A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Abhilasha,
- Sacral Anatomical Malformations
Authors
1 Dept. of Anatomy, Desh Bhagat Dental College and Hospital, Sri Muktsar Sahib (Punjab), IN
2 Dept. of Anatomy, JCD Dental College and Hospital, Sirsa (Haryana), IN
Source
SMU Medical Journal, Vol 3, No 1 (2016), Pagination: 628-637Abstract
Sacrum a large triangular fusion of five sacral vertebrae is found wedged between the two innominate bones and forms postero-superior wall of pelvic cavity. An arched sacral hiatus is usually observed below the fourth or the third sacral spine. The present study was conducted in the Department of Anatomy at Desh Bhagat Dental College and Hospital, Sri Muktsar Sahib. Total 20 dry human sacra were studied with regard to the level of apex of sacral hiatus, level of base of hiatus, shape of hiatus and sacral foramina morphologically. In the present study the most prominent shape of the hiatus was inverted-U (45%). The apex of hiatus was commonly found at the level of 4th sacral vertebra in 50% of sacra while the base was more commonly found at the level of 5th sacral vertebra (55%). The knowledge of anatomical variations of sacral hiatus is of great significance as sacral hiatus is the site of caudal epidural anaesthesia and its knowledge may help improve its success rate.Keywords
Sacrum, Variations, Sacral Hiatus, Vertebrae, Lumbosacral Region, Anterior Sacral Meningocele.- Analytical/Numerical Investigations of Kelvin-Helmholtz Instability of Superposed Non-Viscous Fluids in the Presence of Magnetic Field
Authors
1 Department of Mathematics $ Statistics, H.P.University, Shimla-5, IN
2 Govt. Degree College, Amb, Una (H.P.), IN
3 APG University, Solan (H.P.), IN
Source
Research Journal of Engineering and Technology, Vol 6, No 1 (2015), Pagination: 164-168Abstract
The instability of two immiscible superposed, non-viscous, electrically conducting and counter-streaming fluids with upper fluid layer lighter than the lower fluid layer in the presence of uniform magnetic field has been investigated numerically. Using the linear theory and normal mode analysis, the exact solutions of eigen value problem have been obtained for stress free bounding surfaces and the dispersion relation so obtained has been analysed to examine the effects of magnetic field and velocity of streaming fluids on the growth rates of the unstable mode of perturbation on the physical system. It has been found that the magnetic field has a slight stabilizing effect on the system; whereas the velocity of the counter-streaming fluids has a large enough stabilizing effect towards neutral stability.- Magneto-Thermosolutal Instability in Viscoelastic Nanofluid Layer
Authors
1 Department of Mathematics and Statistics, Himachal Pradesh University, Shimla-5, IN
2 SDWG Govt. College, Beetan, Distt. Una (H.P.), IN
3 Dr. S. S. Bhatnagar University Institute of Chemical Engneering and Technology, Panjab University, Chandigarh 160014, IN
Source
International Journal of Technology, Vol 6, No 2 (2016), Pagination: 258-264Abstract
Thermosolutal convection in an infinitely, extending layer of viscoelastic nanofluids in the presence of uniform vertical magnetic field with Soret and Dufour effect is investigated. The rheology of nanofluids is described by Maxwell's model. The coupled partial differential equations with the stress free boundaries are solved using the normal mode technique and linear theory. The first approximation of Galerkin procedure is used to obtain the numerical solution of the set of ordinary differential equation by using the software MATHEMATICA. The effects of the various parameters are shown graphically on both the stationary and oscillatory motions.- A Brief Survey on Part of Speech Tagging Techniques Used in Punjabi Language and Other Regional Languages
Authors
1 Giani Zail Singh Punjab Technical University, Bathinda, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 13 (2014), Pagination: 151-160Abstract
Parts-of-speech (POS) tagging is the basic building block of any Natural Language Processing (NLP) tool. A POS tagger has many applications. POS tagger represents structure and forms of words and phrases of a particular language. Therefore, these can be used in different research fields in NLP. Taggers can be developed using linguistic rules, stochastic models or both .This paper presents a review about different POS taggers developed for different Indian Language.Keywords
Parts-of-Speech Tagger, Indian Languages, HMM Technique.- Clause Identification in English and Indian Languages: A Survey
Authors
1 GZS Punjab Technical University, Bathinda, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 13 (2014), Pagination: 179-184Abstract
The problem of identification of clauses in natural language processing is to find away to identify the each type of clause, e.g., Dependent clause, independent clause. Clause identification plays very important role in preprocessing task for language processing activities. This paper reports about the Clause Identification proposed for various Languages like English, Malayalam, Bengali and Urdu. Various clause identification approaches like Hidden Markov Model (HMM), Support Vector Model (SVM), and Rule based approaches, Maximum Entropy (ME) and Conditional Random Field (CRF), Entropy Guided Transformation Learning (ETL), have been used for POS tagging.- Review: Palm Recognition Techniques
Authors
1 Computer Science Engineering Department, Giani Zail Singh PTU Campus, Bathinda, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 12 (2014), Pagination: 73-78Abstract
Palm recognition system is used in order to improve the performance and reliability. The physical dimensions of a human palm contain evidence that is capable of verifying the identity of an individual. Palm geometry based verification systems utilize the geometric features of the palm like length and width of the palm, diameter, area and perimeter. The biometric system is a confirmation system which utilizes these palm geometry features for user authentication. It is being extensively used in various applications like attendance, access control, anti-pass back, point-of scale and interactive kiosks etc. The main objective of designing this system is security. In this paper various techniques of Palm Recognition has been presented.Keywords
Biometrics, Palm Print.- Survey on Non Linear Noise Removal Techniques for Salt and Pepper Noise in Digital Images
Authors
1 Department of CSE, GZS-PTU Campus, Bathinda, Punjab, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 12 (2014), Pagination: 90-95Abstract
The main cause of the image quality degradation is noise. Noise makes it difficult for the observer to discriminate the fine details of the image. There are various types of noises which can corrupt the image. Noise can appear on the images due to faulty memory locations, during transmission, during image acquisition, due to timing errors in the digitization process etc. Image denoising becomes the necessity to enhance the image quality without any loss of image information. The numerous researchers have presented various techniques to remove salt and pepper noise from digital images. A Survey of various such techniques is presented in this paper.Keywords
Impulse Noise, Salt and Pepper Noise, Non Linear Filters, Image Denoising, PSNR, IEF and MSE.- Cutting back the Wormhole Attack in Mobile Network: A Survey
Authors
1 Department of CSE, GZS PTU Campus, Bathinda, Punjab, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 11 (2014), Pagination: 11-17Abstract
As concerned with wireless networks, the communication is done through the radio links where chances of unauthorized user are more which consequently degrades the performance of network and result is more delay. Wireless networks are broadly classified into two broad categories: infrastructure mode and infrastructure less mode. Various protocols are defined under this which uses their different mechanism for detection and isolation of the wormhole attacks. In this paper some of the studies are defined on the basis of methods used for the detection and avoidance of attacks adhere to its use in it. As the numerous attacks may arise over network on MANET, their comparison has been discussed on the basis of techniques and their effects.
This paper intends to find out all the possible ways to detect and avoid the wormhole attack in the network. It may not lead to complete isolation of the attack but plays an important role to reduce the wormhole attack.
Keywords
Wireless Network, Wormhole Attack.- Optimization of Speed Protocol Using Genetic Algorithm in Wireless Sensor Network
Authors
1 GZS PTU Campus, Bathinda, Punjab, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 11 (2014), Pagination: 41-47Abstract
A Wireless Sensor Network (WSN) consists of a large number of distributed autonomous devices called sensor nodes (SNs). Sensor nodes monitors physical or environmental conditions like temperature, sound, vibration, pressure at different locations. Different wireless sensor network applications, like battlefield surveillance, health monitoring, disaster management and earthquake response systems, are developed to cope up with fast changing events in the real world. Each underlying communication infrastructure is required to meet real-time constraints and Quality-of-Service (QoS) requirements. Spatiotemporal communication protocol, called SPEED, is a real-time QoS protocol. SPEED supports spatiotemporal communication service by ensuring a desired delivery speed across the sensor network, and making end-to-end delay proportional to the distance between the source and destination. Limited power resources pose a great challenge in meeting QoS real-time routing. The purpose of the research carried is optimize SPEED protocol routing using Genetic Algorithm (GA).The whole simulation is taken place in the MATLAB environment.Keywords
Wireless Sensor Network (WSN), Quality-of-Service (QoS), SPEED, Optimization, Genetic Algorithm (GA).- Numerical Investigations of Electro-Thermal Convection in Dielectric Nanofluid Layer
Authors
1 Department of Mathematics and Statistics, Himachal Pradesh University, Shimla-5, IN
2 SDWG Govt. College Beetan, Distt. Una (H.P), IN
3 Govt. College Beetan, Distt. Una (H.P), IN