IJMIE Vol-1 Issue-6 Abstract

download IJMIE Vol-1 Issue-6 Abstract

of 31

Transcript of IJMIE Vol-1 Issue-6 Abstract

  • 8/3/2019 IJMIE Vol-1 Issue-6 Abstract

    1/31

    International Journal of Management, IT & Engineering(ISSN: 2249-0558)CONTENTS

    Sr.

    No.TITLE & NAME OF THE AUTHOR (S)

    Page

    No.

    1Quality Improvement through SPC Techniques: A Case Study.Dr. D. R. Prajapati

    6-7

    2

    Maximization of Return on Investment (ROI) by Hyper Productive Software

    Development Through Scrum.

    Muhammad Inam Shahzad, Tasleem Mustafa, Fahad Jan, Muhammad Ashraf and AhmadAdnan

    8-9

    3The design of a Trusted Authentication scheme for Wimax Network.Mr. Rajesh Shrivastava and Deepak Kumar Mehto

    10-11

    4Highly Quantitative Mining Association Rules with Clustering.N. Venkatesan

    12-13

    5An Efficient Routing Scheme for ICMN.K. Soujanya, R. Samba Siva Nayak and M. Rajarajeswari

    14-15

    6

    Controlling the Menace of Unsolicited Electronic Mails Contemporary Developments

    and Indian Perspectives.Sachin Arora and Dr. Dipa Dube

    16-17

    7Comparing Search Algorithms of Unstructured P2P Networks.Prashant K. Shukla, Piyush K. Shukla and Prof. Sanjay Silakari

    18-19

    8Determination of Lot Size in the Construction of Six sigma based Link Sampling Plans.R. Radhakrishnan and P. Vasanthamani

    20-21

    9

    Construction of Mixed Sampling Plans Indexed Through Six Sigma Quality Levels with

    Chain Sampling Plan-(0, 1) as Attribute Plan.R. Radhakrishnan and J. Glorypersial

    22-23

    10Analysis of optical soliton propagation in birefringent fibers.Ch. Spandana, D. ajay kumar and M. Srinivasa Rao

    24-25

    11Design of Smart Hybrid Fuzzy Pid Controller for Different Order Process Control.Anil Kamboj and Sonal Gupta

    26-27

    12Privacy and Trust Management in Cloud Computing.Mahesh A. Sale and Pramila M. Chawan

    28-29

    13Sec.AODV for MANETs using MD5 with Cryptography.Mr. Suketu D. Nayak and Mr. Ravindra K. Gupta

    30-31

  • 8/3/2019 IJMIE Vol-1 Issue-6 Abstract

    2/31

    IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________

    A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.

    International Journal of Management, IT and Engineering

    http://www.ijmra.us

    2

    November

    2011

    Chief PatronDr. JOSE G. VARGAS-HERNANDEZ

    Member of the National System of Researchers, Mexico

    Research professor at University Center of Economic and Managerial Sciences,University of Guadalajara

    Director of Mass Media at Ayuntamiento de Cd. Guzman

    Ex. director of Centro de Capacitacion y Adiestramiento

    PatronDr. Mohammad Reza Noruzi

    PhD: Public Administration, Public Sector Policy Making Management,Tarbiat Modarres University, Tehran, Iran

    Faculty of Economics and Management, Tarbiat Modarres University, Tehran, Iran

    Young Researchers' Club Member, Islamic Azad University, Bonab, Iran

    Chief AdvisorsDr. NAGENDRA. S.Senior Asst. Professor,

    Department of MBA, Mangalore Institute of Technology and Engineering, Moodabidri

    Dr. SUNIL KUMAR MISHRAAssociate Professor,

    Dronacharya College of Engineering, Gurgaon, INDIA

    Mr. GARRY TAN WEI HANLecturer and Chairperson (Centre for Business and Management),

    Department of Marketing, University Tunku Abdul Rahman, MALAYSIA

    MS. R. KAVITHAAssistant Professor,

    Aloysius Institute of Management and Information, Mangalore, INDIA

    Dr. A. JUSTIN DIRAVIAMAssistant Professor,

    Dept. of Computer Science and Engineering, Sardar Raja College of Engineering,

    Alangulam Tirunelveli, TAMIL NADU, INDIA

  • 8/3/2019 IJMIE Vol-1 Issue-6 Abstract

    3/31

    IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________

    A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.

    International Journal of Management, IT and Engineering

    http://www.ijmra.us

    3

    November

    2011

    Editorial BoardDr. CRAIG E. REESE

    Professor, School of Business, St. Thomas University, Miami Gardens

    Dr. S. N. TAKALIKARPrincipal, St. Johns Institute of Engineering, PALGHAR (M.S.)

    Dr. RAMPRATAP SINGHProfessor, Bangalore Institute of International Management, KARNATAKA

    Dr. P. MALYADRIPrincipal, Government Degree College, Osmania University, TANDUR

    Dr. Y. LOKESWARA CHOUDARYAsst. Professor Cum, SRM B-School, SRM University, CHENNAI

    Prof. Dr. TEKI SURAYYAProfessor, Adikavi Nannaya University, ANDHRA PRADESH, INDIA

    Dr. T. DULABABUPrincipal, The Oxford College of Business Management, BANGALORE

    Dr. A. ARUL LAWRENCE SELVAKUMARProfessor, Adhiparasakthi Engineering College, MELMARAVATHUR, TN

    Dr. S. D. SURYAWANSHILecturer, College of Engineering Pune, SHIVAJINAGAR

    Dr. S. KALIYAMOORTHYProfessor & Director, Alagappa Institute of Management, KARAIKUDI

    Prof S. R. BADRINARAYAN

    Sinhgad Institute for Management & Computer Applications, PUNE

    Mr. GURSEL ILIPINARESADE Business School, Department of Marketing, SPAIN

    Mr. ZEESHAN AHMEDSoftware Research Eng, Department of Bioinformatics, GERMANY

  • 8/3/2019 IJMIE Vol-1 Issue-6 Abstract

    4/31

    IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________

    A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.

    International Journal of Management, IT and Engineering

    http://www.ijmra.us

    4

    November

    2011

    Mr. SANJAY ASATIDept of ME, M. Patel Institute of Engg. & Tech., GONDIA(M.S.)

    Mr. G. Y. KUDALEN.M.D. College of Management and Research, GONDIA(M.S.)

    Editorial Advisory BoardDr. MANJIT DAS

    Assistant Professor, Deptt. of Economics, M.C.College, ASSAM

    Dr. ROLI PRADHANMaulana Azad National Institute of Technology, BHOPAL

    Dr. N. KAVITHAAssistant Professor, Department of Management, Mekelle University, ETHIOPIA

    Prof C. M. MARANAssistant Professor (Senior), VIT Business School, TAMIL NADU

    Dr. RAJIV KHOSLAAssociate Professor and Head, Chandigarh Business School, MOHALI

    Dr. S. K. SINGHAsst. Professor, R. D. Foundation Group of Institutions, MODINAGAR

    Dr. (Mrs.) MANISHA N. PALIWALAssociate Professor, Sinhgad Institute of Management, PUNE

    Dr. (Mrs.) ARCHANA ARJUN GHATULEDirector, SPSPM, SKN Sinhgad Business School, MAHARASHTRA

    Dr. NEELAM RANI DHANDAAssociate Professor, Department of Commerce, kuk, HARYANA

    Dr. FARAH NAAZ GAURIAssociate Professor, Department of Commerce, Dr. Babasaheb Ambedkar Marathwada

    University, AURANGABAD

  • 8/3/2019 IJMIE Vol-1 Issue-6 Abstract

    5/31

    IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________

    A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.

    International Journal of Management, IT and Engineering

    http://www.ijmra.us

    5

    November

    2011

    Prof. Dr. BADAR ALAM IQBALAssociate Professor, Department of Commerce, Aligarh Muslim University, UP

    Dr. CH. JAYASANKARAPRASADAssistant Professor, Dept. of Business Management, Krishna University, A. P., INDIA

    Associate EditorsDr. SANJAY J. BHAYANI

    Associate Professor ,Department of Business Management, RAJKOT (INDIA)

    MOID UDDIN AHMADAssistant Professor, Jaipuria Institute of Management, NOIDA

    Dr. SUNEEL ARORAAssistant Professor, G D Goenka World Institute, Lancaster University, NEW DELHI

    Mr. P. PRABHUAssistant Professor, Alagappa University, KARAIKUDI

    Mr. MANISH KUMARAssistant Professor, DBIT, Deptt. Of MBA, DEHRADUN

    Mrs. BABITA VERMAAssistant Professor, Bhilai Institute Of Technology, DURG

    Ms. MONIKA BHATNAGARAssistant Professor, Technocrat Institute of Technology, BHOPAL

    Ms. SUPRIYA RAHEJAAssistant Professor, CSE Department of ITM University, GURGAON

  • 8/3/2019 IJMIE Vol-1 Issue-6 Abstract

    6/31

    IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________

    A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.

    International Journal of Management, IT and Engineering

    http://www.ijmra.us

    6

    November

    2011

    Quality Improvement through SPCTechniques: A Case Study

    Dr. D. R. PrajapatiAsst. Professor,

    Deptt. of Mechanical Engineering,PEC University of Technology (formerly Punjab Engineering College),

    Chandigarh (India).

    Title

    Author(s)

  • 8/3/2019 IJMIE Vol-1 Issue-6 Abstract

    7/31

    IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________

    A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.

    International Journal of Management, IT and Engineering

    http://www.ijmra.us

    7

    November

    2011

    ABSTRACT:

    Statistical process Control (SPC) can be applied most frequently to controlling manufacturing

    lines but it may be equally applied to any process with a measurable output. Key tools in SPC are

    control charts and cause & effect diagrams focused on continuous improvement. In this paper, an

    attempt has been made to implement the some SPC techniques in the industry, producing the

    Tractors parts in India. The power of SPC lies in the ability to examine a process and the

    sources of variation in that process, using tools that give weightage to objective analysis over

    subjective opinions and that allow the strength of each source to be determined numerically.

    Only two main tools i.e. cause and effect diagram and control charts are implemented in this

    industry out of seven SPC tools. The present work deals with the study of defects in Foot Board

    assembly, Foot step assembly, Fuel tank assembly and Fender of Radiator. After implementing

    the required suggestions/recommendations for radiator assembly, it is found that process

    capability is improved and it is greater than required for 400 numbers of observations.

    Key Words: Cause and effect diagram, X and R charts, Process Capability, Process Capability

    Index and Percentage rejection

    http://en.wikipedia.org/wiki/Control_charthttp://en.wikipedia.org/wiki/Continuous_Improvement_Processhttp://en.wikipedia.org/wiki/Continuous_Improvement_Processhttp://en.wikipedia.org/wiki/Control_chart
  • 8/3/2019 IJMIE Vol-1 Issue-6 Abstract

    8/31

    IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________

    A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.

    International Journal of Management, IT and Engineering

    http://www.ijmra.us

    8

    November

    2011

    MAXIMIZATION OF RETURN ON INVESTMENT(ROI) BY HYPER PRODUCTIVE SOFTWARE

    DEVELOPMENT THROUGH SCRUM

    Muhammad InamShahzad

    Student of MS (CS)

    University ofAgriculture,

    Faisalabad, Pakistan

    Assistant Manager(Programming/System

    Analysis),

    FESCO ComputerCenter, Faisalabad,

    Pakistan

    Tasleem MustafaChairman

    Department ofComputer Science,

    University ofAgriculture,

    Faisalabad, Pakistan

    Fahad JanLecturer

    Department ofComputer Science,

    University ofAgriculture,

    Faisalabad, Pakistan

    MuhammadAshraf

    Computer Teacher

    Education Department,

    Government of Punjab,

    Nankana Sahib,Pakistan

    Ahmad AdnanDepartment of

    Computer Science,

    University ofAgriculture,

    Faisalabad, Pakistan

    Title

    Author(s)

  • 8/3/2019 IJMIE Vol-1 Issue-6 Abstract

    9/31

    IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________

    A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.

    International Journal of Management, IT and Engineering

    http://www.ijmra.us

    9

    November

    2011

    ABSTRACT:

    The Research paper concentrated on the Scrum and focused on how to maximize the return on

    investment while developing the software especially in the IT (Information Technology) industry

    of Pakistan. The purpose of the study was to propose improvements in the software development

    methods. A case study was performed by using two different methods for the development of the

    project in the computer Centre of Faisalabad Electric Supply Company Faisalabad. The existing

    method of development in FESCO computer Centre was Lwei-Scrum having many flaws and

    drawbacks. In order to overcome these drawbacks a new approach of Scrum was applied in

    FESCO. The new approach was called as Modified Light Weight Scrum (MLwei-Scrum). The

    role of Scrum master and weekly scrum meeting was added in the Lwei-Scrum and then by

    obtaining the results in respect of the return on investment some conclusions were drawn.

    MLwei-Scrum gave better results than Lwei-Scrum. It is expected that the new approach will be

    accepted in Pakistan IT Industry as this will be helpful to maximize the return on investments.

    Keywords: Scrum, Lwei-Scrum, MLwei-Scrum, ROI (Return On Investment), FESCO, Agile

    Manifesto.

  • 8/3/2019 IJMIE Vol-1 Issue-6 Abstract

    10/31

    IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________

    A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.

    International Journal of Management, IT and Engineering

    http://www.ijmra.us

    10

    November

    2011

    The design of a Trusted Authenticationscheme for Wimax Network

    Mr. Rajesh ShrivastavaAsst. Professor,

    Comp. Sci. & Engg. Deptt.,

    Shri Ram Institute of Technology,

    Jabalpur

    Deepak Kumar MehtoM.E. (S.S.),

    Shri Ram Institute of Technology,

    Jabalpur

    Title

    Author(s)

  • 8/3/2019 IJMIE Vol-1 Issue-6 Abstract

    11/31

    IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________

    A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.

    International Journal of Management, IT and Engineering

    http://www.ijmra.us

    11

    November

    2011

    Abstract:

    As a promising broadband wireless technology, WiMAX has many salient advantages over such

    as: high data rates, security, and mobility. Many sophisticated authentication and encryption

    techniques have been embedded into WiMAX but it still exposes to various attacks in.

    IEEE802.16 provides a security sublayer in the MAC layer to address the privacy issues across

    the fixed BWA (Broadband Wireless Access).In this paper, we first overview the IEEE802.16

    standard, and then investigate possible attacks on the basic PKMprotocol in IEEE802.16. We

    also give possible solutions to counter those attacks.

    Key Terms: Wimax, , PKMv1,PKMv2, User Authentication etc.

  • 8/3/2019 IJMIE Vol-1 Issue-6 Abstract

    12/31

    IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________

    A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.

    International Journal of Management, IT and Engineering

    http://www.ijmra.us

    12

    November

    2011

    HIGHLY QUANTITATIVE MINING ASSOCIATIONRULES WITH CLUSTERING

    N. VenkatesanDepartment of IT,

    Bharathiyar College of Engineering and Technology,

    Karaikal.

    Title

    Author(s)

  • 8/3/2019 IJMIE Vol-1 Issue-6 Abstract

    13/31

    IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________

    A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.

    International Journal of Management, IT and Engineering

    http://www.ijmra.us

    13

    November

    2011

    Abstract:

    Data mining is a step in the knowledge discovery process consisting of certain data mining

    algorithms that, under some acceptable computational efficiency limitations, finds patterns or

    models in data. Association rule analysis starts with transactions containing one or more products

    or service offerings and some rudimentary information about the transaction. This paper

    describes the clustering in association rules using quantitative attributes, which are expressive

    multi-dimensional generalized association rules for university admission. University database

    which is vast and which has interrelated item sets is chosen for mining. Quantitative attributes

    can have a very wide range of values defining their domain. 2-Dimensional quantitative

    association rules predicting the condition on the right hand side, given the quantitative attributes

    age, status and citizen. In this method age is the main criteria for quantitative process. The

    Strong association rules are obtained by this prescribed method.

    Keywords: Market Basket Analysis, eclat algorithm, Quantitative Association Rule, Clustering,

    Binning.

  • 8/3/2019 IJMIE Vol-1 Issue-6 Abstract

    14/31

    IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________

    A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.

    International Journal of Management, IT and Engineering

    http://www.ijmra.us

    14

    November

    2011

    AN EFFICIENT ROUTING SCHEME FOR ICMN

    K. SOUJANYAAssistant Professor,

    Department of ECE,Sir C R Reddy Engineering

    College

    R. SAMBA SIVANAYAKHOD,

    Department of ECE,

    Don Bosco Institute of Tech& Science

    M. RAJARAJESWARIDepartment of ECE,

    Sir C R Reddy EngineeringCollege

    Title

    Author(s)

  • 8/3/2019 IJMIE Vol-1 Issue-6 Abstract

    15/31

    IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________

    A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.

    International Journal of Management, IT and Engineering

    http://www.ijmra.us

    15

    November

    2011

    ABSTRACT:

    In this paper, intermittently connected mobile networks are sparse wireless networks

    where most of the time there does not exist a complete path from the source to the destination.

    These networks fall into the general category of Delay Tolerant Networks. There are many real

    networks that follow this paradigm, for example, wildlife tracking sensor networks, military

    networks, inter-planetary networks, etc. proposed efforts to significantly reduce the overhead of

    flooding-based schemes has often been Plagued by large delays. With this in mind, we introduce

    a new routing scheme, called Spray and Wait because it sprays a number of copies into the

    network, & then waits till one of these nodes meets the destination. Using theory and

    simulations we show that Spray and Wait outperforms all existing schemes with respect to

    average message delivery delay and number of transmissions per message delivered; its overall

    performance is close to the optimal scheme. Furthermore, it is highly scalable retaining good

    performance under a large range of scenarios, unlike other schemes.

    Keywords: Intermittently connected mobile networks, Delay Tolerant Networks

  • 8/3/2019 IJMIE Vol-1 Issue-6 Abstract

    16/31

    IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________

    A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.

    International Journal of Management, IT and Engineering

    http://www.ijmra.us

    16

    November

    2011

    CONTROLLING THE MENACE OF UNSOLICITED ELECTRONICMAILS CONTEMPORARY DEVELOPMENTS AND INDIAN

    PERSPECTIVES

    Sachin AroraStudent,

    Rajiv Gandhi School of IntellectualProperty law,

    IIT Kharagpur, 721302, West Bengal.

    Dr. Dipa DubeAssistant Professor,

    Rajiv Gandhi School of IntellectualProperty law,

    IIT Kharagpur, 721302, West Bengal

    Title

    Author(s)

  • 8/3/2019 IJMIE Vol-1 Issue-6 Abstract

    17/31

  • 8/3/2019 IJMIE Vol-1 Issue-6 Abstract

    18/31

    IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________

    A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.

    International Journal of Management, IT and Engineering

    http://www.ijmra.us

    18

    November

    2011

    Comparing Search Algorithms ofUnstructured P2P Networks

    Prashant K. ShuklaAsst. Prof.,Deptt. of IT, SIRT,

    Bhopal, M.P., India

    Piyush K. ShuklaAsst. Prof.,Deptt. of CSE, UIT,

    RGPV, Bhopal, M.P.,India

    Prof. Sanjay SilakariDeptt. of CSE, UIT,RGPV, Bhopal, M.P.,

    India

    Title

    Author(s)

  • 8/3/2019 IJMIE Vol-1 Issue-6 Abstract

    19/31

    IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________

    A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.

    International Journal of Management, IT and Engineering

    http://www.ijmra.us

    19

    November

    2011

    Abstract:

    Computing has passed through many stages since the birth of the first computing machines. A

    centralized solution has one component that is shared by users all the time. All resources are

    accessible, but there is a single point of control as well as a single point of failure. A distributed

    system is a group of autonomous computers connected to a computer network, which appears to

    the clients of the system as a single computer.

    Distributed system software allows computers to manage their activities and to share the

    resources of the system, so that clients recognize the system as a single, integrated computing

    facility. Opportunity to attach components improves the availability, reliability, fault tolerance

    and performance of the system. In such systems, the methods for minimizing communication and

    computation cost are significant. The widely used clientserver model is an example of adistributed system. In this model, the servers are optimized to offer services to several clients. A

    peer-to-peer network is also a good example of a distributed system. In peer-to-peer network, we

    cannot force a peer to remain online until a file is completely downloaded; therefore it is

    important to choose a node, which is trustworthy by nature.

    Keywords: Multi-tire differential search, unstructured P2P networks, OPNET

  • 8/3/2019 IJMIE Vol-1 Issue-6 Abstract

    20/31

    IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________

    A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.

    International Journal of Management, IT and Engineering

    http://www.ijmra.us

    20

    November

    2011

    Determination of Lot Size in theConstruction of Six sigma based Link

    Sampling Plans

    R. RadhakrishnanAssociate Professor in Statistics,

    PSG College of Arts and Science,

    Coimbatore 641 014,

    Tamilnadu, India.

    P. VasanthamaniAssistant Professor in Statistics,

    SNR Sons College,

    Coimbatore 641 006,

    Tamilnadu, India

    Title

    Author(s)

  • 8/3/2019 IJMIE Vol-1 Issue-6 Abstract

    21/31

    IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________

    A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.

    International Journal of Management, IT and Engineering

    http://www.ijmra.us

    21

    November

    2011

    Abstract:

    The term Six Sigma originated from the terminology associated with the statistical modeling of

    manufacturing processes. A six-sigma process is one in which 99.99999% of the products

    manufactured are statistically expected to be free of defects. Acceptance sampling is a statistical

    procedure for accepting or rejecting a lot or a batch items based on the number of non-

    conformities found in a sample. Various sampling plans have been designed and these

    procedures focus on the determination of lot size by assuming the lot size to be either too large or

    infinite. It is not very convincing to say that a lot is accepted or rejected on the basis of a fixed

    sample size irrespective of the lot size. Radhakrishnan and Vasanthamani (2009a, 2009b, 2011)

    determined the lot sizes for single sampling plans, double sampling plans, double sampling plans

    of the type DSP(0,1) for fixed AOQ. Further, Radhakrishnan and Vasanthamani (2010, 2009c)

    determined the lot size for single and double sampling plans DSP(0,1) based on six sigma quality

    levels also which are useful for the companies practicing six sigma initiatives in their

    organization.

    In this paper an attempt is made to determine the size of the lot (N) of a Six sigma based link

    sampling plan with Poisson distribution as a base line distribution. A table is also constructed

    for the easy selection of the plan for various values of sample size (n1, n2), acceptance numbers

    (c1=1, c2=3) and Average Outgoing Quality (AOQ) with probability of acceptance 13.4 x 10- 6

    .

    Key words and Phrases: Link Sampling Plan (LSP), size of the first sample and second sample

    (n1, n2), Acceptance numbers (c1,c2), Lot size (N), Lot quality (p), Average Outgoing Quality

    (AOQ).

  • 8/3/2019 IJMIE Vol-1 Issue-6 Abstract

    22/31

    IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________

    A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.

    International Journal of Management, IT and Engineering

    http://www.ijmra.us

    22

    November

    2011

    Construction of Mixed Sampling Plans IndexedThrough Six Sigma Quality Levels with Chain

    Sampling Plan-(0,1) as Attribute Plan

    R. RadhakrishnanAssociate Professor in Statistics,

    P.S.G College of Arts and Science,

    Coimbatore-641 014, Tamil Nadu, India.

    J. GlorypersialAssistant Professor in Statistics,Dr. G.R.D College of Science,

    Coimbatore-641 014, Tamil Nadu. India.

    Title

    Author(s)

  • 8/3/2019 IJMIE Vol-1 Issue-6 Abstract

    23/31

    IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________

    A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.

    International Journal of Management, IT and Engineering

    http://www.ijmra.us

    23

    November

    2011

    Abstract:

    Six Sigma is a concept, a process, a measurement, a tool, a quality philosophy, a culture

    and a management strategy for the improvement in the system of an organization, in order to

    reduce wastages and increase the profit to the management and enhance satisfaction to the

    customers. Motorola (1980) first adopted the concept of six sigma in their organization and

    established that it can produce less than 3.4 defects per million opportunities. Focusing on

    reduction of defects will result in more profit to the producer and enhanced satisfaction for the

    consumer. The concept of Six Sigma can be applied in the process of quality control in general

    and Acceptance sampling in particular.

    In this paper a procedure for the construction and selection of Mixed Sampling Plan

    indexed through Six Sigma Quality level having the Chain Sampling Plan-(0,1) Plan [ChSP-(0,1)]) as attribute plan is presented. The plans are constructed using SSQL-1 and SSQL-2 as

    indexing parameters. Tables are constructed for easy selection of the plan.

    Keywords: Six Sigma Quality Level, Poisson Distribution, Operating Characteristic Curve,

    Mixed Sampling Plan, ChSP-(0,1) Plan.

  • 8/3/2019 IJMIE Vol-1 Issue-6 Abstract

    24/31

    IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________

    A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.

    International Journal of Management, IT and Engineering

    http://www.ijmra.us

    24

    November

    2011

    ANALYSIS OF OPTICAL SOLITON PROPAGATION INBIREFRINGENT FIBERS

    Ch. spandanaPost graduate student,

    Dept. of E. C. E,Sir C. R. R. College of

    Engineering, Eluru.

    D. ajay kumarAsst. prof.

    Dept. of E. C. E,Sir C. R. R. College of

    Engineering, Eluru.

    M. Srinivasa RaoHOD, Dept. of ECE,

    Sir C.R.R College ofEngineering, Eluru.

    Title

    Author(s)

  • 8/3/2019 IJMIE Vol-1 Issue-6 Abstract

    25/31

    IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________

    A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.

    International Journal of Management, IT and Engineering

    http://www.ijmra.us

    25

    November

    2011

    INTRODUCTION:

    Before the development of optical communication systems, two major forms of

    communication systems were employed. In the first of these, namely, electrical communication

    system, information is encoded as electrical pulses and transmitted through coaxial cable; the

    other system, i.e., microwave system, uses electromagnetic waves with frequencies in the range

    of 1 - 10GHz to transmit the signal .These two systems are limited either by bandwidth due to

    high frequency-dependent loss of coaxial cable of the electrical system, or bit rate due to the low

    carrier frequencies of the microwave system. Fortunately, these two obstacles could be overcome

    by using optical communication system, thanks to the invention of the laser in 1960 and the

    breakthrough technology of low-loss optical fibers in 1970. Specifically, the high frequencies

    (~100 THz) of the optical pulses increase enormously the bit-rate of the system and the fiber loss

    has been reduced to below 20 dB/km in a broad wavelength range around 1m. While, for the

    advantage of low cost, electrical and microwave transmission technologies are still preferred for

    short distances and relatively low bandwidth applications, such as cable TV (Television), CCTV

    (Closed Circuit Television). Fiber-Optic technology is generally used in telecommunications for

    its inherently high data-carrying capacity and the exceptionally low loss of the optical fiber.

  • 8/3/2019 IJMIE Vol-1 Issue-6 Abstract

    26/31

    IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________

    A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.

    International Journal of Management, IT and Engineering

    http://www.ijmra.us

    26

    November

    2011

    DESIGN OF SMART HYBRID FUZZY PIDCONTROLLER FOR DIFFERENT ORDER PROCESS

    CONTROL

    Anil KambojAssistant Prof. (ECE),

    JMIT Radaur, India

    Sonal GuptaScholar (ECE),

    JMIT Radaur, India

    Title

    Author(s)

  • 8/3/2019 IJMIE Vol-1 Issue-6 Abstract

    27/31

    IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________

    A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.

    International Journal of Management, IT and Engineering

    http://www.ijmra.us

    27

    November

    2011

    Abstract:

    This paper develops a hybrid fuzzy PID controller for different order process control. A smart

    hybrid fuzzy PID controller which comes from smart combination of classical PID and fuzzy

    PID controller. Combination is done with the help of switching scheme that makes a decision

    upon the priority of the two controller parts; namely, the classical PID and the fuzzy constituents.

    The simulations done on various processes using the smart hybrid fuzzy PID controller provides

    improved system responses in terms of transient and steady-state performances when compared

    to the pure classical PID or the pure fuzzy controller applications.

    Keywords---Fuzzy PID, PID controllers, Simulation, Smart hybrid controllers.

  • 8/3/2019 IJMIE Vol-1 Issue-6 Abstract

    28/31

    IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________

    A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.

    International Journal of Management, IT and Engineering

    http://www.ijmra.us

    28

    November

    2011

    Privacy and Trust Management inCloud Computing

    Mahesh A. SaleMTech ComputerVJTI, Matunga, Mumbai

    Maharashtra, India

    Pramila M. ChawanAssociate ProfessorComputer Department

    VJTI, Matunga, Mumbai

    Maharashtra, India

    Title

    Author(s)

  • 8/3/2019 IJMIE Vol-1 Issue-6 Abstract

    29/31

    IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________

    A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.

    International Journal of Management, IT and Engineering

    http://www.ijmra.us

    29

    November

    2011

    Abstract:

    Cloud computing is a technology that uses the internet and central remote servers to maintain

    data and applications. Cloud computing allows consumers and businesses to use applications

    without installation and access their personal files at any computer with internet access. This

    technology allows for much more efficient computing by centralizing storage, memory,

    processing and bandwidth. In the last few years, cloud computing has grown from being a

    promising business concept to one of the fastest growing segments of the IT industry. But as

    more and more information on individuals and companies is placed in the cloud, concerns are

    beginning to grow about just how safe an environment it is. The purpose of the paper is to focus

    on various privacy and trust issues in Cloud Computing with the aim to suggest solutions on

    them. To address the privacy and trust challenges in Cloud Computing, a Client-based Privacy

    Manager is proposed in this paper. We proposed Client-based Privacy Manager that allows

    establishing privacy and trust in cloud environment. The design is totally user-centric. Most of

    the operations involved in granting data accesses are done at the client-side. This minimizes the

    load over the Cloud Service Provider.

    Keywords: CSP (Cloud Service Provider), Pseudonyms, shared-key, personae, Obfuscation,

    Privacy, Security

  • 8/3/2019 IJMIE Vol-1 Issue-6 Abstract

    30/31

    IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________

    A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial DirectoriesIndexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.

    International Journal of Management, IT and Engineering

    http://www.ijmra.us

    30

    November

    2011

    Sec.AODV for MANETs using MD5 withCryptography

    Mr. Suketu D. Nayak4thSem M.Tech Computer Science &

    Engineering

    Rajiv Gandhi ProdhyogikiVishwavidhyalaya

    Bhopal, India

    Mr. Ravindra K. GuptaAsst. Professor, CSE Dept.,

    SSSIST, Sehore,

    MP, India

    Title

    Author(s)

  • 8/3/2019 IJMIE Vol-1 Issue-6 Abstract

    31/31

    IJMIE Volume 1, Issue 6 ISSN: 2249-0558__________________________________________________________

    November

    2011

    Abstract:

    Mobile Ad hoc Networks (MANETs) characteristics present major vulnerabilities in security.

    The threats which thought-out in MANETs are due to maliciousness that intentionally disrupts

    the network by using variety of attacks and due to insecure routing protocols (e.g. AODV),

    which were developed without considering security in mind. Due to lack of the infrastructure,

    open peer-to-peer architecture, shared wireless medium, limited resource constraints and highly

    dynamic topology, MANETs (Mobile Ad-hoc Networks) are frequently established in insecure

    environments, which make them more vulnerable to attacks. These attacks are initiated by

    sharing malicious nodes against different services of network. Ad-hoc On-Demand Distance

    Vector (AODV) is one such widely used routing protocol that is at present undergo extensive

    research and development. AODV is based on distance vector routing, but here the updates are

    shared not on a periodic basis but on an as per demand basis. The control packets contain a hop-

    count and sequence number field which recognizes the freshness of routing. These fields are

    editable, so it creates a possible susceptibility that is frequently abused by malicious nodes to

    advertise false better routes. As well as, transmission of routing updates in form of clear text also

    reveals crucial information about the network topology, which is again a probable security

    danger. In this paper we are presenting a novel and practical security mechanism for securing the

    AODV routing protocol that protects against a number of attacks carried out in MANETs. We

    will present message digest with secret key mechanism to secure AODV messages which is very

    effective and less power consuming security solution for MANETs.

    Keywords - Malicious, Mechanism, Message Digest, Routing Protocol, Secret Key, Security