Download Cover Page IJMIE_March_2012......
PARTICULAR
|
Page No.
|
A Study On Satisfaction Level And Problems Faced By Poultry Farm Owners' with Special Reference To Namakkal District, Tamilnadu. Dr. R. Mohanraj and Dr. L. Manivannan
Abstract:
In recent years there has been growing recognition among the development community of the role of poultry production is accelerating the pace of poverty reduction and reaching out to the poorest of the poor. There is also growing evidence to demonstrate the role of poultry marketing in enhancing the food and nutrition security or the poorest households and in the promotion of gender equality. At the same time, the market and production context of poultry production has been changing rapidly over the last the decades.
Download full Lenght Paper......
|
1-34
|
Quality Assurance Analysis And Enhancement Activity Of The Management Information System (Mis).
Rubina Arshad, Ahsan Raza Sattar And Fahad Jan
Abstract:
Software Engineering is a branch of computer science with new advancements and variety of software developed in different domains. In time, software systems become very large and complex due to repeated modifications and updates, needed to meet the ever changing requirements of the business. Therefore, information is the key force which drives businesses these days. To take timely and effective decision one needs correct and timely information. To build effective and efficient information systems, information is essential. Management information systems (MIS) are key expert-systems, which are designed to enhance the quality of production. This research was dealing with the amendments of the main architecture of the management information system (MIS) as well as to apply the standards like DSSs management standards.
Download full Lenght Paper......
|
35-45
|
Hybrid Rough Genetic algorithm for Selecting Optimal Routes. Ali. A. Sakr and Mai. R. Ibraheem
Abstract:
Routing protocols in most networks use the length of paths or the minimum-hops that can be achieved, as the routing metric. This led to the motivation to propose a new algorithm that satisfies multiple constraints for finding a feasible path and apply GA to reduce the time taken to find a feasible path. To achieve this, The Rough sets Theory (RST) is applied to reduce the Performance metrics successfully and decide the most effective ones. ROSETTA software is applied to deduce a QoS metric as a substitution for all routing metrics. This metric is used to select the optimal routes. The results confirm that the proposed metric is adequately suit for selecting the proper routes. Then, Genetic Algorithms (GA) is used to select the optimal routes with new coding and new operators. The proposed Quality of Service Routing Genetic Algorithm (QoSRGA) has been tested on a subnet case study.
Download full Lenght Paper......
|
46-71
|
Enrollment Status of BRAC Primary School in Bangladesh: An Evaluation. Md. Enam Hossain
Abstract:
BRAC has been a pioneer in the education arena. It has been working in the domain of primary education for almost two decades. BRAC has improved access and quality education for a significant number of children in Bangladesh. This paper focuses on enrollment, status, attendance, completion and dropout position of the child (students) of BRAC Primary School. This study was based on two sets of interview schedule designed in the light of the objectives of the study. The study reveals that the students of BRAC School (grade-iii students) are in the age 9 to 12 years. Though most of the students of BRAC primary school come from lower middle class or poor family, their enrollment and completion rates are very good. Download full Lenght Paper......
|
72-84
|
Various Security issues in wireless and Adhoc networks. Vaibhav Shukla, Ashish Mishra and Som Nath Ghosh
Abstract:
As we know that the present day environment is the mobile environment and the people use the mobile devices very frequently people aware about the both type of networks that are wireless and the adhoc networks. These are the two networks that we used very frequently. Basically the difference between the two networks is that in the wireless network we work under fixed infrastructure and in the adhoc network no any type of fixed infrastructure is required. So as we see the differences between these networks the security issues in these type of networks are different and we basically study these issues in this paper.
Download full Lenght Paper......
|
85-96
|
CTEX Algorithm For Image Segmentation. Shital A. Kulkarni
Abstract:
Segmentation refers to the process of partitioning a digital image into sets of pixels or superpixels. The goal of segmentation is to simplify and change the representation of an image for meaningful analysis. Image segmentation has wide applications as Medical Imaging for diagnosis, treatment planning, computer aided surgery, face recognition, fingerprint recognition, traffic control systems, brake light detection, machine vision etc. In this paper, natural images are segmented by combing color and texture information. For this an unsupervised image segmentation framework (referred as CTex) is used. CTex is based on the adaptive inclusion of color and texture in the process of data partition. It is new formulation for the extraction of color features that is evaluated using the input image in a multispace color representation. Download full Lenght Paper......
|
97-113
|
Artificial Intelligence Applied to digital Email for forensic Application. Mr. Shrimant B. Bandgar, Mr. Mahesh Sale and Dr. B. B. Meshram
Abstract:
The number of computer security incidents is growing exponentially and society's collective ability to respond to this crisis is constrained by the lack of trained professionals. The increased use of the Internet and computer technology to commit crimes indicates an abuse of new developments that requires a response by those involved in law enforcement. In this paper we see new research approach that uses artificial intelligence and data mining techniques to study spam emails with the focus on law enforcement forensic analysis. In this 1st we retrieve useful attributes or features from spam emails, these are use in intelligence toolkit to reduction size to investigation then we use clustering algorithm to form relationships between messages. These first clusters are then refined by using a weighted edges model where membership in the cluster requires the weight to exceed a chosen threshold and data mining to managed database.
Download full Lenght Paper......
|
114-122
|
Strategic Green Marketing Need Of The Hour. Dr. A. Muthusamy
Abstract:
Now-a-days Corporate Houses are becoming more concern about their social responsibilities. They have taken social responsibilities as a good strategic move to build up an image in the heart of consumers. Now marketers utilize the resources efficiently without waste as well as to achieve the organization's objectives. Green marketing should not neglect the economic aspect of marketing. Marketers and consumers need to understand the implications of green marketing. This is an opportunity to enhance the product's performance and strengthen the customer's loyalty and command a higher price. Green marketing is still in its infancy and a lot of research is to be done on green marketing to fully explore its potential. There is growing interest among the manufacturers and consumers all over the world regarding protection of environment through green products.
Download full Lenght Paper......
|
123-130
|
DSP Based Digit Serial Architecture. Ms. P. J. Tayade and Dr. Prof. A. A. Gurjar
Abstract:
This paper presents a systematic unfolding transformation technique to transform bit-serial architectures into equivalent digit-serial ones. The novel feature of the unfolding technique lies in the generation of functionally correct control circuits in the digit-serial architectures. Bit-serial systems process one bit of a word or sample in a clock cycle. For some applications bit-serial architectures may be too slow, and bit-parallel architectures may be faster than necessary and may require too much hardware. The desired sample rate in these applications can be achieved using the digit-serial approach, where multiple bits of a sample are processed in a single clock cycle.
Download full Lenght Paper......
|
131-140
|
Quantification Of Agility Of A Supply Chain Using Fuzzy Logic. Nomesh Bolia, Pranav Saxena and Jalaj Bhandari
Abstract:
We focus on the issue of performance evaluation in supply chains, in particular the concept of "Agility". All parameters of agility can be qualitatively judged in linguistic terms. We specifically target the problem of quantification of agility by using fuzzy logic and to develop an index for the same. In particular, we use triangular fuzzy numbers constructed on a standard scale for representing both the weightage and the performance of a particular parameter. We compute a closed form expression of the association function of the proposed performance index which is useful in defuzzification. The closed form expression is very useful for further mathematical treatment and is claimed to be one of central achievements of our work. We also develop a methodology called the Critical Parameter Identification (CPI) method to identify the most important parameters for enhancement in the overall agility index.
Download full Lenght Paper......
|
141-159
|
Selection Of Mixed Sampling Plan With CSP-3(k=i) Plan As Attribute Plan Indexed Through Mapd And Maaoq. R. Sampath Kumar, S. Sumithra and R. Radhakrishnan
Abstract:
In this paper a procedure for the construction and selection of the independent mixed sampling plan using MAPD and MAAOQ as quality standards with Continuous Sampling plan of the type CSP-3(k=i) as attribute plan is presented. Tables are constructed for the selection of parameters of the plan when MAPD and MAAOQ are given. Practical applications of the sampling plan are also discussed with suitable example.
Download full Lenght Paper......
|
160-169
|
TCP Analysis Under Various Mobile ADHOC
Networks. Ajay Dahiya and Dr.Parvinder Singh
Abstract:
A Mobile Ad-hoc Network (MANET) is a temporary wireless network composed of mobile nodes without any permanent infrastructure. Each node not only operates as an end system, it also acts as a router to forward packets on behalf of other nodes [1]. One of the best features of MANET is its flexibility and can configure itself in the fly and thus very suitable for the emergency situation. So in this paper we are trying to evaluate the performance of the ADHOC protocols and performing simulation on NCTUNs simulator and changing the properties of mobile nodes like number of nodes,obsatcles etc. We will consider AODV and ADV.
Download full Lenght Paper......
|
170-185
|
Information Leakage Prevented by Data Encryption using Smartcard. D. B. Shanmugam, P. Sathish Saravanan, T. Karthikeyan and N. Karthik
Abstract:
Information leakage has recently become a serious problem and most often a result of actions inside rather than outside the system that should be protecting the information. Although system administrators have high access authority, they should not know the disk encryption keys of users because they may not be authorized to read a user's sensitive information. Information leakage from a disk in a managed network (e.g., an enterprise network) is generally prevented by encrypting either the entire disk or just the confidential files stored on it. Since this encryption uses highly secure. Download full Lenght Paper......
|
186-207
|
Graph Factorization and its Application. Jayanta Kr. Choudhury, Anupam Dutta and Bichitra Kalita
Abstract:
In this paper, different types of factorization of graphs of the complete graphs K6m-2, K6m+2 and K6m for m=1 have been studied. An algorithm for the solution of TSP has been developed. Some theoretical investigations related to 3-factors, 2-factors and 1-factors have been discussed. Finally, some experimental results have been cited.
Download full Lenght Paper......
|
208-220
|
Effect of 2-Phosphono Butane 1, 2, 4, Tricarboxylic Acid on germination and seedlings of Vigna sinensis. B. L. Chavan and S. H. Pawar
Abstract:
There is an urgent need to develop suitable soil amendments to resolve the problem. The attempts have been made to test 2-Phosphono Butane 1,2,4, Tricarboxylic Acid (Codex-551) as one of the chemical amendment for saline soil. The present work is based on the observation of seed germination Vigna sinensis (Cowpea) variety-Pusakomal in different concentrations of Codex-551. The work was carried out under laboratory conditions. The Vigna sinensis seedling growth were in 20 ppm, 40 ppm, 60 ppm, 80 ppm and 100 ppm of Codex-551 concentrations and control consisted of soil suspension of saline-alkaline black cotton soil without any treatment. After 7 days in control the lowest (1.4 cm) root length and (1.10 cm) shoot length was observed while in 60 ppm, highest root length up to (3.2 cm) and shoot length up to (5.5 cm) was observed.
Download full Lenght Paper......
|
221-231
|
Cost Estimation of Dynamic Programming Algorithm For Solution of Graphical as well as Network Problems for minimum path. Anand Kumar Dixit, Manish Jain, Adarsh Srivastava and Ashish Misra
Abstract:
The cost estimation for any algorithm defines the running time for that algorithm means to say how much time it taken to produce the solution. It defines the performance of algorithm.
The dynamic programming approach is a problem solving technique that solves problems by dividing them into sub problems. Dynamic programming is used when the sub problems are not independent e.g. when the share the same sub problems.
Download full Lenght Paper......
|
232-243
|
A Study of Social Networking Systems and its impact. Raunak Narayan
Abstract:
Socio-economic environment is continuously changing due to technological advancement and new means of communication. The reflection of it is evident in the lifestyle of the people. The impact of it is more prominent in the young generation. The easy receptibility to technological advancement of this generation, who have grown up with personal computers, cell phones, and the internet, are now taking their place in a world where the only constant is, rapid change. Although, the outlook of the young generation varies from place to place due to social and economic conditions, an increased use and familiarity with communications, media, and digital technologies is the feature of Generation Y. The 2001 census indicated that nearly one-third of the Indian population is in the age group of young adolescents and young adults. This statistics makes this study more desirable.
Download full Lenght Paper......
|
244-256
|
GSM Based Call Conference System. C. Kavitha, A.Venkat Ramana, K. Narendra Swaroop and S. SushmaRaj
Abstract:
In the present scenario, a business firm can have multiple branches across the country or the world. To communicate with the branches, there are plenty of communication systems available. One such is the GSM based call conference system. A communication link can be established between the central office and its branches using this technology. A hardware circuit has been designed using 8051 microcontroller to connect the sub-branches with its zones. Software has been developed using VB to connect the main office and the branches. The project reduces the effort and time to make announcements and to connect to multiple zones in the sub-branch. Moreover, it is a low cost technology as the components which are required to implement the technology are inexpensive and easily available in the market. Further this technology can be enhanced with more features.
Download full Lenght Paper......
|
257-271
|
Deep web Data Integration Approach Based on Schema and Attributes Extraction of Query Interfaces. Mr. Gopalkrushna Patel, Anand Singh Rajawat and Mr. Satyendra Vyas
Abstract:
The deep web is becoming a collection of informative resource unlike the conventional web information that allow retrieval of the contents into the Deep Web only accessible through source query interfaces. However, there may be many query interfaces for any domain of interest that users need to access them in order to get the desired information. Accesing the information is a time consuming processes and requires building an integrated query interface over the sources. The first important task in our research is schema extraction from source query interface and second is automatic extracting attributes from the query interface and automatically translating a query, is a solvable way for addressing the current limitations in accessing Deep Web data sources. In this paper, we present a effective Deep web data integration approach based on Schema and Attributes Extraction of Query Interfaces.
Download full Lenght Paper......
|
272-284
|
Investment Pattern in Debt Scheme of Mutual Funds - An Analytical Study. A. Palanisamy, A. Sengottaiyan And G. Palaniappan
Abstract:
A Mutual Fund is a trust that pools together the savings of a number of investors who share a common financial goal. All such investors buy units in a fund that best suit their needs - be it growth in capital, regular returns or safety of capital. Therefore, mutual fund is the most suitable investment for the common man as it offers an opportunity to invest in a diversified, professionally managed basket of securities at a relatively low cost. For this study, among various mutual fund investors are identified in Coimbatore City. For this purpose the sample respondents have been selected who has been involved in trading activates in Coimbatore City. The most important and basic factor to be decided to select the sampling unit was intended to find out the investment pattern in debt scheme of mutual funds. Therefore the sampling unit during this research was the retail investors.
Download full Lenght Paper......
|
285-301
|
Study Of Customer Preferences To Choose An Organised Retail Outlet - A Case Study Of Ranchi. Dr. Kameshwar Mishra and Abhinav Kumar Shandilya
Abstract:
Retailing is in existence in one or another form since the formation of society. The people use to purchase their daily needs in small quantities from the retailers whenever required and the retailer keeps a stock on behalf of consumers to meet the demand. Retailing was limited to small family owned business for long time. Later big retail chains came into the retailing business and there was a sea change in the retailing market. However, even today the traditional family owned retail outlets are doing their business and enjoying their share of cake. The traditional small family owned retail shops, also known as "moms and pops" shops are termed as unorganized retailing and the big retail chains with all the possible comfort of purchase experience comes under organized retailing.
Download full Lenght Paper......
|
302-318
|
Role of Information Technology In Dissemination And Development of Education. Navneet Saxena, Deepak Sharma and Nimisha
Abstract:
Information technology has been developed to provide education in different fields like marketing, engineering, arts etc. Some of the technological tools use information technology to spread out or promote education and training. This paper also focuses on the description of various tools and techniques which are used to promote education like portable computers, electronic books, mobiles, pc's etc. Basically internet is the key in promoting education by learning and understanding these concepts the way of spreading and promoting education becomes not going so tougher as it was previously. These tools and technologies are mirror of for future educational environment. E-learning and mobile learning opens the way of learning new things in new and an interesting manner. E-books and digital libraries are also the new concepts related with the promotion of education.
Download full Lenght Paper......
|
319-323
|
VLSI Design Of Low Power High Speed Domino Logic. Ms. Rakhi R. Agrawal and Dr. S. A. Ladhake
Abstract:
Simple to implement, low cost designs in CMOS Domino logic are presented. These designs require less transistors and are full Domino logic compatible while they attain better performance compared to the standard Domino logic implementations. Wide fan-in logic such as domino circuits is used in high-performance applications. Dynamic domino logic circuits are widely used in modern digital VLSI circuits. The novel feature of dynamic circuits is often favoured in high performance designs because of the speed advantage offered over static CMOS logic circuits. This paper compares static CMOS, domino (dynamic) logic design implementations.
Download full Lenght Paper......
|
324-330
|
Multirate Signal Processing Approaches. Ms. Purvi U. Gandecha and Dr. S. A. Ladhake
Abstract:
Multirate Signal Processing studies Digital Signal Processing systems which include sample rate conversion. This technique is used for systems with different input and output sample rates, but may also be used to implement systems with equal input and output rates. We are going to study the architecture of multirate signal processing circuits that is Upsampler, Downsampler, Interpolator and Decimator in this paper.
Download full Lenght Paper......
|
331-337
|
Campus To Corporate: A Game Of Transition. Vandana Kathuria
Abstract:
Every student has to face one of the biggest challenges i.e. the transition from campus (college) to corporate life. Corporate life offers several challenges which young aspiring candidates often are unprepared for. Freshers out of college need guidance to make this transition smooth. This paper explains how a college life is and how corporate world demands i.e. about corporate culture, also this paper tells you the about the basic skills that a person need to take care of to make this transition from campus to corporate smooth and easy.
Download full Lenght Paper......
|
338-346
|
Development of Virtual Experiment on Flip Flops Using virtual intelligent SoftLab. Bhaskar Y. Kathane and Pradeep B. Dahikar
Abstract:
The scope of this paper includes study and implementation of Flip-flops. In this research paper we have formulated how experiments on flips flops are performed using the concept of virtual Intelligent SoftLab (VIS). A D-Type Flip flop, T-Type Flip flop and Master slave Flip flop constructed by J-K flip flop using the Virtual SoftLab and observed actual outputs. VIS helps us to create results using visual display. Software for conducting the experimentations in Flip flop has been developed which helps students to perform and practice the experiments. VIS model determine the logic operation of J-K flip flops. We made connection and observe the state transition of J-K Flip flop with VIS Model.
Download full Lenght Paper......
|
347-357
|
Association Rule in Data Mining For Large Transactional Database. Abhishek Kumar Maheshwari
Abstract:
Data mining is a technology to explore, analyze (knowledge discovery from data) the data and At last, extract the interesting (non-trivial, implicit, previously unknown and potentially useful) pattern or knowledge from huge amount of data. In this paper, we discuss about the problem in online mining of data in large transactional database, here we apply association rule for mining the data which helps to remove the redundant rule and helps in compact representation of rules for user. In this paper, optimized algorithm has been proposed for online rule generation. The advantage of this algorithm is that the graph generated in our algorithm has less edge as compared to the lattice used in the existing algorithm. This algorithm generated all the essential rules and no rule is missing.
Download full Lenght Paper......
|
358-380
|
Paper in Hindi. Ramchander Rana
|
381-386
|