International Journal of Innovative Technology and ...Head (Research and Publication), SRM...
Transcript of International Journal of Innovative Technology and ...Head (Research and Publication), SRM...
International Journal of Innovative
Technology and Exploring Engineering
ISSN : 2278 - 3075Website: www.ijitee.org
grin lo Ep nx gE id nn ea e riy ng golon
hce T e Iv nit tea rv no an tin oI nf o a l la Jnr uo
Exploring Innovation
www.ijitee.org
IjItEeIjItEe
EXPLORING INNOVA
TION
Volume-3 Issue-12, MAY 2014
Published by: Blue Eyes Intelligence Engineering and Sciences Publication Pvt. Ltd. Published by: Blue Eyes Intelligence Engineering and Sciences Publication Pvt. Ltd.
Editor In Chief
Dr. Shiv K Sahu
Ph.D. (CSE), M.Tech. (IT, Honors), B.Tech. (IT)
Director, Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd., Bhopal(M.P.), India
Dr. Shachi Sahu
Ph.D. (Chemistry), M.Sc. (Organic Chemistry)
Additional Director, Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd., Bhopal(M.P.), India
Vice Editor In Chief
Dr. Vahid Nourani
Professor, Faculty of Civil Engineering, University of Tabriz, Iran
Prof.(Dr.) Anuranjan Misra
Professor & Head, Computer Science & Engineering and Information Technology & Engineering, Noida International University,
Noida (U.P.), India
Chief Advisory Board
Prof. (Dr.) Hamid Saremi
Vice Chancellor of Islamic Azad University of Iran, Quchan Branch, Quchan-Iran
Dr. Uma Shanker
Professor & Head, Department of Mathematics, CEC, Bilaspur(C.G.), India
Dr. Rama Shanker
Professor & Head, Department of Statistics, Eritrea Institute of Technology, Asmara, Eritrea
Dr. Vinita Kumari
Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd., India
Dr. Kapil Kumar Bansal
Head (Research and Publication), SRM University, Gaziabad (U.P.), India
Dr. Deepak Garg
Professor, Department of Computer Science and Engineering, Thapar University, Patiala (Punjab), India, Senior Member of IEEE,
Secretary of IEEE Computer Society (Delhi Section), Life Member of Computer Society of India (CSI), Indian Society of Technical
Education (ISTE), Indian Science Congress Association Kolkata.
Dr. Vijay Anant Athavale
Director of SVS Group of Institutions, Mawana, Meerut (U.P.) India/ U.P. Technical University, India
Dr. T.C. Manjunath
Principal & Professor, HKBK College of Engg, Nagawara, Arabic College Road, Bengaluru-560045, Karnataka, India
Dr. Kosta Yogeshwar Prasad
Director, Technical Campus, Marwadi Education Foundation’s Group of Institutions, Rajkot-Morbi Highway, Gauridad, Rajkot,
Gujarat, India
Dr. Dinesh Varshney
Director of College Development Counceling, Devi Ahilya University, Indore (M.P.), Professor, School of Physics, Devi Ahilya
University, Indore (M.P.), and Regional Director, Madhya Pradesh Bhoj (Open) University, Indore (M.P.), India
Dr. P. Dananjayan
Professor, Department of Department of ECE, Pondicherry Engineering College, Pondicherry,India
Dr. Sadhana Vishwakarma
Associate Professor, Department of Engineering Chemistry, Technocrat Institute of Technology, Bhopal(M.P.), India
Dr. Kamal Mehta
Associate Professor, Deptment of Computer Engineering, Institute of Technology, NIRMA University, Ahmedabad (Gujarat), India
Dr. CheeFai Tan
Faculty of Mechanical Engineering, University Technical, Malaysia Melaka, Malaysia
Dr. Suresh Babu Perli
Professor & Head, Department of Electrical and Electronic Engineering, Narasaraopeta Engineering College, Guntur, A.P., India
Dr. Binod Kumar
Associate Professor, Schhool of Engineering and Computer Technology, Faculty of Integrative Sciences and Technology, Quest
International University, Ipoh, Perak, Malaysia
Dr. Chiladze George
Professor, Faculty of Law, Akhaltsikhe State University, Tbilisi University, Georgia
Dr. Kavita Khare
Professor, Department of Electronics & Communication Engineering, MANIT, Bhopal (M.P.), INDIA
Dr. C. Saravanan
Associate Professor (System Manager) & Head, Computer Center, NIT, Durgapur, W.B. India
Dr. S. Saravanan
Professor, Department of Electrical and Electronics Engineering, Muthayamal Engineering College, Resipuram, Tamilnadu, India
Dr. Amit Kumar Garg
Professor & Head, Department of Electronics and Communication Engineering, Maharishi Markandeshwar University, Mulllana,
Ambala (Haryana), India
Dr. T.C.Manjunath
Principal & Professor, HKBK College of Engg, Nagawara, Arabic College Road, Bengaluru-560045, Karnataka, India
Dr. P. Dananjayan
Professor, Department of Department of ECE, Pondicherry Engineering College, Pondicherry, India
Dr. Kamal K Mehta
Associate Professor, Department of Computer Engineering, Institute of Technology, NIRMA University, Ahmedabad (Gujarat), India
Dr. Rajiv Srivastava
Director, Department of Computer Science & Engineering, Sagar Institute of Research & Technology, Bhopal (M.P.), India
Dr. Chakunta Venkata Guru Rao
Professor, Department of Computer Science & Engineering, SR Engineering College, Ananthasagar, Warangal, Andhra Pradesh, India
Dr. Anuranjan Misra
Professor, Department of Computer Science & Engineering, Bhagwant Institute of Technology, NH-24, Jindal Nagar, Ghaziabad,
India
Dr. Robert Brian Smith
International Development Assistance Consultant, Department of AEC Consultants Pty Ltd, AEC Consultants Pty Ltd, Macquarie
Centre, North Ryde, New South Wales, Australia
Dr. Saber Mohamed Abd-Allah
Associate Professor, Department of Biochemistry, Shanghai Institute of Biochemistry and Cell Biology, Yue Yang Road, Shanghai,
China
Dr. Himani Sharma
Professor & Dean, Department of Electronics & Communication Engineering, MLR Institute of Technology, Laxman Reddy Avenue,
Dundigal, Hyderabad, India
Dr. Sahab Singh
Associate Professor, Department of Management Studies, Dronacharya Group of Institutions, Knowledge Park-III, Greater Noida,
India
Dr. Umesh Kumar
Principal: Govt Women Poly, Ranchi, India
Dr. Syed Zaheer Hasan
Scientist-G Petroleum Research Wing, Gujarat Energy Research and Management Institute, Energy Building, Pandit Deendayal
Petroleum University Campus, Raisan, Gandhinagar-382007, Gujarat, India.
Dr. Jaswant Singh Bhomrah
Director, Department of Profit Oriented Technique, 1 – B Crystal Gold, Vijalpore Road, Navsari 396445, Gujarat. India
Technical Advisory Board
Dr. Mohd. Husain
Director MG Institute of Management & Technology, Banthara, Lucknow (U.P.), India
Dr. T. Jayanthy
Principal, Panimalar Institute of Technology, Chennai (TN), India
Dr. Umesh A.S.
Director, Technocrats Institute of Technology & Science, Bhopal(M.P.), India
Dr. B. Kanagasabapathi
Infosys Labs, Infosys Limited, Center for Advance Modeling and Simulation, Infosys Labs, Infosys Limited, Electronics City,
Bangalore, India
Dr. C.B. Gupta
Professor, Department of Mathematics, Birla Institute of Technology & Sciences, Pilani (Rajasthan), India
Dr. Sunandan Bhunia
Associate Professor & Head,, Dept. of Electronics & Communication Engineering, Haldia Institute of Technology, Haldia, West
Bengal, India
Dr. Jaydeb Bhaumik
Associate Professor, Dept. of Electronics & Communication Engineering, Haldia Institute of Technology, Haldia, West Bengal, India
Dr. Rajesh Das
Associate Professor, School of Applied Sciences, Haldia Institute of Technology, Haldia, West Bengal, India
Dr. Mrutyunjaya Panda
Professor & Head, Department of EEE, Gandhi Institute for Technological Development, Bhubaneswar, Odisha, India
Dr. Mohd. Nazri Ismail
Associate Professor, Department of System and Networking, University of Kuala (UniKL), Kuala Lumpur, Malaysia
Dr. Haw Su Cheng
Faculty of Information Technology, Multimedia University (MMU), Jalan Multimedia, 63100 Cyberjaya
Dr. Hossein Rajabalipour Cheshmehgaz
Industrial Modeling and Computing Department, Faculty of Computer Science and Information Systems, Universiti Teknologi
Malaysia (UTM) 81310, Skudai, Malaysia
Dr. Sudhinder Singh Chowhan
Associate Professor, Institute of Management and Computer Science, NIMS University, Jaipur (Rajasthan), India
Dr. Neeta Sharma
Professor & Head, Department of Communication Skils, Technocrat Institute of Technology, Bhopal(M.P.), India
Dr. Ashish Rastogi
Associate Professor, Department of CSIT, Guru Ghansi Das University, Bilaspur (C.G.), India
Dr. Santosh Kumar Nanda
Professor, Department of Computer Science and Engineering, Eastern Academy of Science and Technology (EAST), Khurda (Orisa),
India
Dr. Hai Shanker Hota
Associate Professor, Department of CSIT, Guru Ghansi Das University, Bilaspur (C.G.), India
Dr. Sunil Kumar Singla
Professor, Department of Electrical and Instrumentation Engineering, Thapar University, Patiala (Punjab), India
Dr. A. K. Verma
Professor, Department of Computer Science and Engineering, Thapar University, Patiala (Punjab), India
Dr. Durgesh Mishra
Chairman, IEEE Computer Society Chapter Bombay Section, Chairman IEEE MP Subsection, Professor & Dean (R&D), Acropolis
Institute of Technology, Indore (M.P.), India
Dr. Xiaoguang Yue
Associate Professor, College of Computer and Information, Southwest Forestry University, Kunming (Yunnan), China
Dr. Veronica Mc Gowan
Associate Professor, Department of Computer and Business Information Systems,Delaware Valley College, Doylestown, PA, Allman
China
Dr. Mohd. Ali Hussain
Professor, Department of Computer Science and Engineering, Sri Sai Madhavi Institute of Science & Technology, Rajahmundry
(A.P.), India
Dr. Mohd. Nazri Ismail
Professor, System and Networking Department, Jalan Sultan Ismail, Kaula Lumpur, MALAYSIA
Dr. Sunil Mishra
Associate Professor, Department of Communication Skills (English), Dronacharya College of Engineering, Farrukhnagar, Gurgaon
(Haryana), India
Dr. Labib Francis Gergis Rofaiel
Associate Professor, Department of Digital Communications and Electronics, Misr Academy for Engineering and Technology,
Mansoura City, Egypt
Dr. Pavol Tanuska
Associate Professor, Department of Applied Informetics, Automation, and Mathematics, Trnava, Slovakia
Dr. VS Giridhar Akula
Professor, Avanthi's Research & Technological Academy, Gunthapally, Hyderabad, Andhra Pradesh, India
Dr. S. Satyanarayana
Associate Professor, Department of Computer Science and Engineering, KL University, Guntur, Andhra Pradesh, India
Dr. Bhupendra Kumar Sharma
Associate Professor, Department of Mathematics, KL University, BITS, Pilani, India
Dr. Praveen Agarwal
Associate Professor & Head, Department of Mathematics, Anand International College of Engineering, Jaipur (Rajasthan), India
Dr. Manoj Kumar
Professor, Department of Mathematics, Rashtriya Kishan Post Graduate Degree, College, Shamli, Prabudh Nagar, (U.P.), India
Dr. Shaikh Abdul Hannan
Associate Professor, Department of Computer Science, Vivekanand Arts Sardar Dalipsing Arts and Science College, Aurangabad
(Maharashtra), India
Dr. K.M. Pandey
Professor, Department of Mechanical Engineering,National Institute of Technology, Silchar, India
Prof. Pranav Parashar
Technical Advisor, International Journal of Soft Computing and Engineering (IJSCE), Bhopal (M.P.), India
Dr. Biswajit Chakraborty
MECON Limited, Research and Development Division (A Govt. of India Enterprise), Ranchi-834002, Jharkhand, India
Dr. D.V. Ashoka
Professor & Head, Department of Information Science & Engineering, SJB Institute of Technology, Kengeri, Bangalore, India
Dr. Sasidhar Babu Suvanam
Professor & Academic Cordinator, Department of Computer Science & Engineering, Sree Narayana Gurukulam College of
Engineering, Kadayiuruppu, Kolenchery, Kerala, India
Dr. C. Venkatesh
Professor & Dean, Faculty of Engineering, EBET Group of Institutions, Kangayam, Erode, Caimbatore (Tamil Nadu), India
Dr. Nilay Khare
Assoc. Professor & Head, Department of Computer Science, MANIT, Bhopal (M.P.), India
Dr. Sandra De Iaco
Professor, Dip.to Di Scienze Dell’Economia-Sez. Matematico-Statistica, Italy
Dr. Yaduvir Singh
Associate Professor, Department of Computer Science & Engineering, Ideal Institute of Technology, Govindpuram Ghaziabad,
Lucknow (U.P.), India
Dr. Angela Amphawan
Head of Optical Technology, School of Computing, School Of Computing, Universiti Utara Malaysia, 06010 Sintok, Kedah, Malaysia
Dr. Ashwini Kumar Arya
Associate Professor, Department of Electronics & Communication Engineering, Faculty of Engineering and Technology,Graphic Era
University, Dehradun (U.K.), India
Dr. Yash Pal Singh
Professor, Department of Electronics & Communication Engg, Director, KLS Institute Of Engg.& Technology, Director, KLSIET,
Chandok, Bijnor, (U.P.), India
Dr. Ashish Jain
Associate Professor, Department of Computer Science & Engineering, Accurate Institute of Management & Technology, Gr. Noida
(U.P.), India
Dr. Abhay Saxena
Associate Professor & Head, Department of Computer Science, Dev Sanskriti University, Haridwar, Uttrakhand, India
Dr. Judy. M.V
Associate Professor, Head of the Department CS &IT, Amrita School of Arts and Sciences, Amrita Vishwa Vidyapeetham,
Brahmasthanam, Edapally, Cochin, Kerala, India
Dr. Sangkyun Kim
Professor, Department of Industrial Engineering, Kangwon National University, Hyoja 2 dong, Chunche0nsi, Gangwondo, Korea
Dr. Sanjay M. Gulhane
Professor, Department of Electronics & Telecommunication Engineering, Jawaharlal Darda Institute of Engineering & Technology,
Yavatmal, Maharastra, India
Dr. K.K. Thyagharajan
Principal & Professor, Department of Informational Technology, RMK College of Engineering & Technology, RSM Nagar,
Thiruyallur, Tamil Nadu, India
Dr. P. Subashini
Assoc. Professor, Department of Computer Science, Coimbatore, India
Dr. G. Srinivasrao
Professor, Department of Mechanical Engineering, RVR & JC, College of Engineering, Chowdavaram, Guntur, India
Dr. Rajesh Verma
Professor, Department of Computer Science & Engg. and Deptt. of Information Technology, Kurukshetra Institute of Technology &
Management, Bhor Sadian, Pehowa, Kurukshetra (Haryana), India
Dr. Pawan Kumar Shukla
Associate Professor, Satya College of Engineering & Technology, Haryana, India
Dr. U C Srivastava
Associate Professor, Department of Applied Physics, Amity Institute of Applied Sciences, Amity University, Noida, India
Dr. Reena Dadhich
Prof. & Head, Department of Computer Science and Informatics, MBS MArg, Near Kabir Circle, University of Kota, Rajasthan, India
Dr. Aashis. S. Roy
Department of Materials Engineering, Indian Institute of Science, Bangalore Karnataka, India
Dr. Sudhir Nigam
Professor Department of Civil Engineering, Principal, Lakshmi Narain College of Technology and Science, Raisen, Road, Bhopal,
(M.P.), India
Dr. S. Senthil Kumar
Doctorate, Department of Center for Advanced Image and Information Technology, Division of Computer Science and Engineering,
Graduate School of Electronics and Information Engineering, Chon Buk National University Deok Jin-Dong, Jeonju, Chon Buk, 561-
756, South Korea Tamilnadu, India
Dr. Gufran Ahmad Ansari
Associate Professor, Department of Information Technology, College of Computer, Qassim University, Al-Qassim, Kingdom of
Saudi Arabia (KSA)
Dr. R. Navaneetha krishnan
Associate Professor, Department of MCA, Bharathiyar College of Engg & Tech, Karaikal Puducherry, India
Dr. Hossein Rajabalipour Cheshmejgaz
Industrial Modeling and Computing Department, Faculty of Computer Science and Information Systems, Universiti Teknologi Skudai,
Malaysia
Dr. Veronica McGowan
Associate Professor, Department of Computer and Business Information Systems, Delaware Valley College, Doylestown, PA, Allman
China
Dr. Sanjay Sharma
Associate Professor, Department of Mathematics, Bhilai Institute of Technology, Durg, Chhattisgarh, India
Dr. Taghreed Hashim Al-Noor
Professor, Department of Chemistry, Ibn-Al-Haitham Education for pure Science College, University of Baghdad, Iraq
Dr. Madhumita Dash
Professor, Department of Electronics & Telecommunication, Orissa Engineering College , Bhubaneswar,Odisha, India
Dr. Anita Sagadevan Ethiraj
Associate Professor, Department of Centre for Nanotechnology Research (CNR), School of Electronics Engineering (Sense), Vellore
Institute of Technology (VIT) University, Tamilnadu, India
Dr. Sibasis Acharya
Project Consultant, Department of Metallurgy & Mineral Processing, Midas Tech International, 30 Mukin Street, Jindalee-4074,
Queensland, Australia
Dr. Neelam Ruhil
Professor, Department of Electronics & Computer Engineering, Dronacharya College of Engineering, Gurgaon, Haryana, India
Dr. Faizullah Mahar
Professor, Department of Electrical Engineering, Balochistan University of Engineering and Technology, Pakistan
Dr. K. Selvaraju
Head, PG & Research, Department of Physics, Kandaswami Kandars College (Govt. Aided), Velur (PO), Namakkal DT. Tamil Nadu,
India
Dr. M. K. Bhanarkar
Associate Professor, Department of Electronics, Shivaji University, Kolhapur, Maharashtra, India
Dr. Sanjay Hari Sawant
Professor, Department of Mechanical Engineering, Dr. J. J. Magdum College of Engineering, Jaysingpur, India
Dr. Arindam Ghosal
Professor, Department of Mechanical Engineering, Dronacharya Group of Institutions, B-27, Part-III, Knowledge Park,Greater Noida,
India
Dr. M. Chithirai Pon Selvan
Associate Professor, Department of Mechanical Engineering, School of Engineering & Information Technology Manipal University,
Dubai, UAE
Dr. S. Sambhu Prasad
Professor & Principal, Department of Mechanical Engineering, Pragati College of Engineering, Andhra Pradesh, India.
Dr. Muhammad Attique Khan Shahid
Professor of Physics & Chairman, Department of Physics, Advisor (SAAP) at Government Post Graduate College of Science,
Faisalabad.
Dr. Kuldeep Pareta
Professor & Head, Department of Remote Sensing/GIS & NRM, B-30 Kailash Colony, New Delhi 110 048, India
Dr. Th. Kiranbala Devi
Associate Professor, Department of Civil Engineering, Manipur Institute of Technology, Takyelpat, Imphal, Manipur, India
Dr. Nirmala Mungamuru
Associate Professor, Department of Computing, School of Engineering, Adama Science and Technology University, Ethiopia
Dr. Srilalitha Girija Kumari Sagi
Associate Professor, Department of Management, Gandhi Institute of Technology and Management, India
Dr. Vishnu Narayan Mishra
Associate Professor, Department of Mathematics, Sardar Vallabhbhai National Institute of Technology, Ichchhanath Mahadev Dumas
Road, Surat (Gujarat), India
Dr. Yash Pal Singh
Director/Principal, Somany (P.G.) Institute of Technology & Management, Garhi Bolni Road , Rewari Haryana, India.
Dr. Sripada Rama Sree
Vice Principal, Associate Professor, Department of Computer Science and Engineering, Aditya Engineering College, Surampalem,
Andhra Pradesh. India.
Dr. Rustom Mamlook
Associate Professor, Department of Electrical and Computer Engineering, Dhofar University, Salalah, Oman. Middle East.
Managing Editor
Mr. Jitendra Kumar Sen
International Journal of Innovative Technology and Exploring Engineering (IJITEE)
Editorial Board
Dr. Saeed Balochian
Associate Professor, Gonaabad Branch, Islamic Azad University, Gonabad, Iratan
Dr. Mongey Ram
Associate Professor, Department of Mathematics, Graphics Era University, Dehradun, India
Dr. Arupratan Santra
Sr. Project Manager, Infosys Technologies Ltd, Hyderabad (A.P.)-500005, India
Dr. Ashish Jolly
Dean, Department of Computer Applications, Guru Nanak Khalsa Institute & Management Studies, Yamuna Nagar (Haryana), India
Dr. Israel Gonzalez Carrasco
Associate Professor, Department of Computer Science, Universidad Carlos III de Madrid, Leganes, Madrid, Spain
Dr. Guoxiang Liu
Member of IEEE, University of North Dakota, Grand Froks, N.D., USA
Dr. Khushali Menaria
Associate Professor, Department of Bio-Informatics, Maulana Azad National Institute of Technology (MANIT), Bhopal (M.P.), India
Dr. R. Sukumar
Professor, Sethu Institute of Technology, Pulloor, Kariapatti, Virudhunagar, Tamilnadu, India
Dr. Cherouat Abel
Professor, University of Technology of Troyes, France
Dr. Rinkle Aggrawal
Associate Professor, Department of Computer Science and Engineering, Thapar University, Patiala (Punjab), India
Dr. Parteek Bhatia
Associate Professor, Deprtment of Computer Science & Engineering, Thapar University, Patiala (Punjab), India
Dr. Manish Srivastava
Professor & Head, Computer Science and Engineering, Guru Ghasidas Central University, Bilaspur (C.G.), India
Dr. B. P. Ladgaonkar
Assoc. Professor&Head, Department of Electronics, Shankarrao Mohite Mahavidyalaya, Akluj, Maharashtra, India
Dr. E. Mohan
Professor & Head, Department of Computer Science and Engineering, Pallavan College of Engineering, Kanchipuram, Tamilnadu,
India
Dr. M. Shanmuga Ptriya
Assoc. Professor, Department of Biotechnology, MVJ College of Engineering, Bangalore Karnataka, India
Dr. Leena Jain
Assoc. Professor & Head, Dept. of Computer Applications, Global Institute of Management & Emerging Technologies, Amritsar,
India
Dr. S.S.S.V Gopala Raju
Professor, Department of Civil Engineering, GITAM School of Technology, GITAM, University, Hyderabad, Andhra Pradesh, India
Dr. Ani Grubisic
Department of Computer Science, Teslina 12, 21000 split, Croatia
Dr. Ashish Paul
Associate Professor, Department of Basic Sciences (Mathematics), Assam Don Bosco University, Guwahati, India
Dr. Sivakumar Durairaj
Professor, Department of Civil Engineering, Vel Tech High Tech Dr.Rangarajan Dr.Sakunthala Engineering College, Avadi, Chennai
Tamil Nadu, India
Dr. Rashmi Nigam
Associate Professor, Department of Applied Mathematics, UTI, RGPV, Airport Road, Bhopal, (M.P.), India
Dr. Mu-Song Chen
Associate Professor, Department of Electrical Engineering, Da-Yeh University, Rd., Dacun, Changhua 51591, Taiwan R.O.C.,
Taiwan, Republic of China
Dr. Ramesh S
Associate Professor, Department of Electronics & Communication Engineering, Dr. Ambedkar Institute of Technology, Bangalore,
India
Dr. Nor Hayati Abdul Hamid
Associate Professor, Department of Civil Engineering, Universiti Teknologi Mara, Selangor, Malaysia
Dr. C.Nagarajan
Professor & Head, Department of Electrical & Electronic Engineering Muthayammal Engineering College,Rasipuram,Tamilnadu,
India
Dr. Ilaria Cacciotti
Department of Industrial Engineering, University of Rome Tor Vergata Via del Politecnico Rome-Italy
Dr. V.Balaji
Principal Cum Professor, Department of EEE &E&I, Lord Ayyappa Institute of Engg & Tech,Uthukadu, Walajabad, Kanchipuram,
Tamil Nadu, India
Dr. G. Anjan Babu
Assoc. Professor, Department of Computer Science, S V University, Tirupati, Andhra Pradesh, India
Dr. Damodar Reddy Edla
Assoc. Professor, Department of Computer Science & Engineering, National Institute of Technology, Goa, India
Dr. D.Arumuga Perumal
Professor, Department of Mechanical Engg, Noorul Islam University, Kanyakumari (Dist), Tamilnadu, India
Dr. Roshdy A. AbdelRassoul
Professor, Department of Electronics and Communications Engineering, Arab Academy for Science and Technology, Electronics and
Communications Engineering Dept., POBox 1029, Abu-Qir, Alexandria, Egypt
Dr. Aniruddha Bhattacharya
Assoc. Professor & Head, Department of Computer Science & Engineering, Amrita School of Engineering, Bangalore, India
Dr. P Venkateswara Rao
Professor, Department of Mechanical Engineering, KITS, Warangal, Andhra Pradesh, India
Dr. V.Mahalakshmi M.L
Assoc. Professor & Head, Institute of Management Studies, Chennai CID Quarters, V.K.Iyer Road, Mandaveli, Chennai
S.
No
Volume-3 Issue-12, May 2014, ISSN: 2278-3075 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd.
Page
No.
1.
Authors: Stalin Babu G, Santosh Raju D
Paper Title: Routing Protocols in Wireless Sensor Networks A Survey
Abstract: Wireless Sensor Networks (WSN) contains hundreds or thousands of sensor nodes with great capabilities
like sensing, computation, wireless communications and these sensors have the ability to communicate either among
each other or directly to an external Base Station. These Sensor nodes will collect information and also plays an
important role of a Router by communicating through wireless channels. WSN ismainly intended for gathering and
sensing information in remote locations (required). Design Goal of WSN is to 1) Transmit data 2) Increase Network
Life Time by employing Energy Efficient Routing Protocols. Wireless networks are constrained by energy, storage
capacity, and power. To increase the lifetime of networks, It is must to consider energy awareness. If we analyze
routing protocols, these are in charge of discovering and maintaining the routes in the network. However, the
appropriateness of a particular routing protocol mainly depends on the capabilities of the sensor nodes and on the
application requirements. This paper presents a review of the main routing protocols proposed for wireless sensor
networks.
Keywords: wireless Sensor networks, classification of routing protocols, Routing protocols.
References: 1. I.F. Akyildiz, S. Weilian, Y. Sankarasubramaniam, E. Cayirci, A survey on sensor networks, IEEE Communications Magazine 40 (8) (2002)
102–114.
2. S. Misra et al. (eds.), Guide to Wireless Sensor Networks, Computer Communications and Networks, DOI: 10.1007/978-1-84882-218-4 4, Springer-Verlag London Limited 2009.
3. W. Heinzelman, A. Chandrakasan, H. Balakrishnan, Energy-efficient communication protocol for wireless sensor networks, in: Proceeding
of the Hawaii International Conference System Sciences, Hawaii, January 2000. 4. Rafe Alasem, Ahmed Reda and Mahmud Mansour ”Location based energy efficient reliable routing protocol for wireless sensor network
“World Scientific and Engineering Academy ANDC Society(WSEAS) Stevens Point, Wisconsin, USA,2011.
5. K. Sohrabi, J. Gao, V. Ailawadhi and G. Pottie, “Protocols for Self- Organization of a Wireless Sensor Network, ” IEEE Personal Communi- cations, pp. 16-27, October 2000
6. J. Luo, and J.- P. Hubaux, "Joint mobility and routing for lifetime elongation in wireless sensor networks", Proceedings IEEE INFOCOM'05,
vol. 3, Miami, FL, Mar. 2005, pp. 1735- 1746.
7. Ganesan, D.; Govindan, R.; Shenker, S.; Estrin, D. Highly-Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks.
Mobile Comput. Commun. Rev.2001
8. M. Chu, H. Haussecker, and F. Zhao: Scalable Information-Driven Sensor Querying and Routing for ad hoc Heterogeneous Sensor Networks, The International Journal of High Performance Computing Applications, Vol. 16, No. 3 ( August 2002).
1-3
2.
Authors: Sangeeta Bansal, Ajay Rana
Paper Title: Analysis of Various Algorithms to Solve Vertex Cover Problem
Abstract: The vertex cover (VC) problem belongs to the class of Non Deterministic Polynomial time complete
(NPC) graph theoretical problems, which plays a central role in theoretical computer science and it has a numerous
real life applications. Since the problem is Non Deterministic Polynomial time complete (NPC) it is unlikely to find a
polynomial-time algorithm for solving vertex-cover problem exactly. This paper analyses the various algorithms to
find minimum vertex cover for standard classes of random graph. The performance of all algorithms is compared
with the complexity and the output solution that of the approximation algorithm, clever greedy algorithm, branch-
and-bound algorithm, and simple genetic algorithm (GA).
Keywords: Minimum vertex cover, Branch and bound, greedy algorithm, genetic algorithm, crossover, mutation.
References: 1. T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein. Introduction to Algorithms. McGraw-Hill, New York, 2nd edition, 2001.
2. Dorit S.Hochbaum. Approximation Algorithms for NP-hard problems. 2002.
3. X. Huang, J. Lai, and S. F. Jennings. Maximum common subgraph: Some upper bound and lower bound results. BMC Bioinformatics, 7(Suppl 4):S6, 2006, pp.80-94.
4. M.Pelikan. Hierarchical Bayesian optimization algorithm: Toward a new generation of evolutionary algorithms. Springer-Verlag, 2005,
pp.102-160. 5. Alexandra K Hartmann and Martin Weigt. Statistical mechanics of the vertex-cover problem, j.phys. A; Math. Gen. 36(2003) 11069-11093.
6. K.Clarkson. A modification to the greedy algorithm for the vertex cover problem, IPL, vol 16:23-25,(1983).
7. R. Arakaki, and L. Lorena. A Constructive Genetic Algorithm for the Maximal Covering Location Problem, in Proceedings of Metaheuristics International Conference, 2001, pp 13-17.
8. Ketan Kotecha and Nilesh Gambhava. A hybrid genetic algorithm for Minimum Vertex-cover Problem, vol 2: pp 16-20.
4-6
3.
Authors: Vahid Rahmati, Morteza Husainy Yar, Ali Reza Malekijavan
Paper Title: Neural Networks New Capacity Factor Measurement for Improvement of SOM
Abstract: the artificial neural networks have an important role in current life with higher expectations. The art of
using these ANNs give us a good insight for problem solving. For example the applications in pattern recognition
and regression are two areas in which ANNs are working well. Signal processing itself investigates broad ranges of
ANNs. The purpose of this paper is, scanning connection routes of one and two layer networks that may be used as
default structure in data replacing and signal analyzing. When a signal is considered as a variable by a problem
solver, the problem solver chooses the best possible ANNs to solve it. But the way we ensure the high possibilities of
reliability for these types of networks, while the compatibility is still needed is important. We present several factors
to measure the capability of a specific network, for a specific problem the one like E-machine learning. Formal
7-9
proofs for claim are provided as well. Finally we try to optimize Kohonen SOM using factor C’.
Keywords: Artificial neural networks, Kohonen SOM, Machine learning, ANN connection route
References: 1. Christopher M. Bishop (Jan 18, 1996), Neural Networks for Pattern Recognition
2. Simon O. Haykin (Nov 28, 2008), Neural Networks and Learning Machines 3. Sandhya Samarasinghe (Sep 12, 2006), Neural Networks for Applied Sciences and Engineering: From Fundamentals to Complex Pattern
Recognition
4. Ke-Lin Du and M. N. S. Swamy (Dec 27, 2013), Neural Networks and Statistical Learning 5. Jeff Heaton (Oct 2, 2008), Introduction to Neural Networks for C#
6. Laurene V. Fausett (Dec 19, 1993), Fundamentals of Neural Networks: Architectures, Algorithms And Applications 7. Jeff Heaton (Oct 1, 2008), Introduction to Neural Networks for Java
8. Kevin Gurney (Aug 7, 1997), An Introduction to Neural Networks
9. Olaf Sporns (Oct 1, 2010), Networks of the Brain 10. Kohonen, T. ; Neural Networks Res. Centre, Helsinki Univ. of Technol., Espoo, Finland ; Oja, E. ; Simula, O. ; Visa, A.more authors,
Engineering applications of the self-organizing map
11. SangHak Lee ; Ubiquitous Comput. Res. Center, Korea Electron. Technol. Inst., South Korea ; JuneJae Yoo ; TaeChoong Chung, Distance-based energy efficient clustering for wireless sensor networks
12. Jari Kangas,Teuvo Kohonen,Developments and applications of the self-organizing map and related algorithms
4.
Authors: Vivek Yadav, M. Pushpalatha
Paper Title: A Framework to Increase the Lifetime of a Sensor Network by Dynamic Cluster Head Selection and
Re-Clustering
Abstract: In spatial correlated sensor networks, nearby sensor nodes show a high degree of similarity in their
readings. Keeping this in mind, the monitored region is divided into clusters and one cluster head is assigned to a
cluster which does the sensing work while other nodes are in sleep state. This results in considerable energy savings
as only one cluster head representing other nodes in the cluster does the sensing and transmitting work. In this paper,
a framework is proposed to add functionality to existing networks so as to increase the networks lifetime and also aid
in better tracking of unusual phenomena such as forest fires. Increasing the lifetime has been done by the use of
dynamic multiple cluster heads and tracking of unusual phenomena has been done on the basis of outlier detection.
Keywords: Lifetime Optimization, Spatial Correlation, Dynamic Cluster Head Selection.
References: 1. S. Lindsey and C.S. Raghavendra, "PEGASIS: Power Efficient Gathering in Sensor Information Systems," Proc. IEEE Aerospace Conf., pp.
1125-1130, 2002. 2. S. Yoon and C. Shahabi. “Exploiting spatial correlation towards an energy efficient clustered aggregation technique (CAG),” IEEE
International Conference on Communications, pages 3307-3313, May 2005.
3. Chih-Chieh Hung, Wen-Chih Peng, Wang-Chien Lee, “Energy-Aware Set-Covering Approaches for Approximate Data Collection in Wireless Sensor Networks,” IEEE Trans. Knowl. Data Eng, vol 24, no 11, 2012.
4. Yajie Ma, Yike Guo, Xiangchuan Tian, and Moustafa Ghanem, “Distributed Clustering-Based Aggregation algorithm for Spatial correlated
Sensor networks”, IEEE Sensors Journal, Vol. 11, no. 3, pp 641-648, March 2011. 5. Ashanie Guanathillake, Kithsiri Samarasinghe, “Energy Efficient Clustering Algorithm with Global & Local Re-clustering for Wireless
Sensor Networks”, International Journal of Communication Science and Engineering Vol. 7, No. 7, pp. 45-52, 2013.
6. Wendi Rabiner Heinzelman, Anantha Chandrakasan, Hari Balakrishnan, “Energy Efficient Communication Protocol for Wireless Microsensor Networks”, Proceedings of the 33rd Hawaii International Conference on System Sciences, IEEE, pp.1-10, 2000.
7. Shakya, R.K. Singh, Y.N. ; Verma, N.K. “Generic correlation model for wireless sensor network applications” Wireless Sensor Systems, IET
,Vol 3 Issue: 4, pp. 266 – 276, ISSN: 2043-6386, Dec 2013 8. Guangzhou, China; Yiju Zhan ; Yonghua Wang “Data Density Correlation Degree Clustering Method for Data Aggregation in WSN,”
Sensors Journal, IEEE, Vol 14 Issue, pp. 1089-1098, ISSN: 1530-437X, April 2014.
9. Ghalib A., Shah, Muslim Bozyigit “Exploiting Energy aware Spatial Correlation in Wireless Sensor Networks,” 2nd International Workshop
on software for Sensor Networks (Sensor Wave 2007), 2007.
10. http://en.wikipedia.org/wiki/Wireless_sensor_network accessed on 6.8.2013.
11. C. Hua and T.-S. Yum, “Optimal routing and data aggregation for maximizing lifetime of wireless sensor networks,” IEEE/ACM Trans. Netw. , vol. 16, no. 4, pp. 892–903, Aug. 2008
12. D. Chu, A. Deshpande, J.M. Hellerstein, and W. Hong, “Approximate Data Collection in Sensor Networks Using Probabilistic Models,”
Proc. 22nd Int’l Conf. Data Eng. (ICDE), pp. 48-59, 2006 13. O. Younis and S. Fahmy, “HEED: A Hybrid Energy-Efficient Distributed Clustering for Adhoc Sensor Networks,” Proc. IEEE INFOCOM,
2004
14. http://www.mathwords.com/o/outlier.htm accessed on 10.2.2014
10-14
5.
Authors: Shikha Dogra, Sahil
Paper Title: Cloud Computing and its Security Concerns A Survey
Abstract: Cloud Computing is evolving into the most desirous computing technology especially because of its low
cost & resource independence but also incurs some of the most threatening concerns to the future of this technology
i.e. its security. This paper presents a brief introduction to Cloud Computing with a comprehensive review of the
most discussed security concerns to Cloud Systems.
Keywords: Grid Computing, Distributed Computing, Parallel Computing, Virtualization, Utility Computing, Image
optimization, Image portability, Fault tolerance, Multitenancy, Virtual Appliance, OS Kernel, Cloud migration,
DDoS, Virus, Data location, Data Recovery, Data Control, Data privacy, Data Availability, Data Transmission, Data
Security, Data Reminisce, Data Disposal, Virtual Servers, Virtual Networks, Hypervisors, APIs, VM Portability,
Uptime.
References: 1. , Peter, and Tim Grance. "The NIST definition of cloud computing." National Institute of Standards and Technology 53, no. 6 (2009): 50.
15-18
2. Liu, Wentao. "Research on cloud computing security problem and strategy." In Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on, pp. 1216-1219. IEEE, 2012.
3. Lin, Guoman. "Research on electronic data security strategy based on cloud computing." In Consumer Electronics, Communications and
Networks (CECNet), 2012 2nd International Conference on, pp. 1228-1231. IEEE, 2012. 4. Jamil, Danish, and Hassan Zaki. "CLOUD COMPUTING SECURITY." International Journal of Engineering Science & Technology 3, no.
4 (2011).
5. Panneerselvam, John, Lu Liu, Richard Hill, Yongzhao Zhan, and Weining Liu. "An investigation of the effect of cloud computing on network management." In High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded
Software and Systems (HPCC-ICESS), 2012 IEEE 14th International Conference on, pp. 1794-1799. IEEE, 2012.
6. Reese, George. Cloud application architectures: building applications and infrastructure in the cloud. " O'Reilly Media, Inc.", 2009. 7. Buyya, Rajkumar, Chee Shin Yeo, Srikumar Venugopal, James Broberg, and Ivona Brandic. "Cloud computing and emerging IT platforms:
Vision, hype, and reality for delivering computing as the 5th utility." Future Generation computer systems 25, no. 6 (2009): 599-616.
8. Gartner, “Gartner Says Cloud Computing Will Become the Bulk of New IT Spend by 2016,” [Online]. 2013.Available: http://www.gartner.com/newsroom/id/2613015
9. A Vouk, Mladen. "Cloud computing–issues, research and implementations." CIT. Journal of Computing and Information Technology 16,
no. 4 (2008): 235-246.. 10. Bala, Anju, and Inderveer Chana. "Fault Tolerance-Challenges, Techniques and Implementation in Cloud Computing." International
Journal of Computer Science Issues (IJCSI) 9, no. 1 (2012).
11. Schubert, Lutz, and Keith Jeffery. "Advances in clouds." Report of the Cloud Computing Expert Working Group. European Commission (2012).
12. Arora, Pankaj, Rubal Chaudhry Wadhawan, and Er Satinder Pal Ahuja. "Cloud computing security issues in infrastructure as a service."
International Journal of Advanced Research in Computer Science and Software Engineering 2, no. 1 (2012).
13. Gens, Frank. “Problems facing during Cloud Computing Platform Construction.” [Online]. December 2009. Available:
http://blogs.idc.com/ie/?p=730
14. Wanyun, L. “Cloud computing: Enterprise information construction strategy and practice.” in Tsinghua University Press, 20 I 0 (In Chinese).
15. Yuel, He, and Che Mingl. "Cloud Computing Security Infrastructure Based on the Isolation Concept."
16. Zhijun, Wang, and Zhang Ni. "A Survey on Cloud Computing Security." 17. Mell, P., and T. Grance. "The NIST Definition of Cloud Computing, Version 15, National Institute of Standards and Technology, October
7, 2009." (2009).
18. Jain, Pritesh, Dheeraj Rane, and Shyam Patidar. "A survey and analysis of cloud model-based security for computing secure cloud bursting and aggregation in renal environment." In Information and Communication Technologies (WICT), 2011 World Congress on, pp. 456-461.
IEEE, 2011.
19. Gowrigolla, Bhagyaraj, Sathyalakshmi Sivaji, and M. Roberts Masillamani. "Design and auditing of cloud computing security." In Information and Automation for Sustainability (ICIAFs), 2010 5th International Conference on, pp. 292-297. IEEE, 2010.
20. Tripathi, Alok, and Abhinav Mishra. "Cloud computing security considerations." In Signal Processing, Communications and Computing
(ICSPCC), 2011 IEEE International Conference on, pp. 1-5. IEEE, 2011. 21. Lv, Haoyong, and Yin Hu. "Analysis and research about cloud computing security protect policy." In Intelligence Science and Information
Engineering (ISIE), 2011 International Conference on, pp. 214-216. IEEE, 2011.
22. “A Survey on Cloud Computing Security, Challenges and Threats| Whitepapers | TechRepublic.”[Online].Available:
http://www.techrepublic.com/whitepapers/a-survey-on-cloudcomputing-security-challenges-and-threats/3483757
23. Archer, Jerry, Alan Boehme, Dave Cullinane, Paul Kurtz, Nils Puhlmann, and Jim Reavis. "Top threats to cloud computing v1. 0." Cloud Security Alliance (2010).
24. Gonzalez, Nelson, Charles Miers, Fernando Redígolo, Marcos Simplício, Tereza Carvalho, Mats Näslund, and Makan Pourzandi. "A
quantitative analysis of current security concerns and solutions for cloud computing." Journal of Cloud Computing 1, no. 1 (2012): 1-18. 25. Kulkarni, Gurudatt, Jayant Gambhir, Tejswini Patil, and Amruta Dongare. "A security aspects in cloud computing." In Software
Engineering and Service Science (ICSESS), 2012 IEEE 3rd International Conference on, pp. 547-550. IEEE, 2012.
26. Wang, Jun-jie, and Sen Mu. "Security issues and countermeasures in cloud computing." In Grey Systems and Intelligent Services (GSIS), 2011 IEEE International Conference on, pp. 843-846. IEEE, 2011.
27. Behl, Akhil. "Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation." In
Information and Communication Technologies (WICT), 2011 World Congress on, pp. 217-222. IEEE, 2011. 28. Bhardwaj, Aashish, and Vikas Kumar. "Cloud security assessment and identity management." In Computer and Information Technology
(ICCIT), 2011 14th International Conference on, pp. 387-392. IEEE, 2011.
29. Mahmood, Zaigham. "Data Location and Security Issues in Cloud Computing." In Emerging Intelligent Data and Web Technologies (EIDWT), 2011 International Conference on, pp. 49-54. IEEE, 2011.
30. Wen, Fu, and Li Xiang. "The study on data security in Cloud Computing based on Virtualization." In IT in Medicine and Education
(ITME), 2011 International Symposium on, vol. 2, pp. 257-261. IEEE, 2011. 31. Yandong, Zhang, and Zhang Yongsheng. "Cloud computing and cloud security challenges." In Information Technology in Medicine and
Education (ITME), 2012 International Symposium on, vol. 2, pp. 1084-1088. IEEE, 2012.
32. Mollet, Ngongang Guy. "Cloud Computing Security." Bachelor of Engineering Degree Information Technology Thesis, Helsinki Metropolia University of Applied Sciences, Helsinki, Finland 11 (2011).
33. Roberts II, John C., and Wasim Al-Hamdani. "Who can you trust in the cloud?: A review of security issues within cloud computing." In
Proceedings of the 2011 Information Security Curriculum Development Conference, pp. 15-19. ACM, 2011. 34. Mathisen, Eystein. "Security challenges and solutions in cloud computing." In Digital Ecosystems and Technologies Conference (DEST),
2011 Proceedings of the 5th IEEE International Conference on, pp. 208-212. IEEE, 2011.
6.
Authors: Md. K. M., Obetta S. E.
Paper Title: Effects of Levels of Tillage on Destruction and Re – Emergence of Weeds of Benue River Makurdi
Flood Plains
Abstract: This study was conducted to investigate effects of different levels of soil tillage on weed destruction and
re – emergence during the cropping season of the year 2012. The experiment was conducted on the experimental
farm of Department of Agricultural and Environmental Engineering, University of Agriculture, Makurdi. The field
was laid out in a randomized complete block design (RCBD) with four treatments and three replications. The
treatments were ploughing and harrowing once (PH), ploughing and harrowing twice (PHH), ploughing and
harrowing thrice (PHHH) and no – tillage (NT). A 75 Hp four – wheel drive MF 375 E tractor, 3 – discs MF plough
and 14 – discs offset MF harrow were used for the tillage operations. The parameters studied were weed destruction
and re – emergence. The total rainfall within the period was 928.7 mm. Atmospheric temperatures fluctuated
between 32ºC and 39ºC and the relative humidity was between 70 % and 86 %. Results showed that the soil of the
experimental plot was generally dark and was predominantly sandy. Ploughing and harrowing thrice cut down the
highest number of weeds and gave the best soil conditions which yielded the least number of weed re – emergence.
More weeds re – emerged on no – tillage sub – plots with percentages ranging between 42.99 % and 65.11 %. The
19-23
results also showed that tillage is a viable alternative to chemical weeds control.
Keywords: Effects, Destruction, Levels, Tillage, Weeds.
References: 1. Wolkowski, R.P. (2011). Impact of Tillage on Soil Properties. Accessed on 02/07/2011 from http://www.soils.wisc.edu
2. Gale Encyclopedia of Food and Culture (2011). Tillage. Accessed on 07/05/2011 from http://www.answers.com 3. Tirovska, S. (1982). Mechanization of Agriculture. Zemizdat, Sofia, Bulgaria. Pp.5-7
4. Kepner, R. A., Bainer, R. and Barger, B. L. (1978). Principles of Farm Machinery. Third Edition. CBS Publishers and Distributors, India.
Pp. 112 – 114. 5. Sahay, J. (2008). Elements of Agricultural Engineering. Standard Publishers Distributors. Pp. 224 – 225.
6. Microsoft Student with Encarta Premium (2009).“Agriculture”. Microsoft Encarta(R) 2009 [DVD]. Redmond, WA: Microsoft Corporation, 2008.
7. Simmons, F. W. and Nafziger, E. D. (2013). Soil Management and Tillage.Illinois Agronomy Handbook. Pg. 140.
Accessed from http://extension.cropsci.illinois.edu on 14/04/13 8. Jabro, J. D., W. B. Stevens, W. M. Iversen and R. G. Evans (2010). Tillage Depth Effects on Soil Physical Properties, Sugarbeet Yield, and
Sugarbeet Quality. USDA Agricultural Research Service – Lincoln, Nebraska. From http://digitalcommons.unl.edu/usdaarsfacpub/540
Accessed on 26/06/2011. 9. Isikwue, M.O. and A. F. Onyilo (2010). Influence of Land Use on the Hydraulic Response of a Loamy Sand Tropical Soil. Journal of
Engineering Trends in Engineering and Applied Sciences (JETEAS) 1 (2): 145 – 150. From jeteas.scholarlinkresearch.org
10. Gomez, K. A. and A. R. Gomez (1984). Statistical Procedures for Agricultural Research. 2nd Edition. John Wiley and Sons, New York. Pp.
1 – 590.
11. Farming Equipments (2011). Massey Ferguson MF 375 E Tractor. From http://www.farming – equipments. com/massey – ferguson – 375
e.htm on 03/07/2012 12. Derpsch, R. and Moriya, K. (1998). Implications of No – Tillage versus Preparation on Sustainability of Agricultural Production.
Sustainable Land Use – Furthering Cooperation between People and Institutions. Advances in Geoecology 31. Vol. II Catena
Verlag, Reiskirchen. Pp. 1179 – 1186. Accessed from http://www.fao.org on 30/06/2011 13. Mohammed, K. M. and Umogbai, V. I. (2014). Effects of Levels of Tillage on Germination Rate and Vegetation of Maize Crop of Benue
River Makurdi Flood Plains.
7.
Authors: Ranu Pandey, Sandeep Gonnade
Paper Title: Assessing Collaboration Framework in Multi- Cloud Environment
Abstract: Cloud computing has emerged as a popular paradigm that offers computing resources (e.g. CPU, storage,
bandwidth, software) as scalable and on-demand services over the Internet. As more players enter this emerging
market, a heterogeneous cloud computing market is expected to evolve, where individual players will have different
volumes of resources, and will provide specialized services, and with different levels of quality of services. It is
expected that service providers will thus, besides competing, also collaborate to complement their resources in order
to improve resource utilization and combine individual services to offer more complex value chains and end-to-end
solutions required by the customers. In this paper we explore the viability of collaboration framework in cloud
computing environments. This collaboration will be driven by the growing need to offer diverse services without
having to spend heavily on infrastructure. Collaboration can be a boon to all cloud service providers in a way that the
customers would have on offer a combined catalogue of all partnering CSPs.
Keywords: Cloud Computing, Cloud service provider(CSP), Proxy,SaaS, IaaS, PaaS
References: 1. R. Thandeeswaran, S. Subhashini, N. Jeyanthi1, M. A. Saleem Durai, “Secured Multi-Cloud Virtual Infrastructure with Improved
Performance”, cybernetics and information technologies XII, ( 2), pp. 11-22, 2012
2. Cong Wang, Student Member, Qian Wang, Student Member, Kui Ren, Senior Member, Ning Cao, and Wenjing Lou, “Toward Secure and Dependable Storage Services in Cloud Computing”, IEEE transactions on services computing, V, (2), 2012.
3. Ayad Barsoum and Anwar Hasan, “Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems”, IEEE
transactions on parallel and distributed systems. 4. Fawaz Paraiso, Nicolas Haderer, Philippe Merle, Romain Rouvoy, Lionel Seinturier, “A Federated Multi-Cloud PaaS Infrastructure”, 5th
IEEE International Conference on Cloud Computing pp.392 – 399, 2
5. Ana Juan Ferrer, Francisco Hernándezb, Johan Tordsson , Erik Elmroth, Ahmed Ali-Eldin, Csilla Zsigri, Raül Sirvent, Jordi Guitart, Rosa M. Badia, Karim Djemamee, Wolfgang Ziegler, Theo Dimitrakos, Srijith K. Nair, George Kousiouris, Kleopatra Konstanteli, Theodora
Varvarigou, Benoit Hudzia, Alexander Kipp, Stefan Wesnerj, Marcelo Corrales, Nikolaus Forgó, Tabassum Sharif, Craig Sheridan,
“OPTIMIS: A holistic approach to cloud service provisioning”, Future Generation Computer Systems ELSEVIER pp. 66–77, 2012. 6. Mukesh Singhal and Santosh Chandrasekhar, Tingjian Ge, Ravi Sandhu and Ram Krishnan, Gail-Joon Ahn, and Elisa Bertino “Collaboration
in Multicloud Computing Environments: Framework and Security Issues”, Published by the IEEE Computer Society IEEE, 2013.
7. Mohamed Almorsy, John Grundy, and Amani S. Ibrahim, “TOSSMA: A Tenant-Oriented SaaS Security Management Architecture”, 5th IEEE Conference on Cloud computing IEEE, 2012.
8. Yashaswi Singh, Farah Kandah, Weiyi Zhang, “A Secured Cost-effective Multi-Cloud Storage in Cloud Computing”, IEEE INFOCOM
Workshop on Cloud Computing, 2011. 9. Anton Beloglazov, Jemal Abawajy, Rajkumar Buyyaa, “Energy-aware resource allocation heuristics for efficient management of data centers
for Cloud computing”, Future Generation Computer Systems ELSEVIER , pp. 755–768, 2011.
10. Jose Luis Lucas-Simarro, Rafael Moreno-Vozmediano, Ruben S. Montero and Ignacio M. Llorent, “Cost optimization of virtual infrastructures in dynamic multi-cloud scenarios”, Concurrency and Computation: practice and experience Concurrency Computat.: Pract.
Exper. Published online in Wiley Online Library (wileyonlinelibrary.com2012.
24-27
8.
Authors: T.Kasilingam, C.Thangavelu
Paper Title: Nano Analyses of Protective Film onto Carbon Steel
Abstract: The corrosion inhibition effect of cathodic surfactant, namely: dodecyl trimethyl ammonium bromide
(DTAB) and zinc ions, have been used as corrosion inhibitor for carbon steel in well water. Surface analysis using
SEM, EDAX and AFM shows a significant morphological improvement on the carbon steel surface with the addition
of inhibitors. FTIR spectra revealed the interaction between inhibitor molecules and carbon steel surface.
28-33
Keywords: AFM, Inhibitor, SEM-EDAX, Weight loss,
References: 1. P.R. Roberge, Handbook of corrosion engineering McGraw – Hill, 2000.
2. Melchers. E, Jeffery. R, “Corrosion Reviews”, 1(2005) 84.
3. Melchers. R.E, Jeffery. R, “Corrosion Reviews”, 6 (2005) 297. 4. J.M Bastidas, P.pinilla, J.L. Polo, S. Miguel, “Copper corrosion inhibition by triphenylmethane derivatives in sulphuric acid media” Corros.
Sci. 45(2003) 427-449.
5. A.E. Bolzan, I.B. Wakenge, R.C.V. Pittai, R.C. Salvarezza, A.J. Arvia, “The behaviour of copper anodes in aqueous thiourea-containing sulphuric acid solutions. Open circuit potentials and electrochemical kinetics”.J.Electroanal. Chem. 501(2001) 241-252.
6. E. Stipnisek-Lisac, A. Gazivoda, M. Madzarac, “Evaluation of non-toxic corrosion inhibitors for copper in sulphuric acid” Electrochim.
Acta 47 (2002) 4189-4194. 7. M. Sahin, S. Bilgic, H. Yilmaz, “The inhibition effects of some cyclic nitrogen compounds on the corrosion of the steel in NaCl mediums”
Appl. Surf. Sci.195 (2002) 1-7. 8. C.A. Miller, S. Qutubuddin, in: H.F. Eick, C.D. parfitt(Eds.), Interfacial Phenomena in Apolar Media, Surfactant Science Series, vol. 21,
Markel Dekker Inc., New York, Basel, 1987, p. 166.
9. Elachouri, M.S. Hajji, M. Salem, S.Kertit, R. Coudert, E.M. Essassi, “Some surfactants in the series of 2-(alkyldimethylammonio) alkanol bromides as inhibitors of the corrosion of iron in acid chloride solution” Corros. Sci 37 (1995) 381-389.
10. M.A. Migahed, E.M.S. Azzam, A.M. Al-Sabagh, “Corrosion inhibition of mild steel in 1 M sulfuric acid solution using anionic surfactant”
Mater ChemPhys 85 (2004) 273-279. 11. M.M. Osma. A.M. Omer, A.M. Al-Sabagh, “Corrosion inhibition of benzyl triethanol ammonium chloride and its ethoxylate on steel in
sulphuric acid solution” Mater ChemPhys 50 (1997) 271-274.
12. F. Zucchi, G.Trabanelli, G.Brunoro, “The influence of the chromium content on the inhibitive efficiency of some organic compounds” Corros Sci 33 (1992) 1135.
13. M. Elachouri, M.S. Hajji, M. Salem, S.Kertit, R. Coudert, E.M. Essassi, “Some surfactants in the series of 2-(alkyldimethylammonio)
alkanol bromides as inhibitors of the corrosion of iron in acid chloride solution” Corros. Sci 37 (1995) 381-389. 14. Z. Wei, P. Duby, P. Somasundram, “pitting inhibition of stainless steel by surfactants: an electrochemical and surface chemical approach” J
Colloid Interface Sci 259 (2003) 97-102.
15. J.M. Bastidas, J.L. Polo, E. Cano, C.L. Torre, “tributylamine as corrosion inhibitor for mild steel in hydrochloric acid” J Mater Sci 35 (2000) 2637.
16. J.M. Bastidas, J.L. Polo, E. Cano, “Substitutional inhibition mechanism of mild steel hydrochloric acid corrosion by hexylamine and
dodecylamine” J Appl Electrochem 30 (2000) 1173. 17. Z. Abdel Hamid, T.Y. Soror, H.A. El Dahan, A.M Omer, “New cationic surfactant as corrosion inhibitor for mild steel in hydrochloric acid
solutions” Anti – Corros Methods Mater 45 (1998) 306.
18. M. Saleh, A.A. Atia, “Effects of structure of the ionic head of cationic surfactant on its inhibition of acid corrosion of mild steel” J Appl Electrochem 36 (2006) 899.
19. M.A. Migahed, “Electrochemical investigation of the corrosion behaviour of mild steel in 2 M HCl solution in presence of 1-dodecyl-4-
methoxy pyridinium bromide” Mater Chem Phys 93 (2005) 48. 20. A.M. Al Sabagh, M.A. Migahed, H.S. Awad HS, “reactivity of polyester aliphatic amine surfactants as corrosion inhibitors for carbon steel
in formation water (deep well water)” Corros SCi 48 (2006) 813.
21. R. Fuchs-Godec, V. Dolecek, “a effect of dodecylsulfate of the corrosion of copper in sulphuric acid media” Colloids Surf A 244 (2004) 73. 22. H. Ma, S. Chen, B. Yin, S. Zhao, X. Liu, “impedance spectroscopic study of corrosion inhibition of copper by surfactant in the acidic
solutions” Corros Sci 45 (2003) 867.
23. A.A. Amin, “weight loss, polarization, electrochemical impedance spectroscopy, SEM and EDX studies of the corrosion inhibition of copper in aerated NaCl solutions” J Appl Electrochem 36 (2006) 215.
24. D.Q. Zhan, L.X. Gao, G.D. Zhou, K.Y.Lee, “undecyl substitution in imidazole and its action on corrosion inhibition of copper in aerated
acid chloride media” J Appl Electrochem 38 (2008) 71. 25. T.P. Zhao, G.N. Mu,”the adsorption and corrosion inhibition of anion surfactant on aluminium surface n hydrochloric acid” Corros Sci 41
(1991) 1937.
26. S.S. Abd El Rehim, H.H. Hassaan, M.A. Amin, “corrosion inhibition of aluminium by 1,1(lauryl amido)propyl ammonium chloride in HCl solution” Mater ChemPhys 70 (2001) 64.
27. S.S. Abd El Rehim, H.H. Hassaan, M.A. Amin, “the corrosion inhibition study of sodium dodecyl benzene sulphonate to aluminium and its
alloys in 1.0 M HCl solution” Mater ChemPhys 78 (2002) 337. 28. A.K. Maayta, N.A.F. Al-Rawashdeh, “inhibition of acidic corrosion of pure aluminum by some organic compounds” Corros Sci 46 (2004)
1129.
29. R. Guo, T. Liu, X. Wei, “effect of SDS and some alcohols on the inhibition efficiency of corrosion for nickel” Colloids Surf A 209 (2002)
273-278.
30. Ph. Dumas, B. Butffakhreddine, C. Am, O.Vatel, E.Ands, R.Galindo and F.Salvan, “Quantitative microroughness analysis down to the
nanometer scale, Europhys. Lett. 22 (1993)717-722. 31. J.M. Bennett, J. Jahannir, J.C.Podlesny, T.L. Baiter and D.T.Hobbs, “Scanning force microscopy as a tool for studying optical surface,
Appl. Opt 43(1995)213-230.
32. A.Duparre, N.Kaiser, H.Truckenbrodi, M.Berger and A.Kohler, “Microtopography investigations of optical surfaces and thin films by light scattering, optical profilometry SPIE, 1995(1993)181-192.
33. C.Amra, C. Deumie, D.Torricini, P.Roche, R.Galindo, P.Dumas and F.Salvan Overlapping of roughness spectra measured in microscopic (Optical) and microscopic (AFM) bandwidths, Int. Symp. On Optical Interference Coatings, 6-10 June 1994. Grenoble, Proc. SPIE
2253(1994)614-630.
34. C.Thangavelu, P.Patric Raymond, S. Rajendran, M. Sundaravadivelu, “Influence of Chloride Ion on the Corrosion Inhibition Efficiency of the ATMP-Zn2+ System,” Asian j. Research Chem. 4(3)(2011)402-405.
35. C.Thangavelu, M.Umarani, M. Sekar, “Eco- Friendly Inhibitor System for Corrosion Inhibition of Carbon Steel in High Chloride Media”,
RASAYAN.J.Chem. 4(2011)245-250.
9.
Authors: Fahmida Khatoon, Tarana Afrin Chandel
Paper Title: Design of Low Power, High Speed Differential Amplifier Ring Voltage Controlled Oscillator in CMOS
Technology
Abstract: Designing a compact, power efficient Voltage- Controlled Oscillator (VCO) for high frequency phase lock
loop (PLL) in modern wireless communication system is decisively a challenging task. Voltage-Controlled Ring
Oscillator are crucial component in many wireless communication systems.VCRO is used in PLL circuit, to generate
the oscillations and increase the speed of whole system. In this paper a low power and high speed VCRO is
implemented using 250nm CMOS technology provided by generic with 2.5volt power supply. In favour of easy
implementation of the module in small die size, a five-stage CMOS differential Voltage Controlled Ring Oscillator
has been adopted to fabricate the proposed VCRO.The Voltage Controlled Ring Oscillator is design in Tanner Tool
Version 13 environment. Power Consumption should be reduced to improve the performance of the VCRO.We also
34-37
used of several techniques such as transistor sizing to improve performance of VCRO.Simulated results show that the
designed VCRO exhibits an output frequency from 87-910 MHz with tuning voltages of 0.7 V to 2.3 V.The VCRO
consumes 0.359mW of power at Vtune=0.7 V supply.
Keywords: CMOS,High Speed, Low Power,VCRO
References: 1. C.H.Park,O.Kim, and B.Kim 2001, “A 1.8-GHz self-calibrated phase locked loop with precisei/Q Matching ,” IEEE J. Solid-State Circuits,
vol. 36, pp.777-783.
2. Hesieh Y.B. and Kao Y.H., “A Fully integrated spread-spectrum clock generation by using direct VCO modulation,” IEEE Trans
CircuitSyst.I,Regular papers,vol.55,pp.1845-1853,August. 3. Sun L. and Kwasniewski T.A., “ A 1.25- GHz 0.35µm monolithic CMOS PLL based on a multiphase ring oscillator,”IEEE J.Solid-State
Circuits,vol. 36,pp.910-916,June 2001. 4. M.Moghavvemi and A.Attaran, “Recent advances in delay cell VCOs,” IEEE Microw.Mag.,vol.12,no. 5,pp. 110-118,August 2011.
5. Bosco Leung, “VLSI for Wireless Communication,”Pearson Education publisher,New York,2002,ISBN 81-297-0403-X.
6. Behzad Razavi, “Design of Analog CMOS Integrated Circuit,”Tata McGraw-Hill Publishing Company Limited,New Delhi,2002,ISBN 0-07-238032-2.
7. Stephen Williams,Hugh Thompson,Michael Hufford,Eric Naviasky, “ An Improved CMOS Ring Oscillator PLL with less than 4ps RMS
Accumulated Jitter,”IEEE 2004 custom integrated circuits conference,Cadence Design Services,6210 Old Dobbin Lane,Suite 100,Columbia,Maryland 21045,USA.
8. Rashmi K Patli,M.A.Gaikward and V.G Nasre,“Area Efficient Wide Frequency Range CMOS Voltage Controlled Oscillator For PLL in
180nm CMOS Process,”IJERA,vol.2,pp.1696-1699. 9. Mrs. Devendra Rani and Prof.Sanjeev M.Ranjan, ,“ A. Karnik, “A Voltage Controlled Oscillator using Ring structure in CMOS
Technology,”International Journal of Electronics and Computer Science Engineering,vol.1 No.3,ISSN 2277-1956.
10. Y.A.Eken and J.P.Uyemura, ,“A 5.9 GHz voltage controlled ring oscillator in 180nm CMOS,”IEEE J.Solid State Circuits,vol.39,No.1,pp.230-233,Januar 2004.
10.
Authors: Yamuna Devi C R, S H Manjula, K R Venugopal, L M Patnaik
Paper Title: Multi-hop Route Discovery Using Opportunistic Routing for Wireless Sensor Networks
Abstract: In wireless sensor networks multi-hop routing is often used because of the limited transmission range of
sensor nodes. Opportunistic Routing is a multi-hop routing for wireless sensor networks. In this routing, the
neighbors of sender node overhear the transmission and f```orm multiple hops from source to the destination for
transfer of information. The neighbor nodes set participating in the routing are included in the forwarder list in the
order of priority. The node with highest priority is allowed to forward the packet it hears. A new protocol by Energy
Efficient Selective Opportunistic Routing (EESOR), is implemented in this paper that reduces the size of forwarder
list by applying a condition that the forwarding node is nearer to the destination. The path followed by
acknowledgment packet follows opportunistic routing, assuring reliability of transmission and energy balancing.
NS2 is the simulator used to implement the algorithm and results of simulation show that proposed EESOR protocol
performs better than existing Energy Efficient Opportunistic Routing (EEOR) protocol with respect to parameters
End-to-End Delay, Throughput, Routing Overhead and Network Lifetime.
Keywords: Delay; Lifetime; Opportunistic Routing; Reliability; Throughput; Wireless Sensor Network.
References: 1. X.F. Mao, S. Tang, X. Xu, X. Y, Li, and H. Ma, :Energy Efficient Opportunistic Routing in Wireless Networks, Proceedings of IEEE
Transactions on Parallel and Distributed Systems, vol. 22, no. 11, pp. 1934–1942, November 2011.
2. S Biswas and R Morris, :ExOR: Opportunistic Multi-hop Routing for Wireless Networks, in Proceedings of ACM SICGOMM, 133-144,
2005. 3. Chen Wei, Chen Zhi, Pingyi Fan, and Khaled Ben Letaief, :AsOR: An Energy Efficient Multi-Hop Opportunistic Routing Protocol for
Wireless Sensor Networks over Rayleigh Fading Channels, IEEE/ACM Transactions on Wireless Communications, vol. 8, no. 5, pp. 2452–
2463, May 2009. 4. Anand Nasipuri, R. Castaneda, and S.R. Das, :Performance of Multipath Routing for On-Demand Protocols in Ad Hoc Networks,
ACM/Kluwer Mobile Networks and Applications, vol. 6, no. 4, pp. 339–349, 2001.
5. Andrea Passarella, Mohan Kumar, Marco Conti, and Eleonora Borgia, :Minimum-Delay Service Provisioning in Opportunistic Networks, in IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 8, pp. 1267–1275, August 2011.
6. Che-Jung Hsu, Huey-Ing Liu, Winston K.G. Seah, :Opportunistic Routing A Review and the Challenges Ahead, ELSEVIER Journal
Computer Networks, vol. S5, pp. 3592–3603, 2011. 7. Jihoon Myung, and Wonjun Lee, :Wireless Sensor Networks: A Survey, IEEE Communication Letters, vol. 16, no. 4, pp. 510– 513, April
2012.
8. K. Zeng, W. Lou, and H. Zhai, :On End-to-End Throughput of Opportunistic Routing in Multirate and Multihop Wireless Sensor Networks, in Proceedings of INFOCOMM, 2008.
9. Shengling Wang, Siuzhen Cheng, :Opportunistic Routing in Intermittently Connected Mobile P2P Networks, IEEE Journal on Selected
Areas in Communication, vol. 31, pp. 369–379, September 2013. 10. Won-Yong Shin, Sae-Young Chung, Yong H. Lee, :Parallel Opportunistic Routing in Wireless Networks, in IEEE Transactions on
Information Theory, vol. 59, no. 10, pp. 6290–6391, October 2013.
11. Yanhuva Li, Abedelaziz Mohaisen, Zhi-Li Zhang, :Trading Optimality for Scalability in Large-Scale Opprotunistic Routing, in IEEE Transactions on Vehicular Technology, vol. 62, no. 5, pp. 2253 – 2263, June 2013.
12. Zehua Wang, Yuanzhu Chen, Cheng Li, :CORMAN: A Novel Cooperative Opportunistic Routing Scheme in Mobile Ad Hoc Networks,
IEEE Journal on Selected Areas in Communication, vol. 30, pp. 289–286, February 2012. 13. Bogdan Pavkovic, Fabrice Theoley re and Andrzej Duda, “Multipath Opportunistic RPL Routing over IEEE 802.15.4”, MSWiM, 2011.
14. Azad and Joarder Kamruzzaman, “Energy-Balanced Transmission Policies for Wireless Sensor Networks”, IEEE Transactions on Mobile
Computing, vol. 10, no. 7, pp. 927-940, Jul. 2011. 15. Xiaoli Ma, Min-Te Sun, Gang Zhao and Xiangqian Liu, “An Efficient Path Pruning Algorithm for Geographical Routing in Wireless
Networks”, IEEE Transactions on Vehicular Technology, vol. 57, no. 4, pp. 2474-2490, Jul. 2008.
38-45
11.
Authors: Azher Jameel, Qazi Junaid, Suhail Ahmed
Paper Title: Large Sliding Frictional Contact Problems by a Penalty Based Approach
Abstract: The finite element method is used to model large sliding frictional contact problems in which one body 46-55
slides over another body and there is relative motion at the interface of the two bodies. The penalty approach has
been used within finite element frame work to consider various constraints at the contact surface. The large sliding
behavior between two bodies has been formulated by employing the node-to-segment (NTS) algorithm. The NTS
technique searches for the active slave nodes and the corresponding master segments at the contact surface and then
the contact stiffness matrix is evaluated to enforce the contact conditions. Finally, three problems are solved to
demonstrate the applicability of the given technique in solving large sliding fictional contact problems. The given
problems have been solved for both the frictionless contact as well as the frictional contact at the interface of the two
bodies.
Keywords: FEM, Penalty Factor, Node-to-Segment Technique, Large Sliding.
References: 1. Wriggers, P., and Simo, J. C., 1985, “A note on tangent stiffness for fully nonlinear contact problems”, Communications in Applied
Numerical Methods, 1, pp. 199–203.
2. Parisch, H., 1989, “A consistent tangent stiffness matrix for three-dimensional non-linear contact analysis”, International Journal for
Numerical Methods in Engineering, 28, pp. 1803–1812. 3. Fracavilla, A., and Zienkiewicz, O. C., 1975, “A note on the numerical computation of elastic contact problems”, International Journal for
Numerical Methods in Engineering, 9, pp. 913–924.
4. Hughes, T. J. R., Taylor, R. L., Sackman, J. L., Curnier, A., and Kanoknukulchai, W., 1976, “A finite element method for a class of contact-
impact problems”, Computer Methods in Applied Mechanics and Engineering, 8, pp. 249–276.
5. Beer, G., 1985, “An isoparametric joint/interface element for finite element analysis”, International Journal for Numerical Methods in
Engineering, Vol. 21, pp. 585–600. 6. Peric, D., and Owen, D. R. J., 1992, “Computational model for 3D contact problems with friction based on the penalty method”,
International Journal for Numerical Methods in Engineering, 35, pp. 1289–1309.
7. Belyschko, T., and Neal, M. O., 1991, “Contact–impact by the pinball algorithm with penalty and Lagrangian methods”, International Journal for Numerical Methods in Engineering, 31, pp. 547–572.
8. Nistor, I., Guiton, M. L. E., Massin, P., Moes, N., and Geniaut, S., 2009, “An X-FEM approach for large sliding contact along
discontinuities”, International Journal for Numerical Methods in Engineering, 78, pp. 1407–1435. 9. Giorgio Zavarise, and Laura De Lorenzis, 2009, “The node-to-segment algorithm for 2D frictionless contact: Classical formulation and
special cases”, Computer Methods in Applied Mechanics and Engineering, 198, pp. 3428–3451.
10. McDevitt, T. W., and Laursen, T. A., 2000, “A mortar-finite element formulation for frictional contact problems”, International Journal for Numerical Methods in Engineering, 48, pp. 1525–1547.
11. ChehelAmirani, M., and Nemati, N., 2011, “Simulation of two dimensional unilateral contact using a coupled FE/EFG method”,
Engineering Analysis with Boundary Elements, 35, pp. 96–104. 12. Al-Dojayli, M., and Meguid, S. A., 2002, “Accurate modeling of contact using cubic splines”, Finite Elements in Analysis and Design, 38,
pp. 337–352.
13. Khoei, A. R., and Taheri Mousavi, S. M. 2010, “Modeling of large deformation – Large sliding contact via the penalty X-FEM technique”,
Computational Materials Science, 48, pp. 471–480.
12.
Authors: Rohini Kadlag, Rohit Devikar
Paper Title: A Survey on Automatic Protocol Blocker for Privacy -Preserving Public Auditing in Cloud
Computing
Abstract: Cloud Computing is nothing but specific style of computing where everything from computing power to
infrastructure, business apps are provided “as a service”. In cloud, shared resources, softwares and information is
provided as a metered service over the network. By data outsourcing, users can be relieved from the burden of local
data storage and maintenance. However, the fact that users no longer have physical possession of the possibly large
size of outsourced data makes the data integrity protection in Cloud Computing a very challenging and potentially
formidable task, especially for users with constrained computing resources and capabilities. Thus, enabling public
auditability for cloud data storage security is of critical importance so that users can resort to an external audit party
to check the integrity of outsourced data when needed. In particular, we consider the task of allowing a third party
auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. In this
paper we are extending the previous system by using automatic blocker for privacy preserving public auditing for
data storage security in cloud computing. We utilize the public key based homomorphic authenticator and uniquely
integrate it with random mask technique and automatic blocker. In particular, to achieve efficient data dynamics, we
improve the existing proof of storage models by manipulating the block tag authentication. Thus, TPA eliminates the
involvement of the client through the auditing of whether his Data stored in the Cloud are indeed intact, which can be
important in achieving economies of scale For Cloud Computing.
Keywords: Cloud computing, CSP, Data storage, Data dynamics, Protocol Blocker, Public auditability, TPA.
References: 1. Qian Wang, Student Member, IEEE, Cong Wang, Student Member, IEEE, Kui Ren, Member, IEEE Wenjing Lou, Senior Member, IEEE,
and Jin Li “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing” IEEE transactions on parallel and
distributed systems, vol. 22, no.5, May 2011.
2. P. Mell, T. Grance (2009),“Draft NIST working definition of cloud computing”, [Online]Available: http://www.csrc.nist.
gov/groups/SNS/cloud-computing/index.html.
3. Juels and B.S. Kaliski Jr., “Pors: Proofs of Retrievability forLarge Files,”Proc. 14th ACM Conf. Computer and Comm. Security(CCS
’07),pp. 584-597, 2007. 4. H. Shacham and B. Waters, “Compact Proofs of Retrievability” Proc. 14th Int’l Conf. Theory and Application of Cryptology and
Information Security: Advances in Cryptology (ASIACRYPT ’08),pp. 90-107, 2008.
5. K.D. Bowers, A. Juels, and A. Oprea, “Proofs of Retrievability: Theory and Implementation,” Report 2008/175, Cryptology ePrint Archive, 2008.
6. M. Naor and G.N. Rothblum, “The Complexity of Online ]memory Checking,” Proc. 46th Ann. IEEE Symp. Foundations of Computer
Science (FOCS ’05),pp. 573-584, 2005. 7. E.-C. Chang and J. Xu, “Remote Integrity Check with Dishonest Storage Server,”Proc. 13th European Symp. Research in Computer
Security (ESORICS ’08),pp. 223-237, 2008.
8. M.A. Shah, R. Swaminathan, and M. Baker, “Privacy-Preserving Audit and Extraction of Digital Contents,” Report 2008/186,Cryptology
56-60
ePrint Archive, 2008. 9. Oprea, M.K. Reiter, and K. Yang, “Space-Efficient Block Storage Integrity,”Proc. 12th Ann. Network and Distributed System Security
Symp. (NDSS ’05), 2005.
10. T. Schwarz and E.L. Miller, “Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage,” Proc. 26th IEEE Int’l Conf. Distributed Computing Systems (ICDCS’06),p. 12, 2006.
11. Q. Wang, K. Ren, W. Lou, and Y. Zhang, “Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance,” Proc. IEEE
INFOCOM, pp. 954-962, Apr. 2009. 12. C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring Data Storage Security in Cloud Computing,” Proc. 17th Int’l workshop Quality of
Service (IWQoS ’09),2009.
13. C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring Data Storage Security in Cloud Computing,” Proc. 17th Int’l Workshop Quality of Service (IWQoS ’09), 2009.
14. G. Ateniese, R.D. Pietro, L.V. Mancini, and G. Tsudik, “Scalable and Efficient Provable Data Possession,”Proc. Fourth Int’l Conf. Security
and Privacy in Comm. Networks (SecureComm ’08),pp. 1-10,20080. 15. D. Boneh, C. Gentry, B. Lynn, H. Shacham,“Aggregate and verifiably encrypted signatures from bilinear maps”, in Proc. of Eurocrypt
2003, Vol. 2656 of LNCS. Springer-Verlag, 2003, pp. 416–432
13.
Authors: Akshay Gupta, Ruprit Sikka, Pavithra Balaji
Paper Title: Low Complexity Partial Transmit Sequence Based Implementation to Reduce Peak to Average Power
Ratio in OFDM Systems
Abstract: Orthogonal frequency division multiplexing is a extremely useful and one of the most widely used
wireless technology. Its high spectral efficiency, low inter symbol interference and very less cross talk makes it
highly used in TV broadcasting or wire line systems like ADSL (Asymmetric digital subscriber line). The
increasingly useful OFDM (Orthogonal frequency division multiplexing) systems too suffer from one major
disadvantage of having a high PAPR, which is due to the superposition of N sub carriers. In this letter we counter the
high PAPR (Peak to Average Power ratio) using PTS (Partial Transmit Sequence) algorithm, which is a more
efficient technique than some other PAPR reducing techniques like SLM (Selected Mapping), clipping and amplitude
filtering. We have lowered the complexity of the algorithm making it highly reliable and much more sharper in terms
of lowering the PAPR. Our paper analyzes the PAPR plot in terms of CCDF (complimentary cumulative distributive
function) by varying the sub carriers and the sub-blocks in PTS. We also carry out the phase optimization in PTS
algorithm by using exhaustive search algorithm and modified exhaustive search algorithm so as to reduce PAPR to a
greater extent in OFDM systems.
Keywords: CCDF, OFDM, PAPR, Phase optimization, PTS, Sub carriers
References: 1. Arun Gangwar, Manushree Bhardwaj, “An Overview: Peak to Average Power Ratio in OFDM system & its Effect” International Journal of
Communication and Computer Technologies Volume 01 – No.2, Issue: 02 September 2012 2. Chintha Tellambura, Member , IEEE, “ Improved Phase Factor computation fot the PAR Reduction of an OFDM Signal Using PTS”, IEEE
COMMUNICATIONS LETTER, VOL.5, NO.4, APRIL 2001
3. Nikhil Arora, Prem Singh“Partial Transmit Sequence (PTS)-PAPR Reduction Technique in OFDM Systems with Reduced Complexity”, Conference on Advances in Communication and Control Systems 2013
4. Padmapriya Praveenkumar, Reangarajan Amiritharajan, “OFDM with low PAPR: A Novel approach of Partial Transmit Sequence”,Research
Journal of Information Technology 5(1),35:44,2013 5. Seung Hee Han, Student Member, IEEE, and Jae Hong Lee, Senior Member, IEEE,’’PAPR Reduction of OFDM Signals Using a Reduced
Complexity PTS Technique”, IEEE SIGNAL PROCESSING LETTERS, VOL. 11, NO. 11, NOVEMBER 2004
6. S.Haykin, “OFDM SYSTEMS, brain-empowered wireless communications,” IEEE J. Sel Areas Commun., vol. 23, pp. 201–220, Feb. 2005. 7. Yunfei Chen, Senior Member, IEEE, and Zijian Tang, "Effect of Spectrum Sensing Errors on the Performance of OFDM-Based Cognitive
Radio Transmission", IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 11, NO. 6, JUNE 2012
61-65
14.
Authors: Aziz Oriche, Abderrahman Chekry, Md. Khaldi
Paper Title: A Multi-Agents System for Extraction and Annotation of Learning Objects
Abstract: in this paper, we propose an extraction approach of learning objects (LO) (Definition, Example, Exercise,
etc...) of documents defined by HTML / XML whose structure is a tree DOM (Document Object Model). Our
approach is based on two intelligent agents. An agent of extraction to extract the learning objects independently of
the domain and to align them with the concepts of the ontology. An agent of annotation defined by a set of
declarative rules for annotates the nodes and their relationships. We defined in the extraction agent a module includes
a set of declarative rules of contextual exploration to extract the learning objects contained in the nodes of DOM
documents. The result of this extraction is a set of RDF triples generated for alignment the learning objects extracts
with concepts of ontology. The agent of annotation is based on a set of annotations metadata representing the results
of extraction and annotation. They allow also annotating the neighbor relationship between the nodes. We assume to
have a domain ontology defined by concepts, relations between these concepts and properties.
Keywords: Semantic Annotation, Multi-agent systems, Ontology, learning object (LO), contextual exploration
method.
References: 1. Aziz O., Abderrahman C., Mohamed K., “Intelligent Agents for the Semantic Annotation of Educational Resources”, International Journal of
Soft Computing and Engineering (IJSCE), Volume-3, Issue-5, November 2013.
2. Descles J.-P., Jouis C., "L’exploration contextuelle : une méthode linguistique et informatique pour l’analyse informatique de textes", in Proceedings of the International Langage Natural (ILN’93), Nantes, 1993.
3. Boutheina S., Rim F., Descles J.-P., "Relevant learning objects extraction based on semantic annotation", Int. J. Metadata, Semantics and
Ontologies, Vol. 8, No. 1, 2013. 4. Jean-Philippe Pernin, “Objets pédagogiques : unités d’apprentissage, activités ou ressources ?”, Sciences et Techniques Educatives, 2003.
5. Learning Technology Standards Committee (LTSC) P1484.12.1-2002 Learning Object Metadata Working Group, "Draft Standard for Learning Object Metadata", Available: http://ltsc.ieee.org/wg12/files/LOM_1484_12_1_v1_Final_Draft.pdf, 2002.
6. Bourda Y., Hélier M., "Métadonnées et XML : application aux objets pédagogiques", In Colloque International Technologies de
66-72
l’Information et de la Communication dans les Enseignement d’Ingénieurs et dans l’industrie, Troyes, 18-20 octobre 2000. 7. Sabine G., K. Ramesh R., "Concept Guide on Reusable Learning Objects with Application to Soil, Water and Environmental Sciences", Dec.
2007.
8. Gruber T. "A Translation Approach to Portable Ontology Specifications", Knowledge Acquisition, pp. 199-220, 1993. 9. Aziz O, Abderrahman C, Mohamed K., “Agent of semantic annotation of educational resources based on ontology”, International Journal of
Innovative Technology and Exploring Engineering (IJITEE), Volume-3, Issue-7, December 2013.
10. Gustavo C., "Une plate-forme informatique de l’Exploration Contextuelle : modélisation, architecture et réalisation (ContextO)", université de paris IV – Sorbonne, Ecole Doctorale Concepts et Langages, Laboratoire LaLICC, thèse de doctorat, 2003.
11. Mouhamadou T., « Annotation Sémantique de Documents Semi-structurés pour la Recherche d’Information », thèse en cotutelle, Universités
de Paris-Sud et Gaston Berger, 2010.
15.
Authors: Sonia Rathi, Nisha Malik, Nidhi Chahal, Sukhvinder Malik
Paper Title: Throughput for TDD and FDD 4 G LTE Systems
Abstract: Long Term Evolution (LTE) has been designed to support only packet-switched services. It aims to
provide seamless Internet Protocol (IP) connectivity between User Equipment (UE) and the packet data network
(PDN), without any disruption to the end user’s applications during mobility. The term LTE “Long Term Evolution”
encompasses the evolution of UMTS which is famous for high data rate because the use of OFDMA. Many of us
might have heard about LTE’s peak throughput i.e. 300Mbps, but how many of us know how we calculate that? This
paper provides the information, how this number is calculated? And assumptions behind? In this paper, authors have
explained the calculations of theoretical throughput for both the LTE FDD and TDD systems.
Keywords: LTE, Throughput, Frequency Division Duplexing, Time Division Duplexing.
References: 1. Lte - The Umts Long Term Evolution from Theory To Practice 2nd Edition by Stefania Sesia , Issam Toufik, Matthew Baker 2. 3GPP TS 36.213 “Evolved Universal Terrestrial Radio Access (E-UTRA) Physical layer procedures”.
3. 3GPP TS 36.221 “Evolved Universal Terrestrial Radio Access (E-UTRA); Medium Access Control (MAC) protocol specification”
4. 3GPP TS 36.300 “Evolved Universal Terrestrial Radio Access (E-UTRA), Evolved Universal Terrestrial Radio Access Network (E-UTRAN). 5. 3GPP TS 24.302: “Access to the 3GPP Evolved Packet Core (EPC) via Non-3GPP Access Networks”.
6. 3GPP TS 36.331: “Evolved Universal Terrestrial Radio Access (E-UTRAN); Radio Resource Control (RRC) Protocol Specification”
7. 3GPP TS 36.401: “Evolved Universal Terrestrial Radio Access Network (E-UTRAN); Architecture Description” 8. 3GPP TS 36.413: “Evolved Universal Terrestrial Radio Access Network (E-UTRAN); S1 Application Protocol (S1AP).
73-77
16.
Authors: Pranita C. Bawankar, U. A. Rane
Paper Title: eNotebook Based on ARM Architecture
Abstract: In recent years, electronic media has grown very fast replacing papers, tape devices, books, etc. The new
technologies provide large number of data into single device, fast searching options and more readability than ever.
As eBooks are replacing books; we are proposing eNotebook system in which user can write as he did in notebook,
save, searches and then reread content. This paper presents design and development of eNotebook using ARM7. The
system uses touch screen to get input data and operations like save, delete, open & close of data file. All data sensed
by touch screen is digitized by internal ADCs of LPC2148 microcontroller which gives low power platform with fast
execution. The output is shown on graphical LCD. Whatever user writes on screen it may need to save for future
use. The content of such hand written data will be in graphical/pictorial form hence required large of memory for
storage. We can provide external memory using pen drive, memory card, EEPROM etc. in this system we are using
SD card interfacing through SPI port.
Keywords: ARM7, Graphical LCD, LPC 2148, SD Cards, Touch Screen.
References: 1. Peter Corcoran (21 October 2011). “A Bitter Pill or a Better Tablet? A historical perspective on tablet computers” Available:
http://theinstitute.ieee.org/technology-focus/technology-history/a-bitter-pill-or-a-better-tablet
2. Kot, Chelsea (July 11, 2011). "A Brief History of Tablets and Tablet Cases". Tablets2Cases.
3. Viken, Alexander (April 10, 2009). "The History of Personal Digital Assistants 1980 – 2000". 4. "History of the HP 95LX computer". HP Virtual Museum. Hewlett-Packard. Retrieved February 18, 2011.
Available:http://www.hp.com/hpinfo/abouthp/histnfacts/museum/personalsystems/0025/0025history.html
5. Andrew Smith, Faithe Wempen (2011). “CompTIA Strata Study Guide”. John Wiley & Sons. p. 140. ISBN 978-0-470-97742-2. 6. Andrew Orlowski (26 Jun 2007). “Psion: the last computer - The Protea Story".
Available:http://www.theregister.co.uk/2007/06/26/psion_special?page=2
7. iPad. Available: en.wikipedia.org/wiki/IPad. 8. Tablet. Available: en.wikipedia.org/wiki/Tablet computer.
9. Digital Paper Available:http
10. ://pro.sony.com/bbsc/ssr/cat-digitalpaper/resource.latest.bbsccms-assets-show-digitalpaper-digitalpaper.shtml 11. Neal Brenner, Shawn Sullivan, William Goh. Texas instruments – application report – “4-Wire and 8-Wire Resistive Touch-Screen
Controller using the MSP430”. SLAA384A–February 2008–Revised November 2010
12. Available: http://www.ti.com/lit/an/slaa384a/slaa384a.pdf 13. David Seal, Addison Wesley (2001). “ARM Architecture Reference Manual” Second Edition.
14. Steve Furber, Addison Wesley (2000). “ARM System-on-Chip Architecture”, Second Edition.
15. The insiders’ guide to the Philips arm7 based microcontrollers. 16. AN10406: Accessing SD/MMC card using SPI on LPC2000 Rev. 03 — 3 January 2007
17. Available: www.nxp.com/documents/application note/AN10406.pdf
18. Application Notes for the T6963C LCD Graphics Controller Chip October, 95. 19. Available: http://www.lcd-module.de/eng/pdf/zubehoer/t6963.pdf
20. SPI Block Guide V03.06, Freescale Semiconductor.
21. Serial Peripheral Interface (SPI) Flash Memory Backgrounder, Scansion 22. Shneiderman, B. (1991). "Touch screens now offer compelling uses". IEEE Software
23. Potter, RS, Weldon, L. & Shneiderman, B. (1988). “Improving the accuracy of touch screen: An experimental evaluation of three
strategies”. Proc. CHI'88. Washington, DC: ACM Press.
78-82
17.
Authors: Priyankaran Tanck, Bipan Kaushal
Paper Title: A New Technique of Quality Analysis for Rice Grading for Agmark Standards
Abstract: The quality inspection method of rice grain which is followed by Agmark is based on manual inspection
by the assigned inspectors which proves to be an improper way and outcomes that results are inaccurate. A digital
inspection method for Agmark Standards for quality assessment of rice is required. So this paper proposes a digital
method which can be used to evaluate the quality of rice for the present Agmark Standards. The proposed method is
formulated with the help of digital image processing technique on MATLAB. In this paper three parameters; Broken
Grain , Foreign Particle and Admixture of Agmark Standards are converted to digital form for digital quality
inspection of rice. The outcomes of inspection of the samples studied, showed that our model was an effective way
for digital inspection of Agmark Standards.
Keywords: AGMARK, Binarization, Grayscale ,MATLAB, Region Props.
References: 1. R.Kiruthika, S.Muruganand , Azha Periasamy “MATCHING OF DIFFERENT RICE GRAINS USING DIGITAL IMAGE PROCESSING”
International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering Vol. 2, Issue 7, July 2013
2. B.K. Yadav, V.K. Jindal “Monitoring milling quality of rice by image analysis” Computers and Electronics in Agriculture 33 (2001) 19–33
www.elsevier.com/locate/compag
3. XuLizhang , Li Yaoming, Multi-Scale Edge Detection of Rice Internal Damage Based on Computer Vision, Proceedings of the IEEE
International Conference on Automation and LogisticsQingdao, China September 2008
4. YangYiShan ChenLiYun, XuYaoWu. From rice quality evaluation criteria of change to see our rice breeding for quality development [J].Journal of hybrid rice, finance (cicf 3) : 5-10.
5. Bhavesh B. Prajapati1, Sachin Patel2 “Algorithmic Approach to Quality Analysis of Indian Basmati Rice Using Digital Image Processing”
International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 3, March 2013)
6. Yao, Chen, Guan, “Inspection of rice appearance quality using machine vision”, Global Congress on Intelligent system, 2009 IEEE
7. R. M. Carter, PhD Thesis: On-Line measurement of size distribution and volumetric concentration of pneumatically conveyed solids using digital imaging techniques. 2005, University of Kent, UK.
8. R M Carter, Y. Yan., Measurement of particle shape using digital imaging techniques. Journal of Physics Conference Series, V. 15, pp. 177-
182, 2005. 9. Rohit R. Parmar, Kavindra R.Jain, Dr.Chintan K.Modi, “Image Morphological operation based quality analysis of coriander seed
(Coriandrumsatavum L.),” ETNCC (International Conference on Emerging Trends in Network and Computer Communications), 2011.
10. Gonzalez, R.C., Woods, R.E., 2008. Digital Image Processing. Prentice-Hall, Upper Saddle River. 11. Zhang, G., Jayas D. S., White N. D.G.., 2005.Separation of touching grain kernels in an image by ellipse fitting al-gorithm. Biosyst. Eng.,
92(2):135-142.
83-85
18.
Authors: Abderrahman CHEKRY, Aziz ORICHE, Mohamed KHALDI
Paper Title: Indexing and Adaptation of Learning Objects to the Personality of the Learner
Abstract: The main goal of this paper is to create adaptable learning object to different types of personality of
learners. For that, we present the personality factor that we deem useful to know the psyche of learner and to create
adaptable content. We lay bare two different approaches of learning profile and we propose an enrichment of
Learning Object Metadata standard to support adaptation. Finally, we suggest our approach to creating learning
profile and the process of adaptation of learning object.
Keywords: Personality, Learning Object Metadata, learner profile, Ontology.
References: 1. Abderrahman CHEKRY., Aziz ORICHE., Mohamed KHALDI., « Sharing and Adaptation of Educational Documents in E-Learning»
International Journal of Emerging Technologies in Learning. ISSN: 1863-0383, iJET, Volume 7, No 1, 2012.
2. Catherine VOYNNET FOURBOUL.,.« La personnalité ». December 2011 Available: http://voynnetf.fr/wp-content/uploads/2013/06/personnalite.pdf .
3. Stéphanie Brouard.,Fabrice Daverio.,. « Les outils du développement personnel pour manager ». Groupe Eyrolles, 2010 ISBN:978-2-212-
54713-9. 4. Sampson Demetrios., Karagiannidis Charalampos., Cardinali Fabrizio.,. « An Architecture for Web-based e-Learning Promoting Re-usable
Adaptive Educational e-Content » Educational Technology & Society 5 (4) , ISSN 1436-4522, 2002.
5. Carchiolo Vincenza., Longheu Alessandro., Malgeri Michele., Mangioni Giuseppe., . « An Architecture to Support Adaptive E-Learning ». International Journal of Computer Science and Network Security, Vol.7, No.1, 2007
6. IMS-LIP.,. http://www.imsglobal.org/ . Global Learning Consortium, Inc. Learner Information Profile Specification. Version 1.0.0 (March
2001). 7. Webster's dictionary. Available: http://www.larousse.fr/ .
8. Gwenaël GAVRAY.,. « Personnalisation des sites Web : élaboration d'une méthodologie de mise en œuvre et application au cas DGTRE ».
Memory for obtaining the title of Engineer From Management of the Catholic University of Louvain. Available: https://lilab.isys.ucl.ac.be/bchi/publications/2002/Gavray-T2002.pdf
86-91
19.
Authors: Ijemaru Gerald Kelechi, Udunwa Augustine Ikenna, Ngharamike Ericmoore Tochukwu, Oleka
Emmanuel Uchendu
Paper Title: Evaluating the Challenging Issues in the Security of Wireless Communication Networks in Nigeria
Abstract: Despite the gains offered by wireless communication systems, developing nations like Nigeria have been
facing some stringent challenges in the security of wireless communication systems. Although Nigeria’s Telecom
industry has experienced continuous growth and rapid progress in policy and technological development, thus
resulting in an increasingly competitive and networked world, it has however been encumbered with many security
challenges. At present, wireless communications weaknesses are on the increase due to the higher demand for
wireless access, demand for higher data rates, the emergence of advanced services, the need for roaming, and the
large deployment of services across the globe. Consequently, this has created challenging issues in the security of
92-96
wireless systems and applications operating in wireless environments. Nigeria witnessed stages of technological
advancements in her information-dissemination techniques. Most of the techniques, such as post office, public switch
telephone network, telegram and so on, are now becoming obsolete and therefore necessitate the use of other
communication mediums which are not only faster, cheaper, portable, contemporary, more efficient and reliable but
also have the gains and potentials of accelerating economic development as well as enhancing the lives of
individuals. Consequently, the wireless communication systems such as the Global System for Mobile
communication (GSM) and the internet, which are operative in Nigeria at present, have brought convenience,
mobility and portability in the information and communication process. And with these, people can now transact a
wide range of services formally. It is true that security of wireless networks is a global issue that needs to be
addressed; the Nigerian case has more to it owing to the diverse nature of the country vis-à-vis its ethnic and
religious diversities and therefore requires a critical evaluation, especially now that deregulation of the sector has
taken its success.
Keywords: CDMA, GSM, TDMA
References: 1. AirDefense™, Inc. ‘Wireless LAN Security: Intrusion Detection and Monitoring for the Enterprise.’ URL:
http://www.airdefense.net/products/index.shtm (30 April 2014).
2. Chuah, M., and Zhang, Q. (2006) Design and Performance of 3G Wireless Network and Wireless Lans. USA: Springer
3. Du, K., and Swamy, M.N.S. (2009) Wireless Communication Systems: From RF Subsystems to 4G Enabling Technologies. London:
Cambridge University press 4. Finkle II, L.G. (2000) ‘Wireless Communications: A Modern Necessity.’ Journal of Information Technology 63, (5)
5. Hamid, R.A. (2003) ‘Wireless LAN: Security Issues and Solutions’
6. Homeland Security (2006) ‘Wireless Communications Security.’ [online] available from http://www.safecomprogram.gov/NR/rdonlyres/7F55866C-13B5-419E-B698-
1C4022696A49/0/Wireless_Communications_Security_090607.pdf [6th May 2010]
7. ISO (2005) ‘Information Technology-Security Techniques-Code of Practice for Information Security Management.’ [online] available from http://www.iso.org/iso/support/faqs_widely_used_standards/widely_used_standards_other/information_security.htm [10th May 2014]
8. Khan, F. (2009) ‘LTE for 4G Mobile Broadband: Air Interface Technologies and Performance’
9. Miller, K. S. (2001) ‘Facing the Challenges of Wireless Security.’ Technology News 17 July: 16-18 10. Moore, L. (2006) ‘Wireless Technology and Spectrum Demand: Advanced Wireless Services.’ Congressional Research Services (CRS)
Report for Congress
11. SANS Institute (2003) ‘An Overview of Wireless Security Issues’ 12. Sing, G. (2012) ‘Security Issues in Wireless Local Area Networks (WLAN)’
13. US-CERT (2008) ‘Using Wireless Technology Securely a government organization.’ [Online] Available from <http://www.us-
cert.gov/reading_room/home-network-security/> [12th March 2014]
20.
Authors: Rubayyat Mahbub, Md. Fakhrul Islam
Paper Title: Sintering Behavior and Microstructure Development of Ba Doped BiFeO3
Abstract: The main focus of this research was to investigate the role of Ba doping on the sintering behavior and
microstructure development of BiFeO3 (BFO) ceramic. Single phase Bi1-xBa.xFeO3 samples (x= 0.1, 0.2 and 0.3)
were synthesized by the conventional solid-state reaction method. The doped samples were then sintered at
temperatures in the range of 850-900oC for both 1 and 2 hours of holding time. Thereafter field emission scanning
electron microscope (FESEM) and X-ray diffraction (XRD) techniques were used to examine the phase and structure
of the samples. Phase analysis by X–ray diffraction (XRD) indicated that single phase perovskite structure was
formed with possible increment in lattice parameter with increasing Ba doping. Moreover, microstructural
investigation using the field emission scanning electron microscope (FESEM) showed that an increase in Ba
concentration in Bi1-xBa.xFeO3 controls excessive grain growth and reduces the average grain size from 10 µm in
Bi0.9Ba0.1FeO3 to 0.58 µm in Bi0.7Ba0.3FeO3 when sintered at 900oC for 2h. However, percent theoretical density
(%TD) above 95% was attained in this research for all compositions.
Keywords: Bismuth Ferrite, Barium, Doping, Sintering, Densification, Microstructure.
References: 1. N.A. Hill, “Why Are There so Few Magnetic Ferroelectrics?”, Journal of Physical Chemistry B, 2000, Volume 104 (29), pp 6694-6709. 2. C.P. Bhole, “Antiferromagnetic to Paramagnetic Phase transitions in Bismuth Ferrite (BiFeO3) Ceramics by Solid State Reaction”,
Ceramics – Silikáty, 2012, Volume 56 (2), pp 127-129.
3. W. Cheong, M. Mostovoy, “Multiferroics: a magnetic twist for ferroelectricity, ”Nature Materials, 2007, Volume 6, pp 13-20. 4. R. Ramesh, N.A. Spaldin, “Multiferroics: progress and prospects in thin films”, Nature Materials, 2007, Volume 6, pp 21-29.
5. L. Luo, W. Luo, G. Yuan, W. Wei, X. Yuan, H. Zhang, K. Shen, M. Xu, Q. Xu, “The Origin of Enhanced Room Temperature
Ferromagnetism in Ba Doped BiFeO3”, Journal of Superconductivity and Novel Magnetism, 2013, Volume 26, pp 3309–3313. 6. D. H. Wang, W. C. Goh, M. Ning, and C. K. Ong “Effect of Ba doping on magnetic, ferroelectric, and magnetoelectric properties in
mutiferroic BiFeO3 at room temperature,” Applied Physics Letters, Vol. 88, 2006, pp 212907: 1-3.
7. Z. Cheng, X. Wang, and S. Dou, “Improved ferroelectric properties in multiferroic BiFeO3 thin films through La and Nb codoping,” Physical Review B, Vol. 77, 2008, pp 092101: 1-4.
8. M.Y. Shami, M.S. Awan, and M. Anis-ur-Rehman,“Effect of Sintering Temperature on Nanostructured Multiferroic BiFeO3 Ceramics,”
Key Engineering Materials Vol. 510-511, 2012, pp 348-355. 9. A.K. Ghosh, H. Kevin, B. Chatterjee, G.D. Dwivedi, A. Barman, H.D. Yang and S. Chatterjee, “Effect of Sr-doping on multiferroic
properties of Bi0.8La0.2Fe0.9Mn0. 1O3”, Solid State Communications, Volume 152, Issue 6, 2009, pp 557-560.
10. R. Das, K. Mandal, “Magnetic, ferroelectric and magnetoelectric properties of Ba-doped BiFeO3”, Journal of Magnetism and Magnetic Materials, 2012, Volume 324 (11), pp 1913–1918.
11. S. J. Kim, S. H. Han, “Multiferroic Properties of Ti-doped BiFeO3 Ceramics”, Journal of the Korean Physical Society, 2010, Volume 56
(1), pp 439-442. 12. V. A. Khomchenko, D. A. Kiselev, “Effect of diamagnetic Ca, Sr, Pb, and Ba substitution on the crystal structure and multiferroic
properties of the BiFeO3 perovskite”, Journal of Applied Physics, 2008, Volume 103, pp 024105: 1-6.
13. A.K. Ghosha, H. Kevin, B. Chatterjee, G.D. Dwivedi, A. Barman, H.D. Yang, S. Chatterjee, “Effect of Sr-doping on multiferroic properties
97-102
of Bi0.8La0.2Fe0.9Mn0.1O3”, Solid State Communications, 2012, Volume 152, pp 557–560. 14. A.K. Ghosh , G.D. Dwivedi, B. Chatterjee, B. Rana, A. Barmanb, S. Chatterjee, H.D. Yang, “Role of codoping on multiferroic properties at
room temperature in BiFeO3 ceramic”, Solid State Communications, 2013, Volume 166, pp 22–26.
15. S. Pattanayak, R.N.P. Choudhary, S.R. Shannigrahib, P.R. Dasa, R. Padheea, “Ferroelectric and ferromagnetic properties of Gd-modified BiFeO3”, Journal of Magnetism and Magnetic Materials, 2013, Volume 341, pp 158–164.
16. Y. Lin, Q. Jiang, Y. Wang, C. Nan, L. Chen, J. Yu, “Enhancement of ferromagnetic properties in Bi FeO3 polycrystalline ceramic by La
doping”, Applied Physics Letters, 2007, Volume 90, pp 172507: 1-3. 17. D.H. Wang, W.C. Goh, M. Ning, C.Ong, “Effect of Ba doping on magnetic, ferroelectric, and magnetoelectric properties in mutiferroic
BiFeO3 at
18. Y.F. Cui, Y.G. Zhao, L.B. Luo, J.J. Yang, H. Chang, M.H. Zhu, D. Xie, T. L. Ren, “Dielectric, magnetic, and magnetoelectric properties of La and Ti codoped BiFeO3”, Applied Physics Letters, 2010, Volume 97, pp 222904: 1-3.
19. A.R. Makhdoom , M.J. Akhtar , M.A. Rafiq a, M.M. Hassan, “Investigation of transport behavior in Ba doped BiFeO3”, Ceramics
International, Volume 38, 2012, pp 3829–3834 20. N. Jeon, K. Moon, D. Rout and S. L. Kang,“Enhanced Sintering Behavior and Electrical Properties of Single Phase BiFeO3 Prepared by
Attrition Milling and Conventional Sintering,” Journal of the Korean Ceramic Society, Vol. 49, No. 6, July 2012, pp. 485~492.
21. Szafraniak, M. Polomska, B. Hilczer, A. Pietraszko, and L Kepinski, “Characterization of BiFeO3Nanopowder Obtained by Mechanochemical Synthesis,” Journal of European Ceramic Society, 2007, pp 4399-4402.
22. S. M. Selbach, M. A. Einarsrud, T. Tybell, and T. Grande, “Synthesis of BiFeO3 by Wet Chemical Methods,” Journal of American Ceramic
Society,Volume 90, Issue 11, 2007, pp 3430-3434. 23. M. M. Kumar, V. R. Palkar, K. Srinivas and S.V. Suryanarayana, “Ferroelectricity in a Pure BiFeO3 Ceramic,” Applied Physics Letter,
Volume 76 Issue 19, 2000, pp 2764-2766.
24. M. Valant, A. Axelsson, and N. Alford,“Peculiarities of a Solid-State Synthesis of Multiferroic Polycrystalline BiFeO3,” Chemistry of
Materials, Volume 19,2007, pp 5431-5436.
25. S. V. Kalinin, M. R. Suchomel, P. K. Davies, and D.A. Bonnell, “Potential and Impedance Imaging of Polycrystalline BiFeO3 Ceramics,”
Journal of American Ceramic Society, Volume 85, Issue 12, 2002, pp 3011-3017. 26. N. Jeon, D. Rout, I. W. Kim, and S.J. L. Kang, “Enhanced Multiferroic Properties of Single-phase BiFeO3 Bulk Ceramics by Ho doping,”
Applied Physics Letter, Volume 98, Issue 7, 2011, pp 072901-072903.
27. X. Qi, J. Dho, R. Tomov, M. G. Blamire and J. L. MacManus-Driscoll, “Greatly reduced leakage current and conduction mechanism in aliovalent-ion-doped BiFeO3,” Applied Physics Letters, Volume 86, 2005, pp 062903:1-3.
28. G.L. Yuan, S.W. Or and H.L.W. Chan, “Enhanced Structural transformation and ferroelectric–paraelectric phase transition in Bi1−x Lax
FeO3 (x = 0 – 0.25) multiferroic ceramics,” Journal of Physics D: Applied Physics, Volume 40, 2007, pp 1196. 29. G. L. Yuan, S. W. Or, J. M. Liu and G. z. Liu, “Structural transformation and ferroelectromagneticbehaviour in single-phase
Bi1−xNdxFeO3multiferroic ceramics,” Applied Physics Letters, Volume 89, 2006, pp 052905: 1-3.
30. Z. M. Tian, S. L. Yuan, X. L. Wang, X. F. Zheng, S. Y. Yin, C. H. Wang and L. Liu, “Size effect on magnetic and ferroelectric properties in Bi2Fe4O9 multiferroic ceramics,” Journal of Applied Physics, Volume 106, 2009, pp 103912: 1-4.
21.
Authors: K. Phaninder Vinay, Basheer Ali Sheik, A. Trinadha Rao
Paper Title: Design and Analysis of Slot Antenna Parameters Using HFSS
Abstract: Micro strip slot antenna becomes very popular day by day because of its ease of analysis and fabrication,
low cost, light weight, easy to feed and their attractive radiation characteristics. Although slot antenna has numerous
advantages, it has also some drawbacks such as restricted bandwidth, and a potential decrease in radiation pattern.
Different techniques for bandwidth enhancement of conventional rectangular micro strip antenna are proposed in this
report. By increasing the height of slot, increasing the substrate thickness and decreasing the permittivity of substrate
the %bandwidth is increased. HFSS Software is used for the simulation and design calculation of micro strip slot
antenna. The return loss, VSWR curve, directivity and gain are to be analyzed and evaluated.
Keywords: Probe, Feed, Patch, Antenna, HFSS, Substrate, Coax, Bandwidth.
References: 1. C. A. Balanis, Antenna Theory: Analysis and Design, 3rd ed. New York, NY, USA: Wiley, 2005.
2. D. Pozar and D. Schaubert, “Scan blindness in infinite phased arrays of printed dipoles,” IEEE Trans. Antennas Propag., vol. AP-32, no. 6,pp. 602–610, Jun. 1984.
3. S. Zavosh, “Analysis of circular microstrip patch antennas backed by circular cavities,” Department of Electrical, Computer and Energy
Engineering, ASU, Tempe, AZ, USA, 1993. 4. D. Sievenpiper, “High-impedance electromagnetic surfaces,” Department of Electrical Engineering, UCLA, Los Angeles, CA, USA, 1999.
5. H. Boutayeb, T. Djerafi, and K. Wu, “Gain enhancement of a circularly polarizedmicrostrip patch antenna surrounded by a circular
mushroom- like substrate,” in Proc. EuMC, Sep. 2010, pp. 257–260. 6. H. Boutayeb, T. A. Denidni, K. Mahdjoubi, A.-C.Tarot, A.-R.Sebak, and L. Talbi, “Analysis and design of a cylindrical EBG-based directive
antenna,” IEEE Trans. Antennas Propag., vol. 54, no. 1, pp. 211–219, 2006.
7. J. Bell and M. Iskander, “Effective propagation properties of an enhanced hybrid EBG/ferrite ground plane,” IEEE Antennas Wireless Propag.Lett., vol. 7, pp. 74–77, 2008.
8. J. Bell and M. Iskander, “Equivalent circuit model of an ultrawideband hybrid EBG/ferrite structure,” IEEE Antennas Wireless Propag. Lett.,
vol. 7, pp. 573–576, 2008. 9. Y. Liu, C. G. Christodoulou, P. F.Wahid, andN. E. Buris, “Analysis of frequency selective surfaces with ferrite substrates,” in Proc. Antennas
Propagation Soc. Int. Symp., Jun. 1995, vol. 3, pp. 1640–1643.
10. L. Greetis and E. Rothwell, “A self-structuring patch antenna,” in Proc. IEEE Antennas Propag. Soc. Int. Symp., Jul. 2008, pp. 1–4. 11. C. A. Balanis, Advanced Engineering Electromagnetics, 2nd ed. New York, NY, USA: Wiley, 2012.
12. L. Yang, L. Martin, D. Staiculescu, C. P. Wong, and M. M. Tentzeris, “Comprehensive study on the impact of dielectric and magnetic loss
on performance of a novel flexible magnetic composite material,” in Proc. EuMC, Oct. 2008, pp. 131–134. 13. ANSYS HFSS. ver. 14.0.0, ANSYS, Canonsburg, PA, USA, 2011 [Online].
103-106
22.
Authors: Thayapraba M
Paper Title: Cost Effectiveness of Post - Tensioned and Reinforced Concrete Flat Slab Systems
Abstract: In a developing country like India the benefits of prestressing and particularly of Post-Tensioning are
yet to be recognized. The inherent hurdle is undoubtedly the higher initial investment that is required from the
clients. This has to be overlooked considering the significant benefits of Post-Tensioning and the high benefit-
aspect ratio that can be advantageously procured. In the present study an attempt is made to compare the cost
effectiveness of Post-Tensioned flat slab systems with respect to reinforced concrete flat slab system. Both the
systems were analysed using SAP and MS Excel program was developed based on the design methodology. The
107-109
results indicate that Post Tensioned flat slabs are cheaper than the RCC slab systems for all the spans considered in
the present study.
Keywords: Post Tensioning (PT), Post Tensioned Flat Slab, RCC Flat Slab.
References: 1. Bijan .O.A., and Jennifer D.J., 2003. “Guidelines for Design of Post-Tensioned Floors”, Concrete International. 2. Bijan.O. and Aalami., 2003. “Guidelines for the design of Post-tensioning floor systems” Concrete International 77-83.
3. Gilbert, S. G., Murray, T. K., Scott, R. H. and Cleland, D. J. 2000. “Equivalent frame analysis methods for gravity loads in flat slab
structures”. Journal of the American Concrete Institute, Structures Journal, 97(2),316-321. 4. IS: 1343- 1980. “Indian Standard Code of Practice for Prestressed Concrete”.
5. Lin ,T.Y., and Burns, N., 1981. “Design of Prestressed Concrete Structures”, John Wiley & Sons, New York.
6. Karve.S.R and Shah.V.L, “Limit State Theory and Design of Reinforced Concrete”. 7. Krishna Raju, N., 2007. “Prestressed Concrete”, Fourth Edition, Tata McGraw- Hill Company Ltd., New Delhi.
8. “Post-Tensioning Systems”, 4.90/1, VSL Report, VSL International Ltd., Berne, Switzerland. The various rates considered for the present
study is as follows: 9. Purushothaman, P., 1984. “Reinforced concret Structural elements”, Tata Mcgraw- hill, New Delhi.