IJMIE Vol-1 Issue-6 Abstract
-
Upload
editorijmie -
Category
Documents
-
view
222 -
download
0
Transcript of IJMIE Vol-1 Issue-6 Abstract
-
8/3/2019 IJMIE Vol-1 Issue-6 Abstract
1/31
International Journal of Management, IT & Engineering(ISSN: 2249-0558)CONTENTS
Sr.
No.TITLE & NAME OF THE AUTHOR (S)
Page
No.
1Quality Improvement through SPC Techniques: A Case Study.Dr. D. R. Prajapati
6-7
2
Maximization of Return on Investment (ROI) by Hyper Productive Software
Development Through Scrum.
Muhammad Inam Shahzad, Tasleem Mustafa, Fahad Jan, Muhammad Ashraf and AhmadAdnan
8-9
3The design of a Trusted Authentication scheme for Wimax Network.Mr. Rajesh Shrivastava and Deepak Kumar Mehto
10-11
4Highly Quantitative Mining Association Rules with Clustering.N. Venkatesan
12-13
5An Efficient Routing Scheme for ICMN.K. Soujanya, R. Samba Siva Nayak and M. Rajarajeswari
14-15
6
Controlling the Menace of Unsolicited Electronic Mails Contemporary Developments
and Indian Perspectives.Sachin Arora and Dr. Dipa Dube
16-17
7Comparing Search Algorithms of Unstructured P2P Networks.Prashant K. Shukla, Piyush K. Shukla and Prof. Sanjay Silakari
18-19
8Determination of Lot Size in the Construction of Six sigma based Link Sampling Plans.R. Radhakrishnan and P. Vasanthamani
20-21
9
Construction of Mixed Sampling Plans Indexed Through Six Sigma Quality Levels with
Chain Sampling Plan-(0, 1) as Attribute Plan.R. Radhakrishnan and J. Glorypersial
22-23
10Analysis of optical soliton propagation in birefringent fibers.Ch. Spandana, D. ajay kumar and M. Srinivasa Rao
24-25
11Design of Smart Hybrid Fuzzy Pid Controller for Different Order Process Control.Anil Kamboj and Sonal Gupta
26-27
12Privacy and Trust Management in Cloud Computing.Mahesh A. Sale and Pramila M. Chawan
28-29
13Sec.AODV for MANETs using MD5 with Cryptography.Mr. Suketu D. Nayak and Mr. Ravindra K. Gupta
30-31
-
8/3/2019 IJMIE Vol-1 Issue-6 Abstract
2/31
IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
International Journal of Management, IT and Engineering
http://www.ijmra.us
2
November
2011
Chief PatronDr. JOSE G. VARGAS-HERNANDEZ
Member of the National System of Researchers, Mexico
Research professor at University Center of Economic and Managerial Sciences,University of Guadalajara
Director of Mass Media at Ayuntamiento de Cd. Guzman
Ex. director of Centro de Capacitacion y Adiestramiento
PatronDr. Mohammad Reza Noruzi
PhD: Public Administration, Public Sector Policy Making Management,Tarbiat Modarres University, Tehran, Iran
Faculty of Economics and Management, Tarbiat Modarres University, Tehran, Iran
Young Researchers' Club Member, Islamic Azad University, Bonab, Iran
Chief AdvisorsDr. NAGENDRA. S.Senior Asst. Professor,
Department of MBA, Mangalore Institute of Technology and Engineering, Moodabidri
Dr. SUNIL KUMAR MISHRAAssociate Professor,
Dronacharya College of Engineering, Gurgaon, INDIA
Mr. GARRY TAN WEI HANLecturer and Chairperson (Centre for Business and Management),
Department of Marketing, University Tunku Abdul Rahman, MALAYSIA
MS. R. KAVITHAAssistant Professor,
Aloysius Institute of Management and Information, Mangalore, INDIA
Dr. A. JUSTIN DIRAVIAMAssistant Professor,
Dept. of Computer Science and Engineering, Sardar Raja College of Engineering,
Alangulam Tirunelveli, TAMIL NADU, INDIA
-
8/3/2019 IJMIE Vol-1 Issue-6 Abstract
3/31
IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
International Journal of Management, IT and Engineering
http://www.ijmra.us
3
November
2011
Editorial BoardDr. CRAIG E. REESE
Professor, School of Business, St. Thomas University, Miami Gardens
Dr. S. N. TAKALIKARPrincipal, St. Johns Institute of Engineering, PALGHAR (M.S.)
Dr. RAMPRATAP SINGHProfessor, Bangalore Institute of International Management, KARNATAKA
Dr. P. MALYADRIPrincipal, Government Degree College, Osmania University, TANDUR
Dr. Y. LOKESWARA CHOUDARYAsst. Professor Cum, SRM B-School, SRM University, CHENNAI
Prof. Dr. TEKI SURAYYAProfessor, Adikavi Nannaya University, ANDHRA PRADESH, INDIA
Dr. T. DULABABUPrincipal, The Oxford College of Business Management, BANGALORE
Dr. A. ARUL LAWRENCE SELVAKUMARProfessor, Adhiparasakthi Engineering College, MELMARAVATHUR, TN
Dr. S. D. SURYAWANSHILecturer, College of Engineering Pune, SHIVAJINAGAR
Dr. S. KALIYAMOORTHYProfessor & Director, Alagappa Institute of Management, KARAIKUDI
Prof S. R. BADRINARAYAN
Sinhgad Institute for Management & Computer Applications, PUNE
Mr. GURSEL ILIPINARESADE Business School, Department of Marketing, SPAIN
Mr. ZEESHAN AHMEDSoftware Research Eng, Department of Bioinformatics, GERMANY
-
8/3/2019 IJMIE Vol-1 Issue-6 Abstract
4/31
IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
International Journal of Management, IT and Engineering
http://www.ijmra.us
4
November
2011
Mr. SANJAY ASATIDept of ME, M. Patel Institute of Engg. & Tech., GONDIA(M.S.)
Mr. G. Y. KUDALEN.M.D. College of Management and Research, GONDIA(M.S.)
Editorial Advisory BoardDr. MANJIT DAS
Assistant Professor, Deptt. of Economics, M.C.College, ASSAM
Dr. ROLI PRADHANMaulana Azad National Institute of Technology, BHOPAL
Dr. N. KAVITHAAssistant Professor, Department of Management, Mekelle University, ETHIOPIA
Prof C. M. MARANAssistant Professor (Senior), VIT Business School, TAMIL NADU
Dr. RAJIV KHOSLAAssociate Professor and Head, Chandigarh Business School, MOHALI
Dr. S. K. SINGHAsst. Professor, R. D. Foundation Group of Institutions, MODINAGAR
Dr. (Mrs.) MANISHA N. PALIWALAssociate Professor, Sinhgad Institute of Management, PUNE
Dr. (Mrs.) ARCHANA ARJUN GHATULEDirector, SPSPM, SKN Sinhgad Business School, MAHARASHTRA
Dr. NEELAM RANI DHANDAAssociate Professor, Department of Commerce, kuk, HARYANA
Dr. FARAH NAAZ GAURIAssociate Professor, Department of Commerce, Dr. Babasaheb Ambedkar Marathwada
University, AURANGABAD
-
8/3/2019 IJMIE Vol-1 Issue-6 Abstract
5/31
IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
International Journal of Management, IT and Engineering
http://www.ijmra.us
5
November
2011
Prof. Dr. BADAR ALAM IQBALAssociate Professor, Department of Commerce, Aligarh Muslim University, UP
Dr. CH. JAYASANKARAPRASADAssistant Professor, Dept. of Business Management, Krishna University, A. P., INDIA
Associate EditorsDr. SANJAY J. BHAYANI
Associate Professor ,Department of Business Management, RAJKOT (INDIA)
MOID UDDIN AHMADAssistant Professor, Jaipuria Institute of Management, NOIDA
Dr. SUNEEL ARORAAssistant Professor, G D Goenka World Institute, Lancaster University, NEW DELHI
Mr. P. PRABHUAssistant Professor, Alagappa University, KARAIKUDI
Mr. MANISH KUMARAssistant Professor, DBIT, Deptt. Of MBA, DEHRADUN
Mrs. BABITA VERMAAssistant Professor, Bhilai Institute Of Technology, DURG
Ms. MONIKA BHATNAGARAssistant Professor, Technocrat Institute of Technology, BHOPAL
Ms. SUPRIYA RAHEJAAssistant Professor, CSE Department of ITM University, GURGAON
-
8/3/2019 IJMIE Vol-1 Issue-6 Abstract
6/31
IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
International Journal of Management, IT and Engineering
http://www.ijmra.us
6
November
2011
Quality Improvement through SPCTechniques: A Case Study
Dr. D. R. PrajapatiAsst. Professor,
Deptt. of Mechanical Engineering,PEC University of Technology (formerly Punjab Engineering College),
Chandigarh (India).
Title
Author(s)
-
8/3/2019 IJMIE Vol-1 Issue-6 Abstract
7/31
IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
International Journal of Management, IT and Engineering
http://www.ijmra.us
7
November
2011
ABSTRACT:
Statistical process Control (SPC) can be applied most frequently to controlling manufacturing
lines but it may be equally applied to any process with a measurable output. Key tools in SPC are
control charts and cause & effect diagrams focused on continuous improvement. In this paper, an
attempt has been made to implement the some SPC techniques in the industry, producing the
Tractors parts in India. The power of SPC lies in the ability to examine a process and the
sources of variation in that process, using tools that give weightage to objective analysis over
subjective opinions and that allow the strength of each source to be determined numerically.
Only two main tools i.e. cause and effect diagram and control charts are implemented in this
industry out of seven SPC tools. The present work deals with the study of defects in Foot Board
assembly, Foot step assembly, Fuel tank assembly and Fender of Radiator. After implementing
the required suggestions/recommendations for radiator assembly, it is found that process
capability is improved and it is greater than required for 400 numbers of observations.
Key Words: Cause and effect diagram, X and R charts, Process Capability, Process Capability
Index and Percentage rejection
http://en.wikipedia.org/wiki/Control_charthttp://en.wikipedia.org/wiki/Continuous_Improvement_Processhttp://en.wikipedia.org/wiki/Continuous_Improvement_Processhttp://en.wikipedia.org/wiki/Control_chart -
8/3/2019 IJMIE Vol-1 Issue-6 Abstract
8/31
IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
International Journal of Management, IT and Engineering
http://www.ijmra.us
8
November
2011
MAXIMIZATION OF RETURN ON INVESTMENT(ROI) BY HYPER PRODUCTIVE SOFTWARE
DEVELOPMENT THROUGH SCRUM
Muhammad InamShahzad
Student of MS (CS)
University ofAgriculture,
Faisalabad, Pakistan
Assistant Manager(Programming/System
Analysis),
FESCO ComputerCenter, Faisalabad,
Pakistan
Tasleem MustafaChairman
Department ofComputer Science,
University ofAgriculture,
Faisalabad, Pakistan
Fahad JanLecturer
Department ofComputer Science,
University ofAgriculture,
Faisalabad, Pakistan
MuhammadAshraf
Computer Teacher
Education Department,
Government of Punjab,
Nankana Sahib,Pakistan
Ahmad AdnanDepartment of
Computer Science,
University ofAgriculture,
Faisalabad, Pakistan
Title
Author(s)
-
8/3/2019 IJMIE Vol-1 Issue-6 Abstract
9/31
IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
International Journal of Management, IT and Engineering
http://www.ijmra.us
9
November
2011
ABSTRACT:
The Research paper concentrated on the Scrum and focused on how to maximize the return on
investment while developing the software especially in the IT (Information Technology) industry
of Pakistan. The purpose of the study was to propose improvements in the software development
methods. A case study was performed by using two different methods for the development of the
project in the computer Centre of Faisalabad Electric Supply Company Faisalabad. The existing
method of development in FESCO computer Centre was Lwei-Scrum having many flaws and
drawbacks. In order to overcome these drawbacks a new approach of Scrum was applied in
FESCO. The new approach was called as Modified Light Weight Scrum (MLwei-Scrum). The
role of Scrum master and weekly scrum meeting was added in the Lwei-Scrum and then by
obtaining the results in respect of the return on investment some conclusions were drawn.
MLwei-Scrum gave better results than Lwei-Scrum. It is expected that the new approach will be
accepted in Pakistan IT Industry as this will be helpful to maximize the return on investments.
Keywords: Scrum, Lwei-Scrum, MLwei-Scrum, ROI (Return On Investment), FESCO, Agile
Manifesto.
-
8/3/2019 IJMIE Vol-1 Issue-6 Abstract
10/31
IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
International Journal of Management, IT and Engineering
http://www.ijmra.us
10
November
2011
The design of a Trusted Authenticationscheme for Wimax Network
Mr. Rajesh ShrivastavaAsst. Professor,
Comp. Sci. & Engg. Deptt.,
Shri Ram Institute of Technology,
Jabalpur
Deepak Kumar MehtoM.E. (S.S.),
Shri Ram Institute of Technology,
Jabalpur
Title
Author(s)
-
8/3/2019 IJMIE Vol-1 Issue-6 Abstract
11/31
IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
International Journal of Management, IT and Engineering
http://www.ijmra.us
11
November
2011
Abstract:
As a promising broadband wireless technology, WiMAX has many salient advantages over such
as: high data rates, security, and mobility. Many sophisticated authentication and encryption
techniques have been embedded into WiMAX but it still exposes to various attacks in.
IEEE802.16 provides a security sublayer in the MAC layer to address the privacy issues across
the fixed BWA (Broadband Wireless Access).In this paper, we first overview the IEEE802.16
standard, and then investigate possible attacks on the basic PKMprotocol in IEEE802.16. We
also give possible solutions to counter those attacks.
Key Terms: Wimax, , PKMv1,PKMv2, User Authentication etc.
-
8/3/2019 IJMIE Vol-1 Issue-6 Abstract
12/31
IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
International Journal of Management, IT and Engineering
http://www.ijmra.us
12
November
2011
HIGHLY QUANTITATIVE MINING ASSOCIATIONRULES WITH CLUSTERING
N. VenkatesanDepartment of IT,
Bharathiyar College of Engineering and Technology,
Karaikal.
Title
Author(s)
-
8/3/2019 IJMIE Vol-1 Issue-6 Abstract
13/31
IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
International Journal of Management, IT and Engineering
http://www.ijmra.us
13
November
2011
Abstract:
Data mining is a step in the knowledge discovery process consisting of certain data mining
algorithms that, under some acceptable computational efficiency limitations, finds patterns or
models in data. Association rule analysis starts with transactions containing one or more products
or service offerings and some rudimentary information about the transaction. This paper
describes the clustering in association rules using quantitative attributes, which are expressive
multi-dimensional generalized association rules for university admission. University database
which is vast and which has interrelated item sets is chosen for mining. Quantitative attributes
can have a very wide range of values defining their domain. 2-Dimensional quantitative
association rules predicting the condition on the right hand side, given the quantitative attributes
age, status and citizen. In this method age is the main criteria for quantitative process. The
Strong association rules are obtained by this prescribed method.
Keywords: Market Basket Analysis, eclat algorithm, Quantitative Association Rule, Clustering,
Binning.
-
8/3/2019 IJMIE Vol-1 Issue-6 Abstract
14/31
IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
International Journal of Management, IT and Engineering
http://www.ijmra.us
14
November
2011
AN EFFICIENT ROUTING SCHEME FOR ICMN
K. SOUJANYAAssistant Professor,
Department of ECE,Sir C R Reddy Engineering
College
R. SAMBA SIVANAYAKHOD,
Department of ECE,
Don Bosco Institute of Tech& Science
M. RAJARAJESWARIDepartment of ECE,
Sir C R Reddy EngineeringCollege
Title
Author(s)
-
8/3/2019 IJMIE Vol-1 Issue-6 Abstract
15/31
IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
International Journal of Management, IT and Engineering
http://www.ijmra.us
15
November
2011
ABSTRACT:
In this paper, intermittently connected mobile networks are sparse wireless networks
where most of the time there does not exist a complete path from the source to the destination.
These networks fall into the general category of Delay Tolerant Networks. There are many real
networks that follow this paradigm, for example, wildlife tracking sensor networks, military
networks, inter-planetary networks, etc. proposed efforts to significantly reduce the overhead of
flooding-based schemes has often been Plagued by large delays. With this in mind, we introduce
a new routing scheme, called Spray and Wait because it sprays a number of copies into the
network, & then waits till one of these nodes meets the destination. Using theory and
simulations we show that Spray and Wait outperforms all existing schemes with respect to
average message delivery delay and number of transmissions per message delivered; its overall
performance is close to the optimal scheme. Furthermore, it is highly scalable retaining good
performance under a large range of scenarios, unlike other schemes.
Keywords: Intermittently connected mobile networks, Delay Tolerant Networks
-
8/3/2019 IJMIE Vol-1 Issue-6 Abstract
16/31
IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
International Journal of Management, IT and Engineering
http://www.ijmra.us
16
November
2011
CONTROLLING THE MENACE OF UNSOLICITED ELECTRONICMAILS CONTEMPORARY DEVELOPMENTS AND INDIAN
PERSPECTIVES
Sachin AroraStudent,
Rajiv Gandhi School of IntellectualProperty law,
IIT Kharagpur, 721302, West Bengal.
Dr. Dipa DubeAssistant Professor,
Rajiv Gandhi School of IntellectualProperty law,
IIT Kharagpur, 721302, West Bengal
Title
Author(s)
-
8/3/2019 IJMIE Vol-1 Issue-6 Abstract
17/31
-
8/3/2019 IJMIE Vol-1 Issue-6 Abstract
18/31
IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
International Journal of Management, IT and Engineering
http://www.ijmra.us
18
November
2011
Comparing Search Algorithms ofUnstructured P2P Networks
Prashant K. ShuklaAsst. Prof.,Deptt. of IT, SIRT,
Bhopal, M.P., India
Piyush K. ShuklaAsst. Prof.,Deptt. of CSE, UIT,
RGPV, Bhopal, M.P.,India
Prof. Sanjay SilakariDeptt. of CSE, UIT,RGPV, Bhopal, M.P.,
India
Title
Author(s)
-
8/3/2019 IJMIE Vol-1 Issue-6 Abstract
19/31
IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
International Journal of Management, IT and Engineering
http://www.ijmra.us
19
November
2011
Abstract:
Computing has passed through many stages since the birth of the first computing machines. A
centralized solution has one component that is shared by users all the time. All resources are
accessible, but there is a single point of control as well as a single point of failure. A distributed
system is a group of autonomous computers connected to a computer network, which appears to
the clients of the system as a single computer.
Distributed system software allows computers to manage their activities and to share the
resources of the system, so that clients recognize the system as a single, integrated computing
facility. Opportunity to attach components improves the availability, reliability, fault tolerance
and performance of the system. In such systems, the methods for minimizing communication and
computation cost are significant. The widely used clientserver model is an example of adistributed system. In this model, the servers are optimized to offer services to several clients. A
peer-to-peer network is also a good example of a distributed system. In peer-to-peer network, we
cannot force a peer to remain online until a file is completely downloaded; therefore it is
important to choose a node, which is trustworthy by nature.
Keywords: Multi-tire differential search, unstructured P2P networks, OPNET
-
8/3/2019 IJMIE Vol-1 Issue-6 Abstract
20/31
IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
International Journal of Management, IT and Engineering
http://www.ijmra.us
20
November
2011
Determination of Lot Size in theConstruction of Six sigma based Link
Sampling Plans
R. RadhakrishnanAssociate Professor in Statistics,
PSG College of Arts and Science,
Coimbatore 641 014,
Tamilnadu, India.
P. VasanthamaniAssistant Professor in Statistics,
SNR Sons College,
Coimbatore 641 006,
Tamilnadu, India
Title
Author(s)
-
8/3/2019 IJMIE Vol-1 Issue-6 Abstract
21/31
IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
International Journal of Management, IT and Engineering
http://www.ijmra.us
21
November
2011
Abstract:
The term Six Sigma originated from the terminology associated with the statistical modeling of
manufacturing processes. A six-sigma process is one in which 99.99999% of the products
manufactured are statistically expected to be free of defects. Acceptance sampling is a statistical
procedure for accepting or rejecting a lot or a batch items based on the number of non-
conformities found in a sample. Various sampling plans have been designed and these
procedures focus on the determination of lot size by assuming the lot size to be either too large or
infinite. It is not very convincing to say that a lot is accepted or rejected on the basis of a fixed
sample size irrespective of the lot size. Radhakrishnan and Vasanthamani (2009a, 2009b, 2011)
determined the lot sizes for single sampling plans, double sampling plans, double sampling plans
of the type DSP(0,1) for fixed AOQ. Further, Radhakrishnan and Vasanthamani (2010, 2009c)
determined the lot size for single and double sampling plans DSP(0,1) based on six sigma quality
levels also which are useful for the companies practicing six sigma initiatives in their
organization.
In this paper an attempt is made to determine the size of the lot (N) of a Six sigma based link
sampling plan with Poisson distribution as a base line distribution. A table is also constructed
for the easy selection of the plan for various values of sample size (n1, n2), acceptance numbers
(c1=1, c2=3) and Average Outgoing Quality (AOQ) with probability of acceptance 13.4 x 10- 6
.
Key words and Phrases: Link Sampling Plan (LSP), size of the first sample and second sample
(n1, n2), Acceptance numbers (c1,c2), Lot size (N), Lot quality (p), Average Outgoing Quality
(AOQ).
-
8/3/2019 IJMIE Vol-1 Issue-6 Abstract
22/31
IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
International Journal of Management, IT and Engineering
http://www.ijmra.us
22
November
2011
Construction of Mixed Sampling Plans IndexedThrough Six Sigma Quality Levels with Chain
Sampling Plan-(0,1) as Attribute Plan
R. RadhakrishnanAssociate Professor in Statistics,
P.S.G College of Arts and Science,
Coimbatore-641 014, Tamil Nadu, India.
J. GlorypersialAssistant Professor in Statistics,Dr. G.R.D College of Science,
Coimbatore-641 014, Tamil Nadu. India.
Title
Author(s)
-
8/3/2019 IJMIE Vol-1 Issue-6 Abstract
23/31
IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
International Journal of Management, IT and Engineering
http://www.ijmra.us
23
November
2011
Abstract:
Six Sigma is a concept, a process, a measurement, a tool, a quality philosophy, a culture
and a management strategy for the improvement in the system of an organization, in order to
reduce wastages and increase the profit to the management and enhance satisfaction to the
customers. Motorola (1980) first adopted the concept of six sigma in their organization and
established that it can produce less than 3.4 defects per million opportunities. Focusing on
reduction of defects will result in more profit to the producer and enhanced satisfaction for the
consumer. The concept of Six Sigma can be applied in the process of quality control in general
and Acceptance sampling in particular.
In this paper a procedure for the construction and selection of Mixed Sampling Plan
indexed through Six Sigma Quality level having the Chain Sampling Plan-(0,1) Plan [ChSP-(0,1)]) as attribute plan is presented. The plans are constructed using SSQL-1 and SSQL-2 as
indexing parameters. Tables are constructed for easy selection of the plan.
Keywords: Six Sigma Quality Level, Poisson Distribution, Operating Characteristic Curve,
Mixed Sampling Plan, ChSP-(0,1) Plan.
-
8/3/2019 IJMIE Vol-1 Issue-6 Abstract
24/31
IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
International Journal of Management, IT and Engineering
http://www.ijmra.us
24
November
2011
ANALYSIS OF OPTICAL SOLITON PROPAGATION INBIREFRINGENT FIBERS
Ch. spandanaPost graduate student,
Dept. of E. C. E,Sir C. R. R. College of
Engineering, Eluru.
D. ajay kumarAsst. prof.
Dept. of E. C. E,Sir C. R. R. College of
Engineering, Eluru.
M. Srinivasa RaoHOD, Dept. of ECE,
Sir C.R.R College ofEngineering, Eluru.
Title
Author(s)
-
8/3/2019 IJMIE Vol-1 Issue-6 Abstract
25/31
IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
International Journal of Management, IT and Engineering
http://www.ijmra.us
25
November
2011
INTRODUCTION:
Before the development of optical communication systems, two major forms of
communication systems were employed. In the first of these, namely, electrical communication
system, information is encoded as electrical pulses and transmitted through coaxial cable; the
other system, i.e., microwave system, uses electromagnetic waves with frequencies in the range
of 1 - 10GHz to transmit the signal .These two systems are limited either by bandwidth due to
high frequency-dependent loss of coaxial cable of the electrical system, or bit rate due to the low
carrier frequencies of the microwave system. Fortunately, these two obstacles could be overcome
by using optical communication system, thanks to the invention of the laser in 1960 and the
breakthrough technology of low-loss optical fibers in 1970. Specifically, the high frequencies
(~100 THz) of the optical pulses increase enormously the bit-rate of the system and the fiber loss
has been reduced to below 20 dB/km in a broad wavelength range around 1m. While, for the
advantage of low cost, electrical and microwave transmission technologies are still preferred for
short distances and relatively low bandwidth applications, such as cable TV (Television), CCTV
(Closed Circuit Television). Fiber-Optic technology is generally used in telecommunications for
its inherently high data-carrying capacity and the exceptionally low loss of the optical fiber.
-
8/3/2019 IJMIE Vol-1 Issue-6 Abstract
26/31
IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
International Journal of Management, IT and Engineering
http://www.ijmra.us
26
November
2011
DESIGN OF SMART HYBRID FUZZY PIDCONTROLLER FOR DIFFERENT ORDER PROCESS
CONTROL
Anil KambojAssistant Prof. (ECE),
JMIT Radaur, India
Sonal GuptaScholar (ECE),
JMIT Radaur, India
Title
Author(s)
-
8/3/2019 IJMIE Vol-1 Issue-6 Abstract
27/31
IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
International Journal of Management, IT and Engineering
http://www.ijmra.us
27
November
2011
Abstract:
This paper develops a hybrid fuzzy PID controller for different order process control. A smart
hybrid fuzzy PID controller which comes from smart combination of classical PID and fuzzy
PID controller. Combination is done with the help of switching scheme that makes a decision
upon the priority of the two controller parts; namely, the classical PID and the fuzzy constituents.
The simulations done on various processes using the smart hybrid fuzzy PID controller provides
improved system responses in terms of transient and steady-state performances when compared
to the pure classical PID or the pure fuzzy controller applications.
Keywords---Fuzzy PID, PID controllers, Simulation, Smart hybrid controllers.
-
8/3/2019 IJMIE Vol-1 Issue-6 Abstract
28/31
IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
International Journal of Management, IT and Engineering
http://www.ijmra.us
28
November
2011
Privacy and Trust Management inCloud Computing
Mahesh A. SaleMTech ComputerVJTI, Matunga, Mumbai
Maharashtra, India
Pramila M. ChawanAssociate ProfessorComputer Department
VJTI, Matunga, Mumbai
Maharashtra, India
Title
Author(s)
-
8/3/2019 IJMIE Vol-1 Issue-6 Abstract
29/31
IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
International Journal of Management, IT and Engineering
http://www.ijmra.us
29
November
2011
Abstract:
Cloud computing is a technology that uses the internet and central remote servers to maintain
data and applications. Cloud computing allows consumers and businesses to use applications
without installation and access their personal files at any computer with internet access. This
technology allows for much more efficient computing by centralizing storage, memory,
processing and bandwidth. In the last few years, cloud computing has grown from being a
promising business concept to one of the fastest growing segments of the IT industry. But as
more and more information on individuals and companies is placed in the cloud, concerns are
beginning to grow about just how safe an environment it is. The purpose of the paper is to focus
on various privacy and trust issues in Cloud Computing with the aim to suggest solutions on
them. To address the privacy and trust challenges in Cloud Computing, a Client-based Privacy
Manager is proposed in this paper. We proposed Client-based Privacy Manager that allows
establishing privacy and trust in cloud environment. The design is totally user-centric. Most of
the operations involved in granting data accesses are done at the client-side. This minimizes the
load over the Cloud Service Provider.
Keywords: CSP (Cloud Service Provider), Pseudonyms, shared-key, personae, Obfuscation,
Privacy, Security
-
8/3/2019 IJMIE Vol-1 Issue-6 Abstract
30/31
IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
International Journal of Management, IT and Engineering
http://www.ijmra.us
30
November
2011
Sec.AODV for MANETs using MD5 withCryptography
Mr. Suketu D. Nayak4thSem M.Tech Computer Science &
Engineering
Rajiv Gandhi ProdhyogikiVishwavidhyalaya
Bhopal, India
Mr. Ravindra K. GuptaAsst. Professor, CSE Dept.,
SSSIST, Sehore,
MP, India
Title
Author(s)
-
8/3/2019 IJMIE Vol-1 Issue-6 Abstract
31/31
IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________
November
2011
Abstract:
Mobile Ad hoc Networks (MANETs) characteristics present major vulnerabilities in security.
The threats which thought-out in MANETs are due to maliciousness that intentionally disrupts
the network by using variety of attacks and due to insecure routing protocols (e.g. AODV),
which were developed without considering security in mind. Due to lack of the infrastructure,
open peer-to-peer architecture, shared wireless medium, limited resource constraints and highly
dynamic topology, MANETs (Mobile Ad-hoc Networks) are frequently established in insecure
environments, which make them more vulnerable to attacks. These attacks are initiated by
sharing malicious nodes against different services of network. Ad-hoc On-Demand Distance
Vector (AODV) is one such widely used routing protocol that is at present undergo extensive
research and development. AODV is based on distance vector routing, but here the updates are
shared not on a periodic basis but on an as per demand basis. The control packets contain a hop-
count and sequence number field which recognizes the freshness of routing. These fields are
editable, so it creates a possible susceptibility that is frequently abused by malicious nodes to
advertise false better routes. As well as, transmission of routing updates in form of clear text also
reveals crucial information about the network topology, which is again a probable security
danger. In this paper we are presenting a novel and practical security mechanism for securing the
AODV routing protocol that protects against a number of attacks carried out in MANETs. We
will present message digest with secret key mechanism to secure AODV messages which is very
effective and less power consuming security solution for MANETs.
Keywords - Malicious, Mechanism, Message Digest, Routing Protocol, Secret Key, Security