1,451 research outputs found

    BPMN to BPEL: Implementing ATM System

    Get PDF
    BPMN provides a standard graphical notation for modelling business process. BPEL is a XML based language which generate executable code from BPMN diagram. Several BPEL engines are available which execute BPEL. In this paper , an example is provided to explain how BPMN diagram is generated and then with the help of BPEL executable code is generated

    Image Inpainting with Improved Storage Capability using DCT

    Get PDF
    Nowadays, tremendous amount of digital media is generating but having grazes on it. In this paper we proposed new idea to remove the graze from image, called image inpainting where in, Exemplar based image inpainting follows discrete cosine transform . The exemplar based image inpainting is based on copy-and-paste texture synthesis for reconstructing damaged parts of an image. Based on exemplar-matching techniques performance and speed of algorithm increases but size of image is also increases so, we proposed discrete cosine transform for reducing the size of image, removing noise and ultimately provides it good quality of image

    Developing and Promoting a Nuclear Security Curriculum at Amity University, India: Beginnings, Successes and Challenges

    Get PDF
    Amity University is one of India’s leading research- and innovation-driven private universities. The Amity Institute of Nuclear Science and Technology (AINST), established in 2009, contribute to Amity’s mission to promote national development through philanthropy, education and research. Very recently, courses related to nuclear security and security culture have been added to the existing AINST curriculum. The purpose of introducing this course was to enhance the understanding of technical, policy, and regulatory challenges associated with nuclear security and to create a nuclear security culture among relevant local institutions. This paper describes the process involved in establishing nuclear security as an elective course in the Engineering and Technology Domain for undergraduate-level and postgraduate-level engineering students at the Institute, discusses both challenges faced in these early stages as well as achievements and successes, and outlines future plans for the program

    IMPACT OF KVK IN DOUBLING FARMERS INCOME IN SITAPUR DISTRICT OF UTTAR PRADESH

    Get PDF
    More than half of Indian population were engaged in agricultural sector but the available technology doesn’t ensure food security of the country. Hence, to diffuse new agricultural invention and innovation in the farming community, there arises a need for effective medium for transfer of technology. Thus, KVK bridges the gap between the technology generation and dissemination. The present study was proposed to understand the impact of KVK in doubling farmers income to formulate suitable programmes. For the study, descriptive research design was adopted. 120 respondents from Biswan taluk of Sitapur district of Uttar Pradesh were selected as respondents. Primary data collected from respondents and secondary data from available literatures. The findings revealed that majority of the respondents were middle aged, illiterate, upto 5 members in their family, medium level of annual income, possesses their own land, agriculture as their main occupation, medium level of mass media exposure, office bearer in one organization, high level of extension contact. Meanwhile, more than half of the respondents had reported medium level of impact towards the activities carried out by KVK, beneficiary selection is not unbiased is a major constraint suggested that maximum emphasis should be given on learning by doing. View Article DOI: 10.47856/ijaast.2021.v08i9.01

    STUDY ON GAS CHROMATOGRAPHY AND MASS SPECTROSCOPY ANALYSIS, ANTIOXIDANT, AND NUTRITIVE PROPERTIES OF AERVA LANATA (L.) JUSS. COLLECTED FROM SELECTED REGIONS OF SHIMOGA, KARNATAKA, INDIA

    Get PDF
    Objective: Aerva lanata (L.) Juss., the plant ethanolic extract was subjected to gas chromatography and mass spectroscopy, antioxidant, and nutritive experiment using standard methods. Methods: Antioxidant experiment is done using 2, 2‑diphenyl‑1‑picrylhydrazyl, 2, 2‑azobis‑3‑ethylbenthiozoline‑6‑sulfonic acid, superoxide radical scavenging, hydroxy radical scavenging, and metal‑chelating assays. Nutritive value is performed by double acid digestion followed by atomic absorption spectroscopy. Results: Antioxidant experiment revealed that A. lanata (L.) Juss. the plant ethanolic extract has good medicinal compounds exhibits excellent antioxidant activity in all tested experiments, but comparably less with the standards used. From nutritive value experiment, it is revealed that A. lanata (L.) Juss the plant has high iron content with rich macro‑ and micro‑nutrients. Conclusion: A. lanata (L.) Juss. could be exploited as a valuable source of antioxidant agent enriching with nutrients

    Clone Detection for Efficient System in WSN Using AODV

    Get PDF
    Wireless sensor networks accommodate a whole lot to thousands of sensor nodes and are wide employed in civilian and security applications. One in every of the intense physical attacks faced by the wireless sensor network is node clone attack. So 2 node clone detection protocols area unit introduced via distributed hash table and arbitrarily directed exploration to detect node clones. The previous primarily based on a hash table value that is already distributed and provides key based facilities like checking and caching to observe node clones. The later one is exploitation probabilistic directed forwarding technique and border determination. The simulation results for storage consumption, communication value and detection chance is completed exploitation NS2 and obtained arbitrarily directed exploration is that the best one having low communication value and storage consumption and has smart detection chance

    Review on Colour Image Denoising using Wavelet Soft Thresholding Technique

    Get PDF
    In this modern age of communication the image and video is important as Visual information transmitted in the form of digital images, but after the transmission image is often ruined with noise. Therefore the received image needs to be processing before it can be used for further applications. Image denoising implicates the manipulation of the image data to produce a high quality of image without any noise. Most of the work which had done in color scale image is by filter domain approach, but we think that the transform domain approach give great result in the field of color image denoising.. This paper reviews the several types of noise which corrupted the color image and also the existing denoising algorithms based on wavelet threshodling technique. DOI: 10.17762/ijritcc2321-8169.15039

    Clone Detection for Efficient System in WSN using AODV

    Get PDF
    Wireless sensor is wide deployed for a spread of application, starting from surroundings observance to telemedicine and objects chase, etc. For value effective sensing element placement, sensors are usually not tamperproof device and are deployed in places while not observance and protection, that creates them at risk of fully different attacks. As an example, a malicious user may compromise some sensors and acquire their private information. Then, it?ll duplicate the detectors and deploy clones in an exceedingly wireless sensor network (WSN) to launch a spread of attack that?s mentioned as clone attack. Because the duplicated sensors have an equivalent information, e.g., code and crypto graphical information, captured from legitimate sensors that may merely participate in network operation and launch attacks. Because of the low value for sensing components duplication and preparation, clone attacks became one in all the foremost essential security issues in WSNs. Thus, it?s essential to effectively detect clone attacks therefore to ensure healthy operation of WSNs

    Linking Supervisor and Co-workers Support to Organizational Commitment: Mediating Effect of Work-Family Conflict

    Get PDF
    The present study investigates the effect of supervisor support and co-worker support on employees' organizational commitment by incorporating the role of work-family conflict as a mediator. Primary data were collected from 353 employees working in the service sector of India. Partial least square structural equational modelling in Smart PLS software was used for analysis. Results confirm that supervisor support significantly influence the organizational commitment of the employees. Work-family conflict act as a mediator between the relationship of supervisor support and organizational commitment. There is no significant effect of co-worker support on organizational commitment. Work-family conflict does not mediate between the relationship of co-worker support and organizational commitment. This study explains the importance of supportiveness from the supervisor in an industrializing country like India. It also provides an insight to the management in realizing the need to provide sensitivity training to the supervisors and the fact that special attention should be given while hiring the supervisors. This research will be useful to the management, researchers, policymakers, and society at large

    CONSTRAINTS FACED BY RESPONDENTS ON KISAN CREDIT CARD SCHEME AND SEEK THEIR SUGGESTIONS FOR BETTER SERVICES

    Get PDF
    The scheme Kisan credit card was started in August 1998 in order to provide timely and hassle free credit for the production requirements of the farmers. The main purpose of the scheme was to meet the production as well as consumption needs of the farmers. The present study was conducted in Soraon block of Prayagraj district of Uttar Pradesh. Ex-post facto research design was followed for the analysis. There are 20 blocks in the selected district out of that Soraon block was selected purposively because the existence of Kisan Credit Card scheme is comparatively more as compared to other blocks. There are 71 villages in the selected block out of that number of 6 villages was selected based on maximum number of farmers involved in KCC scheme. Total number of 120 respondents were selected randomly from 6 villages for the present study The major constraints faced by the respondents are High rate of interest on loan followed by Purpose of availing loan not accepting, Timeliness of credit, Delay by bank side and Duration of loan was very short. It was suggested that Credit limit to be increased considering family expenses, Extent of validity of card up to 5 years, Lower the interest rate, Repayment only after harvest, Flexibility to draw cash and Limit to be fixed on the basis of operational land holding, which will be lead all round development in the research area. View Article DOI: 10.47856/ijaast.2021.v08i10.01
    • …
    corecore