Advanced Institute of Technology and Management

Palwal, India

Advanced Institute of Technology and Management

Palwal, India
SEARCH FILTERS
Time filter
Source Type

Ahuja R.,Jaypee Institute of Information Technology | Saini V.,Amazon | Banga A.,Advanced Institute of Technology and Management
Advances in Intelligent Systems and Computing | Year: 2017

A mobile ad hoc network (MANET) is a continuously self-configuring, infrastructureless network of mobile devices connected without wires. Ad hoc is Latin and means “for this” (i.e., for this purpose). The nodes also act as router. Routing is an important aspect of MANETs which is used to find the route which can be used for communication. Traditionally, routing protocols were focused on performance only. But security is also an important aspect. Due to limited bandwidth, limited storage capacity, dynamic topology, shared medium, open peer-to-peer communication, security in MANETs is difficult to implement compared to wired networks. There are number of attacks on routing protocols like routing table overflow attack, black hole attack, wormhole attack, route cache poisoning, sybill attack, modification, fabrication, location spoofing attacks, etc., which affect the functioning of MANETs and degrade the performance. So, there is need to secure routing protocols so that their functioning is not affected and performance is not degraded due to these attacks. A new way of detection and prevention of wormhole attack is proposed in this paper. Dynamic Source Routing (DSR) is converted into multipath routing protocol by changing the way intermediate node forwards the route request packet. The QualNet 5.0.2 simulator [1] is used to validate the proposed approach. Two new packets Dummy_Request and Dummy_Reply are introduced to check the vulnerability of the path. The format of these packets is same as route reply except the option type. The performance parameters used are packet delivery ratio and throughput. The results show that packet delivery ratio and throughput under wormhole attack is less compared to protocol without wormhole attack and theMultipath Routing Wormhole Detection and Prevention Protocol (MRWDPP) improves performance under wormhole attack. © Springer Science+Business Media Singapore 2017.


Attri R.,YMCA University of Science and Technology | Grover S.,YMCA University of Science and Technology | Dev N.,YMCA University of Science and Technology | Kumar D.,Advanced Institute of Technology and Management
International Journal of Systems Assurance Engineering and Management | Year: 2013

In the highly competitive environment, to be successful and to achieve world-class-manufacturing, organizations must possess both efficient maintenance and effective manufacturing strategies. A strategic approach to improve the performance of maintenance activities is to effectively adapt and implement strategic TPM initiatives in the manufacturing organizations. Total productive maintenance (TPM) is not easy to adopt and implement, due to presence of many barriers. The purpose of this paper is to identify and analyse these barriers. A questionnaire based survey was conducted to rank these barriers. The results of this survey and interpretive structural modelling approach have been used to model and analyse key barriers and drive managerial insights. © 2012 The Society for Reliability Engineering, Quality and Operations Management (SREQOM), India and The Division of Operation and Maintenance, Lulea University of Technology, Sweden.


Attri R.,YMCA University of Science and Technology | Grover S.,YMCA University of Science and Technology | Dev N.,YMCA University of Science and Technology | Kumar D.,Advanced Institute of Technology and Management
International Journal of Systems Assurance Engineering and Management | Year: 2013

Total Productive maintenance (TPM) is increasingly implemented by many organizations to improve their equipment efficiency and to obtain the competitive advantage in the global market in terms of cost and quality. But, implementation of TPM is not an easy task. There are certain enablers, which help in the implementation of TPM. The utmost need is to analyse the behaviour of these enablers for their effective utilization in the implementation of TPM. The main objective of this paper is to understand the mutual interaction of these enablers and identify the 'driving enablers' (i.e. which influence the other enablers) and the 'dependent enablers' (i.e. which are influenced by others). In the present work, these enablers have been identified through the literature, their ranking is done by a questionnaire-based survey and interpretive structural modelling (ISM) approach has been utilized in analysing their mutual interaction. An ISM model has been prepared to identify some key enablers and their managerial implications in the implementation of TPM. © 2012 The Society for Reliability Engineering, Quality and Operations Management (SREQOM), India and The Division of Operation and Maintenance, Lulea University of Technology, Sweden.


Kumar E.,Gautam Buddha University | Rajotiya R.N.,Advanced Institute of Technology and Management
International Journal of Advancements in Computing Technology | Year: 2011

MANET consist of a group of wireless nodes, which cooperate with each other by forwarding packets to enable multi-hop communications. This type of network requires no centralized or fixed network infrastructure [11]. Since the node may change their position unpredictably, the data transmission can be temporarily disrupted if any link on the path fails. Unless an alternate path is immediately available, the packets are likely to be lost or delayed. To overcome this problem [2] suggest some technique such as using the two-hop routing information and data buffering [1][2]. The route caching [9] has been suggested in many papers but the data packet buffering has been given little attention. In this paper we propose the new design for enhancing the performance of MANET by buffering the data and providing an alternate path for the packet to reach their destination.


Basu P.K.,Echelon | Pujahari R.M.,Echelon | Pujahari R.M.,Manav Rachna International University | Kaur H.,Manav Rachna International University | And 4 more authors.
Solar Energy | Year: 2010

Sodium hydroxide (NaOH) and sodium hypochlorite (NaOCl) solution (1:1 ratio by volume) based texturization process at 80-82°C is an easy, low cost and comparatively new and convenient option for fabrication of any multicrystalline silicon (mC-Si) solar cell. In the present study atomic force microscope is used to observe the intragrain surface in a miniscule area (3μm×3μm) of NaOH-NaOCl textured surface by two and three dimensional analysis, roughness analysis and section analysis. The r.m.s value of the surface parameter of 7.0nm ascertains the smoothness of the textured surface and further the surface reflectivity is minimized to 4-6% in the 500-1000nm wavelength range by a proper silicon nitride anti-reflection coating. Comparing with the standard HF-HNO3-CH3COOH acid textured cell, the NaOH-NaOCl textured cell shows a comparatively lower value of series resistance of 7.17mΩ, higher value of shunt resistance of 18.4Ω to yield a fill factor of 0.766 leading to more than 15% cell efficiency in the industrial cell processing line. This AFM study yields different surface roughness parameters for the NaOH-NaOCl textured wafers which can be used as a reference standard for optimized texturing. © 2010 Elsevier Ltd.


Ahuja R.,Jaypee University of Information Technology | Ahuja A.B.,Advanced Institute of Technology and Management | Ahuja P.,CMN Procurement Mould and Die Group
2013 IEEE 2nd International Conference on Image Information Processing, IEEE ICIIP 2013 | Year: 2013

Routing in wireless network is fundamental task which helps node to send and receive packets. Due to lack of centralized authority security in mobile ad hoc networks is very difficult. Traditionally, routing protocols were designed for good performance only and security issues were not considered. So either new routing protocols should be designed which have security parameter also or security parameters must be included in the existing routing protocol. There are number of attacks on routing protocol, one of them is wormhole attack. We will evaluate the performance of AODV and DSR routing protocol under wormhole attack and compare the performance of these protocol without wormhole attack. Performance parameters are Average end to end delay, Throughput, and Packet delivery ratio(PDR). We will use Qualnet Simulator 5.0. © 2013 IEEE.

Loading Advanced Institute of Technology and Management collaborators
Loading Advanced Institute of Technology and Management collaborators