Find Below Articles Published in
Volume -5 Issue - 1
Month [Year] -- January [2015]
*Contents are provided by Authors of articles. Please contact us if you having any query.

   No of Download : 27    Submit Your Rating     Cite This       Full Article
Abstract

Voices from the marginalized sections have been profane with their singular experience of oppression, exploitation, subjugation, suffering and endurance. Having remained silent for so long, their muted anguish finds no alternative until the unbreakable experience of humiliation sensitizes their identity and urges them to make themselves move from invisibility to visibility. This move signals the breaking of age old silence, an act of self assertion as well as self perception. The journey from anonymity to presence, though very hard, is a rewarding one for the marginalized self. Such a journey is remarkably announced in Dalit Literature and African American Literature.

   No of Download : 32    Submit Your Rating     Cite This       Full Article
Abstract

Abstract -Group communication is becoming the basis for a growing number of applications. Group communication can benefit from a Key Generation Center to achieve a scalable exchange of messages. Key Generation Center can broadcast group key information to all group members at once under the secret shared with each user during registration and sends the cipher text to each group member separately. Key transfer protocols rely on a mutually trusted key generation center(KGC) to select session keys and transport session keys to all communication entities secretly. Most often, KGC encrypts session keys under another secret key shared with each entity during registration. In this paper, we propose an authenticated key transfer protocol based on secret sharing scheme that KGC can broadcast group key information to all group members at once and only authorized group members can recover the group key; but unauthorized users cannot recover the group key. The confidentiality of this transformation is information theoretically secure the strength of the proposed protocol is authentication and confidentiality. Security goals and analysis against inside and outside attacks can be achieved. . We also provide authentication for transporting this group key. Goals and security threats of our proposed group key transfer protocol will be analyzed in detail.

   No of Download : 16    Submit Your Rating     Cite This       Full Article
Abstract

Whether you’re using wireless internet in a coffee shop, stealing it from the guy next door, or competing for bandwidth at a conference, you’ve probably gotten frustrated at the slow speeds you face when more than one device is tapped into the network. As more and more people and their many devices access wireless internet, clogged airwaves are going to make it increasingly difficult to latch onto a reliable signal. But radio waves are just one part of the spectrum that can carry our data. What if we could use other waves to surf the internet? One German physicist,DR. Harald Haas, has come up with a solution he calls “Data Through Illumination”—taking the fiber out of fiber optics by sending data through an LED light bulb that varies in intensity faster than the human eye can follow. It’s the same idea behind infrared remote controls, but far more powerful. Haas says his invention, which he calls D-Light, can produce data rates faster than 10 megabits per second, which is speedier than your average broadband connection. He envisions a future where data for laptops, smartphones, and tablets is transmitted through the light in a room. And security would be a snap—if you can’t see the light, you can’t access the data.

   No of Download : 17    Submit Your Rating     Cite This       Full Article
Abstract

भारतीय खाद्य निगम की स्थापना वर्ष 1965 में हुई लेकिन इसने अपना कार्य जनवरी 1966 से प्रारम्भ किया जिसके प्रमुख उद्देश्यों में खाद्यान्न तथा अन्य कृषि उत्पादों के सही प्रबंध हेतु प्रयास किया गया है। भारत जैसे विशाल देश में जहां जनसंख्या का एक बड़ा समूह अपनी दैनिक दिनचर्या के माध्यम से दो वक्त का भोजन जुटाने में संलग्न रहता है। वहां जरूरी खाद्यान्नों की उपलब्ध व्यवस्था आवश्यक समझी गयी। जिसके अन्तर्गत भारत के कौन-कौने से भारतीय खाद्य निगम की शाखाओं द्वारा खाद्यान्नों की निर्धारित मूल्यांे पर खरीद की जाती है और उसका समायोजित वितरण उपभोक्ता की आपूर्ति के लिये किया जाता है भारतीय खाद्य निगम के प्रयासांे के फलस्वरूप खुले बाजार भावों में स्थिरता आती है और एक क्षेत्र से दूसरे क्षेत्र में मूल्यों में विसंगतियां कम होती है।

   No of Download : 17    Submit Your Rating     Cite This       Full Article
Abstract

Branding, as any other concept, has evolved over time from the days when sheep of one herd started to be branded to distinguish them from another herd to the current era when everything, from water and flowers to clothes and food, is branded. Somewhere along the line, the word “branding” got mixed up with logo, taglines etc. While it’s an established fact that brands are far more than logos, it seems that creating visual identities with rich emotional character and authentic connection still eludes many marketers. Branding strategy is a long-term plan for the development of a successful brand in order to achieve specific goals. A well-defined and executed brand strategy affects all aspects of a business and is directly connected to consumer needs, emotions, and competitive environments.

   No of Download : 9    Submit Your Rating     Cite This       Full Article
Abstract

Like the concept of childhood, children’s literature is very much a cultural construct that continues to evolve over time. It comprises those texts that have been written specifically for children and those that children have selected to read. However it plays a vital role in shaping the personality of a child.The world is introduced to children through literature.Fiction gives them an idea of values that keep the world going. Thus one can find that the representation of males and females in novels contribute to children’s idea of what means to be a boy, girl,man or woman. In many instances we find that the disproportionate number of males in central roles may encourage the children to accept the invisibility of females, and thereby reinforcing the gender system. Gender role is a theoretical construct that involves a set of social and behavioral norms that defines individuals of a specific sex and writers do contribute by using their own constructs too.

   No of Download : 42    Submit Your Rating     Cite This       Full Article
Abstract

Background: Lumbar canal stenosis remains one of the most frequently encountered clinically important degenerative spinal disorders requiring operative treatment in the aging population. The simplest procedure is arthrodesis without instrumentation, but this has been found to be associated with a high rate of non-union. Objective: To study the outcome of posterior lumbar inter body fusion in cases of lumbar canal stenosis assessed by VAS score assessment.

   No of Download : 66    Submit Your Rating     Cite This       Full Article
Abstract

The coastal deltaic zone, an area of transition, is an ecotone between air, land and sea, and between terrestrial fresh water and marine saline water. Coastal belts are highly populated and urbanized with the growth of the industries. The coastal marine assemblages are shaped by interactions between physical factors, biological interactions, and almost ubiquitously, human impacts. Large-scale manipulations of human access replicated over a range of the physical and the biological conditions can generate insights over the processes shaping marine assemblages. We would examine the relative roles of the human interaction impacts and hydrographic conditions on marine.

   No of Download : 33    Submit Your Rating     Cite This       Full Article
Abstract

The Bronsted-Lowry Theory best describes acids and bases for a biological system by considering the role of the solvent (water for us) in the dissociation process. The Bronsted-Lowry theory defines an acid as a proton (H+) donor and a base as a proton acceptor. Hydrochloric acid in solution donates a proton to the solvent water and behaves as a Bronsted acid: HCl + H2O ----> H3O+ + CL- H3O+ is referred to as the hydronium ion. For convenience, will refer to the hydronium ion as a hydrogen ion [H+] . The basic properties of ammonia are clearly accounted for by this theory. Ammonia accepts a proton from the water producing OH

   No of Download : 33    Submit Your Rating     Cite This       Full Article
Abstract

Arbuscular mycorrhiza fungi (AM) are major component of soil microbial communities in terrestrial ecosystems, which can form mutually beneficial symbiosis with 90% of vascular plants (Liu and Chen, 2007). A mycorrhizal structure, such as infection conditions, mycelial growth and development, is the material basis of function of carbuncular mycorrhizal symbiosis. Gallaud firstly proposed two types of carbuncular mycorrhiza in 1905, later carbuncular mycorrhiza were divided into three types: Arum-type (A-type), Paris-type (P- type) and Intermediate-types (I- type) (Smith and Smith, 1997). Today arbuscular mycorrhizal studies of Compositae are mostly focused on the common cultivated crops, such as Helianthus annus and wild plants Neopallasia pectinata, Artemisia argyi, A. eriopoda and Taraxacum mongolicum (Muthukumar and Tamilselvi, 2010; Bao and Yan, 2004) study on arbuscular type of invasive plants in Asteraceae has been rarely reported. In addition, the ability of AM fungi to form symbiotic associations with host plants and mycorrhizal effects are relative to many environmental factors, including elevation and soil factors.

   No of Download : 60    Submit Your Rating     Cite This       Full Article
Abstract

Data protection and information security have become more important these days due to hacking and leak of the information costs more for the organizations. The computers run a variety of software applications, including older versions of that may sometimes contain vulnerabilities that can be exploited by malicious actors. Keeping up with the software updates and upgrades, in addition to applying the manufacturer-recommended patches, minimizes many of the vulnerabilities. The malicious individuals or criminals (e.g., hackers) target individuals and organizations to gain access to personal information are through emails containing malicious code-this is referred to as phishing. Once the infected emails are opened, the user’s machine can be compromised.