Model Base on Human Resource System Using Classification Technique
Mahani Saron and Zulaiha Ali Othman
Abstract
In higher education such as university, academic is becoming major asset. The performance of academic has become a yardstick of university performance. Therefore it's important to know the talent of academicians in their university, so that the management can plan for enhancing the academic talent using human resource data. Therefore, this research aims to develop an academic talent model using data mining based on several related human resource systems. The case study used 7 human resources systems in one of government university in Malaysia. This study shows how automated human talent data mart is developed to get the most important attribute's of academic talent from 15 different tables like demographic data, publications, supervision, conferences, research, and others. Apart from the talent attribute collected, the forecasting talent academician model developed using the classification technique involving 14 classification algorithm in the experiment for example J48, Random Forest, BayesNet, Multilayer perceptron, JRip and others. Several experiments are conducted to get the most highest accuracy by applying discretization process, dividing the data set in the different interval year (1,2,3,4, no interval) and also changing the number of classes from 24 to 6 and 4. The best model is obtained 87.47% accuracy using data set interval 4 years and 4 classes with J48 algorithm.
Download Full Text
Using of a New Bond Graph Technology for the Study of a High Frequency Low Pass Filter
Hichem Taghouti, Sameh Khmailia, Riadh Mehouachi and Abdelkader Mami
Abstract
Due to the frequent uses of electronic filters in radio frequency and telecommunication domains, many researchers have been interesting in its design and modeling for several years. We will present in this study a new mathematical approach that describes the steps to conceive a high frequency low pass filter by reactive elements then by microstrip line. The scattering bond graph method is applied to determine an explicit model of filter that describes the phenomenon of energy exchange between different elements of system.
Download Full Text
Compensation of Dispersion in 10 Gbps WDM System by Using Fiber Bragg Grating
P. K. Raghav, Renu Chaudhary
Abstract
In this paper demonstrates the possibility for dispersion compensation in a 10 Gbps WDM with the help of fiber Bragg Grating created with the Fiber Grating component. This component allows design of apodized and chirped fiber gratings that are able to provide dispersion compensation in optical system. The physical idea behind this compensation scheme is the creation of an apodised linear chirped grating allows us to create a time delay between different spectral components of the signal. Because of this different velocity of propagation of different spectral components, the pulse spreads. If we create fiber grating with period linearly reducing along the grating, because the higher frequencies will reflect after longer propagation in the grating a time delay between lower and higher frequency components will appear which is just opposite to this created in the SMF. Therefore propagating and reflecting our pulse in this device will allow to compensate the dispersion broadening of transmitting pulse pulse.
Download Full Text
A Novel Approach for Watermarking using Dual Watermarking Technique in Noisy Regions
Rakhee Lakhera, Alka Gulati, Shital Gupta
Abstract
Digital Watermarking is one of the most prominent technique used for protection of ownership rights of digital media which is text, audio, video or image. For providing more security to the information and to enhance the hiding capacity of an image and avoid abrupt changes in image edge areas, as well as to achieve better quality of the stego-image, a novel image data hiding technique by Wavelet Watermarking and frequency domain is proposed in this paper. The paper focuses on Image Adaptive watermarking methods in the Discrete Wavelet Transform Domain and frequency domain since they yield better results regarding robustness and transparency than other watermarking schemes. In this paper the technique is proposed to hide text data into noisy region of a digital image. The Discrete Wavelet Transform Domain and frequency domain dual adaptive watermarking algorithm which will be used for the novel application for watermarking. It helps, for providing more security to the information and result show our algorithm is best for data hiding in image.
Download Full Text
Designing of 1V Rail to Rail Operational Amplifier
Ravinder kumar, Shamsher Malik
Abstract
At low voltage, the input common mode voltage of Operational amplifier is limited which restricts its use as a buffer. The paper deals with designing a rail to rail amplifier. The paper presents a 1V rail to rail operational amplifier that can be used as a unity gain buffer in the sample and hold circuit for 1V 10 bit 1Msps pipeline ADC in 0.18μm technology. The Operational amplifier is designed using dynamic level shifting technique which uses an additional input CM adapter circuit for fixing the input common mode voltage. Novelty in the input CM adapter circuit and a low value of gm fluctuation (+_0.3%) has been achieved. The operational amplifier is implemented in standard CMOS technology.
Download Full Text
Comparison of Optimized Link State Routing Protocol on IPv4 and IPv6
Pankaj Palta, Sonia Goyal
Abstract
Ad hoc networks are infrastructure less self organizing networks. These networks are referred to as infrastructure less because there is no physical connection between the entities of ad-hoc networks. All the entities in ad-hoc networks communicate with other entities which lie in its radio frequency range. All the mobile nodes in the network dynamically set up paths among themselves to transmit packets temporarily. A MANET is an autonomous system of mobile nodes. Nodes act as a router, client and server as well and its topology is dynamic as nodes join the network whenever there is need to transmit data and leave the network when transmission gets over. These networks do not have a Central Authority for the management of the network. In recent past, several routing protocols for MANET are being proposed. Some of the prominent and promising among them are AODV, DSR, TORA, OLSR, and DSDV.
Download Full Text
Evaluation of Cost Optimization for Travelling Salesman Problem (TSP) by Comparing Various Ant Colony Optimization (ACO) Algorithms
Vineet Chaudhary, Parveen Kumar Yadav, Pawan Kumar Dahiya
Abstract
This paper introduces one of the most profound Swarm Intelligence-based approaches, namely Ant Colony Optimization (ACO). The different operators in ACO and their effect on the quality of solution are briefly discussed. The ACO algorithms variants like Ant System (AS), Elitist Ant System (EAS), Rank-based Ant System (ASrank), Min-Max based Ant System (MMAS) are detailed. The paper puts forth a strong case for applicability of ACO for more complex optimization problems.
Download Full Text
Analysis of Direct Sequence and Chirp Spread Spectrum over Flat Fading Channel for Multiple Access
Rajni Billa, Rahul Kakkar, Javed Ashraf
Abstract
This paper compares the performance of phased chirp spread spectrum and direct sequence spread spectrum technique for multiple access over different fading channels. The direct sequence spread spectrum technique is motivated by the inherent interference rejection capability of such spread-spectrum type system, especially in circumstances where immunity against Doppler shift and fading due to multipath propagation are important. Linear chirp of different chirp rates and phases spreads the modulated signal that creates a pseudo-orthogonal set of spreading codes. An efficient system for chirp spread spectrum, comparable to direct sequence spread spectrum can be made by combining linear chirp modulation with polar signaling, which reduces the multiple access interference. Simulation models for both the systems have been outlined in MATLABTM and bit error rates over fading channels in different Doppler environments, have been calculated when the coherence time is of the order of bit duration. Simulation results show that under proper selection of parameters; the phased chirp spread spectrum technique performs approximately same to direct sequence spread spectrum in all flat fading channels in terms of bit error rate.
Download Full Text
Performance Improvement of Association Rule Mining Algorithms through Load Balancing in Distributed Computing Platform
Vidushi Singh and Anil Rajput
Abstract
Decrease in hardware costs and increase in computer networking technologies have led to the exponential growth in the use of large-scale parallel and distributed computing systems. One of the biggest issues in such systems is the development of effective techniques/algorithms for the distribution of the processes/load of a parallel program on multiple hosts to achieve goal(s) such as minimizing execution time, minimizing communication delays, maximizing resource utilization and maximizing throughput. The algorithms known as load balancing algorithms, helps to achieve the above said goal(s). The objective of this paper is to identify the challenges of the dynamic load balancing of association rule mining algorithm in the distributed computing environment. In future this work can be extended to analyze the efficiency of existing algorithm and if the existing are not, develop an algorithm for dynamic load balancing of association rule mining (ARM) in distributed computing environment .
Download Full Text
Cluster Head Scheme for Wireless Sensor Networks and Security Challenges
Teena Suneja, Parveen Yadav
Abstract
Wireless Sensor networks (WSN) is an emerging technology and have great potential to be employed in critical situations like battlefields and commercial applications such as building, traffic surveillance, habitat monitoring and smart homes and many more scenarios. One of the major challenges wireless sensor networks face today is security. While the deployment of sensor nodes in an unattended environment makes the networks vulnerable to a variety of potential attacks, the inherent power and memory limitations of sensor nodes makes conventional security solutions unfeasible. The sensing technology combined with processing power and wireless communication makes it profitable for being exploited in great quantity in future. The wireless communication technology also acquires various types of security threats. This paper discusses a wide variety of attacks in WSN and their classification mechanisms and different securities available to handle them including the challenges faced.
Download Full Text
An Efficient Salient Feature Extraction by Using Saliency Map Detection with Modified K-Means Clustering Technique
Jyoti Verma, Vineet Richhariya
Abstract
Human eye is perceptually more sensitive to certain colors and intensities and objects with such features are considered more salient. Detection of Salient image regions is useful in applications such as object based image retrieval, adaptive content delivery, adaptive region-of interest based image compression, and smart image resizing .This problem can be handled by mapping the pixels into various feature spaces. This paper proposed a methodology that encapsulate K-Means Clustering with Saliency map detection technique to determine salient region in images using low-level features of luminance and color and then extract the features. Proposed methodology is simple to implement, computationally efficient and generates high quality saliency maps and saliency object of the same size and resolution as the input image. Here presented scheme identify salient regions as those regions of an image that are visually more conspicuous by virtue of their contrast with respect to surrounding regions.
Download Full Text
Jitter based Comparison of Proactive, Reactive and Hybrid Routing Protocols in Mobile Ad-hoc Network
Swati Bhasin, Puneet Mehta, Ankur Gupta
Abstract
A mobile ad-hoc network (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless links. Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Each must forward traffic unrelated to its own use, and therefore be a router. The primary challenge in building a MANET is equipping each device to continuously maintain the information required to properly route traffic. Its routing protocol has to be able to cope with the new challenges that a MANET creates such as nodes mobility, security maintenance, and quality of service, limited bandwidth and limited power supply. These challenges set new demands on MANET routing protocols. With the increasing interest in MANETs, there has been a greater focus on the subject of improving the quality of service as per the requirement of the user according to the various conditions such as cell size, weather, traffic, mobility of users etc. The main objective of this paper is to compare the performance based on jitter present in transmission of packet in a MANET by using different types of protocols viz: Proactive, Reactive, Hybrid. This system is developed for IEEE 802.11b based Wireless network and simulated through Qualnet 5.0. Packet size and No. of users are the two parameters in this paper which helps to find out the suitable type of traffic that can be use in a MANET.
Download Full Text
Comparative Analysis of Watermarking Techniques using Frequency Domain and Wavelet Domain Technologies
Kanika Chawla, Sukhvir Singh
Abstract
These days’ data and multimedia is taking on digital format. To protect this data from any kind of intentional and unintentional attacks, a protection mechanism is needed. Watermarking is one of the methods to achieve data authorization and security of digital data. Watermarking is the process of inserting or hiding valuable information behind a cover work. This paper focuses on two digital watermarking techniques, Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). DWT have been studied using the haar wavelet. Wavelets have strong capability of reconstruction thus preserving image quality and robustness under various attacks. We will calculate Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MSE). For this purpose algorithms corresponding to both domains are implemented using MATLAB and the results are analyzed and compared visually and along with the parameters. It has been observed that DWT provides better results than DCT.
Download Full Text
Dual band Equilateral Triangular Patch Antenna
Swati, Tarun kumar and Amul Kr. Aggarwal
Abstract
Among the various feeding techniques for Microstrip antennas, Microstrip line feeding is the most preferred one due to its reliability and ease of fabrication. This paper presents the Microstrip line feeding techniques in context to an Equilateral Triangular Patch antenna. The work involves calculation of input impedance of ETP (Equilateral Triangular Patch) at the centre of edge by indirect method. The Result shows Dual band operation, which is justified theoretically. Simulation of microstrip line fed triangular patch has been carried out with Advanced Design System (ADS) Software for infinite ground plane.
Download Full Text
A Heuristic Approach for Web Log Mining using Bayesian Networks
N. B. Kadu, D. M. Thakore
Abstract
In the era of globalization and World Wide Web, the Web Applications are playing vital role in our daily life. When more users are using a web application more stress will be applying on the servers. So the whole system or web server may get slow down hereby the process may also slow down or even it may crash down. This makes the users to keep waiting for longer period for the response from the web server. A heuristic approach is presented to catalyze this slow down process by applying mining concept for the web log of the web server, which in deed consist of all the transactions carried out by the end user. By applying Bayesian Networks concept we stream the mined data so perfectly that in the future we can route the end users request to the web server based on the Bayesian results. This makes the system to run on long go and sustain in too busy scenario also.
Download Full Text
Comparison between RFID Technologies for Indoor Positioning
Nidhi Verma
Abstract
Growing convergence among mobile computing devices and embedded technology promotes the development of “context-aware” applications, where location is the most essential topic. In present time, several systems are available in case a laptop, PC with a WLAN card and WLAN outdoor localization, such as GPS, assisted GPS and other access points (APs). An important characteristic of this system systems working on cellular networks. However, there is no proper way to find exact location to use an existing proper location system for indoor scenarios. A novel indoor positioning system based on received signal strength (RSS) in wireless networks with high accuracy is presented in this paper. The three improvement mechanisms, called signal strength filtration, user location filter and path tracking assistance, are employed to improve the positioning accuracy of the system. The comprehensive performance of the proposed system is analyzed in detail and compared with the Radar system.
Download Full Text
Component of Symmetric key Algorithm TORDES with its Functionality
Ajay Bhushan, Pawitar Dulari
Abstract
In the absence of generally acknowledged metrics in the public area that could be used to compute and spell out cryptographic strength, a small operational group agreed to look at the possibility of developing an approach to cryptographic metrics The purpose of this paper is to report the results of the limited exploratory effort by the above operational group that investigated the practicality of developing metrics for use in specifying the strength of cryptographic algorithms. This paper only deals with a small sample of selected symmetric cipher block encryption algorithms.
Download Full Text
Foreign Direct Investment in India
Shalini Aggarwal, Ankush Singla, Ritu Aggarwal
Abstract
Foreign direct investment plays an important role in the economic development of the country. It helps in transferring of financial resources, technology and innovative and improved management techniques along with raising productivity. An Indian company may receive Foreign Direct Investment either through automatic route or government route. The paper tries to study the need of FDI in India, to exhibit the sector-wise & year-wise analysis of FDI’s in India, to rank the sectors based upon highest FDI inflows. The results show that Mauritius is the country that has invested highly in India followed by Singapore, Japan, and USA and so on. It also shows that there has been a tremendous increase in FDI inflow in India during the year 2000 to 2011.
Download Full Text
Rail to Rail Operational Amplifier for Sample & Hold Circuit in Pipeline ADC
Shamsher Malik, Ravinder kumar
Abstract
The papers presents a 1V rail to rail operational amplifier that has been used as a unity gain buffer in the sample and hold circuit for 1V 10 bit 1Msps pipeline ADC in 0.18µm technology. An open loop architecture is chosen for the implementation of sample and hold circuit. The transmission gate switch is used in the sample and hold circuit for reducing the effect of channel charge injection and clock feed through. Also, the transmission gate switch offers a low resistance as compared to pMOS or nMOS switches switches. The sample and hold circuit speed up to 1Msps has been achieved.
Download Full Text
Energy Efficient Multihop Routing scheme with in Network Aggregation for WSN
Manisha Jangra, Shamsher Malik, Ravinder Kumar
Abstract
This paper introduces an energy efficient, multi-hop routing scheme, with in-network aggregation. The technique uses clustering as the base of our algorithm. Ant Colony Optimization (ACO) is implemented over clustering algorithm for multi-hop routing. This reduces amount of direct transmissions from CHs to BS. The technique work in three phases: (a) clustering, (b) intra-cluster communication, (c) inter-cluster communication. LEACH is implemented for clustering, which generates randomly distributed clusters. Then cluster members send data directly to their cluster head. Ant Colony Optimization algorithm (ACO) is used for communication between cluster-heads and base-station. Use of clustering minimizes the transmission of redundant data by data aggregation at the cluster-head level. ACO tends to search shortest and energy efficient route. The results shows lower power consumption and lower average cost (distance) and thus longer lifetime.
Download Full Text