mvsit journal of science, technology & management · a. according to wheebox, (2016), only 1/3...

31
MVSIT Journal Of Science, Technology & Management Volume 1 , Issue 1 , July - 2017 Open Access e-Journal MVSIT TECHNOLEDGE MVSIT TECHNOLEDGE MVSIT TECHNOLEDGE MVSIT TECHNOLEDGE MVSIT JOURNAL OF SCIENCE, TECHNOLOGY & MANAGEMENT A Jain Minority Institution

Upload: others

Post on 10-Mar-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

MVSIT Journal Of Science, Technology

& Management

Volume 1 , Issue 1 , July - 2017

Open Access e-Journal

MVSIT TECHNOLEDGEMVSIT TECHNOLEDGEMVSIT TECHNOLEDGEMVSIT TECHNOLEDGE MVSIT JOURNAL OF SCIENCE,

TECHNOLOGY & MANAGEMENT

A Jain Minority Institution

MVSIT- Technoledge, July 2017, Vol.1, Issue 1

Page 2

Editorial Team

Editor-in-Chief

Prof. Director Dr. Sanjay Kumar

[email protected]

MVSIT

Editor

Kavita Garg (A.P. Maths)

[email protected]

MVSIT

Member

Rajeev Kumar Gupta(A.P. ME)

[email protected]

MVSIT

Member

Bharti Seth(A.P. Maths)

[email protected]

MVSIT

Member

Monica Bazzad(A.P. ME)

[email protected]

MVSIT

Member

Divya Joshi( A. P. CSE)

[email protected]

BMCEM

Member

Samik Sharma(A.P. Civil)

[email protected]

MVSIT

MVSIT- Technoledge, July 2017, Vol.1, Issue 1

Page 3

Contents

Title of the Articles Page No

1 Developing A Framework For Measuring The Effectiveness Of Key

Employability Factors Of Engineering Graduates Of India

*Ms. Bharti Seth, **Mr. Sunny Seth, ***Mr. Sanjive Saxena

4-11

2. Criticism Of “ Shattered Dreams’’ , A Play By Ankit Tyagi

*Mr. Ankit Tyagi

12-13

3. Ipsec And SSL Virtual Private Network: Review

*Ms. Divya Joshi

14-16

4. Designing Uwb Compact Mimo Antenna

*Ms. Ruchika Doda

17-19

5. The Computing Approach Of Cloud Computing

*Dr. Shalini Goel

20-25

6. Students’ Perception On Quality Of Teaching: A Case Study Of

Technical Institute In Haryana.

*Ms.Taruna, **Ms.Preeti

26-29

MVSIT- Technoledge, July 2017, Vol.1, Issue 1

Page 4

Developing A Framework For Measuring The Effectiveness Of Key

Employability Factors of Engineering Graduates of India

Ms. Bharti Seth1, Mr. Sunny Seth

2, Mr. Sanjive Saxena

3,

1Faculty, Mahavir Swami Institute of Technology, Sonepat, India,

[email protected] 2Faculty, Jagan Institute of Management Studies, Near Rithala Metro Station, Rohini

Sec-5, New Delhi, [email protected] 3Faculty, Jagan Institute of Management Studies, Near Rithala Metro Station, Rohini

Sec-5, New Delhi, [email protected]

Abstract:

India is under the process of transformation in many facets and this transformation is

visible at several dimensions. Today we are witnessing the incorporation of new

policies as well as restructuring of existing ones so as to provide a conducive

environment to various investors in setting up of new ventures thereby providing

employment opportunities to several engineering graduates across the country.

However, despite the availability of large number of engineering graduates in India,

there is a general concern which had been making waves but of late, in this time of

recession, has shown a tendency to question on the quality of the education provided

by the engineering colleges, particularly average and below par engineering colleges.

The concern is related to the report of various government organizations and agencies

which point out that 90% of the engineering graduates are incompatible for being

employed in their relevant industry.

This paper is an attempt to develop a framework for measuring the effectiveness of

the key factors which will assist the colleges, especially average and below par

engineering colleges, in addressing the needs of the industry. The design of the paper

follows a structured approach. It starts with the basic terms and gradually develops the

framework, at the end an index is generated which will provide the measure of overall

attributes of the student.

Key Words: employability, engineering graduates, employment opportunities,

engineers.

Introduction

The business world of today is witnessing hyper competitiveness and complexity on

account of changes being visible at local, zonal, regional, national, global and

international levels. Several reasons can be attributed to the creation of this hyper

competitive environment. For example, the rate at which information technology is

being adopted at several decision making processes by applying the information

generated by the use of data analytics and data mining tools or by automating several

operational processes to improve the efficiency of the organization. All these

mechanisms generate hyper competitiveness and complexity.

However, as business processes are executed by human resources there is an equally

growing concern and this is related to the quality of employable human resources

produced by our engineering colleges, particularly average and below average

MVSIT- Technoledge, July 2017, Vol.1, Issue 1

Page 5

engineering colleges. For, with the privatization of education, India has witnessed a

large growth of engineering colleges, the consequence of which is the generation of

large number of engineering graduates who are easily available for employment.

However, despite the surplus availability of these graduates, somehow or the other,

the industry has found them to be unbefitting to meet the challenges and the demand

of today’s business world.

The following statistics present the scenario which exists in the country today:

a. According to Wheebox, (2016), only 1/3 of the students meet the criterion of

being employed by the employers in the market. This indicates that there

exists a huge gap demand the demand and supply and that our educational

institutions must upgrade their course structure or must increase the frequency

of contact with the industry so as to generate the product which can be termed

as employable by the job market.

b. Chakrabarty, Roshni (2016), in his study pertaining to engineering graduates,

concluded that 97% of the engineers want to take up software engineering jobs

including the core engineering functions. However, as per the study only 3%

of them possess have the necessary skills and aptitude to take up software

development as a career and further only 7% of them do possess the required

skills to take up core functional engineering jobs.

c. As cited by Chanda, Rupa (2014), “Our strength in the next few decades lies

in the availability of a vast youthful workforce. But we cannot simply rest with

this advantage of demography. The youth have to be suitably skilled to help

realize the demographic dividend.” - Hon. President Pranab Mukherjee

The analysis of the above statistics and findings reveal that an existence of a huge gap

between the demand of industry and the employable work force. India, despite the

existence of a large number of work force, needs to suitably develop measures and

mechanisms to ensure that the work force be well equipped with the necessary skills,

aptitude and the willingness to ensure that they are able to contribute to the growth of

the organization and hence the growth of the country.

In light of the above findings, authors have tried to address the above issues by

developing a conceptual framework which will measure the effectiveness of the key

factors to improve the employability of the engineering graduates who are said to be

ready for employment. The domain is restricted to average and below par engineering

colleges.

Literature Review

Mehta, Aashish (2015) in his study concluded that issues concerning skill gaps are

acting as constraints in the Indian manufacturing sector and that now it is becoming a

national priority. He further contended that in the Indian context, the skill gaps are a

result of conceptually weak foundations. According to him there are some industries

which are really suffering from skill gaps, there are others who are restricted by

commercial difficulties which can be overcome through restructuring the existing

policies rather than by skill development programs. He further concluded that the skill

gap which is being talked about everywhere is divided into two parts economic and

commercial skill gap and it is this gap which is responsible for creating this great

divide. In other words, there is a need to define accurately as to what the industry

looks for when the industry says that the employability readiness of the students from

MVSIT- Technoledge, July 2017, Vol.1, Issue 1

Page 6

the higher institutes is extremely low. According to the study, the employability

aspect or the skill gap which the industry refers to is a stage wherein what the

company is willing to pay for the work which it wants the employee to carry out. It

has got nothing to do with what the student has studied in college or university. If the

student is willing to work at the pay what is offered to him and is sufficiently able to

demonstrate the work assigned to him then there is no skill gap. In other words, the

student is found to be employable. Several studies are conducted to assess the skill

gap and the notable findings point out that students are required to be trained on

personality buildings requirements such as team work, communication and the like

(Chanda, Rupa (2014), Mehta, Mehta, Aashish (2015), Menaria, Deepak, (2013)).

Objective

The prime objective of this paper is to develop a conceptual framework which will

measure the effectiveness of the key factors to improve the employability of

engineering graduates.

Research & Design Methodology

The design of the paper follows a structured approach. It starts with the basic terms

which go into the framework and which are in line with the objective of the paper.

The key factors which go into the framework are identified based on the demands of

the industry as evident from the gaps identified in the literature review process and

interaction with industry experts. The effectiveness of these key factors is determined

on the basis of an index which is generated at the end.

Employability Defined

For the purpose of this paper, the word ‘employability’ is defined as the claim by the

student or an institute which assures to the employer that the student is able to

sufficiently demonstrate the skills, the application of the knowledge and any other

quality which is needed to ensure that the employer is satisfied with the performance

and therefore the employer is looking at long term association with the student as well

as the institute.

The analysis of the above definition reveals that when it comes to employability there

is something extra something beyond which the employer is looking at. In other

words, long term association is what the employer looks for and this requires on the

part of the student and the institute to prepare in addition to what is being taught in the

class.

Placement Defined

For the purpose of this paper, the word placement is defined as the beginning of a new

arena which involves the student to prove his worthiness for which he was employed

or offered employment at the end of the study.

The analysis of the above definition reveals that there is an intrinsic criterion which

was not revealed and that the student is required to find out that criterion and prove

his worth.

MVSIT- Technoledge, July 2017, Vol.1, Issue 1

Page 7

The process of generating the framework

Having scoped the terms employability and placement, let us now gyrate to the

process of defining the conceptual framework. The first step in defining the

framework is the identification of the core parameters which for which effectiveness

is required. Table 1 below, identifies these core parameters.

Parameter Definition Why this

parameter for

inclusion in the

criterion for

employability

Visible /

Demonstrable

indicators

Weight

age

Communic

ation skills

Communication

skills refers to the

means and

mechanism

required to

convey the ideas

or views so as to

achieve the

objective of

communication

such as brevity,

unambiguous,

legible and the

like

This is the main

parameter which

determines the

effectiveness and

efficiency with

which the person

is able to achieve

the objective of

communication.

Without an

efficient and

effective

communication

the objective of

the work assigned

to him remains

unfulfilled.

Reflection of

confidence,

brevity and

unambiguity in

giving

presentations,

writing memos,

email, drafting of

project reports

and the like

which conveys

the objective of

these indicators

for

communication

skills

35%

Initiative Willingness to

come forward and

take up the

responsibility to

undertake the task

This is another

core parameter

for determining

the efficiency and

effectiveness of

employability

factor. In the

absence of this

core parameter a

person is unable

to complete the

task as he

demonstrates to

be in the team

rather than be a

leader the team

and get the work

done

The visible

demonstrators

include the

aspects such as

questioning the

status quo as to

why a particular

method will

work or will not

work and what is

another

alternative and

the like.

15%

MVSIT- Technoledge, July 2017, Vol.1, Issue 1

Page 8

Analytics Analytics means

to unscramble the

current scenario

and work out a

feasible solution

based on the

findings

This core

parameter is one

of the necessary

component for

meeting

effectiveness and

efficiency of the

task. The business

world, requires

analytics or the

persons who are

capable of

unscrambling the

data or taking

stock of the

situation so as to

quickly determine

the feasible steps

to get the work

done

The

demonstrable

indicators

include number

crunching,

assessment of

the situation by

taking the clues

from the past

experiences and

learning and

using them with

the current

analysis trends to

lead to the

objective of the

work

20%

Planning Planning means

the steps which

will lead to the

desired objective

This is required

due to the fact

that in the

absence of the

plan the person is

rudderless. In

other words, more

time is wasted in

the absence of the

plan which the

delivery of the

task assigned to

him.

The

demonstrable

indicators

include the use

of checklists;

written

documents; notes

and the like

15%

Metrics Metrics are a

collection of

numbers or data

which assist the

individual in

taking stock of

the situation or

the task assigned

to him

This parameter is

required as it

provides the

necessary thrust

to demonstrate

the efficiency and

effectiveness of

the assigned

work. With

metrics in hand

the individual is

in the possession

of greater control

The

demonstrable

indicators

include the

aspects such as

usage of data in

presentation, in

email, in

conversation and

the like

15%

MVSIT- Technoledge, July 2017, Vol.1, Issue 1

Page 9

of time and the

work assigned to

him

Table 1: Core Parameters.

Note: Worth mentioning, the above parameters are not fixed, some more of them can

be included and correspondingly the weight-age can be allocated.

Having thus obtained the basic structure of framework, we can now deliberate on this

further supported by various concrete examples on each of these parameter and the

generation of an effectiveness index.

Effectiveness Index

Name of the

Student

Roll-Number Year Course

**** **** **** ****

Evaluated By: /

Verified by

**** Criterion : Project or assignment or

presentation or any other similar

evaluation technique/activity

Index **

Parameters Demonstrable

indicators

Rating out of

10 (1 being

lowest)

Remarks (to be given by

Evaluator / verifier after

going through informal

sessions / record verification

of several activities

Communica

tion

Reflection of

confidence, brevity

and un-ambiguity in

giving presentations,

drafting of project

reports and the like

5/10*

Lacks confidence and clarity

while expressing and

committed grammatical

errors. Need to improve a lot

Initiative Willingness to come

forward, questioning

the status quo as to

why a particular

method will work or

will not work and

what is another

alternative and the

like

9/10*

A good initiator has the

capability to start and take

things further.

Analytics Analyzing the

available information

and using analytical

skills to solve

7/10*

Should have demonstrated

more usage of analytical

skills. Can improve further

on this area

MVSIT- Technoledge, July 2017, Vol.1, Issue 1

Page 10

problems

Planning The plan for the new

project was

developed by taking

into consideration the

finer aspects of

planning such as

verification,

validation activities

and the like

8/10*

can improve on in-depth

insight of certain involved

activities

Metrics Several metrics were

used in the course of

the development of

various tasks. usage

of data in

presentation,

conversation and the

like

8/10*

Has shown to be quite

effective in the usage and

application of metrics as

demonstrated.

Effectiveness Index:

Index = ∑∑∑∑ weight-age * rating

Thus in the above sheet we have the following index

Index = (.35*5+.15*9+.2*7+.15*8+.15*8) = 1.75 + 1.39 + 1.4 + 1.2 + 1.2 = 6.94

Interpretation of an effective index

The value of 6.94 indicates that the effectiveness of candidate is to the tune of 69.4%.

This indicates that the candidate is sufficiently able to demonstrate the effectiveness

of the core parameters as required in the industry as well as the gaps which came out

during the literature review process. By carefully working on the soft skills or the

personality development skills which are highly sought after in the candidate as

depicted in the framework the skill gap can be reduced.

Limitations of the framework.

The limitation that came out in the framework is confined to the limitation in the

sense that the parameters included in the framework are the limited to 5 which form a

minimal set. These are required to be expanded further. For example, including the

parameter such as problem handling and resolving inter group conflicts can further

improve the utility of the framework.

Conclusion

The framework has provided a new insight into the aspect required for determining

the effectiveness of the key factors of employability of engineering graduates and can

help an institute to quantify the performance of each and every student pertaining to

MVSIT- Technoledge, July 2017, Vol.1, Issue 1

Page 11

the parameters responsible for employability and can further assist institutes in

reducing the skill gap by adopting effective improvement strategies to make their

students employable and industry ready.

References:

• Tripathi, S., Gautam, S., & Lal, A. (2017). Evolving Human Resource

Landscape of the Indian Retail Sector: Bridging the Skill-Gap. Prabandhan:

Indian Journal of Management, 10(2), 41-52.

• Singh, D. B., & Panwar, S. Study of Effects of Demonetization on the

Informal Economy of India.

• Khadria, B. (2001). Shifting paradigms of globalization: The twenty‐first

century transition towards generics in skilled migration from

India. International migration, 39(5), 45-71.

• Singh, D. B., & Panwar, S. Study of Effects of Demonetization on the

Informal Economy of India.

• Chatterjee, S., Nankervis, A., & Connell, J. (2014). Framing the emerging

talent crisis in India and China: A human capital perspective. South Asian

Journal of Human Resources Management, 1(1), 25-43.

MVSIT- Technoledge, July 2017, Vol.1, Issue 1

Page 12

Criticism of “ Shattered Dreams’’ , A play by Ankit Tyagi

Ankit Tyagi ,

Assistant Professor, Mahavir Swami Institute of Technology , Sonepat, India,

[email protected]

Abstract

Child Labor is a heinous social evil. It has been an international concern because it

ruins the future of children. The problem of child labor is a serious matter not only in

India but also in other developing countries. But sadly India is the home to the largest

number of child laborers of the world. Poverty and lack of social security are the main

causes of child labor. Shattered Dreams is a supercalifragilisticexpialidocious play

which appeals to abnegate and abolish child labor and child Abuse.

Key Words :

supercalifragilisticexpialidocious Floccinaucinihilipilification , Rudimentary ,plight

Child labor

Indian law says that any child below the age of 14 cannot be employed either in an

inn ,industry chamber or in a hotel. But the most excruciating thing is that Child

Labor is frequently utilized in India in various places of production and service.

Childhood is the most pleasant phase of one’s life during which an individual learns

rudimentary strategy of life from Guardians, pedagogues and dear ones but child labor

intervenes with the proper growth and development of children in all aspects like

mentally , physically, socially and intellectually.

We all are very much conscious about this social evil but still we never pay much

heed to it. As a responsible citizen it is our superintendence to raise our voice against

this social evil instead of accusing and counter accusing one another we must join

hands together to nullify this abominable and heinous evil.

Children are undoubtedly foresee and the future of a nation but yet there are millions

deprived waifs in our nation who don’t even know that “what is carefree childhood”.

We need to understand that child is meant to learn, not to earn. So, don’t ask children

to take tool instead send them to school.

Criticism of Shattered Dreams

“Shattered Dreams” is a fictional story. All the characters and events in this play are

Fictional. The crux of this play is to revolt against abominable social evils like child

labor and child abuse. Through this play I tried to reveal the miserable plight of

impecunious and down trodden children who are victims of child labor and child

abuse. The two protagonists of this play Montu and Lucky are constantly tormented

and walloped . They both have multitudinous aspirations and dreams but

MVSIT- Technoledge, July 2017, Vol.1, Issue 1

Page 13

unfortunately everything shattered under the burden of child labor. Both Montu and

Lucky are embodiment of all such children who are deprived of their childhood.

In this play Montu is unnecessarily walloped by munni. she is a child hunter and a

brutal lady. Her hard thrashing is adequate to add insult to injury in the deep wounds

of montu but the authentic companionship of his chum, Lucky made him a Rebel.

Fortunately, one day their luck favors them and they met few noble hearts like

Mahima and Mr Mahesh who helped them like an altruist. Their pathetic saga was

narrated on national Television by Mr. Mahesh and the ending brought twist in the

tale. Of course munni was exposed and the ending of this play seems delightful and an

act of justice but does it happens in real life?

Today, throughout the world, around 215 million children work. They do not go to

school and have no time to play. Many do not receive proper nutrition or care. They

are denied the chance to be children. More than fifty percent of them are exposed to

the worst forms of child labor such as work in hazardous environments, chemical

industries, drug trafficking and prostitution.

Child Abuse is also one of the major social evil. The most obvious effect of child

abuse is physical injury to the child. Kids who suffer repeated trauma feel isolated,

scared, worthless and unloved, which is exactly the opposite of how children should

feel. Child abuse can be in physical, emotional, sexual form. Every year millions of

children suffer from different type of child abuse. Most child abuse results from

attempt to punish or control the child. Abused children often feel shattered, void and

rude; with mental consequences that last eternally after the physical wounds have

healed.

Through this play I tried to reflect the most heinous evil of our society i.e. child labor

and child abuse which is flourishing day by day. I want my readers to raise their voice

against this heinous evil. I also foresee that this play will work as an eye-opener for at

least few of them who are unaffected by this social evil and who are not opposing it.

This entire play mocks at our unjust society which considers “ To be” more important

than “ To do”

At last I foresee that my readers will enjoy this play. It will be a sort of parable for

them.

References

1. https://www.educreation.in/store/ankit-tyagis-shattered-dreams-ankit-

tyagi.html

2. Author Page: https://www.educreation.in/author/ankittyagi/

MVSIT- Technoledge, July 2017, Vol.1, Issue 1

Page 14

IPsec and SSL Virtual Private Network: Review

Ms. Divya Joshi

Assistant Professor, Bhagwan Mahaveer College of Engineering & Management, Sonepat,

India, [email protected]

Abstract

Now are days in the era of security, deciding (VPN) is very brain storming work. VPN is

used for making connection among remote cells or users by a public set up, thereby providing

ad hoc access to mobile users. The goal of Virtual Private Network is to add security aspect in

the data exchange from the source to destination cells. It creates a private passage for sending

the data securely. IPSec and SSL are two important VPN technologies used today. These two

comprise of their self boons and bans. A comprehensive study has been presented. It explains

the detailed analysis and way it operates.

Keywords

Tunnel, Transport, Virtual Private Network (VPN), SSL, IPSec

1 Introduction

Virtual Private Network is a network of surfacing virtual circuits responsible for carrying

private traffic through public or non public networks . Private networks are made up of leased

lines from phone companies and Internet Service Provider.

2 IPSEC VPN

IPsec protocol developed under the guidance of IETF (Internet Engineering Task Force) in

November 1998. Network security and inter operability are the two features it provides. IPv4

and IPv6 are used for the working. IPsec provides confidentiality, integrity, encryption to

protect modification of data and unauthorized movement [1].

Encapsulating Security Payload (ESP), Internet Key Exchange (IKE) protocols

Authentication Header (AH).

2.1 Authentication Header (AH)

It is responsible for the provision of authentication, data integrity check and replay

protection, at the same time it does not provide confidentiality which will not encrypt data, so

it does not require encryption algorithm[3].

2.2 Encapsulation of security payload

It provides data authentication and confidentiality, integrity and source authentication.

Encryption is also provided by it. It translates any message which can be read into non

readable format for hiding . Decryption translates the message content from non readable type

to a readable. ESP uses symmetric encryption algorithms to provide data privacy. Packet

payload authentication provided by ESP.

MVSIT- Technoledge, July 2017, Vol.1, Issue 1

Page 15

Fig:1 Encryption

2.3 Internet Key Exchange (IKE)

IPSec[7] uses Internet Key Exchange (IKE) as the default protocol For determining

algorithms, keys and protolcols. It also authenticate the two parties. A security agreement

must be established between the two parties before exchanging the secured data. This

agreement is known as security association in which both the parties agree on how to protect

and exchange information.

3 SSL VPN

SSL (Secure Socket Layer) VPN is used with web browser. It is based on the SSL protocol

that provides encryption for http traffic and authentication. Real Time Protocol (RTP) traffic

secured using the SSL.SSL VPN gives remote users access to internal network connections,

client/server applications and web applications. Client-server communication is used by SSL.

The 3 protocols: Handshake protocol, record protocol and alert protocol are used.

3.1 SSL Protocols

During the handshake protocol, negotiation of encryption algorithm[2] takes place and server

authenticates itself to the client. For encryption, symmetric cryptography is used by SSL

whereas to negotiate the shared key asymmetric cryptography is used. In any record protocol,

client and server use the shared key to encrypt the data.

Table I

Distinction of IPSec And SSL

Parameter IPsec SSL

Connection Site to Site Remote Access Remote Access

Installation Requires Installation Of Client

VPN

No Installation Of Client

VPN

Gateway Location Gateway implemented on firewall Behind the firewall

Complexity Cost More Complex Less Complex

End Points Requires host based clients Thin Clients

Application Support IP based application Email

Layer it work Layer 3 Layer 4-7

MVSIT- Technoledge, July 2017, Vol.1, Issue 1

Page 16

4 CONCLUSION

Accessing the private data over the internet is complex[5]. Ideally, SSL and IPsec VPNs

should both be implemented as they serve different purposes and complement each other. The

deployment choices are clearer once the cost/benefit of each type of deployment is made in

mind, the problems were addressed. In our study we have found that studying the architecture

of the protocols, SSL VPN is suitable to site to site connections. In this, there is no need to

install the client software and provide the access to specific application rather than complete

network. If application is IP specific then IPSec VPNs are solution .

5 Conclusions and Future Scope

Cloud computing has emerged as a more economical technique for storage where data is in

massive quantity. It is visible that big organizations and enterprises will need substantial

space to store their enormous data. Cloud computing technique is even more effective if the

data to be saved, is needed for just a small period of time.

The future of Cloud computing is apparent to be very bright. This can be inferenced from the

number of software industries relying on this technology on an alarming rate. The areas on

which work can be done are the issues related to security and management of resources and

the reliability of the service provider.

References

1. Kajal, R., Saini D. & Grewal K.(2012). Virutal Private Network" International

Journal of Advanced Research in Computer Science & Sofware Engineering, 2 (10),

428-432.

2. Singh, P. K., & Singh, P. P. (2013). A Novel approach for the Analysis & Issues of

IPsec VPN. International Journal of Sciences and Research, 2(7), 187-89.

3. Wikipedia (www.en.wikipedia.org/wiki/IPsec).

4. Phifer, L. (2003). Tunnel Vission: Choosing a VPN-SSL VPN vs IPsec VPN.

5. (http://searchnetworking.techtarget.com/feature/IPsec-vs-SSL-VPNs-Understanding-

the-basics), 2014.

6. A. Sastry, IPsec VPN vs. SSL VPN: comparing respective VPN security

risks(http://searchsecurity.techtarget.com/tip/IPsec-VPN-vs-SSL-VPN-Comparing-

respective-VPN-security-risks), 2011

7. Akbar, I., & Shahzad, K. (2009). Security in Private Branch IP-Telephony Network

with QoS Demands.

8. The Government of the Hongkong Special Administrative Region,"VPN Security".

(2008) White Paper "Virtual Private Networks: Improving Network Security for a

diverse user community". (http://www.pdfio.net/k-7234709.html).

9. Phifer, L. (2003). Tunnel Vission: Choosing a VPN-SSL VPN vs IPsec VPN.

MVSIT- Technoledge, July 2017, Vol.1, Issue 1

Page 17

Designing Uwb Compact Mimo Antenna

Ms. Ruchika Doda

Assistant Professor, Mahavir Swami Institute of Technology, Sonepat, India,

[email protected]

Abstract

In this paper compact patch antenna is designed having ultra-wide band operating

frequency. The dimension of proposed antenna is 35mm to 40 mm and its operating

range of frequency is from 4.4 Ghz to 10.7 Ghz. for improving its performance fork

shape defected ground structure is used.

Keywords

UWB; MIMO; isolation; return loss; radiation pattern.

I. INTRODUCTION

For high data rate and low power consumption pulse radio are used which is also

known by the name of ultra wide band communication. UWB based antenna is mostly

used in indoor application like personal area network for wireless connections [4-5].

ITU-R defined UWB as the transmission in which the bandwidth of the emitted signal

exceeds the minimum of either 500 MHz or 20% of the center frequency. As

technology advances requirement of wideband increases so MIMO technology comes

into existence and it also have wide applications in wireless LAN [1-3].

II. ANTENNA DESIGN

MIMO based patch antenna is proposed for ultra wide band application. Geometry of

proposed antenna are:-

Material used: FR4

Thickness (h) = 1.6mm

Length(L) = 40 mm

Width (W) = 35 mm

Geometry of proposed antenna is shown in figure 1.

Fig.1. Proposed antenna design

MVSIT- Technoledge, July 2017, Vol.1, Issue 1

Page 18

III. PROPOSED ISOLATION MECHANISM

For reducing mutual coupling and for better isolation fork shape structure is used in

ground plane as shown in figure2.

Fig.2 Rear view of proposed antenna

IV. SIMULATION RESULTS

Proposed antenna is simulated using electromagnetic simulator IE3D. On the basis of

two basic characteristics i.e, return loss analysis for bandwidth characteristics and

radiation pattern analysis for radiation performance for proposed designed antenna is

analyzed.

(i) Bandwidth Characteristics

Return loss for proposed antenna is shown in figure 3. Simulated output shows that

antenna operating frequency bandwidth is from 4.4 GHz to 10.7 GHz. It clearly

indicates that proposed antenna have wider bandwidth of operation.

Fig.3 Return loss S11 and S22 for proposed antenna

MVSIT- Technoledge, July 2017, Vol.1, Issue 1

Page 19

(ii) Radiation Performance

Radiation pattern is simulated for operating frequency of proposed antenna i.e,

from 4.4 GHz to 10.7 GHz and selected frequencies are 5GHz, 7 GHz and 8 GHz.

Obtained radiation pattern is shown in figure 4.

Fig.4 Simulated radiation patterns x-y plane

V. CONCLUSION

Proposed antenna have the compact geometry of 35 mm to 40 mm and its return loss

shows wider frequency band also its radiation pattern shows its better performance at

frequency from 4 GHz to 11 GHz. The result satisfies the requirement of designing of

compact ultra wide band antenna. It can be used for practical application in WLAN or

PAN.

References

1. Ssorin, V., Artemenko, A., Sevastyanov, A., & Maslennikov, R. (2012, October).

Compact planar inverted-F antenna system for MIMO USB dongle operating in

2.5—2.7 GHz band. In Microwave Conference (EuMC), 2012 42nd European (pp.

408-411). IEEE..

2. Khan, M. U., & Sharawi, M. S. (2013, March). A compact 8-element MIMO

antenna system for 802.11 ac WLAN applications. In Antenna Technology

(IWAT), 2013 International Workshop on (pp. 91-94). IEEE.

3. Sato, H., Hayashi, T., Koyanagi, Y., & Morishita, H. (2006, November). Small

array antenna for 2x2 MIMO terminal using folded loop antenna. In Antennas

and Propagation, 2006. EuCAP 2006. First European Conference on (pp. 1-5).

IEEE.

4. Balanis, C.A. Antenna Theory, John Wiley & Sons, Pg. 722-784, Inc., 1997.

5. Wong, Kin-Lu, Compact and Broadband Microstrip Antennas, John Wiley &

Sons, pg. 22-26, Inc.2002.

MVSIT- Technoledge, July 2017, Vol.1, Issue 1

Page 20

The Computing Approach of Cloud Computing

Dr. Shalini Goel

Professor, Bhagwan Mahaveer College of Engineering & Management, Sonepat,

India, [email protected]

Abstract

The current educational establishments are seeking opportunities to manage their

resources in the most efficient manner. Cloud computing has appeared as a boon to

the world of software and technology for the reason of providing solutions to the

cash-deficit educational institutes and software industries. It is empowering the

economy by presenting immense benefit to the institutes and industries through its

flexibility and pay-as-you-use cost structure. The computing approach present in the

paper is dependent on a number of technologies that already exist in the market.

These include the Internet, web services, virtualization and grid computing, etc. This

technique of cloud computing is not completely new. It was existing earlier in 1990s

too when few companies, known as Application Software Providers (ASPs) were

offering software programs as a service to the large business organizations with the

help of the Internet [1]. This was not effective due to low bandwidth and high

Internet charges. But later on, around 2009, this approach was replaced by the

technique of cloud computing. I have presented the basic ideas about it in this paper.

Keywords

Cloud, Software Application, Internet, Virtualization, Grid computing, App

1 Introduction

Cloud computing has emerged as the latest technology that is drastically changing the

old and traditional ways of planning, designing, managing and deployment of the

software to the diversified users. The use of cloud computing is growing, since its

birth. By year 2016, this growth had risen marvelously. It is expected that most of the

large enterprises will have private cloud or a more advanced version of the cloud by

the end of year 2017.Gartner has described, Cloud Computing as an approach in

which services of software and hardware are provided to the users with the help of

Internet and Web technologies. The present technologies that support this approach

include the Internet, the World Wide Web, Grid Computing and Virtualization, etc

[1,2].

The need of Cloud Computing has arisen due to many aspects. Overloading of data

centers of large companies and enterprises is the main reason for the requirement of

this technology. The other aspects are the immense usage of broadband and

networking. Further, the affordable and low prices for storing data and massive

enhancements in networking technologies have helped Cloud Computing to grow

invariably. Cloud computing has opened a new horizon in the field of information

transferring and communication, thereby increasing focus on other crucial issues like

their planning, designing and realization.

MVSIT- Technoledge, July 2017, Vol.1, Issue 1

Page 21

2 Architecture

Based on the service models offered by it, the cloud can be categorized in various

ways. The main focus of cloud is towards Service Orientation. Cloud does not provide

a packaged solution; rather it provides solutions as a service. Thus, the end users do

not have to invest money on large scales systems and servers, etc. The architecture of

cloud consists of four layers (figure 1).

Software as a Service (SaaS)

Platform as a Service (PaaS) )

Infrastructure as a Service (IaaS)

Figure 1: Architecture of Cloud computing

• Application: It manages business applications and resources like multimedia

and web services, etc.

• Platform: It manages the software framework of the cloud .It may include

various software languages and platforms like Java, Python and dotNet, etc.

• Infrastructure: It manages the storage system of the cloud and the whole

application.

• Hardware: It manages the CPU, memory, hard disk and bandwidth, etc.

3 Types of Cloud Computing Techniques

The Cloud has been categorized in three main categories. These are Software as a

Service (SaaS), platform as a Service (PaaS) and Infrastructure as a Service (IaaS) [3].

Business Applications,

Multimedia, Web services

Application

Software Framework (Java,

Python/.NET)

Platform

Storage

Infrastructure

CPU, Memory, Harddisk,

Bandwidth

Hardware

MVSIT- Technoledge, July 2017, Vol.1, Issue 1

Page 22

SaaS is considered to be highly optimized but less flexible. On the other hand, IaaS is

highly flexible but less optimized. PaaS falls in the middle of the two models[4].

3.1 SaaS

In this category, the Software as a Service forms the apex of the hierarchy. Here, the

users have an application or software hosted as service to them. The architecture of

Cloud is modular as compared to other server hosting applications [4,5]. The layers in

SaaS are much independent of each other. Therefore, a layer can evolve on its own

without affecting other layers. The vendors and the service providers host the

applications which are made available to the customers with the help of a network,

i.e., the Internet.

3.1.1 Key features of SaaS

• Monitoring: The App developer can easily monitor how the users are

interacting with his application. This helps where real- time analysis and

statistics are required or the performance issues needed to be identified.

• Ease of Use and Low Complexity: The applications and tools based on SaaS

are easier to be used by the people using it, namely the management and the

operating employees. They can achieve efficient optimization of the

performance of the apps. The Internet and the mobile phones provide an easy

access to the SaaS apps.

• Low cost: The users do not need to buy the software and install them at their

end. SaaS provides the subscription of the software on rental basis, thereby

reducing the cost of buying and installing them.

• Scalability: The SaaS-enabled apps are highly scalable, which means that,

they can be easily extended if there is any requirement of new software or

servers. The vendors provide the end-users the updates and the upgrades of the

software, thereby saving their time and effort.

• Security: The data of an enterprise or a company remain secure as it is stored

on the cloud, from where it can be easily retrieved anytime. So, in case of any

loss or emergency, the data could be simply attained from the servers.

• Availability: The application is available 24 by 7 without failure.

• 3.2 PaaS

Platform as a service (PaaS) forms the second layer in the hierarchy of Cloud

computing. In these apps, the cloud supplier makes the hardware and software

tools available to the users. These hardware and software tools are mostly

required by the users for the application development[4,5]t. The advantage of

this technique is that the users do not require installing in-house hardware and

software on their own infrastructure to develop or run a new application.

MVSIT- Technoledge, July 2017, Vol.1, Issue 1

Page 23

F

igure 2: Management in SaaS, PaaS and IaaS

3.2.1 Key features of PaaS

• Highly Standardized: It provides highly standardized and automated

provisioning of prefixed workloads.

• Scalability: It shall be highly scalable and shall provide rapid allocation and

de-allocation of resources with a pay-as-you-use model

• Low expenditure: It requires low investment as the users do not require

installing the hardware and software.

• Reduced lead times: It helps in reducing the lead times with on-demand

availability of resources.

• Self-service: It follows the concept of self-service, thereby reducing the

administration costs.

• Reduced cost of hiring manpower: The cost of hiring skilled manpower is

reduced.

• Ability to add new users: New users can be added quickly.

3.3 IaaS

Infrastructure as a service (IaaS) forms the third layer in the hierarchy of Cloud

computing. It makes computing software and resources available virtually on the

Internet. In IaaS applications, an intermediately party hosts the software and the other

resources on the part of its users [4,5,6,7]. The IaaS providers handle the various tasks

including backup, system maintenance and resiliency planning of the applications.

The advantage of IaaS is that it offers highly scalable resources which can be adjusted

MVSIT- Technoledge, July 2017, Vol.1, Issue 1

Page 24

and made available on-demand. As a result, IaaS is highly suitable for workloads that

are temporary, changeable, or experimental.

3.3.1 Key features of IaaS

Efficiency: It is an efficient technique that reduces both the operating expenses and

the capital expenses. This is possible because of improvement in resource utilization

and administrator-to-server ratio.

Fast Service: It provides fast service and saves market time. It is made possible due

to the efficiency of the applications.

Low Cost: The user has to pay based on the usage of the IaaS application, so the costs

remain lesser as compare to other conventional services.

Easy Monitoring: IaaS provides synchronized checking of the applications, along

with the automatic execution of managerial activities.

Improved Visibility: It provides greater visibility of business and improves system

performance by identifying the redundancies and bottle necks.

4 Current Scenario

Today there are many large software industries that are working on the technology of

Cloud computing [Table 1]. Few examples of these are Google, Amazon, Microsoft,

Sun Microsystems and Solaris, etc [8,9]. Depending on the type of requirement, they

make decision about which category of Cloud computing technique should be used

for the planning, designing and deployment of the software applications [10].

Table 1: Various companies using Cloud computing

5 Conclusions and Future Scope

Cloud computing has emerged as a more economical technique for storage where data

is in massive quantity. It is visible that big organizations and enterprises will need

MVSIT- Technoledge, July 2017, Vol.1, Issue 1

Page 25

substantial space to store their enormous data. Cloud computing technique is even

more effective if the data to be saved, is needed for just a small period of time.

The future of Cloud computing is apparent to be very bright. This can be inferenced

from the number of software industries relying on this technology on an alarming rate.

The areas on which work can be done are the issues related to security and

management of resources and the reliability of the service provider.

6 References

1. Sultan, N. (2010). Cloud computing for education: A new dawn?.

International Journal of Information Management, 30(2), 109-116.

2. Huang, W., Ganjali, A., Kim, B. H., Oh, S., & Lie, D. (2015). The state of

public infrastructure-as-a-service cloud security. ACM Computing Surveys

(CSUR), 47(4), 68.

3. So, K. (2011). Cloud computing security issues and challenges. International

Journal of Computer Networks, 3(5), 247-55.

4. Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues.

Future Generation computer systems, 28(3), 583-592.

5. Rosenthal, A., Mork, P., Li, M. H., Stanford, J., Koester, D., & Reynolds, P.

(2010). Cloud computing: a new business paradigm for biomedical

information sharing. Journal of biomedical informatics, 43(2), 342-353.

6. Ercan, T. (2010). Effective use of cloud computing in educational institutions.

Procedia-Social and Behavioral Sciences, 2(2), 938-942.

7. Kumar, S., & Goudar, R. H. (2012). Cloud Computing-Research Issues,

Challenges, Architecture, Platforms and Applications: A Survey. International

Journal of Future Computer and Communication, 1(4), 356.

8. Pancholi, V. R., & Patel, B. P. (2016). Enhancement of cloud computing

security with secure data storage using AES. International Journal for

Innovative Research in Science and Technology, 2(9), 18-21.

9. Calero, J. M. A., & Aguado, J. G. (2015). Comparative analysis of

architectures for monitoring cloud computing infrastructures. Future

Generation Computer Systems, 47, 16-30.

10. Mayoral, A., Vilalta, R., Muñoz, R., Casellas, R., & Martínez, R. (2017). SDN

orchestration architectures and their integration with cloud computing

applications. Optical Switching and Networking, 26, 2-13.

MVSIT- Technoledge, July 2017, Vol.1, Issue 1

Page 26

Students’ perception on quality of Teaching: A case study of

technical institute in Haryana.

Taruna1, Preeti

2

1 Mahavir Swami Institute of Technology, Jagdishpur, Sonipat, India

[email protected]

2 Bhagwan Mahavir College of Engineering and Management, Jagdishpur, Sonipat,

India ,[email protected]

Abstract

It is important to have student’s feedback on the quality of education and perception

about the teaching faculty as with increasing technology, scenario is changing in the

academic institutes. It helps the institute to incorporate the advanced learning

objectives with the changing technologies. In this paper student’s feedback is

analyzed using traditional assessment and code analysis. In the study, ‘knowledge

base’ and ‘sincerity of the teacher’ are rated higher by the students whereas ‘interest

generation’ and ‘accessibility of the teachers’ are rated least.

Keywords: Quality of teaching, perception of students, feedback analysis.

Introduction

The quality of education and educators has always been responsible for the social

growth of any community. It is very important to have timely check on quality of

teaching in academic as well as technical institutions. Students’ feedback is an

adequate tool to analyze the same and has become an important aspect for the concern

of improvement of quality of education. The rating given by the students helps the

faculty members/teachers in self-assessment of his/her ability and consequently

enhances the eminence of teaching by inculcating the positive suggestions of students.

It is worth noting that the students must supply the truthful feedback so that it may

help in enriching the existing status of the faculty/teachers. The main purpose of

students feedback are to ‘help the administration in evaluating the effectiveness of

teaching’, ‘help students in course and instructor selection’, and ‘improve the

instructions to the teachers (Peter A. Cohen, 1980). Spanish universities used the peer

feedback system to analyze the effective implementation of ‘European Higher

Education Area’ (Ion et al. 2016). Nicol et al. (2006) emphasized on self-regulation in

learning and suggested it as a significant assessment practice. Proactive feedback is

also renowned as useful system that may help in improving students’ self-regulation

and their learning process (Carless et al. 2006; Boud et al. 2013). It is clear from the

contemporary literature that students’ learning is highly influenced by the approach of

teaching and that can be improved by taking feedback and suggestions of the students.

The format, precision and clarity may be the various aspects to be focused on while

extracting the responses of the students. The present study is an attempt to understand

the students’ perception about teachers by analyzing the feedback taken from the

students of a technical institute in Haryana.

Methodology The study is focused on a technical college in Haryana imparting Bachelor of

Technology degree in five different disciplines. The students of all five disciplines

MVSIT- Technoledge, July 2017, Vol.1, Issue 1

Page 27

having both male and female students were selected as source of population in the

current study. Data was collected using the feedback form, having 8 attributes as

shown in Table 1. Ample time was given to the students to fill up the feedback form.

The students have to fill marks for each grade, as shown in Table 2, for individual

attribute.

Table 1: Attributes of feedback

A1 Teacher’s knowledge base

A2 Sincerity and commitment

A3 Interest generation capability

A4 Communication skill

A5 Ability to integrate with other courses

A6 Ability to design quizzes, assignment, and projects

A7 Accessibility of the teacher in and out of the class

A8 Overall Rating

Table 2: Marks and grades for attributes

Very

Good Good Acceptable Poor Very poor

5 4 3 2 1

Results and Discussion

The student’s perception about various attributes of teaching has been analyzed and

presented through Pie-charts as shown in figure 1. It is clear from the analysis that

perception of more than 80% of the students towards all the studied attributes is up to

the mark. Teacher’s accessibility may be an area for improvement as 52% of the

students did not find it easy to approach their teacher inside and outside the

classroom. The knowledge base, sincerity and commitment of the teachers are found

to be most appreciated attributes as approximately 90% of the students are satisfied.

Another area to be focused on may be the interest generation capability of the teachers

which is otherwise a necessity of quality teaching. Moreover if the source is reliable,

negative feedback is always important and may be helpful in enhancing the quality of

teaching. 18% of the students are either saying ‘poor’ or ‘very poor’ for overall rating,

indicating that scope is always there to improve the things and efforts must be made

for the same. The average rating of each attribute has been determined and is shown

in Figure 2. It is observed that all the attributes are given with an average rating of

more than 3.5 on a scale of maximum 5, indicating satisfactory level of quality of

teaching. ‘Sincerity and Commitment’ of the teachers was ranked first with an

average rating of 3.98 followed by ‘teacher’s Knowledge Base’ with an average rating

of 3.91. ‘Accessibility of the teacher in and out of the class’ and ‘Interest generation

capability’ are found to have least average rating of 3.51and 3.58 respectively and are

suggested as the areas of improvement. The average rating of rest of the attributes is

somewhat satisfactory.

MVSIT- Technoledge, July 2017, Vol.1, Issue 1

Page 28

Figure 1: Students perception about various attributes

MVSIT- Technoledge, July 2017, Vol.1, Issue 1

Page 29

Figure 2: Average Ratings of attributes

Conclusions The present work is an attempt to study the perception of the students towards various

attributes to reveal the quality of teaching. The students are found to have scattered

opinion towards various attributes. The areas of improvement are identified through

the analysis of feedback of students. The overall rating for the quality of teaching

delivered to the students is found to be satisfactory.

References

1. Boud, D., & Molloy, E. (2013). Rethinking models of feedback for learning:

the challenge of design. Assessment & Evaluation in Higher Education, 38(6),

698-712.

2. Carless, D., Joughin, G., & Mok, M. (2006). Learning-oriented assessment:

principles and practice. Assessment and evaluation in Higher Education,

31(4), 395-398..

3. Cohen, P. A. (1980). Effectiveness of student-rating feedback for improving

college instruction: A meta-analysis of findings. Research in higher

education, 13(4), 321-341.

4. Cohen, P. A. (1980). Effectiveness of student-rating feedback for improving

college instruction: A meta-analysis of findings. Research in higher education,

13(4), 321-341.15.

5. McKeachie, W., & Svinicki, M. (2010). McKeachie's teaching tips: Strategies,

research, and theory for college and university teachers. Cengage Learning.

MVSIT- Technoledge, July 2017, Vol.1, Issue 1

Page 30

Guidelines to Contributors of MVSIT College Journal Technoledge

• Submissions: Writers are required to submit their articles electronically on the email-

id [email protected]

• Areas covered: Literature, poetry, technical, photography, art & craft, blog writing.

• Format: Authors are required to prepare their article as per following format.

• Template and Style Guide for Submissions • Title: The title of the article should be in Title Case (upper and lower case), centered

in Times New Roman, bold, font size 14 point. There should be a 2 point spacing

between the title and main content.

• Margins - Type within the dimensions of 1-inch (2.54 cm) margins top/bottom and

right and 1.5 inch left.

• Line Spacing - Single line spacing. No indentation.

• Justification - Full justification.

• Page Numbering - Pages are not to be numbered.

• Writer’s name: Writer’s name should be typed in Title Case, right aligned in Times

New Roman, bold, font size 12 point. All affiliations should follow the writers’ name

in italics,

font size 12 point. Each writer should indicate discipline, designation, branch, year &

semester (in case of student) and email address. Also include degrees or professional

titles

(e.g. Dr., Prof., etc).

• Body Text Formatting: Do not include headers, footers or page numbers.

The body text of the paper will contain headings, pictures, diagrams, tables, figures,

formulae

and other relevant information. The section headings should be Times New Roman

12 point

bold.

Body text should be in Times New Roman point 12 normal.

Equations should be centered and numbered consecutively with equation numbers in

parentheses flush with the right margin, as in (1).

E(t) = E0 exp(iωt) (1)

Figures. Figures (diagrams and photographs) and tables can be included anywhere in

the text other than the title, author list or affiliation list. Figures should be numbered

consecutively from Fig. 1 onwards. Tables should be numbered Table 1 onwards. The

captions are Times New Roman 12-point italic. Ensure figures and tables are within

the printable area of the page.

Contact: For further queries feel free to contact us on [email protected]

MVSIT- Technoledge, July 2017, Vol.1, Issue 1

Page 31

MAHAVIR SWAMI INSTITUTE OF TECHNOLOGY (Approved by AICTE & Af f i l ia ted to GGSIPU, New De lh i )

(Accred i ted 'A ' Grade by NAAC)

Jagdishpur, Near O.P. Jindal University, Sonipat, Delhi-NCR

Phone: +91-8607400784, +91-8607400783

Email: [email protected] Website: www.msitsnp.in