India is a country of immense diversity. It is home to people of many different racial, languages, ethnic, religious, and national backgrounds. Groups of people in India differ from each other not only in physical or demographic characteristics but also in distinctive patterns of behavior and these patterns are determined by social and cultural factors like language, region, religion, and caste. Apart from behaviour, economic development, level of education and political culture of the people in various social segments differ from region to region. More you can say that economy and cultures have been enriched by the contributions of migrants from round the globe. In an increasingly globalised world, migratory movements is continuously shaping the countries all over the world. Some countries like India and Ireland, which set the example of economic development and social integration, have the positive impact of the migration by globalisation and some countries like USA, which recently witness racism, xenophobia and discrimination have the negative impact on the migrants. It does not mean India do not face fragmentation and USA do not have cohesion. USA have many stories which show successful integration process, that facilitated the lives of immigrant communities, but being a developed country it still suffers from cultural alienation. In these countries, borders are built within borders to create cultural divides that do not allow people to integrate. Recently, this problem has become more prominent due to the rise of terrorism, clash of cultures in the world, leading to the glorification of stereotypes. People are becoming less accepting towards anyone who does not belong to their region. Migration does not stop after people move from one place to another place. The main question start after that ‘now what’ they will do. That is why this topic needs to be discussed thoroughly in order to find better solutions. This paper will begin with an analysis of different approaches to Migration, discuss the target groups for integration policies, provide indicators of the current situation of migrants and proceed to an analysis of integration tools: legislation, social policies and participatory processes. It will focus not only on the impact of migration but also on social integration, mix culture like indo-western culture in a comparative basis.
In this paper, investigations are made to analyze the human body temperature during wound healing process due to surgery. Wound is considered after the skin graft. Skin graft is a technique used in plastic surgery. Skin is the first line of defense between the human and environment, it is very susceptible to damage. Internal body or core temperature (Tb) is one of the clinical vital signs along with pulse and respiratory rates. Any disturbance in body temperature will drive complexities in wound healing process. These studies are important in the mechanism of establishing the limits of thermal regulation of human body during the healing process in different situations and conditions. The Finite element method is used to analyze tissues temperature for normal tissues (donor site) and abnormal tissues (tissues after surgery). Appropriate boundary conditions have been framed. Numerical results are obtained using Crank Nicolson Method.
This paper centers around how innovations adds to enhancing interoperability between IoT gadgets, and making effectively utilization of IoT gadgets. The proposed stage innovation gives semantic-based IoT data administrations, and semantic interoperability of IoT gadgets. This administration stage can be material to a great deal of semantic IoT administrations: gathering imperceptible data in genuine condition by brilliant gadgets, giving keen life benefits by sharing, taking an interest, circulating open detecting data.
A huge number of embedded devices offer their services to the end users in pervasive environments. Context-aware discovery is a rich and very dynamic system extensively applied for combining the different mobile devices, sensors, actuators and software functions. Existing knowledge-based system using the Common KADS (CKADS) system represent contextual information but algorithm are not effective in predicting the user behavior. Current Location-aware Private Service Discovery (LPSD) considers the discovery path for reducing the distributed topology and flooding operations. LPSD in pervasive environment is not effective in accurately locating the required service by searching method. To present an architecture principle for accurately predicting the user behavior in mobile-pervasive computing environment, Affluent Context Aware Systems based on the User Behavior (ACAS-UB) is proposed in this paper. ACAS-UB mechanism contains the class of mobile devices that can sense (i.e.,) search the physical pervasive environment. Affluent means effectively engaged mobile devices in ACAS-UB mechanism which uses the context information. The ACAS-UB context information contains the judgment of the similar users and also the response from the other users for improving the effectiveness in pervasive environment user behavior prediction. Master-slave concept is used in the ACAS-UB mechanism for the easy collection of response information from the different users. ACAS-UB mechanism construct the user profile initially from the context information, then performs the similarity measure and finally work is to predict the user behavior. ACAS-UB mechanism provides the hints which are necessary to explore different options, rather than just limiting the options in mobile-pervasive computing environment. ACASUB mechanism is experimented on the factors such as message overhead in pervasive environment, scalability and approximately 10 % lesser processing time.
Wireless Sensor Networks (WSNs) received enormous attention in recent years due to its phenomenal ability of implementation in various fields. WSNs consist of a large number of small sensor nodes. These nodes are very cheap in terms of cost. In military operations, there is always a threat of being attacked by enemies. So, the use of these cheap sensor nodes will help to reduce the loss. In this project, the security of data transmission in WSNs for military applications is analyzed. It discusses the available scenarios of using sensor nodes in the military uses. The aim is to present a better deployment of sensor nodes for military purposes with the help of cryptographic techniques. This project will try to identify different areas in which we can reduce the damage in case of militant’s attack or enemy’s outbreak using an intelligent deployment of nodes. It is proposed to use the WSNs in battlefield surveillance to closely monitor the critical areas and borders to obtain information about enemy activity in that area. Hence, militant’s will gather information quickly which will result in quick response. Border monitoring is an essential component of military surveillance to prevent enemy’s intrusion. Here the proposed work provides security using several techniques to encrypt and decrypt the data in WSNs. Elliptic Curve cryptography involves Attribute based encryption which is more complicate to hack. As well as skipjack is used to create digital signature to avoid unauthorized users.
Keeping an in depth tab of recent folks or folks on chair with bound health conditions for his or her health and safety is a very important task. With maturity, weak bones and weakness because of alternative health connected problems could lead to will increase risk of falling. A supervisor might not continually be on the market with them and if correct assistance is not provided at the correct time it should cause larger health considerations which will need extra resources for treatment. For this purpose we've projected a wise IOT Fall Detection System exploitation acceptable sensors that square measure integrated facilitate|to assist} report these incidents to assist avail help at the correct time to forestall additional injury to health. The same system uses sensors like associate degree measuring system to live the speed of the person, a rotating mechanism to live the person’s orientation so as to live their stability, a load sensing element once the system is employed by an individual employing a chair to live their weight, a Wi-Fi module and a microcontroller that sends the general readings to alert the involvedthose that shall give with the right suggests that to assist the person in want. The microcontroller receives all the info from the sensors and perpetually transmits and monitors the acceleration and also the orientation of the person. Any fast abrupt modification within the system which will result from a fall is taken into account as a ‘fall’ and is reported . a serious concern would be that not all fast movement may end up from a fall and be thought of as a matter of concern. To avoid this warning a napbutton is provided to snooze the system. This button will be ironed before a definite time say 15-30 seconds to prevent the system from causation the alert, thus avoiding any confusion and panic. this method will be mounted to the person’s chair or will be created compact to be created into a wearable device which will be worn on the hand.
Physically unclonable function (PUF) is a hardware security module preferred for hardware feature based random number and secret key generation. Security of a cryptographic system relies on the quality of the challenge-response pair, it is necessary that the key generation mechanism must unpredictable and its response should constant under different operating condition. Metastable state in CMOS latch is undesirable since it response becomes unpredictable, this feature used in this work to generate a unique response. A feedback mechanism is developed which forces the latch into the metastable region; after metastable state, latch settle to high or state depends on circuit internal condition and noise which cannot be predicted. Obtained inter hamming variation for 8 PUF is 51% and average intra hamming distance is 99.76% with supply voltage variation and 96.22% with temperature variation.
One of the unique features of Indian society is prevalence of caste system which was originated thousands of years back to demarcate the people engaged in different occupation or jobs. Initially it was not much rigid but gradually people belonging to upper castes for their own selfish means to maintain their monopoly made this arrangement hereditary and started treating people of lower castes disgracefully. For preservation of this system, people started controlling their women to prevent inter-caste marriages and the concept of endogamy came up. This robbed away many types of freedom from women. For women belonging to lower castes, this situation is worse as they are doubly subjugated on the basis on caste as well as gender. Men belonging to their own caste treat them as secondary beings. This paper throws light on this intersection. How intersection of these two kinds of inequalities place them at the lowest position in Indian society. Dr. B.R. Ambedkar rises as their leader who all his life worked for empowerment of downtrodden section of society. He argues that education is the primary tool for evading these differences among people. He further emphasizes to adopt the concept of exogamy to break the backbone of Indian caste system and to immediately leave a religion or culture which legitimizes such system of inequality among people of the same land.
Ketorolac tromethamine, the non-steroidal anti-inflammatory drug, was formulated into mucoadhesive films to overcome the limitations in the currently available dosage and routes of administration which in sequence will increase patients’ compliance. Films were cast from organic and aqueous solvents using various bioadhesive polymers namely: HPMC E-15, Eudragit RLPO, Eudragit RSPO, Carbopol 934P. The prepared films were subjected to investigation for their physical and mechanical properties, swelling behaviors, in vitro bioadhesion, drug permeation via bovine buccal mucosa, and in vitro drug release. These properties were found to vary significantly depending on the preparation methods, the type of the polymers, and the ratio of addition of both plasticizers (i.e. polyethylene glycol and film forming agent. Formulation F4 is selected for best formulation because it shows the 98.85% drug release at time 6 hr. In addition, this film was subjected to in vitro and in vivo release. The obtained results indicate that the concentration of ketorolac in the oral cavity was maintained above 4.0 µg/ml for a period of at least 6 h. This film shows promising results for using the ketorolac mucoadhesive route of administration topically and systemically, and thus it will be subjected to clinical evaluation in future work.
This study was carried out to verify all the manual process involved in generating Students Examination Result and to seek a way of automating the system for effective operations. Computer and its appreciations have become vital tools in the economic, industrial and social development of advanced countries of the world. Most educational institutions in Nigeria, such as Universities, Polytechnics and Colleges of Education still operate on the manual method of record keeping and computation of students’ grade point averages (GPA) which is time-consuming and error-prone especially when the number of students is large. This paper examines the inadequacies involved in the manual method of calculating Students CGPA (cumulative grade point average) and proposes a solution by developing a software application to facilitate the automated processing of the results. The software was developed using the Microsoft Excel spreadsheet program. The developed software was tested and found to performed well and produced expected results on completion. With it, it was possible to compute Grade Point Average (GPA) and Cumulative Grade Point Average (CGPA) for each student based on examination scores entered. The new system has some qualities such as reduction in the cost of processing of information, reduction in time spent in computing GPA and generating transcripts, increase in accuracy and efficiency, and elimination of duplication of effort which makes it superior to the manual system of student record keeping. This new system is flexible and can be modified to suit any kind of student’s record-keeping and data processing.