Archive

FPGA Implementation of State Machine Controller of Transmitter for Wi-Fi
A. M. Bhavikatti, Subhash Kulkarni

Abstract
The paper presents the implementation of State Machine Controller of Transmitter for Wi-Fi. Design method uses very-high-speed integrated circuit hardware description language (VHDL). The code is then implemented on Virtex-II Platform FPGA i.e. device- xc2v250, package- fg456 and speed grade -4. This device belongs to the Virtex–E group of FPGAs from Xilinx. Simulations verify the functionality of the designed transmitter. The transmitter design matches well with the theoretical expectation of IEEE 802.11. With a maximum frequency of 128.791MHz, minimum run-time for the simulation took 7.765ns.
Download Full Text

Performance Evaluation of Mobile Ad-hoc Network Protocols
Kulvinder Singh

Abstract
Mobile Ad-Hoc networks are highly dynamic networks characterized by the absence of physical infrastructure. Nodes of these networks functions as a routers which discovers and maintains the routes to other nodes in the network. In such networks, nodes are able to move and synchronize with their neighbors. Due to mobility, connections in the network can change dynamically and nodes can be added and removed at any time. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position frequently. The main classes of routing protocols are Proactive, Reactive and Hybrid. This article addresses issues pertaining to three different routing protocols Destination Sequenced Distance vector (DSDV) and Dynamic Source Routing (DSR) protocols, Ad hoc On Demand Distance Vector (AODV) which is used for efficient routing under different scenarios in Mobile Ad-hoc Network (MANET), which plays a critical role in places where wired network are neither available nor economical to deploy. Mobile ad-hoc networks have gained a lot of importance in wireless communications. Wireless communication is established by nodes acting as routers and transferring packets from one to another in ad-hoc networks. Routing in these networks is highly complex due to moving nodes and hence many protocols have been developed. This research work concentrate mainly on routing protocols and their functionality in Mobile Ad-hoc networks with a discussion being made on three selected protocols DSDV, DSR and AODV with their comparison.
Download Full Text

Analysis of IP Spoofed DDoS Attack by Cryptography
Dalip Kumar

Abstract
Today, the internet is an essential part of our everyday life and many important and crucial services like banking, shopping, transport, health, and communication are partly or completely dependent on the Internet. According to recent sources the number of hosts connected to the internet has increased to almost 4000 million and there are currently more than 1 billion users of the Internet. Thus, any disruption in the operation of the internet can be very inconvenient for most of us as the Internet was originally designed for openness and scalability without much concern for security, malicious users can exploit the design weaknesses of the internet to wreak havoc in its operation. Incidents of disruptive activities like e-mail viruses, computer worms and denial-of service attacks have been on the rise reports an increase of such incidents from 252 in 1990 to 11,37,529 in 2009).The incidents which have raised the most concern in recent years are the denial-of-service (DoS) attacks whose sole purpose is to reduce or eliminate the availability of a service provided over the Internet, to its legitimate users. I explore a mechanisms for defending against ip spoofed packet attacks, have become one of the major threats to the operation of the internet today. I propose a new scheme for detecting and preventing the most harmful and difficult to detect DDoS Attacks—those that use IP address spoofing to disguise the attack flow. I have designed a low-cost and efficient scheme called HEMDADF, for defending against IP spoofed attacks, The HEMDADF scheme is composed of three parts: marking process, filtering process, secure transmission. The marking process requires the participation of routers in the internet to encode path information into packets. We suggest the use of a hash function and secret key to reduce collisions among packet-markings. The scheme also includes mechanisms for detecting and reporting spoofing in a timely manner. The evaluation of the scheme under simulations would be shown that my scheme can effectively and efficiently differentiate between good and bad packets under spoofed attack. Most good packets are accepted even under the most severe attack, whose traffic is about 10 times of normal traffic. At the same time, the bad packet acceptance ratio is maintained at a low level. This scheme can be performs well even under massively IP spoofed attacks involving up to 5000 attackers. HEMDADF scheme detected the occurrence of attack precisely within 3 - 4 seconds. The quick detection is valuable to the victim so that appropriate actions can be taken to minimize the damage caused by an IP spoofed attack.
Download Full Text

Comparative Performance Evaluation of XYZ Plane Based Segmentation and Entropy Based Segmentation for Pest Detection
Trupti Shrikant Bodhe and Prachi Mukherji

Abstract
Image segmentation is the process of partitioning an image into multiple segments. The purpose of segmentation is to decompose the image into parts that are meaningful with respect to a particular application. In modern crop status management in greenhouse, instead of doing manually, crop status is monitored using cameras with some automation. One of the major problems in the greenhouse crop production is the presence of pests. An accurate and timely monitoring of pests population is the basic requirement. In the pest detection, image segmentation is one of the desirable steps to distinguish the pest from rest of part of an image. This work suggests two methods, namely ‘Segmentation using XYZ plane’ and ‘Entropy based histogram thresholding’. In the first method, XYZ color plane followed by thresholding is used instead of RGB space to overcome with some major problems in segmentation. The second method is given in which the maximum information content is used to decide the segmentation rule. Results are dependent upon a color space selection. The suggested segmentation algorithm is applied for images of pest infected leaves. Results are compared.
Download Full Text

High Speed and Reduced Power – Radix-2 Booth Multiplier
Sakshi Rajput, Priya Sharma, Gitanjali and Garima

Abstract
A multiplier is one of the key hardware blocks in most digital and high performance systems such as FIR filters, digital signal processors and microprocessors etc. A system’s performance is generally determined by the performance of the multiplier because the multiplier is generally the slowest element in the whole system. Furthermore, it is generally the most area consuming. Hence, optimizing the speed and area of the multiplier is a major design issue. However, area and speed are usually conflicting constraints so that improving speed results mostly in larger areas. So here idea is to find out the best trade off solution among the both of them. The result of this work helps to make a proper choice among different adders in booth multiplier that is used in different digital applications according to requirements.
Download Full Text

Methodological Analysis of Principal Component Analysis (PCA) Method
Liton Chandra Paul, Abdulla Al Suman, Nahid Sultan

Abstract
Principal Components Analysis (PCA) is a practical and standard statistical tool in modern data analysis that has found application in different areas such as face recognition, image compression and neuroscience. It has been called one of the most precious results from applied linear algebra. PCA is a straightforward, non-parametric method for extracting pertinent information from confusing data sets. It presents a roadmap for how to reduce a complex data set to a lower dimension to disclose the hidden, simplified structures that often underlie it. This paper mainly addresses the Methodological Analysis of Principal Component Analysis (PCA) Method. PCA is a statistical approach used for reducing the number of variables which is most widely used in face recognition. In PCA, every image in the training set is represented as a linear combination of weighted eigenvectors called eigenfaces. These eigenvectors are obtained from covariance matrix of a training image set. The weights are found out after selecting a set of most relevant Eigenfaces. Recognition is performed by projecting a test image onto the subspace spanned by the eigenfaces and then classification is done by measuring minimum Euclidean distance. In this paper we present a comprehensive discussion of PCA and also simulate it on some data sets using MATLAB.
Download Full Text

Servant Leadership: The Leadership Style for Teachers
Ramajanaki Doraiswamy Iyer

Abstract
Leadership in schools has started assuming increased importance in schools across the globe. Effective leadership in schools is crucial for improving school outcomes, school culture and for influencing the motivations and capacities of teachers. Countries across the globe are striving to adapt their education systems as per the expectations of the contemporary society and hence the challenges that stand before school leaders is huge. In many countries principals and teachers have a heavy workload and people are hesitant to apply for a teachers’ job due to the overburdened roles, insufficient training and preparation, limited career prospects and inadequate support and rewards. There has been immense study on leadership and the vast literature has enabled the development of a variety of competing models that have been combined and clustered together by writers to form some broad themes. This conceptual paper tries to examine the application of few servant leadership principles in teaching to enhance effectiveness of schools in developing better students.
Download Full Text

Work-Life Conflicts of Working Couples and Their Management: A Theoretical Framework
Subhash C. Kundu and Rina

Abstract
In contemporary workplaces there exist many employed parents who are endeavoring to balance participation between the two central life domains i.e. work and family. For parents living in dual-earner families, simultaneously occupying work and family roles can be difficult and has been associated with outcomes such as physical and psychological stress and organizational performance deficits. The purpose of this paper is to investigate the work and family roles accumulation experiences of working couple relationships, and to explore the strategies and processes to be adopted by working couples and their organizations to manage work life balance.
Download Full Text

Qualitative Analysis of FDI in Indian Retail Industry
Pallavi Manik and Renu Singla

Abstract
The Indian Retail Industry is the fifth largest in the world. Comprising of organized and unorganized sectors, Indian retail industry is one of the fastest growing industries in India, especially over the last few years. Though initially the retail industry in India was mostly unorganized, however with the change of taste and preferences of consumers, the Industry is getting more popular these days and getting organized as well. The Indian retail market has shown greater acceptance for organized retailing formats. Domestic retailing is emerging from a multitude of unorganized family-owned businesses to organized modern retailing. Rapid urbanization, changes in shopping pattern, demographic dividend and pro-active measures by the Government are abetting the growth of the retail sector in India. By taking into account the importance of growing Indian retail industry this paper has attempted to analyze the reforms introduced by Government of India in the Indian Retail Industry, whether they are boom or bane for the country.
Download Full Text

end faq