mvsit journal of science, technology & management · a. according to wheebox, (2016), only 1/3...
TRANSCRIPT
MVSIT Journal Of Science, Technology
& Management
Volume 1 , Issue 1 , July - 2017
Open Access e-Journal
MVSIT TECHNOLEDGEMVSIT TECHNOLEDGEMVSIT TECHNOLEDGEMVSIT TECHNOLEDGE MVSIT JOURNAL OF SCIENCE,
TECHNOLOGY & MANAGEMENT
A Jain Minority Institution
MVSIT- Technoledge, July 2017, Vol.1, Issue 1
Page 2
Editorial Team
Editor-in-Chief
Prof. Director Dr. Sanjay Kumar
MVSIT
Editor
Kavita Garg (A.P. Maths)
MVSIT
Member
Rajeev Kumar Gupta(A.P. ME)
MVSIT
Member
Bharti Seth(A.P. Maths)
MVSIT
Member
Monica Bazzad(A.P. ME)
MVSIT
Member
Divya Joshi( A. P. CSE)
BMCEM
Member
Samik Sharma(A.P. Civil)
MVSIT
MVSIT- Technoledge, July 2017, Vol.1, Issue 1
Page 3
Contents
Title of the Articles Page No
1 Developing A Framework For Measuring The Effectiveness Of Key
Employability Factors Of Engineering Graduates Of India
*Ms. Bharti Seth, **Mr. Sunny Seth, ***Mr. Sanjive Saxena
4-11
2. Criticism Of “ Shattered Dreams’’ , A Play By Ankit Tyagi
*Mr. Ankit Tyagi
12-13
3. Ipsec And SSL Virtual Private Network: Review
*Ms. Divya Joshi
14-16
4. Designing Uwb Compact Mimo Antenna
*Ms. Ruchika Doda
17-19
5. The Computing Approach Of Cloud Computing
*Dr. Shalini Goel
20-25
6. Students’ Perception On Quality Of Teaching: A Case Study Of
Technical Institute In Haryana.
*Ms.Taruna, **Ms.Preeti
26-29
MVSIT- Technoledge, July 2017, Vol.1, Issue 1
Page 4
Developing A Framework For Measuring The Effectiveness Of Key
Employability Factors of Engineering Graduates of India
Ms. Bharti Seth1, Mr. Sunny Seth
2, Mr. Sanjive Saxena
3,
1Faculty, Mahavir Swami Institute of Technology, Sonepat, India,
[email protected] 2Faculty, Jagan Institute of Management Studies, Near Rithala Metro Station, Rohini
Sec-5, New Delhi, [email protected] 3Faculty, Jagan Institute of Management Studies, Near Rithala Metro Station, Rohini
Sec-5, New Delhi, [email protected]
Abstract:
India is under the process of transformation in many facets and this transformation is
visible at several dimensions. Today we are witnessing the incorporation of new
policies as well as restructuring of existing ones so as to provide a conducive
environment to various investors in setting up of new ventures thereby providing
employment opportunities to several engineering graduates across the country.
However, despite the availability of large number of engineering graduates in India,
there is a general concern which had been making waves but of late, in this time of
recession, has shown a tendency to question on the quality of the education provided
by the engineering colleges, particularly average and below par engineering colleges.
The concern is related to the report of various government organizations and agencies
which point out that 90% of the engineering graduates are incompatible for being
employed in their relevant industry.
This paper is an attempt to develop a framework for measuring the effectiveness of
the key factors which will assist the colleges, especially average and below par
engineering colleges, in addressing the needs of the industry. The design of the paper
follows a structured approach. It starts with the basic terms and gradually develops the
framework, at the end an index is generated which will provide the measure of overall
attributes of the student.
Key Words: employability, engineering graduates, employment opportunities,
engineers.
Introduction
The business world of today is witnessing hyper competitiveness and complexity on
account of changes being visible at local, zonal, regional, national, global and
international levels. Several reasons can be attributed to the creation of this hyper
competitive environment. For example, the rate at which information technology is
being adopted at several decision making processes by applying the information
generated by the use of data analytics and data mining tools or by automating several
operational processes to improve the efficiency of the organization. All these
mechanisms generate hyper competitiveness and complexity.
However, as business processes are executed by human resources there is an equally
growing concern and this is related to the quality of employable human resources
produced by our engineering colleges, particularly average and below average
MVSIT- Technoledge, July 2017, Vol.1, Issue 1
Page 5
engineering colleges. For, with the privatization of education, India has witnessed a
large growth of engineering colleges, the consequence of which is the generation of
large number of engineering graduates who are easily available for employment.
However, despite the surplus availability of these graduates, somehow or the other,
the industry has found them to be unbefitting to meet the challenges and the demand
of today’s business world.
The following statistics present the scenario which exists in the country today:
a. According to Wheebox, (2016), only 1/3 of the students meet the criterion of
being employed by the employers in the market. This indicates that there
exists a huge gap demand the demand and supply and that our educational
institutions must upgrade their course structure or must increase the frequency
of contact with the industry so as to generate the product which can be termed
as employable by the job market.
b. Chakrabarty, Roshni (2016), in his study pertaining to engineering graduates,
concluded that 97% of the engineers want to take up software engineering jobs
including the core engineering functions. However, as per the study only 3%
of them possess have the necessary skills and aptitude to take up software
development as a career and further only 7% of them do possess the required
skills to take up core functional engineering jobs.
c. As cited by Chanda, Rupa (2014), “Our strength in the next few decades lies
in the availability of a vast youthful workforce. But we cannot simply rest with
this advantage of demography. The youth have to be suitably skilled to help
realize the demographic dividend.” - Hon. President Pranab Mukherjee
The analysis of the above statistics and findings reveal that an existence of a huge gap
between the demand of industry and the employable work force. India, despite the
existence of a large number of work force, needs to suitably develop measures and
mechanisms to ensure that the work force be well equipped with the necessary skills,
aptitude and the willingness to ensure that they are able to contribute to the growth of
the organization and hence the growth of the country.
In light of the above findings, authors have tried to address the above issues by
developing a conceptual framework which will measure the effectiveness of the key
factors to improve the employability of the engineering graduates who are said to be
ready for employment. The domain is restricted to average and below par engineering
colleges.
Literature Review
Mehta, Aashish (2015) in his study concluded that issues concerning skill gaps are
acting as constraints in the Indian manufacturing sector and that now it is becoming a
national priority. He further contended that in the Indian context, the skill gaps are a
result of conceptually weak foundations. According to him there are some industries
which are really suffering from skill gaps, there are others who are restricted by
commercial difficulties which can be overcome through restructuring the existing
policies rather than by skill development programs. He further concluded that the skill
gap which is being talked about everywhere is divided into two parts economic and
commercial skill gap and it is this gap which is responsible for creating this great
divide. In other words, there is a need to define accurately as to what the industry
looks for when the industry says that the employability readiness of the students from
MVSIT- Technoledge, July 2017, Vol.1, Issue 1
Page 6
the higher institutes is extremely low. According to the study, the employability
aspect or the skill gap which the industry refers to is a stage wherein what the
company is willing to pay for the work which it wants the employee to carry out. It
has got nothing to do with what the student has studied in college or university. If the
student is willing to work at the pay what is offered to him and is sufficiently able to
demonstrate the work assigned to him then there is no skill gap. In other words, the
student is found to be employable. Several studies are conducted to assess the skill
gap and the notable findings point out that students are required to be trained on
personality buildings requirements such as team work, communication and the like
(Chanda, Rupa (2014), Mehta, Mehta, Aashish (2015), Menaria, Deepak, (2013)).
Objective
The prime objective of this paper is to develop a conceptual framework which will
measure the effectiveness of the key factors to improve the employability of
engineering graduates.
Research & Design Methodology
The design of the paper follows a structured approach. It starts with the basic terms
which go into the framework and which are in line with the objective of the paper.
The key factors which go into the framework are identified based on the demands of
the industry as evident from the gaps identified in the literature review process and
interaction with industry experts. The effectiveness of these key factors is determined
on the basis of an index which is generated at the end.
Employability Defined
For the purpose of this paper, the word ‘employability’ is defined as the claim by the
student or an institute which assures to the employer that the student is able to
sufficiently demonstrate the skills, the application of the knowledge and any other
quality which is needed to ensure that the employer is satisfied with the performance
and therefore the employer is looking at long term association with the student as well
as the institute.
The analysis of the above definition reveals that when it comes to employability there
is something extra something beyond which the employer is looking at. In other
words, long term association is what the employer looks for and this requires on the
part of the student and the institute to prepare in addition to what is being taught in the
class.
Placement Defined
For the purpose of this paper, the word placement is defined as the beginning of a new
arena which involves the student to prove his worthiness for which he was employed
or offered employment at the end of the study.
The analysis of the above definition reveals that there is an intrinsic criterion which
was not revealed and that the student is required to find out that criterion and prove
his worth.
MVSIT- Technoledge, July 2017, Vol.1, Issue 1
Page 7
The process of generating the framework
Having scoped the terms employability and placement, let us now gyrate to the
process of defining the conceptual framework. The first step in defining the
framework is the identification of the core parameters which for which effectiveness
is required. Table 1 below, identifies these core parameters.
Parameter Definition Why this
parameter for
inclusion in the
criterion for
employability
Visible /
Demonstrable
indicators
Weight
age
Communic
ation skills
Communication
skills refers to the
means and
mechanism
required to
convey the ideas
or views so as to
achieve the
objective of
communication
such as brevity,
unambiguous,
legible and the
like
This is the main
parameter which
determines the
effectiveness and
efficiency with
which the person
is able to achieve
the objective of
communication.
Without an
efficient and
effective
communication
the objective of
the work assigned
to him remains
unfulfilled.
Reflection of
confidence,
brevity and
unambiguity in
giving
presentations,
writing memos,
email, drafting of
project reports
and the like
which conveys
the objective of
these indicators
for
communication
skills
35%
Initiative Willingness to
come forward and
take up the
responsibility to
undertake the task
This is another
core parameter
for determining
the efficiency and
effectiveness of
employability
factor. In the
absence of this
core parameter a
person is unable
to complete the
task as he
demonstrates to
be in the team
rather than be a
leader the team
and get the work
done
The visible
demonstrators
include the
aspects such as
questioning the
status quo as to
why a particular
method will
work or will not
work and what is
another
alternative and
the like.
15%
MVSIT- Technoledge, July 2017, Vol.1, Issue 1
Page 8
Analytics Analytics means
to unscramble the
current scenario
and work out a
feasible solution
based on the
findings
This core
parameter is one
of the necessary
component for
meeting
effectiveness and
efficiency of the
task. The business
world, requires
analytics or the
persons who are
capable of
unscrambling the
data or taking
stock of the
situation so as to
quickly determine
the feasible steps
to get the work
done
The
demonstrable
indicators
include number
crunching,
assessment of
the situation by
taking the clues
from the past
experiences and
learning and
using them with
the current
analysis trends to
lead to the
objective of the
work
20%
Planning Planning means
the steps which
will lead to the
desired objective
This is required
due to the fact
that in the
absence of the
plan the person is
rudderless. In
other words, more
time is wasted in
the absence of the
plan which the
delivery of the
task assigned to
him.
The
demonstrable
indicators
include the use
of checklists;
written
documents; notes
and the like
15%
Metrics Metrics are a
collection of
numbers or data
which assist the
individual in
taking stock of
the situation or
the task assigned
to him
This parameter is
required as it
provides the
necessary thrust
to demonstrate
the efficiency and
effectiveness of
the assigned
work. With
metrics in hand
the individual is
in the possession
of greater control
The
demonstrable
indicators
include the
aspects such as
usage of data in
presentation, in
email, in
conversation and
the like
15%
MVSIT- Technoledge, July 2017, Vol.1, Issue 1
Page 9
of time and the
work assigned to
him
Table 1: Core Parameters.
Note: Worth mentioning, the above parameters are not fixed, some more of them can
be included and correspondingly the weight-age can be allocated.
Having thus obtained the basic structure of framework, we can now deliberate on this
further supported by various concrete examples on each of these parameter and the
generation of an effectiveness index.
Effectiveness Index
Name of the
Student
Roll-Number Year Course
**** **** **** ****
Evaluated By: /
Verified by
**** Criterion : Project or assignment or
presentation or any other similar
evaluation technique/activity
Index **
Parameters Demonstrable
indicators
Rating out of
10 (1 being
lowest)
Remarks (to be given by
Evaluator / verifier after
going through informal
sessions / record verification
of several activities
Communica
tion
Reflection of
confidence, brevity
and un-ambiguity in
giving presentations,
drafting of project
reports and the like
5/10*
Lacks confidence and clarity
while expressing and
committed grammatical
errors. Need to improve a lot
Initiative Willingness to come
forward, questioning
the status quo as to
why a particular
method will work or
will not work and
what is another
alternative and the
like
9/10*
A good initiator has the
capability to start and take
things further.
Analytics Analyzing the
available information
and using analytical
skills to solve
7/10*
Should have demonstrated
more usage of analytical
skills. Can improve further
on this area
MVSIT- Technoledge, July 2017, Vol.1, Issue 1
Page 10
problems
Planning The plan for the new
project was
developed by taking
into consideration the
finer aspects of
planning such as
verification,
validation activities
and the like
8/10*
can improve on in-depth
insight of certain involved
activities
Metrics Several metrics were
used in the course of
the development of
various tasks. usage
of data in
presentation,
conversation and the
like
8/10*
Has shown to be quite
effective in the usage and
application of metrics as
demonstrated.
Effectiveness Index:
Index = ∑∑∑∑ weight-age * rating
Thus in the above sheet we have the following index
Index = (.35*5+.15*9+.2*7+.15*8+.15*8) = 1.75 + 1.39 + 1.4 + 1.2 + 1.2 = 6.94
Interpretation of an effective index
The value of 6.94 indicates that the effectiveness of candidate is to the tune of 69.4%.
This indicates that the candidate is sufficiently able to demonstrate the effectiveness
of the core parameters as required in the industry as well as the gaps which came out
during the literature review process. By carefully working on the soft skills or the
personality development skills which are highly sought after in the candidate as
depicted in the framework the skill gap can be reduced.
Limitations of the framework.
The limitation that came out in the framework is confined to the limitation in the
sense that the parameters included in the framework are the limited to 5 which form a
minimal set. These are required to be expanded further. For example, including the
parameter such as problem handling and resolving inter group conflicts can further
improve the utility of the framework.
Conclusion
The framework has provided a new insight into the aspect required for determining
the effectiveness of the key factors of employability of engineering graduates and can
help an institute to quantify the performance of each and every student pertaining to
MVSIT- Technoledge, July 2017, Vol.1, Issue 1
Page 11
the parameters responsible for employability and can further assist institutes in
reducing the skill gap by adopting effective improvement strategies to make their
students employable and industry ready.
References:
• Tripathi, S., Gautam, S., & Lal, A. (2017). Evolving Human Resource
Landscape of the Indian Retail Sector: Bridging the Skill-Gap. Prabandhan:
Indian Journal of Management, 10(2), 41-52.
• Singh, D. B., & Panwar, S. Study of Effects of Demonetization on the
Informal Economy of India.
• Khadria, B. (2001). Shifting paradigms of globalization: The twenty‐first
century transition towards generics in skilled migration from
India. International migration, 39(5), 45-71.
• Singh, D. B., & Panwar, S. Study of Effects of Demonetization on the
Informal Economy of India.
• Chatterjee, S., Nankervis, A., & Connell, J. (2014). Framing the emerging
talent crisis in India and China: A human capital perspective. South Asian
Journal of Human Resources Management, 1(1), 25-43.
MVSIT- Technoledge, July 2017, Vol.1, Issue 1
Page 12
Criticism of “ Shattered Dreams’’ , A play by Ankit Tyagi
Ankit Tyagi ,
Assistant Professor, Mahavir Swami Institute of Technology , Sonepat, India,
Abstract
Child Labor is a heinous social evil. It has been an international concern because it
ruins the future of children. The problem of child labor is a serious matter not only in
India but also in other developing countries. But sadly India is the home to the largest
number of child laborers of the world. Poverty and lack of social security are the main
causes of child labor. Shattered Dreams is a supercalifragilisticexpialidocious play
which appeals to abnegate and abolish child labor and child Abuse.
Key Words :
supercalifragilisticexpialidocious Floccinaucinihilipilification , Rudimentary ,plight
Child labor
Indian law says that any child below the age of 14 cannot be employed either in an
inn ,industry chamber or in a hotel. But the most excruciating thing is that Child
Labor is frequently utilized in India in various places of production and service.
Childhood is the most pleasant phase of one’s life during which an individual learns
rudimentary strategy of life from Guardians, pedagogues and dear ones but child labor
intervenes with the proper growth and development of children in all aspects like
mentally , physically, socially and intellectually.
We all are very much conscious about this social evil but still we never pay much
heed to it. As a responsible citizen it is our superintendence to raise our voice against
this social evil instead of accusing and counter accusing one another we must join
hands together to nullify this abominable and heinous evil.
Children are undoubtedly foresee and the future of a nation but yet there are millions
deprived waifs in our nation who don’t even know that “what is carefree childhood”.
We need to understand that child is meant to learn, not to earn. So, don’t ask children
to take tool instead send them to school.
Criticism of Shattered Dreams
“Shattered Dreams” is a fictional story. All the characters and events in this play are
Fictional. The crux of this play is to revolt against abominable social evils like child
labor and child abuse. Through this play I tried to reveal the miserable plight of
impecunious and down trodden children who are victims of child labor and child
abuse. The two protagonists of this play Montu and Lucky are constantly tormented
and walloped . They both have multitudinous aspirations and dreams but
MVSIT- Technoledge, July 2017, Vol.1, Issue 1
Page 13
unfortunately everything shattered under the burden of child labor. Both Montu and
Lucky are embodiment of all such children who are deprived of their childhood.
In this play Montu is unnecessarily walloped by munni. she is a child hunter and a
brutal lady. Her hard thrashing is adequate to add insult to injury in the deep wounds
of montu but the authentic companionship of his chum, Lucky made him a Rebel.
Fortunately, one day their luck favors them and they met few noble hearts like
Mahima and Mr Mahesh who helped them like an altruist. Their pathetic saga was
narrated on national Television by Mr. Mahesh and the ending brought twist in the
tale. Of course munni was exposed and the ending of this play seems delightful and an
act of justice but does it happens in real life?
Today, throughout the world, around 215 million children work. They do not go to
school and have no time to play. Many do not receive proper nutrition or care. They
are denied the chance to be children. More than fifty percent of them are exposed to
the worst forms of child labor such as work in hazardous environments, chemical
industries, drug trafficking and prostitution.
Child Abuse is also one of the major social evil. The most obvious effect of child
abuse is physical injury to the child. Kids who suffer repeated trauma feel isolated,
scared, worthless and unloved, which is exactly the opposite of how children should
feel. Child abuse can be in physical, emotional, sexual form. Every year millions of
children suffer from different type of child abuse. Most child abuse results from
attempt to punish or control the child. Abused children often feel shattered, void and
rude; with mental consequences that last eternally after the physical wounds have
healed.
Through this play I tried to reflect the most heinous evil of our society i.e. child labor
and child abuse which is flourishing day by day. I want my readers to raise their voice
against this heinous evil. I also foresee that this play will work as an eye-opener for at
least few of them who are unaffected by this social evil and who are not opposing it.
This entire play mocks at our unjust society which considers “ To be” more important
than “ To do”
At last I foresee that my readers will enjoy this play. It will be a sort of parable for
them.
References
1. https://www.educreation.in/store/ankit-tyagis-shattered-dreams-ankit-
tyagi.html
2. Author Page: https://www.educreation.in/author/ankittyagi/
MVSIT- Technoledge, July 2017, Vol.1, Issue 1
Page 14
IPsec and SSL Virtual Private Network: Review
Ms. Divya Joshi
Assistant Professor, Bhagwan Mahaveer College of Engineering & Management, Sonepat,
India, [email protected]
Abstract
Now are days in the era of security, deciding (VPN) is very brain storming work. VPN is
used for making connection among remote cells or users by a public set up, thereby providing
ad hoc access to mobile users. The goal of Virtual Private Network is to add security aspect in
the data exchange from the source to destination cells. It creates a private passage for sending
the data securely. IPSec and SSL are two important VPN technologies used today. These two
comprise of their self boons and bans. A comprehensive study has been presented. It explains
the detailed analysis and way it operates.
Keywords
Tunnel, Transport, Virtual Private Network (VPN), SSL, IPSec
1 Introduction
Virtual Private Network is a network of surfacing virtual circuits responsible for carrying
private traffic through public or non public networks . Private networks are made up of leased
lines from phone companies and Internet Service Provider.
2 IPSEC VPN
IPsec protocol developed under the guidance of IETF (Internet Engineering Task Force) in
November 1998. Network security and inter operability are the two features it provides. IPv4
and IPv6 are used for the working. IPsec provides confidentiality, integrity, encryption to
protect modification of data and unauthorized movement [1].
Encapsulating Security Payload (ESP), Internet Key Exchange (IKE) protocols
Authentication Header (AH).
2.1 Authentication Header (AH)
It is responsible for the provision of authentication, data integrity check and replay
protection, at the same time it does not provide confidentiality which will not encrypt data, so
it does not require encryption algorithm[3].
2.2 Encapsulation of security payload
It provides data authentication and confidentiality, integrity and source authentication.
Encryption is also provided by it. It translates any message which can be read into non
readable format for hiding . Decryption translates the message content from non readable type
to a readable. ESP uses symmetric encryption algorithms to provide data privacy. Packet
payload authentication provided by ESP.
MVSIT- Technoledge, July 2017, Vol.1, Issue 1
Page 15
Fig:1 Encryption
2.3 Internet Key Exchange (IKE)
IPSec[7] uses Internet Key Exchange (IKE) as the default protocol For determining
algorithms, keys and protolcols. It also authenticate the two parties. A security agreement
must be established between the two parties before exchanging the secured data. This
agreement is known as security association in which both the parties agree on how to protect
and exchange information.
3 SSL VPN
SSL (Secure Socket Layer) VPN is used with web browser. It is based on the SSL protocol
that provides encryption for http traffic and authentication. Real Time Protocol (RTP) traffic
secured using the SSL.SSL VPN gives remote users access to internal network connections,
client/server applications and web applications. Client-server communication is used by SSL.
The 3 protocols: Handshake protocol, record protocol and alert protocol are used.
3.1 SSL Protocols
During the handshake protocol, negotiation of encryption algorithm[2] takes place and server
authenticates itself to the client. For encryption, symmetric cryptography is used by SSL
whereas to negotiate the shared key asymmetric cryptography is used. In any record protocol,
client and server use the shared key to encrypt the data.
Table I
Distinction of IPSec And SSL
Parameter IPsec SSL
Connection Site to Site Remote Access Remote Access
Installation Requires Installation Of Client
VPN
No Installation Of Client
VPN
Gateway Location Gateway implemented on firewall Behind the firewall
Complexity Cost More Complex Less Complex
End Points Requires host based clients Thin Clients
Application Support IP based application Email
Layer it work Layer 3 Layer 4-7
MVSIT- Technoledge, July 2017, Vol.1, Issue 1
Page 16
4 CONCLUSION
Accessing the private data over the internet is complex[5]. Ideally, SSL and IPsec VPNs
should both be implemented as they serve different purposes and complement each other. The
deployment choices are clearer once the cost/benefit of each type of deployment is made in
mind, the problems were addressed. In our study we have found that studying the architecture
of the protocols, SSL VPN is suitable to site to site connections. In this, there is no need to
install the client software and provide the access to specific application rather than complete
network. If application is IP specific then IPSec VPNs are solution .
5 Conclusions and Future Scope
Cloud computing has emerged as a more economical technique for storage where data is in
massive quantity. It is visible that big organizations and enterprises will need substantial
space to store their enormous data. Cloud computing technique is even more effective if the
data to be saved, is needed for just a small period of time.
The future of Cloud computing is apparent to be very bright. This can be inferenced from the
number of software industries relying on this technology on an alarming rate. The areas on
which work can be done are the issues related to security and management of resources and
the reliability of the service provider.
References
1. Kajal, R., Saini D. & Grewal K.(2012). Virutal Private Network" International
Journal of Advanced Research in Computer Science & Sofware Engineering, 2 (10),
428-432.
2. Singh, P. K., & Singh, P. P. (2013). A Novel approach for the Analysis & Issues of
IPsec VPN. International Journal of Sciences and Research, 2(7), 187-89.
3. Wikipedia (www.en.wikipedia.org/wiki/IPsec).
4. Phifer, L. (2003). Tunnel Vission: Choosing a VPN-SSL VPN vs IPsec VPN.
5. (http://searchnetworking.techtarget.com/feature/IPsec-vs-SSL-VPNs-Understanding-
the-basics), 2014.
6. A. Sastry, IPsec VPN vs. SSL VPN: comparing respective VPN security
risks(http://searchsecurity.techtarget.com/tip/IPsec-VPN-vs-SSL-VPN-Comparing-
respective-VPN-security-risks), 2011
7. Akbar, I., & Shahzad, K. (2009). Security in Private Branch IP-Telephony Network
with QoS Demands.
8. The Government of the Hongkong Special Administrative Region,"VPN Security".
(2008) White Paper "Virtual Private Networks: Improving Network Security for a
diverse user community". (http://www.pdfio.net/k-7234709.html).
9. Phifer, L. (2003). Tunnel Vission: Choosing a VPN-SSL VPN vs IPsec VPN.
MVSIT- Technoledge, July 2017, Vol.1, Issue 1
Page 17
Designing Uwb Compact Mimo Antenna
Ms. Ruchika Doda
Assistant Professor, Mahavir Swami Institute of Technology, Sonepat, India,
Abstract
In this paper compact patch antenna is designed having ultra-wide band operating
frequency. The dimension of proposed antenna is 35mm to 40 mm and its operating
range of frequency is from 4.4 Ghz to 10.7 Ghz. for improving its performance fork
shape defected ground structure is used.
Keywords
UWB; MIMO; isolation; return loss; radiation pattern.
I. INTRODUCTION
For high data rate and low power consumption pulse radio are used which is also
known by the name of ultra wide band communication. UWB based antenna is mostly
used in indoor application like personal area network for wireless connections [4-5].
ITU-R defined UWB as the transmission in which the bandwidth of the emitted signal
exceeds the minimum of either 500 MHz or 20% of the center frequency. As
technology advances requirement of wideband increases so MIMO technology comes
into existence and it also have wide applications in wireless LAN [1-3].
II. ANTENNA DESIGN
MIMO based patch antenna is proposed for ultra wide band application. Geometry of
proposed antenna are:-
Material used: FR4
Thickness (h) = 1.6mm
Length(L) = 40 mm
Width (W) = 35 mm
Geometry of proposed antenna is shown in figure 1.
Fig.1. Proposed antenna design
MVSIT- Technoledge, July 2017, Vol.1, Issue 1
Page 18
III. PROPOSED ISOLATION MECHANISM
For reducing mutual coupling and for better isolation fork shape structure is used in
ground plane as shown in figure2.
Fig.2 Rear view of proposed antenna
IV. SIMULATION RESULTS
Proposed antenna is simulated using electromagnetic simulator IE3D. On the basis of
two basic characteristics i.e, return loss analysis for bandwidth characteristics and
radiation pattern analysis for radiation performance for proposed designed antenna is
analyzed.
(i) Bandwidth Characteristics
Return loss for proposed antenna is shown in figure 3. Simulated output shows that
antenna operating frequency bandwidth is from 4.4 GHz to 10.7 GHz. It clearly
indicates that proposed antenna have wider bandwidth of operation.
Fig.3 Return loss S11 and S22 for proposed antenna
MVSIT- Technoledge, July 2017, Vol.1, Issue 1
Page 19
(ii) Radiation Performance
Radiation pattern is simulated for operating frequency of proposed antenna i.e,
from 4.4 GHz to 10.7 GHz and selected frequencies are 5GHz, 7 GHz and 8 GHz.
Obtained radiation pattern is shown in figure 4.
Fig.4 Simulated radiation patterns x-y plane
V. CONCLUSION
Proposed antenna have the compact geometry of 35 mm to 40 mm and its return loss
shows wider frequency band also its radiation pattern shows its better performance at
frequency from 4 GHz to 11 GHz. The result satisfies the requirement of designing of
compact ultra wide band antenna. It can be used for practical application in WLAN or
PAN.
References
1. Ssorin, V., Artemenko, A., Sevastyanov, A., & Maslennikov, R. (2012, October).
Compact planar inverted-F antenna system for MIMO USB dongle operating in
2.5—2.7 GHz band. In Microwave Conference (EuMC), 2012 42nd European (pp.
408-411). IEEE..
2. Khan, M. U., & Sharawi, M. S. (2013, March). A compact 8-element MIMO
antenna system for 802.11 ac WLAN applications. In Antenna Technology
(IWAT), 2013 International Workshop on (pp. 91-94). IEEE.
3. Sato, H., Hayashi, T., Koyanagi, Y., & Morishita, H. (2006, November). Small
array antenna for 2x2 MIMO terminal using folded loop antenna. In Antennas
and Propagation, 2006. EuCAP 2006. First European Conference on (pp. 1-5).
IEEE.
4. Balanis, C.A. Antenna Theory, John Wiley & Sons, Pg. 722-784, Inc., 1997.
5. Wong, Kin-Lu, Compact and Broadband Microstrip Antennas, John Wiley &
Sons, pg. 22-26, Inc.2002.
MVSIT- Technoledge, July 2017, Vol.1, Issue 1
Page 20
The Computing Approach of Cloud Computing
Dr. Shalini Goel
Professor, Bhagwan Mahaveer College of Engineering & Management, Sonepat,
India, [email protected]
Abstract
The current educational establishments are seeking opportunities to manage their
resources in the most efficient manner. Cloud computing has appeared as a boon to
the world of software and technology for the reason of providing solutions to the
cash-deficit educational institutes and software industries. It is empowering the
economy by presenting immense benefit to the institutes and industries through its
flexibility and pay-as-you-use cost structure. The computing approach present in the
paper is dependent on a number of technologies that already exist in the market.
These include the Internet, web services, virtualization and grid computing, etc. This
technique of cloud computing is not completely new. It was existing earlier in 1990s
too when few companies, known as Application Software Providers (ASPs) were
offering software programs as a service to the large business organizations with the
help of the Internet [1]. This was not effective due to low bandwidth and high
Internet charges. But later on, around 2009, this approach was replaced by the
technique of cloud computing. I have presented the basic ideas about it in this paper.
Keywords
Cloud, Software Application, Internet, Virtualization, Grid computing, App
1 Introduction
Cloud computing has emerged as the latest technology that is drastically changing the
old and traditional ways of planning, designing, managing and deployment of the
software to the diversified users. The use of cloud computing is growing, since its
birth. By year 2016, this growth had risen marvelously. It is expected that most of the
large enterprises will have private cloud or a more advanced version of the cloud by
the end of year 2017.Gartner has described, Cloud Computing as an approach in
which services of software and hardware are provided to the users with the help of
Internet and Web technologies. The present technologies that support this approach
include the Internet, the World Wide Web, Grid Computing and Virtualization, etc
[1,2].
The need of Cloud Computing has arisen due to many aspects. Overloading of data
centers of large companies and enterprises is the main reason for the requirement of
this technology. The other aspects are the immense usage of broadband and
networking. Further, the affordable and low prices for storing data and massive
enhancements in networking technologies have helped Cloud Computing to grow
invariably. Cloud computing has opened a new horizon in the field of information
transferring and communication, thereby increasing focus on other crucial issues like
their planning, designing and realization.
MVSIT- Technoledge, July 2017, Vol.1, Issue 1
Page 21
2 Architecture
Based on the service models offered by it, the cloud can be categorized in various
ways. The main focus of cloud is towards Service Orientation. Cloud does not provide
a packaged solution; rather it provides solutions as a service. Thus, the end users do
not have to invest money on large scales systems and servers, etc. The architecture of
cloud consists of four layers (figure 1).
Software as a Service (SaaS)
Platform as a Service (PaaS) )
Infrastructure as a Service (IaaS)
Figure 1: Architecture of Cloud computing
• Application: It manages business applications and resources like multimedia
and web services, etc.
• Platform: It manages the software framework of the cloud .It may include
various software languages and platforms like Java, Python and dotNet, etc.
• Infrastructure: It manages the storage system of the cloud and the whole
application.
• Hardware: It manages the CPU, memory, hard disk and bandwidth, etc.
3 Types of Cloud Computing Techniques
The Cloud has been categorized in three main categories. These are Software as a
Service (SaaS), platform as a Service (PaaS) and Infrastructure as a Service (IaaS) [3].
Business Applications,
Multimedia, Web services
Application
Software Framework (Java,
Python/.NET)
Platform
Storage
Infrastructure
CPU, Memory, Harddisk,
Bandwidth
Hardware
MVSIT- Technoledge, July 2017, Vol.1, Issue 1
Page 22
SaaS is considered to be highly optimized but less flexible. On the other hand, IaaS is
highly flexible but less optimized. PaaS falls in the middle of the two models[4].
3.1 SaaS
In this category, the Software as a Service forms the apex of the hierarchy. Here, the
users have an application or software hosted as service to them. The architecture of
Cloud is modular as compared to other server hosting applications [4,5]. The layers in
SaaS are much independent of each other. Therefore, a layer can evolve on its own
without affecting other layers. The vendors and the service providers host the
applications which are made available to the customers with the help of a network,
i.e., the Internet.
3.1.1 Key features of SaaS
• Monitoring: The App developer can easily monitor how the users are
interacting with his application. This helps where real- time analysis and
statistics are required or the performance issues needed to be identified.
• Ease of Use and Low Complexity: The applications and tools based on SaaS
are easier to be used by the people using it, namely the management and the
operating employees. They can achieve efficient optimization of the
performance of the apps. The Internet and the mobile phones provide an easy
access to the SaaS apps.
• Low cost: The users do not need to buy the software and install them at their
end. SaaS provides the subscription of the software on rental basis, thereby
reducing the cost of buying and installing them.
• Scalability: The SaaS-enabled apps are highly scalable, which means that,
they can be easily extended if there is any requirement of new software or
servers. The vendors provide the end-users the updates and the upgrades of the
software, thereby saving their time and effort.
• Security: The data of an enterprise or a company remain secure as it is stored
on the cloud, from where it can be easily retrieved anytime. So, in case of any
loss or emergency, the data could be simply attained from the servers.
• Availability: The application is available 24 by 7 without failure.
• 3.2 PaaS
Platform as a service (PaaS) forms the second layer in the hierarchy of Cloud
computing. In these apps, the cloud supplier makes the hardware and software
tools available to the users. These hardware and software tools are mostly
required by the users for the application development[4,5]t. The advantage of
this technique is that the users do not require installing in-house hardware and
software on their own infrastructure to develop or run a new application.
MVSIT- Technoledge, July 2017, Vol.1, Issue 1
Page 23
F
igure 2: Management in SaaS, PaaS and IaaS
3.2.1 Key features of PaaS
• Highly Standardized: It provides highly standardized and automated
provisioning of prefixed workloads.
• Scalability: It shall be highly scalable and shall provide rapid allocation and
de-allocation of resources with a pay-as-you-use model
• Low expenditure: It requires low investment as the users do not require
installing the hardware and software.
• Reduced lead times: It helps in reducing the lead times with on-demand
availability of resources.
• Self-service: It follows the concept of self-service, thereby reducing the
administration costs.
• Reduced cost of hiring manpower: The cost of hiring skilled manpower is
reduced.
• Ability to add new users: New users can be added quickly.
3.3 IaaS
Infrastructure as a service (IaaS) forms the third layer in the hierarchy of Cloud
computing. It makes computing software and resources available virtually on the
Internet. In IaaS applications, an intermediately party hosts the software and the other
resources on the part of its users [4,5,6,7]. The IaaS providers handle the various tasks
including backup, system maintenance and resiliency planning of the applications.
The advantage of IaaS is that it offers highly scalable resources which can be adjusted
MVSIT- Technoledge, July 2017, Vol.1, Issue 1
Page 24
and made available on-demand. As a result, IaaS is highly suitable for workloads that
are temporary, changeable, or experimental.
3.3.1 Key features of IaaS
Efficiency: It is an efficient technique that reduces both the operating expenses and
the capital expenses. This is possible because of improvement in resource utilization
and administrator-to-server ratio.
Fast Service: It provides fast service and saves market time. It is made possible due
to the efficiency of the applications.
Low Cost: The user has to pay based on the usage of the IaaS application, so the costs
remain lesser as compare to other conventional services.
Easy Monitoring: IaaS provides synchronized checking of the applications, along
with the automatic execution of managerial activities.
Improved Visibility: It provides greater visibility of business and improves system
performance by identifying the redundancies and bottle necks.
4 Current Scenario
Today there are many large software industries that are working on the technology of
Cloud computing [Table 1]. Few examples of these are Google, Amazon, Microsoft,
Sun Microsystems and Solaris, etc [8,9]. Depending on the type of requirement, they
make decision about which category of Cloud computing technique should be used
for the planning, designing and deployment of the software applications [10].
Table 1: Various companies using Cloud computing
5 Conclusions and Future Scope
Cloud computing has emerged as a more economical technique for storage where data
is in massive quantity. It is visible that big organizations and enterprises will need
MVSIT- Technoledge, July 2017, Vol.1, Issue 1
Page 25
substantial space to store their enormous data. Cloud computing technique is even
more effective if the data to be saved, is needed for just a small period of time.
The future of Cloud computing is apparent to be very bright. This can be inferenced
from the number of software industries relying on this technology on an alarming rate.
The areas on which work can be done are the issues related to security and
management of resources and the reliability of the service provider.
6 References
1. Sultan, N. (2010). Cloud computing for education: A new dawn?.
International Journal of Information Management, 30(2), 109-116.
2. Huang, W., Ganjali, A., Kim, B. H., Oh, S., & Lie, D. (2015). The state of
public infrastructure-as-a-service cloud security. ACM Computing Surveys
(CSUR), 47(4), 68.
3. So, K. (2011). Cloud computing security issues and challenges. International
Journal of Computer Networks, 3(5), 247-55.
4. Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues.
Future Generation computer systems, 28(3), 583-592.
5. Rosenthal, A., Mork, P., Li, M. H., Stanford, J., Koester, D., & Reynolds, P.
(2010). Cloud computing: a new business paradigm for biomedical
information sharing. Journal of biomedical informatics, 43(2), 342-353.
6. Ercan, T. (2010). Effective use of cloud computing in educational institutions.
Procedia-Social and Behavioral Sciences, 2(2), 938-942.
7. Kumar, S., & Goudar, R. H. (2012). Cloud Computing-Research Issues,
Challenges, Architecture, Platforms and Applications: A Survey. International
Journal of Future Computer and Communication, 1(4), 356.
8. Pancholi, V. R., & Patel, B. P. (2016). Enhancement of cloud computing
security with secure data storage using AES. International Journal for
Innovative Research in Science and Technology, 2(9), 18-21.
9. Calero, J. M. A., & Aguado, J. G. (2015). Comparative analysis of
architectures for monitoring cloud computing infrastructures. Future
Generation Computer Systems, 47, 16-30.
10. Mayoral, A., Vilalta, R., Muñoz, R., Casellas, R., & Martínez, R. (2017). SDN
orchestration architectures and their integration with cloud computing
applications. Optical Switching and Networking, 26, 2-13.
MVSIT- Technoledge, July 2017, Vol.1, Issue 1
Page 26
Students’ perception on quality of Teaching: A case study of
technical institute in Haryana.
Taruna1, Preeti
2
1 Mahavir Swami Institute of Technology, Jagdishpur, Sonipat, India
2 Bhagwan Mahavir College of Engineering and Management, Jagdishpur, Sonipat,
India ,[email protected]
Abstract
It is important to have student’s feedback on the quality of education and perception
about the teaching faculty as with increasing technology, scenario is changing in the
academic institutes. It helps the institute to incorporate the advanced learning
objectives with the changing technologies. In this paper student’s feedback is
analyzed using traditional assessment and code analysis. In the study, ‘knowledge
base’ and ‘sincerity of the teacher’ are rated higher by the students whereas ‘interest
generation’ and ‘accessibility of the teachers’ are rated least.
Keywords: Quality of teaching, perception of students, feedback analysis.
Introduction
The quality of education and educators has always been responsible for the social
growth of any community. It is very important to have timely check on quality of
teaching in academic as well as technical institutions. Students’ feedback is an
adequate tool to analyze the same and has become an important aspect for the concern
of improvement of quality of education. The rating given by the students helps the
faculty members/teachers in self-assessment of his/her ability and consequently
enhances the eminence of teaching by inculcating the positive suggestions of students.
It is worth noting that the students must supply the truthful feedback so that it may
help in enriching the existing status of the faculty/teachers. The main purpose of
students feedback are to ‘help the administration in evaluating the effectiveness of
teaching’, ‘help students in course and instructor selection’, and ‘improve the
instructions to the teachers (Peter A. Cohen, 1980). Spanish universities used the peer
feedback system to analyze the effective implementation of ‘European Higher
Education Area’ (Ion et al. 2016). Nicol et al. (2006) emphasized on self-regulation in
learning and suggested it as a significant assessment practice. Proactive feedback is
also renowned as useful system that may help in improving students’ self-regulation
and their learning process (Carless et al. 2006; Boud et al. 2013). It is clear from the
contemporary literature that students’ learning is highly influenced by the approach of
teaching and that can be improved by taking feedback and suggestions of the students.
The format, precision and clarity may be the various aspects to be focused on while
extracting the responses of the students. The present study is an attempt to understand
the students’ perception about teachers by analyzing the feedback taken from the
students of a technical institute in Haryana.
Methodology The study is focused on a technical college in Haryana imparting Bachelor of
Technology degree in five different disciplines. The students of all five disciplines
MVSIT- Technoledge, July 2017, Vol.1, Issue 1
Page 27
having both male and female students were selected as source of population in the
current study. Data was collected using the feedback form, having 8 attributes as
shown in Table 1. Ample time was given to the students to fill up the feedback form.
The students have to fill marks for each grade, as shown in Table 2, for individual
attribute.
Table 1: Attributes of feedback
A1 Teacher’s knowledge base
A2 Sincerity and commitment
A3 Interest generation capability
A4 Communication skill
A5 Ability to integrate with other courses
A6 Ability to design quizzes, assignment, and projects
A7 Accessibility of the teacher in and out of the class
A8 Overall Rating
Table 2: Marks and grades for attributes
Very
Good Good Acceptable Poor Very poor
5 4 3 2 1
Results and Discussion
The student’s perception about various attributes of teaching has been analyzed and
presented through Pie-charts as shown in figure 1. It is clear from the analysis that
perception of more than 80% of the students towards all the studied attributes is up to
the mark. Teacher’s accessibility may be an area for improvement as 52% of the
students did not find it easy to approach their teacher inside and outside the
classroom. The knowledge base, sincerity and commitment of the teachers are found
to be most appreciated attributes as approximately 90% of the students are satisfied.
Another area to be focused on may be the interest generation capability of the teachers
which is otherwise a necessity of quality teaching. Moreover if the source is reliable,
negative feedback is always important and may be helpful in enhancing the quality of
teaching. 18% of the students are either saying ‘poor’ or ‘very poor’ for overall rating,
indicating that scope is always there to improve the things and efforts must be made
for the same. The average rating of each attribute has been determined and is shown
in Figure 2. It is observed that all the attributes are given with an average rating of
more than 3.5 on a scale of maximum 5, indicating satisfactory level of quality of
teaching. ‘Sincerity and Commitment’ of the teachers was ranked first with an
average rating of 3.98 followed by ‘teacher’s Knowledge Base’ with an average rating
of 3.91. ‘Accessibility of the teacher in and out of the class’ and ‘Interest generation
capability’ are found to have least average rating of 3.51and 3.58 respectively and are
suggested as the areas of improvement. The average rating of rest of the attributes is
somewhat satisfactory.
MVSIT- Technoledge, July 2017, Vol.1, Issue 1
Page 28
Figure 1: Students perception about various attributes
MVSIT- Technoledge, July 2017, Vol.1, Issue 1
Page 29
Figure 2: Average Ratings of attributes
Conclusions The present work is an attempt to study the perception of the students towards various
attributes to reveal the quality of teaching. The students are found to have scattered
opinion towards various attributes. The areas of improvement are identified through
the analysis of feedback of students. The overall rating for the quality of teaching
delivered to the students is found to be satisfactory.
References
1. Boud, D., & Molloy, E. (2013). Rethinking models of feedback for learning:
the challenge of design. Assessment & Evaluation in Higher Education, 38(6),
698-712.
2. Carless, D., Joughin, G., & Mok, M. (2006). Learning-oriented assessment:
principles and practice. Assessment and evaluation in Higher Education,
31(4), 395-398..
3. Cohen, P. A. (1980). Effectiveness of student-rating feedback for improving
college instruction: A meta-analysis of findings. Research in higher
education, 13(4), 321-341.
4. Cohen, P. A. (1980). Effectiveness of student-rating feedback for improving
college instruction: A meta-analysis of findings. Research in higher education,
13(4), 321-341.15.
5. McKeachie, W., & Svinicki, M. (2010). McKeachie's teaching tips: Strategies,
research, and theory for college and university teachers. Cengage Learning.
MVSIT- Technoledge, July 2017, Vol.1, Issue 1
Page 30
Guidelines to Contributors of MVSIT College Journal Technoledge
• Submissions: Writers are required to submit their articles electronically on the email-
• Areas covered: Literature, poetry, technical, photography, art & craft, blog writing.
• Format: Authors are required to prepare their article as per following format.
• Template and Style Guide for Submissions • Title: The title of the article should be in Title Case (upper and lower case), centered
in Times New Roman, bold, font size 14 point. There should be a 2 point spacing
between the title and main content.
• Margins - Type within the dimensions of 1-inch (2.54 cm) margins top/bottom and
right and 1.5 inch left.
• Line Spacing - Single line spacing. No indentation.
• Justification - Full justification.
• Page Numbering - Pages are not to be numbered.
• Writer’s name: Writer’s name should be typed in Title Case, right aligned in Times
New Roman, bold, font size 12 point. All affiliations should follow the writers’ name
in italics,
font size 12 point. Each writer should indicate discipline, designation, branch, year &
semester (in case of student) and email address. Also include degrees or professional
titles
(e.g. Dr., Prof., etc).
• Body Text Formatting: Do not include headers, footers or page numbers.
The body text of the paper will contain headings, pictures, diagrams, tables, figures,
formulae
and other relevant information. The section headings should be Times New Roman
12 point
bold.
Body text should be in Times New Roman point 12 normal.
Equations should be centered and numbered consecutively with equation numbers in
parentheses flush with the right margin, as in (1).
E(t) = E0 exp(iωt) (1)
Figures. Figures (diagrams and photographs) and tables can be included anywhere in
the text other than the title, author list or affiliation list. Figures should be numbered
consecutively from Fig. 1 onwards. Tables should be numbered Table 1 onwards. The
captions are Times New Roman 12-point italic. Ensure figures and tables are within
the printable area of the page.
Contact: For further queries feel free to contact us on [email protected]
MVSIT- Technoledge, July 2017, Vol.1, Issue 1
Page 31
MAHAVIR SWAMI INSTITUTE OF TECHNOLOGY (Approved by AICTE & Af f i l ia ted to GGSIPU, New De lh i )
(Accred i ted 'A ' Grade by NAAC)
Jagdishpur, Near O.P. Jindal University, Sonipat, Delhi-NCR
Phone: +91-8607400784, +91-8607400783
Email: [email protected] Website: www.msitsnp.in