Previous Volumes


Dr. Rekha S. Patil (Ph.D.)
  • Principal at J. J. Mugdum College of Engineering Jaysingpur, Kolhapur

Prof. D. N. Kyatanavar

  • SRES College of Engineering Kopargaon

Assistant Prof. M. S. Patil

  • SRES' College of Engineering Kopargaon


The cellular concept is a major breakthrough in solving the problem of spectral congestion. It increases system capacity by providing the possibility of frequency reuse. The demand for higher capacity and better service quality in wireless mobile communication systems has been increasing exponentially in the last decade. Code division multiple access CDMA cellular systems provide higher capacity, better quality of service QOS, and higher data transfer rates. CDMA systems offer many benefits that make them more bandwidth efficient than FDMA and TDMA systems. Signals from different mobile stations propagate through different radio channels and undergo different multipath effects before arriving at base station. A well-defined transmission power control is essential for proper functioning of CDMA systems. In the absence of power control, capacity of CDMA systems is very low. With a proper power control it is possible to prolong the mobile battery life. In this article we take the overview of power control techniques in CDMA cellular mobile communication systems.


Ajay Raut
  • MBA (Networks and IT Infrastructure) Batch 2004-06


For many Internet applications, the ability to protect the identity of participants in distributed applications is critical. Traffic analysis of the Network can infer who is talking to whom over a public network. For such applications, a number of anonymous communication systems have been realized over the recent years. The effectiveness of these systems relies greatly on the way messages are routed among the participants. It is difficult to design a system that provides anonymity for delay-sensitive services such as Web browsing. Existing systems are either not resistant against sophisticated attacks or they achieve their level of anonymity at the cost of a high bandwidth overhead. Designing mix-networks for low-latency applications that offer acceptable performance and provide good resistance against attacks without introducing too much over-head is very difficult. In this paper, I analyzed the Onion routing network by implementing Onion Routing Node in Public environment and compared the performance of Onion routing network with other Anonymous Networks. Also for the different types of attacks on Anonymous network, the response of onion routing is discussed with some recommendations to make these attacks difficult.

Ashish Verma
  • MBA (Network and IT Infrastructure Batch 2005-07), Shreyansh Saroha

Shreyansh Saroha

  • MBA (Network and IT Infrastructure,Batch 2005-07)


As IT departments and the communications industry move to a single converged voice and data network solution, the demand on the network to provide specific service levels increases. This demand for higher and differentiated service levels for certain applications has created a need for a reliable and scalable Quality of Service (QoS) model in the network. Prior to the introduction of Voice over IP (VoIP) into a production network, the environment must be equipped to support the reliable transport of voice and a solid end-to-end voice quality plan must be defined and in place.

Typical demands on the network when supporting voice are continuous uptime (99.999%) and consistently low deviations in latency (jitter). As a real-time application, VoIP is far more sensitive to latency, jitter, and packet loss than standard data applications as users have no tolerance for garbled or broken speech. VoIP continues to be compared to traditional telephony in terms of voice quality and reliability as this is the level of service quality to which most users are accustomed.

To support diverse transmission requirements of multi-media applications QOS should be provided in the internet, however the Internet is still working on best effort services. IETF has provided two models for providing QOS on the Internet i.e. IntServ, DiffServ. IntServ model is rarely deployed due to its heavy resource utilization as it reserves the resources end to end for providing QOS. However DiffServ model can be used to provide low latency, guaranteed service to critical network traffic such as voice and video while providing simple best effort traffic guarantees to non critical service such as web traffic. Our research work will mainly focus on testing the implementation of multi-media applications using signaling protocols like SIP, H.323, etc in IP networks. We will deploy test bed based on Internet routing architecture using protocols like BGP4 for Inter Domain Routing, OSPF for Intra Domain Routing and QOS based on DiffServ model.

Anupam Maheshwari
  • MBA (Software Development and Management, Batch 2005-07)


The objective of this research is to focus on a specific domain of writing secure codes, i.e. for the web-applications. Further, it deals with writing code to protect your web applications against phishing - a type of e-mail scam designed to steal your identity.

Deepmala Agarwa
  • MBA (Software Development and Management, Batch 2005-07)


In this research paper, I will tell you about component technology and why it is useful in system architecture. Then we will look at java Beans, a way to implement component technology to see what feature of bean API provide. We will finish with a preview of a regular series of article that will explain how the new core API work with and with in beans and how to use the java beans API to create your own software components. This research paper will help one understand why and when to go for component technology against object oriented technology. And hence how to use java beans in implementing component technology.

Next we will study and understand the concept of component technology.

The usage of java Beans, EJB to implement component technology.

We will take up an issue catering to evaluation of component over objects and try to find its solution.

Rashmi Sinha
  • MBA (Software Development and Management, Batch 2005-07)


This project provides a structured process for developing a better quality application server platform that makes the new features of Java EE .5 available faster than ever before while maintaining the most important feature of Java EE - compatibility. It is the response to Java developers who want access to the source code and want to contribute to the development of Sun's next generation application server. This project is designed to encourage communication between Sun engineers and the community and will enable all developers to participate in Sun's application server development process.

Upma Sharma
  • MBA (Systems, Batch 2005-07


Control Objectives for Information and related Technology (COBIT) is an IT governance framework and supporting toolset that allows managers to bridge the gap between control requirements, technical issues and business risks. To aid organizations in successfully meeting today business challenges, the IT Governance Institute (ITGI) has published version 4.0 of COBIT.

COBIT enables clear policy development and good practice for IT control throughout organizations. IT Governance Institute latest version- COBIT 4.0-emphasizes regulatory compliance, helps organizations to increase the value attained from IT, enables alignment and simplifies implementation of the COBIT framework.

While the COBIT guidelines have been around since 1996, the guidelines and best practices have almost become the de facto standard for auditors and SOX compliance, mostly because the COBIT standards are platform independent. While using the framework provided, each company will need to customize the approach to its own size and complexity. A multinational, multidivisional organization is different from a single factory domestic company.

When reviewing and applying the COBIT guidelines and best practices, they need to be tailored to the particular environment.

The aim of this RD is to study the COBIT framework, its application in various domains and to come up with the best practices and guidelines for its application

Kandukuri Subbarao
  • MBA (SYSTEMS, Batch 2005-07)


Over time, the foreign exchange market has been an invisible hand that guides the sale of goods, services and raw materials on every corner of the globe. The forex market was created by necessity. Traders, bankers, investors, importers and exporters recognized the benefits of hedging risk, or speculating for profit. The fascination with this market comes from its sheer size, complexity and almost limitless reach of influence.

However at the same time there are many inherent risks surrounding this market. The most important of all these risks is the Exchange Risk. The main objectives of this Research would be to cover the following areas of FOREX:

  • Factors determining long-term currency market trends.
  • Factors with an immediate impact on exchange rates.
  • Principles of foreign exchange dealings.
  • Types of foreign exchange trading.
  • Problems involved in the foreign exchange market.

Solutions for the identified problems.

Nishant Kumar Agarwal
  • MBA (Systems, Batch 2005-07)


Organizations continue to face the pressures of constantly changing market demands, increasing regulatory requirements, fiercer competition, sluggish economies and the need to do more with less. BI software helps businesses face those challenges with query-and-reporting capabilities to help process and utilize strategically the vast amounts of data collected across enterprises. The biggest hurdle is choosing the right Business Intelligence solution and successfully implementing it.

This report looks at the various Business Intelligence tools and software available in the market and provides a comparative study of them.


  • The research would first involve the study of Business Intelligence as a knowledge domain and the required features in a software package that would facilitate its implementation.
  • Then a study of different BI Applications available in the market.
  • After that a comparative study based on the above gathered information.

Eventually the report would contain a few suggestions on how to select a BI application that suits organization needs.

Yogesh Arora
  • MBA (IT Business Management, Batch 2005-07)


Regulation is often regarded as among the key challenges facing the banking industry today. Despite ongoing concerns about the bugbear of regulation and the subsequent costs imposed on the financial industry, it is universally acknowledged that regulation is essential in today world. Some drivers for regulations include the rise of global terror links, accounting scandals and other operational issues.

The Sarbanes Oxley Act of 2002, signed into law on july 30 2002 is one of the most significant changes ever legislated to US Federal Securities law. It was motivated by the never ending waves of corporate financial scandals. One of the most significant provisions within the SOX is the criminal and civil penalties that place executive management and the Board of Directors.

SOX require a new level of corporate governance and accountability.

Pankaj Dhawan
  • MBA (IT Business Management, Batch 2005-07)


Enterprise resource planning (ERP) and customer relationship management (CRM) are transactional systems that contain a wealth of information that can improve businesses financial and operational performance. The key to maximizing the value of this information is to provide broad, timely and easy access to it by decision-makers .

Business Intelligence is a set of concepts and methodologies to improve decision-making in business through use of facts or fact-based systems. The ultimate objective of business intelligence is to improve the timeliness and quality of information.

It acts as an on-line indicator of business trends and ratios. It gives a greater customer insight by providing fact based segmentation and also giving Campaign success analysis. It leads to greater profitability by resource optimization, identification of most profitable customers and reducing the defect ratio.

This report looks at How Business Intelligence can help an organization and then explores some of the tools that can be used to do so along with a comparative study of a few of them. This research also aims at finding out how organizations choose a particular business intelligence tool. Also discussing how business intelligence helps in making investment or financial decisions.