Download as pdf or txt
Download as pdf or txt
You are on page 1of 64

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/299529651

Literature review on Design, Analysis and Fatigue Life of a Mechanical Spring

Article  in  Global Sci-Tech · January 2016


DOI: 10.5958/2455-7110.2016.00002.1

CITATION READS

1 5,104

2 authors, including:

Mohd Parvez
Al Falah University
70 PUBLICATIONS   99 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Biomass gasification View project

energy,entropy,and exergy analysis of cyclic systems View project

All content following this page was uploaded by Mohd Parvez on 28 February 2017.

The user has requested enhancement of the downloaded file.


ISSN 0975-9638 (Print)
ISSN 2455-7110 (Online)

Global Sci-Tech
Al-Falah's Journal of Science & Technology
VOLUME - 8 NUMBER - 1 JANUARY-MARCH 2016
A -FA AH
UNIVERSITY
1997

CHIEF EDITOR
Prof. Z.H. ZAIDI

EDITORS
Prof. Khalil Ahmad
Global Sci-Tech., 8, 1 (1-60) January-March 2016

Prof. Z.A. Jaffery


Prof. Saoud Sarwar

EDITORIAL BOARD
Prof. Abdullah M. Jarrah, Jordan
Prof. Akhtar A. Khan, USA
Prof. Ash Mohd Abbas, India
Prof. Carlos Castro, USA
Prof. D. Bahuguna, India
Prof. H.P. Dikshit, India
Prof. H.R. Khan, Germany
Prof. Ishwar Singh, India
Prof. Lovely Agarwal, USA
Prof. M.S. Jamil Akhtar, India
Prof. Mohd Zulfiquar, India
Prof. Mohd. Sharif, India
Prof. Mursalin, India
Prof. Pankaj Maheshwari, USA
Prof. R.K. Pandey, India
Prof. R.M. Mehra, India
Prof. Tabrez Alam Khan, India
Prof. Vikram Kumar, India
Prof. Zahid A. Khan, India

Available at:
www.alfalahuniversity.edu.in
www.kurra.co.in

Published by
Al-Falah Charitable Trust, New Delhi
CHIEF EDITOR
Prof. Z.H. ZAIDI

EDITORS
Prof. Khalil Ahmad
Al-Falah University, Faridabad

Prof. Z.A. Jaffery


Jamia Millia Islamia, New Delhi

Prof. Saoud Sarwar


Al-Falah University, Faridabad

EDITORIAL BOARD

Prof. Abdullah M. Jarrah, Jordan Prof. Mohd Zulfiquar, India

Prof. Akhtar A. Khan, USA Prof. Mohd. Sharif, India

Prof. Ash Mohd Abbas, India Prof. Mursalin, India

Prof. Carlos Castro, USA Prof. Pankaj Maheshwari, USA

Prof. D. Bahuguna, India Prof. R.K. Pandey, India

Prof. H.P. Dikshit, India Prof. R.M. Mehra, India

Prof. H.R. Khan, Germany Prof. Tabrez Alam Khan, India

Prof. Ishwar Singh, India Prof. Vikram Kumar, India

Prof. Lovely Agarwal, USA Prof. Zahid A. Khan, India

Prof. M.S. Jamil Akhtar, India


Global Sci - Tech
Al-Falah’s Journal of Science & Technology

Volume 8 Number 1 January-March 2016

CONTENTS

1. A Review on-virtual Metrology Laboratory 1


Tasleem Ahmad and Ankita Agarwal

2. Literature review on Design, Analysis and Fatigue Life of a Mechanical Spring 7


S K Jha and Mohd. Parvez

3. Software Cost Estimation 15


Huda Saif

4. Security of Routing Protocols in MANETs: A Survey 22


Sher Jung and Rajinder kumar

5. Comparative study of Agile Business Intelligence and Agile Data Warehouse 37


Md. Deedar Shamsi

6. Intelligent Web Agent through Web Text Mining Techniques with Machine Learning 50
Md Barique Quamar

Owned and Published by J.A. Siddiqui (Chairman, Al-Falah Charitable Trust) -


Global Sci-Tech- 274-A, Al-Falah House, Jamia Nagar, Okhla, New Delhi-110 025.
Printed at Alpha Printers, WZ-35/C, Naraina, Ring Road, New Delhi-110 028.
Editors: Khalil Ahmad, Z.A. Jaffery and Saoud Sarwar, 274-A, Al-Falah House, Jamia Nagar,
New Delhi-110 025.
Global Sci-Tech, 8 (1) January-March 2016; Metrology
A Review on-virtual pp. 1-6 Laboratory
DOI No.: 10.5958/2455-7110.2016.00001.X

A Review on-virtual Metrology Laboratory

TASLEEM AHMAD1* and ANKITA AGARWAL2


1
Mechanical and Automation Engineering Department, Al-Falah University, Faridabad
2
Mechanical Engineering Department, CET-IILM-AHL, Greater Noida
*E-mail: tasleemahmad007@gmail.com

ABSTRACT

Measuring problems in Engineering need no introduction. From recent development


in computer field, it is very well understood that lack of awareness is one of the
contributing factors for huge errors. In order to increase the awareness about the
effects of measurement among professionals involved in industries construction, it
is necessary to make them understand the concepts of measurement in engineering.
To address this issue, some software companies (DCCC, The College of Davidson
and Davie Counties, The North Carolina, Advance Manufacturing Alliance.) have
developed a software tool named "Virtual Micrometer training Tool" "Virtual Calipers
Training Tool" for academic Laboratory. Using this tool, a person with some
knowledge of measurement in engineering can be able to learn by himself the
fundamentals of measurement. For convenience in explaining the concepts, we
divided this tool into two modules. Each module contains few experiments with
good G.U.I. In these experiments, user can find the explanation with virtual
instruments. At the end of module user can understand the measurement technique
of the machine parts. This software tool aims to help students, mechanical engineers
in understanding the principles of measurement.

Key words: measurement, virtual calipers training tool, Virtual micrometer.

1. INTRODUCTION industry-standard computer technologies


to create user-defined instrumentation
1.1. What Is Measurement and Virtual
solutions.
Instrumentation?
1.2. System Components for Taking
You take measurements with
Measurements with Virtual Instru-
instruments. Instrumentation helps
ments
science and technology progress. Scientists
and engineers around the world use Different hardware and software
instruments to observe, control, and components can make up your virtual
understand the physical universe. Our instrumentation system. Many of these
quality of life depends on the future of options are described in more detail
instrumentation from basic research in life through manuals. There is a wide variety
sciences and medicine to design, test and of hardware components you can use to
manufacturing of electronics, to machine monitor or control a process or test a device.
and process control in countless industries. As long as you can connect the hardware
Virtual instrumentation is defined as to the computer and understand how it
combining hardware and software with makes measurements, you can incorporate

1
Tasleem Ahmad and Ankita Agarwal

it into your system. with the use of micrometer. Simulating the


operation of its real world counterpart to
1.3. History of Instrumentation
exacting standards, this virtual micrometer
As a first step in understanding how (Fig. A1) provides the opportunity to operate
instruments are built, consider the history a micrometer and learn its functions.
of instrumentation. Instruments have In addition to simulate the physical
always made use of widely available function of the micrometer, it also provides
technology. In the 19th century, the jeweled digital readouts of the current measured
movement of the clock was first used to location in eights and tenths of an inch. It
build analog meters. In the 1930s, the features both manual operation and a
variable capacitor, the variable resistor, and snap-to-input system (Fig. A2 a) along with
the vacuum tube from radios were used to barrel camera (Fig. A2 b) which allows the
build the first electronic instruments. user to specify an exact decimal measure-
Display technology from the television has ment. A built in mini manual (Fig. A4)
contributed to modern oscilloscopes and provides all the basic information need to
analyzers. And finally, modern personal successfully operate The Micrometer
computers contribute high-performance Training Tool, making it a great stand alone
computation and display capabilities at an training utility or an excellent in-class
ever-improving performance-to-price ratio. educational aid.
2. TRAINING TOOLS MODULES

For easy understanding of virtual


training tools, I have divided the tool in two
different modules. Name of different module
as listed below :
2.1. The Virtual Micrometer Training Tool
2.2 The Virtual Caliper Training Tool

2.1. The Virtual Micrometer Training


Tool
The simulation application is designed
to help educate and familiarize students Fig. A2 (a) Input Control

Fig. A1. Virtual Micrometer Training Tool Fig. A2 (b) Barrel Camera

2
A Review on-virtual Metrology Laboratory

2.1.1. Basic Functions Special Restrictions :


The Manual Control panel (Fig.A3 b) lets • In order to cycle an object, the
you use the VM like you would in real life. micrometer must be fully open.
Course moves fast, Fine moves slowly but • You must not use Reset to Closed
accurately. The reset buttons snap the VM while an object is present.
to fully open or closed positions. The Cycle • Input measure must be between 0.0
Object button (Fig.A3 a) runs through a list and 1.0
of objects you can measure, and then back • Input measure must be greater than
to nothing (empty) or equal to the size of the object loaded
into the micrometer.
Requirement :
Compatible with iPad. Requires iOS 4.3
or later, Size: 22.1 MB.

Fig. A3 (a) Object Control Panel 2.1.2. Least Count :


The working of all micrometers is based
on the use of a screw-and-nut mechanism
which transforms the rotary movement of
micrometer screw into axial movement. The
pitch of screw thread in all micrometers is
equal to 1/40". The tapered end of thimble
is provided with a circular scale having 25
divisions. Thus when rotated the thimble
moves along barrel by 1/40" per revolution.
When the thimble is rotated by one
Fig. A3 (b) Manual Control Panel division (i.e. 1/40 of a revolution) then the

Fig. A4 Mini Manual

3
Tasleem Ahmad and Ankita Agarwal

Fig. B1 Virtual Caliper Training Tool

spindle moves axially by 1/40 × 1/25


=0.001".
It is the value of one division on the
thimble which is the least can be read
correctly with the help of a simple
micrometer, and is called the Least Count.

2.2. The Virtual Caliper Training Tool


The second tool in this series, The
Calipers Training Tool (CTT) is designed to Fig. B2 (a) Gauge Camera Fig. B2 (b) Rule Camera
help aid a student in the proper use of real
caliper measuring instrument. As with the
Micrometer Training Tool, the CTT is a
realistic simulation of an actual caliper tool,
working in the same manner as its real
world counterpart.
A free camera system allow the user to
pan around the work area and zoom in or
out, giving a better feeling of connection to
the tool as if it were in a work area. The
fixed Gauge (Fig. B2 a) and rule cameras (a). Input
(a). Object
(Fig. B2 b) provide consistent and accurate
measurement information, no matter where
the viewer may have focused his main view.
Usage is simulated by free interactive
measurement as well as a simulation mode
where the student can interact with two
objects measured in different ways each. A
"Ready-Check system is in place to avoid
overlapping inputs and prevent errors,
making the simulated caliper easy to use
and more intuitive to learn. (a). Main Camera

4
A Review on-virtual Metrology Laboratory

Requirement : 4. CONCLUSIONS
Compatible with iPad. Requires iOS 4.3 In order to increase the awareness
or later, Size: 20.7 MB. about the virtual instrumentation among
2.2.1. Least Count : professionals involved in measurement, it
is necessary to make them understand the
The dial caliper is consisting of main concepts of virtual measurements. To
scale with a circular dial. The dial carries address this issue, we have to develop
100 division equivalents to 0.1" of main Virtual Measuring Training Tools or can
scale. The dial caliper is primarily intended buy from the professionals supplying the
for measuring both inside and outside same. These are easy tools and cost
diameter of shafts, thickness of parts etc. effective for trainee and users to under-
to accuracy of 0.001". stand virtual measurement in a virtual
metrology lab. Total eight experiments were
3. MODULE "B" : THE VIRTUAL CALLI- explained to understand the fundamentals
PER TRAINING TOOL EXPERIMENT of virtual measurements.
B1: Outer diameter measurement of disk.

5
Tasleem Ahmad and Ankita Agarwal

5. REFERENCES Khanna Publishers, Delhi, 2009.


ISBN-13 9788174091536
[1] The Virtual Micrometer Training Tool
Davidson County Community [4] http://www.youtube.com/
College (DCCC) and The North watch?v=jNwiRLM3STA
Carolina Advance Manufacturing [5] http://www.business-
Alliance (NCAMA). Updated: Jan 23, standard.com/article/pti-stories/
2013. http://advancedmanufactur super-technical-metrology-lab-
ingalliance.org/ Date of access and inuagurated-in-delhi-
time : 20/03/2015 (10:30 pm). 115032700956_1.html, Date of
[2] The Virtual Caliper Training Tool access and time: 20/03/2015
Davidson County Community (10:40 pm)
College (DCCC) and The North [6] http://nptel.ac.in/courses/
Carolina Advance Manufacturing 112106138/2 date of access and
Alliance (NCAMA) Updated: Mar 19, time: 20/03/2015 (10:40 pm)
2013 http://advancedmanufactur
ingalliance.org/Date of access and [7] https://www.gov.uk/national-
time : 20/03/2015 (10:30 pm) measurement-system--2, Date of
access and time : 20/03/2015
[3] R. K. Jain, Engineering Metrology (10:50 pm)

6
Global Sci-Tech,
Literature8review
(1) January-March 2016;and
on Design, Analysis pp.Fatigue
7-14 DOI
Life No.:
of a10.5958/2455-7110.2016.00002.1
Mechanical Spring

Literature review on Design, Analysis and


Fatigue Life of a Mechanical Spring

S K JHA1* and MOHD. PARVEZ2


1
Project Scientist, Indian Institute of Technology Delhi, INDIA
2
Mechanical Engineering Department, Al-Falah University, Faridabad
*E-mail: skj.iddc@gmail.com

ABSTRACT

In this paper are reviewed some papers on the design and analysis of spring
performance and fatigue life prediction of spring. There is also the analysis of
failure in spring. The aim of this paper is to represent a general study on the
analysis of spring. Compression springs are commonly used in the I.C. Engine
valves, 2 wheeler horn & many more and they are subjected to number of stress
cycles leading to fatigue failure. A lot of research has been done for improving the
performance of spring. Now the automobile industry has shown interest in the
replacement of steel spring with composite spring. In general, it is found that
fiberglass material has better strength characteristic and are lighter in weight as
compare to steel for spring. We can reduce product development cost and time
while improving the safety, comfort and durability of the vehicles produce. The
CAE tool has where much of the design verification is now done using computer
simulation rather than physical prototype testing.

Key words: Spring, finite element analysis, FEM, CAE tool.

1. INTRODUCTION safety. It has been reported by the


warranty/ maintenance department that
Springs are mainly used in the industry frequent complaints are being received over
as members absorbing shock energy as well the failures of these springs well within
as for restoring the initial position of a part their intended life span. The springs must
upon displacement for initiating a given be designed for reliability. The springs must
function. Compression springs are coil be designed to withstand the cyclic loading
springs that resist a compressive force during operation. Therefore in this
applied axially. Compression springs may dissertation work it is proposed to carry out
be cylindrical, conical, tapered, concave or the design and fatigue analysis of
convex in shape. Coil compression springs compression spring used for Horn in a two-
are wound in a helix usually out of round wheeler so as to have better performance
wire. Every two-wheeler has a provision in terms of longer life.
for a sounding a horn to be used while
2. SOME OF THE IMPORTANT DESIGN
communicating so as to warn the passer-
CONSIDERATIONS IN SPRING WORK
by of the approaching vehicle as well as a
signal for maintaining a safe distance or to To adhere to proper procedures and
communicate for any other reasons for design considerations, some of the

7
S K Jha and Mohd. Parvez

important design considerations in spring 2.2 General spring design recommenda-


work are outlined here. tions

2.1 Selection of material for spring a. Try to keep the ends of the spring, where
construction possible, within such standard forms as
closed loops, full loops to centre, closed
a. Space limitations : Do you have and ground, and open loops.
adequate space in the mechanism to
b. Pitch. Keep the coil pitch constant
use economical materials such as oil-
unless you have a special requirement
tempered ASTM A229 spring wire? If
for a variable pitch spring.
your space is limited by design and you
need maximum energy and mass, you c. Keep the spring index [mean coil
should consider using materials such diameter, between 6.5 and 10 wherever
as music wire, ASTM A228 chrome possible. Stress problems occur when
vanadium or chrome silicon steel wire. the index is too low, and entanglement
and waste of material occur when the
b. Economy : Will economical materials
index is too high.
such as ASTM A229 wire suffice for the
intended application? d. Do not electroplate the spring unless it
is required by the design application.
c. Corrosion resistance : If the spring is
The spring will be subject to hydrogen
used in a corrosive environment, you
embrittlement unless it is processed
may select materials such as 17-7 PH
correctly after electroplating.
stainless steel or the other stainless
steels (301, 302, 303, 304, etc.). Hydrogen embrittlement causes abrupt
and unexpected spring failures. Plated
d. Electrical conductivity : If you require
springs must be baked at a specified
the spring to carry electric current,
temperature for a definite time interval
materials such as beryllium copper and
immediately after electroplating to
phosphorous bronze are available.
prevent hydrogen embrittlement. For
e. Temperature range : Whereas low cosmetic and minimal corrosion protection,
temperatures induced by weather are zinc electroplating is generally used,
seldom a consideration, high- although other plating such as chromium,
temperature applications will call for cadmium, and tin are also used as per the
materials such as 301 and 302 stainless application requirements. Die springs
steel, nickel chrome A286, 17-7 PH, usually come from the die spring
Inconel 600, and Inconel X750. Design manufacturers with coloured enamel paint
stresses should be as low as possible finishes for identification purposes.
for springs designed for use at high
operating temperatures. 2.3 Special processing either during or
after manufacture
f. Shock loads, high endurance limit,
and high strength : Materials such as a. Shot penning improves surface
music wire, chrome vanadium, chrome qualities from the standpoint of
silicon, 17-7 stainless steel, and reducing stress concentration points on
beryllium copper are indicated for these the spring wire material. This process
applications. can also improve the endurance limit

8
Literature review on Design, Analysis and Fatigue Life of a Mechanical Spring

and maximum allowable stress on the along with the successive resonances and
spring. achieve significant values even at large
distances from the resonance frequencies.
b. Subjecting the spring to a certain
amount of permanent set during B. Pyttel, I. Brunner, et al. [2] Long-
manufacture eliminates the set problem term fatigue tests on shot peened helical
of high energy versus mass on springs compression springs were conducted by
that have been designed with stresses means of a special spring fatigue testing
in excess of the recommended values. machine at 40 Hz. Test springs were made
This practice is not recommended for of three different spring materials - oil
springs that are used in critical hardened and tempe red SiCr- and SiCrV-
applications. alloyed valve spring steel and stainless
steel. With a special test strategy in a test
2.4 Stress considerations run, up to 500 springs with a wire diameter
of d = 3.0 mm or 900 springs with d = 1.6
Design the spring to stay within the
mm were tested simultaneously at different
allowable stress limit when the spring is stress levels. Based on fatigue
fully compressed or "bo ttomed." This can investigations of springs with d = 3.0 mm
be done when there is sufficient space up to a number of cycles N = 109 an
available in the mechanism, and economy
analysis was done after the test was
is not a consideration. When space is not
continued to N = 1.5 _ 109 and their results
available, design the spring so that its
were compared. The influence of different
maximum working stress at its maximum shot peening conditions were investigated
working deflection does not exceed 40 to in springs with d = 1.6 mm. Fractured test
45 percent of its minimum yield strength
springs were examined under optical
for compression and extension springs and
microscope, scanning electron microscope
75 percent for torsion springs. Remember
(SEM) and by means of metallographic
that the minimum tensile strength microsections in order to analyse the
allowable is different for differing wire fracture behaviour and the failure
diameters; higher tensile strengths are mechanisms. The paper includes a
indicated for smaller wire diameters.
comparison of the results of the different
spring sizes, materials, number of cycles
3. LITERATURE REVIEW and shot peening conditions and outlines
further investigations in the VHCF-region..
K. Michalczyk [1] The analysis of
For comparison the results for the springs
elastomeric coating influence on dynamic
with d = 1.6 mm and d = 3.0 mm and Ps =
resonant stresses values in spring is
98% are summarised in Fig. 1. Except for
presented in this paper. The appropriate
springs made of the stainless steel wire,
equations determining the effectiveness of
the fatigue strength of springs with d = 3.0
dynamic stress reduction in resonant
mm is higher than for springs with d = 1.6
conditions as a function of coating
mm. The size effect would imply higher
parameters were derived. It was proved that
fatigue strength for smaller wire diameters.
rubber coating will not perform in
satisfactory manner due to its low modulus Touhid Zarrin-Ghalami, Ali Fatemi [3]
of elasticity in shear. It was also Elastomeric components have wide usage
demonstrated that about resonance areas in many industries. The typical service
of increased stresses are wider and wider loading for most of these components is

9
S K Jha and Mohd. Parvez

Fig. 1. Comparison of fatigue strength of springs made of various spring steel wires
with d = 1.6 mm and d = 3.0 mm at P5 = 98%.

variable amplitude and multiaxial. In this counting method and Miner's linear
study a general methodology for life damage rule were used for predicting
prediction of elastomeric components fatigue life under variable amplitude
under these typical loading conditions was loadings. The fracture mechanics approach
developed and illustrated for a passenger was used for total fatigue life prediction of
vehicle cradle mount. Crack initiation life the component based on specimen crack
prediction was performed using different growth data and FE simulation results.
damage criteria. The methodology was Total fatigue life prediction results showed
validated with component testing under good agreement with experiments for all of
different loading conditions including the loading conditions considered.
constant and variable amplitude in-phase
and out-of-phase axial-torsion experi- Wei Li, Tatsuo Sakai et al. [4] Very high
ments. The optimum method for crack cycle fatigue (VHCF) properties of a newly
initiation life prediction for complex developed clean spring steel were
multiaxial variable amplitude loading was experimentally examined under rotating
found to be a critical plane approach based bending and axial loading. As a result, this
on maximum normal strain plane and steel represents the duplex S-N property
damage quantification by cracking energy only for surface -induced failure under
density on that plane. Rain flow cycle rotating bending, whereas it represents the

10
Literature review on Design, Analysis and Fatigue Life of a Mechanical Spring

single S-N property for surface-induced helical spring under an axial load. The
failure and interior inhomogeneous study provides a clear match between the
microstructure-induced failure under axial evolution of the theoretical and the
loading. Surface small grinding defect- numerical tensile and compression normal
induced failure is the predominant failure stresses, being of sinusoidal behaviour. The
mode of this steel in VHCF regime. The overall equivalent stress isovalues
surface morphology of the interior inhomo- increases radially from 0_ to 180_, being
geneous microstructure with distinct maximal on the internal radial zone at the
plastic deformation is much rougher than section 180_. On the other hand, the
that of the ambient matrix, which means minimum stress level is located in the
the stress concentration resulted from the centre of the filament cross section.
strain inconsistency between the micro
structural in homogeneity as soft phase and B. Pyttel , D. Schwerdt, et al. [6 ] The
the ambient matrix as hard phase plays a paper gives an overview of the present state
key role in causing interior crack initiation. of research on fatigue strength and failure
Considering the effect of surface mechanisms at very high number of cycles
compressive residual stress, the threshold (Nf > 107). Testing facilities are listed. A
stress intensity factor for surface small classification of materials with typical S-N
defect-induced crack propagation of this curves and influencing factors like notches,
steel is evaluated to be 2.04 MPam1/2, residual stresses and environment are
which means that the short crack effect given. Different failure mechanisms which
plays a key role in causing the surface small occur especially in the VHCF-region like
defect-induced failure of this steel in the subsurface failure are explained. There
VHCF regime. From the viewpoint of defect micro structural in homogeneities and
distribution, surface and interior failure statistical conditions play an important
probabilities are equivalent under a fixed role. A double S-N curve is suggested to
characteristic value of defect density. If the describe fatigue behaviour considering
interior defect size is less than or even equal different failure mechanisms. Investigated
to the surface defect size, surface defect- materials are different metals with body-
induced failure will become the centred cubic lattice like low- or high-
predominant failure mode in VHCF regime, strength steels and quenched and
especially under rotating bending. tempered steels but also materials with a
face-centred cubic lattice like aluminium
Sid Ali Kaoua A, Kamel Taibi A et al. alloys and copper. Recommendations for
[5] This paper presents a 3D geometric fatigue design of components are given.
modelling of a twin helical spring and its
finite element analysis to study the spring Stefanie Stanzl-Tschegg [7] Ever since
mechanical behaviour under tensile axial high-strength steels were found to fail
loading. The spiralled shape graphic design below the traditional fatigue limit when
is achieved through the use of Computer loaded with more than 108 cycles, the
Aided Design (CAD) tools, of which a finite investigation of metals' and alloys' very high
element model is generated. Thus, a 3D 18- cycle fatigue properties has received
dof pentaedric elements are employed to increased attention. A lot of research was
discrete the complex ''wired-shape" of the invested in developing methods and
spring, allowing the analysis of the machinery to reduce testing times. This
mechanical response of the twin spiralled overview outlines the principles and testing

11
S K Jha and Mohd. Parvez

procedures of very high cycle fatigue tests of our proposal. The non-linear differential
and reports findings in the areas of crack equation derived from the model is solved,
formation, non-propagating small cracks, obtaining large stiffness variations. A
long crack propagation and thresholds. prototype of the actuator was fabricated
Furthermore, superimposed and variable and tested for different load cases.
amplitude loading as well as frequency Experimental results were compared with
effects are reported. numerical simulations for model
verification, showing excellent agreement
Yuxin Penga, Shilong Wangb, et al. [8]
for a wide range of work.
A stranded wire helical spring (SWHS) is a
unique cylindrically helical spring, which Matjaz Mrsnik, Janko Slavic, et al.
is reeled by a strand that is formed of 2~16 [10] The characterization of vibration-
wires. In this paper, a parametric modelling fatigue strength is one of the key parts of
method and the corresponding 3D model mechanical design. It is closely related to
of a closed-end SWHS are presented based structural dynamics, which is generally
on the forming principle of the spring. By studied in the frequency domain, parti-
utilizing a PC + PLC based model as the cularly when working with vibratory loads.
motion control system, a prototype Fatigue-life estimation in the frequency
machine tool is designed and constructed, domain can therefore prove advantageous
which improves the manufacturing of the with respect to a time-domain estimation,
SWHS. Via the commercial CAD package especially when taking into consideration
Pro/Engineering, numerical simulation is the significant performance gains it offers,
carried out to test the validity of the regarding numerical computations. Several
parametric modeling method and the frequency-domain methods for a vibration-
performance of the machine tool. The fatigue-life estimation have been developed
scheme of the tension control system is based on numerically simulated signals.
analyzed and the control mechanism is set This research focuses on a comparison of
up, which have achieved the constant different frequency-domain methods with
tension of each wire. A human machine respect to real experiments that are typical
interface is also proposed to achieve the in structural dynamics and the automotive
motion control and the tension control. industry. The methods researched are:
Experimental results show that the tension Wirsching-Light, the a0.75 method, Gao-
control system is well-qualified with high Moan, Dirlik, Zhao-Baker, Tovo-Benasciutti
control precision. and Petrucci-Zuccarello. The experimental
A.Gonzalez Rodríguez, J.M. Chacon, comparison re searches the resistance to
et al. [9] An adjustable-stiffness actuator close-modes, to increased background
composed of two antagonistic non-linear noise, to the influence of spectral width,
springs is proposed in this paper. The and multi-vibration-mode influences.
elastic device consists of two pairs of leaf Additionally, typical vibration profiles in the
springs working in bending conditions automotive industry are also researched.
under large displacements. Owing to this For the experiment an electro-dynamic
geometric non-linearity, the global stiffness shaker with a vibration controller was used.
of the actuator can be adjusted by The reference-life estimation is the
modifying the shape of the leaf springs. A rainflow- counting method with the
mathematical model has been developed in Palmgren-Miner summation rule. It was
order to predict the mechanical behaviour foun d that the Tovo-Benasciutti method

12
Literature review on Design, Analysis and Fatigue Life of a Mechanical Spring

gives the best estimate for the majority of uniaxial tensile load is conducted &
experiments, the only exception being the findings are compared against those
typical automotive spectra, for which the obtained from a theoretical approach based
enhanced Zhao-Baker method is best on a transformation of curvilinear
suited. This res earch shows that besides coordinates.
the Dirlik approach, the Tovo- Benasciutti
The characterization of the fatigue
and Zhao-Baker methods should be consid
properties of materials and components at
ered as the preferred methods for fatigue
very high numbers of cycles necessitates a
analysis in the frequency domain. careful selection of fatigue loading
Nenad Gubeljaka, Mirco D. Chapettib, machinery and measuring devices, as well
et al. [11] High strength steel grade 51CrV4 as a diligent application of testing and
in thermo-mechanical treated condition is evaluation procedures.
used as bending parabolic spring of heavy The present paper proposes a new
vehicles. Several investigations show that model of an adjustable-stiffness spring. The
fatigue threshold for very high cycle fatigue proposed device has four leaf springs with
depends on inclusion's size and material nonlinear elastic deformations. The
hardness. In order to determine allowed geometry of the leaf spring can be modified
size of inclusions in spring's steel the by means of an electric motor that adjusts
Murakami's and Chapetti's model have the stiffness of the spring to the desired
been used. The stress loading limit value. This paper also proposes a
regarding to inclusion size and applied mathematical model that allows the leaf
stress has been determine for loading ratio springs to be dimensioned for every specific
R=-1 in form of S-N curves. Experimental purpose. A prototype of the spring has been
results and prediction of S-N curve by built and tested.
model for given size of inclusion and R ratio
show very good agreement. Pre-stressing 5. REFERENCES
and shot-penning causes higher compress
stress magnitude and consequently change [1] K. Michalczyk, Analysis of the
of loading ratio to more negative value and influence of elasto meric layer on
additionally extended life time of spring. helical spring stresses in
longitudinal resonance vibration
4. CONCLUSIONS conditions, archives of civil and
mechanical engineering, (2013).
From above papers it is to conclude
that rubber is not suitable material for [2] B. Pyttel, I. Brunner, B. Kaiser, C.
the coating due to too low value of its Berger and M. Mahendran, Fatigue
modulus of elasticity in shear. Elastomeric behaviour of helical compression
coating has a positive impact on the springs at a very high number of
reduction of dynamic stresses in the spring cycles- Investigation of various
but also contribute to lowering of resonant influences, International Journal of
frequencies. Shorter total life was observed Fatigue, (2013).
for out-of-phase loading compared to in- [3] Touhid Zarrin-Ghalami and Ali
phase loading at the same level for both Fatemi, Multiaxial,fatig ue and life
constant and variable amplitude loadings. prediction of elastomeric compo-
In finite element analysis of the mechanical nents, International Journal of
behaviour of the twin helical spring under Fatigue, (2013).

13
S K Jha and Mohd. Parvez

[4] Wei Li, Tatsuo Sakai, Masami design, numerical simulation and
Wakitac and Singo Mimura, control system of a machine tool for
Influence of microstructure and stranded wire helical springs,
surface defect on very high cycle Journal of Manufacturing Systems,
fatigue properties of clean spring (2012).
steel, International Journal of Fatigue, [9] A González Rodríguez, J.M.
(2013). Chacón, A. Donoso and A.G.
[5] Sid Ali Kaoua, Kamel Taibia, González Rodríguez, Design of an
Nacera Benghanem, Krimo adjustable-stiffness spring:
Azouaoui and Mohammed Azzaza, Mathematical modeling and
Numerical modelling of twin helical simulation, fabrication and
spring under tensile loading, Applied experimental validation, (2011).
Mathematical Modelling, (2011). [10] Matjaz Mrsnik, Janko Slavic and
[6] B. Pyttel , D. Schwerdt and C. Miha Boltezar, Fre quency-domain
Berger, "Very high cycle fatigue - Is methods for a vibration-fatigue-life
there a fatigue limit?, International estimation - Application to real data,
Journal of Fatigue, (2011). Internat ional Journal of Fatigue
(2013).
[7] Stefanie Stanzl-Tschegg, Very high
[11] Nenad Gubeljaka, Mirco D.
cycle fatigue me asuring techniques,
Chapettib, Jozef Predana and
International Journal of Fatigue,
Bojan Sencic, Variation of Fatigue
(2013).
Threshold of Spring Steel with
[8] Yuxin Penga, Shilong Wang, Jie Prestressing, Procedia Engineering,
Zhou and Song Lei, Structural (2011).

14
Global Sci-Tech, 8 (1) January-March 2016;
Software Costpp. 15-21 DOI
Estimation No.: 10.5958/2455-7110.2016.00003.3

Software Cost Estimation

HUDA SAIF
Dux Concept, B-21, Jasola Vihar, New Delhi 110025
*E-mail: bloom.huda@gmail.com

ABSTRACT

The development of a successfull software depends upon the accurate estimation,


as various factors are responsible for the overall assessment of any project. The
Sofware Cost Estimation is the most complicated and challenging task in software
industry. Many estimation models are introduced by the time, that concludes
estimation is not a precise science and demanding of new methodologies should be
proposed day by day. Software Cost Estimation of a project is vital to the acceptance
or rejection of the development of software project. Various techniques have been
introduced. This paper enlightens two categories of Software Cost Estimation
techniques ie Algorithimic and Non Algorithimic.This paper evaluates the Algorithmic
Models such as SLIM, COCOMO, Function Points and Non Algorithimic Models
such as Analogy,Expert Judgement which are used to estimate software costs.
Poor planning frequently leads to project failure and considerable outcomes for the
project team.Software project managers should be aware of the increasing of project
failures. In this paper, several existing methods for software cost estimation are
illustrated and their aspects will be discussed.

Key words: COCOMO, SLIM, Algorithimic.

1. INTRODUCTION • Project Planning and Control


As Software Engineers have expressed • Software improvement investment
concern over their inability to accurately analysis
estimate costs associated with software The software has one important
development. This concern has become characteristic that its cost increases with
more crucial as costs associated with time that is as time grows the cost
development continue to increase. As a increases. This section gives the
result, considerable research attention is introduction of the paper.Section 2
now directed at gaining a better under- introduces Estimation Techniques which
standing of the software-development consists of Algorithimic and Non
process as well as constructing and Algorithimic models.Section 3 includes
developing software cost estimation Problem Identification that is problem
techniques. definition and solution.Section 4 includes
Software engineering cost estimation the Conclusion.
techniques areused for a number of
2. ESTIMATION TECHNIQUES
purposes. These include:
• Budgeting There are many models for software cost
• Tradeoff and Risk analysis estimation, which are divided into two

15
Huda Saif

groups: Algorithmic and Non-algorithmic. FP = CFP × (0.65 + 0.01 × RCAF)


Using of the both groups is required for Relates to the following five software
performing the accurate estimation. If the components :
requirements are known better, their
• Number of user inputs.
performance would be better. Some popular
estimation methods are discussed below. • Number of user outputs.
• Number of user online queries.
2.1. Algorithimic Models • Number of logical files.
These models work on a special • Number of external interfaces.
algorithm. They need data at first and make Weighted factors are applied to each
results by using the mathematical components according to their complexity.
relations.Many software estimation
methods use these models. Algorithmic Table 1 : CFP Calculation Form
Models are classified into some different
Software system Complexity Level
models. Components
Simple Average Complex
2.1.1. Source line of code
User Inputs 3 4 6
SLOC is an estimation parameter that User Outputs 4 5 7
illustrates the number of all commands and User Online Queries 3 4 6
data definition but it does not include Logical Files 7 10 15
instructions such as comments, blanks, External Interfaces 5 7 10
and continuation lines. This parameter is
usually used as an analogy based on an Relative Complexity Adjustment
approach for the estimation. After Factor(RCAF) : Table below summarizes
computing the SLOC for software, its the complexity characteristics of the
amount is compared with other projects software system :
which their SLOC has been computed - assign grades (0 to 5) to the 14
before, and the size of project is estimated. subjects that substantially affect the
SLOC measures the size of project easily. development effort:
- RCAF = Σ(i=1 to 14) si
2.1.2. Function point estimates
The RCAF determines the technical
It was devised in 1979 by A. J. Albrecht, complexity factor (TCF) :
as a means of measuring software size and
TCF = 0.65 + 0.01 × RCAF
productivity.
FP = CFP × TCF
The function point estimation process
consists of : F1 Reliable back-up and recovery
F2 Distributed functions
Stage 1 : Compute the unadjusted F3 Heavily used configuration
(crude) function count (points) (UFC / CFP). F4 Operational ease
Stage 2 : Compute the relative F5 Complex interface
complexity adjustment factor (RCAF) for the F6 Reusability
project. RCAF varies between 0 and 70. F7 Multiple sites
F8 Data communications
Stage 3 : Compute the number of
F9 Performance
function points (FP). F10 Online data entry

16
Software Cost Estimation

F11 Online update packages. The Applications Composition


F12 Complex processing model is 190 B. Boehm et al./Software
F13 Installation ease development cost estimation approaches -
F14 Facilitate change A survey based on Object Points [Banker
et al. 1994; Kauffman and Kumar 1993].
2.1.3. COCOMO (Constructive Cost Model) Object Points are a count of the screens,
The COCOMO (COnstructive COst reports and 3 GL language modules
MOdel) cost and schedule estimation model developed in the application. Each count
was originally published in [Boehm 1981]. is weighted by a three-level; simple,
It became one of most popular parametric medium, difficult; complexity factor. This
cost estimation models of the 1980s. But estimating approach is commensurate with
COCOMO '81 along with its 1987 Ada the level of information available during the
update experienced difficulties in planning stages of Application Composition
estimating the costs of software developed projects.
to new life-cycle processes and capabilities. COCOMO II has some special features,
The COCOMO II research effort was started which distinguish it from other ones. The
in 1994 at USC to address the issues on Usage of this method is very wide and its
non-sequential and rapid development results usually are accurate.
process models, reengineering, reuse
driven approaches, object oriented 2.1.4. Putnam’s Software Life-cycle Model
approaches, etc. (SLIM)
COCOMO II was initially published in Putnam's Software Life-cycle Model
the Annals of Software Engineering in 1995 (SLIM)
[Boehm et al. 1995]. The model has three
Larry Putnam of Quantitative Software
submodels :
Measurement developed the Software Life-
• Applications Composition cycle Model (SLIM) in the late 1970s
• Early Design [Putnam and Myers 1992]. SLIM is based
• Post-Architecture on Putnam's analysis of the life-cycle in
terms of a so-called Rayleigh distribution
which can be combined in various ways to of project personnel level versus time. It
deal with the current and likely future supports most of the popular size
software practices marketplace. estimating methods including ballpark
The Application Composition model is techniques, source instructions, function
used to estimate effort and schedule on points, etc. It makes use of a so-called
projects that use Integrated Computer Rayleigh curve to estimate project effort,
Aided Software Engineering tools for rapid schedule and defect rate. A Manpower
application development. These projects are Buildup Index (MBI) and a Technology
too diversified but sufficiently simple to be Constant or Productivity factor (PF) are
rapidly composed from interoperable used to influence the shape of the curve.
components. Typical components are GUI SLIM can record and analyze data from
builders, database or objects managers, previously completed projects which are
middleware for distributed processing or then used to calibrate the model; or if data
transaction processing, etc. and domain- are not available then a set of questions
specific components such as financial, can be answered to get values of MBI and
medical or industrial process control PF from the existing database. In SLIM,

17
Huda Saif

2.2. Non Algorithmic Models


2.2.1. Analogy
In this method, several similar
completed software projects are noticed and
estimation of
effort and cost are done according to
their actual cost and effort. Estimation
based on analogy is accomplished at the
total system levels and subsystem levels.
By assessing the results of previous actual
projects, we can estimate the cost and
effort of a similar project.
The steps of this method are considered
as :
Fig. 1. The Rayleigh model • Choosing of analogy.
• Investigating similarities and
Productivity is used to link the basic differences.
Rayleigh manpower distribution model to • Examining of analogy quality.
the software development characteristics of
size and technology factors. • Providing the estimation.
Productivity P, is the ratio of software 2.2.2. Expert Judgment
product size S and development effort E.
Estimation based on Expert judgment
That is, is done by getting advices from experts who
P = S/E have extensive experiences in similar
The Rayleigh curve used to define the projects. This method is usually used when
distribution of effort is modeled by the there is limitation in finding data and
differential equation gathering requirements.

dy/dt= 2Kate-at2 Consultation is the basic issue in this


method. One of the most common methods
An example is given in figure above which works according to this technique,
where K = 1:0, a = 0:02, td = 0:18 where is Delphi. Delphi arranges an especial
Putnam assumes that the peak staffing meeting among theproject experts and tries
level in the Rayleigh curve corresponds to to achieve the true information about the
development time (td). Different values of project from their debates.
K, a and td will give different sizes and
shapes of the Rayleigh curve. Some of the Delphi includes some steps :
Rayleigh curve assumptions do not always i. The coordinator gives an estimation
hold in practice (e.g., flat staffing curves form to each expert.
for incremental development; less than t4
effort savings for long schedule ii. Each expert presents his own
stretchouts). To alleviate this problem, estimation (without discussing with
Putnam has developed several model others).
adjustments for these situations. iii. The coordinator gathers all forms

18
Software Cost Estimation

and sums up them (including mean terms.


or median) on a form and ask experts Stage 2 : To develop the complexity
to start another iteration. matrix by producing a new linguistic term.
iv. steps (ii-iii) are repeated until an Stage 3 : To determine the productivity
approval is gained. rate and the attempt for the new linguistic
2.2.3. Machine Learning Models terms.

Most techniques about software cost Stage 4 : Defuzzification: to determine


estimation use statistical methods, which the effort required to complete a task and
are not able to present reason and strong to compare the existing method.
results. Machine learning approaches could
3. PROBLEM IDENTIFICATION
be appropriate at this filed because they
can increase the accuracy of estimation 3.1. Problem Definition
by training rules of estimation and
Estimation always remains difficult and
repeating the run cycles. Machine Learning
challenging task. As the review shows that
Methods could be categorized into two
selection of techniques, models and metrics
methods namely :
are responsible for the inaccuracy and
overruns in the case of budgets and time.
2.2.3.1. Neural network
This overruns effects the estimations and
Neural Networks include several layers that directly effects environment. Software
where each layer is composed of several possesses characteristics that cost of any
elements called neurons.Neurons, by product increase with increase in time.
investigating the weights defined for inputs, Various models are developed but no single
produce the outputs. Outputs will be the is responsible for correct estimation. The
actual effort, which is the main goal of programmers and managers passes
estimation. Back propagation neural through the phases of SDLC where each
network is the best selection for software process affects other. After this there might
estimation problem because it adjusts the be some escapes factors and those are
weights by comparing the network outputs rework on same project, extension of
and actual results. In addition, training is project and maintenance.
done effectively.
3.2. Solution Domain
2.2.3.2. Fuzzy Method
The identification of problem clearly
All systems, which work based on the defines the difficulties faced by the
fuzzy logic try to simulate human behavior researchers. To overcome this problem
and reasoning. In many problems, which there are some solutions as reuse can
decision making is very difficult and become the key factor for reduction of cost
conditions are vague, fuzzy systems are an and effort.
efficient tool in such situations. This
1. Reusability concept of OOP can be
technique always supports the facts that
utilized by using the suitable technique
may be ignored.
and metric.
There are four stages in the fuzzy
2. As for the reusability estimation by
approach :
analogy is appropriate technique which
Stage 1 : Fuzzification: to produce describes that the past project is
trapezoidal numbers for the linguistic compared with new project and if the

19
Huda Saif

code is matched then it can be reused. significance in different manner in the field
3. LOC metric can be used to estimate of software cost estimation. The suggestions
software size as others can cause the of using combination of different techniques
overruns within time. and models can be much more efficient as
alone model and method are not much
4. Analogy concept [13] needs searching
effective in estimation Concept of reusability
technique in the form of search engine
helps in reducing the cost and effort with
as past projects should be placed in
use of analogy estimation and suitable
some code repository, and through this
searching and retrieval techniques. Lastly,
method the historical projects can be
gradual increment of new approaches and
matched with new projects.
the hybrid scheme of methods with models
5. If the codes are matched then it can be can be used.
used in new project reduce the effort
which reduces the cost. 5. REFERENCES
6. As tentative cost of new project should [1] Geetika Batra and Kuntal Barua,
be calculated and the old projects cost "A Review on Cost and Effort
are already known, it helps to asses Estimation Approach for Software
reduced cost in case of no. of lines used Development", M.Tech Scholar,
by new project. Through this approach Department of Computer Science,
the problems can be reduced as L.N.C.T, Indore, Asst Professor,
estimating by analogy with use of LOC Department of Computer Science,
as software size. And the retrieval L.N.C.T, Indore.
techniques like cosine similarity
Euclidean distance can be used such [2] Vahid Khatibi and Dayang N. A.
that reduction of cost and effort. Jawawi, "Software Cost Estimation
Methods: A Review".
4. CONCLUSION
[3] Attarzadeh and I. Siew Hock Ow,
Software development in this era is at "Proposing a New Software Cost
demanding phase, and estimation of cost Estimation Model Based on Artificial
and effort in this filed always remains an Neural Networks", IEEE International
open challenge and considered to be a Conference on Computer Engineering
complex task. Software engineering and and Technology (ICCET), 3, V3-487
SDLC have their significance presence in (2010).
the estimation. The review also shows that
[4] Attarzadeh and I. Siew Hock Ow,
many reviewers and researchers state that
"Improving the accuracy of software
assessment of cost gradually increases or
cost estimation model based on a
decreases. Though it is an essential task
new fuzzy logic model", World
the ignorance is not acceptable. Awareness
Applied science journal 8(2), 117
of project managers and selection of
(2010-10-2).
methods are responsible for over budget.
Each estimation techniques like COCOMO, [5] A.J. Albrecht and J. E. Gaffney,
SLIM model have it own prospects to be "Software function, source lines of
good and at the same time suffered with codes, and development effort
pitfalls. Estimation by algorithmic, non prediction: a software science
algorithmic, top-bottom approach or validation", IEEE Trans Software
bottom-up approach etc shows their own Eng. SE, 639-648, (1983).

20
Software Cost Estimation

[6] M.R. Braz and S. R. Vergilio. D.D. Galorath," Inside SEER-SEM",


"Software Effort Estimation Based on CrossTalk, The Journal of Defense
Use Cases". Computer Software and Software Engineering, (2005).
Applications Conference, COMPSAC
'06. 30 th Annual International, [12] D.D. Galorath and M.W. Evans,
(2006). "Software sizing, estimation, and risk
management: When performance is
[7] B.W. Boehm and R. Valerdi, measured performance improves".
"Achievements and challenges in Boca Raton, FL: Auerbach, (2006).
cocomo-based software resource
estimation", IEEE Software, 25(5), 74 [13] A. Idri and S. Mbarki, et al.
(2008). "Validating and understanding
software cost estimation models
[8] Boehm,"Software Engineering based on neural networks".
Economics", Prentice Hall, (1981). Information and Communication
Technologies: From Theory to
[9] N.H. Chiu and S.J. Huang, "The
Applications, 2004. Proceedings.
adjusted analogy-based software
2004 International Conference on,
effort estimation based on similarity
(2004).
distances", Journal of Systems and
Software 80(4), 628 (2007). [14] C. Jones, "Estimating software
[10] J.J. Cuadrado-Gallego and Rodri, costs: Bringing realism to estimating
et al. "Analogies and Differences (2nd ed.)". New York, NY: McGraw-
between Machine Learning and Hill, (2007).
Expert Based Software Project Effort [15] W. Jianfeng and L. Shixian, et al. "
Estimation". Software Engineering Improve Analogy-Based Software
Artificial Intelligence Networking and Effort Estimation Using Principal
Parallel/Distributed Computing Components Analysis and
(SNPD), 11 th ACIS International Correlation Weighting". Software
Conference on, (2010). Engineering Conference, 2009.
[11] L. Fischman, K. McRitchie and APSEC '09. Asia-Pacific, (2009).

21
Global Sci-Tech, 8 (1) January-March
Sher Jung
2016;
and Rajinder
pp. 22-36kumar
DOI No.: 10.5958/2455-7110.2016.00004.5

Security of Routing Protocols in


MANETs: A Survey

SHER JUNG* and RAJINDER KUMAR


Department of Computer Science and Engineering
Al Falah University, Faridabad, India
*E-mail: sherjung2005@gmail.com

ABSTRACT

A mobile ad hoc network or MANET is a wireless network that is dynamic and can
be formed without any fixed and pre existing infrastructure whereas each node
can play the role of a router. Security is an important requirement in mobile ad hoc
networks. This paper deals with two aspects of the security in MANETs one is
security attacks and the other is security in routing protocols of MANET. The
important purpose of the description of security aspects of MANET is to implement
security including authentication, confidentiality, integrity, anonymity, and
availability of services to the mobile users. In MANETs there are both legitimate
and malicious nodes. In this paper, various important security issues in MANET
have also been analyzed. The various routing attacks, such as black hole, gray
hole, impersonation, worm hole etc. are reviewed in this paper. These attacks are
one of the reasons of major problems in MANETs.

Key words: MANET, Security, Routing Protocol, Security attack.

1. INTRODUCTION mobile nodes which are powered by a


Many improvements in the field of battery. The traffic in an ad hoc network is
wireless are being introduced since the last through the relay nodes so it is desirable
decades. As people are more eager and that participating node in the network
needy to use more secured and robust forwards the packets which it receives but
network, it is very much required to that is meant for some other node as
establish a MANET equipped with secured destination. These nodes may have two
and reliable mechanisms in order to give reasons for their non cooperation:
access of this technology to the current and malicious attitude or selfish attitude [3].
the future generation, we must facilitate a The malicious attitude of a node can be due
secure and reliable MANET. The ad hoc to the opponent's intervention in the
networks provide ubiquitous connectivity network where it intends to sabotage the
without the need of fixed infrastructure network activity. The selfish attitude may
[12]. This makes them very suitable choice be due to the various reasons where a
when the communication has to be legitimate node in the network starts
provided temporarily such as in case of avoiding the forwarding activity due to its
battle field, disaster hit area or to create a current low power status or it feels so over
network between members of an interim utilized in the forwarding activity and it
group. This type of network is made up of fears that it will drain so much power that

22
Security of Routing Protocols in MANETs: A Survey

Fig. 1. Architecture of MANET Example

it will not have enough energy to send or A more powerful and efficient encryption
receive its own packets in the future. algorithm that can be used to encrypt the
Architecture of MANET is given in the figure data under transmission process which is
1. impossible for the attacker to get the useful
and effective information.
2. CLASSIFICATION OF ATTACKS
An active attack attempts to change the
According to behavior of ad hoc data which is being exchanged in the
network, attacks are classified as Passive network thereby destroys the functioning
attacks and Active attacks and according of the network. Active attacks can be
to source, attacks are classified as internal internal or external. Most often, external
attacks and External attacks. A brief attacks are initiated from outside the
description of attacks can be found in [5]. network. Internal attacks are initiated from
a node belonging to the network itself such
2.1 Passive and Active Attacks
as impersonation, modification, fabrication
A passive attack is that attack in which and replication. Since the attacker is part
the original message content and context of the network, internal attacks are more
do not get changed and normal operations difficult to detect as compared to the
on the network are not get disrupted. Here external attacks [8]. Examples of active
the requirement of confidentiality gets attacks are the actions such as message
violated [8]. Detecting this kind of attack is modifications, message replays, message
difficult because neither the system fabrications and the denial of service
resources nor the critical network functions attacks [12]. There are four types of active
are physically affected to prove the attacks as mentioned below:
intrusions [5]. 1. Masquerade - To pretend to be someone

23
Sher Jung and Rajinder kumar

else. In this attack some user is logged attacks. Internal attacks are initiated by
with different user account credentials both compromised and misbehaving nodes
to get access to some authorized in the network. The objective of the mobile
account. For example, if a user knows ad-hoc network is to provide a security
the password and user name of System such as data integrity, confidentiality and
Administrator the user can pretend to authentication of the data. On the other
that he/she is the administrator. hand, if misbehaving nodes are authorized,
2. Replay - To acquire information to send they can use the system resource and fails
it, or copy it elsewhere. to use resources when they are not
authorized [5]. Internal nodes might
3. To make changes in the information or misbehave to save the resources, such as
data being sent or received. the power consumption, the processing
4. Denial of service- To cause a disruption capabilities, and the communication
of all services or some services to the bandwidth.
existing network. External attacks are those attacks
where users are not initially authorized to
2.2 Internal and External Attacks
participate in the network operations.
The other severe attack in the ad hoc These attacks cause network congestion,
networks known as internal attack denying access to particular network
originates from the second source of function or to destroying the whole network

Fig. 2. Classification of Different Types of Attack

24
Security of Routing Protocols in MANETs: A Survey

operations. Various external attacks are network. With the help of the program
bogus packets injection, denial of service, the user can log into a system without
and impersonation. an authentication test or gain
administrative privilege.
2.3 Other Attacks
4. Man in the middle Attacks -This attack
There are various other attacks that are is a type of an access attack, and it can
associated with MANET. These are also be used as the initial point of a
explained below: modification attacks. In this a software
piece is placed between the server and
1. Snooping Attacks - This type of attack
the client. Neither the sever side
arises when someone seeks in your file
administrator nor the client user is
with the hope of finding something
aware of this. This software is firstly
interesting whether electronically or in
intercepts the data and after that
paper. People might inspect our recycle
forward the information to the server.
bins or file cabinets and may try to find
The server sends a response message
something interesting.
to the software thinking that it is
2. Distributed Denial-of-Service Attacks communicating with the client.
- This attack is similar to Denial-of-
5. Password Guessing Attacks - This type
Service attack except the fact that the
of attacks occurs when an account is
environment is distributed. These
attacked repeatedly. This is possible
attacks amplify the DOS attack by using
when possible password is send to the
multiple computer system to execute
account in the systematic manner.
the attack on an organization when
Through these attacks we can guess the
someone seeks in your file with the hope
password. The password guessing
of finding something interesting
attacks are of two types :
whether electronically or in paper. In
this case people might inspect the (a) Brute Force Attacks - This attack
recycle bins or file cabinets. The allows you to guess a password until
attacker can load different attacks to a successful guess occurs. This
dozens of computer systems that uses makes the password more difficult
cable modem. The attack signal is send to be guessed. It is also time
to different computer from the master consuming.
computer. This signal triggers the (b) Dictionary Attacks - These types of
system which launches an attack on the attacks use a dictionary type of
target network and tries to find commonly used words for making
something interesting. attempts to find user password.
3. Back Door Attacks -This type of attacks These attacks are executed using
have two different meanings; the dedicated programs and tools which
original term back door refers to exist in public domain. This is
troubleshooting. The back doors allow possible when possible password is
examining the operation inside the send to the account in the
program code at the time of running the systematic manner. Through these
program. In another type of back doors, attacks we can guess the password.
the attacker gains access to the network
and insert a program or some other 3. SECURITY ATTACKS
utility in order to create entrance to the Security is an important requirement in

25
Sher Jung and Rajinder kumar

mobile ad hoc network (MANETs).This malicious nodes [5]. Classified example of


paper deals with two aspects of the security attack under message modification is
in MANET one is security attacks and the impersonation attacks and packet
other is routing protocols in MANET. The misrouting.
main purpose of security solutions for
MANETs is to provide security solutions like [1) Impersonation attacks -
authentication, anonymity, integrity, Impersonation attacks are known as
confidentiality and availability of services spoofing attacks. The identity of a node
to the mobile user. An attacker may aim to in the network is found out by the
do one of the following : attacker. Then the attacker can receive
messages sent to that node. This is the
3.1 Modification first step to intrude into a network to
carry out some more attacks for
This attack is used to modify information
disruption of operations. The attacker
which is sent through the communication
may also reconfigure the network in
channel between two or more users.
order to let other attackers join the
3.2 Interception network or remove security measures
from the network to allow a number of
Interception is an attack to gain subsequent attempts of various types
unauthorized access to a system. It is a of attacks. A captured node can also be
simple eavesdropping during communi- used for encryption of keys and
cation such as packet sniffing or copying authentication of information. In most
of information. cases, a malicious node can deny proper
routing by injecting false routing
3.2 Fabrication
packets into the path or by false
It is also known as counterfeiting. It updating routing information [2].The
bypasses authentication checks, and is like impersonation attacks generally occur
impersonating and adds new information in the mobile ad hoc network because
in a file. there is no authentication occurs of the
routing packet as a result change in the
3.3 Interruption original content.
Interception attack is an attack that is (2) Packet misrouting attacks - In this
achieved due to unauthorized access to the attack, malicious nodes again route
routing messages. Attacker tries to gain traffic from their original path to reach
access to some of the confidential to the undesirable destinations [9]. Here
information available in the network. Attackers can misroute the packet in
such a way so that a packet can stay
3.4 Modification longer in the network than its original
Modification attack is used to modify lifetimes, this will results retransmi-
information which is sent through the ssion of the lost packets from the source
communication channel between two or which will required extra bandwidth and
more users. In modification attack, attacker because of that the overhead in the
modifies the routing messages, and hence network will increase [5].
the packets integrity in the networks is
3.5 Interception
endangered. Nodes in the ad hoc networks
are free to move and might include the Interception attackers are those attacks

26
Security of Routing Protocols in MANETs: A Survey

which are achieved due to unauthorized and it threatens all its neighboring
access to the routing messages that are not nodes [5].
sent. In this type of attack, attacker wants
to access some of the confidential 3.6 Fabrication
information in the network. The secret This is also known as counterfeiting. It
information may be public key, private key bypasses authenti-cation checks, and is
or password etc. This information should like impersonating and adds new
be kept secure from the unauthorized user. information in a file. Attackers could launch
The packet could be analyzed before the message fabrication attacks by
passing to the destination which depicts introducing some big packets into the
confidentiality. Classified example under network in the same manner as in the sleep
the interception attacks are wormhole deprivation attack. The difference is that
attacks and black hole attacks. the message fabrication attacks are not only
(1) Wormhole attacks - The wormhole launched by malicious nodes but such
attacks are those attacks in which attacks also may come from the
shortcut is created with the external misbehaving nodes within the network such
attacker in the ad hoc network. By using as in the route salvaging attacks [5].
the shortcut, they could play the trick (1) Sleep deprivation attacks - Sleep
of the source node to win over the route deprivation attacks are those attacks
discovery process and launch the which aim to drain off limited resources
interception attacks later on [5]. The in the mobile ad hoc nodes (e.g. the
attackers transmit the packet through battery powers), by con-stantly make
the wired medium in order to create the them busy. These attacks are more
fastest route from source to destination. specific to the mobile ad hoc network.
If the bogus routes are consistently In a routing protocol, sleep deprivation
maintained by the wormhole node then attacks might be launched by flooding
they could deny other routes from being the targeted node with unnecessary
established. These results in a denied routing packets. Flooding in the sleep
route and intermediate nodes are deprivation attacks is done by sending
unable to participate in the network a huge number of route request (RREQ),
operations [5]. route replies (RREP) or route error
(RERR) packets to the targeted node.
(2) Black hole attacks - Black hole attacks
As a result, that parti-cular node is
are those attack in which malicious
unable to participate in the routing
nodes tricks all their neighboring nodes
mechanisms and rendered unreachable
to attract all the routing packets to
by the other nodes in the networks [5].
them. In the wormhole attacks,
malicious nodes could launch the black (2) Route salvaging attacks - Route
hole attacks by advertising themselves salvaging attacks are those attacks
to the neighboring nodes as having the which launched by the greedy internal
most optimal route to the requested nodes in the networks. In a mobile ad
destinations. However, unlike in the hoc network, there is no guarantee that
wormhole attacks where multiple each transmitted packet will
attackers colluded to attack one successfully reach the desired
neighboring node, in the black hole destination node [14]. Packets might not
attacks, only one attacker is involved reach the destination node because of

27
Sher Jung and Rajinder kumar

the network failures. Therefore, sending any packet in the networks [5].
misbehaving internal nodes retransmit
their packets although no sending error 4. MANET VULNERABILITIES
messages received. A system is to be vulnerable when an
unauthorized data manipulation access is
3.7 Interruption provided to the users. In this case the
Interruption attacks are those attacks system does not verify a user's identity
in which the routing packet does not reach before allowing data access. Some of the
to the destination. Routing messages are vulnerabilities are being described as
used to fetch the network messages. Mobile follows:
nodes are also used for the purpose. Attacks
4.1 Lack of centralized management
are initiated through the modification,
interception, and fabrication attacks by A centralized monitor server is not
interrupting the normal operations of the available in MANETs. The absence of any
ad hoc networks. For instance, adversaries centralized management makes the
aiming to interrupt the availability service detection of attacks very difficult because
in the networks might destroy all paths to due to this the traffic will be highly dynamic
a particular victim node by using the and very large in the network. Lack of
message modification attacks [5]. Examples centralized manage-ment will impede the
such of attacks that could be classified trust management for nodes.
under the interruption attacks category are
packet dropping attacks, flooding attacks, 4.2 Resource availability
and lack of cooperation attacks. Availability of resources is a major issue
(1) Flooding attacks - Intermediate nodes in MANETs. Availability of secure
might interrupt the normal operations communications in such environments
in the packet forwarding process by where changing the network topology and
flooding the targeted destination nodes protecting the network against particular
with huge amount unnecessary attacks will lead to the development of many
packets. In flooding attacks nodes are security schemes and respective
unable to receive or forward any type of architectures.
packet in the network.
4.3 Scalability
(2) Lack of cooperation attacks - In such
Scalability feature in ad-hoc networks
types of attacks, internal nodes are not
is required because of mobility of nodes in
ready to cooperate in the network
MANETs, their topology and so the
operations that did not benefit them
connectivity keeps on changing all the time.
because participating in such
So scalability is one of the major issues
operations will drain off their resources.
which concern the security aspect. Security
Different strategies might be used by
mechanisms should be able to handle a
misbehaving internal nodes in order to
varying size network [22].
save their limited resources. The
internal nodes are not ready to forward 4.4 Cooperativeness
the packets to the other nodes, not even
send back the route error report to the Various routing algorithms for MANETs
sender when failing to forward packets, assume that the nodes are cooperative
or might turn off their devices when not and non-malicious. This provides an

28
Security of Routing Protocols in MANETs: A Survey

opportunity to a malicious attacker to 5. MANET APPLICATIONS


become a routing agent and thereby
In ad hoc networks the devices can
enabling the attacker to interrupt the
easily be added and removed from the
network operations by disobeying the
network for maintain the connection. The
specifications given in the protocol.
applications of MANET are varied, ranging
4.5 Dynamic topology from large-scale, movable. Typical
applications include [22, 24, 25].
The dynamic topology in MANETs may
interrupt/disturb the trust relationship 5.1 Military
among the nodes. The trust relationship
Military equipments may contain some
may also be interrupted/disturbed if some
type of computer equipment. In military the
of the nodes are detected as compromised.
ad-hoc network technology (MANET) can
Distributed and adaptive security
maintain an information network between
mechanisms are used to protect the
the soldiers and military information
network having this dynamic behavior [22].
headquarters.
4.6 Limited power supply
5.2 Commercial Sector
The nodes in MANETs should be aware
MANET can be used in emergency or
of the limited power availability, which
salvage operations for natural calamity
creates many problems. As a result, a node
efforts e.g. in fire, flood, or earthquake.
in MANET may behave in a selfish manner.
Salvage operations should be taken
4.7 Bandwidth constrain place where rapid deployment of a
communication network and infrastructure
Variable links exists in wireless network is damaged. Transfer of information should
which are renderer towards noise, take between two saving team members.
interference and signal attenuation effects Other commercial scenarios include e.g.
[22]. ship-to-ship communication through
MANET.
4.8 Adversary inside the Network
The mobile nodes in the MANET can 5.3 Local Level
freely join or leave the network. The nodes Local level application is mainly seen in
in the network may also behave maliciously. home networks where exchange of
In MANET the node malicious behavior is information is directly done. Similarly in
harder to detect. Thus this attack is more other environment like sports stadium, taxi
dangerous than the external attack. cab and small aircraft, [22].
4.9 No predefined Boundary 5.4 Personal Area Network (PAN)
In MANET physical boundary is not Ad-hoc network can validate the inter-
allowed. The nodes performed the task in a communication between the various
roaming behavior where the nodes can join portable devices (such as a, a laptop, a
and exit the network. The communication cellular phone and PDA). The PAN is an
exists when the opponent comes in the application field of MANET in the future
radio range of a node. This includes perspective computing context.
tempering replay, denial of service eave
dropping impersonation.

29
Sher Jung and Rajinder kumar

5.5 MANET-VOVON structure. The various protocols in this


category are described as follows:
A MANET enabled different versions of
JXTA peer to peer, open platform is used to A. Destination-Sequenced Distance
support JXTA virtual network. Using Vector (DSDV) - In DSDV, Each node
MANET JXTA a user can set up a call when maintains its own routing table of the
the path is available. Here XML messages possible destination in the network. The
are exchanges over MANET JXTA number f hops counts to each
communication channel [22, 17]. destination are recorded. The sequence
numbers are assigned by the destination
6. ROUTING PROTOCOLS IN MANET nodes after the each entry. To maintain
The routing protocol of MANET is the table Consistency routing tables are
broadly divided in to 2 main categories as: updated periodically. The Destination-
Table driven routing protocol and On- Sequenced Distance Vector (DSDV)
demand driven routing protocol. routing protocol is a table-driven routing
Algorithm which is based on Bellman-
6.1 Table-driven routing protocols Ford routing mechanism [16] .The
improvements made in the Bellman-
Table driven routing protocol are also
Ford algorithm which includes freedom
called as proactive protocol because in this
from loops in routing tables.
protocol maintain the up to date and
consistent information of each and every The broadcast route has the format
node in the network. Many tables are contain number of hops for reaching the
maintained in order to store the routing destination, the address of the
information of the network. These protocol destination, the sequence number
are differs on the basics of number of table regarding the destination, and new
related and methods in the network sequence number which is unique [20].

Fig. 3. Classification of Routing Protocols

30
Security of Routing Protocols in MANETs: A Survey

If in case the same sequence number cluster head and then further forwarded
are arrived then the sequence number to another cluster head, with the help
which is smaller can be used in order to of gateway node and this process is
optimize the path. continues till the destination node is
B. Optimized Link State Routing (OLSR) found.
Protocol - OLSR is a proactive routing 6.2 On-Demand Driven Protocols
protocol .The main idea behind OLSR is
the use of multipoint relay (MPR) which The second category is on demand
provides an effective flooding driven routing protocol. These types of
mechanism by reducing the number of protocols are also known as reactive
transmissions [8].In OLSR, two types of protocols. This protocol is used to find the
routing messages are used i.e. a HELLO route of destination and once the route is
message and a topology control (TC) found all possible route permutations are
message [8]. examined. The route is maintained by a
route maintenance procedure after a route
C. Wireless Routing Protocol (WRP) -
is identified.
Wireless routing protocol (WRP) [13, 11]
is a path-finding algorithm. It is a type A. Ad Hoc On-Demand Distance Vector
of loop free routing protocol. In WRP (AODV) - It is an improvement of DSDV
nodes are created in the network. Each algorithm explained above. To minimize
node maintains 4 tables: link cost table, the broadcast route a route is created
message retransmission list table on a demand. For example when source
distance table, routing table. Update A wants to deliver a packet to the
messages are exchanged between destination B and if no route is available
neighboring nodes by propagating link from A to B, Then B broadcast the
from the link table. Typical Hello message to the neighboring nodes via
messages are exchanged periodically route request message then the
between neighbors. neighboring node rebroadcast the
D. Cluster Head Gateway Switch message to its all neighbors. This
Routing (CGSR) Protocol - The idea process is continued till the destination
behind CGSR protocol is cluster node is identified. When the first arrived
movable wireless network with different RREQ is received, the destination node
heuristic schemes [18]. In CGSR by sends a route reply (RREP) message to
using a distributed algorithm the node the source node through the reverse
is selected within the cluster which acts path through which the RREQ message
as cluster head. The cluster head arrived.
changes according to the routing B. Dynamic Source Routing (DSR) - In
protocol performance this protocol the destination is identified
Using clustering algorithm the Cluster on the basis of source routing [19]. There
head changes when two cluster heads are two phases: route discovery and
come into contact of each other or they route maintenance phases. When a
get out of contact of all other cluster mobile node wants to send a packet to
head [8]. Between two cluster head the destination, it first checks its route
there are some gateway nodes that are table so that it can identify availability
within the coverage of two cluster head. of destination. If the route is present in
Here initially the packet is send to the the table, then the mobile node will use

31
Sher Jung and Rajinder kumar

this route to send the packet. If the node 6.3 Hybrid Protocol
does not have such a route in the table,
Hybrid routing protocol is based on the
then it will broadcast a route request
concept of aggregating of nodes in a group.
message. The format of the route request
Then these nodes are assigned different
contains the address of the destination
functionality in a zone of the network. These
node along with the address of source
different zones are portioned in the network.
node and a UID number. All receiving
The most popular way of building hierarchy
node which has packet will check the
is to ensure that a group of nodes are
destination route is known or not
geographically close to each other and they
known. A route reply is originated in the
are grouped into clusters. For
network when the route request reaches
communication from another node each
the destination. If the destination route
cluster has a cluster head. The ZRP( Zone
is not found in the network then node
routing protocol) based on Hierarchical link
initially adds its own address to the
state(ZHLS) This type of protocol can also
route record and after that forwards the
provide a better trade-off between
packet
communication over head, total number of
C. Temporary Ordered Routing nodes and frequency of topology change.
Algorithm (TORA) - The Temporally
Ordered Routing Algorithm (TORA) is 7. CONCLUSION
proposed to operate on highly dynamic In this paper, we introduce some type
mobile networking environment. It of security attacks in mobile ad-hoc
provides multiple routes of source/ networks, as in today's world security is the
destination in pair. The main idea of major concern in the field of a network.
TORA is localization of control messages Individuals want to keep information secure
over small set of nodes [8]. To achieve so that any unauthorized user can not
this goal, the routing information about access their information. Then we have
each and every node is maintained. discussed classification of attacks and
D. Relative Distance Micro Diversity various characteristics of attacks to be
Routing (RDMAR) - Relative Distance considered in designing any security
Micro Diversity Routing protocol measure for ad hoc networks. After
determines the distance between the analyzing the behavior of the attacks, one
two nodes on the basis of relative can determine the various attacks which
distance estimation algorithm in radio could be launch against the ad hoc
loops. RDMAR is a source initiated networks. In this paper, we have discussed
protocol and having features similar to most of the common attacks against the ad
associative based routing protocol. The hoc networks routing protocols. Then we
RDMAR is based on the concept is further classify the routing protocols in
searching of route within the restricted mobile ad hoc network. In future, various
range in order to save flooding cost of security solutions that have been proposed
route request message in the network to secure routing protocols will be
[17, 19, 20]. It is assumed in RDMAR implemented and verified. The investigation
that at the same fixed speed all ad hoc will include various techniques that might
hosts are migrated. These types of be employed in protecting, detecting, and
assumptions can make good practical responding to the attacks against the
estimation of relative distance. routing message [5].

32
Security of Routing Protocols in MANETs: A Survey

8. FUTURE SCOPE damage, contain the event,


remediate, and bring operations
The proactive approach attempts to
back to normal as quickly as
prevent security threats in the first place
possible.
and provides lower latency than that of on
demand protocols because they have to Cybercriminals continue to develop new
maintain routes to all the nodes in the ways to monetize victims, while nation-state
network all the time but the problem in this hackers compromise companies,
is about excessive routing overhead. On the government agencies, and non-
other hand, the reactive protocols identify governmental organizations to create
routes only when they are needed. The espionage networks and steal information.
reactive approach seeks to detect threats a To better understand and combat threats
posterior (derived by reasoning from associated with these changes, the
observed facts) and react accordingly. developed and developing countries must
continue to support investigative and
• Before an attack: To defend their
defensive research. Researchers from
network, organizations must be
academia, the private sector, and
aware of what's on it: devices,
government must continue to work together
operating systems, services,
and share information on emerging threats
applications, users, and more.
and innovate ways to combat them.
Additionally, they must implement
access controls, enforce security 9. REFERENCES
policies, and block applications and
overall access to critical assets. [1] Pradip M. Jawandhiya et al. "A
However, policies and controls are Survey of Mobile Ad Hoc Network
only a small piece of a bigger picture. Attacks" International Journal of
These measures can help to reduce Engineering Science and Technology
the surface area of attack, but there 2(9), 4063 (2010).
will always be gaps that attackers [2] Latha Tamilselvan and V.
will find and exploit to achieve their Sankaranarayanan "Prevention of
objectives. Impersonation Attack in Wireless
• During an attack: Organizations Mobile Ad hoc Networks" IJCSNS
must address a broad range of attack International Journal of Computer
vectors with solutions that operate Science and Network Security, 7(3),
everywhere that a threat can (2007).
manifest itself on the network, on [3] Shin Yokoyama, Yoshikazu
endpoints, from mobile devices, and Nakane Osamu Takahashi and
in virtual environments. With Eiichi Miyamoto, "Evaluation of the
effective solutions in place, security Impact of Selfish Nodes in Ad Hoc
professionals will be better Networks and Detection and
positioned to block threats and help Countermeasure Methods",
to defend the environment. Proceedings of the 7th International
• After an attack: Invariably, many Conference on Mobile Data
attacks will be successful. This Management (MDM'06).
means organizations need to have a [4] S. Bouam and J.B. Othman, "Data
formal plan in place that will allow Security in Ad hoc Networks using
them to determine the scope of the Multipath Routing," in Proc. of the

33
Sher Jung and Rajinder kumar

14th IEEE PIMRC, 1331 (2003). Demand and Table-Driven Routing


[5] S.A. Razak, S.M. Furnell and P.J. for Ad Hoc Wireless networks", in
Brooke, "Attacks against Mobile Ad Proceeding of IEEE ICC, (2000).
Hoc Networks Routing Protocols", in [14] C. Perkins and E Royer, "Ad Hoc
Network Research Group, University On-Demand Distance Vector
of Plymouth, (2003). Routing," 2 nd IEEE Wksp. Mobile
[6] Y. Yorozu, M. Hirano, K. Oka and Comp. Sys. and Apps., (1999).
Y. Tagawa, "Electron spectroscopy [15] S.Y. Ni, Y.C. Tseng, Y.S. Chen and
studies on magneto-optical media J.P. Sheu, "The broadcast storm
and plastic substrate interface," problem in a mobile ad hoc network,"
IEEE Transl. J. Magn. Japan, 2, 740 in Proc. Of the 5th annual ACM IEEE
(1987) [Digests 9 th Annual Conf. international conference on Mobile
Magnetics Japan, 301, (1982)]. computing and networking, 151
[7] C. Perkins, E. Belding-Royer and (1999).
S. Das, "Ad Hoc On demand Distance [16] L.R. Ford Jr. and D.R. Fulkerson,
Vector (AODV) Routing," IETF RFC "Flows in Networks", Princeton Univ.
3561, (2003). Press, 1962 David Doermann. The
[8] S. Ghazizadeh, O. Ilghami, E. Sirin Indexing and Retrieval of Document
and F. Yaman, "Security- Aware Images: A Survey. (1998).
Adaptive Dynamic Source Routing [17] V.D. Park and M.S. Corson, "A
Protocol," In Proc. Of 27th Conference Highly Adaptive Distributed Routing
on Local Computer Networks, 751 Algorithm for Mobile Wireless
(2002). Networks", Proc. INFOCOM '97,
[9] Rashid Hafeez Khokhar, Md Asri (1997).
Ngadi and Satria Mandala "A Review [18] C.-C. Chiang, "Routing in Clustered
of Current Routing Attacks in Mobile Multihop, Mobile Wireless Networks
Ad Hoc Networks", (2002). with Fading Channel", Proc. E••
[10] C.K. Toh, "Ad Hoc Mobile Wireless SICON '97, 197-211 (1997).
Networks: Protocols and Systems," [19] D. Johnson and D. Maltz, "Dynamic
Prentice Hall Publications, (2002). Source Routing in Ad Hoc Wireless
[11] S. Rajavaram, H. Shah, V. Networks", Mobile Computing, T.
Shanbhag, J. Undercoffer and A. Imielinski and H. Korth, Ed., 153
Joshi, "Neighborhood Watch: An (1996).
Intrusion Detection and Response [20] C.E. Perkins and P. Bhagwat,
Protocol for Mobile Ad Hoc "Highly Dynamic Destination-
Networks," Student Research Sequenced Distance-Vector Routing
Conference, University of Maryland (DSDV) for Mobile Computers",
at Baltimore County (UMBC), (2002). Comp. Com-mun. Rev., 234 (1994).
[12] Joseph Macker and Scott Corson,
[21] Chethan Chandra S. Basavaraddi
"Mobile ad-hoc networks (MANET)
and N.B. Geetha, "Performance
"http://www.ietf.org/proceedings/
Analysis of Mesh and Position Based
01dec/183.htm, (2001).
Hybrid Routing In MANET", A
[13] Jyoti Raju and J.J. Garcia-Luna- Compre-hensive Study. Chethan
Aceves, "A comparison of On- Chandra S Basavaraddi et al., Int. J.

34
Security of Routing Protocols in MANETs: A Survey

Computer Technology & Applications, Gambardella, "A simulation study of


3(2), 804-812. routing performance in realistic
[22] K. Lakshmi, S. Manju Priya, A. urban scenarios for MANETs". In:
Jeevarathinam, K. Rama and K. Proceedings of ANTS 2008, 6 th
Thilagam, "Modified AODV Protocol International Workshop on Ant
against Blackhole Attacks in Algorithms and Swarm Intelligence,
MANET", K. Lakshmi et al. Brussels, Springer, LNCS 5217,
International Journal of Engineering (2008).
and Technology 2(6), 444 (2010). [30] C. Perkins. "(RFC) request for
[23] Priyanka Goyal, Vinti Parmar and Comments-3561", Category:
Rahul rishi, "MANET Vulnerabilities, Experimental, Network, Working
Challenges, Attacks Application", Group, (2003).
IJCEM International Journal of [31] Satoshi Kurosawal, Hidehisa,
Computational Engineering & Nakayama, Nei Kato, Abbas
Management, 11 (2011) ISSN Jamalipour and Yoshiaki Nemoto.
(Online) 2230-7893 www.IJCEM.org. "Detecting Blackhole Attack on
[24] Imrich Chlamtac, Marco Conti and AODV-based Mobile Ad-Hoc
Jennifer J.-N. Liu "Mobile ad hoc Networks by Dynamic Learning
networking: imperatives and Method." In: International Journal of
challenges", School of Engineering, Network Security, 5(3), 338 (2007).
University of Texas at Dallas, Dallas,
[32] H. Deng, W. Li and D.P. Agrawal.
TX, USA, (2003).
"Routing Security in Adhoc
[25] M. Frodigh, P. Johansson and P. Networks." In: IEEE Communications
Larsson, Wireless ad hoc Magazine, 40(10) 70 (2002).
networking: the art of networking
without a network, Ericsson Review, [33] M.A. Shurman, S.M. Yoo and S.
4, 248 (2000). Park, "Black hole attack in wireless
ad hoc networks." In: Proceedings of
[26] HaoYang, Haiyun and Fan Ye,
the ACM 42 Southeast Conference
Security in mobile ad-hoc networks:
(ACMSE'04), 96 (2004).
Challenges and solutions, 11(1), 38
(2004). [34] Sanjay Ramaswamy, Huirong Fu,
[27] Luis Bernardo, Rodolfo Oliveira, Manohar Sreekantaradhya, John
Sérgio Gaspar, David Paulino and Dixon and Kendall Nygard,
Paulo Pinto, A Telephony "Prevention of Cooperative Black
Application for Manets: Voice over a Hole Attack in Wireless Ad Hoc
MANET-Extended JXTA Virtual Networks", International Conference
Overlay Network. on Wireless Networks (ICWN 03), Las
Vegas, Nevada, USA. (2003)
[28] A. Mishra and K.M. Nadkarni,
Security in wireless Ad -hoc network, [35] Y.Hu, A Perrig and D. Johnson,
in Book. The Hand book of Ad Hoc Ariadne: A secure On-demand
Wireless Networks (chapter 30), CRC Routing Protocol for Ad Hoc
press LLC, (2003). Networks, in Proceeding of ACM
MOBICOM'02, (2002).
[29] Gianni A. Di Caro, Frederick
Ducatelle and Luca M. [36] K. Sanzgiri, B. Dahill, B.N. Levine,

35
Sher Jung and Rajinder kumar

C. Shield and E.M Belding- Royar, (1996).


A secure routing protocol for Ad Hoc [39] J. Broch, A.M David and B. David,
Networks, in Proceedings of ICNP'02, A Performance comparison of multi-
(2002). hop wireless ad hoc network routing
[37] Y. Hu, D. Johnson and A Perrig, protocols. Proc. IEEE ACM
SEAD: Secure Efficient Distance MOBICOM'98, 85 (1998).
Vector Routing for Mobile Wireless. [40] C.E. Perkins and P. Bhagwat,
[38] D. Johnson and D. Maltz, Dynamic Highly dynamic destination-
Source Routing in Ad Hoc Wireless sequenced distance vector routing
Networks, Mobile Computing, T. for mobile computers, Comp, Comm.
Imielinski and H. Korth, Ed., 153 Rev., 234 (1994).

36
Global Sci-Tech, 8 (1)study
Comparative January-March 2016;Intelligence
of Agile Business pp. 37-49 DOI
and No.:
Agile10.5958/2455-7110.2016.00005.7
Data Warehouse

Comparative study of Agile Business


Intelligence and Agile Data Warehouse

MD. DEEDAR SHAMSI*


G.B. Pant Institute of Technology, Okhla, New Delhi-110 020
*E-mail: deedar2s@gmail.com

ABSTRACT

In a rapidly changing business oriented economy, Business Intelligence solutions


have to become more agile. This paper attempts to compare and contrast between
Agile BI and Agile DW based on different analytical Agile driven technologies. Agile
software development is a set of principles and practices that was influenced by
practitioners of Extreme Programming, SCRUM, DSDM, Adaptive Software
Development and others. It was driven out of the need for an alternative to
documentation driven, heavyweight software development processes. Agile
development processes can take a lot of pain out of building data warehouses and
enable project teams to deliver functionality, and business value, on a rolling basis.
Rapidly gaining in popularity, the Agile approach to data warehousing solves many
of the thorny problems typically associated with data warehouse development-
most notably high costs, low user adoption, ever-changing business requirements
and the inability to rapidly adapt as business conditions change. The Agile approach
can be used to develop any analytical database, the two mechanisms that uses
agile approach are Data Warehouse and Business Intelligence. Also, this paper
briefly looks at technologies that can be used for enabling an agile BI solution.

Key words: Agile Analytics, Agile Project Management Methodology, Agile


techniques, Data integration, Scrum.

1. INTRODUCTION documentation driven, heavyweight


software development processes.
Agile methodologies are becoming
Agile software development refers
increasingly popular for software
to a group of software development
development projects of all kinds, but what
methodologies that are based on similar
considerations must be made when
principles[1]. Agile methodologies generally
developing business intelligence
promote:
applications? Agile Analytics is defined as
an approach to Business Intelligence and 1. A project management process that
Data Warehousing. Agile software encourages frequent inspection and
development is a set of principles and adaptation;
practices that was influenced by 2. A leadership philosophy that encoura-
practitioners of Extreme Programming, ges team work, self-organization and
SCRUM, DSDM, Adaptive Software accountability;
Development and others. It was driven out 3. A set of engineering best practices that
of the need for an alternative to allow for rapid delivery of high-quality

37
Md. Deedar Shamsi

software; traditional BI architecture are: ETL tools,


4. And a business approach that aligns an enterprise data warehouse with
development with customer needs and metadata repository and business analytics
company goals. (Figure1).

Business Intelligence (BI) was defined


1.1 Performance Characteristics
in different ways. The Data-Warehousing
Institute has defined Business Intelligence 49% Lack understanding of the benefits,
as "the tools, technologies and processes 47% Lack of IT resources, 43% End-user
required to turn data into information and needs not clearly defined [5]. Aberdeen's
information into knowledge and plans that Maturity Class Framework uses three key
optimize business actions" [6]. Turban has performance criteria to distinguish the
defined BI as "a broad category of Best-in-class in the industry:
applications and techniques for gathering, 1. Availability of timely management
storing, analyzing and providing access to information : IT should be able to
data to help enterprise user make better provide the right and accurate
business and strategic decisions." [16]. The information in timely manner to the
range of capabilities that can be defined as business managers to make sound
business intelligence is very broad. Most business decisions. "This performance
enterprises have hundreds of internal and metric captures the frequency with
external data sources such as: databases, which business users receive their
e-mail archives, file systems, spreadsheets, information they need in the timeframe
digital images, audio files and more. they need it"[5].
Traditional Business Intelligence systems
2. Average time required to add a
use a small fraction of all the data available.
column to an existing report :
Also, traditional BI systems use only
Sometimes new columns need to be
structured data. The core components of a

InformationQuality
Management (IQM)
Components

Fig. 1. Agile Business Intelligence Architecture

38
Comparative study of Agile Business Intelligence and Agile Data Warehouse

added to an existing report to see the time at the beginning of the project as
required information. "If that in traditional projects. In Agile project,
information cannot be obtained within scope can be changed any time during
the time required to support the the development phase.
decision at hand, the information has
3. Agile Infrastructure : The system
no material value. This metric measure
should have virtualization and
the total elapsed time required to modify
horizontal scaling capability. This gives
an existing report by adding a
flexibility to easily modify the
column"[5].
infrastructure and could also maintain
3. Average time required to create a new near-real-time BI more easily than the
dashboard : This metric considers the standard Extract, transform, load (ETL)
time required to access any new or model[8].
updated information and it measures
the total elapsed time required to create 4. Cloud & Agile BI : Many organizations
a new dashboard[5]. are implementing cloud technology now
as it is the cheaper alternative to store
and transfer data. Companies who are
2. PERFORMANCE ANALYSIS
in their initial stages of implementing
2.1 Five Steps To Agile BI Agile BI should consider the Cloud
technology as cloud services can now
1. Agile Development Methodology : support BI and ETL software to be
"need for an agile, iterative process that provisioned in the cloud[8].
speeds the time to market of BI requests
by shortening development cycles"[8]. 5. IT Organization & Agile BI : To achieve
agility and maximum effectiveness, the
2. Agile Project Management IT team should interact with the
Methodology : continuous planning business, but also address the business
and execution. Planning is done at the problems and should have a strong and
beginning of each cycle, rather than one cohesive team[8].

Fig. 2. BI performance analysis and Efficiency


(source: The Aberdeen group BI performance analysis)

39
Md. Deedar Shamsi

3. MEASURES OF POPULARITY still follow a waterfall approach within the


iterations.
3.1 How is Agile different from Waterfall
Agile methodologies started to become
and Spiral methodologies?
widely published and promoted in the
But before we answer the question 2000-2001 timeframe by developers of
whether or not an Agile approach can or operational systems. These methodologies
cannot be used with EDW/BI, let's first do not recognize a service request for a new
examine the major differences of these system to be the final set of requirements.
three categories of methodologies. Instead, the developers view the service
request as a vision for a system that may
Waterfall methodologies were
or may not end up looking the same when
developed in the 1970s for managing
it is finally delivered. With the participation
operational systems projects. These
of the user, the developers dissect the
methodologies are organized by phases that
requirements into desired features, which
follow traditional engineering practices:
are put on a product backlog. The user (not
planning, requirements, analysis, design,
IT) controls the product backlog where he
construction, and deployment. Each phase
or she can add or remove features at will.
must be completed before the next phase
The user is also responsible for prioritizing
can begin. The majority of development
the features on the product backlog. The
time is spent on paper, creating a
developers select a few features from the
requirements document, external design
prioritized list for the first (or next) sprint
models, internal design specifications, and
(software release). Rather than come up
so on. Even with operational stovepipe
with estimates that are cast in concrete,
systems, this type of methodology has been
the developers speculate how long it might
a problem because estimates are highly
take to turn the selected features into
unreliable since each system is different,
working code based on what is known to
each project team is different, and each set
them at that point in time. Progress for
of users is different. In addition, users don't
developing the requested features is
see their system until acceptance testing,
measured by the number of features
at which time they frequently notice errors
delivered and not by the number of tasks
and omissions that have to be corrected
performed. When it becomes evident that
with future enhancements.
the trajectory of current (used up) effort in
Spiral methodologies became popular time will miss the deadline, the project is
in the 1990s to support building large immediately re-scoped.
systems iteratively. These methodologies
are popular in enterprise data warehousing
where we build the EDW one BI application
at a time. This type of methodology has an
enterprise perspective. That means that
spiral EDW methodologies have many
additional tasks that need to be performed
and some of these tasks involve
stakeholders other than the primary user 3.2 Scrum and XP
of the BI application. But, with the Two of the most popular Agile software
exception of developing the EDW in development methodologies are Scrum and
iterations, spiral methodologies basically XP.

40
Comparative study of Agile Business Intelligence and Agile Data Warehouse

Scrum is a term borrowed from Rugby three key objectives of delivering BI.
and XP stands for eXtreme Programming. However, as long as the primary goal is to
The authors of these methodologies, as build separate BI solutions for individual
well as most other prominent Agile users or departments, the popular Agile
practitioners, are project managers and software development methodologies like
seasoned developers with decades of Scrum or XP can certainly be made to work.
experience in developing stand-alone
Some BI teams try to wait for the data
operational systems - most written with
to be ready in the EDW (placed there by a
object-oriented code. They are not EDW/
separate EDW team) before they develop
BI practitioners, and thus, Scrum and
selected BI features using Scrum or XP.
XP were not developed specifically for
Many companies using this approach have
enterprise data warehousing. Writing
gone so far as to separate their BI team
software to create stand-alone operational
from their EDW team and have both teams
systems does not require data integration
report to different managers. This
efforts like data standardization, enterprise
organizational change not only disrupts the
data modeling, business rules ratification
cohesion of the total EDW/BI effort, but
by major business stakeholders,
also creates an unfair competition and ill
coordinated ETL data staging, common
feelings between the two teams. I hear BI
metadata, collectively architected
teams complain bitterly about their EDW
(designed) databases, and so on. Instead,
team being too slow, and I hear the EDW
the basic premise behind Scrum and XP is
teams complain bitterly about their BI team
to write and deliver quality software (code)
not understanding their data efforts and
in short prescribed intervals, but inherently
thus having unreasonable expectations
without significant regard or focus on data
about the speed at which cleansed,
standardization and data architecture from
standardized, and integrated data can be
an enterprise perspective.
loaded into the EDW. I also see many of
the BI teams trying to force their
3.3 Can Agile be used for BI?
counterpart EDW teams to adopt Scrum or
That brings us to the next question: Can XP. Most EDW teams resist, recognizing
Agile be used for BI? Well, that depends on that their projects are data-intensive and
what you call BI. There are a growing not code-intensive, and that the prescribed
number of companies that boast to be using Agile rules in Scrum and XP cannot work
Agile methodologies on BI projects. This for them. Other EDW teams try to adhere
analysis shows that most of those to the strict rules of these Agile
companies restrict their development effort methodologies and fail.
mostly to writing code for stand-alone BI
applications. In other words, the BI 3.4 Can agile be used for EDW?
application developers don't deal with data
Can agile be used for enterprise data
standardization and integration - or at least
warehousing? Let's first agree on what we
not very effectively and rarely from an
mean by enterprise data warehousing.
enterprise perspective. Many complain
about the dirty data negatively affecting If your definition of BI includes building
their aggressive deadlines, evidently not or expanding the necessary EDW
realizing that cleaning up dirty data, components and having that effort be part
standardizing data, and integrating data of every project that delivers BI
across the enterprise are - or should be - applications, and if you want to apply an

41
Md. Deedar Shamsi

Agile method to building the entire end-to- confident that each software release can
end solution (including data cleansing, data be accomplished within the allotted time-
standardization, enterprise data modeling, box (deadline), they create a detailed project
coordinated EDW ETL, and meta data plan with weekly milestones for the first
repository), then - in my opinion - using software release. Starting with the deadline
the popular Agile software development and working backwards, the core team
methodologies Scrum and XP will not work. members determine how far along they
Remember that these methodologies were must be the week before the deadline in
never designed for data-centric business order to make the deadline. Put another
integration projects. However, that does not way, they determine in what state the
mean that you cannot go Agile. project or deliverable must be the week
before the deadline. They repeat this
3.5 Extreme Scoping™ process by backing up another week and
another week and so on. If they pass the
Extreme Scoping™ uses all of the agile project start date, the core team members
principles that can be used on business must determine if the scope is too large for
integration projects and discards those the release deadline or if the activities
agile principles that don't apply. It does not between the milestones are overestimated.
seek to replace the Agile coding method-
ologies Scrum and XP. Instead, it provides After the project activities for the first
the necessary Agile EDW umbrella for the software release are organized into weekly
entire project effort, not just the coding. basis, the core team members self-organize
themselves into the appropriate number of
Extreme Scoping™ has several distinct
work teams. Knowing the makeup of the
project planning steps, which are
work teams and knowing the weekly
performed by a 4-5 member core team, not
milestones, the core team members decide
by a single project manager. The core team
on the detailed tasks and task deliverables
members start out by reviewing their EDW
for each milestone, referring to the work
methodology and selecting the tasks into a
breakdown structure they created earlier.
preliminary WBS. Using this WBS as a
They also decide which tasks and
guide, the core team members create a
deliverables are assigned to what person
high-level project roadmap to give an
on what work team. The detailed daily task
understanding of the overall effort,
assignments and task deliverables are
resources, cost, schedule, risks, and
documented on a white board, a flip chart,
assumptions for the entire new BI
a spreadsheet, or other informal media,
application. This is necessary in order to
which can be modified quickly and easily.
come up with the right number of software
The core team members use this informal
releases, the right sequence of those
detailed project plan on a daily basis to
releases, the dependencies among the
guide the day-to-day work activities,
requirements, and thus, the deliverables
manage the change control process during
and scope for each release. Without this
prototyping, and monitor the progress of
crucial step, the process of breaking an
the project. They do not use this detailed
application into software releases would be
plan to report the project status to
completely arbitrary.
management. Instead, they create a short
Once the core team members are one-page Milestone Chart showing whether
comfortable with the scope and sequence weekly milestones have been completed,
of the proposed software releases and are delayed, or eliminated.

42
Comparative study of Agile Business Intelligence and Agile Data Warehouse

If the first software release was 4. Working software is the primary


completed on time and without problems, measure of progress[9].
the core team members can plan the second
software release in the same manner. 3.6.2 People
However, if there were problems with the 5. Agile processes promote sustainable
first software release, such as development. The sponsors, developers,
underestimated tasks, incomplete and users should be able to maintain a
deliverable, friction on the core team, constant pace indefinitely[9].
constant adjustments to the scope, and so
on, the core team members must review 6. Business people and developers must
and adjust the high-level project roadmap work together daily throughout the
produced in the first step. They must revisit project[9].
their understanding of the overall effort, 7. Build projects around motivated
resources, cost, schedule, risks, and individuals. Give them the environment
assumptions for the entire application. and support they need, and trust them
Then they must make the necessary to get the job done[9].
adjustments to the remaining software
releases. That can include changing the 3.6.3 Other
scope for the second software release,
8. The most efficient and effective method
changing the number of software releases,
of conveying information is face-to-face
reprioritizing and changing the sequence
conversation[9].
of the software releases, changing the
deliverables for one or more software 9. At regular intervals, the team reflects
releases, changing the deadlines, or on how to become more effective, then
changing resources. Only then can the core tunes and adjusts its behavior[9].
team proceed with the detailed planning of 10. Continuous attention to technical
the second software release. excellence and good design enhances
agility[9].
3.6 Twelve Agile Principles
11. Simplicity-the art of maximizing the
There are 12 Agile Principles (Manifesto) amount of work not done-is essential[9].
Agile Manifesto grouped as Process, People, 12. The best architectures, requirements,
and Other. and designs emerge from self-
3.6.1 Process organizing teams[9].

1. Our highest priority is to satisfy the 3.7 Data Virtualization


customer through early and continuous
delivery of valuable software[9]. Data Virtualization accomplishes this by
decoupling reports from data structures,
2. Welcome changing requirements, even
by integrating data in an on-demand
late in development. Agile processes
fashion, and by managing meta data
harness change for the customer's
specifications centrally without having to
competitive advantage[9].
replicate them. This makes data
3. Deliver working software frequently, virtualization the ideal technology for
from a couple of weeks to a couple of developing agile business intelligence
months, with a preference to the shorter systems. This is the primary reason for the
timescale[9]. increased agility.

43
Md. Deedar Shamsi

When data virtualization is applied, an than just descriptive BI. Many organiza-
abstraction and encapsulation layer is tions today want to go beyond this by
provided which hides for applications most implementing predictive and prescriptive
of the technical aspects of how and where analytics. To that end, many companies are
data is stored; Because of that layer, now establishing advanced analytics teams
applications don't need to know where all in business departments to help develop
the data is physically stored, how the data new advanced and predictive analytics that
should be integrated, where the database can be deployed in real-time and in
servers run, what the required APIs are, historical environments to produce new
which database language to use, and so insights for competitive advantage. This is
on. When data virtualization technology is happening both in traditional Data Ware-
deployed, to every application it feels as if house and in new Big Data environments
one large database is accessed. where data scientists are analyzing new
multi-structured data sources to produce
The concepts of data consumer and data
new models and insights. Also business
store are key to the definition of data
analysts are using these analytics in visual
virtualization:
data discovery tools to help predict and
Data virtualization is the technology forecast the future. In addition analytics
that offers data consumers a unified, are being embedded in applications to help
abstracted, and encapsulated view for embed recommendations, alerts and
querying and manipulating data stored in forward looking insights in processes and
a heterogeneous set of data stores. applications to optimize business
operations.
Typical business intelligence application
areas that experience an increased level Another challenge is the number of data
of agility are virtual data marts, self-service sources that companies are now accessing
reporting and analytics, operational to capture data for analysis to produce
reporting and analytics, interactive deeper insights. Clickstream data, social
prototyping, virtual sandboxing, network interaction data, weather data,
collaborative development, and disposable sensor data, location data and news feeds
reports. are just a few of these. The question is what
should companies do with this data? How
To summarize, deploying data should it be organized and stored? The
virtualization in BI systems leads to more emergence of Hadoop has seen data
light weights architectures with a smaller cleansing and integration being offloaded
data footprint, resulting in more agile from Data Warehouses, to cheaper lower
systems. cost Hadoop environments but is this at
the expense of Data Governance? How do
4. COMPLEXITY ANALYSIS you govern data in Big Data environments
and traditional Data Warehouses with
4.1 BI Performance Reports and Analy- confidence? What if structured data is
sis brought into Hadoop?
Most companies today use Business
Intelligence (BI) reports and dashboards to 4.2 Recreating BI and DW: new architec-
measure business performance at strategic, ture and advanced technologies
tactical and operational levels. However
today, business is demanding much more The original Data Warehouse

44
Comparative study of Agile Business Intelligence and Agile Data Warehouse

architecture of the 1980s separated


"decision support" from day-to-day
business operations [15]. This supported
Decision-Making needs at the time and was
easily implemented on then emerging
technologies, such as relational databases.
However, today's Business needs fully
integrated processes, closely linking
information and activities from all areas of
the Enterprise. Decision-Making and
Action-Taking are tightly bound. Business
cycles are dramatically shorter and span
company boundaries. So far, Enterprise IT,
including Business Intelligence, has
responded slowly and incoherently.
Business Integrated Insight (BI2) is a
new architecture that reintegrates all
Decision-Making and Action-Taking into
the overall processes of the Business.
the millennium; and the subsequent
Starting from the Data Warehouse, it
emergence of the web mega-fauna-Google,
incorporates a variety of technological
Facebook, eBay and more. The financial
advances, such as SOA, distributed access,
crisis of 2008 and the subsequent Euro
Web technologies, Content Management
sovereign debt crisis. The Arab Spring.
and specialised relational databases. BI2
General Motors, from world's largest
thus provides a comprehensive structure
automobile maker for 77 years to
for the full Enterprise IT integration
bankruptcy in 2008 and re-emergence at
demanded by modern Businesses. In
the top spot in 2011. From three
addition, it directly addresses the current
companies-Nokia, Research in Motion, and
Data Warehousing issues, such as
Motorola-dominating the smartphone
operational BI, executive Decision-Support,
market in 2006 to none of them among the
comprehensive information discovery and
leaders by last year. If there is one single,
innovation, and Enterprise-Wide Decision
common factor in all this tumultuous
Management. And, although novel, BI2 is
change, it is technology and its intersection
designed as an evolution from current Data
with business and people. Allow me to
Warehouse, operational and collaborative
introduce you to an important evolution in
technologies.
the business world. A new species of
The delegates will also receive a copy business is emerging. It has been vaguely
of the book "Business Intelligence: Insight visible for some time now. But its time has
and Innovation beyond Analytics and come. A new environment in which people
According to some interpretations, the end live and work.
of the Mayan Calendar on 21 December,
The initial technological signs can be
2012 signifies the end of the world.
seen as far back as the 1980s. The
And how business, and the world in difference now, 30 years later, is that these
general, has changed in the last decade! seeds have matured and grown into a highly
Dotcom boom to bust in the early years of diverse and interdependent technology

45
Md. Deedar Shamsi

jungle that today's business users dare to barriers between business intelligence,
enter in significant numbers. And they are operational systems and office support
ready and able to do so; having grown up (collaborative) environments. They will
with computing and communications integrate external data directly into their
technology that, thirty years ago, would business systems. Business intelligence
have been seen as magic by the vast will become Business Integrated Insight
majority of business people. (BI2).
There are three key characteristics of Business Integrated Insight in action
the biz-tech ecosystem as it has emerged Just as BI set the scope for much of the
in the past few years: advances in information usage in the 1990s
1. Interdependence: Business and and the Web the 2000s, big data looks set
technology are each driven, one by the to dominate information thinking in the
other, in a tight loop. New technology 2010s. The term big data covers a multitude
enables new business possibilities; new of sins. But, here, I focus on one aspect of
business opportunities drive advances the topic, sensor-generated data and,
in technology specifically, vehicle telemetric-the process
2. Reintegration: The silos within and of transmitting and receiving computer-
across both business and IT have grown generated data derived from electronic
increasingly uncomfortable to main- sensors, typically through an on-board
tain; they deliver inefficiencies, controller/computer and the use of this
miscommunications and errors. The data to remotely monitor a range of
cracks can no longer be hidden from conditions and events occurring in the
Web-savvy customers; coherence is vehicle.
becoming mandatory
4.3 Idea
3. Cross-over: Business people need the
skill to understand sufficient technology Business Integrated Insight: What It
to envision how new advances could be Means for 2012 and Beyond. From the point
used to recreate the business. Similarly, of view of the biz-tech ecosystem and BI2,
IT people need the business acumen to a number of messages are clear.
see how business needs can be satisfied
in new ways by emerging technology First, we've seen a consistent move in
BI towards operational BI-analysis and
In many ways, these characteristics are action-taking based on near real-time data-
diametrically opposed to the way business over the past decade. While this will
and IT have operated for five decades continue, it will, at best, only partially meet
already-business determines their demands for extreme business innovation.
requirements, hands them over to IT and New data sources, big data in most cases,
waits for an application to be delivered, will be used operationally to drive new
determines that it was incomplete or business processes. Business and IT must
incorrect and goes around the loop again. cooperate closely to understand how new
That era is coming to a close and, with it, information and technologies can be used
our entire approach to business intelligence to create new business processes and how
is set to change. In the coming few years, such changes can be incorporated into
successful businesses will be those that existing IT systems-the interdependence,
create a high degree of synergy between reintegration and cross-over characteristics
business and IT. They will break down the described above.

46
Comparative study of Agile Business Intelligence and Agile Data Warehouse

Second, the distinction between what examines how organizations should


we traditionally call "operational" and manage and govern all this data going
"informational" processing is becoming forward.
increasingly unclear as the business
In summary, Extreme Scoping™ is an
demands real-time reaction to a rapidly
EDW-specific Agile project planning
changing environment. This demand,
process, which is based on my robust
together with exploding data volumes,
methodology Business Intelligence
severely restricts the old approach of
Roadmap. It uses all of the Agile principles
copying/cleansing data into a data
that work for EDW/BI projects, and it does
warehouse and data mart environment. Of
not force you to use other Agile principles
course, that approach will remain valid for
that do not work for EDW/BI projects.
statutory and regulatory reporting where
the highest level of accuracy and The biggest challenge facing the
consistency is mandatory. But, beyond business intelligence industry today is how
that, minimizing the number of copies of to develop business intelligence systems
data and accessing one, original data set that have an agility level that matches the
for multiple purposes will be the norm. This speed with which the business evolves. If
is discussed in a number of papers on BI2 the industry fails in this, current business
available on my website. intelligence systems will slowly become
obsolete and will weaken the organization's
Third, not only are data volumes
decision-making strength. Now that the
increasing rapidly but much of this "new"
economic recession is not going to pass
data we will be handling differs in some
soon and now that businesses have to
key characteristics from that which we
operate more competitively, the need to
traditionally used. The new data sources
increase the agility of the business
are external and of ill-defined quality. They
intelligence systems should be number one
have very different and often less formalized
on every organization's list of business
structures. They have been collected for
intelligence requirements. Agility is
other purposes than how we want to use
becoming a crucial property of each and
them. Ownership and privacy will be
every business intelligence system.
serious concerns.
Most of the current Business Intelli-
Data virtualization is a technology that
gence systems are not agile. It's not one
can help make business intelligence
aspect that makes them static. But
systems more agile. It simplifies the
undoubtedly one of the dominant reasons
development process of reports through
is the database-centric solution that forms
aspects such as unified data access; data
the heart of so many Business Intelligence
store independency; centralized data
systems. The architectures of most
integration, transformation, and cleansing;
Business Intelligence systems are based
consistent reporting results, data language
on a chain of data stores; Examples of
translation, minimal data store
such data stores are production databases,
interference, simplified data structures,
a data staging area, a data warehouse,
and efficient distributed data access.
data marts, and some personal data stores
(PDS). The latter can be a small file or a
5. CONCLUSION
spreadsheet used by one or two business
This paper examines trends in Business users. In some systems an operational data
Analytics and Business Intelligence and store (ODS) is included as well. These data

47
Md. Deedar Shamsi

stores are chained by transformation logic Florida: Future Strategies Inc. &
that copies data from one data store to Workflow Management Coalition, 99-
another. ETL and replication are commonly 114 (2010).
the technologies used for copying. We will
[7] M. Mircea and A. I. Andreescu,
call systems with this architectyre classic
"Agile Systems Development for the
Business Intelligence systems in this
Management of Service Oriented
article.
Organizations". In: 11th International
The reason why so many Business Conference on Computer Systems
Intelligence systems have been designed and Technologies, Comp. Sys. Tech.'
and developed in this way, has to do with 10, Sofia, Bulgaria, 17-18 June,
the state of software and hardware of the 341-346 (2010).
last twenty years. These technologies had [8] A. Andreescu and M. Mircea ,
their limitations with respect to "Actual Trends in Software Systems
performance and scalability, and therefore, for Business Management", Comp.
on one hand, the reporting and analytical Sys. Tech.' 08, The Bulgaria
workload had to be distributed over Academic Society of Computer
multiple data stores, and on the other hand, Systems and Information
transformation and cleansing processing Technologies, (2008).
had to be broken down into multiple steps.
[9] http://en.wikipedia.org/wiki/
Agile_Business_Intelligence#cite_ref-
6. REFERENCES Three_ Steps_to_Analytic_Heaven_5-
[1] BI_Principles_for_Agile_Develop 0.
ment_12-0 http://www.allabout [10] M. Mircea, B. Ghilic-Micu and M.
agile.com/what-is-agile-10-key- Stoica, "Combining Business
principles/ Intelligence with Cloud Computing
[2] Bruni, Margherita. "5 Steps To Agile to Delivery Agility in Actual
BI", Informationweek.com, June 13, Economy".
2011 http://en.wikipedia.org/wiki/ [11] Journal of Economic Computation and
Agile_Business_Intelligence#cite_ref- Economic Cybernetics Studies, 45(1),
5_Steps_To_Agile_BI_8-1. 39-54 (2011).
[3] http://www.agiledata.org/essays/ [12] M. Mircea and A. I. Andreescu,
dataWarehousingBestPractices.html "Extending SOA to Cloud Computing
[4] http://en.wikipedia.org/wiki/ in Higher Education". In: K. S.
Agile_Business_Intelligence#cite_note- Soliman (ed.), The 15 th IBIMA
What_Agile_Business_Intelligence_ conference on Knowledge
Really_Means-10. Management and Innovation: A
Business Competitive Edge
[5] M. Mircea, B. Ghilic-Micu and M.
Perspective, Cairo, Egypt 6-7
Stoica, "Combining Knowledge,
November, 602-615 (2010).
Process and Business Intelligence to
Delivering Agility in Collaborative [13] http://www.agiledata.org/essays/
Environment". L. Fischer, ed. (2010). dataWarehousingBestPractices.html
rhayati A.Jawawi
[6] BPM and Workflow Handbook,
Spotlight on Business Intelligence. [14] M. Cunningham, "Cloud Computing

48
Comparative study of Agile Business Intelligence and Agile Data Warehouse

Enables Self-serve BI", 2010, http:/ [15] B. Ghilic-Micu, M. Mircea and M.


/www.dashboardinsight.com/artic Stoica, The Audit of Business.
les/business-performance- [16] http://www.technologytransfer.eu/
management/cloud-computing- event/1365/Recreating_BI_and_
enables-self-serve-bi.aspx. DW_new_architecture_and_adva.

49
Global Sci-Tech, 8 (1) January-March
Md 2016;
Bariquepp.
Quamar
50-55 DOI No.: 10.5958/2455-7110.2016.00006.9

Intelligent Web Agent through Web Text Mining


Techniques with Machine Learning

MD BARIQUE QUAMAR
CyberQ Consulting Private limited
#622, DLF Tower A, Jasola, New Delhi-110025, India
*E-mail: barik011@gmail.com

ABSTRACT

The simply the web, is the most dynamic environment. The web has grown steadily
in recent years and his content is changing every day. web is recognized as the
largest data source in the world. In this paper, we present a Web Mining process
able to discover knowledge in a distributed and heterogeneous multi organization
environment. The Web Text Mining process is based on flexible architecture and is
implemented by four steps able to examine web content and to extract useful hidden
information through mining techniques. An important aspect in Web Mining is
played by the automation of extraction rules with proper algorithms. Machine
Learning techniques have been successfully applied to Web Mining and
Information Extraction tasks thanks to the generalization and adaptation capabilities
that are a key requirement on general content, heterogeneous web pages In order
to keep the recognition speed high enough for real-world applications an additional
algorithm is proposed which lets the approach to boost both in speed and quality.

Key words: Web mining, machine learning, unstructured data, and intelligent web
agent.

1. INTRODUCTION emerging field of web mining aims at finding


and extracting relevant information that is
The advent of the World Wide Web hidden in Web-related data, in particular
(WWW) has overwhelmed home computer in (hyper-text) documents published on the
users with an enormous flood of Web. Like Data Mining, web mining is a
information. To almost any topic one can multi-disciplinary effort that draws
think of, one can find pieces of information techniques from fields like information
that are made available by other internet retrieval, statistics, machine learning,
citizens, ranging from individual users that natural language processing, and others.
post an inventory of their record collection,
Web mining is commonly divided into
to major companies that do business over
the following three sub-areas:
the Web.
• Web Content/text Mining: application
Many of these systems are based on
of Data Mining techniques to
machine learning and Data Mining
unstructured or semi-structured text,
techniques. Just as Data Mining aims at
typically HTML- documents.
discovering valuable information that is
hidden in conventional databases, the • Web Structure Mining: use of the

50
Intelligent Web Agent through Web Text Mining Techniques with Machine Learning

hyperlink structure of the Web as an The Web is a critical channel of


(additional) information source. communication and promoting a company
• Web Usage Mining: analysis of user image. E-commerce sites are important
interactions with a Web server. sales channels. It is important to use data
mining methods to analyze data from the
activities performed by visitors on websites.
2. WEB MINING
Web mining is the use of data mining Web mining methods are divided into
techniques for automatic discovery and three categories:
knowledge extraction from documents and
Web services. This new area of research was
defined as an interdisciplinary field (or
multidisciplinary) that uses techniques
borrowed from: data mining, text mining,
databases, statistics, machine learning,
multimedia, etc.
Web mining has three operations of
interests - clustering (finding natural
groupings of users, pages etc.), associations
(which URLs tend to be requested together),
and sequential analysis (the order in which 2.1 Web Content Mining :
URLs tend to be accessed). As in most real- Web Content Mining is the way of
world problems, the clusters and retrieving useful information from Web. The
associations in Web mining do not have retrieved information may contain text,
crisp boundaries and often overlap images, audio and video.
considerably. In addition, bad exemplars
(outliers) and incomplete data can easily Text Mining : Text Mining is a type of
occur in the data set, due to a wide variety mining where data is extracted only in text
of reasons inherent to web browsing and format from the data bases. Text mining
logging. Thus, Web Mining and Personali- can be said as an extension of Data mining.
zation requires modeling of an unknown Here the data can be retrieved by specifying
number of overlapping sets in the presence the attributes or key words. Text mining or
of significant noise and outliers, (i.e. bad text data mining, the process of finding
exemplars). Moreover, the data sets in Web useful or interesting patterns, models,
Mining are extremely large. directions, trends, or role from
unstructured text, is used to describe the
In this paper, the web mining process application of data mining techniques to
is divided into the following five subtasks: automated discovery of knowledge from text
(1) Resource finding and retrieving; [5].

(2) Information selection and pre- Image Mining : Image mining is the
processing; concept used to detect unusual patterns
and extract implicit and useful data from
(3) Patterns analysis and recognition; images stored in the large data bases.
(4) Validation and interpretation; Therefore, we can say that image mining
deals with making associations between
(5) Visualization.
different images from large image databases

51
Md Barique Quamar

shown in Fig 3. Image mining is used in


variety of fields like medical diagnosis,
space research, remote sensing,
agriculture, industries and also handling
hyper spectral images. Images include
maps, geological structures, and biological
structures and even in the educational
field, explained in [6].
Video Mining : Mining of video data is
complicated than mining an image data.
Video is a collection of moving images like
animation. There are three types of videos
in video mining.
1. The produced (includes movies, news
videos and dramas).
2. The Raw (includes traffic videos, Fig. 2. The Progress of Web Content Mining
surveillance videos etc…).
used for the four types of web documents
3. The Medical Video (includes ultra sound are listed below in the table 1. Table 1
videos including echocardiogram etc…) techniques of web content mining for
The Fig. 4 given below clearly represents various web documents.
how the video mining takes place in a
multimedia retrieval using web mining 2.2 Web Structure Mining :
concept. Web Structure Mining is the way of
discovering the structure information from
Audio Mining : Audio is a continuous
the Web, which is further divided into two
media type as video the techniques used
types based on the structure information.
in audio are similar to the video data
Web structure mining aims at developing
extraction. Audio can be in the form of
techniques to identify quality of web page
radio, speech, etc… To mine audio data,
which can be find out with the help of
first it has to be converted into text using
hyperlinks. For example, from the links, we
speech transcription techniques. Audio
can discover important Web pages, which,
data can also be mined directly by using
incidentally, is a key technology used in
audio information techniques and then
search engines. We can also discover
mining selects the audio data. Audio
communities of users who share common
mining is very simple in designing when
interests. Traditional data mining does not
compared to video mining.
perform such tasks because there is
2.1.1 Methods of Web content Mining: usually no link structure in a relational
table.
The figure 2 shows the web content
mining process and the information 2.3 Web Usage Mining:
retrieved in the structured format.
Web Usage Mining is the application of
Based on the documents in the web the Data mining techniques in order to obtain
traditional methods are partitioned into the useful patterns from the Web, Which
four parts [3] [7]. The techniques that are is a huge repository of different patterns.

52
Intelligent Web Agent through Web Text Mining Techniques with Machine Learning

Table 1 : Techniques for Web Content Mining


Document Techniques Process

Unstructured Information Extraction Extracting information from unstructured data and converts
into structured data. Pattern matching and transformation
are used.
Topic Tracking Tracks the topics searched by the user and predicts the
documents and produce to the user that of interest.
Prediction techniques are used.
Summarization Reduce the length of documents by minimizing the length of
the documents. Analyzing the semantics and interprets the
meaning of words.
Categorization Documents are placed into a predefined group.
Clustering Used to group the similar documents Grouping based on
the properties are identified.
Information Visualization To build a graphical representation to the user Feature
extraction, indexing techniques are used.
Structured Web crawlers Traverse the hypertext structure of the web. Internal crawlers
go through internal web pages of sites. External web crawlers
go to the unknown links or sites.
Wrapper Generation Set of information extraction rule to extract the useful data
from web pages. Provides a lot of meta information Page
ranking is used.
Page Content Mining Extracts the content of a page. Page ranking is used to display
the results according to the rank.
Using OEM Object Exchange Model. To understand the information
structure of the web. Self describing structure of the data is
produced.
Semi Structured Top Down Extraction Traverse the hypertext structure of the web. Internal crawlers
go through internal web pages of sites. External web crawlers
go to the unknown links or sites.
Web Data Extraction Language Set of information extraction rule to extract the useful data
from web pages. Provides a lot of meta information Page
ranking is used.
SKICAT Based on astronomical data analysis and cataloging system.
Multimedia Color Histogram Matching Find the correlation between the color components.
Unwanted artifacts are removed using smoothing techniques.
Multimedia Miner Extraction of images. Videos for the feature extraction, and
feature comparison for matching queries.
Shot Boundary Detection Automatic detection of boundaries.

3. CONCLUSIONS clearly extracted by the web mining


techniques when the techniques are used
Data mining techniques used for web
accurately based on the requirements of
information extraction are incredible
the users. The proposed solution has been
system and recommended for the
engineered into a complete web crawling
maintenance of highly confidential data.
system for automatic e-commerce offers
This is affluent, most intelligent resource
extraction, providing a working proof of the
extractor, and useful to maintain the
ideas proposed in this thesis. The e-
historical data. Vast amount of data is
commerce and web news scenario
maintained by the web sources and can be
considered during the experimental

53
Md Barique Quamar

analysis are quite different making the [10] John Wiley and F. Gorunescu,
proposed approach a good candidate for the "Data Mining for Business
more general Web Content Mining problem. Intelligence: Concepts, Techniques,
and Applications in Microsoft Office
4. REFERENCES Excel with XLMiner", (2011).
[11] J. Han and M. Kamber, "Data
[1] J. Abonyi and B. Feil, "Cluster
Mining: Concepts, Models and
Analysis for Data Mining and System
Techniques". Springer Science &
Identification". Springer Science &
Business Media: USA, (2011).
Business Media: Germany Alhajj, R.
(2007). [12] Jiawei Han, MichelineKamber and
Jian Pei "Data Mining: Concepts and
[2] "Advanced Data Mining and
Techniques", Morgan-Kaufmann
Applications: Third International
Academic Press: San Francisco,
Conference, ADMA 2007, Harbin,
(2012).
China, August 6-8, 2007
Proceedings". Springer Science & [13] K.L. Haynes, "Data Mining:
Business . Concepts and Techniques", The
Morgan Kaufmann Series in Data
[3] M. J. Linoff G.S. Media: Germany
Management Systems, Third Edition,
Berry, (2000).
published by Elsevier Inc., (2006).
[4] C. M. Bishop, "Mastering Data
[14] J. Hilbe, "Object Recognition Using
Mining: The Art and Science of
Rapid Classification Trees". Florida
Customer Relationship Manage-
State University: USA, (2009).
ment". Wiley Computer Publishing:
New York. (2006). [15] M. F. Hornick, E. Marcade and S.
Venkayala, "Logistic Regression
[5] Y. Chang, "Pattern Recognition and
Models". CRC Press INC: USA,
Machine Learning". Springer: USA
(2010).
(2008).
[16] Alexander Furnas "Java Data
[6] S. Chatterjee and A.S. Hadi,
Mining: Strategy, Standard, and
"Robusti-fying Regression and
Practice: A Practical Guide for
Classification Trees in the Presence
architecture, design, and
of Irrelevant Variables". ProQuest:
implementation". (2012).
USA (2013).
[17] "Everything you want to know about
[7] John Wiley and R. Christensen,
Data Mining but we are afraid to
"Regression Analysis by Example".
ask", http://www.theatlantic.com/
:USA (2013).
technology/archiv e/2012/04/
[8] A. Gelman and J. Hill, "Log-Linear everything-youwanted-to-now-
Models and Logistic Regression". about-data-mining-but-were-afraid-
Springer New York: USA Collins to- ask/255388/, April 3, 2012,
English Dictionary, (2006). 11.33 am ET.
[9] G. Ghmueli, N.R. Patel and P.C. [18] Bui ThiThuy Dung, "Program
Bruce, "Data Analysis Using introduction to data mining" M. Sc.
Regression and Multilevel/ Candidate in Computer and
Hierarchical Models". Cambridge Information Sciences, Tokyo
University Press: USA (2006). University of Agriculture and

54
Intelligent Web Agent through Web Text Mining Techniques with Machine Learning

Technology, Education Program of IT [22] John Silltow, "Data Mining 101:


Engineers for Advanced Tools and Techniques", Managing
Manufacturing, A member of Director, Security Control and Audit
Nakagawa's Lab, Hanoi City, Ltd, August 2006, accessed from,
Vietnam, (2008). (2006).
[19] A. Cavoukian, 'Tag, you're it: Privacy [23] Faustina Johnson and Santosh
implications of radio frequency Kumar Gupta," Web Content Mining
identification (rfid) technology', Techniques: A Survey", International
(2004). Journal of Computer Applications
[20] S.Sukumaran, "A Study on (0975 - 888), 47(11), 44-50 (2012).
Classification Techniques in Data [24] Govind Murari Upadhyay and
Mining", 4th ICCCNT, Tiruchengode, Kanika Dhingra,"Web Content
India, IEEE - 31661, (2013). Mining: Its Techniques and Uses",
[21] G. Degu and T. Yigzaw, "Research International Journal of Advanced
Methodology", Ethiopia Public Research in Computer Science and
Health Training Initiative, University Software Engineering, 3(11), 610-
of Gondar, Ethiopia, (2006). 613 (2013).

55
GUIDELINES FOR CONTRIBUTORS
Global Sci-Tech: Journal of Science & Technology is a quarterly journal published by Al-Falah Charitable Trust.
Its objective is to present new knowledge/understanding of current topics in the area of Science & Technology.
Some issues of the journal may be based on specific themes. It focused on original full length papers, short
communications of urgent interest as well as contemporary review articles and emerging issues in Science &
Technology. Requirements for acceptance include originality, breadth of scope, careful documentation of
experimental results, analysis and clarity of presentation.
SUBMISSION OF MANUSCRIPT - Manuscript should be in English only on one side of good quality paper,
with adequate margin on all four sides. It must be complete in all respects such as abstract, illustrations,
appendices etc.
Manuscript for consideration may be submitted as soft copy (MS Word or PDF format) through email as an
attachment to Editor (kurra91@gmail.com). The manuscript must have neither be published nor be under
consideration elsewhere.
PREPARATION OF MANUSCRIPT - Manuscript should be presented in as concise a form as possible. Pages
should be numbered consecutively and arranged in the following order:
COVER SHEET - A cover sheet consisting of a short title; names, affiliation and address of all the authors.
TITLE - The title should be neither too brief/general nor unnecessarily long. It should reflect the content of the
paper so as to derive the maximum advantage in indexing.
ABSTRACT - The abstract, usually not exceeding 200 words, should indicate the scope and significant content of
the paper, highlighting the principal findings and conclusions. It should be in such a form that abstracting
periodicals can use it without modification.
INTRODUCTION - Long and elaborate introduction should be avoided. It should be brief and state the exact
scope of the study in relation to the present status of knowledge in the field.
FIGURES - Figures should be numbered consecutively with Arabic numerals in order of mention in the text;
each figure should have a descriptive legend. Legends should be presented separately, double-spaced like the
text.
MATHEMATICAL EXPRESSIONS - Wherever possible, mathematical expressions should be typewritten,
with subscripts and superscripts clearly shown. It is helpful to identify unusual or ambiguous symbols in the
margin when they first occur. To simplify typesetting, please use the "exp' form of complex exponential function
and use fractional exponents instead of root signs. Equations must be displayed exactly as they should appear in
print and numbered in parentheses placed at the right margin. Reference to equations in the text should use the
form "Eq. (5)".
TABLES - Tables should be typed on separate sheets, numbered consecutively with Arabic numerals, and have
short descriptive caption at the top. Extensive and/or complex tables must be typed carefully in the exact format
desired. Computer printouts ill normally be reproduced as illustrations. Tables should be placed together at the
end of the manuscript.
REFERENCES - References must be prepared in proper format (examples of various types are given below) and
numbered consecutively in the order in which they are cited in the text.
Books : Author(s) name, title of the book, publisher pp. first and last page no. (year).
Periodicals : Author(s) name, title of article, name of journal, vol. no., pp. first and last page no. (year).
1. M. Yeung and I. Mintzer, Invisible Watermarking for Image Verification, Journal of Electric Imaging, 7,
578 (1998).
Conference records : Authors(s) name, title of article, name of conference, Place where held vol. no. pp. first and
last page no. (year).
Unpublished conference presentations : Author(s) name, title of article, name of conference, Place where held,
(year).
Technical reports : Author(s) name, title of article, report no. published by, (year).
The editors and publisher of Global Sci-Tech are not in anyway responsible for the views expressed by the
authors. The material published in Global Sci-Tech should not be reproduced or reprinted in any form, without
the prior written permission from the Editor/Publisher.
Global Sci - Tech
Subscription Rates

Category 1 year 3 year For subscription


enquiries please mail :
Saoud Sarwar
Academic Institutions 400 (40$) 1000 (100$) Editor
Global Sci-Tech
274-A, Al-Falah House Jamia
Individuals 200 (20$) 500 (50$) Nagar, Okhla
New Delhi-110025

SUBSCRIPTION ORDER FORM

Please accept the enclosed cheque/demand draft, No.________________, dated______________,

drawn on ___________________________________________________________ Bank, favoring

Global Sci-Tech, for Rs. ________/- US$_________ towards subscription of Global Sci-Tech,

payable at Delhi, for one year/three years.

Name : ______________________________________________________________________________

Organisation : ________________________________________________________________________

Mailing Address : ____________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

City __________________________ PIN/ZIP _______________ Country ______________________

E-mail________________________________________________
AL - FALAH UNIVERSITY
SCHOOL OF ENGINEERING & TECHNOLOGY SCHOOL OF PHYSICAL & MOLECULAR SCIENCE
UG Programme (B.Tech. Courses) PG Programme (M.Tech. Courses) UG Programme (B.Sc. Courses) PG Programme (M.Sc. Courses)
Mechanical Engineering Department of Mechanical B.Sc. (Hon.) Chemistry M.Sc. (Chemistry)
Mechanical & Automation Engineering Engineering B.Sc. (Hon.) Physics M.Sc. (Physics)
Civil Engineering Manufacturing Process & Automation B.Sc. (Hon.) Mathematics M.Sc. (Mathematics)
Engineering
Electrical & Electronic Engineering Doctor of Philosophy (Ph.D.)
Electronic & Communication Machine Design
Engineering SCHOOL OF HUMANITIES & LANGUAGES
Thermal Engineering
Computer Science & Engineering Industrial Production & Engineering B.A. (Hon.) English M.A. (English)
Bachelor of Architecture Department of Electronic & B.A. (Hon.) Urdu M.A. (Urdu)
Communication Engineering
Doctor of Philosophy (Ph.D.)
Electronic & Communication
Engineering SCHOOL OF SOCIAL SCIENCES

VLSI Design Bachelor of Social Work (BSW) Master of Social Work (MSW)
Department of Computer Science B.A. (Hon.) Economics M.A. (Economics)
& Engineering B.A. (Hon.) History M.A. (History)
Computer Science & Engineering B.A. (Hon.) Geography M.A. (Geography)
Department of Electrical &
Electronic Engineering SCHOOL OF EDUCATION & TRAINING
Power System Bachelor of Education (B.Ed.) Master of Education (M.Ed.)
Department of Civil Engineering Diploma in Education (D.Ed.) Doctor of Philosophy (Ph.D.)
Structural & Foundation Engineering
Comunication Technology and SCHOOL OF COMPUTER SCIENCE
Management
Environmental Engineering BCA MCA
B.Sc. (I.T.)
Research Programme (Ph. D. Course)
Mechanical Engineering Doctor of Philosophy (Ph.D.)

Civil Engineering UNIVERSITY POLYTECHNIC


Electrical & Electronic Engineering
Diploma in Civil Engineering
Electronic & Communication Engineering
Diploma in Mechanical Engineering
Computer Science & Engineering
Diploma in Electrical Engineering
SCHOOL OF COMMERCE & MANAGEMENT
Bachelor of Business Administration Master of Business Administration
(BBA) (MBA)

AL-FALAH HOSPITAL
B. Com. M. Com.
Master of Finance & Control
Doctor of Philosophy (Ph. D.)

Faridabad (Haryana), India


Abstracted/Indexed by

Scribd Advanced Science Index (ASI) Qwant ResearchBib

AL-FALAH UNIVERSITY
Faridabad (Haryana), India

View publication stats

You might also like