Fixed Point Of Multivalued Mapping On Polish Space |
Author : Yogita R. Sharma |
Abstract | Full Text |
Abstract :A general fixed point theorem, that incorporates several known random fixed point theorems, involving continuous random operators, is proved. |
|
A Review Paper On Firewall |
Author : Dr. Ajit singh, Madhu Pahal, Neeraj Goyat |
Abstract | Full Text |
Abstract :A firewall is a software that establishes a security perimeter whose main task is to block or restrict both incoming and outgoing information over a network. These firewalls are basically not effective and appropriate for corporate environments to maintain security of information while it supports the free exchange of views. In this paper, we study network firewall that helps the corporate environment as well as the other networks that want to exchange information over the network. A firewall protects the flow of traffic over internet and is less restrictive of outward and inward information and also provide internal user the illusion of anonymous FTP and www connectivity to internet. |
|
Cyclic Prefix Based Channel Estimation of Single Carrier - Frequency Domain Equalization |
Author : Smrati Singh Sachan, D r . A n i l K u m a r S h a r m a |
Abstract | Full Text |
Abstract : For the mobile communication, single carrier cyclic prefixed (SC-CP) with frequency domain equalizer (FDE) is favourable and robust channel estimation. Conventional SC-CP wireless system uses training sequences that put in every packet to get the channel information. Channel State Information (CSI) is the crucial parameter that should be available at the receiver. Correct channel estimation is very important to the implementation of any communication system. In wireless communication system, data is often transmitted through unknown channel. This state of information is generally obtained at the receiver by sending training sequence from transmitter to receiver repeatedly and a training algorithm is performed by the receiver on the observed channel output and the known input to the channel. Since, training sequence is sent with the data frame, these solution results in loss of net throughput. A different way of obtaining CSI has been explored in this paper, making use of the transmitted information i.e. cyclic prefix itself and without adding any training symbols. This obviates the need for training sequences and results in overall increase in throughput. |
|
Cyber Security in India’sTourism |
Author : Peeyush Vyas |
Abstract | Full Text |
Abstract : The growing use of ICT for administration of all the spheres of our daily life cannot be ignored. Also, we also cannot ignore the need to secure the ICT infrastructures used for meeting social function like Tourism. Tourism is a very large industry in India. India has the fifth rank among countries with the fastest growing tourism industry according to the data given by World Travel and Tourism Council. Every year thousand of foreign tourists arrive in India mainly from Union Territories, Unites States and UK. Also, domestic tourists visit the states like Uttar Pradesh, Andhra Pradesh, Tamil Nadu, Himachal Pradesh, Jammu & Kashmir, Chennai, Delhi, Mumbai and many more places. So, the threat of Cyber Security in India’s tourism has put an immense challenge during the last so many years. The threat attacks in resorts, hotels, banks, tourist offices and across all the major tourist places have become an inadequate mechanism to address this challenge |
|
Direct torque control of three Phase induction motor using matlab |
Author : Narender Kumar, Mr. Joginder Singh |
Abstract | Full Text |
Abstract : Induction machines are widely employed in industries due to their rugged structure, high maintainability and economy than DC motors. There has been constant development in the induction motor drive system and their implementation in industrial applications. The improvement of switching speed of power electronic devices has enabled control techniques which possess high switching frequency and feasibility of high efficiency drive systems. In this pretext, Direct Torque Control (DTC) was introduced to obtain quick and better dynamic torque response. The DTC scheme in its basic configuration comprises torque and flux estimator DTC controller, stator voltage vector selector and voltage source inverter. Direct Torque Control of induction motor has increasingly become the best alternative to Field- Oriented Control methods. The performance of an induction motor under the classical Direct Torque Control method and improved scheme have been studied and confirmed by simulation using MATLAB . |
|
Future MOSFET Devices using high-k (TiO2) dielectric |
Author : Prerna |
Abstract | Full Text |
Abstract :In this paper, an 80nm NMOS with high-k (TiO2) was designed and fabricated to study its electrical characteristics. ATHENA & ATLAS module of SILVACO software are used in simulating the electrical performance of the transistor. The parameters under simulation were the threshold voltage (Vt), Id-Vg & Id-Vd Characteristics. High-k gate technology is a strong alternative for replacing the conventional SiO2 gates in MOSFETs for both high performance and low power applications. High-k oxides offer a solution to leakage problems that occurs as the gate oxide thickness is scaled down. Non-ideal effects such as short channel effects mainly channel modulation and drain induced barrier lowering (DIBL) are investigated in it. It is observed in the results that the threshold voltage could be varied by changing the above mentioned device parameters. The effectiveness is also observed on performance parameters of the MOSFET such as drain induced barrier lowering, sub-threshold slope and threshold voltage. Hence device engineering would play an important role in optimizing the device parameters. |
|
A Review paper on Routing Protocol Comparison |
Author : Ms. Aastha kohli, Dr. Sukhbir |
Abstract | Full Text |
Abstract :This paper presents a broad study on the work of common MANET (mobile adhoc network) routing protocols. The routing protocols used in this study include AODV, DSR and DSDV which consist of a mixture of reactive and proactive protocols. The paper is a survey of research on routing protocols for MANET. The paper has been made to compare three well know protocols AODV, DSR and DSDV by using three performance metrics packet delivery ratio, average end to end delay and routing overhead. The comparison has been done by using simulation tool NS2, NAM (Network Animator) and excel graph which is used for preparing the graphs from the trace files. |
|
Advanced Chord Algorithm |
Author : Vikash Jaglan Dr. Sukhvir Singh |
Abstract | Full Text |
Abstract :Network is a peer to peer (P2P) increasing popularity and now over a day. Systems on top of peer-peer overlay network abstraction of the machine or the physical network topology. Networks for structured and unstructured two types of networks are peer-to-peer name. The network peer to peer unstructured is not applied to cover the network structure. No network unstructured peer provide any organization or network connection optimized algorithms. The structural arrangement of such networks, according to specific rules or algorithms nodes provides specific performance and coverage topology. Therefore, the structure of the peer network coverage link to be set. They are typically distributed hash table (DHT) indexes, such as Chord system. Chord algorithm is relatively simple and successful alternative program to promote the diffusion of structured P2P network, but it must be better to further improve search efficiency. Therefore, this paper aims to improve the Chord structured P2P network discovery process. In order to improve search efficiency, the other to introduce this routing table in the counterclockwise direction, and the original routing table (in the clockwise direction search). Simulation results show that this method improves the work efficiency chord structured P2P network search process to reduce the number of hops. |
|
Mobile robot Navigation Techniques: A Survey |
Author : Vikas Verma |
Abstract | Full Text |
Abstract :This paper describes the developments of different basic techniques for mobile robot navigation during the last 10 years. Now a day’s mobile robots are vastly used in many industries for performing different activities. Controlling a robot is generally done using a remote control, which can control the robot to a fixed distance, we discuss three basic techniques for mobile robot navigation the first technique is the combination of neural network and Fuzzy logic makes a neuro fuzzy approach. Second method is the Radio frequency technique which is control system for a robot such that the mobile robot is controlled using mobile and wireless RF communication. Third method is robot navigation using a sensor network embedded in the environment. Sensor nodes act as signposts for the robot to follow, thus obviating the need for a map or localization on the part of the robot. Navigation directions are computed within the network (not on the robot) using value iteration. |
|
Mobile Technology: The Strategic Impact Of Mobile Communications Within An Organization |
Author : Abhinav Sharma, Mahesh Chandra Sharma |
Abstract | Full Text |
Abstract : Mobile Technology is a growing field converging mobile computing with telecommunications in a wireless environment that has become more robust in its own right. This convergence of mobile communications enables an organization and its individual workforce to become more flexible in communication as well as work structure. Mobile technology is enabling an organization to work together or separately on a global basis while maintaining its collaborative information sharing capabilities. This allows for a near-seamless work environment to maintain its operational tempo as a work force is dispersed temporarily or on a permanent basis globally. With the evolution of faster, more robust mobile technologies, organizations and the workforce are breaking out of the traditional work environment and moving into the global community allowing them to be continually tied into the virtual office. This thesis is intended to show how mobile technology has reshaped the strategic vision of an organization and has affected society on a global scale. As society moves forward, mobile technology will continue to play a greater role in the strategic direction of organizations and on individual lives. People always strive for the perfect work/life balance based on an individual’s perceived notion of how that balance is defined. Mobile technology plays a significant role in today’s society increasing an organization’s productivity as it relates to its strategic goal, but also enhancing the lives of individuals outside of work. Organizations are realizing the benefits mobile communications bring and the results of successfully leveraging mobile technology. Each new generation of people grow up more mobile savvy and more comfortable with technology. This drives the ability of an organization to more successfully implement and use mobile technology to its advantage. |
|