Archive

Re-think About Human Computer Interaction! Need of the hour
Hardeep Singh, Bikram Pal Singh and Jaspreet Kaur

Abstract
As human life increasingly relates to and relies upon interactions with computer systems, researchers, designers, managers and users continuously develop desires to understand the current situations and future development of human computer interactions. The development of the human/computer interface has many facets and it can be described as the point of communication between the human user and the computer. The current generation of devices and presentation tricks has provided a basis for experimentation but a next generation of interface tools needs to be developed that is less centered on available technology and more on the basic needs of information communication. The progress and productivity of high-wage countries do not any more depend exclusively on the technological innovation. Increasingly, the most decisive part is the quality of the human technology interface, and the extent to which technology respects cognitive, affective and communicative needs of humans. This paper outlines the basic need to rethink about Human Computer Interaction and various socio-technical challenges of future Human Computer Interfaces.
Download Full Text

A 11.8mW Low Noise Amplifier for 3-8GHz Wideband Application
Dilip I. Thakor and Pankaj P. Prajapati

Abstract
This paper deals with the design of wideband CMOS low-noise amplifier (LNA) that combines a narrowband LNA topology with a resistive shunt feedback. The resistive shunt feedback provides wideband input matching by reducing the Q-factor of the narrowband LNA input and flattens the gain. The output peaking network is designed using bridged-shunt-series peaking network to achieve bandwidth extension. The proposed wideband amplifier is implemented in 0.13-µm CMOS technology for a 3-8GHz UWB system. Simulation is performed using the SPICE software and the BSIMV3 model for the 0.13-µm CMOS process. The measured gain is greater than 16dB and the noise spectral density of -180 to -188dB. The total power consumption of the wideband low-noise amplifier is 11.8mW.
Download Full Text

Performance Comparison of Ad-Hoc VANET Routing Algorithms
Vijaylaxmi S. Bhat, Pragnesh N shah

Abstract
We study the problem of multihop routing in vehicular ad hoc networks (VANET). IEEE 802.11p and other vehicular network standards advocate vehicles to issue periodic broadcast messages at regular intervals called beacons. The physical rate adaptation in 802.11 is a deeply investigated, though still open issue. Since 802.11 uses the random access Distributed Coordination Function (DCF) mechanism to access the medium, collisions can occur when two or more stations want to transmit data simultaneously. The challenge of rate adaptation schemes to adapt the physical transmission rate based on channel-related losses, i.e. collisions should not influence the choice of the rate. In this paper we propose a rate adaptation algorithm that behaves like Auto Rate Fallback (ARF), but makes use of the RTS/CTS handshake, when necessary, to decide whether the physical transmission rate should be changed. We evaluate the performance of rate adaptation algorithm, comparing it with other well known algorithms.
Download Full Text

Performance Analysis of Optical Burst Switching (OBS) Network
Sagar H. Sodhatar, R. B. Patel and V. J. Dave

Abstract
Optical Burst Switching (OBS) is a promising switching paradigm for all-optical WDM networks. It combines advantages of both Optical circuit switching (OCS) and Optical packet switching (OPS) and avoids the disadvantages. Optical Burst Switching (OBS) is a new paradigm where the use of modeling and simulation tools is very important. In OBS there is strong separation between control packet called control burst and data packet called data burst. A control burst is sent in advance, which configures the switches in the path for the data burst. Due to lack of adequate contention resolution technique data burst loss is high in OBS. In this paper we present a complex topology. NS-2 is used as simulation software in this parametric study. The result shows the significant reduction in the BLR.
Download Full Text

A Comparative Study of DCT and DWT-SPIHT
Nivedita, Pardeep Singh, Sonika Jindal

Abstract
Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT) are the common methods used in signal and image compression. Wavelet transform are very powerful compared to Fourier transform because its ability to describe any type of signals both in time and frequency domain simultaneously. In this paper, we will discuss the use of Discrete Cosine Transform (DCT) and Wavelet Based Image compression Algorithm-Set Partitioning in Hierarchical Tree (SPIHT). We do the numerical experiment by considering various types of images and by applying DCT and DWT-SPIHT to compress an image. We found that DWT yields better result as compared to DCT. For DWT, various wavelet filters such as Haar (2 filters) and Daubechies (up to 10 filters) are used. All the numerical results were done by using Matlab programming.
Download Full Text

Quality Dependent Vertical Handover Decision Algorithm for Fourth Generation (4G) Heterogeneous Wireless Networks
Nikhil Patel, Kiran Parmar

Abstract
Future wireless networks must be able to coordinate services within a diverse-network environment. One of the challenging problems for coordination is vertical handoff, which is the decision for a mobile node to handoff between different types of networks. While traditional handoff is based on received signal strength comparisons, vertical handoff must evaluate additional factors, such as monetary cost, security, power consumption, network conditions, and user preferences. In this paper, several optimizations are proposed for the execution of vertical handoff decision algorithms, with the goal of maximizing the quality of service experienced by each user.
Download Full Text

Automatically Allocating Multiple Simultaneous Errors
Ajai Kumar, Anil Kumar, Deepti Tak, Sonam Pal

Abstract
This technique uses multiple failing runs in order to rank program statements according to likelihood of being faulty. However, the technique implicitly assumes that all considered failing runs fail due to the same error. In the event that multiple simultaneous errors are present in software, different failing runs may fail due to different errors,. This can decrease the perceived suspiciousness of the faulty statements as compared to the non-faulty statements, thereby making it more difficult to isolate the faulty statements and decreasing the effectiveness of the technique for locating errors. Three variations of this idea are developed that involve different techniques for computing a new ranked list of statements on each iteration. Each ranked list is computed using the updated dynamic information that results from fixing the previously-located error.
Download Full Text

Development of a New Class of Cost Effective and Fault Tolerant Multi Stage Interconnection Network for Parallel Computing System
Shama Pathania, Jasbir Singh Saini

Abstract
In this paper, a review of various regular and irregular routing algorithms of parallel computing networks is done. It can be deduced from the analysis that irregular Parallel computing networks performs better than regular ones because irregular networks are usually less costly and multipath in nature. A major problem in designing a large-scale parallel and distributed system was the construction of an Interconnection Network (IN) to provide inter-processor communication. One of the biggest issues in the development of such a system was the development of an effective architecture that have high reliability, give good performance (even in the presence of faults), low cost higher number of passes of request and a simple control. In this paper, a new class of irregular fault-tolerant multistage interconnection network named Cost Effective and Fault Tolerant Multi stage Interconnection Network(CEFT) is proposed and analyzed. The CEFT MIN can achieve significant tolerance to faults and good performance with relatively low costs and a simple control scheme. The construction procedure of the CEFT network, algorithm for allocation of path length, routing along with the routing procedure, fault-tolerance aspect is described too.
Download Full Text

Implementation of Role Based Model
Anil Kr. Pandey

Abstract
Software engineering is defined in the IEEE standard 610.12 as “the application of a systematic, disciplined, quantifiable approach to the development, operation and maintenance of software”. This paper is based on approach which can be used for applying the reverse engineering to improve the quality of software system. The dynamic structure of a system plays an important role for providing high level abstraction. Analysis of a dynamic structure of a system is one of the areas of research for both structural and behavioral perspective. Role based approach explains the analysis of the dynamic structure of a complex system.
Dynamic structure refers to change that occur to a system structure while it is running. Cost effective development of a large integrated system can be realized through systematic reuse of development into a development process of a software system. Happens that only documentation available for maintain is the source code itself. Under this environment, maintains the source code can be extremely difficult. One way of handling this problem to start with the source code and attempt to recreate the design documents or we have a dynamic structure of a system. Role is a particular set of properties associated with objects or groups of objects in a particular context. A role model describes the essential aspects of a pattern in terms of highly abstract state and behavior elements.
Download Full Text

Face Recognition: Today’s Security Tool
Kailash Chander, Poonam

Abstract
Face and facial feature detection plays an important role in various applications such as human computer interaction, video surveillance, face tracking, and face recognition. Efficient face and facial feature detection algorithms are required for applying to those tasks. Recently face recognition is attracting much attention in the society of network multimedia information access. Face recognition not only makes hackers virtually impossible to steal one's "password", but also increases the user-friendliness in human-computer interaction. Face recognition systems are now replenishing the need for security to cope up with the present day crime. It is really convincing with the market report which clearly depicts the growing popularity of the face recognition system. The face recognition system is proving to be very efficient in the present day market. In today's networked world, the need to maintain the security of information or physical property is becoming both increasingly important and increasingly difficult. From time to time it has been noticed about the crimes of credit card fraud, computer hackings, or security breaches in a company or government building. Government agencies are investing a considerable amount of resources into improving security systems as result of recent terrorist events that dangerously exposed flaws and weaknesses in today’s safety mechanisms.
Download Full Text

Time bound Adaptive Genetic Algorithm based face recognition
S. N. Palod, S. K. Shriwastava, P. K. Purohit

Abstract
When huge face database has to be searched for face detection time becomes the deciding factor for certain applications such as airport security checks where face detection within a short span of time is desirable. Genetic algorithm helps in close match in a very large face database based on heuristic search. PCA based features is a compulsion from the point of view of low dimension and space limitation. This paper proposes time bound adaptive genetic algorithm so as to reduce time for face detection application in shortest span of time. Integrated expert system will still reduce time for recognition.
Download Full Text

SNR Performance Analysis of Rake Receiver for WCDMA
Nikhil B. Patel and K. R. Parmar

Abstract
The communication industry is experiencing an explosion in the demand for personal communications services. Telecommunications service providers and network operators are embracing the recently adopted global third generation (3G) wireless standards in order to address emerging user demands and to provide new services like voice communications, high-speed data and multimedia services. WCDMA is the required technology for above mention services. WCDMA was designed to meet such high data rate up to 3.84 Mcps and high bandwidth. The higher bandwidth causes a more channel distortion. It is modeled as a multi-path phase and amplitude distortion. Two major effects resulting from multipath propagation first, the signal energy may arrive at the receiver across clearly distinguishable time instants and second is fast fading. To overcome these effects Rake receiver is used which combines delayed dispersive energy. We examined the SNR performance of Rake Receiver with, varying spreading factor, Rake fingers and number of multipath. We also examined performance of LMS Algorithm for channel estimation. From the results we have seen that the SNR performance of Rake Receiver is affected by varying these parameters and it gives useful insight for implementation.
Download Full Text

Design of Special Purpose Printed Circuit Board (or-CADD Designing) for EMG Signal Controlled Artificial Arm
Varun Sharma, Rajesh Kumar

Abstract
An electromyogram (EMG) signal is the signature of a muscle contraction by which our limbs can be moved. When part of a limb is lost due to any reason, there will be no hardware but in muscles there is still a signal. An amputee person can then used those muscular signals to activate a myoelectric prosthesis and able to produce some movements. Myoelectric prostheses are capable of many degrees of freedoms. This paper presents a design of hardware for artificial arms controller. But some problem of delays and prosthesis mismatching occurs at time in performing some daily activities. Using this hardware the patients can save time and get quick response On-board microcontroller controlled joints are making prosthetic arms and legs more responsive and easier to control by the user.
Download Full Text

Automatically Locating software Errors using Interesting Value Mapping Pair (IVMP)
Ajai Kumar, Anil Kumar, Deepti Tak, Sonam Pal

Abstract
Software does not always behave as expected due to errors. These errors can potentially lead to disastrous consequences. Unfortunately, debugging software errors can be difficult and time-consuming. Many techniques to automatically locate errors have been developed, but the results are far from ideal. Unlike other techniques that analyze existing state information from program executions, dynamic state alteration techniques modify the state of program executions to gain deeper insight into the potential locations of errors. However, prior state alteration techniques are generally no more effective than other techniques, and come at the expense of increased computation time. The Value Replacement technique performs aggressive state alterations to locate software errors by replacing the set of values used in different statement instances in failing program executions. In a set of benchmarks, interesting value mapping pair (IVMP) precisely identifies a faulty statement; interesting value mapping pair (IVMP) can be generalized to iteratively locate multiple errors.
Download Full Text

Knowledge Management- Organizational Investment in Intangibles
Mani Bansal, Shitika and Anamika

Abstract
This paper addresses the issue of knowledge management in organizations. It points out and conceptualizes the fundamental dimension of knowledge. It also emphasis the various typologies of the Knowledge workers. We need to realize the importance of Knowledge Management. Knowledge building may occur in an organization in an ideal situation when people interact with each other so that organization learning takes place. The paper also explores the implication of KM in today’s business environment through the use of various tools and techniques like brainstorming and physical workspace. New concepts related to Knowledge Management are elaborated including the role of knowledge workers in knowledge economy. An analysis of the theoretical foundation of KM scrutinizes a strong arena with clear directions for future work.
Download Full Text

Knowledge Management Enablers: A Comparative Study of Traditional and Technical Universities
Ashima Chawla and Shabnam Saxena

Abstract
Knowledge management is essential to manage the knowledge flow of the institution. The present study is based on primary data gathered with the help of questionnaire comprising of two sections. The first section contained demographics of the respondents and second section contained twenty six statements about knowledge management enablers in universities. Primary data based on 100 respondents was analyzed in order to identify the various factors of knowledge management enablers in universities. Further data was subjected to correlation, factor analysis and t- test. Correlation analysis was used to assess the relationship of knowledge enabler’s factors and standard deviation was calculated to understand the variations in data collected through responses. Factor analysis was basically used to reduce the data for further analysis and t-test is used to check the significant difference between the traditional and technical universities. All twenty six variables were almost significantly correlated. Factor analysis brought out five factors in all explaining 72.779% of total variance. The derived factors were named as Mutual Trust, De- Centralization, Technology, Collaboration and Formalization. It is found that there is no significant difference between the level of knowledge management enablers in traditional and technical university.
Download Full Text

The Changing Face of Market Leaders
Rajiv kaushik

Abstract
Companies which are market leaders in their respective categories are facing a tough challenge from their competitors. Now leaders have to work harder to stay on the top. Once considered invincible players starting accepting their vulnerability. Nokia is facing tough challenge from Samsung. Although Nokia is market leader but in case of smartphone Samsung emerged as leader.Maruti Suzuki market leader in small car segment was having more than 70% market share in 2000 now convinced around 50% market share. A decade ago when the norm for market leader share was 70%-90% now has slipped to 40% - 60%. Market share of companies like Pepsi Food Co., Nestle, Hero and LG etc. has come down than it was a decade ago. Now market leaders are using different marketing strategies to keep their position intact.
Download Full Text

Impact of Social Media on Marketing
Rajiv Kaushik

Abstract
Growing popularity of social media compelled the marketers to think about this media along with traditional functional areas of marketing. Social media is based primarily on internet or cellular phone based applications and tools to share information among people. The number of social media user’s is more than the population of some of the countries today. Impact of social media on marketing can be judged by comparing marketing before the social media and marketing after the introduction of social media and type of technologies used in social media.
Download Full Text

end faq