This paper tells about Freedom from risk or danger at airport area, and such to prevent the airports from accidental/malicious harm, crime and other threats. Airport security attempts to prevent any threats or potentially dangerous situations from arising or entering the country. If airport security does succeed in this, then the chances of any dangerous situations, illegal items or threats entering into aircraft, country or airport are greatly reduced. As such, airport security serves several purposes: To protect the airport and country from any threatening events, to reassure the traveling public that they are safe and to protect the country and their people. Airport security has gone through significant changes in recent years. Notably, these changes have been driven largely by terrorist activities around the globe. Developing a comprehensive security plan is complex, involving multiple stakeholders responsible for airport and air travel security (e.g., airport authorities and agencies, airlines, private enterprise and government). Conceiving cost effective plans to address the complexity and regulatory compliance of security today, requires a forward thinking approach that encompasses a holistic and technology based view of what a security plan should include to meet current and future needs.
- Page(s): 01-03
- Date of Publication: March 2013
- L. StewartMonash University, Melbourne, Australia.
References
[1]edition.cnn [2]en.wikipedia.org/wiki/File [3]en.wikipedia.org/wiki
L. Stewart "Airport security" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 3, pp.01-03 2013
In wireless charging energy is sent through a coupling to an electrical device, which can then use that energy to charge batteries or run the device. Wireless chargers typically use an induction coil to create an alternating electromagnetic field from within a charging base station, and a second induction coil in the portable device takes power from the electromagnetic field and converts it back into electrical current to charge. An emerging technology that is being adopted heavily by wireless chargers is inductive charging. This wireless transmission technique uses a magnetic field to transfer electricity, allowing compatible devices to receive power through this current, rather than utilizing conductive wires and cords.
- Page(s): 04-05
- Date of Publication: March 2013
- Denial SmithVictoria University Melbourne, Australia
References
1. Wireless-charger-review.toptenreviews 2. Wireless-chargers-inductive-charging-explained. 3. Wikipedia.
Denial Smith "Wireless Charging" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 3, pp.04-05 2013
This paper present two algorithms for Discrete Cosine Transforms used for the compression of still images and motion video. First, background theory on discrete cosine transform (DCT) has been presented, and subsequently a detail study of DCT algorithms is presented, Based on that algorithms one architecture has been designed .It also introduced the concept of Floating point arithmetic operation which is necessary for the implementation. Further 32bit Floating point adder and multiplier is implemented. Main objective of this paper is to explore one of various architectures for optimizing any one or all of the given constraints (area, performance). Given these constraints (area, performance) our explored architecture will be a best suited as per the requirement. Above architecture will be designed and implemented in VHDL and synthesis in Xilinx tools and implementation on FPGA.
- Page(s): 06-08
- Date of Publication: March 2013
- Sumitra GoswamiM Tech Student, BMS College of Engineering, Sri Muktsar Sahib Punjab India
- Amit KumarAssistant Professor, EC Deptt. BMS College of Engineering, Sri Muktsar Sahib Punjab India
References
1. W. H. Chen, C. H. Smith, S. C. Fralick, "A fastcomputational algorithm for the discrete Cosinetransform,” IEEE Transactions onCommunications, Vol. 25, Issue9, pp. 1004-1009,Sep. 1977. 2. Mohamed El-Sharkawy and Waleed Eshmawy, “AFast Recursive Pruned DCT for ImageCompression Applications,” Proceedings of the37th Midwest Symposium on Circuits andSystems, 3-5 August 1994. 3. David Salomon,”Data Compression,” TheComplete Reference, 3rd Edition, Springer-VerlagNew York, Inc 2004. 4. L.V. Agostini, I.S. Silva and S. Bampi, “PipelinedFast 2-D DCT Architecture for JPEG ImageCompression,” 14th Symposium on IntegratedCircuits and Systems Design, 10-15 September2001. 5. H.I. Helal, A.E. Salama and S. Mashali, “EfficientRealization of FPGA-Based Two DimensionalDiscrete Cosine Transform,” Proceedings of theTwelfth Annual IEEE International ASIC/SOC onference, 15-18 September 1999. 6. M.F. Aburdene, J. Zheng and R.J. Kozick,“Computation of Discrete Cosine Transform usingClenshaw’s Recurrence Formula,” IEEE SignalProcessing Letters, vol. 2, no. 8, August 1995. 7. Soumik Ghosh, Soujanya Venigalla, MagdyBayoumi, "Design and implementaion of a 2DDCTarchitecture using Coefficient distributedarithmetic,” Proceedings of the IEEE ComputerSociety Annual Symposium on VLSI, pp. 162-166,11-12 May 2005. 8. Wendi Pan, “A Fast 2-D DCT Algorithm viaDistributed Arithmetic Optimization,” Proceedingsof the International Conference on ImageProcessing, 2000. 9. Syed Ali Khayam “The Discrete Cosine Transform(DCT): Theory and Application,” Department ofElectrical & Computer Engineering, MichiganState University, March 10, 2003. 10. Jiun-In Guo, Rei-Chin Ju, Jia-Wei Chen, "Anefficient 2-D DCT/IDCT core design using cyclicconvolution and adder-based realization ArticleTitle," IEEE Trans. CAS for Video Technology,Vol. 14, Issue 4, pp. 416-428, April 2004. 11. K.S. Hema Priya, “Design of Various DCTArchitecture and its Implementation using VHDL”,SASTRA University, March 2011.
Sumitra Goswami, Amit Kumar "Implementation of 2D DCT on Xilinx Virtex-5 Ml507 FPGA" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 3, pp.06-08 2013
The focus this paper is on evolution of digital libraries in Nigeria. The paper explores the origin and concepts digital library, its potentials, components and technological tools needed for its implementation. The evolutionary development of the library in Nigeria is traced, and possible factors that inhibit successful implementation of the library in Nigeria is presented. The paper also discusses the prospects of digital libraries in Nigeria and offers recommendations on the way forward.
- Page(s): 09-21
- Date of Publication: March 2013
- Madhumay Sen
- Gaurav Kumar Jain
- Ravi Ranjan
References
Madhumay Sen, Gaurav Kumar Jain, Ravi Ranjan "Evolution of Digital Libraries, Problems and Prospects " International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 3, pp.09-21 2013
This paper reports a new and accurate method forload−flow solution of radial distribution networks with minimum data preparation. The node and branch numbering need not to be sequential like other available methods. The proposed method does not need sending−node, receiving−node and branch numbers if these are sequential. The proposed method uses the simple equation to compute the voltage magnitude and has the capability to handle composite load modelling. The proposed method uses the set of nodes of feeder, lateral(s) and sub lateral(s). The effectiveness of the proposed method is compared with other methods using two examples. The detailed load−flow results for different kind of load−modellings are also presented.
- Page(s): 22-26
- Date of Publication: March 2013
- Pankaj KhandelwalM.Tech Scholar S.K.I.T. Jaipur, Rajasthan, India
- Shweta AgrawalM.Tech scholar M.Tech Scholar I.E.T. Alwar, Rajasthan, India
References
[1] N. Vempati, R.R.Shoults, M.S. Chen, L. Schwobel ,― Simplified feeder modeling for load flow calculations,‖ IEEE Trans. on PowerSystems;vol.2,no.1,pp.168–174,1987. [2] T.H.Chen, M.Chen, K.J. Hwang, P. Kotas, E.A.Chebli,― Distribution system power flow analysis—a rigid approach,‖ IEEE Trans. on PowerDelivery; vol.6,no.3 pp. 1146–1152,1981. [3] Distribution automation: a practical tool for shaping a more profitable future: Special report,‖ Electrical World ,pp. 43–50, December 1986. [4] S.Iwamoto, Y.A.Tamura,― Load flow calculation method for ill−conditioned power systems,‖ IEEE Transactions PowerApparatusand Systems, vol. PAS−100, No. 4, pp. 1706−1713,1981. [5] D. Rajicic, Y. Tamura, ― A modification to fast decoupled load flow for networks with high R/X ratios,‖ IEEE Transactionson Power Systems;vol. 3, no.2, pp.743−746,1988. [6] W.H.Kersting, D.L. Mendive, ― An Application of Ladder Theory to the Solution of Three-Phase Radial Load-Flow Problem,‖ IEEETransactions on Power Apparatus and Systems; vol. PAS−98 no.7,pp.1060 – 1067, 1976. [7] W.H.Kersting, ― A Method to Teach the Design and Operation of a Distribution System,‖ IEEE Transactions on Power Apparatus andSystems; vol. PAS−103, no.7, pp.1945 – 1952, 1984. [8] R.A. Stevens , et al., ― Performance of Conventional Power Flow Routines for Real Time Distribution Automation Application,‖ Proceedings 18th Southeastern Symposium on Systems Theory: IEEE Computer Society: 196 – 200, 1986 [9] . D, Shirmohammadi, H.W. Hong, A. Semlyn, G.X. Luo, ― A Compensation Based Power Flow Method for Weakly Meshed Distribution and Transmission Network,‖ IEEE Transactions on PowerSystems, vol. 3, no.2, pp. 753 – 762,1988. [10] W.H.Kersting, ― A Method to Teach the Design and Operation of a Distribution System,‖ IEEE Transactions on Power Apparatus andSystems; vol. PAS−103, no.7, pp.1945 – 1952, 1984. [11] R.A. Stevens ,et al., ― Performance of Conventional Power Flow Routines for Real Time Distribution Automation Application,‖ Proceedings 18th Southeastern Symposium on Systems Theory: IEEE Computer Society: 196 – 200, 1986. [12] D, Shirmohammadi, H.W. Hong, A. Semlyn, G.X. Luo, ― A Compensation Based Power Flow Method for Weakly Meshed Distribution and Transmission Network,‖ IEEE Transactions on PowerSystems, vol. 3, no.2, pp. 753 – 762,1988. [12] G.B.Jasmon and L.H.C.C. Lee , ― Stability of Load-Flow Techniques for Distribution System Voltage Stability Analysis,‖ Proceedings IEE PartC (GTD), vol.138, no. 6, pp. 479 – 484, 1991. [13] D. Das, H.S.Nagi and D.P. Kothari , ―Novel Method for solving radial distribution networks,‖ Proceedings IEE Part C (GTD), vol.141, no. 4, pp. 291 – 298, 1991. [16] T.K.A. Rahman and G.B. Jasmon, ―A new technique for voltage stability analysis in a power system and improved loadflow algorithm for distribution network,‖ Energy Management and Power DeliveryProceedings of EMPD '95; vol.2, pp.714 – 719, 1995. [17] S. Ghosh and D. Das, ―Method for Load−Flow Solution of Radial Distribution Networks,‖ Proceedings IEE Part C (GTD), vol.146, no.6,pp.641 – 648, 1999. [18] S. Jamali. M.R.Javdan. H. Shateri and M. Ghorbani , ―Load Flow Method for Distribution Network Design by Considering Committed Loads,‖ Universities Power Engineering Conference , vol.41, no.3, pp. 856 – 860, sept.2006. [19] P. Aravindhababu, S. Ganapathy and K.R. Nayar, ― A novel technique for the analysis of radial distribution systems,‖ International Journal ofElectric Power and Energy Systems, vol. 23, pp. 167–171, 2001. [20] S.F. Mekhameret.al., ― Load Flow Solution of Distribution Feeders: A new contribution,‖ International Journal of Electric Power ComponentsandSystems,vol.24, pp.701−707, 2002, [21] A. Afsari, S.P. Singh, G.S. Raju, G.K.Rao , ― A fast power flow solution of radial distribution networks,‖ International Journal ElectricComponents and Systems, vol. 30, pp.1065−1074,2002.
Pankaj Khandelwal, Shweta Agrawal "Load−Flow solution of radial distribution networks with minimum data preparation." International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 3, pp.22-26 2013
Software component reuse has become of much interest in the software community due to its potential benefits, cost benefit, time saving, etc. which include increased product quality and decreased product development cost and estimated schedule. To select a component for reuse is very difficult because there are many components with approximate same name, same functionality etc. which make the reuse of component very time consuming. Hence there is required a technique which make the selection of component efficient and fast. For this purpose we proposed a scheme for the selection of software component which will be more efficient than existing scheme.
- Page(s): 27-31
- Date of Publication: March 2013
- Raja BhatiBE, MTECH JECRC UDML College Of Engineering, Jaipur, Rajasthan, India
- Madhumay SenBE, MTECH, Phd* Regional College For Education Research and Technology, Jaipur, Rajasthan, India
- Ajay JainMSc, Phd* Regional College For Education Research and Technology, Jaipur, Rajasthan, India
References
[1] Charles W. Krueger Software Reuse “ACM ComputingSurveys (CSUR) Volume 24, Issue 2 (June 1992) Pages: 131-183. [2] Sametinger, Software Engineering with ReusableComponents, Springer-Verlag, ISBN 3-540-62695-6, 1997. [3] Department of the Navy. DON Software Reuse Guide, NAVSO P-5234-2, 1995. [4] B.Jalender, N.Gowtham, K.Praveenkumar, K.Murahari, K.sampath ”Technical Impediments to Software Reuse” International Journal of Engineering Science andTechnology (IJEST) , Vol. 2(11),p. 6136-6139.Nov 2010. [5] M. Pat Schuler, “Increasing productivity through Total Reuse Management (TRM),” Proceedings of technology2001: The Second National Technology Transfer Conference and Exposition, Volume 2, Washington DC, December 1991, pp.294-300. [6] M. Aoyoma, “New Age of Software Development:How Component-Based Software Engineering Changes the Way of Software Development?,” in Proceedings of the1998 International Workshop on CBSE,. [7] Gerald Jones and Ruben Prieto-Diaz, “Building andManaging Software Libraries”, © 1998 IEEE, pp.228-236. [8] E. Smith,A.Al-Yasiri and M. Merabti, „A multitiered classification scheme for component retrieval‟.Proc. 24th Euro micro conf. 1998, pp. 882–889. [9] Vicente Ferreira de Lucena Jr., “Facet-Based ClassificationScheme for Industrial Automation Software Components”. [10] Ruben Prieto-Diaz, “Implementing Faceted Classificationfor Software Reuse” © 1990 IEEE, pp.300-304. [11] Gerald Kotonya, Ian Sommerville and Steve Hall, “Towards A Classification Model for Component Based Software Engineering Research”, Proceeding of the of the 29th EUROMICRO Conference © 2003 IEEE.
Raja Bhati, Madhumay Sen, Ajay Jain "Software component Reuse" International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.2 issue 3, pp.27-31 2013
Traditionally, access to the Web has been via fixed-line services on large-screen laptops and desktop computers. However, the Web is becoming more accessible by portable and wireless devices and according to ITU (International Telecommunication Union) with current growth rates, web access by people on the move — via laptops and smart mobile devices – is likely to exceed web access from desktop computers within the next five years. The shift to mobile Web access has been accelerating with the rise since 2007 of larger multitouch smartphones, and of multitouch tablet computers since 2010. Both platforms provide better Internet access and browser- or application-based user Web experiences than previous generations of mobile devices have done.
- Page(s): 32-35
- Date of Publication: March 2013
- Er Vipin LaddhaOfficer Incharge Centre for Information Management & Computer Applications (CIMCA) Swami Keshwanand Rajasthan Agricultural University Bkn Rajasthan, India
References
1. Glossary 2. MobileMAN Glossary 3. https://www.distraction.gov/stats-and-facts/ 4. Hands Free Cell Phones No Safer, Insurance Study Claims | Hands Free Info 5. Study: Distractions, not phones, cause car crashes | Signal Strength - CNET News
Er Vipin Laddha "Go Mobile, Smartphone’s and Tablets are Transforming the Way we Surf How each protects the network" International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.2 issue 3, pp.32-35 2013
The present write-up deals with the quality assurance aspects in the service sector. It suggests the implementation of SWOT analysis in the service sector to indentify the factors affecting the sector. It further recommends adoption of Taguchi’s philosophy in carrying out the analysis in order to improve the quality of service in the service sector.
- Page(s): 36-39
- Date of Publication: March 2013
- Ruchika SharmaDeepshikha Group of Colleges, Jaipur, Rajasthan, India,
- Gaurav Kumar JainDeepshikha Group of Colleges, Jaipur, Rajasthan, India
- Ravi RanjanDeepshikha Group of Colleges, Jaipur, Rajasthan, India
References
Refernces are not available
Ruchika Sharma, Gaurav Kumar Jain, Ravi Ranjan "Quality Assurance in the Sector of Software Engineering" International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.2 issue 3, pp.36-39 2013
In this study, we propose an efficient algorithm for the multiprocessor job scheduling problem. From a given list of jobs, Jobs are queued according to the decreasing order of their durations. Depending upon the job duration, jobs are divided into multiple threads for processing. Multi-thread jobs are processed based on the concept of ‘gang scheduling’. To minimize the idle time of the processors, backfilling approach is incorporated into the algorithm.
- Page(s): 40-45
- Date of Publication: March 2013
- Ajay JainDeepshikha Group Of Colleges, Jaipur, Rajasthan, India
- Dharmendra SaxenaDeepshikha Group Of Colleges, Jaipur, Rajasthan, India
References
1. Feitelson D G al. (2004), “parallel job scheduling –A status Report”, job scheduling Strategies for parallel Processing, Lecture Notes in computer Science, Vol. 3834, pp. 1-16 2. Hou E S H (1994), “A Genetic Algorithm for multi-processor Scheduling”, IEEE Transactions on parallel and Distributed system, Vol. 5, No. 2, pp. 113-120. 3. Siyambalapitiya R and Sandirigama M (2010), “A New Greedy Algorithm for multiprocessor Scheduling”, Journal on Software Engineering, Vol. 1, No. 3, pp. 7-12. 4. Siyambalapitiya R and Sandirigama M (2011), “Improvements to First-Come-First-served Multi-processor scheduling with Gang scheduling”, Journal on Software Engineering, Vol. 5, No. 3, pp. 1-7. 5. Ullaman J D (1975), “NP-Complete Scheduling Problems”, Journal of Computer and system Science, Vol. 10, No.3, pp. 384-393. 6. Ward W A et al. (2002), “Scheduling jobs on parallel Systems Using a relaxed Backfill Strategy”, Job Scheduling Strategies for parallel Processing, Lecture Notes in Computer Science, Vol. 2537, pp. 88-102. 7. Zhang Y et al. (2000),”Improving parallel Job Scheduling by Combining Gang Scheduling and Backfilling Techniques”, 14th International Parallel and Distributed Processing Symposium, Mexico, pp. 133-142.
Ajay Jain, Dharmendra Saxena "New Backfilling algorithm for multiprocessor scheduling with mathematics algo." International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 3, pp.40-45 2013
In The Information age, information spreading worldwide through Internet, and Other medium, is bulk and changing constantly and dynamic in nature. As Your society becomes more integrated to computer technology, Information proceed for human activities necessitates computing that responds to request in real time rather than just with best effort. In fact Database management systems have entered the internet age. If too many users approach for information, than this degrades the system performance. The degradation may cause delay and trouble for particular end user in assessing the information. Assessing Information in easy way and within certain time limit ,by keeping its freshness, assessing users requirements and then providing them Information in time is important aspect. Conventional databases are mainly characterized by their strict data consistency requirement. Database systems for real time applications must satisfy timing constraints associated with transactions. The main objective of this paper is to initiate an enquiry in disk scheduling for real time database systems. The proposed work implements the algorithms for disk scheduling for real time database systems.
- Page(s): 46-51
- Date of Publication: March 2013
- Uma Shanker Jayswal
- Gaurav Kumar Jain
- Ravi Ranjan
References
[1]. R. Abbott and H. Garcia-Molina, “Scheduling real time transaction: a performance evaluation ”, proceedings of the 14th VALDB Conference, Los Angeles, California, (1998). [2]. Value Based Scheduling In real time database. Systems. Jayant R. Haritsa, Michael J. Carey, and Miron Livny. Received(1991). [3]. Kao, B. and Garcia-Molina, H.,” overview of real time database systems,” in advances in real time systems (ed.S.H.Son), (1995)463-86. [4]. “Evaluation of scheduling algorithm for real time disk I/O”-YIFENG Zhu, department of computer science and engineering, university of Nebraska-Lincoln,(2002). [5]. Shenze Chen, Joh A. Stankovic, James Curose and Don Towsley, “performance evaluation of two new disk scheduling algorithm”, The Journal of real time system, (1990).
Uma Shanker Jayswal, Gaurav Kumar Jain, Ravi Ranjan "Disk Scheduling In Real Time Database Systems" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 3, pp.46-51 2013
It is the analysis of Enterprise resource planning solution with the help of cloud computing technology. This paper reviews the Enterprise resource planning solution to industries on portable devices using latest technologies. These technologies are Cloud Computing, mobile computing, software services. This paper also includes a very important step of industries that is customer relationship management feature.
- Page(s): 52-60
- Date of Publication: March 2013
- Raja BhatiBE, MTECH JECRC UDML College Of Engineering, Jaipur, Rajasthan, India
- Madhumay SenBE, MTECH, Phd* Regional College For Education Research and Technology, Jaipur, Rajasthan, India
- Ajay Jain MSc, Phd* Regional College For Education Research and Technology, Jaipur, Rajasthan, India
References
[1] ACA Research, Software-as-a-Service (SaaS) in Australia: Is it the Next Big thing?(2007), http :// www.anthonywatson. net. Au/files/ SAAS%20White%20 Paper%20FINAL.PDF (cited March 4, 2008) [2] Ammar Khalid, “Cloud Computing: Applying Issues in Small”, 2010 IEEE International Conference on Signal Acquisition and Processing, pp 278-281. [3] B.P Rimal and E Choi (2009), “A Conceptual Approach for Taxonomical Spectrum of Cloud Computing”. In Proceedings of the 4th International Conference on Ubiquitous Information Technologies & Applications, 2009. ICUT ’09. Fukuoka, Japan [4] Chen Songsheng, Yin Peipei, “Economic Benefits of Enterprise Resources Planning Based on Empirical Evidence from Chinese Listed Companies”, IEEE 2010, PP1305-1308 [5] Dr. Su, Chuan Jun, ” Effective Mobile Assets Management System Using RFID and ERPTechnology”, 2009 International Conference on Communications and Mobile Computing, IEEE 2009,pp 147-151 [6] Honghai Kan, Zhimin Yang, Yue Wang, Nana Qi ,” Research on Library Management System for CDs Attached to Books Based on Cloud Computing”, Proceedings of the 2010 14th International Conference on Computer Supported Cooperative Work in Design IEEE 2010, pp744-74 7. IDC Predictions 2009: An Economic Pressure Cooker Will Accelerate the IT Industry [7] Karthik Kumar and Yung-Hsiang Lu,” cloud computing for mobile users: can offloading computation save energy?”, IEEE 2010 Computer Society, pp 51-55 [8] KeJing Zhang, PingJun Dong, Biao Ma, BingYong Tang, Hong Cai,“Innovation of IT Service in Textile Industrial Clusters from the Service System Perspective”, 2010 IEEE ,pp 1819-1822 [9] Michael Massoth and Dominik Paulus ,” Mobile acquisition of sales operations based on a BlackBerry infrastructure with connection to an inventory and ERP management system”, The Second International Conference on Mobile Ubiquitous Computing,Systems, Services and Technologies,2008 IEEE, pp 413-418. [10] The Proceedings of 17th Annual IRMA International Conference, Washington DC, USA, May 21-24 (2006) Transformation, 215519, December 2008, IDC (2008) [11] Y.C. Chiang, T.C. Wang, S.C. Hsu, “Applying Incomplete Linguistic Preference Relations to a Selection of ERP System Suppliers”, IEEE 2010 Computer Society, pp 6087-6090. [12] Ying Gao, Cuifen Zhang,” Research on Customer Relationship ManagementApplication System of Manufacturing Enterprises”, 2008 IEEE, PP 4-8. [13] Yuan Zhao, Shifeng Liu,” Cloud Computing in Port Industry”, 2009 IEEE [14] Zheng Leina, Pan Tiejun, Ren Guoyan, Fang Chengbin, Chen Yaofei, “The Design of Mobile E-Business System Based on Open Source Software to Small and Medium-sized Enterprise”, International Conference on Management of e-Commerce and e-Government, IEEE 2008, PP 41-44.
Raja Bhati, Madhumay Sen, Ajay Jain "Enterprise Resource Planning With Cloud " International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 3, pp.52-60 2013
The gap between mobile phones and portable computers in shrinking, and portable computer is shrinking, and almost everyone’s daily activities are highly dependent upon a device, know as mobile phone/Smart phone (sp). So mobile device security is becoming increasingly important, as business information and personal information move from the PC onto handheld storage. It is very important to do our daily activities without any problems. But what if our mobile gets stolen ? The paper describes issues and challenges in security and privacy of mobile device. The paper also proposes privacy solutions. Fingerprint sensors and face recognition are also highlighted as a growing feature in security and navigation for handsets. In this paper, we have used security password , face recognition and finger print recognition to avoid unnecessary messaging. It operates silently in the background and it should and it should be very hard to spot.
- Page(s): 61-68
- Date of Publication: March 2013
- Madhumay Sen
- Gaurav Kumar Jain
- Ravi Ranjan
References
1. Applewhite A (2002), “What Knows Where You Are ?” , Pervasive Computing , IEEE, Vol. 1 , No. 4 pp. 4-8, Digital Object Identifier: 10.1109MPRV.2002.1158272. 2. Caimu Tang and Wu D O (2008) , “ Mobile Privacy in Wireless Networks-Revisited “, IEEE Transaction on Wireless Communication, Vol. 7, No. 3, pp. 1030-1042, Digital Object Identifier: 10.1109/TWC.2008.060802. 3. Campadello S (2004), “ Peer_to_peer_security_in_mobile_devices;_a_user perspective “ , Fourth International Conference on Peer –to –Peer Computing, pp. 252-257, Digital Object Identifier: 10.1109/PTP.2004.1334954. 4. Debbabi M, Saleh M, Talhi C and Zhioua S (2005), “Java_for_mobile_devices:_a security _study “, 21st Annual Conference on Computer Security Application, pp. 10 and 244, Digital Object Identifier: 10.1109/CSAC.2005.34.2. 5. Jonathan Knudsen and Sing Li (2005), Beginning J3ME: Form Novice to Professional, 3rd Edition, A press. 6. Mir W and Masood W (2002), “ GPS Technology”, Proceedings of IEEE Student Conference, Vol. 2, pp. 27-39, Digital Object Identifier: 10.1109/ISCON.2002.1214579. 7. Saropourian B (2009),”A New Approach of Finger-Print Recognition Based on Neural Network”, 2nd IEEE International Conference on Computer Science and Information Technology, pp. 158-161, Digital Object Identifier: 10.1109/ICCSIT.2009.5234593. 8. Voth D (2009), “ Face Recognition Technology”, Intelligent Systems, IEEE, Vol. 18, No. 3, pp. 4-7, Digital Object Identifier: 10.1109/MIS.2003.1200719.
Madhumay Sen, Gaurav Kumar Jain, Ravi Ranjan "Identity, Privacy, Issues, Challenges and Solutions In Mobile" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 3, pp.61-68 2013
State Bank of India (SBI) is a multinational banking and financial services company based in India. It is a state-owned corporation with its headquarters in Mumbai, Maharashtra. As at December 2012, it had assets of US$501 billion and 15,003 branches, including 157 foreign offices making it the largest banking and financial services company in India by assests. [2] The bank traces its ancestry to British India, through the Imperial Bank of India, to the founding in 1806 of the Bank of Calcutta, making it the oldest commercial bank in the Indian Subcontinent. Bank of Madras merged into the other two presidency banks—Bank of Calcutta and Bank of Bombay—to form the Imperial Bank of India, which in turn became the State Bank of India. The Government of India nationalized the Imperial Bank of India in 1955, with the Reserve Bank of India taking a 60% stake, and renamed it the State Bank of India. In 2008, the government took over the stake held by the Reserve Bank of India. SBI has been ranked 285th in the Fortune Global 500 rankings of the world's biggest corporations for the year 2012.[1] SBI provides a range of banking products through its network of branches in India and overseas, including products aimed at non-resident Indians (NRIs). SBI has 14 regional hubs and 57 Zonal Offices that are located at important cities throughout the country. SBI is a regional banking behemoth and has 20% market share in deposits and loans among Indian commercial banks.
- Page(s): 69-71
- Date of Publication: March 2013
- Pawan KumarResearch Scholar, SJJT University, Jhunjhunu, Rajasthan, India
- Dr. Shiv Ram Singh JhajhariaLecturer Selection Scale N.D.B. Government College Nohar HMH Rajasthan, India
References
• Basel Committee on Banking Supervision, (1999), Enhancing Corporate Governance for Banking Organisations, September BIS. • Bhide, M.G. (2002), Address at NIBM Annual Day on the theme of Corporate Governance in Banks and Financial Institutions, January. • Jalan, Bimal, (2002), Inaugural Address at NIBM Annual Day on the theme of Corporate a Governance in Banks and Financial Institutions, January. • iloveindia.com/finance/bank/nationalised-banks/state-bank-of-india. •Wikipedia.org/wiki/State_Bank_of_India. •Bee hive Digital Concepts.
Pawan Kumar, Dr. Shiv Ram Singh Jhajharia "Formulation of Marketing Strategies in State Bank of India" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 3, pp.69-71 2013
This article investigates the relationship between transformational leadership and employees’ career salience. This research is conducted to answer the question that whether there is an association between employees’ career salience and transformational leadership or not. We focus only on Indian banking sector in this study. There are four dimensions to measure transformational leadership i.e. idealized influence, intellectual stimulation, inspirational motivation and individualized considerations, relationship is determined with employees’ career salience. The data was collected from five banks in India. 350 questionnaires were distributed for this purpose. Correlation analysis was used for the analysis of data. Findings of this study discovered that transformational leadership and all its dimensions have insignificant relationship with employees’ career salience. Newness of this study is its originality that concerns with relationship between transformational leadership and employees’ career salience. Limitations and future research is also discussed in this article.
- Page(s): 72-76
- Date of Publication: March 2013
- Vikas MahalawatResearch Scholar, SGV University, Jaipur, Rajasthan, India
- Dr. Bharti SharmaAssociate Professor, International School of Informatics & Management, Jaipur, Rajasthan, India
References
1. Almquist, E.M., and Angrist, S.S. (1970). Career Salience and a typicality of Occupational Choice among College Women. Journal of Marriage and Family, Vol. 32, No. 2 (May, 1970), pp. 242-249. 2. Avolio, B.J, Zhu, W.K., and Bhatia. P. (2004). Transformational Leadership and Organizational Commitment: Mediating Role of Psychological Empowerment and Moderating Role of Structural Distance, Journal of Organizational Behavior, No. 25, pp. 951–968. 3. Blau, G.J., and Boal, K.B. (1989). Using job involvement and organizational commitment interactively to predict turnover. Journal of management, 15, 115-127. 4. Bass, B.M. (1998). Transformational leadership: Industrial, military, and educational impact. Mahwah, NJ: Lawrence Erlbaum Associates. 5. Bass, B. M. (1985). Leadership and performance beyond expectations. New York: Free Press. 6. Betz, N. E. and Fitzgerald, L. F. (1987). The career psychology of women. New York: Academic. 7. Chiun M.L, Ramayah, T., and Min, H.W. (2009). Leadership styles and organizational commitment: A test on Malaysia manufacturing industry, African Journal of Marketing Management, 1(6), 133-139. 8. Evans L (2000). The effects of educational change on morale, job satisfaction and motivation. J. Educ. Change, 1(2), 173 -192. 9. Emery C. R., Barker K. j (2007). The effect of transactional and transformational leadership styles on the organizational commitment and job satisfaction of customer contact personnel, journal of organization culture, communication and conflict. 10. Givens R. J, (2008). Transformational Leadership: The Impact on Organizational and Personal Outcomes, Emerging Leadership Journeys, 1, 4-24. 11. Greenhaus, J.H. (1971). An investigation of the role of career salience in vocational behavior. Journal of Vocational Behavior, 1, 209-216. 12. Holmes, T. and Cartwright, S. (1993). Career change: Myth or reality. Employee relations, 11(6), 37-45. 13. Kiyani, A., Haroon, M., Khattak, M.A., Bukhari, S.J. and Asad, R. (2011). Impact of career salience on university teachers’ job involvement: A study on public and private universities in Pakistan. African Journal of Business Management, 14. Lee J (2004). Effects of leadership and leader-member exchange on commitment. Leadership and Organizational Development Journal, 26, 655-672. 15. Masih, L. K. (1967). Career saliency and its relation to certain needs, interests, and job values. Personnel and guidance Journal, 45, 653-658. 16. Mowday, R. T. Porter, L. W. & Steers, R. M. (1982). Employee-organization linkages. New York: Academic Press. 17. Moya, M., Exposito, F., and Ruiz, J. (2000). Close Relationships, Gender, and Career Salience. Journal of Sex Role, Vol. 42, Nos. 9/10. 18. Mert S. I., Keskin, N and Bas, T (2010) Leadership Style and Organizational Commitment: Test of a Theory in Turkish Banking Sector, Journal of Academic Research in Economics, 2, 1-20. 19. Nevill, D.D., and Super, D.E. (1986). The Salience Inventory: Theory, application, and research. Palo Alto, CA: Consulting Psychologists Press, Vol. 41. 20. Riaz et al. (2011). Impact of transformational leadership style on affective employees’ commitment: an empirical study of banking sector in Islamabad (Pakistan). The Journal of Commerce, Vol. 3, No. 1, pp. 43-51. 21. Ramchandran, S., Krishnan, R. (2009). Effect of Transformational Leadership on Followers' Affective and Normative Commitment: Culture as Moderator, Great Lakes Herald, 3(1), 23-38. 22. Savickas IM (2001). A developmental perspective on vocational behavior: career patterns, salience, and themes. Internet J. Educ. Vocat. Guid, 1(1-2): pp.49-57. 23. Stogdill, R. M. (1963). Manual for the leader Behavior Description Questionnaire Form XII, Bureau of Business Research, Ohio State University, Columbus, OH. 24. Shamir, B., Zakay, E., Breinin, E., & Popper, M. (1998). Correlates of charismatic leader behavior in military units: subordinates attitudes, unit characteristics and superiors appraisals of leader performance. Academy of Management Journal, 42, 387-409. 25. Ting, S-C. (2011).The Effect of Internal Marketing on Organizational Commitment: Job Involvement and Job Satisfaction as Mediators. Educational Administration Quarterly, vol. 47 no. 2 353-382. 26. Uygur, A., and Kilic, G. (2009). A Study into Organizational Commitment and Job Involvement: An Application towards the Personnel in the Central Organization for Ministry of Health in Turkey. Ozean Journal of Applied Sciences, 2(1).
Vikas Mahalawat, Dr. Bharti Sharma "Transformational Leadership & Employees Career Salience With Reference to Indian Banking Sector" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 3, pp.72-76 2013
The most important corporate resource over the next few years will be talent: smart, sophisticated business people who are technologically literate, globally astute, and operationally agile. Human Resource Management process comprises the following programs: human resource planning, recruitment, selection, professional development, performance appraisal, and compensation. Human resource planning involves identifying staffing needs, forecasting available personnel, and determining what additions or replacements are required to maintain a staff of the desired quantity and quality to achieve the organization’s goals. The human resource planning function involves three different elements: job analysis, forecasting demand and supply, and legal restraints. Good human resource planning involves meeting current and future personnel needs. The manager ensures that personnel needs are met through ongoing analysis of performance objectives, job requirements, and available personnel, coupled with knowledge of employment laws. and manpower availability. In the current climate, organisations are constantly seeking new ways of cutting their operating costs. For the recruitment industry, new technology is increasingly being relied upon to help the industry contain financial pressures and increase productivity. Humans are considered as the most crucial, volatile and potentially unpredictable resource which an organization utilizes. Manpower planning seeks to make the links between strategy, structure and people more explicit. The purpose of manpower planning is to get a better matching between manpower requirements.
- Page(s): 77-79
- Date of Publication: March 2013
- Pawan KumarResearch Scholar, SJJT University, Jhunjhunu, Rajasthan, India
- Dr. Shiv Ram Singh Jhajharia Lecturer Selection Scale N.D.B.Government College Nohar HMH Rajasthan, India
References
1) Fred C. Lunenburg, Human Resource Planning: Forecasting Demand and Supply, INTERNATIONAL JOURNAL OF MANAGEMENT, BUSINESS, AND ADMINISTRATION VOLUME 15, NUMBER 1, 2012 2) Deepti Sethi(2005), A Dissertation presented in part consideration for the degree of ‘International MBA’,university of Nottingham. 3) Marc Orlitzky, Recruitment Strategy, Oxford Handbook of Human Resource Management.
Pawan Kumar, Dr. Shiv Ram Singh Jhajharia "Human Resource Management" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 3, pp.77-79 2013
Firewalls play the crucial role in the computer security. The overall performance of a firewall depends upon the Time required in rule matching. As the number of the entries increase in the list, the speed of firewall becomes slow. Time required in rule matching is directly proportion to the size of the list. To improve the overall performance of a List based firewall, new multi level Heap Based rule set for the packet filter is presented. In this scheme system maintains two different rule set for incoming & outgoing packets, so average rule set size is reduced to n/2. Rule set for incoming and outgoing packet contains only three parameters to evaluate that packet’s action type (i.e. – either forward or discard the packet). Using the multilevel heaping the performance of a packet filter improves up to level O (n1+n2+n3). This scheme also removes the anomalies of the rule set.
- Page(s): 80-87
- Date of Publication: March 2013
- Mukesh Kumar YadavArya college of Engineering and Information technology, Jaipur, Rajasthan
- Shiv KumarArya college of Engineering and Information technology, Jaipur, Rajasthan
References
[1]. William Stallings, “Cryptography and Network Security”, ISBN 81-7758-774-9, Pearson Education, Inc Pvt. Ltd. 2006. [2]. Christoph L. Schuba and Eugene H. Spafford , “A Reference Model for Firewall .. Technology” Proceedings of the 39th Annual Simulation Symposium. (ANSS’06)–page no -1213-1222 IEEE2006. [3]. Tarek Abbes, Adel Bouhoula, Michale Russinowith, “ An Inference system for detecting firewall filtering anomalies ”, SAC 08 March 16-20, (page no-2122-2128) ACM9781-59593-753-7/08/2003. [4]. Subrata Acharya, Jia Wang, Zihui Ge, Taieb Znati, “Simulation Study of Firewalls to Aid Improved Proceedings of the 39th Annual Simulation Symposium (ANSS’06) 0-7695-2559-8/06 - 2006 IEEE. [5]. Hazem Hamed ,Ehab Al-Shaer , “Dynamic Rule-ordering Optimization for High-speedFirewall Filtering” ASIACCS’06, March 21-24, 2006, Taipei, Taiwan (page no.332 no.332) -342)ACM 1-59593-272-0/06/2000. [6]. S. Acharya, J. Wang, Z. Ge, T. Znati, and A. Greenberg. “A Traffic-Aware Framework and Optimization Strategies for Large Scale Enterprise Networks”. Technical Report, page no. 199-210 IEEE computer 2005. [7]. Thomas H. Core, Charles e., Ronald L. Rivest, Clifford Stein, “Introduction to Algorithms”, ISBN -81-203-2141-3, Prentice –Hall of India Private Limited-2001.
Mukesh Kumar Yadav, Shiv Kumar "Heap Based Rule Set for Packet Filters" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 3, pp.80-87 2013
The operations strategy overcomes weaknesses and build on existing strengths and productivity of the technical educational institutions. It specifies how the institutes will employ its educational capabilities to support its business strategy. This paper has discussed the relevant operations associated with technical educational institutions and its future scope and perspective under changing environment with the help of SWOT Strength, weakness, opportunity and suggests several short-term and long-tem operations for technical educational institutions.
- Page(s): 88-91
- Date of Publication: july 2013
- Ruchika Sharma Deepshikha Group of Colleges, Jaipur, Rajasthan, India
- Gaurav Kumar JainDeepshikha Group of Colleges, Jaipur, Rajasthan, India
- Ravi RanjanDeepshikha Group of Colleges, Jaipur, Rajasthan, India
References
1. Aaker David., Developing business strategy, John Wiley Sons, New York, USA, 1995. 2. Adam, E.E. and R. J. Ebert, Production and operations management, Prentice-hall, Englewood Cliffs, N.J., 1998. 3. Cahill, E.A., Management of productivity improvement in the present global change, AIIF Proceeding of Annual Spring Conference, pp 716-721, may 1998. 4. Dwyer. D.C., Ringstaff, C., & Sandholtz, J.H. (1991). Changes in teacher beliefs and practices in technology –rich classrooms. Educational Leadership. 48(8),45-52. 5. Deb. S.K. and Barua, P.B. Strategic operational model for higher educational institutions under changing environment, proceedings of NAAC sponsored seminar on ensuring quality in higher education institution, Sibsagar college, Sibsagar, March 30-31, 2005. Pp. 17-18. 6. M. Porter. Competitive Advantage, The Free Press, New York, 1985.
Ruchika Sharma, Gaurav Kumar Jain, Ravi Ranjan "Productivity Improvement Analysis Model through Operations Strategy" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 3, pp.88-91 2013
This paper deals with an inventory model for deteriorating items with power pattern demand, partial backlogging in the form of two parameters weibull function. Holding cost is considered as time dependent.
- Page(s): 92-104
- Date of Publication: March 2013
- Anil Kumar SharmaRaj Rishi Govt. Autonomous College, Alwar, Rajasthan, India
- PreetiRaj Rishi Govt. Autonomous College, Alwar, Rajasthan, India
References
1. Chang,H.J. and Dye,C.Y.(1999):An EOQ model for deteriorating items with time varying demand and partial backlogging. Journal of the Operational ResearchSocity, 50, 1176-1182. 2. Dutta,T.K. and Pal,A.K. (1988): Order level inventory system with power pattern demand for items with variable rate of deterioration. Indian Journal of Pure and Applied Maths,19 (11), 1043-1053. 3. Dye,C.Y.; Ouyang,L.Y. and Hsieh,T.P.(2007): Deterministic inventory model for deteriorating items with capacity constraint and time proportional backlogging rate, Vo. European Journal of Operational Research, 178 (3), 789-807. 4. Padmanabhan,G.and Vrat,p.(1995):EOQ models for perishable items under stock dependent selling rate. European Journal of Operational Research, 86, 281-292. 5. Park,K.S. (1982): Inventory models with partial backorders. International Journal of System Sciences, 13, 1313-1317. 6. Roychowdhury,M. and Chaudhuri,K.S. (1983): An order level inventory model for deteriorating items with finite rate of replenishment. Opsearch, 20, 99-106. 7. Sharma,A.K.; Sharma,R.K. and Goyal,M. (2008): A lot size model for deteriorating items with power pattern demand considering shortages. International Transactions in Mathematical Sciences and Computer, 1 (1), 87-94. 8. Sharma,A.K.; Sharma,R.K. and Aggrawal,N.K. (2009): Optimum ordering interval with selling price dependent demand rate for items with random deterioration and shortages. International Transactions in Mathematical Sciences and Computer, 2 (1), 65-72. 9. Singh,T.J., Singh,S.R. and Dutt, R. (2009): EOQ model for perishable items with power demand and partial backlogging. IJOQM. 15 (1), 65-72. 10. Teng,J.T. and Yang,H.L. (2004): Deterministic EOQ models with partial backlogging when demand and cost are fluctuating with time. Journal of the Operational Research Society, 55 (5), 495-503. 11. Wang,S.P. (2002): An inventory replenishment policy for deteriorating items with shortages and partial backlogging. Computers and Operational Research, 29, 2043-2051. 12. Wu,K.S.; Ouyang,L.Y. and Yang,C.T. (2006): An optimal replenishment policy for non-instantaneous deteriorating items with stock dependent demand and partial backlogging. International Journal of Production Economics, 101, 369-384.
Anil Kumar Sharma, Preeti "An Inventory Model for Deteriorating Items with Power Pattern Demand and Partial Backlogging with Time Dependent Holding Cost" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 3, pp.92-104 2013
This paper presents the new trends in code division multiple access techniques known as Optical CDMA Technology. We highlight those trends and features that are believed to be essential to the successful introduction of various OCDMA techniques in communication systems and data networks in near future. In particular, in this we elaborate on enabling technologies that are needed prior to full scale consideration of OCDMA in communication systems. I extend my discussion to various data network. It is believed that OCDMA once fully developed and matured will be an inseparable part of advanced optical communication systems and networks due to its various desirable features and functionalities, in not so distant future. Optical Code Division Multiple Access (OCDMA) is an optical processing system which allows multiple users to share the same bandwidth simultaneously without interfering with each other using unique optical codes. In this paper we present an in depth review on the new trends and the directions taken by the researchers worldwide in Optical Code Division Multiple Access (OCDMA) systems.
- Page(s): 105-111
- Date of Publication: March 2013
- Nityanand SharmaResearch Scholar, Jagannath University, Rajasthan, India
- Priyanka JoshiResearch Scholar, Rajasthan Technical University, Rajasthan, India
- Megha SharmaResearch Scholar, Rajasthan Technical University, Rajasthan, India
References
[1] A. J. Viterbi, CDMA: Principles of Spread SpectrumCommunication. Reading, MA: Addison-Wesley,1995. [2] Hongxi Yin, David J. Richardson, Optical CodeDivision Multiple Access Communication Networks:Theory & Applications’ Tsinghua University Press,Beijing and Springer. [3] J.A. Salehi, “Code division multiple-access techniquesin optical fiber networks-Part I: Fundamentalprinciples,” IEEE Transactions on Communications, vol.37, no. 8, pp. 824-833,August1989. [4] J.A. Salehi, “Emerging Optical Code-Division MultipleAccess Communications Systems, ” IEEE Network, vol.3, no. 2, pp. 31-39, Mar. 1989. [5] L. TanCevski, I. Andonovic, M.Tur, J.Budin, “Hybridwavelength hopping/time spreading code divisionmultilple access systems”, iee proc. Optoelectron, vol.143, no. 3, june 1996, pp. 161-166. [6] T. O'Farrell and S. I. Lochmann, “Switched correlatorreceiver architecture for optical CDMA networks withBipolar capacity”, Electron.Lett,vol.31,pp.905-906,May.1995. [7] E. Forestieri and G. Prati, “Novel optical line codestolerant to fiber chromatic dispersion”, J. Lightw.Technol., vol. 19, no. 11, pp. 1675–1684, Nov. 2001. [8] J. A. Salehi, C. A. Brackett (1989) Code divisionmultiple-access techniques in optical fiber networks. II.Systems performance analysis. IEEE Transactions on Communications,37(8),834–842. [9] P. Prucnal, M. Santoro, and Ting Fan (1986) Spreadspectrum fiber-optic local area network using opticalprocessing. Journal of LightwaveTechnology,4(5),547–554. [10] H.-H. Chen and M. Guizani (2006): Next GenerationWireless Systems and Networks, Chichester: John Wiley& Sons. [11] Hsiao-Hwa Chen (2007): The Next Generation CDMATechnologies, John Wiley & Sons. [12] H. Chung and P. V. Kumar (1990) Optical orthogonal codes—new bounds and an optimal construction. IEEE Transactions on Information Theory, 36(4),866–873. [13] K. M. Sivalingam and S. Subramanian, (2005): Emerging optical network technologies, Springer Science+Business Media Inc.
Nityanand Sharma, Priyanka Joshi, Megha Sharma "Next Generation CDMA Technology" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 3, pp.105-111 2013
Database management systems have entered the internet age. If too many users approach for information, then this degrades the system performance. The degradation may cause delay and trouble for particular end user in accessing the information. Accessing information in easy way and within certain time, by keeping its freshness, assessing user’s requirements and then providing them information in time is important aspect. Conventional database are mainly characterized by their strict data consistency requirements. Database systems for real time applications must satisfy timing constraints associated with transactions. The main objective of this paper is to initiate an enquiry in real time databases and presents, Mathematical model for Disk scheduling for real time database systems.
- Page(s): 112-120
- Date of Publication: March 2013
- Uma Shanker Jayswal
- Gaurav Kumar Jain
- Ravi Ranjan
References
[1].R.Abbott and H.Garcia-Molina, “Scheduling real time transcation: A performance evaluation,”proceedings of the 14 VLDB conference,los angeles, California, (1988). [2].N. Audsley, A.Burns, “real time system scheduling ”, technical report no.YCS134,department computer science, the university of York,UK,(1990). [3]. Shenze Chen, Joh A.Stankovic, James Curose and DonTowsley, “performance evaluation of two new disk scheduling algorithmn”, The Journal of real time system, (1990). [4]. S.Chen, J.A.Stankovic, J.F.Kurose, and D.Towsley, “ performance evolution of two new disk scheduling algorithm for real time systems ”, the Journal of real time system, 3(1991)307-336 [5]. Z.Dimitrijevic, R.Rangaswamy, and E.Chang, “design, analysis, and implementation of virtual IO”.(2002) [6]. Value Based Schedduling In real time database. Systems.Jayant R.Haritsa, Michael J.Carey, and Miron Livny.Recieved(1991). [7]. Kao, B.and Garcia-Molina,H.,”overview of real time database systems,”in advances in real time systems (ed.S.H.Son), (1995)463-86. [8]. “Evaluation of sceduling algorithm for real time disk I/O”-YIFENG Zhu, department of computer science and engineering, university of Nebraska-Lincoln,(2002).
Uma Shanker Jayswal, Gaurav Kumar Jain, Ravi Ranjan "Disk Scheduling Algorithms and presentation of mathematical model with database" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 3, pp.112-120 2013
This paper includes performance and analysis of 3G GSM network on the basis of KPI report. Performance & analysis of this network has following features: Blocked Call Troubleshooting Drop Call – Troubleshooting Speech Quality Parameters Speech Quality – Troubleshooting Handover Troubleshooting Coverage Analysis Quality of SFH & Non-SFH network Drop Call Rate Call setup success rate Blocked Call Rate Hopping C/I
- Page(s): 121-127
- Date of Publication: March 2013
- Mr. Pradeep Kumar SharmaRegional College for Education & Research Tech, Jaipur, Rajasthan, India
- Mr. Yogesh SharmaResearch Scholar Jagannath University, Jaipur, Rajasthan, India
References
[1] Dhiraj Nitnaware, Ajay Verma “Energy Evaluation of Two on Demand Routing Protocol under Stochastic Traffic” [2] Yogesh Chaba, Yudhvir Singh, Manish Joon. “Simulation based Performance Analysis of On-Demand Routing Protocols in MANETs” 2010 Second InternationalConference on Computer Modeling and Simulation [3] Koushik Majumder, Subir Kumar Sarkar” Performance Analysis of AODV and DSR RoutingProtocols in Hybrid Network Scenario”IEEE Xplore [4] C. K. Toh, Associativity-Based Routing for Ad Hoc Mobile Networks, Wireless Personal Communications, vol. 4, no. 2, pp. 1-36, March 1997. [5] R. S. Sisodia, B. S. Manoj, and C. Siva Ram Murthy, A Preferred Link- Based Routing Protocol for Ad Hoc Wireless Networks, Journal of Communications and Networks, vol. 4, no. 1, pp. 14-21, March 2002. [6] P. Sinha, R. Sivakumar, and V. Bharghavan, CEDAR: A CoreExtraction Distributed Ad Hoc Routing Algorithm, IEEE Journal on Selected Areas in Communications, vol. 17, no. 8, pp. 1454-1466,August 1999. [7] Karavetsios, P. & Economides, A.A.: Performance comparison of distributed routing algorithms in ad hoc mobile networks. SEAS Transactions on Communications, Vol. 3, Issue 1, pp. 317-321, 2004
Mr. Pradeep Kumar Sharma, Mr. Yogesh Sharma "Analysis of Kee Parameter Indicator For GSM Network" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 3, pp. 131-135 2013
Solar Energy is the energy received from the sun that sustains life on earth. For many decades solar energy has been considered as a huge source of energy and also an economical source of energy because it is freely available. However, it is only now after years of research that technology has made it possible to harness solar energy. A few industries have increased in size dramatically over a relatively short period. The computer trade is an obvious one. And now so is the solar energy trade. New manufacturers are appearing almost daily, new product innovations are announced just as fast, and existing products are ever more refined, improved, and lowered in price. It's an exciting time for the people involved in the various solar energy industries, and this heightened focus translates to better deals for the consumer, whether residential, commercial, government or other. Some of the modern Solar Energy systems consist of magnifying glasses along with pipes filled with fluid. These systems consist of frontal glass that focuses the sun’s light onto the pipes. The fluid present in the pipes heats up instantly. In addition they pipes are painted black on the outside so as to absorb maximum amount of heat. The pipes have reflective silver surface on the back that reflects the sunlight back, thus heating the pipes further. This reflective silver surface also helps in protecting everything that is on the back of the solar panel.
- Page(s): 128-130
- Date of Publication: March 2013
- Mahaveer GenwaDepartment of Chemistry, Deen Dayal Upadhyaya College (University of Delhi), Shivaji Marg, Karampura New-Delhi, India
- Veer Singh ChopraDepartment of Chemistry, Sh. JJT University, Jhunjhunu (Raj.), India
References
1. Solarenergy.gen.in 2. "The Combined Power Plant: the first stage in providing 100% power from renewable energy". Solar Server. January 2008. Retrieved 10 October 2008. 3. Sandia National Laboratory. Retrieved 29 September 2007. 4. Powersourcesolar.com/5151. 5. "Pumped Hydro Storage". Electricity Storage Association. Retrieved 31 July 2008. 6. Collings AF, Critchley C. Artificial Photosynthesis. From Basic Biology to Industrial Application. Wiley-VCH. Weinheim (2005) p. x ISBN 3-527-31090-8 doi:10.1002/3527606742. 7. Wikipedia.
Mahaveer Genwa, Veer Singh Chopra "Alternative Energy- Solar Energy" International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.2 issue 3, pp.128-130 2013
Speech recognition is the ability of receiving dictations and interprets on it for understanding spoken commands by human beings. Speech recognition software allow the user in alternative way of interaction with the computer, instead of the traditional way of interaction using the input device like keyboard and mouse (Gorin et al.,1997). They growing nature of speech recognition software and their importance pay a significant role in the development of voice-enabled browsers. The nation of voice-enabled browser improve the user interaction and minimizes the barriers of traditional usage. In this paper, we have proposed a new voice-enabled browser which is user independent in nature and also has the ability to interact with applications installed in the device which is being used. The proposed voice browser meets the standard requirements of the user and is found to be a viable mode of interaction.
- Page(s): 131-138
- Date of Publication: March 2013
- Madhumay Sen
- Gaurav Kumar Jain
- Ravi Ranjan
References
1. Asha S and Chellapan S (2011), “Voice Activated E-Learning System for the Visually Impaired”, International Journal of Computer Application, Vol. 14 No- 7, p. 42. 2. Atiwong S Jirasak C and Proadpran P (2006), “Enhancing a Voice Enabled Web Browser for the Visually Impaired”, in Proceeding of the International Conferences on Applied Science. 3. Gorin G, Riccardi and Wright J (1997), “ How May I Help You ?” Speech Communication, Vol. 23, pp. 113-127. 4. Hemphill C T and Thrift P R (1995), “ Surfling the Web by Voice “, ACM Multimedia, San Francisco, CA,USA. 5. Jirasak C, Jakkrapong N, Proadpran P and Atiwong S (2007), “ Internet Explorer Smart Toolbar for the Blind “, pp. 195-200, Proceeding of the I “ International Convention on Rehabilitation Engineering & Assistive Technology: In Conjunction with 1st “ Tan Tock Seng Hospital Neurorehabilitationss Meeting. 6. Lawrence R and Biing Hwang J (1993), Fundamentals of Speech Recognition, Prentice-Hall, Inc. 7. Lee Y S (2005), “ The Impact of ICT on Library Services for the Visually Impaired “, 8th International Conference on Asian Digital Libraries (ICADL, 2005), PP. 44-51, Bangkok, Thailand. 8. Manny R, Beth A H, Nikos C, Kim F and Jean M R(2005),” A Voice Enabled Procedure Browser for the International Space Station “, Proceeding of the ACL 2005 on Interactive Poster and Demonstration Sessions. 9. Nolan Y M and De Paor A (2005), “phoneme Recognition Based Software System for Computer as a Tool (EUROCON, 2005), Vol.1, pp. 394-397. 10. Nuance Communications, available at https://www.nuance.com 11. Orubeondo A (2001), “The Power of Voice”, InfoWorld vol.23, No. 21, pp. 73. 12. Peter J D (2000), “The Promise of a Voice-Enabled Web “, Journal of Computer, Vol. 33, No. 8, pp, 104-106. 13. Schroeter J (2001),The Fundamentals of Text to Speech Synthesis, voiceXML Review. 14. Shuchih E C (2009),”Implementation and Empirical Evaluation of Voice-Enabled Web Application”, International Journal of Information Technology and Management, Vol. 8, No. 2, pp. 178-195. 15. Shuchih E C and Michal S H (2006),” An Empirical Study on Voice-Enabled Web Application “,IEEE pervasive Computing, Vol. 5, No. 3, pp. 76-81. 16. Yevgen B (2008),” Automation of Repetitive Web Browsing Tasks with Voice-Enabled Macros “, Proceeding of the 10TH international ACM SIGACCESS Conference on Computers and Accessibility, October 13-15,Halifax, Nova Scotia, Canada. 17. Young S L (2005), “The Impact of ICT on Library Services for the Visually Impaired “, E A Fox et al. (Eds.), ICADL , Vol. 3815, pp. 44-51. 18. Yraslorza T (1993), Special Supplement: Voice Recognition, Well Street Letter. 19. Yvonne M N and Annraoi de Paor (2005), “Phoneme Recognition Based Software System for Computer Interaction by Disabled People “, pp. 394-397, November 22-24, Proceeding of EUROCON 2005, Serbia and Montenegro, Belgrade.
Madhumay Sen , Gaurav Kumar Jain , Ravi Ranjan "Voice-Enabled Browser In The Case OF User and Application Independent" International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.2 issue 3, pp.131-138 2013
In recent years government agencies and industrial enterprises are using the web as the medium of publication. Hence, a large collection of documents, images, text files and other forms of data in structured, semi structured and unstructured forms are available on the web. It has become increasingly difficult to identify relevant pieces of information since the pages are often cluttered with irrelevant content like advertisements, copyright notices, etc surrounding the main content. Thus, we propose a technique that mines the relevant data regions from a web page. This technique is based on three important observations about data regions on the web.
- Page(s): 139-153
- Date of Publication: March 2013
- Nitin GuptaDepartment of Information Technology, B.E MTech* JECRC-UDML College of Engineering, Jaipur, Rajasthan, India
- Raja BhatiDepartment of Information Technology, B.E MTech* JECRC-UDML College of Engineering, Jaipur, Rajasthan, India
References
[1] Mining Web pages for Data Records, Bing Liu, Robert Grossman, Yanhong Zhai. [2] Jiawei Han and Micheline Kambler, Data Mining: Concepts and Techniques. [3] Arun .K. Pujari, Data Mining Techniques [4] Pieter Adriaans, Dolf Zantinge, Data Mining. [5] George M. Maracas, Modern Data Warehousing, Mining, and Visualization Core Concepts, 2003 [6] J. Hammer, H. Garcia Molina, J. Cho, and A. Crespo, Extracting semi-structured information from the web. [7] A. Arasu, H. Garcia-Molina, Extracting structured datafrom web pages.
Nitin Gupta, Raja Bhati " E-MINE: A Web Mining Approach" International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.2 issue 3, pp.139-153 2013
Scientists, biologists and medical practitioners are always enthusiastic to know the human unconscious control of body activity. A simple question of: how the cells talk? Can answer several mysteries of cognitive science and life control of species .As the nature manages and organize an organism’ s perception, circulation, respiration, digestion ,excretion and action, if we can ably simulate the language of cells, consequently establishing the associated bimolecular interaction networks, it can yield miraculous results procuring digital control on our body with a profound impact on biotechnological and pharmaceutical fields studying the properties of protein and gene interaction network promises to yield prediction of cell language which can shed now light on the evolution of species and also improve our understanding of the underlying biological phenomena. Science a large part of these complex biological networks is governed by probabilistic theory and undefined rules that comes from the incompleteness of detailed knowledge on system biology, the modern machine learning algorithms using probability and heuristics are the major techniques for their simulation. Several distinct and complementary learning algorithms are being explored to infer networks in biology. In this paper, we highlight application of various machine learning techniques to study biological networks inferring organized complexity of the languages of cells and providing a context for reader new to the field.
- Page(s): 154-160
- Date of Publication: March 2013
- Ruchika Sharma
- Gaurav Kumar Jain
- Ravi Ranjan
References
1. Bak p (1997), how Nature Works the Science of Self Organized Criticality, p.21 Oxford University press, Oxford, UK. 2. Baled P and Brunk S (2001), Boinfornanties, The Machine Learning Approach p. 452, The MIT press. 3. Bertalanffy L von (1969), General Systems Theory: Foundations, Development Applications, Pub-id 101-279-836, George Braziller, New York, USA. 4. Breitkreutz B J,Strark Cand Tyers M (2003), “The GRID: The General RepositorFor Interaction Datasets”, Genome Biol, Vol.4, No.3, R23. 5. Bui Quoc- Chinh, Katrenko Sophia and sloot Peter M A (2010), “A Hybrid Approach to Extract Protein-protein Interactions”, Bioinformatics, Vol. 27 No.2, pp.259-265. 6. Chang J-H, Hwang K-B and Zhang B T (2002),”Analysis of Gene Expression Profile And Drug Activity Patterns by Clustering and Bayesian Network Learning”, Methods of Microarray Data Analysis’ II,pp.169-184,Kluwer Academic Publishers. 7. Chen Xue-Wen and Liu Mei (2006),”Domain Based Predictive Models for ProteinProtein Interaction Prediction”, FURASIP, J. on Applied Signal Processing pp.1-8. 8. Chen K C, Calzone L, Csikasz-N a et al (2005). ”Integrative Analysis of Cell Cycle Control in Budding Yeast”, Molecular Biology of Cell, Vol. 15, pp.3841-3862. 9. Durbin R, Eddy SR, Krogh A and Mitchison (1998), Biological Sequence Analysis Probabilistic Models of Proteins and Nuclear Acids, p. 350, The CambridgeUniversity press. 10. Eom jae-Hong and Zhang Byoung-Tak (2006), Prediction of Protein Interaction with Neural Network-Based Feature Association Rude Mining,pp.30-39,ICONIP’06, Part III, Springer Verlag Berlin Heidelberg Lecture Notes in Computer Science (LNCS) 4234. 11. Fariselli P, Pazos F, Valencia A and Casadto R (2002), “Prediction of Protein Protein Interaction Sites in Heterocomplexes with Neural Network”, Eur, j.Biochen. Vol.269, No.5, pp.1356-1361. 12. Fariselli P, Zauli A, Rossi I et al. (2003),”A Neural Network Method to Improve Prediction of Protein-protein Interaction sites in Heterocomplexes”, Neural Network for Signal Processing (NNSI’) apos03, IEEE 13th Workshop, 17-19th September 17-19, 2003
Ruchika Sharma, Gaurav Kumar Jain, Ravi Ranjan "Study Biological Networks For Application of machines learning" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 3, pp.154-160 2013
Hiding the information over other information plays a vital role in securing the data. Steganography is art of hiding the information into other information in such a manner that hidden information cannot be easily perceptible by human eye. This paper presents a new technique for image hiding based on DWT. In our approach, single-level DWT is performed on the cover image by Haar wavelet and then its HL and LH detail components are used for embedding two watermark images associated with embedding algorithm. The proposed method gives an improved bit correct ratio which is nearly about 99%.
- Page(s): 161-166
- Date of Publication: March 2013
- Mamta Jain Department of Electronics & CommunicationInstitute of Engineering & Technology Alwar, Rajasthan, India
- Neha SinghDepartment of Electronics & CommunicationInstitute of Engineering & Technology Alwar, Rajasthan, India
References
[1] R.Poornima, R.J.Iswarya, “An Overview of Digital Image Steganography”, International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.1, February 2013, PP 23-31. [2] Kanzariya Nitin K., Nimavat Ashish V., “Comparison of Various Images Steganography Techniques”, International Journal of Computer Science and Management Research, Vol 2, Issue 1, January 2013, ISSN 2278-733X, pp. 1213-1217. [3] Deepa S, Umarani R, “A Study on Digital Image Steganography”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 1, January - 2013, ISSN: 2277 128X , pp.54-57 [4] Blossom Kaur, Amandeep Kaur, Jasdeep Singh, “Steganographic Approach for Hiding Image in Dct Domain”, International Journal of Advances in Engineering & Technology, July 2011, Vol. 1, Issue 3, ISSN: 2231-1963, pp.72-78 [5] Sushil Kumar, S.K.Muttoo, “A Comparative Study Of Image Steganography In Wavelet Domain”, International Journal of Computer Science and Mobile Computing, IJCSMC, Vol. 2, Issue. 2, February 2013, ISSN 2320–088X,pg.91 – 101 [6] Souvik Bhattacharyya, Gautam Sanyal, “A Robust Image Steganography Using DWT Difference Modulation (DWTDM)”, I. J. Computer Network and Information Security, july-2012, pp. 27-40. [7] Santhi K, Anil Kumar M N, “Biometrics based Steganography using Circular Folding in DWT Domain”, International Journal of Computer Applications, Volume 61– No.10, January 2013, ISSN 0975 –8887, pp 47-51 [8] Jih Pin Yeh, Che-Wei Lu, Hwei-Jen Lin, and Hung-Hsuan Wu, “Watermarking Technique Based On DWT Associated With Embedding Rule”, International Journal Of Circuits, Systems And Signal Processing, Issue 2, Volume 4, 2010, pp 72-82. [9] Yedla dinesh, Addanki purna ramesh, “Efficient Capacity Image Steganography by Using Wavelets”, International Journal of Engineering Research and Applications (IJERA), Vol. 2, Issue 1, Jan-Feb 2012, ISSN 2248-9622, pp 251-259. [10] A.Nag, S. Biswas, D. Sarkar, P.P. Sarkar, “A novel technique for image Steganography based on Block-DCT and Huffman Encoding”, International Journal of Computer Science and Information Technology, Volume 2, Number 3, June 2010, pp 103-112. [11] H S Manjunatha Reddy, K B Raja, “High Capacity And Security Steganography Using Discrete Wavelet Transform”, International Journal of Computer Science and Security (IJCSS), Volume 3, Issue 6, pp 462-472.
Mamta Jain, Neha Singh "Robust DWT Based Technique for Digital Watermarking" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 3, pp.161-166 2013
Mobile ad-hoc networks are constructed without any infrastructures such as redirection switches, base stations and towers. The node clustering and a peer-to peer service discovery protocol specially designed for Mobile Ad-hoc Network (MANET) environment. The clustering process is carried out to form multicast groups within the clusters managed by the cluster head. The Mobile Service Discovery Protocol (MSDP) uses a dynamic clustering algorithm to group nodes in a MANET. The route discovery process is performed to discover the neighbors and maintain the routing table. Cluster Based Routing protocol (CBRP) is used for providing service details and maintaining routing information. This paper is introduced to carry out the routing management and service discovery operations with minimum bandwidth consumption. The multicast data transmission mechanism is used to transfer route and service details.
- Page(s): 161-171
- Date of Publication: March 2013
- Uma Shanker Jayswal
- Gaurav Kumar Jain
- Ravi Ranjan
References
[1]. Abhisekh Gupta, Divya kant agrwal and amr EI Abbadi, “distributed resource discovery inn large scale computing system” symposium on applications and the internet, (2005). [2]. Bluetooth specification part “E. Service discovery protocol (SDP)”, HTTP:-www.bluetooth.com,(Nov.1999). [3].Bulent Tavly and when the Heinzelman” Ad-Hoc network”Springer 1st edition (2006). [4].Chalamtac I.,Conti M.and Liu J.J.N.,”middle ware concepts and techniques” Elsevier press (2003). [5]. Sun. Technical White Pepar:”Jini Architectural overview” HTTP://www.sun.com/Jini/, (1999). [6]. Yanglu, Mingchen, “A cluster based and routing balanced P2P Look up Protocol” IEEE, (2007).
Uma Shanker Jayswal, Gaurav Kumar Jain, Ravi Ranjan "Integrated Solutions for Routing and Service in MANET " International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 3, pp.161-171 2013
Band pass filters are essential part of any signal processing or communication systems, the integral part of superhetrodyne receivers which are currently employed in many RF/Microwave communication systems. At Microwave Frequencies the discrete components are replaced by transmission lines, for low power applications microstrip are used which provide cheaper and smaller solution of Band Pass Filter. This article is an effort to document the designing steps of a micro strip Band Pass Filter. The specific design discussed in the article in detail is know as Parallel Coupled Filter. In this article an example of a filter specs is given over which a filter is designed by using certain tools.
- Page(s): 172-175
- Date of Publication: March 2013
- Girraj SharmaM.Tech. Student, Jaipur National University, Jaipur, Rajasthan, India
- Rajeshwar Lal Dua Prof. And Head ECE deptt. Jaipur National University, Jaipur, Rajasthan, India
- Yogesh Bhati Asst.Prof., Arya Institute of Engg. And Tech., Jaipur, Rajasthan, India
References
[1]Design and Development of a Multi-Fold Microstrip Hairpin LineBandpass Filter at 1400 MHz for Communication Systems.International Journal of Computer Applications (0975 – 8887) Volume41– No.12, March 2012 [2]Design of microstrip hairpin band pass filter using defected groundstructure and open stubs. 2011 international conference on informationand electronics engineering ipcsit vol.6 (2011) © (2011) iacsit press,Singapore [3]A novel wiggly-line hairpin filter with 2nd Spurious passbandsuppression S. I. Hong1, s. W. Fok1, w. W. Choi1, k. W. Tam1 and r. P.Martins1,2 1wirelesscommunication laboratory [4]Coupled Microstrip Filters: Simple Methodologies for ImprovedCharacteristics Kamaljeet Singh, R. Ramasubramanian, S. PalCommunication Systems Group, ISRO Satellite Center, Bangalore, India [5]Design of Hairpin Band Pass Filters for K-Band Application. 2008 ieeeinternational rf and microwave conference December 2-4, 2008,kualalumpur, Malaysia [6]The Miniature 2.4/5.2 GHz Dual-Band Band pass Filter with ModifiedHairpin Structure By Cheng-YuanKung,Ying-ChungChen,Cheng-FuYang2, and Mau-Phon Houng ,Proceedings of Asia-Pacific MicrowaveConference 2007. [7] Hairpin filters with tunable transmission zeros By Chih-Ming Tsai,Sheng-Yuan Lee, and Chin-Chuan Tsai National Cheng Kung University,Department of Electrical Engineering. [8]Optimum Design of Novel UWB Multilayer Microstrip Hairpin Filterswith Harmonic Suppression and Impedance Matching By HomayoonOraizi and Nima Azadi-Tinat Hindawi Publishing CorporationInternational Journal of Antennas and Propagation Volume 2012, ArticleID 762790, 7 pages doi:10.1155/2012/762790
Girraj Sharma, Rajeshwar Lal Dua, Yogesh Bhati "A Review paper on Microstrip Bandpass Hairpin Filter" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 3, pp.172-175 2013
The purpose of this study is to understand the various dimensions of mental health. It defines the definitions given by various psychologists. Mental troubles in older people are different from others. From a psychological point of view this study studies the effects on mental health. The study of mental health is even more important in today's mechanical era. Different psychologists have given different views according to time and time. It is not possible to bring together the conclusions given by all these psychologists. Therefore, mental problems in psychology should be understood in a broad thesis.
- Page(s): 176-177
- Date of Publication: March 2013
- Priyanka Singh Research Scholar, Dr. Ram Manohar Lohia Avadh University, Ayodhya, Uttar Pradesh, India
References
[1]. W.H.O.(2004). Institute for health metrics and evaluation. [2]. Diener, E. And Diener M. (1995). Cross cultural correlations of life satisfaction and self esteem. Journal of personality and social support, 68,653-663. [3]. Gunney, S. (2009). Life satisfaction of university students, world positive psychology conference, USA, 18-23 June. [4]. Kornhauser, A. (1965). Mental health of industrial workers: A Detroit study : NY : Wiley [5]. Lakshminarayan, T.R. and Prabhakaran, P. (1993). Comparison of mental health among the different age groups of industrial employees, Journal of psychology Researches, 30(3),pp.30-34. [6]. Erickson, H.J. (1990). Genetic and environmental contributions to individual-differences - the 3 major dimensions of personality. Journal of personality, 58,245-261. [7]. Anand S.P. (1998). RCE Mental health scale. Indian educational review, 23(1),pp.41-47, NCERT. [8]. Tilvis, R.S., Pitkala, K.H., Jolkkonen, J. Strandberg, T.E..(2000). Social networks and dementia. Lancet, 356:77-78. [9]. Alpass, F.M., Neville, S.(2003). Loneliness, health and depression in older males. Aging Mental health, vol. 7,212-216. [10]. Cohen-Mansfield, J., Parpura-Gill, A. (2007). Loneliness in older persons: a theoretical model and empirical findings. Int. psychogeriatr, vol.19:279-295. [11]. Victor, C., Scambler, S., Bond, J., Bowling, A. (2000). Being alone in later life: loneliness, social isolation and living alone. Rev Clin Gerontol, vol.10,407-417. [12]. Weiss, R.S. (1973). Loneliness. The experience of emotional and social isolation. The MIT press, Cambridge, Massachusetts and London, England. The Massachusetts institute of technology, pp.87-188. [13]. Anderson, L. (1998). Loneliness research and interventions: a review of the literature. Aging Mental health, vol.2,264-274. [14]. Jylha, M. (2004). Old age and loneliness: cross-sectional and longitudinal analysis in the Tampere longitudinal study on aging. Can J aging, vol 23:157-168. [15]. Creecy, R.F., Berg, W.E, Wright, R. (1985). Loneliness among the elderly: A casual approach. J Gerontol vol.,40:487-493.
Priyanka Singh "Identifying Mental Health in Context of Psychological Understanding " International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 3, March 2013, pp.176-177 URL: www.ijltemas.in/DigitalLibrary/Vol.2Issue3/176-177.pdf