Current Issue

The current issue of the journal read...

Authors' guidelines

All you need to know in order to publish in our journal read...


Here you can submit your paper continue...


If anybody want to get in touch with us or submit article in Reseach Inventy please mail on :

For Authors                                                 ISSN(e) : 2278-4721           ISSN(p):2319-6483

  • Call for Paper

    Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per

  • Submit an Article

    Submit your manuscript as an attachment file to in MS Word (.doc format)

  • Payment Option

    If your paper is accepted for publication in Research Inventy : International Journal of Engineering and Science, you will get

  • Faqs

    Frequently Asked Questions

  • Contact Us

    If anybody want to get in touch with us or submit article in Reseach Inventy please mail on :  Inventy@editor

Vol ||2|| Issue || 10 ||

1.Full Citation
Manuscript Id :: 23126
Manuscript Type :: Research
Manuscript Title :: Performance Analysis of Enhanced DSDV Protocol for Efficient Routing In Wireless Ad Hoc Networks
Country :: India
Authors :: D.Loganathan || P.Ramamoorthy
Pages No. :: 01-08
Paper Index :: : 07.4721/02100108
Full PDF ::

An ad hoc wireless network is a collection of mobile nodes establishing an instant network without any fixed topology. Furthermore, each node acts as both router and host concurrently, and can travel out or link up in the network freely. In such a network, designing of routing protocol is a significant and important issue and therefore, new challenges are there in ad hoc routing protocols scheme. Hence traditional routing algorithms are unsuitable for betterment of ad hoc networks. Recent research emphases on the different types of routing protocols for enhancement and compared these protocols with existing metrics of network. Since network energy is an important parameter to improve the network lifetime. In this paper, presents the multicost parameters based DSDV (MPB-DSDV) routing protocol to enhance the energy efficient of ad hoc networks. The modification adapted in DSDV makes it a more suitable routing protocol and simulate the result of the help of the performance metrics like End to End Delay, Packet Delivery Ratio, Routing Overhead and Throughput of wireless ad hoc networks. The proposed multicost parameters based DSDV algorithm can lead to energy consumption, improving the network performance than regular DSDV routing protocol.

Key words: Ad hoc networks, DSDV protocol, Energy, Multicost, MPB-DSDV, Network performance.

[1] Walaia GK, Singh C Simulationbased performance evaluation and comparison of proactive and reactive routing protocols in mobile ad-hoc networks. International journal of computer science and technologies, 2011, 2(3): 1235-1239.
[2] Khatri P, Rajput M, Shastri A, Solanki K. Performance study of ad-hoc reactive routing protocols. Journal of Computer Science. 2010, 6(10): 1130-1134.
[3] Wang Kai, Gao Yang-yang, Guan Jian-feng, Qin Ya-juan. MDSDV: a modified DSDV routing mechanism for wireless mesh networks, Science direct, December 2011, 18 (Suppl. 2): 34–39.
[4] Tao Wan Evangelos Kranakis P.C. van Oorschot.Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV).International Conference on Information and Communications Security Malaga, Spain. October 27-29, 2004. LNCS vol. 3269, pp.358-374.Springer-Verlag
[5] Khaleel Ur Rahman Khan, Rafi U Zaman,A.Venugopal.The Performance of the Extended DSDV, MANET Routing Protocol and its Suitability in Integrated Internet-MANET, IJSSST, Jan 2009,Vol. 10, No. 2
[6] Charles E.Perkins, T.J. Watson, Pravin Bhagwat.Proceeding SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications Pages 234-244, ACM New York, NY, USA ©1994
[7] Anand, Dheeraj Kumar; Prakash, Shiva. International Journal of Advances in Engineering & Technology;Nov2012, Vol. 5 Issue 1, p526
[8] Nikos Karagiorgas, PanagiotisKokkinos, ChristosPapageorgiou, Emmanouel Varvarigos.Joint multi-cost routing and power control in wireless ad hoc networks, Wireless Networks, Springer, 2010 16:2263–2279
[9] Agarwal, S., Krishnamurthy, S. V., Katz R. H., & Dao, S. K, Distributed power control in ad hoc wireless networks, IEEE international symposium on Personal, Indoor and Mobile Radio Communications (PIMRC) 2001.
[10] Papageorgiou, C., Kokkinos, P., & Varvarigos, E. Multicostrouting over an infinite time horizon in energy and capacity constrained wireless ad hoc networks. Euro-Par.2006.
[11] Loganathan D and Ramamoorthy P, ―Multicost Routing Approach in Wireless Ad hoc Networks‖, Journal of Computer Science (JCS) 8 (10): 1739-1748, pp. 3773- 3778. Science Publications, 2012
[12] Liu, L., & Feng, G. Simulated annealing based multi constrained QoS routing in mobile ad hoc networks. International Journal of Wireless Personal Communications, 2007. 41(3), 393–405.
[13] Ns—network simulator,

2.Full Citation
Manuscript Id :: 23154
Manuscript Type :: Research
Manuscript Title :: Process-Oriented and Quantitative Assessment for Blended Police English Course
Country :: China
Authors :: WEI Li
Pages No. :: 09-13
Paper Index :: : 07.4721/021009013
Full PDF ::
To emphasize the learning process and make the intangible online learning concrete but not only the learning outcomes, the process-oriented and quantitative assessment is designed based on outline of CyberInfrastucture Based Education to meet the challenge under web-mediated learning environment. It consists of primary, secondary and tertiary index with assistance of synchronous and interactive participation observations, asynchronous check of text, audio or visual chat history with software tools of Screen Video Recorder, QQ International on computers and WeChat on smart phones. Surveys and interviews show that most of the participants are in favor of the process-oriented and quantitative assessment, though limitations do exist.

Keywords –English learning, process-oriented, quantitative assessment, tertiary index, virtual training
[2] A. Szucs, A. Tait, and M. Vidal and U. Bernath, Distance and E-learning in Transition: Learning Innovation, Technology and Social Challenges (ISTE and John Wiley & Sons, UK and USA, 2009).
[3] M. Bahl, and J. Hom, Quantitative Assessment of the Impact of the Service-Learning Course "Mental Health and the Veteran Population: Case Study and Practicum" on Undergraduate Students, Stanford Undergraduate Research Journal, spring, 2006.
[4] U. Jamornmann, Techniques for Assessing Students‟ eLearning Achievement, International Journal of the Computer, the Internet and Management, 12(2), 2004, 26 -31.
[6] Zhongwen Liu, Integrating Virtual Training into ESP Learning:Hybrid English for Policing Model, Theory and Practice in Language Studies, 2(6), 2012, 1243-1248.
[7] Tae-sik Kim, Towards the Design of an Interactive U-Learning System, Journal of Security Engineering,9(2), 2012,189-198.
[8] Littlewood, W., Process-oriented pedagogy: facilitation, empowerment, or control? ELT Journal, 63, 2008, 246-254.
[9] Zhongwen Liu, Virtual Policing in English: A Trainee-centered Pedagogy for Web-mediated Curricular Learning and Field Training, Journal of Software, 8(2), 2013, 344-350.
[10] WEI Li, Development and Application of Transcripts in Experiential and Web-mediated ESP Learning, International Journal of Engineering Research and Development, 6(5), 2013, 30-34.

3.Full Citation
Manuscript Id :: 23137
Manuscript Type :: Research
Manuscript Title :: Secure Login Using Encrypted One Time Password (Otp) and Mobile Based Login Methodology
Country :: India
Authors :: Ms. E.Kalaikavitha M.C.A., M.Phil || Mrs. Juliana gnanaselvi M.Sc., M.Phil., Ph.D
Pages No. :: 14-17
Paper Index :: : 07.4721/0210014017
Full PDF ::
In Online based applications most of them used static passwords. In that they follow multiple technics to secure their credentials. For examples: Multi level password authentications, hard codes, Session Passwords, bio- matric technics, and One Time Password. Every method has some advantages and disadvantages. Our proposed idea is to enhance the security level of One Time Password by Encrypting it and logging the user by forwarding the encrypted OTP with Password to the system. It increases the security level of the system.

Keywords –Static Password, One Time Password, Encrypted OTP, Mobile based login,

[1] V. A. Brennen. (2004). Cryptography Dictionary, vol. 2005, 1.0.0 ed. [Online]. Available: dict.html
[2] M. Abadi, L. Bharat, and A. Marais, "System and method for generating
[3] unique passwords," U.S. Patent 6 141 760, 1997.
[4] [Online]:
[5] [Online]

4.Full Citation
Manuscript Id :: 23135
Manuscript Type :: Research
Manuscript Title :: Existence Of Solutions For Nonlinear Fractional Differential Equation With Integral Boundary Conditions
Country :: Iraq
Authors :: Azhaar H. Sallo || Afrah S. Hasan
Pages No. :: 18-22
Paper Index :: : 07.4721/021018022
Full PDF ::

In this paper we discuss the existence of solutions defined in C [0,T ] for boundary value problems
for a nonlinear fractional differential equation with a integral condition. The results are derived by using the
Ascoli-Arzela theorem and Schauder-Tychonoff fixed point theorem.

Keywordsu -Riemann_Liouville fractional derivative and integral, boundary value problem, nonlinear
fractional differential equation, integral condition, Ascoli-Arzela theorem and Schauder-Tychonoff fixed point


[1] Ahmad B and Nieto J.J., Riemann-Liouville fractional integro-differential equations with fractional nonlocal integral boundary
conditions. Boundary Value Problems, 2011, 2011:36.
[2] Ahmad B. and Ntouyas S. K., Boundary Value Problems for Fractional Differential Inclusions with Four-Point Integral
Boundary Conditions, Surveys in Mathematics and its Applications, 6 (2011), 175-193.
[3] Barrett, J.H., Differential equation of non-integer order, Canad. J. Math., 6 (4) (1954), 529-541.
[4] Darwish M.A. and Ntouyas S.K., On initial and boundary value problems for fractional order mixed type functional differential
inclusions, Comput. Math. Appl. 59 (2010), 1253-1265.
[5] Goldberg, R.R., Methods of Real Analysis, John Wiley and Sons, Inc, USA (1976).
[6] Hamani S., Benchohra M. and Graef J.R., Existence results for boundary value problems with nonlinear fractional differential
inclusions and integral conditions, Electron. J. Differential Equations 2010, No. 20, 16 pp.
[7] Kilbas, A.A., Srivastava, H.M. and Trujillo, J.J., Theory and Applications of Fractional Differential Equations. Elsevier (North-
Holland), Math. Studies, 204, Amsterdam (2006).

5.Full Citation
Manuscript Id :: 23158
Manuscript Type :: Research
Manuscript Title :: Performance Evaluations of Calcium Nitrite on Steel Rebar Corrosion in Quarry Dust Concrete
Country :: India
Authors :: Dr.M.Devi
Pages No. :: 23-27
Paper Index :: : 07.4721/0210023027
Full PDF ::
The utilization of quarry dust as fine aggregate in concrete is advantageous because of the benefits such as reduction in demand for river sand, environment load and cost of concrete. In this study, experimental investigation has been done to explore the significance of quarry dust as fine aggregate in concrete. Corrosion is the major durability problem causing deterioration of concrete structures. Hence, the objective of this work is to study the strength and corrosion resisting properties of concrete containing quarry dust as fine aggregate along with calcium nitrite as corrosion inhibiting admixture at the dosage of 1%, 2%, 3% and 4% by weight of cement. Strength tests, water absorption test and the durability tests were carried out and the results were compared with the natural sand concrete. The corrosion resistance performance was determined by impressed voltage method, rapid chloride permeability test and gravimetric weight loss method. The results proved that quarry dust as substitute for river sand in concrete increases the strength of the concrete, with addition of inhibitor it proffer very good resistance against corrosion.

Keywords : Concrete, quarry dust, super plasticizer, inhibitor, chloride ingress, corrosion resistance, durability

[1] R. Ilangovan And K.Nagamani "Application Of Quarry Rock Dust As Fine Aggregate In Concrete Construction". National Journal On Construction Management: Nicmr, Pune, December.Pp.5-13, 2006
[2] Raman, S.N., Md Safiuddin And Zain, M.F.M. "Non – Destructive Of Flowing Concretes Incorporating Quarry Waste", Asian Journal Of Civil Engineering [Building And Housing] Vol.8, No.6, Pp. 597 -614,2007.
[3] R. Ilangovan, N.Mahendran And K.Nagamani "Strength And Durability Properties Of Concrete Containing Quarry Rock Dust As Fine Aggregate". Arpn Journal Of Engineering And Applied Science, Vol.3, No.5, October 2008
[4] M.Shahul Hameed And A.S.S.Sekar, "Properties If Green Concrete Containing Quarry Rock Dust And Marble Sludge Powder As Fine Aggregate" Arpn Journal Of Engineering And Applied Science, Vol.4, No.4, October 2009.
[5] R.Murugesan, N.R.Chitra, P.Saravanakumar, "Effect Of Partial Replacement Of Sand By Quarry Dust In Concrete With And Without Super Plasticizer" Proceedings Of The National Conference On Concrete Technology For The Future, Pp,167-170, 2006.
[6] Prachoom Khamput " A Study Of Compressive Strength Of Concrete Using Quarry Dust As Fine Aggregate And Mixing With Admixture Type E", Rajamangla University Of Technology Thanyaburi, Pathumthani, Thailand, 2005.
[7] Sahu A.K., Sunil Kumar And Sachan A.K. "Quarry Stone Waste As Fine Aggregate For Concrete". The Indian Concrete Journal. Pp. 845-848, 2003.
[8] R. Ilangovan And K.Nagamani "Studies On Strength And Behavior Of Concrete By Using Quarry Dust As Fine Aggregate". Ce And Cr Journal, Newdelhi. October.Pp.40-42, 2006 .
[9] R.Vedalakshmi And N.S.Rengasamy, "Quality Assurance Tests For Corrosion Resistance Of Steel Reinforcement"The Indian Concrete Journal, April 2000.
[10] Allan Crane, P. "Corrosion Of Reinforcement In Concrete Construction", Society Of Chemical Industry, London. Publishers Ellis Horwood Ltd., First Edition, 1983.
[11] Ha-Won Song, Velu Saraswathy, " Corrosion Monitoring Of Reinforced Concrete Structures – A Review", International Journal Of Electrochemical Science, No. 2 , 1- 28 ,2007.
[12] Videm, "Corrosion Of Reinforcement In Concrete. Monitoring, Prevention And Rehabilitation". Efc No: 25. London, Pa.104-121.E, 1998.

6.Full Citation
Manuscript Id :: 24010
Manuscript Type :: Research
Manuscript Title :: Associative Effect of Non-Starch Polysaccharide Enzymes and Probiotics on Performance, Nutrient Utilization and Gut Health of Broilers Fed Sub-Optimal Energy Diets
Country :: India
Authors :: J. Narasimha||D. Nagalakshmi||S.T. VirojiRao || M. Venkateswerlu ||Y. Ramana Reddy
Pages No. :: 28-31
Paper Index :: : 07.4721/0210028031
Full PDF ::
The aim of this work was to investigate the associative effect of Non-starch Polysaccharide enzymes and probiotics on performance in broiler. One hundred and fifty day old Cobb broilers were randomly allocated in five experimental groups, six replicates per group and five birds per replicate. The experimental birds received corn-soy bean based standard diet(SD) and low calorie basal diet (BD) (225kcal/kg ME less) supplemented with NSP enzymes and/ or probiotics. Chicks fed BD supplemented with NSP enzymes and probiotics recorded significantly (P<0.05) higher body weight gain compared to BD and no effect on total feed intake was observed. The BD supplemented with probiotics alone or along with NSP enzymes improved (P<0.01) the FCR compared to BD group. The DM, CF, EE, NFE and phosphorus retentions were not influenced by supplementation of NSP enzymes and probiotics to BD. The OM, CP and GE retention was higher (P<0.05) in chicks supplemented with probiotics alone or in combination with NSP enzymes. Supplementation of NSP enzyme increased (P<0.05) the tibia ash content but no synergistic effect of probiotics and NSP enzymes was observed. The slaughter attributes in terms of dressing yield, breast yield, abdominal fat and weight of visceral organs were not affected by supplementation of NSP enzymes and probiotics alone or in combination to BD. Significant reduction (P<0.05) in intestinal pH, viscosity and E. coli count was observed with supplementation of both NSP enzymes and no synergistic effect of NSP enzymes and probiotics was observed on these variables. There was no effect of supplementing NSP enzymes along with probiotics to BD was observed on intestinal histology. Supplementation of NSP enzymes and probiotics singly or in combination significantly (P<0.01) reduced the feeding cost (P<0.05) and the cost per kg live weight gain.

Keywords : Non-starch Polysaccharide enzymes, probiotics, basal diet, gut health, live weight gain.

[1] Altaf-Ur-Rahman, MohsinAli,Shoaib Sultan, And Nazir Ahmad, Effect Ofdietaryprobiotic Supplementation On Performance Of Broilers,Sarhad Journal Ofagriculture, Vol. 23, 2007,No. 2.
[2] Yeo-Jinmo, Kim-Kyuil, J. M. Yeo, And Kim K.I. Effect Of Feeding Diets Containing An Antibiotic, A Probiotic, Or Yucca Extract On Growth And Intestinal Urease Activity In Broilerchicks,Poultry Science, 76, 1997, 381-385.
[3] Zuanon, J.A.S, Fonseca, J.B, Rostagno, H, Almeida, M-De-Silva, And Silva, M. Effects Of Growth Promoters On Broiler Chicken Performance,Revistabrasileira De, 27,1998,999-1005.
[4] Maldonado Galdeano, C, De Moreno De Leblanc, A, Vinderola, G, Bibasbonet, M. E. And Perdigon, G. Proposed Model: Mechanisms Of Immunomodulation Induced By Probiotic Bacteria,ClinicalAnd Vaccine Immunology, 14,2007,485-492.
[5] Fuller, R. (1992). ProbioticstheScientific Basis. (Chapman AndHall, London).
[6] Koenen, M. E, Karmer, J, Van Der Hulst, R, Heres, L, Jeurissen, S. H. And Boersma, W. J. Immunomodulation By Probiotic Lactobacilli In Layer And Meat-Type Chickens,British Poultry Science, 45,2004,355-366.
[7] Mountzouris, K. C, Tsitrsikos, P, Palamidi, I, Arvaniti, A, Mohnl, M, Schatzmayr, G. And Fegeros, K. EffectsOf Probiotic Inclusion Levels In Broiler Nutrition On Growth Performance, Nutrient Digestibility, Plasma Immunoglobulins And Cecalmicroflora Composition. Poultry Science, 89,2010, 58-67.
[8] National Research Council,Nutrient Requirements Of Poultry, (9th Ed. National Academy Press, Washington, DC, 1994)
[9] AOAC.Official Methods Of Analysis Of Association Of Official Analytical Chemists,(18thEdition Virginia, USA, Association Of Official Analytical Chemists, 2005).
[10] Clayden, E. C,PracticalSection Cutting And Staining,(4thEdition, J And Churchil Limited,1962).
[11] Culling, C. F. A,Hand Book Of Histopathological Techniques,(London Butterworth Andcompany, Publisher Ltd,1957).
[12] Duncan, D. D. Multiple Range And Multiple 'F'Test, Biometrics, 11:1955, 1-42.

7.Full Citation
Manuscript Id :: 23082
Manuscript Type :: Research
Manuscript Title :: Video Data Hiding Through LSB substitution Technique
Country :: India
Authors :: Hemant Gupta || Prof. Setu chaturvedi
Pages No. :: 32-39
Paper Index :: : 07.4721/0210032039
Full PDF ::
In this paper propose a video data embedding scheme. It is embedded in AVI (audio video interleave) video. The proposed method for replacing one or two or three LSB of each pixel in video frame. It becomes very difficult for intruder to guess that an image is hidden in the video as individual frames are very difficult to analyze in a video. In this paper calculate peak to signal noise ratio (PSNR) correlation factor analysis and comparison of correlation between original and embedded image for 1bit LSB, 2 bit LSB, 3bit LSB Substitution is given in result section.

Keywords : Index terms: LSB, Cryptography.

[1] Saurabh Singh, "Hiding Image to Video" in International Journal of engineering science & technology Vol. 2(12), 6999-7003,
[2] Marghny Mohamed, "Data hiding by LSB substitution using genetic optimal key permutation " in International arab journal of etechnology
,vol.2,no 1 January 2011.
[3] A.K. Al Frajat "Hiding data in video file An overview" Journal of applied sciences 10(15):1644-1649, 2010.
[4] Ali K Hmood, " An overview on hiding information technique in images" Journal of applied sciences 10(18)2094-2100, 2010.
[5] Mohammed A.F. Al husainy"Image Steganography by mapping pixel to letters" in Journal of computer science 5(1),33 -38, 2009
[6] M. Abomhara , "International journal of computer theory and engineering" ,volume 2 ,1793-8201,2010
[7] Liu bin "an Image method based on correlation analysis and image fusion" in IEEE applied International conference on parallel
and distributed computing, application and technology0-7695-2405-2/05, 2005
[8] P. Mohan Kumar" A new approach for hiding data in image using image domain methods" in International journal of computer
and internet security volume 2, 69-80, 2011.
[9] A.K. Al Frajat "Hiding data in video file An overview" Journal of applied sciences 10(15):1644-1649,2010
[10] P. Mohan Kumar" A new approach for hiding data in image using image domain methods" in International journal of computer
and internet security volume 2, 69-80, 2011.

8.Full Citation
Manuscript Id :: 24019
Manuscript Type :: Research
Manuscript Title :: Design of Dragon Fly Aircraft
Country :: India
Authors :: M.Siva ||M.Rajadurai ||R.Pandyrajan ||B.Babu
Pages No. :: 40-47
Paper Index :: : 07.4721/0210040047
Full PDF ::
In This Project , A New Pictorial Model Of An Aircraft Is Designed By Referring The Existing Aircrafts Like The Assumed Model. This Is An Innovative Idea Of Using Two Wings In An Aircraft. Among The Two Wings, One Is A Forward Swept Wing And The Other Is Elliptical Wing. This Idea Is Based On The Structure Of Dragon Fly. Three Aircrafts, Two With Forward Swept And Other With Elliptical Wing, Taken For Reference . Among The Forward Swept Wing And Elliptical Wing, One Will Be Kept On The Front Side And Other One On The Rear. This Is Based On The Canard Wing Configuration. Design Of Dragonfly Aircraft Involves Three Stages- Preliminary Design, Conceptual Design And Detailed Design. In Preliminary Design The Basic Idea Of Design Is Drawn Roughly. In Conceptual Design Based On The Calculations On Reference Aircrafts, A Conceptual Configuration Is Optimized And Design Is Drawn As Per The Configuration Using Solid Works Software. In Detailed Design The Designed Model Is Analyzed Using Gambit And Fluent To Check The Conditions For Flying. This Model Will Be Same As A Dragon Fly.

[5]. [6]. Aircraft design by R.B. Damania , A.A.Lebedinski, A.K.Rao [7]. Aircraft conceptual design by Mohamed Sadrey [8]. Wing design by Mohamed Sadrey [9]. Wing design by Daniel .P. Raymer

9.Full Citation
Manuscript Id :: 24016
Manuscript Type :: Research
Manuscript Title :: Tackling Rationing and Shortage Gaming Reason of Bullwhip Effect With Fuzzy Logic Approach
Country :: India
Authors :: Manoj Kumar ||Dr. S. Srinivasan ||Dr. Gundeep Tanwar
Pages No. :: 48-52
Paper Index :: : 07.4721/0210048052
Full PDF ::
The supply chain is major part of business activities. In the supply chain, every organization orders from its instantaneous upstream collaborators. Usually, the retailer's order do not match with the authentic retail sales. The bullwhip effect refers to the incident where orders to the supplier tend to have bigger variance than sales to the buyer (i.e. demand misrepresentation), and the alteration propagates upstream in an enlarged form (i.e. variance amplification). It is verified that if the members of the supply chain allocate information with intellectual support technology, and concur on enhanced and superior fuzzy estimates on future sales for the upcoming period, then the bullwhip effect can be significantly reduced.

Keywords :Supply chain management system, Bullwhip effect, Fuzzy Logic, Rationing & Shortage gaming.

[1] Baganha M, Cohen M., "The stabilizing effect of inventory in supply chains". Operations Research; 46:572–83, 1998.
[2] Barbuceabu, M., Fox, M.S., "The Information Agent: An Infrastructure Agent Supporting Collaborative Enterprise Architectures", report of Enterprise Integration, University of Toronto, 19995.
[3] Cachon GP, Lariviere MA., "Capacity choice and allocation: strategic behavior and supply chain performance". Management Science; 45(8):1091–108, 1999.
[4] Cachon GP., "Managing supply chain demand variability with scheduled ordering policies", Management Science, Vol. 45, No. 6, pp. 843–56, 1999.
[5] Caglayan, A., Harrison, C., "Agent Sourcebook", John Willey & Sons, 19997.
[6] Carlsson C., Fuller R., Reducing the bullwhip effects by means of intelligent, soft computing methods. Proceeding of the 34th Hawaii International Conference on System Science, 2001.
[7] Carlsson C., Fuller R. On possibilistic mean value and variance of fuzzy numbers, Fuzzy Sets and Systems, (122), 315-326, 2001.
[8] Chauhan, D., "JAFMAS: A Java_based Agent Framework for Multi-Agent Systems Development and Implementation", Technical Report, ECECS Department, University of Cincinnati, 1997.
[9] Chen F, Drezner Z, Ryan J, Simchi-Levi D, Quantifying the bullwhip effect in a simple supply chain: the impact of forecasting, lead-times, and information. Management Science; 46(3):436–43, 2000.
[10] Chen F, Decentralized Supply Chains Subject to Information Delays, Management Science, Vol. 45, No. 8, 1076-1090, 1999.
[11] Chen, Y., Peng, Y., Labrou, Y., A negotiation-based multi-agent system for supply chain management. Working Notes of the gents'99 Workshop on Agents for Electronic Commerce and Managing the Internet-Enabled Supply Chain, Seattle, WA, April, 15–20, 1999.
[12] Chen F, Drezner Z, Ryan J, Simchi-Levi D., "Quantifying the bullwhip effect in a simple supply chain: the impact of forecasting, lead-times, and information", Management Science; Vol. 46, No. 3 pp. 436–43, 2000.

10.Full Citation
Manuscript Id :: 24008
Manuscript Type :: Research
Manuscript Title :: Fair Scheduling Algorithm with Dynamic Load Balancing Using In Grid Computing
Country :: India
Authors :: Mr.V. P. Narkhede || Prof. S. T. Khandare
Pages No. :: 53-57
Paper Index :: : 07.4721/0210053057
Full PDF ::
Grid computing is new emerging technology which can be used to increase the performance of Distributed Computing. It has emerged a new technology focusing on the resource sharing, utilizing parallelism, and exploiting throughput managing and to reduce response time through proper distribution of the application. Grid computing is a replica of distributed computing that uses geographically and disperses resources. To increase performance and efficiency, the Grid system needs competent load balancing algorithms for the distribution of tasks. The main goal of load balancing is to provide a distributed, low cost scheme that balances the load across all the processors. In this seminar, the algorithm describes multiple aspects of load balancing algorithm and introduced number of concepts which explains its broad capabilities. It also fulfils the objectives of the grid environment to achieve high performance computing by optimal usage of geographically distributed and heterogeneous resources.

Keywords : Grid Computing, Reliability, Resources etc.

[1] U. Karthick Kumar, "A Dynamic Load Balancing Algorithm in Computational Grid Using Fair Scheduling, International Journal Of Computer Science and Informatics Vol. 8, Issue 5, No 1, September 2011 ISSN (Online): 1694-0814.
[2] Dr. K. Vivekanandan, D.Ramyachitra, "A Study on Scheduling in Grid Environment", International Journal on Computer Science and Engineering (IJCSE), ISSN : 0975-3397 Vol. 3 No. 2 Feb 2011.
[3] Sachin Kumar, Niraj Singhal, " A Priority based Dynamic Load Balancing Approach in a Grid based Distributed Computing Network", International Journal of Computer Applications (0975 – 8887) Volume 49– No.5, July 2012 11
[4] Pawandeep Kaur, Harshpreet Singh, "Adaptive dynamic load balancing in grid computing an approach,"International journal of engineering science & advanced technology , ISSN: 2250–3676 Volume-2, Issue-3, 625 – 632, May-Jun 2012.
[5] R.Gogulan, A.Kavitha, U.Karthick Kumar, "Max Min fair scheduling algorithm using in grid scheduling with load balancing", International Journal of Research in Computer Science eISSN 2249-8265 Volume 2 Issue 3 (2012) pp. 41-49.
[6] Prabhat Kr. Srivastava, "Improving Performance in Load Balancing Problem on the Grid Computing System", International Journal of Computer Applications (0975 – 8887) Volume 16– No.1, February 2011
[7] Qin Zheng Chen-Khong Tham Bharadwaj Veeravalli, "Dynamic Load Balancing and Pricing Dynamic Load Balancing and Pricing in Grid Computing with Communication Delay, November 2, 2010
[8] Belabbas Yagoubi and Yahya Slimani, "Dynamic Load Balancing Strategy for Grid Computing," Journal of Information Technology and Applications Vol. 1 No. 4 Mar ch,2007, pp. 285-296.
[9] Belabbas Yagoubi and Yahya Slimani, "Dynamic Load Balancing Strategy for Grid Computing," World Academy of Science, Engineering and Technology 19 2006.
[10] A book ,"An introduction to grid computing", By Bart Jacob, Michael Brown, Kentaro Fukui, Nihar Trivedi, IBM/Redbooks December 2005.