Interdisciplinary Science articles list

The beginnings of the organization of the kosovo liberation army in the lap operational subzone december 1995 – june 1998

The study, “The beginnings of the organization of the Kosovo Liberation Army in the Lap Operational Subzone December 1995 – June 1998,” as its object of study has the period of the Kosovo Liberation War in the years 1998-1999. This study touches upon the historical dimension of the efforts and sacrifices of Albanians found in the Serbian-Yugoslav area against their will.This study’s main topic is the beginnings of the organization in the Lap Operational Subzone (LOSz) as a significant part of the KLA. The study has undergone a scientific analysis based on sources of all kinds. The analysis included LOSz’s position in the KLA structure: the mission and duties during the liberation war, the governing bodies at the beginning of the LOSz organization and their functional organization, as well as the battles and downfalls of the freedom fighters. Historical literature, feuilletons, scientific papers, as well as interviews with famous personalities, were used to shed more light on the organization and the war in LOSz. This topic covers an essential segment of the Kosovo Liberation War period 1998-1999 And contributes towards the complete enlightenment of this historical period, especially in this region. Therefore, hopefully, this study will build interest and create perspectives for new studies of this nature.

Anglisticum

General meaning relation - definite / indefinite meaning in noun class

The general meaning of a word is the representation of the type from it, in linguistic contexts and certain grammatical forms and this meaning is opposed to the individualized meaning, the separation of a unique item of the type, distinguishable from others. The general meaning seems like a grammatical meaning that is not formally sufficiently marked, but the indefinite articles and the suffixes, in addition to other grammatical meanings, can also express a general meaning in certain contexts. A definite meaning of the noun is generally considered the meaning of the noun in the definite form and indefinite meaning the one of the indefinite noun. But how does the general meaning relate to them? Nouns with general meaning, whether in the indefinite form or in the definite form are meaningfully definite. Both the speaker and the listener know the class that the general noun marks. Despite the formal indefiniteness / definiteness, nouns with a general meaning are semantically definite.

Anglisticum

A comparative study of social and economic aspect of migration

India is a country of immense diversity. It is home to people of many different racial, languages, ethnic, religious, and national backgrounds. Groups of people in India differ from each other not only in physical or demographic characteristics but also in distinctive patterns of behavior and these patterns are determined by social and cultural factors like language, region, religion, and caste. Apart from behaviour, economic development, level of education and political culture of the people in various social segments differ from region to region. More you can say that economy and cultures have been enriched by the contributions of migrants from round the globe. In an increasingly globalised world, migratory movements is continuously shaping the countries all over the world. Some countries like India and Ireland, which set the example of economic development and social integration, have the positive impact of the migration by globalisation and some countries like USA, which recently witness racism, xenophobia and discrimination have the negative impact on the migrants. It does not mean India do not face fragmentation and USA do not have cohesion. USA have many stories which show successful integration process, that facilitated the lives of immigrant communities, but being a developed country it still suffers from cultural alienation. In these countries, borders are built within borders to create cultural divides that do not allow people to integrate. Recently, this problem has become more prominent due to the rise of terrorism, clash of cultures in the world, leading to the glorification of stereotypes. People are becoming less accepting towards anyone who does not belong to their region. Migration does not stop after people move from one place to another place. The main question start after that ‘now what’ they will do. That is why this topic needs to be discussed thoroughly in order to find better solutions. This paper will begin with an analysis of different approaches to Migration, discuss the target groups for integration policies, provide indicators of the current situation of migrants and proceed to an analysis of integration tools: legislation, social policies and participatory processes. It will focus not only on the impact of migration but also on social integration, mix culture like indo-western culture in a comparative basis.

Ekta Meena

A comparative study of social and economic aspect of migration

India is a country of immense diversity. It is home to people of many different racial, languages, ethnic, religious, and national backgrounds. Groups of people in India differ from each other not only in physical or demographic characteristics but also in distinctive patterns of behavior and these patterns are determined by social and cultural factors like language, region, religion, and caste. Apart from behaviour, economic development, level of education and political culture of the people in various social segments differ from region to region. More you can say that economy and cultures have been enriched by the contributions of migrants from round the globe. In an increasingly globalised world, migratory movements is continuously shaping the countries all over the world. Some countries like India and Ireland, which set the example of economic development and social integration, have the positive impact of the migration by globalisation and some countries like USA, which recently witness racism, xenophobia and discrimination have the negative impact on the migrants. It does not mean India do not face fragmentation and USA do not have cohesion. USA have many stories which show successful integration process, that facilitated the lives of immigrant communities, but being a developed country it still suffers from cultural alienation. In these countries, borders are built within borders to create cultural divides that do not allow people to integrate. Recently, this problem has become more prominent due to the rise of terrorism, clash of cultures in the world, leading to the glorification of stereotypes. People are becoming less accepting towards anyone who does not belong to their region. Migration does not stop after people move from one place to another place. The main question start after that ‘now what’ they will do. That is why this topic needs to be discussed thoroughly in order to find better solutions. This paper will begin with an analysis of different approaches to Migration, discuss the target groups for integration policies, provide indicators of the current situation of migrants and proceed to an analysis of integration tools: legislation, social policies and participatory processes. It will focus not only on the impact of migration but also on social integration, mix culture like indo-western culture in a comparative basis.

Ekta Meena

Study of temperature variation in human peripheral region during wound healing process due to plastic surgery

In this paper, investigations are made to analyze the human body temperature during wound healing process due to surgery. Wound is considered after the skin graft. Skin graft is a technique used in plastic surgery. Skin is the first line of defense between the human and environment, it is very susceptible to damage. Internal body or core temperature (Tb) is one of the clinical vital signs along with pulse and respiratory rates. Any disturbance in body temperature will drive complexities in wound healing process. These studies are important in the mechanism of establishing the limits of thermal regulation of human body during the healing process in different situations and conditions. The Finite element method is used to analyze tissues temperature for normal tissues (donor site) and abnormal tissues (tissues after surgery). Appropriate boundary conditions have been framed. Numerical results are obtained using Crank Nicolson Method.

Manisha Jain

Secured data transmission in vanet using vehicular digital hash gen model

Vehicular adhoc structures (VANETs) handle the Public Key Infrastructure (PKI) and Certificate Revocation Lists (CRLs) for their security. In any PKI structure, the check of a got message is performed by checking if the check of the sender is joined into the current CRL, Verifying the reliability of the certification and standard for the sender. In this paper, it has been propose a Vehicular Digital Hash Gen show up (VDHG) for VANETs, which replaces the dull CRL checking process by a profitable revoking checking process. The renouncing check process in VDHG uses a Private Key Infrastructure (PKI), where the key used in finding the VDHG is shared particularly between On-Board Units (OBUs). In like manner, VDHG uses a novel probabilistic key stream, which extras with OBUs to trade and revive an issue key. VDHG can on a very basic level lessen the data torment in light of the message declaration deferral pulled back and the standard assistance structures using CRL

Dr H Shaheen

An efficient classifier decision tree for active context source discover on mobile pervasive environment

Mobile pervasive environment interact with several devices at varying service ranges. The technical heterogeneity of pervasive environment is expected to increase the system flexibility and adaptability on modeling with context training phase. While working with context based training phase, time entity measure is considered as the significant issue. The evaluation of the services through numerous devices during training phase does not acquire an effective service monitoring on mobile pervasive environment. Mobile pervasive environment based information extraction fails to modify the patterns as activities change over time. To improve the flexibility of context training phase in mobile pervasive environment, an Active Context Source Discover Training Phase (ACSDTP) with Classifier Decision Tree Support (CDTS) mechanism is proposed in this paper. Our research work is to develop an effective modification (i.e., updation) of the pattern on training phase with real world context as per changes over time. Initially, the ACSDTP set up the available sensors in pervasive environment to work with the ever changing set of context users. The available sensors are maintained using the Active Discover process. Second, the CDTS mechanism is designed using weighted prediction for easy identification of context result on the training phase. Decision tree is operated separately using the learning techniques, where the identification is performed in a significant manner with minimal time factor. The learning process is performed to identify the inferred situations. Finally, the integration process is carried out to work with the complex association between the situations and sensor data in the mobile pervasive environment to achieve flexibility and adaptability factor. Experiment is conducted on factors such as time entity measure rate, precision ratio, and user context result determination level.

Dr H Shaheen

The prospect of legal education: an india overview

Education in India is losing its relevance. This seems much more applicable to the situation in the present day of legal education. This essay aims to focus on two aspects of legal education. Whilst, on one hand, it aims to provide details of the existing legal education system on the other, it aims to drive more attention to the various improvements and developments that are needed. The essay firstly shall describe the existing legal education system. It shall analyze and assess the curricula that are available for the various undergraduate law degrees available in India. It aims to provide an understanding of the perceived distinctions between the three-year law degree and the five-year law degree. As a second aspect, the essay aims to explore options to further the quality of legal education in India by considering examples of various law schools or colleges of law across the world that have consistently proven themselves as a cut-above not legal education and research in their global scale. Also, from the learnings of the gaps in the curricula of the law degrees as discussed previously, the essay shall provide suggestions on the various plausible collaborations with foreign law schools and universities for the benefit of the Indian law schools and colleges of law. As a third and final aspect, as a measure to curb fake or bogus law schools or colleges of law within India and to enhance the employability of law graduates in India at par with those across the globe, the essay aims to provide suggestions applicable for the present-day legal education scenario.

Hari Hara Sudhan R

Characteristics-centered cryptography with cloud revocation authority and its applications

Identity-based encryption (IBE) is a public key cryptosystem and eliminates the demands of public key infrastructure (PKI) and certificate administration in conventional public key settings. Because of the absence of PKI, the revocation drawback could be a crucial issue in IBE settings. Many rescindable IBE schemes are planned relating to this issue. Quite recently, by embedding associate outsourcing computation technique into IBE, Li et al. planned a rescindable IBE theme with a key-update cloud service supplier (KU-CSP). However, their theme has 2 shortcomings. One is that the computation and communication prices are above previous rescindable IBE schemes. The opposite disadvantage is lack of measurability within the sense that the KU-CSP should keep a secret worth for every user. Within the article, we have a tendency to propose a replacement rescindable IBE theme with a cloud revocation authority (CRA) to resolve the 2 shortcomings, namely, the performance is significantly improved and the CRA holds only a system secret for all the users. For security analysis, we demonstrate that the proposed scheme is semantically secure under the Decisional Bilinear Diffie-Hellman (DBDH) assumption. Finally, we have a tendency to extend the planned rescindable IBE theme to gift a CRA-aided authentication theme with period-limited privileges for managing an outsized range of varied cloud services.

Dr H Shaheen

Securing video files using steganography method in android mobile

The development of smart phone technology has lead to denigrate of the phone prepared with many sophisticated features such as sensors. Camera is one of the most extensively used sensors. Although the photographs capture by camera can be shared via Multimedia Message Service (MMS) which allows broadcast of files like photographs, audio and video. A major problem of MMS is, it doesn’t provide adequate safety mechanism. Because of this, the data of the people who wants to conceal confidential information from state-controlled systems that can be easily monitored. Video Steganography is a technique to hide any type of files in any extension into a Video file. The idea proposed in this paper is to embed any kind of data in another file, which is called carrier file. The carrier file must be image video file. Steganography is the art of hiding messages inside other messages such that the very existence of the message is unknown to third party. In this paper, a steganography-based android mobile application that can insert the confidential information into an image, then into a video that can be send it to receiver. Finally we can extract the confidential information from the image in the receiver side.

Dr H Shaheen

A secure distributed peer to peer systems

A P2P network can be an ad hoc connection- a couple of computers connected via a Universal Serial Bus to transfer files. And these networks are vulnerable to peers. The traditional security techniques are insufficient for P2P networks as they are insecure by their very nature. There’s no centralized server controlling access to shared resources in a P2P network which have unique challenges including identity management of the peers, secure reputation data management, Sybil attacks, and above all, availability of reputation data. The future actions are predicted where peers are encapsulated in its digital reputation, based on the past behaviour of the peer.Thus a peer’s reputation allows it to cooperate and prevent from malicious activities. The cryptographic protocol is coupled with selfcertification and cryptographic mechanisms for identity management and countering Sybil attack.

Dr H Shaheen

A study on picture recognition using pre-processing and decision making

Abstract should be times new roman with 9 fount single spacing.The main focused of Watermarking is developing and i Image Recognition is the idea of simulating the visual functions of human brain which uses human eyes as the source of input to recognize and make decisions on the objects it sees. This became possible with the advent of cameras and advanced processing technologies. The idea is to copy the features exactly present in the pattern, that the brain uses to recognize images [6]. The image in the real world are captured and pre-processed in the desired format and stored in large chunks of memories. This is to provide the recognition program to compare the new image taken with the ones that has been pre-processed and stored. The comparison is done at the pixel level of the image which is expressed in a matrix form. The image is compared with the data set stored at pixel level and the decisions are made recognizing the image. This picture recognition method becomes a smarter solution with the availability of more number of data sets. With large number of trail and errors the system will get familiar and intelligent providing best solution for computer and robot vision technologies.

Dr H Shaheen

Iot based system on chip for multiple applications

The rapid growth of wireless devices introduces a diverse range of applications and requires intelligent hardware platforms that integrate computing, sensing, and wireless connectivity in a compact systemon- chip (SoC). This paper presents a low-power, high-performance SoC platform that supports dynamic power management and secure communication. The SoC platform consists of 16-/32-bit programmable ARM9 cores, a power management unit with multiple low-power modes, analog and digital peripherals, and security engines. A complete tool-chain with an automatic platform generator has also been developed to ease and accelerate the application development. Fabricated in a 65 nm CMOS technology, an implementation of the proposed platform occupies an area of 1.0 × 1.7 mm2.

Dr H Shaheen

Dissemination of link state information for enhancing security in mobile ad hoc networks

A mobile adhoc network is a Self-configuring network of mobile routers connected by wireless links. In the mobile adhoc network, each and every device moves independently in any direction so that there are frequent changes in the links. It is essential to learn the position of the neighbors because there is increase in location-aware services. So, there is a chance that the malicious nodes are easily abused the process. The significant problem in mobile networks is correctness of node locations and also it is primarily challenging in the presence of adversaries. So, the neighbor position verification protocol is used to a fully distributed, a lightweight NPV procedure which allows each node to obtain the locations advertised by its neighbors and asses their truthfulness. Further to extend neighbor position verification protocols in the proactive model that need to each node constantly verify the position of its neighbors. So, we introduce a technique called secure link state updating which provides secure proactive topology discovery that is multiply useful for the network operation. This technique is vigorous against individual attackers, it is capable to adjust its capacity between local and network-wide topology discovery, and also operating in networks of frequently changing topology and membership nodes. Experimental results show that the proposed system is high efficiency in terms of security when compared to the existing system.

Dr H Shaheen

Hybrid cryptography algorithms for enhanced adaptive acknowledgment secure in manet

The mobile adhoc network is a group of mobile nodes without having the fixed infrastructure. Due to the infrastructure less network and distributed nature, make mobile adhoc network susceptible to malicious attackers. So, we use an intrusion detection system called Enhanced Adaptive ACKnowledgement (EAACK) especially for mobile adhoc networks. Based on the digital signature algorithm (DSA) and RSA the EAACK is designed. To enhance the strength of the security in the mobile adhoc networks, we introduce an innovative approach called Hybrid Security Protocol that provides integrity, confidentiality and authentication. This Hybrid Security Protocol consists of Cryptography based on Elliptic curve, Dual-RSA algorithm and Message Digest MD5. Encryption is achieved by using Elliptic Curve Cryptography, Dual-RSA algorithm for authentication and MD-5 for integrity. By using a combination of both symmetric and asymmetric cryptographic techniques, we achieve better security with integrity.

Dr H Shaheen

Modelling and analytical proofing of low energy temperature control using earth/ground water heat exchanger

For given condition of (temperature and humidity) of suction air, the delivery air condition depends on the system parameters (depth, radius, length and air mass flow rate), thermo physical properties of the surrounding earth (thermal conductivity and specific thermal capacity) and earth surface environment (ambient temperature, ambient humidity and solar irradiance)[1,3].Sensitivity analysis of system performance is essential for understanding the relative importance of different parameters of design of a optimum system [2,5]. For the steady state periodic input air condition and the performance of the system can be measured in terms of heating potential during the winter period and cooling potential during the summer period. Sensitivity of the system performance parameters (heating potential in winter and cooling potential in summer) to the changes in system parameters or thermo physical properties of the surrounding earth has been analysed and the result is present is in this paper.

Dr H Shaheen

Effective key management in dynamic wsn

Recently, wireless sensor networks (WSNs) have been deployed for a wide variety of applications, including military sensing and tracking, patient status monitoring, traffic flow monitoring, where sensory devices often move between different locations. Securing data and communications requires suitable encryption key protocols. In this paper, we propose a certificateless-effective key management (CL-EKM) protocol for secure communication in dynamic WSNs characterized by node mobility. The CL-EKM supports efficient key updates when a node leaves or joins a cluster and ensures forward and backward key secrecy. The protocol also supports efficient key revocation for compromised nodes and minimizes the impact of a node compromise on the security of other communication links. A security analysis of our scheme shows that our protocol is effective in defending against various attacks.We implement CL-EKM in Contiki OS and simulate it using Cooja simulator to assess its time, energy, communication, and memory performance.

Dr H Shaheen

Carbon footprint is an indicator of sustainability in rice-wheat cropping system: a review

Intensively cultivated rice-wheat cropping system of the Indo Gangetic plain (IGP) is a potential source of greenhouse gas (GHG) emissions.Agriculture sector emits GHGs like methane (CH4) and nitrous oxide (N2O). The total amount of GHGs emitted by a product is known as its carbon footprint (CFP).Quantification of CFP of crops will help in identifying management practices to reduce CFP of crop production. Studies related to assessing of CFP of agricultural products are lacking. The present review paper was aimed to discuss about the studies done on GHG emission from rice-wheat cropping system of the Indo Gangetic plains. The paper elaborates on what is CFP, how to calculate CFP of rice-wheat cropping system with the help of different case studies. The paper provides insights about certain agricultural management practices which can help in reducing CFP of rice-wheat cropping system. Discussion from this paper signifies the importance of carbon footprint assessment in maintaining the sustainability of rice wheat cropping system.

Dr.Renu Dhupper

Metapuf: a challenge response pair generator

Physically unclonable function (PUF) is a hardware security module preferred for hardware feature based random number and secret key generation. Security of a cryptographic system relies on the quality of the challenge-response pair, it is necessary that the key generation mechanism must unpredictable and its response should constant under different operating condition. Metastable state in CMOS latch is undesirable since it response becomes unpredictable, this feature used in this work to generate a unique response. A feedback mechanism is developed which forces the latch into the metastable region; after metastable state, latch settle to high or state depends on circuit internal condition and noise which cannot be predicted. Obtained inter hamming variation for 8 PUF is 51% and average intra hamming distance is 99.76% with supply voltage variation and 96.22% with temperature variation.

Abhishek Kumar

3d torus router architecture for efficient network on chip design

Network on Chips are becoming an important aspect in areas of multiprocessor chip design and high performance computing. Reduction in usage of excess amount of hardware in router design without operating all parameters can improve the performance of the system. The practical review of various routers applied in future of networking is carried out in this paper. Fundamental design considerations and various components involved in router design in terms of communication, energy management and power conversion is summarized in detail. A brief comparison of various routers designed previously has been made along with design aspects for 3D Torus router.

ASHISH MULAJKAR

 1 2 >