Kumar S.,Haryana Engineering College |
Bhatia R.,D. C. R. University of Science and Technology
2011 IEEE 3rd International Conference on Communication Software and Networks, ICCSN 2011 | Year: 2011
Today the software researchers and the industry specialists are paying more attention towards the component based software development. It is a powerful tool to enhance the productivity and accelerate the development time. There are different areas for which the components can be developed. This is well formulated in the 3C model . There are two concepts in the field of software reusable process. One is development with reuse and other is development for reuse . Development with existing reusable software components is known as the development with reuse. One should follow a software life cycle to develop the software. The artifacts resulting from the software life cycle phases can be reused. Our work deals with the extraction of software components from the software design phase. Many researchers have proposed the extraction of software components from the software design. Some of them are based on Unified Modeling Language (UML). These techniques focused on the various models and their corresponding inter and intra relationships. Our method is also based on UML but have a different perspective. It describes various models and their relationships. The information about the models and their relationships has been extracted not from the model directly but from their corresponding petal/mdl (model description language) files. Petal/mdl is an unstructured representation of the information contained in the various UML diagrams like use case, class, sequence etc in textual format. Extracted information is mapped into database tables to form clusters. The process of clustering is to facilitate the retrieval of components so as to gain high precision and recall. © 2011 IEEE.
Kumar R.,Singhania University |
Gill S.,Global Research Institute of Management and Technology |
Kaushik A.,Haryana Engineering College
Proceedings - 2011 International Conference on Communication Systems and Network Technologies, CSNT 2011 | Year: 2011
The following research paper describe the use of genetic algorithm for operating system process scheduling problem. The scheduling problem is consider as NP hard problem. Genetic algorithm is consider as meta heuristic optimization tool. The main aim of genetic algorithm is to adapt itself according to the problem under consideration. The power of genetic algorithm is depends upon its operators such as crossover, mutation, inversion, reproduction etc. crossover operator has exploitive property. In this paper we use different type of cross over operator with constant crossover and mutation probability. The convergence state, adaptability and performance of genetic algorithm is varying according to the crossover and mutation operator used. © 2011 IEEE.
Kamboj A.,Haryana Engineering College |
Kumar S.,Noida Institute of Engineering and Technology |
Singh H.,National Institute of Technology Kurukshetra
Journal of Mechanical Science and Technology | Year: 2015
In drilling process, burr plays an important role on the quality parts. It is necessary to minimize the burr height. This paper presents the effect of CNC drilling process parameters like cutting speed, feed rate, step angle and cutting environment on burr height and hole diameter error of Al6063/15%/SiC composites. The composites are fabricated using mechanical stir casting. An experimental study on composites was conducted using three HSS drills. The Taguchi design of experiments and analysis of variance (ANOVA) are used to optimize the response for Al6063/15%/SiC composites. The results revealed that the quality of the holes can be improved by proper selection of cutting process parameters. SEM analysis and XRD analysis are also carried for composite, drilled surface and drill bits. These analysis provide the good agreement with the effect of cutting parameters on burr height and hole diameter error. © 2015, The Korean Society of Mechanical Engineers and Springer-Verlag Berlin Heidelberg.
Sachdeva S.,NIMS University |
Singh M.,Haryana Engineering College |
Singh U.P.,Seth Jai Parkash Mukand Lal Institute of Engineering and Technology JMIT |
Arora A.S.,Sant Longowal Institute of Engineering And Technology
Advances in Fuzzy Systems | Year: 2011
Today, it is very important for developed and developing countries to consume electricity more efficiently. Though developed countries do not want to waste electricity and developing countries cannot waste electricity. This leads to the concept: load forecasting. This paper is written for the short-term load forecasting on daily basis, hourly, or half-hourly basis or real time load forecasting. But as we move from daily to hourly basis of load forecasting, the error of load forecasting increases. The analysis of this paper is done on previous year's load data records of an engineering college in India using the concept of fuzzy methods. The analysis has been done on Mamdani-type membership functions and OFDM (Orthogonal Frequency Division Multiplexing) transmission scheme. To reduce the error of load forecasting, fuzzy method has been used with Artificial Neural Network (ANN) and OFDM transmission is used to get data from outer world and send outputs to outer world accurately and quickly. The error has been reduced to a considerable level in the range of 2-3. For further reducing the error, Orthogonal Frequency Division Multiplexing (OFDM) can be used with Reed-Solomon (RS) encoding. Further studies are going on with Fuzzy Regression methods to reduce the error more. © 2011 Sandeep Sachdeva et al.
Kalra R.,Haryana Engineering College |
Kalra R.,Rayat Bahara Group of Institutions |
Singhal A.,Haryana Engineering College |
Singhal A.,Rayat Bahara Group of Institutions |
And 4 more authors.
Communications in Computer and Information Science | Year: 2011
Cryptography is an emerging technology, which is important for network security. Research on cryptography is still in its developing stages and a considerable research effort is still required for secured communication. This paper is devoted to the security and attack aspects of cryptographic techniques. The simulation based information content test such as Entropy, Floating Frequency, Histogram, N-gram, Autocorrelation and Periodicity on ciphers is done. The simulation based Randomness test such as Frequency test, Pokers test, Serial test, Long run test on ciphers are done using CrypTool. Finally, we have benchmarked proposed MAES cryptographic algorithm in search for the best compromise in security. © 2011 Springer-Verlag.
Sharma A.,Haryana Engineering College |
Kakkar A.,Thapar University |
Sachdeva S.,Haryana Engineering College
2012 IEEE International Conference on Signal Processing, Computing and Control, ISPCC 2012 | Year: 2012
In Present Era, Optical networks satisfy the requirement of high transmission bandwidth by providing several T bits/s transmissions. Need of high data rates increasing continuously as data traffic continues to increase at the rapid rate of 40 % to 70 % per year. WDM (Wavelength Division Multiplexing) based Optical networks purposes the solution to meet the demands of high bit rate and inline amplifiers to increase transmission distance in order to efficiently utilize the Fiber Capacities by dividing its huge bandwidth into a set of disjoint wavelength bands. The solution can also be cost effective as the existing physical network can be used. In this paper a Fiber Optic Simulator (FOSP) is introduced, used to optimize Physical properties of fiber in order to get high velocity. Further wavelength assignment techniques (First Fit, Random Fit) & WDM networks with wavelength conversion is analyzed in terms of their blocking probability. Analysis shows that WDM networks designed with wavelength converters gives the best performance among all the wavelength assignment techniques. A shortest path algorithm (Dijkastra's algorithm) is followed in order to select shortest path among the network to speed up the data transfer. © 2012 IEEE.
Sharma N.,Haryana Engineering College |
Verma B.,Haryana Engineering College |
Kaur A.,Chitkara University
Proceedings on 2015 1st International Conference on Next Generation Computing Technologies, NGCT 2015 | Year: 2015
It has been observed that amongst all the 22 languages being used Devanagari script is being the primary and most widely used script. Devanagari is used for writing the Hindi language in India. In this paper Energy Efficient Devanagari Unicode Reader has been designed. Devanagari is used for writing the Hindi language in India. In this paper Devanagari Unicode Reader code has been implemented on Xilinx ISE Design Suite 14.2 and the results of 28nm FPGA platform has been compared with the 40nm technology. Impedances of transmission line, port and device should be equal in order to avoid reflection in transmission line which is a usual problem in hardware design. So SSTL logic family has been used at input and output ports so as to avoid such reflections. The power analyses had been done at different frequencies ranging from 1 THZ to 1 MHZ using different IO standards of SSTL logic family. Out of 40nm (Virtex -6) and 28nm(Artix-7),maximum power has been saved in case of 28nm(Artix-7) when the device is operating at frequency of 1MHZ on SSTL18IIOstandard. © 2015 IEEE.
Jain A.,Maharishi Markandeshwar University |
Jain A.,Haryana Engineering College |
Panwar S.,Maharishi Markandeshwar University |
Kumar S.,Maharishi Markandeshwar University
International Journal of Applied Engineering Research | Year: 2012
The studies of semiconductor core shell nanoparticles have advanced at a rapid pace because of the fact that their optical properties can be systematically tuned by varying their sizes. However, the optical properties of QDs have been found to be very sensitive to the physical and chemical properties of their surfaces. Core shells are compounds with specific characteristics and varied uses. Their high fluorescence and narrow spectrum shape makes them an excellent tagging alternative to conventional fluorescent dyes. During the past three decades, extensive research has been performed on the properties and uses of core shell nanoparticles. There are several viable methods to make quantum dots, but not all produce dots that can be used for environmental and biological testing. Properties (and therefore uses) are determined in part by the materials that quantum dots are made from as well as how the dots are made. © Research India Publications.
Bhushan S.,Haryana Engineering College |
Dave M.,National Institute of Technology Kurukshetra |
Patel R.B.,Deenbandhu Chhotu Ram University of Science and Technology
International Journal of Mobile Computing and Multimedia Communications | Year: 2011
In structured and unstructured Peer-to-Peer (P2P) systems, frequent joining and leaving of peer nodes causes topology mismatch between the P2P logical overlay network and the physical underlay network. This topology mismatch problem generates high volumes of redundant traffic in the network. This paper presents Common Junction Methodology (CJM) to reduce network overhead by optimize the overlay traffic at underlay level. CJM finds common junction between available paths, and traffic is only routed through the common junction and not through the conventional identified paths. CJM does not alter overlay topology and performs without affecting the search scope of the network. Simulation results show that CJM resolves the mismatch problem and significantly reduces redundant P2P traffic up to 87% in the best case for the simulated network. CJM can be implemented over structured or unstructured P2P networks, and also reduces the response time by 53% approximately for the network. © 2011, IGI Global.