Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2019 ( 3 )

2018 ( 8 )

2017 ( 22 )

2016 ( 50 )

Custom range...

Search Results: 1 - 10 of 7049 matches for " Dr. Gulshan Taneja "
All listed articles are free for downloading (OA Articles)
Page 1 /7049
Display every page Item
Reliability and Availability Analysis of Database System with Standby Unit Provided by the System Provider
Sukhvir Singh,Dr.Rahul Rishi,Dr. Gulshan Taneja,Dr. Amit Manocha
International Journal of Soft Computing & Engineering , 2013,
Abstract: The present paper deals with the study of a database system having Primary database and hot standby database unit which is provided by the system provider itself. There is an agreement with the system provider that on the failure of the hot standby unit, another similar unit is immediately provided by him. The primary unit is a production unit and synchronized with hot standby unit through online transfer of archive redo logs. Data being saved in the primary unit gets simultaneously stored in the hot standby unit. When the primary database unit fails, the hot standby database unit becomes the production database and primary database unit goes under repair. The system is analyzed by making use of semi-Markov processes and regenerative point technique. Expression for Mean Time to System Failure, Mean Time to Failure of Primary Database Unit and Availability of Primary Unit are obtained. Graphical study has also been done.
Dr. Gulshan Kumar,Neerja Dhingra
International Journal of Economics and Research , 2011,
Abstract: Direct investment across national borders is a distinct feature of international economics, which has gained intense attention of all the countries of the world recently. Foreign direct investment (FDI) is deemed to be a growth catalyst since it is usually accompanied by entrepreneurial, managerial and technical skills which are indispensable for economic growth (Humphrey,1960). Foreign direct investment is one of the most strategic and vital tools for developing a country s competitiveness and efforts must be made to garner huge share of FDI in the country (Badar, 2006). Going by this ideology FDI is being sought by most of the developing countries of the world for promoting the cause of economic development. India, without exception, as in case of other developing countries, is eager to prompt her economic growth which compels her to accept and seek assistance of foreign direct investment. The country also became host to massive inflows of FDI during 1990s and 2000s in concert with her efforts to create more favorable settings for it through trade liberalization, market deregulation, privatization of national ownerships and encouragement to regional integration. Actually in the early 1980s, Indian government adopted a liberal policy towards FDI, especially in high technology areas and exports and it was then that FDI friendly environment was created. Again a host of incentives, exemptions and relaxations in the degree of flexibility concerning foreign ownership adopted during 1990s gave a major boost to FDI inflows. In a way eighties were the fore-runners of the liberalization policy of 1990s and so this period is termed as preliberalization period in the study. The period after 1991 is termed as post liberalization period during which not only the quantum of FDI to India escalated but the sectoral composition of FDI also underwent tremendous change
Secure Association Rule Mining for Distributed Level Hierarchy in Web
Gulshan Shrivastava,,Dr. Vishal Bhatnagar
International Journal on Computer Science and Engineering , 2011,
Abstract: Data mining technology can analyze massive data and it play very important role in many domains, if it used improperly it can also cause some new problem of information security. Thus severalprivacy preserving techniques for association rule mining have also been proposed in the past few years. Various algorithms have been developed for centralized data, while others refer to distributed data scenario. Distributed data Scenarios can also be classified as heterogeneous distributed data and homogenous distributed data and we identify that distributed data could be partitioned as horizontal partition (a.k.a. homogeneous distribution) and vertical partition (a.k.a. heterogeneous distribution). In this paper, we propose an algorithm for secure association rule mining for vertical partition.
Probabilistic Analysis of an Automatic Power Factor Controller with variation in Power Factor
International Journal of Engineering Science and Technology , 2012,
Abstract: In the present study, the probabilistic analysis of an automatic power factor controller (APFC) system working in industry/factory is investigated. The power factor correction of electrical loads and energy losses due to poor power factor are the problems common to all industrial companies. Therefore, the study of APFC unit is of greatimportance. Initially, the system is operative with controlled power factor. Then it may transit to state with power factor not controlled. On the failure of the system, an inspection is carried out to detect the type of failure. The system may fail due to Fuse blown off, Transformer burnt, Programming problem, Output relay faulty. In case of the first two types of failure the components are replaced and corrected; while in last two types of failures the problem is repaired and corrected. The system remains in up state with power factor controlled and power factor not controlled. The system is analyzed by making use of regenerative point technique. The various measures of system effectiveness are obtained including the profit incurred to the system. Graphs have been plotted to depict the behavior of the profit with respect to revenue/loss per unit up time when power factor controlled and when power factor not controlled, cost per unit replacement.
International Journal of Engineering Science and Technology , 2010,
Abstract: The present paper gives the comparative study with respect to the profit between two models for sulphated juice pump standby systems—one (Model I) comprising two big units and the other (Model II) comprising one big and two small units. In model I, initially one unit is operative and the other is kept as cold standby whereas in Model II, initially one big unit is operative and both the small units are kept as cold standby. Comparative study with respect to profits is made between two models taking into consideration the installation cost and consumption cost for both types of units (big as well as small). System is analysed by making use of semi-Markov processes and regenerative point technique.
Energy Efficient Protocols in Wireless Sensor Networks:A Survey
Dr. Kavita Taneja,Amandeep Kaur
International Journal of Computer Science Issues , 2013,
Abstract: Wireless Sensor Networks (WSNs) consists of huge number of Sensor Nodes (SNs) with sensing, communication and processing capabilities. SNs have limited energy supply, storage and computational capacity. In recent years energy efficient computation is a major concern in WSN. The critical aspects include reduction in the energy consumption of SNs so that the network lifetime can be extended to reasonable times. For this purpose many novel innovative techniques based on energy efficient computation have been proposed. In this paper, we present a brief analysis on energy efficient computation protocols. We have also presented a comparison of these protocols.
International Journal of Engineering Science and Technology , 2011,
Abstract: The World Wide Web has become the medium of preference for the circulation of information by common man,teams, organizations, and social communities. Information computing is the fundamental mean by which web information is retrieved and distributed. Conventional information computing approaches continues to be the most common to search documents of potential relevance. But unfortunately these offer only an imperfect solution as many relevant documents may be missed in the crude search process. The search process is sharplyquery specific and the results blindly follow the terms entered. The proposed Abstraction Focused framework for improved information computing over web attempts to resolve this basic problem that stamps from the information needs of the diverse users from the web. It implements abstraction by defining different indicators for directing the user search interests. Results from experiments with Abstraction Focused System approve the success particularly in cases where different users have a defined boundary of the search over WWW.
Object Oriented Information Computing over WWW
Dr. Pushpa R. Suri,Harmunish Taneja
Computer Science , 2011,
Abstract: Traditional search engines on World Wide Web (WWW) focus essentially on relevance ranking at the page level. But this lead to missing innumerable structured information about real-world objects embedded in static Web pages and online Web databases. Page-level information retrieval (IR) can unfortunately lead to highly inaccurate relevance ranking in answering object-oriented queries. On the other hand, Object Oriented Information Computing (OOIC) is promising and greatly reduces the complexity of the system while improving reusability and manageability. The most distinguishing requirement of today's complex heterogeneous systems is the need of the computing system to instantly adapt to vigorously changing conditions. OOIC allows reflecting the dynamic characteristics of the applications by instantiating objects dynamically. In this paper, major challenges of OOIC as well as its rudiments are recapped. The review includes the insight to PopRank Model and comparison analysis of conventional page rank based IR with OOIC
Major Energy Efficient Routing Schemes in Wireless Sensor Networks: Survey and Idea
Jahangeer Ali,Gulshan Kumar,Dr. Mritunjay Kumar Rai
International Journal of Computers & Technology , 2013,
Abstract: Sensing the environment without human intervention is carried out with Wireless Sensor Networks. Thus WSNs have gained impetus in every field as applicable to various sensing applications. As the sensor nodes are very minute with limited power, memory and controlling mechanism. Thus it is necessary to implement energy efficient routing in sensor nodes such that network lifetime is enhanced. In this paper, we have discussed various existing energy efficient routing schemes and made comparison on various parameters in literature survey. Finally came to conclusion that there is a need of an energy efficient routing protocol which can further extend network lifetime. We propose an idea in which existing; Enhanced Energy Efficient Protocol with Static Clustering (EEEPSC) is modified by placing a fraction of nodes having more energy than normal nodes in the locations where Base Station is far away. And BS is placed within the area of deployed nodes.
The Use of Multi-Objective Genetic Algorithm Based Approach to Create Ensemble of ANN for Intrusion Detection  [PDF]
Gulshan Kumar, Krishan Kumar
International Journal of Intelligence Science (IJIS) , 2012, DOI: 10.4236/ijis.2012.224016
Abstract: Due to our increased dependence on Internet and growing number of intrusion incidents, building effective intrusion detection systems are essential for protecting Internet resources and yet it is a great challenge. In literature, many researchers utilized Artificial Neural Networks (ANN) in supervised learning based intrusion detection successfully. Here, ANN maps the network traffic into predefined classes i.e. normal or specific attack type based upon training from label dataset. However, for ANN-based IDS, detection rate (DR) and false positive rate (FPR) are still needed to be improved. In this study, we propose an ensemble approach, called MANNE, for ANN-based IDS that evolves ANNs by Multi Objective Genetic algorithm to solve the problem. It helps IDS to achieve high DR, less FPR and in turn high intrusion detection capability. The procedure of MANNE is as follows: firstly, a Pareto front consisting of a set of non-dominated ANN solutions is created using MOGA, which formulates the base classifiers. Subsequently, based upon this pool of non-dominated ANN solutions as base classifiers, another Pareto front consisting of a set of non-dominated ensembles is created which exhibits classification tradeoffs. Finally, prediction aggregation is done to get final ensemble prediction from predictions of base classifiers. Experimental results on the KDD CUP 1999 dataset show that our proposed ensemble approach, MANNE, outperforms ANN trained by Back Propagation and its ensembles using bagging & boosting methods in terms of defined performance metrics. We also compared our approach with other well-known methods such as decision tree and its ensembles using bagging & boosting methods.
Page 1 /7049
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.