UPLAONKAR D S S
037157 UPLAONKAR D S S (Agricultural Sciences Univ, Karnataka - 580 005, Email: uplaonkarshilpa16@gmail.com) : Usage and awareness of OPAC by faculty of university library, university of agricultural sciences, Dharwad. Libr Prog 2020, 40(1), 87-91.
OPAC is an interactive search module of an automated library management system. Any type of reading materials is searched directly from the managed database of the library. Catalogue is the face of the libraries and the Online Public Access Catalogue (OPAC) changed the conventional card catalogue structure. This paper presents and analysis online public access catalogue services provided by university library, university of agricultural sciences, Dharwad. It also discusses the purpose, frequency, awareness on use of OPAC. The result of the study shows that the faculties of UASD are aware about use of OPAC and regularly using to trace the library holdings by Title, Author, Subject, etc.
5 tables, 9 ref
DHIMAN D A K, JOSHI S
037155 DHIMAN D A K, JOSHI S (Gurukul Kangri Univ, Uttarakhand - 249 404, Email: akvishvakarma@rediffmail.com) : Use of social networking Sites/Web 2.0 tools: A study of central universities of delhi. Libr Prog 2020, 40(1), 65-72.
Social networking sites (SNSs) / Web 2.0 tools are the results of advancement in information technology which are gaining their importance not only in social life but also showing their presence in educational organizations. It is seen, now a day's, everyone is connected with each other by means of various social networks like Twitter, Facebook, LinkedIn, Blogs, etc. which is an effective medium to share the knowledge and skills of the users. SNSs are also offering the opportunity to reach out to its clients. Hence, the number of universities which adopt SNSs are increasing. The present study is an investigation of five central universities of Delhi which are making use of social networking tools / web2.0 tools in one or other ways in their websites.
2 illus, 5 tables, 10 ref
PRAKASH S, SHARMA D S K
037154 PRAKASH S, SHARMA D S K (Mewar Univ, Rajasthan - 312 901, Email: sanjaysharmalib@rediffmail.com) : Electronic resources (ER) for information retrieval of medicinal and aromatic plants (MAPs) research in the digital era. Libr Prog 2020, 40(1), 55-64.
With the growing worldwide in internet conservation, cultivation and use of medicinal, aromatic and other related groups of plants, there has been a four-fold increase in the volume of literature published on these crops during last two decades. This dynamic scenario demands constant updated inflow, documentation and management of accrued of knowledge, which is now-a-days largely available on electronic media and can be accessed through E-journals, scholarly databases, information gateway internet, E-Books, E-magazine and E-News letters. The current issues in MAPs research largely revolve around the production, post harvest management, value–chain alignments, profitability, efficiency and sustainability. To meet the challenges and requirements of globalization, intellectual property rights, agri-export, market intelligence and related issues adequately and successfully, developing countries like India must reorient their R&D priorities on a real time scale for which toolsfor fast retrieval of information must be developed for which refined on priority. An organized method for retrieval of nascent information is likely to play a very crucial role in this mission. But most of the information is highly scattered in various kind of information resources and their retrieval is so complex and cost intensive that it may not be affordable by every developing country. Therefore, efforts have been made in this paper to identify and list the electronic resources which are exclusive in nature is and are freely available on internet.
3 tables, 24 ref
SANTOSH D, S K V, P A S
037152 SANTOSH D, S K V, P A S (Library and Information Science Dep, Dr. Babasaheb Ambedkar Marathwada Univ, Maharashtra - 431 004, Email: khapardevaishali@gmail.com) : Mapping of world publications: Sydenham chorea disease. Libr Prog 2020, 40(1), 34-43.
The present paper focuses on Mapping of World Publications: Sydenham Chorea Disease. Which has given on PubMed database for during the year 2000 to 2018? There are total 9799 documents on Sydenham Chorea Disease. It discusses on ascertain the Sydenham chorea research of documents, ranking of most prolific authors, institution-wise distribution of publications. Concept mapping is a general method, it is particularly useful for helping social researchers and research teams develop and detail ideas for research and, it is especially valuable when researchers want to involve relevant stakeholder groups in the act of creating the research project. Although concept mapping is used for many purposes strategic planning, product development, market analysis, decision making, measurement development we concentrate here on its potential for helping researchers formulate their projects. The main objective of the study is to analyze the to ascertain the Sydenham chorea research output in world during 2000 to 2018. The specific objectives of the study are, Publication output, Share and Rank of Top 25 Most Productive countries in Sydenham chorea research during 2000-2018. etc.
4 illus, 6 tables, 9 ref
SHEHU A B, SINGH K P, OYIZA H O
037151 SHEHU A B, SINGH K P, OYIZA H O (Library and Information Science Dep, Delhi Univ, Delhi –110 007, Email: Kpsingh330@gmail.com) : Present status of information and communication technology in nigerian academic libraries: A review of literature. Libr Prog 2020, 40(1), 25-33.
Application of information and communication technologies to academic libraries has brought remarkable improvement to various services offered by the library, ICT has improved efficiency and influenced changes from storehouses to knowledge management centers, however application of ICT in developing economies like Nigeria is still in budding stage, application and utilization of ICT is marred with various challenges, this paper attempts to review the status of ICT in academic libraries of Nigeriakeeping in view benefits, challenges, ICT competence of library and information science professionals. itis hoped that the present studies will guide the library and information professional and management staff on effective application of ICT, understanding the need and relevance of ICT skill acquisitions by the library and information science professionals.
ref 40
JOE A A F, GOPAL A, PANDIAN R
035875 JOE A A F, GOPAL A, PANDIAN R (Sathyabama Institute of Science and Technology, Tamil Nadu, Email: annefrankjoe@gmail.com) : Performance evaluation of chemometric prediction models—key components of wheat grain. J Sci Ind Res 2020, 79(02), 148-52.
The present study was aimed to evaluate the accuracy of using near-infrared spectroscopy (NIRS) for predicting protein, moisture, starch and ash content values of wheat. The physiochemical properties of wheat were predicted using twelve prediction models of preprocessing coupled with regression tools. The performance measure of SVM aided with extended multiplicative scatter correction gave confident prediction results of protein, moisture, ash and starch content with R2 values of 0.989, 0.987, 0.976, 0.998 and RMSECV values of 0.263, 0.285793, 0.369 and 0.03 respectively. These results indicate the practical applicability of NIRS in wheat grain quality profiling.
2 illus, 2 tables, 16 ref
PRASHANTH K D, PARTHIBAN P, DHANALAKSHMI R
035874 PRASHANTH K D, PARTHIBAN P, DHANALAKSHMI R (National Institute of Technology, Tiruchirappalli- 620 015, Email: parthee_p@yahoo.com) : Evaluation of the performance and ranking of suppliers of a heavy industry by TOPSIS method. J Sci Ind Res 2020, 79(02), 144-7.
The purpose of this paper is to evaluate the performance of the suppliers of a heavy industry and to rank them based on their performance by using Multi Criteria Decision Making Tool (MCDM) – TOPSIS Method. The Criteria and Sub Criteria for the supplier performance evaluation has been decided by a team of experts from the manufacturing industry. DEMATEL is used to calculate the weightage of the criteria and TOPSIS is used to evaluate and rank the suppliers based on these criteria. This paper ranks the suppliers of the industry based on their performance. It also provides a clear picture about various factors affecting the performance of the suppliers. This research provides an insight to all the suppliers as to where they stand with respect to their performance. It helps them identify the factors in which they need to strengthen in order to improve their performance. It also provides a competitive environment for improving their performance which ultimately aids the manufacturing industry with better results from the suppliers.
2 illus, 2 tables, 14 ref
WOO K H, PARK S Y, SAWNG Y W
035870 WOO K H, PARK S Y, SAWNG Y W (Management of Technology Dep, Konkuk Univ, Korea, Email: sawng@konkuk.ac.k) : A comparative study on the impact of the capabilities of manufacturing and service firms on export performance: Focusing on the interaction effect of R&D. J Sci Ind Res 2020, 79(02), 128-31.
This paper empirically examined the impact of firm capabilities and the interaction effect of R&D on the export performance of service firms in comparison with manufacturing firms. To this end, a total of 1,968 Korean firms were analyzed: 243 from service and 1,725 from manufacturing, and two-stage analysis was performed using multiple regression and hierarchical regression analysis. This research confirmed that network and customer capabilities played critical roles in the internationalization of service firms and R&D positively interacted with entrepreneurship and customer capabilities for export performance. These findings suggest valuable policy considerations for government trade policy and academic motivation for further research on the capabilities and R&D of service firms.
1 illus, 2 tables, 15 ref
SINGH A, SINGH R K, SINGH J, GOSWAMI A, UPADHYAYA A, SHARMA PC
035823 SINGH A, SINGH R K, SINGH J, GOSWAMI A, UPADHYAYA A, SHARMA PC (ICAR-Central Soil Salinity Research Institute, Karnal -132 001, Email: ranjaysingh_jbp@rediffmail.com) : ‘DUS’ characterization of an endangered salt tolerant radish landrace (Newar). Indian J Tradl Knowledge 2020, 19, 24-32.
In this study, responses to salinity stress of three varieties of radish, viz., ‘Newar’ (landrace), ‘Pusa Mridula’ and ‘White Excel’, were recorded. Additionally, landrace Newar was also characterized for ‘Distinctness, Uniformity and Stability’ (DUS) using 34 descriptors. Results indicated higher salt tolerance in ‘Newar’ as evidenced by relatively early germination and high early seedling vigour than other varieties regardless of the salinity of the irrigation water. Although salinity stress, especially up to 8.0 dS m-1, had no adverse effect on shoot growth in all the varieties, effects on root growth were quite different. While ‘Newar’ exhibited non-significant differences in root fresh weight (RFW) at different salinity levels, ‘White Excel’ displayed nominal variations up to 8.0 dS m-1 salinity and ‘Pusa Mridula’ registered consistent declines in RFW with increasing salinity. ‘Newar’ plants were found to be efficient in Na+ exclusion and in maintaining a favourable Na+ to K+ ratio in their shoots and roots. Further, proline accumulation was much higher in salt treated Newar than in ‘White Excel’ and ‘Pusa Mridula’ plants. Based on DUS descriptors, number of leaves, leaf length, and root length and weight were found to be the major distinguishable characters in Newar.
4 illus, 3 tables, 58 ref
PARNE B L, GUPTA S, CHAUDHARI N S
024974 PARNE B L, GUPTA S, CHAUDHARI N S (Computer Science and Engineering Dep, Visvesvaraya National Institute of Technology (VNIT), Nagpur - 440 010, Email: balu.parne@students.vnit.ac.in) : ESAP: Efficient and secure authentication protocol for roaming user in mobile communication networks. Sadhana 2018, 43(6), 89.
The Global System for Mobile communication (GSM) network is proposed to mitigate the security problems and vulnerabilities observed in the mobile telecommunication system. However, the GSM network is vulnerable to different kinds of attacks such as redirection attack, impersonation attack and Man in-the Middle (MiTM) attack. The possibility of these attacks makes the wireless mobile system vulnerable to fraudulent access and eavesdropping. Different authentication protocols of GSM were proposed to overcome the drawbacks but many of them lead to network signalling overload and increases the call set-up time. In this paper, an efficient and secure authentication and key agreement protocol (ESAP-AKA) is proposed to overcome the flaws of existing authentication protocol for roaming users in the GSM network. The formal verification of the proposed protocol is presented by BAN logic and the security analysis is shown using the AVISPA tool. The security analysis shows that the proposed protocol avoids the different possible attacks on the communication network. The performance analysis based on the fluid flow mobility model shows that the proposed protocol reduces the communication overhead of the network by reducing a number of messages. On an average, the protocol reduces 60 % of network signalling congestion overhead as compared with other existing GSM-AKA protocols. Moreover, the protocol not only removes the drawbacks of existing protocols but also accomplishes the needs of roaming users.
15 illus, 9 tables, 50 ref
EMMANUEL W R S, MINIJA S J
024972 EMMANUEL W R S, MINIJA S J (Computer Science Dep, Affiliated to Manonmaniam Sundaranar Univ, Tirunelveli - 627 012, Email: minijakenson@gmail.com) : Fuzzy clustering and Whale-based neural network to food recognition and calorie estimation for daily dietary assessment. Sadhana 2018, 43(5), 78.
The calorie value of the food items taken by the person in everyday life needs to be monitored to reduce the risk of obesity, heart problems, and diabetes, etc. The calorie estimator in the existing models has reduced accuracy since the calorie value of each food varies with mass. This paper introduces a dietary assessment system based on the proposed Cauchy, Generalized T-Student, and Wavelet kernel based Wu-and-Li Index Fuzzy clustering (CSW-WLIFC) based segmentation and the proposed Whale Levenberg Marquardt Neural Network (WLM-NN) classifier. The proposed CSW-WLIFC based segmentation segments the image based on the existing WLI-FC algorithm. A novel CSW based kernel function is utilized in the segmentation process. Feature vectors such as color, shape, and texture are extracted from the segmented image. The Neural Network is trained with the Whale-Levenberg Marquardt (WLM) model to recognize each food item from the tray image. The proposed calorie estimator calculates the calorie value of each food item. From the simulation results, it is evident that the proposed model has the improved performance than the existing models with the values of 0.999, 0.9643, 0.9627, and 0.0184 for the segmentation accuracy, macro average accuracy, standard accuracy, mean square error, respectively.
12 illus, 3 tables, 39 ref
KASAPBASi M C, ELMASRY W
024971 KASAPBASi M C, ELMASRY W (Computer Engineering Dep, Istanbul Commerce Univ, Turkey, Email: mckasapbasi@ticaret.edu.tr) : New LSB-based colour image steganography method to enhance the eficiency in payload capacity, security and integrity check. Sadhana 2018, 43(5), 68.
Steganography is the technique for hiding information within a carrier file so that it is imperceptible for unauthorized parties. In this study, it is intended to combine many techniques to gather a new method for colour image steganography to obtain enhanced efficiency, attain increased payload capacity, posses integrity check and security with cryptography at the same time. Proposed work supports many different formats as payload. In the proposed method, the codeword is firstly formed with secret data and its CRC-32 checksum, then the codeword is compressed by Gzip just before encrypting it by AES, and it is finally added to encrypted header information for further process and then embedded into the cover image. Embedding the encrypted data and header information process utilizes Fisher-Yates Shuffle algorithm for selecting next pixel location. To hide one byte, different LSB (least significant bits) of all colour channels of the selected pixel is exploited. In order to evaluate the proposed method, comparative performance tests are carried out against different spatial image steganographic techniques using some of the well-known image quality metrics. For security analysis, histogram, enhanced LSB and Chi-square analyses are carried out. The results indicate that with the proposed method has an improved payload capacity, security and integrity check for common problems of simple LSB method. Moreover, it has been shown that the proposed method increases the visual quality of the stego image when compared to other studied methods, and makes the secret message difficult to be discovered.
11 illus, 7 tables, 30 ref
MANDAL J K, DAS S
024966 MANDAL J K, DAS S (Computer Science and Engineering Dep, Kalyani Univ, West Bengal, Email: jkm.cse@gmail.com) : An information hiding scheme in wavelet domain using chaos dynamics. J Sci Ind Res 2018, 77(5), 264-7.
In this paper an information hiding scheme in images has been proposed in transform domain using four point Daubechies Wavelet where Horizontal, Vertical and diagonal coefficients of the transformed matrix are used to embed the secret information which itself scrambled using cross coupled chaotic map with 3.5bpB payload. Transformation coefficients are prehandled through multiplying by π to overcome loss of precession. Embedded matrix is adjusted prior to reverse transformation to obtain optimal change in the embedded images which follows the inverse transformation to produce the embedded image in spatial domain. The results obtained are compared with existing techniques which shows better performance of the proposed scheme in terms of payload and quality of embedded image.
3 illus, 2 tables, 8 ref
TONG L, SUN X, ZHOU Y
024977 TONG L, SUN X, ZHOU Y (Heilongjiang Univ, China, Email: yzhou@aliyun.com) : Simultaneous estimation of QTL parameters for mapping multiple traits. J Genet 2018, 97(1), 267-74.
The analysis of quantitative trait loci (QTLs) aims at mapping and estimating the positions and effects of the genes that may affect the quantitative trait, and evaluating the relationship between the gene variation and the phenotype. In existing studies, most methods mainly focus on the association/linkage between multiple gene loci and one trait, in which some useful joint information of multiple traits may be ignored. In this paper, we proposed a method of simultaneously estimating all QTL parameters in the framework of multiple-trait multiple-interval mapping. Simulation results show that in accuracy aspect, the proposed method outperforms an existing method for mapping multiple traits. A real example is also provided to validate the performance of the new method.
5 tables, 22 ref
SONG X D, SONG X X, LIU G B, REN C H, SUN Y B, LIU K X, LIU B, LIANG S, ZHU M
024976 SONG X D, SONG X X, LIU G B, REN C H, SUN Y B, LIU K X, LIU B, LIANG S, ZHU M (MRI Dep, Hongqi Hospital of Mudanjiang Medical Univ, China, Email: zhuminbio@126.com) : Investigating multiple dysregulated pathways in Rheumatoid arthritis based on pathway interaction network. J Genet 2018, 97(1), 173-8.
The traditional methods of identifying biomarkers in rheumatoid arthritis (RA) have focussed on the differentially expressed pathways or individual pathways, which however, neglect the interactions between pathways. To better understand the pathogenesis of RA, we aimed to identify dysregulated pathway sets using a pathway interaction network (PIN), which considered interactions among pathways. Firstly, RA-related gene expression profile data, protein–protein interactions (PPI) data and pathway data were taken up from the corresponding databases. Secondly, principal component analysis method was used to calculate the pathway activity of each of the pathway, and then a seed pathway was identified using data gleaned from the pathway activity. A PIN was then constructed based on the gene expression profile, pathway data, and PPI information. Finally, the dysregulated pathways were extracted from the PIN based on the seed pathway using the method of support vector machines and an area under the curve (AUC) index. The PIN comprised of a total of 854 pathways and 1064 pathway interactions. The greatest change in the activity score between RA and control samples was observed in the pathway of epigenetic regulation of gene expression, which was extracted and regarded as the seed pathway. Starting with this seed pathway, one maximum pathway set containing 10 dysregulated pathways was extracted from the PIN, having an AUC of 0.8249, and the result indicated that this pathway set could distinguish RA from the controls. These 10 dysregulated pathways might be potential biomarkers for RA diagnosis and treatment in the future.
2 illus, 1 table, 40 ref
PATEL M, CHAKRABORTY A K, BANDYOPADHYAY M, ROTTI C
024975 PATEL M, CHAKRABORTY A K, BANDYOPADHYAY M, ROTTI C (Institute for Plasma Research, Gandhinagar- 382428, Gujarat, Email: milind.patel@iter-india.org) : Performance characterization of a radiation shield baffle structure of a cryocooler based cryosorption pump for INTF. Indian J Cryog 2018, 43(1), 22-6.
To characterize Diagnostic Neutral Beam (DNB) for ITER, a test facility (INTF) is being developed at ITER-India laboratory, in Institute for Plasma Research, Gandhinagar. Operation of the beam source (BS) in INTF is based on the production of an H-- ion beam of energy 100 keV. To meet the requirement of high vacuum in INTF, twelve sets of cryocooler cooled cryosorption based cryopumps are planned of size 3.0m × 0.6m × 0.3m (L×W×D) to be installed in the INTF vacuum vessel. Each cryopump consists of Liquid Nitrogen (LN2 ) cooled 210 black TiO2 , Al2O3 ceramic coated V-shaped chevron baffles arranged in staggered way precisely as radiation shield around cryocooler cooled activated charcoal coated cryopanel, with temperature around 15 – 20K. Each LN2 baffle is connected to four LN2 distribution pipes at four corners of it, maintaining precious gap to ensure sufficient gas molecule transmission through it with negligible photon transmission to cryopanel. The manufacturing of cryopumps employs two important processes which are Black coating of chevron baffles and joining process of total 210 × 4 joints with the LN2 pipes. In the past, cryopumps for SST-1 have been manufactured by utilizing (1) plasma spray technique for black coating (2) TIG brazing for joining pipe to baffles joints. In the present case, while coating is applied using the same spray technique, the joining technology selected is vacuum brazing. The advantage of vacuum brazing is it makes it possible to join large number of baffles at one go, compared to TIG brazing technique which joins the baffles one of one. Emissivity of the black coating was found to be better than 0.9 exceeding the technical specification of 0.8. Adhesion of black coating with the substrate is found to be adequate. Vacuum brazing of coupons have been qualified for the requirements of the joints.
11 illus, 3 tables, 5 ref
SAHA P, NITIN B, SANDILYA P
024973 SAHA P, NITIN B, SANDILYA P (Indian Institute of Technology, Kharagpur- 721 302, Email: profsandilya@gmail.com) : Optimization of the performance of injection cooling system using genetic algorithm. Indian J Cryog 2018, 43(1), 16-21.
Injection cooling is a method to reduce the boil-off loss of cryogenic liquids, and has been applied in space launch vehicles. In this, subcooling due to liquid evaporation into the gas bubble causes a reduction in the liquid boil-off. Extent of evaporation depends on the gasliquid interfacial area, and heat and mass transfer rates. Hence, gas flow rate, gas injection temperature and system configuration have profound effect on liquid subcooling. Optimum values of process variables are needed to maximize the process performance. The present study involves the development of an optimization strategy to minimize the evaporative loss of cryogenic liquid in injection cooling. Genetic Algorithm (GA) has been applied for this purpose as it enables the determination of global optimum values of various process variables. An in-house code has been developed to carry out optimization studies on the injection cooling.
3 illus, 3 tables, 7 ref
VAIDYA M, GARG S, SINGH C, MAHAJAN M M
024951 VAIDYA M, GARG S, SINGH C, MAHAJAN M M (Economics Dep, GGDSD Coll, Chandigarh– 160 030, Email: madhureco@gmail.com) : Changing dimensions of drug patents of Indian pharmaceutical industry. J Intellec Prop Rights 2018, 23(2-3), 111-8.
The Patents Act, 1970 which provided for process patenting led to pharmaceutical revolution in the country as India witnessed a spectacular increase in generic manufacturers. The Patent Act, 2005 however is considered to be a major game changer as it provides for both process and product patents and will set the tone to shift away from reverse engineering to forward engineering. The growth in Patent activity reflects the development in science and technology of the nation. With the passing of Patent Act, 2005 and increase in Intellectual Property (IP) awareness amongst the Indian companies, they seem to be taking IP protection more seriously on a global level. The paper aims to bring about trend, growth and prospects of patenting in Indian Pharmaceutical Sector. Relative Specialisation Index (RSI) for pharmaceutical patents in India vis-à- vis the whole world has been calculated to concur if its trend is uphill. An inter-country RSI analysis of top ten pharmaceutical markets in the world has been conducted to project India’s strength at the world level.
5 illus, 4 tables, 43 ref
LIU J, WANG W, LI X, WANG T, WANG T
024970 LIU J, WANG W, LI X, WANG T, WANG T (System Engineering Coll, National Univ of Defence Technology, China, Email: l.jiajie@yahoo.com) : A motif-based mission planning method for UAV swarms considering dynamic reconfiguration. Def Sci J 2018, 68(2), 159-66.
Influenced by complex terrain conditions of combat environments and constrained by the level of communication technology, communication among unmanned aerial vehicles (UAV) is greatly restricted. In light of this situation, mission planning for UAV swarms under limited communication has become a difficult problem. This paper introduces motifs as the basic unit of configuration and proposes a motif-based mission planning method considering dynamic reconfiguration. This method uses multidimensional dynamic list scheduling algorithm to generate a mission planning scheme based on the motif-based swarm configuration solution. Then it incorporates order preserved operators with NSGA-III algorithm to find Pareto front solutions of all possible mission planning schemes. The feasibility of this mission planning method is validated through a case study.
13 illus, 1 table, 17 ref
SUDARSAN N V, SARSAR R B, DAS S K, NAIK S D
024969 SUDARSAN N V, SARSAR R B, DAS S K, NAIK S D (DRDO-Armament Research and Development Establishment, Pune - 411 021, Email: nvshemrl@gmail.com) : Prediction of shot start pressure for rifled gun system. Def Sci J 2018, 68(2), 144-9.
Determination of short start pressure (SSP) for gun system has always been of paramount interest for gun designers. In this paper, a generalised model has been developed for theoretical prediction of SSP for rifled gun system using dimensional analysis approach. For this, parameters affecting the SSP of the gun like rifling dimensions, driving band dimensions, material properties of driving band, projectile mass and diameter are taken into consideration. For a particular case of large caliber rifled gun system, the model is established using linear relations among dimensionless groups of parameters. The model has been validated by data available from the open literature.
2 illus, 7 tables, 23 ref
ANBARASU B, ANITHA G
024968 ANBARASU B, ANITHA G (Madras Institute of Technology, Anna Univ, Chennai - 600 044, Email: avianbu@gmail.com) : Indoor scene recognition for micro aerial vehicles navigation using enhanced-GIST descriptors. Def Sci J 2018, 68(2), 129-37.
An indoor scene recognition algorithm combining histogram of horizontal and vertical directional morphological gradient features and GIST features is proposed in this paper. New visual descriptor is called enhanced-GIST. Three different classifiers, k-nearest neighbour classifier, Naïve Bayes classifier and support vector machine, are employed for the classification of indoor scenes into corridor, staircase or room. The evaluation was performed on two indoor scene datasets. The scene recognition algorithm consists of training phase and a testing phase. In the training phase, GIST, CENTRIST, LBP, HODMG and enhanced-GIST feature vectors are extracted for all the training images in the datasets and classifiers are trained for these image feature vectors and image labels (corridor-1, staircase-2 and room-3). In the test phase, GIST, CENTRIST, LBP, HODMG and enhanced-GIST feature vectors are extracted for each unknown test image sample and classification is performed using a trained scene recognition model. The experimental results show that indoor scene recognition algorithm employing SVM with enhanced GIST descriptors produces very high recognition rates of 97.22 per cent and 99.33 per cent for dataset-1 and dataset-2, compared to kNN and Naïve Bayes classifiers. In addition to its accuracy and robustness, the algorithm is suitable for real-time operations.
9 illus, 5 tables, 20 ref
SHIM J-Y, KIM H-Y, CHO B-K, YANG S H, MO C, KWON K D, KIM J, LEE W-H
024967 SHIM J-Y, KIM H-Y, CHO B-K, YANG S H, MO C, KWON K D, KIM J, LEE W-H (Biosystems Machinery Engineering Dep, Chungnam National Univ, Korea, Email: wanghee@cnu.ac.kr) : Multivariate analysis of deboning data for classifying Hanwoo (Korean native cattle) by gender. Curr Sci 2018, 114(5), 1075-82.
Gender is an important factor in determining the market price of Hanwoo, but its discrimination is impossible after deboning. This study aims at identifying the variables in Hanwoo deboning data that could be used for gender identification and classification. Deboning data of Hanwoo were analysed by discriminant function analysis. Seven pre-deboning and 24 post-deboning variables were identified and showed 91.3 % and 98.9 % accuracy in gender identification respectively. Discriminant power was 98.9 % on using all 31 deboning variables. This result suggests that physical characteristics of meat parts are suitable factors for classification of beef by gender.
2 illis, 6 tables, 34 ref
ARORA A A, AGRAWAL S S
024965 ARORA A A, AGRAWAL S S (Centre for Development of Advanced Computing, Noida, Email: karunesharora@cdac.in) : Comparative analysis of phrase based, hierarchical and syntax based statistical machine translation. J Sci Ind Res 2018, 77(3), 172-5.
Languages have inherent property of tree-based recursive arrangement of phrases and follow a syntactic grammar. Phrase Based Translation is considered state-of-the-art in the field of statistical machine translation, but does not take into account the above mentioned properties of languages. Hierarchical and Syntax based machine translations are aimed to model these properties of languages. English-Hindi language pair, belonging to two different language families needs conversion of Subject-Verb-Object (SVO) structure of English to Subject-Object-Verb (SOV) structure of Hindi. This paper is aimed to perform comparative analysis of these models for this language pair which demands long distance movement of words or phrases.
1 illus, 3 tables, 8 ref
ABIRAMI K R, SUMITHRA M G
024964 ABIRAMI K R, SUMITHRA M G (Computer Science and Engineering Dep, PSNA Coll of Engineering and Technology, Dindigul- 624 308, Email: ramaabirami1988@gmail.com) : Preventing the impact of selfish behavior under MANET using Neighbor Credit Value based AODV routing algorithm. Sadhana 2018, 43(3), 60.
Mobile Ad hoc Network (MANET) nodes exchange information using the multi-hop wireless communications without the need for any pre-existing infrastructure. Routing protocols of MANET are designed with an assumption that the nodes will cooperate in routing process. To achieve high throughput and reliable communication, the nodes are expected to cooperate with each other. Routing protocol plays a crucial role in an effective communication between nodes and operates on the assumption that the nodes are fully cooperative. Due to the open structure and limited battery-based energy in MANET, some nodes may not cooperate correctly or behave maliciously and such kind of misbehavior impacts the fairness, reliability and efficiency in MANET. Previous work addressed the ways to overcome these kinds of node misbehaviors and attacks. Most of the existing works need time to analyse the neighbor traffic and decide whether a neighbor is behaving maliciously or not. Further, the existing credit-based detection mechanisms may mark a genuine idle node as a malicious node. This work addresses a simple Neighbor Credit Value based AODV (NCV-AODV) routing algorithm for the detection of selfish behavior which avoids such false detection. The proposed idea is implemented in Ad hoc On Demand Distance Vector (AODV) routing protocol and an extensive analysis on the performance of the proposed detection mechanism against the selfish behavior of some MANET nodes are conducted.
6 illus, 1 table, 19 ref
AARTI B, KOPPARAPU S K
024963 AARTI B, KOPPARAPU S K (Electronics and Communication Dep, SNDT Univ, Mumbai- 400 020, Email: artigauri@yahoo.com) : Spoken Indian language identification: A review of features and databases. Sadhana 2018, 43(3), 53.
Spoken language is one of the distinctive characteristics of the human race. Spoken language processing is a branch of computer science that plays an important role in human–computer interaction (HCI), which has made remarkable advancement in the last two decades. This paper reviews and summarizes the acoustic, phonetic and prosody features that have been used for spoken language identification specifically for Indian languages. In addition, we also review the speech databases, which are already available for Indian languages and can be used for the purposes of spoken language identification.
1 illus, 5 tables, 85 ref
BHUVANESHWARI M, PARAMASIVAN B, KANDASAMY A
024962 BHUVANESHWARI M, PARAMASIVAN B, KANDASAMY A (Computer Science and Engineering Dep, National Engineering Coll, Kovilpatti- 628 503, Email: itsbhuvana@gmail.com) : Stochastic dynamic programming model for optimal resource allocation in vehicular ad hoc networks. Sadhana 2018, 43(3), 52.
Vehicular ad hoc network (VANET) is an emerging trend where vehicles communicate with each other and possibly with a roadside unit to assist various applications like monitoring, managing and optimizing the transportation system. Collaboration among vehicles is significant in VANET. Resource constraint is one of the great challenges of VANETs. Because of the absence of centralized management, there is pitfall in optimal resource allocation, which leads to ineffective routing. Effective reliable routing is quite essential to achieve intelligent transportation. Stochastic dynamic programming is currently employed as a tool to analyse, develop and solve network resource constraint and allocation issues of resources in VANET. We have considered this work as a geographical-angular-zone-based two-phase dynamic resource allocation problem with a homogeneous resource class. This work uses a stochastic dynamic programming algorithm based on relaxed approximation to generate optimal resource allocation strategies over time in response to past task completion status history. The second phase resource allocation uses the observed outcome of the first phase task completion to provide optimal viability in resulting decisions. The proposed work will be further extended for the scenario that deals with heterogeneous resource class. Simulation results show that the proposed scheme works significantly well for the problems with identical resources.
7 illus, 3 tables, 19 ref
RANI P I, MUNEESWARAN K
024961 RANI P I, MUNEESWARAN K (Computer Science and Engineering Dep, Mepco Schlenk Engineering Coll, Sivakasi- 626 005, Email: muhilrani@gmail.com) : Emotion recognition based on facial components. Sadhana 2018, 43(3), 48.
Machine analysis of facial emotion recognition is a challenging and an innovative research topic in human–computer interaction. Though a face displays different facial expressions, which can be immediately recognized by human eyes, it is very hard for a computer to extract and use the information content from these expressions. This paper proposes an approach for emotion recognition based on facial components. The local features are extracted in each frame using Gabor wavelets with selected scales and orientations. These features are passed on to an ensemble classifier for detecting the location of face region. From the signature of each pixel on the face, the eye and the mouth regions are detected using the ensemble classifier. The eye and the mouth features are extracted using normalized semi-local binary patterns. The multiclass Adaboost algorithm is used to select and classify these discriminative features for recognizing the emotion of the face. The developed methods are deployed on the RML, CK and CMU-MIT databases, and they exhibit significant performance improvement owing to their novel features when compared with the existing techniques.
8 illus, 11 tables, 27 ref
KHAN M N A, MAHMOOD A
024960 KHAN M N A, MAHMOOD A (Shaheed Zulfikar Ali Bhutto Institute of Science and Technology, Pakistan, Email: dr.naeem@szabist-isb.edu.pk) : A distinctive approach to obtain higher page rank through search engine optimization. Sadhana 2018, 43(3), 43.
Search engine optimization (SEO) pertains to the activity of optimizing individual websites and webpages to get higher page rank in the search results. Websites are ordinarily optimized through back links, while individual webpages are optimized through specific keywords. In this paper, we propose a framework based on set of guidelines for keyword research analysis and back links generation. The proposed framework suggests that webpage content should be based on keywords and the site traffic should be monitored through referrals. We argue that if a website has some prevalent and pertinent keywords in its content and title along with a reasonable amount of back links that help watch the website traffic, then we can get better rank for the website in the search results. The framework also emphasizes that proper keyword selection and link building should be taken into account when developers and designers work on a software development project. The results of the study are reported here.
6 illus, 2 tables, 28 ref
ABRAHAM A, PAPPA N, HONC D, SHARMA R
024959 ABRAHAM A, PAPPA N, HONC D, SHARMA R (Applied Electronics & Instrumentation Dep, APJ Abdul Kalam Technological Univ, Kerala, Email: anuj1986aei@gmail.com) : Reduced order modelling and predictive control of multivariable nonlinear process. Sadhana 2018, 43(3), 41.
In this paper, an efficient model-predictive control strategy that can be applied to complex multivariable process is presented. A reduced order generalized predictive algorithm is proposed for online applications with reduction in complexity and time elapsed. The complex multivariable process considered in this work is a binary distillation column. The reduced order model is developed with a recently proposed hybrid algorithm known as Clustering Dominant Pole Algorithm and is able to compute the full set of dominant poles and their cluster centre efficiently. The controller calculates the optimal control action based on the future reference signals, current state and constraints on manipulated and controlled variables for a high-order dynamic simulated model of nonlinear multivariable binary distillation column process. The predictive control algorithm uses controlled auto-regressive integrated moving average model. The performance of constraint generalized predictive control scheme is found to be superior to that of the conventional PID controller in terms of overshoot, settling time and performance indices, mainly ISE, IAE and MSE.
9 illus, 10 tables, 31 ref
DAISY V R, NIRMALA S
024958 DAISY V R, NIRMALA S (Electrical and Electronics Engineering Dep, Paavai Engineering Coll, Namakkal- 637 018, Email: roynadaisy@gmail.com) : Stability-integrated Fuzzy C means segmentation for spatial incorporated automation of number of clusters. Sadhana 2018, 43(3), 40.
Fuzzy C Means clustering, one of the predominant segmentation algorithms, requires prior knowledge of number of clusters in the image and is sensitive to noise and outliers. Determining the number of clusters and including spatial information to basic Fuzzy C Means clustering are done in numerous ways. Literature reveals that either number of clusters is defined or spatial information is incorporated. In the proposed work, spatial information and cluster determination are integrated based on the concept of stability. Implementation of split and merge algorithm to find the number of clusters is done based on the modified Sylvester’s theorem in the context of positive definite functions. Experiments are performed on synthetic and real images and the number of clusters determined is validated using validation indices. Results show that correct clusters are classified with robustness to noise.
8 illus, 3 tables, 31 ref
SINGH B, KAUR M
024957 SINGH B, KAUR M (Computer Science and Engineering Dep, Sant Longowal Institute of Engineering and Technology, Longowal- 148 106, Email: birmohans@gmail.com) : An approach for classification of malignant and benign microcalcification clusters. Sadhana 2018, 43(3), 39.
The only reliable and successful treatment of breast cancer is its detection through mammography at initial stage. Clusters of microcalcifications are important signs of breast cancer. Manual interpretation of mammographic images, in which the suspicious regions are indicated as areas of varying intensities, is not error free due to a number of reasons. These errors can be reduced by using computer-aided diagnosis systems that result in reduction of either false positives or true negatives. The purpose of the study in this paper is to develop a methodology for distinguishing malignant microcalcification clusters from benign microcalcification clusters. The proposed approach first enhances the region of interest by using morphological operations. Then, two types of features, cluster shape features and cluster texture features, are extracted. A Support Vector Machine is used for classification. A new set of shape features based on the recursive subsampling method is added to the feature set, which improves the classification accuracy of the system. It has been found that these features are capable of differentiating malignant and benign tissue regions. To investigate the performance of the proposed approach, mammogram images are taken from Digital Database for Screening Mammography database and an accuracy of 94.25 % has been achieved. The experiments have shown that the proposed classification system minimizes the classification errors and is more efficient in correct diagnosis.
8 illus, 13 tables, 56 ref
PATIL H V, SHIRBAHADURKAR S D
024956 PATIL H V, SHIRBAHADURKAR S D (Electronics and Telecommunication Dep, NDMVPS’s KBT COE, Nashik- 422 013, Email: hemant.devkrupa@gmail.com) : FWFusion: Fuzzy Whale Fusion model for MRI multimodal image fusion. Sadhana 2018, 43(3), 38.
Medical treatment and diagnosis require information that is taken from several modalities of images like Magnetic Resonance Imaging (MRI), Computerized Tomography and so on. The information obtained for certain ailments is often incomplete, invisible and lacking in consistent scanner performance. Hence, to overcome these issues in the image modalities, image fusion schemes are developed in the literature. This paper proposes a hybrid algorithm using fuzzy concept and a novel P-Whale algorithm, called Fuzzy Whale Fusion (FWFusion), for the fusion of MRI multimodal images. Two multimodal images from MRI (T1, T1C, T2 and FLAIR) are considered as the source images, which are fed as inputs to a wavelet transform. The transform utilized converts the images into four different bands, which are fused using two newly derived fusion factors, fuzzy fusion and whale fusion, in a weighted function. The proposed P-Whale approach combines Whale Optimization Algorithm (WOA) and Particle Swarm Optimization (PSO) for the effective selection of whale fusion factors. The performance of FWFusion model is compared to those of the existing strategies using Mutual Information (MI), Peak Signal-to-Noise Ratio (PSNR) and Root Mean Squared Error (RMSE), as the evaluation metrics. From the mean performance evaluation, it is observed that the proposed approach can achieve MI of 1.714, RMSE of 1.9 and PSNR of 27.9472.
8 illus, 1 table, 31 ref
SANGAM R S, OM H
024955 SANGAM R S, OM H (Computer Science and Engineering Dep, Indian Institute of Technology (ISM), Jharkhand- 826 004, Email: srskar@gmail.com) : An equi-biased k-prototypes algorithm for clustering mixed-type data. Sadhana 2018, 43(3), 37.
Clustering has been recognized as a very important approach for data analysis that partitions the data according to some (dis)similarity criterion. In recent years, the problem of clustering mixed-type data has attracted many researchers. The k-prototypes algorithm is well known for its scalability in this respect. In this paper, the limitations of dissimilarity coefficient used in the k-prototypes algorithm are discussed with some illustrative examples. We propose a new hybrid dissimilarity coefficient for k-prototypes algorithm, which can be applied to the data with numerical, categorical and mixed attributes. Besides retaining the scalability of the kprototypes algorithm in our method, the dissimilarity functions for either-type attributes are defined on the same scale with respect to their dimensionality, which is very beneficial to improve the efficiency of clustering result. The efficacy of our method is shown by experiments on real and synthetic data sets.
6 illus, 5 tables, 38 ref
PANDEY S C
024954 PANDEY S C (Computer Science and Engineering Dep, Ranchi, Patna Campus, Patna- 800 014, Email: subh63@yahoo.co.in) : New facet of honey bees dancing language for mining the induction rules. Sadhana 2018, 43(3), 35.
Artificial Bee Colony (ABC) algorithm is used in many domains of computation, including optimization, clustering and classification tasks. Further, honey bees dancing is one of the most fascinating and intriguing behaviours of animal life. Honey bees’ dancing is termed as ‘‘waggle Dance’’ in literature and they perform it for indicating the food sources in their environment. This work presents a novel honey bees dancing language (HBDL)-based algorithm for mining the induction rules from datasets. The proposed HBDL algorithm is implemented and tested against the performance of ABC, Particle Swarm Optimization and nine more traditional algorithms frequently used by researchers. The experimental results showed that HBDL is a suitable and effective technique for data mining and classification task.
4 illus, 8 tables, 26 ref
DIXIT H V, JADHAV A R, JAIN Y M, CHEERAN A N, GUPTA V N, SHARMA P K
024953 DIXIT H V, JADHAV A R, JAIN Y M, CHEERAN A N, GUPTA V N, SHARMA P K (Veermata Jijabai Technological Institute, Mumbai- 400 019, Email: hvdixit48@yahoo.com) : Design data for quick development of folded H plane tee at high average power level. Sadhana 2018, 43(3), 33.
At high average power level, waveguide-based structures are indispensable in microwave systems due to their higher power handling capacity. These structures are often used to perform power division and combination operation. Folded H plane tee is one of the many components that can be used for the power division application. Its advantage is that the output arms and input arms are in a single plane along a single axis, thus taking less space in the overall system. However, their proper thermal management is indispensable for its use, as high surface temperature of the waveguide reduces its power handling capacity at high power level. This paper presents quick, easy design steps and methodology for obtaining the structure of a folded H plane tee at any given frequency of operation. Further, a scheme for the thermal management for high input power level (500 kW continuous wave) is presented. The proposed methodology is tested at various frequencies in COMSOL Multiphysics, CST Microwave Studio and HFSS with excellent results. A prototype structure was fabricated for use at 3.7 GHz, which exhibited good agreement with the simulation results.
10 illus, 1 table, 10 ref
PANDEY V C, PEDDOJU S K, DESHPANDE P S
024952 PANDEY V C, PEDDOJU S K, DESHPANDE P S (Computer Science and Engineering Dep, Indian Institute of Technology Roorkee, Roorkee- 247 667, Email: v.c.pandey89@gmail.com) : A statistical and distributed packet filter against DDoS attacks in Cloud environment. Sadhana 2018, 43(3), 32.
Distributed Denial of Service (DDoS) attacks are a serious threat to Cloud. These attacks consume large amount of resources and increase the service usage cost by a significant factor. Due to multi-tenancy and self-provisioning properties of Cloud, traditional DDoS detection techniques cannot be directly applied. Hence, there is a need for Cloud-specific DDoS detection framework. In this paper, a statistical and distributed network packet filtering model is proposed against DDoS attacks in Cloud. The key idea of this scheme is to distribute multiple packet filters among individual virtual machines, which generate and share collective profile of normal behaviour with a coordinator node at constant intervals. Statistics of selected network attributes construct the normal behaviour profile. Based on the deviation from normal behaviour a decision is made whether to accept or reject the incoming packet. The coordinator node monitors filter and distribute the averaged profile to newly provisioned nodes. Individual profiles have low memory and storage requirements and are updated dynamically. Simulation study indicates the effectiveness of this scheme in detecting DDoS attacks in Cloud.
7 illus, 4 tables, 20 ref
AOUICI H, KHELLAF A, SMAIAH S, ELBAH M, FNIDES B, YALLESE M A
023266 AOUICI H, KHELLAF A, SMAIAH S, ELBAH M, FNIDES B, YALLESE M A (Ecole Nationale Supe´rieure de Technologie, Algeria, Email: aouici_hamdi@yahoo.fr) : Comparative assessment of coated and uncoated ceramic tools on cutting force components and tool wear in hard turning of AISIH11 steel using Taguchi plan and RMS. Sadhna 2017, 42(12), 2157–70.
This study investigated the cutting performance of coated CC6050 and uncoated CC650 mixed ceramics in hard turning of hardened steel. The cutting performance was mainly evaluated by cutting force components and tool wear. The planning of experiments was based on Taguchi’s L36 orthogonal array. The response surface methodology and analysis of variance were used to check the validity of multiple linear regression models and to determine the significant parameter affecting the cutting force components. Tool wear progressions and, hence, tool life, different tool wear forms and wear mechanisms observed for tools coated with TiN and uncoated mixed ceramics are presented along with the images captured by digital and electron microscope. Experimental observations indicate higher tool life with uncoated ceramic tools, which shows encouraging potential of these tools to hard turning of AISI H11 (50 HRC). Finally, tool performance indices are based on units which characterise machined cutting force components and wear when hard turning.
7 illus, 7 tables, 26 ref
PANIGRAHI S, VERMA K, TRIPATHI P
023265 PANIGRAHI S, VERMA K, TRIPATHI P (Computer Applications Dep, National Institute of Technology, Raipur- 492 010, Email: sangrampanigrahi.sp@gmail.com;) : Data mining algorithms for land cover change detection: A review. Sadhna 2017, 42(12), 2081–97.
Land cover change detection has been a topic of active research in the remote sensing community. Due to enormous amount of data available from satellites, it has attracted the attention of data mining researchers to search a new direction for solution. The Terra Moderate Resolution Imaging Spectrometer (MODIS) vegetation index (EVI/NDVI) data products are used for land cover change detection. These data products are associated with various challenges such as seasonality of data, spatio-temporal correlation, missing values, poor quality measurement, high resolution and high dimensional data. The land cover change detection has often been performed by comparing two or more satellite snapshot images acquired on different dates. The image comparison techniques have a number of limitations. The data mining technique addresses many challenges such as missing value and poor quality measurements present in the data set, by performing the preprocessing of data. Furthermore, the data mining approaches are capable of handling large data sets and also use some of the inherent characteristics of spatio-temporal data; hence, they can be applied to increasingly immense data set. This paper stretches in detail various data mining algorithms for land cover change detection and each algorithm’s advantages and limitations. Also, an empirical study of some existing land cover change detection algorithms and results have been presented in this paper.
9 illus, 3 tables, 39 ref
NWOBI-OKOYE C C
023264 NWOBI-OKOYE C C (Chukwuemeka Odumegwu Ojukwu Univ, Nigeria, Email: cc.nwobiokoye@coou.edu.ng) : Neuro-fuzzy model for evaluating the performance of processes using transfer function. Sadhna 2017, 42(12), 2055–65.
In this work an Adaptive Neuro-Fuzzy Inference System (ANFIS) was used to model the periodic performance of some multi-input single-output (MISO) processes, namely: brewery operations (case study 1) and soap production (case study 2) processes. Two ANFIS models were developed to model the performance of the two processes under study. The results of the study show that for brewery operations, ANFIS model 2 with a correlation coefficient of 0.9972, as against 0.9956 for ANFIS model 1, had a better correlation than an equivalent MAMDANI fuzzy model. On the order hand, for soap production process, ANFIS model 1 had better correlation with an equivalent MAMDANI model. Generally, there is a general agreement among the models on the periodic performance of the processes. Thus, all the models show that for the brewery, the best performance was in the period 2010-2011 and the period 2008-2009 was the worst. Similarly, for the soap production process, the best performance was in 2011 and the worst in 2012. The results show that a combination of transfer function and ANFIS could be used effectively to model process performance.
10 illus, 12 tables, 24 ref
YOUNES O S
023263 YOUNES O S (Univ of Tabuk, Saudi Arabia, Email: usama.younas@ci.menofia.edu.eg) : Securing ARP and DHCP for mitigating link layer attacks. Sadhna 2017, 42(12), 2041–53.
Network security has become a concern with the rapid growth and expansion of the Internet. While there are several ways to provide security for communications at the application, transport, or network layers,the data link layer security has not yet been adequately addressed. Dynamic Host Configuration Protocol (DHCP) and Address Resolution Protocol (ARP) are link layer protocols that are essential for network operation.They were designed without any security features. Therefore, they are vulnerable to a number of attacks such as the rogue DHCP server, DHCP starvation, host impersonation, man-in-the-middle, and denial of service attacks.Vulnerabilities in ARP and DHCP threaten the operation of any network. The existing solutions to secure ARP and DHCP could not mitigate DHCP starvation and host impersonation attacks. This work introduces a new solution to secure ARP and DHCP for preventing and mitigating these LAN attacks. The proposed solution provides integrity and authenticity for ARP and DHCP messages. Security properties and performance of the proposed schemes are investigated and compared to other related schemes.
13 illus, 41 ref
BHARKAD S, KOKARE M
023262 BHARKAD S, KOKARE M (Electronics and Telecommunication Dep, Government Coll of Engineering, Aurangabad- 431 005, Email: sbharkad@yahoo.co.in;) : Rotation-invariant fingerprint matching using radon and DCT. Sadhna 2017, 42(12), 2025–39.
A new set of promising rotation-invariant features based on radon and discrete cosine transform(DCT) is proposed for fingerprint matching. The radon and DCT of a tiny area in the region of core point of fingerprint image is computed. In the proposed method only 34% DCT coefficients are used for feature extraction. Competency of this approach is tested on standard databases, namely FVC2002 and FVC2004. This approach provides 70% genuine acceptance rate (GAR) at *0% false acceptance rate (FAR) and 95% GAR at 10% FAR on rotated and non-rotated databases, respectively. Experimental results prove that the proposed feature extraction approach is rotation invariant.
13 illus, 4 tables, 36 ref
SATHIYA B, GEETHA T V, SARULADHA K
023261 SATHIYA B, GEETHA T V, SARULADHA K (Computer Science and Engineering Dep, Coll of Engineering, Chennai- 600 025, Email: sathiyabalu89@gmail.com) : PSOM2—partitioning-based scalable ontology matching using MapReduce. Sadhna 2017, 42(12), 2009–24.
The growth and use of semantic web has led to a drastic increase in the size, heterogeneity and number of ontologies that are available on the web. Correspondingly, scalable ontology matching algorithms that will eliminate the heterogeneity among large ontologies have become a necessity. Ontology matching algorithms generally do not scale well due to the massive number of complex computations required to achieve matching. One of the methods used to address this problem is the use of partition-based systems to reduce the matching space. In this paper, we propose a new partitioning-based scalable ontology matching system called PSOM2. We have designed a new neighbour-based intra-similarity measure to increase the quality of the cluster set formation for the partition-based ontology matching process. These sets of clusters or sub-ontologies are matched across the input ontologies to identify matchable cluster pairs, based on anchors that are efficiently discovered through a new light-weight linguistic matcher (EI-sub). However, in order to further increase the efficiency of the time-consuming anchor discovery process we have designed a Map Reduce-based EI-sub process where anchors are discovered in distributed and parallel fashion. Experiments on benchmark OAEI (Ontology Alignment Evaluation Initiative) large scale ontologies demonstrate that the new PSOM2 system achieves, on an average, 31% decrease in entropy of the clusters and 54.5% reduction in overall run time. Based on the experimental results, it is evident that the new PSOM2 achieves better quality clusters and a major reduction in execution time, leading to an effective and scalable ontology matching system.
14 illus, 2 tables, 38 ref
BANUKRISHNA M, DHANASHREE K
023254 BANUKRISHNA M, DHANASHREE K (Nadar Saraswathi Coll of Arts and Science, Tamil Nadu) : Science, technology and postmodernism. Int J Multidiscipl Res Dev 2017, 4(12), 137-8.
In this the postmodernism, science and technology that involves about the historical modern style of scientific knowledge and technological rationality. And says about the relation between sciences, technology. These areas are associated by the ideas with the modernity to develop a distinctive style.
1 ref.
THOTA S
023253 THOTA S (Data Architect, Data Architect, USA) : Analytics – Life Cycle. Int J Multidiscipl Res Dev 2017, 4(12), 117-26.
As an IT professional, we work on computer applications as an analyst, programmer, designer, developer, Database administrator or project manager. In these roles, IT professional is involved in the design, implementation, and maintenance of systems that support day-to-day business operations. As an enterprise grows, hundreds of computer applications are needed to support the various business processes. These applications are efficient in gathering, storing and processing all the data required to perform the daily operations of an enterprise successfully. This existing setup of operational support to an enterprise couldn't cater to strategic information management and Decision support system which can combat increased business competition and complexity. Thus, it developed the notion of Data Warehouse, which is a centralized solution to enterprise's strategic information need that also acts as Decision Support system. This article gives an overview of all the process involved in building Data Warehouse. Data Warehouse is a multi-step process that begins with an analysis of the legacy data and culminates in the loading and reconciliation of data into the new applications.
9 illus, 1 table, 11 ref.
VISLAVATH G N
023252 VISLAVATH G N (MVS Govt. Arts & Science Coll, Telangana) : Prospects of block chain technology in effective public administration. Int J Multidiscipl Res Dev 2017, 4(12), 109-11.
Administration of public offices and public policies has veered its direction from the rustic bundles of papers and records towards the sophisticated digital environs wherein Tera Bytes and Peta Bytes of data pertaining to the governance of public offices is stored in centralized servers and retrieved by the stakeholders whenever needed. This development has also got a flipside in the form of data security which is vulnerable to hacking and cracking by the mischief groups. Off course government has got its own policy to safeguard the information of public offices, despite which there are spasmodic incidents reflecting the gaps in data management policies. It lead to the contemplation of technology stream not explored by Indian public offices at a length i.e. Block Chain Technology, the prospects of which need to be investigated to check whether it can make public office data more secured. It is the reason why a research paper titled “Prospects of block chain Technology in effective public administration” is brought to fore.
1 illus, 1 table, 5 ref
CHEMBATH J
023251 CHEMBATH J (Computer Science Dep, Karpagam Univ, Tamil Nadu) : Cluster analysis to predict web page using k-means and affixed agglomerative approach (CAPKAAA). Int J Multidiscipl Res Dev 2017, 4(12), 74-9.
Web mining is about combining information collected from the World Wide Web using data mining methods and technologies. Predicting the subsequent web page that may be visited by a particular user has become the most wanted area of research as the need for maximum accuracy is mandatory in the sustenance of business in the World Wide Web. Several models are in use nowadays for prediction which focus on the detecting the users subsequent visit of a web page. Basically all prediction mechanisms concentrate on the basic web usage mining principles of clustering. Obviously we need the services of a prediction model like Markov model which has to be trained with the clusters created by cluster algorithms. Server logs help us to understand the user behavior and the possibility of their next web page visit. In this paper, we prove from the experiments conducted that good formation of clusters will lead to better predictions. Here we present an integrated cluster approach from data sets for the prediction of user requests. This clustering approach defines clusters which can be used for predicting the next user request. We focus on predicting the next request of web users by utilizing Basic Agglomerative Hierarchical Clustering Techniqueor “BottomUp” Algorithm and K-Means algorithm along with the prediction algorithm of Markov model. Experimental results reveal that Markov-based models when combined with K-means and Agglomerative approach for clustering produce more accurate results.
5 illus, 2 tables, 12 ref.
MIKE A A, ALONE K
023250 MIKE A A, ALONE K (Computing Dep, Kampala International Univ, Uganda) : A patient information management system (PIMS) for health care: A Case of Kampala international university teaching hospital, Ishaka- Bushenyi, Uganda. Int J Multidiscipl Res Dev 2017, 4(11), 186-90.
The purpose of this research project was to investigate the current Patient records Management System in Kampala University Teaching Hospital and subsequently design and develop a Computerized Patient Information Management System that would support medical personnel to collect, process, stores, retrieve and disseminate patient information, and improve reporting for meaningful use by the managers in decision making. To achieve the objectives of this study, 55 respondents who comprised of doctors, records staff, nurses, patients, clinical officers, and administrative staff. Information technology developments for health care providers have been seen for years as the perfect supporting tools to assist in the prevention and management of these conditions. Therefore, the study was designed to take lessons from health and information systems literature and existing experience in successful implementations at Kampala International University Teaching Hospital. Case study design was the methodology chosen for this study, interviews, and observation; primary data collection methods were used. Field findings showed that the current manual system in Kampala International University Teaching Hospital had shortcomings like subjecting patients to long queues, lack of privacy for patient information, lack of efficiency and security. As a result, this study came up with a computerized patient information management system for health care that addresses the bottle necks is the manual system.
9 illus, 6 ref.
SEKERA N, TRIPATHI S P
023249 SEKERA N, TRIPATHI S P (Dr. APJ Abul kalam Technical Univ (AKTU), Uttar Pradesh) : Creating an empowering environment for women through information & communication technology: A study of women power line’ 1090. Int J Multidiscipl Res Dev 2017, 4(11), 154-62.
Empowerment of women is essentially the process of upliftment of economic, social and political status of women, the traditionally underprivileged ones, in the society. It involves the building up of a society wherein in women can breathe without the fear of oppression, exploitation, apprehension, discrimination and the general feeling of persecution which goes with being a woman in a traditionally male dominated structure. Women empowerment means equipping women to be economically independent, self-confident, and capable to face any difficult situation. The paper looks at the response and success of Helplines introduced to stem violence against women in the background of the crime rates in the state of Uttar Pradesh. A number of mobile apps have surfaced like Police and Women's helplines. This is a cross-gender study of the awareness of Women‘s helplines and efforts to reduce maternal mortality and provide better healthcare to women in the state. The paper is on the awareness and success of the women helpline 1090 which is established by the Government of Uttar Pradesh for the protection of women against violence and harassment faced by them in the society and at the workplace. This helpline has been introduced by the Government to control the criminal offences increasing against women and the UP Government is taking each and every measure to expand this service in the whole of the State. The objective is to provide a platform where every woman is able to register a complaint whenever they face any kind of harassment/problem whether at home/workplace and in all spheres of the society.
4 illus, 14 tables, 13 ref.
ARUMUGAM J, PRAKASH M
023248 ARUMUGAM J, PRAKASH M (PSG Coll of Technology, Tamil Nadu) : A study on microsoft academic search and google scholar: A gateway for researchers. Int J Multidiscipl Res Dev 2017, 4(11), 41-7.
This paper deals about the working techniques of Microsoft Academic Search and Google Scholar. MAS which automatically create a profile for authors who have published in the universe it searches. Therefore it is a good idea for scholars to check their profile and make any needed changes. Google Scholar provides a simple way to broadly search for scholarly literature. This paper deals the merits and demerits of both of these search engines for scholarly publishers. Most of the peer-reviewed Journals, non-peer reviewed journals and open access journals are indexed here. This paper is very much helpful for the research beginners and academicians for locating the related review of the literature.
10 illus, 10 ref.
ACHEMOUKH F, AHMED-OUAMER R
023247 ACHEMOUKH F, AHMED-OUAMER R (Computer science dep, Univ of Mouloud Mammeri, Algeria- 15000, Email: achemoukh.farida@yahoo.fr) : Using temporal bayesian networks to model user profile evolution. J Digital Inf Mgmt 2017, 15(6), 339.
Modeling the user profile can be the first step towards personalization of information search. The user profile refers to his/her interests built across his/her interactions with the information retrieval system. It could be inferred from the recent search history limited to a single search session, during a short period of time to model short term user interests. On the other hand, from the whole search history, to model long term ones stable for a long time. In this paper, we present a personalized information retrieval approach for building and updating the user profile, based on Temporal Bayesian network. The theoretical framework provided by these networks allows better capturing and exploiting the change of user interests over time. Experiments carried out on TREC-1 ad hoc and TREC 2011 session Track collections show that our approach achieves significant improvements over a personalized search approach described in the state of the art and also to a baseline search information process that do not consider the user profile.
6 illus, 3 tables, 59 ref.