Current Issue

The current issue of the journal read...

Authors' guidelines

All you need to know in order to publish in our journal read...

Submission

Here you can submit your paper continue...

Contact

If anybody want to get in touch with us or submit article in Reseach Inventy please mail on :  Inventy.journal@gmail.com

For Authors                                          ISSN(e) : 2278-4721           ISSN(p):2319-6483

 
  • Call for Paper

    Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per

    Readmore
  • Submit an Article

    Submit your manuscript as an attachment file to  Inventy@editormails.com in MS Word (.doc format)



    Readmore
  • Payment Option

    If your paper is accepted for publication in Research Inventy : International Journal of Engineering and Science, you will get


    Readmore
  • Faqs

    Frequently Asked Questions






    Readmore
  • Contact Us

    If anybody want to get in touch with us or submit article in Reseach Inventy please mail on :  Inventy@editor
    mails.com

Vol ||3|| Issue ||7 ||


1.Full Citation
Manuscript Id :: 28015
Manuscript Type :: Research
Manuscript Title :: Securing Wi-Fi Network Via Proxy Servers
Country :: Gurgaon
Authors :: Surbhi Gupta || Puneet Bhalla
Pages No. :: 01-05
Paper Index :: : 07.4721/0370105
Full PDF ::
Abstract

"Unsecured wi-fi network (genetically known as Wireless Local Area Network or WLAN) has become a national celebrity in vamp category due to it's misuse by terrorists, in the recent past.Even otherwise, any open and unsecured node, especially wireless,is an extremely serious security hazard for any network, whether it is corporate, personal, home or small office user. Wi-fi networks are in the news in the recent past due to effective misuse of these by terror organisations. They have been misused asthese wireless (wi-fi) networks have been installed unsecured. Withthe misuse by terrorists, unsecured wi-fi misuse has become national celebrity in villain and vamp categories."

KEYWORDS: AES, DAIR, MAC, Proxy server, TKIP, WEP, WPA

Reference

[1] http://www.webopedia.com/TERM/W/Wi_Fi.html
[2] http://en.wikipedia.org/wiki/Proxy_server.
[3] Forward and Reverse Proxies". httpd mod_proxy. Apache. Retrieved 20 December 2010.
[4] Lyon, Gordon (2008). Nmap network scanning. US: Insecure. p. 270.ISBN 978-0-9799587-1-7.
[5] Wireless lan security today and tomorrow by Sangram Goyal and Dr. S. A. Vetha Manickam Center for Information and Network Security Pune University.
[6] Wireless security ppt by David Wagner.
[7] The State of Wi-Fi® Security Wi-Fi CERTIFIED™ WPA2TM Delivers Advanced Security to Homes, Enterprises and Mobile Devices by Wi-Fi Alliance
[8] Introduction to Wi-Fi Network Security By Bradley Mitchell .
[9] Sara Nasre Wireless Lan Security Research Paper IT 6823 Information Security Instructor: Dr. Andy Ju An Wang Spring 2004.
[10] WI-FI security –WEP, WPA and WPA2 by Guillaume Lehembre.


2.Full Citation
Manuscript Id :: 28018
Manuscript Type :: Research
Manuscript Title :: Context Aware Fuzzy Rule Based Vertical Handoff Decision Strategies for Heterogeneous Wireless Networks
Country :: India
Authors :: M.SAZEEDA KAUSAR || DHANARAJ CHEELU
Pages No. :: 06-12
Paper Index :: : 07.4721/03706012
Full PDF ::
Abstract

The 4th generation wireless communication systems aim to provide users with the convenience of seamless continuous connection to access various wireless technologies and to have the connection with the best network which provides the best Quality of service. To achieve this goal it is necessary to have a good decision making algorithm which decides the best network for a specific application under which vertical handoff should be performed. This paper proposes a QoS aware fuzzy rule based vertical handoff mechanism Using fuzzy logic quantitative decision algorithm (FQDA) is used as an handoff decision criteria to choose which network to handover among different available access networks. The QoS parameters considered are available bandwidth, end-to-end delay, jitter, and bit error rate (BER). Simulation results show that compared to other vertical handoff algorithms, the proposed algorithm gives better performance for different traffic classes.

KEYWORDS : Heterogeneous networks, Vertical handoff, Fuzzy Rule Based algorithm, Traffic Classes, QoS parameters.

Reference

[1] Q-A. Zeng and D. P. Agrawal, "Modeling And Efficient Handling Of Handoffs In Integrated Wireless Mobile Networking", IEEE Transactions on Vehicular Technology, Vol. 51, No.6, Nov. 2002, pp. 1469-1478.
[2] N.Nasser, A.Hasswa and H.Hassanein, "Handoff in Fourth Generation Heterogeneous Networks", IEEE communication Magazine, Vol.44, pp. 96-103, Oct 2006
[3] Enrique Stevens-Navarro and Vincent W.S. Wong, "Comparison between Vertical Handoff Decision Algorithms for Heterogeneous Wireless Networks", IEEE VTC, vol 2, pages: 947-951, 2006
[4] Nirmala Shenoy, Sumita Mishra, "Vertical handoff and mobility management for seamless integration of heterogeneous wireless access technologies" in 'Heterogeneous Wireless Access Networks: Architectures and Protocols' published by Springer Verlag 2008
[5] W. Chen, J. Liu, and H. Huang, "An Adaptive Scheme for Vertical Handoff in Wireless Overlay Networks," in Proc. of ICPAD'04, Newport Beach, CA, July 2004.


3.Full Citation
Manuscript Id :: 28017
Manuscript Type :: Research
Manuscript Title :: A Robust Vertical Handoff Algorithm with Dynamic New Call Blocking Probability for Heterogeneous Wireless Mobile Networks
Country :: India
Authors :: Madhuri Chennareddy||Dhanaraj Cheelu
Pages No. :: 13-18
Paper Index :: : 07.4721/037013018
Full PDF ::
Abstract

Global information access to the user will be provided by the wireless networking. Now a day's wireless networking is becoming an important and popular way to provide the global information access to the user while roaming among the heterogeneous wireless network. The main aim of seamless mobility is the availability of Simple and robust vertical handoff algorithm. This algorithm allows a mobile node to move across the various heterogeneous wireless networks. Vertical handoff procedure is needed in order to move a mobile node from one heterogeneous wireless network to another heterogeneous wireless network and battery power is considered as crucial parameter for certain mobile nodes. In this paper a simple and robust two-step vertical handoff algorithm is proposed. To the best of our knowledge, this algorithm is the first vertical handoff algorithm that takes the two classifications of mobile nodes into the consideration. One is resource poor mobile nodes and other is resource rich mobile node. In addition to this new call blocking and dynamic new calling probability is introduced in this paper. The experimental results have shown that the proposed algorithm outperforms traditional algorithm in bandwidth utilization, handoff dropping rate and handoff rate.

KEYWORDS - Vertical handoff, new call blocking probability, Heterogeneous wireless mobile networks

Reference

[1] Mohamed Lahby, Leghris Cherkaoui and Abdellah Adib "An Enhanced Evaluation Model for Vertical Handover Algorithm In Heterogeneous Networks". IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 3, No 2, May 2012
[2] Ram Kumar Singh, Amit Asthana, Akanksha Balyan, Shyam Ji Gupta, Pradeep Kumar "Vertical Handoffs in Fourth Generation Wireless Networks" International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-2, May 2012
[3] A. Bhuvaneswari, Dr. E. George Dharma Prakash Raj"An Overview of Vertical Handoff Decision Making Algorithms" I. J. Computer Network and Information Security, 2012, 9, 55-62
[4] Feng He Furong Wang "Position aware vertical handoff decision algorithm in heterogeneous wireless networks" 978-1-4244-2108-4/08/$25.00 © 2008 IEEE
[5] Enrique Stevens-Navarro, Vincent W.S. Wong, and Yuxia Lin "A Vertical Handoff Decision Algorithm for Heterogeneous Wireless Networks"


4.Full Citation
Manuscript Id :: 26117
Manuscript Type :: Research
Manuscript Title :: A View of Management Strategies in Workplace industrial Relations in the Construction Industry
Country :: Nigeria
Authors :: E.O. AIYEWALEHINMI
Pages No. :: 19-33
Paper Index :: : 07.4721/037019033
Full PDF ::
Abstract

ABSTRACT: This paper presents a factor analysis on views of management strategies in workplace industrial relations in the Building and Construction Industry. The purpose is to promote a unitary approach where employees and management can work toward a common goal. It is believed that the strong base of the power isusually translated in terms of hierarchical authority, with individuals at higher levels controlling all activities at the lower levels. On this platform the study examines the relationship between employees and management. mail questionnaire was selected as means of data collection and responses were analyzed using SPSS. Assumption that the observations are drawn from a normally distributed population before using analysis of variance (ANOV A with the Scheffe and F test) to test the propositions. Involved are: top management executives, external stakeholders and all categories of employees engaged in the industry. The test showed that 81.5% of variables indicated no significant difference while 18.5% showed a significant difference at a significance level of 0.05 (accepted).

KEYWORDS: Management, Communication, Factor Analysis, Statistical Reliability and Workplace Industrial relations.

Reference

[1] Adams, G. W. (1991) 'Review of Province-Wide Single-Trade Bargaining Process in the Industrial, Commercial, and Institutional Sector of Ontario's Construction Industry', Report commissioned by Minister of Labour, Ontario, 14 December 1990.
[2] AFCC, (1990), Report, Part of Submission Made to the NSW Royal Commission on Building and Construction Industry, Sydney.
[3] Allen, M.W. (1992). 'Communication and Organizational Commitment: Perceived Organizational Support as a Mediating Factor', Communication Quarterly, 40: 357-367
[4] Australian Bureau of Statistics (1984-85,1988-89) ABS CAT NO 8772.0, 8771.0 and 8775.0
[5] Australian Bureau of Statistics (1995) ABS CAT NO 6203.0
[6] Australian Federation of Construction Contractors (1991) Construction Industry Prospects; Bulletin Volume IX No 2.
[7] (A WIRS), (1990) Industrial Relations at Work, Commissioned by Commonwealth Department of Industrial Relations. Australian Government Publishing Service. Canberra.


5.Full Citation
Manuscript Id :: 26118
Manuscript Type :: Research
Manuscript Title :: Factor Analysis of Job Motivation in the Construction Industry
Country :: Nigeria
Authors :: E.O. Aiyewalehinmi
Pages No. :: 34-42
Paper Index :: : 07.4721/037034042
Full PDF ::
Abstract

The purpose of this study is to present a factor analysis carried out on the responses to the mail questionnaires sent to the four construction parties involved in the study. The respondents are the four major construction parties: the management, employers' associations, employees and union. 42 construction industries defined as Management, 80 non-managementemployees, 30 employers' Associations defined as Managing Director and Executives and 15 Building and Construction Workers' Union Officials, defined as Unionwere contacted in New South Wales, Australia. Fifteen motivation related variables were examined and items derived were measured on five Likert point scales. SPSS (Statistical Package for the Social Science for Windows) was used for data analysis. The results showed very little difference across all variables in the scores. The outcome of the study showed that the majority of construction crews do not enter the industry because of monetary motivation but for personal skill development.

KEYWORDS: Motivation, Management, Employers' Associations, employees and union

Reference

[1] Daniel Carrier, J. (1993): Managing and Motivation People on joint Venture Project', Journal of Construction Engineering. ASCE, Vol. 119, No 4, Pp 503 -517.
[2] Moloney, W. (1981): 'Motivation in Construction'. Journal of the Construction Divison, ASCE, Vol. 197, No 4, Pp 641- 647.
[3] Maloney, F. and McFillen (1988): Workers Perceptions' Contractor Behaviour. Journal of the Construction Engineering. Vol. No 3 ASCE.


6.Full Citation
Manuscript Id :: 28026
Manuscript Type :: Research
Manuscript Title :: Several problems in elementary number theory
Country :: China
Authors :: Kaifu SONG
Pages No. :: 43-58
Paper Index :: : 07.4721/03704358
Full PDF ::
Abstract

We will give a character of indefinite equation and a solution of unitary congruence equation
and quadratic congruence equation, reveal the relation among the original root of Odd prime Numbers, the
Simplified residue system and Square residual.

Keywords: Pythagorean number; Unitary congruence equation; Quadratic congruence equation; The original
root. MR(2000):08B10;1CLC: 0156.1.

Reference

[1]. Hua, Loo-Keng. (1979). An introduction to number theory (In Chinese).Beijing: Science Press.
[2]. [2]Min Sihe Yan Shijian. (2003) Elementary number theory(In Chinese). Beijing: Higher Education Press.
[3]. Xiong, Q. (1982). Elementary number theory (In Chinese). Wuhan: Hubei Education Press.
[4].Song, K. (2007). Elementary number theory (In Chinese). Beijing: China Drama Press.