987 research outputs found

    Total Semirelib Graph

    Get PDF
    In this paper, the concept of Total semirelib graph of a planar graph is introduced. Authors present a characterization of those graphs whose total semirelib graphs are planar, outer planar, Eulerian, hamiltonian with crossing number one

    Management of e-Resources in R amp; D Centers: A Case Study of the Information Center at NAL13;

    Get PDF
    The developments in information technology and their applications to library and information services have given new dimension to the entire spectrum of information management. The information generated is usually stored in four physical media: paper, film, optical, and magnetic disks. The e-document be it a book, journal, technical report, conference proceedings is portable; has random access to its contents; and the document can also be a multimedia object, in that it may contain not only text, but also graphics, drawings, photographs or video. Now we have the emergence of publications over the electronic networks and the activity took off in a big way following the invention of the World Wide Web. The Open Access movement is becoming the order of the day. More than 3000 journals are free on net for anybody to access. A number of Institutional repositories and e-Prints archives have thrown challenge to the publishing industry. Consortium approach through different pricing, management and licensing models is enabling the libraries to provide access to thousands of e- journals, e-books and other kinds of e-documents. The Information center at NAL with its state-of-the-art library has progressed a good deal in this direction by acquiring different kind of documents especially e-form, cataloguing amp; processing them appropriately, storing and giving access to its patrons not only in library premises, but on to the desk tops spread in three different campuses through laboratory LAN and also extending selected services through Internet for the benefit of any body from any part of the world. 13; Created and maintained by ICAST the Portal x2018;AeroInfox2019; (www.aeroinfo.org.in) serves as one window information search facility for Web sources in aerospace science and technology. This virtual library facilitates multiple approach to information seekers as the web sources are indexed and organised using different schemes of classification including NASA subject categories. Care is taken to cover Indian aerospace sources exhaustively. The ICAST site (www.icast.org.in), apart from giving detailed information about library sources including books, journals, E-journals, databases and technical reports makes available different search tools for its users. Other details like working hours, library rules, staff details, contact persons, etc are provided. One can submit an online query and suggest documents for acquisition using online forms provided. The Library Database (OPAC) is probably is single largest in the country with more than 3.25 lakh bibliographic records of books, technical reports, patents, standards, journals, etc. ICAST users can search International databases like Aerospace Database, NTIS, J-Gate, Medline, etc through campus LAN. Users can access more than 2500 full text journals covering titles published by Elsevier (ScienceDirect), ASME, AIAA, Springer, John Wiley, OUP, CUP, AMS, World Scientific, few Annual Series, etc. Created by ICAST an e-journals gateway with browse and search (alphabetical and subject wise) facility for titles provides access to more than 700 journals available free on the net. The Centre provides a number of web/e-mail based innovative information services including Journal Contents Service, News Clipping Service, Monthly Documents Additions Lists covering both Books and Technical Reports, Web Alert Service and Union Catalogue of Journals -CSIR and Aerospace Libraries, etc

    Institutional Repositories in India: A Case Study of National Aerospace Laboratories

    Get PDF
    This paper traces the history and developments in Open Archives Initiatives including open access journals, e-print archives and Institutional repositories. The setting up of NAL’s Institutional Repository using OSS GNU Eprints, document types with statistical analysis, country wise statistics of full text download, levels of accessibility and technologies used in building the Institutional Repository have been discussed at lengt

    Multiple Libraries on a Single Platform:Success Story of University of Mysore

    Get PDF
    Library automation, though old topic needs an elaborative study, analysis and discussion. Majority of Indian Libraries create OPAC records and start automated circulation and do not go beyond by automating other housekeeping activities like acquisition, serials control and other modules. Few libraries take up this activity, however face many problems especially in choosing suitable Integrated Library Management System, following various standard protocols effectively, maintaining servers, getting funds for annual maintenance for getting third party service, etc. The success of library automation mainly depends upon the seriousness of librarians, support of managements, selection of suitable software, steps taken in maintenance, etc. There have been some attempts in developing 154 union catalogues such as that of INFLIBNET’s initiative covering Indian University Libraries. However such initiatives have not gone beyond discover services at the most ILL. This paper describes various aspects of library automation taking example of the successful automation of Library of University of Mysore, a model to follow by like minded libraries, especially the group of libraries under the same administrative umbrella to join their hands to use a single server using same ILMS for automating housekeeping activities beyond union catalogue

    Context-aware multi-attribute decision multi - attribute decision making for radio access technology selection in ultra dense network

    Get PDF
    Ultra Dense Network (UDN) is the extreme densification of heterogeneous Radio Access Technology (RAT) that is deployed closely in coordinated or uncoordinated manner. The densification of RAT forms an overlapping zone of signal coverage leading to the frequent service handovers among the RAT, thus degrading overall system performance. The current RAT selection approach is biased towards network-centric criteria pertaining to signal strength. However, the paradigm shift from network-centric to user-centric approach necessitates a multi-criteria selection process, with methodology relating to both network and user preferences in the context of future generation networks. Hence, an effective selection approach is required to avoid unnecessary handovers in RAT. The main aim of this study is to propose the Context-aware Multiattribute decision making for RAT (CMRAT) selection for investigating the need to choose a new RAT and further determine the best amongst the available methods. The CMRAT consists of two mechanisms, namely the Context-aware Analytical Hierarchy Process (CAHP) and Context-aware Technique for Order Preference by Similarity to an Ideal Solution (CTOPSIS). The CAHP mechanism measures the need to switch from the current RAT, while CTOPSIS aids in decision making to choose the best target RAT. A series of experimental studies were conducted to validate the effectiveness of CMRAT for achieving improved system performance. The investigation utilises shopping mall and urban dense network scenarios to evaluate the performance of RAT selection through simulation. The findings demonstrated that the CMRAT approach reduces delay and the number of handovers leading to an improvement of throughput and packet delivery ratio when compared to that of the commonly used A2A4-RSRQ approach. The CMRAT approach is effective in the RAT selection within UDN environment, thus supporting heterogeneous RAT deployment in future 5G networks. With context-aware selection, the user-centric feature is also emphasized

    Review of pemetrexed in combination with cisplatin for the treatment of malignant pleural mesothelioma

    Get PDF
    Malignant pleural mesothelioma is a resistant form of lung cancer, and its incidence continues to rise in Europe and Australia. Until recently, chemotherapy had not been shown to be effective in the treatment of this slowly progressive disease. In 2004, the combination of pemetrexed and cisplatin was shown to induce high response rates in MPM. This article reviews the published literature describing the development and testing of this therapeutic combination in mesothelioma, and examines in detail the key phase III clinical trial that led to the approval of pemetrexed by the US FDA. Ongoing research will further define the role of pemetrexed plus cisplatin in the treatment of MPM

    Multilayer Security Mechanism in Computer Networks

    Get PDF
    In multilayered security infrastructure, the layers are projected in a way that vulnerability of one layer could not compromise the other layers and thus the whole system is not vulnerable. This paper evaluates security mechanism on application, transport and network layers of ISO/OSI reference model and gives examples of today's most popular security protocols applied in each of mentioned layers. A secure computer network systems is recommended that consists of combined security mechanisms on three different ISO/OSI reference model layers : application layer security based on strong user authentication, digital signature, confidentiality protection, digital certificates and hardware tokens, transport layer security based on establishment of a cryptographic tunnel between network nodes and strong node authentication procedure and network IP layer security providing bulk security mechanisms on network level between network nodes. Strong authentication procedures used for user based on digital certificates and PKI systems are especially emphasized. Keywords: Multilayered Security Systems, PKI systems, Smart Cards

    Multilayer Security Mechanism in Computer Networks

    Get PDF
    In multilayered security infrastructure, the layers are projected in a way that vulnerability of one layer could not compromise the other layers and thus the whole system is not vulnerable. This paper evaluates security mechanism on application, transport and network layers of ISO/OSI reference model and gives examples of today's most popular security protocols applied in each of mentioned layers. A secure computer network systems is recommended that consists of combined security mechanisms on three different ISO/OSI reference model layers : application layer security based on strong user authentication, digital signature, confidentiality protection, digital certificates and hardware tokens, transport layer security based on establishment of a cryptographic tunnel between network nodes and strong node authentication procedure and network IP layer security providing bulk security mechanisms on network level between network nodes. Strong authentication procedures used for user based on digital certificates and PKI systems are especially emphasized.  Keywords: Multilayered Security Systems, PKI systems, Smart Cards

    Capacity boost with data security in Network Protocol Covert Channel

    Get PDF
    Covert channels leaks information where information travels unnoticed i.e. the communication itself is hidden. Encryption used to protect the communication   from being decoded by unauthorized users. But covert channels hide the existence of communication. Covert channels are serious security threat. There are many existing techniques available for development of covert channels by manipulating certain fields in the network protocols such as HTTP, IP, TCP, etc. The available packet length based covert channels are having tamper resistance capability but due to abnormal traffic distribution results in detection possibility. In this paper we present packet length based covert channel by using real time packet lengths where statistical detection of the covert channels is not possible due to random transformations and computations used in the algorithm. Also we improved the covert data capacity and security by applying certain encryption algorithm which doesn't change the length of the original data load compared to other available techniques. We focused on implementation details and try to find out the future expansion. Keywords: Covert channels, packet length, high bandwidth, network protocols, packet payload, computer networ
    corecore