Version-1 (July-August 2014)
Ver-1 Ver-2 Ver-3 Ver-4 Ver-5 Ver-6 Ver-7
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Six Sigma and CMMI |
Country | : | India |
Authors | : | Neema Merlin Rodrigues, Anasuya K Lingappa |
: | 10.9790/0661-16410105 |
Keywords: Capability Maturity Model Integrated (CMMI), Six Sigma
[1] Stefan Wagner, Klaus Lochmann, Sebastian Vinter, Andrew Goeb, Michael Klaes, "Quality Models in Practice : A Preliminary Analysis"
[2] Rodney McAdam, Frances Fulton, "The impact of the ISO 9000:2000 quality standards in small software firms", Emerald Insight, 2002
[3] Zhedan Pan, et al., "A six sigma framework for software process improvements and its implementation", 14th Asia-Pacific Software Engineering Conference
[4] Tommy Y Lo, "Quality culture : A product of motivation within organization", Emerald - Managerial Auditing Journal, 2002
[5] Dr. Santwana Chaudhuri, "Knowledge Management in Indian IT Industries", 3rd international conference on information and financial engineering, 2011
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Neighbor-based Data Weight Collaborative Filtering |
Country | : | China |
Authors | : | Xuesong Yin, Jie Yu, Rongrong Jiang |
: | 10.9790/0661-16410610 |
Keywords: Collaborative Filtering, Data Weight, Similarity, Data Sparseness
[1] J. Bobadilla, F. Serradilla, A. Hernando, MovieLens, "Collaborative filtering adapted to recommender systems of e-learning", Knowledge-Based Systems, vol. 22, pp. 261-265, March 2009.
[2] J. Bobadilla, A. Hernando, F. Ortega, J. Bernal, "A framework for collaborative filtering recommender systems", Expert Systems with Applications, vol. 38, pp. 14609-14623, 2011.
[3] M. Wu, C. Chang, R. Liu, "Integrating content-based filtering with collaborative filtering using co-clustering with augmented matrices", Expert Systems with Applications, vol. 41, no. 6, pp. 2754-2761, 2014.
[4] A. Bilge, H. Polat, "A comparison of clustering-based privacy-preserving collaborative filtering schemes", Applied Soft Computing, vol. 13, no. 5, pp. 2478-2489, 2013.
[5] C. Birtolo, D. Ronca, "Advances in Clustering Collaborative Filtering by means of Fuzzy C-means and trust", Expert Systems with Applications, vol. 40, no. 17, pp. 6997-7009, 2013.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Removing Atmospheric Turbulence Using Restoration Algorithm |
Country | : | India |
Authors | : | Vani.M, Shruthi.M.K |
: | 10.9790/0661-16411117 |
[1] W.E.K. Middleton, Vision through the Atmosphere. Univ.of Toronto Press 1958.
[2] M.C. Roggemann and B.M. Welsh, Imaging through Turbulence. CRC Press, 1996.
[3] D.Li, R.M. Mersereau, and S. Simske, "Atmospheric Turbulence- Degraded Image Restoration Using Principal Components
Analysis," IEEE Geoscience and Remote Sensing Letters, vol. 4, no. 3, pp. 340-344, July 2007.
[4] R.N. Tubbs, "Lucky Exposures: Diffraction Limited Astronomical Imaging through the Atmosphere," PhD thesis, Cambridge Univ,
Sept. 2003.
[5] M.A. Vorontsov and G.W. Carhart, "Anisoplanatic Imaging through Turbulent Media: Image Recovery by Local Information
Fusion from a Set of Short-Exposure Images," J. Optical Soc. Am. A, vol. 18, no. 6, pp. 1312-1324, June 2001.
[6] X. Zhu and P. Milanfar, "Image Reconstruction from Videos Distorted by Atmospheric Turbulence," Proc. SPIE Electronic
Imaging Conf. Visual Information Processing and Comm., Jan. 2010.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In this work, we studied the effect of thermal radiation on unsteady gravity flow of a power-law fluid with viscous dissipation through a porous medium. The modified Darcy's law is considered together with the equation of energy transfer in such media. It is assumed that the viscosity is temperature-dependent. We transformed the governing partial differential equations into ordinary differential equations in terms of a suitable similarity variable. We employed Galerkin weighted residual method to solve the resulting non-linear equations. The results show the effects of thermal radiation parameter and other physical parameters involve in the system of flow.
Keywords: Unsteady gravity flow, weighted residual method, Power-law fluid and thermal radiation
[1] Kumar, B. and Prasad (2014): Pulsatile flow through a porous medium. J. of Appl. Fluid Mech.,Vol.7,No.1,pp63-74,2014.
[2] Vajravelu, K, Prasad, K.V. Santh, S.R. and Umesh,V. (2014): Fluid flow and heat transfer over a permeable stretching cylinder. J.
of Applied Fluid Mech.,Vol.7,No.1,pp 111-120,2014.
[3] Salem, A.M. (2013):The effects of variable viscosity, viscous dissipation and chemical reaction on heat and mass transfer flow of
MHD micropolar fluid along a permeable stretching sheet in a non-Darcian porous medium. Journal of Mathematical Problems in
Engineering,Vol.,2013.
[4] GitimaPatowanj (2012): Effect of variable viscosity and thermal conductivity of micro polar fluid in a porous channel in the
presence of magnetic field. Int. J. of Basic Sciences and Social Sciences , Vol.3, pp.69-77.
[5] Rafael CortellBataller (2008): Unsteady gravity flows of a power- law fluid through a porous medium. Applied Maths.and
Computation 196 pp356-362.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Unsteady gravity flow; Porous media; Non – Newtonian power- law fluids and Finite difference method.
[1] B. A. Peter and R.O.Ayeni(2011): A note on unsteady temperature equation for gravity flow of a power -law fluids through a
porous medium. Journal of the Nigerian Association of Mathematical Physics (NAMPS). Vol.18, pp 181-186.
[2] R. Cortell Bataller (2008): Unsteady gravity flows of a power-law fluid through a porous medium. Applied Mathematics and
Computation. 196, pp356-362.
[3] B.I.Olajuwon and R.O.Ayeni(2004):Flow of a power-law fluid with memory past an infinite plate. Journal of the Nigerian
Association of Mathematical Physics (NAMPS). Vol.8, pp 161.
[4] J.P. Pascal and H. Pascal (1993): Similarity solutions to some gravity flows of non-Newtonian fluids through a porous medium, Int.
J. Non-Linear Mech. 38, pp 157 – 167.
[5] B.A.Peter and R.O.Ayeni(2011): Analytical solution of unsteady gravity flow of a power -law fluids through a porous medium.
Journal of the Nigerian Association of Mathematical Physics (NAMPS), Vol.19 pp 223-228
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Enhanced Adaptive Acknowledgement method for detecting malicious nodes in MANETs |
Country | : | India |
Authors | : | Akshatha.Y, Dr Rashmi M.Jogdand |
: | 10.9790/0661-16413238 |
Abstract: Mobile Ad hoc Network is a collection of mobile nodes that communicate with each other without base station. These networks are developed instantly or on-demand when some nodes come in the mobility range of each other and decide to cooperate for data transfer and communication. MANETs are more vulnerable to various types of attacks due to its deployment nature. The security in the mobile ad hoc network is very hard to achieve because of its fundamental characteristics such as dynamic topology, open medium, limited power, limited bandwidth and remote transmission. The prevention mechanisms like cryptography or authentication alone cannot detect malicious nodes in Ad-hoc networks. Hence we propose and implement a new intrusion detection system named Enhanced Adaptive Acknowledgement method specially designed for MANETs. Using MRA scheme, this method is capable of detecting malicious nodes even in the presence of false misbehavior report. Compared to other detection methods, this method is capable of detecting high malicious nodes and hence increases the security and network performances.
Keywords: Mobile ad-hoc network, Intrusion detection system, Enhanced Adaptive Acknowledgement, AODV, MD5 hash algorithm.
[1] EAACK – A Secure Intrusion Detection System for MANETs Elhadi M. Shakshuki, Senior Member, IEEE, Nan Kang and
Tarek R. Sheltami, Member, IEEE
[2] Investigating Intrusion and Detection Systems in MANET and Comparing IDSs for Detecting Misbehaving Nodes Marjan
Kuchaki Rafsan,Ali Movaghar and Faroukh Koroupi,World Academic of Science Engineering and Technology 44 2008.
[3] L. Zhou, Z.J. Haas, Cornell Univ., "Securing ad hoc networks," IEEE Network, Nov/Dec 1999.
[4] [5] S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. 6th
Annu. Int. Conf. Mobile Comput. Netw., Boston, MA, 2000, pp. 255–265.
[5] "A study of different types of attacks on multicast in mobile ad hoc networks" Hoang Lan Nguyen, Uyen Trang Nguyen,
Elsevier AdHoc Networks(2008) 32-46. [7] D. Johnson and D. Maltz, "Dynamic Source Routing in ad hoc wireless
networks," in Mobile computing. Norwell, MA: Kluwer, 1996, ch. 5, pp. 153–181.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Auto-Scaling, Load Balancing and Monitoring As service in public cloud |
Country | : | India |
Authors | : | Gopal Dhaker, , Dr. Savita Shiwani |
: | 10.9790/0661-16413946 |
Keywords: load balancing, autoscaling, latency based routing, resource monitoring, cloud computing.
[1] Eddy Caron: Auto-Scaling, Load Balancing and Monitoring in Commercial and Open-Source Clouds
[2] Miss.Rudra Koteswaramma : Client-Side Load Balancing and Resource Monitoring in Cloud , ISSN: 2248-9622
[3] N. Ajith Singh, M. Hemalatha, "An approach on semi distributed load balancing algorithm for cloud computing systems" International Journal of Computer Applications Vol-56 No.12 2012.
[4] Nitika, Shaveta, Gaurav Raj, International Journal of advanced research in computer engineering and technology Vol-1 issue-3 May-2012
[5] Zenon Chaczko, Venkatesh Mahadevan, Shahrzad Aslanazadeh, and Christopher, IPCSIT Vol-14, IACSIT Press Singapore 2011
[6] Ali M. Alakeel, A Guide to Dynamic Load Balancing in Distributed
[7] Ali M. Alakeel, A Guide to Dynamic Load Balancing in Distributed Computer Systems, IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.6, June 2010.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Evaluate the Effectiveness of Test Suite Prioritization Techniques Using APFD Metric |
Country | : | India |
Authors | : | Mr. Anil Mor |
: | 10.9790/0661-16414751 |
Keywords: Regression Testing, Test case prioritization, Average Percentage of Fault Detection (APFD), APFD Metric
[1] Elbaum, S. G., Malishevaky, A. G., & Rothermel, G. (2002). Test Case Prioritization: A Family of Emperical Studies. IEEE Transaction on Software Engineering .
[2] Elbaum, S., Gable, D., & Rothermel, G. (2001). Understanding and Measuring the Sources of Variation in the Prioritization of Regression Test Suites. International Software Metrics Symposium.
[3] G, R., R, U., C., C., & M.J., H. (2001). Prioritization for Regression Testing. IEEE Transation for Software Engineering .
[4] H, D., & G, R. (2006). On the Use of Mutation Faults in Emperical Assesment of Test Case Prioritization Techniques. IEEE Transaction of Software Engineering .
[5] Hou, S. S., Zhang, L., Xie, T., & Sun, J. S. (2008). Quota-Constrained Test Case Prioritization for Regression Testing of Service Centric Systems. IEEE International Conference on Software Maintenance (ICSM 2008).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Comparing Ethernet and Soft RoCE for MPI Communication |
Country | : | India |
Authors | : | Gurkirat Kaur, Manoj Kumar, Manju Bala |
: | 10.9790/0661-16415258 |
Keywords: Ethernet, RDMA, RoCE, Soft RoCE
[1] Basem Madani, raed al-Shaikh, "Performance Benchmark and MPI Evaluation Using Westmere based Infiniband HPC cluster", IJSSST, Volume 12, Number 1, page no 20-26, Feb. 2011
[2] Jalel Chergui, Isabelle Dupays, Denis Girou, Pierre-FrancoisLavallee, dimitri Lecas, Philippe Wautelet, "Message Passing Interface (MPI)", May 2013.
[3] (2013), The Wikipedia Website.[Online] available at: http://en.wikipedia.org/wiki/RDMA_over_Converged_Ethernet
[4] (2013), The System Fabrics Works Website, [Online] Available at http://www.systemfabricworks.com/news/system-fabric-works-ofed-distribution-supports-rdma- over-converged-ethernet-roce
[5] (2002-2014), The mvapich website. [Online] available at http://mvapich.cse.ohio-state.edu
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In today's world most of the mobile have the use more than its basic functionality. As mobile becomes more advance to be have same architecture same as desktop system. Hence this feature should be used as to create application that controls the desktop nodes in the network with help of client server architecture. This paper purpose x The application connects the system node by server and server connects to android mobile which will easy to control network from any mobile place. The application having functionality to capture a screenshot of client node to know the state of system which will have to capture picture and send over network which will required some time. By adding compression technique for image as screenshot which helps to send faster over the network. This all implemented using JAVA and servlets which also increase performance
Keywords: Android, Remote control, JAVA- Servlets, image compression.
[1] Remote Control of Mobile Devices in Android Platform , Angel Gonzalez Villan, and Josep Jorba Esteve, , IEEE 2012
[2] PocketDroid - A PC Remote Control Chaitali Navasare, Deepa Nagdev and Jai Shree, IPCSIT vol. 37 (2012)
[3] Design and Application of Remote Control System Using Mobile Phone with JNI Interface Lingyan Bi1, Weining Wang1, Haobin Zhong1,Wenxuan Liu ,International Conference on Embedded Software and Systems Symposia (ICESS2008) .
[4] Vnc Architecture Based Remote Desktop Access Through Android Mobile Phones, Archana Jadhav , International Journal of Advanced Research in Computer and Communication Engineering Vol. 1, Issue 2, April 2012.
[5] Adam, Skurski, Bartlomiej Swiercz, "VNC- based Remote Control for Symbian OS smartphones", MIXDES (Mixed Design of Integrated Circuits and Systems) 2009, June 25-27, 2009
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Implementation of Ecc Using Socket Programming In Java |
Country | : | India |
Authors | : | Ms. Shubhi Gupta, Ms. Swati Vashisht |
: | 10.9790/0661-16416568 |
Abstract: Elliptic Curve Cryptography (ECC) has attracted the attention of researchers and developers as it has got robust mathematical structure and higher security compared to algorithms like RSA (Rivest Adleman and Shameer Public key Algorithm). It increases the security compared to RSA or at least give comparable security with lesser key size than RSA. This research shows the implementation of ECC algorithm on a data that is sent from one computer device to another connected through LAN using socket programming in Java.
Index terms: ECC, Socket programming, ASCII
[1]. William Stallings, Cryptography and network security, 2nd edition, Prentice Hall publications
[2]. B.Schiener, Applied Cryptography. John Wiley publications and sons, 2nd edition, 1996
[3]. Victor Miller, "Uses of elliptic curves in cryptography", Advances in cryptology, 1986
[4]. N.Koblitz, A course in number theory and cryptography. [5]. http://www.tutorialspoint.com/java/java_networking.htm
[6]. Kohlekar Megha, Jadhav Anita, 2011." Implementation of Elliptic Curve Cryptography on Text and Image", International Journal of Enterprise Computing and Business Systems, Vol. 1 Issue 2 July 2011.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Reconfigurable Model In Wireless Sensor Network for saving wild life |
Country | : | India |
Authors | : | Milan Kr. Singha, Mr. Amit Bindal |
: | 10.9790/0661-16416973 |
Abstract: The paper presents the design and evaluation of Wireless Sensor Network for prompt detection of forest fires. At first it presents the vital aspects in sculpting forest fires. It is being ensured by scrutinizingthe fire endures index (FEI) Structure, and spectacle how its diverseconstituents can be castoff in deceitful efficient fire revealing structure. FEI structure is one ofbestample forest fire vulnerability rating systems in NorthAmerica and it is backed by numerous decades of forestry exploration. The analysis of the FEI System could be of concernin its peculiarfactual to scholar'swaged in sensor networkarea and sensor industrialists who can optimize the communication and sensing segments of their yields to enhance fit in forest fire revealing systems. Forest fire is revealing delinquent as k-coverage problem in Wireless Sensor Networks. In accumulation, itpresents a simple data aggregation scheme based on the FEI System. This data aggregation scheme ominously prolongs the network epoch, because it delivers statistics that is of concerntosolicitation. Itvalidates numerous aspects of this design expending simulation.
Keywords: Wireless Sensor Network (WSN), Re-Configurable, Cluster Head
[1] Mohamed Hefeeda and Majid Bagheri.Wireless Sensor Networks for Early Detection of Forest Fires, School of Computing Science, Simon Fraser University, Surrey, BC, Canada.
[2] I. Akyildiz,S. Weilian,Y. Sankarasubramaniam, andE. Cayirci.A survey on sensor networks IEEE Communications Magazine, 40(8):102-114, August 2002.
[3] A. Mainwaring, D. Culler, J. Polastre,R. Szewczyk and J. Anderson.Wireless sensor networks for habitat intensive care.In Proc. of the First International Workshop on Wireless Sensor Networks and Applications (WSNA'02), pages88–97, Atlanta, Georgia, September 2002.
[4] B. Son, Y. Her, and J. Kim. A design and implementationof foresty-vigors surveillance system based onwireless sensornetworks for South Korea mountains. International Journalof Computer Science and NetworkSecurity (IJCSNS),6(9):124–130, 2006.
[5] D. M. Doolin and N. Sitar. Wireless sensors for wildfire monitoring. In Proc. of SPIE Symposium on SmartStructures and Materials, pages 477–484, San Diego, CA, March2005.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Predict Fault-Proneness Module Using Pattern Recognization (A Review) |
Country | : | India |
Authors | : | Puneet Chopra, Er. Gurdeep Kaur |
: | 10.9790/0661-16417479 |
Abstract: Background: The accurate prediction of where faults are likely to occur in code can help direct test effort, reduce costs and improve the quality of software. Objective of this paper is We investigate how the context of models, the independent variables used and the modeling techniques applied, influence the performance of fault prediction models. Method on We used a systematic literature review to identify 208 fault prediction studies published from January 2000 to December 2012. We synthesise the quantitative and qualitative results of 36 studies which report sufficient contextual and methodological information according to the criteria we develop and apply. Combinations of independent variables have been used by models that perform well. Feature selection has been applied to these combinations when models are performing particularly well. Conclusion: The methodology used to build models seems to be influential to predictive performance. Although there are a set of fault
Keywords: Systematic Literature Review, Software Fault Prediction
[1]. T.M. Khoshgoftaar and N. Seliya, The Necessity of Assuring Quality in Soft-ware Measurement Data, Proc. 10th Int'l Symp. Software Metrics (MET-RICS 04), IEEE CS Press, 2004, pp. 119_130.
[2]. L. Guo et al., "Robust Prediction of Fault Proneness by Random Forests," Proc. 15th Int'l Symp. Software Reliability Eng. (ISSRE 04), IEEE CS Press, 2004, pp. 417_428.
[3]. A.G. Koru and J. Tian, "An Empirical Comparison and Characterization of High Defect and High Complexity Modules," J. Systems and Software, vol.67, no. 3, 2003, pp. 153_163.
[4]. J.S. Shirabad and T.J. Menzies, "The PROMISE Repository of Software Engineering Databases," School of Information Technology and Engineering, University of Ottawa, Canada, 2005.
[5]. Lan Guo, Yan Ma, Bojan Cukic, Harshinder Singh, "Robust Prediction of Fault-proneness of Random Forests".
[6]. An H. Witten and Eibe Frank, "Data Mining- Practical Machine learning Tools and Techniques," Second Edition, © 2005 by Elsevier Inc.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The explosion of data leads to the problem on how information should be retrieved accurately and effectively. To address this issue, ontology's are widely used to represent user profiles in personalized web information gathering. As a model for knowledge description and formalization, ontology's are widely used to represent user profiles in personalized web information gathering. When representing user profiles, many models have utilized only knowledge from either a global knowledge base or local knowledge base. Ontology model learns user profiles from both a world knowledge base and local knowledge base. A non-content based customized ontology model is proposed for knowledge representation and reasoning over user profiles. This model generates user Local Instance Repository which includes non-content based descriptors referring to the subjects. This model has improvement over former models in hit/miss ratio, precision and recall parameters.
Keywords: ontology model ,customize, user profile, clustering
[1]. Xiaohui Tao, Yuefeng Li and NingZhong, ‖A Personalized Ontology Model for Web Information Gathering‖, IEEE Transactions on Knowledge and Data Engineering, vol.23, no.4, April 2011.
[2]. S. Gauch, J. Chaffee, and A. Pretschner,― Ontology-Based Personalized Search―, Web Intelligence and Agent Systems, vol. 1, nos. 3/4 , pp.219-234, 2003.
[3]. X. Tao, Y. Li, N. Zhong, and R. Nayak, ―Automatic Acquiring Training Sets for Web Information Gathering,‖ Proc. IEEE/WIC/ACM Int'l Conf. Web Intelligence, pp. 532-535, 2006.
[4]. Y. Li and N. Zhong, ―Web Mining Models and Its Applications for Information Gathering‖ ,Knowledge-Based Systems, vol. 17, pp.207-217, 2004.
[5]. S.E. Robertson and I. Soboroff, ―The TREC 2002 Filtering Track Report,‖ proc. Text Retrieval Conf., 2002 .