0% found this document useful (0 votes)
11 views

Proof 2016

Uploaded by

amit gupta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

Proof 2016

Uploaded by

amit gupta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Inter nati onal Research Jburnal of Comput er Science ( RCS) ISSN: 2393-9842

Issue 03, Volume 3 (March 201 6) www.irics.com

A Framework for Evaluating Personal Behavioural1


Interviews
Prabhat Verma
CSE Department, Harcourt Burler Technological Institute,

AbstractPersonal Interview is the integral part of recruitment process which is carried out
to judge the suitability of
the candidate's behavioural attributes to the offering post. In this paper,
propose a we
that can be helpful
Jramework
in the selection processes like SSB interviews
conducted Jor Defense Services in ndia. The idea is to
perceive the
nonverbal communications from the candidate by the psychologist observer and transfer l code these observations in
the Jorm of a signal wavefom
on a
compuler in real time though real time ploter (data visualization). The waveform
is synchronized
with real clock time. This signal is
analyzed using a computation model that compules the value Jor
behaviouul variable on a point scale 0-10 Jor the overall assessment
behaviounul perspective Jor the selection/
of the Tnterviewee Jrom psychological and
hiring purpose. The Jrameworkoffers a simple and elegant solution to
objective assessment of overall personality of a candidae. The
the proposed framework can be easily customized as per
requirements and set policy. This work is the Jirst of its kind Jor it demonstrales a novel
processing in the Jield of behavioural assessment. application of signal
Keywords-Signal Processing; Belhaviour Science;
Tool for Personal Interview; Behaviour Coding; Behavioural
Variable

I. INTRODUCTION

Psychological and
behavioural interview is of
prime importance in certain services like defense since the
interview is to select candidates with a objective of
specific set of attributes. Unlike
psychological and behavioural interviews pose greater subjective, knowledge based interviews,
assessment is based challenges in assessment of the candidate. In
on how
nicely, the candidate has given answers to the interview, subjective
Psychological and behavioural interview the
candidate is asSessed
posed and how
many questions
are correct. In
interview. In other words, during each fraction of second for the duration of the
behavioural interviews is a
subjective interviews are assessed using some discrete
continuous process. Each and process whereas the asSsessment of
Such assessments. Assessments are every moment of the interview duration s
like his face generally based on behavioural attributes of candidate as equally mportant in
expression, body language. gesture, eye contacts, confidence in evident from various
inputs
on, the
psychological expert keeps observing the candidate for communications etc. As the interview
these inputs, an overall behavioural inputs from him / her and on goes
assessment of the candidate is made. the basis of
his mind each and But now the
every observation from question is, will the
observer be able to keeP in
assessment? A computer assisted tool can be start to end of the interview session to
the candidate behaviOur much incorporate
helpful in such cases as the observer can use its them in the overall
in exact GUI to plot or mark
performance of the candidate. chronological order. This coded
intormation can be used to
compute the overall
Efforts have been made to assess face expressions, emotions, gesture, body
techniques separately. But when it comes
overall assessment
to language etc.
using image processing
point of view, it becomes of an interviewee from
very difficult to integrate these psychological
techniques themselves and they are not full
in techniques achieve a workable solution as and behavioural
to
the purpose. proof and robust. As a result, there is a they are complex
wide gap in the
It is a well known working tools for
fact that
there
are certain tasksS
computational tasks can be better
handled by
where human
beings
excel
computers computes than by human. Contrary to
capabilities perfomm
to this category of tasks is the e-g perception, cognitive tasks etc. this,
to be
handled. Scientists have been concern of Artificial Providing the computers
question is, have we optimized our continuously trying to empower computers with Intelligence.
Such tasks are
complex and difficult
flip side, have we computers for tasks of earlier this type of
capabilities.
The
optimized capabilities category which
in
beings before subletting ourthey excel to human beings? On the
our
which "they are not fit? as human
'This paper tries to
division between the two based explore such issues also in its designated tasks to computers for
on their
primary capabilities. approach by maintaining
a fine
balance in work
SSB (Services
Selection Board) test
defense personnel. The process is reckoned as
personal interview in SSB selection one of the toughest
test in the world
Interviewing Officer ((0). The 10 process is the for the
selection of
psychological written test, already has on his hands psychological
candidate's filled self assessment of candidate
Thus, the job of lO is group task, individual tasks with by the
description
form,
candidate to judge his just cross check the candidate by comments before the candidate is called inside results of
to

communications during the personality.Besides, the candidate also triggering


some
questions
and get the
the room.
communication that can exposes some of his responses from the
be
interpreted by a personality
psychologist expert.
facets
through non verbal
IRCS: Im pact Factor Value.S
2014-16, IR.CS AII Rights Scientific burnal High Im
-

Reserved pact Factor value for 2015=2.023


Page 11
Applications (0975-8887)
International Journal of Computer
Volume 136- No.11, Febuary 2016

Security and Privacy in E-Healthcare Monitoring with


WBAN: A Critical Review
Anurag Tewari Prabhat verma
Computer Science and Engg.
Computer Science and Engg. Department, PSIT
Department, Harcourt Butler Technological
College of Engineering, Kanpur,
Institute, Kanpur, Uttar Pradesh,India
Uttar Pradesh, India

As Science and Technology has been evolved to create a

ABSTRACT
In the curent scenario Wreless Body Area network (WBAN Duman ike means a machine wnich canthis
machine sense. think
technical
ana benave more or less
ike a numan. Durnng
has made its prominEnt placeamong a aavancement creation of artificlal but intelligent sensing
advancements to mprove numal healSnce vDN u a System (sensols)
s
tne most promnent and chalenging
wireless technique tor communication, it has vaiouS posiave nvention. These sensors have also attempted to bridge he gap

& striking featuresSuch as s naeE nteraction. At the present time


Derween uman and machine
unobtrusiveness, mobility and cOst enecaveness e Since last ecade these sensorS are unllzed in tue ields or
WBANS àre exremey essennal ror peopie w EVEE in two major äreas- MEdical and Non-Medical.
numan socety
diseases. For example Heart paients. pregman o
Tnese
These sensing
sensing devices (sensors) and their interconnected
mentaly ChallengeE s worna
On the one nand, is working asa as a
m to hehave interactively Dur in
observation. Thus, WBAN, arangee er as sensor networks. Due to
termed
virtual safeguard for its users. distrnbured e technoloay these sensor
WBAN, on the other hand. exploits Wireless media during S invendonO netwOS d
lass sensor networks (WSNS).
also ueve AS
realization. All the constraints specially related to insecurity mt evervwhere along with its all narura
(openness) have als0 been elaborated here. since health u ose ears
related information is tremendously cruclal and conadenual conditions Similarly WSNS etc.)
sensoi in different envionlE
are also evolved to behave.
and also liable to the patient s life. Theretore, we need to take
TOUD of sensors are dedicated for the wel
Care ot mechanisms appiled to WBANS to overcome all the cOLg a hodv and its network is called as wu eless
issues and drawbacks related to securiy and pnvalc DeDouy Aled Network (\WBAN).
This paper focuses on varnous llmitations ànd their poSS1Dle
solutions avallable within wBANS In order to proviae secure In below igure Fig.l layer LI contains a user (human-Deing)
in L2
and private intormation management to Its dependents and
ailong win many as
sens01S (encircled s) atached. layer
to collect different
users. persondlSeve gateway device exists
dtd Sensed by sensOrs LI. In layer L3 Intemet based
USer wiu
General Terms clouds/ services exist .This L3 layer also connecis
Sensors, Safety Mechanisms, Wireless Body Area Network. hospital/medical help by healthcare based cloud.
Tne man cOntibunon or less tnis paper 1s to draw attendon
ywords towards most sensittve and explored and less soIved area
WBANS. Security. Privacy, Healthcare. Sensors, Features, f WBAN technology- Information secunty ana data privat
of physiological knowledge of patient and user. This review
Applications, Cloud Computing.
per provides collected infornmation from few important
1. INTRODUCTION researches. sulvey & review papers 0n WSN, (Weless
Medical Sensor Network) WMSN&WBAN Over a pen1od or
curent scenario or technological advancement 1s the duty
it
In or
Or numans to aevelop &provide Detter re-style to àll numan- 2011 to 2014. Here all the applications, featüres, limitaious
WBAN Systems along with thelr ruture resear n possiDIides
Delngs nEspecave or thelr age, gender or geographical Overed and disclosed. This paper is structured in to 6
1S well known and true
1ocation. AS HEALTH IS WEALTH
1orever. S0 taking care or sickness sensive people While sections.I section contalns distingushed reatures or
WBANs. In section I few latest applicanons are ascuss
witnout disturDing tnem trom thelr regular routines is must. In
technically ancient era or communication only wired media Section IV elaborates Requirement and necessiy u
was present. It lacked mobility &required big expense related and Privacy aspects against possinle attacks Witn NDN
to maintenance of large cables. Now everything in Section V provides an analyuc viEw O E e
has become wireless same 1s true applied to preseve sec y pvy
Communication technology
for healthcare systems also. Finally section vi conciudes tms reviEw
previous Sectos along win ruue poSSIDIndes
te make
WBAN secure, private as well as enclent.

1
International Journal of Recent
Technology and Engineering (JRTE)
ISSN: 2277-3878,Volume-8, Issue-2S6, July 2019
1
Automated Estimation of Predictive Object
Points Metric Values for
Object-Oriented code
Vijay Yadav, VibhashYadav, Raghuraj Singh

Abstract: If
improve" [6]. Inside the logical fields, together with building
we are to
improve
the O0 software
quality we estimation is viewed as one of the
quantities of diagnostic
develop, we must measure our designs by well-defined standards.
Possible problems in our
apparatus and depends on a huge collection of information
system designs
can be delected during planned up over hundreds of years. [1]. [2].
the development process. If we are to estimate and
manage our
The
efforts, we must prologue to
programming framework measurements
measure our progress enecive with
object-oriented coding scheme is, in some ways, incompatible Anaccompanied work move from a
conventional to production
service
ancient metrics. To measure
the size of software system, a programming framework designing environment
ofechnigues for code development estimation exist ike variey
SLOC 12]. Moving from estimations to measurements resembles
and Function Point, SLOC, as a metric has a moving from perception to comprehension 8]. They offer an
drawbackS one Is SLO, number
of
IS not consistent acros5 languages, 1naicadon or tne advancement that a task has made and
applications, or developing environments, however, it cannot furthermore the nature of the plan. Measurements are
applied on object-oriented code. The efforts required to develop markers and encourage in
the code is being calculated
using the making information driven
POP) metric. This counting techniquePredictive
is
Object Point decisions in time [11].
Function Point Technique. This paper addresssupported
the way ofbyeffort
the By the execution of O0 paradigm, the analysts changed and
approved the conventional measurements in principle or
calculation for object oriented code using
POP accurately, an automated tool has POP.
been To
developed the
measure and experimentally. Measuring and unpredictability
designed. The results of the tools has also been discussed in the measurements were the most amazing commitments for size
paper and effort estimation in OO
setting (7].
Most methodologies for assessing effort need an estimation
Index Terms: Code Estimation Technique, Software Tools, of the size of the software
System Metric Tools, Object-Oriented Metrics, Predictive Object system. Once a size estimate is
accessible, models that depicts size to the effort will be
Point Metric, Automation, and improvement.
utilized [14].
I. INTRODUCTION TO SOFTWARE METRIC AND
IL. DESCRIPTION OF POP METRIC
MEASUREMENT
Metrics thought to be used for both i.e. to search out Mickiewicz proposed POP metric in 1998. Price
Systems
anomalies and to
measure the progress of the software 3) has built up the predictive Object point (POP) metric for
development, the metrics can be considered as tips and not as anticipating the effort requiredfor building up an
the rules. object-oriented programming framework. POPs are implied
The metrics will facilitate to support the required motivation as an improvement over FPs, that was initially intended to be
in software system development method [11]. The Metric is utilized among procedural frameworks, by illustration on
claimed to be as a standard of the estimation process. Used to understood measurements identified with
judge the features of the measured software system, like
an
object-oriented
framework [9]. It had been structured explicitly for an
development size and effort, complexity, quality in an Object-oriented programming framework and result from the
efficient manner. Measuring the incorrect factor serves no estimation of the object-oriented properties of the
purpose. framework. It satisfied most of the components of Oo ideas
Most of the people would agree that source Lines of code and depended on the calculation
(SLOC) have very little or no meaning, because of variation procedure of function point
(FP) procedure [3].
in types of language, code complexity, and reuse. We have a
tendency to should concentrate on what we are trying to
A. What metrics include in POP code Sizing Metric?
attain, we want as little code as necessary to fulfill our
With the use of the Object-Oriented Paradigm, the
functional necessities. This could lead to low price and
researchers changed and valid the standard metrics on
development time for that function [10]. paper
or through empirical observation (3]. The following metrics
Estimation is thought of as the mapping from the
are involved in object-oriented framework in POP Count:
experimental world to the recognized, relational world. It's
the quantity or symbol distributed to an element by this Number of top-level classes (TLC), Average number
mapping strategy to describe a trait [20]. weighted methods per class (AWMC), Average depth of
Measurements are identified with upgrades. The worldview inheritance tree (ADIT), and Average number of children
per
ended up being "in the event that you can't quantify, you can't base class(ANOC) [16]. AWMC, ADIT, and ANOC are
assembled from the MOOSE metrics suite [15].
Revised Manuscript Received on July 22, 2019. nd Enginee
Vijay Yadav, C.S.E, A.K.T.U, Lucknow, India.
VibhashYadav, LT, R.E.C, Banda, India.
Raghuraj Singh, C.S.E , HB.T.U, Kanpur, India.

Published By: jo jeuno


IJRTE
Retrieval Nuumber: B116507825619/19OBEIESP
DOI:10.35940/ijrte. B1165.07825619 886
Blue Eyes Intelligence Engineering nor euo
ww.ijte.org
&Sciences Publication Exploring Innovation
UREAS vOLUME 6, 1SSUE 2 (February, 2016) (ISSN 2249-3905)
International lournal of Researchin Engineeringand Applied Sciences (IMPACT FACTOR-5.981) 1
Study on Empirical Review ofEnergy Optimization in Heterogeneous WSN

Dr. K.P. Yadav,

KCC ITM, Greater Noida

Firoj Parwej,
R/S Singhania University, Pacheri Beri

Prof. R.L. Godara,

HNGU, Patan

Poonam Yadav',

R/S Singhania University, Pacheri Beri

Dr. R. Singh5

KNIT Sultanpur

1. Introduction

In wireless sensor networks energy consumption is a key issue for the


sensor lifetime and accuracy of information transmitted and
received. Protocols and mechanisms have been proposed for
energy optimization considering various communication factors
and types of applications. Conserving energy and optimizing
energy consumption are challenges in wireless sensor networks,
requiring energy-adaptive protocols, self-organization, and
balanced forwarding mechanisms. This research will compare
energy models and make a Novel proposal on the best approach
for energy optimization particularly in heterogeneous wireless
networks that may lack continuous network connectivity.
A wireless sensor network (WSNs) are composed of self-organized wireless ad hoc networks which
comprises a large number of spatially distributed small sensors nodes (so called motes). Sensor
nodes are small computers with extremely basic functionality. They monitor's physical or
environmental conditions, such as temperature, humidity, sound, light, vibration, pressure, motion
or pollutants and it cooperatively transmit the data to a Base Station [2].

International Journal of Research in Engineering & Applied Sciences 173


Email:- [email protected], http://www.euroasiapub.org
ISSN (Print): 2279-0063
International Association of Scientific Innovation and Research (IASIR)
(An Assocation Unifying the Sciences, Engineering, and Applied Research) ISSN (Online): 2279-0071

International Journal of Software and Web Sciences (JSWS)


www.iasir.net

A Hierarchical Model for Reliability Estimation of Mobile Agent based


Systems
Kumar Mishra, Raghuraj Singh, "Vibhash Yadav
Prashant
Department of Computer Science & Engineering
Krishna Institute of Technology, Kanpur, INDIA
Director, Kamla Nehru Institute Sultanpur, INDIA
of Technology,
Director, Krishna Institute of Technology. Kanpur, INDIA

Abstract: Mobile Agent based Systems (MAS) is one of the emerging areas for application development in
recent past. To ensure fault and failure free operation of MAS based commercial applications, reliability issues
need to be addressed. This research paper describes a hierarchical model for reliability estimation of Mobile
Agent based Systems. Different factors and their attributes aftecting reliability of MAS have been listed and
aggregated as per developed model. The model relates MAS reliability factor such as security to reliability
attributes such as confidentiality, availability, integrity of agents. The quantitative assessment of reliability
factors has been done based on analysis of the data collected from literature survey. The relationship from
reliability factors to reliability attributes has been determined in accordance with their impact and significance.
Various reliability factors have been used to develop an equation by empirically formulating the reliability of
MAS. Main aim of our hierarchical model for reliability estimation of Mobile Agent based Systems is to develop
a proper lormulation for the estinmation of reliability in terms of the reliability factors.
Keywords: Mobile Agents; MAS; MANET; Reliability; Reliability Model; Reliability Factors and Atributes;
Reliability Estimation: Reliabilityindicator
L Introduction
Reliability is still a vague and multifaceted concept, which means different things to different people. The way we
measure reliability depends on the viewpoint we take. The direct assessment of reliability is very difficult.
Therefore, in order to better quantify reliability, researchers have developed indirect models that attempt to
measure reliability by using a set of reliability factors and their attributes.
With increasing use of MAS based commercial applications, demand of highly reliable MAS continues to
intensify. MAS must ensure consistent and fault free operation every time they are used.
Various MAS reliability estimation models have been developed to quantify likelihood of MAS failure. Most of
these models are based on MAS failure observations made during test or operation. However, in certain cases, it
will be impossible to observe an adequate number of failures. Reliability models developed so far have mainly
aggregated certain combinations of attributes that do not present the real picture. For example, one of the models
calculates reliability of MAS by taking the long term average of mean number of mobile agents in the system that
successfuly completed their tours with respect to status of communication network. Another model considers a
trust-enhanced security environment to calculate the overall reliability of system. It gives us a direction that
Overall reliability of MAS should not be assessed on the basis of a few attributes/parameters only. But, a complete
list of attributes must first be exhaustively identified and then overall reliability of system must be assessed using
an appropriate approach.
Our Hierarchical Model for Reliability Estimation of Mobile Agent based Systems defines the overall reliability
assessment process through a hierarchical structure consisting of reliability factors, reliability attributes and
reliability metrics at different levels of hierarchy and aggregating them starting with the bottom most level and
gradually proceeding to the top most level have been used for the assessment and allocation of reliability of MAS.

IL Model Development
Reliability of MAS is categorized according to three different componernts of MAS ie. mobile agent, mobile
agent host and communication channel as shown in figure 1.
Figure 1 Distribution of Reliability of MAS

Rellability of Mobile Agent


based Systems

Reliablity of Moblle Rellabilty of Moblle Rellability of


Agent Host
Agent Communcation
hanner

JSWS 16-117; 0 2016, USWS All Rights Reserved Page 10

You might also like