International Journal of Scientific & Technology Research

Home Archive Contact Us

Volume 1 - Issue 6, July 2012 Edition

All listed papers are published after full consent of respective author or co-author(s).
For any discussion on research subject or research matter, the reader should directly contact to undersigned authors.

Terms and Conditions

Paras wani, M. J. Siddiqui, M. T Zaheer, Gazanfer wani.

Abstract-Background and Objective: A Clinic initiated community oriented cross sectional study to assess efficacy of VIA Technique in Screening of Carcinoma of cervix in Situ was conducted by department of Tahaffuzi-wa-Samaji Tib (Preventive and Social Medicine), Jamia Hamdard, New Delhi. The General Objective of the study was to evaluate accuracy of VIA technique (visual inspection with acetic acid) as a screening tool for carcinoma in situ. Methods: After informed consent had been obtained from the subjects, the eligible subjects were first laid in lithotmy position and Pap smear was taken by scraping cervix with Ayer's spatula. Then 5% acetic acid was applied on cervix and findings were noted after one minute. Definite acetowhite lesions near the transformation zone were regarded as positive. Relative sensitivity, specificity, Positive predictive value and negative predictive value of VIA relative to Pap smear was calculated. McNemar's test was applied for test of significance of effectiveness of VIA by group comparison of paired samples. Results: Relative sensitivity of VIA was 62.5%.Relative Specificity of VIA was 85.5%.Relative Positive predictive value of VIA was 27.7%.Relative negative predictive value of VIA was 96.25%. Conclusion: VIA was found to be more effective in detecting Cervical Intraepithelial Lesion (CIN) than Pap smear and the difference was statistically significant (Mc Nemar's χ 2 =6.25; Mc Nemar's with Yates's Correction χ2=5.06, both statistically significant at d.f 1 and C.I 95%).Relative negative predictive value being high ,it can be used in low resource settings like India at primary care level and will play important role in prevention of Carcinoma of cervix in situ.

[View Full Paper]  


Devanshu Agarwal

Abstract-Location-based Mobile Social Networks are becoming increasingly popular as one can find almost each and every person on these Networks (OSNs), such as Facebook and recent emergence of smart-phones specially contributed for this popularity as they are well packaged with the features of internet & GPS, specially Google Android Phone by allowing a user to track the location to arrange a meeting or event, when friends are around and by providing the ability to make new friends In this report, The Developer the presents a Location-based Mobile Social Network that constitutes a framework that provide features like, finding a friend's real-time updated location (Location is updated in continuous interval) which helps user to find exact location of a friend also finding friend's exact location only by a SMS, voice notifications, so that the friend can receive message, when they are driving the vehicles (Voice Notifications) also creating the event on social network with date and time so that they won't have to call or email each and every friend for event invitation with Changing the place and date of event anytime without informing each and every friend specifically & emergency messages to notify friends who are in 100 meter range of app-user.

[View Full Paper]  


Edem, I. D, U.C. Udoinyang, S.O. Edem

Abstract The experiment was conducted at University of Uyo Teaching and Research Farm to evaluate slash and burn method of land clearing which is an integral part of the traditional farming system and is widely used as a mean of land clearing to pave way to minimum or zero tillage. A plot of land measuring 720 m2 on a slope of 7 % was used, divided into six plots, each measuring 40 x 3m2 in the burnt and unburnt plots, with a landscape position described as the upper slope, middle slope and valley bottom. Progressively, fire was set into three out of the six plots. And soil samples collected in the respective burnt and un-burnt plots at two depths of 0.15 m and 0.30 m for soil physical properties analysis in the upper slope, middle slope and valley bottom. Descriptive statistics within the plots showed that variability was high in the three landscape positions in the burnt plot, while in the unburnt plots variability was moderate. In paired samples correlation analysis, the relationship between the baseline and weight of soil parameters after burning were not statistically significant, except silt contents (r = 0.999) (p<0.05) with almost a perfect correlation, unlike the other measured or determined parameters where changes were not consistent.

[View Full Paper]  



ABSTRACT Growth of eight wheat genotypes was assessed during 2010-11 under different levels of saline condition i.e.3, 6, 9 and 12 dsm-1.The wheat genotypes differed significantly for emergence, leaf area, relative growth rate and net assimilation rate. The emergence stage the least affected genotype was K9006, whereas other genotypes K9644, K9465, HD2733, and HD2329 were severely affected by salinity. Emergence of seed, leaf area, relative growth rate and net assimilation rate was reported maximum in genotypes K9006, K8434; KRL1-4 and K88. Genotypes K9644 and K9465 showed salinity sensitive.

[View Full Paper]  



ABSTRACT: A pot experiment was conducted during 2010-11 in the Department of Agriculture Botany Janta P.G. College Ajeetmal, Auraiya(U.P.), India. Eight genotypes of wheat are selected with varying in their salt tolerance level, to evaluate effect of salinity on germination, growth, and yield related parameters. Lower salinity (3dsm-1) did not affect the germination, growth and yield attributing parameters. Higher salinity levels reduced germination, growth and yield attributing parameters. Genotypes K9644 and K9465 showed maximum reduction in all these regards. Genotypes K9006, K8434, KRL1-4, K88 and HD2733 showed hardness against higher levels of salinity.

[View Full Paper]  


Jennifer C. Dela Cruz, Felicito S. Caluyo

Abstract-This paper presents the results of indoor propagation measurements conducted at 16 residential sites at 677 MHz using live digital television transmission of National Broadcasting Network (NBN). This study is part of the extensive measurement campaign done last 2011, in partnership with NBN, a government TV network. The main purpose of this study is to measure indoor losses caused by penetration and path loss inside residences at the exact location of analog TV sets. Average Penetration Loss (APL) for each house/building category using the difference between the measured outdoor signal level and the indoor signal level values were computed and compared with similar studies found in the literature. Path loss exponents for four residential categories represent the power law relationship between distance and received power. Path loss contributes to indoor signal reduction thus resulting to poorer television reception quality. The value of path loss exponent n which was found to be decreasing from Classes A, B ,C and D proves that indoor fixtures, interiors and household appliances inside residences contribute to indoor multipath reception.

[View Full Paper]  


Ahmed Baita Garko, Gregory Maksha Wajiga

Abstract - The two prominent billing platforms, postpaid and prepaid billing systems currently in operation in Telecommunications have some problems. In postpaid the problems are mostly due to fraudulent activities by some employees that costs a telecommunications company a loss of 5% of its total revenue annually, and also inefficiency of some human personnel like the dispatch riders who dispatch or distribute bills. While the prepaid billing has its problems like inability to make calls at zero level credit, no matter how urgent and important that call is to the customer. In order to minimize these problems, a framework is proposed in this paper. Software Agent Technology is used by identifying some of the areas and personnel liable to fraud and inefficiency and substituting them with Software Agents. The Unified Modeling Language (UML) is used to model the proposed framework. Java as an Object-oriented programming language is used to come up with the prototype of the agent system, Visual Basic 6.0 was also used to code the processes involved in the three subsystems. This paper presents a cost benefit analysis of substituting some human personnel with software agents in executing some routing tasks, thereby minimizing cost and maximizing benefit.

[View Full Paper]  


Obuka Nnaemeka Sylvester P., Ihueze Chukwutoo Christopher, Okoli Ndubuisi Celestine, Ikwu Gracefield Okwudilichukwu R.

Abstract - The experiments of this research were designed to lend itself to two way and three way classification ANOVA analysis in the SPSS software. The new hybrid epoxy matrix composites consist of 5%wt, 10%wt, 15%wt, 20%wt, 25%wt, and 30%wt of fillers (alumina and calcium silicate) in nanoscale. Tensile strength of each constituent material was obtained through tensile experiments. Creep experiments were performed at temperatures of 500C, 700C, 900C, 1100C, and 1300C, at constant loading of 14 MPa. The composite material with 15%wt constituent showed highest tensile strength followed by the 20%wt constituent showing higher strength than a baseline Epoxy-Alumina nanocomposite. Also the 15%wt and the 20%wt constituents exhibited the best resistant property to creep than every other constituent at short term creep tests and at analytical results. Though the two way classification ANOVA show enough significance at 95% confidence interval, the three way classification ANOVA showed significances of time, temperature and samples (with interactions), which are responsible for the creep failure of the studied composites. The creep limit property of the new material was found to be higher than the creep limit of the Epoxy filled with Alumina only.

[View Full Paper]  


Mrs. Ekta Srivastava, Dr. Nisha Agarwal

Abstract This paper analysis the various challenges which are emerging in the field of HRM.The managers today face a whole new array of changes like globalization, technological advances and changes in political and legal environment. changes in Information technology. This has lead to a paradigm shift in the of roles professional personnel. The great challenge of HRM is to attract, retain and nurture talented employees. This paper also analysis how to overcome with these challenges. These challenges can overcome through cross cultural training, technological and informational training of HR people and motivation of employees through various techniques

[View Full Paper]  


Farhad Soleimanian Gharehchopogh, Sajjad Hashemi

Abstract-Cloud computing is known as the newest technologies in IT field which causes some worries for consumers and its producers due to its novelty. Looking at its literature, we can see the privacy and security aspects and trust are the main concerns. It creates an important hindrance for using by users. So we decided to evaluate some factors such as security for the acceptance of cloud computing. In this paper, we highlighted envision about security emphasizing for the maintenance of privacy and trust in accepting the cloud computing. As a result, we are proposed new recommendations for improving security, decreasing risks, increasing trust and maintaining privacy which they are necessary to adopt cloud computing.

[View Full Paper]  


Harshitha.K.Raj, S.R.Sujatha, Dr.M.Siddappa, P. Satish Kumar

Abstract: Developing device drivers is one of the most difficult tasks to develop or port operating systems. A device driver needs to be described according to the target device and OS. A major design goal in operating system developments is stability and one of the challenges of this stability is device drivers. Device drivers are more likely to crash the operating system for two reasons: on one side they typically run in kernel mode and not as easily be confined as the normal application programs and on the other hand side many drivers are built by independent equipment manufactures. This paper proposes Windows CE 6.0 support system for stream driver development.

[View Full Paper]  


Vinutha.S, C.K.Raju, Dr.M.Siddappa

Abstract: Cloud Computing provides facilities for storage, management, processing, and accessing information and other data stored in several system, platforms, applications etc . The above work represents the implementation of electronic hospital management system which enables date storage, update, retrieval, modification through cloud using the virtual private network which enhances the security of the data. The management system is developed using the popular Android OS.

[View Full Paper]  


Rahul Modanwal, S.K.Singh, Pushpender singh, Raj Kumar Sagar, Sanjay singh

Abstract-Direct Torque Control or DTC as it is called is the very latest AC drive technology developed by ABB and is set to replace traditional PWM drives of the open- and closed-loop type in the near future. Direct Torque Control describes the way in which the control of torque and speed are directly based on the electromagnetic state of the motor. DTC is the first technology to control the "real" motor control variables of torque and flux. Because torque and flux are motor parameters that are being directly controlled, there is no need for a modulator, as used in PWM drives, to control the frequency and voltage. This, in effect, cuts out the middle man and dramatically speeds up the response of the drive to changes in required torque. DTC also provides precise torque control without the need for a feedback device.

[View Full Paper]  


Ashutosh Kumar Singh, Dr. Ramapati Mishra, Fuzail Ahmad, Raj Kumar Sagar, Anil Kumar Chaudhary

Abstract-Cloud computing is beginning from the development of parallel computing, distributed computing, shared computing and grid computing. For the sharing resources that contains software, applications, infrastructures and business processes, cloud computing is the main key. Cloud computing has brought new tremendous changes and good opportunities to information technology industry. Cloud computing is a fast growing information technology, has aroused the concern of the whole world. This is a favorable situation to study and application of cloud computing related technologies. However, most existing Cloud Computing platforms have not formally adopted the service-oriented architecture (SOA) that would make them more flexible, extensible, and reusable. By bridging the power of SOA and virtualization in the context of Cloud Computing ecosystem, this paper presents seven architectural principles and also introduces the existing issues in cloud computing. Proposition of solution for these issues has been provided also.

[View Full Paper]  


S.S. Divya, M. Ram Mohan Reddy

Abstract: : Steganography is an art and science of writing hidden messages in such a way that no one apart from the intended recipient knows the existence of the message.The maximum number of bits that can be used for LSB audio steganography without causing noticeable perceptual distortion to the host audio signal is 4 LSBs, if 16 bits per sample audio sequences are used.We propose two novel approaches of substitution technique of audio steganography that improves the capacity of cover audio for embedding additional data. Using these methods, message bits are embedded into multiple and variable LSBs. These methods utilize upto 7 LSBs for embedding data.Results show that both these methods improve capacity of data hiding of cover audio by 35% to 70% as compared to the standerd LSB algorithm with 4 LSBs used for data embedding. And using encryption and decryption techniques performing cryptography. So for this RSA algorithm used.

[View Full Paper]  


H. Traboulsi

Abstract-Auxiliary power supply (APS) systems are increasingly used for low power rating home appliances (e.g. televisions, water dispensers, etc.) and lighting (e.g. CFL lamps) in countries where long power rationing schemes are applied. In general, these systems charge a 240AH (Ampers-Hours) bank of batteries as long as the grid is on and then convert the stored energy into AC current to supply a load of 400W during the rationing time which sometimes last for several hours (four to six hours). Thus, such systems would be able to afford all these hours if and only if the battery bank of the APS was fully charged. Unfortunately, the practice shows that this target (full charge of the battery bank) cannot be achieved mainly due to the short on period of the grid - while in lucky times (when there are no sporadic interruptions) the on period of the grid does not exceed six consecutive hours, the average time needed to fully charge the battery bank at 20 amps charging current is twelve hours. This paper shows how a small number of solar photovoltaic (PV) modules can be used as an additional charging power source to overcome this problem. Besides the major reduction in the size of the PV modules, an average saving of 61.5% in the energy drawn from the utility is achieved.

[View Full Paper]  


Charles A. Onyeani, S.O. Osunlaja, O.O. Oworu, A.O. Joda

Abstract - This study investigated in-vitro the control of fungal species found associated with the storage of four staple food crops at Ibadan in the humid forest of southern Nigeria using some indigenous plant extracts. Aspergillus flavus, Aspergillus niger, Penicillium expansum and Rhizopus stolonifer were found associated with the spoilage of horticultural crops in storage. The results of the investigation revealed that, Acalypha ciliata, Aloe vera, Azadirachta indica and Vernonia amygdalina were effective in the inhibition of Aspergillus flavus and Penicillium expansum. Annona squamosa effectively inhibited the mycelial growth and sporulation of Aspergillus niger and Rhizopus stolonifer. Aloe vera extract was equally effective in the reduction of mycelial growth and sporulation of Aspergillus niger. In the overall, a significant reduction in mycelial growth and sporulation of the pathogens was found associated with treatment with most of the plant extract tested.

[View Full Paper]  


Michael Jackson Patrick, Norlela Ishak, Ramli Adnan

Abstract- Non-minimum phase (NMP) model is a discrete-time model obtained from small or reducing sampling-time of open-loop input and output experimental data. The classical feed-forward controller design of this model using inverse of the closed-loop transfer function would produce an unstable tracking control. This is due to phase and gain errors that caused by NMP zero. Thus, zero phase error tracking controller (ZPETC) strategy was introduced to encounter this NMP zero problem. Simulation and real-time controls on NMP XY Table system shows that the overall tracking performance for circular contour is significantly improved.

[View Full Paper]  


Rahul Modanwal, S.K.Singh, Pushpender singh, Raj Kumar Sagar, Sanjay Singh

Abstract-The magnitude and orientation of the stator flux must be known in order to directly control the stator flux by selecting appropriate voltage vector. The stator flux plane is divided into six sectors. Each sector has a different set of voltage vectors to increase (voltage vector highlighted in gray) or decrease (voltage vector highlighted in black) the stator flux . The stator flux is forced to follow the reference value within a hysteresis band by using a 2-level hysteresis comparator. If the stator flux lies in sector k, then the voltage vector selected to increase the stator flux, and selected to decrease the stator flux. In This Paper, we are controlling torque or speed of three phase induction motor with concept hysteresis vector controller and we have designed hysteresis vector controller on Matlab Simulink tool which is the advancement in classical DTC model for induction motor.

[View Full Paper]  


Rableen Kaur Suri, Deepak Singh Tomar, Divya Rishi Sahu

Abstract The growth of Internet has many pros and cons to mankind, which is easily visible in day to day activities. The growth of Internet has also manifested into the other domain of cyber crimes. Phishing, web defacement, money laundering, tax evasion, etc. are some of the examples of cyber crimes that have been reported in literature. It has become vital to make technology reliable, so that it can record and intelligently apprise the user of illegal activity. The objective of this work is twofold. Firstly, in this paper tabnabbing which is a type of phishing attack is explored by developing an attack scenario. Secondly, the signature based detection mechanism is proposed to handle tabnabbing attack.

[View Full Paper]  


Yousuf Ibrahim Khan, Saad Mahmud sonyy, S.M. Musfequr rahman, Debasis baishnab, Md. Fuad bin rashid

Abstract- An information is a message which is received and understood. Information can be sent one person to another over a long range but the process of sending information must be done in a secure way especially in case of a private message. Mathematicians and Engineers have historically relied on different algorithmic techniques to secure messages and signals. Cryptography, to most people, is concerned with keeping communications private. Indeed, the protection of sensitive communications has been the emphasis of cryptography throughout much of its history. Sometimes it is safer to send a message using an image and thus cryptography can also be done using images during an emergency. The need to extract information from images and interpret their contents has been one of the driving factors in the development of image processing and cryptography during the past decades. In this paper, a simple cryptographic method was used to decode a message which was in an image and it was done using a popular computational software.

[View Full Paper]  


Dr. Sudeep Thepade, Dimple Parekh, Jinali Shah, Bhumin Shah, Paras Vora

Abstract- Fingerprints are the most widely used form of biometric identification. Fingerprint Classification is done to associate a given fingerprint to one of the existing classes. Classifying fingerprint images is a very difficult pattern recognition problem. In this paper, for classifying fingerprint a fresh technique based on vector quantization using KMCG algorithm is implemented. Vector Quantization is a lossy data compression technique, used in various applications. Fingerprint Classification is implemented, using KMCG with codebook of size 8 and window size 8x8. The proposed approach provides an overall accuracy of 80% by taking smaller computations as compared to conventional fingerprint classification techniques.

[View Full Paper]  



Abstract- This study involves a model to investigate the effect of mass flow, channel depth and collector length on the thermal performance and cost benefit ratio for two types of solar air heaters in double flow mode, flat plate collector with porous media and V-groove absorber. The thermal performance was determined over a wide range of operating conditions. It is found that the double pass double duct V-groove absorber is 4% -15% more efficient than the double pass flat plate collector with porous media in the lower duct and the outlet temperature is increased by 2oC -8oC even though it had a porous media in flat plate collector. On the other hand it is concluded that the higher in cost energy for any particular combination of flow depth, collector length and mass flow rate is at short collector length, small flow depth with high quantity of mass flow rate. Moreover, the values of duct lengths and depths for which the cost of solar energy is minimized are different for different values of mass flow rates

[View Full Paper]  


Rachana Kamble, R.K Pateriya

Abstract-RSVP (Resource ReSerVation Protocol) is an Internet protocol which is allowing applications reserving network resources. RSVP is used as a general purpose signaling control in the MPLS and Traffic Engineering areas. This paper describes our research on the Extension of RSVP (RFC2961) protocol overhead and applied security authentication by ESP (Encapsulating Security Payload) after then check the performance while sending messages on to the network. We specify network-layer protocol overhead and monitor the effects of increased modularity and security by use of ESP. We implement RSVP (RFC 2961 standard) and used ESP for security authentication and study its performance in a RedHat 7.0 Linux OS testbed. An ESP node helping to provide security for signaling sessions is found to consume small amounts of CPU time and memory. Individual routines in the ESP code are instrumented to obtain a detailed profile of their contributions to the overall system processing. Important factors in determining performance, such as the number of sessions, state management, refresh reduction capable bit, RSVP bundle message, summary refresh extension, timer management and signaling message size are further discussed. The IP Encapsulating Security Payload (ESP) Header provides integrity, authentication, and confidentiality to IP datagram. It does this by encapsulating either an entire IP datagram or only the higher-layer protocol (e.g., RSVP protocol) data inside the ESP, encrypting most of the ESP content, and then appending a new IP header to the now encrypted ESP Payload. This new IP header carries the protected data through the internetwork. Our work is based on RFC2961. The main idea of RFC2961 is to send a probe message from a source router in a domain to a destination router in another domain. The probe is passing from domain to domain through the network.

[View Full Paper]