3,750 research outputs found
Role of Higher Education Institutions in Environmental Conservation and Sustainable Development: A case study of Shivaji University, Maharashtra, India.
The ever increasing population and changing lifestyles are making the environmental problems more critical. Higher educational institutions can be the best solution to solve this situation. Higher education can play a crucial role in sustainable development of any nation. As environmental sustainability is becoming an increasingly important issue for the world, the role of higher educational institutions in relation to environmental sustainability is more prevalent. Universities are the apex bodies in higher education system and can provide environmental education through its curricular design, research and collaborative efforts with NGO’s working in those areas. They can provide trained manpower and knowledgeable expertise to solve critical environmental problems. They can also act as a good networking system and data collector. Shivaji University is one of the significant higher education institution located in heart of Western Ghats working with the same goal of environmental sustainability through various activities. The paper examines the efforts taken by higher education in environmental development in the areas of creating healthy environment and conservation of resources. Key words: Role of Higher education, Environmental protection, Universities, sustainable developmen
Performance Evaluation of Energy Efficient Protocols in Wireless Sensor Networks
Reducing the energy utilization is an important element in the Wireless Sensor network (WSN). Many protocols have been designed for improving energy efficiency of the network. Clustering protocols have been proved to be one of the energy-efficient protocols in WSN. One of the basic and most popular protocols designed using the clustering approach is the LEACH (Low-Energy Adaptive Clustering Hierarchy).However, LEACH undergoes an issue of bad distribution of cluster heads, which is overcome by implementing a technique of selecting smart cluster head in LEACH known as SCHS (Smart Cluster Head Selection).Also another clustering protocol HEED (Hybrid Energy Efficient Distributed) which follows the principle of LEACH is considered for the study purpose. In this paper, a thorough analysis of three clustering protocols was carried out by keeping the network parameters same so as to conclude which protocol amongst the three utilizes the minimum energy and prolongs the network lifetime
A survey on Security Based Spontaneous Wireless Ad Hoc Networks for Communication Based Elliptical curve Cryptography
This paper presents a review on a secure protocol for spontaneous Wireless ad hoc network. In this paper we have focused on spontaneous network and wireless ad hoc network. Secure spontaneous wireless ad hoc network works on hybrid symmetric/asymmetric key management scheme in order to exchange the data. Symmetric key scheme is used to encrypt the data terminals which want to exchange data. The spontaneous network works without any infrastructure it do not require any central server or authority. In this secure spontaneous wireless ad hoc network trust is form by visual contact or by authentication procedure using session key. Then we can exchange services and resources. Existing protocol is for limited resources we are working on to add some new features to add no of resources
COLOR HISTOGRAM BASED MEDICAL IMAGE RETRIEVAL SYSTEM
This paper aims to focus on the feature extraction, selection and database creation of brain images for image retrieval which will aid for computer assisted diagnosis. The impact of content-based access to medical images is frequently reported but existing systems are designed for only a particular context of diagnosis. But, our concept of image retrieval in medical applications aims at a general structure for semantic content analysis that is suitable for numerous applications in case-based reasoning. By using the features, the database created for comparison. The color histogram is used to measure the similarity between the stored database image and the query image. The image which is more similar to the query image is retrieved as the resultant image. If the quer
Robotic Groundnut Sower
Robotics and automation does play a significant role in today’s world meeting future agricultural production needs. In the recent few years, a similar trend has begun to take place in agriculture, for example GPS- and vision-based monitoring and self-guided tractors and harvesters already being available commercially in markets. Most recently, farmers have already started to experiment with autonomous systems which automate operations such as thinning, and harvesting, pruning as well as mowing, spraying, and weed removal. This would be just the beginning of what a revolution will be in the way that agriculture is growing, tendering, and getting harvested. Our device would include android based application which would operate movement of device through Bluetooth module and operate excavating pistons which would dig hole and seeds would automatically fall into excavated hole.
DOI: 10.17762/ijritcc2321-8169.160412
MODIFICATION TO SPIHT ALGORITHM USING INCREMENTAL THRESHOLD FOR IMAGE COMPRESSION
The Modified SPIHT represents a more efficient implementation of the SPIHT algorithm by using variable thresholds to sort the list of insignificant pixels (LIP) and the list of insignificant sets (LIS). We observe two interesting facts: (I) most of the initial subsets in LIS are not only insignificant with respect to the maximum threshold, but also insignificant with respect to the smaller threshold. And (2) Most of the pixels generating from sorting LIS are smaller than the current threshold. Based on these two observations, it represents a new image codec method, which can make the binary encoded outputs more efficient, and can work well on different image sizes and different decomposition levels
Isolation, Screening and Characterization of Exopolysaccharide Producing Pseudomonas Sp. from The Soil Sample
Exopolysaccharides (EPS) are vital metabolites that specific environmental microorganisms produce and expel. The goal of the current investigation is to identify bacteria that produce exopolysaccharides in soil samples from the Buttenath Dam region, At. Chanai, Tq. Ambajogai, Dist. Beed situated in the Marathwada region of Maharashtra, India. Two methods, such as gravimetric analysis of exopolysaccharide dry weight and quantification as, instance, for total carbohydrate content using phenol sulphuric acid technique, were used to screen the EPS-producing capacities of the chosen isolates. Post preliminary screening by selecting thick, ropy-like colony formers on agar medium, the results showed that thirteen (13) distinct colonies were marked to manufacture EPS. Tentative identification of these isolates was done based on morphological and biochemical tests. Three (03) isolates, VJ001, VJ003 and VJ010, were identified through secondary screening as the most effective EPS producers (producing precipitates over 1.46 mg/L of total dry weight and 8). This was in comparison to other bacterial colonies that were also isolated. Out of these screened isolates, VJ003 was the isolate with the highest exopolysaccharide produced and this isolated bacterium was identified using 16S rRNA gene sequence and phylogeny study as Pseudomonas aeruginosa VJ003 with NCBI GeneBank accession no. OR196093. The Pseudomonas aeruginosa VJ003 strain can be used in biotechnological sectors because of the ability it has to create significant levels of exopolysaccharides, according to the results of the current study
Thermal comfort characteristics of knitted fabrics for abaya
Fabric material plays an important role in the thermal comfort of Abaya because it is the outer garment of Muslim women. Abaya is black in colour and covers the whole body except the hands, feet and face. It is mandatory to wear Abaya in the Saudi Arabia and certain parts of Middle East countries irrespective of the outside environmental temperature which could be up to 45°C. Therefore, the thermal transmission characteristics of the abaya are extremely important as human body responds to the external thermal environment through clothing. In a hot environment, it is extremely uncomfortable to wear several layers of clothing under the Abaya. Hence it is essential to enhance the thermal comfort of fabrics used for Abaya. This study investigated five selected knitted fabrics that could be used as Abaya fabrics for thermal resistance, air permeability, thermal comfort and vapour resistance. The results indicated that the fabrics with different knit structures, fibre composition and fabric weight have greater influence on thermal comfort performance
Ex-HABE with User Accountability for Secure Access Control in Cloud
Data outsourcing is becoming a useful and feasible paradigm with the rapid application of service-oriented technologies. Many researchers have tried combination of access control and cryptography to propose a model to protect sensitive information in this outsourcing scenario. However, these combinations in existing approaches have difficulty in key management and key distribution when fine-grained data access is required. Taking the complexity of fine-grained access control policy and the wide-reaching users of cloud in account, this issue would become extremely difficult to iron out. Various system models using attribute-based encryption (ABE) have been proposed however, most of them suffer from heavy overhead in implementing the access control policies. In this paper, a system is proposed with extended hierarchical attribute-based encryption (HABE) by using ciphertext-policy attribute-based encryption (ABE). It uses the hierarchical structure of users and bilinear mapping for generating the keys for various data handlers. Also the system focuses on user tracking by allocating an unique id to user. The system uses traitor tracing along with separation of duty made available by HABE and reduces the scope of key abuse. It is formally proved extended HABE with traitor tracing adds on to user accountability if user tracking for resource is maintained for hierarchical systems.
DOI: 10.17762/ijritcc2321-8169.16042
- …