Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Renu,
- Solution of the Algebraic or Transcendental Equations Using Different Computational Techniques
Abstract Views :188 |
PDF Views:0
Authors
Affiliations
1 Research Scholar, Department of Mathematics, Singhania University, Pacheri Bari, Jhunjhunu, Rajasthan, IN
1 Research Scholar, Department of Mathematics, Singhania University, Pacheri Bari, Jhunjhunu, Rajasthan, IN
Source
International Journal of Science, Engineering and Computer Technology, Vol 2, No 3 (2012), Pagination: 139-140Abstract
The algebraic and transcendental equations are solved to obtain the ischolar_main of an equation with the help of different computational techniques. The appropriate solution of the equation to the desired degree of accuracy is obtained using successive approximations. A particular model is chosen for numerical computation of ischolar_main of the equation. The numerical values of this approximated ischolar_main are shown graphically against the number of approximation for the different computational techniques. The impact of the different computational techniques on the ischolar_main of equation is observed significantly.- A Review on Surface Wave Propagation in an Anisotropic Elastic Media
Abstract Views :346 |
PDF Views:0
Authors
Affiliations
1 Research Scholar, Department of Mathematics, Singhania University, Pacheri Bari, Jhunjhunu, Rajasthan, IN
1 Research Scholar, Department of Mathematics, Singhania University, Pacheri Bari, Jhunjhunu, Rajasthan, IN
Source
International Journal of Science, Engineering and Computer Technology, Vol 2, No 3 (2012), Pagination: 133-135Abstract
These papers describe the various approaches and suggestions which may be proved heipful in rearrangement of available resources. It also uncovers the different opportunity not only for best utilization of resources for the surface waves but also for the establishment of new more efficient information about seismology. In the present paper, some problem on surface wave propagation is studied in an anisotropic media.- Rayleigh Wave Propagation in an Initially Stressed Transversely Isotropic Dissipative Solid Half-Space
Abstract Views :224 |
PDF Views:0
Authors
Jyoti Arora
1,
Renu
2
Affiliations
1 Research Scholar, Department of Mathematics, Singhania University, Rajasthan, IN
2 Research Scholar, Department of Mathematics, Singhania University, Rajasthan
1 Research Scholar, Department of Mathematics, Singhania University, Rajasthan, IN
2 Research Scholar, Department of Mathematics, Singhania University, Rajasthan
Source
International Journal of Science, Engineering and Computer Technology, Vol 2, No 3 (2012), Pagination: 129-132Abstract
The governing equations of an initially stressed transversely isotropic dissipative solid half-space are solved for surface wave solutions. The appropriate solutions in the half-space are applied to the required boundary conditions at the free surface of the half-space. The frequency equation of the Rayleigh wave is derived. Frequency equation of the Rayleigh wave is also obtained in some limiting cases.- Surface Wave Propagation at the Interface Between Two Orthotropic Elastic Half Spaces
Abstract Views :248 |
PDF Views:0
Authors
Affiliations
1 Department of Mathematics, Shanti Niketan College of Engineering, Ladwa, Hisar, IN
2 Department of Primary Education, Government Primary School, Jalmana, karnal, IN
1 Department of Mathematics, Shanti Niketan College of Engineering, Ladwa, Hisar, IN
2 Department of Primary Education, Government Primary School, Jalmana, karnal, IN
Source
International Journal of Science, Engineering and Computer Technology, Vol 2, No 2 (2012), Pagination: 13-15Abstract
In the present paper, the surface wave propagation at the interface between two orthotropic elastic solid is studied. The governing equations are solved to obtain the general solution in yz-plane. The appropriate boundary conditions at an interface between two orthotropic elastic half spaces are satisfied by appropriate particular solutions to obtain the frequency equation of the surface wave in the medium. Some special cases are also discussed.- Personality Characteristics and Organizational Role Stress among Employees of Telecom Public and Private Sector Workforce
Abstract Views :308 |
PDF Views:1
Authors
Affiliations
1 Gupta Hospital, Hisar, Haryana, IN
2 University of Rajasthan, Jaipur, IN
1 Gupta Hospital, Hisar, Haryana, IN
2 University of Rajasthan, Jaipur, IN
Source
Indian Journal of Health and Wellbeing, Vol 2, No 2 (2011), Pagination: 399-402Abstract
The scenario study has been designed to compare the degree of organizational role stress, and personality among public and private sector telecoms employees. The sample was composed of 180 telecom employees in which 90 employees were from private sector telecom and the rest of 90 were from public sector telecom. Inter-correlation and t-test has been computed for the simplification of the data. The results indicate that private sectors telecom employees have faced more role ambiguity, role stress, role overload and role stagnation in comparison to public sectors.- Synthesis and Characterization of Ni(II) Complexes with Ester Thiosemicarbazone
Abstract Views :199 |
PDF Views:1
Authors
Affiliations
1 Department of Chemistry, D.A.V. (P.G.) College, Muzaffarnagar (U.P.), IN
1 Department of Chemistry, D.A.V. (P.G.) College, Muzaffarnagar (U.P.), IN
Source
The Asian Journal of Experimental Chemistry, Vol 7, No 1 (2012), Pagination: 19-25Abstract
Complexes of Ni (II) of general composition [ML2X2], [ML2X]X were prepared with thiosemcarbazones (L1, L2, L3 & L4). These complexes were characterized by elemental analysis, molar conductances measurements, Magnetic moments IR, electronic spectra, and EPR spectral studies. All are the nonelectrolyte in nature therefor these complexes may be formulated [M(L)2X2]. All the complexes are of high-spin and show octahedral jeometry.Keywords
Acetoacetic Ester Thiosemicarbazone, Isopropyl Ester Thiosemicarbazone, 6-Methyl Pyran 2-One 4 Hydroxy 3 Dicarboxylic Acid Ester Thiosemicarbazone, Biological Activity.- Synthesis and Characterization of Co(II) Complexes with Ester Semicarbazone
Abstract Views :188 |
PDF Views:1
Authors
Affiliations
1 Department of Chemistry, D.A.V. (P.G.) College, Muzaffarnagar (U.P.), IN
1 Department of Chemistry, D.A.V. (P.G.) College, Muzaffarnagar (U.P.), IN
Source
The Asian Journal of Experimental Chemistry, Vol 7, No 1 (2012), Pagination: 45-51Abstract
Complexes of cobalt (II) of general composition [ML2X2], [ML2X]X were prepared with semcarbazones (L1, L2, L3 and L4). These complexes were characterized by elemental analysis, molar conductances measurements, Magnetic moments IR, electronic spectra, and EPR spectral studies. All are the nonelectrolyte in nature therefor these complexes may formulated [M(L)2X2]. All the complexes are of high-spin and show octahedral geometry.Keywords
Acetoacetic Ester Semicarbazone, Isopropyl Ester Semicarbazone, 6-Methyl Pyran-2-One-4 Hydroxy 3 Diacarboxylic Acid Ester Semicarbazone, Biological Activity.- Pharmacological and Phytochemical Evidences for the Plants of Wedelia Genus-A Review
Abstract Views :221 |
PDF Views:1
Authors
Affiliations
1 National Institute of Ayurvedic Pharmaceutical Research, Moti Bagh Road, Patiala-147001, IN
2 Regional Research Institute of Unani Medicine, Royapuram, Chennai, Tamil Nadu, IN
1 National Institute of Ayurvedic Pharmaceutical Research, Moti Bagh Road, Patiala-147001, IN
2 Regional Research Institute of Unani Medicine, Royapuram, Chennai, Tamil Nadu, IN
Source
Asian Journal of Pharmaceutical Research, Vol 1, No 1 (2011), Pagination: 7-12Abstract
The scientific basis for the statement that plants and their active constituents play an important role in the prevention diseases is continuously advancing. In fact the origin of many therapeutic substances from the genus Wedelia. It is an interesting source of potential bioactive molecules, as iridoids compounds, flavonoids, diterpenoids derivatives, phytosteroids, with antioxidant, anti-inflammatory, antimicrobial, Hepatoprotective activity, analgesic and antihistamine, Anti-implantation, antiasthmatic activities and anticancer activity. This work reviews the pharmacological evidence of extracts of plants from the genus Wedelia, giving an overview of the most studied biological effects and the known phytochemical composition. Although more studies are necessary, Wedelia exhibits proven potential to become of important pharmacological interest.Keywords
Genus Wedelia, Pharmacological Activity, Phytochemistry, Anti-Inflammatory, Medicinal Plants.- Family Environment of Rural and Urban Adolescent Girl's:A Comparative Study
Abstract Views :406 |
PDF Views:0
Authors
Affiliations
1 Department of Human Development and Family Studies, COHS, CCSHAU, Hisar, Haryana, IN
1 Department of Human Development and Family Studies, COHS, CCSHAU, Hisar, Haryana, IN
Source
International Journal of Education and Management Studies, Vol 9, No 2 (2019), Pagination: 95-98Abstract
Family is a shelter for every civil in the world, each family environment influence on their members, family consists many factors such as culture, facility of the family standard of living in family. The growth and development of each person of the family member is dependent on family. Adolescence is a process, rather than a period of achieving the desired growth, attitude, beliefs and methods for effective participation in society as an emerging adult. The way in which adolescents develop and exercise their personal efficacy during this transitional period can play a key role in setting the course their life paths take. The study was conducted with the aim to find the level of family environment of adolescent girls' across residential area. The study was conducted in Hisar district ofHaryana state where two Government Senior Secondary Schools from rural area and two from urban area were selected. From each of the four selected schools of rural and urban area of Hisar, all girls of 14-16 year were included in final sample. The Family Climate Scale (FCS) developed by Shah (2001) was used to assess family environment of adolescent girls. Results indicated that adolescents from urban area get better family environment as compared to adolescents from rural area.Keywords
Family Environment, Adolescents, Growth, Development.References
- Baida, S., Sangwan, S., & Kumari, A. (2019). Family environment as perceived by adolescent boys and girls. International Journal of Current Microbiology and Applied Sciences, 5(1), 2262-2269.
- Beniwal, P., & Singh, C.K. (2016). Creativity and intellectual abilities ofadolescents. Unpublished Master's Thesis. CCS Haryana Agricultural University, Hisar, India.
- Choudhary, H., & Tejpreet, K.K. (2008). Family environment of urban adolescents. Indian Journal ofPsychometry and Education, 39( 1), 75-77.
- Crouter,A. C., Melissa, R. H., Susan, M. M., & Corinna, J.T. (2004). Family time and the psychosocial adjustment of adolescent siblings and their parents. Journal of Marriage and Family, 66, 147-162.
- Knapp, D.S.(1993). The contemporary thesaurus of social science terms and synonyms. The Oryx Press.
- Ozcinar, Z. (2006). The instructional communicative qualification of parents with students. Cypriot Journal of Educational Sciences, 1,24-30.
- Rana, S., & Singh, C.K. (2016). Creativity and emotional intelligence among adolescents. M.SC. Thesis in .Education CCS Haryana Agricultural University, Hisar, India.
- Rani, P., & Singh, C.K. (2013). Comparison of rural and urban children according to home environment and parenting style. Asian Journal of Home Science, 8(2), 665-667.
- Shah, B. (2001). Family Climate Scale. National Psychological Corporation, Agra.
- Singh, G. (2013). Social competence of adolescents in relation to emotional intelligence and home environment. International Journal of Science and Research, 4(9), 449-451
- Van Wei, F. (2000). The parental bom and the well-being of adolescents and young adult. Journal of Youth and Adolescence, 29(3), 307-318.
- Williamson, D.G. (2006). The relationship between perceived early childhood family influence, attachment, and academic self-efficacy: An exploratory analysis. Dissertation Abstracts International, 66(7), 2495-A.
- World Health Organization (1998). Life skills education in schools. Geneva: world health organization. [Google Scholar.
- Energy Efficient Secure Routing Framework Based on Multidimensional Trust Evaluation for MANET
Abstract Views :198 |
PDF Views:0
Authors
Renu
1,
Sanjeev Sharma
1
Affiliations
1 Rajiv Gandhi Technological University, Bhopal, Madhya Pradesh, IN
1 Rajiv Gandhi Technological University, Bhopal, Madhya Pradesh, IN
Source
Journal of Network and Information Security, Vol 7, No 1 (2019), Pagination: 20-24Abstract
Very popular MANET works with some functions like data exchange, communication management and routing etc. based on the cooperation. Assess the trustworthiness of the nodes became important since trust is the pillar for cooperation. For secure routing, an efficient trust management mechanism should be implemented in such a way that it could not change the basic nature of network. Mobility, battery limitation and the computational complexities make the trust evaluation a challenging task. To manage the energy during inside attack this paper proposes a trust based energy efficient routing approach, as the extension of our previous work [10] by including various dimensions of trust such as initial trust, behavioral and recommended trust. Most favourite Ad-hoc On-demand Distance Vector (AODV) Routing protocol is used as a representative in the proposed framework. In this paper, a multidimensional trust evaluation security solution is proposed to make minimal changes to the functioning of AODV and achieved an increased level of security and reliability.Keywords
AODV, Direct trust, Multidimensional Trust, Security, Secure Routing, Trust.References
- N. Pissinou, T. Ghosh, and K. Makki, “Collaborative trust-based secure routing in multihop ad hoc net works,” in Networking 2004. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications, 2004.
- J. Cordasco, and S. Wetzel, “Cryptographic versus trust-based methods for MANET routing security,” Electronic Notes in Theoretical Computer Science, vol. 197, no. 2, pp. 131-140, 2008.
- R. Mishra, S. Sharma, and R. Agrawal, “Vulnerabilities and security for ad-hoc networks,” in Proceedings of the IEEE International Conference on Networking and Information Technology, pp. 192-196, April 2010.
- H. Deng, W. Li, and D. P. Agrawal, “Routing security in wireless ad hoc networks,” IEEE Communications Magazine, vol. 40, no. 10, pp. 70-75, 2002.
- K. Sanzgiri, B. Dahill, B. N. Levine, C. Shield, and E. M. Belding-Royar, “A secure routing protocol for ad hoc networks,” in Proceedings of ICNP’02, 2002.
- B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, and A. Jamalipour, “A survey of routing attacks in mobile ad hoc networks,” IEEE Wireless Communications, IEEE, vol. 14, no. 5, pp. 85-91, 2007.
- M. G. Zapata, and N. Asokan, “Securing ad hoc routing protocols,” in Proceedings of the ACM Workshop on Wireless Security (WiSE’02), ACM Press, 2002.
- L. Zhou, and Z. J. Haas, “Securing ad hoc networks,” IEEE Network, vol. 13, no. 6, pp. 24-30, 1999.
- K. Meka, M. Virendra, and S. Upadhyaya, “Trust based routing decisions in mobile ad-hoc networks,” in Proceedings of the Workshop on Secure Knowledge Management (SKM’2006), 2006.
- R. Mishra, I. Kaur, and S. Sharma, “New trust based security method for mobile ad-hoc networks,” International Journal of Computer Science and Security (IJCSS), vol. 4, no. 3, pp. 346-351, June-July 2010.
- X. Li, M. R. Lyu, and J. Liu, “A trust model based routing protocol for secure ad hoc networks,” in Proceedings of the IEEE Aerospace Conference (IEEEAC), pp. 1286-1295, 2004.
- M. Virendra, M. Jadliwala, M. Chandrasekaran, and S. Upadhyaya, “Quantifying trust in ad-hoc networks,” in Proceedings of the IEEE International Conference on Integration of Knowledge Intensive Multi-Agent Systems (KIMAS), pp. 65-71, 2005.
- M. G. Zapata, and N. Asokan, “Securing ad hoc routing protocol,” in Proceedings of the 3rd ACM Workshop on Wireless Security, pp. 1-10, 2002.
- Y. L. Sun, Z. Han, W. Yu, and K. J. R. Liu, “A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks,” IEEE INFOCOM, 2006.
- S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc network,” in Proceedings of the 6th Annual conference on Mobile Computing and Networking, pp. 255-265, 2000.
- Z. Liu, A. W. Joy, and R. A. Thompson, “A dynamic trust model for mobile ad hoc networks,” in Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS), pp. 80-85, 2004.
- L. Eschenuer, V. D. Gligor, and J. Baras, “On trust establishment in mobile ad-hoc networks,” Security Protocols: 10th International Workshop, pp. 47-62, 2002.
- Z. Yan, P. Zhang, and T. Virtanen, “Trust evaluation based security solution in ad hoc networks,” 2011.
- A. A. Pirzada, and C. McDonald, “Trusted route discovery with TORA protocol,” in Proceedings of the Second Annual Conference on Communication Networks and Services Research (CNSR’04), IEEE, 2004.
- A. Sharma, and N. Kumar, “Trust based theoretical framework for mobile ad-hoc networks,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 6, pp. 905-909, 2013.
- Y. Wang, and V. Varadharajan, “Trust2: Developing trust in peer-to-peer environments,” in Proceedings of the IEEE International Conference on Services Computing,” IEEE, vol. 1, pp. 24-31, 2005. DOI: 10.1109/SCC.2005.104
- M. S. Khan, M. I. Khan, S.-U.-R. Malik, O. Khalid, M. Azim, and N. Javaid, “MATF: A multi-attribute trust framework for MANETs,” EURASIP Journal on Wireless Communications and Networking, vol. 2016, no. 1, p. 1, 2016.
- S. Saxena, G. Sanyal, S. Srivastava, and R. Amin, “Preventing from cross-VM side-channel attack using new replacement method,” Wireless Personal Communications, vol. 97, no. 3, pp. 4827-4854, 2017. DOI: 10.1007/s11277-017-4753-7
- Z. Yan, P. Zhang, and T. Virtanen, “Trust evaluation based security solution in ad hoc networks,” in Proceedings of the Seventh Nordic Workshop on Secure IT Systems 2003, Norway, 2003.