Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Singh, Avtar
- A Note on Pattern Knife for Evaluation of Turning Qualities of Timbers
Abstract Views :243 |
PDF Views:0
Authors
Source
Indian Forester, Vol 111, No 10 (1985), Pagination: 802-811Abstract
Wood turning is mainly done by using conventional hand tools by the skilled and specialized wood turners. The performance of profiled wood turning knife fabricated recently indicated that these are exceptionally good in their performance. The operation of turning becomes very fast and thus energy is saved. The time lost in repeated measurements by the turner is at all eliminated. The time is thus also saved. The overall turning operation becomes very quick and simple. Development of a variety of such pattern knives for various wooden turnery items needs attention for their batch production. The process requiries no skilled wood turners which is inevitable in conventional hand turning.- Effect of Various Stages of Shifting Cultivation on Soil Erosion from Steep Hill Slopes
Abstract Views :201 |
PDF Views:0
Authors
Source
Indian Forester, Vol 108, No 2 (1980), Pagination: 116-121Abstract
Soil erosion on Hill slopes (50-60 %) under first year jhurn, record year jhurn and abandoned jhurn and natural bamboo forest has been estimated as 146.6, 179.2, 30.3 8.2 c/hr respectively. Second year cropping in jhurn land have been found comparatively more hazardous than first year. It has been emphasized that to save precious forest wealth, it would be necessary to do away with the jhurn cultivation and adopt alternative conservation based farming system in North Eastern Hills Region.- Response of Eucalyptus Clones to Different Mrigation Regimes in Plantation
Abstract Views :286 |
PDF Views:0
Authors
Source
Indian Forester, Vol 137, No 6 (2011), Pagination: 691-698Abstract
The leaf N. P. K and chlorophyll content in four different clone numbers viz. 72. 413. 2045 and 2070 of Eucalypts as influenced by three different irrigation regimes was studied in field conditions. The sampling of leaves was carried out during June and December 2007. The results of the study revealed that the accumulation of leaf N was higher in 50mm CPE in clone number 413 during June and December 2007. However, leaf P and K concentrations were significantly increased in clone number 413 when irrigation was 50mm and 75mm CPE during December 2007. Where as, the chlorophyll content was higher in clone number 413. In irrigation regime CPE at 50mm all the clones differed significantly with respect to chlorophyll content when irrigation frequency reduced to 100mm CPE chlorophyll content reduced, significantly in aU the clones during June and December 2007. Under aU the irrigation regimes the clone 2045 proved to be inferior to all other clones under study with regards to chlorophyll content where as, clone 413 maintained its superiority over other clone under study.Keywords
Leaf N, P, K, Chlorophyll Content- Growth Performance of Eucalyptus tereticornis and E. Camaldulensis Progenies under Various Levels of Soil Salinity
Abstract Views :304 |
PDF Views:0
Authors
Source
Indian Forester, Vol 136, No 12 (2010), Pagination: 1610-1615Abstract
The study was conducted by transplanting one and half month old seedlings of six progenies, three each of Eucalyptus tereticornis and E. camaldulensis, in the pots filled with eight levels of artificially created soil salinity levels (ECe) i.e. control, 2, 4, 6, 8, 10, 12, and 14 dSm-1. The experiment was conducted by following completely randomized design with three replications. The data on plant height, collar diameter and number of leaves per plant were recorded after 90 days of study. All the growth parameters of both the species recorded significant differences among salinity treatments. The maximum values were recorded in control and the lowest values were found at salinity level of ECe 14 dSm-1 . Significant genetic variation was noticed in both the species for all the growth parameters. E. camaldulensis recorded significantly higher growth traits than respective values of E. tereticornis.Keywords
Eucalyptus Tereticornis, E. Camaldulensis, Salinity, Genetic Variation, Growth Traits- Response of Wheat to Different Irrigation Regimes Given under Poplar (populus Deltoides Bartr. Ex. Marsh) Based Agro forestry System
Abstract Views :308 |
PDF Views:1
February 2009 at a spacing of 5*4m on sandy soil at Punjab Agricultural University, Ludhiana. The experiment was
conducted using randomized block design with four irrigation treatments viz; I1 (Irrigation after 40mm CPE), I2 (Irrigation after 60mm CPE), I3 (Irrigation after 80mm CPE) and I4 (Irrigation after 100 mm CPE) given to poplar plantation and having six replications. The wheat yield was lower under the intercropping, more so during the second year, as
compared to the pure crop. The reduced irrigation regimes further reduced the grain yield of wheat and the best results
were obtained with the I1 irrigation regime. The grain appearance score, test weight and grain hardness were all
affected negatively during the second year of poplar growth and the restricted irrigation treatments. Consequently the
grain protein content increased with those treatments owing the shriveling of the kernels whereby the bran to
endosperm ratio increases. However the effect on the sedimentation value was not so pronounced.
Authors
Source
Indian Forester, Vol 139, No 1 (2013), Pagination: 75-77Abstract
A recently released, short duration wheat variety PBW-550, was intercropped in the poplar trees planted duringFebruary 2009 at a spacing of 5*4m on sandy soil at Punjab Agricultural University, Ludhiana. The experiment was
conducted using randomized block design with four irrigation treatments viz; I1 (Irrigation after 40mm CPE), I2 (Irrigation after 60mm CPE), I3 (Irrigation after 80mm CPE) and I4 (Irrigation after 100 mm CPE) given to poplar plantation and having six replications. The wheat yield was lower under the intercropping, more so during the second year, as
compared to the pure crop. The reduced irrigation regimes further reduced the grain yield of wheat and the best results
were obtained with the I1 irrigation regime. The grain appearance score, test weight and grain hardness were all
affected negatively during the second year of poplar growth and the restricted irrigation treatments. Consequently the
grain protein content increased with those treatments owing the shriveling of the kernels whereby the bran to
endosperm ratio increases. However the effect on the sedimentation value was not so pronounced.
Keywords
Agro Forestry, Moisture Stress, Wheat, Grain Yield, Quality, Inter-cropping.- Propagation of Discontinuities in A Non-Homogeneous Viscoelastic ROD with Varying Cross-Section
Abstract Views :157 |
PDF Views:0
Authors
Affiliations
1 Deptt. of Mathematics, Punjabi University, Patiala-147002, IN
2 Deptt. of Mathematics, Akal Degree College, Mastuana, Distt. Sangrur (Punjab), IN
1 Deptt. of Mathematics, Punjabi University, Patiala-147002, IN
2 Deptt. of Mathematics, Akal Degree College, Mastuana, Distt. Sangrur (Punjab), IN
Source
The Journal of the Indian Mathematical Society, Vol 54, No 1-4 (1989), Pagination: 165-185Abstract
Propagation of waves and discontinuities in rods has been extensively studied and reported in literature. Tlie problems of wave-propagation in elastic bars with variable area of cross section have been treated by Tsui (1968), Bert and Egle (1969) Handeiman and Rubenfeld (1972).- A SURVEY ON OPTIMIZATION OF TRANSMIT POWER IN COGNITIVE RADIO NETWORKS THROUGH NATURE INSPIRED COMPUTATIONAL INTELLIGENCE TECHNIQUES
Abstract Views :192 |
PDF Views:119
Authors
Affiliations
1 I.K Gujral Punjab Technical University, IN
2 Maharaja Ranjit Singh Punjab Technical University, IN
1 I.K Gujral Punjab Technical University, IN
2 Maharaja Ranjit Singh Punjab Technical University, IN
Source
ICTACT Journal on Communication Technology, Vol 12, No 1 (2021), Pagination: 2259-2264Abstract
Cognitive radio (CR) is a field which is gaining a lot of interest of researchers in around the whole world. It is also termed as nextgen technology as it aims to solve the problem of unutilized electromagnetic spectrum assigned to licensed users. With increasing wireless devices there is a demand of more spectrum resources and cognitive radio can help in making available the unused or underused spectrum for real time communication. When number of cognitive users communicate together at the same time there exists the problem of interference due to transmit power of all the devices to the licensed users. So there is a need of controlling power of transmission for cognitive users so that they may not interfere with Primary licensed users and maintain QoS with other cognitive users. The power control of a large number of devices together can be done by the application of computational intelligence techniques. In this paper three nature inspired computational intelligence techniques like GA, PSO and ABC for optimization of transmit power in cognitive radio networks are discussed.Keywords
Cognitive Radio, Secondary User, Primary User, Efficient Utilization of Spectrum, Power Allocation Strategy, Dynamic Spectrum Access.References
- D. Maresch and J. Gartner, “Make Disruptive Technological Change Happen-The Case of Additive Manufacturing”, Technological Forecasting and Social Change, Vol. 155, pp. 1-15, 2020.
- M.E. Ahmed and H. Kim, “DDoS Attack Mitigation in Internet of Things Using Software Defined Networking”, Proceedings of International Conference on Big Data Computing Service and Applications, pp. 6-9, 2017.
- T. Karthikeyan and K. Praghash, “An Improved Task Allocation Scheme in Serverless Computing using Gray Wolf Optimization (GWO) based Reinforcement Learning (RIL) Approach”, Wireless Personal Communications, Vol. 117, No. 3, pp. 1-19, 2020.
- S. Kannan, G. Dhiman, and M. Gheisari, “Ubiquitous Vehicular Ad-Hoc Network Computing using Deep Neural Network with IoT-Based Bat Agents for Traffic Management”, Electronics, Vol. 10, no. 7, pp. 785-796, 2021.
- L. Atzori and A. Iera, “The Internet of Things: A Survey”, Computer Networks, Vol. 54, No. 15, pp. 2787-2805, 2010.
- M. El Hajj, M. Chamoun, A. Fadlallah and A. Serhrouchni, “Analysis of Authentication Techniques in Internet of Things (IoT)”, Proceedings of International Conference on Cyber Security in Networking, pp. 1-3, 2017.
- L. Celia and Y. Cungang, “Authenticated Key Management Protocols for Internet of Things”, Proceedings of International Conference on Internet of Things, pp. 126-129, 2018.
- Steve R. Gunn and Basel Halak, “Lightweight PUF-Based Authentication Protocol for IoT Devices”, Proceedings of International Conference on Verification and Security, pp. 38-43, 2018.
- T. Kothmayr, C. Schmitt, W. Hu, M. Br and G. Carle, “DTLS based Security and Two-Way Authentication for the Internet of Things”, Ad Hoc Networks, Vol. 11, No. 8, pp. 2710-2723, 2013.
- Amiya Kumar, Suraj Sharma, Deepak Puthal, AbhishekPandey and Rathin Shit, “Secure Authentication Protocol for IoT Architecture”, Proceedings of International Conference on Information Technology, pp. 220-224, 2017.
- B. Hong Jin, Walter Guttmann and Dog Seong Kim, “A Framework for Automating Security Analysis of the Internet of Things”, Journal of Network and Computer Applications, Vol. 83, pp. 12-27, 2017.
- J. Jiang and L. Shu, “Authentication protocols for Internet of Things: A Comprehensive Survey”, Security and Communication Networks, Vol. 2017, pp. 1-18, 2017.
- M.N. Aman, M.H. Basheer and B. Sikdar, “Two-Factor Authentication for IoT with Location Information”, IEEE Internet of Things, Vol. 6, No. 2, pp. 3335-3351, 2018.
- P. Gope and B. Sikdar, “Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices”, IEEE Internet of Things, Vol. 6, No. 1, pp. 580-589, 2018.
- N.G. Veerappan Kousik, K. Suresh, R. Patan and A.H. Gandomi, “Improving Power and Resource Management in Heterogeneous Downlink OFDMA Networks”, Information, Vol. 11, No. 4, pp. 203-216, 2020.
- R. Amin, N. Kumar and G.P. Biswas, “A Light Weight Authentication Protocol for IoT-Enabled Devices in Distributed Cloud Computing Environment”, Future Generation Computer Systems, Vol. 78, pp. 1005-1019, 2018.
- Yong Li and Lijun Liao, “Flexible Certificate Revocation List for Efficient Authentication in IoT”, Proceedings of International Conference on Internet of Things, pp. 1-7, 2018.
- P. Mahalle, S. Babar, N. Prasad and R. Prasad, “Identity Management Framework Towards Internet of Things (IoT): Roadmap and Key Challenges”, Proceedings of International Conference on Virtual Local Area Network Technology and Applications, pp. 430-439, 2010.
- K.W. Kim, Y.H. Han and S.G. Min, “An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks”, Sensors, Vol. 17, No. 10, pp. 1-20, 2017.
- G. Dhiman, K. Somasundaram and K. Sharma, “Nature Inspired-Based Approach for Automated Cyberbullying Classification on Multimedia Social Networking”, Mathematical Problems in Engineering, Vol. 2021, pp. 1- 21, 2021.
- P.K. Dhillon and S. Kalra, “Multi-Factor User Authentication Scheme for IoT-Based Healthcare Services”, Journal of Reliable Intelligent Environments, Vol. 4, No. 3, pp. 141-160, 2018.
- M. Wazid, A.K. Das, V. Odelu and N. Kumar, “Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks, IEEE Internet of Things, Vol. 5, No. 1, pp. 269-282, 2017.
- N.V. Kousik, P. Johri and M.J. Divan, “Analysis on the Prediction of Central Line-Associated Bloodstream Infections (CLABSI) using Deep Neural Network Classification”, Proceedings of International Conference on Computational Intelligence and Its Applications in Healthcare, pp. 229-244, 2020.
- T. Song, R. Li, B. Mei, J. Yu, X. Xing and X. Cheng, “A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes”, IEEE Internet of Things, Vol. 4, No. 6, pp. 1844-1852, 2017.
- A.K. Das, P. Sharma, S. Chatterjee and J.K. Sing, “A Dynamic Password-Based User Authentication Scheme for Hierarchical Wireless Sensor Networks”, Journal of Network and Computer Applications, Vol. 35, No. 5, pp. 1646-1656, 2012.
- P. Johri, “Improved Energy Efficient Wireless Sensor Networks using Multicast Particle Swarm Optimization”, Proceedings of International Conference on Innovative Advancement in Engineering and Technology, pp. 1-6, 2020.
- O.R. Vincent and O. Folorunso, “A Descriptive Algorithm for Sobel Image Edge Detection”, Proceedings of International Conference on Informing Science and IT Education, pp. 97-107, 2009.
- J.H. Lin, C.W. Chou and C.H. Yang, “A Chaotic Levy Flight Bat Algorithm for Parameter Estimation in Nonlinear Dynamic Biological Systems”, Computer and Information Technology, Vol. 2, No. 2, pp. 56-63, 2012.
- M. Abdalla, P. Fouque and D. Pointcheval, “Password Based Authenticated Key Exchange in the Three-Party Setting”, Proceedings of International Conference on Theory and Practice in Public Key Cryptography, pp. 65-84, 2005.