scispace - formally typeset
Search or ask a question

Showing papers in "International journal of emerging trends in science and technology in 2015"


Journal Article
TL;DR: The system model and security model in the scheme are described and the design goals and related assumptions are provided and it is assumed that the cloud infrastructures are more reliable and powerful than personal computers.
Abstract: In this research paper, we will describe the system model and security model in our scheme and provide our design goals and related assumptions. We consider a cloud computing environment consisting of a cloud service provider (CSP), a data owner, and many users. The CSP maintains cloud infrastructures, which pool the bandwidth, storage space, and CPU power of many cloud servers to provide 24/7 services. We assume that the cloud infrastructures are more reliable and powerful than personal computers. In our system, the CSP mainly provides two services: data storage and re-encryption. After obtaining the encrypted data from the data owner, the CSP will store the data on several cloud servers, which can be chosen by the consistent hash function, where the input of the consistent hash function is the key of the data, and the outputs of the consistent hash function are the IDs of the servers that store the data. On receiving a data access request from a user, the CSP will re-encrypt the cipher text based on its own time, and return the re-encrypted cipher text.

53 citations


Journal Article
TL;DR: The importance of pharmacovigilance among various health care professionals and some methods to increase its awareness are enlightened.
Abstract: According to WHO, pharmacovigilance is defined as “science and activities relating to detection, assessment, understanding and prevention of adverse effects or any other drug related problem .[1] WHO defines "Adverse Effect" as “any undesirable or unintended consequence of drug administration” [2] . The term Side Effect is often used synonymously but it precisely means unintended additional action of a drug which may even be therapeutically useful. There is no drug without some or other adverse effect .It may develop either immediately or after prolonged use or even after stoppage of drug. Adverse effects are sometimes very rare. Even then, they play an important role in determining the therapeutic use of the drug. It has been estimated that ADRs are responsible for death for nearly 50 out of every 1000 patients admitted to hospitals & cause nearly 5-7% of all hospital admissions.[3].The job of recording & studying these adverse effects is done by pharmacovigilance committee. Unfortunately, In India not all the clinicians & healthcare professionals are aware of this term and its importance. This article enlightens the importance of pharmacovigilance among various health care professionals and some methods to increase its awareness. Keywords— pharmacovigilance (PhV), adverse drug reactions(ADRs), side effects

51 citations


Journal Article
TL;DR: The author describes to engage the student’s within groups through e-learning techniques to observe how the technique helps learners in learning a module or subject.
Abstract: Learning styles are growing fast as the technology growth in the world. New techniques are forthcoming within the higher education system to get better the student’s presentation, tutors philosophy and the institution enlargement. ICT the Information and Communication Technology innovates the new technologies to conversing the information and knowledge to having a different transform for teachers to teach and for students to learn. This paper is mainly focused on a study to determine the impact of student learning based on group-based learning and the importance of this methodology. The author describes to engage the student’s within groups through e-learning techniques to observe how the technique helps learners in learning a module or subject. Number of surveys is conducted among the students and the staff members concerning the impact of Group-Based learning and e-Learning. Keywords : Learning styles, Information and Communication Technology, Group-Based learning, e-Learning.

27 citations


Journal Article
TL;DR: This research was written with the basic computer user and information system manager in mind, explaining the concepts needed to read through the hype in the marketplace.
Abstract: Network Security & Cryptography is a complicated and Historically only tackled by Well-trained and experienced experts. How ever as more and more people become “wired”, an increasing number of people need to understand the basics of security in a networked world. This research was written with the basic computer user and information system manager in mind, explaining the concepts needed to read through the hype in the marketplace. The hackers and virus writers try to attack the internet and computers connected to the Internet. The Network Security and Cryptography applications is rapidly becoming crucial to the development of the internet. The open systems interconnection security architecture provides a systematic framework for defining security attacks, mechanisms, and services.

17 citations


Journal Article
TL;DR: A critical look at various prevailing IT transformation practices and the key factors that lead to optimum business IT alignment is taken.
Abstract: Transformation is the creation and change of a whole new form, function or structure. IT transformation means a significant change of organization’s IT systems with an aim to achieve a state of alignment of IT strategy with business strategy. IT transformation of an organization from its legacy environment to the next generation of technology is one of the most complex and expensive changes an organization can undergo.The objective of IT transformation is to build more efficient enterprise architecture and transform the IT organization into an effective business partner. It  is a process that results in a dynamic state of business IT alignment. There are many reasons why organizations should align IT with Business, like cost reduction, productivity enhancement, implementation of new business strategies or to gain competitive edge etc. A number of case studies have also shown how significant cost and performance efficiencies were achieved by organizations through business IT alignment (BITA).Numerous studies, research papers and articles available in the public domain suggest that business IT alignment has remained a perennial problem for the industry with no standard solution. This study takes a critical look at various prevailing IT transformation practices and the key factors that lead to optimum business IT alignment. A survey was carried out to incorporate viewpoints of professionals from the Indian industry. Keywords: IT transformation, IT strategy, business IT alignment (BITA), perennial problem, IT practitioners and consultants

7 citations


Journal Article
TL;DR: A collaborative filtering based recommender system is proposed which uses unstructured data to handle the large amount of data relevant to the services and assist a user in selecting a service which is most relevant.
Abstract: There has been an increase in the number of services available in the internet .Datasets are growing at a fast pace as it is being gathered and generated by a number of devices like smartphones, tablets and various information sensing devices. Traditional data processing methods are ineffective in handling such a huge amount of data related to services within limited time constraints. Most of the present day recommendation systems use structured data. In order to handle the large amount of data relevant to the services and assist a user in selecting a service which is most relevant a collaborative filtering based recommender system is proposed which uses unstructured data. There are three stages in this method. In the first stage porters stemming algorithm is applied ,then clustering is applied on the data, in order to reduce the number of services, in the last stage a filtering approach is used in order to recommend relevant services to the user. As stemming and clustering are applied before filtering recommendations are done at a faster pace. Keywords: stemming, clustering, collaborative filtering, pearson coefficient, recommender system.

7 citations


Journal ArticleDOI
TL;DR: A fully-functional embedded device has been proposed which is able to stream or transmit audio in real-time over Wi-Fi (IEEE 802.11) and it supports live audio streaming.
Abstract: With increasing demands of Electronics products in the domain of the industrial & Consumer application, it becomes necessary to come up with new ideas of electronic products. In the field of communication, present real-time communication audio transmission uses technologies like WiMax, IEEE 802.11, 3G and Bluetooth. But audio-streaming through Bluetooth or radio waves have drawbacks of range and not secure as intruders can get streamed feed. In this paper a fully-functional embedded device has been proposed which is able to stream or transmit audio in real-time over Wi-Fi (IEEE 802.11). This system uses a small credit card sized single board called Raspberry Pi, display, webcam, Wi-Fi and headphone/speakers. This system is a standalone system and does not require any single PC to take or receive the data from camera and headphone/MIC and send to another user. Operating speed of this platform is in 700MHz and it supports live audio streaming. As it has onboard Audio codec, it is possible to connect to user by just accessing the IP address of another user. SSH (Secure SHell) is used for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked nodes. Open source Linux based OS is used to keep the cost low. Â

6 citations


Journal Article
TL;DR: Some insights into biotechnological development of mushroom production in the world are reviewed in this paper, where the authors identify opportunities such as increasing consumption capabilities with the increase in world population and to take advantage of this by promoting the consumption of mushrooms.
Abstract: There are At least 12000 species of fungi that can be considered as mushrooms with at least 2000 species showing various degrees of edibility. To date, only about 35 mushrooms species have been cultivated commercially, and about 20 are currently on an industrial scale. The majority of these cultivated species are both edible and posses certain medicinal properties [6]. Mushrooms are in prime focus in the food industry for their multi-functional benefits. They are gaining popularity owing to their high nutritional values and are gradually approaching a “super food” status. Mushrooms are a rich source of proteins and have very low or zero fat and cholesterol, and hence are widely accepted in most of the regions of the world. Increase in the consumption of processed food across the world is one of the major driving factors of the mushroom market. Being a promising and profitable business, mushroom cultivation is widely adopted by growers. Factors such as R&D and innovations to enhance the acceptability and continuous improving technologies to increase mushroom shelf-life are also projected to drive the mushroom market in the next five years. Technological developments in the mushroom industry in general have witnessed increasing production capacities, innovations in cultivation technologies, improvements to final mushroom goods, and utilization of mushrooms' natural qualities for environmental benefits, mainly due to contributions from developing countries such as China, India, and Vietnam. However, there is always the need to maintain current trends and to continue to seek out new opportunities. The challenge is to recognize opportunities such as increasing consumption capabilities with the increase in world population and to take advantage of this by promoting the consumption of mushrooms. Those countries, in which mushroom cultivation is not yet well established, will find difficulty to cope with the new competitive circumstances generated by globalisation. Some insights into biotechnological development of mushroom production in the world are reviewed in this paper.

6 citations


Journal Article
TL;DR: In this paper, the authors address the A-TIG welding, and their significance and advantages, and propose a method to increase the joint penetration and weld depth-width ratio, thereby reducing angular distortion of the weldment.
Abstract: Austenitic stainless steels are widely used in the application of aircraft engine parts, heat exchangers, furnace parts etc. It contains both chromium and nickel. Nickel and chromium aids stability of austenite over wide range of temperatures and high corrosion resistance respectively. 316L austenitic stainless steel is low carbon (0.03%) steel, developed from 316 austenitic stainless steel and contains carbon (0.08%). The causes of decreased contents of carbon, minimizes the problem of harmful carbide precipitation during welding. Activated Tungsten Inert Gas (A-TIG) welding can increase the joint penetration and weld depth-width ratio, thereby reducing angular distortion of the weldment. This paper address the A-TIG welding, and their significance & advantages. Keywords: 316L austenitic stainless steel, A- TIG welding and Marangoni convection, Arc Constriction Effect.

6 citations


Journal Article
TL;DR: Today, as the developing of hardware of mobile is getting better, the performance index is much higher than the actual requirements of the software configuration Phone's features more depend on software.
Abstract: Today, as the developing of hardware of mobile is getting better, the performance index is much higher than the actual requirements of the software configuration Phone's features more depend on software. As the Android operating system is getting more popular, the application based on Android SDK attracts much more attention. Android is a Linux-based operating system for mobile devices such as smart phones and tablet computers. It is developed by the Open Handset Alliance, led by Google, and other companies. In addition to their support for voice and text exchange, smart phones are capable of executing sophisticated embedded software applications, as well as provide a simple link to the Internet and its resources. Keywords: Android, SDK, Linux, Open Handset, Smart Phones, Embedded

5 citations


Journal Article
TL;DR: Two different famous life cycle models like-waterfall model & incremental model are compared, which are very important for developing the software in a systematic manner such that it will be delivered within the time deadline and should also have proper quality.
Abstract: Software development life cycle or SDLC for short is a methodology for designing, building, and maintaining information and industrial systems. There are various SDLC models widely used for developing software. SDLC models give a theoretical guide line about development of the software. Software Development Life Cycle (SDLC) methodologies are mechanisms to assure that software meet established requirements. These methodologies impose various degrees of discipline to the software development process with the goal of making the process more efficient and predictable. SDLC models are very important for developing the software in a systematic manner such that it will be delivered within the time deadline and should also have proper quality. Each SDLC has its advantages and disadvantages according to which we decide which model should be implemented under which conditions. In the present scenario all software systems are imperfect because they cannot be built with mathematical or physical certainty. According SDLC each and every model has the advantage and drawbacks. The concept of system lifecycle models came into existence that emphasized on the need to follow some structured approach towards building new or improved system. For this we need to compare SDLC models. In this paper we will compare two different famous life cycle models like-waterfall model & incremental model. Keywords: Increment model, waterfall model, Software engineering, Software process model and Softwar e

Journal Article
TL;DR: Education regarding fire safety and awareness discouraging dowry demands should be instilled amongst the common mass and dedicated burn units should be made functioning with detection and treatment of infections to reduce mortality.
Abstract: Introduction: High mortality in young married women from burns is an alarming problem in our country. Materials and Methods: All medico-legal autopsies of burn cases of married women which were performed between January 2014 and June 2015 were analyzed with respect to age, religion, community and region distribution, years of marriage, educational status, inflammable substance used, body surface area which was involved, the cause of death and manner of death. Results: The maximum number of the victims (37.96%) belonged to the age group of 21 to 30 years. Majority of the victims were Hindus (70.37%).Most of them were non-tribal women (81.94%). 73.14% hailed from rural areas. Most of the victims (57.40%) were within 7 years of marriage. A majority of the victims were illiterate (45.37%). Kerosene oil was used in majority of cases (99.53%). Most of the incident took place in kitchen (83.33%). In 75.46 % cases, more than 80% of the body surface area was involved. Shock was the cause of majority of deaths (65.74%), followed by Septicaemia (28.7%). The manner of death in 81.94% cases was suicidal followed by accidental (16.2%) and homicidal (1.85%). Discussion: Present study is in accordance with other studies where age group of 21-30 years are mostly affected. Hindus are the majority and kerosene oil burns are common. Conclusion: Education regarding fire safety and awareness discouraging dowry demands should be instilled amongst the common mass. Dedicated burn units should be made functioning with detection and treatment of infections to reduce mortality. Keywords: burn death, medico-legal autopsy, kerosene oil, shock.

Journal Article
Amita Pandey1
TL;DR: A method to find the stability factor of a node by considering self and neighbor node stability may be used to establish a path from source to destination and it is observed that this scheme produce better packet delivery ratio, reduces packet delay and reduced overheads.
Abstract: Providing an efficient, robust and low overhead path from source node to destination node in MANETs is a critical issue due to frequent change in the network topology and mobility of the node (which cause frequent change in radio link). Hence it is necessary to check the node stability with respect to node mobility during path establishment .path. Many routing algorithms, proposed for ad-hoc network, are based on source routing scheme. When a route is broken in source routing, route recovery and maintenance procedure are executed, these procedure consume many resources. To minimize route breaking, it important to find a route that endures longer time. Shortest path route has short lifetime especially in high dense ad-hoc network. Some routing protocol such as SSA and ABR are considering the link stability and try finding more stable route. The stability is computed by using the parameters such as received power, distance between neighboring nodes and link quality that is assessed using bit error in a packet. The proposed scheme is simulated over a large number of MANETs nodes with wide range of mobility and the performance is evaluated. The performance of the proposed scheme is compared with two well-known mesh based multicast routing protocol, i.e. on demand multicast routing protocols(ODMRP) and enhance on demand multicast routing protocol(EODMRP) It is observed that the proposed scheme produce better packet delivery ratio, reduces packet delay and reduced overheads. This paper also proposes a method to find the stability factor of a node by considering self and neighbor node stability. The stability factor of a node may be used to establish a path from source to destination. The stable nodes in the path will provide higher packet delivery ratio and lower latency. We have tried to show link stability and node stability under the influence of varying node speeds and number of nodes. Key words : MANETs, Stability factor, Link stability, node stability, SSA and ABR

Journal Article
TL;DR: In this thesis a plate girder bridge is designed as per the Limit state method using the IS 800:2007, IRC: 24-2000 and analysed by SAP-2000, and conclusions are arrived at to know the behaviour of plate Girder bridges when designed using Indian code.
Abstract: A bridge is a means by which a road, railway or other service is carried over an obstacle such as a river, valley and other road or railway line, either with no intermediate support or with only a limited number of supports at convenient locations. Strength, safety and economy are the three key features that cannot be neglected before the finalization of types of bridges. While deciding the types of bridge, spans and other parameters are to be studied carefully to meet out the need of suitability to site conditions. The scope of this thesis is to confine to the design aspect related to variable parameters. Depth of web, thickness of web, width of flange and span of bridges are the variable parameters considered during the design of plate Girder Bridge. The use of steel often helps the designer to select proportions that are aesthetically pleasing. Structural steels have high strength, ductility and strength to weight ratio. Thus it has become the obvious choice for long span bridges as steel is more efficient and economic. Among the various types of bridges plate girder bridges, truss bridges and box girder bridges are more commonly used. As the cost of steel is rising we have to reduce the amount of steel used without affecting the strength of section. In this thesis a plate girder bridge is designed as per the Limit state method using the IS 800:2007, IRC: 24-2000 and analysed by SAP-2000. Basically the Indian standards are derived from the British Standards. The basic concept is the same. Only the values of various parameters vary according to the design and fabrication/ erection practices existing in India. Design calculations are carried out for simply supported single span. Seismic and wind effect is not taken in to account at design stage. To clarify the design procedure and the current state of practice, a comprehensive literature search and survey were conducted. Recommendations pertaining to best practices for planning, design, and construction activities, as well as applications and limitations are also provided. Based on the design results, conclusions are arrived at to know the behaviour of plate girder bridges when designed using Indian code. Keywords: Steel bridges, design comparison, Welded Plate Girder, Indian Road Congress

Journal Article
TL;DR: Web based operating system consists of some improved set of applications needed for the future enhancement of web operating systems, and many additional applications have been added with extra means of improvement.
Abstract: Web based operating system consists of some improved set of applications needed for the future enhancement. We aim on the current attention towards the web operating systems. As we know that the existing operating systems has some limitations, we have improved those with some additional facilities in our Web operating system. Although, this gains attention from the people who directly are involved in the field of internet OS. Many additional applications have been added with extra means of improvement.

Journal Article
TL;DR: This research reports the first study on Length-weight relationship of M. cavasius from Indus River and presents the first report on any biological aspect of this important catfish.
Abstract: Mystus cavasius a Bagirid catfish is one of the commercially important fish. Paper presents the first report on any biological aspect of this important catfish. Studies on Length-weight relationship and condition factor of M. cavasius at downstream of Indus River near Thatta District were carried out from March to July 2013. A total of 391 specimens including 177 male and 214 female were used for the study. The total length of male population ranged between 7.5 to 18.5 cm and in female population ranged 7.8 to 23.5 cm. The female population dominated over the male in the number, and it also attains larger size than male. The exponent b values of male, female and combined population were calculated as 2.51, 2.57 and 2.54 respectively, that indicate the negative allometric growth. This research reports the first study on Length-weight relationship of M. cavasius from Indus River. Keywords: Mystus cavasius, Catfish, Length-weight relationship, condition factor, Indus River.

Journal Article
TL;DR: The study and evaluation of damage caused by Tuta absoluta on tomato leaves in the field have shown the great danger of this insect for growing tomatoes.
Abstract: Tomato crops in the field, suffering the attacks of a new miner: Tuta absoluta (Meyrick) that caused significant losses in production. The insect may cause losses on tomatoes up to 80 to 100%. The larva is the damaging stage of the tomato leafminer. The first attack is observed on the apical parts of the plant, namely leaves and seedlings. This insect can also attack young transplants and even nursery seedlings. The attacks are manifested by the appearance on the leaves whitish galleries (only the epidermis of the leaf remains, the parenchyma is consumed by the larvae) each containing a caterpillar and its droppings. Over time, the galleries become necrotic and turn brown. The caterpillars attack the green fruits like ripe fruit. Tomatoes are necrosis on the calyx or exit holes on their surface. The fruits are then unmarketable and unfit for consumption. The study and evaluation of damage caused by Tuta absoluta on tomato leaves in the field have shown the great danger of this insect for growing tomatoes. Indeed, in the absence of any intervention, in the conditions of the Moroccan Gharb fields, a couple of the pest Tuta absoluta comes to destroy all the leaves of a tomato field with an area of 500 m2 sixty-nine (69) days. Keywords: tomato crop, field, tomato leafminer (Tuta absoluta), Gharb Morocco

Journal Article
TL;DR: In this article, a system for increasing the production of food in farming using low-cost greenhouse technique is used, in which various parameters like NPK humidity, temp.co 2 of a soil and air are measured and can be controlled and monitored using WSN.
Abstract: In this system for increasing the production of food in farming the low cost greenhouse technique is used. Now a days the population goes on increasing but the productivity goes on decreasing due to environmental changes.. In order to solve this food problems we can use the greenhouses for increasing the food production in agriculture field. In old days farming requires the more man power so this disadvantage is overcome using greenhouses. For increasing the food production we have to measure the various parameters like NPK humidity,temp.co 2 of a soil and air.In his paper we can measure these parameters and can be controlled and monitored using WSN. . Keywords —pH,himidity,LPC2148,co2

Journal Article
TL;DR: This paper represents that indigenous or tribal people of Odisha in present day sustaining their practices regarding health care; modernity can never change their practices and ruined their identity.
Abstract: Introduction: Traditional knowledge which includes both oral and written. It refers to the knowledge, innovation and practices of local communities or ethnic group around the world. It is the component of knowledge system which refers the old age tradition and practices and inherited from generation to generation through folk tales, rituals etc. Traditional knowledge is the knowledge which is unique to a given culture and society. This knowledge is important part of lives of poor. This present study attempts to find out attitudes of people towards modern medicine facilities available in the village. Objective is to explore the traditional knowledge system of health care practices in two primitive tribes. Methods :- two primitive tribes of Odisha have been considered for their traditional health care practices. It’s a comparative study of health care practices among Kondh of Budrikia village of Kandhmal district and Bhuyan of Talpadar village of Keonjhar district. Total sample 50 0f two villages including traditional health practitioners (THP) and old age persons. Door to door survey, Interview and focus group discussion (FGD) conducted during this field work for empirical data collection. Result: This paper represents that indigenous or tribal people of Odisha in present day sustaining their practices regarding health care; modernity can never change their practices and ruined their identity. Not only they use plants and leaves even also use animal to cure any ailment and diseases. 36 plant species including flora and fruits has been used for medicinal purposes. Discussion: In present scenario the traditional value, faith and indigenous knowledge of health care system of present society are facing challenges due to migration of youths to cities and there urban migrants tend to undermine their own culture belief and knowledge based on traditional health care system. If this traditional knowledge won’t be documented, in future this knowledge will be diminished by the influence of modernity. Key words: - traditional knowledge, indigenous knowledge.

Journal Article
TL;DR: Smart Accident Detection and Assistance Systems overcomes limitations as it will automatically detect an accident and notify the nearest emergency response services i.e. Hospitals and Towing services which will enable the accident victim to receive instant medical help and assistance.
Abstract: The numbers of deaths due to road accidents are increasing day by day Even the vehicles are becoming more sophisticated with features like GPS navigation and airbags for safety In spite of this the victims of the accidents which occur at remote locations do not get prompt medical service There are several cases where the accident victims lose their lives due to lack of medical assistance These victims may get serious injuries due to which the might not be able to move or communicate to the rest of the world In such situations the advancements in technology and the sophistication of the vehicles do not seem to be useful Smart Accident Detection and Assistance Systems overcomes this limitations as it will automatically detect an accident and notify the nearest emergency response services ie Hospitals and Towing services which will enable the accident victim to receive instant medical help and assistance In today’s day roads are the most used medium for traveling A large number of road accidents take place every year around the globe Most of the accidents on highways may prove fatal; sometimes the victims go unattended and even lose their lives So, this system proposes a solution to this problem which detects accident of the vehicle and alerts the ambulance service, insurance company, towing services so as to provide instant medical help

Journal Article
TL;DR: In this article, the authors studied the perfect 2-tuple total domination number for the circulant graphs Cir(n,A), where A = 1,2,...,x,n-1,n2,...n-x} and x <=floor((n − 1)/2) from an algorithmic perspective.
Abstract: This paper studies perfect 2-tuple total domination number for the circulant graphs Cir(n,A), where A={1,2,...,x,n-1,n-2,...n-x} and x<=floor((n-1)/2) from an algorithmic point of view.

Journal Article
TL;DR: This project, which is a reliable system, energy efficient remote soldier monitoring system, is able to send health parameters and position parameter of soldier in real time and wirelessly transmitted to Army base station using GSM.
Abstract: In present time world, border security is an important factor in any nation’s security. The national security mainly depends on army, navy, air-force. The army soldiers are played the one of the important and vital roles. There are many issues regarding the safety of these soldiers. Whenever any soldier enters the war field it is very vital for the army base station to know the exact location and also the health status of all soldiers. Every year Army Soldiers become lost or injured in war field. In this proposed system gives the ability to track where Soldiers are at any given instant. Search and rescue work become minimized in time and resources. And also, with alert feature Soldiers will be able to communicate their distress with GPS coordinate information to the base station. This project which is a reliable system, energy efficient remote soldier monitoring system. It is able to send health parameters and position parameterof soldier in real time. Using bio-sensors it enables the army station to monitor Soldier’s parameters such as body temp, heartbeat rate, respiration rate in real time and wirelessly transmitted to Army base station using GSM. Keywords - ARM, GPS, Bio-sensors, Navigation

Journal Article
TL;DR: Stoichiometric and anisotropic nanometer hydroxyapatite was made with co-precipitated method as mentioned in this paper, the powder was compacted under uniaxial and isostatic press and lately sintered.
Abstract: Stoichiometric and anisotropic nanometer hydroxyapatite was made with co-precipitated method. The powder was compacted under uniaxial and isostatic press and lately sintered. Finally, the tablets were immersing in simulated body fluid during 1 day. The material loss hardness (68.20%), elasticity (64.93%) and plastic work (9.20%) only increasing elasticity work (30.06%).

Journal Article
TL;DR: A graph theoretic clustering algorithm based on boruvka’s algorithm is implemented and experimentally evaluated and finds feature subset accuracy of a classifier, time required for classification and proportion of features selected can be calculated.
Abstract: Feature selection is the process of identifying a subset of the most useful features that produces compatible results as the original entire set of features. Features provide the information about the data set. In High-dimensional data representation each sample is described by many features. The data sets are typically not task-specific, many features are irrelevant or redundant and should be pruned out or filtered for the purpose of classifying target objects. Given a set of features the feature selection problem is to find a subset of features that “maximizes the learner’s ability to classify patterns”. A graph theoretic clustering algorithm based on boruvka’s algorithm is implemented and experimentally evaluated in this paper. The proposed algorithm works in two steps. In the first step, features are divided into clusters by using graph-theoretic clustering methods. In the second step, the most representative feature that is strongly related to target classes is selected from each cluster to form a subset of features. All the representative features from different clusters form the final feature subset. After finding feature subset accuracy of a classifier, time required for classification and proportion of features selected can be calculated. Keywords: Boruvka’s Algorithm, Graph theoretic clustering, Filter Method, Wrapper Method, Embedded Approach

Journal Article
TL;DR: This paper proposes a new approach for multi target detection using FaceTracking or polygon tracking method, which achieves better tracking accuracy and energy efficiency for detecting and tracking single object.
Abstract: Wireless sensor networks (WSN) have been considered as a promising system for area surveillance applications. As it moves through a sensor network target tracking has become an increasingly important application in Wireless Sensor Networks. Target detection deals with finding spatial coordinates of a moving object and tracking deals with finding the coordinates and being able to track its movements. Tracking mobile targets using sensor networks is a challenging task. Existing work mostly requires organizing groups of sensor nodes with measurements of a target’s movements or accurate distance measurements from the nodes to the target, and predicting those movements. These are, however, often difficult to accurately achieve in practice, especially in the case of unpredictable environments, sensor faults, etc .In such cases the new tracking framework, called FaceTrack, suits best. FaceTracking employs the nodes of a spatial region surrounding a target, called a face. If a target is detected by a node after a time window, a target is detected by another node. It is assumed to be the same target or single object in FaceTracking method. But it achieves better tracking accuracy and energy efficiency for detecting and tracking single object. This paper proposes a new approach for multi target detection using FaceTracking or polygon tracking method. Simulations are carried out to underline the energy efficiency of the proposed method using NS2.

Journal Article
TL;DR: In this article, the structural behavior of building with and without base isolation is analyzed for both fix base and base isolated structures. But, the authors did not consider the impact of the base isolation on the structural properties.
Abstract: The base isolation systems are gaining large attention as a mean to protect structure form seismic hazard. It is a suitable technology for earthquake resistant design of variety of structure like buildings, bridges, airport terminals, nuclear power plant etc. Seismic isolation consists of essentially the installation of mechanisms which decouple the structure from base by providing seismic isolators. The seismic isolation system is mounted beneath the superstructure and is referred as Base Isolation. The aim of this study deals with structural behavior of building with and without base isolation. Lead rubber bearing is used as an isolation device then compare various parameters like Base shear, Displacement, Storey drift. 5and 15 storey buildings are test models. Nonlinear time history analysis is carried out for both fix base and base isolated structure. Key Words: Base isolation, Storey drift, Base shear, Nonlinear time history analysis, SAP2000

Journal Article
TL;DR: In the present study soil sample is collected from college primesis and used for screening of protease producing bacteria, and on the basis of colony size, texture, and microscopic characteristics, the isolates were identified as Bacillus sps.
Abstract: Proteases execute a large variety of functions and have important biotechnological applications. Proteases represent one of the three largest groups of industrial enzymes and find application in detergents, leather industry, food industry, pharmaceutical industry and bioremediation processes. In the present study soil sample is collected from college primesis and used for screening of protease producing bacteria. On the basis of colony size, texture, and microscopic characteristics, the isolates were identified as Bacillus sps .The two Isolated Bacillus sps were screened for protease producing ability on casein agar and gelatine agar plates. The zone formation around the bacterial colony indicated the protease positive strain which may be due to hydrolysis of casein and gelatine. Hence the strains were identified as a protease producer and it was taken for further experimental studies and biochemical test. The extraction of protease enzyme is important due to its wide industrial applications. Keywords : Proteases, Bacillus sps, Enzyme, Proteolytic Ubiquitous

Journal Article
TL;DR: The paper describes the procedure that can be used to get a suitable spin period for different cloths and the design of fuzzy logic controller having three inputs to give correct spin period of washing machine.
Abstract: Fuzzy logic enables designers to control complex systems more effectively than traditional approaches. As it provides a simple way to arrive at definite conclusion upon ambiguous, imprecise or noisy information. In this paper we have proposed the design of fuzzy logic controller having three inputs to give correct spin period of washing machine. The objective is to save lot of time, electricity and water for washing the cloth. The paper describes the procedure that can be used to get a suitable spin period for different cloths. The proposed FLC is simulated using Fuzzy Logic Toolbox of MATLAB. The result is used to calculate the spin period for different type of input conditions The process is based entirely on the principle of taking non-precise inputs from the sensors subjecting them to fuzzy arithmetic and obtaining a crisp value of spin period. Keywords: FIS Editor, Fuzzy Logic Controller, Matlab, Rules of the system, Response Surface of the Input Output relations

Journal Article
Mamta Gupta1
TL;DR: An attempt has been made to show you that how the biometric authentication system works and at what level it will be secure and accurate to authenticate the user’s identity.
Abstract: Biometric system is a pattern recognition system that recognizes the user‘s identity through their physical or behavioral traits. In this work, an attempt has been made to show you that how the biometric authentication system works and at what level it will be secure and accurate to authenticate the user’s identity.

Journal Article
Abstract: This study attempt to test the effect of Total Quality Management(TQM) competitive advantage and Industrial performance The design of this research has quantitative Approach Improving the quality with which an organization can deliver its products and services is critical for competing in an expanding global market TQM begins with the primary assumption that employees in organizations must cooperate with each other in order to achieve quality for the needs of the customer Quality teams provide companies with the structured environment necessary for successfully implementing and continuously applying the TQM process Quality training is conducted and the continuous improvement process executed through a well-planned team structure Prior studies suggest that TQM strategy that focuses on increasing customer levels of satisfaction does have a significant and positive impact on performance for example, suggest that attaining customer satisfaction is thought to increase the profits of the organization by decreasing costs through fewer returns and increasing revenues through customer loyalty The results show that TQM practices have positive and significant effect both on organizational performance and competitive advantage Competitive advantage has a positive and significant effect on organizational performance Organizational performance is more influenced by competitive advantage than TQM practices Keywords: TQM practices, quality training, competitive advantage, organizational performance, operation management