Professional Documents
Culture Documents
CONTENTS
Sr. No.
Page No.
6-7 8-9 10-11 12-13 14-15 16-17 18-19 20-21 22-23 24-25 26-27 28-29 30-31 32-33 34-35 36-37
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
38-39
December
2011
IJMIE
Volume 1, Issue 7
ISSN: 2249-0558
__________________________________________________________
Chief Patron
Dr. JOSE G. VARGAS-HERNANDEZ
Member of the National System of Researchers, Mexico Research professor at University Center of Economic and Managerial Sciences, University of Guadalajara Director of Mass Media at Ayuntamiento de Cd. Guzman Ex. director of Centro de Capacitacion y Adiestramiento
Patron
Dr. Mohammad Reza Noruzi
PhD: Public Administration, Public Sector Policy Making Management, Tarbiat Modarres University, Tehran, Iran Faculty of Economics and Management, Tarbiat Modarres University, Tehran, Iran Young Researchers' Club Member, Islamic Azad University, Bonab, Iran
Chief Advisors
Dr. NAGENDRA. S.
Senior Asst. Professor, Department of MBA, Mangalore Institute of Technology and Engineering, Moodabidri
MS. R. KAVITHA
Assistant Professor, Aloysius Institute of Management and Information, Mangalore, INDIA
December
2011
IJMIE
Volume 1, Issue 7
ISSN: 2249-0558
__________________________________________________________
Editorial Board
Dr. CRAIG E. REESE
Professor, School of Business, St. Thomas University, Miami Gardens
Dr. S. N. TAKALIKAR
Principal, St. Johns Institute of Engineering, PALGHAR (M.S.)
Dr. P. MALYADRI
Principal, Government Degree College, Osmania University, TANDUR
Dr. T. DULABABU
Principal, The Oxford College of Business Management, BANGALORE
Dr. S. D. SURYAWANSHI
Lecturer, College of Engineering Pune, SHIVAJINAGAR
Dr. S. KALIYAMOORTHY
Professor & Director, Alagappa Institute of Management, KARAIKUDI
Prof S. R. BADRINARAYAN
Sinhgad Institute for Management & Computer Applications, PUNE
December
2011
IJMIE
Volume 1, Issue 7
Mr. SANJAY ASATI
ISSN: 2249-0558
__________________________________________________________
Dept of ME, M. Patel Institute of Engg. & Tech., GONDIA(M.S.)
Mr. G. Y. KUDALE
N.M.D. College of Management and Research, GONDIA(M.S.)
Dr. N. KAVITHA
Assistant Professor, Department of Management, Mekelle University, ETHIOPIA
Prof C. M. MARAN
Assistant Professor (Senior), VIT Business School, TAMIL NADU
Dr. S. K. SINGH
Asst. Professor, R. D. Foundation Group of Institutions, MODINAGAR
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
December
2011
IJMIE
Volume 1, Issue 7
ISSN: 2249-0558
__________________________________________________________
Prof. Dr. BADAR ALAM IQBAL
Associate Professor, Department of Commerce, Aligarh Muslim University, UP
Technical Advisors
Mr. Vishal Verma
Lecturer, Department of Computer Science, Ambala, INDIA
Associate Editors
Dr. SANJAY J. BHAYANI
Associate Professor ,Department of Business Management, RAJKOT, INDIA
Mr. P. PRABHU
Assistant Professor, Alagappa University, KARAIKUDI
December
2011
IJMIE
Volume 1, Issue 7
ISSN: 2249-0558
__________________________________________________________
Title
Author(s)
TANIMOWO N. BOLANLE
Department of Urban & Regional Planning, Ladoke Akintola University of Technology, Ogbomoso, Oyo State, NIGERIA.
MUILI A.B
Department of Urban & Regional Planning, Ladoke Akintola University of Technology, Ogbomoso, Oyo State, NIGERIA.
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
December
2011
IJMIE
Volume 1, Issue 7
ISSN: 2249-0558
__________________________________________________________
ABSTRACT:
The study evaluates community participation in rural water supply scheme in Oke-Ogun area of Oyo State, Nigeria. The specific objectives for the study include examination of socioeconomic characteristics, identification of rural water supply schemes, appraisal of the level of community participation in planning and implementation of water supply scheme, examination of problems and offering practicable and appropriate measures of improving the level of community participation in rural water supply scheme. The data were collected through questionnaires prepared for community members. A total of 1,193 respondents were interviewed using random sampling techniques. Data were further analyzed using both descriptive and analysis of variance (ANOVA). The findings revealed presence of low income, lack of formal education, bad leadership, low level of participation in rural water supply schemes. It was concluded that there is need to seek greater involvement in planning and implementation of water facilities, so as to facilitate greater efficiency in the delivery of water supply to the rural communities.
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
December
2011
IJMIE
Volume 1, Issue 7
ISSN: 2249-0558
__________________________________________________________
Title
Author(s)
Dr. Ali Musa Abaker
Assistant Professor, Department of Agricultural Economics and Rural Development, Faculty of Natural Resources and Environmental Studies, University of Kordofan, P O Box Elobeid, Sudan
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
December
2011
IJMIE
Volume 1, Issue 7
ISSN: 2249-0558
__________________________________________________________
ABSTRACT:
This research paper aims to address income poverty and inequality in Sudan. Poverty and inequality indicators were computed using both primary and secondary data sources. P-alpha equation, Povstat and Simsip models were used for poverty assessment and simulation. Results showed that more than 65 percent of the population in Sudan living with poverty. Inequality Gini index was 75 percent. The future prospect of poverty in Sudan showed declining trend, growth would slightly reduce poverty and inequality. The combined effect of growth and food prices increase would also reduce poverty and inequality. However, the decomposition of this effect into income and distribution effects, income effect would reduce poverty while the distributional effect would increase extreme poverty indicators.
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
December
2011
IJMIE
Volume 1, Issue 7
ISSN: 2249-0558
__________________________________________________________
Title
Performance Evaluation of On-demand AODV and DSR Routing Protocols in Mobile Ad-hoc Network
Author(s)
Muhammad Ashraf
Student of MS (CS) Department of Computer Science, University of Agriculture, Faisalabad, Pakistan
Tasleem Mustafa
Chairman Department of Computer Science,
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
December
2011
IJMIE
Volume 1, Issue 7
ISSN: 2249-0558
__________________________________________________________
Abstract:
Wireless networks history began in the period of 1970s and the awareness has been increasing ever since. Mobile Ad hoc Network (MANET) is a collection of wireless mobile nodes, which build network dynamically, and does not require any infrastructure support for transferring data packet between two mobile nodes. These are often known as infrastructure-less networking because the mobile nodes in such network establish routes between themselves dynamically. Communication and administrative tasks can be carried out between the computers without using any wire. MANETs are recognized by infrastructure less environment, multihop wireless connectivity, and frequently changing topology. An experimental analysis regarding performance evaluation of well known ad hoc protocols AODV and DSR has been carried out using network simulators OPNET 14.0. To evaluate the performance of AODV and DSR random mobility model is used and performance differential parameters are analyzed in terms of throughput, end to end delay, network load and packets dropped with varying node speed, network density and pause time.
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
December
2011
IJMIE
Volume 1, Issue 7
ISSN: 2249-0558
__________________________________________________________
Title
Author(s)
AHMAD ADNAN
Department of Computer Science, University of Agriculture, Faisalabad-38040, Pakistan
FAHAD JAN
Department of Computer Science, University of Agriculture, Faisalabad-38040, Pakistan
INAAM SHEHZAD
Department of Computer Science, University of Agriculture, Faisalabad-38040, Pakistan
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
December
2011
IJMIE
Volume 1, Issue 7
ISSN: 2249-0558
__________________________________________________________
ABSTRACT:
Security is the main concern in these days and everyone want to secure his communication. IEEE 802.16e is a new broadband technology that is used to provide secure wireless access to thousands of users in a city at high data rate. This research paper examines the security for initial network entry of mobile stations and subscriber stations for IEEE 802.16e network. Some threats like denial of service (DoS) attacks were most common in the IEEE 802.16e network, the reason is; it is a new standard and need some security measurements. DoS attacks occur when the SS wants to communicate with base station (BS) and range request message (RNG_REQ) has been sent to BS. BS responds with range response (RNG_RSP) message to SS. Here occurs the DoS attack and this attack denied all communications between BS and SS. In this research paper we have discussed some security countermeasures that control the DoS attacks that occurred at the time of initial network entry of SS. Key Words: Security, Communication, Threats
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
December
2011
IJMIE
Volume 1, Issue 7
ISSN: 2249-0558
__________________________________________________________
Title
Author(s)
Gholamreza Rahimi (Phd) Assistant Professor in Management Department of Islamic Azad University, Jolfa International Branch, East Azerbaijan, Iran
Ghader Vazifeh Damirch (MA) Management Department of Islamic Azad University, Jolfa International Branch, East Azerbaijan, Iran
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
December
2011
IJMIE
Volume 1, Issue 7
ISSN: 2249-0558
__________________________________________________________
ABSTRACT:
Social capital is about the value of social networks, bonding similar people and bridging between diverse people, with norms of reciprocity. It is the aggregate of the actual or potential resources which are linked to possession of a durable network of more or less institutionalized relationships of mutual acquaintance or recognition. The main focus of this article is surveying the Role Social Capital Components on Entrepreneurship in Parsabad small and medium enterprise (EMEs). Theoretical framework of this study is Carland et al's (1984) entrepreneurship model and Sandra Franke (2005) Social Capital model. Data has collected from 120 workers of SMEs in Irans Parsabad Moghan city by two standard questionnaires of study variables. Both the reliability and validity of measures has examined. The Hypotheses were tested through Freedman and Regression tests. The research has shown a positive and meaningful relation between social capital with its components and entrepreneurship.
Key Words: Social capital, entrepreneurship, social capital quality, structural Components, EMEs.
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
December
2011
IJMIE
Volume 1, Issue 7
ISSN: 2249-0558
__________________________________________________________
Title
Author(s)
Subroto Chowdhury
Assistant Professor, Department of Commerce, Manipal University
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
December
2011
IJMIE
Volume 1, Issue 7
ISSN: 2249-0558
__________________________________________________________
Abstract:
Lending activity is an integral part of the banking business. Howsoever good a bank may be in its credit management it cannot escape the natural laws operating within the dynamics of advance and recovery. To put in more manageable sense the strategic homogeneity of the factors of default are also affected by the category of default and the type of facility. Grouping and regrouping of the factors of default is a natural phenomenon based on certain rules. Thus this kind of an understanding calls for deliberation to find out the factors of default and also look for natural tendency of the factors for formation of clusters. Marketing as a process always looks for clusters based on certain homogeneity of variables so as to design techniques and means thus maximizing reach and minimizing cost. The formation of clusters and the affinity of certain units to cling to the same clusters can always provide with the much needed vital tip. The formulation of recovery plan is more strategic in nature when it comes to banks, with operational part playing a necessary role of execution. The dynamics of the factors of default and the formation of clusters according to major category of defaulter can open up new avenues to find out the synergistic agglomeration of units.
Key Words: Factors of Default, SME, Banks, Cluster Analysis JEL Classification: G-21, C-83, H-80
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
December
2011
IJMIE
Volume 1, Issue 7
ISSN: 2249-0558
__________________________________________________________
Title
Author(s)
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
December
2011
IJMIE
Volume 1, Issue 7
ISSN: 2249-0558
__________________________________________________________
ABSTRACT:
Engineers all over the world have been trying to find workable solutions to keep Engineering Construction project time over-run under good control. The activity networking technique initiated in the USA in the late fifties gained large popularity. This was followed by the introduction of the computer and a large number of management software aiming at effective project control. The techniques are in use globally including in the developing world. Needless to say these techniques have proved very useful, but the real problem of effectively controlling the slippage on construction projects, particularly in the developing countries like India, still remains largely unsolved. The author has done substantial work in India and other developing countries trying to find workable solutions to this burning issue and have achieved considerable success. Keeping in view this experience, the author has been actively pursuing further studies, research and detailed work in this area and his broad findings are outlined in this paper.
Key Words: Activity network, concurrent delays, developing countries, project slippage, project implementation profile, work breakdown structure, remedial measures.
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
December
2011
IJMIE
Volume 1, Issue 7
ISSN: 2249-0558
__________________________________________________________
Title
Author(s)
Ms. A. SHARMILA
Asst. Prof, Department of Management Studies, Sri Ganesh School of Business Management, Attur Main Road, Mettupatti, Salem 636111, Tamil Nadu, India.
Ms. J. POORNIMA
Lecturer, Department of Management Studies, Sri Ganesh School of Business Management, Attur Main Road, Mettupatti, Salem 636111, Tamil Nadu, India.
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
December
2011
IJMIE
Volume 1, Issue 7
ISSN: 2249-0558
__________________________________________________________
ABSTRACT:
The biggest killer is not AIDS or cancer but psychological problems, and we see that very high level of stress found in bank employees. The banking sector is becoming increasingly competitive around the country and the level of product and service quality being offered to customer is almost same. Hence, the bank management adds more responsibilities on the shoulders of employees, resulting into a pressure on them, with increasing psychological problems i.e. stress, strain, anxiety, depression, sleep disorders, etc. This situation, in which the employees have little or no sense of identification with their job, can cause an individual looking for another job or dont perform efficiently their own. Therefore, it is very difficult for management that how to maintains bank employees ability to develop successful performance with their organization under present conditions. In this juncture, the present study is undertaken to address specific problems of private bank employees related to occupational stress. This throw light in to the pathogenesis of various problems related to occupational stress among bank employees. The study will be helpful to drawn up further policy on the related fields and act as a secondary data for further research.
KEYWORDS: Job performance, Stress, Private Banks, Occupational stress, Bank Employee, causes of stress.
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
December
2011
IJMIE
Volume 1, Issue 7
ISSN: 2249-0558
__________________________________________________________
Title
Author(s)
Anju Gera
Computer Science & Engineering BSA.Institute of Technology& Management Faridabad, India
Sonia Saini
Computer Science & Engineering BSA.Institute of Technology& Management Faridabad, India
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
December
2011
IJMIE
Volume 1, Issue 7
ISSN: 2249-0558
__________________________________________________________
Abstract:
The paper discusses public key cryptography such as ECC, RSA and also gives mathematical explanations on the working of these algorithms. The paper also proposed an ECC algorithm for secure text based cryptosystem.
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
December
2011
IJMIE
Volume 1, Issue 7
ISSN: 2249-0558
__________________________________________________________
Title
HANDLING OF SYNCHRONIZED DATA USING JAVA/J2EE
Author(s)
ANKUR SAXENA
Amity Institute of Biotechnology Amity University, Noida, Sec-125 Uttar Pradesh, India-201301
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
December
2011
IJMIE
Volume 1, Issue 7
ISSN: 2249-0558
__________________________________________________________
ABSTRACT:
This paper proposes use of a Vector Data Structure mechanism for Human Resource Management System over the Web Application. Array is the static memory allocation. It allocates the memory for the same data type in sequence. The limitation with Arrays is that they have defined size and hence user cannot modify the array at run time according to their ease. In this study a new container has been used which will store its elements in an array, but the array will be resized when necessary to accommodate the new elements. An array that may be resized at run time is called a dynamic array, and any data structure that exhibits such dynamic behavior is said to be a dynamic data structure. We will deploy data structures that are dynamic but do not store their elements in dynamic arrays. In other words, the term dynamic data structure does not imply the use of a dynamic array but instead refers to run-time resizing. This application runs on any Web Server or Application Server.
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
December
2011
IJMIE
Volume 1, Issue 7
ISSN: 2249-0558
__________________________________________________________
Title
Forensic Tools Matrix: The Process of Computer Forensic for Digital Evidence Collection
Author(s)
Dr. Jigar Patel
Associate Professor MCA Programme Kalol Institute of Management, Kalol North Gujarat
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
December
2011
IJMIE
Volume 1, Issue 7
ISSN: 2249-0558
__________________________________________________________
Abstract:
Cyber crime is in limelight due to increasing use of computer and its networks in day to day activity. As computer networks is heavily use not only for information exchange but financial and private data are also transferred via Internet, the Cyber crime increasing by high rate. Since, the evidence of such crimes are in digital forms it is challenging task for Cyber crime Investigator or police personals to collect the evidence against the Cyber criminals to prove the particular type of Cyber crime. This paper mainly focuses on how the Cyber crime takes place and how to collect the evidence against the Cyber criminals which is enough to prove the crime in the court. To do this we need various tools to collect the evidence against the criminals and therefore, the Forensic Tools Matrix helps a lot to investigator for evidence collection and entire investigation process.
Keywords: Cyber Criminals, Forgery, Forensic Tools, Forensic Tools Matrix, Investigator.
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
December
2011
IJMIE
Volume 1, Issue 7
ISSN: 2249-0558
__________________________________________________________
Title
Author(s)
Madhuri Gupta
Lecture, Rayat Institute of Management, Railmajra
Kavita Aggarwal
Lecturer, Rayat-Bahra Institute of Management, Mohali
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
December
2011
IJMIE
Volume 1, Issue 7
ISSN: 2249-0558
__________________________________________________________
Abstract:
It is an inherent desire and need of every business to grow vertically and horizontally. Organic growth, that is development from within, is often slow and sometimes difficult. Competition is fierce, and companies must team up to survive in an industry where specialized knowledge is king. That is why there is an increasing trend towards Mergers and Acquisitions. A complete combination of two separate corporations involving in a business is referred as business merger. A merger in the official sense is said to be worth when both businesses dissolve and double their assets and convert into a newly created third unit. Acquisitions on the other hand are take-over. In this case one company actually buys another company. In take-over or acquisition generally a larger company buys a smaller one. Mergers and Acquisitions encourage banks to gain global reach and better synergy and allow banks to acquire the stressed assets of weaker banks. Through Mergers and Acquisitions banks not only get established brand names, new geographies, complementary product offerings but also opportunities to cross sell to new accounts acquired. The process of merger and acquisition is not a new to the Indian Banking. Our paper is an attempt to find the impact of Mergers and Acquisitions in Indian Banking Industry and their .position before and after merger and acquisition.
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
December
2011
IJMIE
Volume 1, Issue 7
ISSN: 2249-0558
__________________________________________________________
Title
Loss Reduction in Radial Distribution Systems Using Plant Growth Simulation Algorithm
Author(s)
V. Raj kumar
Department of Electrical & Electronics Engineering, GITAM University, Visakhapatnam, A.P., India
B. Venkata Ramana
Department of Electrical & Electronics Engineering, LENDI Institute of Engineering & Technology, Vizianagaram
T.Ramesh Babu
Department of Electrical & Electronics Engineering, SVP College of Engineering, Visakhapatnam, A.P., India
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
December
2011
IJMIE
Volume 1, Issue 7
ISSN: 2249-0558
__________________________________________________________
Abstract:
This paper aims to investigate the optimal switching sequence to maintain radial nature of distribution network for minimal active power losses and an improved voltage loads. The network configuration has been declared as a method for power and energy saving at nearly no cost. A network configuration optimization approach based on the plant growth simulation algorithm (PGSA), is specially suited to large-scale distribution systems. The change in Network configuration is achieved by closing or opening of switches in such a way that the radiality of the Network is maintained. An elegant design method of the decision variables, which describes the radial feature of the distribution network and considerably reduces the dimension of the variables in the solved model, is developed. Moreover, a detailed description on switch states further improves the efficiency of calculation. The proposed approach is applied to a 33-bus sample system and large-scale real system.
Index Terms Distribution system, network configuration optimization, plant growth simulation algorithm (PGSA), power loss reduction.
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
December
2011
IJMIE
Volume 1, Issue 7
ISSN: 2249-0558
__________________________________________________________
Title
Off Page Optimization Factors For Page Rank and Link Popularity
Author(s)
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
December
2011
IJMIE
Volume 1, Issue 7
ISSN: 2249-0558
__________________________________________________________
ABSTRACT:
Off page optimization includes those techniques that can be done off the pages to increase traffic to your website. Off-page optimization are strategies for search engine optimization that are done off the pages of a website to maximize its performance in the search engines for target keywords related to the page content example of this are linking and placing keywords within links anchor texts (anchor texts are the labels of the links). Obtaining links are also considered off-page optimization, which include articles distribution, social networking, directory listings, blogging, link exchange, forum posting, etc. It is very important to note, though, that submitting your website to be linked to other websites randomly could hurt your website's ranking. You should only submit your website to directories or listings that are connected or are relevant to what you are offering to be able to properly achieve off-page optimization. These factors are off-site in that they are not controlled by on page factors .Examples of off-page optimization include things such as link popularity and page rank .Off page factors outside of normal control of the content of site. They are often referred to by search engine optimization experts as the inbound links (IBL) to a given web site from other websites. The more inbound links to a site, the higher its ranking will be on most search engines. Search engines are relying more and more on these elements when determining ranking because they are more resistant to spamming abuse.
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
December
2011
IJMIE
Volume 1, Issue 7
ISSN: 2249-0558
__________________________________________________________
Title
A Node Disjoint Multipath Routing Protocol in Mobile Ad Hoc Network
Author(s)
R.K. Kapoor
Associate Professor National Institute of Technical Teachers Training and Research, Bhopal (M.P.), India
M.A. Rizvi
Associate Professor National Institute of Technical Teachers Training and Research, Bhopal (M.P.), India
Sanjay Sharma
Associate Professor Maulana Azad National Institute of Technology, Bhopal (M.P.), India
M.M. Malik
Professor Maulana Azad National Institute of Technology, Bhopal (M.P.), India
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
December
2011
IJMIE
Volume 1, Issue 7
ISSN: 2249-0558
__________________________________________________________
ABSTRACT:
The applications of Mobile Ad hoc Network (MANET) are based on all-IP architecture. In MANET, the applications place stringent requirements on networks for delivering data packets reliably and quickly. Mobile ad hoc networks are characterized by a dynamic topology, limited channel bandwidth and limited power at the nodes. Because of these characteristics, paths connecting source nodes with destinations may be very unstable and go down at any time, making communication over ad hoc networks difficult. Typical applications may require higher reliability connections than that provided by a single link. Also, to fulfill certain quality parameters; presence of multiple node-disjoint paths becomes beneficial. Such paths aid in the optimal traffic distribution and reliability in case of path breakages. Thus, to cater these challenges of routing in Mobile Ad hoc Networks, a Node Disjoint Multipath Routing protocol considering high mobility in MANET has been proposed by the authors. This protocol can discover multiple node-disjoint route paths with low routing overhead, so it can provide load balancing and higher aggregate bandwidth.
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
December
2011
IJMIE
Volume 1, Issue 7
ISSN: 2249-0558
__________________________________________________________
Title
VLSI IMPLEMENTATION OF SYSTOLIC ARRAY FOR DISCRETE WAVEELET TRANSFORM
Author(s)
Prof. Sonali R.Tavlare
Sipnas college of Engg. And Technology, Amravati.
Prof. P. R. Deshmukh
Sipnas college of Engg. And Technology, Amravati.
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
December
2011
IJMIE
Volume 1, Issue 7
ISSN: 2249-0558
__________________________________________________________
Abstract:
This paper presents a VLSI implementation of Systolic architecture for discrete wavelet transform (DWT).This architecture consist of Input delay unit, filter, register bank and control unit. This performs the calculation of high pass and low pass coefficients by using only one multiplier. This architecture have been simulated and implemented in VLSI. The hardware utilization efficiency has been more than 85%. The systolic nature of this architecture corresponding to a clock speed of N MHz. Optimized area, time and power obtained from this architecture for various devices.
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
December
2011
IJMIE
Volume 1, Issue 7
ISSN: 2249-0558
__________________________________________________________
Title
HIGHER ORDER MUTATION TESTING (RESULT- EQUIVALENT MUTANTS)
Author(s)
Shalini Kapoor
CSE Deptt, GNI, Mullana Haryana
Rajat Kapoor
Assistant Manager Finance, Accenture, Noida
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.
December
2011
IJMIE
Volume 1, Issue 7
ISSN: 2249-0558
__________________________________________________________
ABSTRACT:
Whenever we make a single change to the original program we get First Order Mutant (FOM). When we apply another single change to FOM we get Second Order Mutant (SOM).On applying another single change to SOM we get Third Order Mutant (TOM).Mutants other than FOM are called Higher Order Mutant (HOM).In this paper we prove that as we move from FOM to SOM to TOM there will not be any test data that will kill the Original Program resulting to the formation of equivalent mutants. Equivalent Mutants are never killed hence they will never detect any fault and thus they are considered useless.
Keywords: First Order Mutant (FOM), Second Order Mutant (SOM), Third Order Mutant (TOM), Higher Order Mutant (HOM).
A Monthly Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories
Indexed & Listed at: Ulrich's Periodicals Directory , U.S.A., Open J-Gage as well as in Cabells Directories of Publishing Opportunities, U.S.A.