Correlation and effectiveness of coordination exercise and activity of daily living in differently able children
Eye-hand coordination abilities are an integral part of a Child’s development. Eye-hand coordination is necessary for functional independence progress and its effects on the activity of daily living. This study is aimed at the effectiveness of coordination exercise on activity of daily living and the correlation between coordination exercise and activity of daily living. Total 20 children (7 Female, 13 Male) age group 10 to 15 years with different disabilities situated around Anand. Developmental Coordination Questionnaires (DCDQ) was used for assessment of coordination skill. Functional Independence Measure (FIM) was used for evaluating the activities of daily living. The coordination exercise program was effective for an activity of daily living in differently able children. Coordination exercise was positively associated with Activity of daily living. Coordination has an effect on Activity of daily living. After the coordination exercise program, the child improved his/her Coordination skill. Coordination exercises are effective on an activity of daily living in differently able children.
Published by: Dr. Bansari Anish Patel, Dr. Brajesh Kumar Mishra
Author: Dr. Bansari Anish Patel
Paper ID: V4I6-1317
Paper Status: published
Published: December 1, 2018
Solid waste management in internally displaced persons IDPS camps in Maiduguri Borno state Nigeria
This study aims to examine the solid waste management conditions of Internally Displaced Persons (IDPs) camps in Maiduguri, Borno State. The research is descriptive, qualitative approached were used. The primary data for the research was sourced through the use of questionnaire and interview using a combination of purposive and convenience sampling. While books, journals, newspapers, magazines and internet materials made up the secondary data. The data collected were coded, edited, presented and analyzed using descriptive statistics through frequency tables and percentages. A total of 197 IDPs participated in the study. The findings revealed that almost half of the respondents (45.7%) revealed that food waste is the highest type of solid waste generated in the camps this is because food is the basic need for the livelihood of the IDPs in the camps. And also (36.5%) of the respondents indicated that fine was the second most abundant type of solid waste generated in the camps. Therefore, the burning of fuelwood as a source of energy can be produced beautiful and this is environmentally not friendly which generate air pollution and environmental degradation. The study revealed that majority 122 (62.0) of the respondents perceived air pollution was the consequences of solid waste disposal in the camps. While 38 (19.3%) of the respondents reveals that the spread of germ is the consequences of solid waste disposal. Similarly, the study found that incineration was used for managing waste in the camps. Some NGOs contributed in sanitation through Water Sanitation and Hygiene (WASH) committee which conducts regular sensitization on the danger of poor waste management. The study recommends among others the need for intensive education to promote positive attitude for solid waste management among the IDPs. Keywords: Solid Waste Management Sanitation Polythene
Published by: Baba Gana Zannah, Bukar Usman, Mohammed Baba Shehu
Author: Baba Gana Zannah
Paper ID: V4I6-1279
Paper Status: published
Published: November 30, 2018
Effect of scenario planning on strategic entrepreneurship in Iraqi higher education
For many organizations and institutions, the challenge of knowing how to face competition derived from the globalization of the economy is presented. A fundamental technique to successfully answer that question is scenario planning. Which has become the basis for the success of various businesses. Accordingly, The objective of this study is to analyze the effect of scenario planning on strategic entrepreneurship. considering the impact which may have the dimensions of scenario planning and strategic entrepreneurship. For this, a theoretical model was designed depending on the literature, the questionnaire was the main tool for this study. Statistical analysis, based on direct correlation and effects tests (using SPSS and Amos software), allows proving there are positive effects on strategic entrepreneurship by scenario planning and its dimensions as revealed by the findings.
Published by: Karawan Azeez Hussain
Author: Karawan Azeez Hussain
Paper ID: V4I6-1307
Paper Status: published
Published: November 30, 2018
Encrypted data management with deduplication in cloud computing
Cloud computing plays an important role in supporting data storage, processing, and management in the Internet of Things (IoT). To preserve cloud data confidentiality and user privacy, cloud data are often stored in an encrypted form. However, duplicated data that are encrypted under different encryption schemes could be stored in the cloud, which greatly decreases the utilization rate of storage resources, especially for big data. Several data deduplication schemes have recently been proposed. However, most of them suffer from security weakness and lack of flexibility to support secure data access control. Therefore, few can be deployed in practice. This article proposes a scheme based on attribute-based encryption (ABE) to deduplicate encrypted data stored in the cloud while also supporting secure data access control. The authors evaluate the scheme's performance based on analysis and implementation. Results show the efficiency, effectiveness, and scalability of the scheme for potential practical deployment. To ensure data privacy, existing research proposes to outsource only encrypted data to CSPs. However, the same or different users could save duplicated data under different encryption schemes at the cloud. Existing solutions for deduplication are vulnerable to brute-force attacks2 and can’t flexibly support data access control and revocation (see the “Related Work in Data Deduplication” sidebar for a discussion of some other work in this area). Existing industrial solutions fail in encrypted data deduplication. A scheme based on attribute-based encryption (ABE) is proposed to deduplicate encrypted data stored in the cloud while at the same time supporting secure data access control. proposes to outsource only encrypted data to CSPs. However, the same or different users could save duplicated data under different encryption schemes at the cloud. Although cloud storage space is huge, this kind of duplication wastes networking resources, consumes excess power, and complicates data management. intra-user deduplication and interdeduplication.6 In their scheme, the ciphertext C of convergent encryption is further encrypted with a user key and transferred to the servers. However, it doesn’t deal with data sharing after deduplication among different users. Implementation is the stage of the project when the theoretical design is turned out into a working system. Thus it can be considered to be the most critical stage in achieving a successful new system and in giving the user, confidence that the new system will work and be effective. The implementation stage involves careful planning, investigation of the existing system and it’s constraints on implementation, designing of methods to achieve changeover and evaluation of changeover methods. In this project the following modules are used: i) Cloud Computing ii) Inter And Intra User iii) Deduplication. Various cloud service providers (CSPs) offer huge volumes of storage to maintain and manage IoT data, which can include videos, photos, and personal health records. These CSPs provide desirable service properties, such as scalability, elasticity, fault tolerance, and pay per use. Thus, cloud computing has become a promising service paradigm to support IoT applications and IoT system deployment. Thus, saving storage is becoming a crucial task for CSPs. Deduplication can achieve high space and cost savings, reducing up to 90 to 95 percent of storage needs for backup applications and up to 68 percent in standard file systems. Inter And Intra User:- At the same time, data owners want CSPs to protect their personal data from unauthorized access. CSPs should, therefore, perform access control based on the data owner’s expectations. In addition, data owners want to control not only data access but also its storage and usage. a data owner that stores its data at the CSP (we assume there’s only one data owner for one data M); and • data holders (ui, i = 1, . . . , n) that are eligible data users and could save the same data as the data owner at the CSP. That is, the same data, although in an encrypted form, is only saved once at the cloud but can be accessed by different users based on the data owners’ policies. Data-Deduplication:- Data deduplication should cooperate with data access control mechanisms. That is, the same data, although in an encrypted form, is only saved once at the cloud but can be accessed by different users based on the data owners’ policies. current industrial deduplication solutions can’t handle encrypted data. Existing solutions for deduplication are vulnerable to brute-force attacks and can’t flexibly support data access control and revocation (see the “Related Work in Data Deduplication” sidebar for a discussion of some other work in this area). Few existing schemes for cloud data access control support data deduplication simultaneously, and few can ensure flexibility and security with a sound performance for cloud data deduplication that data owners control directly. Algorithms:- Cyphertext Policy ABE (CP-ABE) or Key Policy ABE (KP-ABE):- Attribute-based encryption is a type of public-key encryption in which the secret key of a user and the ciphertext are dependent upon attributes (e.g. the country in which he lives, or the kind of subscription he has). In such a system, the decryption of a ciphertext is possible only if the set of attributes of the user key matches the attributes of the ciphertext. A crucial security aspect of Attribute-Based Encryption is collusion-resistance: An adversary that holds multiple keys should only be able to access data if at least one individual key grants access. Encryption Algorithm:- In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Encryption does not of itself prevent interception but denies the message content to the interceptor. In an encryption scheme, the intended communication information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm Decryption. There are many modern key-based cryptographic techniques. These are divided into two classes: symmetric and asymmetric (also called public/private) key cryptography. In symmetric key cryptography, the same key is used for both encryption and decryption. H/W System Configuration: System : Pentium –IV 2.4 GHz RAM : 256MB(min) Hard Disk : 40 GB Key Board : Standard Windows Keyboard S/W System Configuration: Operating System : Windows/XP/7 Application Server : Tomcat5.0/6.X Front End : HTML, Java, JSP Scripts : JavaScript Server-side Script : Java Server Pages Database : Mysql 5.0 Database Connectivity : JDBC.
Published by: Pokala Phanitej, Y. Suresh
Author: Pokala Phanitej
Paper ID: V4I6-1297
Paper Status: published
Published: November 30, 2018
Effect of partial replacement of sand by glass powder and steel powder over the properties of M-30 concrete
In the present research, a series of experiments had been performed to compare the use of glass powder and steel powder as partial replacement of sand in different proportions. Concrete mixes are modified by 10%, 15% and 20% and 25% of glass powder and steel powder in replacement. The inclusion of glass powder increases the compressive strength up-to certain proportions. It has also been noted that with the increase in the content of glass powder decreases the slump value or workability. It has also been noted that with the increase in the content of supplementary materials decreases the slump value or workability. Comparatively higher early strength gain (7-days) is obtained with steel powder concrete.
Published by: Achal Jain, Nitin Thakur
Author: Achal Jain
Paper ID: V4I6-1295
Paper Status: published
Published: November 30, 2018
A study on strengthening of soil using stabilized flyash
In the present study, I tried to prove soil stabilization using stabilized flyash. for the stabilization of flyash, we need to improve the flash properties by adding some admixtures. in the present study, we are using lime and sodium silicate as additives to improve the soil properties. Individual geotechnical parameters like grain size distribution, liquid limit, OMC, MDD, Specific gravity and angle of internal friction of Fly ash were determined and then Fly ash was mixed with different proportions of lime (2-15%) and sodium silicate (1-4%). These mixes were tested to obtain the optimum percentage of lime and sodium silicate. The variation in shear parameters like cohesion and angle of shearing resistance was studied by conducting a direct shear test. All the tests were performed after a time period of 3hours starting from the completion of preparation of the sample. Each test was performed for the normal stresses of 0.5kg/cm2, 1kg/cm2, 1.5kg/cm2, 2kg/cm2 and 2.5 kg/cm2. The results are compiled in a graphical form to observe the trends for shear parameters. The results show remarkable improvement in strength characteristics for higher percentages of lime and sodium silicate. The Major challenge on behalf of engineers especially civil engineers is the disposal of industrial waste products and their storage. Nowadays most of the industries reusing the wastes in different areas like civil constructions, treatment of materials and others. This reuse of wastes is essential to overcome the hazardous effects of wastes on the environment. Fly Ash is one of the industrial wastes produced every year throughout the country. Fly ash is a fine powder obtained from burning of coal during the production of electricity. Disposal of Fly ash is a big problem, to minimize the disposal of Fly ash into large land, it was used as a construction material in civil engineering works like building materials embankments, and bricks making etc.
Published by: Sakshi Singh Rana, Chappa Damodar Naidu
Author: Sakshi Singh Rana
Paper ID: V4I6-1310
Paper Status: published
Published: November 29, 2018
