E-ISSN 0976-3945  
  International Journal of Advanced Engineering Technology
                                                                    -An Open Access Peer Reviewed e-Journal
       Home Online Submission Current Issue Past Issue

 
 

TQM IN MANAGEMENT EDUCATION SYSTEM IN MADHYA PRADESH

Authors: Dr. A. K. Dwivedi

IJAET/ Volume VI/ Issue IV/ Oct.-Dec..'2015/01-02

ABSTRACT
This paper deals with the TQM in Management Education System in Madhya Pradesh. There has been much discussion in recent years about the “fall” of TQM, particularly in higher education, where TQM is viewed as “dated”. How has this state of affairs arisen? There is clearly a need, therefore, for specific studies that demonstrate the reality of their effectiveness and the viability of their implementation. TQM may escape the critical attention of researchers, because it is not firmly founded in traditional sociological or organizational theory. The key question which relates to the interface between the quality system and higher education institution is whether this kind of quality system can help higher education institutions to improve the quality of their academic, research and services to society. Fitness of this quality management system in higher education is a controversial issue.

REMOVAL OF SELECTIVE BLACK HOLE ATTACK WITH UPSTREAM NODE AND DOWNSTREAM NODE ALARM SYSTEM BY DYNAMIC SOURCE PROTOCOL (DSR)

Authors: Anu Priya, Amit Puri

IJAET/ Volume VI/ Issue IV/ Oct.-Dec..'2015/03-07

ABSTRACT
This research paper is based on black-hole attack in the Mobile Ad-hoc Network (MANET). This is an attack occurs due to malicious nodes, which attracts the data packets by falsely advertising a false route to the destination. Wireless networks are gaining popularity to its peak today, as the users want wireless connectivity at every geographic position. There is an increasing problem of attacks on the Mobile Ad-hoc Networks (MANET). Black hole attack is one of the security threat in which the traffic is redirected to such a node that actually does not exist in the network. The nodes advertise itself in such a way to the node that it can attack other nodes and networks knowing that it has the shortest path. MANETs must have a secure way for communication which is quite challenging. In order to provide secure communication and transmission, researcher working specifically on the security issues in MANETs, and provide us secure routing protocols..

APPLICABILITY ASSESSMENT OF WASTE MATERIAL IN PLAIN CONCRETE

Authors: Prof. Dinesh B. Sathavara

IJAET/ Volume VI/ Issue IV/ Oct.-Dec..'2015/08-10

ABSTRACT
This paper a study has been carried out how to reduce the impact on the environment due to industrial and agricultural waste products such as Rise Husk Ash, Coir fiber and cotton fiber which are the waste products of paddy, textile and agricultural industry. This paper presents a parametric experimental study, which investigates the potential use of waste material combination for producing new low-cost and lightweight composite as a building material. Use of this material in concrete is not only improves strength of concrete but also leads to the proper disposal of these materials, resulting in reducing the impact of these materials on environment. The dynamic behavior of waste material is practically unknown. In this work, the effect of waste product content on properties of concrete is studied. To evaluate the efficiency of waste material improving the properties of the concrete the performance of plain concrete is used a reference. Compressive strength, modulus of elasticity, splitting tensile strength and modulus of rupture were determined for all waste material and plain concrete specimens.

DETECTION AND PREVENTION OF SQL INJECTION ATTACKS USING NOVEL METHOD IN WEB APPLICATIONS

Authors: Tejinderdeep Singh Kalsi, Navjot Kaur

IJAET/ Volume VI/ Issue IV/ Oct.-Dec..'2015/11-15

ABSTRACT
In today’s era, Web applications play a very great role in individual life as well as in the development of the any country. The use of web application has become raisingly popular in our daily life as reading newspaper, making online payments for shopping etc. A SQL injection attack imposes a serious threat to the insurance of web applications because they may give attackers unrestricted access to databases that contain sensitive information. This paper gives an overview to the SQL Injection attacks (SQLIA) and methods how to prevent them. We will discuss all the proposed models to stop SQL Injections. In this paper we present a detail on numerous types of SQL injection attacks and prevention technique for web application. We also describes the technique to prevent injections attacks occurring due to dynamic SQL statements in database stored procedures, which are often used in e-commerce applications. Along with presenting our findings from the study, we also note down future expectations and possible development of countermeasures against SQL Injection attacks.

TO DESIGN MECHANISM FOR THE EVALUATION OF DETECTION AND DEFENSE PROTOCOLS AGAINST CYBER ATTACKS WITH SIMULATION MODELS

Authors: Randeep Kaur, Rasleen Kaur

IJAET/ Volume VI/ Issue IV/ Oct.-Dec..'2015/16-21

ABSTRACT
Distributed denial of service attacks interrupts the availability of a services or applications in the internet or network. DDOS is defined as an attack in which multiple damage machines and vulnerable systems are used to attack a single destination or victim machine to make the services or application unavailable to its intended users. The goals of DDOS attacks are first it overloads the server with unwanted and unnecessary traffic which may lead to crash and second goal is to obtain the bandwidth by generating the huge amount of unwanted traffic. This research is based on modelling and simulating different scenarios using NeSSi2 and ns-2 as network simulation tools.

STATE OF ART REVIEW OF HAZARDS & RISK ASSOCIATED WITH VIADUCT WORK AND SUGGESTION TO IMPROVE SAFETY

Authors: Bikarama Prasad Yadav*, Dr.N.A.Siddiqui, Dr Ashutosh Gautam

IJAET/ Volume VI/ Issue IV/ Oct.-Dec..'2015/22-25

ABSTRACT
Most Indian metro cities are facing the problem of traffic congestion, arising from indiscriminate use of personal vehicles, due to lack of an effective transport system to meet the demands of increasing population. An effective public transport system can not only ease the traffic flow but also improve the air quality of a region by taking personal vehicles off the road in large numbers.
Providing an effective rail or road transport system requires construction of viaducts for safe and congestion free movement of traffic. Viaducts also facilitate connecting existing network over otherwise difficult terrain and optimized use of available land. Construction of rail and road network requires working in hazardous environment. Rail and road construction work at ground level is hazardous but this hazard increases manifold for work above ground level.
As per estimates given by Occupational Safety Administration (OSHA), UK more than 10 % of the workers involved in viaduct construction meet accidents ranging from minor injuries to fatality. Therefore, the importance of reviewing the existing safety measures and suggestions to improve the existing safety record cannot be undermined.
This paper reviews the existing safety practices and standards followed by viaduct construction industries. The causes of high accident rate are identified and suggestions are given to improve the safety of workers involved in viaduct construction, thereby, drastically bringing down the number of injuries.

DATA CONFIDENTIALITY OF SHARING KNOWLEDGE USING CLIENT SERVER MODEL

Authors: Areti Aswini Priyanka and K. Rajesh Kumar

IJAET/ Volume VI/ Issue IV/ Oct.-Dec..'2015/26-27

ABSTRACT
In general, sharing of data is used many practitioners. During the sharing of data is used by client-server communication model. DTN’s are wireless devices that carry confidential information from one place to another. ABE (Attribute based encryption) is two types called KP-ABE and CP-ABE. KP-ABE contains only one key, CP-ABE contains set of keys. In this paper, we proposed a military network technique is used in key authorities for data sharing purposes. The experimental results conducted on this model.

A REGRESSION METHOD FOR COST BENEFIT ANALYSIS OF CLOUD COMPUTING ON MULTILAYER MODEL

Authors: Rahul Sharma, Samandeep Singh

IJAET/ Volume VI/ Issue IV/ Oct.-Dec..'2015/28-33

ABSTRACT
Cloud Computing is described as a type of computing that relies on sharing computing resources rather than having local server or personal device to handle various applications. In Cloud Computing, the word cloud is used as a metaphor for the Internet so the phrase cloud computing means a type of Internet-based computing, where different services as servers, storage and applications are provided to the organization computers and devices through the internet. One of the key feature of cloud computing is the flexibility that it offers and one of the ways that it offers flexibility through the scalability. This refers to ability of a system to adapt and scale to changes in workload. Cloud technology allows for the automatic provision and deprivation of resource as and when it is necessary, thus ensuring that the level of resource available is as closely corresponds to current demand as possible. In this work an approach is proposed which facilitate to completely decentralize dynamic VM when overload/ under load is detected. Also the need of power consumption and energy efficiency in cloud computing model is investigated and supported by this research..

ENHANCING CLOUD SECURITY BY USING HYBRID ENCRYPTION SCHEME

Authors: Vibhey Bhangotra, Amit Puri

IJAET/ Volume VI/ Issue IV/ Oct.-Dec..'2015/34-40

ABSTRACT
Cloud computing is a developed computing model in which resources of the computing infrastructure are provided as utilities over the Internet. As likely as it is, this paradigm also brings forth many new challenges for data safeness and access control when customers outsource delicate data for sharing on cloud servers, which are not within the same trusted domain as data owners. This paper addresses this challenging open issue by, on one hand, defining and requiring access policies depend on data attributes, and, on the other hand, allowing the data owner to delegate most of the computing tasks involved in fine- grained data access control to untrusted cloud servers without disclosing the basic data contents. We attain this target by accomplishing and uniquely combining techniques of message Digest encryption (MD5), alternate re-encryption, and slow re-encryption. Our proposed scheme also has salient properties of user access right confidentiality and customer private key accountability. Extensive analysis shows that our proposed scheme is highly efficient and provably secures under existing security models.

PARAMETRIC OPTIMIZATION OF ANGULAR DISTORTION ON MILD STEEL BY USING MIG WELDING

Authors: Praful Kumar

IJAET/ Volume VI/ Issue IV/ Oct.-Dec..'2015/41-46

ABSTRACT
Welding induced distortion is a common problem in industries like shipbuilding, railroad, aerospace, pressure vessels, pipes and automotive etc. During the fabrication of welded steel structures, the problem of welding distortion arises to the fabricators, which affects the integrity and service behavior of the structures. In order to deal with this problem, it is necessary to predict the specific type and amount of distortion resulting from the welding operations.
Angular distortion is a major problem and most pronounced among different types of distortion in the butt welded plates. This angular distortion is mainly caused by the non-uniform extension and contraction through thickness direction due to the temperature gradient. Restriction of this distortion by restraints may lead to higher residual stresses. However, if the magnitude of the angular distortion is predictable, these can be reduced by providing initial angular distortion in the negative direction. It is difficult to obtain a complete analytical solution to predict angular distortion that may be reliable over a wide range of processes, materials, and process control parameters. Presently, several analytical methods and empirical formulas have been developed to give quantitative information. In this study, the statistical method of three factors, two level full factorial design has been used to develop mathematical model to correlate angular distortion in metal inert gas. The distortion is found to be significantly influenced by no of passes, time gap between successive passes and joint gap. Direct and interaction effects of the process parameters are also analyzed and presented in the graphical form.