An ad hoc wireless network is a collection of mobile nodes establishing an instant network without any fixed topology. Furthermore, each node acts as both router and host concurrently, and can travel out or link up in the network freely. In such a network, designing of routing protocol is a significant and important issue and therefore, new challenges are there in ad hoc routing protocols scheme. Hence traditional routing algorithms are unsuitable for betterment of ad hoc networks. Recent research emphases on the different types of routing protocols for enhancement and compared these protocols with existing metrics of network. Since network energy is an important parameter to improve the network lifetime. In this paper, presents the multicost parameters based DSDV (MPB-DSDV) routing protocol to enhance the energy efficient of ad hoc networks. The modification adapted in DSDV makes it a more suitable routing protocol and simulate the result of the help of the performance metrics like End to End Delay, Packet Delivery Ratio, Routing Overhead and Throughput of wireless ad hoc networks. The proposed multicost parameters based DSDV algorithm can lead to energy consumption, improving the network performance than regular DSDV routing protocol.
Key words: Ad hoc networks, DSDV protocol, Energy, Multicost, MPB-DSDV, Network performance.
[2] Khatri P, Rajput M, Shastri A, Solanki K. Performance study of ad-hoc reactive routing protocols. Journal of Computer Science. 2010, 6(10): 1130-1134.
[3] Wang Kai, Gao Yang-yang, Guan Jian-feng, Qin Ya-juan. MDSDV: a modified DSDV routing mechanism for wireless mesh networks, Science direct, December 2011, 18 (Suppl. 2): 34–39.
[4] Tao Wan Evangelos Kranakis P.C. van Oorschot.Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV).International Conference on Information and Communications Security Malaga, Spain. October 27-29, 2004. LNCS vol. 3269, pp.358-374.Springer-Verlag
[5] Khaleel Ur Rahman Khan, Rafi U Zaman,A.Venugopal.The Performance of the Extended DSDV, MANET Routing Protocol and its Suitability in Integrated Internet-MANET, IJSSST, Jan 2009,Vol. 10, No. 2
[6] Charles E.Perkins, T.J. Watson, Pravin Bhagwat.Proceeding SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications Pages 234-244, ACM New York, NY, USA ©1994
[7] Anand, Dheeraj Kumar; Prakash, Shiva. International Journal of Advances in Engineering & Technology;Nov2012, Vol. 5 Issue 1, p526
[8] Nikos Karagiorgas, PanagiotisKokkinos, ChristosPapageorgiou, Emmanouel Varvarigos.Joint multi-cost routing and power control in wireless ad hoc networks, Wireless Networks, Springer, 2010 16:2263–2279
[9] Agarwal, S., Krishnamurthy, S. V., Katz R. H., & Dao, S. K, Distributed power control in ad hoc wireless networks, IEEE international symposium on Personal, Indoor and Mobile Radio Communications (PIMRC) 2001.
[10] Papageorgiou, C., Kokkinos, P., & Varvarigos, E. Multicostrouting over an infinite time horizon in energy and capacity constrained wireless ad hoc networks. Euro-Par.2006.
[11] Loganathan D and Ramamoorthy P, ―Multicost Routing Approach in Wireless Ad hoc Networks‖, Journal of Computer Science (JCS) 8 (10): 1739-1748, pp. 3773- 3778. Science Publications, 2012
[12] Liu, L., & Feng, G. Simulated annealing based multi constrained QoS routing in mobile ad hoc networks. International Journal of Wireless Personal Communications, 2007. 41(3), 393–405.
[13] Ns—network simulator, http://www.isi.edu/nsnam/.
Keywords –English learning, process-oriented, quantitative assessment, tertiary index, virtual training
[2] A. Szucs, A. Tait, and M. Vidal and U. Bernath, Distance and E-learning in Transition: Learning Innovation, Technology and Social Challenges (ISTE and John Wiley & Sons, UK and USA, 2009).
[3] M. Bahl, and J. Hom, Quantitative Assessment of the Impact of the Service-Learning Course "Mental Health and the Veteran Population: Case Study and Practicum" on Undergraduate Students, Stanford Undergraduate Research Journal, spring, 2006.
[4] U. Jamornmann, Techniques for Assessing Students‟ eLearning Achievement, International Journal of the Computer, the Internet and Management, 12(2), 2004, 26 -31.
[5] http://en.wikipedia.org/wiki/Blended_learning
[6] Zhongwen Liu, Integrating Virtual Training into ESP Learning:Hybrid English for Policing Model, Theory and Practice in Language Studies, 2(6), 2012, 1243-1248.
[7] Tae-sik Kim, Towards the Design of an Interactive U-Learning System, Journal of Security Engineering,9(2), 2012,189-198.
[8] Littlewood, W., Process-oriented pedagogy: facilitation, empowerment, or control? ELT Journal, 63, 2008, 246-254.
[9] Zhongwen Liu, Virtual Policing in English: A Trainee-centered Pedagogy for Web-mediated Curricular Learning and Field Training, Journal of Software, 8(2), 2013, 344-350.
[10] WEI Li, Development and Application of Transcripts in Experiential and Web-mediated ESP Learning, International Journal of Engineering Research and Development, 6(5), 2013, 30-34.
Keywords –Static Password, One Time Password, Encrypted OTP, Mobile based login,
[1] V. A. Brennen. (2004). Cryptography Dictionary, vol. 2005, 1.0.0 ed. [Online]. Available: http://cryptnet.net/fdp/crypto/crypto-dict/en/crypto- dict.html
[2] M. Abadi, L. Bharat, and A. Marais, "System and method for generating
[3] unique passwords," U.S. Patent 6 141 760, 1997.
[4] [Online]: research.microsoft.com/apps/pubs/default.aspx?id=132349
[5] [Online]:www.slideshare.net/ttnjal/200804NISnetNFCNoll
In this paper we discuss the existence of solutions defined in C [0,T ] for boundary value problems
for a nonlinear fractional differential equation with a integral condition. The results are derived by using the
Ascoli-Arzela theorem and Schauder-Tychonoff fixed point theorem.
Keywordsu -Riemann_Liouville fractional derivative and integral, boundary value problem, nonlinear
fractional differential equation, integral condition, Ascoli-Arzela theorem and Schauder-Tychonoff fixed point
theorem.
[1] Ahmad B and Nieto J.J., Riemann-Liouville fractional integro-differential equations with fractional nonlocal integral boundary
conditions. Boundary Value Problems, 2011, 2011:36.
[2] Ahmad B. and Ntouyas S. K., Boundary Value Problems for Fractional Differential Inclusions with Four-Point Integral
Boundary Conditions, Surveys in Mathematics and its Applications, 6 (2011), 175-193.
[3] Barrett, J.H., Differential equation of non-integer order, Canad. J. Math., 6 (4) (1954), 529-541.
[4] Darwish M.A. and Ntouyas S.K., On initial and boundary value problems for fractional order mixed type functional differential
inclusions, Comput. Math. Appl. 59 (2010), 1253-1265.
[5] Goldberg, R.R., Methods of Real Analysis, John Wiley and Sons, Inc, USA (1976).
[6] Hamani S., Benchohra M. and Graef J.R., Existence results for boundary value problems with nonlinear fractional differential
inclusions and integral conditions, Electron. J. Differential Equations 2010, No. 20, 16 pp.
[7] Kilbas, A.A., Srivastava, H.M. and Trujillo, J.J., Theory and Applications of Fractional Differential Equations. Elsevier (North-
Holland), Math. Studies, 204, Amsterdam (2006).
Keywords : Concrete, quarry dust, super plasticizer, inhibitor, chloride ingress, corrosion resistance, durability
[1] R. Ilangovan And K.Nagamani "Application Of Quarry Rock Dust As Fine Aggregate In Concrete Construction". National Journal On Construction Management: Nicmr, Pune, December.Pp.5-13, 2006
[2] Raman, S.N., Md Safiuddin And Zain, M.F.M. "Non – Destructive Of Flowing Concretes Incorporating Quarry Waste", Asian Journal Of Civil Engineering [Building And Housing] Vol.8, No.6, Pp. 597 -614,2007.
[3] R. Ilangovan, N.Mahendran And K.Nagamani "Strength And Durability Properties Of Concrete Containing Quarry Rock Dust As Fine Aggregate". Arpn Journal Of Engineering And Applied Science, Vol.3, No.5, October 2008
[4] M.Shahul Hameed And A.S.S.Sekar, "Properties If Green Concrete Containing Quarry Rock Dust And Marble Sludge Powder As Fine Aggregate" Arpn Journal Of Engineering And Applied Science, Vol.4, No.4, October 2009.
[5] R.Murugesan, N.R.Chitra, P.Saravanakumar, "Effect Of Partial Replacement Of Sand By Quarry Dust In Concrete With And Without Super Plasticizer" Proceedings Of The National Conference On Concrete Technology For The Future, Pp,167-170, 2006.
[6] Prachoom Khamput " A Study Of Compressive Strength Of Concrete Using Quarry Dust As Fine Aggregate And Mixing With Admixture Type E", Rajamangla University Of Technology Thanyaburi, Pathumthani, Thailand, 2005.
[7] Sahu A.K., Sunil Kumar And Sachan A.K. "Quarry Stone Waste As Fine Aggregate For Concrete". The Indian Concrete Journal. Pp. 845-848, 2003.
[8] R. Ilangovan And K.Nagamani "Studies On Strength And Behavior Of Concrete By Using Quarry Dust As Fine Aggregate". Ce And Cr Journal, Newdelhi. October.Pp.40-42, 2006 .
[9] R.Vedalakshmi And N.S.Rengasamy, "Quality Assurance Tests For Corrosion Resistance Of Steel Reinforcement"The Indian Concrete Journal, April 2000.
[10] Allan Crane, P. "Corrosion Of Reinforcement In Concrete Construction", Society Of Chemical Industry, London. Publishers Ellis Horwood Ltd., First Edition, 1983.
[11] Ha-Won Song, Velu Saraswathy, " Corrosion Monitoring Of Reinforced Concrete Structures – A Review", International Journal Of Electrochemical Science, No. 2 , 1- 28 ,2007.
[12] Videm, "Corrosion Of Reinforcement In Concrete. Monitoring, Prevention And Rehabilitation". Efc No: 25. London, Pa.104-121.E, 1998.
Keywords : Non-starch Polysaccharide enzymes, probiotics, basal diet, gut health, live weight gain.
[1] Altaf-Ur-Rahman, MohsinAli,Shoaib Sultan, And Nazir Ahmad, Effect Ofdietaryprobiotic Supplementation On Performance Of Broilers,Sarhad Journal Ofagriculture, Vol. 23, 2007,No. 2.
[2] Yeo-Jinmo, Kim-Kyuil, J. M. Yeo, And Kim K.I. Effect Of Feeding Diets Containing An Antibiotic, A Probiotic, Or Yucca Extract On Growth And Intestinal Urease Activity In Broilerchicks,Poultry Science, 76, 1997, 381-385.
[3] Zuanon, J.A.S, Fonseca, J.B, Rostagno, H, Almeida, M-De-Silva, And Silva, M. Effects Of Growth Promoters On Broiler Chicken Performance,Revistabrasileira De, 27,1998,999-1005.
[4] Maldonado Galdeano, C, De Moreno De Leblanc, A, Vinderola, G, Bibasbonet, M. E. And Perdigon, G. Proposed Model: Mechanisms Of Immunomodulation Induced By Probiotic Bacteria,ClinicalAnd Vaccine Immunology, 14,2007,485-492.
[5] Fuller, R. (1992). ProbioticstheScientific Basis. (Chapman AndHall, London).
[6] Koenen, M. E, Karmer, J, Van Der Hulst, R, Heres, L, Jeurissen, S. H. And Boersma, W. J. Immunomodulation By Probiotic Lactobacilli In Layer And Meat-Type Chickens,British Poultry Science, 45,2004,355-366.
[7] Mountzouris, K. C, Tsitrsikos, P, Palamidi, I, Arvaniti, A, Mohnl, M, Schatzmayr, G. And Fegeros, K. EffectsOf Probiotic Inclusion Levels In Broiler Nutrition On Growth Performance, Nutrient Digestibility, Plasma Immunoglobulins And Cecalmicroflora Composition. Poultry Science, 89,2010, 58-67.
[8] National Research Council,Nutrient Requirements Of Poultry, (9th Ed. National Academy Press, Washington, DC, 1994)
[9] AOAC.Official Methods Of Analysis Of Association Of Official Analytical Chemists,(18thEdition Virginia, USA, Association Of Official Analytical Chemists, 2005).
[10] Clayden, E. C,PracticalSection Cutting And Staining,(4thEdition, J And Churchil Limited,1962).
[11] Culling, C. F. A,Hand Book Of Histopathological Techniques,(London Butterworth Andcompany, Publisher Ltd,1957).
[12] Duncan, D. D. Multiple Range And Multiple 'F'Test, Biometrics, 11:1955, 1-42.
Keywords : Index terms: LSB, Cryptography.
[1] Saurabh Singh, "Hiding Image to Video" in International Journal of engineering science & technology Vol. 2(12), 6999-7003,
2010.
[2] Marghny Mohamed, "Data hiding by LSB substitution using genetic optimal key permutation " in International arab journal of etechnology
,vol.2,no 1 January 2011.
[3] A.K. Al Frajat "Hiding data in video file An overview" Journal of applied sciences 10(15):1644-1649, 2010.
[4] Ali K Hmood, " An overview on hiding information technique in images" Journal of applied sciences 10(18)2094-2100, 2010.
[5] Mohammed A.F. Al husainy"Image Steganography by mapping pixel to letters" in Journal of computer science 5(1),33 -38, 2009
[6] M. Abomhara , "International journal of computer theory and engineering" ,volume 2 ,1793-8201,2010
[7] Liu bin "an Image method based on correlation analysis and image fusion" in IEEE applied International conference on parallel
and distributed computing, application and technology0-7695-2405-2/05, 2005
[8] P. Mohan Kumar" A new approach for hiding data in image using image domain methods" in International journal of computer
and internet security volume 2, 69-80, 2011.
[9] A.K. Al Frajat "Hiding data in video file An overview" Journal of applied sciences 10(15):1644-1649,2010
[10] P. Mohan Kumar" A new approach for hiding data in image using image domain methods" in International journal of computer
and internet security volume 2, 69-80, 2011.
[1]. http://en.wikipedia.org/wiki/Forward-swept_wing
[2]. http://www.google.co.in/imghp?hl=en&tab=wi
[3]. http://en.wikipedia.org
[4]. http://en.wikipedia.org/wiki/Forward-swept_wing
[5]. http://en.wikipedia.org/wiki/Elliptical_wing [6]. Aircraft design by R.B. Damania , A.A.Lebedinski, A.K.Rao [7]. Aircraft conceptual design by Mohamed Sadrey [8]. Wing design by Mohamed Sadrey [9]. Wing design by Daniel .P. Raymer
Keywords :Supply chain management system, Bullwhip effect, Fuzzy Logic, Rationing & Shortage gaming.
[1] Baganha M, Cohen M., "The stabilizing effect of inventory in supply chains". Operations Research; 46:572–83, 1998.
[2] Barbuceabu, M., Fox, M.S., "The Information Agent: An Infrastructure Agent Supporting Collaborative Enterprise Architectures", report of Enterprise Integration, University of Toronto, 19995.
[3] Cachon GP, Lariviere MA., "Capacity choice and allocation: strategic behavior and supply chain performance". Management Science; 45(8):1091–108, 1999.
[4] Cachon GP., "Managing supply chain demand variability with scheduled ordering policies", Management Science, Vol. 45, No. 6, pp. 843–56, 1999.
[5] Caglayan, A., Harrison, C., "Agent Sourcebook", John Willey & Sons, 19997.
[6] Carlsson C., Fuller R., Reducing the bullwhip effects by means of intelligent, soft computing methods. Proceeding of the 34th Hawaii International Conference on System Science, 2001.
[7] Carlsson C., Fuller R. On possibilistic mean value and variance of fuzzy numbers, Fuzzy Sets and Systems, (122), 315-326, 2001.
[8] Chauhan, D., "JAFMAS: A Java_based Agent Framework for Multi-Agent Systems Development and Implementation", Technical Report, ECECS Department, University of Cincinnati, 1997.
[9] Chen F, Drezner Z, Ryan J, Simchi-Levi D, Quantifying the bullwhip effect in a simple supply chain: the impact of forecasting, lead-times, and information. Management Science; 46(3):436–43, 2000.
[10] Chen F, Decentralized Supply Chains Subject to Information Delays, Management Science, Vol. 45, No. 8, 1076-1090, 1999.
[11] Chen, Y., Peng, Y., Labrou, Y., A negotiation-based multi-agent system for supply chain management. Working Notes of the gents'99 Workshop on Agents for Electronic Commerce and Managing the Internet-Enabled Supply Chain, Seattle, WA, April, 15–20, 1999.
[12] Chen F, Drezner Z, Ryan J, Simchi-Levi D., "Quantifying the bullwhip effect in a simple supply chain: the impact of forecasting, lead-times, and information", Management Science; Vol. 46, No. 3 pp. 436–43, 2000.
Keywords : Grid Computing, Reliability, Resources etc.
[1] U. Karthick Kumar, "A Dynamic Load Balancing Algorithm in Computational Grid Using Fair Scheduling, International Journal Of Computer Science and Informatics Vol. 8, Issue 5, No 1, September 2011 ISSN (Online): 1694-0814.
[2] Dr. K. Vivekanandan, D.Ramyachitra, "A Study on Scheduling in Grid Environment", International Journal on Computer Science and Engineering (IJCSE), ISSN : 0975-3397 Vol. 3 No. 2 Feb 2011.
[3] Sachin Kumar, Niraj Singhal, " A Priority based Dynamic Load Balancing Approach in a Grid based Distributed Computing Network", International Journal of Computer Applications (0975 – 8887) Volume 49– No.5, July 2012 11
[4] Pawandeep Kaur, Harshpreet Singh, "Adaptive dynamic load balancing in grid computing an approach,"International journal of engineering science & advanced technology , ISSN: 2250–3676 Volume-2, Issue-3, 625 – 632, May-Jun 2012.
[5] R.Gogulan, A.Kavitha, U.Karthick Kumar, "Max Min fair scheduling algorithm using in grid scheduling with load balancing", International Journal of Research in Computer Science eISSN 2249-8265 Volume 2 Issue 3 (2012) pp. 41-49.
[6] Prabhat Kr. Srivastava, "Improving Performance in Load Balancing Problem on the Grid Computing System", International Journal of Computer Applications (0975 – 8887) Volume 16– No.1, February 2011
[7] Qin Zheng Chen-Khong Tham Bharadwaj Veeravalli, "Dynamic Load Balancing and Pricing Dynamic Load Balancing and Pricing in Grid Computing with Communication Delay, November 2, 2010
[8] Belabbas Yagoubi and Yahya Slimani, "Dynamic Load Balancing Strategy for Grid Computing," Journal of Information Technology and Applications Vol. 1 No. 4 Mar ch,2007, pp. 285-296.
[9] Belabbas Yagoubi and Yahya Slimani, "Dynamic Load Balancing Strategy for Grid Computing," World Academy of Science, Engineering and Technology 19 2006.
[10] A book ,"An introduction to grid computing", By Bart Jacob, Michael Brown, Kentaro Fukui, Nihar Trivedi, IBM/Redbooks December 2005.