CHRISTIANTO V
001521 CHRISTIANTO V (Malang Institute of Agriculture, Malang, Indonesia, Email: victorchristianto@gmail.com) : Magnificent seven: Review of seven advanced methods to reduce impacts of 5g harmful radiations to human health and environment. Bio-Sci Res Bull 2021, 37(2), 69-76.
As more and more reports coming out to find the hidden connection between 5G radiation and inducement of covid virus in human cells (M. Fioranelli et al., 20201, and also recent B. Rubik & R. Brown, 20212), there is urgent need to find ways to reduce the impacts of 5G harmful radiation. Even reputable journals such as Nature also publish a new article on potential use of metamaterial. This short literature review is intended to consider seven alternative methods to reduce impacts of 5G harmful radiation.
2 illus, 4 tables, 16 ref
SHARMA M, NARANG R, SAXENA M, GUPTA M
001483 SHARMA M, NARANG R, SAXENA M, GUPTA M (Electronic Science Dep, Delhi Univ, New Delhi- 110 021) : Optimized DL-TFET design for enhancing its performance parameters by using different engineering methods. IETE Tech Rev 2021, 38(4), 429-37.
Dopingless Tunnel Field Effect Transistor is a prominent device because of its low sub-threshold swing and fast switching speed. In this paper, DL-TFET is investigated for enhancing the performance parameters by applying different engineering techniques. The hetero-junction is implemented in the DL-TFET for increasing the ION current. Further, for reducing the ambipolar current and enhancing the ON-characteristics by introducing the non-uniform oxide layer, hetero-gate and then further optimization is done by varying the “x” compositions of In1−xGaxAs for source side material. The various staggered hetero-gate hetero-junction DL-TFET structures with different EBeff are comparatively investigated for analyzing their performance parameters. Among them, highly staggered Hetero-junction DL-TFET with EBeff = 0.374 eV shows better performance as lower threshold voltage, higher ION current, high transconductance and lower sub-threshold swing. So, the In0.45Ga0.55As/In0.25Ga0.75As based hetero-gate at TG = 4.2 eV and = 7.59° heterojunction DL-TFET structure can be chosen for fast switching and advanced circuit application.
5 illus, 3 tables, 19 ref
WANG F, YAN H, WU G, HAO J
001481 WANG F, YAN H, WU G, HAO J (China Three Gorges Univ, Yichang- 443 002, People’s Republic of China) : Initialization of electromagnetic transient simulation using differential quadrature method. IETE Tech Rev 2021, 38(4), 397-407.
The initialization problem of electromagnetic transient simulation is to calculate the steady-state solution of the differential equations describing the electromagnetic transients of power systems. Currently, the widely used initialization method in electromagnetic transient programs (EMTP) is the fixed-point iteration or the so-called EMTP-based approach where the steady-state periodic response is found for a given initial state by simply integrating the system equations until the response becomes periodic. In lightly damped systems, this type of method could extend over many periods making the computation costly. In this paper, the initialization is described as a two-point differential boundary value problem. On this basis, the differential quadrature method (DQM) is used to solve this problem, therefore, a new electromagnetic transient initialization method is derived. The proposed initialization method is a rigorous Newton algorithm and thus has better convergence than the fixed-point iterative method. In order to solve the problem that the Jacobian matrix involved in the DQM solution is very large, a block recursive solution method based on V-transformation is proposed. Case studies conducted on two typical networks have confirmed the effectiveness of the proposed method.
11 illus, 2 tables, 17 ref
SEO J, HAN K
001479 SEO J, HAN K (Kyungpook National Univ, Daegu- 41566, Korea) : A survey of enhanced device discovery schemes in bluetooth low energy networks. IETE Tech Rev 2021, 38(3), 365-74.
Bluetooth Low Energy (BLE) is a popular low power wireless technology, used for short-range communication. In BLE networks, discovery process enables fast and energy-efficient communication, since all communications must involve it at the first step. For this reason, some studies have proposed novel discovery schemes to improve the performance of device discovery process. Nevertheless, literature report that provides a consolidated view are limited and insufficient. In this paper, we survey different device discovery schemes in BLE networks and discuss their advantages and limitations. The enhanced schemes are categorized into two approaches: parameter adjustment and collision avoidance approach. The first approach improves the performance by adjusting the discovery parameters according to a network situation. In the second approach, the BLE devices try to avoid the interference to reduce collisions in crowded networks.
3 illus, 3 tables, 30 ref
KUMAR P, GUPTA A
001478 KUMAR P, GUPTA A (IIITDM Jabalpur, Madhya Pradesh- 482 005) : Overlap aware active learning query strategies for pool based scenario. IETE Tech Rev 2021, 38(3), 347-56.
Active learning (AL) is an emerging machine learning technique, which works with fewer labeled instances, thereby reducing labeling as well as learning cost. Various AL query strategies are available to identify the candidate query instances for achieving a generalized hypothesis. However, the AL query strategies sometimes produce redundant or overlapped instances as candidate instances, due to the presence of instance and/or class overlapping in the dataset. This overlapping results in a complex decision boundary. We addressed this problem and proposed a solution as an augmented step for AL query strategies, which improves the generalization performance of the AL task. The solution is based on the nearest neighbor assumption and fixed vicinity based approach. This augmentation tries to avoid the selection of overlap instances and provides a smoother decision boundary. We have validated the performance of the proposed method on the available benchmark datasets.
4 illus, 3 tables, 27 ref
KAMAL S, MOHAMMED A S B, AIN M F B, NAJMI F, HUSSIN R, AHMAD Z A, ULLAH U, OTHMAN M, RAHMAN A
001477 KAMAL S, MOHAMMED A S B, AIN M F B, NAJMI F, HUSSIN R, AHMAD Z A, ULLAH U, OTHMAN M, RAHMAN A (Sains Malaysia Univ, Nibong Tebal- 14300, Malaysia) : An assessment of progress in 5.8 ghz quasi-lumped element resonator antennas. IETE Tech Rev 2021, 38(3), 328-46.
The revolutionary microstrip technology for wireless communication suffers from relatively large size and low radiation efficiency when modeled for the current challenging hardware. An efficient solution to this subject is the quasi-lumped element (LE) approach. Therefore, this manuscript is a tutorial on the progress in quasi-LE resonator antennas, and it has been transcribed as an introduction or assessment for the readers. The paper traces the LEs’ history and fundamental principles. The modeling procedures of the quasi-LE resonator and its essential outline are summarized. A review of the quasi-LE resonator antennas for 5.8 GHz applications has been presented. Measurement reports of a unique quasi-LE antenna are also illustrated. Finally, the intended methods are compared with other configurations while considering the several important performance parameters of antennas.
17 illus, 2 tables, 180 ref
FOO Y-L
001471 FOO Y-L (Multimedia Univ, Cyberjaya, Malaysia) : Harmonious coexistence of IEEE 802.11af wireless LAN and digital tv. IETE Tech Rev 2021, 38(2), 239-44.
Congested Industrial, Scientific, and Medical (ISM) band stifles the growth of Wireless Local Area Network (WLAN). The recent switchover from analog to digital TV (DTV) broadcast frees from the conventional TV bands a sizeable amount of spectrum, which is commonly called TV white space (TVWS). TVWS is very attractive to many wireless technologies, including WLAN. IEEE came up with 802.11af, the standardfor the WLAN technology that operates in TVWS. Nevertheless, it is unsure how best to guarantee its operation not causing harmful interference to DTV. In this paper, we present the conditions required for harmless coexistence of IEEE 802.11af WLAN and DTV. We make use of the standard prediction method based on radio propagation characteristics, i.e. the ITU-R P.1411-9 method which has been adopted in communication system planning. Based on our findings, we suggest the followings: (1) Operate IEEE 802.11af WLAN at any adjacent channel other than the first (i.e. except the closest neighbour channel). (2) The height of IEEE 802.11af installation does play a part when there is a relatively large separation distance between the WLAN and DTV (e.g. 50 m). (3) For outdoor operation, IEEE 802.11af WLAN should be installed at the second, third, or fourth channels adjacent to the DTV’s; fifth or sixth adjacent channel for indoor operation.
4 illus, 4 tables, 17 ref
WANG F, LI F
001470 WANG F, LI F (China Three Gorges Univ, Yichang, People’s Republic of China) : Voltage stability online monitoring and analysis method based on the fixed-point principle. IETE Tech Rev 2021, 38(2), 231-8.
Continuous assessment of voltage stability is vital to ensure the secure operation of the power system. Based on this concern, a number of online voltage stability analysis methods have been proposed. Among these indices, the impedance match concept based on Thévenin equivalent has attracted a lot of interest. However, the traditional impedance match is reported not to perform as expected under multi-load power systems. This paper proposes a new approach for voltage stability assessment based on the Banach fixed-point theorem. This leads to a real-time voltage stability monitoring scheme without the need to estimate Thévenin parameters. The derived method was tested on a 5-generators and 18-bus system by time-domain dynamic simulations and simulated on an actual power system using real phasor measurement unit.
14 illus, 14 ref
MEI Y, YE D-P, JIANG S-Z, LIU J-R
001466 MEI Y, YE D-P, JIANG S-Z, LIU J-R (Wuhan Univ, Hubei- 430 072, People’s Republic of China) : A particular character speech synthesis system based on deep learning. IETE Tech Rev 2021, 38(1), 184-94.
The speech synthesis system of a particular character is a TTS (text-to-speech) synthetic system, which can obtain voice with the specific speaker’s voice characteristics. The traditional method, based on machine learning, requires a great amount of training samples and large iterations. In this paper, we proposed a novel TTS system based on fully convolutional neural networks and attention mechanism. The system can be trained start from scratch with random initialization and realize end-to-end output. By adding the attention layer and the loss of attention, it can better adapt to the features of the pronunciation, intonation and accent of a specific speaker. Experimental results show that our speech synthesis framework demonstrates a stronger model performance by synthesizing higher quality forged specific character audio with a smaller training set and lesser iterations.
7 illus, 4 tables, 24 ref
DUAN X, LI B, XIE Z, YUE D, MA Y
001465 DUAN X, LI B, XIE Z, YUE D, MA Y (Henan Normal Univ, Xinxiang, People’s Republic of China) : High-capacity information hiding based on residual network. IETE Tech Rev 2021, 38(1), 172-83.
To solve the problem of the low capacity of traditional information hiding and steganography, the deep neural network is used to construct a hidden network and a decoding network to hide one image into another. In this paper, the ResNet (Residual Network) has a good effect in feature extraction, and the residual block is used in the hidden network. First, the hidden network encoded the secret image into cover image. During the encoding process, the steganography image mimics the distribution of the cover image as much as possible. Then, the receiver sends the steganography image to the decoding network to obtain the secret image. Experimental results indicate that the scheme will solve the obvious problems of visual cues, also improve the ability of embedding.
13 illus, 6 tables, 36 ref
LIU E, YAO H, HU Y, CAO F
001464 LIU E, YAO H, HU Y, CAO F (Shanghai for Science and Technology Univ, Shanghai- 200 093, People’s Republic of China) : Perceptual color image hashing based on quaternionic local ranking binary pattern. IETE Tech Rev 2021, 38(1), 158-71.
Image hashing is a technique that represents an image as a short unidirectional sequence. In this study, we propose a robust color image hashing technique based on the quaternionic local ranking binary pattern (QLRBP). First, the values of the RGB color channels are expressed as a pure quaternion, and the texture image is generated using the phase difference of the Clifford translation quaternion as the source for local binary pattern (LBP) comparison data. Next, mean pooling is used to reduce the dimensionality of the image texture. For security, the pixels of the dimension-reduced image are randomly selected, and each pixel is quantized to obtain the final image hash. Experimental results showed that the proposed scheme resists a variety of ordinary image operations and achieves good balance between robustness and discrimination. In comparison with other state-of-the-art methods, the receiver operating characteristic (ROC) curves of our scheme demonstrate its superiority in terms of content identification.
10 illus, 5 tables, 30 ref
WANG X, NIU S, WANG H
001463 WANG X, NIU S, WANG H (Beijing Univ of Posts and Telecommunications, Beijing, People’s Republic of China) : Image inpainting detection based on multi-task deep learning network. IETE Tech Rev 2021, 38(1), 149-57.
Image inpainting can effectively repair damaged areas, but it can also be a way of image tampering when it is used to remove meaningful content from an image. Therefore, this paper focuses on the research of inpainting forensics, and proposes a multi-task deep learning method. In order to enhance the learning of texture features, the corresponding local binary pattern channels are added to the input of the network. Furthermore, considering that the multi-task object detection network Mask R-CNN cannot fully utilize the features of all scale feature information during the FPN feature extraction phase, the network in this paper combines Feature Pyramid Networks and back connections to extract more features. This network model can detect not only the images tampered by traditional inpainting methods, but also the images inpainted by deep learning methods. Experimental results on two large public data sets demonstrate the superior performance of the proposed method.
8 illus, 3 tables, 25 ref
CHANG Q
001462 CHANG Q (Beijing Jiaotong Univ, Beijing, People’s Republic of China) : Reversible data hiding in encrypted images based on hybrid cryptosystem. IETE Tech Rev 2021, 38(1), 142-8.
As an important branch of reversible data hiding, reversible data hiding in encrypted images (RDHEI) can embed secret message into images, but also effectively protect the privacy of the images in an open environment. Most of the recently proposed RDH-EI methods are based on the publickey cryptosystem. However, the expansion rate of the public-key cryptosystem is too high to make the information transmission more difficult. In this paper, to achieve a low expansion rate, a hybrid encryption combined with Paillier cryptosystem and stream cipher is proposed. The original image is partitioned into non-overlapping blocks, which are selected as two categories of blocks and encrypted by a hybird encryption with a low expansion rate. The embedding capacity of these two types of blocks is determined by the adaptive optimization algorithm. Hidden data are embedded into images by modifying ciphertexts according to the data hiding key. In the decoding phase, the embedded data can be extracted, and the original image can be recovered with the encryption key and data hiding key. Experimental results show that the low expansion rate can be obtained with a relatively high PSNR compared with some state-of-the-art methods.
2 illus, 2 tables, 25 ref
BAI S, ZHOU L, YAN M, JI X, TAO X
001461 BAI S, ZHOU L, YAN M, JI X, TAO X (Chongqing Institute of Engineering, Chongqing- 400 056, People’s Republic of China) : Image cryptosystem for visually meaningful encryption based on fractal graph generating. IETE Tech Rev 2021, 38(1), 130-41.
Image information security is an important research direction in the field of information security. In existed image encryption schemes, original image is transformed to meaningless random noise signal which would draw attention and thus attract attacks. In this work, aiming to encrypt image to visually meaningful encrypted image, a novel image cryptosystem based on fractal graph generating is proposed which is called Visually Meaningful Image Encryption (VMIE) scheme. The VMIE scheme is to encrypt plain images into fractal scenery or fractal plant images by using fractal graph generation parameters as keys. According to these keys, receiver can get the plain image from fractal image by a reverse process. Based on the pixel value distribution characteristics of different plain images, different fractal transformations can be selected to produce different fractal images, which can better camouflage the plain images and make the encrypted plain images safer. In this paper, a new image encryption method is proposed, which is different from VMIE based on information hiding with limited hiding capacity, and from VMIE based on image sharing, which takes up a large amount of storage space and image size. Simulation experiments show that the proposed new scheme has low computation complexity and high security and the encrypted plain images have well understandability, strong resistance to compression and small data increase.
8 illus, 3 tables, 24 ref
BAI H, LIU G, LIU W, ZHAI J, YANG L, DAI Y
001460 BAI H, LIU G, LIU W, ZHAI J, YANG L, DAI Y (Nanjing Univ of Science and Technology, Nanjing, People’s Republic of China) : Identification of network application behaviors hiding in http tunnels. IETE Tech Rev 2021, 38(1), 112-29.
HTTP tunnels almost obscure the original contents and behaviors of network applications, which makes it challenging for the network management and cybersecurity equipment to identify the hidden network application behaviors. Many efficient detection schemes have been exploited for network application identification in prior works. However, the following “Last Mile” problem, the application behavior identification hidden in HTTP tunnels, remains a significant challenge. In this paper, the typical network application behaviors are firstly summarized and the discriminative spatial–temporal features are selected by information gain and information gain ratio analysis. The feature extraction is developed on flow fragments instead of a whole HTTP flow. Experiments are conducted to verify the effectiveness of the selected features and compare the performance of three popular machine learning (ML) algorithms, namely Decision Tree, Random Forest, and Naïve Bayes. The implementation parameter suggestion for Decision Tree is also given according to a series of experiments on different algorithm parameters and flow fragmenting sizes with the compositive computation and accuracy considerations.
16 illus, 12 tables, 29 ref
YIN Y, WU H, ZHANG X
001459 YIN Y, WU H, ZHANG X (Shanghai Univ, Shanghai- 200 444, People’s Republic of China) : Neural visual social comment on image-text content. IETE Tech Rev 2021, 38(1), 100-11.
Social bots are computer software designed for content production and interaction with humans. With the popularity of images in social networks, social bots need to have visual awareness of image content while only understanding texts is far from enough to be active in social networks. We introduce a novel task, Visual Social Comment (VSC), in which social bots should generate relevant and informative comments on social contents of both images and texts. In this task of multimodal context, our work focuses on how to extract and fuse the information of vision and text to improve the quality of generated comments, and how to deal with the problem that neural dialog models trained with maximum likelihood estimation (MLE) criteria tend to generate generic responses. In order to fuse visual and textual context features closely through the relationship between them, we adopt joint attention of multimodal context to modify the standard sequence-to-sequence (Seq2Seq) framework. We also leverage the topic information transferred from a topic classification model to build a perceptual loss function, which encourages the generative comment model to generate more informative and diverse comments with the topic corresponding to context. The experimental results of models trained with datafrom Sina Weibo show that comments generated by our proposed models achieve better performance in both relevance and informativeness than those generated by other baseline models.
4 illus, 3 tables, 38 ref
KAUR D P, MANTRI A, HORAN B
001410 KAUR D P, MANTRI A, HORAN B (Chitkara Univ, Punjab- 140 401) : A framework utilizing augmented reality to enhance the teaching–learning experience of linear control systems. IETE J Res 2021, 67(2), 155-64.
In recent years, engineering education has become more complex, more uncertain and more interdisciplinary. It is therefore important to supplement the theoretical introduction of technical topics and concepts with practical, learning by doing experiences, so as to maximize the learning outcome. When introduced to challenging technical concepts and topics through conventional diagrams and equations, such as thosefound in textbooks, many students have difficulty with visualization; limiting their ability to gain a deep understanding of the concept. The computer visualization (using Virtual Reality or Augmented Reality (AR)) has apparently become a problem-solving tool in engineering education. AR can overlay 3D virtual objects to a particular real-world context and is an effective way to enhance the visualization and as a result, the understanding of technical concepts. One topic commonly challenging for students to understand is the stability analysis of linear time-invariant control systems. To address this, this paper introduces the framework of a tabletop AR learning environment based on the tangible user interface (TUI) and consisting of a fixed VGA camera with a display screen.
12 illus, 1 table, 34 ref
SINGH R, GONSALVES T A
001408 SINGH R, GONSALVES T A (Information and Communication Technology Dep, Manipal Institute of Technology, Manipal- 576 104) : Using ontologies to share access control information in rural business process outsourcing. IETE J Res 2021, 67(1), 129-38.
Organisations interact with each other for mutual benefits. Federation refers to one such interaction where each organisation functions independently yet is bound by contracts with others. Rural business process outsourcing (RBPO), multi-institution course management system, and video streaming services are a few examples of federations. Security of shared resources is an important concern in such scenarios. Since each organisation is independent, it is difficult to communicate the precise semantics of access control policies to other participating organisations for correct enforcement. Over the years, ontology has been employed across different domains and can be used for sharing access control semantics across organisations. In this work, we describe a network-aware digital object-based access control model (NA-DOBAM) as an extension of the popular role-based access control model to address the specific needs of security in federations. The relationship between web ontology language and NA-DOBAM model is studied. We have used an ontology-based approach for specification and implementation of NA-DOBAM in the context of RBPO where the access control policy depends on the structure of the users and objects along with the network state. We demonstrate the applicability of ontology for RBPO case studies for extracting meaningful access control information using queries as well as for enforcing access control policies including separation of duty and delegation.
9 illus, 1 table, 25 ref
SEN S, MOYRA T
001403 SEN S, MOYRA T (Electronics and Communication Dep, National Institute of Technology, Agartala) : Interdigital capacitor based compact microstrip bandpass filter with wide stopband. IETE J Res 2021, 67(1), 82-9.
A compact, low-cost microstrip bandpass filter (BPF) with low insertion loss and wide attenuation band is presented in this article. The proposed structure consists of multiple interdigital capacitor sections and a T-shaped stub which is connected to the ground using via. The wide stopband response is achieved by the inclusion of defected ground structures (DGS). Addition of these defected ground structures also reduces the circuit size. The designed BPF of centre frequency 0.9 GHz is fabricated, measured, and its lumped equivalent circuit is also obtained. A good agreement is found among IE3D simulated results, circuit simulated results, and the measured results. The obtained results for the proposed bandpass filter (BPF) are −3 dB fractional bandwidth (FBW) of 63% and minimum insertion loss of 0.59 dB. The relative stop band (RSB) rejection is found up to 177% and the normalized circuit size (NCS) is found 0.012λ2 g . This proposed filter can be used for GSM and other microwave circuitry in wireless communication system.
6 illus, 1 table, 20 ref
KUMAR N R, NAGABHOOSHANAM E
001401 KUMAR N R, NAGABHOOSHANAM E (ECE Dep, Mahaveer Institute of Science and Technology, Hyderabad- 500 005, Telangana) : EKF with artificial bee colony for precise positioning of UAV using global positioning system. IETE J Res 2021, 67(1), 60-73.
The growth of the Unmanned Aerial Vehicle (UAV) has become greater than before due to the presence of inexpensive sensors and improved computer technology. The state estimation of the UAV has faced challenges such as inaccurate estimation and delay created by the imperfect controllers in the Global Positioning System. So, in this paper, Extended Kalman Filter (EKF) with Modified Artificial Bee Colony (MABC) algorithm is proposed to estimate the state of UAV. The position of the vehicle is estimated by computing the Yaw angle (ψY ), pitch angle (θ P), and roll angle (ϕR). Furthermore, the absolute deviation between the measured angles and the actual angle is estimated by computing the error (Root Mean Square Error, Mean Absolute Percentage Error, Mean Absolute Error, and L1-Norm) and also analysis of the convergence of the proposed method. Thus the proposed EKF-MABC shows its superior performance in calculating all three angles, when compared with KF, EKF, EKF-artificial bee colony (ABC), EKF-ABC-Inversely Proportional Mutation, EKF-Quick artificial bee colony, EKF-ABC-Multi-Point, and EKF-Adaptive and Hybrid-ABC methods and accurately estimates the final position of the UAV system.
8 illus, 1 table, 40 ref
GUPTA A K, CHAUHAN Y K, MAITY T
001399 GUPTA A K, CHAUHAN Y K, MAITY T (Mining and Machinery Dep, Indian Institute of Technology, Dhanbad) : A new gamma scaling maximum power point tracking method for solar photovoltaic panel feeding energy storage system. IETE J Res 2021, 67(1), 15-35.
This paper analyzes the variable step size selection methods applied to the incremental conductance based maximum power point tracking technique (MPPT) for the solar photovoltaic system. The delta P/delta V (DpDv) variable step size method and the novel variable step size method, namely the gamma scaling method, are developed in Matlab/Simulink. Extensive results are obtained using these step size methods and compared. The proposed gamma scaling method is found to have higher efficiency with lower peak-peak ripple in load current as compared to DpDv, when sudden irradiance of 1000 W/m2 is applied to the PV panel. There are numerous other performance advantages of the gamma scaling method compared to the DpDv method under various irradiation conditions. The hardware prototype of the inverse sepic converter is used which is supplemented by the gamma scaling and DpDv methods. The simulated and experimental results of gamma scaling and DpDv methods are compared. In terms of performance, the proposed gamma scaling method has been found to be better than the DpDv method.
10 illus, 5 tables, 38 ref
Wong B
000862 Wong B (Science and Technology Dep, Eurotech, Singapore, Singapore, Email: bwong8@singnet.com.sg) : The twin primes. Bull Pure Appl Sci Sect E Math Stat 2021, 40E(1), 75-86.
The primes, including the twin primes and the other prime pairs, are the building-blocks of the integers. Euclid’s proof of the infinitude of the primes is generally regarded as elegant. It is a proof by contradiction, or, reductio ad absurdum, and it relies on an algorithm which always brings in larger and larger primes, an infinite number of them. However, the proof is also subtle and is misinterpreted by some, with one well-known mathematician even remarking that the algorithm might not work for extremely large numbers. A long unsettled related problem, the twin primes conjecture, has also aroused the interest of many researchers. The author has been conducting research on the twin primes for a long time and had published a paper on them (see, B. Wong, Possible solutions for the “twin” primes conjecture - The infinity of the twin primes, International Mathematical Journal, 3(8), 2003, 873–886). This informative paper presents some im-portant facts on the twin primes which would be of interest to prime number researchers, with some remarks/reasons that point to the infinitude of the twin primes, including a reasoning which is somewhat similar to Euclid’s proof of the infinity of the primes; very importantly, two algorithms are developed in Section 5 for sieving out the twin primes from the infinite list of the integers, which would be of interest to cryptographers and even to computer programmers.
1 table, 8 ref
JAYESH TIWARI, DILEEP KUMAR SHARMA, PRASAD K N V V V
000857 JAYESH TIWARI, DILEEP KUMAR SHARMA, PRASAD K N V V V (Computer Science Dep, Devi Ahilya Univ, Madhya Pradesh, Email: jayesh_tiwari2005@yahoo.com) : Some fixed point theorems on b-metric spaces. Bull Pure Appl Sci Sect E Math Stat 2021, 40E(1), 18-25.
In this paper, we introduce new contractive mappings in the setup of com-pleteness and uniqueness of fixed point theorem on b-metric space. We improve the recentfixed point results established by Agrawal et al. (Agrawal, S., Qureshi, K. and Nema, J.,A fixed point theorems for b-metric space, IJPAM, 9(1), 2016, 45–50). We also show thatdifferent contractive type mappings exist in b-metric space.
9 ref
Singh A, Maurya A K, Singh S P, Pandey H,Tripathi U N
000856 Singh A, Maurya A K, Singh S P, Pandey H,Tripathi U N (Computer Science Dep, D D U Gorakhpur Univ, Uttar Pradesh, Email: avinashnero2007@gmail.com) : Cooperative game theory approaches to manage traffic congestion in wireless network. Bull Pure Appl Sci Sect E Math Stat 2021, 40E(1), 1-13.
Presently more and more advanced technology enabled mobile devices arein demand and the numbers of their users are also increasing day by day. These mobiledevices having so many features assembled in them demand various types of services andlarger bandwidth requirements from cellular operators for their users. For satisfying thedemands of their subscribers the service providers are continuously trying to introducethe newer upgraded technologies. Today the user is using so many devices having dif-ferent service requirements and various capacities enabled wireless networks at the sametime. Collectively all these requirements together put tremendous stress on the networktraffic and this situation often leads to network congestions. Congestion is a point atwhich the network resources of the service provider experience stress and all services aredegraded and they often collapse after some time. In the cellular network the resourcesare uniformly distributed but some networks are heavily loaded and others are less. Sosome have shortages and they need to cooperate with their adjacent neighbors, but manyneighbors having their own sufficient resources are many a times not willing to cooper-ative with the lesser efficient ones. To solve this issue we propose a noble cooperativeapproach based congestion management scheme in this paper that minimizes congestionin a network. Our prime motive is to minimize the congestion level so that the new calland handoff calls are to be served. In this schema we can reduce the congestion so thatthe resources are utilized effectively to satisfy the users’ demands and the qualities ofservices delivered are also improved.
5 illus, 34 ref
HUDDA S
003469 HUDDA S (Society for Electronic Transactions and Security, Chennai - 600 113, Email: hudda.shhudda@gmail.com) : Uninterrupted VPN connection-service with mobility management and dead peer detection. Def Sci J 2021, 71 (4), 507 - 14.
The VPN technology is used to connect client devices securely over unsecured public networks. The Connection handover and Dead Peer Detection (DPD) are the most challenging and important tasks in VPN. In this present article, a solution for connection handover is proposed which covers the pre-authentication with new credentials for a mobile device prior to connection handover. In VPN, a case where such connection handover is failed due to incomplete connection handover or several unusual events which make a VPN client to become offline or dead. To address DPD issues a solution is proposed which includes a Keep Alive Timer (KAT) server at the VPN server side. This proposed solution for DPD is far better than an already existing solution that uses a DNS server for DPD since the DNS server faces several attacks consistently. Thus, the proposed solution for DPD is more secure against such vulnerable attacks.
7 illus, 20 ref
TIWARI A, BATRA U
003467 TIWARI A, BATRA U (GD Goenka Univ, Gurugram – 122 103, Email: anupam.tiwari@gdgu.org) : Blockchain enabled reparations in smart buildings-cyber physical system. Def Sci J 2021, 71 (4), 491 - 8.
Blockchain technology is evolving across the globe and is being looked upon as a definite part of the future. Blockchain is often associated with bitcoin and finance’s domain. But over the last decade, this backend technology to bitcoin has spread its association in almost all domains that we can think of. Further to this, smart contracts are making the blockchain ecosystem better. Other evolving technologies like Internet-of-things, Industrial Internet-of-things, Cyber physical systems are also making their onset on the global platform. Smart buildings link Internet-of-things connectivity, sensors and the cloud to remotely supervise and assure efficient heating- air conditioning, lighting and security systems etc to improve efficiency and overall sustainability. The global buildings sector over the next 40 years is expected to add 230 billion square meters of fresh construction, i.e., adding the equivalent of Paris every week. Thus integrating these technologies right at the onset, before they grow in isolation, is a coveted need today. This paper proposes a prototype to simulate architecture and discusses how blockchain enabled smart buildings can further expedite automation, security and transparency. For an apprehension purpose, the paper focuses on smart contracts enabled repairs and service in smart buildings.
6 illus, 2 tables, 30 ref
GAYATHIRI M, THIRIBHUVANAMALA G, KRISHNAMOORTHY A S, HARIPRIYA S, AKSHAYA S B, ARUMUKAPRAVIN I
003369 GAYATHIRI M, THIRIBHUVANAMALA G, KRISHNAMOORTHY A S, HARIPRIYA S, AKSHAYA S B, ARUMUKAPRAVIN I (Nanoscience and Technology Dep, Tamil Nadu Agricultural Univ, Coimbatore - 641 003, Tamil Nadu) : Characterization of antimicrobial metabolites from medicinal mushrooms against Mango anthracnose pathogen Colletotrichum gloeosporioides (Penz.) Sacc.. Annals Phytomed 2021, Vol 10 (1), 185 - 94.
Mango is prone to attack by many diseases and one among them is the anthracnose disease, caused by Colletotrichum gloeosporioides (Penz.) Sacc. which cause both pre and post-harvest yield losses even up to 100 per cent based on prevailing wet humid weather condition. The present investigation has been focused on exploring the possibilities of identifying bioactive compounds from macro basidiomycetes against C. gloeosporioides. In the present study, different solvents such as ethyl acetate, diethyl ether, hexane, and chloroform at different concentrations (0.1 to 1 per cent) were used to extract secondary metabolites from culture filtrates of medicinal mushrooms, Ganoderma lucidum and Auricularia. polytricha. However, the ethyl acetate extracts of G. lucidum and diethyl ether fraction of A. polytricha at 1 per cent concentration showed maximum mycelial growth inhibition of 68.55 per cent and 58.55 per cent, respectively. Characterization of antimicrobial compounds from ethyl acetate extracted culture filtrates of G. lucidum through gas chromatography-mass spectrometry (GC-MS) indicated the presence of novel compound papaverine which recorded the highest peak area, 2.13 per cent with a probability of 90.74 per cent at RT 26.68. Further, the functional groups identified through fourier transform infra-red spectrophotometer (FT-IR) analysis revealed the nature of compounds belonging to aliphatic primary amine, amine salt, thiol, amide, conjugated ketone, alkane, and alcohol. The thin layer chromatography (TLC) studies performed with the ethyl acetate extracted culture filtrate of G. lucidum indicated the appearance of two bands at the Rf value of 0.45 and 0.29. Further, testing of eluted bands through agar well diffusion assay showed 36.66 and 40.50 per cent inhibition of mycelial growth of C. gloeosporioides, respectively. The standard samples of papaverine (Source: Sigma Aldrich and Compound code: P3510-5g) tested against mycelial growth and conidial germination of C. gloeosporioides exhibited 100 per cent inhibition of mycelial growth of C. gloeosporioides at 1500 ppm and 3000 ppm in agar well diffusion assay and paper disc assay which confirmed the presence of antimicrobial metabolites from culture filtrates of G. lucidum.
6 illus, 4 tables, 23 ref
RAMESH C, MOHANRAJU R
000010 RAMESH C, MOHANRAJU R (Andaman and Nicobar Centre for Ocean Science and Technology, Port Blair- 744 103, Andaman and Nicobar Islands) : Detection of luxA gene on plasmid DNA of luminous bacteria Vibrio campbellii stf1. Natl Acad Sci Lett 2021, 44(1), 47-50.
Bacterial bioluminescence is emitted due to regulation by lux genes present on the chromosomal DNA. Earlier studies have attempted to find possible occurrence of lux genes on plasmid DNA (pDNA) but did not find such incident. Evidently, the present study reveals the rare incidence of luxA gene on pDNA analysed using polymerase chain reaction. We detected the 755 bp of luxA gene on plasmid DNA of luminous bacteria Vibrio campbellii strain STF1. We postulate that this rare evidence on the occurrence of luxA gene on pDNA might be due to horizontal gene transfer/gene integration and its role on pDNA is yet to be ascertained.
20 ref
KUMAR A
000008 KUMAR A (ECE Dep, JECRC Univ, Jaipur) : Detection in 5G mobile communication system using hybrid technique. Natl Acad Sci Lett 2021, 44(1), 39-42.
Massive multi-input and multi-output (MIMO) is considered as the most important technology to attain the high data rate for next-generation mobile communication. It comprises more than one antenna at the sender and recipient sides. The detection of the signal in these systems is complex. In this work, we suggest a novel QRM-MLD algorithm with maximum likelihood detection to reduce the latency and complexity of the massive MIMO system. The simulation results indicate that the proposed system accomplished a reduced latency and complexity with a trivial penalty of bit error rate performance as compared to the existed techniques.
6 ref
ABRAHAM D, MANUEL M
000007 ABRAHAM D, MANUEL M (Electronics and Communication Dep, Rajiv Gandhi Institute of Technology, Kottayam) : Design of transmultiplexer filter banks using Ramanujan sums. Natl Acad Sci Lett 2021, 44(1), 33-8.
Ramanujan sums are sequences introduced by the famous mathematician S. Ramanujan in 1918. Ramanujan sum cq(n)cq(n) is the sequence in n with periodicity q. Many arithmetic functions such as Euler’s totient function and Riemann zeta function can be expressed using these sequences. These sums have many attractive properties which make them suitable for signal processing domain. Ramanujan sums are orthogonal and symmetric. Implementation of Ramanujan sum-based transforms is faster compared to discrete Fourier transform, since their computation involves only co-resonant frequencies. These transforms are particularly useful in identifying periodicities in signals. Ramanujan sums are integer valued. In this letter, it is proposed to use Ramanujan sums for the design of transmultiplexer filter banks. Here, the analysis and synthesis filter coefficients are integers. Computation time is reduced considerably by replacing floating point arithmetic with integer coefficients. Rounding errors in hardware implementation are avoided, and perfect reconstruction condition in the transmultiplexer system is ensured by using these integer coefficients.
15 ref
GUPTA A, SARKAR B K
000006 GUPTA A, SARKAR B K (Birla Institute of Technology, Ranchi- 835 215, Jharkhand) : Biswapped–Torus network: A new efficient node-symmetrical optoelectronic network. Natl Acad Sci Lett 2021, 44(1), 27-31.
In this paper, a node-symmetrical optoelectronic grid-based variation of biswapped network framework named biswapped–torus network is introduced. It is a hybrid network that combines both biswapped network and torus. The proposed network claims to be a faster alternative as compared to biswapped–mesh network due to smaller network diameter. Also, node symmetry is an essential property of this network. Further, compared to efficient node-symmetrical optoelectronic biswapped framework named biswapped–hyper hexa-cell network, the presented network is cost-efficient and capable of delivering competitive performance, concerning network diameter for network size up to 1250.
5 ref
ALGAHTANI F D
044163 ALGAHTANI F D (Public Health Dep, Ha'il Univ, Ha'il, KSA, Email: dr.algahtani@gmail.com ) : Healthy lifestyle among ha'il university students, Saudi Arabia. Int J Pharm Res Allied Sci 2020, 9(1), 160-7.
This study was conducted to determine the healthy lifestyle behaviors of students of the University of Ha'il in using various variables. This descriptive-analytical investigation is made out of 335 students from the University of Ha'il, Saudi Arabia and included information about lifestyle patterns in terms of age, sex, BMI, study field and year of study. About 33.8% of university students followed unhealthy eating patterns and there was no difference concerning their eating habits. Students' health responsibility was identified with the distinctive variable, which was too less with an undesirable score. The results showed that the awareness of university students on the rules of intermittent medicinal assessment was undesirable in all study samples.
2 illus, 3 tables, 28 ref
ALQAHTANI A N , ALANAZY S H , ALJAMEEL O S H , ALDHAWI F S M , JAMJOOM M M , SHARHAN A H A , ALSHEHRI J A M , HALAWANI A T, ALHAMDAN Z A , ATTAR M H , SALMAN I M
044155 ALQAHTANI A N , ALANAZY S H , ALJAMEEL O S H , ALDHAWI F S M , JAMJOOM M M , SHARHAN A H A , ALSHEHRI J A M , HALAWANI A T, ALHAMDAN Z A , ATTAR M H , SALMAN I M (Emergency Dep, Aliman General Hospital, Riyadh, Saudi Arabia, Email: sul-10 @ windowslive.com) : Evaluation of diagnosis and management of anaphylactic shock in emergency room: A literature review. Int J Pharm Res Allied Sci 2020, 9(1), 93-8.
Anaphylaxis is the most severe form of an allergic reaction. The incidence rate of anaphylaxis enhanced during the last decade. Death may happen in fatal anaphylactic shocks within minutes of the reaction. Hence, it is needed to highlight the significance of effective emergency management. In this investigation, we aimed to discuss the important aspects of anaphylaxis shock diagnosis and management in the emergency room. PubMed database was used for article selection, and the following keywords were used in the mesh: "anaphylaxis management in emergency room"[Mesh] and “anaphylactic shock management in emergency room"[Mesh]. A total of 20 papers were reviewed and included in the research. The essential manifestations of anaphylactic reactions are on the skin, in the gastrointestinal tract, respiratory tract, and cardiovascular system. The symptoms may begin and progress very quickly, in which the condition can deteriorate dramatically into death within a few minutes. Then, a physician should be skilled and prepared for such cases. The most noteworthy drug in the acute remedy of anaphylaxis is adrenaline as it is a lifesaving drug in cases of anaphylaxis.
32 ref
ELMASRY H M , ABDELSAMEA H A , AHMAD A A, ELARAB M N E
044140 ELMASRY H M , ABDELSAMEA H A , AHMAD A A, ELARAB M N E (Radiology Dep, Al Azhar Univ at Assiut, Egypt) : Role of MRI CSF flowmetry in pediatric hydrocephtalus. Int J Multidiscip Res Dev 2020, 7(2), 208-13.
Is to assess intracranial CSF flow dynamics in pediatric patients with hydrocephalus suspected on morphological sequences using phase contrast MRI. A prospective observational study included eighty individuals from the pediatric population, 60 patients with ventriculomegaly and suspected hydrocephalus (diagnosed by a radiological report) who referred from Pediatric department and outpatients clinics of Al-Azhar University Assiut and 20 healthy control. Patients were given diagnosis based on findings of conventional MR images, and were categorized into two major groups:-Group (I): Obstructive hydrocephalus (No.=31):-that subdivided into 3 sub-groups. Subgroup (Ia) Patients had aqueductal stenosis (No. =15).Subgroup (1) Patients had Arnold Chiari malformation. (No. =10).Subgroup (Ic) Patients had hydrocephalus with intracranial. SOL (No. =6).Group (II): Non Obstructive hydrocephalus (No. =29):-That subdivided into 3 sub-groups: Subgroup (2) patients had communicating hydrocephalus (no=16).Subgroup (IIb) 10 Patients had brain atrophy (No. =10).Subgroup (IIc) Patients had Dandy-Walker spectrum (No. =3). This technique enables measuring aqueductal flow parameters in a reliable and reproducible way and enable further future understanding of the pathophysiology of abnormal CSF dynamics in cases of hydrocephalus that still appears vague. The optimal cut of value of hypodynamic CSF flow through cerebral aqueduct in comparison of all obstructive subgroups with control group is the 7.5 μl, with sensitivity 100 %, specificity 64 % and P value > 0.05. The optimal cut of value of hyperdynamic CSF flow through cerebral aqueduct in comparison of non-obstructive subgroups with control group is the 37.5 micro-liter with sensitivity 100 %, specificity 40 % and P Value > 0.05. Cine Phase images can detect spontaneous third ventriculostomy that may occur in some cases of long standing hydrocephalus.
2 illus, 9 tables, 24 ref
DENANO T T T , SIBERA S
044139 DENANO T T T , SIBERA S (Statistics Dep, Wolaita Sodo Univ, POBO 138, Sodo, Ethiopia) : Applications of count data models for determinants of under-five mortality in Ethiopia. Int J Multidiscip Res Dev 2020, 7(2), 197-207.
Under-5 mortality is risk of a child dying before completing five years of age. The purpose of this study was to identify factors that affect under-five mortality based on 2016 EDHS data set using count regression model with specific objectives: to examine socio economic and demographic factors in terms of under-five death and to identify the appropriate count regression model to fit under-five death data. The survey collected information from a total of 15,683 women aged 15-49 years out of which 11951 women are considered in this study. The data were found to have excess zeros (62.5%) and the variance was higher than its mean. Thus several count models such as Poisson, NB, ZIP, ZINB, HP and HNB models were fitted to select the best model which fits the data. Among these models HNB was more appropriate to fit the data according to model selection criteria. Based on HNB model result the truncated negative binomial part, the explanatory variables like region, mother’s education level, contraceptive use, birth order, breastfeeding and birth type are statistically significant factors while for logistic part, using breastfeeding method, place of residence, region, mother’s occupation, mother’s educational level, contraceptive use, wealth index, birth type and birth order are statistically significant factor on the number of under-five death per mother in Ethiopia. Hence, the concerned body should work closely with both the private sector and civil society to teach households to have sufficient knowledge and awareness on under five mortality and mechanisms of reduction and moreover to make children very well.
2 tables, 30 ref
HANGARAGI KB , MUKAMMANNAVAR P
044138 HANGARAGI KB , MUKAMMANNAVAR P (Karnataka Univ Dharwad, Gadag, Karnataka) : Library classification schemes & practices with comprehensive hints. Int J Multidiscip Res Dev 2020, 7(2), 192-6.
This is paper simplifies potential of a library classification scheme that are usually considered in the LIS practices and literature and clarifies such a scheme’s three main roles, namely information planning, data retrieval, and self-preparation. In this manner, the paper states the useful necessities of bibliographic arrangements, which generally are topic collection and interpretation of perusing the collection. It clarifies by particulars the components of a library classification scheme and their purpose. The main components are schedules, notations, and catalogue. It also states their distinguished features, such for example generalia class, from divisions, book figures, and devices for number mixture which are not essential in an information classification. It demonstrates with examples from Web Dewey good examples of additional features of a virtual library cataloguing system. It highlights that official backup and a review machinery are significant for a classification to continue and remain appropriate in the print and e-environment.
2 illus, 3 tables, 10 ref
SULTANA S
044137 SULTANA S (Ph. D. Tamil Nadu Agricultural Univ, Coimbatore, Tamil Nadu) : Corporates corporate social responsibility initiatives for agriculture development in India. Int J Multidiscip Res Dev 2020, 7(2), 189-91.
Corporate Social responsibility (CSR) is a very known concept. The concept of CSR according to William C. Frederick, came into being in the 1960’s as a response to the changing social value of society. This paper attempts to give a brief understanding of a few companies which provides sustenance to the agriculture sector. The study finds that the CSR outlay in agriculture sector is less in comparison to other sectors such as education, research, cultural, healthcare, etc.
6 ref
AHMED M A M , MANSOUR T M M , SABBAH H A A
044136 AHMED M A M , MANSOUR T M M , SABBAH H A A (Radiodiagnosis Dep, Al Azhar Univ, Assiut, Egypt) : The role of uterine artery doppler in prediction of preeclampsia. Int J Multidiscip Res Dev 2020, 7(2), 185-8.
Is to assess the sensitivity of uterine artery Doppler in prediction of PE in pregnant women with high risk for developing PE in first (11 to 14 weeks) and second (19 to 22 weeks) trimesters. A prospective study included 100 patients aged from 17 to 41 years for high risk in developing PE seeking antenatal care, divided into two groups, Group A(unaffected group) includes 82 patients, and Group B (affected group) includes 18 patients for developing or non-developing PE. The result of this study revealed that 18 in number developing PE out of 100 patients, the sensitivity and specificity of PI in prediction of pre-eclampsia for first and second trimester were 27.78 %, 92.68 % and 66.67 %, 86.58 % respectively, while the sensitivity and specificity of bilateral notching in prediction of pre-eclampsia for first and second trimester were 83.33 %, 60.98 % and 72.22 %, 85.37 % respectively. In this study it was concluded that Doppler analysis helps not only earlier detection of utero-placental and fetoplacental changes associated with the disease but also help to take decision for early intervention. Doppler technology has provided the best opportunity for repetitive non-invasive haemodynamic monitoring in pregnancy for fetal well-being evaluation and predicting perinatal outcome.
11 tables, 27 ref
PRAKASH C , MATHEW T , AUGUESTINE B T
044135 PRAKASH C , MATHEW T , AUGUESTINE B T (Commerce Dep, Christ Coll Puliyanmala, Kerala) : Impact of advertisement in the purchasing decision of samsung products. Int J Multidiscip Res Dev 2020, 7(2), 177-84.
Advertising was introduced by Egyptians who used Papyrus for sales messages and wall posters, billboards, signboards and outdoor advertising as the most ancient form of advertising. The tradition of wall painting and wall chocking is found in the ancient culture of Greece and Romans and as well in India, which could be now seen in many, parts of the world. Researchers found that Samsung had improved their ads in a truthful manner which increase the customer’s faithfulness towards the brand and they were conscious in creating more entertain able concept in advertisement, which will attract so much people. Some time it may either affect the price or quality of the goods and services provided by the company. The advertisement should provide all details regarding the new products and new use, price, features, availability of an existing products. Celebrity endorsement will improve the standard of advertisement and it also increase the viewers of an advertisement. Other than advertisement, Samsung provides more after sales services it will encourage the brand loyalty of customers. It is evident that the customers give importance to advertisement to know about new trends, quality of the products and consumer loyalty.
5 illus, 6 tables, 26 ref
ISLAMOVA , ISLAMOVA Z , AKROMHKOJAEVA D C , MIRABDULLAEVA Z , BAXADIROVA D
044134 ISLAMOVA , ISLAMOVA Z , AKROMHKOJAEVA D C , MIRABDULLAEVA Z , BAXADIROVA D (Oriental Studies Univ, Uzbekistan) : Who am I as a good teacher and my advises to students. Int J Multidiscip Res Dev 2020, 7(2), 173-6.
What is the difference between effective and efficient? Let's say you had to travel from Rome to Paris; what means of transportation would you use? You could walk, run, ride a bike, drive a car, use a motorcycle, take a train, or fly (by plane). All of these methods of transportation are effective, they work; you will get there. But, which methods require the least amount of energy and accomplish the job in the shortest period of time? These methods are the most efficient. I am sure you would agree that traveling by plane is more efficient than riding a bike although Armstrong might not agree. Learning English can be broken down into two areas: input and output. Input consists of reading and listening while output consists of writing and speaking. Clearly, in order to have good quality output, you must have a lot of good quality input. Think of how long a child listens before beginning to speak. As adults, we are not going to wait two years before attempting to speak, but the more input we get, the more output we can produce. The same applies for reading and writing. The more you read, the better you write. I can even say that the more you read, write and listen, the better you speak. My advice to serious English learners is to approach your goal with a sense of urgency. That means you need to work effectively, but more importantly, you need to work efficiently. Based on my years of teaching and studying foreign languages, I have put together what I consider to be the most effective and efficient ways to develop each area of.
3 ref
ZHURAVEL N
044133 ZHURAVEL N (Nanjing Univ of Aeronautics and Astronautics, Nanjing, China) : Application of multi-criteria decision analysis to select the best waste management technology at the waste processing plant. Int J Multidiscip Res Dev 2020, 7(2), 167-72.
One of the key elements in solving environment-protection problems is introducing the principles of the best available technologies, which are effective in evaluating and regulating the negative impact industrial plants have on the environment. The term “best available technologies” (BAT) are defined as the production technologies, processes and services, determined on the basis of modern science and technology, with the best combination of criteria to achieve environmental objectives subject to availability of technical possibilities being taken into account. The problem of selecting the best available technologies is based on the valuation of pollution and counter-pollution measures and the regulation of the negative impact of industrial production on the environment. Comparing alternative technological options is a complex task in which many environmental, technological, economic and social criteria should be taken into account. One of the main conditions for the correct selection of tools for decision making on BAT is to adequately address uncertain input data. For the correct assessment of alternative technologies including comparison of the levels of negative impacts on the environment, we propose a model of multi-criteria decision making with fuzzy parameters which is a variant of the fuzzy multicriteria decision making methodology called TOPSIS. A stepwise algorithm for multi-criteria decision-making is developed that allows us to operate with uncertain, fuzzy input data using subjective expert evaluations. The proposed method is illustrated with a real-life example which verifies and justifies the method, and illustrates its effectiveness and ability to provide an objective decisionmaking solution.
6 tables, 35 ref
ALI M I , HUQ M M , BEGUM R , WAHIDUZZAMAN M , TARAFDER K H
044132 ALI M I , HUQ M M , BEGUM R , WAHIDUZZAMAN M , TARAFDER K H (Otolaryngology-Head & Neck Surgery Dep, BSMMU, Dhaka, Bangladesh) : Comparative study of neck swelling by clinical, cytological and histopathological examination: A study of 50 cases. Int J Multidiscip Res Dev 2020, 7(2), 163-6.
In this study 50 patients of neck swelling were studied to compare the findings with clinical diagnosis and histopathological report for its diagnostic reliability. This cross sectional study was done in Department of Otolaryngology –Head & Neck Surgery, Bangabandhu Sheikh Mujib Medical University, Dhaka from July 2015 to June 2017. Fine needle aspiration cytology, MRI, CT scan, and histopathological examination of postoperative specimen of neck swelling, analyzed data presented by various tables, graphs and figures. In the present series 50 cases of neck swelling were studied. Out of these 50 cases 19 were male and 31 were female. The male, female ratio was 1:1.63. Age range was 4 – 60 years with maximum frequency in the 4th decade with the 3rd and 2nd in the following suit. Most of the patient were poor. Clinical, cytological and histopathological diagnosis were available in all the cases. The three sorts of diagnoses were compared with each other. Histopathologically 12 cases were tubercular lymphadenopathy. Metastatic carcinoma and lymphoma 5 cases for each. Twelve were nodular goiter, 5 were thyroid carcinoma. Rest were benign, congenital and nonspecific inflammatory conditions. Correct diagnosis were made by FNAC in 45 cases. In the rest 5 cases smear were unsatisfactory in 2 cases and gives inconclusive result, remaining 3 were follicular neoplasm and no definitive result were made which were subsequently diagnosed by histopathological examination as a follicular adenoma in 1 and follicular carcinoma in 2. Sensitivity of FNAC in the diagnosis of neck masses were found 91 % for tuberculosis, 100 % for metastatic carcinoma also for salivary gland tumour. In case of nodular goiter sensitivity was 92 %. But it is only 60 % sensitive in case of thyroid malignancy, as FNAC cannot demarcate clearly between follicular adenoma and follicular cell carcinoma. But its accuracy in diagnosing papillary cell carcinoma of thyroid was 100 %. Keeping the limitations in mind, FNAC can reduce substantially the need of open biopsy for histopathological examination. Last of all I wish to conclude the study with the popular saying of Stewart “Diagnosis by aspiration is as reliable as the combined intelligence of the clinician and pathologist makes it.
8 tables, 25 ref
DIBABA S D
044131 DIBABA S D (Law Dep, Law and Governance Oromia State Univ Coll, Batu, Ethiopia) : Rural land arbitration elders: Composition, recruiment and their relation with regular court: the case of adami tullu jido kombolcha woreda (Ethiopia). Int J Multidiscip Res Dev 2020, 7(2), 156-62.
This study is about rural land arbitration elders in Oromia (Adami Tulu Jido Kombolcha Wereda case) of Ethiopia. The federal and regional rural land administration and use law particularly that of Oromia recognizes rural land dispute settlement by local arbitration elders. The study is about composition, recruitment, relation with regular court and laws applied by local arbitration elders (Jaarsa Biyyaa), and the status of their decision. The FDRE Constitution and other laws recognize the applications of customary rules for land dispute settlement and other matters. But establishment and hence jurisdiction of local arbitration elders (Jaarsa Biyyaa) as customary dispute resolution institution is not regulated by both federal and regional rural land administration law. The Oromia rural land administration law not provides the status of local arbitration elders. The other point is as to values of arbitration elder’s finding. The Oromia rural land administration law says nothing how elder’s finding (which has become binding on parties) is enforced. The Oromia rural land administration law is silent as to which type of laws applied by arbitration elders but the finding shows as customary rules are applicable. The problem is these customary rules do not exist in written form but in the memory of individuals, as a result of this; there is high probability of variation, a possibility of arbitrariness and the danger of abuse. After addressing all these problems in the study area focusing Oromia rural land administration law, this study has given substantial recommendations for solving these problems.
11 ref
CHIEKE J C , EWELUM J N
044130 CHIEKE J C , EWELUM J N (Adult and Continuing Education Dep, Nnamdi Azikiwe Univ, Awka, Anambra, Nigeria) : Need for technology integrated curriculum for adult and non-formal education in colleges of education in Nigeria. Int J Multidiscip Res Dev 2020, 7(2), 152-5.
The aim of this study is to explore the importance of technology in educational curriculum. The concept of curriculum was clearly explained. The paper went on to discuss the different forms of technologies that could be integrated into curriculum in the colleges of education in Nigeria. The benefits of technology integrated curriculum were also highlighted. This paper concludes by recommending that the federal government of Nigeria should fund education adequately to enable it acquire necessary technologies that could transform education in Nigeria.
14 ref
KATRE S S, ARORA C
044129 KATRE S S, ARORA C (Delhi Univ, New Delhi) : Fastener in occupational wear-investigative study to identify types & to set parameters in the case of BSF. Int J Multidiscip Res Dev 2020, 7(2), 149-51.
Any or various device which holds two different part or object together. Also some time to separates two object or parts. Performance as ease in opening and closing, upholding, protection, comfort, usage and aesthetics. requires appropriate qualities. As strength, durability, pull strength, Flexibility, resistance to corrosion etc; as per type of fastener. study of existing fastener and setting up parameters to assess performance.
7 tables, 12 ref
PANDEY R K
044128 PANDEY R K (MATS Univ, Raipur, Chhattisgarh) : Effect of stress on Students academic performance at secondary school level in Raipur. Int J Multidiscip Res Dev 2020, 7(2), 146-8.
The title of the study is of Effect of Stress on Students Academic Performance at Secondary School Level in Chhattisgarh. The objective of this research study is to explore the effect of stress on the students’ academic performance. Now days Stress has a key role in student’s academic performance. The purposes of the study were to investigate; firstly, the type of stress linked with student’s performance; secondly, to evaluate the impact of stress on the academic performances of students; and thirdly, differentiate the impacts of stress on the academic performances of both gender students. To achieve the above-mentioned objectives of the study, the researcher can suggest a reasonable solution for the impact of stress on student’s academic performance. The data collected for this topic, has been gathered from all the secondary schools in Raipur a capital city of Chhattisgarh. In this study the researcher has taken a sample of respondents 10 schools from city and 10 schools from village.200 (100 students from city and 100 students of village area schools) students 10 students / School from different higher secondary schools.
1 table, 12 ref
PATHARE M , GAIKWAD S T , OJHA S , PATADE M
044126 PATHARE M , GAIKWAD S T , OJHA S , PATADE M (MIT ADT Univ, Pune, Maharashtra) : Web based food delivery systems in India. Int J Multidiscip Res Dev 2020, 7(2), 138-41.
Food industry has consistently been a gainful industry for producers, manufacturers yet in addition for clients, merchants. An online food ordering system empowers ease for the clients. Online food delivery system is a site structured fundamentally for use in nourishment conveyance industry. This framework permits inns and cafés to build extent of business by lessening the work cost included. The framework likewise permits to effectively deal with an online menu which clients can peruse and use to put orders with only hardly any snaps. Nourishment can be requested online in problem free way through our proposed framework from eateries just as wreckage. Likewise, clients can easily follow the requests with orders with a nourishment menu. Clients can rate the food items over the feedback system gave by the framework. For the initial implementation of the system application pay-on-delivery payment systems is used. This review tries to comprehend the global as well as Indian scenario of web based food delivery system along with major players, key growth factors, advantages and disadvantages of system.
21 ref
PRASAD B R
044125 PRASAD B R (Maris Stella Coll, Vijayawada, Krishna, Andhra Pradesh) : Tribal development in Andhra Pradesh up to XII plan. Int J Multidiscip Res Dev 2020, 7(2), 132-7.
The Scheduled tribes, since ages, have been victims of socio-economic exploitation and have been relegated to low income generating occupations, inferior trades, unhealthy environment and unclean unskilled occupations. Tribal Development in India is a subject which is being discussed among personnel of higher ranks, statesmen, academicians and scholars for over six decades. During this period, it has become a subject which drew serious and widespread concern and pronounced attention from several quarters ranging from policy makers and development planners to academicians providing material for all of them. Since the state is becoming increasingly important in the context of tribal development, the public policy and administrative system relating to this field have been subjected to serious intellectual scrutiny during all these years. Thus the tribal development has come to occupy very important place in the agenda of social science research in the country. Although clear untouchable practices may be declining in many parts of the country, caste rigidities continue to confine many Schedule Tribe workers in demeaning occupations, which put them at a disadvantage when compared to other communities. The forces of urbanization, social and protective legislations, positive discrimination and other measures taken by the Government, have led to gradual improvement in occupational mobility and living standards over the years, but the living conditions of the majority of Scheduled Tribes. In this connection the researcher put concentration to examine that the tribal development measures in Andhra Pradesh (combined state) during the five year plans from 1951-56 to 2012-2017. During the twelfth five year plan the Andhra Pradesh state was divided in to two Telangana and Andhra Pradesh states.
1 table, 11 ref
CHANDANI JG
044124 CHANDANI JG (Sri Jayewardenepura Univ, Nugegoda, Sri Lanka) : Intellectual freedom, social justice and prison libraries in Sri Lanka. Int J Multidiscip Res Dev 2020, 7(2), 128-31.
The article contributes to the professional discussion of prison library in the context of intellectual freedom and social justice paradigm. It presents results from a survey of the prison libraries in Sri Lanka based on Magazine Prison in Welikada. The survey was conducted in 2018 through an interview. The results show that many prisons in Sri Lanka provide some kind of minimal library services to their inmates. However, prison libraries in Sri Lanka are not professionally managed or are they regularly funded. Further, their collections are developed mainly through gifts and there is almost no evidence of any systematic programming which would lead to constructive and creative use of prisoners’ free time.
28 ref
SADHANASHUKLA , GUJAR CP
044123 SADHANASHUKLA , GUJAR CP (MGCGV, Chitrakoot, Satna, Madhya Pradesh) : Role of commercial banks and non-banking financial companies in Indian economy. Int J Multidiscip Res Dev 2020, 7(2), 124-7.
The canvas of financial system in India portrays a picture of players of different hues and diverse opportunities to commercial banks both in public and private sector, foreign banks, public sector financial institute, regional rural banks, Non- banking financial institutions (NBFC’s), co-operative, NGO/ trust purveying micro credit etc. all working within a broad & sturdy framework of the regulators. Banks and NBFC’s play a vital role in the economic development of a country and are assisting in meeting the diverse financial needs of the economy. They accumulate the idle savings of the people and make them available for investment. In doing so banks & NBFC’s have influenced the direction of saving and investment of the customers and the resultant capital formation has become essential for India’s economic growth and development. They also create new demand deposits in the process of granting loans and purchasing investment securities. A well-organized banking system is the need of the day. At present there are 151 banks with 109811 branches and 12375 NBFC’c in India. If the banking system in a country is effective, efficient and disciplined; it brings about a rapid growth in the various sectors of the economy. As we know that the Agriculture, small and medium enterprise (SME) sector and growing micro finance are the major area of economy of any country like India. Research is based upon the secondary data which provide the findings on commercial banks & NBFC’s and how it helpful in economic development. So this research will helpful in finding out that how commercial banks and NBFC’s are helpful in credit flowing, employment generations in India and how it will contribute in development of Indian economy.
3 tables, 15 ref