scispace - formally typeset
Search or ask a question

Showing papers in "International Journal of Research in 2016"


Journal Article
TL;DR: Calculations are developed and examined to reduce the entire quantity of Wireless access points as well as their locations in almost any given atmosphere while with the throughput needs and the necessity to ensure every place in the area can achieve a minimum of k APs.
Abstract: More particularly, calculations are developed and examined to reduce the entire quantity of Wireless access points as well as their locations in almost any given atmosphere while with the throughput needs and the necessity to ensure every place in the area can achieve a minimum of k APs. This paper concentrates on using Wireless for interacting with and localizing the robot. We've carried out thorough studies of Wireless signal propagation qualities both in indoor and outside conditions, which forms the foundation for Wireless AP deployment and communication to be able to augment how human operators communicate with this atmosphere, a mobile automatic platform is developed. Gas and oil refineries could be a harmful atmosphere for various reasons, including heat, toxic gasses, and unpredicted catastrophic failures. When multiple Wireless APs are close together, there's a possible for interference. A graph-coloring heuristic can be used to find out AP funnel allocation. Additionally, Wireless fingerprinting based localization is developed. All of the calculations implemented are examined in real life situations using the robot developed and answers are promising. For example, within the gas and oil industry, during inspection, maintenance, or repair of facilities inside a refinery, people might be uncovered to seriously high temps to have a long time, to toxic gasses including methane and H2S, and also to unpredicted catastrophic failures.

455 citations


Journal Article
TL;DR: A survey on the techniques used for designing software to mine opinion features in reviews and how Natural Language Processing techniques such as NLTK for Python can be applied to raw customer reviews and keywords can be extracted.
Abstract: Now days, E-commerce systems have become extremely important. Large numbers of customers are choosing online shopping because of its convenience, reliability, and cost. Client generated information and especially item reviews are significant sources of data for consumers to make informed buy choices and for makers to keep track of customer’s opinions. It is difficult for customers to make purchasing decisions based on only pictures and short product descriptions. On the other hand, mining product reviews has become a hot research topic and prior researches are mostly based on pre-specified product features to analyse the opinions. Natural Language Processing (NLP) techniques such as NLTK for Python can be applied to raw customer reviews and keywords can be extracted. This paper presents a survey on the techniques used for designing software to mine opinion features in reviews. Elven IEEE papers are selected and a comparison is made between them. These papers are representative of the significant improvements in opinion mining in the past decade.

229 citations


Journal Article
TL;DR: In this article, the authors proposed the Alternating Arm Converter Converter (AAC) which is a hybrid between the modular multilevel converter and the two-level converter in the form of director switches in each arm.
Abstract: This paper explains the working principles, sup- ported by simulation results, of a new converter topology intended for HVDC applications, called the alternate arm converter (AAC). It is a hybrid between the modular multilevel converter, because of the presence of H-bridge cells, and the two-level converter, in the form of director switches in each arm. This converter is able to generate a multilevel ac voltage and since its stacks of cells consist of H-bridge cells instead of half-bridge cells, they are able to gen- erate higher ac voltage than the dc terminal voltage. This allows the AAC to operate at an optimal point, called the “sweet spot,” where the ac and dc energy flows equal. The director switches in the AAC are responsible for alternating the conduction period of each arm, leading to a significant reduction in the number of cells in the stacks. Furthermore, the AAC can keep control of the current in the phase reactor even in case of a dc-side fault and support the ac grid, through a STATCOM mode. Simulation results and loss calculations are presented in this paper in order to support the claimed features of the AAC.

158 citations


Journal Article
TL;DR: In this article, an exploratory three-stage seven-level cascaded H-bridge inverter has been manufactured using nine H-bridges, each of which is associated with a 185-W solar panel.
Abstract: Due to the possibility of providing energy with much less dependence on the fossil fuels, renew-competent energy sources, in specified sun photovoltaic (PV) conversion have received elevated acceptance and progress in latest times. Big benefits of PV panels comprise easy and trustworthy power production and suitability for disbursed iteration. In addition the costs for photovoltaic modules is drastically lowering. To comprehend this issue, a control plan with modulation compensation scheme is likewise proposed. An exploratory three-stage seven-level cascaded H-bridge inverter has been manufactured using nine H-bridge modules (three modules for each stage). Each H-bridge module is associated with a 185-W solar panel. Simulation results are introduced to confirm the practicality of the proposed approach.

135 citations


Journal Article
TL;DR: This paper set up outsourcing addition into IBE for the first time and recommends a revocable IBE proposal in the server-aided setting, which off-load the majority of the key making interrelated operations during key-issuing and key-update processes to a Key Update Cloud Service Provider.
Abstract: In this paper, aiming at tackling the significant concern of identity revocation, we set up outsourcing addition into IBE for the first time and recommend a revocable IBE proposal in the server-aided setting. Our proposal off-load the majority of the key making interrelated operations during key-issuing and key-update processes to a Key Update Cloud Service Provider, departure only a regular number of operations for PKG and users to make locally. This goal is accomplish by exploit a novel collusion-resistant procedure: we take up a hybrid private key for every user, in which an AND gate is complicated to bond and jump the individuality component and the time constituent. Additionally, we suggest another creation which is incontestable secure under the Refereed Delegation of Computation model. In conclusion, we offer extensive untried results to express the efficiency of our projected construction .

95 citations


Journal Article
TL;DR: The main aim of employing this project is to get a good scalability and a long lifetime for the required network and for the lower data gathering recess.
Abstract: In this project, a framework which consists of three layers is introduced for the mobile data gathering in the wireless sensor networks. The three layers of the framework are given as the sensor layer, clustered head layer, mobile collector layer (also called as SenCar). This framework is made use of with a LBC-DDU, which is called as the load balanced clustering and the dual data uploading. The main aim of employing this project is to get a good scalability and a long lifetime for the required network and for the lower data gathering recess.

91 citations


Journal Article
TL;DR: In this paper, a review of literature indicated that motivation has a very important role in learning English as a foreign or second language successfully and that motivation is an important factor for explaining the success or failure of any complex task.
Abstract: This study overviews current research on the role of motivation in second or foreign language learning. Motivation is an important factor for explaining the success or failure of any complex task. In this paper, the researcher defines the term motivation, explains different types of motivation, reviews previous studies about the role of motivation in language learning, mentions conditions of motivation, and finally states key factors of motivation. The review of literature indicated that motivation has a very important role in learning English as a foreign or second language successfully.

90 citations


Journal Article
TL;DR: This paper reviewed some of the important issues of English pronunciation instruction and explained the importance of pronunciation instruction, elaborate the role of teachers in teaching pronunciation, and finally mention some suggestions in helping teachers to improve learners' pronunciation.
Abstract: English Pronunciation instruction is difficult for some reasons. Teachers are left without clear guidelines and are faced with contradictory practices for pronunciation instruction. There is no well-established systematic method of deciding what to teach, when, and how to do it. As a result of these problems, pronunciation instruction is less important and teachers are not very comfortable in teaching pronunciation in their classes. This paper reviews some of the important issues of English pronunciation instruction. The aims of this paper are to define the term pronunciation, discuss the goal of pronunciation instruction, explain the importance of pronunciation instruction, elaborate the role of teachers in teaching pronunciation, and finally mention some suggestions in helping teachers to improve learners’ pronunciation. The review of literature shows that if teachers want to teach pronunciation accurately they should be trained in pronunciation instruction.

88 citations


Journal Article
TL;DR: A multilevel inverter for generating 17 voltage levels using a three-level flying capacitor inverter and cascaded H-bridge modules with floating capacitors has been proposed in this article.
Abstract: A multilevel inverter for generating 17 voltage levels using a three-level flying capacitor inverter and cascaded H-bridge modules with floating capacitors has been proposed. Various as- pects of the proposed inverter like capacitor voltage balancing have been presented in the present paper. Experimental results are presented to study the performance of the proposed converter. The stability of the capacitor balancing algorithm has been verified both during transients and steady-state operation. All the capac- itors in this circuit can be balanced instantaneously by using one of the pole voltage combinations. Another advantage of this topol- ogy is its ability to generate all the voltages from a single dc-link power supply which enables back-to-back operation of converter. Also, the proposed inverter can be operated at all load power fac- tors and modulation indices. Additional advantage is, if one of the H-bridges fail, the inverter can still be operated at full load with reduced number of levels. This configuration has very low dv/dt and common-mode voltage variation.

58 citations


Journal Article
TL;DR: The authors defined the terms listening and listening comprehension, reviewed the components of listening, explained teachers' role in listening comprehension and presented the general principles of listening comprehension in second language learning, and demonstrated that learners' listening comprehension skill can be improved by teachers' assistance and the use of appropriate learning materials and activities.
Abstract: Many studies in language learning have indicated that listening comprehension plays an important role in the learning process. In spite of its importance, listening has been ignored in second language learning, research, and teaching. The purpose of the present article is to define the terms listening and listening comprehension, review the components of listening, explain teachers’ role in listening comprehension, and present the general principles of listening comprehension. The literature review demonstrated that learners’ listening comprehension skill can be improved by teachers’ assistance and the use of appropriate learning materials and activities.

54 citations


Journal Article
TL;DR: In this article, a dual voltage source inverter (DVSI) scheme is proposed to enhance the power quality and reliability of the microgrid system, which enables the micro-grid to exchange power generated by the distributed energy resources (DERs) and also compensate the local unbalanced and nonlinear load.
Abstract: This paper presents a dual voltage source inverter (DVSI) scheme to enhance the power quality and reliability of the microgrid system. The proposed scheme is comprised of two inverters, which enables the microgrid to exchange power generated by the distributed energy resources (DERs) and also to compensate the local unbalanced and nonlinear load. The con- trol algorithms are developed based on instantaneous symmetrical component theory (ISCT) to operate DVSI in grid sharing and grid injecting modes. The proposed scheme has increased relia- bility, lower bandwidth requirement of the main inverter, lower cost due to reduction in filter size, and better utilization of micro- grid power while using reduced dc-link voltage rating for the main inverter. These features make the DVSI scheme a promising option for microgrid supplying sensitive loads. The topology and control algorithm are validated through extensive simulation and experimental results.

Journal ArticleDOI
TL;DR: In this paper, the authors discuss that marketing mix is one of the main objectives of the marketing mix elements for setting objectives and marketing budget measures, and that the importance of each element depends not only on the company and its activities, but also on the competition and time.
Abstract: Aim of article is to analyze marketing mix theoretical aspects. The article discusses that marketing mix is one of the main objectives of the marketing mix elements for setting objectives and marketing budget measures. The importance of each element depends not only on the company and its activities, but also on the competition and time. All marketing elements are interrelated and should be seen in the whole of their actions. Some items may have greater importance than others; it depends mainly on the company's strategy and its activities. Companies that provide services - the provision of services will be a key element. Article arises research questions is marketing mix create added value for enterprises. There are used scientific literature and analysis methods in article. An analysis of the scientific literature, it can be said that the marketing mix measures are the actions and measures necessary to achieve marketing goals. Marketing elements: product, price, place and promotion are used for marketing objectives. These instruments operate most efficiently when all the elements are combined and working together.

Journal Article
TL;DR: A very compact hardware implementation of AES-128, which requires only 2400 GE, which is to the best of the knowledge the smallest implementation reported so far and improves the level of resistance against first-order side-channel attacks.
Abstract: Our contribution is two fold: first we describe a very compact hardware implementation of AES-128, which requires only 2400 GE. This is to the best of our knowledge the smallest implementation reported so far. Then we apply the threshold countermeasure by Nikova et al. to the AES S-box and yield an implementation of the AES improving the level of resistance against first-order side-channel attacks. Our experimental results on real-world power traces show that although our implementation provides additional security, it is still susceptible to some sophisticated attacks having enough number of measurements.

Journal Article
TL;DR: This letter has studied wavelet based approaches for image enhancement techniques based on discrete and stationary wavelet transforms with the interpolation algorithms, which will be used as resolution improvement and proposed an adaptive image enhancement algorithm based on image fusion.
Abstract: Satellite images are used in many fields of research. Resolution is the major issue in these kinds of images. In Image processing the image with higher resolution gives better results. In this letter we have studied wavelet based approaches for image enhancement techniques. These are based on discrete and stationary wavelet transforms with the interpolation algorithms, which will be used as resolution[1]improvement. Afterwards, compared the experimental results of both algorithms and we proposed an adaptive image enhancement algorithm based on image fusion. Compared the simulated results with the two methods and the proposed method shown that it gives improved PSNR.

Journal Article
TL;DR: A brief account of practices in vocabulary teaching and learning is provided by focusing on the research on teaching words in context and out of context as well as incidental and intentional vocabulary learning.
Abstract: Abundantly clear though the need for effective eclectic techniques for enhancing learners’ vocabulary learning strategies may seem, in practice, language instructors, by all accounts, tend to resort to only a few obsolete ones. This review paper aims to provide a brief account of practices in vocabulary teaching and learning by focusing on the research on teaching words in context and out of context as well as incidental and intentional vocabulary learning.

Journal Article
TL;DR: This paper formulate the problems encountered in the operations of mobile cloud computing environments, including determining the price to charge for media services, resource allocation, and interference management, as a Stackelberg game model, and extend this game model with multiple players through network virtualization technology.
Abstract: In mobile cloud computing systems, cloud computing has a significant impact on wireless networks Cloud computing and wireless networks have traditionally been addressed separately in the literature In this paper, we jointly study the operations of cloud computing and wireless networks in mobile computing environments, where the objective is to improve the end-to-end performances of cloud mobile media delivered through mobile cloud computing systems Unlike most existing studies on wireless networks, where only the spectrum efficiency is considered, we consider not only the spectrum efficiency in wireless networks but also the pricing information in the cloud, based on which power allocation and interference management in the wireless networks are performed We formulate the problems encountered in the operations of mobile cloud computing environments, including determining the price to charge for media services, resource allocation, and interference management, as a Stackelberg game model Moreover, we extend this game model with multiple players through network virtualization technology, and adopt the replicator dynamics method to solve the evolutionary game between the different groups of small cells Furthermore, a backward induction method is used to analyze the proposed Stackelberg game Simulation results are presented to show the effectiveness of the proposed techniques

Journal Article
TL;DR: The design and development of a home security system, based on human face recognition technology and remotely monitoring technology, to confirm visitor identity and to control door accessibility has been reported in this paper.
Abstract: Smart home security control system has becameindispensable in daily life. The design and development of a home security system, based on human face recognition technology and remotely monitoring technology, to confirm visitor identity and to control door accessibility has been reported in this paper. This paper describes about the implementation and deployment of wireless control system and accessibility in to a home environment for authenticated people only. A wireless network technique Wifi based and image processing technique PCA based, dedicatedly make the security system alive as per the request. Wifi module and electromagnetic door lock module combinedly operate the door accessibility, has been designed and developed. Face detection and recognition algorithms, as well as a wireless interface are used to detect and identify visitors and send an email and/or an alert message about the current home environment status via GSM network automatically to the home owner’s mobile phone or any communication devices. The concerned authority can control the system through his/her mobile phone or any communication devices by sending AT Commands to GSM MODEM or by taking necessary actions for authentication through email, which is again password protected. Users can monitor visitors and control the door lock on active Web pages enhanced with JavaScript and HTML. This system finds a wide application in areas where physical presence is not possible all the time. The entire control system is built using ARM1176JZF-S microcontroller and tested for actual use in home environment.

Journal ArticleDOI
TL;DR: In this article, the authors examined the challenges and benefits a group of Finnish preschool teachers experienced when they learned to document their work and found that using documentation empowered the teachers as professionals, helped them communicate with parents and c...
Abstract: The Finnish social pedagogical curriculum for early childhood education directs early childhood teachers to use documentation to assess and develop pedagogy and practise. This empirical study examines the challenges and benefits a group of Finnish preschool teachers experienced when they learned to document their work. Although the idea of documenting appears fine in theory, and international experiences of constructing child-centered pedagogy through documents are promoted in the literature, accomplishing this task successfully is challenging in practise. In this study, as the features of documentation in early childhood education and care practise were considered critically, ideological discord was found within the national and local policy-making process, including problems with pedagogical leadership, which reduced the power of documentation in practise. However, the study also revealed that using documentation empowered the teachers as professionals, helped them communicate with parents and c...

Journal Article
TL;DR: This paper demonstrates anonymous data sharing with forward security in this connection, and improves the safety of ID-based ring signature by giving advance security: If a secret key of any user has been compromise, all earlier produced signatures that contain this user still remains legal.
Abstract: In this paper we demonstrate anonymous data sharing with forward security in this connection Data distribution is not at all easier with the progress of cloud computing, and an exact examination on the shared data offers a collection of profits both to the public and individuals. Data distribution with a huge number of applicants must get into account numerous issues, counting effectiveness, data integrity and confidentiality of data owner. Ring signature is a capable applicant to build an unsigned and genuine data sharing system. It lets a data owner to secretly authenticate his data which can be set into the cloud for storage or scrutiny purpose. so far the expensive certificate authentication in the conventional public key infrastructure (PKI) surroundings becomes a restricted access for this solution to be scalable. Identity-based (ID-based) ring signature, which eradicates the method of certificate verification, can be utilized instead. In this paper, we additionally improve the safety of ID-based ring signature by giving advance security: If a secret key of any user has been compromise, all earlier produced signatures that contain this user still remains legal. This property is particularly significant to any huge scale data distribution system, since it is unfeasible to request all data owners to re-authenticate their data still if a secret key of one single user has been compromised. We offer an actual and well-organized instantiation of our scheme, demonstrate its safety and supply an accomplishment to illustrate its realism.

Journal Article
TL;DR: This paper addresses the eye gaze tracking problem using a lowcost and more convenient web camera in a desktop environment, as opposed to gaze tracking techniques requiring specific hardware, e.g., infrared high-resolution camera and infrared light sources, as well as a cumbersome calibration process.
Abstract: This paper addresses the eye gaze tracking problem using a lowcost andmore convenient web camera in a desktop environment, as opposed to gaze tracking techniques requiring specific hardware, e.g., infrared high-resolution camera and infrared light sources, as well as a cumbersome calibration process. In the proposed method, we first track the human face in a real-time video sequence to extract the eye regions. Then, we combine intensity energy and edge strength to obtain the iris center and utilize the piecewise eye corner detector to detect the eye corner. We adopt a sinusoidal head model to simulate the 3-D head shape, and propose an adaptive weighted facial features embedded in the pose from the orthography and scaling with iterations algorithm, whereby the head pose can be estimated. Finally, the eye gaze tracking is accomplished by integration of the eye vector and the head movement information. Experiments are performed to estimate the eye movement and head pose on the BioID dataset and pose dataset, respectively. In addition, experiments for gaze tracking are performed in real-time video sequences under a desktop environment. The proposed method is not sensitive to the light conditions. Experimental results show that ourmethod achieves an average accuracy of around 1 . 28 ◦ without head movement and 2 . 27 ◦ with minor movement of the head.

Journal Article
TL;DR: Security analysis exhibit that the primary endeavor to formalize circulated dependable deduplication framework is secure regarding the definitions indicated in the proposed security model.
Abstract: De-duplication is one of the most recent advances in the present business sector since it has capacity to diminish costs. Information deduplication method is one of the essential information pressure systems for wiping out excess duplicates. Distributed information duplication framework is utilized as a part of distributed storage to diminish memory space and transfer transmission capacity stand out duplicate for every record put away in cloud regardless of the possibility that that document can be utilized by number of clients. Fundamental reason for this paper is to makes the primary endeavor to formalize circulated dependable deduplication framework. In this framework information pieces are appropriated over different servers. In disseminated stockpiling frameworks, rather than united encryption as utilized as a part of past deduplication frameworks security necessities of information label consistency and classification are accomplished by utilizing a deterministic mystery sharing plan. Security analysis exhibit that our plan is secure regarding the definitions indicated in the proposed security model.

Journal Article
TL;DR: This paper proposes novel progressed secure framework which empower the cloud framework secured and legitimate utilizing Verifier(TPA) benefit of Cloud Server and performs data deduplication in a Secured way in requested to enhance the cloud Storage space too data transfer capacity.
Abstract: Now a days Cloud Computing is an emerging technology where can utilize the services like SaaS, PaaS and IaaS .In this paper, we show the trustworthiness evaluating and secure deduplication over cloud data utilizing imaginative secure frameworks .Usually cloud framework outsourced information at cloud storage is semi-trusted because of absence of security at cloud storage while putting away or sharing at cloud level because of weak cryptosystem information may be uncover or adjusted by the hackers keeping in mind the end goal to ensure clients information protection and security We propose novel progressed secure framework which empower the cloud framework secured and legitimate utilizing Verifier(TPA) benefit of Cloud Server. Additionally our framework performs data deduplication in a Secured way in requested to enhance the cloud Storage space too data transfer capacity.

Journal Article
TL;DR: This paper is designed to introduced the fundamental information about MQTT protocol and represents an overview of MQ TT from starting history till the present development.
Abstract: Internet of things refers to uniquely identifiable objects and the representation of these physical objects in a virtual form in an Internet like structure. The number of things that get added to the network are increasing day by day. These connected devices are bound to reach 50 billion by 2020. MQTT or Message Queue Telemetry Transport is an Internet Of Things protocol for machine to machine communication. The protocol was invented by Andy Stanford-Clark of IBM, and Arlen Nipper of Cirrus Link Solution. MQTT is a Client Server publish/subscribe messaging transport protocol. It is light weight, open, simple, and designed so as to be easy to implement. These paper is designed to introduced the fundamental information about MQTT protocol. It represents an overview of MQTT from starting history till the present development. Keywords- MQTT; IoT; publish/subscribe; MQTT-SN.

Journal ArticleDOI
TL;DR: The advantages of e-commerce are convenience, Time saving, Options, Easy to compare, Easy To find reviews, Coupons and deals, Increasing customer base, Rise in sales, 24/7, 365 days, Expand business reach, Recurring payments made easy, Instant transactions.
Abstract: E - Commerce allows consumers to electronically exchange goods and services with no barriers of time or distance. Electronic commerce has expanded rapidly over the past five years and is predicted to continue at this rate, or even accelerate. In the near future the boundaries between "conventional" and "electronic" commerce will become increasingly blurred as more and more businesses move sections of their operations onto the Internet. The e-commerce industry in India is growing at a remarkable pace due to high penetration of internet and sophisticated electronic devices. However, the recent growth rate of e-commerce in India is far lagging behind than other developed countries. The advantages of e- commerce are convenience, Time saving, Options, Easy to compare, Easy to find reviews, Coupons and deals, Increasing customer base, Rise in sales, 24/7, 365 days, Expand business reach, Recurring payments made easy, Instant transactions. There are many big problems and challenged on the way of an online merchant. Factors like safety and security of online money transaction being the biggest problem along with others have curbed the smooth expansion of the online industry in the country.

Journal Article
TL;DR: A new adaptive routing algorithm built upon the widely studied back- pressure algorithm is developed by decouple the routing and scheduling components of the algorithm by designing a probabilistic routing table that is used to route packets to per-destination queues.
Abstract: Back-pressure-based adaptive routing algorithms where each packet is routed along a possibly different path have been extensively studied in the literature. However, such algorithms typically result in poor delay performance and involve h igh complexity implementation. In this paper, we develop a new adaptive routing algorithm built upon the widely studied back- pressure algorithm. We decouple the routing and scheduling components of the algorithm by designing a probabilistic routing table that is used to route packets to per-destination queues. The scheduling decisions in the case of wireless networks are made using counters called shadow queues. The results are also extended to the case of networks that employ simple forms of network coding. In that case, our algorithm provides a low-complexity solution to optimally exploit the routing–coding tradeoff.

Journal Article
TL;DR: It had been concluded that the best surface sterilization agent was PPM.
Abstract: Surface sterilization is a vital step in preparation of healthy and viable explants in tissue culture because plants in the field are highly exposed to microbial contamination. Most surface contaminants, such as bacteria and fungi, can be eliminated by surface sterilization with a suitable sterilizing agent. In this study three surface sterilizing agents were used: plant preservative mixture (PPM), mercuric chloride (HgCl2) and sodium hypochlorite (NaOCl). Different concentrations and time exposure were tested for decontamination and shoot development of the nodal segments of Cestrum nocturnumL. in vitro. The results showed that among the three sterilizing agents used in this study, PPM treatment at concentrations (4,6%) for 4 hours of constant shaking were effective in terms of decontamination percentage (100), survival and viability of the nodal segments and shoot development percentage (70%). The PPM treatment at all concentrations (1,2,4,6%) for 12 hours of constant shaking gave all dead nodal segments, thus viability of the nodal segments was affected. Sterilization with HgCl2 at all concentrations (0.05,0.1,0.2%) for 7 minutes of continuous rinsing showed good results in terms of decontamination (90-100%) and survival and shoot development percentages (50-60%), while (NaOCl) at higher concentration of (50%) for 5 minutes of continuous rinsing showed satisfactory result of viability and shoot development (50%). The numbers and percentages of contaminated and survived nodal segments were recorded after 30 days. All Viable nodal segments developed to shoots. It had been concluded that the best surface sterilization agent was PPM.

Journal Article
TL;DR: This paper has synthesized the proposed CORDIC cells by Synopsys Design Compiler using TSMC 90-nm library, and shown that the proposed designs offer higher throughput, less latency and less area-delay product than the reference CORDic design for fixed and known angles of rotation.
Abstract: Rotation of vectors through fixed and known angles has wide applications in robotics, digital signal processing, graphics, games, and animation. But, we do not find any optimized coordinate rotation digital computer (CORDIC) design for vector-rotation through specific angles. Therefore, in this paper, we present optimization schemes and CORDIC circuits for fixed and known rotations with different levels of accuracy. For reducing the area- and time-complexities, we have proposed a hardwired pre-shifting scheme in barrel-shifters of the proposed circuits. Two dedicated CORDIC cells are proposed for the fixed-angle rotations. In one of those cells, micro-rotations and scaling are interleaved, and in the other they are implemented in two separate stages. Pipelined schemes are suggested further for cascading dedicated single-rotation units and bi-rotation CORDIC units for high-throughput and reduced latency implementations. We have obtained the optimized set of micro-rotations for fixed and known angles. The optimized scale-factors are also derived and dedicated shift-add circuits are designed to implement the scaling. The fixed-point mean-squared-error of the proposed CORDIC circuit is analyzed statistically, and strategies for reducing the error are given. We have synthesized the proposed CORDIC cells by Synopsys Design Compiler using TSMC 90-nm library, and shown that the proposed designs offer higher throughput, less latency and less area-delay product than the reference CORDIC design for fixed and known angles of rotation. We find similar results of synthesis for different Xilinx field-programmable gate-array platforms.

Journal ArticleDOI
TL;DR: Baldacchino et al. as mentioned in this paper pointed out that the blurred edges of the definition of islands have been one element that has allowed various critics of island studies as a coherent (or, even, worthwhile) field of endeavour to identify that islands share many important characteristics with coastal locations such as ports, estuaries and peninsulas.
Abstract: In one sense, islands are easy to characterise, the working definition being that they are areas of land wholly surrounded by water. But the edges of that definition are blurred. Complexities arise when we consider areas of sand, rock or coral that are covered at high tide, or that are connected to other land areas at low tide (by sand spits etc.), or that are connected to other land areas by bridges or causeways. Areas submerged at high tide are generally not regarded as islands. Areas linked to others at low tide are an awkward, intermediate category. And areas that have been bridged or linked by causeways are often regarded as having been significantly ‘de-islanded’ by human engineering. Island Studies has operated with these complexities during its first two decades of operation (taking the establishment of the International Small Islands Studies Association [ISISA] in 1992 as a disciplinary starting point) and has sought to clarify some of its parameters (see, for instance, Baldacchino [ed] [2007] on the issue of bridged islands). But the blurred edges of the definition have been one element that has allowed various critics of Island Studies as a coherent (or, even, worthwhile) field of endeavour to identify that islands share many important characteristics with coastal locations such as ports, estuaries and peninsulas (reflected in the inclusivity of the title and project of the Journal of Marine and Island Cultures, for instance) and/or remote communities in general. These observations are all the more pertinent given that many (especially, but not exclusively) larger islands possess interiors which have highly land-orientated ecosystems, agricultural systems, livelihood networks, infrastructures, social structures and socio-cultural identities.

Journal Article
TL;DR: The praying mantids (Order Mantodea, Class Insecta) are a group of over 2500 carnivorous polyneopteran insects distributed in tropical and subtropical habitats of the world, from the rainforest to the desert ground.
Abstract: The praying mantids (Order Mantodea, Class Insecta) are a group of over 2500 carnivorous polyneopteran insects distributed in tropical and subtropical habitats of the world, from the rainforest to the desert ground. The order Mantodea comprises over 20 families, out of which the family Mantidae is the largest one and consists of almost 50% of the total mantids described so far. In this compilation, the family Mantidae was grouped into most acceptable 21 subfamilies: Amelinae (148 spp.), Angelinae (55 spp.), Antemninae (2 spp.), Choeradodinae (8 spp.), Chroicopterinae (70 spp.), Compsothespinae (14 spp.), Danuriinae (29 spp.), Deroplatyinae (20 spp.), Dystactinae (17 spp.), Heterochaetinae (11 spp.), Mantinae (420 spp.), Mellierinae (7 spp.), Miomantinae (187 spp.), Orthoderinae (11 spp.), Oxyothespinae (49 spp.), Photinainae (75 spp.), Phyllothelyinae (15 spp.), Schizocephalinae (1 spp.), Stagmatopterinae (45 spp.), Stagmomantinae (29 spp.), Vatinae (48 spp.) consisting 1261 species/subspecies. In India, 89 species of Mantidae are reported so far. The global distribution of each species was given.

Journal Article
TL;DR: In this paper, the authors developed a software package that allows the optimization of wind turbine blades in a series of criteria, which is a complex subject, since the mathematical description of the aerodynamic and complex load, and a number of limitations and objectives must be satisfied.
Abstract: WT blade manufacturing cost of approximately 15 to 20% of the production cost of wind turbines. Expenses innovations in the design of the blades represent a small amount of the total cost of production of the wind turbines. The benefits from the best structural model, and the use of suitable fusing materials and better manufacturing techniques, both sheets and composite materials, necessitating the application of numerical modeling and optimization techniques. In the design of a wind turbine, the goal is to achieve greater output power possible under specific climatic conditions. Technically, this depends on the shape of the sheet. Changing the blade shape is one of the ways to adjust stiffness and stability, but can affect the aerodynamic efficiency of the wind turbine. Another way of changing the dynamic mechanical properties of the wind turbine is modified composite material, which is made from the blade. Problem determining the optimal shape of the blade and the determination of the optimum composite is a complex subject, since the mathematical description of the aerodynamic and complex load, and a number of limitations and objectives must be satisfied. These considerations have led the authors to address the problem from various optimum design of wind turbine blade standards. The objective of this study is to develop a software package that allows the optimization of wind turbine blades in a series of criteria