Higher Education in India– New Insights for Innovations in Learning Process
The Indian higher education system is the third largest in the world, after China and the United States. There has been an exceptional growth in number of universities, colleges as well as enrolment in higher education system particularly during last 15 years. The ratio of professional to non-professional enrolment has been almost 1:3. Key challenge before higher education system in India is to make it relevant and purposive, so that it responds to societal needs and enables students to get meaningful employment opportunities. The areas in which there is a need to come out with policy perspective at macro level and innovations at institutional level are - Quality and Excellence, Equity and Access & Inclusion. There is a dire need for the teaching community to keep coming out with innovations in teaching-learning process, in particular in the areas of curricula, pedagogy, and assessment which should make learning an enjoyable experience and more and more purposive to the societal needs. This paper attempts to identify specific areas of innovations in higher education system to improve the quality of higher education, so as to make it relevant and purposive to societal needs. The strategy to innovate has to take care of local and global dimensions of multiple sources of learning such as – networked learning, life-long learning, world class learning with local and international perspective. Above all, higher learning has to imbibe a framework of flexibility by introducing a modular structure which can be taken as per the desired pace of understanding of the student, implying a possibility of completing the degree programme in shorter or longer duration and a choice-based learning that allows the student to opt for interdisciplinary courses of his liking and interest as a part and parcel of curricula to complete his degree programme.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
An Effective Intrusion Detection System for correction and detection of Gray Hole attack in MANETs
Mobile Adhoc Networks is a collection of wireless mobile nodes, which form temporary networks without relying on any existing infrastructure or centralized administration or standard support services regularly available in wide area networks to which the host may normally be connected. In this paper the simulation results has been compared between previous & current approach for the correction and detection of Gray Hole attack in MANETs and all the results are taken by NS2 Simulator.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Corporate governance in the financial services sector of Pakistan
The main purpose of this paper is to overview the goal and objectives of corporate governance from the theoretical perspective within the financial sector of Pakistan. This sector has experienced some high profile corporate scandals in all over the world, for example BCCI, Baring Bank, and Equitable life. The corporate governance structure set the rules and regulations for the distribution of rights and responsibilities among different stakeholders to avoid fraud. In this conceptual paper first the broad parameters of corporate governance are discussed, from a theoretical perspective, and specific characteristics are derived from theoretical knowledge that is applicable to financial services sector of Pakistan. Different issues are examined and the extent to which they have been addressed by contemporary academic or policy-related studies is considered. The main focus of this paper is banks. The key issue arising is the rapid changes brought about by globalization, deregulation and technological advances are increasing the risks in banking systems. External regulators, SECP, and auditors should play significant role to minimize these risk and should encourage sound governance practices. One avenue of future research would be to assess the effectiveness of compliance in the Pakistan; given that financial companies have obligations concerning code provisions. Some key issues pertaining to corporate governance in financial services are addressed, highlighting their significance to encourage further research by academic and practitioners in the field.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
In wireless sensor network vis global snook armor demeanor privacy
In sensor network many protocols have been developed for the purpose of confidentiality, contextual information, providing security for the content of message and transferred over network .It become a complex session for sensor network (ie, locating target objects in monitoring application, as well as protecting information). There have been several recent works on location privacy. It will be concise for the adversary and can capture only network-traffic in small area. The proposing system is the location privacy in large sensor networks. The antagonist model, global eavesdropper has become real and vanquishes existing techniques. We also propose two techniques that protect the information: recurrent location and provenance bluff. It provides a extreme level of location privacy while the other provides trade-off between privacy, cost for communication, latency. The squander view method is used to monitor the attacker within a small time of sequence. These techniques are efficient and effective in sheltering location information from attacker.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Viable intrusion detection on static and dynamic resource allocation on wireless adhoc network
Control architecture for resource allocation in satellite networks is proposed, along with the specification of performance indexes and control strategies. The latter, besides being based on information on traffic statistics and network status, rely upon some knowledge of the fading conditions over the satellite network channels. The resource allocation problem consists of the assignment, by a master station, of a total available bandwidth among traffic earth stations in the presence of different traffic types. Traffic stations are assumed to measure continuously their signal fade level, but this information may either be used only locally or also communicated to the master station. According to the information made available on-line to the master station on the level of the fading attenuation of the traffic stations, the assignment can be made static, based on the a priori knowledge of long-term fading statistics, or dynamic, based on the updated measurements. In any case, the decisions can be adapted to slowly time-varying traffic characteristics. At each earth station, two basic traffic types are assumed to be present, namely guaranteed bandwidth, real-time, synchronous data (stream traffic), and best effort traffic (datagram traffic). Numerical results are provided for a specific architecture in the dynamic case, in a real environment, based on the Italian satellite national coverage payload characteristics.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Design of coding schemes with low peak to average power ratio for OFDM systems
A coding scheme for OFDM transmission is proposed, exploiting a connection between pairs of Golay complementary sequences and second-order Reed-Muller codes. Using a realization of 16-QAM or 64 QAM constellation as the vector sum or two or three QPSK constellation respectively we construct 16 QAM and 64 QAM sequences having low PAPR. In this paper, we further examine the squared Euclidean distance of these M-QAM sequences and their variations. Our aim here is to combine the block coded modulation (BCM) and Golay complementary sequences to trade off the PAPR, the code rate, and the squared Euclidean distance of M-QAM OFDM signals
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Data hiding images using spread spectrum in cloud computing
Communication is the god given gift that enables intellectual and cultural exchange and builds up our competence in social behaviour. So now we are living in the information age. The internet and cloud computing has taken communication to unimaginable attitudes. Cloud computing entrusts remote services with a user's data, software and computation. But many questions arise when we think of security. Is Cloud computing communication private and security? But encrypted messages can still be tracked revealing who is talking to whom. The term Cloud Computing refers to the concept where the shared servers provide resources such as data, software to the clients. In order to use a Cloud service all you need is a web browser and an internet. The biggest Disadvantage in cloud computing is the data security. Because the data that is being stored in the cloud will be stored in the cloud provider’s server and hence this results in hacking of data by unauthorized person. In the business model using software as a service, users are provided access to application software and databases. The cloud providers manage the infrastructure and platforms on which the applications run. In this paper we gave our proposal, how we can secure our data in cloud computing. Our idea is based on implementing the Spread spectrum Image. Steganography’s (SSIS) in cloud computing platforms .we hope it will be very beneficial for the user who loves cloud platform but hesitating to use because of the data security issue.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Gasoline Subsidy and Government Expenditures in Iran: An Empirical Analysis (1971-2004)
The purpose of the present paper is to deal with the economic effects of gasoline subsidy on government expenditures in Iran's. To do so, we have used time series data for the period 1971-2004 and concentrated on the ordinary least square (OLS) method to estimate the relevant regression models. The results show that there has been a positive and significance relation between gasoline subsidy and government expenditures during the period under consideration .In order to alleviate the burden of gasoline subsidy on government budget, it is suggested that government emphasize on policies to reduce the gasoline subsidy which is mainly benefited the upper income bracket of the countries and move towards the guided subsidies. Also the economic liberalization and promotion of private sector introduced in Iran 4th economic plan needs more reliable support from all policy makers of the country.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Separation and Extraction of Co(Ii) using Mesoporous Organo-Silicas and determination By FAAS
A novel and selective method for the fast determination of trace amounts of Co(II) ions in water samples has been developed. The procedure is based on the selective formation of Co(II) ions using mesoporous organo-silicas mesoporous silica at different pH followed by elution with organic eluents and determination by atomic absorption spectrometry The preconcentration factor was 100 (1 ml elution volume) for a 100 ml sample volume. The limit of detection of the proposed method is 1.0 ng ml?1. The maximum sorption capacity of sorbent under optimum conditions has been found to be 5mg of Co per gram of sorbent. The relative standard deviation under optimum conditions was 3.0% (n = 10). Accuracy and application of the method was estimated by using test samples of natural and synthetic water spiked with different amounts of Co(II) ion.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Energy and exergy analysis of drying process of banana slices
In this study, estimation capabilities of response surface methodology and optimization acceptability of desirability functions methodology in an air drying process were investigated. The air temperature, air velocity, drying time and banana thickness were selected as independent factors in the process of drying banana slices. The dependent variables or responses were the moisture content, drying rate, energy efficiency and exergy efficiency. A rotatable central composite design as an adequate method was used to develop models for the responses. The regression coefficient, regression equation and analysis of variance (ANOVA) was also obtained to analysis of responses. In addition to this 3D response surface plot were helpful to predict the results by performing only limited set of experiments. Simultaneously, a minimum value for the moisture content and maximum value for the other responses was desired. Finally desirability functions found a maximum desirability equal to 0.49.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]