Volume 6, Issue 5, May 2015 Edition

Publication for Volume 6, Issue 5, May 2015.


IJSER Research Group https://www.ijser.org/forum/index.php Register for IJSER Research Forum      IJSER Xplore IJSER Xplore Research Paper Database

Pages   [1] [2] [3] [4] [5] [6] [7] [8] [9] [U]
 



OMR-AODV: An Optimised Multihop Routing Strategy for Mobile Adhoc Network[ ]


Majority of the research work done in the recent years focuses on routing protocols in Mobile Adhoc Network (MANET) that improves the overall energy and lifetime of the network. Majority of the traditional routing protocols are discovering the shortest path between source and destination without considering crucial parameters like energy level, quality of link, estimation of link expiry, location of nodes etc. which may result into poor packet delivery fraction, throughput, end to end delay and network routing load. To improve the overall network lifetime along with the packet delivery fraction and normalized routing load, this paper proposes an optimised multihop routing protocol (OMR-AODV) as an extension of Adhoc On-demand Distance Vector (AODV) by introducing threshold limit on residual battery of mobile node and quality of link during route establishment phase. AODV and OMR-AODV are simulated using NS2 with various parameters and results show that OMR-AODV performs better than AODV for overall network lifetime along with packet delivery fraction and normalized routing load.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Implementing and Analyzing the Impact Assess-ment Algorithm for Adoption of Information and Communication Technology in Basic Education[ ]


In this paper, an impact assessment algorithm for evaluating the adoption of Information and Communication Technology (ICT) in basic education through Cross-impact method was implemented and analyzed. The implementation of the algorithm was carried out using C# programming language while its qualitative evaluation was explored through analysis of variance, regression analysis and sensitivity testing. The result of analysis of variance confirmed that Government Policy (GP), Teacher Competency (TC), Availability of ICT infrastructure (IF), Integration of ICT in school curriculum by Ministry of Education (MC), Student preparedness in adopting ICT in learning process (SC) and Perception of schools’ management in adoption of ICT in schools (MI), which are the six major events considered, were significantly important in adoption of ICT in basic education. The regression analysis yielded correlation coefficients of 91%, 85%, 87%, 92%, 95% and 95% with respect to GP, TC, IF, MC, SC and MI. The results of sensitivity testing showed that increase in Initial Probability (InitProb) of each event had positive influence on other alternative events. For increase in InitProb of GP and IF, the TC experienced the highest significant changes of 52% and 63%, respectively. For increase in InitProb of TC, MC and SC, the MI experienced the highest significant changes of 34%, 29% and 42%, respectively. For increase in InitProb of MI, the SC experienced the highest significant change of 33%. The developed algorithm serves as an improvement on existing user perspective method of analysing the use of ICT in education. It could be adopted by policy makers at Federal and States levels to forecast the impact of ICT in basic education.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Algorithms for design of single flute end mill cutters[ ]


In this article, designed as a set of three interconnected elements are presented algorithms for analytical and graphical profiling of single flute end mill cutters for manufacturing of aluminium profiles, composite and HPL panels, as and methodology for graphic profiling in an environment of CAD system TopSolid.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Physicochemical properties of materials for single flute end mill cutters[ ]


This article is designed as a set of three interconnected elements. Here are presented the conditions for the formation and removal of of the chip at milling with single flute end mill cutters, examined is instrumental wear, analyzed are the types of materials for the manufacturing of tools, as is paid especially attention to zirconium two - and three - component structures ZrN, ZrC and ZrCN.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Types, geometry and measurement of tool parameters of single flute end mill cutters[ ]


This article is designed as a set of three interconnected elements. Here are presented the purpose and the general classification of single flute end mill cutters, construction and geometry of tools, just like schemes solutions for the measurement of the constructional elements and geometric parameters through universal control device – CGCT. 01.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Software Defined Networks’ Security: An Analysis of Issues and Solutions[ ]


Lately, Software Defined Networks (SDN) has received a lot of attention as a new technology which provides more flexibility than conventional network. It is the decoupling of the data plane from the control plane. In the implementation of SDN, three outstanding benefits readily come to mind; network flexibility, speedy service provisioning and efficiency as well as lower operating expense. SDN also has vast potential of programmability, configurability and manageability from its unique character of centralized software control. The exponential growth of mobile devices and content, server virtualization and the introduction of cloud services are among the key computing trends which need new networking architecture. Furthermore, handling today’s “big data” requires extensive parallel processing on thousands of servers, all of which needs secure connections to each other. These massive, complex, and sensitive data and user requirements beckons on a new improved, dynamic and dependable network infrastructure and architecture which is promised on the centralized control based architecture of SDN. This paper attempts to delineate the strengths and weaknesses of SDN. We commence with a listing of identifiable security threats and breaches of SDN. The paper then makes an analysis of previously outlined solutions to identifiable security issues of SDN. We venture further into the horizon of the unknown to predict and identify new security breaches and threats, as well as areas of inherent weakness in the overall SDN architecture and infrastructure. Possible solutions to the identified issues are proffered and analyzed by the paper. In view of the limitations of this research, the paper prescribes possible positions for future researchers to adopt, in order to shed more light to the pertinent security issues of SDN.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
WRF model analysis of land-surface processes over Jaipur Region[ ]


In this paper, we analyze the effect of Weather Research and Forecasting (WRF) land-surface schemes (LSSs) on simulation of weather events over the capital of Rajasthan city Jaipur. The model essentially computes heat and moisture fluxes over land surface. In order to assess their role in weather phenomenon over the study region, we performed WRF simulations for 30 km resolution domain using four LSSs,namely, WRF: 6-layer Rapid Update Cycle (RUC), 5-layer thermal diffusion, 2-layer Pleim-Xiu scheme (combining surface and boundary layers), and 4-layer Noah scheme. We focused on two things one is time span and another is land surface processes. The results show that Noah and Pleim schemes give us reasonably good results as compare to the other land surface schemes.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
An Empirical Study on Testability Measurement of Object Oriented Software[ ]


Testability has always been a difficult exercise and its accurate estimation or assessment a complex exercise. Most of the studies quantify testability or more specifically the attributes that have influence on software testability but at the implementation level. A decision to transform the design in order to improve software testability after implementation has started may be very error prone and expensive. While estimating testability early in the software development life cycle may significantly reduce the overall development cost. In this paper Testability has been recognized as a major factor to object oriented software quality and importance is being drawn to measure design testability, near the beginning in the software development process. Study identified effectiveness and flexibility are the major factors that affect overall testability at design phase. The identified testability factors are to be correlated with the object oriented design characteristics. After successfully establishing the relationship, study developed Testability Measurement Model for Object Oriented Design. Subsequently testability model has been empirically validated and contextual interpretation has been performed using try out software projects.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
LIPOPROTEIN LIPASE ACTIVITY AND DYSLIPIDEMIA IN UREMIC PATIENTS TREATED WITH HEMODIALYSIS[ ]


There are documented facts that uremic patients present clinical picture of dyslipi-demia associated with the earlier representation of atherosclerosis and serious cardiovascular complications, peripheral arterial lessions with large number and the youngest in comparison with the older population. It is supposed that in uremic patients the subtle changes in the morphology of lipid molecule further increase their atherogenicity (due to greater affinity for sticking to the subendothelial wall of oxidized cholesterol ( oxLDL-ch) and changed. Subfraction  1-HDL-ch is minor subfraction who acts as a initial acceptor of cholesterol Initiation of vaccum created by his own cells and transport under the influence of lecithin acyl cholesterol transferase (LCAT ) fraction 1-HDL-ch passes in  migrant cholesterol -HDL. LCAT in normal plasma affects maturation (maturation) to HDL-ch reconstructed into spherical HDL poorer with lipids in HDL-ch with lipids. Reduced activity of Lipoprotein lipase (LPL) for approximately 33-46% is due to the excessive cumulation of toxins or cytokine-us (Interleukin-1, Interleukin-6, Interleukin- 1α, Interleukin-1  and this phenomenon counted among the main causes of pathological adjustments in lipid metabolism of uremic patients with lower concentrations of HDL-ch, elevated concentrations triglycerides (TG), total cholesterol (TCh) and LDL-ch. Purpose of paper:The aim of the paper was to verify the effect and activity Lipoprotein Lipase (LPL), its impact on the presentation of hypertriglyceridemia and dyslipidemia in uremic patients treated with chronic HD intermitent randomized by age sex and basic disease that has lead them to uraemia with values obtained from lipid parameters and LPL from the group of healthy individuals who served as the control group. The paper also aimed to document the correlation between lipid profile and LPL and influence of their disorders in the appearance of uremic dyslipidemia with consequences of early atherosclerosis (Atherosclerosis uraemica praecox). The paper aims also in proposing measures for drug prevention and treatment and correction of hypertriglyceridemia and cholesterolemia with what would influence the prevention and inhibition of early atherosclerotic processes of uremic patients. The material and methodsIn the prospective cohort study, (,, cross-section ") in total are included N 0 = 520 examined of whom 260 were of uremic patients treated with dialysis while 260 were healthy individuals who served as the control group. Of the total number of patients (N O = 260) treated with HD-110 (45%) were girls while-150 (55%) were male, with an average age: 18.0  58.20 years, treated with dialysis more than 6 years in nephrology-Skopje Clinic and Hospital Clinical examination Tetova.And high prevalence of coronary artery atherosclerosis and cerebral. Disorders of lipid meta-bolism in patients with terminal chronic renal insufficiency (TCRI ) are first documented in 1827 by Dr. Bright (1).

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Model of Magnetic Material Separating Robot[ ]


Every aspect of human endeavor is being controlled by computing and the application of computers in solving human needs has enhanced man’s performances. No doubt, as other areas of computing (Networking, Database administration, software engineering, web design, etc) delve into critically solving human basic problems, the area of Robotics and Artificial Intelligence is not left out as well. In material separation, different particles of varying degree are being separated with different separating mediums. Magnetic materials can be separated from non-magnetic materials and that is the sole basis of this research project. Humans find it difficult to separate magnetic materials from non-magnetic materials due to the fact that there is limited equipment that can handle the automatic material separation available in some places. The Magnetic Material Separating Robot Arm is a robot that is capable of making four movements (clockwise, anticlockwise, upward and downward movements), to enable it move the arm to the direction of the metal, pick some of the materials and drop them in a collecting provision that has been made. In an age where the need for automated systems is on the increase, automated system developers will have to put more effort to see that the need is being met. Meeting the needs of computer automation as well as taking into consideration some precautionary measures is very vital when it comes to automated system development. As in the case of the killer robot, the machine malfunctioned and got an operator killed due to negligence on the side of the system designers; the wrong methodology was adopted and instead of the robot working in favour of humans, it got the operator killed. This paper discusses the steps involved in the design of magnetic material separating robot which is fully computer controlled, the interfacing circuit and control software.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Approaches and Tools for Viewing, Browsing and Querying Semantic Web Data and Ontologies[ ]


Semantic Web is not only a vision, it is the future of the Web, and current Web already includes many well working semantic-based applications. Semantic Web is mainly for computers to make web more convenient for humans, but many peoples have need in direct usage of semantic web knowledge. Thus, querying semantic web and visual representation of semantic web knowledge is of great importance. In this paper we make a brief survey and classification of current semantic web technologies and querying tools. Our main aim is to propose architecture that can support recommendation and easy integration of the right tools for every type user or purpose among the grand amount of the available well working tools for knowledge exploration evolution and querying semantic web.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
An Application of Lean Six Sigma (LSS) in Small and Medium Enterprises (SMEs): Cement bags industry[ ]


In today’s world, business has become more competitive. All industries and organizations have to perform well in order to survive and be profitable. The lean six sigma (LSS) methodology is being applied extensively to tackle many quality related issues in many processes of today’s industries. Various companies have benefited greatly from the adoption of six sigma and lean engineering concepts since their initiation. A paper cement bags is a packaging sack made of paper high quality and usually craft virgin fiber, which usually consists of several layers to provide strength, with high elasticity and high tear resistance, and are designed for packaging products with high demands for strength and durability.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Design of Novel Cross-Coupled Trisection Bandpass Filters with Open-Loop Resonators[ ]


In this paper the method of designing and simulating the cross-coupled trisection bandpass filter using open-loop resonators centered at 1.025 GHz is presented. The filter has a cross coupling that produces a single attenuation pole at finite frequency used to shape the bandpass response. These new resonator is applied to design bandpass filter with pseudo-elliptic response. We have performed an electromagnetic simulation under CST MWS environment. The result is an attenuation pole of finite frequency on the high side of the passband, therefore exhibiting asymmetric frequency response. The simulated trisection filter with a centre frequency exhibits an insertion loss of 0.6 dB and a return loss of −20 dB and 3−dB bandwidth of [972−1078] MHz. The rejection is larger than 30 dB at 1.09 GHz.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Modeling and Simulation of Wave load on Periodic Support for Isolation system of offshore platform[ ]


The wave-induced dynamic load is one of the most important excitations to be dealt with in the design of offshore structures and the platforms. In order to perform a reliable design of an offshore structure, it is important to obtain an exact evaluation of its dynamic response to wave load but also to examine the ways of reducing the response. The work analyzed the effects of wave load on periodic support of isolation system of jacket offshore platform. The platform considered herein as an example to examine the effectiveness of the proposed vibration control strategy for offshore structures. In this section, a parametric study for the jacket offshore platform with installation of the periodic support to enhance isolation system due to its attenuations ability over broad frequencies and the effects of wave load on offshore jacket platforms installed with energy dissipation devices such as periodic support were presented. The offshore jacket platforms are modeled as multi-degrees-of-freedom and the general equation for fluid forces acting on a cylinder, considering the relative motion of the body in the fluid as per the Morison’s equation was applied to form the basis of modeling of the wave load and supports. The analyzes of the effects of wave load on the offshore platform especially with periodic support was considered due to its attenuations over broad frequencies. It could be realized from the result that increase in waves load varies the increase in frequency domain of the system which enhances subjection to vibration.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Tuning Optimization of Hybrid controller for temperature control of heat exchanger by Gradient Descent method[ ]


In this research paper, a Hybrid (PI+FF) controller optimized technique is developed to control the outlet temperature of a shell and tube heat exchanger. The aim of the proposed controller is to optimize the temperature control of a heat exchanger around a temperature set point. The controller regulates the temperature around a setpoint in response to external temperature disturbance. The optimization of hybrid controller provides a optimum solution with number of solution. The proposed technique overcomes the drawbacks of conventional feedback controller and feed-forward controller. The developed tuning optimization of Hybrid PI controller for heat exchanger process has demonstrated 81% improvement in the overshoot and 76% improvement in settling time from the classical controller. Also control accuracy is 100% as steady state error becomes zero.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Big Data In Business[ ]


Even organizations that are totally committed towards big data, which have defined business case along with have been ready for maturing beyond science project phase, face the daunting question: how do they make the big data work? Big Data has not been only one more technology initiative. However, this has not been the technology initiative at all; this has been the business program, which needs the technical savvy.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Peach Canker Caused by Nectria mauritiicola and its Control in Egypt[ ]


Trees of Florida Prince peach cv. grown at Nobaria, El-Behera governorate during 2011 growing season showed typical symptoms of Necteria canker mainly on the branches and often on the twigs.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Investigation into the Flexural Properties of Bamboo-Reinforced Concrete Beam[ ]


Problems encountered with the commonly used construction materials like steel are high cost, corrosion, etc. The urge to overcome these problems without the tensile capacity of reinforced concrete being compromised, has prompted numerous scientists and engineers to seek out locally sourced materials as a replacement for conventional steel reinforcement. Specifically, bamboo is one of the most suitable materials to substitute for reinforcing bar in concrete. This study assessed the suitability of bamboo as reinforcement in concrete. Tests were conducted on both fresh and hardened reinforced concrete. The slump value of 6mm was measure. The compressive strength of 28 days gave the value of 25.26N/mm2 which according to BS code 8110 is satisfactory. For the flexural test, three beam specimens were tested for each of steel reinforcement, bamboo reinforcement and mass reinforcement. For the steel reinforced beam, maximum deflection (4mm) occurred at failure load of 162kN, while the deflection width of beam specimen which was reinforced with bamboo is 6mm at the failure load of 102kN and the deflection width of beam specimen used as control which had no reinforcement was 15mm at the failure load of 95kN. The results showed that steel reinforced beam had the highest strength to withstand load. However, bamboo reinforced beam strength was higher than that of plain concrete beam; hence, it can be used for light load bearing reinforced concrete.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Sahara Desert Interconnected DC Network[ ]


The main objective of this paper is to build regional interconnected DC network extended through the upper part of Africa including Sahara desert in order to maximize the utilization of distributed generation such as solar energy in Sahara desert and wind power in the Mediterranean and the atlantics. The paper also develops friendly integrated techniques to connect the wind farm and solar projected into DC network pool according to standard grid codes without creating operational or stability problems. The paper addresses the challenges of the power mismatch and frequency instability emerges due to nature of renewable power units and the power trading between the regional networks and the dc power pool.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Annual Pattern of Biomedical Waste Generation and the Seasonal Variation[ ]


Waste generation in a healthcare facility depends basically upon a number of factors including but not limited to the number of patients treated, the total bed occupancy rate and the type of diseases treated. These three aspects are controlled by many sub factors but in this case study we have studied the seasonal variation, average temperature and disease outbreak in the area where the health care facility under study is located and the way in which they influence the amount of medical waste generated. Data on medical waste generation at the largest health facility of a hilly town of Himachal Pradesh a northern state of India was collected by observational approach, formal personal interviews, informal dialogue and site visits for analysis between August 2011 and August 2014. It was found out that the waste generated is directly related to the average temperature and varies with the seasonal variations. It was further found out that the waste generated at the health care facility was segregated and treated in accordance to the guidelines laid down by the Central Pollution Control Board of India under the Biomedical Waste (Management & Handling) Rules, 1998.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
CORRELATION OF CD44THE RECEPTOR OF HYALURONAN IN DECIDUAL STROMAL CELLS AND MISCARRIAGE[ ]


To evaluatethe expression of CD44 proteins in women with incomplete first trimester miscarriage. The study included 172 women age 16-41 years were further classified into three categories: Group A- Recurrent spontaneous miscarriage (RSM): n= 65 women, with a mean age of (25.2±7.28) years. Group B- Non- recurrent spontaneous miscarriage (non-RSM): n= 36 women, with a mean age of (26.61 ±6.97)years.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Magnetic mould casting: technical review and methodology[ ]


Casting is a manufacturing process, which is used directly or indirectly in almost every industry. It is a primary manufacturing process and has its effect on the properties of the resultant product. In this era there is a demand to innovate processes, which can reduce lead-time, reduce cost of production without compromising with the quality of the products and reduce ill effects on environment. Magnetic mould casting is an innovative process having a great potential to replace conventional casting methods due to various advantages associated with it. The setup of MMC includes winding of copper wire such that it behaves like a solenoid with hollow cavity in which actual casting process is to be carried out. The setup was prepared with copper wire of 19 gauge and winding is done until required magnetic field is created. The prepared setup and trial runs shows that there is a scope of creation of similar setup at large scale so that MMC can be used at industrial level to utilize its advantages of reduced cost, reduced lead-time, reduced effect on environment and imparting improved properties to the resultant product.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
An empirical assessment on cost-effectiveness and re-usability of test cases based on defect severity levels in regrerssion testing[ ]


Regression testing is an important part of the software development life cycle. In this paper an empirical assessment is made between defect priority and defect severity levels. This is assessment is done because, when priorities are assigned to the defects it can dynamically change, but defect severity is absolute and does not change as they reflect the state and quality of the product. Testing the software based on defect severity levels requires a defect bash. When this process is carried out at a given fixed time maximum defects or faults can be revealed. In this approach defect severity levels are assigned using a metric called Total Severity of Faults Detected (TSFD) .In Test Case Prioritization technique the test cases are discarded, those discarded test cases are repaired using the test case repairer and then stored into Test Case Bin(TCB).This TCB acts as a repository to store those repaired test cases. The reason is, instead of writing new test cases, the repaired test cases in TCB are used as well. This TCB not only achieves reusability of test cases but it is highly cost-effective too.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Optimization of Ternary Combinational System[ ]


This paper presents basic concept about ternary number system, this paper gives us idea about symbol and truth table of ternary gates it also gives novel method for defining, analyzing and implementing the basic combinational circuitry with minimum number of ternary gates. This paper provides concept of Boolean algebra to ternary number system. The 3:1Multiplexeris designed using ternary gates to realize combinational circuitry that provides complete, concise, implementation-free description of the ternary functions involved. Half and full adder circuit implemented using ternary gates the method is useful in analyzing the complex ternary functions and reduction of gate count. This paper also presents a survey on ternary switching algebra.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Detection and Avoidance of Wormhole Attack in MANET[ ]


The wireless mobile Ad-hoc network (MANET) is self-configuring mobile nodes connected through the wireless links with the decentralized networks where the nodes communicate with each other on the basis of mutual trust. For the network design, nature of the MANETs brings a new security challenges. Due to the dynamic infrastructure less nature and decentralized networks, wireless Ad-hoc networks are unprotected and vulnerable to the attack. This paper focuses on the study of the wormhole attack and avoidance of it. In this paper detection and avoidance techniques of wormhole attack are implemented in MANET routing protocol namely TORA as reactive routing protocol. The performance of TORA is compared without wormhole attack, with wormhole attack and after avoidance of wormhole attack. Performance metrics used for evaluation are throughput, delay and packet delivery ratio. The technique is based on the nodes quality index value. Simulation done with 16 nodes and in these two nodes considered as malicious node in Network Simulator2 (NS2).

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Novel Approach for choosing smart feature set victimization using clustering algorithm for HD[ ]


By involving known a set of the foremost helpful options that produces additional compatible results set because the original entire set of excellent options, a decent feature choice for top dimensional information i.e.High dimensional Data(HD). The potency and effectiveness points of read are often evaluated for a decent feature choice algorithmic rule to go looking a decent set of options, the potency of HD associated with the time that is needed, and also the effectiveness of HD is that the quality of excellent set options. There area unit 2 steps of quick works, a decent feature set choice algorithmic rule. the great options set is distributed into clusters by victimisation graph supposed agglomeration ways, within the initiative of quick algorithmic rule. The most representative, helpful and effective feature that's most ordinarily associated with target categories and designated from every cluster to make a set of excellent options, within the second step. we tend to adopt the economical minimum spanning tree bunch technique for potency of quick.We tend to use prunning call tree technique for constructing economical civil time.The worth of a knowledge item is usually diagrammatical, not by multiple values, however by varied values forming a chance distribution. The ensuing classifier is a lot of correct than those exploitation price averages, in depth analysis are performed that show.The price of process chance density functions is quite that of process single values.Call tree construction on unsure information is a lot of mainframe hard-to-please than that sure information.We tend to propose a series of pruning techniques that may be extremely improve construction potency to unravel or decrease this downside. For extremely improve construction potency we tend to propose a paronomasia techniques.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Novel design approach Microstrip Patch Antenna Design for Ultra wideband Applications[ ]


There are various types of Microstrip antennas that can be used for many applications in communication systems. This paper proposes the design of a Bevel Shape rectangular Microstrip patch antenna to operate in a frequency range of 1.55 GHz to 2.2 GHz. We have designed the antenna, based on a thickness of 1.6 mm, Flame Retardant 4 substrate with a dielectric constant of approximately 4.4, is a probe feed and has a partial ground plane. After mathematical design and simulation tool results, the antenna performance characteristics such as antenna VSWR and Return Loss are substantially improved. The simulation was done using Hyperlink 3D simulator software

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A new look depending on the cover image data for hiding and retrieval the secret information by using LSB technique[ ]


The hiding operation of important ways to keep the Confidential data for Security institutions and the private property of individuals When transported through the internal network or Internet networks,and the objective of the hiding operation It is to remove any doubts about the existence of hidden data reverse the encryption process which raises doubts , The most important characteristic of concealment techniques that they keep pace with new technologies With the availability of different types of center-carrier or the so-called cover .In this research was to improve the hiding way Depending on the LSB Technique,and that of through hiding then jump , including a bits in a specific location of the picture And move to the next site based on the value of previous site After addition . In this way we are sending the picture with two keys They are the start and finish site.where the site value be represented by the total of ones number (1) or the total of zeros number (0)Per byte plus the Driving force (Impetus),where the impetus value be selected by user.the Features this method , Flexibility where applied to all kinds of images , Ease of hiding and retrieval, and the Durability from where of the large number of possibilities that be from the impossibility to Predict the existence of a secret message , This is what distinguishes this proposed algorithm, especially if conducted some encryption technologies on confidential data ,In order to clarify the idea of the proposed algorithm is applied to the image of the grayscaletype , the English text , and Arabic texts, The use of Efficiency standards (PSNR) and (MSE) For the purpose of measuring the level of efficiency of the proposed algorithm , Matlab language was used for the application of the proposed algorithm .

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Optimum Utilization of Solar Energy in Domestic Sector in India[ ]


India is endowed with abundance of solar radiation. The country receives solar radiation equivalent to more than 5, 000 trillion kWh/year, which is far more than its total annual energy requirement. The radiation available could be utilized for thermal as well as for photovoltaic applications. Solar thermal technologies have already found ready acceptance in a variety of decentralized applications in domestic, industrial and commercial sectors of the country. The most widely acceptable application is the solar water heating technology. However, solar steam generating and air heating technologies and energy efficient solar buildings are also attracting attention in urban and industrial areas. Among solar photovoltaic technologies, there are several important devices such as solar lanterns, solar home systems, solar street lights, solar pumps, solar power packs and roof top SPV systems. They could be useful both in rural and urban areas for the purpose of reducing the burden on conventional fuels. As the dependence on conventional fuels is decreased, the environmental pollution will go down. Significant among renewable energy sources is solar energy which is fortunately all pervasive, readily available almost throughout the year in India and non-depleting. In this study, primary focus has been given to optimum utilization of solar energy in domestic sector in such activities as cooking, lighting, water and air heating, drying, etc. Increased use of solar energy will also have health benefits; in particular women will be saved from drudgery and ailments.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------


Pages   [1] [2] [3] [4] [5] [6] [7] [8] [9] [U]