Archive

Study of Nonlinearity in CO-OFDM for Single Channel and WDM System
Mamta, Manisha Bharti

Abstract
In this paper an attempt is made to study the theoretical fundamentals for Coherent optical orthogonal frequency division multiplexing (CO-OFDM) for high speed, long haul optical transmission and investigated the nonlinear effect of a 16-QAM CO-OFDM and WDM CO-OFDM at 10Gbps data rate. We then demonstrated the transmission performance through simulation for single channel CO-OFDM and multi-channel WDM CO-OFDM system with 100GHz channel spacing. The simulation results reveal that single channel CO-OFDM has better transmission performance up to 500km of SSMF without dispersion compensation in comparison to WDM CO-OFDM system where the transmission distance reduced to 400km instead of 500km.
Download Full Text

Rural Women Entrepreneurship in India
Sreenivasa Rao Behara, K. Niranjan

Abstract
Rural woman constitutes the family, which leads to society and Nation. Social and economic development of women is necessary for overall economic development of any society or a country. Entrepreneurship is the state of mind which every woman has in her but has not been capitalized in India in way in which it should be. Due to change in environment, now people are more comfortable to accept leading role of women in our society. Our increasing dependency on service sector has created many entrepreneurial opportunities especially for women where they can excel their skills with maintaining balance in their life. This study is intended to find out various Problems, motivating and de-motivating factors of women entrepreneurship. It is an attempt for real problems and motivational factors with a real Case study from Andhra Pradesh. It will also suggest the way of eliminating and reducing hurdles of the women entrepreneurship development in Indian Context.
Download Full Text

Marketing Communication Strategies of Public and Private Sector Banks- A Comparative Analysis
Manisha

Abstract
Marketing Communication becomes increasingly necessary in today’s competitive environment. It becomes mandatory for the banks to think seriously about how they can compete effectively with other financial institutions. This has led them to pay due importance to marketing communication strategies. Marketing Communication strategies perform two different functions i.e. attract the deposits on one hand and attract the borrowers and users of services. In banking sector marketing communication elements are especially important, they help to create powerful images and a sense of credibility, confidence and assurance. Therefore it is essential to evaluate all the elements of communication strategy that are used in banking service sector. The present study evaluates and compares the effectiveness of marketing communication strategies in public and private sector banks. The study assess the effectiveness of advertising, sales promotion ,personal selling and publicity and public relations in Indian Banking sector on the basis of five parameters i.e providing information, creating awareness , changing attitude ,creating Brand image and Brand loyalty. The study is exploratory in nature and two banks namely ICICI & SBI in the private and public sector respectively were selected with the target areas of Karnal and Kurukshetra districts of Haryana. A non-probability sampling technique was used comprising of 50 respondents from each bank spread over two districts with 25 each. The sampling technique may be referred as a simple convenience sampling. The respondent units were customers of both the banks respectively. A well structured questionnaire was prepared for the collection of necessary primary data on different aspects of marketing communication strategies as adopted by the two banks. A standard likert 5 point scale was used to measure the response of the selected customers and was further subjected to tabulation and analysis. In order to draw logical and scientific conclusions and inferences of the study necessary statistical tools are applied to arrive at the findings.
Download Full Text

Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity
Neha Chauhan, Akhilesh A. Waoo, P. S. Patheja

Abstract
There has been many techniques for hiding messages in images. We propose a new region-adaptive watermarking algorithm which will be used for the novel application to detect watermark attacks. One of the major advantages of the proposed watermarking detection technique is PSNR and RGB Intensity value that it allows tamper detection using linear classifier by providing these discriminating features. The watermark data is embedded on different regions of the host image using a combination of discrete wavelet transform and singular value decomposition technique. In addition, there is a novel use the region-adaptive watermarking technique as a means to detect if certain types of attack have occurred. As will be elaborated, the technique to improves the speed of detection, and also test the robustness of the proposed watermarking scheme. They are Gaussian noise, salt and pepper noise, sharpen, smoothing, histogram equalization and JPEG compression attack. At the same time, rotation, translation and scaling belongs to geometric attacks are also applied. The severity of these attacks can be adjusted by modifying their corresponding parameter values. Experimental results will detected the hiding data on the original image and has little relation to secret message file. It helps, for providing more security to the information
Download Full Text

Genetic Algorithm for Dynamic Capacitated Minimum Spanning Tree
Tanu Gupta, Anil Kumar

Abstract
Many of the network topology design problems include CMST, which means to find a minimum cost tree that connects all the nodes of the network to the central node with some capacity constraint. The links of edges have associated costs that could be based on their distance, capacity, quality of line etc, and the nodes have their associated demand. Usually most of the network obtained from CMST are static in nature, but there are situations where the network is subjected to change by addition (or deletion) of nodes, such a network is known as dynamic network and identifying CMST in this case is known as Dynamic CMST or DCMST. The Genetic Algorithm is an approach in finding better solution to DCMST problem. The GA is used with two encodings Prufer and Netkey for CMST to provide always optimal solution. Genetic algorithm are the part of evolutionary computing, which is a rapidly growing area of artificial intelligence. Genetic algorithms are computer programs, which create an environment where populations of data can compete, and only the fittest survive. Genetic algorithms are a search method that can be used for both solving problems and modeling evolutionary systems.
Download Full Text

Convergence to IFRS: What Needs to be Done by Indian Corporate to Meet the Emerging Challenges?
S Yadav, Deependra Sharma

Abstract
Recent years have seen major changes in financial reporting worldwide under which the most obvious is the continuing adoption of IFRS worldwide. An upcoming economy on world economic map, India, too, decided to converge to International Financial Reporting Standards (IFRS). While regulators, standard setters and law makers sit together to rollout the road map for implementation of IFRS in India, a wide section of the industry is already debating about the impact that they are going to have on transitioning to IFRS.. This paper explores the impact of adoption of IFRS, challenges that will come up and its adoption procedure in India. It also discusses the problems faced by the stakeholders (Regulators, Accountants, and Firms etc) in the process of adoption of IFRS in India. Paper concludes with the ways through which these problems can be addressed.
Download Full Text

Characterization of Shape Curving Effects on Multi-Band Fractal Antenna Design
Rajveer Singh, Divneet Singh Kapoor, Ravi Kumar and Amit Kumar Kohli

Abstract
The modern telecommunication systems require antennas with the wider bandwidths, the smaller dimensions, and the ability to resonate on several frequencies of interest. The fractal antennas have the capability to cater to all of the aforementioned requirements. Moreover, the fractal geometries tend to have improved level of the impedance and the standing wave ratio on the reduced physical area, in comparison with the non-fractal Euclidean geometries. This paper focuses on the design of multi-band fractal patch antennas, which can resonate at different frequencies at the same time. It is demonstrated by computer simulation results that the significant number of resonant frequencies increases with the increase in number of iterations in the fractal geometry. Besides, some simulation results are presented using the fractal geometries to give an insight into the frequency response variations with respect to the change in the curved shape of the patch of the fractal antenna.
Download Full Text

Impact of Attributes of Store Format on the Choice Behavior in Organized Retail Sector
Kamini Singh

Abstract
Indian Retail is supposed to be a promising industry with almost all the gaint players vying for a share of the coveted pie in India. Most of us experience organized retailing at BigBazaars, pantaloons, Shoppers Stop, Westside, Shubiksha, Reliance fresh outlet and other joints. Organised retail in India is expected to increase from 4 % of the total market in 2008 to 14-18% by 2015. The aim of this study is to investigate the various relevant and efficient attributes of organized grocery store with the objective to gauge the role of each attribute and their impact on the shoppers store format choice behavior. The primary data is collected through questionnaire survey of 500 randomly selected adult female grocery shoppers from Delhi, out of which only 153 was the final sample. Hypotheses are based on attributes as store personnel, proximity convenience, in store communication, price consciousness, store services, fast check out and store reputation. The Chi-square tests were applied to test the hypotheses. This study gives a more in-depth outlook for retailers to understand their market.
Download Full Text

Need of Effective Corporate Governance and Its Challenges in India
Meenu

Abstract
Corporate governance is the set of processes, policies, to ensure proper management of companies for effective accountability to all stakeholders, aim to optimize economic output and protect the interest of shareholders. It includes in its orbit all implicit and explicit relationships between the corporation and its employees, customers, creditors, suppliers and all other stakeholders. Government of India has taken policy step to provide direction, control and guidelines to all companies to work in ethical ways, create trust among shareholders and customers, to provide stability to our economy and to check financial scams and frauds. Regulations formed by different committees, need of effective corporate governance and challenges to corporate governance are briefed in this paper.
Download Full Text

A Heuristic Based Load Balancing Algorithm
Harish Rohil, Sanjna Kalyan

Abstract
In today’s competitive environment the objectives and goals of the producers (also called resource owners) and consumers (also called end users) are different. Computational grid has been considered as the best paradigm for handling large scale distributed system having geographically allocated resources. Load balancing algorithms are important in the research of network applications. In this paper we present an algorithm which reduces the average execution time and cost of the tasks. This method considers both cost and time constraints. The proposed algorithm is implemented with Gridsim toolkit which can simulate a decentralized module. The GridSim toolkit abstracts the features and behaviour of complex fundamental grid elements such as grid tasks, grid resources and grid users. This algorithm provides services like resource discovery. For evaluation purpose a comparison of execution times and cost of proposed algorithm and the other similar algorithm is also provided in this paper. Results support the proposed approach.
Download Full Text

A High Sensitive Approach for Gender Prediction by using Pupil Dilation
Priyanka Thapak, Ajit Kumar Shrivastava

Abstract
Pupil dilation is rarely analyzed in usability studies although it can be measured by most video-based eye-tracking systems and yields highly relevant workload information. Algorithms developed by the researchers for recognizing gender by their Pupil dilation patterns have now been tested in many field and laboratory, producing no false matches in several million comparison tests enabling real-time decisions about personal identity with extremely high confidence. The variety of factors that can influence pupil dilation and the distortion of pupil-size data by eye movements yields the size of the pupil as seen by the eye-tracker camera depends on the person's gaze angle. The high confidence levels are important because they allow very large databases to be searched exhaustively without making false matches despite so many chances. In the present study, we developed and implemented a neural-network based calibration interface for eye-tracking systems, which is capable of almost completely eliminating the geometry-based distortion of pupil-size data for any human subject. It also helps, for providing more security to the information.
Download Full Text

Agent-Based Software Engineering
P. Santosh Kumar Patra

Abstract
Agent-based computing represents an exciting new synthesis both for Artificial Intelligence (and, more generally, Computer Science. It has the potential to significantly improve the theory and the practice of modeling, designing, and implementing computer systems. Yet, to date, there has been little systematic analysis of what makes the agent-based approach such an appealing and powerful computational model. Moreover, even less effort has been devoted to discussing the inherent disadvantages that stem from adopting an agent-oriented view. Here both sets of issues are explored. The standpoint of this analysis is the role of agent-based software in solving complex, real-world problems. In particular, it will be argued that the development of robust and scalable software systems requires autonomous agents that can complete their objectives while situated in a dynamic and uncertain environment, that can engage in rich, high-level social interactions, and that can operate within flexible organizational structures.
Download Full Text

Bearing Fault Analysis using Frequency and Wavelet Techniques
Milind Natu

Abstract
Bearing fault diagnosis is important in condition monitoring of any rotating machine. Early fault detection in machineries can save millions of dollars in emergency maintenance cost. Different techniques are used for fault analysis such as short time Fourier transforms (STFT), Wavelet analysis (WA), Cepstrum analysis, Model based analysis, etc. This Paper explains the procedure for detecting bearing faults using FFT and by using Wavelet analysis more specifically HAAR wavelet. The analysis is carried out offline in MATLAB.
Download Full Text

Computer Based Training
Vishal Khurana, Ruchi Khurana

Abstract
In this paper, we start by providing an overview of the main components of intelligent tutoring systems. We then provide a brief summary of different types of ITS. Next, we present a detailed discussion of two components, the student model and the pedagogical module. We close by discussing some of the open questions in ITS as well as future directions of the field.
Download Full Text

Design and Analysis of a Connected E-Shape and U-Shape Dual-Band Patch Antenna for WLAN Application
Md. Mahabub Alam, Md. Suaibur Rahman

Abstract
This paper represents a numerical simulation of connected E-shape and U-shape for WLAN application. In this paper, dual operation E-shape and U-shape Patch Antenna is fed by transmission line. The objective in this design is to obtain the enhancement in bandwidth (BW) for WLAN applications over the frequency band (2 to 6 GHz).The proposed antenna is designed on two-layer, one FR4 substrate and another ground plane with an area of 33 mmx42 mm. The dual operation frequencies are 2.66 GHz and 5.72 GHz. In addition, the antenna has achievable return loss, radiation pattern and also bandwidths within the 6dB return loss bandwidth. It is observed that the impedance bandwidth can be expanded by using FR4 substrate. Furthermore, this antenna provides a stable radiation pattern across the operating bandwidth.
Download Full Text

Energy Saving using Cloud Computing
Saurabh Saxena

Abstract
This paper describes cloud computing, a platform for next generation internet computing and various layers comprising a cloud. The paper defines green computing, how energy can be saved using cloud. It proposes novel ideas to reduce costs and conserve energy at an infrastructural level while setting up resources for implementing cloud computing. The paper also highlights some of the key benefits of implementation of cloud computing paradigm that can help make earth a greener planet. It discusses how cloud can be used to provide highly efficient and optimum computational paradigm to provide for both cost and energy effectiveness using virtualization. The paper concludes with the need for inter convergence of various clouds and taking product development to a new and a higher level where not only costs but energy efficiency is also considered.
Download Full Text

QTL Identification in Presence of QTL×Environment Interaction
Nitiprasad N. Jambhulkar

Abstract
Quantitative traits are the traits controlled by many genes and each of the genes has a small effect on the trait. The loci controlling quantitative traits are referred to as QTLs (Quantitative Trait Loci) and the procedure of finding and locating the QTLs are called QTL mapping. The available literature on use of molecular markers for detecting loci influencing the performance of Maize in drought stress is very scanty in India, so the data considered belongs to Maize crop in drought stress, for the present investigation. Mapping population with 236 RILs (Recombinant Inbred Lines), using Ac7643S5 (drought tolerant) and Ac7729 (drought susceptible) as male parent, at CIMMYT and evaluated in India under AMBIONET (Asian Maize Biotechnology Network), Maize Genetic Unit, IARI is considered for the present investigation. Phenotypic data on different plant characters have been utilized for the present study. Genotypic data on RILs obtained through 138 RFLP markers and a linkage map of a total length of 2250 cM with an average density of 17 cM are used for QTL detection. Genotypic data is obtained through molecular marker assay whereas phenotypic data is derived from evaluation of mapping population of the target traits of interest. The analysis is done using software QTLMapper (version 1) and it is found that marker MK28 has main-effect on four traits, marker MK28, MK101 and MK34 has main-effect on two traits. Interaction effect has also been found in different marker pairs. The results are obtained considering the main and interaction effect of markers and it is seen that for the trait Anthesis-Silking Interval one QTL is present on chromosome 1 located on marker MK13. For the trait Ear Height, three QTLs are present, first QTL on chromosome 1 located on 4cM to right from MK8, second QTL on chromosome 2 located on MK34 and third QTL on chromosome 8 located on MK101. For the trait Grain Yield two QTLs are present, first is on chromosome 2 located on 2cM to the right from MK28 and second QTL on chromosome 4 located on MK51. For the trait Ear Diameter one QTL is present on chromosome 3 located on MK35. For the trait 100 Kernel Weight one QTL is present on chromosome 2 located on 14cM to the right of MK27. For the trait Plant Height one QTL is present on chromosome 8 located on marker MK101.
Download Full Text

Reconstruction of Perturbed Data using K-Means
Prasannta Tiwari, Hitesh Gupta

Abstract
A key element in preserving privacy and confidentiality of sensitive data is the ability to evaluate the extent of all potential disclosure for such data. In other words, we need to be able to answer to what extent confidential information in a perturbed database can be compromised by attackers or snoopers. Several randomized techniques have been proposed for privacy preserving data mining of continuous data. These approaches generally attempt to hide the sensitive data by randomly modifying the data values using some additive noise and aim to reconstruct the original distribution closely at an aggregate level. The main contribution of this paper lies in the algorithm to accurately reconstruct the community joint density given the perturbed multidimensional stream data information. Any statistical question about the community can be answered using the reconstructed joint density. There have been many efforts on the community distribution reconstruction. Our research objective is to determine whether the distributions of the original and recovered data are close enough to each other despite the nature of the noise applied. We are considering an ensemble clustering method to reconstruct the initial data distribution. As the tool for the algorithm implementations we chose the “language of choice in industrial world” – MATLAB.
Download Full Text

Bioinformatics: Homology Detection and Protein Families Computation in the Area of New Research
Manjeet Kaur Bedi, Kendar Pratap and Raj Kumari

Abstract
It is the name given to these mathematical and computing approaches used to glean understanding of biological processes. It is the application of information technology to the field of molecular biology. Bioinformatics entails the creation and advancement of databases, algorithms, computational and statistical techniques, and theory to solve formal and practical problems arising from the management and analysis of biological data. Over the past few decades rapid developments in genomic and other molecular research technologies combined developments in information technologies have combined to produce a tremendous amount of information related to molecular biology Common activities in Bioinformatics include mapping and analyzing DNA and protein sequences, aligning different DNA and protein sequences to compare them and creating and viewing 3-D models of protein structures. The primary goal of bioinformatics is to increase our understanding of biological processes. What sets it apart from other approaches, however, is its focus on developing and applying computationally intensive techniques (e.g., data mining, and machine learning algorithms) to achieve this goal. Major research efforts in the field include sequence alignment, gene finding, genome assembly, protein structure alignment, protein structure prediction, prediction of gene expression and protein-protein interactions, and the modeling of evolution.
Download Full Text

Reviews of Future Trends for Cloud Computing
Kulvinder Singh

Abstract
Cloud computing is no longer the curiosity it was a few years ago. Today companies are progressively looking for cloud computing for an intact component of their computing strategy. Companies at present empathize that cloud computing provides the possibility of being able to more to seamlessly change IT without having the time and expense of setting up, configuring, and deploying new systems. Many companies are discovering that it is much easier to experiment and introduce with cloud computing than with traditional computing models.
Download Full Text

end faq