28 research outputs found

    Insecurities and Human Rights Issues of People Affected by Development-Induced Displacement

    Get PDF
    Development and displacement seem to be directly related to each other. As India is a densely populated country, any development project leads to the displacement of lakhs of people. Displacement is not just the physical relocation of displaced people but is also associated with social and economic consequences that disrupt the lives of people. The insecurities resulting from the same are manifold. They include human insecurity, social insecurity, economic insecurity, food insecurity, health insecurity, and gender-based insecurity. This paper briefly analyses the situation of displacement in India and reflects on the insecurities faced by the people displaced due to development projects

    Reducing the hygroscopic swelling in MEMS sensor using different mold materials

    Get PDF
    Today, Hygroscopic swelling is one of the biggest challenging problem of Epoxy mold compound (EMC) in packaging with Microelectromechanical system (MEMS) devices. To overcome this hygroscopic swelling problem of EMC and guard the devices, MEMS devices are molded in this paper with different Mold Compound (MC) i.e. titanium and ceramic etc. during their interconnection with the board. Also, a comparatively performance analysis of this various mold compound with MEMS pressure sensor has been studied in this paper at 60% humidity, 140 mol/m3 saturation concentration and 25 oC. It was observed that hygroscopic swelling does not take place in the titanium mold compound. But, titanium is very costly so we have to consider something cheaper material i.e. ceramic in this paper. The Hygroscopic swelling in Ceramic Mold Compound after 1 year is nearly 0.05mm which is very less than epoxy

    A rare case of repeated expulsions of a giant cervical fibroid per vaginum followed by delivery of near term babies in two consecutive pregnancies

    Get PDF
    Huge cervical fibroid polyp with red degeneration, obstructing birth canal might be a night mare for obstetricians. Most of us will plan for a caesarean section but somehow due to lack medical consultation; a patient in rural setup with a huge cervical fibroid, delivered normal in two consecutive pregnancies. This case is unique because no such case has been reported in literature where normal delivery took place twice in the same patient, with such a huge fibroid with red degeneration, obstructing the birth canal

    A Fault-Tolerant Mobile Computing Model Based On Scalable Replica

    Get PDF
    The most frequent challenge faced by mobile user is stay connected with online data, while disconnected or poorly connected store the replica of critical data. Nomadic users require replication to store copies of critical data on their mobile machines. Existing replication services do not provide all classes of mobile users with the capabilities they require, which include: the ability for direct synchronization between any two replicas, support for large numbers of replicas, and detailed control over what files reside on their local (mobile) replica. Existing peer-to-peer solutions would enable direct communication, but suffers from dramatic scaling problems in the number of replicas, limiting the number of overall users and impacting performance. Roam is a replication system designed to satisfy the requirements of the mobile user. Roam is based on the Ward Model, replication architecture for mobile environments. Using the Ward Model and new distributed algorithms, Roam provides a scalable replication solution for the mobile user. We describe the motivation, design, and implementation of Roam and report its performance. Replication is extremely important in mobile environments because nomadic users require local copies of important data

    Effect of humic acid and nutrients mixture on quality parameter of Tomato (Lycopersicon esculentum Mill.) under polyhouse condition

    Get PDF
    An experiment was conducted on Effect of humic acid and nutrients mixture on growth and yield parameter of Tomato (Lycopersicon esculentum Mill.) under polyhouse condition at Rajasthan College of Agriculture, Udaipur (Raj.). The data was analyzed statistically following completely randomized design. The results revealed that treatment T7 [(RDF + humic acid 10 kg/ha soil application + humic acid 0.1% foliar spray + nutrient mixture foliar spray (0.2% Ca + 0.5% Mg + 0.2% B + 0.5% Zn)] was recorded superior to enhance leaf nutrients analysis Ca (1.656%), Mg (0.763%), Zn (25.07ppm) and B (61.94ppm), fruit nutrient analysisCa (1.904%), Mg (0.877%), Zn (58.98ppm) and B (61.84ppm), total Soluble Solids (TSS) (6.020%), ascorbic acid content (39.85mg/100g), lycopene content (3.75 mg/100g) and cost benefit ratio (4.81)

    Community Organization in Indian Settings: Insights, Practices and Scope

    No full text

    Assessment of cases of infective keratitis

    No full text
    Background: A variety of factors determine clinical outcome in microbial keratitis and the epidemiological patterns vary from one country to the other and in different geographical areas in the same country. The present study was conducted to assess cases of infective keratitis. Materials & Methods: 76 patients diagnosed with infective keratitis of both genders were enrolled. Scrapings were subjected to Gram stain, potassium hydroxide preparation and culture for bacterial and fungal pathogens. Results: Out of 76 patients, males were 46 and females were 30. Micro-organisms found to be bacterial isolates in 54, fungal growth in 12 and no organism isolated in 10 cases. Bacterial isolates were staphylococcus aureus in 12, coagulase-negative staphylococci in 14, Micrococcus in 10, Klebsiella spp in 10 and Pseudomonas spp in 8. Fungus found to be curvularia spp in 2, aspergillus spp in 1, fusarium spp in 2, unidentified in 2 and candida spp in 5. The difference was significant (P< 0.05). Conclusion: Staphylococcus aureus, coagulase-negative staphylococci and candida spp. Were most commonly involved pathogen in infective keratitis

    Notice of Retraction Privacy Preserving Similarity Based Text Retrieval through Blind Storage

    No full text
    Notice of Retraction-----------------------------------------------------------------------After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IAES's Publication Principles.We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.The presenting author of this paper has the option to appeal this decision by contacting ijeei.iaes@gmail.com.-----------------------------------------------------------------------Cloud computing is improving rapidly due to their more advantage and more data owners give interest to outsource their data into cloud storage for centralize their data. As huge files stored in the cloud storage, there is need to implement the keyword based search process to data user. At the same time to protect the privacy of data, encryption techniques are used for sensitive data, that encryption is done before outsourcing data to cloud server. But it is critical to search results in encryption data. In this system we propose similarity text retrieval from the blind storage blocks with encryption format. This system provides more security because of blind storage system. In blind storage system data is stored randomly on cloud storage.  In Existing Data Owner cannot encrypt the document data as it was done only at server end. Everyone can access the data as there was no private key concept applied to maintained privacy of the data. But In our proposed system, Data Owner can encrypt the data himself using RSA algorithm.  RSA is a public key-cryptosystem and it is widely used for sensitive data storage over Internet. In our system we use Text mining process for identifying the index files of user documents. Before encryption we also use NLP (Nature Language Processing) technique to identify the keyword synonyms of data owner document. Here text mining process examines text word by word and collect literal meaning beyond the words group that composes the sentence. Those words are examined in API of word net so that only equivalent words can be identified for index file use. Our proposed system provides more secure and authorized way of recover the text in cloud storage with access control. Finally, our experimental result shows that our system is better than existing
    corecore