WAIMS PUBLICATION 2012-13

 S.N VOLUME I: SESSION 2012-2013
1 Paper Title : Pre-Mature Software Reliability Testing: An Analytical Study
Paper
Id:WAIMS/1/1/1-7
Abstract: Advancement in technology and its infrastructure software became parts and partial of human need. Now, we have entered a new software engineering era where applications are used in many device in various range of application i.e. from pace maker to radiation therapy.
Affiliation: Anjana Shrivastava, Dr. Sumit Gill Vedanta College Jaipur
Keyword: Software Reliability,Soft Computing,Gentic Algorithm
 2. Paper Title : Study and Analysis of LTE Advanced Technology For 4G and Wireless Communication
Paper Id :WAIMS/1/1/8-12

Abstract: Our world is growing day-to-day with expansion of network infrastructure. Increased network and its utilization by the customer demand for high bandwidth data services have accelerated the urgency for operators to deploy 4G networks.
Affiliation: Hemant Mathur,School of Computer and System Sciences,Jaipur National University,Jaipur India
Keyword: LTE (Long-Term Evolution),4G, 3GPP (Third Generation Partnership Project)
 3. Paper Title : Comparative Analysis of the theory of sentiments in Indian & western criticism
Paper id: WAIMS/1/1/12-13

Abstract : Before presenting a parallel study of the Indian concept of Sentiments and Western theories, it is essential for us to know the true meaning and function of art and literature. Encyclopedia Britannica (edition 1951) thus defines art, “All great art, being emphatically personal, is accompanied by variations from previously existing standards of excellence. This personal variation is marked by a new intensity of feeling, by a new sense of vitality and by a new rhythm of pattern. All great artists are pioneers possessing these characteristics. Emotion is the key stone of painting as it is of poetry” (Encyclopedia Britannica, 1951 page 243).
Affiliation: Dr. Minu Kashyap, Department of English, Shri Lal Bahadur Shastri Rastirya Sanskrit Vidyapeetha ,Katwaria Sarai, New Delhi.
keywords
: theory of sentiments 
 4. Paper Title : OKB As An Experience Factory Using The Concepts Of SE-MABKM
Paper Id : (WAIMS/1/1/22-36)
Abstract: In Current scenario where knowledge and it’s infrastructure cost is increasing day to day and it is very difficult for organization to hire or purchase costly human resource for organization improvement. We have observed in my previous research work regarding requirement of agent based infrastructure as well as Multi agent based Knowledge management process and practices can improve the capacity of organization in terms of cost cutting criteria. We also identify various agents who can be helpful for organizational knowledge management.
Affiliation: Ripu R Sinha & Dr.C.S Lamba Resarch Scholer, NIMS University Jaipur Resarch Supervisor, NIMS University Jaipur
Keyword: SE-MABKM, OKMP, MABKM
5. Paper Title : Precise State Estimation for Tracking Trajectory Motion of a Trajectile
Paper Id :  (WAIMS/0029/0092/1-4)
Abstract: Control of trajectile and other systems requires reliable real-time estimates of the system state. The design procedure is the mathematical formulation of the state observer by vector calculus possible by different variants of the observer, the determination of its rectro position, attitude and the dynamic system behavior. State Estimation takes all the telemetry seen so far and uses it to determine the underlying behavior of the system at any point of time.
Affiliation: SHEEMA A D
Keyword: Trajectory motion estimates, Attitude, Variants in the coordinate frame, Rectro positions, and Dynamic system behavior
6. Paper title : Energy Efficent Routing in Wireless Sensor Networks
Paper Id: (WAIMS/0019/0079/5-14)
Abstract: Recent advances in wireless network and mobile technologies have resulted in more improvements in sensor networks. But there are various challenges and security threats that disturb the Wireless communication.
Affiliation: Siva Sangari.A, Dr.Martin Leo Manikam
Keyword: Wireless sensor network, Ad hoc on demand multipath distance vector protocol, Ad hoc on demand vector
7. Paper Title : Occupational Stress & Library Professional in Digital Environment
Paper Id : (WAIMS/0019/0080/15-19)
Abstract: In today’s corporate as well as institutional world, the most important concept is Job stress. Occupational stress is also called as burnout. Library Professional in academic libraries now appears to suffer from occupational stress. In present era the library professionals are faces with constant challenges in their working environments. In term of documents, infrastructure facilities, information etc., user’s expectations always seems to exceed library’s capacity in this digital environment. Stress study amongst library professionals is topical and challenging due to stress prevalence on the larger society affects library professionals.
Affiliation: Somvir,Sudha Kaushik
Keyword: Stress, Digital Environment, Occupational Stress, Library
8. Paper Title : MASST: Multi Agent Based Environment to measure complexity for software testing
Paper Id : (WAIMS/0029/0091/20-23)
Abstract: Agent Oriented modeling in software engineering is a new phenomena, we have observed that Agent- mediated environment and their technique represent an exciting new means of analyzing, designing and building complex software systems. Agent oriented software engineering significantly improves current practice in software engineering and to extend the assortment of applications that can be tackled feasibly. Yet, to date,, no standard methodologies, development tools, or software architectures.
Affiliation: Reema Ajmera, Dr. C.S. Lamba
Keyword: Multi Agent System, Software Testing, Agent Oriented Modeling
Download Full Paper
9. Paper Title : Developing an image based low cost solution to the OMR process: OMR Pheonix  
Paper Id :WAIMS/0069/128/33-36
Abstract: Optical Mark Recognition is the technique used to scan a marked paper to detect the presence or absence of the mark in a predetermined position. This technology is widely used in applications like Institutional research, community surveys, consumer surveys, examinations, data compilation, product evaluation etc. The most important use of OMR is the detection of pencil marked bubbles in optical answer sheets used in Multiple Choice Question examinations. Problem with the OMR technique lies is that, it cannot process thin papers and low printing precision answer sheets. In this paper a novel technique OMR Phoenix technique is presented that overcomes the limitations of OMR process. It scans the hard copies of papers which are designed and marked in a specific format and saves that scanned copy in JPEG format, then identifies the responses marked from the JPEG image and stores the result in database. Errors and their solutions which could creep in due to scaling, rotation, translation of the scanned copy are also presented..Affiliation: Astha Gupta ,Krishna Engineering college Ghaziabad, India ; Niraj Singhal,Shobhit University Meerut, IndiaKeyword: Optical Mark Recognition, Image Based Technique, Template Matching
10. Paper Title : Overseas Mediated Companies Initiatives In India Corce E Delizia
Paper Id :WAIMS/0019/0078/24-27
Abstract: MNCs has offered opportunities to gain new customer overseas , to achieve lower costs through overseas operation , and to achieve economies of scale .MNCs business can be undertaken through exports , licensing of products in favour of overseas partners franchising functional subsidiaries, partly/wholly owned subsidiaries, and joint venture .Indian organization are using all these avenue in varying proportion. There are numerous of reasons explaining why Indian market are becoming target of foreign corporation. The question rises here is that whether the introduction of huge mncs to Indian market is really beneficial or a curse .
Affiliation: TRIPTI ,scholar ICSI
Keyword: OMC (Overseas Mediated Companies), IOM(Impact of Overseas Market)
11. Paper Title : Enhancement of Security on E-commerce Based Application Using R-Idea Algorithm With Random key Generation Approach
Paper Id: (WAIMS/0029/0088/28-32)
Abstract: A computer network is an interconnected group of computing nodes, using a well defined protocol to interact and share resource in predicate manner. Security over the network is widely required, recognized and accepted. Security plays a crucial and critical role in e-commerce and m-commerce channels. To address the security a number of algorithms have been proposed and many are being used in cryptography to secure our information. But security is a question till now. The purpose of this paper is to introduce and demonstrate a new algorithm for e-commerce based information security. The purposed algorithm is based on IDEA (International Data Encryption Algorithm), IDEA is a powerful algorithm, and no successful liner or algebraic weakness reported yet. Since 1996 till date there is no change in IDEA algorithm. The proposed paper has implement of randomized key generation, to enhance the security in the existing IDEA algorithm.
Affiliation: Rahul Saxena, Dr. C.S. Lamba
Keyword: Randomized IDEA (R-IDEA), Diffie Hellman, International Data Encryption Algorithm (IDEA).
Download Full Paper
12. Paper Title : Comparative Study on Pre-Mature Software reliability methods
Paper Id: (WAIMS/0019/0089/33-39)
Abstract: Software industry suffers many challenges in developing a high quality reliable software. Many factors affect their development such as the schedule, limited resources, uncertainty in the developing environment and inaccurate requirement specification. Software Reliability Growth Models (SRGM) were significantly used to help in solving these problems by accurately predicting the number of faults in the software during both development and testing processes. The issue of building growth models was the subject of many research works. In this paper, we explore the use of fuzzy logic to build a SRGM. The proposed fuzzy model consists of a collection of linear sub-models joined together smoothly using fuzzy membership functions to represent the fuzzy model.Affiliation: Anjana Srivastava ,Dr. Sumit GillKeyword: SRM(Software Reliability Methods, SCP(Soft Computing Principles
13. Software Evolution Model for Learning Management System: an analytical Study 
Paper Id : WAIMS/0019/0082/52-58
Abstract: Software evolution aims at implementation and re-validation of possible vital changes to the system without being proceeds from the assumed cause to a related affect to predict how user requirement will evolve. The current system never gets completed, it is evolving in nature. As it evolve, the complexity of system grows simultaneously unless there is a better solution to resolve these complexity. Therefore software evolution focuses on ensuring reliability and flexibility of system. The concept of software evolution leads to open source development as anyone can download the source and make modification in terms of requirement. Learning management system is software application for those areas which broadly covers administration, tracking, reporting of training programs on-line event e-learning and many more. Learning management system are very much influenced from open source system. learning management are web based facility access to learning content and administration. Evolution here is very much necessary.In this paper we are representing views on how software evolution will help learning management system more effectivelyAffiliation: Dinesh Kumar Dharamdasani,Dr. C.S. Lamba
Keyword: Software Evolution, Learning Management System, Open Source Software
14. Paper Title : Multi Agent Framework for measuring software reliability 
Paper Id : WAIMS/0029/0085/59-65
Abstract: In relation with our research entitles MASST. We performed our research work. In our previous paper we presented various measurement testing techniques to measure complexity and after the study of various measurement techniques we find out there is a need of measurement technique which should be in terms of multi agent system for testing environment technique as experimental results show that the cost of development and testing of software are closely related to cost of development and testing of software which should result in terms of multi agent system technique. Procedure-oriented metrics (Line of code, Cyclomatic complexity and Halstead metric) , integrating the three procedure-oriented software complexity metrics i.e. LOC, Cyclomatic complexity and Halsteads metric measure the probability of error detection in system classes during testing and is to propose an investigation and analysis strategy to make these kinds of studies more reusable and comparable. Agent technologies enhance the complexity measure for software testing by virtue of their high level decomposition, independency and parallel activation. Now in this paper we develop a multi agent based complexity metric named as MASST which is closely related to reliability of software, the total software complexity is measured. This paper therefore provides a timely summary and enhancement of agent theory for measuring complexity of software.Affiliation: Reema Ajmera, Dr. C.S. LambaKeyword: System testing technique (MASST), Multiagent Based System, Complexity measurement Technique
15. Paper Title : Agricultural Information Systems and Services in Mahatma Phule Agricultural University under NARS: An Overview
Paper ID : WAIMS/0019/0081/66-73
Abstract: The Indian National Agricultural Research System generates substantial and quality Research Information which mostly remains within the confines of the respective stakeholders. It needs to be shared among the farming and research community globally. Since most of these documents are available in libraries, it is essential that libraries create an appropriate platform to share the research information. In that context the National Agricultural Technology Project (NATP) and the components of the National Agricultural Innovation Project (NAIP) with special reference to the Component-I under which all the important and most innovative web-based projects, i.e., e-Granth, CeRa and KrishiPrabha are rendering in Mahatma Phule Agricultural University Rahuri (M.S). The overview of these projects including objectives and deliverables has been highlighted especially keeping in view of the current scenario of the NARS. It further elaborates the rationale, mission and objectives of the projects, the methodologies, and work programs. It also shows the directions and outcomes of the projects. The long term positive deliverables of the projects have also been projected.Affiliation: Kalbande,D.T , Syed F.M, Dr.S.S.Sonwane
Keyword: Agricultural Information Systems, e-Granth, CeRa, Krishiprabha, NAIP, ICAR, NATP, MPKV
17. Paper Title : Social Media-The Next Powerhouse For Personalized Shopping                Paper Id : WAIMS/0019/0087/80-85
Abstract: shopping is everyone favorite activity, in our busy society, sifting and shifting in professional and personal lives, takes a toll on something as enjoyable as shopping. People increasingly have less time and are looking forward to resources that can lessen their work. First, it was wedding planners that went professional and now it’s the word personal shoppers that is making its presence felt globally. Personal shopping can be defined as an occupation where people help others shop by giving advice and making suggestions to customers Personal shoppers are also known as fashion stylists, shop assistants, image consultants or even sales assistants
Affiliation: Ripu R Sinha
Keyword: E-commerce, WBE(Web Based Engineering),IADE (Intelligent Application Development Environment)
18. Paper Title : A efficient business process integration and quality service for service oriented Architectures
Paper Id: WAIMS/0019/0084/74-79
Abstract: Agile integration satisfies the business agility and provides solutions for maintaining business changes and ensures that the enterprise survives in the current competition. Any business should be robust enough to respond to end user request. Existing traditional enterprise application is in-capable of integrating with different business silos, lacks to improve the business agility. To address this issue, this paper is about the agile integration of different business silos using ‘Service Oriented Architecture’ and its core technology enable the business enterprise systems flexible, loosely coupled and improve agility. Enterprise business systems have to adopt Service Oriented Architecture (SOA) as it promises to help them respond more rapidly to changing business requirements by composing new solutions from existing business services. Here we have discussed about definition of SOA, its layers, the core technologiesAffiliation: C. K. Gomathy,Dr. S. Rajalakshmi
Keyword: SOA (Service Oriented Architecture), ESB (Enterprise Service Bus), BPEL (Business Process Execution Language), BRE (Business Rules Engine), WSDL (Web Service Description Language), QoS (Quality of Service)
19. Paper Title : Prediction of organizational knowledge management practice for software engineering organization via multi agent
Paper Id :WAIMS/0069/00109/1-19
Abstract: Human resource is worthwhile in every organization. To make more return in a short time companies are starving at expertise human resource a research made on why the growth of Organization of developed company shows the growth line to the peak revel that they are expert in managing the expert. By the term expert we only mean that expertise of individual human mind. The simple policy they follow is the creation of experience factory. In our previous paper we paid attention on creation of experience factory by putting agent with them and that created organizational knowledge base accordingly. We adopted some research methodology for that. Now in this paper how Multi agent based knowledge management can make action as a whole.Affiliation: Dr. C.S LAMBA, Ripu R Sinha, Resarch Scholer NIMS University Rajasthan, Resarch Supervisor NIMS University Rajasthan
Keyword: SE-MABKM, MABKM, OKB, OKMP
20. Paper Title : A study on the consumer buying behavior of personal care products in more super market, chittoor district 
Paper Id: WAIMS/0049/108/28-32
Abstract: The study of consumer behavior is very important to the marketers because it enables them to understand and predict buying behavior of consumers in the marketplace; it is concerned not only with what consumers buy, but also with why they buy it, when and where and how they buy it, and how often they buy it, and also how they consume it & dispose it. Consumer research is the methodology used to study consumer behavior; it takes place at every phase of the consumption process: before the purchase, during the purchase, and after the purchase. Research shows that two different buyers buying the same product may have done it for different reasons; paid different prices, used in different ways, have different emotional attachments towards the things and so on. The present study is conducted to know about the consumer behavior towards personal care products in More Super market.Affiliation: B.ujwala Sitams college,chittoor,Andhra Pradesh
Keyword: Consumer behavior, market, buying, emotional attachments, consumption process.
21. Paper Title : Mining local frequent periodic patterns in time series database
Paper Id: WAIMS/0039/00204/42-45
Abstract: Mining of periodic patterns in time series databases is an interesting data mining problem. Generally there are two types of periodic patterns, that is fully periodic patterns and partial periodic patterns. Existing studies on periodic patterns from an entire time series. So for some time series fully periodic patterns may not be useful and complex. Here, we are providing a solution for partial patterns and more useful in the some of the time episode may exhibit periodic patterns. In this paper aims to discover the partial periodic patterns in locality of the time series data. We implemented a novel algorithm, Called LFPMiner (Local Frequent Periodic Pattern Miner), to find the local frequent periodic patterns in time series data. Experimental results show that this LFPMiner algorithm effective and efficient to reveal interesting local frequent periodic patterns.
Affiliation: B.Chakardhar, Shashi kumar, G. TOTAD ,GMR Institute of technology Rajam,Srikakulam,AP
Keyword: LFPMiner; Frequent Periodic Pattern; Datamining time series; Fully Periodic; Partial Periodic.
22 Paper Title : Evaluation of alternative centrality measure algorithm for tracking online community in social network 
Paper Id : WAIMS/0069/00105/46-50
Abstract: Network centrality is used to identify the most important/active people at the center of a network or those that are well connected. The tracking of single community in social networks is commonly done using some of the centrality measures employed in social network .The betweenness centrality measures has been used in SCAN (Social Cohesion Analysis of Network) method to track communities in social networks. This paper evaluates new alternative eigenvector centrality measures for tracking community and is more suitable compared to betweenness centrality measures algorithm.
Affiliation: Sanjiv Sharma and G.N. purohit, Department of Computer Science, Banasthali Vidyapeth,Banasthali , Rajasthan
Keyword: Social Network Analysis, Centrality, betweenness centrality, SCAN, Communities, Eigenvector centrality.
23 Paper title : A study on business ethics in advertising
Paper Id :WAIMS/0039/00104/37-41
Abstract: The field of advertising is extremely broad and diverse. In general terms, of course, an advertisement is simply a public notice meant to convey information and invite patronage or some other response. As that suggests, advertising has two basic purposes: to inform and to persuade, and while these purposes are distinguishable both very often are simultaneously present. Advertising is not the same as marketing (the complex of commercial functions involved in transferring goods from producers and consumers) or public relations (the systematic effort to create a favorable public impression or? image of some person, group, or entity). In many cases, though, it is a technique or instrument employed by one or both of these. Advertising can be very simple a local, event? Neighborhood,’ phenomenon or it can be very complex, involving sophisticated research and multimedia campaigns that span the globe. It differs according to its intended audience, so that, for example, advertising aimed at children raises some technical and moral issues significantly different from those raised by advertising aimed at competent adults. Business ethics refers to the application of ethics to business. It is the study of good and evil, right and wrong and just and unjust actions of business. In this present scenario business ethics constitutes right and wrong. For example, would it be right for a store manager to break a promise to a customer and sell same to someone else, whose need for it is greater? What, if anything should a moral employee do when his or her superiors refuse to look into apparent wrong doing in a branch office? If you innocently came across secret information about a competitor, would it be permissible for you to use it for your own advantage? What is moral and immoral? In present scenario business ethics are not followed by many companies in their advertisements and as well as some companies are following un-ethical practices so as to increase their profits by fraudulent activities towards the consumers. The present study gives glimpse on ethics in advertising, how it is useful for the business, what is negative impact and positive impact by the society .It also focuses on the Indian organizations up to what extent the ethical values are being followed in business operations and how the consumers are being affected by the fraudulent business activities.Affiliation: B.SUDHEER KUMAR, Sreenivasa Institute Of Technology and Management Studies (SITAMS), Chittoor, Andhra PradeshKeyword: business ethics, advertisements, consumers, moral and immora
24. Paper Title : A comparative and analysis of 4g technologies
Paper Id : WAIMS/0039/00135/20-23
Abstract: In recent years, there has been a plenty of paradigm shifts occurring in the way people across the world could connect and collaborate. Nowadays, wireless connectivity is almost everywhere and getting highly affordable even for people who are in the bottom of the pyramid. However wireless connection is liable for several changes and challenges and therefore is far more complex to implement and sustain than a wired system. Now, with the cool arrival of third and fourth generation communication technologies, the inhibiting trends such as unpredictability, signal fading, latency, jitter etc., are gradually disappearing for the good. The fourth generation (4G) wireless networks are all set to turn the current networks into end-to-end IP networks. With the massive adoption of IPv6, every single device in the world will have a unique IP address thereby IP based devices, networks and environments are going to shine in the days to unfurl. This significant transition enables everything tangible in our midst to join into the raging Internet bandwagon in order to be remotely monitored, managed and manipulated. If 4G is implemented correctly and comprehensively, it will truly and tantalizingly harmonize global roaming, high-speed connectivity, and transparent end-user performance on every mobile device in the world. 4G is set to deliver 100mbps to a roaming mobile device globally and up to 1gbps to a stationary device. This allows video conferencing, streaming picture-perfect video and much more. The maturity and stability of 4G technologies therefore breeds innovation at faster pace and hence possibilities for novel and people-centric services are huge. In this paper, we have highlighted the following critical issues for the leading wireless broadband standards such as WiMAX, Mobile WiMAX and 3GPP-LTE. This paper specifically discuss about the below-mentioned in detail. The evolution of mobile service from the 1G (first generation) to 4G (Fourth Generation) are The configuration details of Mobile WiMAX and LTE Benefits and usage patterns of these systems Comparison of these standards in order to enable users to choose the best as per his requirements and preferences.Affiliation: JAGREET KAUR, SHALINI WASAN ,Chandigarh College of Engineering & Technology
Keyword: WiMAX, 802.16e, 3GPP-LTE, SWOT
25. Paper Title : Analytical study of e-commerce security issues and challenges
Paper Id: WAIMS/0039/00205/64-69
Abstract: Due to popularity of internet and web environment electronic commerce services have risen to more and more attractive. E-commerce transaction information on network must be secure because information security is always a key factor that affects the growth of e-commerce. In this paper we are going to discuss the existence of e-commerce application security issues and e commerce security technology is analyzed.Affiliation: Rahul Saxena, Research Scholar NIMS University School of Computing Sciences; C.S. Lamba ,Research Supervisor NIMS University, School of Computing Sciences,
Keyword: e-commerce security; information security; hybrid encryption; symmetric encryption; asymmetric encryption
26. Paper Title : Effect of spirituality on effectiveness of employees in workplace
Paper Id: WAIMS/0069/00108/70-73
Abstract: The present study has been conducted on how spirituality affects the effectiveness of employees. For the purpose of study the data has been collected thorough structured questionnaire from the 100 respondents and analysis has been done with the help of non statistical tools like pie chart. After the analysis of data collected it can be concluded that spirituality not only affect the efficiency of the employees but it also reduces the work related stress and metal peace. Not only this, it also helps organization to improve its profitability and productivity.Affiliation: Prof. Anshu Thakur
Keyword: Spirituality, Workplace, Faith, Hope
27. Paper Title :  Optimizing the power of wireless sensor networks using the efficient cluster building method 
Paper Id :WAIMS/0039/00104/74-76
Abstract: The main challenge in wireless sensor network is power consumption must be optimized. In order to ensure increased lifetime for those devices. This project proposes a new centralized clustering method for a data collection mechanism in wireless sensor networks, during data collection, two mechanisms are used to reduce energy consumption: message aggregation and filtering of redundant data. These mechanisms generally use clustering methods in order to coordinate aggregation and filtering. The novel method proposes the use of a tabu search heuristic to solve this problem. The existing centralized clustering methods cannot be used to solve this issue due to the fact that our approach to model the problem assumes that the numbers of clusters and cluster heads are unknown before clusters are created, The clustering problem is modelled as a hyper graph partitioning and its resolution is based on a tabu search heuristic. The novel tabu search adaptation consists of defining three types of moves that allow reassigning nodes to clusters, selecting cluster heads, and removing existing clusters. As a result, this approach is suitable for handling network extensibility in a satisfactory manner.
Affiliation: C.M.Sathish Raja,Latha Mathavan Engineering CollegeKeyword: Wireless Sensor networks, Novel Tabu Search, Clustering Methods
28. Paper Title : Data Mining Techniques and their Implementation in Blood Bank Sector ân Review                                   
Paper Id: WAIMS/0039/00107/24-27
Abstract: This paper focuses on the data mining and the current trends associated with it. It presents an overview of data mining system and clarifies how data mining and knowledge discovery in databases are related both to each other and to related fields. Data Mining is a technology used to describe knowledge discovery and to search for significant relationships such as patterns, association and changes among variables in databases. This enables users to search, collect and donate blood to the patients who are waiting for the last drop of the blood and are nearby to death. We have also tried to identify the research area in data mining where further work can be continued.
Affiliation: Arvind Sharma, Head, Department of Computer Science, DAV Kota, Rajasthan, India ; Ankit Bhardwaj ,M.Tech Scholar, Department of Computer Science & Engg., HCTM, Kaithal, Haryana, IndiaKeyword: Data mining, KDD, Association Rules, Classification, Clustering, Prediction
29. Paper Title : Live network traffic analysis
Paper Id : WAIMS/0039/00135/59-63
Abstract: Society is becoming increasingly dependent upon systems of networked computers for performing essential functions in industry, commerce and transport. Many of these systems perform safety critical functions, or are responsible for storage and retrieval of sensitive data. With the increase in connectivity between computer networks it has become easier for unauthorized users to gain access to these systems. It may be possible to protect some critical systems from attack by physical isolation, but a compromise inevitably arises between useful access to data and functionality, and protection of these resources from misuse. A need has arisen for methods to monitor the activity of these complex systems to ensure efficient use of network resources, detecting and hopefully preventing misuse. This paper discusses various attack methodologies and various preventive measures are discussed to provide security from various attacks.
Affiliation: Jagreet Kaur, Shalini Wasan , Chandigarh College of Engineering & Technology
Keyword: networks, attacks, protocols, DoS
30. Paper Title : Research Challenges in E-Business – A Review
Paper Id:WAIMS/089/10231
Abstract: Electronic business refers to the use of Internet for doing business. Rush to E-Business sites attitude affects the quality of such sites in many ways. The increase of popularity of the e business sites are creating challenges everyday for the service provider. For developing an extensive E-Business model we have to analyze the various performance affecting issues and E-Business essentials. The primary aim of this paper is to discuss the issues which are affecting the quality of e business sites. Among that some of the major issues are scalability and security. Scalability is one of the important issue because, the lack of resource allocation leads to the loss of potential customer that will lead to the revenue loss of a particular concern. On the other side security issue creates bad image to the whole business that’s why trust building is an important target of every concern with proper security mechanism. In this paper we are trying to present the various methodologies involved in sorting out these issues and the future directions towards building most effective E-Business model.Affiliation: P.M. Durai Raj Vincent Assistant professor School of Information Technology and Engineering School of Information Technology and Engineering VIT University, India Dr. E. Sathiyamoorthy Associate professor School of Information Technology and Engineering School of Information Technology and Engineering ,VIT University, India
Keyword: Phishing, Trust, DNS, SSL.
31. Paper Title : A study of benefits and challenges of workplace diversity at al futtaim motors, dubai, united arab emirates.
Paper Id : WAIMS/089/10101/1-11
Abstract: Work place diversity is the key to survival and growth. It is felt that people sincerely want to contribute to the long-term success of their organizations. The changing demographics of U.A.E. has had a tremendous impact on our country’s economy and the way businesses approach their bottom lines. To be competitive, businesses must recognize this trend and take action to invest in and support the needs of its most important resource – their workforce. Workplace diversity is a reality created by individuals and groups from a broad spectrum of demographic and philosophical differences. Workplace diversity is a concept years old in the west, but it is recently gaining importance in the Middle East region. It is believed that companies employing a diverse workforce would be in a better position to understand the demographics of the customers they serve much better making them better able to thrive in the marketplace than companies that hire only a limited group of employee demographics. Also, a company that supports diversity of workforce is better able to address employee satisfaction and retention issues. A survey was undertaken at Al Futtaim Motors where the managers were asked to voice their opinion regarding potential benefits and challenges of workplace diversity. From the questionnaire administered, the findings point out that Al Futtaim believes that it is diverse, although that is not the case. The researcher has recommended certain measures which can be followed by Al Futtaim Motors to implement diversity initiatives in their workplace.Affiliation: Sulaksha Nayak, Senior lecturer, Department of Management Studies, Manipal University, Dubai, UAE. Dr. Harisha G. Joshi, Associate Professor, Manipal Center for Information Science, Manipal University, IndiaKeyword: Workplace Diversity, Demographics, Questionnaire, Benefits and Challenges
32. Paper Title : Mri  Brain Segmentation using adaptive Mean-shift clustering framework
Paper Id: WAIMS/089/10111/12-17
Abstract: A novel, fully automatic, adaptive, robust procedure for brain tissue classification from 3D magnetic resonance head images (MRI) is described in this paper. We propose an automated scheme for magnetic resonance imaging (MRI) brain segmentation. An adaptive mean-shift methodology is utilized in order to categorize brain voxels into one of three main tissue types: gray matter, white matter, and cerebro spinal fluid. The MRI image space is characterized by a high dimensional feature space that includes multimodal intensity features in addition to spatial features. An adaptive mean-shift algorithm clusters the joint spatial-intensity feature space, thus extracting a representative set of high-density points within the feature space, otherwise known as modes. Tissue segmentation is obtained by a follow-up phase of intensity-based mode clustering into the three tissue categories. By its nonparametric nature, adaptive mean-shift can deal successfully with non-convex clusters and produce convergence modes that are better applicant for intensity based categorization than the initial voxels. The performance of this brain tissue classification procedure is demonstrated through quantitative and qualitative validation experiments on both simulated MRI data (10 subjects) and real MRI data (43 subjects). The proposed method is validated on 3-D single and multimodal datasets, for both simulated and real MRI data. It is shown to perform well in comparison to other state-of-the-art methods without the use of a preregistered statistical brain atlasAffiliation: Bethanney janney j, sheeba abraham, SINDU divakaran Sathyabama University and Department of Biomedical Engineering, Chennai-119.
Keyword: Adaptive mean-shift, brain magnetic resonance imaging (MRI), segmentation.
33 Paper Title : Survey on fpga based embedded cryptography
Paper Id:WAIMS/089/10121/18-24
Abstract: Abstract Embedded systems require efficient yet flexible implementations of cryptographic primitives with a minimal impact on the overall cost of a device. In this paper we present the design of a functional unit (FU) for accelerating the execution of cryptographic software on 32-bit processors. The FU is basically a multiply-accumulate (MAC) unit able to perform multiplications and MAC operations on integers and binary polynomials.It is clear that Cryptography is computationally intensive. It is also known that embedded systems have slow clock rates and less memory. The idea for this research was to study the possibilities for analysis of cryptography on embedded systems. The basic approach was the implementation of cryptographic algorithms on high-end, state-of-theart, DSP chips in order to study the various parameters that optimize the performance of the chip while keeping the overhead of encryption and decryption to a minimum. Embedded systems are very resource sensitive. An embedded system is composed of different components, which are implemented in both hardware and software. Therefore, hardware-software co-synthesis is a crucial factor affecting the performance of embedded systems. Encryption algorithms are generally classified as data-dominated systems rather than ubiquitous control-dominated systems. Datadominated systems have a high degree of parallelism. Embedded systems populate the new generation gadgets such as cell phones and Smartcards where the encryption algorithms are obviously an integral part of the system. Due to the proliferation of embedded systems in all the current areas, there is a need for the systematic study of encryption techniques from the embedded systems point of view. This paper explored the different ways encryption algorithms can be made to run faster with much less memory. Some of the issues investigated were overlapped scheduling techniques for high-level synthesis, structural partitioning, real-time issues, reusability and functionality, random number and unique key generators, seamless integration of cryptographic code with other applications and architecture specific optimization techniques.Affiliation: Pratibha Rohilla , M.Tech(Computer Science) Rajasthan Technical University(RTU), Kota, India
Keyword: Specific Optimization Techniques
34. Paper Title : Survey on FPGA based embedded cryptography
Paper Id:WAIMS/089/10121/18-24
Abstract: Abstract Embedded systems require efficient yet flexible implementations of cryptographic primitives with a minimal impact on the overall cost of a device. In this paper we present the design of a functional unit (FU) for accelerating the execution of cryptographic software on 32-bit processors. The FU is basically a multiply-accumulate (MAC) unit able to perform multiplications and MAC operations on integers and binary polynomials.It is clear that Cryptography is computationally intensive. It is also known that embedded systems have slow clock rates and less memory. The idea for this research was to study the possibilities for analysis of cryptography on embedded systems. The basic approach was the implementation of cryptographic algorithms on high-end, state-of-theart, DSP chips in order to study the various parameters that optimize the performance of the chip while keeping the overhead of encryption and decryption to a minimum. Embedded systems are very resource sensitive. An embedded system is composed of different components, which are implemented in both hardware and software. Therefore, hardware-software co-synthesis is a crucial factor affecting the performance of embedded systems. Encryption algorithms are generally classified as data-dominated systems rather than ubiquitous control-dominated systems. Datadominated systems have a high degree of parallelism. Embedded systems populate the new generation gadgets such as cell phones and Smartcards where the encryption algorithms are obviously an integral part of the system. Due to the proliferation of embedded systems in all the current areas, there is a need for the systematic study of encryption techniques from the embedded systems point of view. This paper explored the different ways encryption algorithms can be made to run faster with much less memory. Some of the issues investigated were overlapped scheduling techniques for high-level synthesis, structural partitioning, real-time issues, reusability and functionality, random number and unique key generators, seamless integration of cryptographic code with other applications and architecture specific optimization techniques.Affiliation: Pratibha Rohilla , M.Tech(Computer Science) Rajasthan Technical University(RTU), Kota, India
Keyword: Specific Optimization Techniques
35. Paper Title : A Review of wearable sensors
Paper Id:WAIMS/089/10271
Abstract: The aim of this review paper is to summarize recent developments in the field of wearable sensors and systems. Modern communication systems have extended this monitoring remotely. In this survey, various types of wearable sensors discussed their medical applications like ecg, eeg, blood pressure, detection of blood glucose level, pulse rate, respiration rate and non medical applications like daily exercise monitoring and motion detection of different body parts. Wearable monitoring systems can provide continuous physiological data, as well as better information regarding the general health of individuals. A short description of key enabling technologies (i.e. Sensor technology, communication technology, and data analysis techniques) that have allowed researchers to implement wearable systems is followed by a detailed description of major areas of application of wearable technology.Affiliation: Rajesh namdev Asst. Professor Electronics deptt. Iitm Nh-75 sithouli, Gwalior (m.p.)
Keyword: mm
 36. Paper title : A Study on Biometric Multimodality: Secure authentication break 
Paper Id :WAIMS/089/10141
Abstract: Abstract Over the last few years a new area of engineering science has been established whose products are likely to create a large market in the near future. It has been called ”biometrics”. The pioneers of this new domain intend to construct devices which would allow identification of a person on the basis of his/her ”biological” characteristics: voice, dynamics of movements, features of face and other parts of the body, retina or iris pattern. Biometrics is the science that tries to fetch human biological features with an automated machine either to authentication or identification. In this paper we are going to enumerated Biometrics modalities and performance. This paper gives an overview of biometric approaches with different kinds of methods.
Affiliation: Prof. Chandrakant D. Patel AMPICS MCA Department, Ganpat Univerity, Kherva
Keyword: biometric
 37.  Paper Title : Trusted Operating System Approach for Security of an OS with JAVA
Paper Id:WAIMS/089/10151
Abstract: In a little more than a decade since the inception of the java language, the java ecosystem has evolved into one that businesses around the world look to for secure, robust, and manageable web-based applications that serve the enterprise. Java was created to be exploited in highly distributed environments. The portability of the language meant that security had to be incorporated in the very first steps of java application development. This way, application users could be assured that the code they obtained was secure and had not been tampered with during transmission. This paper explains how to achieve that security. This paper explores the integrated java platform security that results from the synergy of these two world-class environments. Java security as implemented by the jvm operates above the operating system security services, meaning that java security is actually implemented in the jvm run-time environment. The privileges to be given at the host operating system level to the java applications execution streams are well established and fully controlled. The paper describes the java security model as implemented in the z/os jvmâ„¢. In this paper we are also discussing about various security levels of an os. This paper will give the brief description of racf & its groups with respect to z/os. In this paper we are trying to integrate the java security with the security of an os. This paper will explain about the os security environment, its terminology, racf, jni & security, & trusted operating system.
Affiliation: Gaurav indoria research scholar, M.tech Suresh Gyan Vihar University , Kamlesh lakhwani assistant professor, Suresh Gyan Vihar university
Keyword: General Terms Security, Trusted OS, JAVA, JNI, Levels. Keywords Java, Java Security, JVM, z/OS, Security Levels, Trusted OS.
38. Paper title : A Survey of Routing Protocols in Mobile Ad Hoc Networks (MANET)
Paper Id:WAIMS/089/10161
Abstract: Mobile Ad-hoc Networks is a kind of wireless ad-hoc network. MANET is composed of mobile nodes without any fixed infrastructure. The routers are free to move randomly which results in the dynamic nature of network topology. In a MANET all nodes can be source as well as forwarders of traffic. Due to the dynamic nature of network topology finding the root between source and destination is a very important and necessary issue for mobile ad hoc networks. Routing protocols for MANETs could be differing depending on the application and network architecture. Because traditional routing protocols cannot be directly applied in the MANET, a lot of routing protocols for unicast, multicast have been proposed since the advent of the MANET. This survey gives a study of routing protocols in the MANET.Affiliation: Divya C. Department of Computer Science Engineering Christ University Faculty of Engineering, Bangalore
Keyword: MANET, Multicast, Routing protocol, security unicast, On-Demand Routing, Tables Driven Routing, Hybrid Routing.
39. Paper Title : A Survey on the Current & the Traditional Routing Protocols for Ad Hoc Wireless Networks    
Paper Id: WAIMS/089/10171
Abstract: Routing is needed to find a path between source and destination and to forward the packets appropriately. Routing protocols are developed for the wired networks such as the wired Internet are inadequate, as they not only assume mostly fixed topology but also have high overheads. This has lead to several routing proposals specifically targeted for ad hoc networks. An Ad Hoc network is a set of wireless mobile nodes forming a dynamic autonomous network through a fully mobile infrastructure. The nodes communicate with each other without the intervention of centralized access points or base stations, so each node acts both as a router and as a host. The Traditional algorithms (Traditional routing protocol) have not been designed with a highly dynamic topology, the asymmetric links, or the interference in mind. Routing in wireless ad-hoc networks cannot rely on layer three knowledge alone. A good routing protocol for the network environment has to dynamically adapt to the changing network topology. .Affiliation: Amresh Kumar, Department of Computer Science and Engineering Christ University, Bangalore
Keyword: Ad Hoc network, wireless networks, Traditional routing algorithms protocol, routing protocol
40. Paper title : A Novel Page Rank Algorithm for Web Mining based on User’s Interest 
Paper Id:WAIMS/089/10181
Abstract: The web can be viewed as the largest database available and presents a challenging task for effective design and access. With the tremendous growth of Web, the main objective is to provide relevant information to the user to fulfil their needs. Data Mining applied to Web has the potential to be quiet beneficial. Web Mining is the mining of data related to World wide Web. Web search engines are usually designed to serve user requirement without considering the user’s interest. In this paper we present Web content mining technique known as Personalization. With Personalization, Web access or the contents of a Web page are modified to better fit the desires of the user. This may involve actually creating Web pages that are unique per user or using the desires of a user to determine what Web documents to retrieve. This paper deals with the analysis of various Page Rank algorithms for Web mining based on user’s interest.Affiliation: Arun Kumar Singh, Computer Science Department, Noida International University Greater Noida, GautambudhNagar, India Niraj Singhal,School of Computer Engineering and Information Technology Shobhit University, Meerut, India
Keyword: Page Rank, Web Mining, Personalized Search, Personalization
41. Paper Title : Mri Brain Segmentation using adaptive Mean-shift clustering framework   
Paper Id: WAIMS/089/10111/12-17
Abstract: A novel, fully automatic, adaptive, robust procedure for brain tissue classification from 3D magnetic resonance head images (MRI) is described in this paper. We propose an automated scheme for magnetic resonance imaging (MRI) brain segmentation. An adaptive mean-shift methodology is utilized in order to categorize brain voxels into one of three main tissue types: gray matter, white matter, and cerebro spinal fluid. The MRI image space is characterized by a high dimensional feature space that includes multimodal intensity features in addition to spatial features. An adaptive mean-shift algorithm clusters the joint spatial-intensity feature space, thus extracting a representative set of high-density points within the feature space, otherwise known as modes. Tissue segmentation is obtained by a follow-up phase of intensity-based mode clustering into the three tissue categories. By its nonparametric nature, adaptive mean-shift can deal successfully with non-convex clusters and produce convergence modes that are better applicant for intensity based categorization than the initial voxels. The performance of this brain tissue classification procedure is demonstrated through quantitative and qualitative validation experiments on both simulated MRI data (10 subjects) and real MRI data (43 subjects). The proposed method is validated on 3-D single and multimodal datasets, for both simulated and real MRI data. It is shown to perform well in comparison to other state-of-the-art methods without the use of a preregistered statistical brain atlas
Affiliation: Bethanney janney j, sheeba abraham, SINDU divakaran Sathyabama University and Department of Biomedical Engineering, Chennai-119.
Keyword: Adaptive mean-shift, brain magnetic resonance imaging (MRI), segmentation.
 42. Paper Title : New technique to mitigate DDOS attack 
Paper Id:WAIMS/089/10191
Abstract: In this paper, we explore a new scheme for filtering spoofed packets which is a combination of adaptive threshold puzzle and Path fingerprint scheme. In ingress router, adaptive threshold puzzle is placed, which have been proposed to add DDOS resistance to authentication protocols. In the egress side, we propose Path fingerprint, packet marking approach in which a path fingerprint is embedded in each packet, enabling a victim to identify packets traversing the same paths through the internet on a per packet basis, regardless of source IP address spoofing. Our design has the following advantages, 1) Reduces the network traffic, as we place an adaptive threshold puzzle at the ingress router. 2) Mapping table at the server is light weight and moderate. 3) The time management of solved puzzle instances, thus marking the protocol resistant to strong attacks.Affiliation: V.Praveena Department of Computer Science and Engineering Dr.N.G.P. Institute of Technology Coimbatore, Tamilnadu, India
Keyword: Adaptive threshold client puzzle, DDOS attack, Egress router, Ingress router, Pi Filtering.
43. Paper Title : Implementation Of Branch Search Algorithm For Automation Testing Technique 
Paper Id: WAIMS/089/10201
Abstract: The use of techniques for automating the generation of test scripts is important as it can reduce the time and cost of the process. The recent method for automatic generation of tests using metaheuristic techniques i.e. Genetic Algorithms and Simulated Annealing. There is a great deal of research into the use of Genetic Algorithms to obtain a specific coverage in software testing but none is using the Branch search technique. This paper presents an efficient testing technique that combines Branch Search with Korel’s chaining approach. Proposed technique automatically generates test data in order to obtain complete branch coverage in software testing.
Affiliation: K.Suresh Babu, Assoc.prof, Dept of CSE, LIET, Vizianagaram, Andhra Pradesh, India. R.L.Divakar Asst.prof, Dept of CSE, LIET, Vizianagaram, Andhra Pradesh, India
Keyword: Genetic Algorithm, Branc Korel’s chaining h Search
44. Paper Title : Context based Index Construction for Web Search Engines using Agents   
Paper Id : WAIMS/089/10281
Abstract: Main goal of search engine is to provide most relevant documents to the users in minimum possible time. The major issue for performances of Web Search Engine is to provide efficient and fast access to the index. Indexing is performed on the web pages after they have been collected into the repository by the crawling agent. The existing architecture of search engine shows that the index is built on the basis of the terms of the document and contains posting lists where each posting list is associated with a term as well as the identifiers of the documents containing the term. The current information retrieval systems use terms to describe documents and search engines. In this paper, we propose an indexing structure in which index is built on the basis of context of the document using migrating agents. The agent-based collection selection method uses context to describe collection of the documents and search engines. The context of the documents being collected by the crawling agent in the repository is being extracted by the indexer agent using the context repository, thesaurus and agent repository and then documents are indexed according to their respective context.
Affiliation: Rahul Kumar Sharma, Computer Science Department, Guru Nanak Education Trust’s Group of Institutions Roorkee, Uttarakhand, India Niraj Singhal School of Computer Engineering and Information Technology Shobhit University, Meerut, IndiaKeyword: Web search engine, context based index, agents, posting list
45. Paper Title : A Paper On Portfolio management In Selected Companies In India
Paper Id:WAIMS/089/10211
Abstract: Portfolio management can be defined and used in many ways, because the basic meaning of the word is “combination of the various things keeping intact”. So I considered and evaluated this from the perspective of the investment part in the securities segment. From the investor point of view this portfolio followed by him is very important since through this way one can manage the risk of investing in securities and thereby managing to get good returns from the investment in diversified securities instead of putting all the money into one basket. Now a day’s investors are very cautious in choosing the right portfolio of securities to avoid the risks from the market forces and economic forces. So this topic is chosen because in portfolio management one has to follow certain steps in choosing the right portfolio in order to get good and effective returns by managing all the risks. This topic covers how a particular portfolio has to be chosen concerning all the securities individual return and there by arriving at the overall portfolio return. This also covers the various techniques of evaluation of the portfolio with regard to all the uncertainties and gives an edge to select the right one. The purpose of choosing this topic is to know how the portfolio management has to be done in arriving at the effective one and at the same time make aware the investor to choose the securities which they want to put their investment in the portfolio. This also gives an edge in arriving at the right portfolio in consideration to different securities rather than one single security. The project is undertaken for the study of my subject thoroughly while understanding of the investor and myself.Affiliation: B. Sudheer Kumar, Assistant Professor, Dep’t of MBA Sreenivasa Institute of technology and Management Studies (SITAMS), Chittoor (DT), T. Kusuma,Assistant Professor, Dep’t of MBA, Sreenivasa Institute of technology and Management Studies (SITAMS), Chittoor (DT),
Keyword: Risk and Return for selected companies, Combination of companies has provided risk and returns.
46. Paper Title : Agglomerate Clustering Based Index construction for Search Engines using Agents   
Paper  Id : WAIMS/089/10221
Abstract: The information on World Wide Web is growing at an exponential rate; therefore search engines are required to index the downloaded web documents. Indexing in search engines is an active area of current researches. The main aim of search engine is to provide best relevant documents to the users in minimum possible time. The major issue for performances of Web search engine is to provide efficient and fast access to the index. Indexing is performed on the web pages after they have been collected into the web page repository by the crawling agent community. Web search engines use inverted file index that consists of an array of the posting lists where each posting list is associated with a term and contains the term as well as the identifiers of the documents containing the term. Since the document collected by crawling agent stored in web page repository and indexer agent extract the document from page repository. Where the matcher agent that will take all the document extracted by the indexer agent for checking the document similarity between them and store the same similarity document in mincluster. In this paper, we presents Agglomerative hierarchical clustering algorithm which aims at partitioning the set of documents into ordered cluster so that the document within the same cluster are similar and are being assigned the closer document identifiers.Affiliation: Rahul Kumar Sharma, Computer Science Department, Guru Nanak Education Trust’s Group of Institutions Roorkee, Uttarakhand, India Niraj Singhal School of Computer Engineering and Information Technology Shobhit University, Meerut, India
Keyword: Web search engine, posting list, agent,Agglomerativehierarchical clustering, document identifiers
47. Paper Title : A Trust-Aware Routing Framework for WSNs 
Paper Id:WAIMS/089/10241
Abstract: The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multi-hop routing, we have designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, TARF provides trustworthy and energy efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception
Affiliation: CHITRA S.R & JEBASI C. M.E-CSE, Udaya School of Engineering Mrs.A.Ann Romalt, M.E Asst.prof, Dept of CSE, Udaya School of Engineering
Keyword: wns
48. Paper Title : Techniques To Improve Data Intensive Sequence Analysis Algorithms: A Study  Paper Id : WAIMS/089/10261
Abstract: In this paper we discuss about the various methods to improve data intensive sequence analysis algorithms such as deployment some advance data structure for handling molecular sequences, thereafter compression of these data structures and parallelization of existing sequence anaysis algorithms on multicore architecture. In the end, we also do deep study on multicore architecture
Affiliation: Mr. Binay Kumar Pandey Affiliation-:G B Pant University Of Agriculture And Technology Pantnagar Contact Authors:-Binay Kumar Pandey, Digvijay Pandey
Keyword: Sequence Analysis: fasta: cell broadband engine: sequence search
49. Paper Title : Survey of routing protocols for adhoc wireless networks 
Paper Id :WAIMS/089/10131
Abstract: An ad-hoc wireless network is a collection of nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. Routing is a challenging issue in ad-hoc wireless network. In this report, it is described about the traditional routing protocols and issues in the traditional routing protocols. This report presents the various types of routing protocols for ad-hoc wireless networks including comparison of individual routing protocols. This report aims at providing the best routing protocol for ad-hoc wireless networks by presenting comparison tables with advantages and disadvantages.
Affiliation: Kiran M ,Department of Computer Science ,Christ University Faculty of Engineering
Keyword: Routing Protocol, Traditional Routing Protocol, Table-Driven Routing Protocol, On-Demand Routing Protocol, Hybrid Routing Protocol.
50. Paper Title : Digital Image Watermarking.
Paper Id:WAIMS/089/10251
Abstract: The drastic advancement of digital technologies has demanded the owners to pay immense attention in securing their digital contents. Of late, watermarking has been utilized by researchers for the security of digital documents. However the embedded watermark data can be easily hacked by the hackers and thus result as a threat to protection of digital content. The proposed method is an efficient scheme for protecting the copyrights of digital images with the aid of both biometrics and digital watermarking. Newer data hiding techniques that satisfy the requirements of imperceptibility, robustness, capacity, or data hiding rate and security of the hidden data etc., are being developed. Therefore the preference to go for digital image watermarking, to show resiliency against various unintentional or deliberate attacks has increased. In this paper implementation of two different watermarking algorithms in the frequency domain will be presented. The first algorithm is based on the Discrete Wavelet Transform (DWT), the second one is based on the Bi-orthogonal Wavelet Transform (BWT). Embedding the watermark is done by modifying the coefficients of the middle frequency band within region of non-interest (RONI) so that the visibility of the image and diagnosis capability will not be affected and the watermark will not be removed by attacks. All schemes are tested using medical images and the simulation results are compared and the comparison shows that the best scheme is that based on using BWT.Affiliation: B. Rajendra Prasad Department of ECE, S.V.UNIVERSITY, Titupati, 517502.INDIA. K.Vinayaka2Keyword: Copyright, DCT, BWT, Attacks
51. Paper Title : Blowfish algorithm: Security and performance enhancement  
Paper Id: WAIMS/0015/089
Abstract: Wired and wireless networks are becoming popular day by day. Due to rapid growth of networks, information security becomes more important to protect commerce secrecy and privacy. Encryption algorithm plays a crucial role in information security but securing data also consumes a significant amount of resources such as CPU time and battery power. In this context the evolution and evaluation of new encryption system is inextricably linked to the process of realizing ever increasing network security needs. In this paper I try to present the various ways through which performance of a blowfish algorithm can be enhanced.Affiliation: Pratibha Rohilla ,M.Tech. (Computer Science, Pursuing), Rajasthan Technical University Kota, Rajasthan, India
Keyword: Blowfish, Cipher
52. Paper Title : Implementing Hierarchical Clustering Method for Multiple Sequence Alignment and Phylogenetic Tree Contraction
Paper Id :WAIMS/0015/090
Abstract: With the addition of more data in the field of proteomics, the computational methods need to be more efficient. The fraction or the part of molecular sequence that is more resistant to change is functionally more important to the molecule. Comparative approaches are used to ensure the reliability of sequence alignment. The problem of multiple sequence alignment (MSA) is a proposition of evolutionary history. The explicit homologous correspondence of each individual sequence position is established for each column in the alignment. In the present work, the different pair-wise sequence alignment methods are discussed. The limitation of these methods is that they are capable for aligning the limited number of sequences having small sequence length. A new method is proposed for sequence alignment based on the local alignment with consensus sequence. The triticum wheat varieties sequences are considered which are loaded from the NCBI databank. The dataset is divided into two parts and two phylogenetic trees are constructed for each dataset. Using advanced pruning techniques, a single tree is constructed from the two trees generated. Then by applying the threshold condition, the closely related sequences are extracted and optimal MSA is obtained using shift operations in both directions.
Affiliation: Harmandeep Singh#1, Er. Rajbir Singh Asst. Prof.*2 , Navjot Kaur*3 Lala Lajpat Rai Institute of Engineering. and Tech., Moga Punjab, INDIA 1
Keyword: Multiple Sequence Alignment, Local Alignment, NCBI Data Bank, Phylogenetic Tree
53. Paper Title : Synchronization Techniques in OFDM Systems
Paper Id: WAIMS/0015/091
Abstract: Orthogonal frequency-division multiplexing (OFDM) is a powerful technique for high data-rate transmission over fading channels. OFDM systems have experienced increased attention in recent years and have found applications in a number of diverse areas including telephone-line based links, digital audio and video broadcasting systems, and wireless local area networks (WLAN). Among modern communication techniques, OFDM has become one of the candidate techniques for future mobile communication due to its high data rate transmission capability and its robustness to multi-path delay spread. However, OFDM systems are much more sensitive to synchronization errors than single carrier systems. So Synchronization is a key issue in the design of a OFDM. Here we will discuss the different techniques for synchronization.
Affiliation: Rakhi Thakur,MANIT,Bhopal, Dr.Kavita Khare MANIT,Bhopal,
Keyword: OFDM; Frame Synchronization; Symbol Timing Synchronization.
54. Paper Title : Implementation of Object-oriented Approach using Group-6 Theory
Paper Id:WAIMS/0015/093
Abstract: This paper will address the importance of the Group-6 theory. The Group-6 theory is a problem-solving process which, through a series of steps, helps produce a new computer information system. Each step from system planning, system analysis, system design & implementation and system maintenance conducted in sequence should provide the answers to a problem. An example may be a user which employs an order system, may sense a problem with that system because customers may complain that orders are late or being lost. The Group-6 theory, through the steps previously mentioned, would help correct and improve the system and operations of the order entry process. In this paper, the Group-5 theory accepts Object Oriented Techniques. In Object Oriented Technique, there is no unique process to combine the all level of classes and proper implementation of those classes up to maintenance.
Affiliation: Arvind Kumar Mishra ,Fateh Chand Rana Gautam ,Buddha Technical University, Lucknow MCA Dep’t, SRMSCET, Bareilly
55. Paper Title : NANOROBOTS FOR LAPAROSCOPI CANCER SURGERY
Paper id : WAIMS/0015/092
Abstract: Robots have been a science fiction for a long time before technological development brought them in to the reality. Nanotechnology can enable build the bridges for the post-human future through the fabrication of Microscopic robots comprised of nanocomponents. Such nanorobots are expected to have dimensions comparable to bacteria. Revolutionary possibilities are expected with the use of nanorobots in biomedical applications. The challenge to effectively build nanorobots and develop Control design to enable their operation is a worthwhile effort. We presented here that, how the robots find application in medical field. This paper presents innovative hardware architecture for medical nanorobot using nanobioelectronics and wireless technologies .The gradual development and future use of nanorobot for cancer surgery. Nanorobots are expected to provide advance in medicine through the miniaturization from microelectronics to nanoelectronics .The biomedical interventions and manipulations are automatically performed by nanorobots. Nanorobots are theoretical microscopic devices measured on the scale of nanometers (1 nm equals one millionth of a millimeter). The nanorobot capability to detect cancer targets is demonstrated through extensive analysis. Nanorobots can provide information for the surgeons to deal with the medical procedure precisely mapping the target areas requiring dissections. The conclusions for the proposed model are obtained with real time 3D simulations based on clinical parameters.
Affiliation: Mageshkumar.V
Keyword: Nano Robot
56. Paper Title :A Study on the Impact and Relation of Development with the Science and Technology 
Paper id : WAIMS/0015/093
Abstract: Our Nation’s economic growth depends on our capacity to educate, innovate, and build. Long-term national investments in basic and applied research and development (R&D) play an important role in the flow of market-based innovations through a complex system that leverages the combined talents of scientists and engineers, entrepreneurs, business managers and industrialists. These funds have led to everything from small entrepreneurial initiatives to growth in high technology industries with the concomitant employment of millions of workers. The large impact on employment results from innovation impacts not only in high tech enterprises, but also other industries that benefit from increased capabilities and productivity. The present paper envisages the important aspects in the development in Science and Technology. Mutually reinforcing and complementary investments in R & D by both private and public sectors work in concert to support the development, production, and commercialization of new products and processes. Investment in R&D is not the only factor that affects the rate of and capacity for innovation, public policies, including monetary policy, tax policy, standards, procurement, regulatory policy, the availability of a skilled technical workforce, and market access are also important in establishing an environment that fosters innovation. Given this critical time in our Nation’s economic trajectory, careful consideration of our portfolio of innovation policies including R&D investment practices and public policy is needed to foster national prosperity and to increase national access to the global economy.
Keyword – Technology, Innovation, Development,Sustainability, Economy
Name & Affiliation : Rajesh Gupta,Lecturer, Govt. College, Malpura (Tonk).