El documento describe las etapas del procesamiento de información en una computadora, incluyendo la digitación de texto en Word 2007, la impresión de texto, el encendido del equipo, la carga del sistema operativo Windows y una secuencia binaria.
Second order and Third order NLO studies of L- alanine crystals grown in aque...Editor IJCATR
Nonlinear optics is a fascinating field, which plays a vital role in the emerging field of photonics and optoelectronics. A
nonlinear optical crystal of L-alanine grown in aqueous solution of hydrofluoric acid is done by slow evaporation method. L-alanine is
an NLO material and it has a Second Harmonic Generation (SHG) efficiency of about 0.3 times that of KDP. To alter the various
properties of L-alanine, single crystals of L-alanine have been grown in the aqueous solution of hydrofluoric acid. In this work, Lalanine
was admixtured with hydrofluoric acid (LAHF) in the molar ratio of 1:1. The grown crystals were colorless and transparent
and they were subjected to various studies for characterization.The third-order nonlinearities of LAHF crystal have been investigated
by Z-scan method. The values of nonlinear refractive index (n2), the nonlinear absorption coefficient (β) and third-order nonlinear
susceptibility (χ(3)) are estimated for the sample
A Reliable Routing Technique for Wireless Sensor NetworksEditor IJCATR
Wireless Sensor Network (WSN) consists of very large number of sensor nodes which are deployed close to the area which
is to be monitored so as to sense various environmental conditions. WSN is a data-driven network which produces large amount of data
and also sensor nodes are energy-limited devices and their energy consumption is mainly associated with data routing. Therefore it is
necessary to perform redundant data aggregation so as to save energy. In this work data aggregation is achieved with the help of two key
approaches namely Clustering approach and In-network data aggregation. These two approaches help to save energy and thereby
increasing the lifetime of the network. The proposed work has some key features like reliable cluster formation, high data aggregation
rate, priority of packets, minimized overhead, multiple routes, reduced energy consumption which enhance the network lifetime. The
performance evaluation of the proposed approach is carried out using Network Simulator- version 2
Second order and Third order NLO studies of L- alanine crystals grown in aque...Editor IJCATR
Nonlinear optics is a fascinating field, which plays a vital role in the emerging field of photonics and optoelectronics. A
nonlinear optical crystal of L-alanine grown in aqueous solution of hydrofluoric acid is done by slow evaporation method. L-alanine is
an NLO material and it has a Second Harmonic Generation (SHG) efficiency of about 0.3 times that of KDP. To alter the various
properties of L-alanine, single crystals of L-alanine have been grown in the aqueous solution of hydrofluoric acid. In this work, Lalanine
was admixtured with hydrofluoric acid (LAHF) in the molar ratio of 1:1. The grown crystals were colorless and transparent
and they were subjected to various studies for characterization.The third-order nonlinearities of LAHF crystal have been investigated
by Z-scan method. The values of nonlinear refractive index (n2), the nonlinear absorption coefficient (β) and third-order nonlinear
susceptibility (χ(3)) are estimated for the sample
A Reliable Routing Technique for Wireless Sensor NetworksEditor IJCATR
Wireless Sensor Network (WSN) consists of very large number of sensor nodes which are deployed close to the area which
is to be monitored so as to sense various environmental conditions. WSN is a data-driven network which produces large amount of data
and also sensor nodes are energy-limited devices and their energy consumption is mainly associated with data routing. Therefore it is
necessary to perform redundant data aggregation so as to save energy. In this work data aggregation is achieved with the help of two key
approaches namely Clustering approach and In-network data aggregation. These two approaches help to save energy and thereby
increasing the lifetime of the network. The proposed work has some key features like reliable cluster formation, high data aggregation
rate, priority of packets, minimized overhead, multiple routes, reduced energy consumption which enhance the network lifetime. The
performance evaluation of the proposed approach is carried out using Network Simulator- version 2
Order Size Dependent Trade Credit Study in a Three Echelon Supply Chain ModelEditor IJCATR
In present study, we generalize order linked trade credit policy in three echelon supply chain system where manufacturer,
distributor and retailer are involved and manufacturer provide a delay period to distributor and distributor also provide a order linked
trade credit policy to his retailers. Whole study is discussed in time dependent production and demand rate. We model a three echelon
supply chain system as cost minimization to determine the system’s optimal cycle time. In this paper, we determine the optimal cycle
time, optimal order quantity and optimal payment time. Finally numerical examples are given to illustrate the result and the managerial
insights are also obtained
Implementation of FSM-MBIST and Design of Hybrid MBIST for Memory cluster in ...Editor IJCATR
In current scenario, power efficient MPSoC’s are of great demand. The power efficient asynchronous MPSoC’s with
multiple memories are thought-off to replace clocked synchronous SoC, in which clock consumes more than 40% of the total power. It
is right time to develop the test compliant asynchronous MpSoC. In this paper, Traditional MBIST and FSM based MBIST schemes
are designed and applied to single port RAM. The results are discussed based on the synthesis reports obtained from RTL Complier
from Cadence. FSM based MBIST is power and area efficient method for single memory testing. It consumes 40% less power when
compared with traditional MBIST. But, in case of multiple memory scenarios, separate MBIST controllers are required to test each
individual memories. Thus this scheme consumes huge area and becomes inefficient. A novel technique for testing different memories
which are working at different frequencies is in need. Therefore, an area efficient Hybrid MBIST is proposed with single MBIST
controller to test multiple memories in an Asynchronous SoC. It also includes multiple test algorithms to detect various faults. An
Asynchronous SoC with DWT processor and multiple memories is discussed in this paper, which will used as Design under Test
[DUT] and Hybrid MBIST is built around it to test the heterogeneous memories. The design is coded in Verilog and Validated in
Spartan-3e FPGA kit.
A Posteriori Perusal of Mobile ComputingEditor IJCATR
The breakthrough in wireless networking has prompted a new concept of computing, called mobile computing in which users tote
portable
devices have
access to a shared infrastructure, independent of their physical location. Mobile computing is becoming increasingly vital du
e to the
increase in the number of portable computers and the aspiration to have continuous network connectivity to the Internet i
rrespective of the physical
location of the node.
Mobile computing systems
are computing systems that may be readily moved physically and whose computing ability may be
used while they are being moved. Mobile computing has rapidly become a vital new examp
le in today's real world of networked computing systems. It
includes software, hardware and mobile communication. Ranging from wireless laptops to cellular phones and WiFi/Bluetooth
-
enabled PDA‟s to
wireless sensor networks; mobile computing has become ub
iquitous in its influence on our quotidian lives. In this paper various types of mobile
devices are talking and they are inquiring into in details and existing operation systems that are most famed for mentioned d
evices are talking. Another
aim of this pa
per is to point out some of the characteristics, applications, limitations, and issues of mobile computing
Anonymizing and Confidential Databases for Privacy Protection Using Suppressi...Editor IJCATR
The technique of k-anonymization has been proposed in the literature as an alternative way to release public information, while ensuring both data privacy and data confidentiality. “X” owns a k-anonymous database and needs to determine whether “X” database, when inserted with a tuple owned by “Y”, is still k-anonymous. Clearly, allowing “X” to directly read the contents of the tuple breaks the privacy of “Y”. In this place,”Y” not get the privacy of own information because the information of “Y” can be accessed by “X” without the prior knowledge of “Y”. On the other hand, the confidentiality of the database managed by “X” is violated once “Y” has access to the contents of database. Thus, the problem is to check whether the database inserted with the tuple is still k-anonymous, without letting “X” and “Y” knows the contents of the tuple and database respectively. In this paper, we propose two protocols solving this problem that is suppression-Based & Generalization-Based k-anonymous and confidential databases using through prototype architecture. And also those two protocols maintain privacy and confidential information in k-anonymous database.
Visual Image Quality Assessment Technique using FSIMEditor IJCATR
The goal of quality assessment (QA) research is to design algorithms that can automatically
assess the quality of images in a perceptually consistent manner. Image QA algorithms generally
interpret image quality as fidelity or similarity with a “reference” or “perfect” image in some perceptual
space. In order to improve the assessment accuracy of white noise, Gauss blur, JPEG2000 compression
and other distorted images, this paper puts forward an image quality assessment method based on phase
congruency and gradient magnitude. The experimental results show that the image quality assessment
method has a higher accuracy than traditional method and it can accurately reflect the image visual
perception of the human eye. In this paper, we propose an image information measure that quantifies the
information that is present in the reference image and how much of this reference information can be
extracted from the distorted image.
Efficient growth techniques and properties of Benzophenone Single Crystals fo...Editor IJCATR
Benzophenone is one of the promising organic NLO materials for their high energy laser photonic
applications and hence this review is mainly emphasized on the discussion of growth, efficiency and
applications of low melting organic NLO benzophenone crystals in order to improve their structural and
physical properties. To grow bulk and good quality benzophenone crystals by various techniques adopted has
been discussed such as slow evaporation method, Microtube-Czochralski method, and Vertical Bridgman
method. It is acknowledged that the size and the efficiency of the growing benzophenone single crystal varies
with that of the techniques we are using has been discussed below. The SHG efficiency of pure benzophenone
crystal also been compared with the standard KDP crystal. Also optical transparency behaviour of the
benzophenone crystal has also been reviewed.
Proposing an Appropriate Pattern for Car Detection by Using Intelligent Algor...Editor IJCATR
Nowadays, the automotive industry has attracted the attention of consumers, and product quality is considered as an
essential element in current competitive markets. Security and comfort are the main criteria and parameters of selecting a car.
Therefore, standard dataset of CAR involving six features and characteristics and 1728 instances have been used. In this paper, it
has been tried to select a car with the best characteristics by using intelligent algorithms (Random Forest, J48, SVM,
NaiveBayse) and combining these algorithms with aggregated classifiers such as Bagging and AdaBoostMI. In this study, speed
and accuracy of intelligent algorithms in identifying the best car have been taken into account.
A Dependent Set Based Approach for Large Graph AnalysisEditor IJCATR
Now a day’s social or computer networks produced graphs of thousands of nodes & millions of edges. Such Large graphs
are used to store and represent information. As it is a complex data structure it requires extra processing. Partitioning or clustering
methods are used to decompose a large graph. In this paper dependent set based graph partitioning approach is proposed which
decomposes a large graph into sub graphs. It creates uniform partitions with very few edge cuts. It also prevents the loss of
information. The work also focuses on an approach that handles dynamic updation in a large graph and represents a large graph in
abstract form.
Agent based P ersonalized e - Catalog S ervice S ystemEditor IJCATR
With the emergence of the e
-
Catalog, there has been an increasingly wide application of commodities query in distribut
ed
environment in the field of e
-
commerce. But e
-
Catalog is often autonomous and heterogeneous, effectively integrating and querying
them is a delicate and time
-
consuming task. Electronic catalog contains rich semantics associated with products, and serves
as a
challenging domain for ontology application. Ontology is concerned with the nature and relations of being. It can play a cruc
ial role
in e
-
commerce as a formalization of e
-
Catalog. User personalized catalog ontology aims at capturing the users' inter
ests in a working
domain, which forms the basis of providing personalized e
-
Catalog services.
This paper describes a prototype of an ontology
-
based
Information retrieval agent.
User personalized catalog ontology aims at capturing the users' interests in a
working domain, which
forms the basis of providing personalized e
-
Catalog services.
In this paper, we present an ontological model of e
-
Catalogs, and design
an Agent based personalized e
-
Catalog service system (ABPECSS), which achieves match user personal
ized catalog ontology and
domain e
-
Catalog ontology based on ontology integrated
A Review on Parameter Estimation Techniques of Software Reliability Growth Mo...Editor IJCATR
Software reliability is considered as a quantifiable metric, which is defined as the probability of a software to operate
without failure for a specified period of time in a specific environment. Various software reliability growth models have been proposed
to predict the reliability of a software. These models help vendors to predict the behaviour of the software before shipment. The
reliability is predicted by estimating the parameters of the software reliability growth models. But the model parameters are generally
in nonlinear relationships which creates many problems in finding the optimal parameters using traditional techniques like Maximum
Likelihood and least Square Estimation. Various stochastic search algorithms have been introduced which have made the task of
parameter estimation, more reliable and computationally easier. Parameter estimation of NHPP based reliability models, using MLE
and using an evolutionary search algorithm called Particle Swarm Optimization, has been explored in the paper.
Neural Network, Fuzzy Logic, Employability, Sugeno type inference, Education,...Editor IJCATR
Cloud Computing has been growing over the last few years as a result of cheaper access to high speed Internet connection
and many applications that comes with it. Its infrastructure allows it to provide services and applications from anywhere in the world.
However, there are numerous technical, non-technical and security issues that come with cloud computing. As cloud computing
becomes more adopted in the mainstream, these issues could increase and potentially hinder the growth of cloud computing. This
paper investigates what cloud computing is, the technical issues associated with this new and evolving computing technology and also
the practical applications of it. It also addresses and highlight the main security issues in cloud computing
Study of Cross-Site Scripting Attacks and Their CountermeasuresEditor IJCATR
In present-day time, most of the associations are making use of web services for improved services to their
clients. With the upturn in count of web users, there is a considerable hike in the web attacks. Thus, security becomes
the dominant matter in web applications. The disparate kind of vulnerabilities resulted in the disparate types of attacks.
The attackers may take benefit of these vulnerabilities and can misuse the data in the database. Study indicates that
more than 80% of the web applications are vulnerable to cross-site scripting (XSS) attacks. XSS is one of the fatal
attacks & it has been practiced over the maximum number of well-known search engines and social sites. In this paper,
we have considered XSS attacks, its types and different methods employed to resist these attacks with their
corresponding limitations. Additionally, we have discussed the proposed approach for countering XSS attack and how
this approach is superior to others.
Mafalda está más viva que nunca. Reaparece siempre fresca y renovada en sus nuevos libros y periódicos. Hace cine y televisión. Viaja en la imaginación colectiva de infinidad de naciones que son muy diferentes entre ellas culturalmente. Y llega a los lugares más insospechados, volviéndose familiar a generaciones que no tienen nada que ver con la que vio nacer a Mafalda
Order Size Dependent Trade Credit Study in a Three Echelon Supply Chain ModelEditor IJCATR
In present study, we generalize order linked trade credit policy in three echelon supply chain system where manufacturer,
distributor and retailer are involved and manufacturer provide a delay period to distributor and distributor also provide a order linked
trade credit policy to his retailers. Whole study is discussed in time dependent production and demand rate. We model a three echelon
supply chain system as cost minimization to determine the system’s optimal cycle time. In this paper, we determine the optimal cycle
time, optimal order quantity and optimal payment time. Finally numerical examples are given to illustrate the result and the managerial
insights are also obtained
Implementation of FSM-MBIST and Design of Hybrid MBIST for Memory cluster in ...Editor IJCATR
In current scenario, power efficient MPSoC’s are of great demand. The power efficient asynchronous MPSoC’s with
multiple memories are thought-off to replace clocked synchronous SoC, in which clock consumes more than 40% of the total power. It
is right time to develop the test compliant asynchronous MpSoC. In this paper, Traditional MBIST and FSM based MBIST schemes
are designed and applied to single port RAM. The results are discussed based on the synthesis reports obtained from RTL Complier
from Cadence. FSM based MBIST is power and area efficient method for single memory testing. It consumes 40% less power when
compared with traditional MBIST. But, in case of multiple memory scenarios, separate MBIST controllers are required to test each
individual memories. Thus this scheme consumes huge area and becomes inefficient. A novel technique for testing different memories
which are working at different frequencies is in need. Therefore, an area efficient Hybrid MBIST is proposed with single MBIST
controller to test multiple memories in an Asynchronous SoC. It also includes multiple test algorithms to detect various faults. An
Asynchronous SoC with DWT processor and multiple memories is discussed in this paper, which will used as Design under Test
[DUT] and Hybrid MBIST is built around it to test the heterogeneous memories. The design is coded in Verilog and Validated in
Spartan-3e FPGA kit.
A Posteriori Perusal of Mobile ComputingEditor IJCATR
The breakthrough in wireless networking has prompted a new concept of computing, called mobile computing in which users tote
portable
devices have
access to a shared infrastructure, independent of their physical location. Mobile computing is becoming increasingly vital du
e to the
increase in the number of portable computers and the aspiration to have continuous network connectivity to the Internet i
rrespective of the physical
location of the node.
Mobile computing systems
are computing systems that may be readily moved physically and whose computing ability may be
used while they are being moved. Mobile computing has rapidly become a vital new examp
le in today's real world of networked computing systems. It
includes software, hardware and mobile communication. Ranging from wireless laptops to cellular phones and WiFi/Bluetooth
-
enabled PDA‟s to
wireless sensor networks; mobile computing has become ub
iquitous in its influence on our quotidian lives. In this paper various types of mobile
devices are talking and they are inquiring into in details and existing operation systems that are most famed for mentioned d
evices are talking. Another
aim of this pa
per is to point out some of the characteristics, applications, limitations, and issues of mobile computing
Anonymizing and Confidential Databases for Privacy Protection Using Suppressi...Editor IJCATR
The technique of k-anonymization has been proposed in the literature as an alternative way to release public information, while ensuring both data privacy and data confidentiality. “X” owns a k-anonymous database and needs to determine whether “X” database, when inserted with a tuple owned by “Y”, is still k-anonymous. Clearly, allowing “X” to directly read the contents of the tuple breaks the privacy of “Y”. In this place,”Y” not get the privacy of own information because the information of “Y” can be accessed by “X” without the prior knowledge of “Y”. On the other hand, the confidentiality of the database managed by “X” is violated once “Y” has access to the contents of database. Thus, the problem is to check whether the database inserted with the tuple is still k-anonymous, without letting “X” and “Y” knows the contents of the tuple and database respectively. In this paper, we propose two protocols solving this problem that is suppression-Based & Generalization-Based k-anonymous and confidential databases using through prototype architecture. And also those two protocols maintain privacy and confidential information in k-anonymous database.
Visual Image Quality Assessment Technique using FSIMEditor IJCATR
The goal of quality assessment (QA) research is to design algorithms that can automatically
assess the quality of images in a perceptually consistent manner. Image QA algorithms generally
interpret image quality as fidelity or similarity with a “reference” or “perfect” image in some perceptual
space. In order to improve the assessment accuracy of white noise, Gauss blur, JPEG2000 compression
and other distorted images, this paper puts forward an image quality assessment method based on phase
congruency and gradient magnitude. The experimental results show that the image quality assessment
method has a higher accuracy than traditional method and it can accurately reflect the image visual
perception of the human eye. In this paper, we propose an image information measure that quantifies the
information that is present in the reference image and how much of this reference information can be
extracted from the distorted image.
Efficient growth techniques and properties of Benzophenone Single Crystals fo...Editor IJCATR
Benzophenone is one of the promising organic NLO materials for their high energy laser photonic
applications and hence this review is mainly emphasized on the discussion of growth, efficiency and
applications of low melting organic NLO benzophenone crystals in order to improve their structural and
physical properties. To grow bulk and good quality benzophenone crystals by various techniques adopted has
been discussed such as slow evaporation method, Microtube-Czochralski method, and Vertical Bridgman
method. It is acknowledged that the size and the efficiency of the growing benzophenone single crystal varies
with that of the techniques we are using has been discussed below. The SHG efficiency of pure benzophenone
crystal also been compared with the standard KDP crystal. Also optical transparency behaviour of the
benzophenone crystal has also been reviewed.
Proposing an Appropriate Pattern for Car Detection by Using Intelligent Algor...Editor IJCATR
Nowadays, the automotive industry has attracted the attention of consumers, and product quality is considered as an
essential element in current competitive markets. Security and comfort are the main criteria and parameters of selecting a car.
Therefore, standard dataset of CAR involving six features and characteristics and 1728 instances have been used. In this paper, it
has been tried to select a car with the best characteristics by using intelligent algorithms (Random Forest, J48, SVM,
NaiveBayse) and combining these algorithms with aggregated classifiers such as Bagging and AdaBoostMI. In this study, speed
and accuracy of intelligent algorithms in identifying the best car have been taken into account.
A Dependent Set Based Approach for Large Graph AnalysisEditor IJCATR
Now a day’s social or computer networks produced graphs of thousands of nodes & millions of edges. Such Large graphs
are used to store and represent information. As it is a complex data structure it requires extra processing. Partitioning or clustering
methods are used to decompose a large graph. In this paper dependent set based graph partitioning approach is proposed which
decomposes a large graph into sub graphs. It creates uniform partitions with very few edge cuts. It also prevents the loss of
information. The work also focuses on an approach that handles dynamic updation in a large graph and represents a large graph in
abstract form.
Agent based P ersonalized e - Catalog S ervice S ystemEditor IJCATR
With the emergence of the e
-
Catalog, there has been an increasingly wide application of commodities query in distribut
ed
environment in the field of e
-
commerce. But e
-
Catalog is often autonomous and heterogeneous, effectively integrating and querying
them is a delicate and time
-
consuming task. Electronic catalog contains rich semantics associated with products, and serves
as a
challenging domain for ontology application. Ontology is concerned with the nature and relations of being. It can play a cruc
ial role
in e
-
commerce as a formalization of e
-
Catalog. User personalized catalog ontology aims at capturing the users' inter
ests in a working
domain, which forms the basis of providing personalized e
-
Catalog services.
This paper describes a prototype of an ontology
-
based
Information retrieval agent.
User personalized catalog ontology aims at capturing the users' interests in a
working domain, which
forms the basis of providing personalized e
-
Catalog services.
In this paper, we present an ontological model of e
-
Catalogs, and design
an Agent based personalized e
-
Catalog service system (ABPECSS), which achieves match user personal
ized catalog ontology and
domain e
-
Catalog ontology based on ontology integrated
A Review on Parameter Estimation Techniques of Software Reliability Growth Mo...Editor IJCATR
Software reliability is considered as a quantifiable metric, which is defined as the probability of a software to operate
without failure for a specified period of time in a specific environment. Various software reliability growth models have been proposed
to predict the reliability of a software. These models help vendors to predict the behaviour of the software before shipment. The
reliability is predicted by estimating the parameters of the software reliability growth models. But the model parameters are generally
in nonlinear relationships which creates many problems in finding the optimal parameters using traditional techniques like Maximum
Likelihood and least Square Estimation. Various stochastic search algorithms have been introduced which have made the task of
parameter estimation, more reliable and computationally easier. Parameter estimation of NHPP based reliability models, using MLE
and using an evolutionary search algorithm called Particle Swarm Optimization, has been explored in the paper.
Neural Network, Fuzzy Logic, Employability, Sugeno type inference, Education,...Editor IJCATR
Cloud Computing has been growing over the last few years as a result of cheaper access to high speed Internet connection
and many applications that comes with it. Its infrastructure allows it to provide services and applications from anywhere in the world.
However, there are numerous technical, non-technical and security issues that come with cloud computing. As cloud computing
becomes more adopted in the mainstream, these issues could increase and potentially hinder the growth of cloud computing. This
paper investigates what cloud computing is, the technical issues associated with this new and evolving computing technology and also
the practical applications of it. It also addresses and highlight the main security issues in cloud computing
Study of Cross-Site Scripting Attacks and Their CountermeasuresEditor IJCATR
In present-day time, most of the associations are making use of web services for improved services to their
clients. With the upturn in count of web users, there is a considerable hike in the web attacks. Thus, security becomes
the dominant matter in web applications. The disparate kind of vulnerabilities resulted in the disparate types of attacks.
The attackers may take benefit of these vulnerabilities and can misuse the data in the database. Study indicates that
more than 80% of the web applications are vulnerable to cross-site scripting (XSS) attacks. XSS is one of the fatal
attacks & it has been practiced over the maximum number of well-known search engines and social sites. In this paper,
we have considered XSS attacks, its types and different methods employed to resist these attacks with their
corresponding limitations. Additionally, we have discussed the proposed approach for countering XSS attack and how
this approach is superior to others.
Mafalda está más viva que nunca. Reaparece siempre fresca y renovada en sus nuevos libros y periódicos. Hace cine y televisión. Viaja en la imaginación colectiva de infinidad de naciones que son muy diferentes entre ellas culturalmente. Y llega a los lugares más insospechados, volviéndose familiar a generaciones que no tienen nada que ver con la que vio nacer a Mafalda