic technology interfaces with the user through the sense of touch. Haptic communication means by which people and other animals communicate via touching. Haptic perception is the process of recognizing objects through touch. Haptic technologies provide force feedback to users about the physical properties and movements of virtual objects represented by a computer. Currently this involves solving challenging problems in mechanical design, actuators, real time system. Here, we will discuss a distinct property of haptic interfaces, that provides simultaneous exchange of information between a user and a machine. This paper proceeds with a description of the components of haptic devices and use of haptics in our daily life.
Download Full Text

Enhancing User Experiences on Terrain Using Android Platform
Venkata Ramu Bathina and Aju

Abstract
From last few years, there is a tremendous improvement in the capabilities of mobile devices; the main intention of this paper is to enhance User Experiences on Terrain using Android platform because it has various in built features like OpenGL ES, GPS, Bluetooth provided by its SDK. Android has a more capability to enhance the terrain applications through rich user interface, touch and gesture support through this performs the Map rendering, navigation operations on mobiles very easily. Terrain is one of the most important components in creating outdoor virtual scene in wide range of applications such as simulation, Geographical Positioning System (GPS), virtual environment. For creating terrain Android provide provides one in built open standard low level rendering API that is Open GL ES through this enable 3D graphics on embedded systems such as PDA’s and mobiles. Terrain has an interface between user and SQ lite database .It takes input as user data longitude and latitude (touch on terrain) for the corresponding parameters get response from database. Its database contains latitude, longitude, and terrain name and elevation data at required resolution based on USGS dataset. Experiments are performed using two datasets with result based on frames per second and the rendering speed of terrain on mobile and computer is different. The problems of this paper is highlighted in future research and will be great importance to Gesture of Mobile device.
Download Full Text

A Low Power 8-bit Magnitude Comparator with Small Transistor Count using Hybrid PTL/CMOS Logic
Geetanjali Sharma, Uma Nirmal, Yogesh Misra

Abstract
Magnitude comparison is one of the basic functions used for sorting in microprocessor, digital signal processing, so a high performance, effective magnitude comparator is required. The main objective of this paper is to provide new low power, area solution for Very Large Scale Integration (VLSI) designers. At circuit level, Hybrid PTL/CMOS Logic style gives best results over CMOS only and PTL only. A fine cost-performance ratio comparator design based on modified 1’s complement principle and conditional sum adder scheme using Hybrid PTL/CMOS logic style has been proposed in this paper and the proposed design has small power dissipation and less area over various supply voltages. Simulations based on BSIM 3V3 90nm CMOS technology. It shows an 8-b comparator of the proposed architecture only needs 154 transistors.
Download Full Text

Identification of Factors Affecting Product Cannibalization in Indian Automobile Sector
Meenu

Abstract
The changes in demographic characteristics of majority of consumers change their perception and preferences about the existing products and hence the products lose their market share with the introduction of new or modified product which leads product cannibalization. The car purchase decision is still very difficult for Indian consumers, as the decision depends upon the numerous factors. The consumers evaluate available alternatives in the market on the basis of their demographic characteristics such as income, occupation, age etc. and evaluation criteria such as fuel efficiency, price, maintenance cost, looks and style etc. Therefore to recognize the reasons concerning product cannibalization, is important to understand the decision making process for purchase of a new car. Demographic characteristics of majority of consumers depend upon the macro-economic factors. So an attempt has been made to know the relationship between macro-economic factors such as Growth Domestic Products (GDP), Purchasing Power Parity (PPP), Per Capita Income (PCI) and inflation with product cannibalization in small and compact size segment cars in last two decades with the help of co-relation analysis. From the case study of Maruti Udyog Ltd. (MUL), it has found that GDP, PPP and PCI have strong positive relationship, whereas Inflation has negative relationship with the Product Cannibalization. Therefore, macroeconomic factors lead product cannibalization to a great extent because change in above mentioned factors shift consumers’ perceptions and preferences accordingly.
Download Full Text

A Novel Scheme for Intrusion Avoidance in Sensor Area Network
Swimpy Pahuja, Ankit Verma

Abstract
This paper presents a secure alternate path routing scheme in the field of sensor area networks. Our alternate path scheme provides a preventive mechanism for designing the routing scheme for wireless sensor networks. It proposes the new cluster based security architecture which starts from the initialization of the network. In this paper, we propose a security algorithm to improve routing security in wireless sensor network. The algorithm uses alternative routing paths for each data transmission call to overcome the sensor network attack. To enhance network reliability, the algorithm allows sensory data to be sent on defined routing paths; thereby increasing security of transmitted data.
Download Full Text

Online Polling System using UML Methodology
Lalit K Bansal, Harshit

Abstract
It deals with Online Polling which facilitates the public to vote on the internet rather than going to the polling booths. So, this document provides all the necessary information regarding the ONLINE POLLING and tells the way through which one can understand the overall objective of the project and each module included in it. This documentation is meant for software developers and provides an ease of information by providing various tools to describe the functioning of the project. The developer can get an idea about the need of the project along with the hardware and the software demands of the project. Moreover, one can get a succinct idea about the project by only looking on various Diagrams used in online polling system. In order to fulfill these objectives, it is crucial to apply efficient methodologies to support ICT (Information and Communication Technology) implementation.
Download Full Text

ENHANCED FP-GROWTH ALGORITHM
Kuldeep Malik, Neeraj Raheja and Puneet Garg

Abstract
Based on analyzing an association rule mining algorithm called FP tree. a new association rule mining algorithm called Enhanced FP was presented. As the main disadvantage of FP-Growth is that it is very difficult to implement because of its complex data structure. In this FP-tree takes a lot of time to build and also needs more memory for storing the transactions. To overcome these disadvantages, I introduce Enhanced-FP, which does its work without any prefix tree and any other complex data structure. It processes the transactions directly, so its main strength is its simplicity.
Download Full Text

Fabrication, Sensing & Application of MEMS/NEMS Technology
Sourabh Srivastav, Preetam Bhardwaj, Summit

Abstract
The fabrication technology for MEMS is similar as semiconductor devices. MEMS manufacturing processes include Photolithography, Wet etch, Micro electrical discharge machining (EDM), Laser micromachining and the most important process is the silicon surface machining that is the oldest and best understood approach. Due to specific demands for MEMS/NEMS devices these other fabrication methods are used. After general survey of micro-technology some of the specific MEMS/NEMS fabrication processes and sensing will be discussed like surface micromachining, SOI technology, LIGA etc.
Download Full Text

Efficient Energy Modeling in Wireless Sensor Networks
Sri Harsha B V V and Srimathi C

Abstract
WSN consists of a number of sensor nodes, each node assigned with the task of sending the sensed information from surroundings to a central base station. In this type of network setup, sensor nodes are generally energy deficient when compared to the base station which is all powerful. Hence it is essential to look into the pattern of energy consumption and protocols adopted by various nodes, so as to increase the lifetime of the network. In this paper, we present a multi-hop ad hoc routing protocol which is all energy aware, hence it reduces the overall energy consumption in the network, thus increasing the life time of nodes in network. This protocol is an event-driven and location based and designed by assuming a stationary configuration of nodes. In this setup we assume that the sensor nodes are distributed uniformly in a rectangular grid, with base station at one of the corners of grid. Then we give a modeling for energy consumed by each node, assuming that an event happens at one node in the grid. By taking into consideration, a uniform distribution of events all across the grid, we give a formulation for expected energy consumed by a node. Based on the formulation, we realized that there was uneven distribution in the pattern of energy consumed by the nodes that are present at boundaries of the grid, and hence we give a small modification to the proposed protocol which makes the energy consumption pattern uniform, across all the nodes in network.
Download Full Text

Architecture for Three-Dimensional (3-D) Discrete Wavelet Transform for Grayscale image
Vikas Kumar, Sonal

Abstract
Three-dimensional discrete wavelet transform (3-D DWT) is used for compression applications. DWT allows for better compression on 3-D data as compared with 2-D methods. This paper describe an architecture for the three-dimensional DWT, called the 3DW-I. 3DW-I architecture is based on folding. Applications of this architecture include high definition television (HDTV) and medical data compression, such as magnetic resonance imaging (MRI). Three-dimensional DWT is implemented in 3DW-I architecture like to folded one-dimensional and two-dimensional designs. 3-D DWT allows even distribution of the processing load onto 3 sets of filters, with each set performing the calculations for one dimension. The control for this design is very simple, since the data are operated on in a row–column and image fashion. The architecture is described according to memory requirements, number of clock cycles, and processing of frames per second.
Download Full Text

Performance Analysis and Simulation of H-S/MRC using M-ary Digital Modulation Technology
Neelam Yadav, Jyoti Yadav and Poonam Yadav

Abstract
Hybrid Selection / Maximal Ratio Combining is a diversity combing scheme where Lout of N diversity branches are selected and combined using Maximal Ratio Combining (MRC). This technique provides improved performance over L branch MRC when additional diversity is available. It is denoted such hybrid schemes as H-S/MRC-L\N. in the context of coherent wideband CDMA systems, these systems offer less complex receivers than the conventional MRC receivers since they have the fixed number of fingers independent of the number of multipath. In this project the exact expressions for the Symbol Error Probability (SEP) are derived for Hybrid Selection/Maximal Ratio Combining wireless systems in multipath fading environment. Coherent detection of several types of M-ary modulations is considered.
Download Full Text

Instant and Protest in Mobile Adhoc Network
Sombir Singh Sheoran

Abstract
A Mobile Ad-hoc Network (MANET) is composed of mobile nodes without any infrastructure. MANET applications such as audio/video conferencing, webcasting requires very stringent and inflexible Quality of Service (Qos). The provision of Qos guarantees is much more challenging in MANETs than wired networks due to node mobility, limited power supply and a lack of centralized control. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. It represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self-organize into arbitrary and temporary, ‘‘ad-hoc’’ network topologies, allowing people and devices to seamlessly internetwork in areas with no pre-existing communication infrastructure. Ad hoc networking concept is not a new one, having been around in various forms for over 20 years. Traditionally, tactical networks have been the only communication networking application that followed the adhoc paradigm. Recently, the introduction of new technologies such as the Bluetooth, IEEE 802.11 and Hyperlan are helping enable eventual commercial MANET deployments outside the military domain. These recent evolutions have been generating a renewed and growing interest in the research and development of MANET. This paper attempts to provide a comprehensive overview of this dynamic field. It first explains the important role that mobile ad hoc networks play in the evolution of future wireless technologies. Then, it reviews the latest research activities in these areas of MANETs characteristics, capabilities and applications.
Download Full Text

Capacity Improvement of WI-MAX In presence of Different Codes WI-MAX: Speed & Scope of future
Puneet Garg, Nitin Arora and Tajender Malik

Abstract
IEEE 802.16e, mobile Wi-Max, is a wireless technology used to provide very high data rate over large areas to a large number of users where broadband is unavailable. It uses OFDMA (Orthogonal Frequency Division Multiple Access) as a transmission scheme based on multicarrier modulation. The performance or capacity improvement is achieved using forward error correction codes (FEC). Two other codes, convolution code (CC) and low density parity check code (LDPC) are for achieving the high capacity. BER is also a major factor of it & performance with BER is compared using different FEC for mobile Wi-max.
Download Full Text

Behavioral Study of MANET Routing Protocols by using NS-2
Anil Kumar Sharma and Neha Bhatia

Abstract
A Mobile Ad-hoc NETwork (MANET) consists of a number of mobile wireless nodes, among which the communication is carried out without having any centralized control. MANET is a self organized, self configurable network having no infrastructure, and in which the mobile nodes move arbitrarily. The mobile nodes can receive and relay packets as a router. Routing is a critical issue and an efficient routing protocol makes the MANET reliable. For almost last 10 years, a number of routing protocols have been studied and their performance comparisons are made by many researchers. Most of the previous research on MANET routing protocols have focused on simulation study by varying various parameters, such as network size, pause times, node mobility independently etc. In this work a study has been carried out on the behavioral aspect of three different MANET routing protocols i.e. AODV (Ad Hoc On-Demand Distance Vector), DSDV (Destination Sequenced Distance-Vector) and DSR (Dynamic Source Routing Protocol) using the NS-2 simulation tool. The performance of these routing protocols is analyzed in terms of their average throughput, average delay & maximum packets in queue and their results are shown in graphical forms. The main objective of this study is to create a choice guide of routing protocol for a given network scenario, based on the relative performance of the protocols under various scenarios.
Download Full Text

Evolving limitations in K-means algorithm in data mining and their removal
Kehar Singh, Dimple Malik and Naveen Sharma

Abstract
In the modern world large amount of information is stored in our database. These information are stored at different places in our data bases, therefore we have to develop some methods for extracting essential Information from these databases. Therefore we have to develop some methods for extracting essential Information from these databases; data mining is the process of extracting this information. There are various types of algorithms in data mining process. From these algorithm k-means algorithm is evolved. K-means is very popular because it is conceptually simple and is computationally fast and memory efficient but there are various types of limitations in k means algorithm that makes extraction some what difficult. In this paper we are discussing these limitations and how these limitations will be removed.
Download Full Text

Effective Communication and Marketing
Rajiv Kaushik

Abstract
Effective Communication is supplementary to marketing. It makes marketing campaign memorable and develops an emotional link between the marketer and target audience. When a piece of communication is to the point, relevant, worthwhile, and compelling, it moves audience — prospect — to consumer. For effective communication marketers instead of relying only on advertisement are using integrated marketing communication. Effective communication has to be both creative and effective. New ideas which developed emotional touch point with consumer proved fruitful. Sometimes irreverence generates new ideas for effective communication.
Download Full Text

end faq