A Rare Implementation of a Mobile Messenger
A method and system for finding a person using a mobile messenger service in a mobile communication terminal including a global positioning system (GPS) module are provided. The method includes providing a location finding method using a mobile messenger service, the method comprising: providing a mobile messenger service to a mobile communication terminal in which a position detecting module is provided; receiving information on access to the mobile communication terminal and information on registration of counterpart mobile communication terminals registered with the mobile messenger service, so as to generate information on locations of the mobile communication terminal and the counterpart mobile communication terminals and to generate map information to which the location information is mapped; and providing the map information to the mobile communication terminal.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A study on consumer perception towards pen
Pen is a product, which has used by each and every person. There are various brands of pen in the market of different types of price, colour, design, grip, attractive ink, attractive body, etc. So the pen market is full of competition where the consumer possesses vast variety of choice to select his/her brand which depends on their perception. It is very difficult to find the consumer perception about pen, even though the present study tried to find how the consumer purchase and prefer the brand, what factors influence the purchase of preferred brand of pen? The technique of data collection is through questionnaire. The sampling technique used for this project is convenience sampling. A closed ended with suitable scaling, open ended questions and discussion with the respondents was used to collect the required primary data. In this survey primary data were collected through interview schedule and mall intercept. Statistical tool used for analysing the data are cross- tabulation, Chi-Square- Goodness of Fit, Friedman Test.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A Study on Effect of Single Additive Outlier on Estimation of Value at Risk and Expected Shortfall under Peaks over Threshold Framework
Value at Risk (VaR) is one of the most popular measures of risk associated with financial instruments. The generalized Pareto distribution (GPD) is useful in modeling values exceeding a high threshold in estimation of VaR and Expected Shortfall (ES). It has been observed that none of the existing methods for estimating parameters of GPD performs uniformly better than others (P. Z. Bermudez and S. Kotz, 2010), and even if one develops a method, it would suffer from heavy computational requirements. Recently, P.Chen et.al (2017) proposed a method of estimating parameters of GPD based on minimum distance approach and M-estimation. In literature survey it has been observed that a study on effect of outliers on estimation of parameters of GPD has not been carried out, though presence of outliers is common in financial data. In this regard this paper focuses on the effect of outliers on estimators of parameters of GPD, on estimators of VaR and estimators of ES under Peaks over Threshold (PoT) framework obtained from different methods. A simulation study is carried out to compare performances of five robust and seven non-robust methods for estimating parameters of GPD, VaR and ES in the presence of a single additive outlier under PoT set up and it is found that robust methods suggested by P.Chen et.al (2017) for estimating GPD parameters perform on par with other estimators when shape parameter k > 0 (for thin tailed distributions), in estimating VaR in presence of outlier, especially when sample size is moderately large
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A Survey on Intrusion Detection Techniques and Sceneraio for Intrsuion Mechanism
Security has become the greatest problem within and outside the organizations. User ID, passwords and firewalls are the common steps that organizations take to secure their computers. However, these are not so effective mediums in current context of unsecure eon. Intruders and attackers are so advanced that they access the computer and manipulate it, so they cannot be traced easily. Through this contribution objective is to find out & present existing intrusion detection system (IDS) with their pros and cons that will be helpful to select the best one and provide the secure environment so that system will be protected from instrusion and attacks.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Advanced health monitoring and receiving using smartphone in global networks
A healthcare solution that combines android mobile and IPv6 techniques in a wireless sensor network to monitor the health condition of patients and provide a wide range of effective, comprehensive, and convenient healthcare services by using global network. With advances in mobile communication, new opportunities have opened up for the development of healthcare systems that remotely monitor biomedical signals from patients. In this different type of sensors can be used to measure body level of patient in different location such as heart rate, blood pressure, haemoglobin, temperature. A visualization module of the server program graphically displays the recorded biomedical signals on Android mobile devices used by patients and doctors at the end of the networks in real-time. These data’s can be transmitted through the Bluetooth, which is received by the smart phone in another location. With the help of GSM we can access human body level from anywhere. A low-power embedded wearable sensor measures the health parameters dynamically and is connected according to the concept of IPv6 over low-power wireless personal area network to the M2M node for wireless transmission through the internet or external IP-enabled networks via the M2M gateway.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
American New Sanction Against Iran: Challenges for Economic Growth
The article is dedicated to investigation of two basic problems: (i) would bring the U.S. sanctions imposed on Iran to minimizing and even to cancelling the oil exports from this country? (ii) what impact would have those sanctions on the country’s economic growth? For the survey we have used two methods. Primo, we have explored oil export structure from Iran and have studied oil import organization of the major commercial counterpart states trying to clarify if they would be able to substitute oil imports from Iran by alternative sources. And, secundo, we have drawn a statistical model, which links Iranian GDP with oil exports. Such a model was necessary for investigating probable undulations in the Iran GDP due to changing volume of exporting oil. Investigation results are important and may have huge geopolitical corollaries as follows: (i) In medium-term run President Trump’s administration measures to cause serious economic obstacles for economic development of Iran will be unsuccessful. (ii) USA has no means and geopolitical instruments to bring oil exports from Iran to zero. (iii) Hence, even if it is done, these measures will cause difficult but not dramatic consequences for economic life of this Islamic country, which would create complications for development of civil society in Iran. Moreover, the desire of President Rouhani to modernize the Iranian society will fail, and Islamic Revolutionary Guard Corps, weakened under the Rouhani’s presidency, will regain momentum. (iv) Thus, President Trump’s measures will cause just the back effect than the target he wanted to reach, and (v) The sole possibility to provoke democratic movements within the Iranian society is to imply the country into international energy projects, in which Rule of Law is governing partnership relations.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
An analysis of social cohesion through interaction: a preliminary study in penang, Malaysia
This article discusses about the preliminary study of the social cohesion level among ethnics in Penang. The purpose of this study is to explore the extent of social cohesion that exists among the Malays, Chinese and Indians, through their daily interactions. A total of 90 respondents were surveyed in this study. The study found that the level of social cohesion between these three ethnic groups; Malays, Chinese and Indians are less satisfactory. The Chinese respondents have full daily interaction (100 percent) with other Malays but only 83 percent of Indian respondents and 60 percent of Malay respondents have daily interaction with other Chinese. However, for the location of the interaction, all three ethnic groups studied recorded the highest number of daily interactions in their workplace. More than 30 percent of respondents found among the Indians and Chinese had never interacted with other ethnic groups in school. Overall, the findings showed an alarming level of social cohesion because more than 20 percent of Indians have bad relationship with other Chinese and Malays and 49 percent of the Chinese have very bad relationship with other Indians and Malays.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
An efficient accident notification system in VANETs using ILCRP
An accident notification system for a vehicle includes a degree of damage predicting system that detects whether the vehicle occupant has been injured in an accident. It consists of position monitoring system that monitors the position of the vehicle. If any accident occurs, the mobile communication terminal receives the signal and it informs to the nearest hospital about the accident, so that the occupant can be rescued soon and gets treatment. This project can be used in the areas where there is no one to help the injured occupant when they are met with an accident. It also makes note of the databases of the persons in and around the accidental area. This will be helpful for the police in further investigations.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Application of simulation of queue network for reengineering of business processes (case study: process of remittance and withdrawal from bank current account (ordinary and golden)
Systems simulation is growth rapidly as one of the most useful management tools today. This article tries to model and finally improve process of remittance and withdrawal from current account (ordinary and golden) of bank with use of discrete simulation methodology. For this purpose, the said process is identified and then a logical model is simulated with use of ED model (Enterprise Dynamic) for identification of the said model process and data relating to each entity is obtained with use of chronometry and then sample volume has been calculated. For validation and confirmation of the model, a comparison between results of simulation and real measurement has been made by statistical tests. In the next stage, two criteria which include output of the customers and average waiting time of the customers are selected and some suggestions were presented for improvement of remittance and withdrawal processes with regard to the obtained results.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Applying mining techniques to predict traffic condition in roadway network
Vehicle traffic is experienced everyday by millions of people in day-to-day life. To overcome the problems there emerged a need for an effective traffic prediction system. An efficient prediction method reduces the traffic congestion and allows us for optimal usage of resources. In this paper we propose a traffic prediction system that uses a series of clustering and prediction techniques on the data set and has been used to predict the traffic flow over a road point. This is performed by finding the similarity value, we can quantify the influence of that Road points over others and this method will provide you a prior knowledge about traffic congestion so that user can plan to avoid vehicle traffic.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]