International Journal of Innovative Technology and ...Head (Research and Publication), SRM...

22
International Journal of Innovative Technology and Exploring Engineering ISSN : 2278 - 3075 Website: www.ijitee.org g ri n l o E p n x g E i d n n e a e r i y n g g o l o n h c e T e I v n i t t e a r v n o a n t i n o I n f o a l l a J n r u o Exploring Innovation www.ijitee.org IjItEe IjItEe E X P L O R IN G I N N O V A T ION Volume-3 Issue-12, MAY 2014 Published by: Blue Eyes Intelligence Engineering and Sciences Publication Pvt. Ltd. Published by: Blue Eyes Intelligence Engineering and Sciences Publication Pvt. Ltd.

Transcript of International Journal of Innovative Technology and ...Head (Research and Publication), SRM...

Page 1: International Journal of Innovative Technology and ...Head (Research and Publication), SRM University, Gaziabad (U.P.), India Dr. Deepak Garg Professor, Department of Computer Science

International Journal of Innovative

Technology and Exploring Engineering

ISSN : 2278 - 3075Website: www.ijitee.org

grin lo Ep nx gE id nn ea e riy ng golon

hce T e Iv nit tea rv no an tin oI nf o a l la Jnr uo

Exploring Innovation

www.ijitee.org

IjItEeIjItEe

EXPLORING INNOVA

TION

Volume-3 Issue-12, MAY 2014

Published by: Blue Eyes Intelligence Engineering and Sciences Publication Pvt. Ltd. Published by: Blue Eyes Intelligence Engineering and Sciences Publication Pvt. Ltd.

Page 2: International Journal of Innovative Technology and ...Head (Research and Publication), SRM University, Gaziabad (U.P.), India Dr. Deepak Garg Professor, Department of Computer Science

Editor In Chief

Dr. Shiv K Sahu

Ph.D. (CSE), M.Tech. (IT, Honors), B.Tech. (IT)

Director, Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd., Bhopal(M.P.), India

Dr. Shachi Sahu

Ph.D. (Chemistry), M.Sc. (Organic Chemistry)

Additional Director, Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd., Bhopal(M.P.), India

Vice Editor In Chief

Dr. Vahid Nourani

Professor, Faculty of Civil Engineering, University of Tabriz, Iran

Prof.(Dr.) Anuranjan Misra

Professor & Head, Computer Science & Engineering and Information Technology & Engineering, Noida International University,

Noida (U.P.), India

Chief Advisory Board

Prof. (Dr.) Hamid Saremi

Vice Chancellor of Islamic Azad University of Iran, Quchan Branch, Quchan-Iran

Dr. Uma Shanker

Professor & Head, Department of Mathematics, CEC, Bilaspur(C.G.), India

Dr. Rama Shanker

Professor & Head, Department of Statistics, Eritrea Institute of Technology, Asmara, Eritrea

Dr. Vinita Kumari

Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd., India

Dr. Kapil Kumar Bansal

Head (Research and Publication), SRM University, Gaziabad (U.P.), India

Dr. Deepak Garg

Professor, Department of Computer Science and Engineering, Thapar University, Patiala (Punjab), India, Senior Member of IEEE,

Secretary of IEEE Computer Society (Delhi Section), Life Member of Computer Society of India (CSI), Indian Society of Technical

Education (ISTE), Indian Science Congress Association Kolkata.

Dr. Vijay Anant Athavale

Director of SVS Group of Institutions, Mawana, Meerut (U.P.) India/ U.P. Technical University, India

Dr. T.C. Manjunath

Principal & Professor, HKBK College of Engg, Nagawara, Arabic College Road, Bengaluru-560045, Karnataka, India

Dr. Kosta Yogeshwar Prasad

Director, Technical Campus, Marwadi Education Foundation’s Group of Institutions, Rajkot-Morbi Highway, Gauridad, Rajkot,

Gujarat, India

Dr. Dinesh Varshney

Director of College Development Counceling, Devi Ahilya University, Indore (M.P.), Professor, School of Physics, Devi Ahilya

University, Indore (M.P.), and Regional Director, Madhya Pradesh Bhoj (Open) University, Indore (M.P.), India

Dr. P. Dananjayan

Professor, Department of Department of ECE, Pondicherry Engineering College, Pondicherry,India

Dr. Sadhana Vishwakarma

Associate Professor, Department of Engineering Chemistry, Technocrat Institute of Technology, Bhopal(M.P.), India

Dr. Kamal Mehta

Associate Professor, Deptment of Computer Engineering, Institute of Technology, NIRMA University, Ahmedabad (Gujarat), India

Dr. CheeFai Tan

Faculty of Mechanical Engineering, University Technical, Malaysia Melaka, Malaysia

Dr. Suresh Babu Perli

Professor & Head, Department of Electrical and Electronic Engineering, Narasaraopeta Engineering College, Guntur, A.P., India

Page 3: International Journal of Innovative Technology and ...Head (Research and Publication), SRM University, Gaziabad (U.P.), India Dr. Deepak Garg Professor, Department of Computer Science

Dr. Binod Kumar

Associate Professor, Schhool of Engineering and Computer Technology, Faculty of Integrative Sciences and Technology, Quest

International University, Ipoh, Perak, Malaysia

Dr. Chiladze George

Professor, Faculty of Law, Akhaltsikhe State University, Tbilisi University, Georgia

Dr. Kavita Khare

Professor, Department of Electronics & Communication Engineering, MANIT, Bhopal (M.P.), INDIA

Dr. C. Saravanan

Associate Professor (System Manager) & Head, Computer Center, NIT, Durgapur, W.B. India

Dr. S. Saravanan

Professor, Department of Electrical and Electronics Engineering, Muthayamal Engineering College, Resipuram, Tamilnadu, India

Dr. Amit Kumar Garg

Professor & Head, Department of Electronics and Communication Engineering, Maharishi Markandeshwar University, Mulllana,

Ambala (Haryana), India

Dr. T.C.Manjunath

Principal & Professor, HKBK College of Engg, Nagawara, Arabic College Road, Bengaluru-560045, Karnataka, India

Dr. P. Dananjayan

Professor, Department of Department of ECE, Pondicherry Engineering College, Pondicherry, India

Dr. Kamal K Mehta

Associate Professor, Department of Computer Engineering, Institute of Technology, NIRMA University, Ahmedabad (Gujarat), India

Dr. Rajiv Srivastava

Director, Department of Computer Science & Engineering, Sagar Institute of Research & Technology, Bhopal (M.P.), India

Dr. Chakunta Venkata Guru Rao

Professor, Department of Computer Science & Engineering, SR Engineering College, Ananthasagar, Warangal, Andhra Pradesh, India

Dr. Anuranjan Misra

Professor, Department of Computer Science & Engineering, Bhagwant Institute of Technology, NH-24, Jindal Nagar, Ghaziabad,

India

Dr. Robert Brian Smith

International Development Assistance Consultant, Department of AEC Consultants Pty Ltd, AEC Consultants Pty Ltd, Macquarie

Centre, North Ryde, New South Wales, Australia

Dr. Saber Mohamed Abd-Allah

Associate Professor, Department of Biochemistry, Shanghai Institute of Biochemistry and Cell Biology, Yue Yang Road, Shanghai,

China

Dr. Himani Sharma

Professor & Dean, Department of Electronics & Communication Engineering, MLR Institute of Technology, Laxman Reddy Avenue,

Dundigal, Hyderabad, India

Dr. Sahab Singh

Associate Professor, Department of Management Studies, Dronacharya Group of Institutions, Knowledge Park-III, Greater Noida,

India

Dr. Umesh Kumar

Principal: Govt Women Poly, Ranchi, India

Dr. Syed Zaheer Hasan

Scientist-G Petroleum Research Wing, Gujarat Energy Research and Management Institute, Energy Building, Pandit Deendayal

Petroleum University Campus, Raisan, Gandhinagar-382007, Gujarat, India.

Dr. Jaswant Singh Bhomrah

Director, Department of Profit Oriented Technique, 1 – B Crystal Gold, Vijalpore Road, Navsari 396445, Gujarat. India

Page 4: International Journal of Innovative Technology and ...Head (Research and Publication), SRM University, Gaziabad (U.P.), India Dr. Deepak Garg Professor, Department of Computer Science

Technical Advisory Board

Dr. Mohd. Husain

Director MG Institute of Management & Technology, Banthara, Lucknow (U.P.), India

Dr. T. Jayanthy

Principal, Panimalar Institute of Technology, Chennai (TN), India

Dr. Umesh A.S.

Director, Technocrats Institute of Technology & Science, Bhopal(M.P.), India

Dr. B. Kanagasabapathi

Infosys Labs, Infosys Limited, Center for Advance Modeling and Simulation, Infosys Labs, Infosys Limited, Electronics City,

Bangalore, India

Dr. C.B. Gupta

Professor, Department of Mathematics, Birla Institute of Technology & Sciences, Pilani (Rajasthan), India

Dr. Sunandan Bhunia

Associate Professor & Head,, Dept. of Electronics & Communication Engineering, Haldia Institute of Technology, Haldia, West

Bengal, India

Dr. Jaydeb Bhaumik

Associate Professor, Dept. of Electronics & Communication Engineering, Haldia Institute of Technology, Haldia, West Bengal, India

Dr. Rajesh Das

Associate Professor, School of Applied Sciences, Haldia Institute of Technology, Haldia, West Bengal, India

Dr. Mrutyunjaya Panda

Professor & Head, Department of EEE, Gandhi Institute for Technological Development, Bhubaneswar, Odisha, India

Dr. Mohd. Nazri Ismail

Associate Professor, Department of System and Networking, University of Kuala (UniKL), Kuala Lumpur, Malaysia

Dr. Haw Su Cheng

Faculty of Information Technology, Multimedia University (MMU), Jalan Multimedia, 63100 Cyberjaya

Dr. Hossein Rajabalipour Cheshmehgaz

Industrial Modeling and Computing Department, Faculty of Computer Science and Information Systems, Universiti Teknologi

Malaysia (UTM) 81310, Skudai, Malaysia

Dr. Sudhinder Singh Chowhan

Associate Professor, Institute of Management and Computer Science, NIMS University, Jaipur (Rajasthan), India

Dr. Neeta Sharma

Professor & Head, Department of Communication Skils, Technocrat Institute of Technology, Bhopal(M.P.), India

Dr. Ashish Rastogi

Associate Professor, Department of CSIT, Guru Ghansi Das University, Bilaspur (C.G.), India

Dr. Santosh Kumar Nanda

Professor, Department of Computer Science and Engineering, Eastern Academy of Science and Technology (EAST), Khurda (Orisa),

India

Dr. Hai Shanker Hota

Associate Professor, Department of CSIT, Guru Ghansi Das University, Bilaspur (C.G.), India

Dr. Sunil Kumar Singla

Professor, Department of Electrical and Instrumentation Engineering, Thapar University, Patiala (Punjab), India

Dr. A. K. Verma

Professor, Department of Computer Science and Engineering, Thapar University, Patiala (Punjab), India

Dr. Durgesh Mishra

Chairman, IEEE Computer Society Chapter Bombay Section, Chairman IEEE MP Subsection, Professor & Dean (R&D), Acropolis

Institute of Technology, Indore (M.P.), India

Dr. Xiaoguang Yue

Associate Professor, College of Computer and Information, Southwest Forestry University, Kunming (Yunnan), China

Page 5: International Journal of Innovative Technology and ...Head (Research and Publication), SRM University, Gaziabad (U.P.), India Dr. Deepak Garg Professor, Department of Computer Science

Dr. Veronica Mc Gowan

Associate Professor, Department of Computer and Business Information Systems,Delaware Valley College, Doylestown, PA, Allman

China

Dr. Mohd. Ali Hussain

Professor, Department of Computer Science and Engineering, Sri Sai Madhavi Institute of Science & Technology, Rajahmundry

(A.P.), India

Dr. Mohd. Nazri Ismail

Professor, System and Networking Department, Jalan Sultan Ismail, Kaula Lumpur, MALAYSIA

Dr. Sunil Mishra

Associate Professor, Department of Communication Skills (English), Dronacharya College of Engineering, Farrukhnagar, Gurgaon

(Haryana), India

Dr. Labib Francis Gergis Rofaiel

Associate Professor, Department of Digital Communications and Electronics, Misr Academy for Engineering and Technology,

Mansoura City, Egypt

Dr. Pavol Tanuska

Associate Professor, Department of Applied Informetics, Automation, and Mathematics, Trnava, Slovakia

Dr. VS Giridhar Akula

Professor, Avanthi's Research & Technological Academy, Gunthapally, Hyderabad, Andhra Pradesh, India

Dr. S. Satyanarayana

Associate Professor, Department of Computer Science and Engineering, KL University, Guntur, Andhra Pradesh, India

Dr. Bhupendra Kumar Sharma

Associate Professor, Department of Mathematics, KL University, BITS, Pilani, India

Dr. Praveen Agarwal

Associate Professor & Head, Department of Mathematics, Anand International College of Engineering, Jaipur (Rajasthan), India

Dr. Manoj Kumar

Professor, Department of Mathematics, Rashtriya Kishan Post Graduate Degree, College, Shamli, Prabudh Nagar, (U.P.), India

Dr. Shaikh Abdul Hannan

Associate Professor, Department of Computer Science, Vivekanand Arts Sardar Dalipsing Arts and Science College, Aurangabad

(Maharashtra), India

Dr. K.M. Pandey

Professor, Department of Mechanical Engineering,National Institute of Technology, Silchar, India

Prof. Pranav Parashar

Technical Advisor, International Journal of Soft Computing and Engineering (IJSCE), Bhopal (M.P.), India

Dr. Biswajit Chakraborty

MECON Limited, Research and Development Division (A Govt. of India Enterprise), Ranchi-834002, Jharkhand, India

Dr. D.V. Ashoka

Professor & Head, Department of Information Science & Engineering, SJB Institute of Technology, Kengeri, Bangalore, India

Dr. Sasidhar Babu Suvanam

Professor & Academic Cordinator, Department of Computer Science & Engineering, Sree Narayana Gurukulam College of

Engineering, Kadayiuruppu, Kolenchery, Kerala, India

Dr. C. Venkatesh

Professor & Dean, Faculty of Engineering, EBET Group of Institutions, Kangayam, Erode, Caimbatore (Tamil Nadu), India

Dr. Nilay Khare

Assoc. Professor & Head, Department of Computer Science, MANIT, Bhopal (M.P.), India

Dr. Sandra De Iaco

Professor, Dip.to Di Scienze Dell’Economia-Sez. Matematico-Statistica, Italy

Page 6: International Journal of Innovative Technology and ...Head (Research and Publication), SRM University, Gaziabad (U.P.), India Dr. Deepak Garg Professor, Department of Computer Science

Dr. Yaduvir Singh

Associate Professor, Department of Computer Science & Engineering, Ideal Institute of Technology, Govindpuram Ghaziabad,

Lucknow (U.P.), India

Dr. Angela Amphawan

Head of Optical Technology, School of Computing, School Of Computing, Universiti Utara Malaysia, 06010 Sintok, Kedah, Malaysia

Dr. Ashwini Kumar Arya

Associate Professor, Department of Electronics & Communication Engineering, Faculty of Engineering and Technology,Graphic Era

University, Dehradun (U.K.), India

Dr. Yash Pal Singh

Professor, Department of Electronics & Communication Engg, Director, KLS Institute Of Engg.& Technology, Director, KLSIET,

Chandok, Bijnor, (U.P.), India

Dr. Ashish Jain

Associate Professor, Department of Computer Science & Engineering, Accurate Institute of Management & Technology, Gr. Noida

(U.P.), India

Dr. Abhay Saxena

Associate Professor & Head, Department of Computer Science, Dev Sanskriti University, Haridwar, Uttrakhand, India

Dr. Judy. M.V

Associate Professor, Head of the Department CS &IT, Amrita School of Arts and Sciences, Amrita Vishwa Vidyapeetham,

Brahmasthanam, Edapally, Cochin, Kerala, India

Dr. Sangkyun Kim

Professor, Department of Industrial Engineering, Kangwon National University, Hyoja 2 dong, Chunche0nsi, Gangwondo, Korea

Dr. Sanjay M. Gulhane

Professor, Department of Electronics & Telecommunication Engineering, Jawaharlal Darda Institute of Engineering & Technology,

Yavatmal, Maharastra, India

Dr. K.K. Thyagharajan

Principal & Professor, Department of Informational Technology, RMK College of Engineering & Technology, RSM Nagar,

Thiruyallur, Tamil Nadu, India

Dr. P. Subashini

Assoc. Professor, Department of Computer Science, Coimbatore, India

Dr. G. Srinivasrao

Professor, Department of Mechanical Engineering, RVR & JC, College of Engineering, Chowdavaram, Guntur, India

Dr. Rajesh Verma

Professor, Department of Computer Science & Engg. and Deptt. of Information Technology, Kurukshetra Institute of Technology &

Management, Bhor Sadian, Pehowa, Kurukshetra (Haryana), India

Dr. Pawan Kumar Shukla

Associate Professor, Satya College of Engineering & Technology, Haryana, India

Dr. U C Srivastava

Associate Professor, Department of Applied Physics, Amity Institute of Applied Sciences, Amity University, Noida, India

Dr. Reena Dadhich

Prof. & Head, Department of Computer Science and Informatics, MBS MArg, Near Kabir Circle, University of Kota, Rajasthan, India

Dr. Aashis. S. Roy

Department of Materials Engineering, Indian Institute of Science, Bangalore Karnataka, India

Dr. Sudhir Nigam

Professor Department of Civil Engineering, Principal, Lakshmi Narain College of Technology and Science, Raisen, Road, Bhopal,

(M.P.), India

Dr. S. Senthil Kumar

Doctorate, Department of Center for Advanced Image and Information Technology, Division of Computer Science and Engineering,

Graduate School of Electronics and Information Engineering, Chon Buk National University Deok Jin-Dong, Jeonju, Chon Buk, 561-

756, South Korea Tamilnadu, India

Page 7: International Journal of Innovative Technology and ...Head (Research and Publication), SRM University, Gaziabad (U.P.), India Dr. Deepak Garg Professor, Department of Computer Science

Dr. Gufran Ahmad Ansari

Associate Professor, Department of Information Technology, College of Computer, Qassim University, Al-Qassim, Kingdom of

Saudi Arabia (KSA)

Dr. R. Navaneetha krishnan

Associate Professor, Department of MCA, Bharathiyar College of Engg & Tech, Karaikal Puducherry, India

Dr. Hossein Rajabalipour Cheshmejgaz

Industrial Modeling and Computing Department, Faculty of Computer Science and Information Systems, Universiti Teknologi Skudai,

Malaysia

Dr. Veronica McGowan

Associate Professor, Department of Computer and Business Information Systems, Delaware Valley College, Doylestown, PA, Allman

China

Dr. Sanjay Sharma

Associate Professor, Department of Mathematics, Bhilai Institute of Technology, Durg, Chhattisgarh, India

Dr. Taghreed Hashim Al-Noor

Professor, Department of Chemistry, Ibn-Al-Haitham Education for pure Science College, University of Baghdad, Iraq

Dr. Madhumita Dash

Professor, Department of Electronics & Telecommunication, Orissa Engineering College , Bhubaneswar,Odisha, India

Dr. Anita Sagadevan Ethiraj

Associate Professor, Department of Centre for Nanotechnology Research (CNR), School of Electronics Engineering (Sense), Vellore

Institute of Technology (VIT) University, Tamilnadu, India

Dr. Sibasis Acharya

Project Consultant, Department of Metallurgy & Mineral Processing, Midas Tech International, 30 Mukin Street, Jindalee-4074,

Queensland, Australia

Dr. Neelam Ruhil

Professor, Department of Electronics & Computer Engineering, Dronacharya College of Engineering, Gurgaon, Haryana, India

Dr. Faizullah Mahar

Professor, Department of Electrical Engineering, Balochistan University of Engineering and Technology, Pakistan

Dr. K. Selvaraju

Head, PG & Research, Department of Physics, Kandaswami Kandars College (Govt. Aided), Velur (PO), Namakkal DT. Tamil Nadu,

India

Dr. M. K. Bhanarkar

Associate Professor, Department of Electronics, Shivaji University, Kolhapur, Maharashtra, India

Dr. Sanjay Hari Sawant

Professor, Department of Mechanical Engineering, Dr. J. J. Magdum College of Engineering, Jaysingpur, India

Dr. Arindam Ghosal

Professor, Department of Mechanical Engineering, Dronacharya Group of Institutions, B-27, Part-III, Knowledge Park,Greater Noida,

India

Dr. M. Chithirai Pon Selvan

Associate Professor, Department of Mechanical Engineering, School of Engineering & Information Technology Manipal University,

Dubai, UAE

Dr. S. Sambhu Prasad

Professor & Principal, Department of Mechanical Engineering, Pragati College of Engineering, Andhra Pradesh, India.

Dr. Muhammad Attique Khan Shahid

Professor of Physics & Chairman, Department of Physics, Advisor (SAAP) at Government Post Graduate College of Science,

Faisalabad.

Dr. Kuldeep Pareta

Professor & Head, Department of Remote Sensing/GIS & NRM, B-30 Kailash Colony, New Delhi 110 048, India

Dr. Th. Kiranbala Devi

Associate Professor, Department of Civil Engineering, Manipur Institute of Technology, Takyelpat, Imphal, Manipur, India

Page 8: International Journal of Innovative Technology and ...Head (Research and Publication), SRM University, Gaziabad (U.P.), India Dr. Deepak Garg Professor, Department of Computer Science

Dr. Nirmala Mungamuru

Associate Professor, Department of Computing, School of Engineering, Adama Science and Technology University, Ethiopia

Dr. Srilalitha Girija Kumari Sagi

Associate Professor, Department of Management, Gandhi Institute of Technology and Management, India

Dr. Vishnu Narayan Mishra

Associate Professor, Department of Mathematics, Sardar Vallabhbhai National Institute of Technology, Ichchhanath Mahadev Dumas

Road, Surat (Gujarat), India

Dr. Yash Pal Singh

Director/Principal, Somany (P.G.) Institute of Technology & Management, Garhi Bolni Road , Rewari Haryana, India.

Dr. Sripada Rama Sree

Vice Principal, Associate Professor, Department of Computer Science and Engineering, Aditya Engineering College, Surampalem,

Andhra Pradesh. India.

Dr. Rustom Mamlook

Associate Professor, Department of Electrical and Computer Engineering, Dhofar University, Salalah, Oman. Middle East.

Managing Editor

Mr. Jitendra Kumar Sen

International Journal of Innovative Technology and Exploring Engineering (IJITEE)

Editorial Board

Dr. Saeed Balochian

Associate Professor, Gonaabad Branch, Islamic Azad University, Gonabad, Iratan

Dr. Mongey Ram

Associate Professor, Department of Mathematics, Graphics Era University, Dehradun, India

Dr. Arupratan Santra

Sr. Project Manager, Infosys Technologies Ltd, Hyderabad (A.P.)-500005, India

Dr. Ashish Jolly

Dean, Department of Computer Applications, Guru Nanak Khalsa Institute & Management Studies, Yamuna Nagar (Haryana), India

Dr. Israel Gonzalez Carrasco

Associate Professor, Department of Computer Science, Universidad Carlos III de Madrid, Leganes, Madrid, Spain

Dr. Guoxiang Liu

Member of IEEE, University of North Dakota, Grand Froks, N.D., USA

Dr. Khushali Menaria

Associate Professor, Department of Bio-Informatics, Maulana Azad National Institute of Technology (MANIT), Bhopal (M.P.), India

Dr. R. Sukumar

Professor, Sethu Institute of Technology, Pulloor, Kariapatti, Virudhunagar, Tamilnadu, India

Dr. Cherouat Abel

Professor, University of Technology of Troyes, France

Dr. Rinkle Aggrawal

Associate Professor, Department of Computer Science and Engineering, Thapar University, Patiala (Punjab), India

Dr. Parteek Bhatia

Associate Professor, Deprtment of Computer Science & Engineering, Thapar University, Patiala (Punjab), India

Dr. Manish Srivastava

Professor & Head, Computer Science and Engineering, Guru Ghasidas Central University, Bilaspur (C.G.), India

Dr. B. P. Ladgaonkar

Assoc. Professor&Head, Department of Electronics, Shankarrao Mohite Mahavidyalaya, Akluj, Maharashtra, India

Dr. E. Mohan

Professor & Head, Department of Computer Science and Engineering, Pallavan College of Engineering, Kanchipuram, Tamilnadu,

India

Page 9: International Journal of Innovative Technology and ...Head (Research and Publication), SRM University, Gaziabad (U.P.), India Dr. Deepak Garg Professor, Department of Computer Science

Dr. M. Shanmuga Ptriya

Assoc. Professor, Department of Biotechnology, MVJ College of Engineering, Bangalore Karnataka, India

Dr. Leena Jain

Assoc. Professor & Head, Dept. of Computer Applications, Global Institute of Management & Emerging Technologies, Amritsar,

India

Dr. S.S.S.V Gopala Raju

Professor, Department of Civil Engineering, GITAM School of Technology, GITAM, University, Hyderabad, Andhra Pradesh, India

Dr. Ani Grubisic

Department of Computer Science, Teslina 12, 21000 split, Croatia

Dr. Ashish Paul

Associate Professor, Department of Basic Sciences (Mathematics), Assam Don Bosco University, Guwahati, India

Dr. Sivakumar Durairaj

Professor, Department of Civil Engineering, Vel Tech High Tech Dr.Rangarajan Dr.Sakunthala Engineering College, Avadi, Chennai

Tamil Nadu, India

Dr. Rashmi Nigam

Associate Professor, Department of Applied Mathematics, UTI, RGPV, Airport Road, Bhopal, (M.P.), India

Dr. Mu-Song Chen

Associate Professor, Department of Electrical Engineering, Da-Yeh University, Rd., Dacun, Changhua 51591, Taiwan R.O.C.,

Taiwan, Republic of China

Dr. Ramesh S

Associate Professor, Department of Electronics & Communication Engineering, Dr. Ambedkar Institute of Technology, Bangalore,

India

Dr. Nor Hayati Abdul Hamid

Associate Professor, Department of Civil Engineering, Universiti Teknologi Mara, Selangor, Malaysia

Dr. C.Nagarajan

Professor & Head, Department of Electrical & Electronic Engineering Muthayammal Engineering College,Rasipuram,Tamilnadu,

India

Dr. Ilaria Cacciotti

Department of Industrial Engineering, University of Rome Tor Vergata Via del Politecnico Rome-Italy

Dr. V.Balaji

Principal Cum Professor, Department of EEE &E&I, Lord Ayyappa Institute of Engg & Tech,Uthukadu, Walajabad, Kanchipuram,

Tamil Nadu, India

Dr. G. Anjan Babu

Assoc. Professor, Department of Computer Science, S V University, Tirupati, Andhra Pradesh, India

Dr. Damodar Reddy Edla

Assoc. Professor, Department of Computer Science & Engineering, National Institute of Technology, Goa, India

Dr. D.Arumuga Perumal

Professor, Department of Mechanical Engg, Noorul Islam University, Kanyakumari (Dist), Tamilnadu, India

Dr. Roshdy A. AbdelRassoul

Professor, Department of Electronics and Communications Engineering, Arab Academy for Science and Technology, Electronics and

Communications Engineering Dept., POBox 1029, Abu-Qir, Alexandria, Egypt

Dr. Aniruddha Bhattacharya

Assoc. Professor & Head, Department of Computer Science & Engineering, Amrita School of Engineering, Bangalore, India

Dr. P Venkateswara Rao

Professor, Department of Mechanical Engineering, KITS, Warangal, Andhra Pradesh, India

Dr. V.Mahalakshmi M.L

Assoc. Professor & Head, Institute of Management Studies, Chennai CID Quarters, V.K.Iyer Road, Mandaveli, Chennai

Page 10: International Journal of Innovative Technology and ...Head (Research and Publication), SRM University, Gaziabad (U.P.), India Dr. Deepak Garg Professor, Department of Computer Science

S.

No

Volume-3 Issue-12, May 2014, ISSN: 2278-3075 (Online)

Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd.

Page

No.

1.

Authors: Stalin Babu G, Santosh Raju D

Paper Title: Routing Protocols in Wireless Sensor Networks A Survey

Abstract: Wireless Sensor Networks (WSN) contains hundreds or thousands of sensor nodes with great capabilities

like sensing, computation, wireless communications and these sensors have the ability to communicate either among

each other or directly to an external Base Station. These Sensor nodes will collect information and also plays an

important role of a Router by communicating through wireless channels. WSN ismainly intended for gathering and

sensing information in remote locations (required). Design Goal of WSN is to 1) Transmit data 2) Increase Network

Life Time by employing Energy Efficient Routing Protocols. Wireless networks are constrained by energy, storage

capacity, and power. To increase the lifetime of networks, It is must to consider energy awareness. If we analyze

routing protocols, these are in charge of discovering and maintaining the routes in the network. However, the

appropriateness of a particular routing protocol mainly depends on the capabilities of the sensor nodes and on the

application requirements. This paper presents a review of the main routing protocols proposed for wireless sensor

networks.

Keywords: wireless Sensor networks, classification of routing protocols, Routing protocols.

References: 1. I.F. Akyildiz, S. Weilian, Y. Sankarasubramaniam, E. Cayirci, A survey on sensor networks, IEEE Communications Magazine 40 (8) (2002)

102–114.

2. S. Misra et al. (eds.), Guide to Wireless Sensor Networks, Computer Communications and Networks, DOI: 10.1007/978-1-84882-218-4 4, Springer-Verlag London Limited 2009.

3. W. Heinzelman, A. Chandrakasan, H. Balakrishnan, Energy-efficient communication protocol for wireless sensor networks, in: Proceeding

of the Hawaii International Conference System Sciences, Hawaii, January 2000. 4. Rafe Alasem, Ahmed Reda and Mahmud Mansour ”Location based energy efficient reliable routing protocol for wireless sensor network

“World Scientific and Engineering Academy ANDC Society(WSEAS) Stevens Point, Wisconsin, USA,2011.

5. K. Sohrabi, J. Gao, V. Ailawadhi and G. Pottie, “Protocols for Self- Organization of a Wireless Sensor Network, ” IEEE Personal Communi- cations, pp. 16-27, October 2000

6. J. Luo, and J.- P. Hubaux, "Joint mobility and routing for lifetime elongation in wireless sensor networks", Proceedings IEEE INFOCOM'05,

vol. 3, Miami, FL, Mar. 2005, pp. 1735- 1746.

7. Ganesan, D.; Govindan, R.; Shenker, S.; Estrin, D. Highly-Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks.

Mobile Comput. Commun. Rev.2001

8. M. Chu, H. Haussecker, and F. Zhao: Scalable Information-Driven Sensor Querying and Routing for ad hoc Heterogeneous Sensor Networks, The International Journal of High Performance Computing Applications, Vol. 16, No. 3 ( August 2002).

1-3

2.

Authors: Sangeeta Bansal, Ajay Rana

Paper Title: Analysis of Various Algorithms to Solve Vertex Cover Problem

Abstract: The vertex cover (VC) problem belongs to the class of Non Deterministic Polynomial time complete

(NPC) graph theoretical problems, which plays a central role in theoretical computer science and it has a numerous

real life applications. Since the problem is Non Deterministic Polynomial time complete (NPC) it is unlikely to find a

polynomial-time algorithm for solving vertex-cover problem exactly. This paper analyses the various algorithms to

find minimum vertex cover for standard classes of random graph. The performance of all algorithms is compared

with the complexity and the output solution that of the approximation algorithm, clever greedy algorithm, branch-

and-bound algorithm, and simple genetic algorithm (GA).

Keywords: Minimum vertex cover, Branch and bound, greedy algorithm, genetic algorithm, crossover, mutation.

References: 1. T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein. Introduction to Algorithms. McGraw-Hill, New York, 2nd edition, 2001.

2. Dorit S.Hochbaum. Approximation Algorithms for NP-hard problems. 2002.

3. X. Huang, J. Lai, and S. F. Jennings. Maximum common subgraph: Some upper bound and lower bound results. BMC Bioinformatics, 7(Suppl 4):S6, 2006, pp.80-94.

4. M.Pelikan. Hierarchical Bayesian optimization algorithm: Toward a new generation of evolutionary algorithms. Springer-Verlag, 2005,

pp.102-160. 5. Alexandra K Hartmann and Martin Weigt. Statistical mechanics of the vertex-cover problem, j.phys. A; Math. Gen. 36(2003) 11069-11093.

6. K.Clarkson. A modification to the greedy algorithm for the vertex cover problem, IPL, vol 16:23-25,(1983).

7. R. Arakaki, and L. Lorena. A Constructive Genetic Algorithm for the Maximal Covering Location Problem, in Proceedings of Metaheuristics International Conference, 2001, pp 13-17.

8. Ketan Kotecha and Nilesh Gambhava. A hybrid genetic algorithm for Minimum Vertex-cover Problem, vol 2: pp 16-20.

4-6

3.

Authors: Vahid Rahmati, Morteza Husainy Yar, Ali Reza Malekijavan

Paper Title: Neural Networks New Capacity Factor Measurement for Improvement of SOM

Abstract: the artificial neural networks have an important role in current life with higher expectations. The art of

using these ANNs give us a good insight for problem solving. For example the applications in pattern recognition

and regression are two areas in which ANNs are working well. Signal processing itself investigates broad ranges of

ANNs. The purpose of this paper is, scanning connection routes of one and two layer networks that may be used as

default structure in data replacing and signal analyzing. When a signal is considered as a variable by a problem

solver, the problem solver chooses the best possible ANNs to solve it. But the way we ensure the high possibilities of

reliability for these types of networks, while the compatibility is still needed is important. We present several factors

to measure the capability of a specific network, for a specific problem the one like E-machine learning. Formal

7-9

Page 11: International Journal of Innovative Technology and ...Head (Research and Publication), SRM University, Gaziabad (U.P.), India Dr. Deepak Garg Professor, Department of Computer Science

proofs for claim are provided as well. Finally we try to optimize Kohonen SOM using factor C’.

Keywords: Artificial neural networks, Kohonen SOM, Machine learning, ANN connection route

References: 1. Christopher M. Bishop (Jan 18, 1996), Neural Networks for Pattern Recognition

2. Simon O. Haykin (Nov 28, 2008), Neural Networks and Learning Machines 3. Sandhya Samarasinghe (Sep 12, 2006), Neural Networks for Applied Sciences and Engineering: From Fundamentals to Complex Pattern

Recognition

4. Ke-Lin Du and M. N. S. Swamy (Dec 27, 2013), Neural Networks and Statistical Learning 5. Jeff Heaton (Oct 2, 2008), Introduction to Neural Networks for C#

6. Laurene V. Fausett (Dec 19, 1993), Fundamentals of Neural Networks: Architectures, Algorithms And Applications 7. Jeff Heaton (Oct 1, 2008), Introduction to Neural Networks for Java

8. Kevin Gurney (Aug 7, 1997), An Introduction to Neural Networks

9. Olaf Sporns (Oct 1, 2010), Networks of the Brain 10. Kohonen, T. ; Neural Networks Res. Centre, Helsinki Univ. of Technol., Espoo, Finland ; Oja, E. ; Simula, O. ; Visa, A.more authors,

Engineering applications of the self-organizing map

11. SangHak Lee ; Ubiquitous Comput. Res. Center, Korea Electron. Technol. Inst., South Korea ; JuneJae Yoo ; TaeChoong Chung, Distance-based energy efficient clustering for wireless sensor networks

12. Jari Kangas,Teuvo Kohonen,Developments and applications of the self-organizing map and related algorithms

4.

Authors: Vivek Yadav, M. Pushpalatha

Paper Title: A Framework to Increase the Lifetime of a Sensor Network by Dynamic Cluster Head Selection and

Re-Clustering

Abstract: In spatial correlated sensor networks, nearby sensor nodes show a high degree of similarity in their

readings. Keeping this in mind, the monitored region is divided into clusters and one cluster head is assigned to a

cluster which does the sensing work while other nodes are in sleep state. This results in considerable energy savings

as only one cluster head representing other nodes in the cluster does the sensing and transmitting work. In this paper,

a framework is proposed to add functionality to existing networks so as to increase the networks lifetime and also aid

in better tracking of unusual phenomena such as forest fires. Increasing the lifetime has been done by the use of

dynamic multiple cluster heads and tracking of unusual phenomena has been done on the basis of outlier detection.

Keywords: Lifetime Optimization, Spatial Correlation, Dynamic Cluster Head Selection.

References: 1. S. Lindsey and C.S. Raghavendra, "PEGASIS: Power Efficient Gathering in Sensor Information Systems," Proc. IEEE Aerospace Conf., pp.

1125-1130, 2002. 2. S. Yoon and C. Shahabi. “Exploiting spatial correlation towards an energy efficient clustered aggregation technique (CAG),” IEEE

International Conference on Communications, pages 3307-3313, May 2005.

3. Chih-Chieh Hung, Wen-Chih Peng, Wang-Chien Lee, “Energy-Aware Set-Covering Approaches for Approximate Data Collection in Wireless Sensor Networks,” IEEE Trans. Knowl. Data Eng, vol 24, no 11, 2012.

4. Yajie Ma, Yike Guo, Xiangchuan Tian, and Moustafa Ghanem, “Distributed Clustering-Based Aggregation algorithm for Spatial correlated

Sensor networks”, IEEE Sensors Journal, Vol. 11, no. 3, pp 641-648, March 2011. 5. Ashanie Guanathillake, Kithsiri Samarasinghe, “Energy Efficient Clustering Algorithm with Global & Local Re-clustering for Wireless

Sensor Networks”, International Journal of Communication Science and Engineering Vol. 7, No. 7, pp. 45-52, 2013.

6. Wendi Rabiner Heinzelman, Anantha Chandrakasan, Hari Balakrishnan, “Energy Efficient Communication Protocol for Wireless Microsensor Networks”, Proceedings of the 33rd Hawaii International Conference on System Sciences, IEEE, pp.1-10, 2000.

7. Shakya, R.K. Singh, Y.N. ; Verma, N.K. “Generic correlation model for wireless sensor network applications” Wireless Sensor Systems, IET

,Vol 3 Issue: 4, pp. 266 – 276, ISSN: 2043-6386, Dec 2013 8. Guangzhou, China; Yiju Zhan ; Yonghua Wang “Data Density Correlation Degree Clustering Method for Data Aggregation in WSN,”

Sensors Journal, IEEE, Vol 14 Issue, pp. 1089-1098, ISSN: 1530-437X, April 2014.

9. Ghalib A., Shah, Muslim Bozyigit “Exploiting Energy aware Spatial Correlation in Wireless Sensor Networks,” 2nd International Workshop

on software for Sensor Networks (Sensor Wave 2007), 2007.

10. http://en.wikipedia.org/wiki/Wireless_sensor_network accessed on 6.8.2013.

11. C. Hua and T.-S. Yum, “Optimal routing and data aggregation for maximizing lifetime of wireless sensor networks,” IEEE/ACM Trans. Netw. , vol. 16, no. 4, pp. 892–903, Aug. 2008

12. D. Chu, A. Deshpande, J.M. Hellerstein, and W. Hong, “Approximate Data Collection in Sensor Networks Using Probabilistic Models,”

Proc. 22nd Int’l Conf. Data Eng. (ICDE), pp. 48-59, 2006 13. O. Younis and S. Fahmy, “HEED: A Hybrid Energy-Efficient Distributed Clustering for Adhoc Sensor Networks,” Proc. IEEE INFOCOM,

2004

14. http://www.mathwords.com/o/outlier.htm accessed on 10.2.2014

10-14

5.

Authors: Shikha Dogra, Sahil

Paper Title: Cloud Computing and its Security Concerns A Survey

Abstract: Cloud Computing is evolving into the most desirous computing technology especially because of its low

cost & resource independence but also incurs some of the most threatening concerns to the future of this technology

i.e. its security. This paper presents a brief introduction to Cloud Computing with a comprehensive review of the

most discussed security concerns to Cloud Systems.

Keywords: Grid Computing, Distributed Computing, Parallel Computing, Virtualization, Utility Computing, Image

optimization, Image portability, Fault tolerance, Multitenancy, Virtual Appliance, OS Kernel, Cloud migration,

DDoS, Virus, Data location, Data Recovery, Data Control, Data privacy, Data Availability, Data Transmission, Data

Security, Data Reminisce, Data Disposal, Virtual Servers, Virtual Networks, Hypervisors, APIs, VM Portability,

Uptime.

References: 1. , Peter, and Tim Grance. "The NIST definition of cloud computing." National Institute of Standards and Technology 53, no. 6 (2009): 50.

15-18

Page 12: International Journal of Innovative Technology and ...Head (Research and Publication), SRM University, Gaziabad (U.P.), India Dr. Deepak Garg Professor, Department of Computer Science

2. Liu, Wentao. "Research on cloud computing security problem and strategy." In Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on, pp. 1216-1219. IEEE, 2012.

3. Lin, Guoman. "Research on electronic data security strategy based on cloud computing." In Consumer Electronics, Communications and

Networks (CECNet), 2012 2nd International Conference on, pp. 1228-1231. IEEE, 2012. 4. Jamil, Danish, and Hassan Zaki. "CLOUD COMPUTING SECURITY." International Journal of Engineering Science & Technology 3, no.

4 (2011).

5. Panneerselvam, John, Lu Liu, Richard Hill, Yongzhao Zhan, and Weining Liu. "An investigation of the effect of cloud computing on network management." In High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded

Software and Systems (HPCC-ICESS), 2012 IEEE 14th International Conference on, pp. 1794-1799. IEEE, 2012.

6. Reese, George. Cloud application architectures: building applications and infrastructure in the cloud. " O'Reilly Media, Inc.", 2009. 7. Buyya, Rajkumar, Chee Shin Yeo, Srikumar Venugopal, James Broberg, and Ivona Brandic. "Cloud computing and emerging IT platforms:

Vision, hype, and reality for delivering computing as the 5th utility." Future Generation computer systems 25, no. 6 (2009): 599-616.

8. Gartner, “Gartner Says Cloud Computing Will Become the Bulk of New IT Spend by 2016,” [Online]. 2013.Available: http://www.gartner.com/newsroom/id/2613015

9. A Vouk, Mladen. "Cloud computing–issues, research and implementations." CIT. Journal of Computing and Information Technology 16,

no. 4 (2008): 235-246.. 10. Bala, Anju, and Inderveer Chana. "Fault Tolerance-Challenges, Techniques and Implementation in Cloud Computing." International

Journal of Computer Science Issues (IJCSI) 9, no. 1 (2012).

11. Schubert, Lutz, and Keith Jeffery. "Advances in clouds." Report of the Cloud Computing Expert Working Group. European Commission (2012).

12. Arora, Pankaj, Rubal Chaudhry Wadhawan, and Er Satinder Pal Ahuja. "Cloud computing security issues in infrastructure as a service."

International Journal of Advanced Research in Computer Science and Software Engineering 2, no. 1 (2012).

13. Gens, Frank. “Problems facing during Cloud Computing Platform Construction.” [Online]. December 2009. Available:

http://blogs.idc.com/ie/?p=730

14. Wanyun, L. “Cloud computing: Enterprise information construction strategy and practice.” in Tsinghua University Press, 20 I 0 (In Chinese).

15. Yuel, He, and Che Mingl. "Cloud Computing Security Infrastructure Based on the Isolation Concept."

16. Zhijun, Wang, and Zhang Ni. "A Survey on Cloud Computing Security." 17. Mell, P., and T. Grance. "The NIST Definition of Cloud Computing, Version 15, National Institute of Standards and Technology, October

7, 2009." (2009).

18. Jain, Pritesh, Dheeraj Rane, and Shyam Patidar. "A survey and analysis of cloud model-based security for computing secure cloud bursting and aggregation in renal environment." In Information and Communication Technologies (WICT), 2011 World Congress on, pp. 456-461.

IEEE, 2011.

19. Gowrigolla, Bhagyaraj, Sathyalakshmi Sivaji, and M. Roberts Masillamani. "Design and auditing of cloud computing security." In Information and Automation for Sustainability (ICIAFs), 2010 5th International Conference on, pp. 292-297. IEEE, 2010.

20. Tripathi, Alok, and Abhinav Mishra. "Cloud computing security considerations." In Signal Processing, Communications and Computing

(ICSPCC), 2011 IEEE International Conference on, pp. 1-5. IEEE, 2011. 21. Lv, Haoyong, and Yin Hu. "Analysis and research about cloud computing security protect policy." In Intelligence Science and Information

Engineering (ISIE), 2011 International Conference on, pp. 214-216. IEEE, 2011.

22. “A Survey on Cloud Computing Security, Challenges and Threats| Whitepapers | TechRepublic.”[Online].Available:

http://www.techrepublic.com/whitepapers/a-survey-on-cloudcomputing-security-challenges-and-threats/3483757

23. Archer, Jerry, Alan Boehme, Dave Cullinane, Paul Kurtz, Nils Puhlmann, and Jim Reavis. "Top threats to cloud computing v1. 0." Cloud Security Alliance (2010).

24. Gonzalez, Nelson, Charles Miers, Fernando Redígolo, Marcos Simplício, Tereza Carvalho, Mats Näslund, and Makan Pourzandi. "A

quantitative analysis of current security concerns and solutions for cloud computing." Journal of Cloud Computing 1, no. 1 (2012): 1-18. 25. Kulkarni, Gurudatt, Jayant Gambhir, Tejswini Patil, and Amruta Dongare. "A security aspects in cloud computing." In Software

Engineering and Service Science (ICSESS), 2012 IEEE 3rd International Conference on, pp. 547-550. IEEE, 2012.

26. Wang, Jun-jie, and Sen Mu. "Security issues and countermeasures in cloud computing." In Grey Systems and Intelligent Services (GSIS), 2011 IEEE International Conference on, pp. 843-846. IEEE, 2011.

27. Behl, Akhil. "Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation." In

Information and Communication Technologies (WICT), 2011 World Congress on, pp. 217-222. IEEE, 2011. 28. Bhardwaj, Aashish, and Vikas Kumar. "Cloud security assessment and identity management." In Computer and Information Technology

(ICCIT), 2011 14th International Conference on, pp. 387-392. IEEE, 2011.

29. Mahmood, Zaigham. "Data Location and Security Issues in Cloud Computing." In Emerging Intelligent Data and Web Technologies (EIDWT), 2011 International Conference on, pp. 49-54. IEEE, 2011.

30. Wen, Fu, and Li Xiang. "The study on data security in Cloud Computing based on Virtualization." In IT in Medicine and Education

(ITME), 2011 International Symposium on, vol. 2, pp. 257-261. IEEE, 2011. 31. Yandong, Zhang, and Zhang Yongsheng. "Cloud computing and cloud security challenges." In Information Technology in Medicine and

Education (ITME), 2012 International Symposium on, vol. 2, pp. 1084-1088. IEEE, 2012.

32. Mollet, Ngongang Guy. "Cloud Computing Security." Bachelor of Engineering Degree Information Technology Thesis, Helsinki Metropolia University of Applied Sciences, Helsinki, Finland 11 (2011).

33. Roberts II, John C., and Wasim Al-Hamdani. "Who can you trust in the cloud?: A review of security issues within cloud computing." In

Proceedings of the 2011 Information Security Curriculum Development Conference, pp. 15-19. ACM, 2011. 34. Mathisen, Eystein. "Security challenges and solutions in cloud computing." In Digital Ecosystems and Technologies Conference (DEST),

2011 Proceedings of the 5th IEEE International Conference on, pp. 208-212. IEEE, 2011.

6.

Authors: Md. K. M., Obetta S. E.

Paper Title: Effects of Levels of Tillage on Destruction and Re – Emergence of Weeds of Benue River Makurdi

Flood Plains

Abstract: This study was conducted to investigate effects of different levels of soil tillage on weed destruction and

re – emergence during the cropping season of the year 2012. The experiment was conducted on the experimental

farm of Department of Agricultural and Environmental Engineering, University of Agriculture, Makurdi. The field

was laid out in a randomized complete block design (RCBD) with four treatments and three replications. The

treatments were ploughing and harrowing once (PH), ploughing and harrowing twice (PHH), ploughing and

harrowing thrice (PHHH) and no – tillage (NT). A 75 Hp four – wheel drive MF 375 E tractor, 3 – discs MF plough

and 14 – discs offset MF harrow were used for the tillage operations. The parameters studied were weed destruction

and re – emergence. The total rainfall within the period was 928.7 mm. Atmospheric temperatures fluctuated

between 32ºC and 39ºC and the relative humidity was between 70 % and 86 %. Results showed that the soil of the

experimental plot was generally dark and was predominantly sandy. Ploughing and harrowing thrice cut down the

highest number of weeds and gave the best soil conditions which yielded the least number of weed re – emergence.

More weeds re – emerged on no – tillage sub – plots with percentages ranging between 42.99 % and 65.11 %. The

19-23

Page 13: International Journal of Innovative Technology and ...Head (Research and Publication), SRM University, Gaziabad (U.P.), India Dr. Deepak Garg Professor, Department of Computer Science

results also showed that tillage is a viable alternative to chemical weeds control.

Keywords: Effects, Destruction, Levels, Tillage, Weeds.

References: 1. Wolkowski, R.P. (2011). Impact of Tillage on Soil Properties. Accessed on 02/07/2011 from http://www.soils.wisc.edu

2. Gale Encyclopedia of Food and Culture (2011). Tillage. Accessed on 07/05/2011 from http://www.answers.com 3. Tirovska, S. (1982). Mechanization of Agriculture. Zemizdat, Sofia, Bulgaria. Pp.5-7

4. Kepner, R. A., Bainer, R. and Barger, B. L. (1978). Principles of Farm Machinery. Third Edition. CBS Publishers and Distributors, India.

Pp. 112 – 114. 5. Sahay, J. (2008). Elements of Agricultural Engineering. Standard Publishers Distributors. Pp. 224 – 225.

6. Microsoft Student with Encarta Premium (2009).“Agriculture”. Microsoft Encarta(R) 2009 [DVD]. Redmond, WA: Microsoft Corporation, 2008.

7. Simmons, F. W. and Nafziger, E. D. (2013). Soil Management and Tillage.Illinois Agronomy Handbook. Pg. 140.

Accessed from http://extension.cropsci.illinois.edu on 14/04/13 8. Jabro, J. D., W. B. Stevens, W. M. Iversen and R. G. Evans (2010). Tillage Depth Effects on Soil Physical Properties, Sugarbeet Yield, and

Sugarbeet Quality. USDA Agricultural Research Service – Lincoln, Nebraska. From http://digitalcommons.unl.edu/usdaarsfacpub/540

Accessed on 26/06/2011. 9. Isikwue, M.O. and A. F. Onyilo (2010). Influence of Land Use on the Hydraulic Response of a Loamy Sand Tropical Soil. Journal of

Engineering Trends in Engineering and Applied Sciences (JETEAS) 1 (2): 145 – 150. From jeteas.scholarlinkresearch.org

10. Gomez, K. A. and A. R. Gomez (1984). Statistical Procedures for Agricultural Research. 2nd Edition. John Wiley and Sons, New York. Pp.

1 – 590.

11. Farming Equipments (2011). Massey Ferguson MF 375 E Tractor. From http://www.farming – equipments. com/massey – ferguson – 375

e.htm on 03/07/2012 12. Derpsch, R. and Moriya, K. (1998). Implications of No – Tillage versus Preparation on Sustainability of Agricultural Production.

Sustainable Land Use – Furthering Cooperation between People and Institutions. Advances in Geoecology 31. Vol. II Catena

Verlag, Reiskirchen. Pp. 1179 – 1186. Accessed from http://www.fao.org on 30/06/2011 13. Mohammed, K. M. and Umogbai, V. I. (2014). Effects of Levels of Tillage on Germination Rate and Vegetation of Maize Crop of Benue

River Makurdi Flood Plains.

7.

Authors: Ranu Pandey, Sandeep Gonnade

Paper Title: Assessing Collaboration Framework in Multi- Cloud Environment

Abstract: Cloud computing has emerged as a popular paradigm that offers computing resources (e.g. CPU, storage,

bandwidth, software) as scalable and on-demand services over the Internet. As more players enter this emerging

market, a heterogeneous cloud computing market is expected to evolve, where individual players will have different

volumes of resources, and will provide specialized services, and with different levels of quality of services. It is

expected that service providers will thus, besides competing, also collaborate to complement their resources in order

to improve resource utilization and combine individual services to offer more complex value chains and end-to-end

solutions required by the customers. In this paper we explore the viability of collaboration framework in cloud

computing environments. This collaboration will be driven by the growing need to offer diverse services without

having to spend heavily on infrastructure. Collaboration can be a boon to all cloud service providers in a way that the

customers would have on offer a combined catalogue of all partnering CSPs.

Keywords: Cloud Computing, Cloud service provider(CSP), Proxy,SaaS, IaaS, PaaS

References: 1. R. Thandeeswaran, S. Subhashini, N. Jeyanthi1, M. A. Saleem Durai, “Secured Multi-Cloud Virtual Infrastructure with Improved

Performance”, cybernetics and information technologies XII, ( 2), pp. 11-22, 2012

2. Cong Wang, Student Member, Qian Wang, Student Member, Kui Ren, Senior Member, Ning Cao, and Wenjing Lou, “Toward Secure and Dependable Storage Services in Cloud Computing”, IEEE transactions on services computing, V, (2), 2012.

3. Ayad Barsoum and Anwar Hasan, “Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems”, IEEE

transactions on parallel and distributed systems. 4. Fawaz Paraiso, Nicolas Haderer, Philippe Merle, Romain Rouvoy, Lionel Seinturier, “A Federated Multi-Cloud PaaS Infrastructure”, 5th

IEEE International Conference on Cloud Computing pp.392 – 399, 2

5. Ana Juan Ferrer, Francisco Hernándezb, Johan Tordsson , Erik Elmroth, Ahmed Ali-Eldin, Csilla Zsigri, Raül Sirvent, Jordi Guitart, Rosa M. Badia, Karim Djemamee, Wolfgang Ziegler, Theo Dimitrakos, Srijith K. Nair, George Kousiouris, Kleopatra Konstanteli, Theodora

Varvarigou, Benoit Hudzia, Alexander Kipp, Stefan Wesnerj, Marcelo Corrales, Nikolaus Forgó, Tabassum Sharif, Craig Sheridan,

“OPTIMIS: A holistic approach to cloud service provisioning”, Future Generation Computer Systems ELSEVIER pp. 66–77, 2012. 6. Mukesh Singhal and Santosh Chandrasekhar, Tingjian Ge, Ravi Sandhu and Ram Krishnan, Gail-Joon Ahn, and Elisa Bertino “Collaboration

in Multicloud Computing Environments: Framework and Security Issues”, Published by the IEEE Computer Society IEEE, 2013.

7. Mohamed Almorsy, John Grundy, and Amani S. Ibrahim, “TOSSMA: A Tenant-Oriented SaaS Security Management Architecture”, 5th IEEE Conference on Cloud computing IEEE, 2012.

8. Yashaswi Singh, Farah Kandah, Weiyi Zhang, “A Secured Cost-effective Multi-Cloud Storage in Cloud Computing”, IEEE INFOCOM

Workshop on Cloud Computing, 2011. 9. Anton Beloglazov, Jemal Abawajy, Rajkumar Buyyaa, “Energy-aware resource allocation heuristics for efficient management of data centers

for Cloud computing”, Future Generation Computer Systems ELSEVIER , pp. 755–768, 2011.

10. Jose Luis Lucas-Simarro, Rafael Moreno-Vozmediano, Ruben S. Montero and Ignacio M. Llorent, “Cost optimization of virtual infrastructures in dynamic multi-cloud scenarios”, Concurrency and Computation: practice and experience Concurrency Computat.: Pract.

Exper. Published online in Wiley Online Library (wileyonlinelibrary.com2012.

24-27

8.

Authors: T.Kasilingam, C.Thangavelu

Paper Title: Nano Analyses of Protective Film onto Carbon Steel

Abstract: The corrosion inhibition effect of cathodic surfactant, namely: dodecyl trimethyl ammonium bromide

(DTAB) and zinc ions, have been used as corrosion inhibitor for carbon steel in well water. Surface analysis using

SEM, EDAX and AFM shows a significant morphological improvement on the carbon steel surface with the addition

of inhibitors. FTIR spectra revealed the interaction between inhibitor molecules and carbon steel surface.

28-33

Page 14: International Journal of Innovative Technology and ...Head (Research and Publication), SRM University, Gaziabad (U.P.), India Dr. Deepak Garg Professor, Department of Computer Science

Keywords: AFM, Inhibitor, SEM-EDAX, Weight loss,

References: 1. P.R. Roberge, Handbook of corrosion engineering McGraw – Hill, 2000.

2. Melchers. E, Jeffery. R, “Corrosion Reviews”, 1(2005) 84.

3. Melchers. R.E, Jeffery. R, “Corrosion Reviews”, 6 (2005) 297. 4. J.M Bastidas, P.pinilla, J.L. Polo, S. Miguel, “Copper corrosion inhibition by triphenylmethane derivatives in sulphuric acid media” Corros.

Sci. 45(2003) 427-449.

5. A.E. Bolzan, I.B. Wakenge, R.C.V. Pittai, R.C. Salvarezza, A.J. Arvia, “The behaviour of copper anodes in aqueous thiourea-containing sulphuric acid solutions. Open circuit potentials and electrochemical kinetics”.J.Electroanal. Chem. 501(2001) 241-252.

6. E. Stipnisek-Lisac, A. Gazivoda, M. Madzarac, “Evaluation of non-toxic corrosion inhibitors for copper in sulphuric acid” Electrochim.

Acta 47 (2002) 4189-4194. 7. M. Sahin, S. Bilgic, H. Yilmaz, “The inhibition effects of some cyclic nitrogen compounds on the corrosion of the steel in NaCl mediums”

Appl. Surf. Sci.195 (2002) 1-7. 8. C.A. Miller, S. Qutubuddin, in: H.F. Eick, C.D. parfitt(Eds.), Interfacial Phenomena in Apolar Media, Surfactant Science Series, vol. 21,

Markel Dekker Inc., New York, Basel, 1987, p. 166.

9. Elachouri, M.S. Hajji, M. Salem, S.Kertit, R. Coudert, E.M. Essassi, “Some surfactants in the series of 2-(alkyldimethylammonio) alkanol bromides as inhibitors of the corrosion of iron in acid chloride solution” Corros. Sci 37 (1995) 381-389.

10. M.A. Migahed, E.M.S. Azzam, A.M. Al-Sabagh, “Corrosion inhibition of mild steel in 1 M sulfuric acid solution using anionic surfactant”

Mater ChemPhys 85 (2004) 273-279. 11. M.M. Osma. A.M. Omer, A.M. Al-Sabagh, “Corrosion inhibition of benzyl triethanol ammonium chloride and its ethoxylate on steel in

sulphuric acid solution” Mater ChemPhys 50 (1997) 271-274.

12. F. Zucchi, G.Trabanelli, G.Brunoro, “The influence of the chromium content on the inhibitive efficiency of some organic compounds” Corros Sci 33 (1992) 1135.

13. M. Elachouri, M.S. Hajji, M. Salem, S.Kertit, R. Coudert, E.M. Essassi, “Some surfactants in the series of 2-(alkyldimethylammonio)

alkanol bromides as inhibitors of the corrosion of iron in acid chloride solution” Corros. Sci 37 (1995) 381-389. 14. Z. Wei, P. Duby, P. Somasundram, “pitting inhibition of stainless steel by surfactants: an electrochemical and surface chemical approach” J

Colloid Interface Sci 259 (2003) 97-102.

15. J.M. Bastidas, J.L. Polo, E. Cano, C.L. Torre, “tributylamine as corrosion inhibitor for mild steel in hydrochloric acid” J Mater Sci 35 (2000) 2637.

16. J.M. Bastidas, J.L. Polo, E. Cano, “Substitutional inhibition mechanism of mild steel hydrochloric acid corrosion by hexylamine and

dodecylamine” J Appl Electrochem 30 (2000) 1173. 17. Z. Abdel Hamid, T.Y. Soror, H.A. El Dahan, A.M Omer, “New cationic surfactant as corrosion inhibitor for mild steel in hydrochloric acid

solutions” Anti – Corros Methods Mater 45 (1998) 306.

18. M. Saleh, A.A. Atia, “Effects of structure of the ionic head of cationic surfactant on its inhibition of acid corrosion of mild steel” J Appl Electrochem 36 (2006) 899.

19. M.A. Migahed, “Electrochemical investigation of the corrosion behaviour of mild steel in 2 M HCl solution in presence of 1-dodecyl-4-

methoxy pyridinium bromide” Mater Chem Phys 93 (2005) 48. 20. A.M. Al Sabagh, M.A. Migahed, H.S. Awad HS, “reactivity of polyester aliphatic amine surfactants as corrosion inhibitors for carbon steel

in formation water (deep well water)” Corros SCi 48 (2006) 813.

21. R. Fuchs-Godec, V. Dolecek, “a effect of dodecylsulfate of the corrosion of copper in sulphuric acid media” Colloids Surf A 244 (2004) 73. 22. H. Ma, S. Chen, B. Yin, S. Zhao, X. Liu, “impedance spectroscopic study of corrosion inhibition of copper by surfactant in the acidic

solutions” Corros Sci 45 (2003) 867.

23. A.A. Amin, “weight loss, polarization, electrochemical impedance spectroscopy, SEM and EDX studies of the corrosion inhibition of copper in aerated NaCl solutions” J Appl Electrochem 36 (2006) 215.

24. D.Q. Zhan, L.X. Gao, G.D. Zhou, K.Y.Lee, “undecyl substitution in imidazole and its action on corrosion inhibition of copper in aerated

acid chloride media” J Appl Electrochem 38 (2008) 71. 25. T.P. Zhao, G.N. Mu,”the adsorption and corrosion inhibition of anion surfactant on aluminium surface n hydrochloric acid” Corros Sci 41

(1991) 1937.

26. S.S. Abd El Rehim, H.H. Hassaan, M.A. Amin, “corrosion inhibition of aluminium by 1,1(lauryl amido)propyl ammonium chloride in HCl solution” Mater ChemPhys 70 (2001) 64.

27. S.S. Abd El Rehim, H.H. Hassaan, M.A. Amin, “the corrosion inhibition study of sodium dodecyl benzene sulphonate to aluminium and its

alloys in 1.0 M HCl solution” Mater ChemPhys 78 (2002) 337. 28. A.K. Maayta, N.A.F. Al-Rawashdeh, “inhibition of acidic corrosion of pure aluminum by some organic compounds” Corros Sci 46 (2004)

1129.

29. R. Guo, T. Liu, X. Wei, “effect of SDS and some alcohols on the inhibition efficiency of corrosion for nickel” Colloids Surf A 209 (2002)

273-278.

30. Ph. Dumas, B. Butffakhreddine, C. Am, O.Vatel, E.Ands, R.Galindo and F.Salvan, “Quantitative microroughness analysis down to the

nanometer scale, Europhys. Lett. 22 (1993)717-722. 31. J.M. Bennett, J. Jahannir, J.C.Podlesny, T.L. Baiter and D.T.Hobbs, “Scanning force microscopy as a tool for studying optical surface,

Appl. Opt 43(1995)213-230.

32. A.Duparre, N.Kaiser, H.Truckenbrodi, M.Berger and A.Kohler, “Microtopography investigations of optical surfaces and thin films by light scattering, optical profilometry SPIE, 1995(1993)181-192.

33. C.Amra, C. Deumie, D.Torricini, P.Roche, R.Galindo, P.Dumas and F.Salvan Overlapping of roughness spectra measured in microscopic (Optical) and microscopic (AFM) bandwidths, Int. Symp. On Optical Interference Coatings, 6-10 June 1994. Grenoble, Proc. SPIE

2253(1994)614-630.

34. C.Thangavelu, P.Patric Raymond, S. Rajendran, M. Sundaravadivelu, “Influence of Chloride Ion on the Corrosion Inhibition Efficiency of the ATMP-Zn2+ System,” Asian j. Research Chem. 4(3)(2011)402-405.

35. C.Thangavelu, M.Umarani, M. Sekar, “Eco- Friendly Inhibitor System for Corrosion Inhibition of Carbon Steel in High Chloride Media”,

RASAYAN.J.Chem. 4(2011)245-250.

9.

Authors: Fahmida Khatoon, Tarana Afrin Chandel

Paper Title: Design of Low Power, High Speed Differential Amplifier Ring Voltage Controlled Oscillator in CMOS

Technology

Abstract: Designing a compact, power efficient Voltage- Controlled Oscillator (VCO) for high frequency phase lock

loop (PLL) in modern wireless communication system is decisively a challenging task. Voltage-Controlled Ring

Oscillator are crucial component in many wireless communication systems.VCRO is used in PLL circuit, to generate

the oscillations and increase the speed of whole system. In this paper a low power and high speed VCRO is

implemented using 250nm CMOS technology provided by generic with 2.5volt power supply. In favour of easy

implementation of the module in small die size, a five-stage CMOS differential Voltage Controlled Ring Oscillator

has been adopted to fabricate the proposed VCRO.The Voltage Controlled Ring Oscillator is design in Tanner Tool

Version 13 environment. Power Consumption should be reduced to improve the performance of the VCRO.We also

34-37

Page 15: International Journal of Innovative Technology and ...Head (Research and Publication), SRM University, Gaziabad (U.P.), India Dr. Deepak Garg Professor, Department of Computer Science

used of several techniques such as transistor sizing to improve performance of VCRO.Simulated results show that the

designed VCRO exhibits an output frequency from 87-910 MHz with tuning voltages of 0.7 V to 2.3 V.The VCRO

consumes 0.359mW of power at Vtune=0.7 V supply.

Keywords: CMOS,High Speed, Low Power,VCRO

References: 1. C.H.Park,O.Kim, and B.Kim 2001, “A 1.8-GHz self-calibrated phase locked loop with precisei/Q Matching ,” IEEE J. Solid-State Circuits,

vol. 36, pp.777-783.

2. Hesieh Y.B. and Kao Y.H., “A Fully integrated spread-spectrum clock generation by using direct VCO modulation,” IEEE Trans

CircuitSyst.I,Regular papers,vol.55,pp.1845-1853,August. 3. Sun L. and Kwasniewski T.A., “ A 1.25- GHz 0.35µm monolithic CMOS PLL based on a multiphase ring oscillator,”IEEE J.Solid-State

Circuits,vol. 36,pp.910-916,June 2001. 4. M.Moghavvemi and A.Attaran, “Recent advances in delay cell VCOs,” IEEE Microw.Mag.,vol.12,no. 5,pp. 110-118,August 2011.

5. Bosco Leung, “VLSI for Wireless Communication,”Pearson Education publisher,New York,2002,ISBN 81-297-0403-X.

6. Behzad Razavi, “Design of Analog CMOS Integrated Circuit,”Tata McGraw-Hill Publishing Company Limited,New Delhi,2002,ISBN 0-07-238032-2.

7. Stephen Williams,Hugh Thompson,Michael Hufford,Eric Naviasky, “ An Improved CMOS Ring Oscillator PLL with less than 4ps RMS

Accumulated Jitter,”IEEE 2004 custom integrated circuits conference,Cadence Design Services,6210 Old Dobbin Lane,Suite 100,Columbia,Maryland 21045,USA.

8. Rashmi K Patli,M.A.Gaikward and V.G Nasre,“Area Efficient Wide Frequency Range CMOS Voltage Controlled Oscillator For PLL in

180nm CMOS Process,”IJERA,vol.2,pp.1696-1699. 9. Mrs. Devendra Rani and Prof.Sanjeev M.Ranjan, ,“ A. Karnik, “A Voltage Controlled Oscillator using Ring structure in CMOS

Technology,”International Journal of Electronics and Computer Science Engineering,vol.1 No.3,ISSN 2277-1956.

10. Y.A.Eken and J.P.Uyemura, ,“A 5.9 GHz voltage controlled ring oscillator in 180nm CMOS,”IEEE J.Solid State Circuits,vol.39,No.1,pp.230-233,Januar 2004.

10.

Authors: Yamuna Devi C R, S H Manjula, K R Venugopal, L M Patnaik

Paper Title: Multi-hop Route Discovery Using Opportunistic Routing for Wireless Sensor Networks

Abstract: In wireless sensor networks multi-hop routing is often used because of the limited transmission range of

sensor nodes. Opportunistic Routing is a multi-hop routing for wireless sensor networks. In this routing, the

neighbors of sender node overhear the transmission and f```orm multiple hops from source to the destination for

transfer of information. The neighbor nodes set participating in the routing are included in the forwarder list in the

order of priority. The node with highest priority is allowed to forward the packet it hears. A new protocol by Energy

Efficient Selective Opportunistic Routing (EESOR), is implemented in this paper that reduces the size of forwarder

list by applying a condition that the forwarding node is nearer to the destination. The path followed by

acknowledgment packet follows opportunistic routing, assuring reliability of transmission and energy balancing.

NS2 is the simulator used to implement the algorithm and results of simulation show that proposed EESOR protocol

performs better than existing Energy Efficient Opportunistic Routing (EEOR) protocol with respect to parameters

End-to-End Delay, Throughput, Routing Overhead and Network Lifetime.

Keywords: Delay; Lifetime; Opportunistic Routing; Reliability; Throughput; Wireless Sensor Network.

References: 1. X.F. Mao, S. Tang, X. Xu, X. Y, Li, and H. Ma, :Energy Efficient Opportunistic Routing in Wireless Networks, Proceedings of IEEE

Transactions on Parallel and Distributed Systems, vol. 22, no. 11, pp. 1934–1942, November 2011.

2. S Biswas and R Morris, :ExOR: Opportunistic Multi-hop Routing for Wireless Networks, in Proceedings of ACM SICGOMM, 133-144,

2005. 3. Chen Wei, Chen Zhi, Pingyi Fan, and Khaled Ben Letaief, :AsOR: An Energy Efficient Multi-Hop Opportunistic Routing Protocol for

Wireless Sensor Networks over Rayleigh Fading Channels, IEEE/ACM Transactions on Wireless Communications, vol. 8, no. 5, pp. 2452–

2463, May 2009. 4. Anand Nasipuri, R. Castaneda, and S.R. Das, :Performance of Multipath Routing for On-Demand Protocols in Ad Hoc Networks,

ACM/Kluwer Mobile Networks and Applications, vol. 6, no. 4, pp. 339–349, 2001.

5. Andrea Passarella, Mohan Kumar, Marco Conti, and Eleonora Borgia, :Minimum-Delay Service Provisioning in Opportunistic Networks, in IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 8, pp. 1267–1275, August 2011.

6. Che-Jung Hsu, Huey-Ing Liu, Winston K.G. Seah, :Opportunistic Routing A Review and the Challenges Ahead, ELSEVIER Journal

Computer Networks, vol. S5, pp. 3592–3603, 2011. 7. Jihoon Myung, and Wonjun Lee, :Wireless Sensor Networks: A Survey, IEEE Communication Letters, vol. 16, no. 4, pp. 510– 513, April

2012.

8. K. Zeng, W. Lou, and H. Zhai, :On End-to-End Throughput of Opportunistic Routing in Multirate and Multihop Wireless Sensor Networks, in Proceedings of INFOCOMM, 2008.

9. Shengling Wang, Siuzhen Cheng, :Opportunistic Routing in Intermittently Connected Mobile P2P Networks, IEEE Journal on Selected

Areas in Communication, vol. 31, pp. 369–379, September 2013. 10. Won-Yong Shin, Sae-Young Chung, Yong H. Lee, :Parallel Opportunistic Routing in Wireless Networks, in IEEE Transactions on

Information Theory, vol. 59, no. 10, pp. 6290–6391, October 2013.

11. Yanhuva Li, Abedelaziz Mohaisen, Zhi-Li Zhang, :Trading Optimality for Scalability in Large-Scale Opprotunistic Routing, in IEEE Transactions on Vehicular Technology, vol. 62, no. 5, pp. 2253 – 2263, June 2013.

12. Zehua Wang, Yuanzhu Chen, Cheng Li, :CORMAN: A Novel Cooperative Opportunistic Routing Scheme in Mobile Ad Hoc Networks,

IEEE Journal on Selected Areas in Communication, vol. 30, pp. 289–286, February 2012. 13. Bogdan Pavkovic, Fabrice Theoley re and Andrzej Duda, “Multipath Opportunistic RPL Routing over IEEE 802.15.4”, MSWiM, 2011.

14. Azad and Joarder Kamruzzaman, “Energy-Balanced Transmission Policies for Wireless Sensor Networks”, IEEE Transactions on Mobile

Computing, vol. 10, no. 7, pp. 927-940, Jul. 2011. 15. Xiaoli Ma, Min-Te Sun, Gang Zhao and Xiangqian Liu, “An Efficient Path Pruning Algorithm for Geographical Routing in Wireless

Networks”, IEEE Transactions on Vehicular Technology, vol. 57, no. 4, pp. 2474-2490, Jul. 2008.

38-45

11.

Authors: Azher Jameel, Qazi Junaid, Suhail Ahmed

Paper Title: Large Sliding Frictional Contact Problems by a Penalty Based Approach

Abstract: The finite element method is used to model large sliding frictional contact problems in which one body 46-55

Page 16: International Journal of Innovative Technology and ...Head (Research and Publication), SRM University, Gaziabad (U.P.), India Dr. Deepak Garg Professor, Department of Computer Science

slides over another body and there is relative motion at the interface of the two bodies. The penalty approach has

been used within finite element frame work to consider various constraints at the contact surface. The large sliding

behavior between two bodies has been formulated by employing the node-to-segment (NTS) algorithm. The NTS

technique searches for the active slave nodes and the corresponding master segments at the contact surface and then

the contact stiffness matrix is evaluated to enforce the contact conditions. Finally, three problems are solved to

demonstrate the applicability of the given technique in solving large sliding fictional contact problems. The given

problems have been solved for both the frictionless contact as well as the frictional contact at the interface of the two

bodies.

Keywords: FEM, Penalty Factor, Node-to-Segment Technique, Large Sliding.

References: 1. Wriggers, P., and Simo, J. C., 1985, “A note on tangent stiffness for fully nonlinear contact problems”, Communications in Applied

Numerical Methods, 1, pp. 199–203.

2. Parisch, H., 1989, “A consistent tangent stiffness matrix for three-dimensional non-linear contact analysis”, International Journal for

Numerical Methods in Engineering, 28, pp. 1803–1812. 3. Fracavilla, A., and Zienkiewicz, O. C., 1975, “A note on the numerical computation of elastic contact problems”, International Journal for

Numerical Methods in Engineering, 9, pp. 913–924.

4. Hughes, T. J. R., Taylor, R. L., Sackman, J. L., Curnier, A., and Kanoknukulchai, W., 1976, “A finite element method for a class of contact-

impact problems”, Computer Methods in Applied Mechanics and Engineering, 8, pp. 249–276.

5. Beer, G., 1985, “An isoparametric joint/interface element for finite element analysis”, International Journal for Numerical Methods in

Engineering, Vol. 21, pp. 585–600. 6. Peric, D., and Owen, D. R. J., 1992, “Computational model for 3D contact problems with friction based on the penalty method”,

International Journal for Numerical Methods in Engineering, 35, pp. 1289–1309.

7. Belyschko, T., and Neal, M. O., 1991, “Contact–impact by the pinball algorithm with penalty and Lagrangian methods”, International Journal for Numerical Methods in Engineering, 31, pp. 547–572.

8. Nistor, I., Guiton, M. L. E., Massin, P., Moes, N., and Geniaut, S., 2009, “An X-FEM approach for large sliding contact along

discontinuities”, International Journal for Numerical Methods in Engineering, 78, pp. 1407–1435. 9. Giorgio Zavarise, and Laura De Lorenzis, 2009, “The node-to-segment algorithm for 2D frictionless contact: Classical formulation and

special cases”, Computer Methods in Applied Mechanics and Engineering, 198, pp. 3428–3451.

10. McDevitt, T. W., and Laursen, T. A., 2000, “A mortar-finite element formulation for frictional contact problems”, International Journal for Numerical Methods in Engineering, 48, pp. 1525–1547.

11. ChehelAmirani, M., and Nemati, N., 2011, “Simulation of two dimensional unilateral contact using a coupled FE/EFG method”,

Engineering Analysis with Boundary Elements, 35, pp. 96–104. 12. Al-Dojayli, M., and Meguid, S. A., 2002, “Accurate modeling of contact using cubic splines”, Finite Elements in Analysis and Design, 38,

pp. 337–352.

13. Khoei, A. R., and Taheri Mousavi, S. M. 2010, “Modeling of large deformation – Large sliding contact via the penalty X-FEM technique”,

Computational Materials Science, 48, pp. 471–480.

12.

Authors: Rohini Kadlag, Rohit Devikar

Paper Title: A Survey on Automatic Protocol Blocker for Privacy -Preserving Public Auditing in Cloud

Computing

Abstract: Cloud Computing is nothing but specific style of computing where everything from computing power to

infrastructure, business apps are provided “as a service”. In cloud, shared resources, softwares and information is

provided as a metered service over the network. By data outsourcing, users can be relieved from the burden of local

data storage and maintenance. However, the fact that users no longer have physical possession of the possibly large

size of outsourced data makes the data integrity protection in Cloud Computing a very challenging and potentially

formidable task, especially for users with constrained computing resources and capabilities. Thus, enabling public

auditability for cloud data storage security is of critical importance so that users can resort to an external audit party

to check the integrity of outsourced data when needed. In particular, we consider the task of allowing a third party

auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. In this

paper we are extending the previous system by using automatic blocker for privacy preserving public auditing for

data storage security in cloud computing. We utilize the public key based homomorphic authenticator and uniquely

integrate it with random mask technique and automatic blocker. In particular, to achieve efficient data dynamics, we

improve the existing proof of storage models by manipulating the block tag authentication. Thus, TPA eliminates the

involvement of the client through the auditing of whether his Data stored in the Cloud are indeed intact, which can be

important in achieving economies of scale For Cloud Computing.

Keywords: Cloud computing, CSP, Data storage, Data dynamics, Protocol Blocker, Public auditability, TPA.

References: 1. Qian Wang, Student Member, IEEE, Cong Wang, Student Member, IEEE, Kui Ren, Member, IEEE Wenjing Lou, Senior Member, IEEE,

and Jin Li “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing” IEEE transactions on parallel and

distributed systems, vol. 22, no.5, May 2011.

2. P. Mell, T. Grance (2009),“Draft NIST working definition of cloud computing”, [Online]Available: http://www.csrc.nist.

gov/groups/SNS/cloud-computing/index.html.

3. Juels and B.S. Kaliski Jr., “Pors: Proofs of Retrievability forLarge Files,”Proc. 14th ACM Conf. Computer and Comm. Security(CCS

’07),pp. 584-597, 2007. 4. H. Shacham and B. Waters, “Compact Proofs of Retrievability” Proc. 14th Int’l Conf. Theory and Application of Cryptology and

Information Security: Advances in Cryptology (ASIACRYPT ’08),pp. 90-107, 2008.

5. K.D. Bowers, A. Juels, and A. Oprea, “Proofs of Retrievability: Theory and Implementation,” Report 2008/175, Cryptology ePrint Archive, 2008.

6. M. Naor and G.N. Rothblum, “The Complexity of Online ]memory Checking,” Proc. 46th Ann. IEEE Symp. Foundations of Computer

Science (FOCS ’05),pp. 573-584, 2005. 7. E.-C. Chang and J. Xu, “Remote Integrity Check with Dishonest Storage Server,”Proc. 13th European Symp. Research in Computer

Security (ESORICS ’08),pp. 223-237, 2008.

8. M.A. Shah, R. Swaminathan, and M. Baker, “Privacy-Preserving Audit and Extraction of Digital Contents,” Report 2008/186,Cryptology

56-60

Page 17: International Journal of Innovative Technology and ...Head (Research and Publication), SRM University, Gaziabad (U.P.), India Dr. Deepak Garg Professor, Department of Computer Science

ePrint Archive, 2008. 9. Oprea, M.K. Reiter, and K. Yang, “Space-Efficient Block Storage Integrity,”Proc. 12th Ann. Network and Distributed System Security

Symp. (NDSS ’05), 2005.

10. T. Schwarz and E.L. Miller, “Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage,” Proc. 26th IEEE Int’l Conf. Distributed Computing Systems (ICDCS’06),p. 12, 2006.

11. Q. Wang, K. Ren, W. Lou, and Y. Zhang, “Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance,” Proc. IEEE

INFOCOM, pp. 954-962, Apr. 2009. 12. C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring Data Storage Security in Cloud Computing,” Proc. 17th Int’l workshop Quality of

Service (IWQoS ’09),2009.

13. C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring Data Storage Security in Cloud Computing,” Proc. 17th Int’l Workshop Quality of Service (IWQoS ’09), 2009.

14. G. Ateniese, R.D. Pietro, L.V. Mancini, and G. Tsudik, “Scalable and Efficient Provable Data Possession,”Proc. Fourth Int’l Conf. Security

and Privacy in Comm. Networks (SecureComm ’08),pp. 1-10,20080. 15. D. Boneh, C. Gentry, B. Lynn, H. Shacham,“Aggregate and verifiably encrypted signatures from bilinear maps”, in Proc. of Eurocrypt

2003, Vol. 2656 of LNCS. Springer-Verlag, 2003, pp. 416–432

13.

Authors: Akshay Gupta, Ruprit Sikka, Pavithra Balaji

Paper Title: Low Complexity Partial Transmit Sequence Based Implementation to Reduce Peak to Average Power

Ratio in OFDM Systems

Abstract: Orthogonal frequency division multiplexing is a extremely useful and one of the most widely used

wireless technology. Its high spectral efficiency, low inter symbol interference and very less cross talk makes it

highly used in TV broadcasting or wire line systems like ADSL (Asymmetric digital subscriber line). The

increasingly useful OFDM (Orthogonal frequency division multiplexing) systems too suffer from one major

disadvantage of having a high PAPR, which is due to the superposition of N sub carriers. In this letter we counter the

high PAPR (Peak to Average Power ratio) using PTS (Partial Transmit Sequence) algorithm, which is a more

efficient technique than some other PAPR reducing techniques like SLM (Selected Mapping), clipping and amplitude

filtering. We have lowered the complexity of the algorithm making it highly reliable and much more sharper in terms

of lowering the PAPR. Our paper analyzes the PAPR plot in terms of CCDF (complimentary cumulative distributive

function) by varying the sub carriers and the sub-blocks in PTS. We also carry out the phase optimization in PTS

algorithm by using exhaustive search algorithm and modified exhaustive search algorithm so as to reduce PAPR to a

greater extent in OFDM systems.

Keywords: CCDF, OFDM, PAPR, Phase optimization, PTS, Sub carriers

References: 1. Arun Gangwar, Manushree Bhardwaj, “An Overview: Peak to Average Power Ratio in OFDM system & its Effect” International Journal of

Communication and Computer Technologies Volume 01 – No.2, Issue: 02 September 2012 2. Chintha Tellambura, Member , IEEE, “ Improved Phase Factor computation fot the PAR Reduction of an OFDM Signal Using PTS”, IEEE

COMMUNICATIONS LETTER, VOL.5, NO.4, APRIL 2001

3. Nikhil Arora, Prem Singh“Partial Transmit Sequence (PTS)-PAPR Reduction Technique in OFDM Systems with Reduced Complexity”, Conference on Advances in Communication and Control Systems 2013

4. Padmapriya Praveenkumar, Reangarajan Amiritharajan, “OFDM with low PAPR: A Novel approach of Partial Transmit Sequence”,Research

Journal of Information Technology 5(1),35:44,2013 5. Seung Hee Han, Student Member, IEEE, and Jae Hong Lee, Senior Member, IEEE,’’PAPR Reduction of OFDM Signals Using a Reduced

Complexity PTS Technique”, IEEE SIGNAL PROCESSING LETTERS, VOL. 11, NO. 11, NOVEMBER 2004

6. S.Haykin, “OFDM SYSTEMS, brain-empowered wireless communications,” IEEE J. Sel Areas Commun., vol. 23, pp. 201–220, Feb. 2005. 7. Yunfei Chen, Senior Member, IEEE, and Zijian Tang, "Effect of Spectrum Sensing Errors on the Performance of OFDM-Based Cognitive

Radio Transmission", IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 11, NO. 6, JUNE 2012

61-65

14.

Authors: Aziz Oriche, Abderrahman Chekry, Md. Khaldi

Paper Title: A Multi-Agents System for Extraction and Annotation of Learning Objects

Abstract: in this paper, we propose an extraction approach of learning objects (LO) (Definition, Example, Exercise,

etc...) of documents defined by HTML / XML whose structure is a tree DOM (Document Object Model). Our

approach is based on two intelligent agents. An agent of extraction to extract the learning objects independently of

the domain and to align them with the concepts of the ontology. An agent of annotation defined by a set of

declarative rules for annotates the nodes and their relationships. We defined in the extraction agent a module includes

a set of declarative rules of contextual exploration to extract the learning objects contained in the nodes of DOM

documents. The result of this extraction is a set of RDF triples generated for alignment the learning objects extracts

with concepts of ontology. The agent of annotation is based on a set of annotations metadata representing the results

of extraction and annotation. They allow also annotating the neighbor relationship between the nodes. We assume to

have a domain ontology defined by concepts, relations between these concepts and properties.

Keywords: Semantic Annotation, Multi-agent systems, Ontology, learning object (LO), contextual exploration

method.

References: 1. Aziz O., Abderrahman C., Mohamed K., “Intelligent Agents for the Semantic Annotation of Educational Resources”, International Journal of

Soft Computing and Engineering (IJSCE), Volume-3, Issue-5, November 2013.

2. Descles J.-P., Jouis C., "L’exploration contextuelle : une méthode linguistique et informatique pour l’analyse informatique de textes", in Proceedings of the International Langage Natural (ILN’93), Nantes, 1993.

3. Boutheina S., Rim F., Descles J.-P., "Relevant learning objects extraction based on semantic annotation", Int. J. Metadata, Semantics and

Ontologies, Vol. 8, No. 1, 2013. 4. Jean-Philippe Pernin, “Objets pédagogiques : unités d’apprentissage, activités ou ressources ?”, Sciences et Techniques Educatives, 2003.

5. Learning Technology Standards Committee (LTSC) P1484.12.1-2002 Learning Object Metadata Working Group, "Draft Standard for Learning Object Metadata", Available: http://ltsc.ieee.org/wg12/files/LOM_1484_12_1_v1_Final_Draft.pdf, 2002.

6. Bourda Y., Hélier M., "Métadonnées et XML : application aux objets pédagogiques", In Colloque International Technologies de

66-72

Page 18: International Journal of Innovative Technology and ...Head (Research and Publication), SRM University, Gaziabad (U.P.), India Dr. Deepak Garg Professor, Department of Computer Science

l’Information et de la Communication dans les Enseignement d’Ingénieurs et dans l’industrie, Troyes, 18-20 octobre 2000. 7. Sabine G., K. Ramesh R., "Concept Guide on Reusable Learning Objects with Application to Soil, Water and Environmental Sciences", Dec.

2007.

8. Gruber T. "A Translation Approach to Portable Ontology Specifications", Knowledge Acquisition, pp. 199-220, 1993. 9. Aziz O, Abderrahman C, Mohamed K., “Agent of semantic annotation of educational resources based on ontology”, International Journal of

Innovative Technology and Exploring Engineering (IJITEE), Volume-3, Issue-7, December 2013.

10. Gustavo C., "Une plate-forme informatique de l’Exploration Contextuelle : modélisation, architecture et réalisation (ContextO)", université de paris IV – Sorbonne, Ecole Doctorale Concepts et Langages, Laboratoire LaLICC, thèse de doctorat, 2003.

11. Mouhamadou T., « Annotation Sémantique de Documents Semi-structurés pour la Recherche d’Information », thèse en cotutelle, Universités

de Paris-Sud et Gaston Berger, 2010.

15.

Authors: Sonia Rathi, Nisha Malik, Nidhi Chahal, Sukhvinder Malik

Paper Title: Throughput for TDD and FDD 4 G LTE Systems

Abstract: Long Term Evolution (LTE) has been designed to support only packet-switched services. It aims to

provide seamless Internet Protocol (IP) connectivity between User Equipment (UE) and the packet data network

(PDN), without any disruption to the end user’s applications during mobility. The term LTE “Long Term Evolution”

encompasses the evolution of UMTS which is famous for high data rate because the use of OFDMA. Many of us

might have heard about LTE’s peak throughput i.e. 300Mbps, but how many of us know how we calculate that? This

paper provides the information, how this number is calculated? And assumptions behind? In this paper, authors have

explained the calculations of theoretical throughput for both the LTE FDD and TDD systems.

Keywords: LTE, Throughput, Frequency Division Duplexing, Time Division Duplexing.

References: 1. Lte - The Umts Long Term Evolution from Theory To Practice 2nd Edition by Stefania Sesia , Issam Toufik, Matthew Baker 2. 3GPP TS 36.213 “Evolved Universal Terrestrial Radio Access (E-UTRA) Physical layer procedures”.

3. 3GPP TS 36.221 “Evolved Universal Terrestrial Radio Access (E-UTRA); Medium Access Control (MAC) protocol specification”

4. 3GPP TS 36.300 “Evolved Universal Terrestrial Radio Access (E-UTRA), Evolved Universal Terrestrial Radio Access Network (E-UTRAN). 5. 3GPP TS 24.302: “Access to the 3GPP Evolved Packet Core (EPC) via Non-3GPP Access Networks”.

6. 3GPP TS 36.331: “Evolved Universal Terrestrial Radio Access (E-UTRAN); Radio Resource Control (RRC) Protocol Specification”

7. 3GPP TS 36.401: “Evolved Universal Terrestrial Radio Access Network (E-UTRAN); Architecture Description” 8. 3GPP TS 36.413: “Evolved Universal Terrestrial Radio Access Network (E-UTRAN); S1 Application Protocol (S1AP).

73-77

16.

Authors: Pranita C. Bawankar, U. A. Rane

Paper Title: eNotebook Based on ARM Architecture

Abstract: In recent years, electronic media has grown very fast replacing papers, tape devices, books, etc. The new

technologies provide large number of data into single device, fast searching options and more readability than ever.

As eBooks are replacing books; we are proposing eNotebook system in which user can write as he did in notebook,

save, searches and then reread content. This paper presents design and development of eNotebook using ARM7. The

system uses touch screen to get input data and operations like save, delete, open & close of data file. All data sensed

by touch screen is digitized by internal ADCs of LPC2148 microcontroller which gives low power platform with fast

execution. The output is shown on graphical LCD. Whatever user writes on screen it may need to save for future

use. The content of such hand written data will be in graphical/pictorial form hence required large of memory for

storage. We can provide external memory using pen drive, memory card, EEPROM etc. in this system we are using

SD card interfacing through SPI port.

Keywords: ARM7, Graphical LCD, LPC 2148, SD Cards, Touch Screen.

References: 1. Peter Corcoran (21 October 2011). “A Bitter Pill or a Better Tablet? A historical perspective on tablet computers” Available:

http://theinstitute.ieee.org/technology-focus/technology-history/a-bitter-pill-or-a-better-tablet

2. Kot, Chelsea (July 11, 2011). "A Brief History of Tablets and Tablet Cases". Tablets2Cases.

3. Viken, Alexander (April 10, 2009). "The History of Personal Digital Assistants 1980 – 2000". 4. "History of the HP 95LX computer". HP Virtual Museum. Hewlett-Packard. Retrieved February 18, 2011.

Available:http://www.hp.com/hpinfo/abouthp/histnfacts/museum/personalsystems/0025/0025history.html

5. Andrew Smith, Faithe Wempen (2011). “CompTIA Strata Study Guide”. John Wiley & Sons. p. 140. ISBN 978-0-470-97742-2. 6. Andrew Orlowski (26 Jun 2007). “Psion: the last computer - The Protea Story".

Available:http://www.theregister.co.uk/2007/06/26/psion_special?page=2

7. iPad. Available: en.wikipedia.org/wiki/IPad. 8. Tablet. Available: en.wikipedia.org/wiki/Tablet computer.

9. Digital Paper Available:http

10. ://pro.sony.com/bbsc/ssr/cat-digitalpaper/resource.latest.bbsccms-assets-show-digitalpaper-digitalpaper.shtml 11. Neal Brenner, Shawn Sullivan, William Goh. Texas instruments – application report – “4-Wire and 8-Wire Resistive Touch-Screen

Controller using the MSP430”. SLAA384A–February 2008–Revised November 2010

12. Available: http://www.ti.com/lit/an/slaa384a/slaa384a.pdf 13. David Seal, Addison Wesley (2001). “ARM Architecture Reference Manual” Second Edition.

14. Steve Furber, Addison Wesley (2000). “ARM System-on-Chip Architecture”, Second Edition.

15. The insiders’ guide to the Philips arm7 based microcontrollers. 16. AN10406: Accessing SD/MMC card using SPI on LPC2000 Rev. 03 — 3 January 2007

17. Available: www.nxp.com/documents/application note/AN10406.pdf

18. Application Notes for the T6963C LCD Graphics Controller Chip October, 95. 19. Available: http://www.lcd-module.de/eng/pdf/zubehoer/t6963.pdf

20. SPI Block Guide V03.06, Freescale Semiconductor.

21. Serial Peripheral Interface (SPI) Flash Memory Backgrounder, Scansion 22. Shneiderman, B. (1991). "Touch screens now offer compelling uses". IEEE Software

23. Potter, RS, Weldon, L. & Shneiderman, B. (1988). “Improving the accuracy of touch screen: An experimental evaluation of three

strategies”. Proc. CHI'88. Washington, DC: ACM Press.

78-82

Page 19: International Journal of Innovative Technology and ...Head (Research and Publication), SRM University, Gaziabad (U.P.), India Dr. Deepak Garg Professor, Department of Computer Science

17.

Authors: Priyankaran Tanck, Bipan Kaushal

Paper Title: A New Technique of Quality Analysis for Rice Grading for Agmark Standards

Abstract: The quality inspection method of rice grain which is followed by Agmark is based on manual inspection

by the assigned inspectors which proves to be an improper way and outcomes that results are inaccurate. A digital

inspection method for Agmark Standards for quality assessment of rice is required. So this paper proposes a digital

method which can be used to evaluate the quality of rice for the present Agmark Standards. The proposed method is

formulated with the help of digital image processing technique on MATLAB. In this paper three parameters; Broken

Grain , Foreign Particle and Admixture of Agmark Standards are converted to digital form for digital quality

inspection of rice. The outcomes of inspection of the samples studied, showed that our model was an effective way

for digital inspection of Agmark Standards.

Keywords: AGMARK, Binarization, Grayscale ,MATLAB, Region Props.

References: 1. R.Kiruthika, S.Muruganand , Azha Periasamy “MATCHING OF DIFFERENT RICE GRAINS USING DIGITAL IMAGE PROCESSING”

International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering Vol. 2, Issue 7, July 2013

2. B.K. Yadav, V.K. Jindal “Monitoring milling quality of rice by image analysis” Computers and Electronics in Agriculture 33 (2001) 19–33

www.elsevier.com/locate/compag

3. XuLizhang , Li Yaoming, Multi-Scale Edge Detection of Rice Internal Damage Based on Computer Vision, Proceedings of the IEEE

International Conference on Automation and LogisticsQingdao, China September 2008

4. YangYiShan ChenLiYun, XuYaoWu. From rice quality evaluation criteria of change to see our rice breeding for quality development [J].Journal of hybrid rice, finance (cicf 3) : 5-10.

5. Bhavesh B. Prajapati1, Sachin Patel2 “Algorithmic Approach to Quality Analysis of Indian Basmati Rice Using Digital Image Processing”

International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 3, March 2013)

6. Yao, Chen, Guan, “Inspection of rice appearance quality using machine vision”, Global Congress on Intelligent system, 2009 IEEE

7. R. M. Carter, PhD Thesis: On-Line measurement of size distribution and volumetric concentration of pneumatically conveyed solids using digital imaging techniques. 2005, University of Kent, UK.

8. R M Carter, Y. Yan., Measurement of particle shape using digital imaging techniques. Journal of Physics Conference Series, V. 15, pp. 177-

182, 2005. 9. Rohit R. Parmar, Kavindra R.Jain, Dr.Chintan K.Modi, “Image Morphological operation based quality analysis of coriander seed

(Coriandrumsatavum L.),” ETNCC (International Conference on Emerging Trends in Network and Computer Communications), 2011.

10. Gonzalez, R.C., Woods, R.E., 2008. Digital Image Processing. Prentice-Hall, Upper Saddle River. 11. Zhang, G., Jayas D. S., White N. D.G.., 2005.Separation of touching grain kernels in an image by ellipse fitting al-gorithm. Biosyst. Eng.,

92(2):135-142.

83-85

18.

Authors: Abderrahman CHEKRY, Aziz ORICHE, Mohamed KHALDI

Paper Title: Indexing and Adaptation of Learning Objects to the Personality of the Learner

Abstract: The main goal of this paper is to create adaptable learning object to different types of personality of

learners. For that, we present the personality factor that we deem useful to know the psyche of learner and to create

adaptable content. We lay bare two different approaches of learning profile and we propose an enrichment of

Learning Object Metadata standard to support adaptation. Finally, we suggest our approach to creating learning

profile and the process of adaptation of learning object.

Keywords: Personality, Learning Object Metadata, learner profile, Ontology.

References: 1. Abderrahman CHEKRY., Aziz ORICHE., Mohamed KHALDI., « Sharing and Adaptation of Educational Documents in E-Learning»

International Journal of Emerging Technologies in Learning. ISSN: 1863-0383, iJET, Volume 7, No 1, 2012.

2. Catherine VOYNNET FOURBOUL.,.« La personnalité ». December 2011 Available: http://voynnetf.fr/wp-content/uploads/2013/06/personnalite.pdf .

3. Stéphanie Brouard.,Fabrice Daverio.,. « Les outils du développement personnel pour manager ». Groupe Eyrolles, 2010 ISBN:978-2-212-

54713-9. 4. Sampson Demetrios., Karagiannidis Charalampos., Cardinali Fabrizio.,. « An Architecture for Web-based e-Learning Promoting Re-usable

Adaptive Educational e-Content » Educational Technology & Society 5 (4) , ISSN 1436-4522, 2002.

5. Carchiolo Vincenza., Longheu Alessandro., Malgeri Michele., Mangioni Giuseppe., . « An Architecture to Support Adaptive E-Learning ». International Journal of Computer Science and Network Security, Vol.7, No.1, 2007

6. IMS-LIP.,. http://www.imsglobal.org/ . Global Learning Consortium, Inc. Learner Information Profile Specification. Version 1.0.0 (March

2001). 7. Webster's dictionary. Available: http://www.larousse.fr/ .

8. Gwenaël GAVRAY.,. « Personnalisation des sites Web : élaboration d'une méthodologie de mise en œuvre et application au cas DGTRE ».

Memory for obtaining the title of Engineer From Management of the Catholic University of Louvain. Available: https://lilab.isys.ucl.ac.be/bchi/publications/2002/Gavray-T2002.pdf

86-91

19.

Authors: Ijemaru Gerald Kelechi, Udunwa Augustine Ikenna, Ngharamike Ericmoore Tochukwu, Oleka

Emmanuel Uchendu

Paper Title: Evaluating the Challenging Issues in the Security of Wireless Communication Networks in Nigeria

Abstract: Despite the gains offered by wireless communication systems, developing nations like Nigeria have been

facing some stringent challenges in the security of wireless communication systems. Although Nigeria’s Telecom

industry has experienced continuous growth and rapid progress in policy and technological development, thus

resulting in an increasingly competitive and networked world, it has however been encumbered with many security

challenges. At present, wireless communications weaknesses are on the increase due to the higher demand for

wireless access, demand for higher data rates, the emergence of advanced services, the need for roaming, and the

large deployment of services across the globe. Consequently, this has created challenging issues in the security of

92-96

Page 20: International Journal of Innovative Technology and ...Head (Research and Publication), SRM University, Gaziabad (U.P.), India Dr. Deepak Garg Professor, Department of Computer Science

wireless systems and applications operating in wireless environments. Nigeria witnessed stages of technological

advancements in her information-dissemination techniques. Most of the techniques, such as post office, public switch

telephone network, telegram and so on, are now becoming obsolete and therefore necessitate the use of other

communication mediums which are not only faster, cheaper, portable, contemporary, more efficient and reliable but

also have the gains and potentials of accelerating economic development as well as enhancing the lives of

individuals. Consequently, the wireless communication systems such as the Global System for Mobile

communication (GSM) and the internet, which are operative in Nigeria at present, have brought convenience,

mobility and portability in the information and communication process. And with these, people can now transact a

wide range of services formally. It is true that security of wireless networks is a global issue that needs to be

addressed; the Nigerian case has more to it owing to the diverse nature of the country vis-à-vis its ethnic and

religious diversities and therefore requires a critical evaluation, especially now that deregulation of the sector has

taken its success.

Keywords: CDMA, GSM, TDMA

References: 1. AirDefense™, Inc. ‘Wireless LAN Security: Intrusion Detection and Monitoring for the Enterprise.’ URL:

http://www.airdefense.net/products/index.shtm (30 April 2014).

2. Chuah, M., and Zhang, Q. (2006) Design and Performance of 3G Wireless Network and Wireless Lans. USA: Springer

3. Du, K., and Swamy, M.N.S. (2009) Wireless Communication Systems: From RF Subsystems to 4G Enabling Technologies. London:

Cambridge University press 4. Finkle II, L.G. (2000) ‘Wireless Communications: A Modern Necessity.’ Journal of Information Technology 63, (5)

5. Hamid, R.A. (2003) ‘Wireless LAN: Security Issues and Solutions’

6. Homeland Security (2006) ‘Wireless Communications Security.’ [online] available from http://www.safecomprogram.gov/NR/rdonlyres/7F55866C-13B5-419E-B698-

1C4022696A49/0/Wireless_Communications_Security_090607.pdf [6th May 2010]

7. ISO (2005) ‘Information Technology-Security Techniques-Code of Practice for Information Security Management.’ [online] available from http://www.iso.org/iso/support/faqs_widely_used_standards/widely_used_standards_other/information_security.htm [10th May 2014]

8. Khan, F. (2009) ‘LTE for 4G Mobile Broadband: Air Interface Technologies and Performance’

9. Miller, K. S. (2001) ‘Facing the Challenges of Wireless Security.’ Technology News 17 July: 16-18 10. Moore, L. (2006) ‘Wireless Technology and Spectrum Demand: Advanced Wireless Services.’ Congressional Research Services (CRS)

Report for Congress

11. SANS Institute (2003) ‘An Overview of Wireless Security Issues’ 12. Sing, G. (2012) ‘Security Issues in Wireless Local Area Networks (WLAN)’

13. US-CERT (2008) ‘Using Wireless Technology Securely a government organization.’ [Online] Available from <http://www.us-

cert.gov/reading_room/home-network-security/> [12th March 2014]

20.

Authors: Rubayyat Mahbub, Md. Fakhrul Islam

Paper Title: Sintering Behavior and Microstructure Development of Ba Doped BiFeO3

Abstract: The main focus of this research was to investigate the role of Ba doping on the sintering behavior and

microstructure development of BiFeO3 (BFO) ceramic. Single phase Bi1-xBa.xFeO3 samples (x= 0.1, 0.2 and 0.3)

were synthesized by the conventional solid-state reaction method. The doped samples were then sintered at

temperatures in the range of 850-900oC for both 1 and 2 hours of holding time. Thereafter field emission scanning

electron microscope (FESEM) and X-ray diffraction (XRD) techniques were used to examine the phase and structure

of the samples. Phase analysis by X–ray diffraction (XRD) indicated that single phase perovskite structure was

formed with possible increment in lattice parameter with increasing Ba doping. Moreover, microstructural

investigation using the field emission scanning electron microscope (FESEM) showed that an increase in Ba

concentration in Bi1-xBa.xFeO3 controls excessive grain growth and reduces the average grain size from 10 µm in

Bi0.9Ba0.1FeO3 to 0.58 µm in Bi0.7Ba0.3FeO3 when sintered at 900oC for 2h. However, percent theoretical density

(%TD) above 95% was attained in this research for all compositions.

Keywords: Bismuth Ferrite, Barium, Doping, Sintering, Densification, Microstructure.

References: 1. N.A. Hill, “Why Are There so Few Magnetic Ferroelectrics?”, Journal of Physical Chemistry B, 2000, Volume 104 (29), pp 6694-6709. 2. C.P. Bhole, “Antiferromagnetic to Paramagnetic Phase transitions in Bismuth Ferrite (BiFeO3) Ceramics by Solid State Reaction”,

Ceramics – Silikáty, 2012, Volume 56 (2), pp 127-129.

3. W. Cheong, M. Mostovoy, “Multiferroics: a magnetic twist for ferroelectricity, ”Nature Materials, 2007, Volume 6, pp 13-20. 4. R. Ramesh, N.A. Spaldin, “Multiferroics: progress and prospects in thin films”, Nature Materials, 2007, Volume 6, pp 21-29.

5. L. Luo, W. Luo, G. Yuan, W. Wei, X. Yuan, H. Zhang, K. Shen, M. Xu, Q. Xu, “The Origin of Enhanced Room Temperature

Ferromagnetism in Ba Doped BiFeO3”, Journal of Superconductivity and Novel Magnetism, 2013, Volume 26, pp 3309–3313. 6. D. H. Wang, W. C. Goh, M. Ning, and C. K. Ong “Effect of Ba doping on magnetic, ferroelectric, and magnetoelectric properties in

mutiferroic BiFeO3 at room temperature,” Applied Physics Letters, Vol. 88, 2006, pp 212907: 1-3.

7. Z. Cheng, X. Wang, and S. Dou, “Improved ferroelectric properties in multiferroic BiFeO3 thin films through La and Nb codoping,” Physical Review B, Vol. 77, 2008, pp 092101: 1-4.

8. M.Y. Shami, M.S. Awan, and M. Anis-ur-Rehman,“Effect of Sintering Temperature on Nanostructured Multiferroic BiFeO3 Ceramics,”

Key Engineering Materials Vol. 510-511, 2012, pp 348-355. 9. A.K. Ghosh, H. Kevin, B. Chatterjee, G.D. Dwivedi, A. Barman, H.D. Yang and S. Chatterjee, “Effect of Sr-doping on multiferroic

properties of Bi0.8La0.2Fe0.9Mn0. 1O3”, Solid State Communications, Volume 152, Issue 6, 2009, pp 557-560.

10. R. Das, K. Mandal, “Magnetic, ferroelectric and magnetoelectric properties of Ba-doped BiFeO3”, Journal of Magnetism and Magnetic Materials, 2012, Volume 324 (11), pp 1913–1918.

11. S. J. Kim, S. H. Han, “Multiferroic Properties of Ti-doped BiFeO3 Ceramics”, Journal of the Korean Physical Society, 2010, Volume 56

(1), pp 439-442. 12. V. A. Khomchenko, D. A. Kiselev, “Effect of diamagnetic Ca, Sr, Pb, and Ba substitution on the crystal structure and multiferroic

properties of the BiFeO3 perovskite”, Journal of Applied Physics, 2008, Volume 103, pp 024105: 1-6.

13. A.K. Ghosha, H. Kevin, B. Chatterjee, G.D. Dwivedi, A. Barman, H.D. Yang, S. Chatterjee, “Effect of Sr-doping on multiferroic properties

97-102

Page 21: International Journal of Innovative Technology and ...Head (Research and Publication), SRM University, Gaziabad (U.P.), India Dr. Deepak Garg Professor, Department of Computer Science

of Bi0.8La0.2Fe0.9Mn0.1O3”, Solid State Communications, 2012, Volume 152, pp 557–560. 14. A.K. Ghosh , G.D. Dwivedi, B. Chatterjee, B. Rana, A. Barmanb, S. Chatterjee, H.D. Yang, “Role of codoping on multiferroic properties at

room temperature in BiFeO3 ceramic”, Solid State Communications, 2013, Volume 166, pp 22–26.

15. S. Pattanayak, R.N.P. Choudhary, S.R. Shannigrahib, P.R. Dasa, R. Padheea, “Ferroelectric and ferromagnetic properties of Gd-modified BiFeO3”, Journal of Magnetism and Magnetic Materials, 2013, Volume 341, pp 158–164.

16. Y. Lin, Q. Jiang, Y. Wang, C. Nan, L. Chen, J. Yu, “Enhancement of ferromagnetic properties in Bi FeO3 polycrystalline ceramic by La

doping”, Applied Physics Letters, 2007, Volume 90, pp 172507: 1-3. 17. D.H. Wang, W.C. Goh, M. Ning, C.Ong, “Effect of Ba doping on magnetic, ferroelectric, and magnetoelectric properties in mutiferroic

BiFeO3 at

18. Y.F. Cui, Y.G. Zhao, L.B. Luo, J.J. Yang, H. Chang, M.H. Zhu, D. Xie, T. L. Ren, “Dielectric, magnetic, and magnetoelectric properties of La and Ti codoped BiFeO3”, Applied Physics Letters, 2010, Volume 97, pp 222904: 1-3.

19. A.R. Makhdoom , M.J. Akhtar , M.A. Rafiq a, M.M. Hassan, “Investigation of transport behavior in Ba doped BiFeO3”, Ceramics

International, Volume 38, 2012, pp 3829–3834 20. N. Jeon, K. Moon, D. Rout and S. L. Kang,“Enhanced Sintering Behavior and Electrical Properties of Single Phase BiFeO3 Prepared by

Attrition Milling and Conventional Sintering,” Journal of the Korean Ceramic Society, Vol. 49, No. 6, July 2012, pp. 485~492.

21. Szafraniak, M. Polomska, B. Hilczer, A. Pietraszko, and L Kepinski, “Characterization of BiFeO3Nanopowder Obtained by Mechanochemical Synthesis,” Journal of European Ceramic Society, 2007, pp 4399-4402.

22. S. M. Selbach, M. A. Einarsrud, T. Tybell, and T. Grande, “Synthesis of BiFeO3 by Wet Chemical Methods,” Journal of American Ceramic

Society,Volume 90, Issue 11, 2007, pp 3430-3434. 23. M. M. Kumar, V. R. Palkar, K. Srinivas and S.V. Suryanarayana, “Ferroelectricity in a Pure BiFeO3 Ceramic,” Applied Physics Letter,

Volume 76 Issue 19, 2000, pp 2764-2766.

24. M. Valant, A. Axelsson, and N. Alford,“Peculiarities of a Solid-State Synthesis of Multiferroic Polycrystalline BiFeO3,” Chemistry of

Materials, Volume 19,2007, pp 5431-5436.

25. S. V. Kalinin, M. R. Suchomel, P. K. Davies, and D.A. Bonnell, “Potential and Impedance Imaging of Polycrystalline BiFeO3 Ceramics,”

Journal of American Ceramic Society, Volume 85, Issue 12, 2002, pp 3011-3017. 26. N. Jeon, D. Rout, I. W. Kim, and S.J. L. Kang, “Enhanced Multiferroic Properties of Single-phase BiFeO3 Bulk Ceramics by Ho doping,”

Applied Physics Letter, Volume 98, Issue 7, 2011, pp 072901-072903.

27. X. Qi, J. Dho, R. Tomov, M. G. Blamire and J. L. MacManus-Driscoll, “Greatly reduced leakage current and conduction mechanism in aliovalent-ion-doped BiFeO3,” Applied Physics Letters, Volume 86, 2005, pp 062903:1-3.

28. G.L. Yuan, S.W. Or and H.L.W. Chan, “Enhanced Structural transformation and ferroelectric–paraelectric phase transition in Bi1−x Lax

FeO3 (x = 0 – 0.25) multiferroic ceramics,” Journal of Physics D: Applied Physics, Volume 40, 2007, pp 1196. 29. G. L. Yuan, S. W. Or, J. M. Liu and G. z. Liu, “Structural transformation and ferroelectromagneticbehaviour in single-phase

Bi1−xNdxFeO3multiferroic ceramics,” Applied Physics Letters, Volume 89, 2006, pp 052905: 1-3.

30. Z. M. Tian, S. L. Yuan, X. L. Wang, X. F. Zheng, S. Y. Yin, C. H. Wang and L. Liu, “Size effect on magnetic and ferroelectric properties in Bi2Fe4O9 multiferroic ceramics,” Journal of Applied Physics, Volume 106, 2009, pp 103912: 1-4.

21.

Authors: K. Phaninder Vinay, Basheer Ali Sheik, A. Trinadha Rao

Paper Title: Design and Analysis of Slot Antenna Parameters Using HFSS

Abstract: Micro strip slot antenna becomes very popular day by day because of its ease of analysis and fabrication,

low cost, light weight, easy to feed and their attractive radiation characteristics. Although slot antenna has numerous

advantages, it has also some drawbacks such as restricted bandwidth, and a potential decrease in radiation pattern.

Different techniques for bandwidth enhancement of conventional rectangular micro strip antenna are proposed in this

report. By increasing the height of slot, increasing the substrate thickness and decreasing the permittivity of substrate

the %bandwidth is increased. HFSS Software is used for the simulation and design calculation of micro strip slot

antenna. The return loss, VSWR curve, directivity and gain are to be analyzed and evaluated.

Keywords: Probe, Feed, Patch, Antenna, HFSS, Substrate, Coax, Bandwidth.

References: 1. C. A. Balanis, Antenna Theory: Analysis and Design, 3rd ed. New York, NY, USA: Wiley, 2005.

2. D. Pozar and D. Schaubert, “Scan blindness in infinite phased arrays of printed dipoles,” IEEE Trans. Antennas Propag., vol. AP-32, no. 6,pp. 602–610, Jun. 1984.

3. S. Zavosh, “Analysis of circular microstrip patch antennas backed by circular cavities,” Department of Electrical, Computer and Energy

Engineering, ASU, Tempe, AZ, USA, 1993. 4. D. Sievenpiper, “High-impedance electromagnetic surfaces,” Department of Electrical Engineering, UCLA, Los Angeles, CA, USA, 1999.

5. H. Boutayeb, T. Djerafi, and K. Wu, “Gain enhancement of a circularly polarizedmicrostrip patch antenna surrounded by a circular

mushroom- like substrate,” in Proc. EuMC, Sep. 2010, pp. 257–260. 6. H. Boutayeb, T. A. Denidni, K. Mahdjoubi, A.-C.Tarot, A.-R.Sebak, and L. Talbi, “Analysis and design of a cylindrical EBG-based directive

antenna,” IEEE Trans. Antennas Propag., vol. 54, no. 1, pp. 211–219, 2006.

7. J. Bell and M. Iskander, “Effective propagation properties of an enhanced hybrid EBG/ferrite ground plane,” IEEE Antennas Wireless Propag.Lett., vol. 7, pp. 74–77, 2008.

8. J. Bell and M. Iskander, “Equivalent circuit model of an ultrawideband hybrid EBG/ferrite structure,” IEEE Antennas Wireless Propag. Lett.,

vol. 7, pp. 573–576, 2008. 9. Y. Liu, C. G. Christodoulou, P. F.Wahid, andN. E. Buris, “Analysis of frequency selective surfaces with ferrite substrates,” in Proc. Antennas

Propagation Soc. Int. Symp., Jun. 1995, vol. 3, pp. 1640–1643.

10. L. Greetis and E. Rothwell, “A self-structuring patch antenna,” in Proc. IEEE Antennas Propag. Soc. Int. Symp., Jul. 2008, pp. 1–4. 11. C. A. Balanis, Advanced Engineering Electromagnetics, 2nd ed. New York, NY, USA: Wiley, 2012.

12. L. Yang, L. Martin, D. Staiculescu, C. P. Wong, and M. M. Tentzeris, “Comprehensive study on the impact of dielectric and magnetic loss

on performance of a novel flexible magnetic composite material,” in Proc. EuMC, Oct. 2008, pp. 131–134. 13. ANSYS HFSS. ver. 14.0.0, ANSYS, Canonsburg, PA, USA, 2011 [Online].

103-106

22.

Authors: Thayapraba M

Paper Title: Cost Effectiveness of Post - Tensioned and Reinforced Concrete Flat Slab Systems

Abstract: In a developing country like India the benefits of prestressing and particularly of Post-Tensioning are

yet to be recognized. The inherent hurdle is undoubtedly the higher initial investment that is required from the

clients. This has to be overlooked considering the significant benefits of Post-Tensioning and the high benefit-

aspect ratio that can be advantageously procured. In the present study an attempt is made to compare the cost

effectiveness of Post-Tensioned flat slab systems with respect to reinforced concrete flat slab system. Both the

systems were analysed using SAP and MS Excel program was developed based on the design methodology. The

107-109

Page 22: International Journal of Innovative Technology and ...Head (Research and Publication), SRM University, Gaziabad (U.P.), India Dr. Deepak Garg Professor, Department of Computer Science

results indicate that Post Tensioned flat slabs are cheaper than the RCC slab systems for all the spans considered in

the present study.

Keywords: Post Tensioning (PT), Post Tensioned Flat Slab, RCC Flat Slab.

References: 1. Bijan .O.A., and Jennifer D.J., 2003. “Guidelines for Design of Post-Tensioned Floors”, Concrete International. 2. Bijan.O. and Aalami., 2003. “Guidelines for the design of Post-tensioning floor systems” Concrete International 77-83.

3. Gilbert, S. G., Murray, T. K., Scott, R. H. and Cleland, D. J. 2000. “Equivalent frame analysis methods for gravity loads in flat slab

structures”. Journal of the American Concrete Institute, Structures Journal, 97(2),316-321. 4. IS: 1343- 1980. “Indian Standard Code of Practice for Prestressed Concrete”.

5. Lin ,T.Y., and Burns, N., 1981. “Design of Prestressed Concrete Structures”, John Wiley & Sons, New York.

6. Karve.S.R and Shah.V.L, “Limit State Theory and Design of Reinforced Concrete”. 7. Krishna Raju, N., 2007. “Prestressed Concrete”, Fourth Edition, Tata McGraw- Hill Company Ltd., New Delhi.

8. “Post-Tensioning Systems”, 4.90/1, VSL Report, VSL International Ltd., Berne, Switzerland. The various rates considered for the present

study is as follows: 9. Purushothaman, P., 1984. “Reinforced concret Structural elements”, Tata Mcgraw- hill, New Delhi.