2,426 research outputs found

    A Picturesque Description of Neuroticism in Anita Desai’s Cry, the Peacock

    Get PDF
    Anita Desai is an eminent novelist who explores the women’s psyche and her quest for identity. In her debut novel, Cry, The Peacock, she deals with the theme of husband wife alienation and the marital discord. Desai very finely portrays the character of Maya, lost in the dark world of agony and loneliness. Maya and Gautama, her husband, both possess a different outlook towards life. Maya is very sensitive and emotional whereas Gautama has a practical approach. Maya is unable to relate to Gautama. Her Emotional needs are not fulfilled by him. Maya’s mental agony is further aggravated by the prediction of the astrologer. Cry, The Peacock reflects upon the mental state and agony of women in the Indian society

    ESTABLISHMENT OF AGE VS STRENGTH CURVE FOR SET OF MATERIALS

    Get PDF
    This study was directed toward performance of concrete under varying water to cementitious materials ratio. The influence of constituent materials and various mix proportions on compressive strength of concrete was studied experimentally and reported. At each water/cement ratio varied from .25 to .55 at constant increment of 0.05. For all the concrete mixes,the compressive strength of concrete was determined at ages of 1,3,7,28,90 and 180 days. The experiment was carried out at the same ambient temperature and the compressive strengths of concrete mixes were found to increase with age but decrease as water - cement ratio increases. From the experimental test results,it was observed that the important parameter affecting the strength of concrete is the water/cement ratio and Abrams' generalization law is applicable to concrete in compression for our set of materials. Graphical model is proposed to predict the compressive strength of concrete using Water/Cement ratio. https://www.ijiert.org/paper-details?paper_id=14101

    Technology Enhanced Learning through ICT Tools using Aakash Tablet

    Get PDF
    Today with advancement in technology teachers have been conscious about the quality of teaching. Teaching can be enhanced through information communication technology (ICT) tools in education system for better understanding of the subject. Information communication technology can be utilized for the education sector. ICT can play great role in formal and non-formal forms of education. Lots of companies are coming up with digital materials for poor students. Many are making specialized hardware to meet the requirement of elementary education system

    Smart Power Monitoring System on Solar

    Get PDF
    The design and development of a Smart Power monitoring device has reported in this paper. System has been designed that can be used to monitor electrical appliances such as voltage, current and power of solar panel. The system consists of a smart sensing unit that detects and controls the energy deliver and it used for daily activities by following different tariff rates. A developed prototype has been extensively tested and experimental results have compared with conventional measuring devices. This work has been designed to implement smart power monitoring and control system through IOT using cloud data storage.In this system we are collecting the energy data from the solar panel and pass it to the microcontroller device. The device will pass this collected data via RS232 to the GSM sender.Here two GSM devices are used, that is sender and receiver.The PHP will perform some operation on the received data and stored it in database

    Portable TPM based user Attestation Architecture for Cloud Environments

    Get PDF
    Cloud computing is causing a major shift in the IT industry. Research indicates that the cloud computing industry segment is substantial and growing enormously. New technologies have been developed, and now there are various ways to virtualize IT systems and to access the needed applications on the Internet, through web based applications. Users, now can access their data any time and at any place with the service provided by the cloud storage. With all these benefits, security is always a concern. Even though the cloud provides accessing the data stored in cloud storage in a flexible and scalable manner, the main challenge it faces is with the security issues. Thus user may think it2019;s not secure since the encryption keys are managed by the software, therefore there is no attestation on the client software integrity. The cloud user who has to deploy in the reliable and secure environment should be confirmed from the Infrastructure as a Service (IaaS) that it has not been corrupted by the mischievous acts. Thus, the user identification which consists user ID and password can also be easily compromised. Apart from the traditional network security solutions, trusted computing technology is combined into more and more aspects of cloud computing environment to guarantee the integrity of platform and provide attestation mechanism for trustworthy services. Thus, enhancing the confidence of the IaaS provider. A cryptographic protocol adopted by the Trusted Computing Group enables the remote authentication which preserves the privacy of the user based on the trusted platform. Thus we propose a framework which defines Trusted Platform Module (TPM), a trusted computing group which proves the secure data access control in the cloud storage by providing additional security. In this paper, we define the TPMbased key management, remote client attestation and a secure key share protocol across multiple users. Then we consider some of the challenges with the current TPM based att

    Mining Closed Itemsets for Coherent Rules: An Inference Analysis Approach

    Get PDF
    Past observations have shown that a frequent item set mining algorithm are alleged to mine the closed ones because the finish offers a compact and a whole progress set and higher potency. Anyhow, the most recent closed item set mining algorithms works with candidate maintenance combined with check paradigm that is dear in runtime likewise as area usage when support threshold is a smaller amount or the item sets gets long. Here, we show, PEPP with inference analysis that could be a capable approach used for mining closed sequences for coherent rules while not candidate. It implements a unique sequence closure checking format with inference analysis that based mostly on Sequence Graph protruding by an approach labeled Parallel Edge projection and pruning in brief will refer as PEPP. We describe a novel inference analysis approach to prune patterns that tends to derive coherent rules. A whole observation having sparse and dense real-life information sets proved that PEPP with inference analysis performs larger compared to older algorithms because it takes low memory and is quicker than any algorithms those cited in literature frequently

    ESAHR: Energy Efficient Swarm Adaptive Hybrid Routing Topology for Mobile Ad hoc Networks

    Get PDF
    Ad hoc networks consist of independent self structured nodes. Nodes use a wireless medium for exchange their message or data, therefore two nodes can converse directly if and only if they are within each other2019;s broadcast range. Swarm intelligence submits to complex behaviors that occur from very effortless individual activities and exchanges, which is frequently experienced in nature, especially amongst social insects such as ants. Although each individual (an ant) has little intelligence and simply follows basic rules using local information gained from the surroundings, for instance ant2019;s pheromone track arranging and following activities, globally optimized activities, such as discovering a shortest route, appear when they work together as a group. In this regard in our earlier work we proposed a biologically inspired metaphor based routing in mobile ad hoc networks that referred as Swarm Adaptive Hybrid Routing (SAHR). . With the motivation gained from SAHR, here in this paper we propose a energy efficient swarm adaptive hybrid routing topology (ESAHR). The goal is to improve transmission performance along with energy conservation that used for packet transmission In this paper we use our earlier proposed algorithm that inspired from Swarm Intelligence to obtain these characteristics. In an extensive set of simulation tests, we evaluate our routing algorithm with state-of-the-art algorithm, and demonstrate that it gets better performance over a wide range of diverse scenarios and for a number of different assessment measures. In particular, we show that it scales better in energy conservation with the number of nodes in the network

    Save the Indigenous Teaching and Learning: ELT

    Get PDF
    This paper explores not only the care of the indigenous in nativity of teaching of English Language and also advising the methods for language learners and language teachers, the methods where all learners do have some access for cognitive knowledge of intellectual development in language. The learners according to GT method to use their cognitive faculty to memorize grammatical rules, vocabulary lists, translation and reading comprehension and many more. This paper doesn’t explain all the rules but principal characteristics of GT method, it suggests GT method importance. It unravels the focus learning through cognitive system which is a real thinking as native speakers do. The word indigenous here meant the nativity of EL, the teaching of educated native speakers of ELT which second language teachers cannot faithfully do the same but there are absolute qualities can be gained from native speakers learning. There are hundreds and thousands of software technologies that teach English Language. Information and communication technologies (ICT) refer to technologies that provide easy access to information through telecommunications. This includes the internet, wireless networks, cell phones, and other communication mediums. Learning EL through ICT is a half-backed knowledge.  All developed countries they setup and use digital learning. Here thanks to technology but if the curriculum is not designed with the standard approaches and the methods of ELT, surely a wrong learning enter! Even it leads to kill the language standards due to unnecessary globalized jargon. Globalization is one of the many terms virtually quotidian in present times discourse

    A Review Approach on various form of Apriori with Association Rule Mining

    Get PDF
    Data mining is a computerized technology that uses complicated algorithms to find relationships in large databases Extensive growth of data gives the motivation to find meaningful patterns among the huge data. Sequential pattern provides us interesting relationships between different items in sequential database. Association Rules Mining (ARM) is a function of DM research domain and arise many researchers interest to design a high efficient algorithm to mine ass ociation rules from transaction database. Association Rule Mining plays a important role in the process of mining data for frequent pattern matching. It is a universal technique which uses to refine the mining techniques. In computer science and data min ing, Apriori is a classic algorithm for learning association rules Apriori algorithm has been vital algorithm in association rule mining. . Apriori alg orithm - a realization of frequent pattern matching based on support and confidence measures produced exc ellent results in various fields. Main idea of this algorithm is to find useful patterns between different set of data. It is a simple algorithm yet having man y drawbacks. Many researches have been done for the improvement of this algorithm. This paper sho ws a complete survey on few good improved approaches of Apriori algorithm. This will be really very helpful for the upcoming researchers to find some new ideas from these approaches. The paper below summarizes the basic methodology of association rules alo ng with the mining association algorithms. The algorithms include the most basic Apriori algorithm along with other algorithms such as AprioriTi d, AprioriHybrid

    Method And System For Automatically Generating Artificial Intelligence Powered Prototypes

    Get PDF
    The present disclosure relates to a method and a system for automatically generating Artificial Intelligence (AI) powered prototypes. Here, a plurality of AI models is provided in a user interface of the system. Further, a selection of a set of the AI models is received via the user interface. For each of the set of the AI models, identification of input features and data sources is received via the user interface for training each of the plurality of AI models. Further, a selection of one or more rules for aggregating model inputs and model outputs is received via the user interface to form one or more searchable tables of sample data for at least one of the artificial intelligence models. The one or more rules include one or more categories of filtering criteria for populating the one or more searchable tables. In response to the user input, the model inputs in the data sources as defined by the input features are identified and a link between the model inputs and the artificial intelligence model is defined. Further, the one or more searchable tables having one or more columns corresponding to the one or more categories are created. Further, an order of operation of the set of artificial intelligence models is received via the user interface. In the order of operation, an output of one or more first AI models is used as an input for one or more second AI models. Thereafter, an AI ensemble that comprises the set of AI models is generated
    • …
    corecore