A mobile adhoc network is a Self-configuring network of mobile routers connected by wireless links. In the mobile adhoc network, each and every device moves independently in any direction so that there are frequent changes in the links. It is essential to learn the position of the neighbors because there is increase in location-aware services. So, there is a chance that the malicious nodes are easily abused the process. The significant problem in mobile networks is correctness of node locations and also it is primarily challenging in the presence of adversaries. So, the neighbor position verification protocol is used to a fully distributed, a lightweight NPV procedure which allows each node to obtain the locations advertised by its neighbors and asses their truthfulness. Further to extend neighbor position verification protocols in the proactive model that need to each node constantly verify the position of its neighbors. So, we introduce a technique called secure link state updating which provides secure proactive topology discovery that is multiply useful for the network operation. This technique is vigorous against individual attackers, it is capable to adjust its capacity between local and network-wide topology discovery, and also operating in networks of frequently changing topology and membership nodes. Experimental results show that the proposed system is high efficiency in terms of security when compared to the existing system.
How great would it be if you never forgot anything or never lost the ability to think and be creative? And just imagine how much more great it would be if your brain can be reconstructed so that it can stay young forever and be used to create wonders even after your death? It would be a great leap in the field of science if the brains of great minds like Steve Jobs or Albert Einstein can be recreated. That is exactly what the blue brain does. The blue brain project is an attempt to reconstruct the brain piece by piece and building a virtual brain in a supercomputer. It began in 2005 with an agreement between the EPFL and IBM, which supplied the Blue Gene/L supercomputer acquired by EPFL to build the virtual brain. The computing power needed is considerable. Each simulated neuron requires the equivalent of a laptop computer. A model of the whole brain would have billions. Supercomputing technology is rapidly approaching a level where simulating the whole brain becomes a concrete possibility. The main aim is to update the brain into a computer. As a first step, the project succeeded in simulating a rat cortical column. Efforts are now being made to simulate the human brain. In five years of work, Henry Mark ram’s team has perfected a facility that can create realistic models of one of the brains essential building blocks. This process is entirely data driven and essentially automatically executed on the supercomputer. This modeling will expand to all the areas of the brain and if successful, shed light on the relationships between genetic, molecular and cognitive functions of the brain. These models will be basic building blocks for larger scale models leading towards a complete virtual brain.
Physically unclonable function (PUF) is a hardware security module preferred for hardware feature based random number and secret key generation. Security of a cryptographic system relies on the quality of the challenge-response pair, it is necessary that the key generation mechanism must unpredictable and its response should constant under different operating condition. Metastable state in CMOS latch is undesirable since it response becomes unpredictable, this feature used in this work to generate a unique response. A feedback mechanism is developed which forces the latch into the metastable region; after metastable state, latch settle to high or state depends on circuit internal condition and noise which cannot be predicted. Obtained inter hamming variation for 8 PUF is 51% and average intra hamming distance is 99.76% with supply voltage variation and 96.22% with temperature variation.
One of the unique features of Indian society is prevalence of caste system which was originated thousands of years back to demarcate the people engaged in different occupation or jobs. Initially it was not much rigid but gradually people belonging to upper castes for their own selfish means to maintain their monopoly made this arrangement hereditary and started treating people of lower castes disgracefully. For preservation of this system, people started controlling their women to prevent inter-caste marriages and the concept of endogamy came up. This robbed away many types of freedom from women. For women belonging to lower castes, this situation is worse as they are doubly subjugated on the basis on caste as well as gender. Men belonging to their own caste treat them as secondary beings. This paper throws light on this intersection. How intersection of these two kinds of inequalities place them at the lowest position in Indian society. Dr. B.R. Ambedkar rises as their leader who all his life worked for empowerment of downtrodden section of society. He argues that education is the primary tool for evading these differences among people. He further emphasizes to adopt the concept of exogamy to break the backbone of Indian caste system and to immediately leave a religion or culture which legitimizes such system of inequality among people of the same land.
One of the unique features of Indian society is prevalence of caste system which was originated thousands of years back to demarcate the people engaged in different occupation or jobs. Initially it was not much rigid but gradually people belonging to upper castes for their own selfish means to maintain their monopoly made this arrangement hereditary and started treating people of lower castes disgracefully. For preservation of this system, people started controlling their women to prevent inter-caste marriages and the concept of endogamy came up. This robbed away many types of freedom from women. For women belonging to lower castes, this situation is worse as they are doubly subjugated on the basis on caste as well as gender. Men belonging to their own caste treat them as secondary beings. This paper throws light on this intersection. How intersection of these two kinds of inequalities place them at the lowest position in Indian society. Dr. B.R. Ambedkar rises as their leader who all his life worked for empowerment of downtrodden section of society. He argues that education is the primary tool for evading these differences among people. He further emphasizes to adopt the concept of exogamy to break the backbone of Indian caste system and to immediately leave a religion or culture which legitimizes such system of inequality among people of the same land.
Our research is a contribution to the analysis of emergent practices in the mediatization of the Gospel. It mobilizes an intercultural approach of the appropriation of the TIC by social actors at ends of proselytism and propaganda. The mobilized problem is that of the seduction in the media revival of the neo-pentecostal leaders. By supporting us on an observation of the practices of the TVevangelism in Cameroon, we analyze the emergent social uses of the audio-usual mediums at ends of proselytism and propaganda. Our research reveals the interest to go beyond the deterministic analyses of the development of the TIC to propose an intercultural analysis which underlines the sociocultural contingency of the movement of emergence and development of the TIC. The aim is to propose an intercultural analysis which underlines the sociocultural contingency of the movement of emergence and development of the TIC in Africa.
Abstract Abundant solar energy is freely available almost round the year in India. As per the current scenario of global warming and climatic change, solar energy is the cleanest source in nature. Concentrated solar power (CSP)has hardly contributed to the overall installed solar power capacity in the country. CSP technologies are Parabolic Trough Collector (PTC), Linear Fresnel Reflector (LFR), Paraboloid Dish and Solar Power Tower. This paper presents a review of CSP in solar parabolic dish concentrator to understand thermal aspect like thermal efficiency, optical efficiency, useful heat gain, heat losses, solar irradiation, etc. for various applications and current development. The current scenario of global CSP is discussed to meet the future challenges and need of the society.
Investigating school performance and competencies, especially on leadership, received a considerable attention in the past. In fact, there have been multitudes of evidence that leadership can impact school performance, student achievement, or outcome. Also, there was no single measurement of school performance. This study examined the influence of leadership and core behavioral competencies on the school performance of school heads. This was to build a new model of school performance. Using an explanatory research design, it administered a survey questionnaire to 192 randomly chosen school heads from the 37 districts of Department of Education Division of Surigao del Sur. Also, it used data mining for the performance ratings of school heads from the division office. Regression analysis tested three hypothesized models of school performance where leadership and core behavior competencies serve as independent variables. Results showed that leading people was a significant predictor of school performance. Thus, leading people can best explain the school improvement as a proposed model. The results have implications for future research, leadership practice, and theoretical development of school performance model among school heads.
Gender Bias is an ambivalent issue all over the world. Understanding the values of being a man on women by one another may solve many consequences in future. Gender Bias will be dismissed by empowering women in the society. Because of the Gender Bias particularly women are in despaired state. UNO and many organizations have taken many decisions and efforts to empower women which will reduce the impacts of Gender Bias. Even though women are empowered we didn’t get remarkable result yet. Even our society is ridicule get ride from traditional customs but women themselves are opponent for accepting new rules and liberations. Empowering women is a mandated one; it is not implemented properly empower must bring the equal rights to women.
La socialisation en Afrique de l’Ouest se fait par des canaux normatifs dont le mariage. Ce lien sacré, scellé par les Hommes et béni par Dieu, est une nécessité humaine et reste un goulot social pour plusieurs femmes. Sur cette entité géographique patriarcale, la condition féminine relève très souvent d’’un chemin de croix’ pour un épanouissement multiforme. Issoufi DICKO et Safiatou BA se saisissent de cette facette de la thématique du genre pour questionner les vies et les règles traditionnelles en contexte de modernité. Les deux jeunes écrivains maliens portent, entre condition féminine et inversion sexuelle, un regard sans complaisance sur leur société en profonde mutation. Trame nourricière de leurs ouvrages respectifs, ces thèmes leur permettent de mettre en scène des personnages hauts en couleur et en courage. Contrariées en partie par leurs quotidiens et la vie, le système patriarcal et l’embrigadement socioreligieux, leurs héroïnes s’indignent et se révoltent contre les sorts qui leur sont imposés. Défiant les règles de la vie en couple et celles socio-culturelles, elles s’érigent en rempart des dérives sociales perpétrées contre les femmes. Parallèlement à la condition féminine et les conflictualités de la vie en couple, le lesbianisme balbutiant au Mali est convoqué. Issoufi DICKO et Safiatou BA décrivent méticuleusement les arcanes de son enracinement progressif. Cette contribution aborde, avec la méthode qualitative, la condition féminine et l’homosexualité au Mali, entre fiction et réalité sociale. L’objectif de cette contribution est d’analyser la condition féminine et l’homosexualité à travers les deux romans.
Women are multi taskers in their lives- mother, wife, daughter, sister and a lot more. And hence are exposed to a lot of emotions. A working woman is exposed to many other more roles- boss, subordinates. A working woman has to develop skills of self awareness, self management, be motivated, feelings of optimism, positivity and internality, empathy and social skills (collectively called as emotional intelligence) to perform her multiple roles, both at home and at, work place efficiently so as to meet the expectations of both the family members and their organization. Current study focuses on investigating the influence of demographic factors on the level of emotional intelligence among the respondents in Coimbatore city. These factors tested against being determined by their age, job profile, marital status.
The transportation problem is widely applied in the real world. This problem aims to minimize the total shipment cost from a number of sources to a number of destinations. This paper presents a new method named Dhouib-Matrix-TP1, which generates an initial basic feasible solution based on the standard deviation metric with a very reduced number of simple iterations. A comparative study is carried out in order to verify the performance of the proposed Dhouib-Matrix-TP1 heuristic.
Frequent power outages arising from poor state of electricity infrastructure is hindering Nigeria’s socio-economic growth. Port Harcourt is one of the foremost cities in Nigeria where business and social activities are becoming rapidly more dependent on electricity. Any power outage, even of the shortest duration, in Port Harcourt City has severe socio-economic impacts and there is no likelihood that the phenomenon would abate even in the nearest future. This research investigated the causes of incessant power outages in Port Harcourt City and suggested remedial measures to reverse the trend. The researcher relied on datacollected from primary sources through personal observations, interviews and discussions with residents of the City and from secondary sources such as the National Bureau of Statistics (NBS), the Manufacturers Association of Nigeria (MAN) and current scholarly literature relating to this research, over a period of twelve months. The study used a descriptive and the non-parametric simple percentages technique in analysing the data so collected and in drawing conclusions. It was found that inadequate power generating capacity, shortage of gas, weak and dilapidated electrical transmission and distribution network, inadequate power infrastructure facilities, etc. are the chief causes of incessant power outages in the Port Harcourt metropolis. The paper recommends, among others, immediate upgrade of existing power infrastructure facilities, review of government policy on domestic gas supply and stiff statutory legislation on vandalism as measures to stabilise electricity supply in the Port Harcourt city.
Lakes are characterized by dynamic responses to ecological and limnologic disturbances that occur within a constrained timeframe. Some endorheic lakes in the Kenyan Rift valley are presently regarded as environmental hotspots because of complex changes that are revealed through multiple proxies; changing lake levels and surface area, turbidity and sedimentation, and the proliferation of macrophytes, and loss of aquatic biodiversity. Lake Baringo is characterized by widespread catchment degradation accompanied by high levels of turbidity during erratic and decline of the native fishery based on Oreochromis niloticus baringoensis. A careful analysis implicates potential natural factors such as catchment topography and increasing anthropogenic pressure as the main causes of lake ecosystem degradation. This paper recommends several strategies for restoration of Lake Baringo based on an integrated multi-faceted approach that combines catchment rehabilitation, pollution control, and provision of alternative livelihoods such as agriculture to the riparian communities
Micro-level assessment of vulnerability to climate change creates basis for policy formulation. The study specifically ascertained the levels and determinants of vulnerability to climate change among selected food crop farmers. Data collected were analysed using descriptive statistics and ordinary least square regression analysis. The result revealed that 15.95%, 68.97% and 15.08% of the households were highly vulnerable, moderately vulnerable and less vulnerable to climate change respectively. This implies a varied effect on crop farmers. The result also showed that amount saved, extension contacts, household expenditure and value of crop were significant at 1% level. The study recommended the provision of basic amenities and soft loans to farmers as well as an improvement in extension services. It also advocated the introduction of effective climate change mitigation and adaptive measures to boost agricultural output in their area.
ABSTRACT “Numbers are the highest degree of knowledge. It is knowledge itself.”- Plato “The world is built on the power of numbers.” Pythagoras “Everything around you is numbers.” Shakuntala Devi. The date, we were born on, was not an accident. Each number in our date of birth is connected with certain energies and vibrations. Similarly, each and every letter in our name (first as well as full name) also has particular frequency, energies and vibrations. The combined and correlated energies of numbers and letters of an individual reveal about the past, present and future. The careful study of these universal divine energies can reveal, who you are, why you are here, where are you going and how will you get there. In other words what is your personality, nature, thinking, and what is your future in terms of family career relationships and finances etc. In this study, an attempt has been made to analyze -How certain patterns of name numbers and date of birth related core numbers can emerge as a directional guide for an individual to choose any specific career/profession (by studying the patterns of over 1100+ date of births and names of the Engineers cum Arbitrators).
Along with computer technology, the demand of digital image processing is too high and it is used massively in every sector like organization, business, medical etc. Image segmentation enables us to analyze any given image in order to extract information from the image. There are numerous algorithm and techniques have been industrialized in the field of image segmentation. Segmentation has become one of the prominent tasks in machine vision. Machine vision enables the machine to vision the real world problems like human does and also act accordingly to solve the problem so it is utmost important to come up with the techniques that can be applied for the image segmentations. Invention of modern segmentation methods like instance, semantic and panoptic segmentation have advances the concept of machine vision. This paper focuses on the various methods of image segmentation along with its advantages and disadvantages.
Malwares are one of the most dangerous security threats in today’s world of fast growing technology. Now, it is not impossible to remotely lock down a system’s files for ransoms even when it is located overseas. This threat was accelerated when the world was introduced to cryptocurrency (for e.g., Bitcoins). It allowed the attackers to hide their tracks more efficiently. From a simple idea of testing the efficiency of a computer system to the most critical and sophisticated cyber-attack, malwares has evolved over the years and appeared time to time. Even with the smartest technologies today where we are trying to include Machine learning and Deep learning to every field of our life, the attackers are already developing more sophisticated malwares using the same Machine learning and Deep learning techniques. This raises the question on the security of the cyber-world and how we are able to protect it. In this work, we are presenting an analysis on a recent and most critical Windows malware called “LockerGoga”. Both static and dynamic analyses are performed on the malware to understand the behavior and characteristics of the malware.
This study determined the effectiveness of Differentiated Instruction in the reading comprehension level of the Grade-11 senior high school students, school year 2016-2017. Specifically, it aims to determine the reading comprehension level of the control and the experimental groups in the pre test and post-test; identify if there is a significant difference in the reading comprehension level of the control and experimental groups in the pre-test and post-test results; and identify the strengths and weaknesses in using Differentiated Instruction. Quasi-experimental method was employed in conducting the study. The respondents were the 150 Grade-11 students of a public high school grouped as control and experimental using Parallel technique. Data sources include pre-test and post-test scores, gain scores, classroom observation form, survey questionnaire, and researcher's reflective notes. The qualitative data were analysed using template analysis style and the basic approach of comprehending, synthesizing, theorizing and re-contextualizing to identify common themes and integrating thematic pieces. Based on the classroom observations, survey and researcher's reflective notes, strengths and weaknesses of Differentiated Instruction were observed. Despite the observed and encountered challenges, the statistical analysis has revealed a significant difference between pre-test and post-test results.
This study aims to determine the functional literacy acquisition of Alternative Learning System learners and make a sound basis for strategic planning and pedagogical intervention that will help promote and develop the said program. The descriptive-evaluative method of research was used in the study. The descriptive method was used to identify the respondents' profile based on (a) age, (b) gender, (c) civil status, and (d) employment status. The evaluative method was used to determine the respondents' functional literacy acquisition in (a) communication skills, (b) scientific and critical thinking skills, (c) mathematical and problem solving skills, (d) life and career skills, (e) understanding the self and society, and (f) digital citizenship (formerly digital literacy). Frequency Count and Percentage Technique was used to describe the functional literacy acquisition of the respondents. Meanwhile, a modified survey questionnaire based on the functional literacy, education and mass media survey ("National Profile of Adult Literacy and Numeracy Skills," 2004, p. 91) was used as the primary tool to gather the data. The respondents in this study were the students enrolled in ALS-Sipocot (North and South District), the school year 2019-2020. Due to COVID restrictions, other ALS learners from other municipalities were not covered as part of the study. Findings revealed that ALS learners do not yet manifest the complete acquisition of functional literacy needed to face the globalized world's challenges because their attainment of the required functional literacy skills is generally low. Moreover, the study disclosed that sex, age, civil status, and employment status affect the acquisition of functional literacy skills among ALS learners in Sipocot, Camarines Sur. Based on the results, the researcher developed an extension activity to help the ALS learners improve their functional literacy, particularly in the digital citizenship area, where they got the lowest score.
Department Of Orthopedics, University Faculty Of Medicine
Dr Vishwanath Karad Mit World Peace University
Department Of Mathematics, National University Of Skills (nus), Tehran, Iran.
Police Academy, Egypt