Wireless Sensor Network for Energy Efficient Target Coverage
A critical aspect of applications with wireless sensor network lifetime. Power –constrained wireless sensor networks are usable as long as they can communicate sensed data to a processing node. In this paper, we have depicted the over view of the blocks required for the wireless sensor network information about the hardware parts to some extent .These hardware parts are the necessary requirement for enhancement of our work further sensing and communications consume energy, therefore judicious power management and sensor scheduling can effectively extend network lifetime.[1] Moreover, in existed paper which only had few sensor and 8051 processor have been replaced by the efficiently proposed method having PIC processor to be processed along with sensor module which can be of any type based on their availability.[7] This paper propose an efficient method to extend the sensor network life time by organizing the Sensors into a maximal number of set covers that are activated successively. Only the sensors from the current active set are responsible for monitoring all targets and for transmitting the collected data, while all other nodes are in a low-energy sleep mode. By allowing sensors to participate in multiple sets, our problem formulation increases the network lifetime. [3]
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Addition of yattria partially stabilized Zirconia for reinforcement of dental porcelain
The aim of this study was to investigate the effects of addition of Yttria partially stabilized Zirconia powder to dental porcelain being incorporated in 3,5 and 7-percent by weight on some mechanical properties. The measured properties were flexural strength, modulus of elasticity, fracture toughness and hardness. Samples were prepared according to the manufacturers instructions. Zirconia powder was thoroughly mixed with the porcelain powder in the correct weight percent before use. Flexural strength, modulus of elasticity, and fracture toughness were measured using three-point bending test. The hardness was measured using a conventional microhardness tester. All data were collected and analyzed with one-way analysis of variance (ANOVA) and LSD test (p=0.05). The results indicated that the addition of 3 % and 5 % of Yttria partially stabilized Zirconia to the conventional dental porcelain powder resulted in increased flexural strength and fracture toughness of the porcelain. On the contrary, 3 % and 5 % zirconia decreased both the modulus of elasticity and hardness. In addition, 7 % zirconia decreased all tested properties. X-ray examination showed that zirconia addition increased the radiopacity of the material. It was concluded that zirconia-modified dental porcelain was stronger and tougher than the conventional unmodified ceramic.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A survey on anomaly and signature based intrusion detection system(IDS)
Denial of Service (DoS) and Distributed DoS (DDoS) attacks are evolving continuously. These attacks make network resources unavailable for legitimate users which results in massive loss of data, resources and money. Combination of Intrusion detection System and Firewall is used by Business Organizations to detect and prevent Organizations? network from these attacks. But this combination cannot prevent network from novel attacks as Signatures to detect them are not available. This paper presents a light-Weight mechanism to detect novel DoS/DDoS (Resource Consumption) attacks and automatic Signature generation process to represent them in real time. Experimental results are provided to support the proposed mechanism.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Boost Enhancing Electronic Teaching Material (ETM) of Modern Physical Education Practice (PEP) pedagogical Technology Over Problem-Based Learning
The article aims to increase enhancing Electronic Teaching Material (ETM) of modern (PEP) pedagogical technology, which adopted in the teaching of faculties and some universities can’t match instructional requests currently, while (ETM), which combines multimedia image, visibility and good stereo characteristic features, and robust interaction with computer-assisted learning coursework and develop high capacity, has been common learning resources through different topics. In comparison with traditional teaching material, the electronic teaching material (ETM) can explain major and difficult points in teaching over more perfect teaching design, suitable teaching media chose and implement of multimedia, such as, diagram, icon audio effect, video and animated cartoon .Beginning of the request to build (ETM) based on modern (PEP) pedagogical technology ,this study will explicit increasing enhancing multimedia (ETM) of modern (PEP) pedagogical technology under the design idea electronic teaching material (ETM ) of modern physical education practice (PEP) pedagogical technology, it necessity to meet instructional needs for both lecturers and learners.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
An Improved Association Rule Mining with correalation technique
Construction and development of classifier that work with more accuracy and perform efficiently for large database is one of the key task of data mining techniques [l7] [18]. Secondly training dataset repeatedly produces massive amount of rules. It’s very tough to store, retrieve, prune, and sort a huge number of rules proficiently before applying to a classifier [1]. In such situation FP is the best choice but problem with this approach is that it generates redundant FP Tree. A Frequent pattern tree (FP-tree) is a type of prefix tree [3] that allows the detection of recurrent (frequent) item set exclusive of the candidate item set generation [14]. It is anticipated to recuperate the flaw of existing mining methods. FP –Trees pursues the divide and conquers tactic. In this paper we have adopt the same idea of author [17] to deal with large database. For this we have integrated a positive and negative rule mining concept with frequent pattern (FP) of classification. Our method performs well and produces unique rules without ambiguity
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Biochemical Values of the fresh water fishes Channa punctatus and Channa striatus (Bloch)
Alive freshwater fishes Channa punctatus and C. striatus were collected from freshwater bodies of Cauvery delta and their s parameters were thoroughly studied. RBC and WBC count, haemoglobin content and haematocrit were showed slight fluctuation. The range of different in biochemical parameter of these species are RBC 3.29 ? 106 to 3.42 ? 106/cumm; WBC 4.3 ? 103 to 4.6 ?103/cumm; Hb 9.37 to 10.84 g/dl; PVC 34.42 to 36.14 %/dl; MCV 104.62 to 105.67 ?m3, MCH 24.09 to 28.48 Pg/dl; MCHC 27.22 to 29.99 g/dl. The serum protein, albumin and cholesterol were found to be slightly higher value in C. punctatus than C. striatus. The globulin and triglycerides showed elevated level in C. striatus. The average values of protein content showed higher value when compared to cholesterol and glucose. The present study suggested that these fishes are important sources of animal protein and good for human health.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Simulation & Synthesis of a Cryptography Processor for Portable Electronic Devices
Cryptography circuits for portable electronic devices provide user authentication and secure data communication. These circuits should, in general, occupy small chip area, consume low power, handle several cryptography algorithms, and provide acceptable performance. This paper presents the simulation and synthesis of three standard cryptography algorithms on a universal architecture. The cryptography processor implements both private key and public key algorithms and meets the power and performance specifications. The mentor graphics modelsim tool is used for design and simulation and also Synopsys Design Compiler tool is used for synthesis. TSMC 65nm library is used for the synthesis.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Analysis of distributed delay jitter Control in QOS networks
We study jitter control in networks with guaranteed quality of service (QoS) from the competitive analysis (as mentioned in [1]) point of view. we analyze on-line algorithms for single jitter regulator that control jitter and compare their performance to the best possible by an off-line algorithm as proposed in [1]. For delay jitter, where the goal is to minimize the difference between delay times of different packets, we show that a simple on-line algorithm using a buffer of B slots guarantees the same delay jitter as the best off-line algorithm using buffer space B/2. We prove that the guarantees made by our (proposed in [1]) on-line algorithm hold, even for simple distributed implementations, where the total buffer space is distributed along the path of the connection, provided that the input stream satisfies a certain simple property. The significance of the results is that it proves the on-line algorithm to be the best possible algorithm to reduce delay jitter for a given buffer size B. The main argue is even if both the distributed and non distributed algorithms get same jitter which one has more advantage. We focused on the advantages of distributing the buffers. The algorithm in its original form is applicable only to a fixed number of packets. We extend the results to a more practical model in which we compare off-line algorithm with n inputs and on-line algorithms with n1 (>n) inputs.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Enhancing to detect face automatically from input videos using multiple algorithms
This research work proposes a novel technique for Automatic face recognition (AFR) system using cascaded structures and clustering network. Human beings at a very early age are capable of recognizing the varying facial features, due to the Human Visual System (HVS). But it’s difficult to depict the human visual system using computer vision system. The basic idea used in this proposed work is to use divide and conquer method, where we design a particular approach for each processing stage and then embedding the entire strategy for AFR system. In this proposed work, two important factors namely cost efficiency and applied technology for varying characteristics of input image are considered respectively, irrespective of the traditional factors such as accuracy, retrieving rate etc. For facial detection, a heterogeneous cascaded detector based on various features is designed to increase the processing capability and detecting efficiency respectively. For facial feature extraction, sparse graph, component based direct fitting and component based texture fitting methods are used to extract the various features at different orientations.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Study investigative method and teaching techniques based on it (a new approach to education)
Education students, as if they were happy, and obtain the necessary skills to solve problems and enable to proper decisions about their personal and social issues, is sightly scholars of Training and practitioners, and policy makers of education. This requires the use of modern teaching methods in education. One of the new methods of teaching that has many applications is discovery. Discovery method is based on learning search process and explains phenomena. In this paper, in order to be familiar with this approach, concepts, nature, structure and teaching methods are defined based on the discovery. Teaching techniques, such as exploratory learning and experimental Teaching methods.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]