souvenior inside it page-1

53
Group of Girls' Colleges International Conference on November 26-27, 2010 Emerging Trends in Engineering & Technology Venue : UTSAV Auditorium, Biyani Girls College, Jaipur (INDIA) Techno Developing Passion for Technology... Bytes10 Organized by : Main Sponsor : Co-Sponsor : Biyani International Institute of Engineering & Technology Jaipur (INDIA) Department of Information Technology Biyani Girls College Jaipur (INDIA)

Upload: nguyennga

Post on 01-Feb-2017

241 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Souvenior Inside IT page-1

Group of Girls' Colleges

International Conference on

November 26-27, 2010

Emerging Trends in Engineering & Technology

Venue : UTSAV Auditorium, Biyani Girls College, Jaipur (INDIA)

TechnoDeveloping Passion for Technology...

Bytes10

Organized by :Main Sponsor : Co-Sponsor :

Biyani International Instituteof Engineering & TechnologyJaipur (INDIA)

Department of Information TechnologyBiyani Girls CollegeJaipur (INDIA)

Page 2: Souvenior Inside IT page-1

C O N T E N T SPatron :

• Mr. Rajeev Biyani, Chairman

• Dr. Sanjay Biyani, Director (Acad.)

• Dr. Manish Biyani, Director (R & D)

Advisory Committee :

• Dr. Neeta Maheshwari

• Prof. P.C. Jangir

• Prof. Ashutosh Pant

• Mr. Pankaj Sharma

• Dr. B.L. Sharma

Editor :

• Mrs. Shabori Bhattacharya

• Mrs. Bhavna Sangamnerkar

Editorial Board :

• Ms. Rajni Sharma (coordinator)

• Ms. Nitika Newar

• Ms. Pratibha Pathak

• Ms. Deepika Kumari

• Ms. Renu Kanwar

• Ms. Anu Chaudhary

• Mr. Anish Vyas

Graphic Designing :

• Mr. Ram Pratap Sharma

Composition :

• Mr. Rambabu Jangir

CO

NTEN

TS

Symposium is sponsored by :

Get instant access to your study related queries

GURU KPO Guru Knowledge Process Outsourcing, Jaipur (India)

Biyani Shikshan Samiti, Jaipur (India)

Council of Scientific and Industrial Research, New Delhi (India)

32

SP

ON

SO

RS

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

• 04

• 05

• 09

• 11

• 12

• 14

• 40

• 96

• 102

Welcome Note

Welcome Message

Organizing Committee

Programme Schedule

Plenary Lecture

Invited Lectures

Contributed Paper/Abstract

About Us

Jaipur city at a Glance

State Bank of Bikaner & Jaipur, Jaipur (India)

Page 3: Souvenior Inside IT page-1

With a vision “From Dream to Discovery through accelerating innovation everywhere” the Biyani International Institute of Engineering & Technology in association with Department of Information Technology at Biyani Group of Colleges is hosting its second Indo-Japan Symposium (ITBS-2010) and on behalf of the organizing committee, I am delighted to welcome you in this auspicious event. The two-day event of this year is focused on “Emerging trends in Engineering and Technology”.

Japan is well known as a 'Science and Engineering Nation' and has made outstanding contributions in engineering and technological sciences (ranking second in top 20 countries). On the other side, India has the best global resource and so a place with so many problems/challenges (having problems is having opportunities as well for finding 'solution') and thus India has a fast growing demand to use and promote developed engineering and technological tools. The aim of ITBS-2010 is to keep local audience updated with latest technologies and emerging trends of engineering by promoting collaboration and resource exchange between India and Japan.

We will have speakers from both countries sharing their experiences and knowledge in 4 different sessions which are aimed at throwing some light on how to turn tools into practice:

• Intelligent Computer and Processing

• Power Electronics and Engineering

• Electronics and Interactive Communication

• Chemical Engineering and Advanced Materials

This symposium will offer an opportunity to researchers, scientists and entrepreneurs from academic fields and industries to share their ideas and drive new paradigm shifts in Engineering and will contribute in transforming 'Technopreneurship skill'(a process of engineering the future of a person) and help India to nurture superstar engineers.

We look very much forward to a personally and professionally satisfying meeting at the historical, cultural and pink city Jaipur.

Dr. MANISH BIYANI

Gram-Bhaitariya Bharoo, Kalwar, JaipurTel : +91-141-2338371, 2336226, 2338591-95Fax : +91-141-2338007 • E-mail : [email protected]

BIYANI INTERNATIONAL INSTITUTEOF ENGINEERING & TECHNOLOGYApproved by AICTE & Affiliated to RTU

WELC

OM

E M

ESSA

GE

WELCOME NOTEWELC

OM

E N

OTE

Group of Girls' College

54

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Scientist, University of Tokyo, Japan,Director, BIIET, Jaipur

I am happy to know that the second International Symposium on Emerging Trends in Engineering &

Technology is being organized by the Biyani Group of Colleges, Jaipur on 26-27 Nov., 2010.

Symposium of such nature provide a platform for various researchers, academicians and technologist to

know and deliberate upon the upcoming ventures of engineering and technology throughout the world.

I am sure that this symposium would also be encouraging for our future generation.

While thanking you for the kind invitation, I regret my inability to be present at the occasion owing to

various other pressing commitments on that day. I, however convey my best wishes to the organizers and

participants of the event for the success of their endeavour.

MESSAGE

DR. VISHWA MOHAN KATOCH

DR. VISHWA MOHAN KATOCH

Sd/-

Director General, ICMR, Delhi

MD, FNASE, FNAMS, FASc, FNASecretary, Govt. of IndiaDept. of Health ResearchMinistry of Health & Family Welfare, Director General, ICMR, Delhi

Page 4: Souvenior Inside IT page-1

MESSAGE

Sh. RAJEEV BIYANICHAIRMAN

It is our privilege to welcome all the delegates and participants of International IT seminar on “Emerging Trends in Engineering and Technology” on 26th and 27th November, 2010 at Biyani Girls College in Jaipur.

The objective and aim of the seminar is not only to spread awareness regarding new trends in engineering and technology but also to encourage faculty members and students to make use of this technology in their teaching and research work.

We are sure that all the technical sessions of this seminar will provide useful knowledge to the participants and other faculty members. This seminar will not be restricted to the students and faculty members of IT only; it is open for all as it imparts information regarding new technology that can be used for making the teaching more effective.

We wish great success to this seminar and hope that it will be above the expectations of all the participants.

Dr. SANJAY BIYANIDIRECTOR (ACAD.)

SECTOR-3, VIDHYADHAR NAGAR, JAIPUR 302023Tel : +91-141-2338371, 2336226, 2338591-95Fax : +91-141-2338007 • E-mail : [email protected]

BIYANI GROUP OF COLLEGESApproved by AICTE, Affiliated to RTU & UOR

SECTOR-3, VIDHYADHAR NAGAR, JAIPUR 302023Tel : +91-141-2338371, 2336226, 2338591-95Fax : +91-141-2338007 • E-mail : [email protected]

BIYANI GROUP OF COLLEGESApproved by AICTE, Affiliated to RTU & UOR

We take the opportunity to welcome all the distinguished guests, resource persons,

participants to the International seminar on “Emerging Trends in Engineering &

Technology.”

We hope that this seminar will provide fruitful knowledge to all the participants.

We wish good luck to the organizing committee who have put in hard work and persistent

efforts to make this seminar successful.

MESSAGE

PROF. P.C. JANGIRVICE PRINCIPALPRINCIPAL

Group of Girls' College Group of Girls' College

WELC

OM

E M

ESSA

GE

WELC

OM

E M

ESSA

GE

76

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

DR. NEETA MAHESHWARI

Page 5: Souvenior Inside IT page-1

We feel immense pleasure in welcoming all the delegates of International IT Conference on “Emerging Trends in Engineering & Technology” in Biyani Campus at Jaipur.

This two day programme is specifically designed to appraise the participants to discuss the issues in detail, take first hand knowledge of the emerging tools and take full advantage of opportunities available with our competitive edge.

It is our humble effort to bring awareness about new emerging trends in Engineering & Technology and disseminate the knowledge among the participants.

This conference is a combined effort of all the faculty members and we convey our thanks to management, all colleagues, research scholars, resource persons and participants. This seminar allows us to exchange ideas, information and experiences on the emerging trends in technology and engineering through different technical sessions.

We thank all the concerned people who have put in their assiduous efforts to organize this seminar.

FROM CONVENER’S DESK

MS. SHABORI BHATTARCHARYACONVENER:TECHNOBYTES-10

MS. BHAVANA SANGAMNERKARCONVENER:TECHNOBYTES-10

CORE COMMITTEE SPONSORSHIP • Sh. Rajeev Biyani (Chairman) • Mr. Raj Singhal • Dr. Sanjay Biyani (Director-Acad.) • Mr. Madan Bajiya• Dr. Manish Biyani (Director- R&D) • Mr. Mohit Dotoliya• Dr. B.K. Maheshwari (Tech. Director) • Mr. Pukhraj Deep • Dr. Neeta Maheshwari (Principal) • Mr. Munesh Kaushik & Students • Sh. P.C. Jangir (Vice-Principal) ANCHORING • Ms. Shabori Bhattacharya (Convener) • Ms. Rajni Sharma • Ms. Bhavana Sangamnerkar (Convener) • Ms. Renu Kanwar• Dr. B.L. Sharma • Ms. Anu ChoudharyREGISTRATION HOSPITALITY • Ms. Rajni Sharma • Mr. Mohd. Shakil Zai • Ms. Nitika Newar • Mr. Piyush Pareek• Mr. Mohit Dotoliya • Mr. Joy Gardner • Mr. Renu Kanwar • Mr. Pukhraj Deep• Mr. Munesh Kaushik • Mr. Raj Singhal• Mr. Pukhraj Deep • Mr. Mohit Dotoliya• Ms. Deepika Kumari • Mr. Munesh Kaushik• Ms. Pratibha Pathak REPORTING OF SESSION • Ms. Shachi Pareek • Mr. Anish Vyas • Ms. Pushpa Sharma • Ms. Bhawana Chitlangia • Dr. Binu Singh ACCOMMODATION • Ms. Alka Dadheech • Mr. Mohd. Shakil Zai • Mr. Piyush Pareek • Mr. Munesh Kaushik • Ms. Sonia Soni • Mr. Joy Gardner RECEPTION (WELCOME OF THE GUESTS) CULTURAL PROGRAMME • Ms. Varsha Gupta • Ms. Anu Choudhary • Ms. Nandita Sarsar • Dr. Beenu Singh • Ms. Swati Walia STAGE & AUDITORIUM ARRANGEMENT • Ms. Aparna Dixit • Mr. Jai Singh PROJECT MGMT. & SCIENTIFIC PROGRAMME • Ms. Desh Deepak• Ms. Shabori Battacharya SOUND & LIGHT AT AUDITORIUM ARRANGEMENT • Ms. Nitika Newar • Mr. Madan Lal Bajiya• Ms. Rajni Sharma • Mr. Navin Mishra • Ms. Pratibha Pathak • Mr. Mukesh Patwa• Mr. Piyush Pareek REFRESHMENT • Ms. Deepika Kumari • Mr. Munesh KaushikCONFERENCE SECRETARIAT • Mr. Mohd. Shakil • Dr. B.L. Sharma • Mr. Sunil Melda • Mr. Anish Vyas TRANSPORTATION• Ms. Renu Tandon • Ms. Renu Tandon SOUVENIR PUBLICATION Mr. Rajendra Singh Shekhawat• Ms. Shabori Bhattacharya • Mr. Ram Sahay Dhakar• Ms. Bhavana Sangamnerkar • Mr. Ram Singh • Mr. Ram Pratap Sharma PHOTOGRAPHY & VIDEOGRAPHY• Ms. Rajni Sharma • Mr. Ram Pratap Sharma • Ms. Nitika Newar • Mr. Navin Mishra• Ms. Pratibha Pathak PRESS & PUBLICITYDECORATION • Mr. Anish Vyas • Mr. Ritu Dhingra • Mr. Jitesh Kumar Gupta • Ms. Shiwani Gupta DISCIPLINE COMMITTEE CARDS & FLEX DESIGN • Mr. Rajendra Singh• Ms. Renu Kanwar • Ms. Kiran Nirwan • Mr. Ram Pratap Sharma WEBSITE UPDATION• Ms. Bhavana Sangamnerkar • Ms. Deepika Kumari CERTIFICATE DESIGN & MEMENTO ARRANGEMENT • Ms. Renu Kanwar • Ms. Nitika Newar • Mr. Alim Khan • Ms. Varsha Gupta • Mr. Vaibhav Bhatt• Ms. Pratibha Pathak• Ms. Sonia Soni

Group of Girls' College

WELC

OM

E M

ESSA

GE

OR

GA

NIZ

ING

CO

MM

ITTEE

98

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Fax : +91-141-2338007 • E-mail : [email protected]

SECTOR-3, VIDHYADHAR NAGAR, JAIPUR 302023Tel : +91-141-2338371, 2336226, 2338591-95

BIYANI GROUP OF COLLEGESApproved by AICTE, Affiliated to RTU & UOR

Page 6: Souvenior Inside IT page-1

CO

-SP

ON

SO

R

PR

OG

RA

MM

E S

CH

EU

DLE

1110

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Inte

rnat

ion

al C

on

fere

nce

on

No

ve

mb

er

26

-27

, 2

01

0

Emer

ging

Tre

nds i

n Eng

inee

ring &

Tec

hnol

ogy

NOVEMBER 26 (FRI)

NOVEMBER 27 (SAT)

Registration and Morning Tea

Opening Session-Day one

Session S1: Intelligent Computer and Processing

Closing Session-Day one

Session S2: Power Electronics and Engineering

Session S3: Electronics & Interactive Communication

Session S4: Chemical Engineering and Advanced Materials’s

Oral Session (Selected Talks)

Closing Session-Day two and symposium

08:00-08:45

08:45-10:30

10:30-10:45

10:45-13:00

13:00-14:00

14:00-17:00

17:00-17:30

09:00-10:45

11:15-11:30

11:30-13:00

13:00-14:00

14:00-15:30

16:15-17:15

17:15-17:45

Opening Ceremony

Plenary lecture (PLO1)

Invited lecture (IL01)

Invited lecture (IL02)

Invited lecture (IL03)

Invited lecture (IL04)

Invited lecture (IL05)

Invited lecture (IL06)

Invited lecture (IL07)

Invited lecture (IL08)

Invited lecture (IL09)

Invited lecture (IL10)

Invited lecture (IL11)

Invited lecture (IL12)

Invited lecture (IL13)

Invited lecture (IL14)

Invited lecture (IL15)

Invited lecture (IL16)

08:45-09:30

09:30-10:30

10:45-11:30

11:30-12:15

12:15-13:00

14:00-14:45

14:45-15:30

15:30-16:15

16:15-17:00

09:00-09:45

09:45-10:30

10:30-11:15

11:30-12:15

12:15-13:00

14:45-15:30

15:30-16:15

15:30-16:15

Lunch Break

Tea Break

Tea Break

14:00-14:45

Lunch Break

SBBJ BankAd.

Page 7: Souvenior Inside IT page-1

Prof. Aftab SethFormer Ambassador, Greece, Vietnam

Date of birth: 17.09.1943Place of birth: Patna, Bihar, IndiaEducation• Certificate of enrollment with distinction in the Japanese Language and History, Keio University, Japan, 1963.• B.A. (Hons) in History from St. Stephen’s College, Delhi University, 1964. First Class and ranking first in the

University in the merit list.• M.A. in History and Politics, Constitutional History from Christ Church College, Oxford University, 1967.• Rhodes Scholar from India, 1965, at Oxford University.• Doctorate of Laws, 1993, American College of Greece, Athens.• Honorary President of “English Speaking Union of Japan”• Honorary Patron of “Tokyo International Players” (Amateur Dramatic Club)• Honorary Chairperson of “Dr. M.S. Swaminathan Foundation in Japan”• Advisor to the “Okinawa-India Friendship society”• Chairperson of the “Satya Sai Education Association”• Advisor to the “Bird Life International in Japan”• Honorary President of “Japan Student Fund”• Member of “World Parliament of Cultures” (Ankara, Turkey)• Member of the Board of the worldwide body of “Global Indian Cultural Foundation”, Singapore.• Chairman of “The Global Indian Cultural Centre in Tokyo”, Japan• Member of the Advisory Board, “Global Indian International School of Tokyo”, Japan• Co-Chairman of the 4th “Global Top Seminar”, The Japan Productivity Center for Socio-Economic Development

(JPC-SED)• Member of the Board of Management, “Indian Institute of Foreign Trade”, India• Chairman of the International Advisory Board, “World Peace & Development Association”, People's Republic of

China• Director to the “Japan-India Association”, Japan• Chairman of the Non-Profit Organisation “Japan-India Partnership Forum”, Japan

Publications• Articles and Reviews in newspapers and magazines• A Volume of Poems-“Pillars of Landscape”, 1995: This volume has been published bilingually, in English and

Japanese, in March 2002• Published a book in Japanese in December 2001:”How Much Weight Can an Elephant Lose?”• 2002: Awarded The Mahatma Gandhi-Martin Luther King Daisaku Ikeda Award• Published a book in 2005 : If an elephant loses weight it is still an elephant” [Keio University Press, Tokyo]

PLE

NA

RY L

EC

TU

RE

12

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

In the time of Prince Shoutoku about 1500 years ago the sublime message of universal brotherhood, tolerance, non-violence, peace and right conduct emanating from India, reached the shores of Japan.This gentle message had travelled from India 2500 years ago and had reached all of South East Asia and up into North East Asia till it reached Japan.The first contacts therefore, between India and Japan were links of knowledge: knowledge about the world and the universal Spirit that underlay the entire universe.With the knowledge of Indian religion and philosophy came knowledge of Indian mathematics, astronomy, medicine and textile manufacture. Shibori and sarasa are the Japanese descendents of the tie-and –dye techniques of India and calico textiles respectively.The links of knowledge so established, were nurtured over the centuries through contacts between scholars and pilgrims like Kobodaishi,who interacted with their Indian counterparts in China and in Nalanda university in India.Even during the 260 years of isolation during the Tokugawa shogunate which ended in 1868,links of trade between India and Japan remained, thanks to the Dutch who were the sole Westerners allowed to live in Dejima near Nagasaki in Southern Japan.It was the Dutch who carried Indian Textiles and handicrafts to Japan and bring lacquer,ceramics and silk from Japan.After the Meiji Restoration in 1868, direct links between India and Japan were restored.Scholars like the art historian OkakuraTenshin and his followers Yokoyama Taikan, Arai Kanpou and AkinoFuki established abiding ties with India and specially withShantiniketan. In return Rabindranath Tagore the poet and philosopher travelled to Japan and interacted with universities and artists.Swami Vivekananda in 1893 came to Japan and took with him a leading Buddhist divine, the head of Enkakau temple in Kamakura to Chicago, to attend the World Congress of Religions.At the political level the Russo- Japanese war of 1905 had a profound impact on India's national movement with leaders like Tilak inspired by the Japanese example demanding direct action against the British ,arrayed against men like Gokhale and later Gandhi and Nehru, who preferred a peaceful non-violent approach. Tilak's

ndadmirers like Rash Behari Bose actually fled to Japan and sought refuge there in the 20s. During the 2 world war men like Subhas Chandra Bose sought and obtained Japanese assistance to build the Indian National Army composed of POWs captured by Japanese forces in south east Asia.Trade between India and Japan received some impetus with the establishment of the Japan India Association in 1903. Distinguished Japanese leaders like Okuma

rdShigenobu and Shibusawa Eiichi led this body and enhanced trade with British India. In 1939 India was Japan's 3 largest trade partner after the USA and China. Today China has surpassed the USA to become Japan's largest trade partner as indeed it is India's largest trade partner.After the war India loomed large on the Japanese consciousness because of certain importantfactors.In 1949, Nehru ,moved by the destruction of Tokyo and other cities, presented a baby elephant called Indira to Ueno Zoo. Indira travelled all over Japan bringing joy to Japanese children and their parents, who suffering from serious shortages of food medicine and shelter.In 1952, when the US occupation of Japan ended, the dissenting judgement of the Indian judge on the Tokyo international war crimes tribunal, RadhaBenod Pal was made known to the Japanese public. Even though the tribunal ended its work in 1949, the views of Pal were not known because of strict censorship. ShimonakaYasaburo the President of Heibonsha , a leading publishing company printed Pal's dissenting judgement in which he found Japan's war time leaders”Not Guilty” , in extensoand titled it as “Truth from the East”.Nehru also tried to re establish the steel industry of Japan by permitting the free export of iron ore from India.These gestures of friendship were reciprocated by Japan in 1958 by which time the Japanese economy had recovered and India became the first country to receive ODA from Japan. Today India is the largest recipient of ODA from Japan. Despite such symbols of friendship ,because of the Cold war and India's perceived closeness to the USSR, matched by the Security Alliance of Japan with the USA, the

stforeign policies of the two countries did not find points of convergence.Trade between the two countries also remained low and till the beginning of the 21 century never rose above $5 billion a year.An event of 1999, when a Japanese freighter carrying aluminium ingots was hijacked by pirates in the Indian Ocean and subsequently rescued by the Indian navy , seen also in the context of the end of the cold war, led to a significant change in attitudes towards India in the foreign and defence ministries of Japan. PM Mori in August 2000

stmade an historic trip to India ,the first by a Japanese PM in 10 years. Following the announcement of the India Japan Partnership for the 21 century made by Mori and PM A.B Vajpayee, ties started to improve. Annual exchanges between the defence and foreign ministries, and the military establishments of the 2 countries were supplemented by joint naval exercises of the navies and the coast guards.Japanese investment in India showed a rise as did bilateral trade which now stands at $15 billion which is a 3 fold increase. It is still way below the trade between India and China which is $50 billion.Japanese companies began showing greater interest in investing in India, with the automobile companies leading the way. Suzuki had started work in India in 80s and by the late 90s Toyota had entered to be followed in recent years by Nissan and Honda. In 2008 2 major Japanese investments were the $2.7 billion put in by NTT DO CO MO in Tata Teleservices and the $4.5 billion put in by Daiichi Sankyo,in thepharmaceutical giant Ranbaxy. Japanese interest also centres on the infrastructure and energy industries in India.At the political level, PM Koizumi's visit in April 2005 was a landmark, as it led to the identification of a territory of over 1400 square kilometres between Delhi and Mumbai as the Japan India industrial corridor. A dedicated freight corridor is being built by the Japanese and it is hoped that Japanese companies will enter other areas of infrastructural development , specially the 24 new Eco cities that are planned ,the new airports ,ports and roads.In 2007 August PM Abe and Man Mohan Singh presided over the first India- Japan University presidents conference in Delhi. The aim was to improve academic links between India and Japan. Unlike the 60000 Chinese students in Japan and an equally large number of Koreans, there are only 540 Indian university students in Japan. This is a major drawback in enhancing academic and business links.India and Japan have had a Science and Technology agreement in place for many years. In 2005 this was expanded to include disaster management among other areas.But the exchanges between the scientific institutions of the two countries remains well the potential.Cultural ties were given a fillip in 2007, which was declared the year of India in Japan and Japan in India. Many dance troupes , art exhibitions and martial art displays took place.Today we find an almost annual exchange of PMs. M.M Singh was there in 2006 December and 2008 October. PMHatoyama was in India in December 2009 and PM M.M Singh in October 2010 has completed a visit to Japan, where a Comprehensive Partnership Agreement has been signed. This is expected to boost trade and investment.

thWe have taken the initiative to establish an Indian Economic zone in the heart of Tokyo to attract Indian companies to establish themselves in Japan.On the 30 November in Delhi we have a major seminar with Japan on Energy, Environment and Infrastructure . Our organization is poised to take the lead in strengthening India's historic and friendly relations with Japan.

India-Japan Relations History andprospects in the 21st Century

Talk Abstract

PLE

NA

RY L

EC

TU

RE

13

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Page 8: Souvenior Inside IT page-1

Dr. Manish Biyani(Scientist, University of Tokyo, Japan, Director, BIIET, Jaipur)

Affiliation & Contact:

²Project Professor, The University of TokyoDepartment of Bioengineering, 2-11-16 Yayoi, Bunkyo-ku, Tokyo, JAPAN. Tel/Fax: +81-3-5841-0453E-mail: [email protected]

²Director, Biyani International Institute of Engineering & TechnologyKalwar, Jaipur, INDIA. Tel: +91-141-2589951Email: [email protected]; [email protected]

²Research Director, Biyani Girls College R4, Sector 3, Vidhyadhar Nagar, Jaipur, INDIA Tel: +91-141-2338591Email: [email protected]; [email protected]

Research Interest: Biophysics, Nano-bio device, Microarray, Genomics & Proteomics.

Education & Professional Career:1998-2004 M.E. and Ph.D., Saitama University (Biophysics)2000-2000 Visiting Researcher, Washington University, USA2004-2007 Research Scientist, CREATE/JST Project, Japan2006- Research Director, Biyani Girls College, India2008- Project Asst. Professor, The University of Tokyo, Japan2008- President, Indian Scientist Association in Japan 2010- Director, Biyani International Institute of Engineering & Technology, India

Key Publications:1. Manish Biyani, Naoto Nemoto and Takanori Ichiki (2010) DNA-linked Protein array for high-throughput proteomics:

from spatially unknown DNA arrays to identifiable protein arrays. Nano LIFE, 1, 1-2, 33-43. 2. Manish Biyani, Madhu Biyani, Naoto Nemoto, Takanori Ichiki, Koichi Nishigaki and Yuzuru Husimi (2010) Gel shift

selection of translation enhancer sequences using mRNA display. Anal Biochem. doi:10.1016/j.ab.2010.10.002. 3. Manish Biyani, Naoto Nemoto and Yuzuru Husimi (2006) Solid-phase translation and RNA-protein fusion: a novel

approach for folding quality control and direct immobilization of protein using anchored mRNA. Nucleic Acids Res. 34, e140.

4. Manish Biyani and Koichi Nishigaki (2005) Structural characterization of ultra-stable higher-ordered aggregates generated by novel guanine-rich DNA sequences. Gene 364, 130-138

5. Manish Biyani and Koichi Nishigaki (2005) Single-strand conformation polymorphism at the oligodeoxyribonucleotide level: An insight into solution structural dynamics of DNAs by gel electrophoresis and molecular dynamics simulations. J Biochem 138(4), 363-373.

6. Manish Biyani and Koichi Nishigaki (2003) Sequence-specific and non-specific mobilities of single-stranded oligonucleotides observed by changing the borate buffer concentration. Electrophoresis, 24(4), 628-633.

INVIT

ED

LEC

TU

RE

14

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Since we lapsed the 20th Century and headed into 21st Century, we are experiencing the greatest advances in our life

we never even imagined before. And this could happen due to emergence of a wide range of “pervasive technologies”

which are reaching new heights every day. Technologies are the application of engineering knowledge, tool and skills

to solve practical problems and extend human capabilities. For example, biotechnology started out as a craft and for

thousands of years, mankind exploited empirical know-how handed down from generation to generation to produce

bread, beer, wine etc. However, the evolution of production procedures was so slow that it could hardly be perceived

because new 'know-how' had to be obtained in a completely empirical way due to the total lack of 'know-why'. Today,

our world is facing enormous challenges including global warming, exponentially growing population, depleted

natural resources and to handle these, how engineering students are being prepared to enter the 'real world' is critically

important. Therefore, a sound scientific basis of know-why (i.e., engineering activities) is necessarily requires to

provide tools for rapid and efficient development of novel know-how (i.e., process, products) which will be critically

important to build a sustainable life on the earth.

In this talk, I will elaborate the above issue by discussing transformation of a bold idea to develop a simple, rapid,

robust, portable and cost-effective diagnostic devices for home health monitoring. The science behind this idea is

important but is not all for creating new value for society in terms of commercialization and that is the know-how and

know-why based engineering which can build the necessary bridges between application and science.

Practical Know-how and Know-whyfor Engineering Education

Talk Abstract

INVIT

ED

LEC

TU

RE

15

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Page 9: Souvenior Inside IT page-1

Prof. Takashi SaitoFaculty of System Science & Technology, Akita Univ., Japan

Affiliation & Contact:

Associate Professor, Department of Machine Intelligence and Systems Engineering, Faculty of Systems Science and Technology, Akita Prefectural University,

84-4 Aza-ebinokuchi, Tsuchiya, Yuri-honjo, Akita, 015-0055 Japan

Phone +81-184-27-2113; Fax +81-184-27-2188

Email: [email protected]

Research Interest:

Cell-Based Device Therapy, Neural Interface, Bio-Robotics

Education & Professional Career:

1994-1999 Ph.D. The University of Tokyo (Engineering)

1996-1997 Trainee, BEBIG Isotopentechnik GmbH, Berlin,Germany

1999-2002 Research Associate, The University of Tokyo

2002-2004 Research Fellow, National Cardiovascular Center Research institute

2004-2005 Bio Business Consultant, Toyama New Industry Organization

2005-2008 Specially Appointed Associate Professor, Osaka University

2008-2010 Research Fellow, The University of Tokyo

2010- Associate Professor, Akita Prefectural University

Major Publications:

1. Photodynamic assistance increases the efficiency of the process of microinjection in animal cells”, T. K. Saito, et al., Biotechnol. lett., 24, 2002, 309-314.

2. MALC, a novel microinjection method for loading of macromolecules into cultured neurons”, R. Yano et al., NeuroReport, 13, 2002, 1263-1266.

3. “A Multi-purpose Eight-legged Robot Developed for an Evaluation of a Neural Interface”, T.K. Saito et al., Springer Tracts in Advanced Robotics, 24 , 2006, 385-394

4. “Self-organized ZnO nanorod with photooxidative cell membrane perforation enables large-scale cell manipulation”, T.K. Saito et al., Analytical and Bioanalytical Chemistry, 391(7), 2008, 2513-2519

INVIT

ED

LEC

TU

RE

16

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Historically, scientists and engineers have been comparing living body's functions as some mechanic systems for understanding. Now, modern technology enables us to realize how living body – especially human being – is controlled systematically in details, but such the analysis cannot be ended shortly. Our research group is a cutting edge player of such a field and our projects were started from a cell level neural interface, which interprets information signals of living body's with artificial system's - e.g. robotic artificial limb - bi-directionally. Although the origin of the research requires interdisciplinary knowledge about biomedical engineering and robotics, our research efforts require us more extras. The ongoing projects are: high performance cell processor for cell based medicine, animal mimicking robot with high mobility, and robotic long range manipulator for welfare engineering. Our latest effort proved that we could apply our unique cell membrane perforation process to a large number of cells automatically, with a robotic cell processing system.

As I mentioned before, our research projects have wide variations from cell based medicine to animal mimicking robotics, but there exists a common supporting idea: this is the concept of”disruptive technologies”. It is an idea on economics by Clayton M. Christensen, how can even a group which has small, limited resources compete against his rivals. The recent development of low-cost but enough performance

stsoftware/mechanical components for the system design/control is the 1 key and rapid prototyping technology is the nd2 key contributors of our activities.

In this lecture, I will introduce how to create a novel system with the above described tools, and the methods will be well-suited to realize student's fresh ideas, too.

Interdisciplinary Bio-Robotics ResearchBased on Disruptive Technologies

Talk Abstract

INVIT

ED

LEC

TU

RE

17

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Page 10: Souvenior Inside IT page-1

Mr. Sanjay SharmaScientist-C, NIC, Jaipur

OBJECTIVE

To work in a challenging and dynamic environment to keep adding value to myself and simultaneously contribute to the growth and success of the organization, I represent

Presently working at NIC, Rajasthan State Centre, Jaipur, Ministry of Comm. & IT, as Scientist 'C' from Dec. 1991.

PROFESSIONAL QUALIFICATION

M.Tech. - Computer Science (M.Tech.), from Birla Institute of Technology, Mesra, Ranchi, Jharkhand.

Master of Business Administration – Marketing Management (M.B.A.), from Vardhaman Mahaveer Open University, Kota, Rajasthan.

COMPUTER PROFICIENCY

Hardware Platforms IBM Compatible Pentium, Xeon Servers

Operating System Ms-Dos, Unix, Linux & Windows

Programming Languages/ Packages C, C++, PL/SQL, Java, ASP, ASP.Net etc.

RDBMS Oracle, DB2, FoxPro, MS-Access, MS-SQL Server

Others Data Structure, System Analysis & Design, Software Engineering, Database Management System, Simulation & Modeling, Data Communication, Operating System, MIS, etc.WORK EXPERIENCE

National Informatics Center, Jaipur, Rajasthan

·Some of the major projects are High Court Computerization, Sub-ordinate Courts Computerization, Consumer Courts Computerization, Central Administrative Tribunal Computerization, Civil Registration System (Birth & Death Registration) for Economics & Statistics Department, General Elections (Parliament, Assembly & Panchayat), Various Recruitment programmes for Teachers, Stenos, LDC, Class-IV, Plots allotment through lottery, Computerization of RSPCB etc.

·Technical consultant in various committees.

·Coordinating various Mindset programmes/workshops on IT based projects.

·Lectures on IT applications for Judicial Officers and their officials.

Universities and Colleges

·Examiner for theory and practical examinations of UOR & RTU, Rajasthan.

·Examiner for practical examinations of BITS, Mesra, Ranchi, Jharkhand.

·Guest faculty for MCA / M.Sc.(IT) / BCA in UOR & its affiliated colleges.

·Guest faculty for B.E./B.Tech in Singhania University, Jhunjhunu, Rajasthan.

INVIT

ED

LEC

TU

RE

18

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Hacking, cracking, and cyber crimes are the important issues now-a-days and will also be important in future. We can reduce our organization's threat level by adopting some important practices. There are ten common methods hackers use to breach the security. Stealing Passwords : Password protection is the oldest step, which is used for security. Unfortunately, passwords that are too complex for a person to remember easily can be discovered by a cracking tool in a frighteningly short period of time. Dictionary attacks, brute force attacks, and hybrid attacks are all various methods used to guess or crack passwords. The only real protection against such threats is to make very strong and long passwords or use multiple factors for authentication. Trojan Horses : Trojan horse is a malicious payload secretly delivered inside a host. Some of the famous Trojan horse are Back Orifice, NetBus, and SubSeven. Any malicious payload can be combined with any software to create a Trojan horse. Malicious payload includes programs that destroy hard drives, corrupt files, record keystrokes, monitor network traffic, track Web usage, duplicate e-mails, allow remote control and remote access, transmit data files to others, launch attacks against other targets, plant proxy servers, host file sharing services, and many more. Payloads can be grabbed off the Internet or can be just written code authored by the hacker. Then, this payload can be embedded into any software to create the Trojan horse. Exploiting Defaults : Attacking a target network becomes easy when that target is using the defaults set provided by the vendor or manufacturer. Many attacking tools assumes that the target is configured using the default settings. Hence, the most effective and often overlooked security precaution is simply to change the defaults. The scope of this problem can be find by making a search on Internet for sites using the keywords "default passwords". Man-in-the-Middle (MITM) Attacks : A MITM attack occurs when an attacker is able to fool a user into establishing a communication link with a server or service through a rogue entity. The rogue entity is the system controlled by the hacker. It has been set up to intercept the communication between user and server without letting the user become aware that the misdirection attack has taken place. The rogue system has a look-alike interface that tricks the user into providing their logon credentials. Wireless Attacks : Wireless means freedom from wires - the ability to be mobile. Wireless networks are economical to deploy and easy to install. Time, effort, and expense required to secure wireless networks is significantly more than deploying a traditional wired network. Interference, DOS, hijacking, man-in-the-middle, eavesdropping, sniffing, and many more attacks are become simple for attackers when wireless networks are used. Doing their Homework : External hackers, learn how to overcome the security barriers by researching the organization. This process is known as discovery or foot-printing. Most organizations are hemorrhaging data; companies freely give away much information that can be used against them in various types of logical and physical attacks. Following are the examples which show that what a hacker can learn about the organization, often in minutes: The names of top executives and any flashy employees by perusing the archive of press releases, The company address, phone number and fax number from domain name registration, The service provider for Internet access through DNS lookup and trace route, Employee home addresses, phone numbers, employment history. Monitoring Vulnerability Research : They are able to read Web sites, discussion lists, blogs, and other public information services about known problems, issues, and vulnerabilities with hardware and software. The more the hacker can discover about possible attack points, the more likely he can discover a weakness. For this we should keep watch on discussion groups and web sites from each and every vendor whose products we are using in the organization. Being Patient and Persistent : Hacking is not an activity that someone undertakes and completes in a short period of time. Hackers often research their targets for weeks or months, before starting their first tentative logical interactions against their target with scanners, banner-grabbing tools, and crawling utilities. The most devastating attacks are those that go undetected for a long period of time, while the hacker has extensive control over the environment. Confidence Games : Firewalls, IDSes, IPSes, and anti-malware scanners have made intrusions and hacking a difficult task. But,many hackers have expanded their idea of what hacking means to include social engineering: hackers are going after the weakest link in any organization's security—the people. Already Being on the Inside : It is assumed that the hacker is some unknown outsider but a majority of security violations actually are caused by internal employees. It can happen in two different ways. First, the hacker can get a job at the target company .Second, an existing employee can become dissatisfied and choose to cause harm to the company as a form of revenge.

Ten Ways Hackers Breach Security

Talk Abstract

INVIT

ED

LEC

TU

RE

19

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Page 11: Souvenior Inside IT page-1

Mr. Neeraj Prakash Srivastava(MAIET, Mansarovar, Jaipur)

Pursuing Ph.D. in Computer Science, M. Tech. in Computer Science with first class (JRN Rajasthan Vidyapeeth, Udaipur) , B.E. in Computer Science Engineering with first class(North Maharashtra University, Jalgaon), Diploma in Business Administration with first class(Indian Institute of Management and Technology, Chennai)An overall experience of twelve years in IT field 4 Years in Industry: In the areas Technical Operations, RDBMS Development, Management, and Planning with Companies like Matrix, SSi etc.8 Years in Academics: Teaching, Academic Administration, Documentation and Technical Operations with Engineering College. May 2002 till date. Working in the capacity of Associate Professor in Department of I.T. at Maharishi Arvind Institute of Engineering and Technology, Jaipur .Involved with project management for in house developed software and academic software. Organising various seminars, workshops and technical events. Looking after R&D Projects and Tie Ups at National and International Level.Conferences, Workshops and Books Published1. Paper presented at National Conference on Recent Trends in IT: opportunities and Challenges at Jaipur in

August 2010, on the topic of Soft Computing and AI2. Paper published and presented at National Conference on Recent Trends in information Technology:

opportunities and Challenges at Jaipur in August 2008.3. Paper published and presented at National Conference on the topic “IT for Rural Development in India”, Indore in

December 2007.4. Workshop on “Intellectual Property Rights & Patent System In India” conducted by Ministry of Human Resource

Development, Government of India, Jaipur in March 2006.5. National Level Workshop on “Changing Contours of the IT Industry” , at IIIM, Jaipur in October 2005.6. Workshop on “Entrepreneurship Development” conducted by Department of Science and Technology,

Government of India, at Jaipur in December 2004.7. Workshop on “Software Products: Development and Quality Assurance” at IIIM, Jaipur in January 2003.8. Workshop on “Issues in Real-Time Computer Systems” conducted by Indian Society of Technical Education and

AICTE at MNIT, Jaipur in December 2003 9. Robotics based R&D Project was approved and funded by Department of Science and Technology, Government of

Rajasthan in February 2006.10. Book published on the topic of Automata Theory of Computational methods titled “Theory of Computation”11. Book published on the topic of Database Management Systems titled “Introduction to Database management

Systems”12. State level for the presentation of technical paper “Object Oriented Programming” at “Wattumal Institute of

Technology Worli” Mumbai.13. National level for the presentation of technical paper “Object Oriented Database” at IIT Delhi. At present working on projects for Conservation and preservation of energy resources through human body, the idea and proposal is submitted to Department of Science and Technology.

INVIT

ED

LEC

TU

RE

20

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

As the limits of computer technology are pushed into the domains of very small, robust and near-perfect reliability, it has become a great challenge to produce the correct answer every time. The set of errors occur in a system is divided into two categories, defects and faults. Defects- made in the hardware during manufacturing whereas, faults- made during a calculation, at run time. Run-time faults results in unpredictable, random and independent errors.

The fact that a complex system, no matter how carefully designed and validated, contains design and operational faults is the basis for study of fault tolerance (Ability of system to respond to an unexpected hardware or software failure). Fault tolerance techniques attempt to prevent lower-level errors from propagating into system failures. Such techniques either mask or detect a fault and then affect a recovery process which, if successful, prevents a system from failure. So it can be said that such techniques should be used and should be developed so that systems under used by human beings may be saved from failures and faults.

The research in the field of fault tolerance focuses on the fact that most of the faults occur due to design errors, programmer errors and operator error which are adequately defended against by the Soft Computing techniques. It's a collection of techniques spanning many fields that fall under various categories in Computational Intelligence, having three main branches: Fuzzy Logic, Evolutionary Computation and Neural Networks. It refers to collection of computational techniques in computer science, machine learning and engineering disciplines, which study model and analyze complex phenomena for which more conventional methods have not yielded low cost, analytic and complete solutions

As the current systems tend to focus on software techniques, such as transactions, assertions, periodic consistency audits, and pervasive timeouts to attain high uptimes; in general, defensive programming is becoming an evermore- important tool, and soft computing techniques are the most suitable and adequate techniques that can be utilized for the detection of the fault and study of fault tolerance within any system.

Soft-computing, as opposed to “hard computing”, is rarely prescriptive in its solution to a problem. Solutions are not programmed for each and every possible situation. Instead, the problem or task at hand is represented in such a way that the “state” of the system can somehow be measured and compared to some desired state. The quality of the system's state is the basis for adapting the system's parameters, which slowly converge towards the solution.

Soft-computing is often robust under noisy input environments and has high tolerance for imprecision in the data on which it operates.

Components of soft computing include:

• Neural networks (NN) • Fuzzy systems (FS)

• Evolutionary computation (EC), including: • Evolutionary algorithms

• Harmony search • Swarm intelligence

• Ideas about probability including: • Bayesian network

• Chaos theory

Unlike hard computing schemes, which strive for exactness and full truth, soft computing techniques exploit the given tolerance of imprecision, partial truth, and uncertainty for a particular problem. Another common contrast comes from the observation that inductive reasoning plays a larger role in soft computing than in hard computing.

Study of Fault Tolerance usingSoft Computing Techniques

Talk Abstract

INVIT

ED

LEC

TU

RE

21

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Page 12: Souvenior Inside IT page-1

Mr. Pankaj Sharma(CEO, Pearl Enterprises, Jaipur)

Introduction :

Engineer having almost 18+ Years of extensive and varied experience in IT industry, ranging right from Forming & Managing a Company Independently, Business Management, General Administration Production, Quality and Project Management, Project Analysis, System Designing, Team Leadership to Software Development. Traveled abroad extensively on technical assignments.

Presently holding the position of CEO, Pearl Enterprises (Self formed company to provide IT consultation and Software Solutions).

Personal Profile & Skills :

Academics : Bachelor of Engineering (Electronics), University of Bombay, 1991

Computer Skills :

Skill Set : Expertise in Software engineering, system analysis, design, development, at equal ease with Windows, Linux & Macintosh platform

Languages : Assembly x86, Win32 (API), C, C++, VC++, VB 6.0, Java, .NET, C#, VB.NET Scripting : CGI/Pearl, HTML, DHTML, XML, JSP, VBScript, JavaScript, ASP, ASP.NetDBMS : Dbase IV, FoxPro, MS-Access, SQL, Oracle 8i, PostGreSQLHardware : Chip level PC Architecture knowledge & Hands-On Maintenance experienceNetworking : Expertise in Network planning, Configuration, Troubleshooting, Administration, LAN, WAN,

Routing on TCP/IP as well as IPX protocols, Experience on Sockets, SMTP, POP & FTP Protocol programming and application development

Misc : Multimedia, E-Commerce, Hardware Interfacing, PC based process control, Desktop Publishing, Graphics Designing.

Other Skills :

Electronics : Professional level circuit designing, troubleshooting - especially in Digital Electronics, Microprocessor Interfacing & Industrial Electronics.

Electrical : Amateur skills, yet having excellent knowledge and hands-on experience in 3-phase and 1-phase Electrical Technologies.

Automobiles : Amateur skills, yet having quite a lot of hands-on experience in Automobile fundamentals, repairing and maintenance, especially cars.

Career Summary :

CEO & Director (Pearl Enterprises) 1st July '03 to datethDirector (eXtensible IT Solutions, Jaipur) 21st Mar '05 to 20 July '07

Chief Technical Officer (Data Infosys Ltd., Jaipur) 1st Nov '03 to 20th Jan '05th stGeneral Manager (Technical) (VGL Softech Ltd., Jaipur) 11 Dec '02 to 31 Oct '03

st thGeneral Manager (Patrika Online Pvt. Ltd., Jaipur) 1 Jan '00 to 10 Dec '02st stManager Systems (Senior) (Rajasthan Patrika Ltd., Jaipur) 1 Jul '95 to 31 Dec '99st thSoftware Architect (Rajasthan Patrika Ltd., Jaipur) 1 Jul '91 to 30 Jun '95

INVIT

ED

LEC

TU

RE

22

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Mobile computing has three aspects: mobile communication, mobile hardware and mobile software. The first aspect addresses communication issues in ad-hoc and infrastructure networks as well as communication properties, protocols, data formats and concrete technologies. The second aspect focuses on the hardware, i.e. mobile devices or device components. The third aspect deals with the characteristics and requirements of mobile applications.

We are moving into a new era of mobile computing, one that promises greater variety in applications, highly improved usability, and speedier networking. The 3G iPhone from Apple is the poster child for this trend, but there are plenty of other developments that point in this direction. The Google-led Android phone will make its appearance this year, offering a compelling open-source alternative to Apple's device. New, faster networking, particularly WiMax, is rolling out, allowing these devices connection speeds that approach wired broadband. This will also benefit the new crop of ultra-light laptops. The significant innovation in this area is the famous $100 XO computer .

10 most significant emerging technology trends to look forward to in 2010:

1) Better Virtualization Management Tools: It's pretty clear that virtual machine software is going to get more complex and dynamic in 2010. The good news is that the tools for managing virtual machines are rapidly getting better.

2) Open Data Center Convergence Architectures: A lot of the new integrated server architectures really just highlight what should be possible across any set of open distributed data center components.

3) The Rise of Open Mobile Systems: Backed by Google, Android smartphones will create an open platform for mobile computing that will force telecommunications carriers to open their networks.

4) De Facto Collaboration Standards: Driven more by end users than vendors, de facto collaboration standards from companies such as Google and Facebook will drive mashups and other composite applications into the enterprise.

5) Solid-State Drives Go Mainstream: With prices for SSDs dropping as the number of suppliers increases, entire databases are going to be running in-memory a whole lot more.

6) Data Analytics Goes Big Time: Not necessarily in terms of adoption, but rather in the amount of data that can be effectively analyzed in real time.

7) Desktop Virtualization Proliferates: It will come in many flavors, but the end result will be the same. The cost of deploying and managing end-user desktops is going to drop substantially.

8) IT Process Automation Tools: An increasing percentage of the mundane IT tasks that waste so much time during the day are about to become automated.

9) The Rise of Twitter Communications Protocol: A large number of enterprise applications are going to start using Twitter as an asynchronous communications protocol for sharing information.

10) Advances in Compression: For all the trouble we have managing huge volumes of data, it's not like data compression technology is standing still in the face of this challenge.

Emerging Trends inMobile Computing

Talk Abstract

INVIT

ED

LEC

TU

RE

23

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Page 13: Souvenior Inside IT page-1

Mr. Abhinav Anand (Sapient technologies, Delhi)

Mr. Abhinav Anand has overall 7 years of industry experience in Software Test Engineering, with more than 3 years in Test

Automation using vendor and open source tools .

He began working in the software industry in 2002. Abhinav has held positions as a Tester, Programmer, Test Automation

Engineer, Quality Engineering and Technical Writer and has worked for companies ranging from a 20-person startup to a

large multi-national software vendors.

He also contributed as facilitator and trainer to help professionals learn testing and overcoming the challenges of Testing.

On academic front - he is Bachelor Of Information Technology(BIT), holds a Masters in Computer Science and PGDBA in

Operations Management.

His professional certifications include :

·HND ( Higher National Diploma : Advanced Software Engineering ) Edexcel Foundation, London UK.

·Certified Software Development Professional (CSDP) from IEEE

·Certificate of Proficiency as Tester from International Software Testing Qualifications Board(ISTQB)

·Certified Professional for HP Quality Center 9.2

Abhinav is frequently invited to speak at conferences across India.

In 2008, he became involved with the Agile community. In 2009 he became a member of the Agile Alliance.

He is currently working as Senior Associate, Quality with Sapient Corporation Pvt. Ltd. and enjoys spending his time -

teaching, speaking, writing, and working on Extreme Programming teams with testers & test engineers.

INVIT

ED

LEC

TU

RE

24

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Agile software development is a group of software development methodologies based on iterative and incremental

development, where requirements and solutions evolve through collaboration between self-organizing, cross-

functional teams.

There are many specific agile development methods. Most promote development, teamwork, collaboration, and

process adaptability throughout the life-cycle of the project. Agile methods break tasks into small increments with

minimal planning, and do not directly involve long-term planning. Iterations are short time frames (timeboxes) that

typically last from one to four weeks. Each iteration involves a team working through a full software development

cycle including planning, requirements analysis, design, coding, unit testing, and acceptance testing when a working

product is demonstrated to stakeholders. This minimizes overall risk and allows the project to adapt to changes

quickly. Stakeholders produce documentation as required. An iteration may not add enough functionality to warrant a

market release, but the goal is to have an available release (with minimal bugs) at the end of each iteration. Multiple

iterations may be required to release a product or new features.

Agile methods emphasize face-to-face communication over written documents when the team is all in the same

location. Most agile teams work in a single open office (called a bullpen), which facilitates such communication. Team

size is typically small (5-9 people) to simplify team communication and team collaboration. Larger development

efforts may be delivered by multiple teams working toward a common goal or on different parts of an effort. This may

require a coordination of priorities across teams. When a team works in different locations, they maintain daily contact

through videoconferencing, voice, e-mail, etc.

No matter what development disciplines are required, each agile team will contain a customer representative. This

person is appointed by stakeholders to act on their behalf and makes a personal commitment to being available for

developers to answer mid-iteration problem-domain questions. At the end of each iteration, stakeholders and the

customer representative review progress and re-evaluate priorities with a view to optimizing the return on investment

(ROI) and ensuring alignment with customer needs and company goals.

Advantages of Agile Engineering:

§ Agile methods are adaptive rather than predictive. Engineering methods tend to try to plan out a large part of

the software process in great detail for a long span of time, this works well until things change. So their nature is to

resist change. The agile methods, however, welcome change. They try to be processes that adapt and thrive on

change, even to the point of changing themselves.

§ Agile methods are people-oriented rather than process-oriented. The goal of engineering methods is to

define a process that will work well whoever happens to be using it. Agile methods assert that no process will ever

make up the skill of the development team, so the role of a process is to support the development team in their

work.

Agile Engineering

Talk Abstract

INVIT

ED

LEC

TU

RE

25

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Page 14: Souvenior Inside IT page-1

Prof. Masakazu Sugiyama(Asst. Prof.,Institute of Engg. Innovations Univ. of Tokyo)

Affiliation & Contact:

Institute of Engineering Innovation, Graduate School of Engineering, the University of Tokyo, Japan

Phone +81-3-5841-2336; Fax +81-3-5841-6027 • Email: [email protected]

Research Interest:

²Epitaxial growth of III-V compound semiconductors using metal-organic vapor-phase epitaxy (MOVPE), especially quantum structures.

²High-efficiency III-V solar cells

²Nano-fabrication processes such as lithography, etching and film deposition on narrow structures.

Education:

Ph.D. Chemical System Engineering, the University of Tokyo (March 2000).

M.Sc. Chemical System Engineering, the University of Tokyo (March 1997).

B. Sc. Chemical System Engineering, the University of Tokyo (March 1995).

Professional Career:

April 1997 – March 2000 : Research fellow of the Japan Society for the Promotion of Science (JSPS)

April 2000 – April 2002 : Research Associate, Department of Chemical System Engineering, School of Engineering, the University of Tokyo

May 2002 – March 2005 : Lecturer, Department of Electronic Engineering, School of Engineering, the University of Tokyo

April 2005 – March 2006 : Associate Professor, Department of Electronic Engineering, School of Engineering, the University of Tokyo.

April 2006 – Present : Associate Professor, Institute of Engineering Innovation, School of Engineering, the University of Tokyo.

Major Publications:

[1] T. Shioda, Y. Tomita, M. Sugiyama, Y. Shimogaki, Y. Nakano: (Invited Paper) "Selective Area Metal-Organic Vapor Phase Epitaxy of Nitride Semiconductors for Multicolor Emission", J. Selected Topics in Quantum Electronics, Vol. 15, No. 4, pp. 1053-1065 (2009).

[2] M. Sugiyama, K, Sugita, Y. Wang and Y. Nakano: “In situ curvature monitoring for metal-organic vapor phase epitaxy of strain-balanced stacks of InGaAs/GaAsP multiple quantum wells”, J. Crystal growth, in press.

[2] M. Deura, Y. Kondo, M. Takenaka, S. Takagi, Y. Nakano, M. Sugiyama: “Twin-free InGaAs thin layer on Si by multi-step growth using micro-channel selective-area MOVPE”, J. Cryst. Growth, vol. 312, no. 8, pp. 1353-1358 (2010)

INVIT

ED

LEC

TU

RE

26

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Recently, there is growing focus on high-efficiency solar cells using III-V compound semiconductors. The most severe bottleneck in InGaP/GaAs/Ge tandem junction cells toward higher conversion efficiency is current mismatch among three component sub-cells. For better current matching, the bandgap of the GaAs middle cell have to be narrower, while keeping lattice matching to Ge for the purpose of dislocation-free crystal growth. InGaAs/GaAsP multiple quantum wells (MQWs) structure is promising for narrowing an effective bandgap: a narrow-gap (large-lattice) InGaAs is grown with its thickness below the relaxation limit, and then a small-lattice GaAsP is grown to compensate strain due to lattice mismatch, which pair is repeated until sufficient total thickness of InGaAs is obtained for photo-absorption.

The MQWs indeed absorb photons with the wavelength longer than the band edge of GaAs, but electrons and holes generated by photo-absorption tend to be trapped and recombine in the wells. Therefore, high efficiency of quantum well solar cells depends on the escape efficiency of electrons and holes from the wells. We adopted a model quantum-well cell in which quantum wells are inserted in a GaAs single p-i-n junction, and tried to design a structure to enhance carrier escape from the wells.

We have tried two structures: a “super-lattice cell” in which the thickness of barriers is smaller than 5 nm to promote tunneling of carriers through the barriers, and a “stepped potential cell” in which a step layer with an intermediate potential has been inserted between the well and the barrier. We have thus

2achieved an extended effective band edge at 1.2 eV from the GaAs value of 1.4 eV, and 3 mA/cm increment in short-circuit current due to the quantum wells, both of which are required for the energy conversion efficiency of 45% by a 3 junction solar cells under concentrated sunlight. We have also examined the optimum position of MQWs in the i-layer. If we situate the MQWs between the edge of p-layer and the center of the i-layer, we can avoid carrier recombination inside the MQWs the most efficiently, and thus can maximize the contribution of MQWs to conversion efficiency.

Ultra-high-efficiency Solar CellsUsing III-V Compound Semiconductorsand Nanostructures

Talk Abstract

INVIT

ED

LEC

TU

RE

27

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Page 15: Souvenior Inside IT page-1

Dr. L.M. Joshi(Professor-EC&ELE, CEERI, Pilani, India)

Dr. LM Joshi did M.Sc in Physics with specialization in Electronics from Kumaon University, Nainital and Ph.D in

Electronics Engineering from Institute of Technology, Banaras Hindu University, Varanasi. Presently he is holding the

post of Scientist G (Additional Director) and is Head of High Power Klystrons Group at Central Electronics Engineering

Research Institute, Pilani, where he is serving for last thirty years.

He has been associated as member/ Project Leader with several successful research & development projects of national

importance funded by Departments of Atomic Energy, Defense and Space. Currently he is chief investigator of three major

projects sponsored by Department of Atomic Energy and DRDO. He has been to U.K, USA, Germany and Sweden as

visiting scientist where he was associated with import international R&D projects. He has published /presented more than

fifty research papers at national and international level. He is Fellow of Institution of Electronics &Telecommunication

Engineers and present chairman of IETE, Pilani Centre. He is life member of Indian Vacuum Society, Indian Physics

Association and Indo-French Technical Association.

INVIT

ED

LEC

TU

RE

28

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

High power electromagnetic signals with power ranges from a few hundred watts to megawatt levels at

microwave and millimeter wave frequencies find wide use in radar, communication, electronic

warfare, industrial heating, material processing, medical and scientific applications. Most commonly

used devices to generate or amplfy such signals include klystrons, magnetrons, travelling wave tubes

and gyrotrons. With advancement of science and technology, newer type of devices and areas of their

applications are being investigated for generation of electricity, material processing and treatment of

deseases. Our country is also actively involved in advanced research for development of high power

microwave devices and systems both for millitary and civilian applications. Some examples of such

applications include satellite based communication systems, phased array radars, missile guidance

system, medical linear accelerators and thermonuclear fusion reactors. The talk will cover the current

state of development of high power microwave devices in India and the areas of their applications.

High Power Microwave Devices:Development and Applicationsin Indian Context

Talk Abstract

INVIT

ED

LEC

TU

RE

29

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Page 16: Souvenior Inside IT page-1

Dr. Deepak Bhatnagar(Professor-EC&ELE, University of Rajasthan, India)

Currently he is heading Microwave and Communication Group in Department of Physics, University of Rajasthan, Jaipur comprising three faculty members and 12 research students working for their Ph. D. degree in different areas of microwaves. Till date 11 students have obtained their Ph.D. degree under his supervision while two others are waiting for their Ph.D. viva examination. This group has produced more than 65 research papers in international and national journals and 80 papers in proceedings of various international and national conferences held in India and abroad. He is an author of three books for under graduate students of Rajasthan state while one book on Microwave antennas is under process for PHI, India. He has successfully completed three major research project sanctioned by ISRO, Bangalore and UGC, New Delhi while three research projects sanctioned by DST, New Delhi, UGC, New Delhi and DIT New Delhi are currently under way.

He is senior member of IEEE and currently chairman of IEEE MTTS India Council. He is a Fellow of IETE, India and currently he is the Chairman of IETE Rajasthan center. His main area of research interest is the design and development of patch antennas for mobile, wireless and satellite communication systems.

INVIT

ED

LEC

TU

RE

30

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Compact circularly polarized microstrip antennas are becoming useful structures for modern communication systems including in GPS systems while broad band antennas are highly suitable for modern communication systems including in mobile and wireless communication systems. Microstrip antennas are small in size, can be mounted easily on host surface and can be integrated easily with other planer components. The main limitations associated with conventional microstrip structures are that they resonate at a single frequency and presents narrow impedance bandwidth and low gain. Therefore microstrip antennas in their conventional form could not gain popularity for their commercial application in communication systems. However with the demand of compact size antennas for modern communication systems, the possibility of application of patch antennas was re-considered and several modifications were applied to improve their performance. The bandwidth of conventional microstrip antennas may be improved considerably by applying suitable narrow slits at appropriate location or by making stacked arrangement of radiating patches. Similarly circular polarization in conventional patches may be achieved by suitable selection of feed location. It is realized that with conventional patches, it is extremely difficult to achieve large impedance bandwidth and large axial ratio bandwidth simultaneously. It is also true that achieving large gain with conventional patch antennas is very difficult and necessary alterations in these geometries needed to enhance their gain. Efforts have also been made to develop circularly polarized broadband microstrip antennas which may be useful in all type of communication systems.

In the proposed talk, the design, development and performance of some compact single feed circularly polarized broadband planar and stacked arrangement of antennas will be discussed and their results will be presented systematically. The performance of proposed antennas will be compared with those of conventional antennas for better understanding.

Circularly polarized broadbandantennas for moderncommunication systems

Talk Abstract

INVIT

ED

LEC

TU

RE

31

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Page 17: Souvenior Inside IT page-1

Ghanshyam Singh(Asstt. Professor-EC, MNIT, Jaipur, India)

Highest Qualifications : M.Tech-Electronics & Comm. Ph.D (pursuing)thDate of Birth : Jan 25 , 1975

Membership of professional societies:·Member IEEE ·Optical Society of India (Membership No: L-513) ·International Association of Computer Sci. & Information Technology, Singapore.(IACSIT Membership No:

80331515)·Association of Computer Electronics and Electrical Engineers, India (ACEEE Membership No. 7000142)·Indian Laser Association (Membership No: LM-808)·Broadcast Engineering Society India (Membership No: LM2556)·International Association of Engineers (IAENG Membership No. 103514 )·IETE, New Delhi. (Membership No: M146878) ·IE (India), Kolkata. (Membership No: AM091263-O) ·ISTE, New Delhi. (Membership No: LM38137)Area of research interest:vNano-materials & structures, Surface Plasmonics, Photonic switches, Large Switch Architecture, MEMs, etc.vVLSI design of optical devices.Research Visit to Foreign Universities: ·Photonics switches architectures with Photonic research groups@ Physics department, Herriot Watt University,

th thEdinburgh, Scotland, U.K. March 15 -25 , 2009 under the grant of TEQIP, Govt. of India.·Awarded CIMO Fellowship (Govt. of Finland) to carryout research work in Nanostructures and Surface plasmon

based optical switches: Nano fabrication lab@ Dept. of Physics & Mathematics, University of Eastern Finland, st thJoensuu campus, Finland, From January 1 , 2010 to June 30 , 2010.

Reviewer of Journals & Books:·The Journal of Optics A: Pure and Applied Optics, Institute of Physics, USA, IOP Publishing Limited, Optics and

Photonics Letters, International journal of computer theory and applications, Tata McGraw-Hill Publication, New Delhi, India.and various IEEE conferences.

Publications: Refereed Journals1. International Journal of Microwave and Optical Technology, ISSN: 1553-0396, vol. 3, page no. 558-564, Nov.

2008.2. Journal of Optics 38(1), Springer, ISSN 0972-8821, page no. 29-37, March, 2009.3. Int. journal of recent trends in engg , ISSN 1797-9617, Vol. 1, No. 3, 115-119, June-2009.4. Int. Journal of Advances in Comm. Engg, ISSN: 0975-6094, Vol. 1, No. 2, 67-72, Dec.-2009.

st5. Photonics Lett. of Poland, ISSN 094, vol. 1 (4), 187-189, Dec. 31 , 2009.6. New Advanced Technologies, Intechweb, Austria, ISBN: 978-953-307-067-4, March 2010.

7. Accepted for publication with International Journal of Computers and Applications, ISSN 1206-21X, February 2010,

to be published by first quarter of 2011.8. Accepted for publication with Journ. of Opt. Commun., ISSN: 0173-4911, April 2010.

INVIT

ED

LEC

TU

RE

32

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

The proposed work is focused on design and analyses of all optical switches strictly following the

betterment of their operation, architecture and compatibility with communication technologies. The

sub-domain includes intense research on the basic principle of all optical switches and performance

enhancement of switching elements when incorporated in high dimension architectures for using them

with optical networks & circuitries. The research includes evaluation of basic all optical switching

phenomena for Mach-Zehnder Interferometer (MZI), Multi Mode Interference (MMI) and digital

optical switching elements. Our motive is to replace traditional on-chip electronic components with

optical sub-parts for performance enhancement. The research has been aimed at investigating and

studying the single units of optical switches and their compatibility in switching networks.

Photonic Switching Technologies:A comparison of MZI, MMI andDigital Optical Switching Elements

Talk Abstract

INVIT

ED

LEC

TU

RE

33

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Page 18: Souvenior Inside IT page-1

Dr. Suja George(Associate Professor-MNIT, India)

Present Affiliation: Associate Professor, Department of Chemical Engineering, MNIT Jaipur, Jaipur 302017

E-Mail Address: [email protected]

Research Interests:

·Water and Wastewater Treatment,

·Process Modeling, Simulation and Control,

·Artificial Neural Networks,

·Microbial Fuel cells.

Profile :

Dr. Suja George holds B.Tech (Chemical Engg.); M. Tech. (Process Engg. & Design) and PhD (Chemical Engg.) degrees. She joined M. N. I. T. Jaipur as a lecturer of Chemical Engineering in 1996 and is serving as an Associate Professor. She is involved in teaching B. Tech and M. Tech. Chemical Engineering program and major areas of her research include Process Modeling and Simulation for various processes, Water and wastewater treatment, Process Control, Application of Artificial Neural networks and Microbial fuel cells. She has published/presented over 25 papers in various international/national journals/conferences, guided B.Tech and M. Tech. Theses and taken up research projects from organizations like DST Delhi.

Some of the Papers published/presented in Referred International/ National Journals / Books/ Conferences 1. Suja George, Prabhat Pandit, A.B. Gupta, “Residual Aluminium in water defluoridated using Activated Alumina

Adsorption - Modeling and Simulation Studies”, Water Research (44) 2010, pp 3055-3064.

2. Suja George, Prabhat Pandit, A.B. Gupta and M. Agarwal, “Modeling and Simulation studies for Aluminium - Fluoride Interactions in Nalgonda Defluoridation Process” Journal of Chemical Product and Process Modeling, Volume 4, Issue 1, 2009 Article 27.

3. M.Agarwal, Isha Arya, S.P.Chaurasia, K.Singh, S.George, Synthesis and Characterisation of Biodiesel”, Indian Chemical Engineer, 2009, Vol. 51:No. 4: pp 300-308.

4. Suja George, Madhu Agarwal, Kissun Ramrekha, Divyamaan Wadnerkar and Gaurav Chaudhary, “ Identification of Best Control manipulation on Application of Adaptive Artificial Neural Network Control Strategy” ,” in the Book titled “Modeling & Simulation”, Volume-1, ISBN N0:81-8424-218-2, Editors: S.R.K.Prasad, R.Prabhakar, E.Ramaswamy, R.Saravanan, 2007, pp 176-183.

5. Suja George, Prabhat Pandit, A.B.Gupta, “Process Modeling for Estimation of Colloidal Aluminium in Alum treated water during Defluoridation”, Proceedings of the 2010 International Conference On Environmental Engineering And Applications, ICEEA 2010, Singapore. September 10 - 12, 2010, pp 103-106.

6. Suja George, Prabhat Pandit, A.B.Gupta, “Application of mathematical model NALD for Nalgonda process of Defluoridation”, Proceedings of the International Symposium on Environmental Pollution, ecology and Human

th thhealth, ISEPEHH-2009,Tirupati, 25 -27 July, 2009.

INVIT

ED

LEC

TU

RE

34

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Aluminium was earlier regarded as a relatively innocuous element but recent research has found that its

various bound forms with the fluoride and other inorganic/ organic ions are toxic in nature. Aluminium

is a potential neuro-toxic agent in human beings and aluminium fluorides are thought to be causative

factor for Alzheimer's disease, presenile dementia and sclerosis etc. Defluoridation of water using

activated alumina is found to be superior and the most adopted technique than other defluoridation

techniques mostly due to the high removal capacities and strong affinity between aluminium and

fluoride. Presence of high fluorides in groundwater is a major problem in India as well as in many areas

of the world including Canada, large parts of Africa, China, Middle East and southern Asia. In presence

of high raw water fluoride concentrations, aluminium may dissolve from the activated alumina surfaces

into its free and hydroxide ions in the aqueous medium and its solubility increases due to the formation

of monomeric aluminium fluoride and aluminium hydroxyl-fluoride complexes in the aqueous

medium. Experimental studies have found that residual aluminium in the form of dissolved and

colloidal form is present in the treated water when activated alumina was used as the adsorbent.

Modeling and Simulation Studies help in deciding the Fluoride uptake capacities for the alumina

adsorption beds in the design the defluoridation units so that the residual aluminium concentrations in

the treated waters are kept at its minimum and below the permissible limits.

Mathematical Modelling of An Adiabatic Adsorption Tower

Talk Abstract

INVIT

ED

LEC

TU

RE

35

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Page 19: Souvenior Inside IT page-1

Dr. Manish Vashistha(Associate Professor-MNIT, India)

Research Interests:

·Interfacial Engineering · Thin liquid films· Modeling and Simulation

·Artificial Neural Networks · Particle Science · Thermodynamics.

Qualifications:

·Bachelor of Engineering (with Honours), Department of Chemical Engineering , Malaviya Regional Engineering College (now called MNIT), Jaipur

· Master of Technology, Department of Chemical Engineering, Indian Institute of Technology, Delhi, New Delhi

·Doctor of PhilosophY, Department of Chemical Engineering, Indian Institute of Technology, Delhi, New Delhi

·Total Teaching and Research Experience: 12 years

·Total Publications in International/National Journals and Conferences : 25

LIST OF MAJOR PUBLICATIONS IN INTERNATIONAL JOURNALS (LAST 5 YEARS)

1. Manish Vashishtha, P. K. Jaiswal, R. Khanna, S. Puri and A. Sharma, Spinodal phase separation in liquid ? lms with quenched disorder, PHYSICALCHEMISTRY CHEMICAL PHYSICS, Vol. 12, 2010. pp.1-5. (Impact Factor: 4.2)

2. R. Khanna, N.K Agnihotri, Manish Vashishtha, A. Sharma, P. K. Jaiswal and S. Puri, Kinetics of spinodal phase separation in unstable thin liquid ? lms, PHYSICAL REVIEW E, Vol.82, July 2010, pp.011601-1 to 011601-5. (Impact Factor: 2.8)

3. Manish Vashishtha, P.Reddy, D. Singh, Improvement in properties of urea by phosphogypsum coating, International Journal of ChemTech Research, Vol.2, No.1, pp.36-44, Jan-Mar 2010.

4. D. Singh, D. Pratap, Manish Vashishtha and A. K. Mathur, Direct catalytic conversion of biogas methane to formaldehyde, International Journal of ChemTech Research, Vol.2, No.1, pp.476-482, Jan-Mar 2010.

5. S. Roy, M. Vashishtha and A. K. Saroha, Catalytic wet air oxidation of oxalic acid using platinum catalysts in bubble column reactor: A review, Journal of Engineering Science and Technology Review , Vol. 3, No.1, (2010), pp.95-107.

6. P. Roy, Manish Vashishtha, R. Khanna and D.Subbarao, Heat and mass transfer study in ?uidized bed granulation: Prediction of entry length, Particuology (Elsevier publication), Vol.7/issue 3, June 2009, pp.215-219. (Impact Factor: 0.9)

7. P.Roy, ManishVashishtha, R.Khanna and D.Subbarao, Variation of granule mass fraction with coordination number in wet granulation process, Particuology (Elsevier publication), Vol.7/issue5, October 2009, pp.408-413. (Impact Factor: 0.9)

8. P. Roy, Manish Vashishtha, R. Khanna and D.Subbarao, Size dependent co- alescence kernel in fertilizer granulation- A comparative study, Particuology (Elsevier publication), Vol.7/issue6, December 2009, pp.445-450. (Impact Factor: 0.9)

9. Garg R.K., Vashishtha M., Srivastava V.K., A Modelling approach to reaction of non-Newtonian Fluids in tubular reactor, Polymer-Plastics Technology and Engineering (Taylor and Francis publication), Vol.46/ No.10, October 2007, pp.965-971. (Impact Factor: 0.51)

INVIT

ED

LEC

TU

RE

36

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Nanotechnology is regarded as one of the key technologies of the future. It has a potential for fundamentally changing whole fields of technology. Nanotechnology has a positive potential not only for economic development but considerable improvement is also expected with regard to the protection of the environment and human health. Thus, nanotechnology development may increase the efficiency of resources and improve the overall performance of environmental protection. Knowledge about the exposure of humans and the environment to nano-sized particles has been very scarce so far. Questions arising as to the implications of the exposure to nanoparticles for humans and the environment have not yet been sufficiently elucidated. In the present paper, a summary of the potrntial benefits and hazards of nanotechnology is presented. This overview considers both the potential benefits for the environment to be expected from this innovative technology, mainly in the fields of conservation of resources, energy efficiency and health protection, and the potential adverse effects on the environment and possible health risks as well as approaches to reduce such adverse effects.

An Overview of Potential Benefitsand Hazards of Nanotechnology

Talk Abstract

INVIT

ED

LEC

TU

RE

37

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Page 20: Souvenior Inside IT page-1

Mrs. Bhavana SangamnerkarHOD-IT, Biyani Group of Colleges, Jaipur

thDate of birth : 25 July 1974.

Computer Science : DSA, OOPs, RDBMS, DBMS, Internet Applications.

Languages Known : COBOL, PASCAL, C, C++, Java 2, SQL, HTML, DHTML, JavaScript etc.

Packages : FoxPro ,Oracle, D2k,MS-Office

Platform Known : DOS, UNIX, WINDOWS.

Educational Qualification : MCA with first class with distinction; M.Sc. University Position Holder in Applied mathematics With specialization in Computer Programming. From SATI, Vidisha Engg. College (M.P.). PGDCA first class with distinction from Bhopal University. Certified from Mocrosoft Office Specialist for power point presentation.

Work Experience : 11 yrs.

Achievements : Excellent faculty in teaching, I.T Dept, award, 2007 at Biyani Girls College. Best Department in college award 2008 as HOD , I.T. , Biyani Girls College. Most dedicated faculty award 2009.

Best faculty award 2002 at M.K.H.S. Gujarati girls college ,Indore.(M.P.).

Given Lecture on the topic 'Recent Avenues in IT' at Rajasthan Patrika fair 12' Jun 2007. Organized Seminars on various topics on IT At college campus and outside of the college.

Publication :

1. A book on Data Structure & Algorithm published first & second editions.

2. A National level paper presentation on “A modified approach on-The studentized range of Newman-keul’s Test in “IT in global world A futuristic perspective” December, 2009.

3. National level oral presentation on “Benefit based data caching in Ad-hoc networks at Biyani Girls College, Jaipur in 2009.

4. Member of “Y2K bug problem Cobol to Oracle conversion result processing system” Devi Ahilaya Vishwavidhayala, Indore from 1997.

5. Think Tanks published on Database Management System & DSA in 2009.

INVIT

ED

LEC

TU

RE

38

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Privacy of personal data is an illusion in today's complex society. With only passwords, or Social Security Numbers as identity or security measures every one is vulnerable to invasion of privacy or break of security. Traditional means of identification are easily compromise and anyone can use this information to assume another identity. That's why we can approach to the pattern recognition techniques.Some techniques of pattern recognition are as follows:

1) Handwritten digit recognition is the process of recognizing and classifying handwritten digits without human interaction. Its application field is very wide, for example Postal code recognition (Automatic sorting of mail by destination ZIP code), Digitizing hand written spreadsheets, tax forms etc.

2) A multi-scale model for electrochemistry in proton exchange membrane (PEM) fuel cells has been developed. The multi-scale model involves four scales: atomic-scale for kinetics of chemical/electrochemical reaction, nano-scale for surface reactions, micro-scale for electrolyte transport, and macro-scale.

3) Artificial Neural Network (ANN) is a system loosely modeled on human brain. It tries to obtain a performance similar to that of human's performance while solving problems. As a computational system it is made up of a large number of simple and highly interconnected processing elements which process information by its dynamic state response to external inputs. Computational elements in ANN... AI is the study of the abilities for computers to perform tasks, which currently are better done by humans. AI has an interdisciplinary field where computer science intersects with philosophy, psychology, engineering and other fields. Humans make decisions based upon experience and intention.AI is helpful in the study.

4) Wavelet analysis have received significant attention because their multi-resolution decomposition allows efficient image analysis. It is widely used for varied applications such as noise reduction, and data compression, etc. In this paper we have introduced and applied the concept of 2 dimensional Gabor wavelet transform to Biometric Iris recognition system.

5) Memorizing - this is absolutely the worst way to keep track of material. People are preoccupied with trying to remember the words to say and not the ideas behind the words (or with the audience). As a result, normal voice inflection disappears. With memorizing, mental blocks become inevitable. With memorizing it is not a matter of will you forget; it's a matter of WHEN!

Beside this ,Humans are very good at recognizing faces and if computers complex patterns. Even a passage of time doesn't affect this capability and therefore it would help become as robust as humans in face recognition. Faces represent complex, multidimensional, meaningful visual stimuli and developing a computational model for face recognition is difficult This paper present a hybrid neural network solution which compares favorably with other methods. The system combines local image sampling, a self-organizing map neural network, and a convolution neural technique. Facial recognition systems are used for identification solutions, by translating the characteristics of a face into a unique set of numbers. Facial recognition technology introduces a new era of internet and e-commerce security. Using this it has been able to move to the forefront in using new modern security solutions for prisons. This technology has been used by police department etc. This paper provides an up-to-date critical survey of still and video based face recognition.

Pattern Recognition Techniques :An Approach of Facial Expression

Talk Abstract

INVIT

ED

LEC

TU

RE

39

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Page 21: Souvenior Inside IT page-1

discipline, based on computer science but with Biometrics: The Flip Sidemathematics helping in the design of ciphers and

1 2 Asheesh Misra , Bright Kesswani , Nitesh protocols. That perspective started to change as 3

Kaushik researchers and practitioners realized the 1Software Engineer, Metacube Software Pvt. importance of economics. As distributed systems Ltd., Jaipur are increasingly composed of machines that 2

belong to principals with divergent interests, HOD, Computer Applications, GyanVihar incentives are becoming as important to University, Jaipur

3 dependability as technical design. In this paper, Co-ordinator, MTech. (CSE), GyanVihar the use of digital steganography for information University, Jaipursecurity in various ecommerce applications

Biometrics based systems have always been through the Internet will be discussed in detail.

thought of as the ultimate defense against identity These applications include digital watermarking

theft, espionage and cyber crime. That is why for copyright protection of multimedia data,

more and more organisations and companies are digital signature authentication and validation of

adopting biometric based identification and electronic documents, digital data storage and

security systems. However, recent identity related linkage for binding digitized photographs with

thefts have exposed the chink in armor of this personal attribute information, as well as secure

proclaimed impregnable shield. The paper communication of multimedia data through the

examines the compromises made in the popular open channels. This research paper has been

biometric methods and concludes with a proposal starting to spill over into more general security

for countering or atleast circumvent exposed questions (such as law-enforcement strategy), and

vulnerabilities.into the interface between security and the social sciences.Keywords: Fingerprint Scanning, Hand

Geometry, Face Recognition, Iris Detection, nnnTemplate Storage, False Accept, False Reject, Multi – Modal Biometric. Cyber Frauds in E-Commerce &

Preventions in Today's Intelligent nnn

Computer Processing1 2Information Security Rajeev Srivastava , Dr. Vijay Singh Rathore

11 2 Research Scholar, Singhania University, Nitesh Kaushik, Gaurav Indoria , 3 Pacheri Bari (Rajasthan – 333 515), IndiaSiddharth Jain

11 Director(Voc. Courses) and HOD(Comp.Sc.), Computer Science, Gyan Vihar University,

LBS PG College Jaipur, Rajasthan 302004, Rajasthan, India2 IndiaComputer Science, Gyan Vihar University, 2

Research Guide, Singhania University, Pacheri Rajasthan, India3 Bari (Rajasthan – 333 515), IndiaComputer Science, Gyan Vihar University, 2

Director and Associate Professor, Shree Karni Rajasthan, IndiaCollege, Jaipur, Rajasthan - 302021, India

Security is the degree of protection against danger, This paper deals with the cyber frauds E-damage, loss, and criminal activity. Security as a Commerce and measures to take for preventions form of protection are structures and processes and gain the reliability in E-Commerce that provide or improve security as a condition. transactions for the online users in the today's Information Security was seen as a technological

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

intelligent computer processing system. It Hackers, Firewalls, Secure Socket Layers and explains the basic scenario of E-commerce frauds secure electronic transactions.and explains the preventions measures concept in nnntransactions made online.

A Performance Evaluation Study of It explains the various ways/situations of Bluetooth Using GloMoSim“phishing” or “Smishing” how the online user

1 2becomes the victim of cyber crime and Surender Singh , Suneel Kumar , Sanjeev 3unknowingly does cyber crimes and also makes Kumar

1 2 3his known persons victim of this trend. Asst. Professor, M.Tech(CSE), M.Tech(CSE),

1Department of Computer Science & It also presents the ways to avoid these types of Engineering CIITM Jaipurcircumstances and if caught in this racket, how to 1,2make comeback and what prevention measures Department of Computer Science &

must be taken to secure their financial transactions Engineeringusing websites and also how to check the websites Guru Jambheshwar University of Science & for their authenticity. One of the issues faced by Technology, Hisar (Haryana) - IndiaWeb site designers is maintaining a secure session

Bluetooth is also knows as 802.15 standard of with a client over subsequent requests.IEEE and wireless PAN. A bluetooth network can

A secure system accomplishes its task with no be built around limited coverage area like as room, unintended side effects. Security has three main small building etc. It provides low connectivity in concepts: confidentiality, integrity, and

a PAN environment that is suitable for most data availability. While security features do not

applications. However it does not meet QoS guarantee a secure system, they are necessary to requirements for real-time data traffic build a secure system. The attacker monitors the applications such as voice and video data between the shopper's computer and the transmissions. The explosive growth of the server.Internet over the last decade has led to an

Some of the easiest and most profitable attacks are increasing demand for high speed Internet access. based on tricking the shopper, also known as Broadband Wireless technologies are increasingly social engineering techniques. Millions of gaining popularity by the successful global computers are added to the Internet every month. deployment of the Wireless Personal Area Most users' knowledge of security vulnerabilities Networks (Bluetooth- IEEE 802.15). Bluetooth of their systems is vague at best.can be exploited on small scales, to build ad hoc An effective overall security strategy is to be Wireless Personal Area Network(WPAN) i.e., that prepared when vulnerabilities are detected.connect devices placed inside a circle with radius

When architecting and developing a system, it is of 10m. In this paper we have designed various important to use threat models to identify all

scenarios using the GloMoSim simulator to study possible security threats on the server.

the performance of Bluetooth in delivering traffic Despite the existence of hackers and crackers, E- under different operational conditions. The results Commerce remains a safe and secure activity. The showed how different factors such as load and resources available to large companies involved in mobility might affect the performance of E-Commerce are enormous.

Bluetooth. The simulation input parameter is Keywords: Phishing, Cyber Frauds, Smishing, mobility and output parameter are end to end

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

4140

Page 22: Souvenior Inside IT page-1

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

delay, packet delay ratio, delay jitter and SQL query in such a way that its execution will have unintended consequences.throughput were considered as the performance

measures in this study. II. Blind SQL injection

Keywords- IEEE 802.15, Blutooth, GloMoSim, Blind SQL injection is a hacking method that WEP. allows an unauthorized attacker to access a

database server. It is facilitated by a common nnncoding blunder. The program accepts data from a

Data Mining with SQL Inference and client and executes SQL queries without first Injection validating the client's input. The attacker is then

free to extract, modify, add, or delete content from 1 2Shilpa, Sunita Gupta the database. This type of attack can become time-1Lecturer, Balaji College of Engineering intensive because a new statement must be crafted

&Technology, Jaipur. for each bit recovered.Hackers typically test for 2Sr.Lecturer, Balaji College of Engineering SQL injection vulnerabilities by sending the &Technology, Jaipur. application input that would cause the server to

generate an invalid SQL query. If the server then Abstract: Inference attacks stand alone in the fact returns an error message to the client, the attacker that no actual data is transferred – rather, a will attempt to reverse-engineer portions of the difference in the way an application behaves can original SQL query using information gained from allow an attacker to infer the value of the data. these error messages. When drilling for data via SQL injection there are

three classes of attack- in band, out-of-band and III. Conclusionthe relatively unknown inference attack. In band

Inference as a means of drilling for data can be attacks extract data over the same channel between used regardless of the application environment the client and the web server. Out-of-band attacks and regardless of the predefined application query employ a different communications channel to – so long as the application is vulnerable to SQL drill for data by using database mail.injection.

Keywords: - Injection, inference, bliend SQL nnninjection.

Strength of Data Mining In E-payment I. IntroductionSystem SQL injection is a code injection technique that 1 2exploits a security vulnerability occurring in the Dr.Ashok Agarwal (Asst.Prof), Dr. Krishna

3 database layer of an application. The vulnerability Gupta(Asst Prof) Akash Saxena,(Asst Prof)4is present when user input is either incorrectly Khushboo Saxena (Asst Prof)1 2filtered for string literal escape characters A.B.S.T University of Rajasthan. Jaipur

embedded in SQL statements or user input is not E.A.F.M, University of Rajasthan, Jaipur 3 4strongly typed and thereby unexpectedly St.Wilfred's P.G College, Jaipur TIT,Bhopal

executed.The application, which is generally, but (M>P), Jaipurnot necessarily, a web application, accepts user input and embeds this input inside an SQL query. This query is sent to the application's database server where it is executed. By providing certain malformed input, an attacker can manipulate the

E-commerce generally refers to commercial transactions between businesses or between business and consumers that take place wholly or partially over the internet or other electronic

communication networks. Electronic payment is an integral part of electronic commerce. E-payment is a financial exchange between online buyers and sellers. It over comes the limitations of traditional payment system like lack of convenience, lack of security, lack of coverage etc. In this paper specify the needs of data mining in electronic payment system.

Data Mining in BioinformaticsMrs. Kirti ChoudharyLecturer, MAIET, Jaipur

Bioinformatics is the science of managing, mining, integrating and imprinting information from biological data at the genomic, meta balomic, proteomic, phylogenetic, cellular or whole organism label and data mining or knowledge

nnndiscovery from data (KDD),in its most fundamental form, is to extract interesting, Wireless Lan and Network Security

1 2 nontrivial, implicit, previously unknown and Anoop Singh Poonia , Jitendra Gautam1 potentially useful information from data. the aim of HOD, E.C.E. Deptt. Swami Keshvanand Institute

this paper is to introduce some of the best technique of Technology, Management & Gramothan, for data mining in bio-informatics in the hope to Jaipur

2 make new d i scove r i e s fo r BIOKDD. Lecturer, E.C.E. Deptt., Swami Keshvanand Bioinformatics as the science of storing, Institute of Technology, Management & extracting, organizing, analyzing, interpreting and Gramothan, Jaipur utilizing information from biological sequences

To secure interactive multimedia applications in and molecules.wireless LANs (WLANs) it is pertinent to

Some bioinformatics visualizations are also implement a number of security services such as computationally challenging. A general complaint authentication, key exchange and real-time is that visualization tools are not sufficiently encryption/decryption. WLANs, though, present a interactive to allow effective exploration of data. complex and challenging environment for This paper is basically to support or reveal the implementing such security services since these information regarding searching pattern in bio services may deplete the limited network resources informatics and also the question of whether we and increase the burden of supporting quality of may rapidly be approaching a limit to how much service for multimedia applications. For significant biological information we can turn into constructing a ubiquitous network, the highspeed knowledge. And also to examine what are the wireless LAN (WLAN) attracts attention as an important research issues in bioinformatics and infrastructure for global access. In this paper, we develop new data mining methods for scalable and discuss a fast authentication method of mobile effective analysis. A maturity challenge for ubiquitous terminals in WLAN. To achieve an statistical data miners and bio informaticians is to efficient access control between Access Points widen their focus until true collaboration and the (APs) and mobile terminals and sharing of a unlocking of the secrets of the cell become reality.session key between terminals. This paper

proposes a new security architecture that enhances Topic : Data Mining in Bioinformaticsthe security of the WLANs based on the new IEEE

Data mining :802.1 ii standard for large-scale multinational corporations. Furthermore, by adopting distributed “Data mining is the process of exploration and authentication servers, it provides a better analysis, by automatic or semiautomatic means, of performance then the traditional architecture with a large quantities of data in order to discover central authentication server. meaningful patterns and rules.” (M. J. A. Berry and

G. S. Linoff)nnn

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

4342

Page 23: Souvenior Inside IT page-1

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

dead ends. Let us investigate, for example, whether there are any proteins similar to the mouse nucleoli in the protein database SWISS-PROT. The solution can be found by using a bioinformatics tools like the “Basic Local Alignment and Search Tool” (BLAST). BLAST is part of a suite of DNA- and protein-sequence search tools accessible online in various customized versions from many databases. The core part of BLAST is a beautiful and powerful example of the application of probability theory and statistics (compromising aspects of random walk theory, of renewal theory and asymptotic distribution theory) within bioinformatics.

Bioinformatics? Bioinformatics and visualization via using data mining :

The genome is the total amount of genetic information that an organism possesses. Genes in Last but not least, let us briefly mention also turn are made from DNA, which contains the exploratory or visual data mining. Visualization is complete genetic information that defines the used in many areas within bioinformatics, with structure and function of an organism. DNA stores varying success: for some topics good tools already information in the form of the base nucleotide exist, while for others they do not, often both sequence, which is a string of 4 letters (Adenine, because of the screen space problems common to Cytosine, Guanine and Thymine), e.g. many visualization problems and because

sufficient thought has not gone into how best to T T C A G C C G AT AT C C T G G T C A G A -

visualize the data to aid comprehension. In many T T C T C T A A G T C G G C T A T A -

area of bioinformatics it is important to be able to GGACCAGTCTAAGAGA

view information at several levels of detail and For about 3 billion letters is the human genome. shift between them readily, which can be Genes are segments of DNA that contain the challenging for software.“recipe” to make proteins and proteins are the

Some bioinformatics visualizations are also crucial molecules that do most of a cell's work.

computationally challenging. A general complaint Indeed, the “central dogma of molecular biology”

is that visualization tools are not sufficiently states that, in a cell, information flows from the

interactive to allow effective exploration of data. nuclear DNA to RNA to protein synthesis.

The visualization of biological data is also Bioinformatics tasks : hampered by the wide range of data types and

exponentially increasing volume of data available, One of the most basic operations in bioinformatics

and by the lack of interoperability of existing tools.involves searching for similarities, or homologies, between a (newly) sequenced piece of DNA and Conclusion and challenges for statistical data previously sequenced DNA segments from various miners :organisms. Finding near -matches allows

Statistical data mining approaches seem ideally researchers to predict the type of protein the (new)

suited for bioinformatics, since it is data-rich, but sequence encodes. This not only yields for drug

lacks a comprehensive theory of life's organization targets early in drug development but also weeds

at the molecular level. Or, in the words of I. E. out many targets that would have turned out to be

Alcamo: “Keeping up with the directions and

applications of DNA is a never-ending job”. provided convenient access to information and the ability to perform transactions from home, work

However, data mining in bioinformatics is easy and conveniently on other locations. It is

hampered by many facets of biological databases, important to be aware that when you communicate

including their size, their number, their diversity via the Internet, other people and software can also

and the lack of a standard ontology to aid the communicate with your computer.

querying of them, as well as the heterogeneous data of the quality and provenance information they contain. Data mining and bioinformatics are fast expanding research frontiers. It is important to examine what are the important research issues in bioinformatics and develop new data mining methods for scalable and effective analysis. The active interactions and collaborations between these two fields have just started and a lot of exciting results will appear in the near future. Bioinformatics and data mining will inevitably grow toward each other because bioinformatics will not become knowledge discovery without statistical data mining and thinking.

nnn

IT -Enabled System for optimizing operational efficiency in E-commerceMahaveer SainAssistant Professor, Computer Science

As we know that every technology along with Departmentmerits comes with some demerits and side effects as Maharishi Arvind Institute of Science and well. An unknown party or a virus can access an Management, Ambabari,Jaipurinadequately protected computer in a very short

A new era began when the Internet came into period of time. In order to provide effective and existence. This powerful tool changed localized secure e-commerce system, there are few mechanisms to the globalize system of E- managerial issues needed to be attention. The key commerce's. After the use of technology and areas are:Internet changed its system to E-system. We are working in the technology world where each and every task is revived in the light of Information Technology. IT system has provided new opportunities for improvements in performance across the E-system. IT is an important enabler of effect ive E-commerce. The innovative opportunities coming to the fore with electronic commerce, especially through the Internet, have also increased the interest in IT. The benefit is based on employing the right processes and right IT tools and techniques. E- commerce system

After several years of turbulence for Internet stocks and the resulting failure of many companies, it is easy to underplay the impact of e-commerce in daily life. E-commerce has grown rapidly using today's computer technology thereby providing the option of online system in order to manage the finances more quickly and efficiently.

In Indian market most of the software development work is out sourced. They not have a qualified manpower to upkeep and maintain the hardware as well as software. For a small problem they are dependent on out sourced companies. In a smaller town it is very difficult for the manager to manage the things online while the technical persons are at far distance. The technical resources take their own time to rectify the problem, and by the time customers lose their interest in business with the branch.

.

1. Security : Security of the transactions is the primary concern of the Internet-based business/transactions. The lack of security may result in serious damages. The examples of potential hazards of the electronic system are during on-line business, transferring funds, and electronic currency, etc.

2. Privacy : The privacy issue is a subset of the security issue. Privacy on the internet is nothing new,but is most important issue for organization and consumer. The examples of the private

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

4544

Page 24: Souvenior Inside IT page-1

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

information relating to the banking sectors are: the amount of the transaction, the date and time of the transaction, and the name of the merchant where the transaction is taking place.

3. Authentication

Authentication refers to the verification that whether the user/client is genuine according the certain pre specified parameters. Encryption may

Enforcement of the high degree of security in the E-help make the transactions more secure, but there is

commerce is the global phenomenon these days.also a need to guarantee that no one alters the data at either end of the transaction.

technical system issues. In automated environment electronic commerce refers to the electronic processing activities on computers or other related devices or equipments. When these activities take place on these equipments, they need to ensure the security and integrity of it. These are very essential attributes of an automated system environment to maintain in the digital world.

The IT systems are taken out of control of organizations using them, and are introduced into

Uses of IT in E-commerce: the environment in which this control is limited, and

Web based business model using IT are 'e- the freedom of choice of time and place of operation commerce and 'E-business'. The objective of IT in on the user side results in existing security measures E-commerce: being ineffective and insufficient,

1. Providing information availability and visibility Conclusions and Findings

2. Enabling collaboration with e-commerce The benefit of IT in E-commerce are manifold and vary in the context of their implementation. The

IT is more importantly viewed to have a role in essence of IT is to devolp an efficient E-commerce

supporting the collaboration and coordination ofsystem and to gain a keep understanding of how the

e-commerce. IT in E-commerce to enable great technological chanes can help an organization opportunities, ranging from direct operational smoothyen its processes.benefits to the creation of strategic advantage.

The result of the study indcate that companies view Objective of the study: IT as a means for oprational efficiency.Internet

technology and third-party transaction integration There are various issues are occurs when it

services have provided companies with increased integrated with IT such issues are the use of

possibilities to network with E-commerce partners appropriate IT technology, cost reduction because

and optimize the network's operational efficiency of it, efficiency.

as well.Objectives are:

nnn1. IT is enabling the development of new product and services. HoneyPot Technology2. IT is changing interaction between organization Movil Jeenwaland consumers Assistant Professor, Computer Science DepartmentMore of business hours increase the pressure on DAV College, Jaipurhuman being and they are all the time in stressed. Honeypots are a security resource whose value lies The prime objective of the research study on in being intruded or attacked. They have multiple managerial problems in electronic commerce to uses, such as prevention, detection, or information find out the ways, strengths, tools and techniques to gathering. There are two different types of establish the high degree of security and integrity in honeypots: Production honeypots and Research e-commerce environment.Since electronic honeypots. Honeypots are for anyone looking to commerce has many layers and levels to enforce the protect themselves from any type of identity theft.

They are an internet-based server that acts as a capture bad activity and any interaction with a decoy, luring potential hackers so that specialists honeypot is most likely unauthorized or malicious may monitor and study how system break-ins occur. activity. Honeypots reduce 'noise' by collecting

only small data sets, but information of high value, There are two types of honeypots, production

as it is only the bad guys. This means it's much honeypots and research Honeypots. The production

easier (and cheaper) to analyze the data a honeypot honeypots, used primarily by companies or

collects and derives value from it.They will prevent corporations, are easy to use. They capture only

intruders from invading network because attackers limited information and identify attack patterns.

might realize that there is a honeypot deterring them Upon collecting this information, defenders can

because they don't know which the honeypot and take action by building better defenses and counter

which is the system. So they will not take a chance measures against future security threats.

of getting caught.Unlike most security technologies The research honeypots are complex to deploy and (such as IDS systems) honeypots work fine in maintain, capture extensive information, and are encrypted. It does not matter what the bad guys used primarily by research, military, or government throw at a honeypot, the honeypot will detect and organizations. Now within those types is a capture it. Encryption deter attackers efforts by breakdown into three sublevels of honeypots, low eating all their time educating the honeypots interaction honeypots, medium interaction owner's to strengthen system and end result of the honeypots and high interaction honeypots. The low attackers capture.interaction honeypots emulate programs that are

HoneyPots also have several disadvantagesThe vulnerable and they are easy to set up because there

greatest disadvantage of honeypots is they have a is no need for a system administrator.Low

narrow field of view: They only see what activity is interaction honeypots are more used by home users.

directed against them. If an attacker breaks into These tend to be the production honeypots. The

your network and attacks a variety of systems, your second type medium interaction honeypots tend to

honeypot will be unaware of the activity unless it is be application-centric jail systems. The problem

attacked directly. Another disadvantage of with these is that it is hard to set up a good jail

honeypots, especially found in many commercial system, there is not one for windows, and they tend

versions, is finger-printing. Fingerprinting is when to be too much work for most people because they

an attacker can identify the true identity of a tend to be more of an application security process

honeypot because it has certain expected than a honeypot. High interaction honeypots

characteristics or behaviors. For example, a present a natural environment for the hacker that

honeypot may emulate a Web server or database you assume will be penetrated completely. These

organizer. Whenever an attacker connects to this applications monitor everything the hacker does

specific type of honeypot, the Web server responds including his tools, keystrokes, and also installs

by sending a common error message using standard data control to reduce the likelihood of an outgoing

HTML, usually a 404 message. This is the exact attack, but because honeypots are designed to be

response we would expect for any Web server. compromised in a computer system, there are some

However, the honeypot has a mistake in it and advantages and also some disadvantages to

misspells one of the HTML commands, such as consider.

spelling the word length as length. This misspelling Honeypots have many advantages to them. They now becomes a fingerprint for the honeypot, since are small data sets of high value, Deter attackers, any attacker can quickly identify it because of this Encryption, Information, and Simplicity. error in the Web server emulation just as Spell Honeypots collect small amounts of information Checker finds errors in Microsoft Word documents. only when attacker interacts with them. They only

The third disadvantage of honeypots is risk: They

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

4746

Page 25: Souvenior Inside IT page-1

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

can introduce a large, unseen risk to your organization outputting the statistical analysis of environment. By risk, we mean that a honeypot, mined factors.once attacked, can be used to attack, infiltrate, or

One of the important applications of Data Mining harm other systems or organizations. It allows

is in Neural Networks. Neural Networks tools hackers a gateway into systems and networks that

allow authorities in harvesting knowledge from normally could not be accessed. However,

large and complex data warehouses. They play a different honeypots have different levels of risk.

crucial role in modeling of complex relationships Some introduce very little risk, while others give

between inputs and outputs and predicting of the attacker entire platforms from which to launch

patters based of studied knowledge.new attacks. Here is a basic rule though; the simpler the honeypot; the less the risk. This provides the users to manipulate and cross-

fertilize data to get more informed decisions and nnnrules.

Enhancement of Power Quality in 14 Bus This paper reveals the research report on System using UPFC Involvement of Data mining as “Artificial Neural 1 2 Networks”. This describes the position of ANN as Vishal Rohila, Ravi Hada

a preferred tool in Data Mining. This perspective Assistant Prof. GIT, Jaipuracknowledges the inter-disciplinary nature of the

Abstract: This research deals with digital research in data mining and neural networks and simulation of 14-bus power system using UPFC to provides a unified platform for knowledge improve the power quality. The UPFC is also management learning and accessing in this fast capable of improving transient stability in a power growing multi-disciplinary research area. The system. It is the most complex power electronic paper highlights the topologies and Data Mining system for controlling the power flow in an Process for ANN. It involves various algorithms electrical power system. The real and reactive used for Data Mining in Neural Application. powers can be easily controlled in a power system

This paper will also show the advantages and using a UPFC system. The circuit model for UPFC

sensitive considerations for designing problems. is developed using rectifier and inverter circuits. The control angle is varied to vary the real and Paper on Neurons of Data Miningreactive powers at the receiving end. The Matlab

Data mining is the term used to describe the process simulation results are presented to validate the

of extracting value from a database. A data-model.

warehouse is a location where information is nnn stored. The type of data stored depends largely on

the type of industry and the company. Many Neurons of Data Mining

companies store every piece of data they have Ms. Sarita Veer - (Lecturer – CSE) collected, while others are more ruthless in what Maharishi Arvind Institute of Engineering and they deem to be “important”. Consider the Technology following example of a financial institution failing

to utilize their data-warehouse. Income is a very Determining the relevant data from large data important socio-economic indicator. If a bank warehouses has always been a killer domain for the knows a person's income, they can offer a higher companies, resulting in low quality decisions and credit card limit or determine if they are likely to tedious functioning of organizational activities. want information on a home loan or managed The solution to this is Data Mining. Data mining investments. Even though this financial Institution develops rules and decision trees for an had the ability to determine a customer's in two

ways, from their credit card application, or through regular direct deposits in their bank account, they did not extract and utilize this information. Another example of where this institution has failed to utilize its data-warehouse is in cross-selling insurance products (e.g. home, life and motor vehicle insurance). By using transaction Information they may have the ability to determine if a customer is making payments to another insurance broker. This would enable the institution to select prospects for their insurance products. These are simple examples of what could be achieved using data mining. Four things are required to data-mine effectively: high-quality data, the “right” data, an adequate sample size and the right tool. There are many tools available to a data mining practitioner. These include decision trees, various types of regression and neural networks.

1. Artificial Neural Networks: The Back Propagation Algorithm:

An artificial neural network (ANN), often just Back propagation, or propagation of error, is a called a "neural network" (NN), is a mathematical common method of teaching artificial neural model or computational model based on biological networks how to perform a given task. The back neural networks, in other words, is an emulation of propagation algorithm is used in layered feed biological neural system. It consists of an forward ANNs. This means that the artificial interconnected group of artificial neurons and neurons are organized in layers, and send their processes information using a connectionist signals “forward”, and then the errors are approach to computation. In most cases an ANN is propagated backwards. The back propagation an adaptive system that changes its structure based algorithm uses supervised learning, which means on external or internal information that flows that we provide the algorithm with examples of the through the network during the learning phase. inputs and outputs we want the network to

compute, and then the error (difference between 2. Neural Networks In Data Mining:

actual and expected results) is calculated. The idea In more practical terms neural networks are non- of the back propagation algorithm is to reduce this linear statistical data modeling tools. They can be error, until the ANN learns the training data.used to model complex relationships between

3. CONCLUSION:inputs and outputs or to find patterns in data. Using neural networks as a tool, data warehousing firms Artificial Neural Networks offer qualitative are harvesting information from datasets in the methods for business and economic systems that process known as data mining. The difference Traditional quantitative tools in statistics and between these data warehouses and ordinary econometrics cannot quantify due to the databases is that there is actual manipulation and complexity in translating the systems into precise cross-fertilization of the data helping users makes mathematical functions. Resistance to using these more informed decisions. “black boxes” is gradually diminishing as more

researchers use them, in particular those with

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

4948

Page 26: Souvenior Inside IT page-1

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

statistical backgrounds. Thus, neural networks are database server where it is executed. By providing Becoming very popular with data mining certain malformed input, an attacker can practitioners, particularly in medical research, manipulate the SQL query in such a way that its finance and marketing. This is because they have execution will have unintended consequences.proven their predictive power through comparison

II. Blind SQL injection : Blind SQL injection is a with other statistical techniques using real data

hacking method that allows an unauthorized sets. Due to design problems neural systems need

attacker to access a database server. It is facilitated further research before they are widely accepted in

by a common coding blunder. The program accepts industry. As software companies develop more

data from a client and executes SQL queries sophisticated models with user-friendly interfaces

without first validating the client's input. The the attraction to neural networks will continue to

attacker is then free to extract, modify, add, or grow.

delete content from the database. This type of nnn attack can become time-intensive because a new

statement must be crafted for each bit Data Mining With SQL Inference and recovered.Hackers typically test for SQL injection Injection vulnerabilities by sending the application input that 1 2 would cause the server to generate an invalid SQL Shilpa, Sunita Gupta1 query. If the server then returns an error message to Lecturer, Balaji College of Engineering

the client, the attacker will attempt to reverse-&Technology, Jaipur.engineer portions of the original SQL query using 2Sr.Lecturer, Balaji College of Engineering information gained from these error messages.

&Technology, Jaipur.III. Conclusion : Inference as a means of drilling

Inference attacks stand alone in the fact that no for data can be used regardless of the application actual data is transferred – rather, a difference in the environment and regardless of the predefined way an application behaves can allow an attacker to application query – so long as the application is infer the value of the data. When drilling for data vulnerable to SQL injection.via SQL injection there are three classes of attack-

nnnin band, out-of-band and the relatively unknown inference attack. In band attacks extract data over Artificial Intelligence the same channel between the client and the web server. Out-of-band attacks employ a different Naveen Kumar Kediacommunications channel to drill for data by using B.E.(Hons.) Computer Sciencedatabase mail.

Assistant Professor (MAIET, JAIPUR)I. Introduction : SQL injection is a code injection

PURPOSE- The purpose of this abstract is to technique that exploits a security vulnerability

enlighten the science and technology of Artificial occurring in the database layer of an application.

Intelligence. Artificial Intelligence is the The vulnerability is present when user input is

intelligence of machines and the branch of either incorrectly filtered for string literal escape

computer science that aims to create it. It is a key characters embedded in SQL statements or user

technology used in novel applications such as input is not strongly typed and thereby

banking, software systems.unexpectedly executed.The application, which is

APPROACH & METHODS- generally, but not necessarily, a web application, accepts user input and embeds this input inside an

(i) Neutral Network and Parallel Computation- SQL query. This query is sent to the application's

This approach is based on the signal received by the

human cells called neurons. It is the aim of AI Historical Perspective : Early work in AI focused researchers to construct electronic circuits that acts on using cognitive and biological models to like neuron in human brain. simulate and explain human information

processing skills, on "logical" systems that (ii) Chess- AI based game playing programs

perform common-sense and expert reasoning, and combine intelligence with entertainment. Deep

on robots that perceive and interact with their blue, a chess computer built by IBM researchers

environment. This early work was spurred by defeated world champion Gary Kasparov.

visionary funding from the Defense Advanced (iii) Frames- Frames are packets of information. Research Projects Agency (DARPA) and Office of The frame any contain any information which can Naval Research (ONR), which began on a large be used by the Artificial Intelligence system. scale in the early 1960's and continues to this day.

Basic AI research support from DARPA and ONR -The Future Aspect :

- as well as support from NSF, NIH, AFOSR, It is an attempt to understand the fundamental NASA, and the U.S. Army beginning in the 1970's question of human existence but it has also grown -- led to theoretical advances and to practical in commerce and society. Work is progressing on technologies for solving military, scientific, developing systems that converse in natural medical, and industrial information processing language, that perceive and respond to their problems. surroundings.

Approaches to Artificial IntelligenceConclusion : Artificial Intelligence has become an

Neural Networks and Parallel Computation : The important aspect of computer science and

human brain is made up of a web of billions of cells technology. It aims at developing smart systems

called neurons, and understanding its complexities embedded with electronic circuits that acts like

is seen as one of the last frontiers in scientific neuron in human brain and can make decisions of

research. It is the aim of AI researchers who prefer what is good and what is bad.

this bottom-up approach to construct electronic Paper on Artificial Intelligence circuits that act as neurons do in the human brain.

Although much of the working of the brain remains Artificial intelligence (AI) is the intelligence of

unknown, the complex network of neurons is what machines and the branch of computer science that

gives humans intelligent characteristics. By itself, aims to create it. The field was founded on the

a neuron is not intelligent, but when grouped claim that a central property of humans,

together, neurons are able to pass electrical signals intelligence—the sapience of Homo sapiens—can

through networks.be so precisely described that it can be simulated by a machine. Chess : AI-based game playing programs combine

intelligence with entertainment. On game with Artificial Intelligence (AI) is the key technology in

strong AI ties is chess. World-champion chess many of today's novel applications, ranging from

playing programs can see ahead twenty plus moves banking systems that detect attempted credit card

in advance for each move they make. In addition, fraud, to telephone systems that understand

the programs have an ability to get progressably speech, to software systems that notice when

better over time because of the ability to learn. you're having problems and offer appropriate

Chess programs do not play chess as humans do. In advice. These technologies would not exist today

three minutes, Deep Thought (a master program) without the sustained federal support of

considers 126 million moves, while human fundamental AI research over the past three

chessmaster on average considers less than 2 decades.

moves. Herbert Simon suggested that human chess

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

5150

Page 27: Souvenior Inside IT page-1

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

masters are familiar with favorable board Software Security Awareness: Mapping positions, and the relationship with thousands of of Roles and Responsibilitiespieces in small areas. [1] [2]

C. Banerjee Bright Keswani Arpita [3]Frames : One method that many programs use to Banerjee

[1][2]represent knowledge are frames. Pioneered by Suresh Gyan Vihar University, Jaipur[3]Marvin Minsky, frame theory revolves around Software Consultant, Jaipur

packets of information. For example, say the To build a secure software, the security should be situation was a birthday party. A computer could implemented right from the beginning i.e., the call on its birthday frame, and use the security in software development should be information contained in the frame, to apply to designed and developed right from the the situation. The computer knows that there is requirements engineering phase. Security does not usually cake and presents because of the mean understanding various features of security, in information contained in the knowledge frame. contrast, it means understanding ways to build and Frames can also overlap, or contain sub-frames. deliver secure features. For this to happen, the

Applications : awareness should be created among the individual · Autonomous vehicles: A DARPA-funded members of the software team. A culture of

onboard computer system from Carnegie security needs to be established among the Mellon University drove a van all but 52 of the software team members without focusing solely on 2849 miles from Washington, DC to San computers and software. A number of security Diego, averaging 63 miles per hour day and awareness tools and techniques have been night, rain or shine. developed for creating individual and group

awareness but most of them primarily target the ·Computer chess: Deep Blue, a chess computer programmers during coding phase. Some tools or built by IBM researchers, defeated world techniques applicable during the complete champion Gary Kasparov in a landmark software development phases with a synchronized performance.approach and manner needs to be identified and ·Mathematical theorem proving: A computer developed in order to create awareness among the system at Argonne National Laboratories various members of software team more proved a long-standing mathematical specifically for requirements team, design team, conjecture about algebra using a method that programming team, testing team, implementation would be considered creative if done by team, maintenance team and system users. This humans.paper highlights the importance of creating

·Scientific classification: A NASA system security awareness among the software team as a

learned to classify very faint signals as either whole with the help of recent published work for

stars or galaxies with superhuman accuracy, by building more secure software. In addition, a

studying examples classified by experts.mapping of the various external and internal roles

The Future : and responsibilities in software development team and software security awareness techniques is

AI began as an attempt to answer some of the most being presented and areas that need further

fundamental questions about human existence by investigations are identified in the paper.

understanding the nature of intelligence, but it has nnngrown into a scientific and technological field

affecting many aspects of commerce and society.

nnn

irrelevant stimulus is seen, it is seen as being Software Security Testing insignificant and not noteworthy and a P300 is not Considerations Throughout the System emitted. The P300 electrical brain wave response is Development Life Cyclewidely known and accepted in the scientific [1] [2] Bright Keswani C. Banerjee Poonam community. There have been hundreds of studies [3]

Keswani conducted and articles published on it over the past [1][2]

Suresh Gyan Vihar University, Jaipur thirty years. In his research on the P300 response, [3]Research Scholar, University of Rajasthan Dr. Farwell discovered that the P300 was one

aspect of a larger brain-wave response that he Functional security testing generally begins as named a MERMER® (memory and encoding soon as software is available to test. Software is related multifaceted electroencephalographic tested at many levels in a typical development response). The MERMER comprises a P300 process. In this paper we discuss the key response, occurring 300 to 800 ms after the considerations for security testing in each of these stimulus, and additional patterns occurring more activities:than 800 ms after the stimulus, providing even ·Unit testing, where individual classes, methods, more accurate results.functions, or other relatively small components

are tested nnn

·Testing libraries and executable filesIndustrial Implementation of CBR for

·Functional testing, where software is tested for PIN Systemadherence to requirements

1 2Madhu Sharma Dr. D.K. Mishra

·Integration testing, where the goal is to test 1Lecturer, S.S. Jain Subodh P.G. College, MCA whether software components work together as institute, Jaipur (Rajasthan)they should2Professor& Head (CSE) and Dean (R&D), ·System testing, where the entire system is under

Acropolis Institute of Technology & Research, testIndore (MP)

nnn

The paper proposed here introduces and Brain Finger Printing Testing investigates Case-Based Reasoning (CBR), a TechnologyKnowledge-Based Reasoning technique that

1 2 proved to be capable of providing good solutions Sudhendra Pal Singh Kamlesh Lakhwani3 for the problem of finding values of the parameters Saurabh Gupta

1 required in the steel's surface hardening process in M.Tech Scholar, Rajasthan Technical University a PIN (Plasma Ion Nitriding ) System. Kota, India

2M.Tech Scholar, Karanataka State Open Here a basic CBR system is hierarchically

University, India organized with a structured knowledge 3 representation. The system is then further M.Tech Scholar, R.G.V Technical University

improved to solve the stated problem. Evaluations Bhopal, Indiaon a large number of experiments indicate that this

Brain Fingerprinting testing detects information approach could provide a significant step for a stored in the human brain. A specific, electrical number of problems.brain wave response, known as a P300, is emitted

In this paper, a new concept is introduced in CBR by the brain within a fraction of a second when an for predicting values for the parameters required in individual recognizes and processes an incoming steel hardening process in a Plasma Nitriding stimulus that is significant or noteworthy. When an

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

5352

Page 28: Souvenior Inside IT page-1

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

System by investigating the approach to select the paper has been starting to spill over into more most appropriate heuristic method rather than to general security questions (such as law-employ it directly on the problem, in the attempt to enforcement strategy), and into the interface raise the level of generality at which we can between security and the social sciences.operate. All the evidence obtained from the first nnnstage experiments indicates that there is a range of promising future directions. Augmented Reality

1 2Finally the results of the work are to be evaluated Vikas Goyal Ramesh Bijarnia

1and a direction for future work is also presented. Stani memorial P.G College Jaipur2St. Wilfred's P.G. College Jaipurnnn

Augmented reality is the merging of real scene Information Securityview by a user and a virtual scene generated by a 1 2 3

Nitesh Kaushik, Gaurav Indoria , Siddharth computer. The user is completely immersed in an Jain artificial world & is divorced from the real 1Computer Science, Gyan Vihar University, environment. Augmented reality is a rapidly

Rajasthan, India emerging field which is drawing interest of peoples 2Computer Science, Gyan Vihar University, working in digital art and media. This paper will Rajasthan, India discuss some well known examples where 3Computer Science, Gyan Vihar University, augmented reality applies …. Such as special Rajasthan, India effects given in movies, trial of a Boeing aircraft

Laser based gadgets. This paper will explore Security is the degree of protection against danger, various technologies of augmented reality system damage, loss, and criminal activity. Security as a and the challenges faced by it. The paper will also form of protection are structures and processes that give a focus on its application in fields of medical, provide or improve security as a condition. military, engineering design, Robot and Tele-Information Security was seen as a technological robotics etc. Finally the paper will discuss what the discipline, based on computer science but with future holds for augmented reality and just how mathematics helping in the design of ciphers and advance it can become.protocols. That perspective started to change as

researchers and practitioners realized the nnnimportance of economics. As distributed systems

Software Project Cost and Effort are increasingly composed of machines that belong Estimationto principals with divergent interests, incentives

are becoming as important to dependability as Vishal Goyaltechnical design. In this paper, the use of digital St. Wilfred's P.G College, Jaipursteganography for information security in various

Software development projects include several ecommerce applications through the Internet will critical success factors which may put the risk for be discussed in detail. These applications include success of such a collaborative development digital watermarking for copyright protection of project. We therefore require methods and proper multimedia data, digital signature authentication steps that will help in reducing the risk in such a and validation of electronic documents, digital data software development project.storage and linkage for binding digitized

photographs with personal attribute information, This Paper introduces a study based technique as well as secure communication of multimedia which can be used to estimate the effort of software data through the open channels. This research projects. This will enable us a more accurate

estimation than using the current traditional sustainability and reliability in any transaction software development projects methods. It will performed between citizen and government. It is also help to predict the outcome of such also clear that E-governance can be implemented collaborative project by reducing the overall risk. with combination of ICT (Information

Communication and Technology) because it helps nnnin the governance process by providing a spectrum of technological solutions.Scenario of E-Governance in Rajasthan

State; Need Some Changes In Thoughts Keywords: Thoughts, Attitude, Motivation, Sachin Bajaj, Asstt. Prof., Vijay Kumar characteristics, and Role of AdministratorSharma, Asstt.Prof.

Conclusion:Department of Computer Science, St. Wilfred's P.G. College, Jaipur E-governance is useful for both government as

well as citizen, because it provide convenience and E-Governance is gaining popularity and being transparency between both parties. Benefits of E-accepted in Rajasthan as well as throughout India. governance can be achieved by only proper In Rajasthan, many work has been already done, in implementation of it and proper implementation of this direction, and much more has yet to be E-governance can only be done if and only if they achieved. There are some result that shows some remove all the negative aspects, thoughts, and satisfaction and implementation regarding attitude. They should only try for better switching over to computers in certain government implementation of E-governance honestly, department as well as in semi-government and effectively, accurately and technically with the private department. In this paper/abstract we are view of success of E-governance. just trying to find out and analyze some of the

positive as well as some not-so-positive features of nnnE-governance in Rajasthan State. There are so

Modern Business Utility of Data many changes which must be done for effective Warehousing .implementation of E-governance in state. First if Vijay Kumar Sharmawe talk about the thoughts of employees towards

E-governance must be positive, also they try to do St. Wilfred's PG College, Jaipurtheir best for properly and effectively

Data warehousing is a concept, an algorithm and implementation of E-governance in Rajasthan. It more of a structure that help the decision support can also be said that here the leader or system. The ability to take the right decision not administrator also plays a very important role in only helps the business to make more profit. Data this context, because they should try to change Warehouse improve its decision making process, attitude and behavior of their employees and also the operational business process that translates to find out the techniques, by which they can be better customer service, higher quality of products, motivated and can work & participated in success reduction of cost and faster delivery times.ness in E-governance. So, as according to the

above text it should be clear in our mind that The concept of data warehousing, though not a success of E-governance is directly is in hand of the very old concept, has gathered a new dimension employees, who are working and using the in the new economic set-up and would bring a functionalities of E-Governance. in case of proper huge amount of information under a structured implementation of E-governance, it provide arrangement.accessibility at the citizen's doorsteps with user

nnnfriendly interface. It also provide some other features like Efficiency, flexibility, scalability,

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

5554

Page 29: Souvenior Inside IT page-1

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

creating lab-oriented courses in networking by Development of Practical Computer offering an extended set of lab exercises from Networking Laboratoryplanning, design, implementation, and testing to

Sushil Sharma software and hardware configuration processes. Asstt. Prof., St. Wilfred's P.G. College, JPR These are extensible to a broad range of topics. We

learn through experience that multi dimensional In 2004 Electronic Engineering Technology approach in teaching networking technology Department at Southern University decided to requires multi dimensional effort to address all the develop computer networking and wireless important aspects of networking science.technology laboratory. The driving force was the

need for hands-on experience. This is an essential nnncomponent for a high-quality education in

Enhancing Software Fault Prediction computing and networking technology. We believe creating a technology environment will motivate Models Using Process Project Metrics

[1] [2]students to develop a better understanding of Hemlata Goyal , Neelu Goyal , Smita [3]theoretical concepts. Hence, these laboratory Vijayvargiya

[1] [2]activities aim to prepare students in computer Asstt, Prof.(Comp. Sc.) Asstt, Prof.(Comp. [3]networking class for the challenges of participating

Sc.) Asstt, Prof.(Comp. Sc.), Maharishi Arvind in an exponentially growing technology.

Institute of Science & Management, JaipurConsequently, our primary goal was that students

Risks can come from uncertainty in financial experience the fundamental concepts of wired and markets, project failures, legal liabilities, credit wireless networking technology through practical risk, accidents, natural causes and disasters as well training on hardware components, software as deliberate attacks from an adversary. There are configuration, and testing devices. The second several research papers that attempt to predict risk goal was to use protocol-analyzing software to by analyzing the source code and applying a examine, analyze, and modify data packets. The quantitative model. But still most of these third goal was to expand the scope of work to a prediction approaches are still in preliminary phase level to simulate the large-scale network design on and more research should be conducted to reach simulating software like OPNET®. In order to robust models. The accuracy of these models is achieve these goals, we wrote a series of lab significantly enhanced if process data is included practices to guide undergraduate students in their in the development of the quantitative model. This lab work. These activities integrate the paper surveys the software engineering literature aforementioned features. Furthermore, this work on software fault prediction and analyzes the can be extended to research oriented activities potential risks for SDLC using both machine where a network-programming component, such learning based and statistical based approach. This as socket programming, or modifications of whole research is carried with the help of RiskID network protocols is required. As a complement to Pro which is a Risk Assessment Tool from Accelera networking activities, we are working on exercises Research. that students can experience the computer security

issues and relevant technologies in the same Keywords : Process Metric, Project Metric, framework. In addition, other motivations were Generic Data, logistic regressionbehind the development of a practical computer

Introduction : The fundamental difficulty in risk networking laboratory. The general course assessment is determining the rate of occurrence framework in networking does not provide direct since statistical information is not available on all access to networking equipment and software. This kinds of past incidents. Furthermore, evaluating networking lab tries to meet the demand for the severity of the consequences (impact) is often

quite difficult for immaterial assets. Asset customer to customer, so does the amount and valuation is another question that needs to be quality of the process data that is available. addressed. Thus, best educated opinions and Therefore, it is difficult to construct a generic available statistics are the primary sources of model that will utilize process data and be information. There have been several theories and available to all customers. This is one reason that a attempts to quantify risks. Numerous different risk customized model is necessary to properly include formulae exist, but perhaps the most widely the process data.accepted formula for risk quantification is: Rate of

Statistical Significance :occurrence multiplied by the impact of the event equals risk. One simple aspect of process data that greatly

affects the likelihood of a fault is whether or not the RiskID Pro from Accelera Research provides

module has been recently modified. Historically, coverage based on SEI's Taxonomy–Based Risk

we find that a module that has been modified is 10 Identification. Like other risk assessment models

times more likely to have a field fault than a or software engineering tools, it examines the

module of equal complexity that has not been code to look for complexity and potentially

modified in the given release. Additional process problematic constructs to estimate risk. Unlike

metrics are often statistically significant (and other tools, it compliments the complexity data

therefore contribute to a more accurate model). with process data and customizes the model to the

The following table shows the statistical historical data from a specific development

significance of various factors in a logistic environment. The data for this paper is drawn from

regression analysis used for field fault prediction. the models that have been created for the RiskID

This is a specific example from a specific set of Pro product.

software data, but it is representative of our general Definitions : A “field fault" is a software fault that experience with risk models using process data. goes undetected in the development debugging and Since the statistical significance of an attribute can testing, and is identified in the customer's change in the presence of other factors, the table operational system. shows the significance of the factor by itself and in

the full model. For our example data, we found the • ??A "risk model" is a formula, set of rules to

following significance levels for process data:predict whether a software module is more likely to have a field fault.

• ??A "module" refers to the component of code, managed by the CM system. It is the entity at which faults are tracked and it is the target of the software risk model.

• A “release is a version of the entire software package that is delivered to a customer. If it is not released to the customer, then there is no field fault data. Since the process metrics are significant, even in

the presence of other factors, it is expected that the Process data may also include things like

total accuracy of the model is improved by experience levels of the developers, the amount of

including them.time that the module spent in review, the number of defects found in reviews, the number of test cases Since the cost of a software fault in the field is high, (and unique test cases) run that touched the software risk models should be constructed to err module. As the software process varies from on the side of caution. This means that some

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

5756

Page 30: Souvenior Inside IT page-1

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

modules will be falsely accused, but coverage will Software Fault- Tolerance by Using Soft be increased. The models used in the following Computing Time Model tables were constructed with this bias for the cost Anjana Shrivastavafunction in mind.

Associate Professor, Biyani Girls College JaipurBoth of these models are logistic regression Fault tolerance is the ability of a system sustains its models. It is important to note that the model functionality, even in the presence of faults. A fault without process metrics is a full analysis that was is a defect or flaw that occurs in some hardware and restricted to not use process metrics. It is not simply software components .Fault- tolerance system the same model with the process metrics removed. attempt to detect and correct the errors before they

become effective. The means for fault-tolerance are either error processing to remove errors from the system's state. Fault –treatment to prevent fault from being activated again .Two things are important when designing fault-tolerant system the fault-hypothesis what type of fault do we want the system to tolerant. The fault-coverage the So 33.3% of the modules predicted “high risk” and probability that the fault hypothesis be respected 4.3% of the modules predicted "low risk" have when a fault actually occurs in the system.faults.nnn

Aspect-Oriented Programming

Nitika Newar

Asst. Professor, Biyani Girls College, Jaipur

When Object-Oriented (OO) programming entered While identifying about the same number of the mainstream of software development, it had a modules as "high risk", coverage was increased by dramatic effect on how software was developed. 8.3%. Thus 21.9% fewer faults escape Developers could visualize systems as groups of identification.entities and the interaction between those entities,

Conclusion which allowed them to tackle larger, more complicated systems and develop them in less time Including process data and customizing the risk than ever before. The only problem with OO model significantly increases the accuracy of the programming is that it is essentially static, and a risk model. The utility of a risk model is allowing change in requirements can have a profound impact the organization to focus its review, inspection and on development timelines.test efforts on a smaller set of high-risk modules. A

model with higher accuracy translates into even A s p e c t - O r i e n t e d P r o g r a m m i n g ( A O P ) more efficient allocation of resources and more complements OO programming by allowing the effective fault detection earlier in the development developer to dynamically modify the static OO process. model to create a system that can grow to meet new

requirements. Just as objects in the real world can nnnchange their states during their lifecycles, an application can adopt new characteristics as it develops.

Consider an example: many of you have developed execution in the application at which cross-simple web applications that use servlets as the cutting concern needs to be applied. In our entry point, where a servlet accepts the values of a example, a point-cut is reached when the thread HTML form, binds them to an object, passes them enters a method, and another point-cut is into the application to be processed, and then reached when the thread exits the method.returns a response to the user. The first cut of the

4. Aspect: The combination of the point-cut and servlet may be very simple, with only the minimum

the advice is termed an aspect. In the example amount of code required to fulfill the use case being

below, we add a logging aspect to our modeled. The code, however, often inflates to three

application by defining a point-cut and giving to four times its original size by the time secondary

the correct advice. requirements such as exception handling, security, and logging have been implemented. I use the term AOP is designed to handle cross-cutting concerns "secondary requirements" because a servlet should by providing a mechanism, the aspect, for not need to know about the logging or security expressing these concerns and automatically mechanisms being used; its primary function is to incorporating them into a system. AOP does not accept input and process it. replace existing programming paradigms and

languages; instead, it works with them to improve AOP allows us to dynamically modify our static

their expressiveness and utility. It enhances our model to include the code required to fulfill the

ability to express the separation of concerns secondary requirements without having to modify

necessary for a well-designed, maintainable the original static model (in fact, we don't even need

software system. Some concerns are appropriately to have the original code). Better still, we can often

expressed as encapsulated objects, or components. keep this additional code in a single location rather

Others are best expressed as cross-cutting than having to scatter it across the existing model,

concerns...as we would have to if we were using OO on its

nnnown.

Some Standard Terminology : .Net Framework: A Software Platform for .NET-based Cloud Computing 1. Cross-cutting concerns: Even though most Applicationclasses in an OO model will perform a single,

specific function, they often share common, Mr. Vikram Singh Rathoresecondary requirements with other classes. For Assistant Professor, Center For Electronic example, we may want to add logging to classes Governance (Govt. of Rajasthan)within the data-access layer and also to classes Govt. R.C.Khaitan Polytecnic College Campus, in the UI layer whenever a thread enters or exits Jhalana Doongari, Jaipura method. Even though the primary .Net Framework is a platform for deploying functionality of each class is very different, the Clouds developing applications on top of it. It code needed to perform the secondary provides a runtime environment and a set of APIs functionality is often identical. that allow developers to build .NET applications

that leverage their computation on either public 2. Advice: This is the additional code that you or private clouds. One of the key features of want to apply to your existing model. In our .Net Framework is the ability of supporting example, this is the logging code that we want multiple programming models that are ways of to apply whenever the thread enters or exits a expressing the execution logic of applications by method.using specific abstractions. This is

3. Point-cut: This is the term given to the point of accomplished by creating a customizable and

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

5958

Page 31: Souvenior Inside IT page-1

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

extensible service oriented runtime environment bullying is limited to a few isolated incidents or a represented by a collection of software couple of mean emails or instant messages. containers connected together. By leveraging However, if you get even one communication that on these architecture advanced services includes a threat of bodily harm or a death threat including resource reservation, persistence, the police should be alerted. Be aware that urging storage management, security, and performance suicide is considered a death threat and the police monitoring have been implemented. On top of will treat it accordingly.this infrastructure different programming models

What can we do about cyber bullying:- 1. An can be plugged to provide support for different

Acceptable Use Policy (AUP) for internet, blogs, scenarios as demonstrated by the engineering,

podcasts and social networking sites should be life science, and industry applications.

crafted and signed by all stakeholders. Although nnn most districts and schools already have such

policies, care should be taken to ensure that there is Cyberbullying also a provision that no student should post Deepika Kumari information about other students, especially Asst. Professor, Biyani Girls College, Jaipur malicious and false information. Finally, schools

should ensure that there is also a provision against Cyberbullying is any harassment that occurs via student posting of any information that allows the Internet. Vicious forum posts, name calling others to identify a student or his/her location .2. in chat rooms, posting fake profiles on web sites, Telling a trusted adult is a common idea for a and mean or cruel email messages are all ways of solution, but, often, this track makes the situation cyberbullying.worse. Several researchers have noted that

Bullying has been around forever but cyberbullying causes distraction in all students, cyberbullying is different because it lets a bully victims, perpetrators, and by-standers alike, as remain anonymous. It is easier to bully in well as in teachers and administrators, taking cyberspace than it is to bully face to face. With minds from valuable class time . 3. If deemed cyberbullying a bully can pick on people with appropriate and necessary, reporting of much less risk of being caught. Kids who stand cyberviolence can be done in several around doing nothing in a real life bullying ways:CyberTipline: Unsolicited, obscene incident often become active participants in online materials and/or threats can be reported to harassment. http://www.missingkids.com/cybertip/ or by

calling 1-800-843-5678. ISP: Report harassment The detachment afforded by cyberspace makes to the bully's internet provider service and request bullies out of people who would never become that the offender's account be suspended or involved in a real life incident. The Internet makes blocked. Violations can also be reported to bullying more convenient and since the victim's www.whois.com . Police Contact and report reaction remains unseen people who wouldn't cyberbullying to local police, especially if the normally bully don't take it as seriously.bully threatens violence or abductionSchool

In schools, take all types of bullying seriously. As Report cyberbullying to school, especially when soon as the cyberbullying starts go to school any school-related content in involved officials for help. Cyberbullying is often an .4)Although some researchers have found that extension or escalation of bullying that is already parental control of students' internet use has little happening at school. Parents should also be told effect on cyberbullying (Fredrick, 2009), it still what is happening. makes sense to instruct parents to keep an eye on

their children's internet use patterns. Even a little The police are unlikely to become involved if the

precaution can go a long way. Instruct kids to keep are typically many more processes running than personal information private, and to keep there are available CPUs. This assignment is passwords private (except from parents). Teach carried out by softwares known as a scheduler and children to refrain from sharing secrets, photos, or dispatcher.anything embarrassing. Inform students to avoid

Scheduling OBJECTIVES:sending messages when they are angry to avoid

1. CPU utilization - to keep the CPU as busy as regret, and teach kids to be good “cyberfriends” by possible. refraining from sending emails or IMs written by a

2. Throughput - number of processes that friend to anyone else without permission 5. complete their execution per time unit. Finally, individual schools need to address more

complex issues at their own institutions. Ronald 3. Turnaround - total time between submission of Jacobson, a researcher at the University of a process and its completion. Washington proposes that schools might be able to 4. Waiting time - amount of time a process has help the bully no longer want to bully.The idea is been waiting in the ready queue. that the bully and the victim lack the social skills

5. Response time - amount of time it takes from for peaceful coexistence.

when a request was submitted until the first nnn response is produced.

6. Fairness - Equal CPU time to each thread. Artificial intelligency SchedulingScheduling algorithms:Hemlata Sharma 1. First in first out(FCFS):Lecturer, Maharishi Arvind Institute of Engg. and

Tech. Its the simplest scheduling algorithm, simply queues processes in the order that they This paper summarizes the state of the real time arrive in the ready queue.Since context switches field in areas of scheduling. The objective of only occur upon process termination, and no multiprogramming increases cpu utilization that is reorganization of the process queue is required, some process running at all times. The objective of scheduling overhead is minimal. time sharing is to switch cpu among processes so • Throughput can be low, since long processes frequently that users can interact with each

can hog the CPU program while it is running. Cpu scheduling • Turnaround time, waiting time and response algorithm are used to decide which process is in the

time can be low for the same reasons above ready queue is to be allocated the cpu. Basic type of scheduling algos are:- first come, first served, • No prioritization occurs, thus this system has shortest job first scheduling, priority scheduling, trouble meeting process deadlines. round robin scheduling,multi level queue • The lack of prioritization does permit every scheduling and were discussed in this paper and process to eventually complete, hence no evaluated on four cpu scheduling objectives starvation. (average waiting time, average turn around time,

2. Shortest remaining time(SJF):average cpu utilization and average throughput).

In it scheduler arranges processes with the least INTRODUCTION:-Scheduling is a key concept estimated processing time remaining to be next in in computer multitasking, multiprocessing the queue. This requires advance knowledge or operating system and real-time operating system estimations about the time required for a process to designs. Scheduling refers to the way processes are complete.assigned to run on the available CPUs, since there

FIFO

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

6160

Page 32: Souvenior Inside IT page-1

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

• If a shorter process arrives during another and cycles through them.process' execution, the currently running • RR scheduling involves extensive overhead, process may be interrupted, dividing that especially with a small time unit. process into two separate computing blocks. • Balanced throughput between FCFS and SJF, This creates excess overhead through additional shorter jobs are completed faster than in FCFS context switching. The scheduler must also and longer processes are completed faster than place each incoming process into a specific in SJF. place in the queue, creating additional overhead.

• Fastest average response time, waiting time is • This algorithm is designed for maximum dependent on number of processes, and not

throughput in most scenarios. average process length. • Waiting time and response time increase as the • Because of high waiting times, deadlines are

process' computational requirements increase. rarely met in a pure RR system. Since turnaround time is based on waiting time

• Starvation can never occur, since no priority is plus processing time, longer processes are given. Order of time unit allocation is based significantly affected by this. Overall waiting upon process arrival time, similar to FCFS. time is smaller than FIFO, however since no

process has to wait for the termination of the 5. Multilevel queue scheduling:longest process.

This is used for situations in which processes are • No particular attention is given to deadlines, the easily divided into different groups. For example, a

programmer can only attempt to make processes common division is made between foreground with deadlines as short as possible. (interactive) processes and background (batch)

• Starvation is possible, especially in a busy processes. These two types of processes have system with many small processes being run. different response-time requirements and so may

have different scheduling How to choose a 3. Fixed priority pre-emptive scheduling:scheduling algorithm.When designing an operating

In it the scheduler arranges the processes in the system, a programmer must consider which ready queue in order of their priority. Lower priority scheduling algorithm will perform best for the use processes get interrupted by incoming higher the system is going to see. There is no universal priority processes. “best” scheduling algorithm, and many operating • Overhead is not minimal, nor is it significant. systems use extended or combinations of the

scheduling algorithms above. Since processes can • FPPS has no particular advantage in terms of only use one time unit of the in the throughput over FIFO scheduling. highest priority queue, starvation can be a problem • Waiting time and response time depend on the for longer high priority processes.priority of the process. Higher priority nnnprocesses have smaller waiting and response

times.

• Deadlines can be met by giving processes with deadlines a higher priority.

• Starvation of lower priority processes is Every corporation using IT technologies needs a possible with large amounts of high priority good and carefully secured network design. The IT processes queuing for CPU time. security is a key factor of a normal functional of the

4. Round-robin scheduling: whole corporation and all its sections. There are different methods and concepts for providing The scheduler assigns a fixed time unit per process,

round robin

Network Security & CryptographyRajni Sharma

Asst. Professor, Biyani Girls College, Jaipur

different level of IT security. Some of them are very Study and Analysis of Cyber Crime important and should be implemented in every Nisha Sharma, Lecturercorporate network. S.S.G Pareek College, JaipurThere are a lot of services providing inside and Crime and criminality has been associate Cyber outside the corporation network. Increasing the crime with man since his enternality .All crimes number of services like web services, mail services, performed or resorted to by abuse of electronic file services and other, the number of eventual media.Cyber Crime is any crime where – Computer security issues is rising. The security methods of is a target, tool of crime, incidental tool. Origin of each of provided services are different and it is cyber crime– internet telephony, ecommerce, required a professional with deep knowledge about Usenet, instant messaging, Email, internetradio, this service functionality if it is needed to be good downnload or upload,chat groups. The person who applied. conduct such type of crime like hacking,

pronography, phishing, Email Bombing etc are Operation system and application hardering are known as cyber criminal. Victims Greedy people, methods which are not so hard for applying, like Desperados, Unskilled & Inexperienced, Unlucky configuring proxy server or firewalls, but they people. Computer Crimes are Vulnerable Because could increase the security drastic. In a combination o f f : - A n o n y m i t y, C o m p u t e r ' s s t o r a g e with simple configured security devices, the results capacity,Weakness in Operating System,,Lack off could be very impressive.Awareness off user.Sale of illegal article-In this

Choosing the right methodology and framework of crime illegal article like drugs, weapon are sale with designing a secured network is important part of the help of computer. Phishing is the substitution of entire process. With the right methodology original home page with another page.designing could be easier and more effective.

nnnNetwork security can also help in this . Network

A Practical Approach to Introducing security is a complicated subject, historically only Project Development Lifecycle-SDLCtackled by well-trained and experienced experts.

However, as more and more people become Nupur Jain``wired'', an increasing number of people need to Lecturer, Mahrishi Arvind College of Science & understand the basics of security in a networked Technologyworld. We are going to present what are the

Objective- By this I explain the SDLC phases and common attacks against security over network,

explain who can take the benefits of SDLC .And Solutions for those attacks, Introduction of

how can implement the practical approach of SDLC cryptography, Algorithms of Cryptography and

in project Development or a System Development. some special-purpose Secure Networking Devices.

Students are very confused to take phases. Actually Some Common methods to prevent attacks are: every system had a development process or Life 1. Symmetric Encryption cycle.2. Asymmet r i c Enc ryp t ion (Pub l i c key

Introduction-SDLC is System Development life Encryption)Cycle as well as Software Development Life cycle. 3. Mac FunctionWe follow some step to Develop a System.

4. Hash FunctionPlanning- extracting the requirements or 5. Digital Signaturerequirements analysis

nnnRequirements-Gathered Data and Analysis on the Basis of Client as well as developer

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

6362

Page 33: Souvenior Inside IT page-1

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Analysis-Strength and weakness of the system on start coding. Then we do work on other phases.the basis of Feasible study.

* Functional specificationDesigning-We put are planning in some flow – * Designusing DFD, USE CASE etc. * Scheduling

* Team work Coding-Write code

* CodingDevelopment-Integrated the Modules and develop * Testing full system * Debugging

* Support Testing- Once the unit testing is completed and the

* Updates code is released, the functional testing is done. A

Many authors write that it have 6 phases, According Documentation Prepare Report

to many it have 5 phases and some are describe Deployment- starts after the code is appropriately seven phase. Actually what have done I prepare tested, is approved for release and sold or otherwise something I do follow some process. eg. I prepare a distributed into a production environment. Tea. Some told take a pen –add water-add

sugar—and milk – add tea leaves –boil 2-3 Training- training for the user to using software.

min—serve. Other way -Take a pan-add Maintenance - software to cope with newly integrants—boil it 2-3 min-serve it.discovered problems or new requirements.

Yes I want to say its process we can take combined When we combine these entire task or activities in phase of development and testing in one phase Particular order its SDLC, SDLC is the process to Implementation.combining various activities of software

But main stress is that we should clear about the Development from planning to investigation to

functional and non functional requirement of analysis to coding to development to testing to

system.deployment to maintenance. It's system approach to problem solving. Conclusion-It's a simple and practical approach to

develop a system. Not to confuse to take pahses.But Description-The important task in creating a

as per requirement we choose the SDLC models .It software product is extracting the requirements or

can be the Traditional (Water fall, RAD, Prototype) analysis. Mean we are planning to develop a

or it can be the Alternative (V –Model).In V Model System as per user requirement. Here we not

we apply Testing in Every Phase.mentioned what software to do. In Analysis phase

nnnwe collect the data and check the strength and weakness of system, turning data into information

Ontologyand identifying the needs. This phase is indicated by Akanksha Saxenathe management because we collect the

requirement from the user .point to keep in mind Lecturer, MAIET, Jaipuruser do not have any idea about Software.

In the context of computer and information Possibilities are that System is not economically

sciences, ontology defines a set of representational best or not, scheduled, or the level of operation are

primitives with which to model a domain of not clearly distinguished .so we have to make a

knowledge. The representational primitives are feasibility study.

typically classes (or sets), attributes (or properties), After that design the system by the help of DFD, and relationships (or relations among class USE CASE etc.After designing a system now we members). The definitions of the representational

primitives include information about their meaning expressive constructs aimed at facilitating agent and constraints on their logically consistent interaction on the Web. Many disciplines now application. In the context of database systems, develop standardized ontologies that domain ontology can be viewed as a level of abstraction of experts can use to share and annotate data models, analogous to hierarchical and information in their fields. Medicine, for relational models, but intended for modeling example, has produced large, standardized, knowledge about individuals, their attributes, and structured vocabularies such as SNOMED (Price their relationships to other individuals. Ontologies and Spackman 2000) and the semantic network are typically specified in languages that allow of the Unified Medical Language System abstraction away from data structures and (Humphreys and Lindberg 1993). Broad general-implementation strategies; in practice, the purpose ontologies are emerging as well. For languages of ontologies are closer in expressive example, the United Nations Development power to first-order logic than languages used to Program and Dun & Bradstreet combined their model databases. For this reason, ontologies are efforts to develop the UNSPSC ontology which said to be at the "semantic" level, whereas database provides terminology for products and services.schema are models of data at the "logical" or Ontology defines a common vocabulary for "physical" level. Due to their independence from researchers who need to share information in a lower level data models, ontologies are used for domain. It includes machine-interpretable integrating heterogeneous databases, enabling definitions of basic concepts in the domain and interoperability among disparate systems, and relations among them.specifying interfaces to independent, knowledge-

Some of the reasons to develop ontology:based services. In the technology stack of the • To share common understanding of the Semantic Web standards, ontologies are called out

structure of information among people or as an explicit layer. There are now standard software agents.languages and a variety of commercial and open

• To enable reuse of domain knowledge.source tools for creating and working with ontologies. In recent years the development of • To make domain assumptions explicit.ontologies—explicit formal specifications of the • To separate domain knowledge from the terms in the domain and relations among them operational knowledge.(Gruber 1993)—has been moving from the realm • To analyze domain knowledge.of Artificial-Intelligence laboratories to the

Sharing common understanding of the structure desktops of domain experts. Ontologies have of information among people or software agents become common on the World-Wide Web. The is one of the more common goals in ontologies on the Web range from large developing ontologies . For example, suppose taxonomies categorizing Web sites (such as on several different Web sites contain medical Yahoo!) to categorizations of products for sale information or provide medical e-commerce and their features (such as on Amazon.com). services. If these Web sites share and publish The WWW Consortium (W3C) is developing the same underlying ontology of the terms they the Resource Description Framework (Brickley all use, then computer agents can extract and and Guha 1999), a language for encoding aggregate information from these different sites. knowledge on Web pages to make it The agents can use this aggregated information to understandable to electronic agents searching for answer user queries or as input data to other information. The Defense Advanced Research applications.Projects Agency (DARPA), in conjunction with Enabling reuse of domain knowledge was one of the W3C, is developing DARPA Agent Markup the driving forces behind recent surge in Language (DAML) by extending RDF with more

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

6564

Page 34: Souvenior Inside IT page-1

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

ontology research. For example, models for To conclude, an ontology is a formal explicit many different domains need to represent the description of concepts in a domain of discourse notion of time. This representation includes the (classes (sometimes called concepts)), properties of notions of time intervals, points in time, relative each concept describing various features and measures of time, and so on. If one group of attributes of the concept (slots (sometimes called researchers develops such ontology in detail, others roles or properties)), and restrictions on slots can simply reuse it for their domains. Additionally, (facets (sometimes called role restrictions)). if we need to build a large2 ontology, we can Ontology together with a set of individual instances integrate several existing ontologies describing of classes constitutes a knowledge base. In reality, portions of the large domain. We can also reuse a there is a fine line where the ontology ends and the general ontology, such as the UNSPSC ontology, knowledge base begins.and extend it to describe our domain of interest. nnn

Making explicit domain assumptions underlying Enterprise Competitiveness Using ERPan implementation makes it possible to change

Aman Jain, Sandeep Sharma, Pawan Namathese assumptions easily if our knowledge Deepshikha College of Technical Education, about the domain changes. Hard-coding Jaipurassumptions about the world in programming-This research defines the concept of the Extended language code makes these assumptions not Enterprise and explains its relevance to IT services only hard to find and understand but also hard to firms. The research concentrates on one of the change, in particular for someone without hottest segments in the extended enterprise, programming expertise. In addition, explicit Enterprise Resource Planning (ERP), to specifications of domain knowledge are useful for demonstrate how the functionality of corporate IT new users who must learn what terms in the domain systems is being extended beyond the “enterprise”.mean. Separating the domain knowledge from

the operational knowledge is another common A systemic review of ERP tools and how these tools use of ontologies. We can describe a task of are being utilized to the extended enterprise configuring a product from its components environments to enable the connectivity of multiple according to a required specification and applications both within and between enterprises implement a program that does this configuration has been done.independent of the products and components This research explains the implications of an ERP themselves. We can then develop an ontology implementation, from a business perspective with of PC-components and characteristics and apply its successes and failures; it agrees that ERP is not the algorithm to configure made-to-order PCs. “the magic bullet” that will give competitiveness to Analyzing domain knowledge is possible once an enterprise. Companies have to be prepared and a declarative specification of the terms is competitive in order to take an ERP implementation available. Formal analysis of terms is as a tool that will provide sustainable advantages. extremely valuable when both attempting to Analyzing real life cases of ERP implementation, reuse existing ontologies and extending them . Cisco Systems a successful history and FoxMeyer Often an ontology of the domain is not a goal Drug's Bankruptcy a failure of ERP, can help in itself. Developing ontology is akin to defining a companies to understand what can go right and set of data and their structure for other programs to what can go wrong within the ERP and how a use. Problem-solving methods, domain- company will change the way they do business for independent applications, and software agents use ever.ontologies and knowledge bases built from DRIVERS FOR ERP IMPLEMENTATIONontologies as data.

Performance improvement of an enterprise ·Single system, creating an IT infrastructure using ERP easier to manage.In order to understand the attraction of enterprise ·Avoids to build local own integrated systems, systems, as well as their potential dangers, first it is something involving large cost and risks.necessary to understand or to have a global view of

·Eliminates the need to maintain version control the problems ERP are designed to solve.and interfaces associate with separate

·The fragmentation of information in large packages.organizations, every big company collects, Operational :generates and stores vast quantities of data. In

The whole company will be re-organized across most companies the data are not kept in a single process, Operational benefits should be the most repository, rather the information is spread significant through the whole implementation and across many but separate computer systems, the once that are much easer to evaluate. If an ERP each housed in an individual function, business changes the way of doing business in way that it unit, region, factory or office. Each of these so-takes its core competence, there is no use of being called legacy systems may provide invaluable linked if the purpose of the company has disappear.support for particular business activity, but in ·Reduction in inventoriescombination, they represent one of the heaviest

drags on business productivity. If the ·Reduction in total logistics costcompany's systems are fragmented, its business

·Reduction in manufacturing costis fragmented.·Reduction in outside warehousing·Costs, maintaining many different computer ·Reduction in procurement costsystems lead to enormous costs, for storing and

rationalizing redundant data, but even more ·Increased production capacityimportant than the direct costs are the indirect

·Improved order cycle time/ accuracy/cost.ones. If a company's sales and ordering systems Financial :cannot talk with its production-scheduling

systems then its manufacturing productivity The benefits on the financial are cannot be that and customer responsiveness suffer. great, especially when the main issue is not how

much benefit will bring to the financial department, This works that the entire database collects data but more if there is sufficient resources to cover the from and feeds data into modular applications cost of an ERP implementation.supporting virtually all of a company's business

activities across functions, across business units, ·Increased shareholder value, before this was across the world. When new information is entered measured by the increase on the stock price, but in one place, related information is automatically not anymore.updated. ·Reduced assets deployedTechnical benefits :

·Increase return on equityMost of the times the technical benefits are

·Improved cash flowconcerning with the long term and the ROI, but ERP Modules benefits :companies should always see if an ERP helps to

rationalize technical resources across the business. These benefits can vary from companies and depend on the functionality and applicability of ·Consistent logic application, information and each of these modules.interface, creating an IT environment easier to

understand and thus to work in. The most significant modules are:

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

6766

Page 35: Souvenior Inside IT page-1

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

The cost of downtime its one of the main cost that ·Inventory Managementshould be taken into consideration. On average ·Order EntryERP experience a 2.8 hours of unscheduled

·Pricing Flexibility downtime per week and according to a recent survey of 250 Fortune 1000 companies, the ·PurchasingStandish Group reported that the average per ·Production managementminute cost of downtime for an enterprise

Beside all the models benefits and despite the application sis $13000.company does business, the overall benefit is

CONCLUSIONS :the connectivity of information.In one hand an ERP system can be a savior and in INVESTMENT AND BUSINESS IMPACT the other hand it can be slayer of competitive (ERP)advantages. Successful cases show how a company

Investment : can develop competitive advantages around IT Implementation of ERP systems requires a systems, but failure cases can also indicate how an substantial investment of time, money and internal ERP system can kill the company's actual resources and is fraught with technical and business competitive advantages, that have been develop risk. around a function that has been eliminated with an A typical ERP installation has a total cost of about ERP implementation.$15 million and cost can be as high as to two to three If a company rushes to install an enterprise system percent revenues. Installation takes between one without first having a clear understanding of the and three years (21 months on average), with business implications, the dream of integration can benefits starting to accrue in an average of 31 quickly turn into a nightmare. The logic of the months. system may conflict with the logic of the business, ERP implementations are also known to be in this case, the implementation will fail, wasting unusually difficult, even when compared to other enormous sums of money and resources, and large-scale systems development projects. weakening important sources of advantages.

Although ERP systems are packaged software For Companies that compete on cost rather than on applications, the majority of project cost is devoted distinctive products or superior customer service, to setup, installation and customization of the enterprise systems can raise different strategic software, services typically provided by outside issues. The huge investment required to implement consultants such as Accenture or EDS. an ERP at large companies, typically ranging from Cost of ERP $50 million to more than $500 million need to be The cost of ERP can be divided into technical and weighed carefully against the eventual savings the managerial system will produce. In some cases, companies ·Cost of the software may find that by not implementing an ERP they can

actually gain a cost advantage over competitors that ·Cost of implementation, consulting firmsare embracing the systems. They may not have the ·Cost of maintenancemost elegant computer system or the most

·Technical costintegrated information flows and processes, but if

Costs may vary depending on number of users, the customers are concerned only with price, that may size of the enterprise and detailed of the software

not matter.and specific characteristic that can depend form the

It is true that enterprise systems can deliver great vendors and the companies deal.reward, but the risks they carry are equally great.

Cost of Downtime

When considering and ERP implementing, Agents have limited ability to dynamically sense or managers need to be careful that their enthusiasm gain information from the environment. Through about the benefits does not blind them to the the sensing ability, agents know the existence of hazards. other agents and the existence of obstructions and

facility such as roadway for vehicle and stair or nnnelevator for pedestrian.Modeling Mobile Traffic Agents on Agent also has minimum intelligence to decide Network Simulationwhich way to go. There is no requirement for user

Pratibha Pathakintervention on agents' decision. The decision is

Asst. Professor, Biyani Girls College, Jaipur based on agent's observation of the current situation and simple local rules.This article describes a new and novel approach to

model dynamic simulation of Conclusions :mobile traffic agents such as pedestrians and cars on The route choice self-organization can be seen as a a simple network graph. The modeling approach is new and novel alternative to existing multi-agent based on route choice self-organization of multi dynamic traffic assignment models. The proposed agents. In contrast to the traditional method of model is much simpler than traditional traffic traffic assignment that assigns probability on each assignment model that it incorporates natural route based on a generalized travel cost, our model movement of agents to establish individual route considers route probability as direct output of the choice. As the result, the model is able to handle simulation rather than an input to the network. The dynamic traffic assignment based on route choice self-organizing route choice happens as a dynamic self-organization.feedback loop that optimizes the product between

The illustration example of pedestrian agents over global and local information. the network graph indicates that no unique set of

Multi agent traffic simulation is an abstract parameters would produce the same set of link flow representation of real world traffic agents into pattern. Therefore, we cannot use flow pattern as mathematical equation or computer program that criteria of objective function in parameter might give a new paradigm to evaluate the outcome calibration. It was also found out that shortest of various design, control and policy scenarios. distance path does not necessarily lead to minimum Simulation is a great tool as virtual laboratory to egress time which is useful for evacuation experiment with various types of facilities and application. This finding is especially important in behavioral rules and what-if scenarios. the present of panic crowds. It implies that

evacuation route should be analyzed further as it is A mobile traffic agent or just agent in short is not necessarily the shortest distance as commonly defined as an intelligent autonomous discrete believe by many people.character (such as pedestrians, goods, vehicles and

mix traffic) that moves on a network graph, lattice nnngrid, continuous space or hybrid environment based

Holographic Versatile Discon local rules from an origin point to a destination point. The term autonomous indicates that the Renu Kanwaragents have their own minimal intelligence to sense, Asst. Professor, Biyani Girls College, Jaipur to decide, and to react or to adapt independently

The Information Age has led to an explosion of based on a set of rules and agent's observation of the information available to users. The decreasing cost environment. Each agent has it own properties such of storing data and the increasing storage capacities as position and speed and many other parameters of small device has been key enablers of this that affect agent's behaviors.

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

6968

Page 36: Souvenior Inside IT page-1

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

revolution. While current storage needs are being information, which is approximately 6,000 times met, storage technologies must continue to improve the capacity of a CD-ROM, 830 times the capacity in order to keep pace with the rapidly increasing of a DVD, 160 times the capacity of single-layer demand. Thus Holographic memory is developing Blu-ray Discs, and about 8 times the capacity of technology that has promised to revolutionalise the standard computer hard drives as of 2006. The HVD storage systems. It can store data up to 1 Tera byte in also has a transfer rate of 1 gigabit/s. a sugar cube sized crystal. Storing information nnnthroughout the volume of a medium—not just on its surface— offers an intriguing high-capacity Banach Spaces and Banach Algebras alternative. Thus storing enormous data on a petite Theorysurface Holographic data storage is a volumetric

Varsha Guptaapproach which, although conceived decades ago,

Asst. Professor, Biyani Girls College, Jaipur has made recent progress toward practicality with Banach space theory has its roots in Banach's the appearance of lower-cost enabling technologies, seminal monograph from 1932. His motivating significant results from longstanding research examples were mainly vector spaces of functions. efforts, and progress in holographic recording Subsequently, many other interesting classes of materials And HVD is its paramount case.Banach spaces have been introduced, and the field is

Holographic Versatile Disc (HVD) is an optical disc at present very rich in examples. The focus of the technology still in the research stage which would work at Lancaster is to investigate a given Banach greatly increase storage over Blue-ray Disc and HD space through the (bounded, linear) operators that DVD optical disc systems. It is based on the act on it, using algebraic methods. Often problems principle of holography and employs a technique are motivated by results about C*-algebras (which known as collinear holography, whereby two lasers, correspond to the case of operators acting on the one red and one blue-green, are collimated in a nicest possible Banach space, that is, a Hilbert single beam. The blue-green laser reads data space). Examples of questions that we have studied encoded as laser interference fringes from a are closed ideals, existence of traces and holographic layer near the top of the disc while the involutions, and K-theory of algebras of operators red laser is used as the reference beam and to read on a Banach space.servo information from a regular CD-style

Project: K-theory and the structure of Banach aluminium layer near the bottom. Servo sequence algebras. information is used to monitor the position of the

read head over the disc, similar to the head, track, Briefly, a Banach algebra is a Banach space which and sector information on a conventional hard disk carries a continuous multiplication that turns it into drive. On a CD or DVD this servo information is a ring. An important class of Banach algebras are the interspersed amongst the data. Banach sequence algebras which are those Banach

algebras that arise as the completion of c (the A dichroic minor layer between the holographic 00

algebra of complex sequences which vanish data and the servo data reflects the blue-green laser eventually, equipped with its point-wise operations) while letting the red laser pass through. This with respect to some norm. Easy examples include prevents interference from refraction of the blue-

pgreen laser off the servo data pits and is an advance the classical sequence spaces l for 1 ? p < ∞and c , 0

over past holographic storage media, which either and more generally every Banach space with an experienced too much interference, or lacked the unconditional Scheduler basis is a Banach sequence servo data entirely, making them incompatible with algebra. The aim of this project is to investigate the current CD and DVD drive technology. These discs structure of such algebras, in particular to have the capacity to hold up to 3.9 terabyte(TB) of

understand how properties of the underlying direction is closest to the direction of destination Banach space are reflected in the algebraic gets selected as the next hop forwarding node.) structure. K-theory will play an important role. K- together with minimum overhead for route theory originates from topology, where it was discovery and mobility management. Unlike other introduced by Atiyah and Hirzebruch in the 1960s, Zone based approach, in clustering it is not required building on work of Grothendieck. In the 1970s it to consider zone related information of each node was realized that K-theory can be formulated in a while finding shortest path. Here, it is being purely Banach-algebraic framework, and it has proposed a new routing algorithm for mobile ad hoc since become a standard element of any operator network by combining the concept of Ant Colony algebraist's toolkit. Comparatively little is known approach and Zone based routing approach using about the K-theory for classes of Banach algebras clustering to get shortest path with small number of which are not C*-algebras. control messages to minimize the overhead.

nnn nnn

Zone Based Ant Colony Routing in Mega Trends in Instructional Mobile AD-HOC Network Technology

1 2 Ms. Anu Chaudhary Varsha fauzdar Swati bahire1 IT, Faculty, Biyani Girls College M Tech Pursing, Asst. Prof., SGVU2 Information technology has created enormous M Tech Pursing, Asst. Prof., SGVU

changes in recent decades: personal computers, the Ant colony optimization (ACO) is a stochastic Internet, and much more. The use of these approach for solving combinatorial optimization technologies in teaching is getting popular day by problems like routing in computer networks. The day in the face to face classroom. The use of such idea of this optimization is based on the food technology is limited to classroom. It is considered accumulation methodology of the ant community. small trends of technology. The mega trends of Zone based routing algorithms is build on the educational technology are used in distance concept of individual node's position for routing of education and research studies. The media of mega packets in mobile ad-hoc networks. Here the nodes' technology are radio-broadcasting, satellite position can be further utilized to discover routes by television, multi-media approach, internet system the Ants in optimized way. Position based routing and website system, teleconferencing, video-disc algorithms (POSANT) had some significant and video text etc. loopholes to find route (source to destination) like it The mega educational technology is generally used never guarantees the route would be the shortest in the open universities where instruction is one, in cases while it is able to find it. On the provided on line. Online education and distance contrary, routing algorithms which are based on ant learning have given a new dimension to the field of colony optimization find routing paths that are close education and higher learning. Today, students do in length to the shortest paths. The drawback of not necessarily need to be physically present in these algorithms is the large number of control classrooms. Students can submit their homework messages that needs to be sent or the long delay and test assignments through the Internet.before the routes are established from a source to a

destination. Here In this paper we have used Zone Advantages of Mega Trends in Instructional based ANT colony using Clustering which assures Technologyto find shortest route using the DIR principle (In this The use of technology to instruct in the classroom is principle, the source or intermediate node transmits known as Instructional Technology. With message to several neighbors and the node whose Instructional Technology, we truly have the

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

7170

Page 37: Souvenior Inside IT page-1

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

opportunity to develop “classrooms without walls.” Through IT, instructors can ask that students It has given following advantages: analyze, synthesize, and evaluate virtual or

actual solutions. Students may also have more ·Enhance learning: Web-based systems offer a access to powerful visuals or better organized multi-media environment; integrate various materials.kinds

nnn·Encourages contacts between students and

Secure Routing in Wireless Sensor faculty. Through e-mail, list servers, and chat Networksrooms, IT lends itself easily to this principle by

increasing not only the quantity, but also the Pramod Kumar Gargquality of interaction between students and Sr. Lecturer in Maharshi Arvind Institute of faculty. Engineering & Technology

·Develops reciprocity and cooperation among Wireless Sensor Networks is the new concept in the students. IT helps shape a constructivist field of networks consists of small, large number of classroom where students utilize collaborative sensing nodes which is having the sensing, learning and are able to communicate with each computational and transmission power. Due to the other and oftentimes are more honest in their lack of tamper-resistant packaging and the insecure peer-reviews using a written medium. nature of wireless communication channels, these

networks are vulnerable to internal and external ·Uses active learning techniques. IT expects attacks. Moreover, routing protocols are designed, students to assume responsibility for their taking the consideration of power consumption not learning.security as a goal. As security plays an important ·Gives prompt feedback. With IT programs role in the ability to deploy and retrieve trustworthy such as Blackboard or e-College, students can data from a wireless sensor network. The proper access instructor feedback as soon as it is posted. operations of many WSNs rely on the knowledge of Students may also feel more comfortable asking routing algorithms. However, most existing routing an instructor about their performance in a algorithms developed for WSNs are vulnerable to written medium as well.attacks in hostile environments.

·Emphasizes time on task. Not only can certain Current routing protocols assume the networks to be

programs document student's time spent on task benevolent and cannot cope with misbehaviour of

via threaded discussions and the like, IT can help nodes. The misbehaviour may be due to node being

to make studying more efficient by providing a malicious to save the battery power. Whenever any

myriad of information to the students' homes device comes within the frequency range can get the

thereby reducing travel time and the like.access to the transmitting data and may affect the

·Communicates high expectations. Teaching transmission. Thus, this work has significant courses entirely online necessitates that an importance, to build a highly secure system through instructor's expectations be clearly defined. frequency hopping.With IT that allows for peer-review and all 1. INTRODUCTIONstudents having access to each other's

Wireless Sensor Networks (WSN) relies on coursework, high expectations may not only be collaborative work of large number of sensors. For communicated by instructors, but met by this reason, they are deployed densely throughout students who are aware that the entire class—not the area where they monitor specific phenomena just the instructor—will view their work.and communicate with each other and with one or

·Respects diverse talents and ways of learning. more sink nodes that interact with a remote user. The IT is ideally suited for this characteristic. user can inject commands into the sensor network

via the sink to assign data collection; data because of sensor mobility but also because of processing and data transfer tasks to the sensors in sleep-and-wake cycles of the sensors, bandwidth order to receive the data sensed by the network. because usable bandwidth in WSN are limited However, due to the lack of tamper-resistant compared to wired network, contribute by multi-packaging and the insecure nature of wireless path fading, noise and interference; and security communication channels, these networks are because wireless is too vulnerable whether to vulnerable to internal and external attacks. insider user or outsider users attack.

2. Motivation 5. Objective and Sub-Tasks

WSN are prone to failure and malicious user attack The primary objective of this thesis is secure routing because it is physically weak, a normal node is very in WSNs which was achieved by the following easy to be captured to become a malicious node or manner:by inserting a malicious node in the network. The ? To analyze, implement and evaluate AODV malicious nodes try to disrupt the network operation protocol. by modifying, fabricating, or injecting extra ? In order to know the performance of the system, packets; they may mislead the the throughput at destination was analyzed. operation of packet forwarding or will try to ? Source and malicious node are sending the same consume the resources of the nodes by making them amount of packets to the same destination. First believe that the packets are legitimate. The examine the throughput without using malicious node will not cooperate in the network frequency hopping then, compare it with operation resulting in the malfunction of the throughput by using frequency hopping. network operation. This happens because any

? After that, throughput from source and from device within the frequency range can get access to malicious node is compared. the data. So, we need a secure way to protect the

? So, the objective is to develop security in network. Wireless communication only affects the Wireless Sensor Network using frequency-physical, data link and network layers of the OSI hopping method, and to analyze the throughput layer.before and after the implementation of 3. State of the Artfrequency hopping.

Many security mechanisms have been proposed for CONCLUSION & FUTURE SCOPE :the security of the WSN. Most of the mechanisms ecurity is a significant issue in Wireless Sensor for the detection of the malicious nodes are based on Networks. Intrusion of malicious nodes may cause the cryptography. The technique requires security serious impairment to the security. The objectives keys in the algorithm that consumethe memory listed have been carried out. In the presented work, storage space inside the device.we have discussed all the modes of AODV (simple 4. Importance of the Studymode frequency hopping and malicious node) along

Wireless Sensor Network is categorized in IEEE with their working. We sincerely hope that our work 802.15.4 task group that is in Low Rate Wireless will contribute in providing further research Personal Area Network. The standard was released directions in the area of security based on frequency in 2003 and the upgraded version was released in hopping.2006. Since it is a new research area, there are lots

ith the results of AWK programming and tracegraph, of arguments to be discussed and solved such as we can conclude that in the case of simple AODV power consumption because the sensors depends there is no packet drop and throughput is 100%. But on battery which only remains for a short period when two frequencies are hopped in the network of time, topology because sensors can be static or with different simulation times, throughput is less mobile; and the topology is ever changing not only than 00% but increases continuously with respect to

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

7372

Page 38: Souvenior Inside IT page-1

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

simulation time. After a simulation time of 2000 contrasts in the form of polynomials to obtain a first seconds (~33 minutes) almost 98 percent packets approximation to the shape of the response curve or reach the destination safely. to estimate optimum dosage. In some cases,

contrasts that are most meaningful are not nnnorthogonal but correlated. Since meaning must

Current Status of Multiple take precedence over orthogonality, one should Comparisons of Means in Designed abandon f-tests in favor of Bonferroni t-statistics in

such cases to protect the stated confidence. ExperimentsOrthogonal f-tests. The f-tests (or corresponding t-

Bhavana Sangamnerkar tests) are the most sensitive (powerful) of procedures for comparing means. However, if the), HOD – IT, Biyani Group of Colleges, Jaipurare applied to a set of comparisons that are not

Introduction independent, overall confidence may be biased badly upward. Therefore, one should strive to Routine analysis of variance f-test of equal design contrasts that are orthogonal, as well as treatment means rarely provides answers that are meaningful, both to avoid increasing the type I sufficiently specific for more than two treatment error rate (probability of claiming significance groups because a significant result merely implies when none exists) and to obtain the highest power that not all of the treatments are equal in effect. The of detecting real differences. For Nonorthogonal question of which treatments differ is not Contrasts, When meaning requires designed answered. Also, a specific difference between two contrasts to be correlated, one can avoid the treatments may not be detected by the overall f-test distortion of type I error rate that would occur with if other differences are small or nonexistent. The f-tests by using an ancient technique of uncertain plethora of procedures developed over the past 20 origin now known as Bonferroni tstatistics (5,10). yrs to provide more specific answers is confusing The Bonferroni procedure splits the type I error rate to experimenters. Techniques differ greatly in evenly, among the comparisons, but if the number many respects, and some of the criteria suitable for of designed contrasts is relatively small, it still is comparing them have been evaluated only in recent more sensitive for detection of real differences than .The objective of this paper is to bring order out of are procedures recommended for post-data existing techniques and to recommend procedures comparisons. To define contrasts at the design that now seem fitted to particular circumstances. stage of experimentation but formulates them after

Description: The techniques received till the date seeing the results or chooses to make comparisons may be divided into two general categories: those of all possible pairs of means or of each mean with a applicable to designed contrasts and those controlOne may use Scheffd's Interval for developed for post-data comparisons. Designed Selected Contrasts. In general, it is not good contrasts ideally, one should formulate meaningful practice to allow results of a single experiment to comparisons (contrasts) among means during influence choice of hypotheses to be tested with the design of an experiment. If contrasts of interest can same data, but it is difficult to avoid the practice be designed in such a way that they are completely when prior information is lacking and intriguing orthogonal i.e., uncorrelated and independent, differences occur in the sample of data. Selection of then one can ignore the general analysis of variance contrasts after examining the data destroys the f-test and concentrate on Scheffd's tests of contrasts distributional properties of ordinary tests like f or t with one degree of freedom each. If the treatments and also often destroys the independence of the to be imposed are quantitative (e.g., dietary protein individual comparisons in a set so that the nominal amounts or doses of injected hormone), then one probability of type I error cannot be guaranteed for may wish to employ special versions of orthogonal tests of individual hypotheses. Scheff6, however,

developed a procedure for testing any and all sensitivity possible for comparisons that are contrasts that provides for an experiment wise error meaningful.rate, i.e., probability of making at least one

1) Tukey's HSD: Tukey (14) developed an erroneous rejection of an individual hypothesis

Honestly Significant Difference (HSD) test, which from an entil'e set of hypotheses about contrasts.

uses a t-like statistic based upon the Studentized The problem is much less sensitive than orthogonal

range i.e., the distribution of the ratio of the sample f-tests, but it does allow contrasts to be specified

range of values to the sample standard deviation.without limit. The procedure may be modified by a technique for approximating degrees of freedom Boardman and Moffitt (2) showed that the nominal (3), to obtain approximate answers when the group experiment wise type I error is uniformly variances are significantly heterogeneous. maintained by this procedure. In view of recent Consider the example for orthogonal f-tests but knowledge about the defects of competing with nonorthogonal contrasts selected after procedures, this method should be recommended completing the experiment: (a) 1 vs. 2; (b) 1 vs. 3; when the experimenter must plead ignorance about (e) 2 vs. 3,4; (d) 3 vs. 4. For comparative purposes, possible contrasts at the design stage of examine only the last contrast (means 2.68 and experimentation and wishes to examine all 2.96): %, = -- 1 (2.68) + 1 (2.96) = .28,with varianee possible pair-wise comparisons. Consider the 2 V(qd) = E(ci/ni)msE = 2msE/n = 2(.291)/24 = example for orthogonal f-tests but with all possible .02425, ( t - - l ) = 3 df among the four treatment (six) comparisons. For comparative purposes, groups. The 95% confidence interval is .28-!- examine only 3 vs. 4 (means 2.68 and 2.96, ~X/(t-- 1)f.0~, a 9eV(qa) = .28+.445. The difference=.28) in a 95% confidence interval is difference is not significant because the interval :.28-+-q.05 ,,.92~/.291/2-4 (13, Table A.15) = .28!-includes zero. Note that the interval is 44% and _.412. The difference is not significant because the 12% longer than the corresponding orthogonal and interval includes zero, The interval is 33% longer Bonferroni intervals for designed orthogonal and than the corresponding orthogonal interval and 3% nonorthogonal contrasts. Clearly, one should longer than the Bonferroni interval but is 8% design comparisons to obtain the best sensitivity shorter than Scheff6's interval, which is and precision. Comparisons of all possible pairs of notoriously insensitive for comparing only pairs of means. Failure to design or select a limited set of means, although it is somewhat better for other specific contrasts among means is inexcusable kinds of contrasts (12). Scheff6's interval should be (because of loss of sensitivity) unless the means used in the pairwise situation, however, if the group represent a set of classes or treatments that may be variances are heterogeneous or if the numbers per described as differing only qualitatively and in group are unequal. obscure ways, i.e., they appear to be unrelated,

2) SNK: A procedure that is known as the Student-unstructured, or undifferentiated by prior

Newman-Keuls (SNK) test provides for multiple experience or theory. For example, several progeny

critical values from the distribution of the groups of steers might be compared for mean gains

Studentized range, the appropriate value for a in weight on a standard ration to study differences

particular comparison being dependent upon the among young sires for which no prior information

relative rankings of the two means being exists.

compared. The test protects the nominal type I error Such circumstances are uncommon in most as well as does Tukey's HSD (2) and is slightly experimental disciplines. It is only as a last resort more sensitive but more cumbersome to use. Also, that one should turn to procedures for testing all some statisticians do not accept the validity of the possible pairs of means because one should avoid basic philosophy of such multiple range tests.ambiguous compulsions and obtain the best

(3) Duncan: Another multiple range procedure,

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

7574

Page 39: Souvenior Inside IT page-1

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

developed by Duncan (4), is more powerful than the all possible comparisons. Fortunately, the most HSD and SNK tests but does not protect adequately recent tests are adaptable for cases involving the type I error rate. Boardman and Moffitt (2) have unequal variances, unbalanced replication, or both. shown that a nominal experimentwise error rate of Consider the example for orthogonal f-tests but .05 is increased by approximately .04 for each of the with comparisons limited to 1 vs. 2, 1 vs. 3, and 1 vs, next several treatments added beyond two. For 4. Mean differences for the three comparisons are example, with six treatment groups the true error .54, .13, and .41. The test of each difference rate is likely to be about .2 instead of .05 as stated. involves A/2 (.291)/24 =. 156: tD = (.54/.156) = The evidence against this procedure now is 3.46"*, tD = (.13/0.156) = .83, and tn ---- (.41/156) -sufficiently incriminating that the test should be --- 2.63* (*p<.05, **p<.01). Note that tD..05.s,92 = discontinued. 2.40 The tests are not directly comparable to

orthogonal f-tests for any specific example unless 4) LSD: Least Significant Difference is the oldest

one of the orthogonal contrasts happens to involve of the procedures commonly used for pair-wise

control vs. one experimental group. For the comparisons. It represents nothing more than a set

example, t.0592 = A/f.05,1.0._, = ~/3.96 = 1.99. of ordinary t-tests performed as ff the individual

Dunnett's corresponding value (2.40), which is tests were mutually independent whereas they are

based on allowance for the correlation of correlated. If 10 or more df are available for

comparisons, is 20% larger. That is the cost (in experimental error (the usual case), the

sensitivity) for protection of the type I error rate dependencies among comparisons cause the

when correlation is present. Correspondence with experiment wise error rate to increase

Tukey's HSD may be established by dividing approximately .05 to .10 (above a nominal rate of

Tukey's critical value by V2: (q.054,0~/1.414) = .05) for each of the next several treatments added

(3.71/1.414) = 2.62. This result is 10% larger than beyond two (1,2). For example, with six treatment

Dunnett's value. The difference is the price paid for groups the experiment wise error rate is likely to be

making extra comparisons. Obviously, one should .25 to .45 instead of ,05. This damning evidence

avoid making all possible comparisons when a should lay to rest, once and for all, the LSD

more restricted set is adequate for answers required. procedure. Don't use it!

An alternative to Dunnett's procedure, recently 5) Other procedures: Several other alternatives to developed by Williams, is useful in determining the the four procedures have been devised for all pair- lowest dose at which there is significant evidence of wise comparisons, but they have various defects, response (e.g., as in toxicity trials). The test is more ranging from lack of sensitivity to poor protection powerful than Dunnett's in most of the applicable of type I error rate, to lack of robustness against cases because it is assumed the responses are departures from distributional assumptions, to monotonically ordered by dose (i.e., nondecreasing, computational complexity. Therefore, none of them or noninereasing). can be recommended for general use. Comparisons

Conclusions The most important conclusions are: with a control. In some experiments the primary

1) Whenever possible, one should use designed goal is to determine if the mean of each

comparisons, preferably orthogonal contrasts, experimental treatment differs from the control.

rather than comparisons selected postdata. Proper When that is the situation, and comparisons among

design allows one to use procedures that maximize promising experimental treatments are to be left to

the sensitivity (power) to detect meaningful real later stages of experimentation, the special t-test

differences, or will allow smaller, less costly developed by Dunnett (6) may be employed. The

experiments to achieve the same degree of test is based upon an experiment wise type I error

sensitivity. 2) In all one must resort to comparing all rate because the comparisons are correlated, but it is

possible pairs of means, one should not use LSD or more sensitive than procedures recommended for

Duncan's test, because type I error becomes inflated e? ciently compute the single source shortest paths beyond reasonable bounds. Use Tukey's HSD. Or, ff (SSSPs) for nearly acyclic graphs in O(m + r logl ) you believe in the philosophy of multiple range time, where r is the size of the 1-dominator set, and l tests, gain a little sensitivity by using the SNK is the size of the largest sc-component. procedure. Both of those techniques adequately In the third approach, we modify the concept of a 1-protect type I error rate. dominator set to that of a 1-2-dominator set, and

achieve O(m + r2) time to compute a 1-2-dominator nnnset in a graph. Each of acyclic sub-graphs obtained

Improved Shortest Path Algorithms by Dynamic by the 1-2-dominator set are dominated by one or Graph Decomposition two trigger vertices cooperatively. Such sub-graphs Deepak Mahawar are potentially larger than those decomposed by the Sr.Lecturer, Mahrshi Arvind Institute of 1-dominator set. Thus fewer trigger vertices are Engineering & Technology needed to cover the graph, That is, r0 _ r, where r0 is In this thesis, I introduce three new approaches for the number of triggers in the 1-2-dominator set. solving the single sourceshortest path (SSSP) When r0 is much smaller than r, we can efficiently problem in nearly acyclic directed graphs, and compute SSSPs in O(m+ r0logr0) time .algorithmsbased on these approaches. Summary and Conclusions :In the ? rst approach, we extend a technique of The research presented in this thesis has explored strongly connected components (sc-components) how to solve the single source shortest path decomposition, and the generalized decomposition problem e? ciently for directed nearly acyclic approach is called a higher-order decomposition. graphs. According to Takaoka's de?nition of acyclicity, the New algorithms have been developed, and they degree of cyclicity of a graph G, cyc(G ),is de?ned provide considerable contributions to the existing by the maximum cardinality of the strongly works that have been done in this area is a summary connected components of G. Based on the higher- of the di? erent kinds of measures for acyclicity, order decomposition, we give a generalization of which have been introduced in articles and this Takaoka's de?nition of acyclicity. That is, the thesis. points out some possibilities for future hdegree of cyclicity cyc (G) is the maximum research.thcardinality of the h order strongly connected

Summary :components of G, where h is the number of times In 1993 Abuaiadh and Kingston suggested that the that the graph has been decomposed.inherent complexity of the shortest path problem Then, the original de?nition introduced by Takaoka depends on the cycle structures of a graph as well as can be presented as: The degree of cyclicity cyc(G)

th on its size. They gave an algorithm with O(m +nlogt is the maximum cardinality of the 1 order strongly ) time complexity, where t was the number of delete connected components of G. The second approach min operations needed in the priority queue presents a new method for measuring acyclicity manipulations. For nearly acyclic graphs, t was based on modi?cations to two existing methods. In expected to be small, so their algorithm could the new method, we decompose the given graph e? ciently solve the SSSP problem. However, they into a 1-dominator set, which is a set of acyclic did not give a clear de?nition of t, and the new subgraphs, where each sub-graph is dominated by parameter t had no direct relation with the graph one trigger vertex. Meanwhile we compute sc-structures. Later in 1994, they introduced another components of a degenerated graph derived from algorithm with time complexity O(m +k logk ), triggers. Using this preprocessing, we can where k was the number of cycles in a graph. This had been improved by Saunders and Takaoka in

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

7776

Page 40: Souvenior Inside IT page-1

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

2005 (see a research map in Figure ). where cyc(G0) is the degree of the acyclicity of the degenerated graph G0. In the degenerated graph Takaoka gave a de?nition of acyclicity. The degree G0, the vertices of G0 a re t he 1 -domina to r of cyclicity of a graph G, c y c ( G ) , w a s triggers and an edge from u to v in G0 exists if an de?ned as the maximum cardinality of strongly edge exists from some vertex in AC[u] to v , where connected components (sc-components) of G. AC[u] is an acyclic structure that u belongs to. When cyc(G ) was small, he clari?ed the given When l or r is small, we say that the graph is nearly digraph G to be nearly acyclic. When cyc(G ) = k, acyclic, and we can e? ciently solve the SSSP he gave an algorithm with O(m +nlogk ) time problem for the graph in time O(m +r logl ), which complexity. Saunders and Takaoka o? ered an takes advantage of both measures.acyclic decomposition approach. In this approach,

a graph was decomposed into acyclic structures in nnnO(m) time. Each structure was dominated by a trigger vertex. Triggers formed a 1-dominator set. Study About Security Issue in Multilevel If a nearly acyclic graph had r trigger vertices, they Distributed Database Managementintroduced an algorithm with O(m +r logr ) time

Saurabh Shandilyacomplexity for solving SSSP problems. The new

HOD-MCA, Rajasthan College of Engineering parameter r represented the number of acyclic for Womenstructures in a graph.Security concerns must be addressed when In this thesis, we ? rst present a higher-order

approach to decompose a graph into strongly developing a distributed database. When choosing connected components (sc-components) as small between the objectoriented model and the as possible. Using higher-order decomposition, we relational model, many factors should be give another de?nition of acyclicity, which is considered. The most important of these factors are generalized from the Takaoka's de?nition . That is, single level and multilevel access controls, the degree of cyclicity is the maximal cardinality

th protection against inference, and maintenance of of h order strongly connected component of a

integrity. When determining which distributed graph G, and the degree of cyclicity is denoted by h database model will be more secure for a particular cyc (G).Here, parameter h is the number of times

application, the decision should not be made purely that the graph has been decomposed. When the on the basis of available security features. One graph is decomposed into sc-components, for

computing the shortest paths we run Dijkstra's should also question the efficacy and efficiency of algorithm only for each sc-component but not the the delivery of these features. Do the features whole graph. When all sc-components are small provided by the database model provide adequate

hand the degree of acyclicity cyc (G) = ñ, we can security for the intended application? Does the e? ciently compute SSSPs in O(hm +nlogñ) time. implementation of the security controls add an If we repeatedly use the decomposed graph for

unacceptable amount of computational overhead? solving the SSSP problem, we can balance the time

In this paper, the security strengths and weaknesses used for preprocessing the graph.of both database models and the special problems Then, we show that we can compute acyclic found in the distributed environment are discussed.components and sc-components of the graph at the

same time. The bene? t of merging these two graph In this research, we will review the security preprocessing approaches is to make a superior concerns of databases in general and distributed measure over the two existing measures of nearly databases in particular. We will examine the acyclic graphs. Let r be the number of trigger security problems found in both models, and we vertices in the 1-dominator set, and l = cyc(G0) will examine the security problems unique to each

system. Finally, we will compare the relative towards more and more specialization, and merits of each model with respect to security. In demands lateral thinking and the combination of this paper we tried to explain how security is many disciplines. managed in distributed database. nnnnnn

Fuzzy Logic Technique for Edge Detection in Digital ImagesOptimistic Glance on Strategic Rajneesh Goyal , Mukesh Bhukar, Amit Development of Mobile Robotics Maharshi

Vaibhav SharmaAssistant Professor Jagannath Gupta Institute of

S.S.Jain Subodh P.G.College,Jaipur Engineering & Technology

The fuzzy technique is an operator introduced in Universal Robotics is the engineering science and order to simulate at a mathematical level the technology of robots, and their design, compensatory behavior in process of decision manufacture, application, and structural making or subjective evaluation. The following disposition. Robotics is related to electronics, paper introduces such operators on hand of mechanics, and .computer vision application.

Robots are enjoying resurgence. As computer In this paper a novel method based on fuzzy processors are getting faster and cheaper, robots logic reasoning strategy is proposed for edge can afford to get smarter. Meanwhile, researchers detection in digital images without determining are working on ways to help robots move and the threshold value. The proposed approach "think" more efficiently. Although most robots in begins by segmenting the images into regions use today are designed for specific tasks, the goal is using floating 3x3 binary matrix. The edge pixels to someday make universal robots, robots that are are mapped to a range of values distinct from flexible enough to do just about anything a human each other. The robustness of the proposed does–and more Engineering and computer science method results for different captured images are are core elements of mobile robotics, obviously, compared to those obtained with the linear Sobel but when questions of intelligent behavior arise, operator. It is gave a permanent effect in the artificial intelligence, cognitive science, lines smoothness and straightness for the straight psychology and philosophy offer hypotheses and lines and good roundness for the curved lines. In answers. Analysis of system components, for the same time the corners get sharper and can example through error calculations, statistical be defined easily. evaluations etc. are the domain of mathematics,

and regarding the analysis of whole systems nnnphysics proposes explanations.

Evaluation of Modern Mobile Mobile robotics is a fascinating research topic, for Platforms Androidmany reasons. To change a mobile robot from a

Jagdish Kumawat, Saurabh Sharma, Amit computer on wheels that is merely able to sense Kumar Sinsinwarsome physical properties of the environment Assistant Professor, JNIT, Jaipurthrough its sensors into an intelligent agent, able to

identify features, to detect patterns and regularities, In this paper we attempt to evaluate modern mobile to learn from experience, to localize, build maps platforms (Android) from the developer and to navigate requires the simultaneous standpoint. We provide minimal and/or application of many research disciplines. In this recommended hardware requirements and real sense, mobile robotics reverses the trend in science performance figures (where available), along with

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

7978

Page 41: Souvenior Inside IT page-1

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

information about OS architecture, SDK(s), and with an application store that's hardly restricted at application store facilities. User interface all .organization is also evaluated.

A. Hardware Requirements Android boasts low Index Terms: Android mobile platforms, user minimal hardware requirements, but currently only interface, SDK, app store, hardware specifications high-end devices have been announced. The

hardware requirements for Android 2.1 were said to I. INTRODUCTION:Now-a-days ,it is an exciting

be:CPU Clock > 1 GHz,12 Mb RAM,Screen ? 3,5"time for mobile developers. Mobile phones have never been more popular, and powerful smart But as it turned out, these were not minimal, but phones are now a regular choice for consumers. recommended hardware requirements. So real Stylish and versatile phones packing hardware minimal requirements for Android devices are features like GPS, accelerometers, and touch unknown.screens are an enticing platform upon which to

B. Operating System and its Components: Linux create innovative mobile applications.Android is a 2.6 monolithic Kernel shaped to fit smartphone mobile operating system that uses a modified requirements forms the base of the system. On the version of the Linux kernel. It was initially higher architectural levels one could find the file developed by Android Inc., a firm later purchased system (YAFFS), standard libraries (including C by Google, and lately by the Open Handset standard library not unlike libc, that is specifically Alliance. Researchers have developed a fast and optimized for mobile devices) and standard UNIX easy-to-use search technology for mobile Android. commands. On the top sits the Dalvik virtual Android hardware will be designed to tempt machine, running Java-like code in a sandboxed consumers, but the real win is for developers. With environment. Dalvik VM runs all the user existing mobile development built on proprietary applications and the graphical UI. Dalvik is operating systems that restrict third-party analogous in principle to Java VM, but has a applications, Android offers an open and equal different, incompatible class file format. For great alternative. Without arti?cial barriers, Android speed, Dalvik VM is preallocated, and each time an developers are free to write applications that take application runs, preallocated VM's memory is full advantage of increasingly powerful mobile copied (which is faster than starting up VM every hardware. As a result, developer interest in Android time).devices has made their 2008 release a hugely

anticipated mobile technology event. Android has a vast number of graphical, audio and video libraries. Multimedia libraries are based Built on an open source framework, and featuring upon OpenCORE technology developed by powerful SDK libraries and an open philosophy, PacketVideo. On the graphical UI level works the Android has opened mobile phone development to Surface Manager, which manages 2D and 3D thousands of developers who haven't had access to rendering. Font support is based on FreeType2 tools for building mobile applications. library.Web Browser uses LibWebCore engine Experienced mobile developers can now expand based on WebKit. It supports all the same features into the Android platform, leveraging the unique that iPhone Web Browser does.Unlike iOS, features to enhance existing products or create Android has built-in database management system innovative new ones.(SQLite).

Android represents an exciting new opportunity to C. SDKs In this section, we evaluate software write innovative applications for mobile development kits offered to the application devices.Android development is supported in developers on each platform.Programming Windows, Mac-OS, and Linux,a free, open source languages used to create applications for the platform that any phone manufacturer can build for,

Android, are given in table II. Android support the hardware, memory and CPU. It can display information written in a restricted mark-up greatest number of development languages and language called WML. Information sources can be technologies. Development environments selected which are then downloaded and their supported by Android have the convenient SDKs, content is displayed. Hyper Text, links and buttons running on all major desktop platforms.can then be pressed to move around from page to

nnn page in a very simple way. The WAP standard describes a protocol suite allowing the WAP-The Wireless Application Protocolinteroperability of WAP equipment and software

Poonam Sharma with many different network technologies. The Lecturer I.T, Biyani Girls College, Jaipur bottom-most protocol in the suite, the WAP

Datagram Protocol (WDP), which functions as an Wireless Application Protocol (WAP) is an open adaptation layer that makes every data network international standard. The wireless industry came look a bit like UDP to the upper layers WTLS, an up with the idea of WAP. WAP bridges the gap optional layer, provides a public-key cryptography-between the wireless mobile world and the internet. based security mechanism. WTP provides The Wireless Application Protocol (WAP) is a transaction support (reliable request/response) collection of protocols and transport layers which adapted to the wireless world. WTP supports more allow mobile and portable communication devices effectively than TCP. And at the last, WSP works to receive information over the airwaves just like a initially as a compressed version of HTTP. Internet personal computers users obtain information over protocols designed specifically for effective and the internet. The WAP protocol is the leading cost-effective information transfer across mobile standard for information services on wireless networks. Wireless terminals incorporated a terminals like digital mobile phones. The WAP HDML (Handheld Device Markup Language), standard is based on Internet standards (HTML, micro browser; etc. This technology was XML and TCP/IP). It consists of a WML language incorporated into WAP- and renamed using some of

specification, a WML Script specification, and a the many WAP-related acronyms such as WMLS,

Wireless Telephony Application Interface (WTAI) WTP and WSP. Someone with a WAP-compliant

specification. phone uses the in-built micro browser to make a Introduction : WAP stands for Wireless request in WML (Wireless Markup Language), a Application Protocol. It is an application language derived from HTML especially for communication protocol. It is for handheld devices wireless network characteristics. This request is such as mobile phones. WAP is a protocol designed passed to a WAP Gateway that then retrieves the for micro browsers. It uses the mark-up language information from an Internet server either in WML. Before the introduction of WAP, service standard HTML format or preferably directly providers had extremely limited opportunities to prepared for wireless terminals using WML. If the offer interactive data services, but needed content being retrieved is in HTML format, a filter interactivity to support common activities such as: in the WAP Gateway may try to translate it into Email by mobile phone, tracking of stock-market WML. The requested information is then sent from prices, sports results, news headlines, music the WAP Gateway to the WAP client, using downloads, ticket purchase,, Checking weather whatever mobile network bearer service is conditions etc. From the user's view, using WAP is available and most appropriate In order to meet the much like surfing the net on a personal computer; requirements for mobile operations the system the mobile device is fitted with a small display must be Inter operable, scalable, efficient, reliable which can be used just like a desktop browser. To fit and secure.into a small wireless terminal, WAP uses a Micro

nnnBrowser. A Micro Browser is a small piece of software that makes minimal demands on

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

8180

Page 42: Souvenior Inside IT page-1

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Quality of Service in Mobile Adhoc Increased Mobility and Density of ad hoc Networks Vehicular Networks with Routing Nishtha Kesswani Protocols

1 2Assistant Professor, S.S.Jain Subodh P.G. College, Ramesh C. Poonia, Jyoti RajhariaJaipur School of Engineering and Technology Jaipur Quality of Service (Qos) is an important National Universityconsideration in networking, but is also a significant Ad hoc networks works with broadcast nature of the challenge. Providing QoS guarantees becomes even radio channel who poses a unique challenge due to more challenging when you add the complexities of wireless links but they have time-varying wireless and mobile networks. QoS has been characteristics in terms of link capacity and link defined in several ways in different contexts. error probability. For mobile networks, According to Webopedia “A networking term that emphatically in Mobile Net or VANET, the structure specifies a guaranteed throughput level”. Yoram perform highly dynamic due to the movement of the Bernet has defined it as the capability to control nodes, hence an on-going activity suffers frequent traffic-handling mechanisms in the network such path breaks. Within this paper we present a method that the network meets the service needs of certain that uses the existence knowledge about the applications and users subject to network policies. network's structure to improve the routing Multiple techniques for providing service protocol's performance through diminishing the guarantees are presented including data link layer probability of path breaks. We propose a scheme to QoS schemes, network layer schemes, multi layer identify stable links in VANETs, which are approaches, QoS routing, dynamic class adaptation preferentially used for routing. This strategy is and techniques for reservation and admission easily integrated in the existent routing protocols. control. We explore how to integrate it in the stabilized Link-

State Routing Protocol (SLIP). Finally, we evaluate Various QoS mechanisms that are available include the performance of our scheme with the original Resource Reservation and Traffic Prioritization. In protocol. Simulation results show that our method resource reservation, the network resources are exhibits better end-to-end path delay (almost one allocated according to an application's QoS request. and Half magnitude order lower) and packet In Traffic Prioritization, the network traffic is delivery ratio (between 35% and 41% higher) than classified and preferential treatment is given to the original protocol. This observation is even more classes identified as having more demanding evident when the node's density increases.requirements. Service attributes that can be used to

quantify end-to-end performance include delay, nnnbandwidth, probability of packet loss (or packet

The Analysis and Monitoring of Power delivery ratio) and jitter.Quality Issues and Problems

The challenges associated with providing service 1 2Anita Pakharia, Jyoti Nehraguarantees are numerous, but the biggest challenge

1Assistant Professor, GIT,Jaipurfor traditional networks has been congestion.

2Assistant Professor, GIT,JaipurHowever, many more challenges exist for wireless The power quality is a term used to broadly and mobile networks above those in traditional encompass the entire scope of interaction among networks. For this reason, a completely different set electrical suppliers, the environment, the system of QoS techniques is required for wireless networks and products energized, and the uses of those than for wired networks. systems and products. It is more than the delivery of

nnn “clean” electric power that compile with industry

standards. It involves the maintainability of that The Noval Heuristic Based Approach for power, the design, the selection, and the installation Coverage and Connectivity Problems in every piece of hardware and software in the Wireless Sensor Networkselectrical energy system. Stretching from the 1 2 3 Sunita Gupta , Shilpa , Sakar Gupta , Saroj generation plant to the utility customer, power 4

Hiranwalquality is a measure of how the elements affect 1 Sr. Lecturer, Sri Balaji College of Engineering & system as a whole. This paper consist an overview

Technology, Jaipurof electric power quality with special emphasis on 2 Lecturer, Sri Balaji College of Engineering & power quality problems, such as voltage distortion

Technology, Jaipurdue to current harmonics, flicker, voltage sag, 3Asst.Professor, Kautilya Institute of Technology & voltage surges, etc., their analysis and monitoring.Engineering, Jaipur

nnn 4Asst.Professor, Sri Balaji College of Engineering Design and implementation of Self- & Technology, Jaipur

In wireless sensor networks, one of the main design aware Cognitive Radio Networkschallenges is to severely constrained energy Nishtha Kesswaniresources and obtain long system lifetime. Due to Assistant Professor, Central University of the power scarcity of sensors a mechanism that can Rajasthan, Kishangarh,Rajasthan, Indiaefficiently utilize the energy has a great impact on A cognitive network is a network composed of extending network life time. Sensor deployment is a elements that, through learning and reasoning, critical issue since it reflects the cost and detection dynamically adapt to varying network conditions in capability of a wireless sensor network. order to optimize end-to-end performance. In a

cognitive network, decisions are made to meet the requirements of the network as a whole, rather than the individual network components. Cognitive radio network is a new emerging research area recently. It enhances the existing software-defined radio, whose physical layer behaviour is largely defined in software. Cognitive radio has the following characteristics [19]. First, it is aware of its Introduction : Given an integer vector Q, where environment and its capabilities. Second, it is able to q is the minimum number of sensors to i

independently alter its physical layer behaviour simultaneously cover targets i, the problem based on its previous experience and its current becomes Q-coverage problem. The objective is to environment. When spectrum environment changes maximize sensor network lifetime satisfying Q-around cognitive user, it is capable of sensing these coverage requirement. The problem is shown to be changes and independently changing its physical NP-complete and there is no known practical layer settings such as transmission power, channel algorithm. We propose a heuristic and show that selection and etc to meet some constraints or QOS the proposed heuristic yields solution very near to requirements of the users. the optimal solution.

In this paper, I have examined the cognitive network concept by first providing a definition and then outlining various routing techniques used in these networks. Several protocols including MAC and QoS protocols have been explored.

nnn

We add a Quality of Service (QOS) requirement such that targets are covered by more than one sensor at any time, so that network may remain connected even after one or more sensors covering that target fail. Maximizing sensor network life time satisfying Q-Coverage requirement is a NP-Complete problem and there is no known practical algorithm for it.

The proposed heuristic has two important features.

·It uses greedy heuristic to generate Q-Covers by prioritizing sensors in terms of residual battery life.

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

8382

Page 43: Souvenior Inside IT page-1

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

·Heuristic assigns a small constant of lifetime to Q-Covers thus generated; so that sensors may participate in many Q-Covers.

are subject to unanticipated failures after deployment, it is not enough to have a wireless sensor network just connected, it should be k-connected (for k > 1). In this paper, we compare

One major application of sensor networks is to some deployment patterns and optimal deployment monitor a set of targets by an overly deployed set of pattern to achieve both full coverage and 2-sensors. A target is said to be covered if it falls connectivity.within the sensing range of at least one sensor. The

nnnsensors have limited battery life. Given a vector Q ={q , q ,…,q }for m targets, the Q-coverage 1 2 m The System Energy Minimisation For problem is concerned with maximizing the lifetime

Weakly Hard Real Time System Using of the network when at least q number of sensors jth (m,k) Variablescover the j target at any given time. We propose a

heuristic that prioritizes the sensors in terms of the Ruchika Guptaresidual battery life and then greedily selects

Energy consumption and quality of service (QoS) sensors to generate a Q-cover. We assign a small are the two primary concerns in the development of constant lifetime (instead of full battery life) to each today's pervasive computing systems. While most generated Q-covers so that sensors can participate of the current research in energy-aware real-time in many Q-covers to provide near optimal solution.scheduling has been focused on Hard Real-time

Conclusion : Systems, a large number of practical applications and systems exhibit more weakly hard real-time. In this paper, we propose a centralized algorithm for Weakly Hard Real-time Systems can tolerate some coverage problem with QOS requirement. It is occasional deadline misses. This feature provides a based on greedy approach, and selects that sensor unique opportunity to reduce system's energy.with highest residual energy. One can have many

variations of the problem with additional Our goal is to minimize the system energy (energy constraints of coverage and connectivity or required by frequency dependent and independent directional sensing etc. component) rather than minimization of processor

energy only. nnn

I. Introduction : Power and energy has recently Deployment Patterns for WSN Nodes become one of the important metric for the

to Achieve Both Coverage and optimization in the design and operation of real-Connectivity. time embedded systems. Real time applications

1 2Sunita Gupta , Sakar Gupta usually comprised of set of cooperative tasks which 1 Sr. Lecturer, Sri Balaji College of Engineering & interact with each other by exchanging

Technology, Jaipur messages.Examples of such applications include 2 process control automated manufacturing system Asst.Professor, Kautilya Institute of Technology &

and delivery of audio/video frames in multimedia Engineering, Jaipur[1].

With the emergence of wireless sensor networks, however, it is now no longer enough to consider 2. Power/Energy aware computing : The two coverage alone when deploying a wireless sensor common techniques used for minimization of network; connectivity must also be considered. system energy are dynamic voltage scaling (DVS) While moderate loss in coverage can be tolerated by and dynamic power down (DPD). applications of wireless sensor networks, loss in

2.1 Energy Consumption in DVS processors connectivity can be fatal .Moreover, since sensors

:The DVS attempts to reduce the processor speed to 3.2 Phase-2: Preemption control : When a job is the extent it is possible, to obtain higher energy scheduled on the processor then the associated saving. The speed of a frequency dependent devices are switched to active state in which they component is said to be reduced if it is either remain till it completes. Thus, if a lower priority job operating at lower voltage or frequency. is preempted by the higher priority job then the

associated device remain active and consume 2.2 Real-Time Systems : Real-time systems are

energy for the time for which the job is preempted. considered to be those types of systems which have

This extra consumption in the energy can be to respond to certain stimuli within a finite and

reduced by delaying the higher priority job if specified delay.

possible and completing the execution of the lower 2.2.2 Energy saving scope in weakly hard Real- priority job in the meanwhile (laxity). time systems : Battery-powered mobile devices,

The algorithm preemption control would decrease ranging from laptops to cellular phones, are

the energy consumption by executing the lower becoming important platforms for processing

priority job non-preemptively. Thus, energy saving multimedia data such as audio, video, and images.

is achieved by finishing the lower priority job earlier Compared to traditional desktop and server

(preemption control to favor DPD) and executing systems, such mobile systems need both to support

the higher priority jobs at lower speed (to favor application QoS requirements and to save the

DVS). energy.

Summary and Conclusion : In this paper I 2.3Quality of Service by (m,k) -Guarantee :

proposed a two phase scheduling algorithm where Weakly hard real time where missing of some tasks

in the first phase I propose a mixed pattern which is a to complete by deadlines degrade the quality of

refinement of the existing partitioning strategies. result however result is acceptable. For example, in

The modified partitioning approach utilizes the real-time transmission of digitized full motion

greedy based speed assignment concept which is video; a source (e.g., a video camera) generates a

faster than existing technique.stream of video frames at a rate of say 30 frame/sec

nnnfrom which at least 24 frames/sec are needed to visualize the movement of the image [2].

Harmonic Behaviour of HVDC cables3.Proposed Energy Minimization Technique: Er. Bhumika Soni

Asst. Professor, Global Institute of Technology, 3.1 Phase 1: Task level feasibility and energy Jaipurminimization : In this phase I propose a new The paper deals with harmonic analysis of HVDC partitioning strategy of jobs into mandatory and submarine cables. The longitudinal series optional (mixed pattern) and assign speed to each impedance matrix is computed with reference to task so that it is feasible. armoured cables. The results are also compared

3.1.1 Mixed Pattern (Mix_Pattern) : Instead of with Finite Element models showing a very good assigning same pattern to all the tasks in the task set, agreement. This investigation can be considered the mixed pattern approach will assign different type of first step of more detailed further analysis about the patterns (Red_Pattern, Even_Pattern or propagation of harmonics on the d.c. and a.c. sides. Rev_Pattern) to each task. Heretofore the topic seems to be almost neglected in

technical literature so this paper investigates the 3.1.2 Speed Fitting : A greedy based speed fitting harmonic behaviour of HVDC cable lines.that utilizes the concept of choosing to increment

the speed of a task for which the increment in energy nnnrequirement is least is proposed.

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

8584

Page 44: Souvenior Inside IT page-1

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

properties. It is an anti-ferromagnetic material with Low Cost Sensors for General a density of 6.67g/cm3 and having a cubic structure Applications

1 2 and band gap energy from 3.6 to 4.0 ev. Transparent Dinesh Sethi , Arun Groverconducting nickel oxide films have a wide range of 1

Reader and Head in ECE (BMIT Jaipur)applications in optoelectronic and thermal devices. 2

Lecturer in ECE(BMIT Jaipur)NiO films have good dynamic range, cyclic

Human has five senses as: skin, tong, nose, ear and reversibility, durability and grey colouration useful

eye. We take information from these senses; these for smart window technology. Different techniques

informations are transferred to our brain through are used for producing nickel oxide thin films like

some sells of our body. The brain takes decision electron beam evaporation, radio frequency against the information received & action is takes sputtering, anodic electro deposition, cathodic place. Through these five senses we are able to get electro deposition, chemical vapour deposition sol interact with external environment & does our work gel technology and chemical spray pyrolysis successfully with accuracy. As in humans control technique. In the present work Nickel oxide thin unit is brain there is also a control unit in robot films were grown on glass substrate by a simple and which is processor or controller or any other unit inexpensive homemade spray pyrolysis technique which has decision making capabilities. Now, the using NiCl .6H O as the precursor solution and the 2 2

question is how control unit control robot's working structural and electrical properties were by simply just give commands to robot to do some investigated. The structural studies of the prepared work or take inputs from surrounding to make a NiO films were done by means of X-ray decision? This paper deals with second type of diffracometer (Rigaku RINT 2000) with Cu:K á

robots. To interact with external world robot needs radiation having a wavelength of 1.5418 A to obtain some interfacing units which can tell the control unit diffraction patterns. A range of 2è=30-70 was about its surrounding environment. These scanned so that all the possible diffraction peaks interfacing units are sensors. This paper is focusing could be detected. Structural studies shows a major the most commonly used sensors in mobile robotics. diffraction peak along (1,1,1) at 2è=37.2 plane and The paper analyzes all sensors and describes their some other low intense peaks along (200) and (220) application in general & application specific planes suggesting the formation of cubic structure manner as robot vehicle. This paper helps every of NiO thin films. Measurements of electrical

resistivity “ñ” at room temperature 200-400 K were person of this field to select proper sensor from application and cost and range point of view. performed on the films using two- probe resistivity

measurements system. The results obtained from nnnthe resistivity measurements shows that the

Invest Preparation of Semi Conducting resistance decreases with the increase in the temperature showing the semi conducting behavior Nickel Oxide Thin Films

1 2 of NiO. The prepared films are reproducible, Shweta Moghe , A.D. Acharya 1 2 adherent to the substrate and uniform. Such films Mahakal Group of Institutes, Ujjain, Vikram

are useful for many applications related with University, Ujjainsurface such as chemical sensors-p junction Oxides of nickel may exist in various forms like electrode in dye-sensitized solar cells, since it can NiO, NiO , NiO and Ni O . Among these NiO is a 2 4 2 3

offer more surface area to interact.well-studied material due to its high chemical stability as well as optical, magnetic and electrical nnn

transfer data on a telephone line, the data must be Uart : The Conversion Between Serial converted from 0s and 1s to audio tones or sounds And Parallel Data At A Specific Rate

1 2 (the audio tones are sinusoidal shaped signals). Swati Arora , Sujeet Gupta , Akanksha 3 Conversion is performed by a peripheral device Kulshreshtha

1 called a modem (modulator/demodulator). The M.Tech.*(VLSI & ES) , SGVU, Jaipur2 modem takes the signal on the single wire and Asso.Prof. SGVU, Jaipur3 converts it to sounds. At the other end, the modem M.Tech.*(D.C.), RTU, Kota

converts the sound back to voltages, and another Universal asynchronous receiver and transmitter

UART converts the stream of 0s and 1s back to (UART) is a circuit that sends parallel data through

bytes of parallel data [1,3].a serial line. UARTs are frequently used in RS-232 standard, which specifies the of two data communication equipment. Because the voltage level defined in RS-232 is different from that of FPGA I/O, a voltage converter chip is needed between a serial port and an FPGA's I/O pins. A UART includes a transmitter and a receiver. The transmitter is essentially a special shift register that

Fig.: Transmission of dataloads data in parallel and then shifts it out bit by bit at a specific rate. The receiver, on the other hand, II Uart Transmitting Subsystemshifts in data bit by bit and then reassembles the

The UART transmitter is essentially a shift register data. The serial line is '1' when it is idle. The

that shifts out data bits at a specific rate. The rate transmission starts with a start bit, which is '0',

can be controlled by one-clock-cycle enable ticks followed by data bits and an optional parity bit, and

generated by the baud rate generator. Because no ends with stop bits, which are '1'. The commonly

oversampling is involved, the frequency of the used baud rates are 2400, 4800, 9600, and 19,200

ticks is 16 times slower than that of the UART bauds.

receiver. Instead of introducing a new counter, the I. Introduction : UART transmitter usually shares the baud rate

generator of the UART receiver and uses an Serial data is transmitted via its serial port. A serial internal counter to keep track of the number of port is one of the most universal parts of a enable ticks. A bit is shifted out every 16 enable computer. It is a connector where serial line is ticks[2].attached and connected to peripheral devices such

as mouse, modem, and printer and even to another computer. In contrast to parallel communication, these peripheral devices communicate using a serial bit stream protocol (where data is sent one bit at a time). The serial port is usually connected to UART, an integrated circuit which handles the conversion between serial and parallel data Fig. shows how the UART receives a byte of parallel data and converts it to a sequence of voltage to Fig.:- UART transmitting subsystemrepresent 0s and 1s on a single wire (serial). To

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

8786

Page 45: Souvenior Inside IT page-1

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Fig.: UART receiving subsystem

Fig.:-RTL diagram

Transmitted 8-bit data is 01010101 and it can be observed that the corresponding UART format is 01010101. The first two bits correspond to 'one' and 'start' bit' followed by 8-bit data and the last two bits correspond to 'parity' and 'stop' bit[4].

Result and Simulation

Fig.:-RTL diagram

The serial data is received by RX and then will be converted into parallel data at DATA. The RXRDY line is activated to indicate that the 8-bit data is received. The READ line is always held at high.

Result and SimulationFig. Simulation results for Transmitter

From the above fig we observe that the parallel input taken initially is converted in to serial data

III Uart Receiving Subsystem :

Since no clock information is conveyed from the transmitted signal, the receiver can retrieve the data bits only by using the predetermined parameters. We use an oversampling scheme to estimate the middle points of transmitted bits and then retrieve them at these points accordingly[4,5].

Fig. Simulation results for Receiver

From the above fig we observe that the serial input taken initially is converted in to parallel data.

IV Baud Rate Generator :

The baud rate generator generates a sampling At the other end, the modem converts the sound signal whose frequency is exactly 16 times The back to voltages, and another UART converts the UART's designated baud rate. To avoid creating a stream of 0s and 1s back to bytes of parallel data.new clock domain and violating the Synchronous nnndesign principle, the sampling signal should function as enable ticks rather than the clock signal Dispersion Compensation by Shifting to the UART receiver, eg For the 19,200 baud rate, the Zero Dispersion Wavelengththe sampling rate has to be 307,200 (i.e., 19,200 [1] [2]

Akanksha Kulshreshtha Mukesharora*16) ticks per Second. Since the system clock rate [3]

Swati Arorais 50 MHz, the baud rate generator needs a mod-[1]

M.Tech.(D.C.), RTU, Kota163 Counter, in which the one-clock-cycle tick is [2]asserted once every 163 clock cycles. The Reader (E&C Deptt.), M.Tech. (VLSI) , SKIT,

parameterized mod- m counter can be used for this Jaipur [3]purpose by setting the M generic to 163[9]. M.Tech. (VLSI & ES) , SGVU, Jaipur

V Overall Uart System : The branch of optics that deals with the study of propagation of light (rays or modes) through By combining the receiving and transmitting transparent dielectric waveguides, e.g., optical subsystems, the top-level diagram can construct. fibers is termed as Fiber Optics. For long distance The block diagram can be described by component transmission systems the two most important instantiation [7, 8].requirements of an optical fiber are Low loss and low dispersion. for a reference the optical loss of silica fibers is less than 0.2 dB/km at 1.55 µm and for simplest step index single-mode fibers the low-dispersion window is around 1.3 µm. The optical loss of silica fibers is less than 0.2 dB/km at 1.55 µm and for simplest step index single-mode fibers the low-dispersion window is around 1.3 µm. The point of zero dispersion wavelengths for pure silica is 1.2µm. An essential requirement for large capacity and long repeater spacing transmission systems is shifting the wavelength of zero dispersion from 1.33µm to 1.55µm region. The dispersion shifted fibers (DSFs) are the fibers in which we can shift the point of zero dispersion Fig. Block diagram of whole UART circuitwavelengths from 1.33µm to 1.55µm region. The

VI Conclusion : design of such dispersion-shifted single-mode fibers, the simplest refractive index distribution is The UART receives a byte of parallel data and the step, by reducing the core radius and increasing converts it to a sequence of voltage to represent 0s the refractive index difference between core and and 1s on a single wire (serial). To transfer data on a cladding, the wavelength of zero dispersion can be telephone line, the data must be converted from 0's shifted into the 1.55µm window.and 1's to audio tones or sounds (the audio tones are

sinusoidal shaped signals). This conversion is Introduction:performed by a peripheral device called a modem

Fiber optics is a fairly simple and old technology (modulator/demodulator). The modem takes the used extensively in the modern world. The signal on the single wire and converts it to sounds.

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

8988

Page 46: Souvenior Inside IT page-1

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

principle that makes fiber optics possible is guiding which low dispersion is made to occur over an of light by refraction, it was first demonstrated by extended wavelength range, with possibly zero Daniel Colladon and Jacques Babinet in Paris in the dispersion close to 1.3 µm and 1.55 µm[3].early 1840s. The use of optic fibers for Design Methodology:communication purposes were first carried out in

a). Designing of step index fibers: The total Western Europe in the late 19th and early 20th dispersion in the single-mode fibers composed of century, such as they were used to diagnose a two components, a material dispersion term M and patient's stomach by a doctor, and those waveguide dispersion term W and the concept of communications within short ranges. Especially, zero total dispersion by cancellation of the M and W the transfer of images by optical fibers was largely terms. Material dispersion depends only on the popularized at the beginning of 21st century, due to composition of the material, waveguide dispersion the growing medical and television demands. is a function of the core radius, the refractive index

Dispersion: It causes the broadening of transmitted differences, and the shape of the refractive index pulses as they travel along the channel. The pulse profile. broadens and overlaps with its neighbor, becomes

b). Designing of multiple index fibers: One class indistinguishable at the receiver input. This effect is of fiber which has been used to demonstrate known as inter symbol interference.dispersion shifting is based on the doubly-clad or

Types of Dispersion: “W” Profile. The zero total dispersion value of a 1. Multipath time dispersion /intermodal DSFs falls at 1.55µm, the chromatic dispersion is

dispersion :The intermodal dispersion results negative for wavelengths less than 1.55µm and from propagation delay differences between positive for longer wavelengths.modes within a multimode fiber. This Simulation And Results:difference is between the transmission times of

The first profile which we are demonstrating here is the slowest and fastest modes.the simplest step index matched cladding. For

2. Group Velocity Dispersion: The Group s imulat ion we are using the sof tware Velocity Dispersion is also known as OPTIFIBER2.0. The radius of core is taken to be Intramodal Dispersion / Chromatic Dispersion. 4.1 µm. and Refractive Index - 1.44692. the clad Optical sources do not emit just a single Radius - 10 µm and Refractive Index - frequency but a band of frequencies. Intermodal 1.44185[6,5,10].dispersion is caused due to the delay differences between the different spectral components of the transmitted signal.

Dispersion Compensation Techniques:

1. Dispersion Shifted Fibers(DSF): The fibers for which we can shift the point of zero total dispersion wavelengths from 1.33µm to 1.55µm region are known as dispersion shifted fibers (DSFs).

2. Dispersion Flattened Fibers(DFF): Fig.Profile diagram for step index fiber.“dispersion flattened” fibers are the fibers in

The observations are taken on the wavelength 1.3 µm. the dispersion curve is shown below in which we have material, waveguide and total dispersion.

Fig. Dispersion characteristics of multiple clad Fig.Dispersion characteristic for step index fiber.

fiber.From above dispersion curve we can easily analyze

From above curve we observe that the zero that the zero dispersion wavelength is at 1.3 µm.

dispersion lie on the 1.55 µm. so this is most In case multiple clad fibers we can take triangular suitable and desired wavelength at which we can profile with annular ring. This is the combination of attain zero dispersion.triangular profile and doubly clad profile.The

Conclusion:radius let's say we take Radius - 3.1 µm, the

From the work conducted on the different structures refractive index is taken as linear function in which of optical fiber we can observe the considerable 1.4615(starting index)- 1.44692(ending index). progress in the understanding, design and The first clad have the Radius - 1.32 µm and fabrication of single mode fibers. The alteration is Refractive Index - 1.44692. the second clad have made in the designing of the optical fiber to shift the the Radius – 1.50 µm and Refractive Index - 1.45. point of zero dispersion wavelengths. As we are the third clad we are taking of the Radius – 57.3 µm changing the profiles the zero dispersion and Refractive Index - 1.44692. the profile diagram wavelengths is shifting from 1.33 µm towards the is shown below:1.55 µm window. The zero dispersion from 1.30

µm to 1.55 µm region is an essential requirement

for large capacity and long repeater less

transmission.

nnn

Fig. Profile diag. of multiple clad fiber.

We will take the observations at 1.3 µm. the

dispersion curve is given below.

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

9190

Page 47: Souvenior Inside IT page-1

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

ultrasensitive electronic sensing. This technology Recent Advances In Integrated may be widely applied for micro and nano Microfluidic Reactorspatterning of other redox active materials

Jay Thakkar*, Ankur Falor, Manish including other conducting polymers, metals, Vashishtha** inorganic semiconductors, and functional ceramic Department of Chemical Engineering, Malaviya materials for broader application in other micron National Institute of Technology, Jaipur, and nano electronic devices and (iv) solid-phase Rajasthan, India synthesis of DNA oligonucleotides: the synthesis

plays a critical role in contemporary laboratory M i c r o r e a c t o r t e c h n o l o g y d e a l s w i t h practice as it provides a rapid and inexpensive microstructured reactors, capillary and tube access to any desired oligonucleotide sequences.reactors of small inner dimensions. In the last two nnndecades significant efforts have been devoted to

develop microfluidic reactors because these Polymer Clay Nanocomposites: miniaturized devices offer various advantages

Current Status and Advancesover macroscopic reactors such as reduced

1 2 3chemical consumption, safety, high surface-area- Anurag Khandelwal, Esha Bhasin, Divya 4to-volume ratios, and improved control over mass and Manish Vashishtha

and heat transfer An integrated microfluidic Department of Chemical Engineeringsystem represents a scalable integration of a Malaviya National Institute of Technology, microchannel network with functional Jaipurmicrofluidic modules, thus enabling the execution The scope of nanocomposite material has and automation of complicated chemical reactions broadened significantly to encompass a large in a single device. In the present paper , we variety of systems such as one-dimensional, two-summarize recent progresses on the development dimensional, three-dimensional and amorphous of integrated microfluidics based chemical materials, made of distinctly dissimilar reactors for (i) parallel screening of in situ click components and mixed at the nanometer scale. chemistry libraries: a kinetically controlled target Polymer-clay nanocomposites are formed through guided synthesis method for screening potential the union of two very different materials with

organic and mineral pedigrees mixed at biligand inhibitors in a highly efficient manner, nanometer scale. The hybrid compositions, (ii) multistep synthesis of radio labeled imaging however, exhibit large increases in tensile probes for positron emission tomography: the strength, modulus, and heat distortion temperature development of sensitive and specific positon as compared with the pristine polymer. The emitting radionuclide-labeled molecular probes subject of hybrids based on layered inorganic crucial for expanding the capability of target-compounds such as clays has been studied for a specific in vivo imaging for biological research considerable time, but the area is enjoying a and drug discovery, (iii) sequential preparation of resurgence of interest and activity as a result of the individually addressable conducting polymer exceptional properties which can be realized from nanowire: deals with one dimensional such nanocomposites. The key to the performance

nanostructured semi conducting materials for the of polymer nanocomposites is the quality of

.

dispersion of the nano-reinforcement particles and Laminar Flow and Heat Transfer in the the interfacial interaction between the matrix and Annulus Filled by Hyper-porous the reinforcement phase. Over the last two

Medium with Naturally Permeable decades, the addition of nano-sized layered

walls of very Small Permeabilitysilicates in plastics has been found to offer improvements to the rheological properties with Shilpi Saxenajust a small quantity, typically in the range of 3-5 Vivekananda Institute of Technology, Jaipur, wt%. The present paper attempts to demonstrate Indiathe suitability of nanocomposites based on

Fluid flow in porous media is an important subject thermoplastics, thermosets, elastomers and in Fluid dynamics and is of vital interest to the

biodegradable polymers where properties petroleum industry, geophysics, bio - mechanics,

improvement have been reported by various and astrophysics. The fluid flow through porous researchers. boundaries is of great importance in technological

and bio - physical fields, e.g. in soil mechanics, It also discusses some challenges and current trend drainage and irrigation engineering, water in research in the emerging field of polymer purification, sanitary engineering, ground water nanocomposites. Natural and bio-degradable hydrology, blood flow and artificial dialysis. A

polymers are a new generation of polymers that are number of applications in thermal engineering

relatively friendly to the environment with little or require a good understanding and working no impact when disposed. To gain a thorough knowledge of flow and heat transfer in porous knowledge of the processing and applications of medium. Such applications include heat this relatively new class of material, it is important exchangers, drying technology, energy

conservation, geothermal systems, building to understand its morphological, rheological and thermal insulations, and transpiration cooling. The mechanical properties. Often, an ultimate property problem of viscous fluid flow in the annulus of such as tensile strength, barrier and thermal coaxial fixed circular cylinders is significant resistance is the key for the suitability of these because of its various practical application in nanocomposites. Polymers reinforced with as little many engineering process and therefore such

as 2-5% of nano-particles via melt compounding problem has captured the attention of many

or insitu polymerisation exhibit dramatic researchers. These researchers have extended this improvements in thermo-mechanical properties, problem by taking porous cylinders with suction/ barrier properties, and flame retardancy. They can injection on the boundary surface. If the porous also outperform standard fillers in improving medium is adjacent to clear fluid, then a coupled -

fluid flow problem is to be investigated, in which heat resistance, dimensional stability, and Navier Stokes equations govern the flow in the electrical conductivity. Dispersions of nanoscale free fluid region, whereas Darcy's equation or reinforcements in polymers are already entering some other suitable equations are to be considered the marketplace in automotive and packaging for the flow through porous matrix, with some applications. But that pace is expected to speed up appropriate energy equation, and some suitable

dramatically, as indicated by the enthusiasm of matching conditions at the fluid-porous medium

researchers and industry right around the world. interface.The potential for the commercial application of

In this paper a viscous incompressible fluid flow in nano-composites is enormous.annular pipes filled by a hyper-porous material is

nnn considered with heat transfer. The inner filled pipe

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

9392

Page 48: Souvenior Inside IT page-1

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

and the surrounded region of the annulus are made various types of wastewaters such as dairy waste, up of a naturally permeable material of very small domestic waste, industrial waste etc. This paper permeability. In the absence of any external presents the study of Microbial Fuel Cell using pressure gradient in these surrounding regions dairy waste from Saras Dairy of jaipur with COD flow is assumed to be zero, that is, the fluid is content of 1680 mg/Liter in a mediator less stationary but both these regions are kept at environment and generating energy with a peak constant temperatures. A constant injection voltage of 0.546 volts and peak current of 1.47 mA velocity is applied at the outer boundary of the which is higher than reported data for MFCs using annulus. An approximate solution of temperature dairy waste. Stable performance was obtained after field is obtained by using a perturbation series 10 days from the initial day of generating current method, in which temperature variables are and peak values were obtained around 65 days expressed in a power series with respect to the from the start for the cell life of 100 days. Agar injection Reynolds number. The flow variable is Agar was used for the making of the proton expressed in a power series with respect to the exchange membrane. The agar- agar was boiled cross flow Reynold's number. The effect of with water and poured into the membrane chamber permeability parameter is examined on the and cooled to produce a membrane. This MFC velocity profiles, temperature field, skin friction may be a leading step in developing low cost MFCs and the rate of heat transfer and discussed. as it used low cost Graphite electrodes instead of

Platinum electrodes and the Proton Exchange Keywords: Annulus, hyper-porous medium,

Membrane medium was Agar-Agar.permeability, injection, heat transfer.

nnnnnn

Mathematical Modelling of An Adiabatic Use of Saras Dairy Waste for Electricity Adsorption TowerGeneration Through Microbial Fuel CellSuja George and Shreya Shivani

Suja George, Manav Kataria, Krishna MohanDepartment of Chemical Engineering Department of Chemical Engineering, Malaviya Malaviya National Institute of Technology,JLN National Institute of Technology Jaipur, Marg,Jaipur J.L.N.Marg, Jaipur, Rajasthan- 302017, India

In this era of world where energy crisis demand an The Adsorption process defined as the separation energy source which is affordable, accessible and of a particular adsorbate from one phase and its environmentally friendly, Microbial fuel cell accumulation on to another adsorbate surface, (MFC) shows an feasible alternative source to needs high efficiency of separation which could be produce electricity using biomass and obtained by utilising properly and effectively microorganism. In Microbial Fuel Cells the designed process vessels. The primary factors complex metabolism of Heterotrophic bacteria is considered in design include the system properties, based on redox reactions that break the organic the breakthrough concentration and temperature matter into proteins and nucleic acids and the profiles or length of mass transfer/ heat transfer chemical energy may be harvested during the zone, the nature of the process equilibrium and cellular respiration. The microbial fuel cell (MFC) reaction time. Computational techniques of has attracted researcher which is capable of mathematical modelling and simulation are converting hydrocarbon into electricity production significant for its theoretical approach, as it require by using metal reducing bacteria as a biocatalyst. only the various process parameters characteristic This could be both economically and of the process and the working conditions and environmentally effective when the organic matter provides almost accurate solutions predicting the does not have any intrinsic value as in the case of performance of the system. This paper presents the

mathematical modelling and simulation of an these services from misuse. Automated programs adiabatic adsorption column inclusive of mass and (referred to as bots) have been intended to attack a heat transfer effects within the particle and fluid variety of services For example, attacks are phases as well as the axial dispersion effects in the common on free email providers to acquire column. The process equilibrium, mass, energy accounts. To prevent automated attacks, a new and momentum balances and the boundary technique was invented known as CAPTCHA conditions were developed for the adsorption (Completely Automated Public Turing test). In process using a set of nonlinear equations and this paper we introduce CAPTCHA which is now further a simpler numerical approach such as the nearly a standard security technology for finite difference scheme utilised for obtaining the protecting against unwanted or malicious Internet solutions which will predict the system behaviour. bot programs, such as those scatter junk emails and A three dimensional grid system provided with those grabbing thousands of free email accounts three axial coordinates axial, time and radial instantly. It has start extensive application on distance was taken while solving the equations on a abundant commercial web sites including Google, spatial domain covering the entire adsorber Yahoo, and Microsoft's MSN.The script generates column length. This model helps in the prediction images (known as "Captcha's") contain security of the breakthrough profiles of the column. codes used for protecting a form from spam bots.

By encoding a 'password' inside an image and nnnasking the user to re-enter what they see, you can verify the user is a human and not automated CAPTCHA- A Technique to Prevent software submitting your form. CAPTCHA - From Automated Attack Completely Automated Public Turing test to 1 2

Akanksha Saxena Anubha Gaur Neeti differentiate user from computer. Any difficulty 3Kapoor that can be easily solved by a human, but cannot be

1Ph.D. Pursuing, Sr. Lecturer, Suresh Gyan Vihar solved by a computer can be used as a Turing test. University, Jaipur To protect against auto registration, mass mailing 2 in forums and guest books, a text-based Ph.D. Pursuing, Sr. Lecturer, Suresh Gyan Vihar

CAPTCHA was chosen. It is a most widely used University, Jaipur3 CAPTCHA . Since then, this type of protection was Lecturer, M.Tech. (Pur.) Suresh Gyan Vihar

adopted by other resources: free mail services, University, Jaipurblogs, social networks, etc.

With an ever-increasing number of free services on nnnthe internet, we find an obvious need to protect

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

CO

NTR

IBU

TED

PA

PER

/A

BSTR

AC

T

9594

Page 49: Souvenior Inside IT page-1

AB

OU

T U

S

4. Shimadzu Biotech., JapanBackground5. University of Maryland School of Medicine, USAThe Biyani Shikshan Samiti was formed by a team of 6. University of Manchester, UKyoung, dynamic, result oriented and qualified persons.

It is registered under the Rajasthan Society College CampusRegistrat ion Act , 1958 having Reg. No.

Situated in sprawling 1.1 acre of lush green space at 500/Jaipur/1997-98. The overall object of the Samiti

the heart of Vidhyadhar Nagar, Jaipur, the Biyani is Women Empowerment through Technical

College campus has a beautiful state-of-art Education. Param Pujya Shri Kirit Bhaiji laid the

infrastructure, with a total constructed area of foundation stone of the college in the month of Feb.

1,35,000 sq.ft. The campus is surrounded by 2.76 2005.

acres of lawns and greenery.

It came into the main stream of education with its College Manualaffiliation to the University of Rajasthan in 2002 as For the effective functioning of the various Biyani Girls College.It has now increased its scope of administrative & academic wings the institute has its education which include more specialized and college manual and set-of forms & proformas, which professional courses with the Biyani's Group of help in taking managerial decisions.Colleges :

1. Biyani Girls College (BGC)Placement Support Cell (PSC)

2. Biyani Institute of Science & Management (BISMA)We have a very vibrant placement cell at Biyani's Group

3. Biyani International Institute of Engineering & of Colleges which takes care of the employment Technology (BIIET) opportunities of the students. We equip students with

the knowledge of latest techniques and concepts so 4. Biyani School of Nursing & Para-medical Science (BSNPS) that they are ready to face the corporate challenges.

We are also initiating an 'Interim Corporate Training' 5. Biyani Girls B.Ed. College (BGBC)module for the students in which students will take

training in the corporate houses on a regular basis and Affiliations sharpen their practical insights. Our students are The group of colleges are recognized by the following trained vigorously on attempting the written test paper, authorities : group discussion sessions and personal interviews 1. Approved by the Government of Rajasthanbefore venturing for their final placements interviews.

2. The University of Rajasthan, JaipurThe Placement cell aims at 100% placements for the

3. All India Council for Technical Education, New DelhiGraduate and PG students of Biyani's Group of

4. Rajasthan Technical University, Kota Colleges. The students' placement coordinators are 5. Approved by Indian Nursing Council & Rajasthan appointed for each stream and the students are

Nursing Council encouraged to participate actively in the placement

6. The Institute of Chartered Accountants of India, process under the guidance of the Placement and New Delhi Marketing Manager. The Placement brochures giving

all the details of the placement activities have been 7. National Council for Teacher Education, New Delhiprinted along with the Bio-Data Manual of the students

8. Tally Solutions Pvt. Ltd., Bangalorewhich are circulated in the industry.

9. MICROSOFT-India Cyber Learning Pvt. Ltd., DelhiResearch & Development Activities10. Rajasthan Knowledge Corporation Ltd.We have established a GP (Genome Profiling)

Ongoing/Proposed International Laboratory in our Science department. GP is a realistic Collaborations solution for genotype-based characterization of 1. University of Tokyo, Japan isolates (differing in sequence even with a single-

base). With the robust nature including rapid analysis, 2. Saitama University, Japan

low-cost, parallel and easy application, GP can lead to a 3. RIKEN, Japan

Clothes distribution, Free Eye Checkup Camp, Jal

Kalash Yatra, Nukkad Natak for social awareness have

been successfully conducted by the NSS volunteers.

PEP & IOPPEP (Personality Enhancement Programme) & IOP

(Industry Oriented Programme) forms an essential part

of the curriculum followed at BGC. It aims at

development of an all-round balanced personality of

students. Eminent persons having expertise in

subjects relating to personality development were

invited to interact with the students. The subjects revolutionary improvement in species authentication

covered in the PEP & IOP module include studies and proves to be beneficial in various fields of

entrepreneurship skills, influential communication, Biology including agricultural or microbe-related

table manners, development of positive thinking, disciplines.

interviews, seminars, group discussions etc.Presently, our researchers at GP lab are working on a

bilateral research project in collaboration with Industrial VisitsNishigaki Group of Saitama University, Japan. This Industrial visits are an integral part of our course project is entitled as ‘Database development for on-line curriculum. Direct exposure to the work place, shop identification of field micro-organisms: DNA-based floors and assembly lines, along with interactive diagnosis for fungal plant pathogen'. sessions with industry personnel, helps clarify many The research is being conducted under the supervision concepts, issues and doubts of students from all of Dr. Manish Biyani (Director, R&D), Biyani Girls streams. They benefit greatly as they observe or College, Jaipur. actively participate in industry activity. Our students

have visited Parle-G (Neemrana), HMT Watch Factory Beyond Classroom(Ranibagh), Mahindra & Mahindra (Rudhrapur Plant),

The teaching methodology at the Biyani's Group of HP Invent (Pant Nagar), Bajaj Auto Limited (Pant Nagar),

Colleges incorporates various activities outside the Rajasthan Patrika (Jaipur), Infosys BPO (Jaipur),

classroom also, to instill professional & interpersonal Central Potato Research Institute (Shimla), IMTECH

skills among the students to face the competitive Institute of Microbial Technology (Chandigarh) & IIT

world. Some of such activities are NEN, NSS, (Delhi).

Educational Trips, Industrial Visits, PEP, IOP and

BELLS. Educational ExcursionsOutstation educational trips are organized to inculcate

National Entrepreneurship Network (NEN) personal and professional values including teamwork, We conduct an entrepreneurship programme at the resourcefulness, leadership and an ability to handle college campus for all the management students of unforeseen situations. In these trips, students also get BBA & MBA. This programme focuses on developing an opportunity to explore and gain fascinating insights entrepreneurship skills, idea generation, influential into the rich heritage, artistic traditions and diverse presentations and e-cell formation for the conduction culture of India and abroad. Educational trips have of activities at the campus. It helps in developing the been organized to Japan, Nainital, Ranikhet, Pant requisite skills in the students to be a successful Nagar, Rudhrapur, Ranibagh, Bangalore, Hyderabad, entrepreneur in future. Delhi, Simla, Chandigarh etc.

Government Co-operation & SupportNational Service Scheme (NSS)Acknowledging the efforts of Biyani's Group of Colleges NSS is a regular feature of our college. The college towards opening up new avenues and creating a better undertook the NSS activity, to inculcate the spirit of future for women, the Government of Rajasthan has social service amongst the students. A number of extended hearty support to the institution : activities such as Blood Donation Camp, Sports

Activities, Tree-Plantation, Working in slum areas, • Biyani Shikshan Samiti has signed a memorandum

AB

OU

T U

S

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

9796

Page 50: Souvenior Inside IT page-1

of understanding with the Govt. of Rajasthan Apparatus, Analytical Balance, Micropipettes etc. It is in on 30-11-2007 for setting up a Private also well equipped with latest equipments as University in Jaipur city. The Samiti has received UV_Spectro Photometer, Ultracentrifuge, Rotatory letter of intent (LOI) from the Govt. of Rajasthan. Shaker and Electronic weighing balance to carry out

experiments.• The JDA has handed over park-I adjacent to the

college for maintenance and to ensure a good & Botany Laboratoryhealthy environment. The lab has various models & botanical charts for easy

• The government has also handed over the stretch assimilation by the students. It has the facility of Digital of road from Ambabari to Vidhyadhar Nagar for pH meter, Rotary Shake, Leminar Air Flow & Digital plantation. Electronic Weighting balance to carry out the various

Botany experiments. It is well equipped with all the Library latest specimens, Electronic Microscope & Microtome.The college library gives accessibility to a wide range of

Physics Laboratoryquality books and journals, written by renowned Indian The laboratory is well equipped. It consists of and International authors. The library is continuously instruments related to digital electronics, semi-upgraded to providing students and faculty members conductor devices and electrical circuits. There are with the latest books in each & every academic many display boards related to various electronic discipline.components so that the students may recognize and

E-Libraryapply them in experiments.

K e e p i n g p a c e w i t h t h e I T Advancement, the college has an e- Computer Laboratorylibrary wherein the students are The state of the art computer labs are provided easy access to e-learning, fully equipped with all the latest audio-video lectures, e-books etc. For facilities. One lab has 91 computers, the convenience of the students, that are Dual Core Processors and broadband internet facility is also another lab with 50 computers with available. AMD processors. There is a 24 x 7

broadband internet facility available for Laboratoriesstudents & faculties. A separate lab for Biotechnology LaboratoryMicrosoft Office Specialist online The Biotechnology laboratory has all hi-examination and one for Tally tech apparatus required for research Certification is also available.and practical work. The lab is equipped

with basic equipments like Laminar Air English Language LaboratoryFlow, Autoclave, Micro Centrifuge,

Adding yet another feather to the Rotary Shaker, B.O.D., pH Meter, Hot

Biyani's cap for taking it to the Numero Plate & Deep Freeze. The lab also has

Uno position, a English Language Lab PCR, m TGGE & Spectrophotometer. has been set up with the state of art We also have "Genome Profiling" cutting edge technology for the laboratory, in which DST projects are enhancement of spoken English and being carried out. written communication. The students

shall be provided with 90 hours of Zoology Laboratorytraining at each level through

The Zoology laboratory is well comprehensively crafted syllabi.

equipped with al l the latest equipments like Microtome, Light Micro Processor LaboratoryMicroscope, Centrifuge Machine, pH The college has a Micro Processor Lab Meter etc. to meet the requirements of digital

electronics and architecture discipline. Chemistry LaboratoryIt has VMC 8509 training kit based on

The Chemistry laboratory is well 8085 micro processor with LCD

organized, properly ventilated and display. Through this kit, the students

consists of necessary apparatus like can communicate with the outside

Kipp's Apparatus, Dist i l lat ion

AB

OU

T U

S

world through a key board having 64 Kool CAFÉ has put up a rich canteen ASCII keys and LCD of 20” x 2”. This in the college campus with delicious kit also gives the advantage of delicacies and provides healthy interacting with CRT terminal and refreshing food.printer.

HostelPlant Tissue Culture Laboratory

The college has two hostels–Block A The college has a well equipped PTC “Mother Teresa” with a capacity of laboratory, where various types of 136 and Block-B “Priyadarshani” with experiments are conducted by the a capacity of 161 available for the students. It includes anther culture, students in the campus, with embryo culture, shoot tip culture, etc. comfortable, well-lit, well-ventilated

rooms, furnished with wooden Nursing Laboratorytables, chairs, beds and wardrobes

The lab facilities for Nursing students for all students. Every room is four

includes—Fundamentals of Nursing, bedded room with attached toilet,

Anatomy, Physiology Lab, Audio-bathroom and balcony facility. The

visual Lab & Computer Lab. The lab facility is in sync with our endeavour

has 3-D charts, Suction Machine, to provide a positive frame of mind

Pulse Oxymeter, Oxygen Cylinder, along with quality education to the students.

Dummies, Operation Theatres etc.

Mess cum Recreation HallUniform

In order to provide a family atmosphere and recreation The college has prescribed a professional dress code

of hostellers, a mess cum recreation hall is attached to for the students as well as for the staff members, which

both the hostels where they can spend some leisure creates a disciplined atmosphere in the campus.

time.

Gymnasium TransportationRealising how important it is to encourage health and

The Biyani's Group of Colleges understands the need fitness among the students besides academic

for stress free education. Hence, it provides performance, we have a full-fledged gymnasium with

transportation facility for the students coming from state-of-the art equipments such as—Tread Mill,

long distance.Abdominal Exerciser, Upright Bike, Elliptical, Recumbent, Spinning Bike, Big Steeper & Exercise Growth in StudentsMachine (GYM) within the college campus.

Strength

Auditorium & Conference Halls• Utsav : Utsav is a large fully air-conditioned hall

with modern multimedia facilities and pleasant ambience having a seating capacity of 300 people. All the important events are organized in Auditorium Utsav.

• Manthan : Manthan is an oval table conference hall having a seating capacity of 100 people. It is a fully air conditioned and well equipped hall for important meetings and conferences.

• Parichay : Parichay is a well equipped presentation hall having a capacity of 150 people. It also has a facility of buffers and speakers required for effective presentations. SPECIAL ACHIEVEMENTS

• By the joint efforts of Shri Rajeev Biyani (Chairman Cafeteria of Biyani Group of colleges, Jaipur), Dr. Sanjay

AB

OU

T U

S

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

9998

Page 51: Souvenior Inside IT page-1

Biyani (Director-Acad., Biyani Girls College, Jaipur), facilitate the students to speak English confidently Dr. Manish Biyani (Chief Scientist Saitama through comprehensive array of words, accent training Univers i ty , Japan) a memorandum of and situational dialogues.understanding has been signed between the Vice-

MOS (Microsoft Office Specialist)Chancellor of the University of Rajasthan and Saitama University, Japan. This is a student and

The mission of Biyani Girls College is not only to faculty exchange programme between both the

enhance the academic knowledge of the students but countries.also to equip them with the demand of competitive &

• Dr. Manish Biyani designed & demonstrated the Industrial world. BGC, therefore, conducts an technique for detection of H N influenza virus 1 1 International level certification course in MOS within a short span of time and at low cost in

(Microsoft Office Specialist), which helps the students collaboration with Tokyo University.to stand out as a job candidate with the necessary

• The Center for Medical System computer skill. Innovation at the University of

Microsoft office specialist certification program is a Tokyo has offered “Summer premier certification program by Microsoft Corporation research program 2010” under

the heading of Global COE for demonstrating desktop productivity skill in Program. It's our great pleasure Microsoft office business programs such as Word, that one of our students Ms. Excel, Power Point, Access etc. To become a Microsoft Parmila Kumari from M.Sc.(Final) office specialist, students need to pass an online Biotechnology, has completed

examination for any one of such Microsoft Office the training in this Program. The CMSI has

application. BGC is an authorized center for MOS provided the air fare and grants for maintenance Examination. After passing the Online examination, allowance of ¥400,000.students will be certified as Microsoft Office Specialist

UNIQUE FEATURES by Microsoft Corporation USA.

Biyani Knowledge Process Outsourcing Tally Programme(KPO) Driven by the growing need from its enormous user Biyani's Group of Colleges has made a unique launch in base and across the corporate world, Tally aims to the KPO segment by launching gurukpo.com. In this bring standardization in its pursuit of excellence in the KPO, we have a vast reservoir of technical and Education stream. As a leader in the financial and professional knowledge related to most of the courses accounting domain, Tally has set up the certification existing in the educational field. Students can access program in a bid to build a community of competent and put in queries on the site and get answers in Tally professionals. BGC is an authorized center for minutes. A unique password and ID is created for every Tally. We give Tally certification to students of student who will access the portal. The details on the commerce & management discipline as this helps portal are regularly updated by the competent them to attach additional proficiency in managing authorities. Various new links related to Job portal, financial & accounting vocation.Resume, Builder, Psychological Counselling,

RKCL's RS-CIT ProgrammeConcentration Test, Greetings, Video lectures are The Biyani Girls College has started a Certificate being added to gurukpo.com, accurate and concept Course in “Information Technology”, approved by the based data is available round the clock on Govt. of Rajasthan & launched by Rajasthan Knowledge www.gurukpo.com.Corporation Limited known as RS-CIT. It is a unique IT Literacy program that offers novel curriculum BELLS (Biyani English Language Learning comprising of theory as well as practice on different System)office application software tools.

Biyani Group of Colleges has always been a pioneer in RKCL offers excellent study material in the form of exploring & developing the capacities of its students. highly illustrated international quality book and Making education more efficacious along with many interactive multimedia learning units comprising of other value based programs the English language lab inform and perform type of content. This e-Content is has recently initiated a holistic endeavour for effective delivered through learning and Content Management communication under the acronym BELLS (Biyani System. A state-of-art academic delivery mechanism English Language Learning System). The aim is to

AB

OU

T U

S

leads to online examination and instant e-Certification. 3. Project Management4. ERP Basics

Certificate Programmes5. Information Security

As an added feature, the institute offers certificate 6. Software Testingprogrammes alongwith the main course/stream the 7. Pharma & Healthcarestudent pursues. These courses are drafted with an 8. Retail, Insurance & Bankingobjective of expanding the knowledge horizon of the

9. Customer Servicestudents. The student can opt for any one of the

10. Business Planningfollowing programmes :

11. Quality Management• Basics of Dramatics 12. Networking & Relationship Building• Basics of Manual Accounting These programmes can be opted by the students on an • Basics of Marshal Art optional basis. The course fee is Rs. 2,000/- for each • Fundamentals of Fashion Designing certification.• Basics of Retail Management

Dale Carnegie Certification Programme• Fundamentals of Bioinformatics

Human beings have various wants and the most pre – • Memory Enhancement Programmedominant one is to become important and be worthy of • Basics of Graphic Designing appreciation. To attain such heights through continued • Public Relations & Advertisingcommendable performance and become effective and • Journalismsuccessful in life, the book "How to win Friends &

• Yoga & MeditationInfluence People" by Dale Carnegie makes an

• Danceimmense contribution. Endorsing the same

• Spoken Englishphilosophy, the college conducts 06 days workshop on

• Tourism, Hospitality and Travel Management the principles contained in the book & gives certificate • Principles and Ideals of Geeta & Gandhism to faculty members & the students free of cost.

Online Training & Certification Programmes You Can Succeed Certification ProgrammeKeeping pace with the knowledge based E-learning 'You can succeed', a compilation of inspirational system, the college also provides training and quotes and motivational thoughts is one of the in-certification in wide spectrum of competencies helping house publication of the college. From this academic students acquire skills in various areas. These year we are starting with the certification programme on programme will be delivered through the internet using this book to help students imbibe these wonderful an interactive voice-based programme. We will be inspiring thoughts and beliefs. This certification will be providing highly practical and driven by industry need beneficial while developing a strong value system in the training and certification in the following areas : students and in making them more optimistic,

confident and successful in life.1. Six Sigma2. Logistics & Supply Chain Management

AB

OU

T U

S

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

101100

219, Himmat Nagar,Behind Kiran Sweets,Gopalpura Turn, Tonk Road, Jaipur (Raj.)Tel: +91-141-3136868Mob.: +91- 9887789124, +91-9785598711Email: [email protected] : http://www.grras.com

GRRAS LINUX TRAINING ANDDEVELOPMENT CENTER

Page 52: Souvenior Inside IT page-1

Jaipur along with Delhi and Agra forms, the Golden Triangle which is India's most popular destinations. The city's regal aura coupled with its excellent infrastructure and the traditional Rajasthani hospitality of "Padharo Mahare Desh" is the main reason why tourists from all over the world flock to this princely state.The capital of Rajasthan, Jaipur also known the Pink City is renowned in the world over for its majestic forts, opulent havelis, beautiful lakes and shimmering sand dunes. Designed by Vidyadhar Bhattacharya as per the Shilpa Shastra- an ancient treatise on architecture and built by Maharaja Sawai Jai Singh II, Jaipur is built entirely of pink stucco in imitation of the red sandstone. The City palace, the Amber Fort, Jaigarh Fort, Hawa Mahal, Jantar Mantar observatory, Jal Mahal and Nahargarh Fort are some of the famous attractions of the city. Jaipur is famous for its semi-precious stones, miniature paintings, silver jewellery and lac items and the city's colorful bazaars make shopping an exhilarating experience.

History of Jaipur The history of the Amer-Jaipur region can be traced way back to the 11th century when Prince Dulha Rai left his patrimony of Narwar for Dausa in Eastern Rajasthan. Married to a daughter of a Chauhan Chief of Moran. His son and successor Kakil Dev was equally brave. He established his control over the Amber-Bairath region, built the Ambikeshwar Mahadeva Temple, and made Amber his capital. It was under Maharaja Bharmal, the fourth son of Prithvi Raj that Amer became a very powerful Rajput state and began to play an important role in the subsequent history of Rajasthan. The next important ruler to have come to the throne of Amer was Sawai Jai Singh II. A great Statesman and a keen astrologer, he along with his architect Vidyadhar Bhattacharya laid the foundation of the present city of Jaipur. Divided into nine blocks and encircled by a masonry crenellated wall that has seven gates,

the city follows the grid system with wide straight roads, streets and lanes. However, it was in the 19th century that Jaipur earned the epitaph "Pink City". According to the local fables, when some ambassadors of the Prince of Wales visited the city prior to his visit, someone insultingly called them the 'pink-faced monkey', as a result of the contempt for the British who had India under their clutches. To make up for his rashness and as a diplomatic tact, Raja and his ministers maintained that the person had called them so in reverence, as the 'monkey' was worshipped in the region as 'Hanuman' and pink was the sacred color of the region. To give conviction to their seemingly improbable reason they painted the city pink on the Prince's arrival. Tourist AttractionsThe City Palace: Built in early 18th century by Maharaja Jai Singh II, the City Palace represents a unique blend of Rajasthani and Mughal styles in its pillars, arches, mehrabs, grills and beautiful inlay works. The palace

JAIP

UR

CIT

Y A

T A

GLA

NC

E

complex comprises of many structures, courtyards, gardens and halls like the Chandra Mahal, Mubarak Mahal and Badal Mahal. There is also a famous temple called the Shri Govind Temple within the precincts of the palace as well as a museum called the City Palace Museum. The Mahal has now been converted to a textile museum. Amber Fort: Located at a distance of 11 kilometers from Jaipur is the Amer Fort,

one of the most important monuments of Rajputana. A stunning piece of Indian architecture, the exterior of the Fort is not in the least like its interiors. One of India's best-preserved medieval citadels, the fort built of white marble and red sandstone is renowned for its Sheesh Mahal- the Mirror Palace. Patterned mosaics, colored glass and mirror decorate the Sheesh Mahal from floor to ceiling, creating a palace of almost unbelievable beauty. The fort is dominated by two buildings- the Diwan-e-Aam (the Hall of Public Audience) and the intricately painted double-storied Ganesh Pol gate which leads to the residential apartments of the Maharaja.

Hawa Mahal: Jaipur's best-known landmark, the Hawa Mahal or Palace of Winds built by the poet King Sawai Pratap Singh in 1799 is a remarkable structure that overlooks one of the main streets and also provides some excellent views of the city especially the Jantar Mantar. Designed for the royal ladies to watch and enjoy the processions and other activities, on the street below, this five storied stunning semi-octagonal monument having 953 windows with over hanging latticed balconies is a fine piece of Rajput architecture. Built of pink & red sandstone as a giant honeycomb. The palace gets its name because of its small windows that circulate cool air naturally throughout the building even in the hottest months of June and July. A small archeological museum located just near the Mahal further provides a glimpse of art and craft of Rajasthan.

Jantar Mantar: One of the five observatories built by the astrologer king Sawai Jai Singh II, the Jantar Mantar of Jaipur was constructed in the year 1728 A.D. Located close to the City Palace. It was built to measure the local time, the sun's declination, altitude, the declination of stars, planets and to determine eclipses.Jaigarh Fort : Falling in the category of the ‘Giri or Parvata Durg’, the Jaigarh Fort standing in the midst of thorn-scrub Aravali hills is one the most forbidding and imposing forts of Jaipur. The Jaigarh fort built by Mirza Raja Jai Singh was subsequently developed by his succeeding rulers. The fort has palaces, granary, a well-planned cannon foundry, several temples, a tall tower and a giant cannon known as Jaivan, believed to be

the largest cannon in the world. However, it is the Jaivana, reportedly the world's largest cannon on wheels that forms the highlight of the Jiagarh tour. Built in the Jaigarh's foundry during reign of Maharaja Sawai Jaisingh, the canon weighing 50 tons with a trajectory of about 20km is said to have been fired once during its lifetime (in 1720). The impact of it was so enormous that a

JAIP

UR

CIT

Y A

T A

GLA

NC

E

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

103102

Page 53: Souvenior Inside IT page-1

lake got formed at the very spot where the cannon ball landed. Many houses collapsed in Jaipur and the person who had fired the canon died immediately after the firing, before he could even jump into water. Infact, such was the fear of the canon that nobody ever attacked the fort. The Fort has a lot of wide water channels, which were a part of a rainwater harvesting system. There are 3 underground tanks at the fort, the largest one of which could store 60, 00,000 gallons of water. Other sights worth seeing at the fort are the seven-storied Diya Burj.

Nahargarh Fort: Built in 1734, the Nahargarh Fort provides some stunning views of Jaipur city.

One of the first three forts built by the rulers of Jaipur, the Nahargarh fort, just like the Jaigarh fort was built to bolster up the defence of Amer. Though it was built by Sawai Raja Jai Singh. A very interesting feature of Nahargarh Fort is the Madhavendra Bhawan. The Bhavan has a cluster of 12 identical suits for queens which are arranged in such a way that the king could visit any one queen’s room without the knowledge of the others. According to the story, the fort is named after Nahar Singh, a Rathore prince.

Kanak Valley: Settled in the midst of the beautiful Aravalli ranges on one side and the Dharbawati River on the other is the Kanak valley. A popular place for picnics, excursions and film shooting, the valley with its dhok and kadamba trees, cascading waterfalls, brooks, ponds and tons of vegetation, including many flowering and fragrant variety of plants makes an idyllic stopover point for the wearied traveller. In between the two temples lies the Kanak Bagh- a geometrically designed garden with eight sections, four chhatris and four kabanis all arranged geometrically. Sisodia Rani ka Bagh: Built in 1728 by Raja Sawai Jai Singh for his Sisodia bride, the beautiful

Sisodia Rani ka Bagh appears like a green oasis in midst the vast barren land. Located on the Jaipur Agra road, the garden provided the perfect gateway to the queen to escape the daily court intrigues and enjoy the beautiful landscape and

fresh air. Nearby these beautiful gardens are the natural springs of Galta where the famous temples of Lord Vishnu, Lord Shiva and Lord Hanuman are located.

Laxmi Narayan Temple: The Laxmi Narayan temple also known as the Birla Mandir is located close to the Moti Doongri fort. The temple built by the Birlas,a wealthy industrialist family symbolizes the secular spirit of the country with its three domes representing three different faiths. An architectural marvel, the temple which appears to glow in the moon light, the temples houses many Hindu deities of Hindu pantheon while its exterior showcases great historical personages and religious figures from other religions.

JAIP

UR

CIT

Y A

T A

GLA

NC

E

Biyani Group of Colleges, Jaipur, INDIA • E-mail : [email protected] • Website : www.biyaniconference.com

International Conference on Emerging Trends in Engineering & Technology

104