Software Design of Water Supply System
for Irrigation
-- John Jiya Musa, Alikali Babawuya,
Adeoye Peter Aderemi
and Micheal Alaba Oluwasegun
Water being a limited resource, its efficient use is basic to the survival of the ever-increasing population of the world. In
the comprehensive strategy needed for the conservation and development of water resources, several factors are to be
kept in view. Water use varies considerably around the world. In Africa, Asia and South America, agriculture is the primary
user of underground and surface water. An automated irrigation system that ensures efficient use of available water
was designed, i.e., the hardware and software. The software was implemented after the system design using Microsoft
Visual Basic 6.0. The software IrrigateSoft2009 is about 10 MB in size and will take about 2 min to set up irrigation activity.
© 2010 IUP. All Rights Reserved.
Minimum Spanning Tree-Based Approach
for Reliability Estimation of COTS-Based Software Applications
-- Kirti Seth, Arun Sharma and Ashish Seth
Software reliability is defined as the probability of the failure-free operation of a software system for a specified period
of time in a specified environment. Traditional approaches for software reliability analysis treat the software as a whole,
use test data during software test phase and model only the interactions with outside world; these are known as black
box models. Day-by-day the complexity of software application is growing and there is more emphasis on reuse. So,
Component-Based Software (CBS) applications have come into existence. The black box models ignore the structure of the
software made out of components and reliability of individual components, and thus are not appropriate to model the CBS. This
has generated the research interest of architecture-based reliability. This paper introduces a reliability model and
reliability analysis technique for architecture-based reliability evaluation.
© 2010 IUP. All Rights Reserved.
SOA in Business Organization
-- S Nirmala Sugirtha Rajini and T Bhuvaneswari
Service-Oriented Architecture (SOA) has been widely and quickly adopted in different organizations during recent
years. SOA enables to solve integration complexity problem and facilitates broad-scale interoperability and unlimited
collaboration across the organization. This paper demonstrates how SOA is important in business organizations based on a
proposed architecture diagram. A case study is also presented where the functionality of the proposed SOA is implemented in
a business organization.
© 2010 IUP. All Rights Reserved.
Detection of Bridging Fault
in Reversible Circuits
-- Hafizur Rahaman, Dipak K Kole,
Debesh K Das
and Bhargab B Bhattacharya
Logic synthesis with reversible circuits has received considerable interest in the light of advances recently made
in quantum computation. Implementation of a reversible circuit is envisaged by deploying several special types of
quantum gates, such as Toffoli gate. Newer technologies like ion trapping or nuclear magnetic resonance are required to
emulate quantum gates. This paper presents the testability issue of reversible circuits under the bridging fault model.
Intra-level bridging fault model is considered here, i.e., a single pair of lines, both lying at the same level of the circuit, may be
assumed to have been logically shorted in order to model a defect in reversible circuit. For an
(N x N) reversible circuit with d levels realized with simple Toffoli gates, the time complexity of the test generation procedure is O(Nd2 log2N). A test set of cardinality O(d log2N) is found to be sufficient for testing all such detectable faults. A minimal test set can also be
easily derived by using the concept of test equivalence. Finally, this paper proposes a design for testability technique to
achieve universal test set. The reversible circuit has been augmented by adding one control AND line to achieve a universal set
for detection of this fault. For an N x N reversible circuit realized with simple Toffoli gate, this technique admits a compact
test set of cardinality .
© 2010 IUP. All Rights Reserved.
A Comparative Study of the Defuzzification Methods
in an Application
-- Nidhi Kataria
This paper briefly reviews some of the different defuzzification methods reported in
literature, using the base problem of feeding according to the protein and energy level. The defuzzification methods studied
are: centroid, bisector, Largest of Maximum (LOM),
Mean of Maximum (MOM) and Smallest of Maximum
(SOM). In the problem under consideration, two input parameters
energy and protein, and one output parameter
(feeding)have been taken. In this work, four rules
have been made, which decide the level of feed required.
Ten observations for energy and protein levels are taken and the fuzzy rules are applied on them to find a solution. The fuzzy results
obtained are then defuzzified using the five methods stated above. From the results
obtained for the different observations and different
defuzzification methods, it can be concluded that centroid, bisector and MOM
give almost the same values. Therefore, there is
more consistency in these results. On the other
hand, there is a wide variation in the results
obtained from LOM and SOM.
© 2010 IUP. All Rights Reserved.
Efficient Reactive Routing Protocols
in Ad Hoc Networks
-- Rashmi Sharma
The era of 1990s marked a rapid growth of research interest in mobile ad hoc networking. Mobile Ad hoc Networks
(MANETs) employ the traditional TCP/IP protocol structure which provides end-to-end communication between two different
nodes. Routing is one of the interesting research areas in MANET. It has received a tremendous amount of attention from
researches. This helps in the development of different routing protocols for MANETs. Therefore, it is quite difficult
to determine which protocol perform best under a number of different network scenarios, such as increasing node
density and traffic. This paper provides an overview of a wide range of on-demand routing protocols proposed in the
literature, presents a qualitative analysis of on-demand routing protocols and suggests which protocol
performs best in large networks.
In qualitative analysis, the properties are
compared according to different criteria and then listed the advantages
and disadvantages of the each protocol. Protocols considered here are on-demand routing
protocols, as these are best suited for ad hoc environment.
© 2010 IUP. All Rights Reserved.
|