Professional Documents
Culture Documents
Global Sci-Tech. 8-1-2016
Global Sci-Tech. 8-1-2016
net/publication/299529651
CITATION READS
1 5,104
2 authors, including:
Mohd Parvez
Al Falah University
70 PUBLICATIONS 99 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Mohd Parvez on 28 February 2017.
Global Sci-Tech
Al-Falah's Journal of Science & Technology
VOLUME - 8 NUMBER - 1 JANUARY-MARCH 2016
A -FA AH
UNIVERSITY
1997
CHIEF EDITOR
Prof. Z.H. ZAIDI
EDITORS
Prof. Khalil Ahmad
Global Sci-Tech., 8, 1 (1-60) January-March 2016
EDITORIAL BOARD
Prof. Abdullah M. Jarrah, Jordan
Prof. Akhtar A. Khan, USA
Prof. Ash Mohd Abbas, India
Prof. Carlos Castro, USA
Prof. D. Bahuguna, India
Prof. H.P. Dikshit, India
Prof. H.R. Khan, Germany
Prof. Ishwar Singh, India
Prof. Lovely Agarwal, USA
Prof. M.S. Jamil Akhtar, India
Prof. Mohd Zulfiquar, India
Prof. Mohd. Sharif, India
Prof. Mursalin, India
Prof. Pankaj Maheshwari, USA
Prof. R.K. Pandey, India
Prof. R.M. Mehra, India
Prof. Tabrez Alam Khan, India
Prof. Vikram Kumar, India
Prof. Zahid A. Khan, India
Available at:
www.alfalahuniversity.edu.in
www.kurra.co.in
Published by
Al-Falah Charitable Trust, New Delhi
CHIEF EDITOR
Prof. Z.H. ZAIDI
EDITORS
Prof. Khalil Ahmad
Al-Falah University, Faridabad
EDITORIAL BOARD
CONTENTS
6. Intelligent Web Agent through Web Text Mining Techniques with Machine Learning 50
Md Barique Quamar
ABSTRACT
1
Tasleem Ahmad and Ankita Agarwal
Fig. A1. Virtual Micrometer Training Tool Fig. A2 (b) Barrel Camera
2
A Review on-virtual Metrology Laboratory
3
Tasleem Ahmad and Ankita Agarwal
4
A Review on-virtual Metrology Laboratory
Requirement : 4. CONCLUSIONS
Compatible with iPad. Requires iOS 4.3 In order to increase the awareness
or later, Size: 20.7 MB. about the virtual instrumentation among
2.2.1. Least Count : professionals involved in measurement, it
is necessary to make them understand the
The dial caliper is consisting of main concepts of virtual measurements. To
scale with a circular dial. The dial carries address this issue, we have to develop
100 division equivalents to 0.1" of main Virtual Measuring Training Tools or can
scale. The dial caliper is primarily intended buy from the professionals supplying the
for measuring both inside and outside same. These are easy tools and cost
diameter of shafts, thickness of parts etc. effective for trainee and users to under-
to accuracy of 0.001". stand virtual measurement in a virtual
metrology lab. Total eight experiments were
3. MODULE "B" : THE VIRTUAL CALLI- explained to understand the fundamentals
PER TRAINING TOOL EXPERIMENT of virtual measurements.
B1: Outer diameter measurement of disk.
5
Tasleem Ahmad and Ankita Agarwal
6
Global Sci-Tech,
Literature8review
(1) January-March 2016;and
on Design, Analysis pp.Fatigue
7-14 DOI
Life No.:
of a10.5958/2455-7110.2016.00002.1
Mechanical Spring
ABSTRACT
In this paper are reviewed some papers on the design and analysis of spring
performance and fatigue life prediction of spring. There is also the analysis of
failure in spring. The aim of this paper is to represent a general study on the
analysis of spring. Compression springs are commonly used in the I.C. Engine
valves, 2 wheeler horn & many more and they are subjected to number of stress
cycles leading to fatigue failure. A lot of research has been done for improving the
performance of spring. Now the automobile industry has shown interest in the
replacement of steel spring with composite spring. In general, it is found that
fiberglass material has better strength characteristic and are lighter in weight as
compare to steel for spring. We can reduce product development cost and time
while improving the safety, comfort and durability of the vehicles produce. The
CAE tool has where much of the design verification is now done using computer
simulation rather than physical prototype testing.
7
S K Jha and Mohd. Parvez
2.1 Selection of material for spring a. Try to keep the ends of the spring, where
construction possible, within such standard forms as
closed loops, full loops to centre, closed
a. Space limitations : Do you have and ground, and open loops.
adequate space in the mechanism to
b. Pitch. Keep the coil pitch constant
use economical materials such as oil-
unless you have a special requirement
tempered ASTM A229 spring wire? If
for a variable pitch spring.
your space is limited by design and you
need maximum energy and mass, you c. Keep the spring index [mean coil
should consider using materials such diameter, between 6.5 and 10 wherever
as music wire, ASTM A228 chrome possible. Stress problems occur when
vanadium or chrome silicon steel wire. the index is too low, and entanglement
and waste of material occur when the
b. Economy : Will economical materials
index is too high.
such as ASTM A229 wire suffice for the
intended application? d. Do not electroplate the spring unless it
is required by the design application.
c. Corrosion resistance : If the spring is
The spring will be subject to hydrogen
used in a corrosive environment, you
embrittlement unless it is processed
may select materials such as 17-7 PH
correctly after electroplating.
stainless steel or the other stainless
steels (301, 302, 303, 304, etc.). Hydrogen embrittlement causes abrupt
and unexpected spring failures. Plated
d. Electrical conductivity : If you require
springs must be baked at a specified
the spring to carry electric current,
temperature for a definite time interval
materials such as beryllium copper and
immediately after electroplating to
phosphorous bronze are available.
prevent hydrogen embrittlement. For
e. Temperature range : Whereas low cosmetic and minimal corrosion protection,
temperatures induced by weather are zinc electroplating is generally used,
seldom a consideration, high- although other plating such as chromium,
temperature applications will call for cadmium, and tin are also used as per the
materials such as 301 and 302 stainless application requirements. Die springs
steel, nickel chrome A286, 17-7 PH, usually come from the die spring
Inconel 600, and Inconel X750. Design manufacturers with coloured enamel paint
stresses should be as low as possible finishes for identification purposes.
for springs designed for use at high
operating temperatures. 2.3 Special processing either during or
after manufacture
f. Shock loads, high endurance limit,
and high strength : Materials such as a. Shot penning improves surface
music wire, chrome vanadium, chrome qualities from the standpoint of
silicon, 17-7 stainless steel, and reducing stress concentration points on
beryllium copper are indicated for these the spring wire material. This process
applications. can also improve the endurance limit
8
Literature review on Design, Analysis and Fatigue Life of a Mechanical Spring
and maximum allowable stress on the along with the successive resonances and
spring. achieve significant values even at large
distances from the resonance frequencies.
b. Subjecting the spring to a certain
amount of permanent set during B. Pyttel, I. Brunner, et al. [2] Long-
manufacture eliminates the set problem term fatigue tests on shot peened helical
of high energy versus mass on springs compression springs were conducted by
that have been designed with stresses means of a special spring fatigue testing
in excess of the recommended values. machine at 40 Hz. Test springs were made
This practice is not recommended for of three different spring materials - oil
springs that are used in critical hardened and tempe red SiCr- and SiCrV-
applications. alloyed valve spring steel and stainless
steel. With a special test strategy in a test
2.4 Stress considerations run, up to 500 springs with a wire diameter
of d = 3.0 mm or 900 springs with d = 1.6
Design the spring to stay within the
mm were tested simultaneously at different
allowable stress limit when the spring is stress levels. Based on fatigue
fully compressed or "bo ttomed." This can investigations of springs with d = 3.0 mm
be done when there is sufficient space up to a number of cycles N = 109 an
available in the mechanism, and economy
analysis was done after the test was
is not a consideration. When space is not
continued to N = 1.5 _ 109 and their results
available, design the spring so that its
were compared. The influence of different
maximum working stress at its maximum shot peening conditions were investigated
working deflection does not exceed 40 to in springs with d = 1.6 mm. Fractured test
45 percent of its minimum yield strength
springs were examined under optical
for compression and extension springs and
microscope, scanning electron microscope
75 percent for torsion springs. Remember
(SEM) and by means of metallographic
that the minimum tensile strength microsections in order to analyse the
allowable is different for differing wire fracture behaviour and the failure
diameters; higher tensile strengths are mechanisms. The paper includes a
indicated for smaller wire diameters.
comparison of the results of the different
spring sizes, materials, number of cycles
3. LITERATURE REVIEW and shot peening conditions and outlines
further investigations in the VHCF-region..
K. Michalczyk [1] The analysis of
For comparison the results for the springs
elastomeric coating influence on dynamic
with d = 1.6 mm and d = 3.0 mm and Ps =
resonant stresses values in spring is
98% are summarised in Fig. 1. Except for
presented in this paper. The appropriate
springs made of the stainless steel wire,
equations determining the effectiveness of
the fatigue strength of springs with d = 3.0
dynamic stress reduction in resonant
mm is higher than for springs with d = 1.6
conditions as a function of coating
mm. The size effect would imply higher
parameters were derived. It was proved that
fatigue strength for smaller wire diameters.
rubber coating will not perform in
satisfactory manner due to its low modulus Touhid Zarrin-Ghalami, Ali Fatemi [3]
of elasticity in shear. It was also Elastomeric components have wide usage
demonstrated that about resonance areas in many industries. The typical service
of increased stresses are wider and wider loading for most of these components is
9
S K Jha and Mohd. Parvez
Fig. 1. Comparison of fatigue strength of springs made of various spring steel wires
with d = 1.6 mm and d = 3.0 mm at P5 = 98%.
variable amplitude and multiaxial. In this counting method and Miner's linear
study a general methodology for life damage rule were used for predicting
prediction of elastomeric components fatigue life under variable amplitude
under these typical loading conditions was loadings. The fracture mechanics approach
developed and illustrated for a passenger was used for total fatigue life prediction of
vehicle cradle mount. Crack initiation life the component based on specimen crack
prediction was performed using different growth data and FE simulation results.
damage criteria. The methodology was Total fatigue life prediction results showed
validated with component testing under good agreement with experiments for all of
different loading conditions including the loading conditions considered.
constant and variable amplitude in-phase
and out-of-phase axial-torsion experi- Wei Li, Tatsuo Sakai et al. [4] Very high
ments. The optimum method for crack cycle fatigue (VHCF) properties of a newly
initiation life prediction for complex developed clean spring steel were
multiaxial variable amplitude loading was experimentally examined under rotating
found to be a critical plane approach based bending and axial loading. As a result, this
on maximum normal strain plane and steel represents the duplex S-N property
damage quantification by cracking energy only for surface -induced failure under
density on that plane. Rain flow cycle rotating bending, whereas it represents the
10
Literature review on Design, Analysis and Fatigue Life of a Mechanical Spring
single S-N property for surface-induced helical spring under an axial load. The
failure and interior inhomogeneous study provides a clear match between the
microstructure-induced failure under axial evolution of the theoretical and the
loading. Surface small grinding defect- numerical tensile and compression normal
induced failure is the predominant failure stresses, being of sinusoidal behaviour. The
mode of this steel in VHCF regime. The overall equivalent stress isovalues
surface morphology of the interior inhomo- increases radially from 0_ to 180_, being
geneous microstructure with distinct maximal on the internal radial zone at the
plastic deformation is much rougher than section 180_. On the other hand, the
that of the ambient matrix, which means minimum stress level is located in the
the stress concentration resulted from the centre of the filament cross section.
strain inconsistency between the micro
structural in homogeneity as soft phase and B. Pyttel , D. Schwerdt, et al. [6 ] The
the ambient matrix as hard phase plays a paper gives an overview of the present state
key role in causing interior crack initiation. of research on fatigue strength and failure
Considering the effect of surface mechanisms at very high number of cycles
compressive residual stress, the threshold (Nf > 107). Testing facilities are listed. A
stress intensity factor for surface small classification of materials with typical S-N
defect-induced crack propagation of this curves and influencing factors like notches,
steel is evaluated to be 2.04 MPam1/2, residual stresses and environment are
which means that the short crack effect given. Different failure mechanisms which
plays a key role in causing the surface small occur especially in the VHCF-region like
defect-induced failure of this steel in the subsurface failure are explained. There
VHCF regime. From the viewpoint of defect micro structural in homogeneities and
distribution, surface and interior failure statistical conditions play an important
probabilities are equivalent under a fixed role. A double S-N curve is suggested to
characteristic value of defect density. If the describe fatigue behaviour considering
interior defect size is less than or even equal different failure mechanisms. Investigated
to the surface defect size, surface defect- materials are different metals with body-
induced failure will become the centred cubic lattice like low- or high-
predominant failure mode in VHCF regime, strength steels and quenched and
especially under rotating bending. tempered steels but also materials with a
face-centred cubic lattice like aluminium
Sid Ali Kaoua A, Kamel Taibi A et al. alloys and copper. Recommendations for
[5] This paper presents a 3D geometric fatigue design of components are given.
modelling of a twin helical spring and its
finite element analysis to study the spring Stefanie Stanzl-Tschegg [7] Ever since
mechanical behaviour under tensile axial high-strength steels were found to fail
loading. The spiralled shape graphic design below the traditional fatigue limit when
is achieved through the use of Computer loaded with more than 108 cycles, the
Aided Design (CAD) tools, of which a finite investigation of metals' and alloys' very high
element model is generated. Thus, a 3D 18- cycle fatigue properties has received
dof pentaedric elements are employed to increased attention. A lot of research was
discrete the complex ''wired-shape" of the invested in developing methods and
spring, allowing the analysis of the machinery to reduce testing times. This
mechanical response of the twin spiralled overview outlines the principles and testing
11
S K Jha and Mohd. Parvez
procedures of very high cycle fatigue tests of our proposal. The non-linear differential
and reports findings in the areas of crack equation derived from the model is solved,
formation, non-propagating small cracks, obtaining large stiffness variations. A
long crack propagation and thresholds. prototype of the actuator was fabricated
Furthermore, superimposed and variable and tested for different load cases.
amplitude loading as well as frequency Experimental results were compared with
effects are reported. numerical simulations for model
verification, showing excellent agreement
Yuxin Penga, Shilong Wangb, et al. [8]
for a wide range of work.
A stranded wire helical spring (SWHS) is a
unique cylindrically helical spring, which Matjaz Mrsnik, Janko Slavic, et al.
is reeled by a strand that is formed of 2~16 [10] The characterization of vibration-
wires. In this paper, a parametric modelling fatigue strength is one of the key parts of
method and the corresponding 3D model mechanical design. It is closely related to
of a closed-end SWHS are presented based structural dynamics, which is generally
on the forming principle of the spring. By studied in the frequency domain, parti-
utilizing a PC + PLC based model as the cularly when working with vibratory loads.
motion control system, a prototype Fatigue-life estimation in the frequency
machine tool is designed and constructed, domain can therefore prove advantageous
which improves the manufacturing of the with respect to a time-domain estimation,
SWHS. Via the commercial CAD package especially when taking into consideration
Pro/Engineering, numerical simulation is the significant performance gains it offers,
carried out to test the validity of the regarding numerical computations. Several
parametric modeling method and the frequency-domain methods for a vibration-
performance of the machine tool. The fatigue-life estimation have been developed
scheme of the tension control system is based on numerically simulated signals.
analyzed and the control mechanism is set This research focuses on a comparison of
up, which have achieved the constant different frequency-domain methods with
tension of each wire. A human machine respect to real experiments that are typical
interface is also proposed to achieve the in structural dynamics and the automotive
motion control and the tension control. industry. The methods researched are:
Experimental results show that the tension Wirsching-Light, the a0.75 method, Gao-
control system is well-qualified with high Moan, Dirlik, Zhao-Baker, Tovo-Benasciutti
control precision. and Petrucci-Zuccarello. The experimental
A.Gonzalez Rodríguez, J.M. Chacon, comparison re searches the resistance to
et al. [9] An adjustable-stiffness actuator close-modes, to increased background
composed of two antagonistic non-linear noise, to the influence of spectral width,
springs is proposed in this paper. The and multi-vibration-mode influences.
elastic device consists of two pairs of leaf Additionally, typical vibration profiles in the
springs working in bending conditions automotive industry are also researched.
under large displacements. Owing to this For the experiment an electro-dynamic
geometric non-linearity, the global stiffness shaker with a vibration controller was used.
of the actuator can be adjusted by The reference-life estimation is the
modifying the shape of the leaf springs. A rainflow- counting method with the
mathematical model has been developed in Palmgren-Miner summation rule. It was
order to predict the mechanical behaviour foun d that the Tovo-Benasciutti method
12
Literature review on Design, Analysis and Fatigue Life of a Mechanical Spring
gives the best estimate for the majority of uniaxial tensile load is conducted &
experiments, the only exception being the findings are compared against those
typical automotive spectra, for which the obtained from a theoretical approach based
enhanced Zhao-Baker method is best on a transformation of curvilinear
suited. This res earch shows that besides coordinates.
the Dirlik approach, the Tovo- Benasciutti
The characterization of the fatigue
and Zhao-Baker methods should be consid
properties of materials and components at
ered as the preferred methods for fatigue
very high numbers of cycles necessitates a
analysis in the frequency domain. careful selection of fatigue loading
Nenad Gubeljaka, Mirco D. Chapettib, machinery and measuring devices, as well
et al. [11] High strength steel grade 51CrV4 as a diligent application of testing and
in thermo-mechanical treated condition is evaluation procedures.
used as bending parabolic spring of heavy The present paper proposes a new
vehicles. Several investigations show that model of an adjustable-stiffness spring. The
fatigue threshold for very high cycle fatigue proposed device has four leaf springs with
depends on inclusion's size and material nonlinear elastic deformations. The
hardness. In order to determine allowed geometry of the leaf spring can be modified
size of inclusions in spring's steel the by means of an electric motor that adjusts
Murakami's and Chapetti's model have the stiffness of the spring to the desired
been used. The stress loading limit value. This paper also proposes a
regarding to inclusion size and applied mathematical model that allows the leaf
stress has been determine for loading ratio springs to be dimensioned for every specific
R=-1 in form of S-N curves. Experimental purpose. A prototype of the spring has been
results and prediction of S-N curve by built and tested.
model for given size of inclusion and R ratio
show very good agreement. Pre-stressing 5. REFERENCES
and shot-penning causes higher compress
stress magnitude and consequently change [1] K. Michalczyk, Analysis of the
of loading ratio to more negative value and influence of elasto meric layer on
additionally extended life time of spring. helical spring stresses in
longitudinal resonance vibration
4. CONCLUSIONS conditions, archives of civil and
mechanical engineering, (2013).
From above papers it is to conclude
that rubber is not suitable material for [2] B. Pyttel, I. Brunner, B. Kaiser, C.
the coating due to too low value of its Berger and M. Mahendran, Fatigue
modulus of elasticity in shear. Elastomeric behaviour of helical compression
coating has a positive impact on the springs at a very high number of
reduction of dynamic stresses in the spring cycles- Investigation of various
but also contribute to lowering of resonant influences, International Journal of
frequencies. Shorter total life was observed Fatigue, (2013).
for out-of-phase loading compared to in- [3] Touhid Zarrin-Ghalami and Ali
phase loading at the same level for both Fatemi, Multiaxial,fatig ue and life
constant and variable amplitude loadings. prediction of elastomeric compo-
In finite element analysis of the mechanical nents, International Journal of
behaviour of the twin helical spring under Fatigue, (2013).
13
S K Jha and Mohd. Parvez
[4] Wei Li, Tatsuo Sakai, Masami design, numerical simulation and
Wakitac and Singo Mimura, control system of a machine tool for
Influence of microstructure and stranded wire helical springs,
surface defect on very high cycle Journal of Manufacturing Systems,
fatigue properties of clean spring (2012).
steel, International Journal of Fatigue, [9] A González Rodríguez, J.M.
(2013). Chacón, A. Donoso and A.G.
[5] Sid Ali Kaoua, Kamel Taibia, González Rodríguez, Design of an
Nacera Benghanem, Krimo adjustable-stiffness spring:
Azouaoui and Mohammed Azzaza, Mathematical modeling and
Numerical modelling of twin helical simulation, fabrication and
spring under tensile loading, Applied experimental validation, (2011).
Mathematical Modelling, (2011). [10] Matjaz Mrsnik, Janko Slavic and
[6] B. Pyttel , D. Schwerdt and C. Miha Boltezar, Fre quency-domain
Berger, "Very high cycle fatigue - Is methods for a vibration-fatigue-life
there a fatigue limit?, International estimation - Application to real data,
Journal of Fatigue, (2011). Internat ional Journal of Fatigue
(2013).
[7] Stefanie Stanzl-Tschegg, Very high
[11] Nenad Gubeljaka, Mirco D.
cycle fatigue me asuring techniques,
Chapettib, Jozef Predana and
International Journal of Fatigue,
Bojan Sencic, Variation of Fatigue
(2013).
Threshold of Spring Steel with
[8] Yuxin Penga, Shilong Wang, Jie Prestressing, Procedia Engineering,
Zhou and Song Lei, Structural (2011).
14
Global Sci-Tech, 8 (1) January-March 2016;
Software Costpp. 15-21 DOI
Estimation No.: 10.5958/2455-7110.2016.00003.3
HUDA SAIF
Dux Concept, B-21, Jasola Vihar, New Delhi 110025
*E-mail: bloom.huda@gmail.com
ABSTRACT
15
Huda Saif
16
Software Cost Estimation
17
Huda Saif
18
Software Cost Estimation
19
Huda Saif
code is matched then it can be reused. significance in different manner in the field
3. LOC metric can be used to estimate of software cost estimation. The suggestions
software size as others can cause the of using combination of different techniques
overruns within time. and models can be much more efficient as
alone model and method are not much
4. Analogy concept [13] needs searching
effective in estimation Concept of reusability
technique in the form of search engine
helps in reducing the cost and effort with
as past projects should be placed in
use of analogy estimation and suitable
some code repository, and through this
searching and retrieval techniques. Lastly,
method the historical projects can be
gradual increment of new approaches and
matched with new projects.
the hybrid scheme of methods with models
5. If the codes are matched then it can be can be used.
used in new project reduce the effort
which reduces the cost. 5. REFERENCES
6. As tentative cost of new project should [1] Geetika Batra and Kuntal Barua,
be calculated and the old projects cost "A Review on Cost and Effort
are already known, it helps to asses Estimation Approach for Software
reduced cost in case of no. of lines used Development", M.Tech Scholar,
by new project. Through this approach Department of Computer Science,
the problems can be reduced as L.N.C.T, Indore, Asst Professor,
estimating by analogy with use of LOC Department of Computer Science,
as software size. And the retrieval L.N.C.T, Indore.
techniques like cosine similarity
Euclidean distance can be used such [2] Vahid Khatibi and Dayang N. A.
that reduction of cost and effort. Jawawi, "Software Cost Estimation
Methods: A Review".
4. CONCLUSION
[3] Attarzadeh and I. Siew Hock Ow,
Software development in this era is at "Proposing a New Software Cost
demanding phase, and estimation of cost Estimation Model Based on Artificial
and effort in this filed always remains an Neural Networks", IEEE International
open challenge and considered to be a Conference on Computer Engineering
complex task. Software engineering and and Technology (ICCET), 3, V3-487
SDLC have their significance presence in (2010).
the estimation. The review also shows that
[4] Attarzadeh and I. Siew Hock Ow,
many reviewers and researchers state that
"Improving the accuracy of software
assessment of cost gradually increases or
cost estimation model based on a
decreases. Though it is an essential task
new fuzzy logic model", World
the ignorance is not acceptable. Awareness
Applied science journal 8(2), 117
of project managers and selection of
(2010-10-2).
methods are responsible for over budget.
Each estimation techniques like COCOMO, [5] A.J. Albrecht and J. E. Gaffney,
SLIM model have it own prospects to be "Software function, source lines of
good and at the same time suffered with codes, and development effort
pitfalls. Estimation by algorithmic, non prediction: a software science
algorithmic, top-bottom approach or validation", IEEE Trans Software
bottom-up approach etc shows their own Eng. SE, 639-648, (1983).
20
Software Cost Estimation
21
Global Sci-Tech, 8 (1) January-March
Sher Jung
2016;
and Rajinder
pp. 22-36kumar
DOI No.: 10.5958/2455-7110.2016.00004.5
ABSTRACT
A mobile ad hoc network or MANET is a wireless network that is dynamic and can
be formed without any fixed and pre existing infrastructure whereas each node
can play the role of a router. Security is an important requirement in mobile ad hoc
networks. This paper deals with two aspects of the security in MANETs one is
security attacks and the other is security in routing protocols of MANET. The
important purpose of the description of security aspects of MANET is to implement
security including authentication, confidentiality, integrity, anonymity, and
availability of services to the mobile users. In MANETs there are both legitimate
and malicious nodes. In this paper, various important security issues in MANET
have also been analyzed. The various routing attacks, such as black hole, gray
hole, impersonation, worm hole etc. are reviewed in this paper. These attacks are
one of the reasons of major problems in MANETs.
22
Security of Routing Protocols in MANETs: A Survey
it will not have enough energy to send or A more powerful and efficient encryption
receive its own packets in the future. algorithm that can be used to encrypt the
Architecture of MANET is given in the figure data under transmission process which is
1. impossible for the attacker to get the useful
and effective information.
2. CLASSIFICATION OF ATTACKS
An active attack attempts to change the
According to behavior of ad hoc data which is being exchanged in the
network, attacks are classified as Passive network thereby destroys the functioning
attacks and Active attacks and according of the network. Active attacks can be
to source, attacks are classified as internal internal or external. Most often, external
attacks and External attacks. A brief attacks are initiated from outside the
description of attacks can be found in [5]. network. Internal attacks are initiated from
a node belonging to the network itself such
2.1 Passive and Active Attacks
as impersonation, modification, fabrication
A passive attack is that attack in which and replication. Since the attacker is part
the original message content and context of the network, internal attacks are more
do not get changed and normal operations difficult to detect as compared to the
on the network are not get disrupted. Here external attacks [8]. Examples of active
the requirement of confidentiality gets attacks are the actions such as message
violated [8]. Detecting this kind of attack is modifications, message replays, message
difficult because neither the system fabrications and the denial of service
resources nor the critical network functions attacks [12]. There are four types of active
are physically affected to prove the attacks as mentioned below:
intrusions [5]. 1. Masquerade - To pretend to be someone
23
Sher Jung and Rajinder kumar
else. In this attack some user is logged attacks. Internal attacks are initiated by
with different user account credentials both compromised and misbehaving nodes
to get access to some authorized in the network. The objective of the mobile
account. For example, if a user knows ad-hoc network is to provide a security
the password and user name of System such as data integrity, confidentiality and
Administrator the user can pretend to authentication of the data. On the other
that he/she is the administrator. hand, if misbehaving nodes are authorized,
2. Replay - To acquire information to send they can use the system resource and fails
it, or copy it elsewhere. to use resources when they are not
authorized [5]. Internal nodes might
3. To make changes in the information or misbehave to save the resources, such as
data being sent or received. the power consumption, the processing
4. Denial of service- To cause a disruption capabilities, and the communication
of all services or some services to the bandwidth.
existing network. External attacks are those attacks
where users are not initially authorized to
2.2 Internal and External Attacks
participate in the network operations.
The other severe attack in the ad hoc These attacks cause network congestion,
networks known as internal attack denying access to particular network
originates from the second source of function or to destroying the whole network
24
Security of Routing Protocols in MANETs: A Survey
operations. Various external attacks are network. With the help of the program
bogus packets injection, denial of service, the user can log into a system without
and impersonation. an authentication test or gain
administrative privilege.
2.3 Other Attacks
4. Man in the middle Attacks -This attack
There are various other attacks that are is a type of an access attack, and it can
associated with MANET. These are also be used as the initial point of a
explained below: modification attacks. In this a software
piece is placed between the server and
1. Snooping Attacks - This type of attack
the client. Neither the sever side
arises when someone seeks in your file
administrator nor the client user is
with the hope of finding something
aware of this. This software is firstly
interesting whether electronically or in
intercepts the data and after that
paper. People might inspect our recycle
forward the information to the server.
bins or file cabinets and may try to find
The server sends a response message
something interesting.
to the software thinking that it is
2. Distributed Denial-of-Service Attacks communicating with the client.
- This attack is similar to Denial-of-
5. Password Guessing Attacks - This type
Service attack except the fact that the
of attacks occurs when an account is
environment is distributed. These
attacked repeatedly. This is possible
attacks amplify the DOS attack by using
when possible password is send to the
multiple computer system to execute
account in the systematic manner.
the attack on an organization when
Through these attacks we can guess the
someone seeks in your file with the hope
password. The password guessing
of finding something interesting
attacks are of two types :
whether electronically or in paper. In
this case people might inspect the (a) Brute Force Attacks - This attack
recycle bins or file cabinets. The allows you to guess a password until
attacker can load different attacks to a successful guess occurs. This
dozens of computer systems that uses makes the password more difficult
cable modem. The attack signal is send to be guessed. It is also time
to different computer from the master consuming.
computer. This signal triggers the (b) Dictionary Attacks - These types of
system which launches an attack on the attacks use a dictionary type of
target network and tries to find commonly used words for making
something interesting. attempts to find user password.
3. Back Door Attacks -This type of attacks These attacks are executed using
have two different meanings; the dedicated programs and tools which
original term back door refers to exist in public domain. This is
troubleshooting. The back doors allow possible when possible password is
examining the operation inside the send to the account in the
program code at the time of running the systematic manner. Through these
program. In another type of back doors, attacks we can guess the password.
the attacker gains access to the network
and insert a program or some other 3. SECURITY ATTACKS
utility in order to create entrance to the Security is an important requirement in
25
Sher Jung and Rajinder kumar
26
Security of Routing Protocols in MANETs: A Survey
which are achieved due to unauthorized and it threatens all its neighboring
access to the routing messages that are not nodes [5].
sent. In this type of attack, attacker wants
to access some of the confidential 3.6 Fabrication
information in the network. The secret This is also known as counterfeiting. It
information may be public key, private key bypasses authenti-cation checks, and is
or password etc. This information should like impersonating and adds new
be kept secure from the unauthorized user. information in a file. Attackers could launch
The packet could be analyzed before the message fabrication attacks by
passing to the destination which depicts introducing some big packets into the
confidentiality. Classified example under network in the same manner as in the sleep
the interception attacks are wormhole deprivation attack. The difference is that
attacks and black hole attacks. the message fabrication attacks are not only
(1) Wormhole attacks - The wormhole launched by malicious nodes but such
attacks are those attacks in which attacks also may come from the
shortcut is created with the external misbehaving nodes within the network such
attacker in the ad hoc network. By using as in the route salvaging attacks [5].
the shortcut, they could play the trick (1) Sleep deprivation attacks - Sleep
of the source node to win over the route deprivation attacks are those attacks
discovery process and launch the which aim to drain off limited resources
interception attacks later on [5]. The in the mobile ad hoc nodes (e.g. the
attackers transmit the packet through battery powers), by con-stantly make
the wired medium in order to create the them busy. These attacks are more
fastest route from source to destination. specific to the mobile ad hoc network.
If the bogus routes are consistently In a routing protocol, sleep deprivation
maintained by the wormhole node then attacks might be launched by flooding
they could deny other routes from being the targeted node with unnecessary
established. These results in a denied routing packets. Flooding in the sleep
route and intermediate nodes are deprivation attacks is done by sending
unable to participate in the network a huge number of route request (RREQ),
operations [5]. route replies (RREP) or route error
(RERR) packets to the targeted node.
(2) Black hole attacks - Black hole attacks
As a result, that parti-cular node is
are those attack in which malicious
unable to participate in the routing
nodes tricks all their neighboring nodes
mechanisms and rendered unreachable
to attract all the routing packets to
by the other nodes in the networks [5].
them. In the wormhole attacks,
malicious nodes could launch the black (2) Route salvaging attacks - Route
hole attacks by advertising themselves salvaging attacks are those attacks
to the neighboring nodes as having the which launched by the greedy internal
most optimal route to the requested nodes in the networks. In a mobile ad
destinations. However, unlike in the hoc network, there is no guarantee that
wormhole attacks where multiple each transmitted packet will
attackers colluded to attack one successfully reach the desired
neighboring node, in the black hole destination node [14]. Packets might not
attacks, only one attacker is involved reach the destination node because of
27
Sher Jung and Rajinder kumar
the network failures. Therefore, sending any packet in the networks [5].
misbehaving internal nodes retransmit
their packets although no sending error 4. MANET VULNERABILITIES
messages received. A system is to be vulnerable when an
unauthorized data manipulation access is
3.7 Interruption provided to the users. In this case the
Interruption attacks are those attacks system does not verify a user's identity
in which the routing packet does not reach before allowing data access. Some of the
to the destination. Routing messages are vulnerabilities are being described as
used to fetch the network messages. Mobile follows:
nodes are also used for the purpose. Attacks
4.1 Lack of centralized management
are initiated through the modification,
interception, and fabrication attacks by A centralized monitor server is not
interrupting the normal operations of the available in MANETs. The absence of any
ad hoc networks. For instance, adversaries centralized management makes the
aiming to interrupt the availability service detection of attacks very difficult because
in the networks might destroy all paths to due to this the traffic will be highly dynamic
a particular victim node by using the and very large in the network. Lack of
message modification attacks [5]. Examples centralized manage-ment will impede the
such of attacks that could be classified trust management for nodes.
under the interruption attacks category are
packet dropping attacks, flooding attacks, 4.2 Resource availability
and lack of cooperation attacks. Availability of resources is a major issue
(1) Flooding attacks - Intermediate nodes in MANETs. Availability of secure
might interrupt the normal operations communications in such environments
in the packet forwarding process by where changing the network topology and
flooding the targeted destination nodes protecting the network against particular
with huge amount unnecessary attacks will lead to the development of many
packets. In flooding attacks nodes are security schemes and respective
unable to receive or forward any type of architectures.
packet in the network.
4.3 Scalability
(2) Lack of cooperation attacks - In such
Scalability feature in ad-hoc networks
types of attacks, internal nodes are not
is required because of mobility of nodes in
ready to cooperate in the network
MANETs, their topology and so the
operations that did not benefit them
connectivity keeps on changing all the time.
because participating in such
So scalability is one of the major issues
operations will drain off their resources.
which concern the security aspect. Security
Different strategies might be used by
mechanisms should be able to handle a
misbehaving internal nodes in order to
varying size network [22].
save their limited resources. The
internal nodes are not ready to forward 4.4 Cooperativeness
the packets to the other nodes, not even
send back the route error report to the Various routing algorithms for MANETs
sender when failing to forward packets, assume that the nodes are cooperative
or might turn off their devices when not and non-malicious. This provides an
28
Security of Routing Protocols in MANETs: A Survey
29
Sher Jung and Rajinder kumar
30
Security of Routing Protocols in MANETs: A Survey
If in case the same sequence number cluster head and then further forwarded
are arrived then the sequence number to another cluster head, with the help
which is smaller can be used in order to of gateway node and this process is
optimize the path. continues till the destination node is
B. Optimized Link State Routing (OLSR) found.
Protocol - OLSR is a proactive routing 6.2 On-Demand Driven Protocols
protocol .The main idea behind OLSR is
the use of multipoint relay (MPR) which The second category is on demand
provides an effective flooding driven routing protocol. These types of
mechanism by reducing the number of protocols are also known as reactive
transmissions [8].In OLSR, two types of protocols. This protocol is used to find the
routing messages are used i.e. a HELLO route of destination and once the route is
message and a topology control (TC) found all possible route permutations are
message [8]. examined. The route is maintained by a
route maintenance procedure after a route
C. Wireless Routing Protocol (WRP) -
is identified.
Wireless routing protocol (WRP) [13, 11]
is a path-finding algorithm. It is a type A. Ad Hoc On-Demand Distance Vector
of loop free routing protocol. In WRP (AODV) - It is an improvement of DSDV
nodes are created in the network. Each algorithm explained above. To minimize
node maintains 4 tables: link cost table, the broadcast route a route is created
message retransmission list table on a demand. For example when source
distance table, routing table. Update A wants to deliver a packet to the
messages are exchanged between destination B and if no route is available
neighboring nodes by propagating link from A to B, Then B broadcast the
from the link table. Typical Hello message to the neighboring nodes via
messages are exchanged periodically route request message then the
between neighbors. neighboring node rebroadcast the
D. Cluster Head Gateway Switch message to its all neighbors. This
Routing (CGSR) Protocol - The idea process is continued till the destination
behind CGSR protocol is cluster node is identified. When the first arrived
movable wireless network with different RREQ is received, the destination node
heuristic schemes [18]. In CGSR by sends a route reply (RREP) message to
using a distributed algorithm the node the source node through the reverse
is selected within the cluster which acts path through which the RREQ message
as cluster head. The cluster head arrived.
changes according to the routing B. Dynamic Source Routing (DSR) - In
protocol performance this protocol the destination is identified
Using clustering algorithm the Cluster on the basis of source routing [19]. There
head changes when two cluster heads are two phases: route discovery and
come into contact of each other or they route maintenance phases. When a
get out of contact of all other cluster mobile node wants to send a packet to
head [8]. Between two cluster head the destination, it first checks its route
there are some gateway nodes that are table so that it can identify availability
within the coverage of two cluster head. of destination. If the route is present in
Here initially the packet is send to the the table, then the mobile node will use
31
Sher Jung and Rajinder kumar
this route to send the packet. If the node 6.3 Hybrid Protocol
does not have such a route in the table,
Hybrid routing protocol is based on the
then it will broadcast a route request
concept of aggregating of nodes in a group.
message. The format of the route request
Then these nodes are assigned different
contains the address of the destination
functionality in a zone of the network. These
node along with the address of source
different zones are portioned in the network.
node and a UID number. All receiving
The most popular way of building hierarchy
node which has packet will check the
is to ensure that a group of nodes are
destination route is known or not
geographically close to each other and they
known. A route reply is originated in the
are grouped into clusters. For
network when the route request reaches
communication from another node each
the destination. If the destination route
cluster has a cluster head. The ZRP( Zone
is not found in the network then node
routing protocol) based on Hierarchical link
initially adds its own address to the
state(ZHLS) This type of protocol can also
route record and after that forwards the
provide a better trade-off between
packet
communication over head, total number of
C. Temporary Ordered Routing nodes and frequency of topology change.
Algorithm (TORA) - The Temporally
Ordered Routing Algorithm (TORA) is 7. CONCLUSION
proposed to operate on highly dynamic In this paper, we introduce some type
mobile networking environment. It of security attacks in mobile ad-hoc
provides multiple routes of source/ networks, as in today's world security is the
destination in pair. The main idea of major concern in the field of a network.
TORA is localization of control messages Individuals want to keep information secure
over small set of nodes [8]. To achieve so that any unauthorized user can not
this goal, the routing information about access their information. Then we have
each and every node is maintained. discussed classification of attacks and
D. Relative Distance Micro Diversity various characteristics of attacks to be
Routing (RDMAR) - Relative Distance considered in designing any security
Micro Diversity Routing protocol measure for ad hoc networks. After
determines the distance between the analyzing the behavior of the attacks, one
two nodes on the basis of relative can determine the various attacks which
distance estimation algorithm in radio could be launch against the ad hoc
loops. RDMAR is a source initiated networks. In this paper, we have discussed
protocol and having features similar to most of the common attacks against the ad
associative based routing protocol. The hoc networks routing protocols. Then we
RDMAR is based on the concept is further classify the routing protocols in
searching of route within the restricted mobile ad hoc network. In future, various
range in order to save flooding cost of security solutions that have been proposed
route request message in the network to secure routing protocols will be
[17, 19, 20]. It is assumed in RDMAR implemented and verified. The investigation
that at the same fixed speed all ad hoc will include various techniques that might
hosts are migrated. These types of be employed in protecting, detecting, and
assumptions can make good practical responding to the attacks against the
estimation of relative distance. routing message [5].
32
Security of Routing Protocols in MANETs: A Survey
33
Sher Jung and Rajinder kumar
34
Security of Routing Protocols in MANETs: A Survey
35
Sher Jung and Rajinder kumar
36
Global Sci-Tech, 8 (1)study
Comparative January-March 2016;Intelligence
of Agile Business pp. 37-49 DOI
and No.:
Agile10.5958/2455-7110.2016.00005.7
Data Warehouse
ABSTRACT
37
Md. Deedar Shamsi
InformationQuality
Management (IQM)
Components
38
Comparative study of Agile Business Intelligence and Agile Data Warehouse
added to an existing report to see the time at the beginning of the project as
required information. "If that in traditional projects. In Agile project,
information cannot be obtained within scope can be changed any time during
the time required to support the the development phase.
decision at hand, the information has
3. Agile Infrastructure : The system
no material value. This metric measure
should have virtualization and
the total elapsed time required to modify
horizontal scaling capability. This gives
an existing report by adding a
flexibility to easily modify the
column"[5].
infrastructure and could also maintain
3. Average time required to create a new near-real-time BI more easily than the
dashboard : This metric considers the standard Extract, transform, load (ETL)
time required to access any new or model[8].
updated information and it measures
the total elapsed time required to create 4. Cloud & Agile BI : Many organizations
a new dashboard[5]. are implementing cloud technology now
as it is the cheaper alternative to store
and transfer data. Companies who are
2. PERFORMANCE ANALYSIS
in their initial stages of implementing
2.1 Five Steps To Agile BI Agile BI should consider the Cloud
technology as cloud services can now
1. Agile Development Methodology : support BI and ETL software to be
"need for an agile, iterative process that provisioned in the cloud[8].
speeds the time to market of BI requests
by shortening development cycles"[8]. 5. IT Organization & Agile BI : To achieve
agility and maximum effectiveness, the
2. Agile Project Management IT team should interact with the
Methodology : continuous planning business, but also address the business
and execution. Planning is done at the problems and should have a strong and
beginning of each cycle, rather than one cohesive team[8].
39
Md. Deedar Shamsi
40
Comparative study of Agile Business Intelligence and Agile Data Warehouse
Scrum is a term borrowed from Rugby three key objectives of delivering BI.
and XP stands for eXtreme Programming. However, as long as the primary goal is to
The authors of these methodologies, as build separate BI solutions for individual
well as most other prominent Agile users or departments, the popular Agile
practitioners, are project managers and software development methodologies like
seasoned developers with decades of Scrum or XP can certainly be made to work.
experience in developing stand-alone
Some BI teams try to wait for the data
operational systems - most written with
to be ready in the EDW (placed there by a
object-oriented code. They are not EDW/
separate EDW team) before they develop
BI practitioners, and thus, Scrum and
selected BI features using Scrum or XP.
XP were not developed specifically for
Many companies using this approach have
enterprise data warehousing. Writing
gone so far as to separate their BI team
software to create stand-alone operational
from their EDW team and have both teams
systems does not require data integration
report to different managers. This
efforts like data standardization, enterprise
organizational change not only disrupts the
data modeling, business rules ratification
cohesion of the total EDW/BI effort, but
by major business stakeholders,
also creates an unfair competition and ill
coordinated ETL data staging, common
feelings between the two teams. I hear BI
metadata, collectively architected
teams complain bitterly about their EDW
(designed) databases, and so on. Instead,
team being too slow, and I hear the EDW
the basic premise behind Scrum and XP is
teams complain bitterly about their BI team
to write and deliver quality software (code)
not understanding their data efforts and
in short prescribed intervals, but inherently
thus having unreasonable expectations
without significant regard or focus on data
about the speed at which cleansed,
standardization and data architecture from
standardized, and integrated data can be
an enterprise perspective.
loaded into the EDW. I also see many of
the BI teams trying to force their
3.3 Can Agile be used for BI?
counterpart EDW teams to adopt Scrum or
That brings us to the next question: Can XP. Most EDW teams resist, recognizing
Agile be used for BI? Well, that depends on that their projects are data-intensive and
what you call BI. There are a growing not code-intensive, and that the prescribed
number of companies that boast to be using Agile rules in Scrum and XP cannot work
Agile methodologies on BI projects. This for them. Other EDW teams try to adhere
analysis shows that most of those to the strict rules of these Agile
companies restrict their development effort methodologies and fail.
mostly to writing code for stand-alone BI
applications. In other words, the BI 3.4 Can agile be used for EDW?
application developers don't deal with data
Can agile be used for enterprise data
standardization and integration - or at least
warehousing? Let's first agree on what we
not very effectively and rarely from an
mean by enterprise data warehousing.
enterprise perspective. Many complain
about the dirty data negatively affecting If your definition of BI includes building
their aggressive deadlines, evidently not or expanding the necessary EDW
realizing that cleaning up dirty data, components and having that effort be part
standardizing data, and integrating data of every project that delivers BI
across the enterprise are - or should be - applications, and if you want to apply an
41
Md. Deedar Shamsi
Agile method to building the entire end-to- confident that each software release can
end solution (including data cleansing, data be accomplished within the allotted time-
standardization, enterprise data modeling, box (deadline), they create a detailed project
coordinated EDW ETL, and meta data plan with weekly milestones for the first
repository), then - in my opinion - using software release. Starting with the deadline
the popular Agile software development and working backwards, the core team
methodologies Scrum and XP will not work. members determine how far along they
Remember that these methodologies were must be the week before the deadline in
never designed for data-centric business order to make the deadline. Put another
integration projects. However, that does not way, they determine in what state the
mean that you cannot go Agile. project or deliverable must be the week
before the deadline. They repeat this
3.5 Extreme Scoping™ process by backing up another week and
another week and so on. If they pass the
Extreme Scoping™ uses all of the agile project start date, the core team members
principles that can be used on business must determine if the scope is too large for
integration projects and discards those the release deadline or if the activities
agile principles that don't apply. It does not between the milestones are overestimated.
seek to replace the Agile coding method-
ologies Scrum and XP. Instead, it provides After the project activities for the first
the necessary Agile EDW umbrella for the software release are organized into weekly
entire project effort, not just the coding. basis, the core team members self-organize
themselves into the appropriate number of
Extreme Scoping™ has several distinct
work teams. Knowing the makeup of the
project planning steps, which are
work teams and knowing the weekly
performed by a 4-5 member core team, not
milestones, the core team members decide
by a single project manager. The core team
on the detailed tasks and task deliverables
members start out by reviewing their EDW
for each milestone, referring to the work
methodology and selecting the tasks into a
breakdown structure they created earlier.
preliminary WBS. Using this WBS as a
They also decide which tasks and
guide, the core team members create a
deliverables are assigned to what person
high-level project roadmap to give an
on what work team. The detailed daily task
understanding of the overall effort,
assignments and task deliverables are
resources, cost, schedule, risks, and
documented on a white board, a flip chart,
assumptions for the entire new BI
a spreadsheet, or other informal media,
application. This is necessary in order to
which can be modified quickly and easily.
come up with the right number of software
The core team members use this informal
releases, the right sequence of those
detailed project plan on a daily basis to
releases, the dependencies among the
guide the day-to-day work activities,
requirements, and thus, the deliverables
manage the change control process during
and scope for each release. Without this
prototyping, and monitor the progress of
crucial step, the process of breaking an
the project. They do not use this detailed
application into software releases would be
plan to report the project status to
completely arbitrary.
management. Instead, they create a short
Once the core team members are one-page Milestone Chart showing whether
comfortable with the scope and sequence weekly milestones have been completed,
of the proposed software releases and are delayed, or eliminated.
42
Comparative study of Agile Business Intelligence and Agile Data Warehouse
43
Md. Deedar Shamsi
When data virtualization is applied, an than just descriptive BI. Many organiza-
abstraction and encapsulation layer is tions today want to go beyond this by
provided which hides for applications most implementing predictive and prescriptive
of the technical aspects of how and where analytics. To that end, many companies are
data is stored; Because of that layer, now establishing advanced analytics teams
applications don't need to know where all in business departments to help develop
the data is physically stored, how the data new advanced and predictive analytics that
should be integrated, where the database can be deployed in real-time and in
servers run, what the required APIs are, historical environments to produce new
which database language to use, and so insights for competitive advantage. This is
on. When data virtualization technology is happening both in traditional Data Ware-
deployed, to every application it feels as if house and in new Big Data environments
one large database is accessed. where data scientists are analyzing new
multi-structured data sources to produce
The concepts of data consumer and data
new models and insights. Also business
store are key to the definition of data
analysts are using these analytics in visual
virtualization:
data discovery tools to help predict and
Data virtualization is the technology forecast the future. In addition analytics
that offers data consumers a unified, are being embedded in applications to help
abstracted, and encapsulated view for embed recommendations, alerts and
querying and manipulating data stored in forward looking insights in processes and
a heterogeneous set of data stores. applications to optimize business
operations.
Typical business intelligence application
areas that experience an increased level Another challenge is the number of data
of agility are virtual data marts, self-service sources that companies are now accessing
reporting and analytics, operational to capture data for analysis to produce
reporting and analytics, interactive deeper insights. Clickstream data, social
prototyping, virtual sandboxing, network interaction data, weather data,
collaborative development, and disposable sensor data, location data and news feeds
reports. are just a few of these. The question is what
should companies do with this data? How
To summarize, deploying data should it be organized and stored? The
virtualization in BI systems leads to more emergence of Hadoop has seen data
light weights architectures with a smaller cleansing and integration being offloaded
data footprint, resulting in more agile from Data Warehouses, to cheaper lower
systems. cost Hadoop environments but is this at
the expense of Data Governance? How do
4. COMPLEXITY ANALYSIS you govern data in Big Data environments
and traditional Data Warehouses with
4.1 BI Performance Reports and Analy- confidence? What if structured data is
sis brought into Hadoop?
Most companies today use Business
Intelligence (BI) reports and dashboards to 4.2 Recreating BI and DW: new architec-
measure business performance at strategic, ture and advanced technologies
tactical and operational levels. However
today, business is demanding much more The original Data Warehouse
44
Comparative study of Agile Business Intelligence and Agile Data Warehouse
45
Md. Deedar Shamsi
jungle that today's business users dare to barriers between business intelligence,
enter in significant numbers. And they are operational systems and office support
ready and able to do so; having grown up (collaborative) environments. They will
with computing and communications integrate external data directly into their
technology that, thirty years ago, would business systems. Business intelligence
have been seen as magic by the vast will become Business Integrated Insight
majority of business people. (BI2).
There are three key characteristics of Business Integrated Insight in action
the biz-tech ecosystem as it has emerged Just as BI set the scope for much of the
in the past few years: advances in information usage in the 1990s
1. Interdependence: Business and and the Web the 2000s, big data looks set
technology are each driven, one by the to dominate information thinking in the
other, in a tight loop. New technology 2010s. The term big data covers a multitude
enables new business possibilities; new of sins. But, here, I focus on one aspect of
business opportunities drive advances the topic, sensor-generated data and,
in technology specifically, vehicle telemetric-the process
2. Reintegration: The silos within and of transmitting and receiving computer-
across both business and IT have grown generated data derived from electronic
increasingly uncomfortable to main- sensors, typically through an on-board
tain; they deliver inefficiencies, controller/computer and the use of this
miscommunications and errors. The data to remotely monitor a range of
cracks can no longer be hidden from conditions and events occurring in the
Web-savvy customers; coherence is vehicle.
becoming mandatory
4.3 Idea
3. Cross-over: Business people need the
skill to understand sufficient technology Business Integrated Insight: What It
to envision how new advances could be Means for 2012 and Beyond. From the point
used to recreate the business. Similarly, of view of the biz-tech ecosystem and BI2,
IT people need the business acumen to a number of messages are clear.
see how business needs can be satisfied
in new ways by emerging technology First, we've seen a consistent move in
BI towards operational BI-analysis and
In many ways, these characteristics are action-taking based on near real-time data-
diametrically opposed to the way business over the past decade. While this will
and IT have operated for five decades continue, it will, at best, only partially meet
already-business determines their demands for extreme business innovation.
requirements, hands them over to IT and New data sources, big data in most cases,
waits for an application to be delivered, will be used operationally to drive new
determines that it was incomplete or business processes. Business and IT must
incorrect and goes around the loop again. cooperate closely to understand how new
That era is coming to a close and, with it, information and technologies can be used
our entire approach to business intelligence to create new business processes and how
is set to change. In the coming few years, such changes can be incorporated into
successful businesses will be those that existing IT systems-the interdependence,
create a high degree of synergy between reintegration and cross-over characteristics
business and IT. They will break down the described above.
46
Comparative study of Agile Business Intelligence and Agile Data Warehouse
47
Md. Deedar Shamsi
stores are chained by transformation logic Florida: Future Strategies Inc. &
that copies data from one data store to Workflow Management Coalition, 99-
another. ETL and replication are commonly 114 (2010).
the technologies used for copying. We will
[7] M. Mircea and A. I. Andreescu,
call systems with this architectyre classic
"Agile Systems Development for the
Business Intelligence systems in this
Management of Service Oriented
article.
Organizations". In: 11th International
The reason why so many Business Conference on Computer Systems
Intelligence systems have been designed and Technologies, Comp. Sys. Tech.'
and developed in this way, has to do with 10, Sofia, Bulgaria, 17-18 June,
the state of software and hardware of the 341-346 (2010).
last twenty years. These technologies had [8] A. Andreescu and M. Mircea ,
their limitations with respect to "Actual Trends in Software Systems
performance and scalability, and therefore, for Business Management", Comp.
on one hand, the reporting and analytical Sys. Tech.' 08, The Bulgaria
workload had to be distributed over Academic Society of Computer
multiple data stores, and on the other hand, Systems and Information
transformation and cleansing processing Technologies, (2008).
had to be broken down into multiple steps.
[9] http://en.wikipedia.org/wiki/
Agile_Business_Intelligence#cite_ref-
6. REFERENCES Three_ Steps_to_Analytic_Heaven_5-
[1] BI_Principles_for_Agile_Develop 0.
ment_12-0 http://www.allabout [10] M. Mircea, B. Ghilic-Micu and M.
agile.com/what-is-agile-10-key- Stoica, "Combining Business
principles/ Intelligence with Cloud Computing
[2] Bruni, Margherita. "5 Steps To Agile to Delivery Agility in Actual
BI", Informationweek.com, June 13, Economy".
2011 http://en.wikipedia.org/wiki/ [11] Journal of Economic Computation and
Agile_Business_Intelligence#cite_ref- Economic Cybernetics Studies, 45(1),
5_Steps_To_Agile_BI_8-1. 39-54 (2011).
[3] http://www.agiledata.org/essays/ [12] M. Mircea and A. I. Andreescu,
dataWarehousingBestPractices.html "Extending SOA to Cloud Computing
[4] http://en.wikipedia.org/wiki/ in Higher Education". In: K. S.
Agile_Business_Intelligence#cite_note- Soliman (ed.), The 15 th IBIMA
What_Agile_Business_Intelligence_ conference on Knowledge
Really_Means-10. Management and Innovation: A
Business Competitive Edge
[5] M. Mircea, B. Ghilic-Micu and M.
Perspective, Cairo, Egypt 6-7
Stoica, "Combining Knowledge,
November, 602-615 (2010).
Process and Business Intelligence to
Delivering Agility in Collaborative [13] http://www.agiledata.org/essays/
Environment". L. Fischer, ed. (2010). dataWarehousingBestPractices.html
rhayati A.Jawawi
[6] BPM and Workflow Handbook,
Spotlight on Business Intelligence. [14] M. Cunningham, "Cloud Computing
48
Comparative study of Agile Business Intelligence and Agile Data Warehouse
49
Global Sci-Tech, 8 (1) January-March
Md 2016;
Bariquepp.
Quamar
50-55 DOI No.: 10.5958/2455-7110.2016.00006.9
MD BARIQUE QUAMAR
CyberQ Consulting Private limited
#622, DLF Tower A, Jasola, New Delhi-110025, India
*E-mail: barik011@gmail.com
ABSTRACT
The simply the web, is the most dynamic environment. The web has grown steadily
in recent years and his content is changing every day. web is recognized as the
largest data source in the world. In this paper, we present a Web Mining process
able to discover knowledge in a distributed and heterogeneous multi organization
environment. The Web Text Mining process is based on flexible architecture and is
implemented by four steps able to examine web content and to extract useful hidden
information through mining techniques. An important aspect in Web Mining is
played by the automation of extraction rules with proper algorithms. Machine
Learning techniques have been successfully applied to Web Mining and
Information Extraction tasks thanks to the generalization and adaptation capabilities
that are a key requirement on general content, heterogeneous web pages In order
to keep the recognition speed high enough for real-world applications an additional
algorithm is proposed which lets the approach to boost both in speed and quality.
Key words: Web mining, machine learning, unstructured data, and intelligent web
agent.
50
Intelligent Web Agent through Web Text Mining Techniques with Machine Learning
(2) Information selection and pre- Image Mining : Image mining is the
processing; concept used to detect unusual patterns
and extract implicit and useful data from
(3) Patterns analysis and recognition; images stored in the large data bases.
(4) Validation and interpretation; Therefore, we can say that image mining
deals with making associations between
(5) Visualization.
different images from large image databases
51
Md Barique Quamar
52
Intelligent Web Agent through Web Text Mining Techniques with Machine Learning
Unstructured Information Extraction Extracting information from unstructured data and converts
into structured data. Pattern matching and transformation
are used.
Topic Tracking Tracks the topics searched by the user and predicts the
documents and produce to the user that of interest.
Prediction techniques are used.
Summarization Reduce the length of documents by minimizing the length of
the documents. Analyzing the semantics and interprets the
meaning of words.
Categorization Documents are placed into a predefined group.
Clustering Used to group the similar documents Grouping based on
the properties are identified.
Information Visualization To build a graphical representation to the user Feature
extraction, indexing techniques are used.
Structured Web crawlers Traverse the hypertext structure of the web. Internal crawlers
go through internal web pages of sites. External web crawlers
go to the unknown links or sites.
Wrapper Generation Set of information extraction rule to extract the useful data
from web pages. Provides a lot of meta information Page
ranking is used.
Page Content Mining Extracts the content of a page. Page ranking is used to display
the results according to the rank.
Using OEM Object Exchange Model. To understand the information
structure of the web. Self describing structure of the data is
produced.
Semi Structured Top Down Extraction Traverse the hypertext structure of the web. Internal crawlers
go through internal web pages of sites. External web crawlers
go to the unknown links or sites.
Web Data Extraction Language Set of information extraction rule to extract the useful data
from web pages. Provides a lot of meta information Page
ranking is used.
SKICAT Based on astronomical data analysis and cataloging system.
Multimedia Color Histogram Matching Find the correlation between the color components.
Unwanted artifacts are removed using smoothing techniques.
Multimedia Miner Extraction of images. Videos for the feature extraction, and
feature comparison for matching queries.
Shot Boundary Detection Automatic detection of boundaries.
53
Md Barique Quamar
analysis are quite different making the [10] John Wiley and F. Gorunescu,
proposed approach a good candidate for the "Data Mining for Business
more general Web Content Mining problem. Intelligence: Concepts, Techniques,
and Applications in Microsoft Office
4. REFERENCES Excel with XLMiner", (2011).
[11] J. Han and M. Kamber, "Data
[1] J. Abonyi and B. Feil, "Cluster
Mining: Concepts, Models and
Analysis for Data Mining and System
Techniques". Springer Science &
Identification". Springer Science &
Business Media: USA, (2011).
Business Media: Germany Alhajj, R.
(2007). [12] Jiawei Han, MichelineKamber and
Jian Pei "Data Mining: Concepts and
[2] "Advanced Data Mining and
Techniques", Morgan-Kaufmann
Applications: Third International
Academic Press: San Francisco,
Conference, ADMA 2007, Harbin,
(2012).
China, August 6-8, 2007
Proceedings". Springer Science & [13] K.L. Haynes, "Data Mining:
Business . Concepts and Techniques", The
Morgan Kaufmann Series in Data
[3] M. J. Linoff G.S. Media: Germany
Management Systems, Third Edition,
Berry, (2000).
published by Elsevier Inc., (2006).
[4] C. M. Bishop, "Mastering Data
[14] J. Hilbe, "Object Recognition Using
Mining: The Art and Science of
Rapid Classification Trees". Florida
Customer Relationship Manage-
State University: USA, (2009).
ment". Wiley Computer Publishing:
New York. (2006). [15] M. F. Hornick, E. Marcade and S.
Venkayala, "Logistic Regression
[5] Y. Chang, "Pattern Recognition and
Models". CRC Press INC: USA,
Machine Learning". Springer: USA
(2010).
(2008).
[16] Alexander Furnas "Java Data
[6] S. Chatterjee and A.S. Hadi,
Mining: Strategy, Standard, and
"Robusti-fying Regression and
Practice: A Practical Guide for
Classification Trees in the Presence
architecture, design, and
of Irrelevant Variables". ProQuest:
implementation". (2012).
USA (2013).
[17] "Everything you want to know about
[7] John Wiley and R. Christensen,
Data Mining but we are afraid to
"Regression Analysis by Example".
ask", http://www.theatlantic.com/
:USA (2013).
technology/archiv e/2012/04/
[8] A. Gelman and J. Hill, "Log-Linear everything-youwanted-to-now-
Models and Logistic Regression". about-data-mining-but-were-afraid-
Springer New York: USA Collins to- ask/255388/, April 3, 2012,
English Dictionary, (2006). 11.33 am ET.
[9] G. Ghmueli, N.R. Patel and P.C. [18] Bui ThiThuy Dung, "Program
Bruce, "Data Analysis Using introduction to data mining" M. Sc.
Regression and Multilevel/ Candidate in Computer and
Hierarchical Models". Cambridge Information Sciences, Tokyo
University Press: USA (2006). University of Agriculture and
54
Intelligent Web Agent through Web Text Mining Techniques with Machine Learning
55
GUIDELINES FOR CONTRIBUTORS
Global Sci-Tech: Journal of Science & Technology is a quarterly journal published by Al-Falah Charitable Trust.
Its objective is to present new knowledge/understanding of current topics in the area of Science & Technology.
Some issues of the journal may be based on specific themes. It focused on original full length papers, short
communications of urgent interest as well as contemporary review articles and emerging issues in Science &
Technology. Requirements for acceptance include originality, breadth of scope, careful documentation of
experimental results, analysis and clarity of presentation.
SUBMISSION OF MANUSCRIPT - Manuscript should be in English only on one side of good quality paper,
with adequate margin on all four sides. It must be complete in all respects such as abstract, illustrations,
appendices etc.
Manuscript for consideration may be submitted as soft copy (MS Word or PDF format) through email as an
attachment to Editor (kurra91@gmail.com). The manuscript must have neither be published nor be under
consideration elsewhere.
PREPARATION OF MANUSCRIPT - Manuscript should be presented in as concise a form as possible. Pages
should be numbered consecutively and arranged in the following order:
COVER SHEET - A cover sheet consisting of a short title; names, affiliation and address of all the authors.
TITLE - The title should be neither too brief/general nor unnecessarily long. It should reflect the content of the
paper so as to derive the maximum advantage in indexing.
ABSTRACT - The abstract, usually not exceeding 200 words, should indicate the scope and significant content of
the paper, highlighting the principal findings and conclusions. It should be in such a form that abstracting
periodicals can use it without modification.
INTRODUCTION - Long and elaborate introduction should be avoided. It should be brief and state the exact
scope of the study in relation to the present status of knowledge in the field.
FIGURES - Figures should be numbered consecutively with Arabic numerals in order of mention in the text;
each figure should have a descriptive legend. Legends should be presented separately, double-spaced like the
text.
MATHEMATICAL EXPRESSIONS - Wherever possible, mathematical expressions should be typewritten,
with subscripts and superscripts clearly shown. It is helpful to identify unusual or ambiguous symbols in the
margin when they first occur. To simplify typesetting, please use the "exp' form of complex exponential function
and use fractional exponents instead of root signs. Equations must be displayed exactly as they should appear in
print and numbered in parentheses placed at the right margin. Reference to equations in the text should use the
form "Eq. (5)".
TABLES - Tables should be typed on separate sheets, numbered consecutively with Arabic numerals, and have
short descriptive caption at the top. Extensive and/or complex tables must be typed carefully in the exact format
desired. Computer printouts ill normally be reproduced as illustrations. Tables should be placed together at the
end of the manuscript.
REFERENCES - References must be prepared in proper format (examples of various types are given below) and
numbered consecutively in the order in which they are cited in the text.
Books : Author(s) name, title of the book, publisher pp. first and last page no. (year).
Periodicals : Author(s) name, title of article, name of journal, vol. no., pp. first and last page no. (year).
1. M. Yeung and I. Mintzer, Invisible Watermarking for Image Verification, Journal of Electric Imaging, 7,
578 (1998).
Conference records : Authors(s) name, title of article, name of conference, Place where held vol. no. pp. first and
last page no. (year).
Unpublished conference presentations : Author(s) name, title of article, name of conference, Place where held,
(year).
Technical reports : Author(s) name, title of article, report no. published by, (year).
The editors and publisher of Global Sci-Tech are not in anyway responsible for the views expressed by the
authors. The material published in Global Sci-Tech should not be reproduced or reprinted in any form, without
the prior written permission from the Editor/Publisher.
Global Sci - Tech
Subscription Rates
Global Sci-Tech, for Rs. ________/- US$_________ towards subscription of Global Sci-Tech,
Name : ______________________________________________________________________________
Organisation : ________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
E-mail________________________________________________
AL - FALAH UNIVERSITY
SCHOOL OF ENGINEERING & TECHNOLOGY SCHOOL OF PHYSICAL & MOLECULAR SCIENCE
UG Programme (B.Tech. Courses) PG Programme (M.Tech. Courses) UG Programme (B.Sc. Courses) PG Programme (M.Sc. Courses)
Mechanical Engineering Department of Mechanical B.Sc. (Hon.) Chemistry M.Sc. (Chemistry)
Mechanical & Automation Engineering Engineering B.Sc. (Hon.) Physics M.Sc. (Physics)
Civil Engineering Manufacturing Process & Automation B.Sc. (Hon.) Mathematics M.Sc. (Mathematics)
Engineering
Electrical & Electronic Engineering Doctor of Philosophy (Ph.D.)
Electronic & Communication Machine Design
Engineering SCHOOL OF HUMANITIES & LANGUAGES
Thermal Engineering
Computer Science & Engineering Industrial Production & Engineering B.A. (Hon.) English M.A. (English)
Bachelor of Architecture Department of Electronic & B.A. (Hon.) Urdu M.A. (Urdu)
Communication Engineering
Doctor of Philosophy (Ph.D.)
Electronic & Communication
Engineering SCHOOL OF SOCIAL SCIENCES
VLSI Design Bachelor of Social Work (BSW) Master of Social Work (MSW)
Department of Computer Science B.A. (Hon.) Economics M.A. (Economics)
& Engineering B.A. (Hon.) History M.A. (History)
Computer Science & Engineering B.A. (Hon.) Geography M.A. (Geography)
Department of Electrical &
Electronic Engineering SCHOOL OF EDUCATION & TRAINING
Power System Bachelor of Education (B.Ed.) Master of Education (M.Ed.)
Department of Civil Engineering Diploma in Education (D.Ed.) Doctor of Philosophy (Ph.D.)
Structural & Foundation Engineering
Comunication Technology and SCHOOL OF COMPUTER SCIENCE
Management
Environmental Engineering BCA MCA
B.Sc. (I.T.)
Research Programme (Ph. D. Course)
Mechanical Engineering Doctor of Philosophy (Ph.D.)
AL-FALAH HOSPITAL
B. Com. M. Com.
Master of Finance & Control
Doctor of Philosophy (Ph. D.)
AL-FALAH UNIVERSITY
Faridabad (Haryana), India