Author
Asha Rani

Org/Univ
IPEM Law Academy, India

Keywords
Judicial Activism, fundamental rights, Directive, Principles, Judgment

View AbstractCitationView PDF

Full Paper PDF (View in new tab)

Abstract

Judicial Activism is not a result of general development of judicial procedure. It is an essential aspect of the dynamics, derivatives and independent findings of the courts. It is a specific judicial interest about the issues. Judicial Activism does not mean governance by the judiciary. Judicial Activism must also function within the limits of judicial process. Within those limits it performs the function of stigmatizing, as well as legitimizing, the actions of the other bodies of the Government- more often legitimizing. The judiciary is having certain limitation according to statutes which are framed by the legislature. It becomes strong only when people repose faith in it. Such faith constitutes the legitimacy of the Court and of judicial activism. Courts do not have to bow to public pressure, but rather they should stand firm against public pressure. Such inarticulate and diffused consensus about the impartiality and integrity of the Judiciary is the source of the Court’s legitimacy. It is an essential aspect of the dynamics of a constitutional court, in modern India, the judicial activism may develop through many aspects and it will play an important role to future challenges of the democratic India.

Cite this paper

IEEE
Asha Rani. A Review on Judicial Activism, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Asha Rani (2016). A Review on Judicial Activism. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Asha Rani. "A Review on Judicial Activism." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Mr. Insha Mushtaq

Org/Univ
PEC, Panchkula, Kurukshetra University, India

Keywords
VANET, PUMA Protocol, V2V, Genetic Algorithm, ITS

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Aashish Gagneja, Navjot Kaur

Abstract

In most of the automobile system avoiding collision is a critical issue. A “Vehicle Collision Avoidance System” in an automobile system is a safety system that is designed to reduce the chances of collision .Collision avoidance is one of the most important issues in controlling vehicles automatically. The job of driving vehicles can be made easier by the use of these system, as well as these system ensures to manage the traffic efficiently with road safety. In this paper we consider a VANET scenario for road side safety and to solve the emergency situation. To improve the performance for large scale network having large traffic and communication between vehicles is done by using routing protocol. Here we introduce a PUMA protocol and compare its results. Also we apply Genetic Algorithm on this protocol for the path optimization to achieve maximum results. By varying number of vehicles (nodes) mean throughput, mean delay, jitter, PDR has been calculated. In this paper application and future scope of VANETs is also introduced.

Cite this paper

IEEE
Mr. Insha Mushtaq, Aashish Gagneja, Navjot Kaur. Protocol Enhancement of Vehicle Collision Avoidance System in Network, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Mr. Insha Mushtaq, Aashish Gagneja, Navjot Kaur (2016). Protocol Enhancement of Vehicle Collision Avoidance System in Network. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Mr. Insha Mushtaq, Aashish Gagneja, Navjot Kaur. "Protocol Enhancement of Vehicle Collision Avoidance System in Network." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Mariya Ameer

Org/Univ
PEC, Panchkula, Kurukshetra University, India

Keywords
Botnet, Bot, Botmaster, Hill Cipher, MANET, SVM, Mitigation

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Aashish Gagneja, Navjot Kaur

Abstract

Botnets are the networks of remotely controlled computer systems infected with a malicious program that allow cyber crimes to control the infected computers or machines without the user’s knowledge. Botnets are the most ever-growing much interested evolved in the design of mobile adhoc networks (MANET). A botnet in mobile network is defined as a collection of nodes containing a malware called mobile malware which are able to bring the different elements into harmonious activities. Unlike Internet botnets, mobile botnets do not need to propagate using centralized structure. With the advent of internet and e-commerce application data security is the most critical issue in transferring the information throughout the internet. Botnets are emerging as the most significant threat facing computing assets and online ecosystems. The sharing of information through internet has been the main driver behind the Elite hacker into criminal activities. Their main target is to steal the vulnerable information from the individuals or from the organizations. In other words we can say their purpose include the distribution of spam emails, coordination of distributed denial of service (DDoS) and automatic identity theft. The proposed method is a classified model in which a Hill Cipher Algorithm and a Support Vector Machine are combined. A MANET environment with real time datasets is simulated for testing this model; the packet data of network flow was also collected. The proposed method was used to identify the critical features that determine the pattern of botnet. The experimental results indicated that the method can be used for identifying the essential botnet features and that the performance of the proposed method was superior to that of Artificial Fish Swarm Algorithm.

Cite this paper

IEEE
Mariya Ameer, Aashish Gagneja, Navjot Kaur. Detection and Mitigation of Botnet through Machine Learning in MANET, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Mariya Ameer, Aashish Gagneja, Navjot Kaur (2016). Detection and Mitigation of Botnet through Machine Learning in MANET. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Mariya Ameer, Aashish Gagneja, Navjot Kaur. "Detection and Mitigation of Botnet through Machine Learning in MANET." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Roshni Singh

Org/Univ
Madan Mohan Malaviya University of Technology, Gorakhpur, UP, India

Keywords
Cloud Computing, Dynamic Resource Allocation, Resource Management, Resource Scheduling.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Dr. Shiva Prakash

Abstract

Cloud computing environment provisions the supply of computing resources on the basis of demand, as and when needed. It builds upon advances of virtualisation and distributed computing to support cost efficient usage of computing resources, emphasizing on resource scalability and on-demand services. It allows business outcomes to scale up and down their resources based on needs. Managing the customer demand creates the challenges of on demand resource allocation. Further they can make use of company-wide access to applications, based on pay-as-you-go model. Hence there is no need for getting licenses for individual products. Virtual Machine (VM) technology has been employed for resource provisioning. It is expected that using virtualized environment will reduce the average job response time as well as executes the task according to the availability of resources. Effective and dynamic utilization of the resources in cloud can help to balance the load and avoid situations like slow run of systems. In this paper, various resource allocation strategies and their challenges are discussed in detail. It is believed that this paper would benefit both cloud users and researchers in overcoming the challenges faced.

Cite this paper

IEEE
Roshni Singh, Dr. Shiva Prakash. Survey on Dynamic Resource Allocation Schemes in Cloud Environment: A Review, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Roshni Singh, Dr. Shiva Prakash (2016). Survey on Dynamic Resource Allocation Schemes in Cloud Environment: A Review. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Roshni Singh, Dr. Shiva Prakash. "Survey on Dynamic Resource Allocation Schemes in Cloud Environment: A Review." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Ataussamad

Org/Univ
Madan Mohan Malaviya University of Technology, Gorakhpur, UP, India

Keywords
Steganography, Security, CSP, Cryptography, Iaas, Paas, Saas.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Dr. Shiva Prakash

Abstract

Cloud Computing is a flexible, cost-efficient, and authentic platform for providing business or consumer IT enabled services on the Internet. However, Cloud computing represents an added level of risk factors because important and essential services are often outsourced to a third party connected to cloud network, which makes it even harder to maintain the level of data security. Steganography is the technique of hiding or encapsulating information in digital media in order to prevent the existence of information. The digital media with hidden information within are called stego media and the data without hidden information are called cover media. Steganography can be used for hiding both the legal as well as illegal information. For example, civilians can use it for maintaining privacy while the government may use it for the security reasons of the country. In this paper we have discussed about the various techniques by which we can enhance the cloud service in relation to security and data privacy.

Cite this paper

IEEE
Ataussamad, Dr. Shiva Prakash. A Review in Cloud Computing Security using Steganography, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Ataussamad, Dr. Shiva Prakash (2016). A Review in Cloud Computing Security using Steganography. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Ataussamad, Dr. Shiva Prakash. "A Review in Cloud Computing Security using Steganography." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Ramanpreet Kaur

Org/Univ
Chandigarh Group of Colleges, Landran, Chandigarh, India

Keywords
Probabilistic neural network, Non-negative matrix factorization, object detection, object classification.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Meenu Talwar

Abstract

The number of vehicles in the urban areas is rising at high pace. The critical issues are arising with the rise in the number of vehicles for the traffic analysis. The analysis of the vehicle running across the roads is usually done for the density analysis, traffic shaping and many other similar applications. The vehicle detection in the rushed areas produces the real challenge of independent component selection and classification, which requires the precise object detector with deep analytical ability based classification algorithm. In this paper, the unique method with probabilistic neural network (PNN) classification model along with the non-negative matrix factorization for the purpose of vehicular object localization and classification in the urban imagery. The proposed model is expected to solve the problems associated with the accuracy, precision and recall.

Cite this paper

IEEE
Ramanpreet Kaur, Meenu Talwar. Automated Vehicle Detection and Classification with Probabilistic Neural Network, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Ramanpreet Kaur, Meenu Talwar (2016). Automated Vehicle Detection and Classification with Probabilistic Neural Network. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Ramanpreet Kaur, Meenu Talwar. "Automated Vehicle Detection and Classification with Probabilistic Neural Network." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Kaustav Jyoti Borah

Org/Univ
Gauhati University, Assam, India

Keywords
LO, UIO, SMO.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Jutika Borah

Abstract

a state observer is a system that models a real system in order to provide an estimate of the internal state of the system. The design techniques and comparison of four different types of state observers are presented in this paper. The considered observers include Luenberge observer, unknown input observer and sliding mode observer. The application of these observers to a Multiple Input Multiple Output (MIMO) DC servo motor model and the performance of observers is assessed. In order to evaluate the effectiveness of these schemes, the simulated results on the position of DC servo motor in terms of residuals including white noise disturbance and additive faults are compared.

Cite this paper

IEEE
Kaustav Jyoti Borah, Jutika Borah. Comparison of State Observer Design Algorithms for DC Servo Motor Systems, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Kaustav Jyoti Borah, Jutika Borah (2016). Comparison of State Observer Design Algorithms for DC Servo Motor Systems. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Kaustav Jyoti Borah, Jutika Borah. "Comparison of State Observer Design Algorithms for DC Servo Motor Systems." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Ramandeep Kaur

Org/Univ
Chandigarh University, India

Keywords
PID controller,CSTR,optimize,PSO

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Jaspreet Kaur

Abstract

In this paper conventional PID controller provides satisfactory results, still inefficiency persists due to extreme non-linear nature and uncertainty in the dynamics of the plant. So optimize the pidnon linear behavior by Gravitational search algorithm and partical swarm optimization. The PID controller is the most common form of feedback. PID control isused at the lowest level; the multivariable controller gives the set points to the controllers at the lower level. The PID controller can thus be saidto be the “bread and butter’ of control engineering. It is an importantcomponent in every control engineer’s tool box.PIDcontrollers have survived many changes in technology, from mechanicsand pneumatics to microprocessors via electronic tubes, transistors,integrated circuits.

Cite this paper

IEEE
Ramandeep Kaur, Jaspreet Kaur. Proposed Approach on CSTR with PID, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Ramandeep Kaur, Jaspreet Kaur (2016). Proposed Approach on CSTR with PID. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Ramandeep Kaur, Jaspreet Kaur. "Proposed Approach on CSTR with PID." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Vikasdeep Kaur

Org/Univ
Bahra Group of Institute, Patiala, Punjab, India

Keywords
MPLS, ISIS, OSPF, Dijkstra’s Shortest Path algorithm, BGP, EIGRP, VPN.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Harpreet Kaur, Jaspreet Kaur

Abstract

OSPF is mainly designed for IP networks from scratch and runs in almost all sorts of environments like enterprise, data centers, or service providers, while ISIS, which was mainly designed by ISO was not intended to run for IP based networks from scratch and IETF in the early 1990’s adopted ISIS for its advantages. As a scalability purpose ISIS is better than OSPF, but when we have a large database or a large service provider, with only a single level design inside the service provider Both the routing protocols have different authentication mechanisms with ISIS providing key chain based mechanism and provides both plain-text and MD5 based integration with it, while OSPF also provide MD5 and SHA1 hashing based authentication when used with IPv6. Multiprotocol label switching technology (MPLS) is used to transfer the data in service provider network. Apart from Interconnecting Data Centers, L2VPNs are also used for Inter-AS service provider’s connectivity and connecting various Enterprise Branch offices with each other. Selection of right L2VPN technology is very important as wrong technology can harm the network. The main focus of this technique to give the solutions for slow speed, quality of service, lack of traffic engineer, less security and problem in trouble shouting. The motive is to improve the speed, high security, easily trouble shoot, high quality in terms of packet transformation and better results for traffic engineering.

Cite this paper

IEEE
Vikasdeep Kaur, Harpreet Kaur, Jaspreet Kaur. Behavior Analysis of OSPF and ISIS Routing Protocols with Service Provider Network, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Vikasdeep Kaur, Harpreet Kaur, Jaspreet Kaur (2016). Behavior Analysis of OSPF and ISIS Routing Protocols with Service Provider Network. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Vikasdeep Kaur, Harpreet Kaur, Jaspreet Kaur. "Behavior Analysis of OSPF and ISIS Routing Protocols with Service Provider Network." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Priyanka Malhotra

Org/Univ
Chitkara University, Punjab, India

Keywords
SC-FDMA, adaptive channel estimation, PAPR, LMS, PSO

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Garima Saini

Abstract

The third generation partnership project has employed SCFDMA for its uplink transmission because of its low PAPR. SCFDMA signal while travelling through channel is affected by noise contained in the channel. Various channel estimation techniques has been given in the literature. This paper presents a channel estimation based on LMS with its parameters being optimised using PSO. The paper also compares result with existing LMS algorithm based systems. It has been observed that the proposed technique provides improvement in Bit Error Rate as compared to other technique.

Cite this paper

IEEE
Priyanka Malhotra, Garima Saini. Optimizing Channel Estimation for SCFDMA, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Priyanka Malhotra, Garima Saini (2016). Optimizing Channel Estimation for SCFDMA. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Priyanka Malhotra, Garima Saini. "Optimizing Channel Estimation for SCFDMA." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Sandhya Sehraw‎at

Org/Univ
DCRUST, Murthal, Haryana, India

Keywords
Mobile wireless, Sensor Networks, Data Aggre‎gation.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Dr. D‎INESH SIN‎GH

Abstract

The addition of mobility in WSN ha‎s att‎racted signific‎ant i‎nterest in recent years. Mo‎bile nodes incre‎ase the ca‎pabilities of the WSN in m‎any way‎s. W‎e c‎lassify mobile wireless sensor networks (MWSNs) as a spec‎ial and ada‎ptable c‎lass of WSN, in which one or more th‎an one e‎lement of the network is mobile. The mobile componen‎t can b‎e any of the sensor nodes, rela‎ys (i‎f any), data c‎ollectors or sink or any combina‎tion of them. Fr‎om d‎eployment to data disseminat‎ion, mobility p‎lays a‎n i‎mportant rol‎e in ever‎y f‎unction of sensor networks. F‎or examp‎le, a mobile node can visi‎t oth‎er nodes in the network and ga‎ther data direct‎ly t‎hrough sin‎gle-ho‎p tra‎nsmissions. Simila‎rly a mobile node can trave‎l ar‎ound the sensor network and collect data from sens‎ors, bu‎ffer them, and t‎hen t‎ransfer them to base station. This considerabl‎y red‎uces onl‎y colli‎sions and data loss‎es, and als‎o minimiz‎es the pres‎sure of data forward‎ing ta‎sk by nodes and as a r‎esult spre‎ads the energy cons‎umption more consi‎stently througho‎ut the network. The proposed data aggregati‎on mechani‎sm us‎es bacteria‎l foraging optimization algorithm. This techn‎ique is i‎nspired by the so‎cial foraging behav‎iour lik‎e a‎nt col‎ony and pa‎rticle swar‎m optimization. The proposed algorithm improves WSN th‎roughput, coll‎ects data more efficientl‎y, and save‎s energy.

Cite this paper

IEEE
Sandhya Sehraw‎at, Dr. D‎INESH SIN‎GH. A Sec‎ure D‎ata Ag‎gregation Mecha‎nism in Wire‎less Senso‎r Netw‎ork, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Sandhya Sehraw‎at, Dr. D‎INESH SIN‎GH (2016). A Sec‎ure D‎ata Ag‎gregation Mecha‎nism in Wire‎less Senso‎r Netw‎ork. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Sandhya Sehraw‎at, Dr. D‎INESH SIN‎GH. "A Sec‎ure D‎ata Ag‎gregation Mecha‎nism in Wire‎less Senso‎r Netw‎ork." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Khursheed Ahmad Rather

Org/Univ
PEC, Panchkula, Kurukshetra University, India

Keywords
Leach, Sep, Zigbee, Adhoc network.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Aashish Gagneja, Navjot Kaur

Abstract

The great potential of Wireless Sensor Network is being seen in industrial, consumer and commercial application. The wireless technology is becoming one of the most prominent areas of research. With the development of network and communication technology, the WSN has solved the inconvenience into people’s lives. WSN has good functions of data collection, transmission, and processing. In the older technology there was a shortcoming of average packet time delay, large power dissipation, less efficient reception of packets, large propagation delay, low speed communication. Besides there were other limitations like limited battery life time nodes incapability of data aggregation, processing, storing and then passing it to the base station accordingly.. As in the earlier Technologies WSN node based leach protocol could not provide the above necessary requirements for the system to operate under well adverse environmental situations. In this dissertation, we have used a ZigBee protocol in WSN system for ensuring that the nodes may operate for a longer period of time, reducing packet time delay, establishment of a re-linking algorithm and provides an efficient reception packet and sufficient throughput The advantage of ZigBee Technology is that it covers a range of 1-100m For comparison purposes, we have taken the oldest technology i.e SEP .To allow different systems to work together, standards are needed. ZigBee/IEEE 802.15.4 protocols are developed for this purpose. Moreover, ZigBee protocol in WSN has resulted in the low power consumption, enhancement of life time of battery reduced average packet time delay less power dissipation improved an efficient reception of packets, reduced propagation delay, high speed communication among wireless communication devices. On comparing the results of both that is the previous work over which work has been done earlier and present work it has been observed that modified system performs better.

Cite this paper

IEEE
Khursheed Ahmad Rather, Aashish Gagneja, Navjot Kaur. Efficient Reception of Packets using Zigbee Protocol Wireless Sensor Network, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Khursheed Ahmad Rather, Aashish Gagneja, Navjot Kaur (2016). Efficient Reception of Packets using Zigbee Protocol Wireless Sensor Network. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Khursheed Ahmad Rather, Aashish Gagneja, Navjot Kaur. "Efficient Reception of Packets using Zigbee Protocol Wireless Sensor Network." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Attinderpal Singh

Org/Univ
Guru Nanak Dev University, Amritsar, India

Keywords
Plagiarism, Porter, TD-IDF, Cosine, Similarity, Java.

View AbstractCitationView PDF

Full Paper PDF (View in new tab)

Abstract

With the advent of internet everything that has been researched is available on the internet. This information can be copied and used as original by someone in their own work which poses a major challenge for academia and industries like publications. A lot of work has been done in the field to detect plagiarism in the documents and algorithms have been made. In this paper, we have implemented porter algorithm for stemming, TF-IDF and cosine similarity to detect plagiarism

Cite this paper

IEEE
Attinderpal Singh. Implementation of Plagiarism Detection Tool in JAVA, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Attinderpal Singh (2016). Implementation of Plagiarism Detection Tool in JAVA. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Attinderpal Singh. "Implementation of Plagiarism Detection Tool in JAVA." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Kaustav Jyoti Borah

Org/Univ
Gauhati University, Assam, India

Keywords
IPV4, IPV6, Triangle Routing, Datagrams, Routing.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Jutika Borah

Abstract

Communication is nothing but transfer of information from source point to destination point over a medium and coming to Communication Routing it is a process in which to find how shortest and fastest communication is achieved between the two ends for the Optimization of the Network. In this paper I would like to discuss about how optimization is achieved in communication network through the application of information like accuracy, throughput, latency and mobility support and different protocols followed by networks for the optimized route. And I will also explain about advantages of network coding in improving the throughput over routing. Explained how different network algorithms are used for solving optimization problems in communication routing for example like genetic algorithm used in routing optimization of optical fiber communication networks. And discussed about Optimizing the layered communication Protocols.

Cite this paper

IEEE
Kaustav Jyoti Borah, Jutika Borah. Optimization in Communication Routing: An Introduction to Optimal Control, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Kaustav Jyoti Borah, Jutika Borah (2016). Optimization in Communication Routing: An Introduction to Optimal Control. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Kaustav Jyoti Borah, Jutika Borah. "Optimization in Communication Routing: An Introduction to Optimal Control." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Dr. Vandana N. Purav

Org/Univ
P. D. Karkhanis College of Arts and Commerce, Ambarnath, India

Keywords
Golden ratio, Partition, Rogers-Ramanujan identities,

View AbstractCitationView PDF

Full Paper PDF (View in new tab)

Abstract

Golden ratio Associated with Rogers -Ramanujan Identities Dr. Vandana N. Purav P.D.Karkhanis College of Arts and Commerce, Ambarnath Email : vnpurav63@gmail.com Abstract Ramanujan was an eminent Indian Mathematician of 20th century. During the years 1903-1914 he discovered most of the mathematical results . In this note, we focus on the results associated with Rogers- Ramanujan identities of first and second kind and Golden Ratio.

Cite this paper

IEEE
Dr. Vandana N. Purav. Golden Ratio Associated with Rogers-Ramanujan Identities, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Dr. Vandana N. Purav (2016). Golden Ratio Associated with Rogers-Ramanujan Identities. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Dr. Vandana N. Purav. "Golden Ratio Associated with Rogers-Ramanujan Identities." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Karamjeet Kaur

Org/Univ
Rayat Bahra Group of Institutes, Patiala, India

Keywords
Cluster, metaheuristic, optimization

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Harpreet Kaur

Abstract

— In this thesis, the extra burden of the nodes that are within the neighbourhood of the base station in a cluster-based network has been modelled as extra virtual member nodes. We virtually divide the network into regions according to the proximity to the BS denoting the closest region as the front region and the farthest region as the rear region. The nodes have been classified according to the region that they fall in. Based on our model, transmission tuning algorithm for cluster-based WSNs has been proposed to balance the load among cluster heads that fall in different regions. This algorithm is applied prior to a cluster algorithm to improve the performance of the clustering algorithm without affection the performance of individual sensor nodes. As a result, the network lifetime has been prolonged.

Cite this paper

IEEE
Karamjeet Kaur, Harpreet Kaur. Novel Clustering based Routing Approach in MANET by Flower Pollination Algorithm, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Karamjeet Kaur, Harpreet Kaur (2016). Novel Clustering based Routing Approach in MANET by Flower Pollination Algorithm. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Karamjeet Kaur, Harpreet Kaur. "Novel Clustering based Routing Approach in MANET by Flower Pollination Algorithm." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
DR. K. Gomathi

Org/Univ
J. J. College of Arts & Science(Autonomous)- Pudukkottai, India

Keywords
Job related variables, Demographic Variables.

View AbstractCitationView PDF

Full Paper PDF (View in new tab)

Abstract

Women established an identity of their own and created a space for them in education and work sphere. Educational institutions started training women to enter new arenas enabling them to move away from traditional roles. Families began expecting women not only to continue with higher education, but also to pursue any interest they may have in the profession. And, naturally, after spending so many years in education and obtaining professional degrees, they became interested in using the knowledge acquired productively. As a result, modern Indian women have made inroads into different professions that were unthinkable to women in the past. The number of women in the profession is increasing and they are making substantial progress toward parity with men. Today, in India, one can find more and more women in familiar as well as unfamiliar places - as heads of giant organizations, at the controls of aircrafts, in parliament, in judiciary, as police officers, doctors, engineers, teachers- the list is never ending. By tradition and throughout history, Indian women were expected to fulfill roles that defined them in relation to others only, – the kinship identities. But increasingly contemporary women establish independent identities and move beyond the identities of daughter, wife and mother. The present study has made an attempt to study the work value perceptions of women employees in Indian Postal Department.

Cite this paper

IEEE
DR. K. Gomathi. A Study on Work Value Perceptions of Women Employees in Indian Postal Department with Special Reference to Tamil Nadu State., International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
DR. K. Gomathi (2016). A Study on Work Value Perceptions of Women Employees in Indian Postal Department with Special Reference to Tamil Nadu State.. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
DR. K. Gomathi. "A Study on Work Value Perceptions of Women Employees in Indian Postal Department with Special Reference to Tamil Nadu State.." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Dr. B. Anitha Rani

Org/Univ
J. J. College of Arts & Science(Autonomous)- Pudukkottai, India

Keywords
Employee Welfare, Safety and Security, Healthy environment.

View AbstractCitationView PDF

Full Paper PDF (View in new tab)

Abstract

Safety and security measures are inevitable in any organization where workers are involved. An organization’s responsibility to its employees extends beyond the payment of wages for their services. The employee’s safety and security on and off the job within the organization is a vital concern for the employer. Providing a safe and healthy environment is a pre-requisite for any productive effort. Knitted Garment Apparels is a private limited unit, was one of the leading exporters from Tirupur, since They are now giving the expansion of business and looking up for new sources . This research deals with the study is on the safety and security measures provided to the employees at Tirupur Knitted Garment Apparals,Tirupur .

Cite this paper

IEEE
Dr. B. Anitha Rani. Employee Satisfaction of Safety and Security Measures in Knitted Garment Apparels Pvt(Ltd), Tirupur, (Tamil Nadu, India)., International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Dr. B. Anitha Rani (2016). Employee Satisfaction of Safety and Security Measures in Knitted Garment Apparels Pvt(Ltd), Tirupur, (Tamil Nadu, India).. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Dr. B. Anitha Rani. "Employee Satisfaction of Safety and Security Measures in Knitted Garment Apparels Pvt(Ltd), Tirupur, (Tamil Nadu, India).." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Samriti Goyal

Org/Univ
Gurukul Vidyapeeth Institute of Engineering and Technology, Banur, Punjab, India

Keywords
Cost, energy, mobile offloading, cloud.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Bhartii Grover

Abstract

Offloading in mobile cloud computing by exception maximization algorithm is the idea to augment execution through migrating heavy computation from mobile devices to resourceful cloud servers and then receive the results from them via wireless networks. Offloading is an effective way to overcome the resources and functionalities constraints of the mobile devices since it can release them from intensive processing and increase performance of the mobile applications, in terms of response time. Offloading brings many potential benefits, such as energy saving, performance improvement, reliability improvement, ease for the software developers and better exploitation of contextual information. Parameters about method transitions, response times, cost and energy consumptions are dynamically re-estimated at runtime during application executions.

Cite this paper

IEEE
Samriti Goyal, Bhartii Grover. Offloading in Mobile Cloud Computing by Exception Maximization Algorithm, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Samriti Goyal, Bhartii Grover (2016). Offloading in Mobile Cloud Computing by Exception Maximization Algorithm. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Samriti Goyal, Bhartii Grover. "Offloading in Mobile Cloud Computing by Exception Maximization Algorithm." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Ritu Sharma

Org/Univ
MDS University, Ajmer, India

Keywords
Bio remediation, Hazardous wastes, Oil spills, Hydrocarbon.

View AbstractCitationView PDF

Full Paper PDF (View in new tab)

Abstract

Bioremediation is the use of biological treatment to destroy or reduce the concentration of hazardous wastes from a contaiminated sites. such system involves the uses of biological organisms such as bacteria fungi and plants, to reduce or eliminate toxic pollutants from contaminated sites by degradation assimilation or transpiration in the atmosphere is called bioremediation degradation is the mode of elimination mostly in case of organic compounds while heavy metals are assimilated. These microbes and higher plants can also be variously modified by genetic engineering to become efficient and suitable for bioremediation.

Cite this paper

IEEE
Ritu Sharma. Bioremediation of Petroleum Products through Bacterial Isolates., International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Ritu Sharma (2016). Bioremediation of Petroleum Products through Bacterial Isolates.. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Ritu Sharma. "Bioremediation of Petroleum Products through Bacterial Isolates.." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Ritu Sharma

Org/Univ
MDS University, Ajmer,Rajasthan, India

Keywords
Antibiotics, Petroleum, Response hydrocarbon bioremediation sensitivity resistance.

View AbstractCitationView PDF

Full Paper PDF (View in new tab)

Abstract

All the bacterial isolates were studied for their responses to various antibiotics. Out of 28 bacterial forms, 12 forms were resistant to ampicillin, 10 forms to penicillin, 3 forms to erythromycin, 5 forms to streptomycin and only one isolate was resistant to tetracycline. Indicating that tetracycline was the most effective antibiotic for these bacteria.

Cite this paper

IEEE
Ritu Sharma. Response of Bacterial Isolates to Various Antibiotics Isolated from Petroleum Spilled Soil., International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Ritu Sharma (2016). Response of Bacterial Isolates to Various Antibiotics Isolated from Petroleum Spilled Soil.. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Ritu Sharma. "Response of Bacterial Isolates to Various Antibiotics Isolated from Petroleum Spilled Soil.." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Ahsan Ul Haq

Org/Univ
BGSBU, Rajouri, India

Keywords
Microfinance, Financial Institution, poverty, NABARD, SHGs. NGOs, savings, MFIs, NPAs

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Dr. Javed Iqbal

Abstract

Abstract The purpose of this paper is to examine the role of financial institution and to study the different microfinance models which are empowering rural finance development in India. In this paper an attempt is made to find out how financial institutions are empowering the rural people and study the different microfinance models as well as different clients of the microfinance. India which is the one of the largest microfinance center in the world nowadays. In India more than 25% of its population lives below poverty line. For this poverty alleviation the Govt. of India started various programmes from time and again but failed in achieving this goal. The reasons behind the failure are such as the Govt. of India fail to reach the target population, the loophole in the system, corruption etc. The different countries of the world come with different ideas and schemes and these schemes increased the NPAs .Then the microfinance institution come forward to fulfill these gaps but the outreach is small as compared to the requirement and potential but some progress had been seen in this regard when NABARD and SHGs played an active role in this. After than numbers of different microfinance institution and different NGOs also dived in this business. Govt. must power the microfinance institution for mobilizing savings, with increase demand for the rural finance .How ever keeping in mind the recent experiences, and for the better growth we need to managed these microfinance institution in a better way and provide them adequate finance which full fill the needs of poor and also provide them a social responsibility which is most important for the growth of these microfinance institution and for alleviating poverty from the country. There is no doubt that NGOs played an important role in promoting SHGs so there should be need to start some incentive packages for these NGOs which motivates them to diversify themselves and their business to backward areas also.

Cite this paper

IEEE
Ahsan Ul Haq, Dr. Javed Iqbal. A Study about the Microfinance Models and Role of Financial Institution in Empowering Rural Finance: - An overview., International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Ahsan Ul Haq, Dr. Javed Iqbal (2016). A Study about the Microfinance Models and Role of Financial Institution in Empowering Rural Finance: - An overview.. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Ahsan Ul Haq, Dr. Javed Iqbal. "A Study about the Microfinance Models and Role of Financial Institution in Empowering Rural Finance: - An overview.." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Sivakumar N

Org/Univ
Hindusthan College of Arts and Science, Tamil Nadu, India

Keywords
Hilbert space, Normal operator, Self adjoint, Isometry, Parahyponormal operators and quasi parahyponormal operators.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Dhivya G

Abstract

In this paper we discuss about a new class of operators on Hilbert space. We call these operators as parahyponormal operators. Moreover, here we discussed some results on quasi parahyponormal and M-Quasi parahyponormal operators.

Cite this paper

IEEE
Sivakumar N, Dhivya G. On Parahyponormal and Quasi Parahyponormal Operators, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Sivakumar N, Dhivya G (2016). On Parahyponormal and Quasi Parahyponormal Operators. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Sivakumar N, Dhivya G. "On Parahyponormal and Quasi Parahyponormal Operators." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Sivakumar N

Org/Univ
Hindusthan College of Arts and Science, Tamil Nadu, India

Keywords
Hilbert Space, normal operator, quasi normal, n-quasi normal, (k-N) quasi normal, quasi n normal, class(Q) operator.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Bavithra V

Abstract

In this work we introduce another class of normal operator which is (K-N) quasi n normal operator and given some basic properties. The relation between this operator with another types of normal operators are discussed. Here the results are given by using the conditions of (K-N) quasi normal operators.

Cite this paper

IEEE
Sivakumar N, Bavithra V. On the Class of (K-N) Quasi-n-Normal Operators on Hilbert Space, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Sivakumar N, Bavithra V (2016). On the Class of (K-N) Quasi-n-Normal Operators on Hilbert Space. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Sivakumar N, Bavithra V. "On the Class of (K-N) Quasi-n-Normal Operators on Hilbert Space." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Kiran Mahendrabhai Patel

Org/Univ
G.E.S’s R.H.S.C.O.E, Nashik, India

Keywords
Just-In-Time (JIT), Production, Industrialization, Management, Enterprise.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Karan M. Patel, Rohan S. Sanap

Abstract

Rapid industrialization has increased competition in the market and it has become troublesome for the industries (especially for small scale industries) to persist with this kind of modern industrialization. In order to survive in the market an enterprise should produce a good quality product which can be affordable to common man within a specific span of time. Management of time is of an immense importance for any enterprise or industry as it can accomplish more with minimum efforts. To overcome numerous problems Just-in-Time can be introduced to an enterprise. Just-In-Time deals with the production of any item after the order from consumer and not to produce items before the need or in advance.

Cite this paper

IEEE
Kiran Mahendrabhai Patel, Karan M. Patel, Rohan S. Sanap. Implementation of Just-in-time in an Enterprise, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Kiran Mahendrabhai Patel, Karan M. Patel, Rohan S. Sanap (2016). Implementation of Just-in-time in an Enterprise. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Kiran Mahendrabhai Patel, Karan M. Patel, Rohan S. Sanap. "Implementation of Just-in-time in an Enterprise." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Kaustav Jyoti Borah

Org/Univ
Gauhati University, Assam, India

Keywords
Aviation, Risk, Safety, Identification, Air Traffic

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Mohan Kantipudi

Abstract

Flying involves risk. To stay safe, you need to know how to judge the level of risk, how to minimize it, and when to accept it. Before the risk to happen we need to identify the hazard. Hazard is anything with the potential to cause harm it’s a present condition, event, and object, circumstance that could lead or contribute to a death to people, loss of property or equipment. It is a source of danger. Flying is one of the most secure methods for travel yet things turn out badly because of different reasons, for example, Human-errors, mechanical, climate, criminal activities. Records from the past mischance’s has brought about the development of flight frameworks and innovation has lessened danger of past mischance’s yet has made flight taking care of more entangled through years.

Cite this paper

IEEE
Kaustav Jyoti Borah, Mohan Kantipudi. A Review of the Research on Aviation Risk Identification, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Kaustav Jyoti Borah, Mohan Kantipudi (2016). A Review of the Research on Aviation Risk Identification. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Kaustav Jyoti Borah, Mohan Kantipudi. "A Review of the Research on Aviation Risk Identification." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Prince Singh

Org/Univ
NIILM University, Kaithal, Haryana, India

Keywords
Multi Objective Linear Programming Techniques

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Dr Manjeet Jakha

Abstract

In India and abroad, the commonly used decision modelling in real life rests on the assumption that the decision maker seeks to optimize a well-defined single objective using traditional mathematics programming approach. A farmer may be interested in maximizing his cash income, with certain emphasis on risk minimization. On the other at county level especially in a developing country a planner may aspire for a plan while maximizes food grains production and also to some extent considers employment maximization etc as the goals. Keeping in view the objectives of the study, state-wise secondary data on different variables for the period 1980-81 to 2014-15 were collected from Statistical Abstracts of Punjab, Fertilizer Statistics, Agricultural Statistics at a glance and the reports of the Commission for Agricultural Costs and Prices, published by Ministry of Agriculture By taking its deviations of observed Yt from its estimated value we got the error or the risk coefficients for each year for each crop. These risk coefficients were taken in the matrix formulation in the MOTAD format suggested by Hazell (1971 a and b). To give a meaningful explanation to the level of risk, total mean absolute deviations in gross returns were derived as under: Min A = 1/S Σ│ (chj-gj) xj│ Where A is the minimum average absolute deviation defined as the mean over (h=1………s) years, of the sum of the deviations of gross returns (chj) from the trend in gross returns (gj) multiplied by activity levels x j (j = 1………n). Where A is an unbiased estimator of the population mean absolute income deviation Where A = estimated mean absolute deviation S = no. of years chj = gross returns of the jth activity in hth year gj = sample mean of gross returns of jth activity x j = activity level This was minimized subject to the following constraints: Σaij xj ≤ bi (for all i = 1………….m, j =1……..n) Total activity requirements for the i th constraint, the sum of the unit activity requirements aij for the constraint i times the activity levels ‘xj‘do not exceed the level of the i th constraint bi for all ‘i’ and x j 0 all activity levels are non negative. Where a ij = per unit technical requirement for the jth activity of the ith resource. bi = the ith resource constraint level m = no. of constraints n = no. of activities

Cite this paper

IEEE
Prince Singh, Dr Manjeet Jakha. Development of Multi Objective Techniques-A Case Study of Punjab and Haryana, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Prince Singh, Dr Manjeet Jakha (2016). Development of Multi Objective Techniques-A Case Study of Punjab and Haryana. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Prince Singh, Dr Manjeet Jakha. "Development of Multi Objective Techniques-A Case Study of Punjab and Haryana." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Pushap Lata Sharma

Org/Univ
Rajiv Gandhi Govt. Degree College, Chaura Maidan Shimla-4 (H.P.), India

Keywords
Magnetohydrodynamic field, variable gravity, positive operator, Green’s function principle of exchange of stabilities.

View AbstractCitationView PDF

Full Paper PDF (View in new tab)

Abstract

In the present paper, the problem of Benard for the magneto hydrodynamic field heated from below with variable gravity is analyzed and it is established by the method of positive operator of Weinberger and by using the properties of Green’s function that principle of exchange of stabilities is valid for this general problem, when g(z) is non-negative throughout the fluid layer.

Cite this paper

IEEE
Pushap Lata Sharma. On the Principle of Exchange of Stabilities in the Magnetohydro Dynamic Benard Problem with Variable Gravity by Positive Operator Method., International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Pushap Lata Sharma (2016). On the Principle of Exchange of Stabilities in the Magnetohydro Dynamic Benard Problem with Variable Gravity by Positive Operator Method.. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Pushap Lata Sharma. "On the Principle of Exchange of Stabilities in the Magnetohydro Dynamic Benard Problem with Variable Gravity by Positive Operator Method.." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Valsaraj T.S

Org/Univ
S.N.S College of Engineering, Coimbatore, India

Keywords
Microwave welding, XRD, EDS, SEM .

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Mr. Sathish Kumar

Abstract

This paper deals with Microwave welding using stainless steel grades.The field of microwave joining had taken a great leap in the past decade, Due to its special and exceptional characteristics like selective heating, volumetric heating and inverted heating profile its has been introduce in the field of the microwave joining of materials ,previously which was limited only to the processing of food. It also has an edge over conventional methods due to these characteristics. Microwave energy is generally new area of topic in material welding or material joining even though it has been introduced already in many industries like medical, food processing, drying. This process with the help of microwave radiations deals with joining of similar and dissimilar materials. These joints were characterized using various techniques.

Cite this paper

IEEE
Valsaraj T.S, Mr. Sathish Kumar. Microwave Welding using Stainless Steel Grades – A Short Survey, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Valsaraj T.S, Mr. Sathish Kumar (2016). Microwave Welding using Stainless Steel Grades – A Short Survey. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Valsaraj T.S, Mr. Sathish Kumar. "Microwave Welding using Stainless Steel Grades – A Short Survey." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Neetu Dhingra

Org/Univ
Patiala Institute of Engineering and Technology, Punjab, India

Keywords
Indoor scene recognition, object level detection, Scene Aura based Recognition, Image Retrieval.

View AbstractCitationView PDF

Full Paper PDF (View in new tab)

Abstract

The research area of the indoor scene recognition has attracted the various scientists and engineers across the globe, which includes the neuroscientists, electronics engineers, robotic engineers, digital image experts, camera developers and manufacturers for the purpose of application designing in the fields of the computer vision, vision based communications and the access control systems. The indoor scene recognition methods require the inclusion of the various methods in the computer vision, image processing and feature recognition for the scene recognition by identifying the category of the input image by comparing it against the given training databases by the means of the feature descriptor (popularly based upon the color or low level features) and the classification algorithm. The indoor scene classification algorithms require the number of the computations and feature transformations along with the normalization and automatic categorization. In this thesis, the multi-category dataset has been incorporated with the robust feature descriptor using the scale invariant feature transform (SIFT) along with the multi-category enabled support vector machine (mSVM).

Cite this paper

IEEE
Neetu Dhingra. Multivariate Indoor Scene Recognition using the Object Level Analysis with SVM Classification, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Neetu Dhingra (2016). Multivariate Indoor Scene Recognition using the Object Level Analysis with SVM Classification. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Neetu Dhingra. "Multivariate Indoor Scene Recognition using the Object Level Analysis with SVM Classification." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Shirdi Wazeed Baba

Org/Univ
Indian Institute of Information Technology, Design and Manufacturing, Jabalpur, (M.P), India

Keywords
Apriori algorithm, Association rule, confidence,support, Naïve Bayes classifier, Text classification.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Reddi Sanjeev Kumar

Abstract

Text classification is the process of classifying documents into predefined categories based on their content.Text classification is the primary requirement of text retrieval systems,which retrieve texts in response to a user query, and text understanding systems, which transform text in some way such as producing summaries, answering questions or extracting data.We have proposed a Text Classification system for classifying abstract of different research papers. In this System we have extracted keywords using Porter Stemmer and Tokenizer. The word set is formed from the derived keywords using Association Rule and Apriori algorithm. The Probability of the word set is calculated using naive bayes classifier and then the new abstract inserted by the user is classified as belonging to one of the various classes. The accuracy of the system is found satisfactory. It requires less training data as compared to other classification system.

Cite this paper

IEEE
Shirdi Wazeed Baba, Reddi Sanjeev Kumar. Data Mining : Text Classification System for Classifying Abstracts of Research Papers, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Shirdi Wazeed Baba, Reddi Sanjeev Kumar (2016). Data Mining : Text Classification System for Classifying Abstracts of Research Papers. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Shirdi Wazeed Baba, Reddi Sanjeev Kumar. "Data Mining : Text Classification System for Classifying Abstracts of Research Papers." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Prince Singh

Org/Univ
NIILM University, Kaithal, Haryana, India

Keywords
Growth in Agricultural resource use; An Application of Exponential

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Dr Manjeet Jakha

Abstract

Agriculture is the means of livelihood for around two thirds of the work force of India. Agriculture is the production, processing, marketing and use of foods, fibers and bye prducts from plant crops and animals. It was the key development that led to the rise of human civilization with the husbandry of domesticated animals plants creating food surpluses that enabled the development of more densely populated and stratified societies. At the time of independence, the revenue from the agriculture sector was quite low compared to what it is today. The main reason for the increase in the revenue is the in crease in agricultural production that was brought about by the Green revolution, over the years, agriculture has emerged as one of the top priorities of the Central & state governments. In 2000, the government announced the first over “National Agriculture Policy”. The resources taken were consumption of fertilizers, consumption of electricity in agricultural sector, short term and long term credit, number of tractors, area under high yielding varieties, net irrigated and gross irrigated area and total cropped area. It was computed using the exponential trend equation i.e.: Y = abt Log Y = log a + t log b taking ^ b = (1+r) r = (b-1) x 100 Where Y = study variable; area, production, yield or Resource variables a = constant ^ b = regression coefficient t = time, t = 1 ……………n r = compound growth rate in percent To test the significance of the compound growth rates, t-test applied was t* = r/S.E( r) Where t* = calculated t-ratio, distributed with (n-2) degrees of freedom r = compound growth rate S.E. (r) = standard error of the compound growth rate, S.E. was calculated by fitting the following formula. 100 x b S.E. (r) = Σ (log y)2 (Σ log y)2 (log b )2 Σ ( t – t )2 Log 10e n (n-2) Σ (t – t )2 where the limit for Σ is, i = 1,2……n

Cite this paper

IEEE
Prince Singh, Dr Manjeet Jakha. Growth in Agricultural Resource USE: An Application of Exponential Growth Curve., International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Prince Singh, Dr Manjeet Jakha (2016). Growth in Agricultural Resource USE: An Application of Exponential Growth Curve.. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Prince Singh, Dr Manjeet Jakha. "Growth in Agricultural Resource USE: An Application of Exponential Growth Curve.." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Dr. P. Sulochana

Org/Univ
Intell Engineering College, Ananatapuramu, Andhra Pradesh, India

Keywords
Hall effects, heat and mass transfer, viscous fluid, MHD flows, porous medium.

View AbstractCitationView PDF

Full Paper PDF (View in new tab)

Abstract

In this paper, we discussed the heat and mass transfer on the unsteady hydromagnetic convective flow of an incompressible viscous electrically conducting heat generating/absorbing fluid through porous medium in a rotating parallel plate channel under the influence of uniform transfer magnetic field normal to the channel taking Hall current effects into account. The momentum equation for the flow is governed by the Brinkman’s model. The analytical solutions for the velocity, temperature and concentration distributions are obtained by making use of regular perturbation technique. The variations of said quantities with different flow parameters are computed by using Mathematica Software and discussed with the help of plots. The skin friction, Nusselt number, and Sherwood number are also evaluated analytically and computationally discussed with reference to pertinent parameters in detail.

Cite this paper

IEEE
Dr. P. Sulochana. Hall Current Effects on Unsteady MHD Convective Flow of Heat Generating/Absorbing Fluid through Porous Medium in a Rotating Parallel Plate Channel, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Dr. P. Sulochana (2016). Hall Current Effects on Unsteady MHD Convective Flow of Heat Generating/Absorbing Fluid through Porous Medium in a Rotating Parallel Plate Channel. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Dr. P. Sulochana. "Hall Current Effects on Unsteady MHD Convective Flow of Heat Generating/Absorbing Fluid through Porous Medium in a Rotating Parallel Plate Channel." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Kamaldeep kaur

Org/Univ
Doaba Institute of Engineering & Technology, Kharar, India

Keywords
News Classification, Regression, Probabilistic Classifier, Automatic Categorization, Multi-domain news analysis

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Maninder Kaur

Abstract

The supervised models have been found more efficient for the purpose of news classification. The major goal of the news classification research is to improve the accuracy while decreasing the elapsed time. It is always difficult for the people to read all of the news on their favourites portal which have listed over the given portal. In this research, an approach is KNN lexicon technique which is used to obtain the popular news list from thousands or hundreds of online news available through APIs. This approach uses extraction summarization for summarizing the keywords thereby selecting the original sentences and putting it together into a new shorter text explaining the overall overview of the news data. Then the lexicon analysis would be performed over the given text data and then final classification of the news is done using k-nearest neighbor. The results would be obtained in the form of the parameters of accuracy, elapsed time, etc.

Cite this paper

IEEE
Kamaldeep kaur, Maninder Kaur. k-Means Clustering based Lexicon Analytical Model for Multi-Source News Classification, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Kamaldeep kaur, Maninder Kaur (2016). k-Means Clustering based Lexicon Analytical Model for Multi-Source News Classification. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Kamaldeep kaur, Maninder Kaur. "k-Means Clustering based Lexicon Analytical Model for Multi-Source News Classification." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Prof. Pritam P Kothari

Org/Univ
Bharati Vidyapeeth University,Pune, AKIMSS Solapur, India

Keywords
Changing trends of using internet, online trends in India and Use of Online shopping impact in solapur city.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Prof. Shivganga S. Maindargi

Abstract

The growing no. of internet user in India provides a bright prospect for online shopping. If E-marketers know the key factors affecting the behavior of customers and its relationship, then they can formulate their marketing strategies to convert potential customers into loyal ones and retaining existing online customers. This researcher paper highlights on factors which online Indian customers keep in mind while shopping. After completion of study Researchers found that cognition, sensed usefulness, the comfort of use; sensed enjoyment and security are the five components which affect consumer perceptions about online purchasing. The Internet has changed the way consumers purchase goods and services at the same time many companies have started using the Internet with the objective of cutting marketing costs, thereby reducing the price of their product and service in order to stay ahead in highly competitive markets. Companies also use the Internet to convey, communicate and disseminate information to sell the product, to take feedback and also to conduct satisfaction surveys with customers. Customers use the Internet not only to purchase the product online but also to compare prices, product features and after sale service facilities they will receive if the purchase the product from a particular store. Many experts are optimistic about the prospect of online business.

Cite this paper

IEEE
Prof. Pritam P Kothari, Prof. Shivganga S. Maindargi. A Study on Customer Attitude Towards Online Shopping in India and its Impact: With Special Reference to Solapur City, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Prof. Pritam P Kothari, Prof. Shivganga S. Maindargi (2016). A Study on Customer Attitude Towards Online Shopping in India and its Impact: With Special Reference to Solapur City. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Prof. Pritam P Kothari, Prof. Shivganga S. Maindargi. "A Study on Customer Attitude Towards Online Shopping in India and its Impact: With Special Reference to Solapur City." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Dr. R. Malini

Org/Univ
Anna University, Tamil Nadu, India

Keywords
Euclidean Distance, Harris Detector, Principal Component Analysis, SIFT, Feature Descriptor

View AbstractCitationView PDF

Full Paper PDF (View in new tab)

Abstract

Due to the growth of internet and social media sites there has been a proliferation of images which makes image retrieval a challenging job. The proposed an Enhanced Image Descriptor Algorithm for Image Retrieval using SIFT-PCA involves three steps: feature detection (Harris Detector), feature description (SIFT), dimension reduction (PCA). The features of all images in database are retrieved and stored in feature database in the form of histogram. When a query image is given, the generated histogram of query image is matched with feature database of all image histograms and those images with minimum distance are retrieved. Euclidean distance is used as the distance measure. For analyzing the performance of the algorithm, average precision and recall are used. Precision is the measure of ability of a system to present all the relevant items and Recall is defined as the ability to present only relevant items.

Cite this paper

IEEE
Dr. R. Malini. An Enhanced Image Descriptor Algorithm for Image Retrieval using SIFT - PCA, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Dr. R. Malini (2016). An Enhanced Image Descriptor Algorithm for Image Retrieval using SIFT - PCA. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Dr. R. Malini. "An Enhanced Image Descriptor Algorithm for Image Retrieval using SIFT - PCA." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Jeewan Jyoti

Org/Univ
Department of Education H.P.U, Shimla, India

Keywords
Dyscalculia, Self-Confidence, Elementary school students.

View AbstractCitationView PDF

Full Paper PDF (View in new tab)

Abstract

ABSTRACT The main objective of the present study is to compare the dyscalculic elementary school students on self- confidence in relation to their gender and locality. Null hypothesis were framed in regard to the objective. Investigator administered Self-Confidence Inventory, developed by Dr. Rekha Gupta (2013), to the sample of 60 dyscalculic school students of 8th class drawn from randomly selected schools of Shimla district. For the comparison of students on self-confidence 2x2 ANOVA was used. No significant differences existed among rural and urban dyscalculic elementary school boys and girls on self-confidence. .

Cite this paper

IEEE
Jeewan Jyoti. Self- Confidence among Dyscalculic Elementary School Students of Shimla District, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Jeewan Jyoti (2016). Self- Confidence among Dyscalculic Elementary School Students of Shimla District. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Jeewan Jyoti. "Self- Confidence among Dyscalculic Elementary School Students of Shimla District." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Upendra Kumar Srivastav

Org/Univ
Dr. APJ Abdul Kalam Technical University, Lucknow, UP, India

Keywords
DCT, Fuzzy Transform, Quantization, Entropy, Compression ratio, PSNR, MSE.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Harikesh Pandey

Abstract

Abstract— Today there has been big advancement in digital technology that has led to the development of various easily usable devices and methods specially in the fields of communications and data transfer to a longer distances. The transmission of data in the form of documents, images, voice etc.is now reachable to all parts of the society and the services are affordable to a larger number of people. An important aspect is data compression and for that matter Image compression, as images form a larger part of data being exchanged over the internet through social networking and messaging sites and apps all over the world. Among all the various kinds of data images and videos constitute the bulkiest data. Thus, need for compressing the image and video files is an important aspect in data communication. In this research work we present a technique for image compression, using Discrete Cosine Transform and Fuzzy Logic Techniques. The algorithm used in this paper is tested along with several images and the results are compared with other techniques. Our method shows an improved performance both in compression ratio as well as image perceptibility.

Cite this paper

IEEE
Upendra Kumar Srivastav, Harikesh Pandey. Hybrid Image Compression using DCT and Fuzzy Logic, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Upendra Kumar Srivastav, Harikesh Pandey (2016). Hybrid Image Compression using DCT and Fuzzy Logic. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Upendra Kumar Srivastav, Harikesh Pandey. "Hybrid Image Compression using DCT and Fuzzy Logic." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Madhusudana Rao Vanamala

Org/Univ
Aeronautical Development Agency, India

Keywords
Flight Test Instrumentation (FTI), Intelligent Real Time Data Scan Module(IRDSM), Fighter Aircraft, Open System Architecture (OSA), remote acquisition unit (RAU), data center(DACENT), VME and cPCI, Signal Conditioning and Data Acquisition (SCADA), High data integrity, Ground Support Equipment (GSE), Telemetry, minor frame and major frame.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Vijay V Patel, Prasad NNSSRK

Abstract

ABSTRACT—Configuring and designing on-board flight test instrumentation for a modern fighter aircraft is a real challenge. Flight Test Instrumentation (FTI) System has to acquire data from large number of sensors on aircraft. It demands distributed acquisition and centralized processing based flight test instrumentation as the sensors and data acquisition units are spread across large area of the aircraft. Acquisition of data in real time from large numbers of sensors, formatting minor frames as per telemetry standards, and real time data telemetry is a critical task as load on process is very high. This paper brings out a technique for relieving great extent processor load from processor participating to exchange the minor frame data and on-board storage data between remote acquisition unit (RAU) and data center (DACENT) with the help of Intelligent Real Time Data Scan Module(IRDSM). This paper also brings out the detail design approach adopted for IRDSM and significant performance improvement gained. Common design methodology adopted for DACENT and RAU are also brought out here. Self test capabilities of the module, component count reduction for better reliability, design of registry structure, process of screening at the module level for better reliability, extensive testing of modules with different configurations, etc, are also discussed. Issues encountered during the development phase are brought in this paper.

Cite this paper

IEEE
Madhusudana Rao Vanamala, Vijay V Patel, Prasad NNSSRK. Intelligent Real Time Data Scan Module for Improved System Performance of Distributed Flight Test Instrumentation System Architecture, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Madhusudana Rao Vanamala, Vijay V Patel, Prasad NNSSRK (2016). Intelligent Real Time Data Scan Module for Improved System Performance of Distributed Flight Test Instrumentation System Architecture. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Madhusudana Rao Vanamala, Vijay V Patel, Prasad NNSSRK. "Intelligent Real Time Data Scan Module for Improved System Performance of Distributed Flight Test Instrumentation System Architecture." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Ms. Jasleen Rana

Org/Univ
Jagannath International Management School, Kalkaji, India

Keywords
m-banking, mobile apps, smart phones, private banks, technology adoption, e-banking.

View AbstractCitationView PDF

Full Paper PDF (View in new tab)

Abstract

Internet is said to be the third most impactful revolution in the world after the agricultural and industrial revolution. The evolvement of internet had led to the dot-com burst which eventually transformed the traditional banking systems to systems like Automatic teller Machine(ATM), tele-banking, electronic fund transfer and m-banking. Technology plays a very essential role in delivering quality banking services and like any other technological innovation e-banking has also been adopted rapidly by various banks and customers. The boom of e-banking and smart phones has caused a huge shift from traditional banking habits to mobile app banking. This study explains how people living in New Delhi have adopted the mobile banking services provided by the private banks and it examines the factors which persuade the customers to use mobile app for banking. This study is helpful for both private as well as public banks as it gives an insight to what are the latest trends in m-banking and how people respond to it. How do people take mobile apps as a mode of banking service? Are customers more concerned about the ease-of-use or the risk attached with m-banking? Does difference in age group influence the customer’s m-banking behavior? The study is conducted with 200 private bank customers in New Delhi further categorized as customers already using mobile banking, customers using mobile apps for banking and customers currently not using mobile banking with age groups, using random sampling technique. The customers were surveyed with help of a structured questionnaire. Percentage method, averages, standard deviation, regression and correlation techniques have been used for data analysis.

Cite this paper

IEEE
Ms. Jasleen Rana. A Study on Adoption of M-Banking Services by Private Bank Customers in New Delhi, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Ms. Jasleen Rana (2016). A Study on Adoption of M-Banking Services by Private Bank Customers in New Delhi. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Ms. Jasleen Rana. "A Study on Adoption of M-Banking Services by Private Bank Customers in New Delhi." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Ms Mugdha Sehgal

Org/Univ
Jagannath International Management School, Kalkaji, Affiliated to GGSIPU, India

Keywords
Work-life balance, career, women professional, Spousal Support, stress.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Pallavi Ahuja, Dr. J. K. Batra

Abstract

Many researchers have been done on family work and health but only some of them suggested the strategies to be used by women to tackle these issues. Our paper provides an insight into the problems faced by the Indian married women working in private sector banks and the ways which can help them in solving these issues. This study examines the kinds of work, family and health conflict experienced by female married professionals working in private banks and the suggested strategies & solutions to cope up with the dichotomy. Balancing work and family tasks can put excessive stress on women, who in many families still take primary responsibility for childcare and elder care and end up suffering several health issues. How do such women bring a work-life balance? How do they cope up with the health issues they confront due to work pressure? Will the workplace of the future evolve for the better so that women won't have to worry anymore? Our paper aims at recommending the practices to deal with such complications. Work-life and health balance is a complete myth. But by making calculated choice about which prospect to pursue and which to turn down, rather than simply reacting to crisis, women can engage with work, family, and health. The study is conducted with 100 women professionals working in private sector banks of Delhi region categorized as newly married women and those with young kids across different levels in the hierarchical chain using random sampling method. Percentage, averages and Likert scale will be used for data analysis.

Cite this paper

IEEE
Ms Mugdha Sehgal, Pallavi Ahuja, Dr. J. K. Batra. Coping Strategies of Young Married Women in Banking Sector with Reference to Health and Family, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Ms Mugdha Sehgal, Pallavi Ahuja, Dr. J. K. Batra (2016). Coping Strategies of Young Married Women in Banking Sector with Reference to Health and Family. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Ms Mugdha Sehgal, Pallavi Ahuja, Dr. J. K. Batra. "Coping Strategies of Young Married Women in Banking Sector with Reference to Health and Family." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Ranjeet Mithari

Org/Univ
Bharati Vidyapeeth’s College of Engineering, Kolhapur, India

Keywords
Casting, Mold, Gating System, Inspection, Defects.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Mahesh Shinge, Pravin Rajigare

Abstract

There is various metal casting parameters which are now know through various experiment which are quantified. These parameters should be controlled to improve quality of casted products. Metal casting involves design, gating and risering system design, mold design, pouring of molten metal each process has its own effects on quality of the casting. The flow of molten metal in mold accounts for almost 60% of the casting defects and due to this fact it is quite obvious that it is important to pay more and adequate attention on preparation of molds in such a way that molten metal will flow easily and fill the mould cavity properly. The molten metal is elastically deformable during short interval of time when deformation causes stresses remain in the molten metal and hence in the cast parts. After solidification these internal stresses remain in the metal. The change in temperature is the common cause of volumetric changes in the molten metal. The paper will focus more on study of gating system design since flow of the molten metal has significant effect due to this system. Design of this gating system reduces number of defects produced in casting. This system results compare in between traditional and software. On the commercial front if we look at prices trend charts of important foundry raw material we observe that there is consistent rise in prices and it is quite obvious that these will go on increasing since we have no control over market circumstances and forces. In this situation only alternative to remain competent and all foundries people to keep max control over all manufacturing processes and hence related parameters so as to ensure the quality in the process itself.

Cite this paper

IEEE
Ranjeet Mithari, Mahesh Shinge, Pravin Rajigare. Design of Gating System for Connecting Hinge by Traditional and Software Method, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Ranjeet Mithari, Mahesh Shinge, Pravin Rajigare (2016). Design of Gating System for Connecting Hinge by Traditional and Software Method. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Ranjeet Mithari, Mahesh Shinge, Pravin Rajigare. "Design of Gating System for Connecting Hinge by Traditional and Software Method." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Mr. Ashish Laxman Gaikwad

Org/Univ
Savitribai Phule Pune University, India

Keywords
Twitter, Topic Detection, BNgram, Social Networks.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Mr. Sumit Suresh Shendkar, Mr. Mahesh Tukaram Atpadkar

Abstract

Social networking services such as Twitter creates content reflecting a series of talks that appear in the real worldEvents. Twitter is a social networking site that provides service to a large number of users to communicate with each other at same time. That is asymmetrical relationship between friends and followers that provide dramatic structure of interest between Twitter users. A series of Twitter messages called tweets, which are limited to 140 characters, and thus are usually much focused. The basic process is the capture of Twitter tweets that extract most discussed topic in between users. Tweet this Dataset can be processed using standard natural language processing to search for trending stories. Common stories and erosion areso brick is extracting and summarizing information gathered from social networking services. There is the fact of Ways to find common stories that improve the quality of the result. This article proposes an application to detect themes of tendencies of the data that the BNgram Twitter disclosure rules use.

Cite this paper

IEEE
Mr. Ashish Laxman Gaikwad, Mr. Sumit Suresh Shendkar, Mr. Mahesh Tukaram Atpadkar. Analysing of the Media and Public Tendencies in Twitter, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Mr. Ashish Laxman Gaikwad, Mr. Sumit Suresh Shendkar, Mr. Mahesh Tukaram Atpadkar (2016). Analysing of the Media and Public Tendencies in Twitter. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Mr. Ashish Laxman Gaikwad, Mr. Sumit Suresh Shendkar, Mr. Mahesh Tukaram Atpadkar. "Analysing of the Media and Public Tendencies in Twitter." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Sumit Kumar Srivastava

Org/Univ
Dr. APJ Abdul Kalam Technical University, Lucknow, UP, India

Keywords
Image Watermarking, Medical Image watermarking, Steganography, Data hiding, DWT Transform.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Harikesh Pandey

Abstract

The Digital watermarking has been introduced for increasing the medical image security, confidentiality and integrity. The Medical image watermarking is a special sub-division of the image watermarking in the aspects that the images have some special requirements. The Medical image watermarking is an appropriate technique applied for increasing security and authentication of the medical data or information, which is very crucial and used for further diagnosis and future reference. This paper discusses the available medical image watermarking techniques for protecting and authenticating the medical data. The paper focuses on about the perceptual designing of the watermark for the digital images. The watermark designed perceptually is then embedded to the digital images in wavelet domain. A perceptual model is applied on to perceptually shape the watermark. This paper represents a primary study on the degradation of medical images when embedded with various watermarks, using a variety of the popular systems. The Image quality is measured with a number of widely used matrices, which have been used elsewhere in the image processing. The watermark before embedding can be compressed. This will lead to more secured and safely system. Also, it will take more effort to break the system. Consequently, the medical image watermarking remains an open field for the research and it appears that a selection of various watermarks for different medical image types is the most suitable solution to the generic problem.

Cite this paper

IEEE
Sumit Kumar Srivastava, Harikesh Pandey. Medical Image Watermarking with Patient Details as Watermark, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Sumit Kumar Srivastava, Harikesh Pandey (2016). Medical Image Watermarking with Patient Details as Watermark. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Sumit Kumar Srivastava, Harikesh Pandey. "Medical Image Watermarking with Patient Details as Watermark." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Prajakta Yawalkar

Org/Univ
Maharashtra Institute of Technology, Pune, India

Keywords
Mutual Funds, Investors Expectations.

View AbstractCitationView PDF

Full Paper PDF (View in new tab)

Abstract

Mutual Funds is an investment funded by shareholders that trades I diversified holdings and is professionally managed by companies. In this paper researcher is focused to understand the investors’ expectations on mutual funds

Cite this paper

IEEE
Prajakta Yawalkar. A Study on Investors’ Expectations on Mutual Funds Offered by Share Khan with Reference to Amravati City, Maharashtra, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Prajakta Yawalkar (2016). A Study on Investors’ Expectations on Mutual Funds Offered by Share Khan with Reference to Amravati City, Maharashtra. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Prajakta Yawalkar. "A Study on Investors’ Expectations on Mutual Funds Offered by Share Khan with Reference to Amravati City, Maharashtra." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Pauroosh Kaushal

Org/Univ
D.Y. Patil College of Engineering, Akurdi, India

Keywords
Semiconductor Gas Sensor, Quantitative Detection, Sensor Array, Neural Network, Pattern Recognition.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Nirlipta R. Mohanty

Abstract

Two semiconductor gas sensors which are sensitive to methanol and acetone were chosen to form a gas sensor array. Response of sensor array combined with pattern recognition technique of artificial neural network was used to carry out the quantitative analysis of gas concentration in a mixture. Separate gas is injected on gas sensor to understand the sensitivity of sensor upon change in gas concentration. Gas mixture of different acetone and methanol gas composition is prepared and response on sensor array is acquired. The acquired data is a function of concentration profile of gas mixture. Data is pre-processed and given to neural network for quantitative analysis of gas concentration of the mixture. The results show that the system can analyze the gas mixture and produce quantitative data with good accuracy.

Cite this paper

IEEE
Pauroosh Kaushal, Nirlipta R. Mohanty. Gas Sensor Array for Quantitative Detection of Gas Mixture, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Pauroosh Kaushal, Nirlipta R. Mohanty (2016). Gas Sensor Array for Quantitative Detection of Gas Mixture. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Pauroosh Kaushal, Nirlipta R. Mohanty. "Gas Sensor Array for Quantitative Detection of Gas Mixture." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Rafia Ahmad

Org/Univ
M. L. K. P. G College, Balrampur, India

Keywords
1-10-phenanthroline ; 2,2 -bipyridyll.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

U. N.Tripath

Abstract

Chloro lanthanu (III) trithiophosphates (RO)(S)(P)(S)2LaCl where R = Me,Et, nPr, iPr, nBu, sBu, iBu , iAm, cyclohexyl, Phenyl,were prepared in the methanolic solution of LaCl3 and dipotassium salt of trithiophosphates.Addition complexes of the type (RO)(S)(P)(S)2LaCl .nL(where n=1,L=(C6H4N)2 1-10-phenanthroline and (C5H4N)2 2,2 -bipyridyl were prepared by reaction of chloro Lanthanum (III) trithiophosphate and nitrogen donar bases in dry methanol . These newly synthesized derivatives have been characterized by elemental analysis, moleculer weight measurement, I R ,13C ,31P spectral studies. Coordination no of three and five are suggested for La (III) in these derivatives. Key Words : La(III) ; 1-10-phenanthroline ; 2,2 -bipyridyl Corrosponding Author;gkpahmad@gmail.com

Cite this paper

IEEE
Rafia Ahmad, U. N.Tripath. Synthesis and Characterization of O-Alkyl ,O-Aryl and O-Cycloalkyl Trithiophosphato Derivatives of Lanthanum (III) Chloride and their Adduct with Nitrogen Donar Bases, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Rafia Ahmad, U. N.Tripath (2016). Synthesis and Characterization of O-Alkyl ,O-Aryl and O-Cycloalkyl Trithiophosphato Derivatives of Lanthanum (III) Chloride and their Adduct with Nitrogen Donar Bases. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Rafia Ahmad, U. N.Tripath. "Synthesis and Characterization of O-Alkyl ,O-Aryl and O-Cycloalkyl Trithiophosphato Derivatives of Lanthanum (III) Chloride and their Adduct with Nitrogen Donar Bases." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Javaid Ahmad Wani

Org/Univ
Dr. C. V. Raman University, Bilaspur, India

Keywords
System of Rice Intensification (SRI), Conventional Management Practices(CMP), Farmers Practices, Productivity,Crop Growth Rate (CGR).

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Dr. Amit Sharma

Abstract

Field experiment were conducted to compare the System of Rice Intensification (SRI) Practices with the Conventional management Practices (CMPs) or farmers’ practices of rice (Oryza sativa L.) in context of Morphological and yield production parameters at district Kulgam of J& K(2016). The investigational variables included combinations of seedling number and age (10 day-old single vs. 21 day-old), spacing (25 x 25 cm vs. 20 x 10 cm), irrigation (intermittent irrigation vs. continuous flooding), and weed control (cono-weeding vs. manual weeding) however for both sets of methods, the organic manure (mixture with cow dung and straw) was applied along with chemical fertilizers at the same rate. The test was laid out in randomized factorial design. Highest grain yield (637.9 gm–2) were obtained from SRI practices (planting 10 days-old seedlings hill–1 at 25 x 25 cm spacing + intermittent irrigation and cono-weeding). Yield under CMP (planting 21 day-old single seedlings at 20 x 10 cm + continuous flooding and manual-weeding: 448.9gm-2) was lower than that of SRI practices. Thus the overall results indicated that all the cultivars under study performed better under SRI as compared to other traditional practices with respect to different morphological and yield traits including grain yield. All the cultivars exhibited increased leaf area, leaf area index and Crop Growth Rate (CGR) under SRI practice as compared to CMP cultivation practice.

Cite this paper

IEEE
Javaid Ahmad Wani, Dr. Amit Sharma. Response of Jhelum Rice Variety to Different Crop Management Practices towards Morphological and Yield Parameters in Temperate Kashmir Valley, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Javaid Ahmad Wani, Dr. Amit Sharma (2016). Response of Jhelum Rice Variety to Different Crop Management Practices towards Morphological and Yield Parameters in Temperate Kashmir Valley. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Javaid Ahmad Wani, Dr. Amit Sharma. "Response of Jhelum Rice Variety to Different Crop Management Practices towards Morphological and Yield Parameters in Temperate Kashmir Valley." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
R. Parvathi

Org/Univ
REVA University, India

Keywords
Mobile, Mobile Commerce, Mobile Apps.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Dr. Veena Angadi, Gattamraju Sreelatha, Dr Gopala Krishana

Abstract

Mobile, Internet and Mobile Application has created a new market and new world of network which has eventually disrupts an existing traditional business market and given importance to internet through Mobile Apps to online Business. The electronic gadget, computer which was nothing better than a big calculator has taken over the entire business market and captured as electronic market through e-Commerce, eventually established itself to M-Commerce, Business on the Mobile gadget where consumer carry any time, any place and do business at any point of time. This created a huge platform to new market and ultimately eliminated the existing business. Purpose of the study says that Flipchart, Amazon, e-bay, BigBasket, these business houses are attracting the customer through online. Customer can shop from home at much cheaper rates could save even up to 80% discount rates with all kind of guarantee and warrantee with best quality and replacement assurance. An objective of research work is to “To assess the impact of mobile, Mobile Commerce and Mobile apps on business practices.”. The article expected to through the light on the disruptive innovation of Mobile, Mobile Commerce and Mobile Apps.

Cite this paper

IEEE
R. Parvathi, Dr. Veena Angadi, Gattamraju Sreelatha, Dr Gopala Krishana. Innovation of Mobile, Mobile Commerce and Mobile Apps as Disrupted the Businesses of Small Units, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
R. Parvathi, Dr. Veena Angadi, Gattamraju Sreelatha, Dr Gopala Krishana (2016). Innovation of Mobile, Mobile Commerce and Mobile Apps as Disrupted the Businesses of Small Units. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
R. Parvathi, Dr. Veena Angadi, Gattamraju Sreelatha, Dr Gopala Krishana. "Innovation of Mobile, Mobile Commerce and Mobile Apps as Disrupted the Businesses of Small Units." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Gaurav Singh

Org/Univ
I.E.T, Lucknow, India

Keywords
Composting, Lactobacillus Serum, Leachate, Organic Manure, Vermicompost.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Akhil Kumar Gupta, Divyank Tiwari, Matulya Mani

Abstract

The blind use of fertilisers have made the soil dilapidated to such an extent that it would take 3 years of no cultivation and continuous fixing of minerals by organic methods, to convert the soil for the purpose of organic farming. Chemical fertilisers are like a drug to the soil, the more we use the more will be required. In order to bring a change and to make organic method more demanding and handy, a set of trials were done. The experiments were conducted inside the college campus using different type of manures, farm yard manure (made by cow dung straw and cow urine), garden manure (made by dry shredded leaves, kitchen waste and thrown flowers) and vermicompost (using Eisenia fetida earthworms) made by easy composting in normal pressure and temperature and were tested on mangifera indica (mango) plants. Significant effects were observed on the plant yield. The use of lactobacillus serum alone has increased the yield significantly. Field studies evaluated the use of leachate along with the green manure. The study was done on the optimum use of manure for the nutrition requirement of plant.

Cite this paper

IEEE
Gaurav Singh, Akhil Kumar Gupta, Divyank Tiwari, Matulya Mani. Comparative Study of Manure Produced from Wastes, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Gaurav Singh, Akhil Kumar Gupta, Divyank Tiwari, Matulya Mani (2016). Comparative Study of Manure Produced from Wastes. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Gaurav Singh, Akhil Kumar Gupta, Divyank Tiwari, Matulya Mani. "Comparative Study of Manure Produced from Wastes." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Akash Verma

Org/Univ
I.E.T, Lucknow, India

Keywords
LDR, LED, VARIAC, COMPARATOR, OP-AMP.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Hikmat Beig, Vijay Kumar Yadav, Vivek Singh

Abstract

This paper deals with the design of a module which can differentiate among three different light intensity ranges. This module uses two LDRs in such a configuration, so that they can collectively give the output which helps in differentiating among various light intensity ranges. The unique feature of the module is to differentiate among three different light intensity ranges which finds applications in the area like automatic plant irrigation system, automatic street light system, maintaining light at a particular intensity and further more.

Cite this paper

IEEE
Akash Verma, Hikmat Beig, Vijay Kumar Yadav, Vivek Singh. Digital Photo Sensor Able to Differentiate up to Three Light Intensity Bands and its Applications, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Akash Verma, Hikmat Beig, Vijay Kumar Yadav, Vivek Singh (2016). Digital Photo Sensor Able to Differentiate up to Three Light Intensity Bands and its Applications. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Akash Verma, Hikmat Beig, Vijay Kumar Yadav, Vivek Singh. "Digital Photo Sensor Able to Differentiate up to Three Light Intensity Bands and its Applications." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Vandana Jain

Org/Univ
Rayat Bahra University, India

Keywords
Wireless Sensor Network, A-LEACH, Heterogeneous Network and Cluster Head.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Amanpreet Singh Dhanoa

Abstract

Wireless Sensor Networks are those networks in which communication is carried out through a wireless channel. A sensor network is a group of specialized transducers intended to monitor and record conditions at diverse locations. These parameters are temperature, humidity, pressure, speed, intensity, vibration-sound intensity, PIV etc. Numbers of towers in area act as sensors are called as nodes in wireless sensor networks. Thus from one node to other, communication is carried out without any physical link. A network consists of numbers of nodes with one as a source and one as a destination. This paper proposed A-LEACH protocol and cluster member elect cluster head to avoid excessive energy consumption. Cluster Head is responsible for creating and manipulating a TDMA schedule & sending aggregated data from nodes to the BS where this data is needed using CDMA. Gateway is a network point that reduces the distance between CH and BS in WSNs. In this paper proposed a multiple hops data transmission and make energy efficient and energy conservative protocol design to increase data rate.

Cite this paper

IEEE
Vandana Jain, Amanpreet Singh Dhanoa. Review on: Heterogeneous Leach in 3-Dimensional Wireless Sensor Network using Gateway, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Vandana Jain, Amanpreet Singh Dhanoa (2016). Review on: Heterogeneous Leach in 3-Dimensional Wireless Sensor Network using Gateway. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Vandana Jain, Amanpreet Singh Dhanoa. "Review on: Heterogeneous Leach in 3-Dimensional Wireless Sensor Network using Gateway." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Ruchi Rai

Org/Univ
LNCT, Bhopal, India

Keywords
Full adder, CMOS Circuit, C5 Process, Carry look ahead adder, Transient analysis.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Prof. L N Gahalod, Dr. Rita Jain

Abstract

- A method illustrated in this is to design carry look ahead adders using SCMOS technology, also analyzed the effect of various parameters on the characteristics of adders, using 50 nm, spice model for CMOS technology. The design was implemented for 16 bit and then extended for 32 bit also. Here parameters are computed and response curves are computed between all characteristics, DC and transient characteristics. The design and simulations are carried out to achieve these values approximately. Design will be carried out in Electric CAD and Xilinx. Simulation results are verified using Modelsim and LTSpice. The DRC, LVS/NCC, transient checks are performed in the proposed design. Noise analysis is also done. In comparison with the existing full adder designs, the present implementation will offer significant improvement in terms of frequency.

Cite this paper

IEEE
Ruchi Rai, Prof. L N Gahalod, Dr. Rita Jain. Optimization, Analysis and Comparison of 4 and 16 bit Carry look Ahead Adders using 0.3μm Process Technology for SCMOS, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Ruchi Rai, Prof. L N Gahalod, Dr. Rita Jain (2016). Optimization, Analysis and Comparison of 4 and 16 bit Carry look Ahead Adders using 0.3μm Process Technology for SCMOS. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Ruchi Rai, Prof. L N Gahalod, Dr. Rita Jain. "Optimization, Analysis and Comparison of 4 and 16 bit Carry look Ahead Adders using 0.3μm Process Technology for SCMOS." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Deepesh Kumar Yadav

Org/Univ
Amity University, Noida, India

Keywords
Employee, Management, Employee management relationship, Role of HR professional, job satisfaction, Training, performance, team work, compensation.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Dr. Jaya Yadav

Abstract

The aim of this paper is to bring out the impact of HR practices on employees job satisfaction. There are certain activities which are imperative for job satisfaction of employees policies like working environment, co-operation between departments, team work, retention, promotion policies, grievance handling etc. These all together gives the job satisfaction to the employees. If the employees are happy the productivity rate will definitely be high in other terms productivity will touch the sky and if the job satisfaction is not there then the organisation will definitely suffer. It is both management and employee’s responsibilities, and in their interest, to ensure that employees work in a positive atmosphere because relationship with the management can either maximize or minimize productivity and cause or prevent stress and fatigue.

Cite this paper

IEEE
Deepesh Kumar Yadav, Dr. Jaya Yadav. Impact of HR Practices on Employees Job Satisfaction, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Deepesh Kumar Yadav, Dr. Jaya Yadav (2016). Impact of HR Practices on Employees Job Satisfaction. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Deepesh Kumar Yadav, Dr. Jaya Yadav. "Impact of HR Practices on Employees Job Satisfaction." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Manu R

Org/Univ
Federal Institute of Science and Technology, Kerala, India

Keywords
Mindwave, Electroencephalogram, Arduino, Prosthetics, Brainwaves.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Mithu Markose, Tonio P Thomas

Abstract

The brain-controlled prosthetic leg involves the technique of using the brain waves to control the motion of a prosthetic leg. The brain waves are obtained using a device called Mindwave. This device captures the complex brainwaves through the analysis of electroencephalogram power spectrum. The brain signals are then further processed using an Arduino microcontroller which then drives the motors to control the motion of the prosthetic leg. Through this approach, the natural motion of human leg can be regained using prosthetics at a very low cost.

Cite this paper

IEEE
Manu R, Mithu Markose, Tonio P Thomas. Brain Controlled Prosthetic Leg, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Manu R, Mithu Markose, Tonio P Thomas (2016). Brain Controlled Prosthetic Leg. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Manu R, Mithu Markose, Tonio P Thomas. "Brain Controlled Prosthetic Leg." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Aaditya Khare

Org/Univ
Dr. K. N. Modi University, Newai, Rajasthan, India

Keywords
Permanent Magnet Synchronous Motor, Electrical driven Forklifts, Modelling of Permanent Magnet Synchronous Motor, Dynamic modelling of subsystem block.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Dr. Smita Shrivastava

Abstract

The research work deals with Detailed modelling of permanent magnet synchronous motor for electrical drives. In this paper we have discussed about mathematical modelling of PMSM for Electrical Forklifts designing aspects of subsystem model of PMSM Block of the Main model. Permanent magnets to replace the electromagnetic pole with windings requiring a less electric energy supply source resulted in compact dc machines. Likewise in synchronous machines, the conventional electromagnetic field poles in the rotor are replaced by the PM poles and by doing so the slip rings and brush assembly are dispensed. With the advent power semiconductor devices the replacement of the mechanical commutator with an electronic commutator in the form of an inverter was achieved. These two developments contributed to the development of PMSMs and Brushless dc machines. Due to many applications of PMSM like sensor less speed control, appropriate position control, Servo motor, etc. Mathematical modelling of permanent Magnet synchronous motor is carried out and simulated using MATLAB. The most important features of PMSM is its high efficiency given with the ratio of input

Cite this paper

IEEE
Aaditya Khare, Dr. Smita Shrivastava. Detailed Modelling of Permanent Magnet Synchronous Motor (PMSM) for Electrical Forklifts part-IV Designing of Subsystem Model of PMSM Block, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Aaditya Khare, Dr. Smita Shrivastava (2016). Detailed Modelling of Permanent Magnet Synchronous Motor (PMSM) for Electrical Forklifts part-IV Designing of Subsystem Model of PMSM Block. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Aaditya Khare, Dr. Smita Shrivastava. "Detailed Modelling of Permanent Magnet Synchronous Motor (PMSM) for Electrical Forklifts part-IV Designing of Subsystem Model of PMSM Block." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Pushkar S Kothawade

Org/Univ
NDMVP’S KBTCOE Nashik, India

Keywords
Real estate, Success criteria, construction projects, balanced scorecard, Analytic network process.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Mrs. Madhura Aher

Abstract

The findings of this study suggest the importance of the attractiveness of project location, level of contribution to business value, accuracy of cost estimation, level of innovativeness, and effectiveness of cost control for a successful real estate project. The applicability of the proposed model is tested on Nashik real estate projects and the results are found to be satisfactory. Real estate companies may benefit from the findings of the proposed model in assessing the performance of their projects and may take the necessary actions to achieve better success in their projects.

Cite this paper

IEEE
Pushkar S Kothawade, Mrs. Madhura Aher. Comparative Study of Successive Factors of Residential and Commercial Project In Nashik, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Pushkar S Kothawade, Mrs. Madhura Aher (2016). Comparative Study of Successive Factors of Residential and Commercial Project In Nashik. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Pushkar S Kothawade, Mrs. Madhura Aher. "Comparative Study of Successive Factors of Residential and Commercial Project In Nashik." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Radhika Wadhera

Org/Univ
Pacific Academy of Higher Education and Research University, Udaipur, India

Keywords
Celebrity Endorsement

View AbstractCitationView PDF

Full Paper PDF (View in new tab)

Abstract

The term Celebrity refers to an individual who is known to the public (actor, sports figure, entertainer, etc.) for his or her achievements in areas other than that of the product class endorsed (Friedman and Friedman, 1979).The objective of this research paper was to examine the celebrity endorsements impact on society as a whole, its positive and negative effects on the society. For achieving the objective of the study an empirical study was designed and for the collection of data questionnaire was used. To analyse data descriptive statistic and ANOVA test was used.

Cite this paper

IEEE
Radhika Wadhera. Celebrities and Social Cause- Detailed Analysis of Importance of Choosing a Celebrity Followed by Pulse Polio Advertisement, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Radhika Wadhera (2016). Celebrities and Social Cause- Detailed Analysis of Importance of Choosing a Celebrity Followed by Pulse Polio Advertisement. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Radhika Wadhera. "Celebrities and Social Cause- Detailed Analysis of Importance of Choosing a Celebrity Followed by Pulse Polio Advertisement." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
K. Usha Madhuri

Org/Univ
Sanketika Institute of Technology and Management (SITAM), Visakhapatnam, India

Keywords
Project network; Trapezoidal fuzzy number; Critical path, Linear Programming.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

K. Chandan

Abstract

The critical path method is used to date in production operations whose outputs are relatively large complex end items such as highways, buildings, and ships. This paper considers Fuzzy Mathematical Model to find fuzzy critical path, fuzzy project duration in the network. All the activities in the network are represented by trapezoidal fuzzy numbers. Linear programming model is applied to find fuzzy critical path and fuzzy project duration in manufacturing Tugboat (Tugboat is a small ship that exercises vessels by pushing or towing). Finally practical applications shown with comparison.

Cite this paper

IEEE
K. Usha Madhuri, K. Chandan. Applying the Fuzzy Critical Path Method to Manufacturing Tugboat, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
K. Usha Madhuri, K. Chandan (2016). Applying the Fuzzy Critical Path Method to Manufacturing Tugboat. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
K. Usha Madhuri, K. Chandan. "Applying the Fuzzy Critical Path Method to Manufacturing Tugboat." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Pankaj Purushottam Chandwadkar

Org/Univ
K.B.T.C.O.E, Nashik, India

Keywords
Project's Performance, Success Factors, Prediction, Multiple Linear Regression

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Prof. R. V. Devalkar

Abstract

Existing studies tend to agree that there are links among certain key aspects of any project, their systematic enlisting and measurement and directional efforts to improve the performance of project. These aspects are selective and specific and if tracked in a systematic fashion along with necessary corrective action can not only measure any particular project’s performance but also indicate to the higher management in the organization about the approach to be changed in selective area so as to enhance the business success, in general and project’s success in specific. This seminar tends to study various aspects, present a checklist and track sheets along with comments to improve the transmission project’s performance. Transmission being critical activity and among the important services so as to serve the society’s electricity needs, are taken into consideration. A systematically addressed relationship among these criteria and that how these criteria affect the project success is the gist of this seminar. A sincere attempt is made for establishment of relationships of various factors affecting the project’s success and utilizing that relationship for making alert and guiding during project monitoring of Transmission Project. It is concluded that these aspects are not only important to improve project performances on quality, time, cost, and safety, but also critical to appropriately deal with transmission power projects’ externalities for achieving the objectives on project migration, ecological, social and environmental impacts. These results can help Project managers to better understand the relationship between the said aspects and project performance, and encourage them to optimize and take corrective actions for better project outcomes. With support of a case study of 400 KV substation (transmission) project‘s data collected and it has revealed strong correlations between various aspects and project performances.

Cite this paper

IEEE
Pankaj Purushottam Chandwadkar, Prof. R. V. Devalkar. Project Success, It’s Performance Evaluation and Prediction for Transmission Construction Project, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Pankaj Purushottam Chandwadkar, Prof. R. V. Devalkar (2016). Project Success, It’s Performance Evaluation and Prediction for Transmission Construction Project. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Pankaj Purushottam Chandwadkar, Prof. R. V. Devalkar. "Project Success, It’s Performance Evaluation and Prediction for Transmission Construction Project." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Amandeep Kaur

Org/Univ
Bahra Group of Institutes, Patiala, India

Keywords
WSN, Energy, Dead Nodes , Optimization.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Harpreet Kaur

Abstract

The study shows that, to save energy and improve bandwidth efficient cluster-based topology, and scalability of the network, but difficult to balance the network after the running of the period of time, the remaining energy of all nodes. In addition, with increasing WSN sensor nodes, the path of the search space to increase exponentially therefore seek effective heuristic algorithm to solve the clustering and routing in WSN is very important. Probabilistic approach in Reac-In algorithm is a new kind of optimization algorithm, which draws on the principles of Iterative change the cluster size and cluster head by optimization method.(1) broad access to information at home and abroad, an overview of the wireless sensor networks and its characteristics, summed up the WSN routing features and design requirements, analysis of current major the strengths and weaknesses of the routing protocols, and pointed out that the current research hotspots and unresolved problems. (2) We were studied on how to dynamically determine the optimal number of clusters, to analyze the factors affecting the optimal number of clusters. Simulations results show that Reac-In improve the optimal number of clusters compared to the life cycle of the network to be extended. (3) considering the degree of energy balance remaining node residual energy and network energy consumption is proposed based on the right to non-linear decreasing Presented with energy inspired based the priority encoding PSO routing algorithm to reduce the probability of an invalid path and improve the reliability of the network routing to provide new ideas for WSN routing optimization.

Cite this paper

IEEE
Amandeep Kaur, Harpreet Kaur. Novel Technique of Clustering based Reac-In Routing with Probabilistic Approach, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Amandeep Kaur, Harpreet Kaur (2016). Novel Technique of Clustering based Reac-In Routing with Probabilistic Approach. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Amandeep Kaur, Harpreet Kaur. "Novel Technique of Clustering based Reac-In Routing with Probabilistic Approach." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Amol C. Vikhe

Org/Univ
Ajeet Seeds Private Limited Chitegaon, Aurangabad, India

Keywords
Germination paper, Phytotoxicity, Evaluation.

View AbstractCitationView PDF

Full Paper PDF (View in new tab)

Abstract

The standardization (Phytotoxicity) of germination media (Paper) is an important and essential aspect in seed industry (seed testing laboratory).The present work done on germination paper, which tested in our laboratory and showed good as well as bad results of germination papers. The germination papers accepted from consignee showed fluctuation in paper testing. We tested all the parameters regarding paper testing and also for germination testing. The paper sampled into 25 lots and tests were followed. Out of 25 lots seven lots failed to meet the standard parameter. The eighteen sampled lots meet to standard; hence the present study Revealed that to check the (Phytotoxicity) germination papers accepted from consignee before it use for germination.

Cite this paper

IEEE
Amol C. Vikhe. Standardisation (Phytotoxicity) of Germination Media (Paper) for Mustard Seedling Evaluation, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Amol C. Vikhe (2016). Standardisation (Phytotoxicity) of Germination Media (Paper) for Mustard Seedling Evaluation. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Amol C. Vikhe. "Standardisation (Phytotoxicity) of Germination Media (Paper) for Mustard Seedling Evaluation." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Vaibhav P. Thakare

Org/Univ
P. R. Patil College of Engineering & Technology, Amravati, India

Keywords
Anonymous Communication, Anonymous Authentication, Secure Channel, Identity-Based Encryption, Group Signature.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Chetan J. Shelke

Abstract

For Privacy Preserving Communications Both Anonymity and end to end encryption mechanism is essential. Identity Based Encryption technique is best suitable for secure and anonymous communications. For solving anonymous and secure communication problems both cryptographic and IBE based protocols needed which governs the proper communication between two parties. For the purpose of authentication of the user proxy server is maintained between user and service providers. The GM and KGC are essential in anonymous communication for issuing both signing and decryption keys for getting plaintext from ciphertext in original form. Public key encryption and digital signature mechanism needed for guarantees of secure communication between both ends. Finally protocol realizes secure and anonymous communication between sender and receiver.

Cite this paper

IEEE
Vaibhav P. Thakare, Chetan J. Shelke. Implementation of Anonymous and Secure Communication System with Group Signatures: A Review, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Vaibhav P. Thakare, Chetan J. Shelke (2016). Implementation of Anonymous and Secure Communication System with Group Signatures: A Review. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Vaibhav P. Thakare, Chetan J. Shelke. "Implementation of Anonymous and Secure Communication System with Group Signatures: A Review." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
P. Dileepkumar

Org/Univ
VEMU Institute of Technology, A.P, India

Keywords
Catia, Ansys, Wheel Rim

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

G. Ramesh, G. Suresh

Abstract

The purpose of the car wheel rim is to provide a firm base on which to fit the tyre. Its dimensions, shape should be suitable to satisfactorily accommodate the particular tyre required for the vehicle. In this a tyre of a car wheel rim belonging to the disc wheel category is considered. Design is an important industrial activity which influences the quality of the product. The wheel rim is designed by using modeling software CATIAv5R18.In modeling the time spent in producing the complex 3-D models and the risk involved in design and manufacturing process can be easily minimized. So the modeling of the wheel rim is made by using CATIA. Later this CATIA model is imported to ANSYS for analysis work. ANSYS software is the latest software used for simulating the different forces, pressure acting on the component and also for calculating and viewing the results. A solver mode in ANSYS software calculates the stresses, deflection, bending moments and their relations without manual interventions, reduces the time compared with the method of mathematical calculations by a human. ANSYS static analysis work is carried out by considering two different materials namely Aluminum Alloy and Structural steel and their relative performances have been observed respectively. In addition to this, rim is subjected to vibration analysis, a part of Dynamic Analysis is carried out and its performance is observed.

Cite this paper

IEEE
P. Dileepkumar, G. Ramesh, G. Suresh. Structural and Vibrational Analysis of Wheel Rim, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
P. Dileepkumar, G. Ramesh, G. Suresh (2016). Structural and Vibrational Analysis of Wheel Rim. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
P. Dileepkumar, G. Ramesh, G. Suresh. "Structural and Vibrational Analysis of Wheel Rim." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
S. Ananda

Org/Univ
S. J. M. Arts, Commerce, Science College, Chitradurga, karnataka, India

Keywords
Caste system, Joint family, Discrimination, Hereditary Jobs, Traditionalist, Unorganized workers, Migrant youths.

View AbstractCitationView PDF

Full Paper PDF (View in new tab)

Abstract

Objective: The purpose of the study is comparison of Rural and Urban Gender discrimination among the youths. Subjects and Method: For the purpose of study the subjects were one hundred, twenty (120), sixty (30+30=60) rural boys and girls from Belagatta, Madakaripura Sasalahatty villages of Chitradurga Taluk, sixty (30+30=60) urban boys and girls from Chitradurga town of Karnataka State. Between the age of 18 to 28 years were selected. The researcher had been selected the following groups at the village level literate, illiterate, hereditary job holders, traditionalists, caste, family, At the urban educated, migrants, unorganized workers, unemployed youths. The data was analyzed by applying independent t-test. The level of significance was set at 0.05.

Result: The results of this study show that the majority of the components are significantly higher in rural joint family group. The results of the study also indicate that the significant difference in exclusive on rural caste restricted to youths and migrants in urban. The urban youths are better than the rural youths.

Conclusion: In significant difference found in endurance and flexibility between rural and urban gender discrimination among the youths. And there were significant difference found in inequality treatment to boys and girls in rural society, But in urban some better treatment to both.

Cite this paper

IEEE
S. Ananda. A Comparative Study of Gender and Youth between Rural and Urban, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
S. Ananda (2016). A Comparative Study of Gender and Youth between Rural and Urban. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
S. Ananda. "A Comparative Study of Gender and Youth between Rural and Urban." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Mohammad Taseem Rafique Kadagaonkar

Org/Univ
Finolex Academy of Management and Technology, Ratnagiri, India

Keywords
Process piping, Stress Analysis, CAESER II, Piping Layouts, Piping Design.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Milind S Yadav

Abstract

Process piping is a form of pipe work used to transport materials used in industrial processes and manufacturing. It is specially designed for particular applications to ensure that it will meet health and safety standards, in addition to suiting the needs of a given manufacturing process. The designer of the piping also has to consider issues like the amount of pressure the piping will be subjected to and the width of the piping, when selecting an appropriate construction material for longer life of system. In this project study, by using data like P & ID, 2-D and 3-D piping system is designed by following codes and standards. Finite element analysis is performed with the application of various loading cases to check sustainability of piping system in design service condition. The results of the study show that the primary and secondary stresses are within code allowable limits. Hence system is safe for stresses. Also nodal movements are shown in displacement summary report.

Cite this paper

IEEE
Mohammad Taseem Rafique Kadagaonkar, Milind S Yadav. Design of Steam Piping System for Dryers in Paper Machine and Checking its Sustainability through Finite Element Analysis using Caesar II, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Mohammad Taseem Rafique Kadagaonkar, Milind S Yadav (2016). Design of Steam Piping System for Dryers in Paper Machine and Checking its Sustainability through Finite Element Analysis using Caesar II. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Mohammad Taseem Rafique Kadagaonkar, Milind S Yadav. "Design of Steam Piping System for Dryers in Paper Machine and Checking its Sustainability through Finite Element Analysis using Caesar II." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Manikanta M

Org/Univ
Manipal Institute of Technology, Manipal, Karnataka, India

Keywords
Al2024 grey cast iron, Stir casting, Age hardening, MMC.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

S. S. Sharma, Sathish Rao U

Abstract

It is proposed to study the mechanical properties of Al2024-gray cast iron composite with age hardening process and compared with as cast specimen. All heat treatment processes are carried out in atmospheric conditions. Al2024 is a reasonable choice as a matrix material to prepare MMCs owing to high strength (especially at elevated temperatures), toughness, and, in specific cases weld ability. Among different types of the recently formed composite materials, particle reinforced MMC and in particular aluminum as matrix material has found to have industrial applications. Gray cast iron powder reinforced aluminum 2024 composites possess a unique combination of high specific strength, high elastic modulus than the corresponding unreinforced matrix alloy system. By double stir casting method, Al2024 will be reinforced with gray cast iron powder. Heat treatment is given so as to tailor and improve the required mechanical properties as per the requirement. Gray cast iron is selected since it is believed to improve the hardness as well as the mach inability due to the presence of both iron carbide and free graphite in gray cast iron powder. Here three different proportion of gray cast iron composite are prepared by stir casting process. Age Hardening treatment is given to the samples with different percentage of gray C.I, and different properties such as microstructure, hardness and corrosion are compared with as cast Al2024- gray cast iron composite of respective composition. The possible outcomes maybe increase in mechanical properties by addition of gray cast iron.

Cite this paper

IEEE
Manikanta M, S. S. Sharma, Sathish Rao U. Characteristic Study and Enhancement of Mechanical Properties of Al2024 Gray Cast Iron Powder Reinforced MMC by Heat Treatment, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Manikanta M, S. S. Sharma, Sathish Rao U (2016). Characteristic Study and Enhancement of Mechanical Properties of Al2024 Gray Cast Iron Powder Reinforced MMC by Heat Treatment. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Manikanta M, S. S. Sharma, Sathish Rao U. "Characteristic Study and Enhancement of Mechanical Properties of Al2024 Gray Cast Iron Powder Reinforced MMC by Heat Treatment." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Diljot Kaur

Org/Univ
Lovely Professional University, Phagwara, India

Keywords
VANET, Security, DTN, Trust, ACO

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Simarjit Singh Malhi

Abstract

In Trust based Networks, nodes are typically being controlled by realistic entities such as people. Trust based Network is aiming at enabling communication through highly heterogeneous networks by relying on dynamic nature of message transmission whenever there is arise in communication opportunities, such communication thus does not rely on a routing infrastructure and is peer-to-peer in nature. The delay-tolerant paradigm is akin to trust based networks, thus a suitable approach to address the lack of connectivity and the mobility. In this thesis we simulate attack and are monitoring the nodes by Particle swarm optimization, thus preventing the attack and which will lead to through put increase and overhead reduce.

Cite this paper

IEEE
Diljot Kaur, Simarjit Singh Malhi. Review of VANET Security on Trust Base, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Diljot Kaur, Simarjit Singh Malhi (2016). Review of VANET Security on Trust Base. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Diljot Kaur, Simarjit Singh Malhi. "Review of VANET Security on Trust Base." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Dhanveer Kaur

Org/Univ
Lovely Professional University, Phagwara, India

Keywords
Vanet, Routing, DTN, Drop Packet.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Harwant Singh Arri

Abstract

Vehicular Ad hoc Network (VANET) is based on principles of Mobile Ad hoc networks (MANET). It is a spontaneous process of data exchange from one node to another node. Vehicular networks comes with new promising field in wireless technology which is used to deploy a vehicle to vehicle communication (V2V) and vehicle to infrastructure (V2I) communication between nodes. In VANET routing main drawback is packet dropping, but it will be reduced by intelligent routing which can be optimized by met heuristics. In this thesis we proposed VANET based routing which depend on shortest path and social information, optimize by met heuristics.

Cite this paper

IEEE
Dhanveer Kaur, Harwant Singh Arri. Review of VANET Routing in Opportunistic Environment, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Dhanveer Kaur, Harwant Singh Arri (2016). Review of VANET Routing in Opportunistic Environment. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Dhanveer Kaur, Harwant Singh Arri. "Review of VANET Routing in Opportunistic Environment." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Musale Kunal Rajendra

Org/Univ
NDMVP’S KBTCOE, Nashik, India

Keywords
Risk Management, Risk Analysis, Monte Carlo Simulation.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Aher M. C.

Abstract

Large and complex construction projects always face an uncertainty that leads to risks of delaying the project. Construction projects are of different sizes and of different nature and risk associated with them also vary. Schedules are very essential to the successful execution of projects. Without a schedule, it is difficult to coordinate the various activities found in a construction project. Most schedules are developed in a deterministic manner using Critical Path Method. Unfortunately, construction schedules are affected by various uncertainties. As a result, schedule delays are common in various construction projects. Therefore, it is important to find out probabilities of schedule delays. To evaluate the probability of construction time-overruns and Forecasting of appx. Accurate project completion date is a challenge to construction schedulers. Management of risks and uncertainties in construction projects is possible if risks have been identified and the potential impacts have been analyzed. The Critical Path Method (CPM), which is used to schedule construction activities, is deterministic with regard to the duration assigned to the execution of the activities and the results produced in certain values. Unfortunately, construction activities are performed under uncertain conditions. Project risks cause variations in activity duration, and in turn the entire network is affected by uncertainty. To evaluate construction networks by considering risk factors, nondeterministic scheduling methods such as the program evaluation and review technique (PERT), the probabilistic network evaluation technique (PNET), Critical Chain Scheduling (CCS), and Monte Carlo simulation (MCS) have been developed. In the present work, an attempt is made to study the effect of uncertainties in the project on the total duration of the project in an Indian context. For this, Monte Carlo simulation (MCS) technique is used. Effect of different distributions for different activities and the number of simulations on the total project duration are determined and compared with the CPM and PERT. Finally, sensitivity analysis is carried out to show the influence of each uncertain activity on the total project duration.

Cite this paper

IEEE
Musale Kunal Rajendra, Aher M. C.. Risk Analysis in Construction Scheduling, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Musale Kunal Rajendra, Aher M. C. (2016). Risk Analysis in Construction Scheduling. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Musale Kunal Rajendra, Aher M. C.. "Risk Analysis in Construction Scheduling." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Prasanth Navaneetham

Org/Univ
SRM University, Chennai, India

Keywords
Multi – axis CNC VMC Milling Machine, Camshaft, Solid Works, Mastercam, Optimization

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

V. G. Umasekar, Bibin Baby

Abstract

In olden days, the complexity of fabricating the mechanical components is higher and time consuming. Manufacturing industries normally use conventional methods like casting and forging process to shape components and use CNC machines to achieve final dimensions within the required tolerance. The difficulty in making components can be minimized by introducing the techniques for reduced setup time reduced machining time for increase in productivity and increase in accuracy and surface finish as a result of using 5- axis CNC VMC milling machining setup. But prior to start machining, a virtual simulation of the entire operations is to be carried out to check, verify and rectify the occurrence of collision, and the application of suitable parameters to achieve reduced cycle time. And this virtual simulation can be carried out through Mastercam software. This paper is focused on 4-axis finishing process of camshaft using 5-axis CNC VMC milling machine. This work involves geometric modeling of camshaft using Solid Works software. The model is then imported to Mastercam software for applying different methods and parameters to simulate the tool. Then the suitable parameters having collision free and reduced cycle time is taken into account. Then, the NC program is generated using the required post processor and program is entered to the 5- axis CNC milling machine to perform both roughing process and finishing process. Material used is Aluminum Alloy 6061. As per the experimental results, it has been observed that constant overlap spiral tool path for top part machining is selected and high speed tool path is selected for bottom part 3- axis rough machining and rotary 4 axis tool path for final finishing ensuring collision free and reduced cycle time. The cycle time resulted by Mastercam software is less than the cycle time resulted by the 5 axis CNC VMC milling machine. Then, the total machining time of camshaft as per the profile were found to be 5.83 hours and 52 seconds.

Cite this paper

IEEE
Prasanth Navaneetham, V. G. Umasekar, Bibin Baby. Optimization of Cycle Time through Mastercam Virtual Simulation and Four Axis CNC Milling Machining Of Camshaft, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Prasanth Navaneetham, V. G. Umasekar, Bibin Baby (2016). Optimization of Cycle Time through Mastercam Virtual Simulation and Four Axis CNC Milling Machining Of Camshaft. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Prasanth Navaneetham, V. G. Umasekar, Bibin Baby. "Optimization of Cycle Time through Mastercam Virtual Simulation and Four Axis CNC Milling Machining Of Camshaft." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Shivani. S. Tantarpale

Org/Univ
G.H.Raisoni College of Engineering and Management, Amravati, India

Keywords
Error Amplifier, LDO, Gain, Regulator.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Ms. Archana O. Vyas

Abstract

A low-dropout or LDO regulator is a DC linear voltage regulator which can control the output voltage even when the supply voltage is very close to the output voltage. The advantages of a low dropout voltage regulator include the absence of switching noise ( as no switching takes place), smaller device size ( as neither large inductors nor transformers are needed), and greater design simplicity (usually consists of a reference, an amplifier and a pass element). A significant adiabatic logic with 180 nm CMOS technology is proposed to reduce impact of power supply reductions well as a simple symmetric operational transconductance amplifier is used as the error amplifier (EA), with a current splitting method adopted to increase the gain and also improves the bandwidth of the LDO regulator.

Cite this paper

IEEE
Shivani. S. Tantarpale, Ms. Archana O. Vyas. An Approach for Reduction in Power Consumption in Low Voltage Dropout Regulator, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Shivani. S. Tantarpale, Ms. Archana O. Vyas (2016). An Approach for Reduction in Power Consumption in Low Voltage Dropout Regulator. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Shivani. S. Tantarpale, Ms. Archana O. Vyas. "An Approach for Reduction in Power Consumption in Low Voltage Dropout Regulator." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Jayaprakash Chinnappan

Org/Univ
School of Life Sciences, Bharathiar University, Coimbatore, India

Keywords
Peganum harmala, Candida albicans, Klebsiella pneumonia, Pseudomonas aurignosa, UV, IR, NMR and MIC.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Veeran Mohanraj

Abstract

The aim of the study was to determine the strong antimicrobial and antifungal activity from the extracts of Peganum Harmala plant species by solvent extraction procedure. P. harmala seeds extract contains several important alkaloids such an important Oxamide compound was used for this study. Extracted product was isolated, purified and identified by Thin Layer Chromatography, UV-VIS Spectroscopy, FT-IR Spectroscopy and 1H-NMR, 13C-NMR Spectroscopy. Finally, the isolated compound Oxamide activity was checked and proved through the Candida albicans, Klebsiella pneumonia and Pseudomonas aeruginosa with MIC studies.

Cite this paper

IEEE
Jayaprakash Chinnappan, Veeran Mohanraj. Antibacterial and Antifungal Activity from Seed Extracts Of Peganum Harmala, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Jayaprakash Chinnappan, Veeran Mohanraj (2016). Antibacterial and Antifungal Activity from Seed Extracts Of Peganum Harmala. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Jayaprakash Chinnappan, Veeran Mohanraj. "Antibacterial and Antifungal Activity from Seed Extracts Of Peganum Harmala." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Chandan Sharma

Org/Univ
Career Point University, Hamirpur, H.P, India

Keywords
WTLS, WAP, WCMP, WAE,SSL

View AbstractCitationView PDF

Full Paper PDF (View in new tab)

Abstract

Wireless Application Protocol (WAP) is one of the technical standards for information over a mobile wireless network. Mobile devices such as mobile phones that use the protocol have a WAP browser as a web browser. WTLS (wireless transport layer security) inherited from TLS (Transport Layer Security). WTLS uses similar semantics adapted for a low bandwidth mobile device. As compared to TLS main changes are compressed data structures where possible packet sizes are reduced by using bit-fields, discarding redundancy and truncating some cryptographic elements. WTLS defines a compressed certificate format. This broadly follows the X.509 v3 certificate structure, but uses smaller data structures. Packet based design TLS is designed for use over a data stream. WTLS adapts that design to be more appropriate on a packet based network. WTLS design is based on a requirement that it be possible to use a packet network such as SMS as a data transport. There are number of WTLS security issues. WTLS processing more is fast as compared to using SSL. So it is suitable for wireless system. WTLS uses modern cryptography tools to enhance security. WTLS can provide different level of security for privacy, data integrity and authentications.

Cite this paper

IEEE
Chandan Sharma. A Review on Wireless Transport Layer Security, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Chandan Sharma (2016). A Review on Wireless Transport Layer Security. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Chandan Sharma. "A Review on Wireless Transport Layer Security." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Disha Gupta

Org/Univ
RTMNU, Nagpur, India

Keywords
Class Imbalance, Data Mining, Oversampling, Classification, KNN Clustering

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Reetu Gupta, Prashant Khobragade

Abstract

Class imbalance problem are raised when one class having maximum number of examples than other classes. The classical classifiers of balance datasets cannot deal with the class imbalance problem because they pay more attention to the majority class. The main drawback associated with it majority class is loss of important information. The Class imbalance problem is a difficult due to the amount and nature of data. This paper focuses different methods of class imbalance problem. It is been considered the majority class to achieve the class imbalanced problem. This paper mainly focuses the minority class sample to achieve the problem and proposed method for class imbalance problem using minority sample data. The oversampling and undersampling both concept were used to identify the correct class label of the sample using probabilistic approach, the main objective of this paper, to proposed method to minimize the misclassification rate of minority class sample, balance and classify the data more accurately thereby improving the performance of classifier.

Cite this paper

IEEE
Disha Gupta, Reetu Gupta, Prashant Khobragade. Class Imbalance Problem in Data Mining using Probabilistic Approach, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Disha Gupta, Reetu Gupta, Prashant Khobragade (2016). Class Imbalance Problem in Data Mining using Probabilistic Approach. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Disha Gupta, Reetu Gupta, Prashant Khobragade. "Class Imbalance Problem in Data Mining using Probabilistic Approach." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Uma Desai

Org/Univ
Ballari Institute of Technology & Management, Ballari, Karnataka, India

Keywords
Metal-coumarin & substituted coumarin Schiff base complexes, Stability constants.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Suresh

Abstract

Schiff bases derived from substituted coumarins with substituted diamines were synthesized by cyclo-condensation. Proton-ligand ionization constants and metal-ligand stability constants at constant ionic strength in aqueous-alcohol medium (50/50% V/V) were evaluated using Irving-Rossotti method. The ligands exhibit pKa values around 11.5 due to the phenolic –OH group. The metal ligand stability constants with Cu (II), Co(II), Ni(II), Zn(II), Cd(II) and Hg(II) were also determined. The effects of substitutions on the stability constants were studied.

Cite this paper

IEEE
Uma Desai, Suresh. Physicochemical Studies on Schiff Bases Derived from Substituted Coumarins with Substituted Diamines in Aqueous-Alcohol Medium, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Uma Desai, Suresh (2016). Physicochemical Studies on Schiff Bases Derived from Substituted Coumarins with Substituted Diamines in Aqueous-Alcohol Medium. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Uma Desai, Suresh. "Physicochemical Studies on Schiff Bases Derived from Substituted Coumarins with Substituted Diamines in Aqueous-Alcohol Medium." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
K. S. Sadasiva Rao

Org/Univ
Sri Indu Institute of Engineering and Technology, Telangana, India

Keywords
Transform Domain Technique, Steganography.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Dr A. Damodaram

Abstract

Steganography is the process of embedding original message bits on some carrier file. The carrier file may be text file, image file, audio file or video file etc. If that carrier file is an image file, then that technique is called Image steganography [1]. If color image is used as a carrier file to embed data bits, then that type of steganography technique is called as color image steganography [7]. In this proposed work, embedding the original message bits in the transform domain of the carrier color image without considering the green plane, hence it is resulting in high quality stego image. Hence this technique is called as improved color image steganography technique in transform domain. Here in this paper, DCT (Discrete Cosine Transform) technique has been used.

Cite this paper

IEEE
K. S. Sadasiva Rao, Dr A. Damodaram. Improved Color Image Steganographic Technique in Transform Domain, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
K. S. Sadasiva Rao, Dr A. Damodaram (2016). Improved Color Image Steganographic Technique in Transform Domain. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
K. S. Sadasiva Rao, Dr A. Damodaram. "Improved Color Image Steganographic Technique in Transform Domain." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Lovepreet Singh

Org/Univ
Punjab Technical University, Punjab, India

Keywords
MANET, AODV, OLSR, DSR

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Pankaj Sharma, Puneet Jain

Abstract

In this paper the effect of entering different routing protocol in a network is analyzed. To analyze this effect number of nodes are vary from 25 to 65 nodes. In this paper the 25 nodes are move at low speed and 65 nodes are moving at high speed. To analyze this effect opnet modeler 14.5 is used. The performance is compared in terms of throughput, load and media access delay. Results show that when only aodv is used performance is good when other protocols enter into the network then performance decrease.

Cite this paper

IEEE
Lovepreet Singh, Pankaj Sharma, Puneet Jain. Effect of Varying Source Node, Relay Node and Mobility in MANET, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Lovepreet Singh, Pankaj Sharma, Puneet Jain (2016). Effect of Varying Source Node, Relay Node and Mobility in MANET. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Lovepreet Singh, Pankaj Sharma, Puneet Jain. "Effect of Varying Source Node, Relay Node and Mobility in MANET." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Ramandeep Sethi

Org/Univ
Punjab Technical University, Punjab, India

Keywords
WLAN, UMTS, Handoff

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Pankaj Sharma, Puneet Jain

Abstract

In this paper the performance of WLAN is analyzed in the presences of UMTS nodes. To analyze this interference UMTS are nodes are moving using different trajectories. While moving UMTS nodes handoff (soft and hard) techniques are used in this paper. To analyze this effect OPNET modeler is used. The performance is compared In terms of load, media access delay and packet delay variation. The result shows that the performance of soft handoff is better than hard handoff.

Cite this paper

IEEE
Ramandeep Sethi, Pankaj Sharma, Puneet Jain. Effect of Interference of UMTS and WLAN during Handoff, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Ramandeep Sethi, Pankaj Sharma, Puneet Jain (2016). Effect of Interference of UMTS and WLAN during Handoff. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Ramandeep Sethi, Pankaj Sharma, Puneet Jain. "Effect of Interference of UMTS and WLAN during Handoff." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Sandhiya. B.

Org/Univ
Kathir College of Engineering, Coimbatore, India

Keywords
Energy Saving, Power Consumption.

View AbstractCitationView PDF

Full Paper PDF (View in new tab)

Abstract

In order to attain energy saving with efficiency and supply good services automatically for users, the design of a sensible energy observance and management system using the Microsoft neural network and computationally non tolling formula is projected in this paper. By monitoring the ability consumption data, surroundings data and users’ scenario data, the system supported the design will calculate the proportion of wasted energy consumption supported the energy consumption data point, give sensible services based on the person-device interaction, and forecast the energy consumption supported the user energy consumption behaviors. The system is combined with cloud computing for data storage and processing. This document illustrates the propose and execution of the system structural design.

Cite this paper

IEEE
Sandhiya. B.. Machine Learning and SOA Based Building Management System, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Sandhiya. B. (2016). Machine Learning and SOA Based Building Management System. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Sandhiya. B.. "Machine Learning and SOA Based Building Management System." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Ashok M V

Org/Univ
Teachers Academy, Bangalore, India

Keywords
Educational data mining, competent student, Apriori algorithm, X-means algorithm

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Apoorva A, Dr. G Suganthi

Abstract

Educational Data Mining is an area where in a combination of techniques such as data mining, machine Learning and statistics, is applied on educational data to get valuable information. The main objective is to recognize competent students based on marks are using clustering (X-means algorithm); then the subjects studied by them are classified into different categories and finally better combination of students as groups or teams are chosen to represent college for contests using association rules. To assess the performance of the proposed model, a student dataset of MCA from a college in Bangalore were collected for the study as a synthetic data. The accuracy of the results obtained from the proposed model was found to be promising. It was found from the study that 3 groups of 2 teams per group emerged as better combinations.

Cite this paper

IEEE
Ashok M V, Apoorva A, Dr. G Suganthi. Educational Data Mining: Recognizing and Forming Groups of Competent Students For Contests, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Ashok M V, Apoorva A, Dr. G Suganthi (2016). Educational Data Mining: Recognizing and Forming Groups of Competent Students For Contests. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Ashok M V, Apoorva A, Dr. G Suganthi. "Educational Data Mining: Recognizing and Forming Groups of Competent Students For Contests." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
K. Prakash

Org/Univ
Annamalai University, Annamalai Nagar, India

Keywords
Potassium dichromate (K2 Cr2 O7), Cowpea, Phytotoxicity, Vigour Index Morphological parameters, Pigments content.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

T. Ravimycin, P. Thamizhiniyan

Abstract

A laboratory experiment was conducted to determine the phototoxic effect of [Chromium (Cr) Potassium dichromate (K2 Cr2 O7)] on seed germination and seedling growth of cow pea [Vigna unguiculata (L.) Walp.]. The seeds were treated under 5, 25, 50, 75, 100, 125 and 150 ppm of Cr concentration solutions individually. Each treatment was replicated thrice in a randomized block design. Observations were complete on Germination Percentage, Root and Shoot Length, Number of Leaves, Total Leaf Area, Fresh and Dry Weights of seedling. And Phytotoxicity, Tolerance Index, Vigour Index and pigments content such as Chlorophyll ‘a’, Chlorophyll ‘b’, Total Chlorophyll and carotenoid content of cow pea seedlings at 14th days of seedlings. Among the results gradual increase in Cr concentration under different treatments significantly leads to inhibition of seed germination and other growth parameters. Percentage of phytotoxicity showed an increasing trend with gradual increase in Cr concentration for the cow pea seedlings. Maximum inhibition in all growth parameters and pigments content were recorded.

Cite this paper

IEEE
K. Prakash, T. Ravimycin, P. Thamizhiniyan. Phyto-Toxic Effect of Chromium of Cow Pea (Vigna Unguiculata (l.) Walp.), International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
K. Prakash, T. Ravimycin, P. Thamizhiniyan (2016). Phyto-Toxic Effect of Chromium of Cow Pea (Vigna Unguiculata (l.) Walp.). International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
K. Prakash, T. Ravimycin, P. Thamizhiniyan. "Phyto-Toxic Effect of Chromium of Cow Pea (Vigna Unguiculata (l.) Walp.)." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Asha Rani

Org/Univ
IPEM Law Academy, India

Keywords
Uniform Civil Code, Secularism, Equality, Rule of Law.

View AbstractCitationView PDF

Full Paper PDF (View in new tab)

Abstract

After 68 years of independence and claiming that India is a secular country, can help combat the misuse of personal laws for selfish purposes. From time to time Courts as well as politicians have laid the importance of the Uniform Civil Code but none of them has able to influence the law makers or the Legislative Assembly who is empowered to make laws regarding the same. Uniform Civil Code will not only ensure that there will be no person hiding behind the veil of religion and misusing personal laws for exploitation of women.It is interesting to note that in Goa there is Goa Civil Code, which is a uniform civil code in itself. It is followed since Portuguese time. Although there were chances to revoke the old law after the departure of Portugal but locals raised the voice against that decision. This is an indication that people are willing to accept uniform code regardless of religion

Cite this paper

IEEE
Asha Rani. A Term Paper on Uniform Civil Code, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Asha Rani (2016). A Term Paper on Uniform Civil Code. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Asha Rani. "A Term Paper on Uniform Civil Code." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Subi Chaturvedi

Org/Univ
IIT, Delhi, India

Keywords
Social media, SNS, political news, digital governance, participatory communication, social networking websites, instant communication, crowd-sourcing, hashtag, newsjacking, social commerce, Twitterati, Viral, micro-blogging, Newsfeeds

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Jaijit Bhattacharya

Abstract

News on social media has outgrown television & radio news with instant update & feedback options; turning ‘passive audience’ into ‘active participants’ in the news making & news sharing process. Emergence of Twitter as a citizen engagement platform has been beneficial for journalists who use it for reading news & analyzing the latest Twitter trends as well as to acquire news worthy material for profitable news reporting. The paper foregrounds this dynamic function as well as critiques the role of Twitter as a participatory news resource for journalists’ engagement with respect to political news in the nation and across the world. Twitter has become the informative site with over 320 million Twitterati (PEW Report, 2015). The primary focus of this paper is to understand how Twitter has developed as the most used social networking site by the Journalists for accessing and sharing Political News and to explore the motivations of Journalists for using Twitter for the purpose of political news sharing and participation in news related discussions.

Cite this paper

IEEE
Subi Chaturvedi, Jaijit Bhattacharya. Role of Twitter as a Digital News Engagement Resource for Political Awareness of Journalists in India, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Subi Chaturvedi, Jaijit Bhattacharya (2016). Role of Twitter as a Digital News Engagement Resource for Political Awareness of Journalists in India. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Subi Chaturvedi, Jaijit Bhattacharya. "Role of Twitter as a Digital News Engagement Resource for Political Awareness of Journalists in India." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Bh. L. Mohanraju

Org/Univ
DNR School of Business Management, Bhimavaram., India

Keywords
Street, Employees , Industry.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

K. Neelima

Abstract

Simply knowing the range of possible preventive stress management methods does not necessarily lead to effective prevention of distress. This chapter reviews preventive stress management programs (organizational/individual) and presents a framework for the implementation of such programs. At the organizational level, management training programs for all levels of management, organizational development activities, internal or external consultants, and ad hoc task forces can be useful in introducing preventive stress management activities. At the individual level, medical or health departments, stress management programs, fitness programs, and comprehensive health promotion programs can each be vehicles for bringing individual stress management techniques into the organization. Implementing preventive stress management in an organization requires (a) organizational stress diagnosis, (b) planning for prevention, (c) organizational and individual action, and (d) outcome evaluation. These functions form an iterative model for implementing preventive stress management that is intended to foster continuing growth and development of the organization and the individuals within it. (PsycINFO Database Record (c) 2010 APA, all rights reserved).

Cite this paper

IEEE
Bh. L. Mohanraju, K. Neelima. Stress Management, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Bh. L. Mohanraju, K. Neelima (2016). Stress Management. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Bh. L. Mohanraju, K. Neelima. "Stress Management." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Asha Rani

Org/Univ
IPEM Law Academy, India

Keywords
Legal literacy , Social Justice, Law.

View AbstractCitationView PDF

Full Paper PDF (View in new tab)

Abstract

The study of article is to create legal awareness among individuals about their rights, duties, values, legal system. Legal awareness also help to promote consciousness of legal culture and rule of law and it empower the people to demand justice accountability and effective remedies at all levels. The article describes that law is the key to know our rights as we all are living in a democratic country where we all govern with rule of law so we should know the law of his country because ignorance of law is no excuse. The article shows that legal education is not only an instrument of social control but also as an instrument of social change.

Cite this paper

IEEE
Asha Rani. Legal Education Need of Society, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Asha Rani (2016). Legal Education Need of Society. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Asha Rani. "Legal Education Need of Society." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Shangeerthana G V

Org/Univ
Alagappa University, Tamil Nadu, India

Keywords
E-Learning (Electronic based Learning, typically on the internet), Employee’s Learning, India based Corporates (IT companies originated in India)

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Chandrasekar K

Abstract

This paper provides an insight about the key factors that can be re-considered for implementing E-Learning in any of the India based Corporate towards its success by overcoming the failures, which can be accomplished by means of setting light to Employee’s Learning strategy (in other words, E-Learning:- Employees Learning in Corporate).

Cite this paper

IEEE
Shangeerthana G V, Chandrasekar K. Re-Think on Critical Successful Factors of E-learning Implementation in India based Corporates, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Shangeerthana G V, Chandrasekar K (2016). Re-Think on Critical Successful Factors of E-learning Implementation in India based Corporates. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Shangeerthana G V, Chandrasekar K. "Re-Think on Critical Successful Factors of E-learning Implementation in India based Corporates." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Sunita .H. Bajaj

Org/Univ
BIT, Ballarpur, India

Keywords
Wireless Networks, Kedium Access Control, Recharging Pulse.

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Samiksha .M. Bharne

Abstract

Wireless sensor networks on energy received from radio frequency devices. Since the sensor nodes are always in the process of sensing, energy outage is the common phenomenon among them. In order to reduce this outage of energy, we have proposed Medium Access Control (MAC) protocol. This protocol follows round robin scheduling algorithm. The nodes which are on the verge of outage of energy send recharging request to the master node. During this process, the nodes which are in the way of master node and the requesting node they also hear and repeat the recharging request until the master node replies with a recharging pulse. The performance of the system is evaluated using a probabilistic energy expenditure model. Our results show that the protocol designed gives uninterrupted working networks despite of varying conditions.

Cite this paper

IEEE
Sunita .H. Bajaj, Samiksha .M. Bharne. Recharging of WSN Nodes based on Polling Mac Protocol for Lifetime Maximization and Reliability, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Sunita .H. Bajaj, Samiksha .M. Bharne (2016). Recharging of WSN Nodes based on Polling Mac Protocol for Lifetime Maximization and Reliability. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Sunita .H. Bajaj, Samiksha .M. Bharne. "Recharging of WSN Nodes based on Polling Mac Protocol for Lifetime Maximization and Reliability." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Ruchik N. Jani

Org/Univ
Government Polytechnic, Rajkot, India

Keywords
TTL; MN; AODV; NIC; FN; GWADV; RMD

View AbstractCitationView PDF

Full Paper PDF (View in new tab)

Abstract

From last two decades wireless networks are gaining popularity and have been widely used. Mobile adhoc network is a great solution to the current need of low-cost, on-demand, autonomous and infrastructure-less network which is highly portable, mobile and temporary in nature. To connect MANET to fixed network, any node in MANET should be configured as a gateway. Node that wants connectivity needs to discover present gateways in MANET. To reduce overhead, previous schemes tune Time to Live and/or Advertisement Interval of gateway advertisement packets based on total source nodes and/or mobility of nodes in MANET. As discussed in [4], it is also possible to consider number of gateways in MANET to adapt the discovery procedure. Proposed scheme does the same. It is found that the new scheme shows better results in terms of less routing overhead with same Delivery Ratio and End-to-End Delay, compared to proactive and hybrid gateway discovery schemes.

Cite this paper

IEEE
Ruchik N. Jani. The Gateway Based Adaptive Gateway Discovery Scheme in Mobile Ad-hoc Network, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Ruchik N. Jani (2016). The Gateway Based Adaptive Gateway Discovery Scheme in Mobile Ad-hoc Network. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Ruchik N. Jani. "The Gateway Based Adaptive Gateway Discovery Scheme in Mobile Ad-hoc Network." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
Ila Shrivastava

Org/Univ
Acropolis Institute of Technology and Research, Indore (Madhya Pradesh), India

Keywords
Information, Text retrieval, Neural Network, Classification Algorithm

View AbstractCitationCo-authorsView PDF

Full Paper PDF (View in new tab)

Co-authors

Rahul Moriwal

Abstract

Now in these days the information need is increasing rapidly in our day to day life therefore a large number of users are accessing data from search engine. The search engines are composed with three major components user query interface, search algorithm and the ranking process. During search process the system evaluate the user input query and the database documents according to best fit documents are retrieved. The retrieved document is then ranked according to the user query relevance thus most near document of the user query is listed first. The available technique are provides the ranked listing of documents. In this presented work first the recently developed text document retrieval models are evaluated and then after a traditional model of document retrieval is enhanced with help of supervised classification technique. The proposed data model of the document search first finds the document’s word probability using the Bayesian classification approach then after the data is normalized to find the similar length of text document features. These document features are used to make training of neural network .The neural network processes the input training features and makes training for the documents pattern. This data model is used to predict the user input data patterns from the existing set of data. The implementation of the proposed technique is performed using the JAVA development technology after implementation of the desired document retrieval technique the performance of the system is estimated in terms of accuracy, error rate, memory consumption and the time consumption. According to the evaluated results the performance of the algorithm is found more optimum. Thus the given model is more adoptive as compared to the traditional approaches available.

Cite this paper

IEEE
Ila Shrivastava, Rahul Moriwal. An Improved Hierarchical Clustering for Information Retrieval System, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
Ila Shrivastava, Rahul Moriwal (2016). An Improved Hierarchical Clustering for Information Retrieval System. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
Ila Shrivastava, Rahul Moriwal. "An Improved Hierarchical Clustering for Information Retrieval System." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.ijariit.com.
Author
M. Jyothirmai

Org/Univ
JNTU kakinada, Andhra Pradesh, India

Keywords
Dwt, Jpeg, Jpeg 2000, Spiht, Eewita.

View AbstractCitationView PDF

Full Paper PDF (View in new tab)

Abstract

Transmission of facts like voice, textual content, photograph and video has many drawbacks like confined statistics degree of networks, noise in the channel, battery constraints of the gadgets and many others. This paper addresses the power and information degree drawbacks of pictures in digital conversation. The intention is to supply a comparison of the modern techniques supported the number of information within the snap shots, minimizing the strength needed for communication and also the obtainable transmission bandwidths. The fashions in comparison are the compression algorithms for mobile gadgets to cut back the transmission power of snap shots through wireless networks and adaptive facts codec for still photos so one can appreciably decrease the energy needed for Wi-Fi photograph communication. The rule is applied earlier than transmission images and is obvious to users. We will be predisposed to consequently use publically obtainable databases for our evaluation of power low-budget compression method.

Cite this paper

IEEE
M. Jyothirmai. An Insight into the Energy Efficiency based Image Compression on Handheld Devices, International Journal of Advance Research, Ideas and Innovations in Technology, www.ijariit.com.

APA
M. Jyothirmai (2017). An Insight into the Energy Efficiency based Image Compression on Handheld Devices. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.ijariit.com.

MLA
M. Jyothirmai. "An Insight into the Energy Efficiency based Image Compression on Handheld Devices." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2017). www.ijariit.com.


Is there a mistake in your details. Please let us know via this form.