This document reports on the synthesis and characterization of copper indium disulfide (CuInS2) nanoparticles. CuInS2 nanoparticles were prepared by a solid state melt growth process under vacuum. X-ray diffraction analysis confirmed the formation of a chalcopyrite crystal structure in the as-prepared sample. Field emission scanning electron microscopy images showed an increase in nanoparticle size after annealing the sample at 200°C. Energy dispersive X-ray analysis demonstrated that the elemental composition of copper, indium, and sulfur was maintained close to the intended stoichiometric ratio.
Intrusion Detection System Based on K-Star Classifier and Feature Set ReductionIOSR Journals
Abstract: Network security and Intrusion Detection Systems (IDS’s) is an important security related research
area. This paper applies K-star algorithm with filtering analysis in order to build a network intrusion detection
system. For our experimental analysis and as a case study, we have used the new NSL-KDD dataset, which is a
modified dataset for KDDCup 1999 intrusion detection benchmark dataset. With a split of 66.0% for the
training set and the remainder for the testing set a 2 class classifications has been implemented. WEKA which is
a java based open source software consists of a collection of machine learning algorithms for Data mining tasks
has been used in the testing process. The experimental results show that the proposed approach is very accurate
with low false positive rate and high true positive rate and it takes less learning time in comparison with other
existing approaches used for efficient network intrusion detection.
Keywords: Information Gain, Intrusion Detection System, Instance-based classifier, K-Star, Weka.
Smartdust Network for Tactical Border Surveillance Using Multiple SignaturesIOSR Journals
The paper aims at designing a system for border surveillance using the concept of smartdust
technology. Smartdusts are small dust like wireless sensor motes with multiple on-board sensors and
microcontroller. In real time, thousands of such smartdust motes must be deployed in a large area. The motes
can form a network among them and has wireless connection to outside world. Onboard hardware include a
variety of sensors for vibration/seismic, magnetic, acoustic and thermal signature recognition, a
microcontroller for processing these sensor values and a radio transceiver for communication over a wireless
network. In this experimental project, we have designed one central monitoring mote and two smartdust motes
using ARM controller, IEEE radio transceiver and sensors.The central monitoring mote also displays the
tracking history of intrusion on enabling a switch
This document summarizes a study on the effects of the organophosphate insecticide Fenitrothion on the freshwater fish Channa punctatus. The study exposed groups of C. punctatus to various concentrations of Fenitrothion for 21 days and examined histological changes in their liver, kidney, and heart tissues compared to an unexposed control group. The study found concentration-dependent toxicity effects including vacuolar degeneration, necrosis, hemorrhaging, and congestion in the liver and kidney tissues as well as muscle fragmentation and degeneration in the heart tissues of the exposed fish groups. The results indicate that Fenitrothion causes hazardous histological damage to important organs in C. punctatus.
This document reports on the synthesis and characterization of copper indium disulfide (CuInS2) nanoparticles. CuInS2 nanoparticles were prepared by a solid state melt growth process under vacuum. X-ray diffraction analysis confirmed the formation of a chalcopyrite crystal structure in the as-prepared sample. Field emission scanning electron microscopy images showed an increase in nanoparticle size after annealing the sample at 200°C. Energy dispersive X-ray analysis demonstrated that the elemental composition of copper, indium, and sulfur was maintained close to the intended stoichiometric ratio.
Intrusion Detection System Based on K-Star Classifier and Feature Set ReductionIOSR Journals
Abstract: Network security and Intrusion Detection Systems (IDS’s) is an important security related research
area. This paper applies K-star algorithm with filtering analysis in order to build a network intrusion detection
system. For our experimental analysis and as a case study, we have used the new NSL-KDD dataset, which is a
modified dataset for KDDCup 1999 intrusion detection benchmark dataset. With a split of 66.0% for the
training set and the remainder for the testing set a 2 class classifications has been implemented. WEKA which is
a java based open source software consists of a collection of machine learning algorithms for Data mining tasks
has been used in the testing process. The experimental results show that the proposed approach is very accurate
with low false positive rate and high true positive rate and it takes less learning time in comparison with other
existing approaches used for efficient network intrusion detection.
Keywords: Information Gain, Intrusion Detection System, Instance-based classifier, K-Star, Weka.
Smartdust Network for Tactical Border Surveillance Using Multiple SignaturesIOSR Journals
The paper aims at designing a system for border surveillance using the concept of smartdust
technology. Smartdusts are small dust like wireless sensor motes with multiple on-board sensors and
microcontroller. In real time, thousands of such smartdust motes must be deployed in a large area. The motes
can form a network among them and has wireless connection to outside world. Onboard hardware include a
variety of sensors for vibration/seismic, magnetic, acoustic and thermal signature recognition, a
microcontroller for processing these sensor values and a radio transceiver for communication over a wireless
network. In this experimental project, we have designed one central monitoring mote and two smartdust motes
using ARM controller, IEEE radio transceiver and sensors.The central monitoring mote also displays the
tracking history of intrusion on enabling a switch
This document summarizes a study on the effects of the organophosphate insecticide Fenitrothion on the freshwater fish Channa punctatus. The study exposed groups of C. punctatus to various concentrations of Fenitrothion for 21 days and examined histological changes in their liver, kidney, and heart tissues compared to an unexposed control group. The study found concentration-dependent toxicity effects including vacuolar degeneration, necrosis, hemorrhaging, and congestion in the liver and kidney tissues as well as muscle fragmentation and degeneration in the heart tissues of the exposed fish groups. The results indicate that Fenitrothion causes hazardous histological damage to important organs in C. punctatus.
Feasibility of Using Tincal Ore Waste as Barrier Material for Solid Waste Con...IOSR Journals
1) The study investigates using tincal ore waste (TOW) as a material to improve the properties of lateritic soil barriers used for containing municipal solid waste.
2) Hydraulic conductivity and unconfined compressive strength tests were performed on lateritic soil alone and mixed with 5-20% TOW, compacted using different methods.
3) Specimens with 20% TOW compacted at high energy yielded the lowest hydraulic conductivities of 10-10 to 10-12 m/s, meeting regulatory standards when permeated with leachate.
Sorting algorithms are the main concepts of the subject Data Structures and It’s Applications. These
algorithms are designed in arranging the data elements in the sorted order. If the data elements are arranged
in sorted order , then the searching is very easier. Some algorithms are comparison sort and some are noncomparison
sort. The choice of a algorithm is based on the efficiency of the algorithm. I have designed one
algorithm called as Alternate Sort. The main aspect is that different technique of comparisons is involed. I have
presented the algorithm , It’s working and the examples and finally my paper is consisting of the program
listing.
1) The document discusses properties of digital roots, including that digital roots partition the set of natural numbers into equivalence classes and that the difference of two equivalent numbers is always a multiple of 9.
2) It presents a "Vedic square" table that shows the digital roots of products of numbers between 1-9. This allows representing how numbers with a given digital root can be factorized.
3) The table demonstrates that numbers with a given digital root can only be factorized through the multiplication of numbers with specific other digital roots, such as numbers with a digital root of 1 being the product of numbers with digital roots of 1, 5 and 2, or 7 and 4.
Strongly Unique Best Simultaneous Coapproximation in Linear 2-Normed SpacesIOSR Journals
This paper deals with some fundamental properties of the set of strongly unique best simultaneous coapproximation in a linear 2-normed space. AMS Subject classification: 41A50,41A52,41A99, 41A28.
Decentralization Analysis of Decision Making and Performance of Accounting Co...IOSR Journals
This document summarizes a study that analyzed the effect of decentralization of decision-making and the use of accounting control systems on organizational performance. The study used a sample of 53 managers from a university in Indonesia. Statistical tests found that decentralization of decision-making and the use of accounting controls together explained 27.5% of the variation in organizational performance. Individual tests found that decentralization of decision-making had a slightly stronger influence on performance than accounting controls. The study concluded that decentralizing decision-making and using accounting controls can improve organizational performance.
Performance analysis of Data Mining algorithms in WekaIOSR Journals
This document summarizes and compares several studies that evaluated the performance of different data mining algorithms. It discusses papers that tested classification, clustering, and association rule mining algorithms on various datasets using tools like WEKA and found that the performance depends on factors like the nature of the dataset, number of instances, number of attributes, and test mode used. The document also outlines related work analyzing algorithms like K-means, fuzzy K-means, Apriori and compares their performance on different datasets and tools to measure characteristics like accuracy, scalability, and execution time.
Nymble: Blocking Misbehaving Users In Anonymizing NetworksIOSR Journals
The advent of anonymizing networks assured that users could access internet services with complete
privacy avoiding any possible hindrance. This arrangement where series of routers form a network, hide the
user’s IP address from the server. However malfeasance of few malpractitioners has left this system with a
loophole where users make use of this anonymity to deface popular websites. Administrators who cannot
practically block a user using IP address are forced to shut all possible nodes that lead to exit. Thus deny access
to both behaving and non-behavingusers altogether. And so end up blocking users with no compromise to their
anonymity. Hence we propose a system which is undogmatic with different servers. Thus we aim at giving the
administrator the right to block the malicious user without hindering the anonymity of the rest.
Effects of Fenitrothion on some histo-architecture of freshwater fish Channa ...IOSR Journals
The presence of insecticide in the environment, due to extensive use in agriculture is of potential toxicological concern for fish. Histotoxicological studies have been widely used as biomarkes in the evaluation of the health of fish exposed to the pesticides studies. In the present study the hazardous effect of the organophosphate insecticide, Fenitrothion on the histology of the fresh water fish (Channa punctatus) after exposure for 21 days was investigated. Fish used in the experiment was nearly similar weight and length. The treated groups were compared with the control group for the histological changes in the selected tissue (kidney, liver and heart) and marked changes were observed.
A Fossil Dicot Wood Aeschynomenoxylon Mohgaonsesp.Nov From The Deccan Intertr...IOSR Journals
The Deccan Intertrappean flora is mostly silicified and often very well preserved, representing the groups Thallophyta (fungi, algae and charophytes), water ferns, conifers and angiosperms with both monocotyledons and dicotyledons. The present wood is collected from the Deccan Intertrappean beds of Mohgaonkalan. The wood is angiospermic diffuse porus, vessels solitary and in multiples of two, usually small, occasionally of medium size. Xylem parenchyma scanty with paratracheal vasicentri type, Intervascular pitting are simple and alternate.Perforation plate simple. Fibers are non-septate and storied. Wood rays uniseriate only. Rays are homogenous and made up of procumbent cells only. It show its affinities with the reported species of Aeschynomene.
Market Orientation, Learning Organization and Dynamic Capability as Anteceden...IOSR Journals
Strategic competitiveness is achieved when a firm successfully formulate and implement a strategy of value creation. In order to create competitive advantage, the theory of competitive advantage have contributed to the present two major schools of the Market-Based View (MBV) and Resources-Based View (RBV), which both lead the company in creating a competitive advantage through superior value. The purpose of this paper is to examine the relationship between market orientation, learning organization and dynamic capability on value creation. Using a questionnaire survey, the paper is based on data collected from 105 owners or managers of industry creative in Indonesia. The partial least squares (PLS) structural equation modeling approach was used to analyze the data and test the hypotheses.The results indicate that, among the market orientation, learning organization, dynamic capability are significantly and positively related to value creation.
A comparative analysis on qos multicast routing protocols in MANETsIOSR Journals
Abstract: Simultaneous transmission of data from one sender to multiple receivers is called multicasting.
Several widely used applications require multicasting at least at the logical level. Examples include audio video
teleconferencing, real time video streaming and the maintenance of distributed databases. In many cases it is
advantageous to implement multicasting at the level of the routing algorithm (other approaches would be oneto-all
unicast or the implementation of multicasting at the application layer). In this paper we are presenting a
comparative analysis on various multicast routing protocols in adhoc networks.
Keywords: multicasting, multicast protocols,dynamic core, performance evaluation,Qos Parameters
The document proposes a novel method to characterize nonlinear channels in OFDM systems using spectral notch signals. The method involves transmitting OFDM frames with and without spectral notches and analyzing the difference signal. This allows the estimation of frequency-domain Volterra kernels to be decomposed into independent subtasks involving fewer coefficients, improving accuracy and reducing complexity compared to conventional methods. Simulations validate that the proposed method has lower computational complexity than existing approaches for estimating kernels of cubically nonlinear channels in real baseband OFDM systems.
A Detailed Analysis of the Issues and Solutions for Securing Data in CloudIOSR Journals
This document analyzes security issues and solutions for securing data in cloud computing. It identifies 16 security attacks that can occur from the browser to server level in cloud, and classifies different threats to data residing in cloud. It then provides separate solutions to these attacks. Finally, it proposes a multi-layered security architecture that can ensure data security and protect data as it flows from the browser to the server.
A middleware approach for high level overlay networkIOSR Journals
This document proposes a modular middleware architecture for high-level network management. The architecture consists of two main layers: 1) A lower "Smart Signaling Layer" uses ant colony algorithms to monitor the network in a decentralized way and store information in a data warehouse. 2) An upper "Smart Resource Management Layer" uses intelligent agents to manage resources and meet application requirements based on information from the data warehouse. The layers are loosely coupled to provide independence and adaptability. The goal is to provide self-organization, adaptability, scalability and reactivity for reliable network management.
Finite Element Analysis of Shaft of Centrifugal PumpIOSR Journals
Centrifugal pump is world one of the oldest water pumping devises. The current work deals study
Shaft of centrifugal pump for static and dynamic analysis. As we know rotodynamic machineries are designed
keenly as there is lot of fluctuation in the loads and speeds. The shaft is analyzed by using finite element analysis
technique for stresses and deflections. The total work is carried out in two stages first stage is static analysis. In
this stage pump shaft is analyzed for stresses and deflection and same results are verified using graphical
integration method. And second for dynamic analysis, in this stage result obtained by static analysis are used to
calculate dynamic forces coming in pump shaft. Again shaft is analyzed in dynamic input condition and results
are verified by using graphical integration method. The software used for the finite element meshing is
HYPERMESH and solver used is RADIOSS. Result values obtained for deflection and stresses are compared in
both cases. Result obtained by graphical method and FEA are nearly similar and are in acceptable limits.
On Hadamard Product of P-Valent Functions with Alternating TypeIOSR Journals
The document is a research paper that presents results on the Hadamard product of p-valent functions. It begins with introducing definitions of p-valent starlike and convex functions. It then states that the class of p-valent functions is closed under Hadamard products. The main results proved in the paper are two lemmas that provide coefficient conditions for a p-valent function to belong to the classes M*(A,B) and C(A,B) under Hadamard products.
A Novel Revolutionary highly secured Object authentication schemaIOSR Journals
This document proposes a novel 3D object authentication scheme that aims to improve password security. The proposed scheme combines multiple authentication factors like textual passwords, biometrics, and graphical passwords within a 3D virtual environment. Users can navigate and interact with virtual objects to set customized passwords. This increases the password space and makes passwords difficult for attackers to guess. An experimental 3D environment was created with objects accepting textual or graphical passwords. Initial user tests showed over 90% success rate. The proposed 3D object password scheme provides a multi-factor authentication approach that could make passwords more secure and customizable compared to existing single-factor schemes.
E- Resource for Technical Institute & Engineering Colleges a Boon to librarie...IOSR Journals
This document summarizes a study on the use of e-resources by teachers and students at Siddhivinayak Technical Campus in India. Some key findings include:
- E-journals were the most commonly used e-resource by both students (88%) and teachers (93%). Other popular resources were the open web and e-mail.
- Most students (81%) and teachers (87%) found e-resources easy to access. However, some training may still be needed on using e-resources.
- E-resources were used usually/often by most students (64%) and teachers (87%) due to benefits like time savings, ease of use, and being more informative.
- However
Video Encryption and Decryption with Authentication using Artificial Neural N...IOSR Journals
Abstract :Multimedia data security is becoming important with the continuous increase of digital
communications on internet. With the rapid development of various multimedia technologies, more and more
multimedia data are generated and transmitted in the medical, commercial, and military fields, which may
include some sensitive information which should not be accessed by or can only be partially exposed to the
general users. . The encryption algorithms developed to secure text data are not suitable for multimedia
application because of the large data size and real time constraint. Therefore, there is a great demand for
secured data storage and transmission techniques. Information security has traditionally been ensured with
data encryption and authentication techniques. The secrecy of communication is maintained by secret key
exchange. In effect the strength of the algorithm depends solely on the length of the key. The presented work
aims at secure video transmission using randomness in encryption algorithm, thereby creating more confusion
to obtain the original data. The security of the original cipher has been enhanced by addition of impurities to
misguide the cryptanalyst. Since the encryption process is one way function, the artificial neural networks are
best suited for this purpose as they possess features like high security, no distortion and its ability to perform for
non linear input-output characteristics, In the presented work the need for key exchange is also eliminated,
which is otherwise a perquisite for most of the algorithms used today. The proposed work finds its application in
medical imaging systems, military image database communication and confidential video conferencing, and
similar such application. The results are obtained through the use of MATLAB 7.14.0
Keywords: Artificial Neural networks, Back propagation algorithm, video encryption and decryption, cipher
and decipher
Feasibility of Using Tincal Ore Waste as Barrier Material for Solid Waste Con...IOSR Journals
1) The study investigates using tincal ore waste (TOW) as a material to improve the properties of lateritic soil barriers used for containing municipal solid waste.
2) Hydraulic conductivity and unconfined compressive strength tests were performed on lateritic soil alone and mixed with 5-20% TOW, compacted using different methods.
3) Specimens with 20% TOW compacted at high energy yielded the lowest hydraulic conductivities of 10-10 to 10-12 m/s, meeting regulatory standards when permeated with leachate.
Sorting algorithms are the main concepts of the subject Data Structures and It’s Applications. These
algorithms are designed in arranging the data elements in the sorted order. If the data elements are arranged
in sorted order , then the searching is very easier. Some algorithms are comparison sort and some are noncomparison
sort. The choice of a algorithm is based on the efficiency of the algorithm. I have designed one
algorithm called as Alternate Sort. The main aspect is that different technique of comparisons is involed. I have
presented the algorithm , It’s working and the examples and finally my paper is consisting of the program
listing.
1) The document discusses properties of digital roots, including that digital roots partition the set of natural numbers into equivalence classes and that the difference of two equivalent numbers is always a multiple of 9.
2) It presents a "Vedic square" table that shows the digital roots of products of numbers between 1-9. This allows representing how numbers with a given digital root can be factorized.
3) The table demonstrates that numbers with a given digital root can only be factorized through the multiplication of numbers with specific other digital roots, such as numbers with a digital root of 1 being the product of numbers with digital roots of 1, 5 and 2, or 7 and 4.
Strongly Unique Best Simultaneous Coapproximation in Linear 2-Normed SpacesIOSR Journals
This paper deals with some fundamental properties of the set of strongly unique best simultaneous coapproximation in a linear 2-normed space. AMS Subject classification: 41A50,41A52,41A99, 41A28.
Decentralization Analysis of Decision Making and Performance of Accounting Co...IOSR Journals
This document summarizes a study that analyzed the effect of decentralization of decision-making and the use of accounting control systems on organizational performance. The study used a sample of 53 managers from a university in Indonesia. Statistical tests found that decentralization of decision-making and the use of accounting controls together explained 27.5% of the variation in organizational performance. Individual tests found that decentralization of decision-making had a slightly stronger influence on performance than accounting controls. The study concluded that decentralizing decision-making and using accounting controls can improve organizational performance.
Performance analysis of Data Mining algorithms in WekaIOSR Journals
This document summarizes and compares several studies that evaluated the performance of different data mining algorithms. It discusses papers that tested classification, clustering, and association rule mining algorithms on various datasets using tools like WEKA and found that the performance depends on factors like the nature of the dataset, number of instances, number of attributes, and test mode used. The document also outlines related work analyzing algorithms like K-means, fuzzy K-means, Apriori and compares their performance on different datasets and tools to measure characteristics like accuracy, scalability, and execution time.
Nymble: Blocking Misbehaving Users In Anonymizing NetworksIOSR Journals
The advent of anonymizing networks assured that users could access internet services with complete
privacy avoiding any possible hindrance. This arrangement where series of routers form a network, hide the
user’s IP address from the server. However malfeasance of few malpractitioners has left this system with a
loophole where users make use of this anonymity to deface popular websites. Administrators who cannot
practically block a user using IP address are forced to shut all possible nodes that lead to exit. Thus deny access
to both behaving and non-behavingusers altogether. And so end up blocking users with no compromise to their
anonymity. Hence we propose a system which is undogmatic with different servers. Thus we aim at giving the
administrator the right to block the malicious user without hindering the anonymity of the rest.
Effects of Fenitrothion on some histo-architecture of freshwater fish Channa ...IOSR Journals
The presence of insecticide in the environment, due to extensive use in agriculture is of potential toxicological concern for fish. Histotoxicological studies have been widely used as biomarkes in the evaluation of the health of fish exposed to the pesticides studies. In the present study the hazardous effect of the organophosphate insecticide, Fenitrothion on the histology of the fresh water fish (Channa punctatus) after exposure for 21 days was investigated. Fish used in the experiment was nearly similar weight and length. The treated groups were compared with the control group for the histological changes in the selected tissue (kidney, liver and heart) and marked changes were observed.
A Fossil Dicot Wood Aeschynomenoxylon Mohgaonsesp.Nov From The Deccan Intertr...IOSR Journals
The Deccan Intertrappean flora is mostly silicified and often very well preserved, representing the groups Thallophyta (fungi, algae and charophytes), water ferns, conifers and angiosperms with both monocotyledons and dicotyledons. The present wood is collected from the Deccan Intertrappean beds of Mohgaonkalan. The wood is angiospermic diffuse porus, vessels solitary and in multiples of two, usually small, occasionally of medium size. Xylem parenchyma scanty with paratracheal vasicentri type, Intervascular pitting are simple and alternate.Perforation plate simple. Fibers are non-septate and storied. Wood rays uniseriate only. Rays are homogenous and made up of procumbent cells only. It show its affinities with the reported species of Aeschynomene.
Market Orientation, Learning Organization and Dynamic Capability as Anteceden...IOSR Journals
Strategic competitiveness is achieved when a firm successfully formulate and implement a strategy of value creation. In order to create competitive advantage, the theory of competitive advantage have contributed to the present two major schools of the Market-Based View (MBV) and Resources-Based View (RBV), which both lead the company in creating a competitive advantage through superior value. The purpose of this paper is to examine the relationship between market orientation, learning organization and dynamic capability on value creation. Using a questionnaire survey, the paper is based on data collected from 105 owners or managers of industry creative in Indonesia. The partial least squares (PLS) structural equation modeling approach was used to analyze the data and test the hypotheses.The results indicate that, among the market orientation, learning organization, dynamic capability are significantly and positively related to value creation.
A comparative analysis on qos multicast routing protocols in MANETsIOSR Journals
Abstract: Simultaneous transmission of data from one sender to multiple receivers is called multicasting.
Several widely used applications require multicasting at least at the logical level. Examples include audio video
teleconferencing, real time video streaming and the maintenance of distributed databases. In many cases it is
advantageous to implement multicasting at the level of the routing algorithm (other approaches would be oneto-all
unicast or the implementation of multicasting at the application layer). In this paper we are presenting a
comparative analysis on various multicast routing protocols in adhoc networks.
Keywords: multicasting, multicast protocols,dynamic core, performance evaluation,Qos Parameters
The document proposes a novel method to characterize nonlinear channels in OFDM systems using spectral notch signals. The method involves transmitting OFDM frames with and without spectral notches and analyzing the difference signal. This allows the estimation of frequency-domain Volterra kernels to be decomposed into independent subtasks involving fewer coefficients, improving accuracy and reducing complexity compared to conventional methods. Simulations validate that the proposed method has lower computational complexity than existing approaches for estimating kernels of cubically nonlinear channels in real baseband OFDM systems.
A Detailed Analysis of the Issues and Solutions for Securing Data in CloudIOSR Journals
This document analyzes security issues and solutions for securing data in cloud computing. It identifies 16 security attacks that can occur from the browser to server level in cloud, and classifies different threats to data residing in cloud. It then provides separate solutions to these attacks. Finally, it proposes a multi-layered security architecture that can ensure data security and protect data as it flows from the browser to the server.
A middleware approach for high level overlay networkIOSR Journals
This document proposes a modular middleware architecture for high-level network management. The architecture consists of two main layers: 1) A lower "Smart Signaling Layer" uses ant colony algorithms to monitor the network in a decentralized way and store information in a data warehouse. 2) An upper "Smart Resource Management Layer" uses intelligent agents to manage resources and meet application requirements based on information from the data warehouse. The layers are loosely coupled to provide independence and adaptability. The goal is to provide self-organization, adaptability, scalability and reactivity for reliable network management.
Finite Element Analysis of Shaft of Centrifugal PumpIOSR Journals
Centrifugal pump is world one of the oldest water pumping devises. The current work deals study
Shaft of centrifugal pump for static and dynamic analysis. As we know rotodynamic machineries are designed
keenly as there is lot of fluctuation in the loads and speeds. The shaft is analyzed by using finite element analysis
technique for stresses and deflections. The total work is carried out in two stages first stage is static analysis. In
this stage pump shaft is analyzed for stresses and deflection and same results are verified using graphical
integration method. And second for dynamic analysis, in this stage result obtained by static analysis are used to
calculate dynamic forces coming in pump shaft. Again shaft is analyzed in dynamic input condition and results
are verified by using graphical integration method. The software used for the finite element meshing is
HYPERMESH and solver used is RADIOSS. Result values obtained for deflection and stresses are compared in
both cases. Result obtained by graphical method and FEA are nearly similar and are in acceptable limits.
On Hadamard Product of P-Valent Functions with Alternating TypeIOSR Journals
The document is a research paper that presents results on the Hadamard product of p-valent functions. It begins with introducing definitions of p-valent starlike and convex functions. It then states that the class of p-valent functions is closed under Hadamard products. The main results proved in the paper are two lemmas that provide coefficient conditions for a p-valent function to belong to the classes M*(A,B) and C(A,B) under Hadamard products.
A Novel Revolutionary highly secured Object authentication schemaIOSR Journals
This document proposes a novel 3D object authentication scheme that aims to improve password security. The proposed scheme combines multiple authentication factors like textual passwords, biometrics, and graphical passwords within a 3D virtual environment. Users can navigate and interact with virtual objects to set customized passwords. This increases the password space and makes passwords difficult for attackers to guess. An experimental 3D environment was created with objects accepting textual or graphical passwords. Initial user tests showed over 90% success rate. The proposed 3D object password scheme provides a multi-factor authentication approach that could make passwords more secure and customizable compared to existing single-factor schemes.
E- Resource for Technical Institute & Engineering Colleges a Boon to librarie...IOSR Journals
This document summarizes a study on the use of e-resources by teachers and students at Siddhivinayak Technical Campus in India. Some key findings include:
- E-journals were the most commonly used e-resource by both students (88%) and teachers (93%). Other popular resources were the open web and e-mail.
- Most students (81%) and teachers (87%) found e-resources easy to access. However, some training may still be needed on using e-resources.
- E-resources were used usually/often by most students (64%) and teachers (87%) due to benefits like time savings, ease of use, and being more informative.
- However
Video Encryption and Decryption with Authentication using Artificial Neural N...IOSR Journals
Abstract :Multimedia data security is becoming important with the continuous increase of digital
communications on internet. With the rapid development of various multimedia technologies, more and more
multimedia data are generated and transmitted in the medical, commercial, and military fields, which may
include some sensitive information which should not be accessed by or can only be partially exposed to the
general users. . The encryption algorithms developed to secure text data are not suitable for multimedia
application because of the large data size and real time constraint. Therefore, there is a great demand for
secured data storage and transmission techniques. Information security has traditionally been ensured with
data encryption and authentication techniques. The secrecy of communication is maintained by secret key
exchange. In effect the strength of the algorithm depends solely on the length of the key. The presented work
aims at secure video transmission using randomness in encryption algorithm, thereby creating more confusion
to obtain the original data. The security of the original cipher has been enhanced by addition of impurities to
misguide the cryptanalyst. Since the encryption process is one way function, the artificial neural networks are
best suited for this purpose as they possess features like high security, no distortion and its ability to perform for
non linear input-output characteristics, In the presented work the need for key exchange is also eliminated,
which is otherwise a perquisite for most of the algorithms used today. The proposed work finds its application in
medical imaging systems, military image database communication and confidential video conferencing, and
similar such application. The results are obtained through the use of MATLAB 7.14.0
Keywords: Artificial Neural networks, Back propagation algorithm, video encryption and decryption, cipher
and decipher
Bella es una joven que se ofrece a tomar el lugar de su padre como prisionera de una bestia en un castillo encantado. A pesar de las apariencias monstruosas de la Bestia, Bella descubre que él tiene un corazón bondadoso debajo de su apariencia feroz. Con el tiempo, Bella se enamora de la Bestia a medida que él demuestra su verdadera naturaleza amable y gentil.
A empresa de tecnologia anunciou um novo smartphone com câmera aprimorada, maior tela e melhor desempenho. O dispositivo também possui um preço mais acessível em comparação aos modelos anteriores para atrair mais consumidores. O lançamento ocorrerá no próximo mês e a empresa espera que o novo smartphone ajude a aumentar suas vendas e participação no mercado.
While man-made creations may struggle to match nature's beauty, music is one thing that can come close by capturing the essence of nature through sound. Music has an ability to reflect qualities found in nature like emotion, movement, and life through its melodies and harmonies.