A simple route for the synthesis single-crystalline Mg2B2O5 nanowire bundles
Single-crystalline magnesium borate Mg2B2O5 nanowires in bundle form have been synthesized via a simple route based on heating a precursor powder made of aqueous solutions of magnesium chloride and de-sodium tetraborate with citric acid. The results show that each bundle composed of nanowires of high-purity with diameter of approximately ca. 90 nm and lengths up to a few micrometers. The effect of citric acid, the optimum experimental parameters and possible growth mechanism for the compound nanowires have been presented.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Synthesis, structural, optical, thermal and dielectric studies of 4-aminopyridinium oxalate single crystal
4-aminopyridinium oxalate (4APO), an organic nonlinear optical single crystal has been grown by slow evaporation solution growth technique. Single crystal X-ray diffraction studies were carried out to determine the unit cell parameters.4APO crystallizes in monoclinic system. The grown crystal has been characterized by Fourier transform infrared and UV-Visible spectral studies. Thermogravimetric analyses (TGA) and differential thermal analysis (DTA) have been carried out to study the thermal behavior of the grown crystal. The mechanical stability of the grown crystal has been studied by using Vickers microhardness test. The Kurtz and Perry powder SHG technique confirms the NLO property of the grown crystal.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Decentralized information accountability framework for information sharing in cloud environment
Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that user’s data are usually processed remotely in unknown machines that user’s do not own or operate. While enjoying the convenience brought by this new emerging technology, user’s fears of losing control of their own data (particularly, financial and health data) can become a significant barrier to the wide adoption of cloud services. To address this problem, a highly decentralized information accountability framework is proposed to keep track of the actual usage of the user’s data in the cloud. In particular, an object-centered approach that enables enclosing the logging mechanism together with user’s data and policies. The JAR programmable capabilities are leveraged to both create a dynamic and traveling object, and to ensure that any access to user’s data will trigger authentication and automated logging that is local to the JARs. To strengthen user’s control, a distributed auditing mechanism is proposed to be implemented.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Fingerprint authentication using graph theory
In this paper we have tried to implement the idea to classify fingerprints through identifying the core of the fingerprint. The fingerprint is taken as an input via an image. The image is then transformed for necessary preprocessing. Then we make a graph with ridges’ ending and bifurcations all around the Centre, acting as vertices. Then we compare the graph constructed using the connection of vertices. The idea is to calculate distance between neighbouring vertices for each vertex. Our aim is to increase the efficiency of fingerprint identification in different orientation.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Implementation of ZCT precoding based OFDM transmitter system using VHDL
The large Peak to Average Power Ratio (PAPR) of Orthogonal Frequency Division Multiplexing (OFDM) system has undesirable effects on the system such as increase in the complexity of A/D convertor and reduction in the efficiency of power amplifier. In this paper, modified expression of Zadoff Chu sequence, generation of Zadoff Chu sequence using hardware efficient CORDIC algorithm and develop Zadoff Chu matrix transformation (ZCT) precoding based OFDM system to minimize PAPR in OFDM system. Zadoff Chu sequences are class of complex exponential polyphase sequences which has constant amplitude and these sequences posses’ good correlation properties. In ZCT pre coding based OFDM system, ZCT is applied to the constellation symbols before the Inverse Fast Fourier Transform (IFFT). The proposed system is simulated with VHDL and hardware efficient CORDIC algorithm is used for the generation of Zadoff Chu sequence. The achieved simulation results confirm that the proposed methods are capable of reducing the PAPR significantly by 3 dB for N=64 subcarrier and 16-QAM modulation at clip rate of 10-2.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Principal Component Discriminant Analysis: Face Recognition
Images containing faces are essential to intelligent vision-based human computer interaction, and research efforts in face processing include face recognition, face tracking, pose estimation, and expression recognition. The rapidly expanding research in face processing is based on the premise that information about a user’s identity, state, and intent can be extracted from images and that computers can then react accordingly, e.g., by knowing person’s identity, person may be authenticated to utilize a particular service or not. A first step of any face processing system is registering the locations in images where faces are present. However, face registration for whole database is a challenging task because of variability in scale, location, orientation (up-right, rotated), and pose (frontal, profile). Facial expression, occlusion, and lighting conditions also change the overall appearance of face. The Image registration algorithm will register all these images present in the database. The face recognition algorithm which is insensitive to large variation in lighting direction and facial expression is to be implemented. Taking a pattern classification approach, each pixel in an image can be considered as a coordinate in a high-dimensional space. The advantage of this is that the images of a particular face, under varying illumination but fixed pose, lie in a 3D linear subspace of the high dimensional image space—if the face is a Lambertian surface. However, since faces are not truly Lambertian surfaces and do indeed produce self-shadowing images will deviate from this linear subspace. Rather than explicitly modeling this deviation, project the image into a subspace in such a manner which discounts those regions of the face with large deviation. This is achieved by using dimension reduction techniques like Principal component analysis (PCA), Linear Discriminant analysis (LDA), Laplacian faces, and other modified approaches like A Priori Laplacian and PCDA.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
An Empirical Investigation on Role of Human Capital on Foreign Direct investment: The Lucas Paradox Revisited
This paper investigates the role of human capital for the difference of FDI inflows between rich and poor countries “Lucas Paradox.” We conduct a GMM analysis of 50 developed and developing countries over1980-2005. We have utilized a newly developed index that is the focused on weighted HC stock to examine the effects of HC on FDI inflows. Our main finding is that the existence a higher level of HC in developed countries is one of the explanation for the gap of FDI inflows among developed and developing countries. This finding is in line with the Lucas Paradox.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Enhancing database access control policies
Now a days Public and private organizations increase their database system requirement for day-to-day business. Hence database security becomes more crucial as the scale of database is growing. A signified approach for protecting information which enforcing access control policies based on subject and object and their characteristics. There are many security models for database systems. The database security systems have developed a number of different access control policies for assuring data confidentiality, integrity and availability. In this paper we survey the concepts under access control policies for database security. We review the key access control policies such as Mandatory Access Control policy(MAC), Discretionary Access Control Policy(DAC), and Role Based Access Control Policy(RBAC) and propose a concept on RBAC policy that is instead of access control through role assigned to the users, the users are assigned by some level of access control.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Study of Greater Sciatic Notch in Sex Determination of Hip Bone by Metric Method
Identification of sex of an unknown individual from the skeletal remains is the first and the most important step encountered by the forensic experts and archiologists. The hip bone is considered as an ideal bone for sex determination as it provides the highest accuracy levels. Many workers have studied various metric parameters for sexing of hip bone. The present study was done with an aim to find out the sex of hip bone using various parameters of greater sciatic notch. For this purpose, 100 dry hip bones were collected from the Department of Anatomy, VIMS, Bellary. Seven different parameters of the greater sciatic notch were used for the study: Maximum width, Maximum depth, Posterior segment, Index I, Index II, Total angle and Posterior angle. All the parameters (especially posterior segment, posterior angle and index II) were found to be highly indicative of sex hip bone by t- test (p<0.005) except the depth.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
The moderating role of intrinsic motivation to know on the relationship between novelty seeking and video game playing
The present study investigated the moderating role of adolescent’s intrinsic motivation to know on the relationships between novelty seeking and video game playing among 400 Iranian adolescents. Results showed that novelty seeking was significantly related to video game for adolescents who have high level on intrinsic motivation to know. The Current findings highlight the importance the motivation of game on personality traits and video game.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]