Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Mahalakshmi, R.
- Batocera rufomaculata (Coleoptera: Cerambycidae), a New Insect Record on Casuarina equisetifolia L. in India
Abstract Views :479 |
PDF Views:0
Authors
Source
Indian Forester, Vol 127, No 6 (2001), Pagination: 723-724Abstract
No abstract- The Design and Development of Courseware for MCA Students through LMS
Abstract Views :409 |
PDF Views:120
Authors
Affiliations
1 Educational Media Centre, NITTTR, Chennai-600 025, IN
1 Educational Media Centre, NITTTR, Chennai-600 025, IN
Source
Indian Journal of Science and Technology, Vol 4, No 1 (2011), Pagination: 64-67Abstract
The primary objective of this paper is to unveil the specific problems noticed in the quality of the MCA students emerging out of Anna University affiliated colleges and to suggest a research work which may lead to a collective feasible solution for these problems. MCA students enter the professional PG course in computer applications after their UG degree from different arts and science disciplines with just ancillary level mathematics background. So, the course faces heterogeneous entry behaviour. Also due to the advent of more engineering and arts colleges offering MCA, students exhibit a heterogeneous behaviour in their motivation levels, communication skills, logical and reasoning aptitude and computer software skills. But the requirement is to enable them with good academic performance with scope of employability. Employability skills include communication skills, logical aptitude, programming logic, computer-software-based technical skills and so on. Learning management system (LMS) is a software through which students can access the course, enroll, attend and write formative quiz-type exams to assignments and can participate in forums to share their ideas through online. While participating in a forum or quiz or writing to a blog, students with less confidence are able to overcome their inhibition and communicate freely. This is the first step of growth in communication skills which subsequently help them to gain better technical skills. The current research proposes to design, develop and deliver a part of a computer science courseware for 'Object oriented programming with Java' through the Open source LMS Moodle. The design of courseware includes the lecture session of the course, lecture notes, corresponding formative evaluation questions like quiz and other evaluation methods like forum and assignments. Installing an LMS and making the students attend the classes through that media is a matter of hesitation in many of the Indian Universities. Though Open source LMSs like Moodle and Sakai are available and proved good, initial efforts have to be put up not only by the faculty members for content and formative evaluation tool development but also by the administration. Administration has to support the project financially, in gaining the necessary infrastructure and for the internet connectivity throughout the learning period. But, weighing the benefits and limitations of LMS, we understand that for the better future of the students in the national and international level, in the long run LMS-based education will serve the best. A research project to justify the advantages and disadvantages quantifying the various aspects is planned. This paper also suggests that if at least one of the pre-final semester papers is offered through an open-source LMS, the students, institution and the nation will be benefitted.Keywords
MCA(Master of Computer Applications), LMS (Learning Management Systems), UG (Undergraduate)References
- Cole J and Foster H (2009) Using Moodle–Teaching with the popular open source course management system. 2nd edn. O’Reilly community press. pp:95-122.
- Ebardo RA and Valderama AMC (2009) The 6th Int. Conf. on e-learning for knowledge-based society. Thailand. pp:17-18
- Govind Raj P and Gupta PR (2009) Development of collaborative learning environment using LMS. Proc. of ASCNT–2009, CDAC, Noida, India. pp:133–140.
- Karlovcec N (2005) Computer science education:Differences between e-learning and classical approach, en e-learn 2005. Vancouver, BC Canada, 21(3), 229-243.
- Martin F (2008) Blackboard as the learning management system of a computer literacy course. MERLOT J. Online Learning Teaching. 4(2), 138–145.
- The Leaf-Feeding Geometrid Isturgia disputaria (Guenee)-A Potential Biological Control Agent for Prickly acacia, Vachellia nilotica subsp. indica (Benth.) Kyal. & Boatwr. (Mimosaceae) in Australia
Abstract Views :227 |
PDF Views:120
Authors
Affiliations
1 Institute of Forest Genetics and Tree Breeding, Coimbatore, Tamil Nadu, 641002, IN
2 Ecosciences Precinct, Biosecurity Queensland, Department of Agriculture, Fisheries & Forestry, 41 Boggo Road, Dutton Park, Qld 4001, AU
1 Institute of Forest Genetics and Tree Breeding, Coimbatore, Tamil Nadu, 641002, IN
2 Ecosciences Precinct, Biosecurity Queensland, Department of Agriculture, Fisheries & Forestry, 41 Boggo Road, Dutton Park, Qld 4001, AU
Source
Journal of Biological Control, Vol 28, No 2 (2014), Pagination: 81–86Abstract
Prickly acacia (Vachellia nilotica subsp. indica), a native multipurpose tree in India, is a weed of National significance, and a target for biological control in Australia. Based on plant genetic and climatic similarities, native range surveys for identifying potential biological control agents for prickly acacia were conducted in India during 2008-2011. In the survey leaf-feeding geometrid, Isturgia disputaria Guenee (syn. Tephrina pulinda), widespread in Tamil Nadu and Karnataka States, was prioritized as a potential biological control agent based on field host range, damage potential and no choice test on non target plant species. Though the field host range study exhibited that V. nilotica ssp. indica and V. nilotica ssp. tomentosa were the primary hosts for successful development of the insect, I. disputaria, replicated no - choice larval feeding and development tests conducted on cut foliage and live plants of nine non-target acacia test plant species in India revealed the larval feeding and development on three of the nine non-target acacia species, V. tortilis, V. planiferons and V. leucophloea in addition to the V. nilotica ssp. indica and V. nilotica ssp. tomentosa. However, the proportion of larvae developing into adults was higher on V. nilotica subsp. indica and V. nilotica subsp. tomentosa, with 90% and 80% of the larvae completing development, respectively. In contrast, the larval mortality was higher on V. tortilis (70%), V. leucophloea (90%) and V. planiferons (70%). The no-choice test results support the earlier host specificity test results of I. disputaria from Pakistan, Kenya and under quarantine in Australia. Contrasting results between field host range and host use pattern under no-choice conditions are discussed.Keywords
Prickly Acacia, Acacia nilotica, Native Range Survey, Biological Control, India.References
- Dhileepan K, Balu A, Ahmed SI, Singh S, Srivastava KK, Senthilkumar M, Murugesan S, Senthilkumar P, Gorain M, Sharma A, Sharma N, Mahalashmi R, Shivas R. 2010. New biocontrol opportunities for prickly acacia: exploration in India. pp 231-234. In: Zydembos, S.M. (Eds.). Proceedings of the 17th Australasian Weeds Conference, September 2010, New Zealand. Dhileepan K, Senaratne KADW, Raghu S. 2006. A systematic approach to biological control agent exploration and prioritisation for prickly acacia (Acacia nilotica ssp. indica). Australian J Entomol. 45(4): 303-307.
- Jeffrey PL. 1995. Prickly acacia. pp 3-9 In: N. March (Ed) Exotic woody weeds and their control in North West Queensland. Department of Lands, Queensland, Australia. Kriticos D, Brown J, Maywald GF. 2003a. SPAnDX: a process-based population dynamics model to explore management and climatic change impacts on an invasive alien plant, Acacia nilotica. Ecol Modeling 163: 187-208.
- Kriticos D, Sutherst RW, Brown JR, Adkins SW, Maywald GF. 2003b. Climatic change and the potential distribution of an invasive alien plant: Acacia nilotica ssp. indica. Australia. J Appl Ecol. 40: 111-124.
- Kunjithapatham Dhileepan, Ayyapillai Balu, Selvaraj Murugesan, Ponnusamy Senthilkumar, Roger G. Shivas. 2013. Survey and prioritisation of potential biological control agents for prickly acacia (Acacia nilotica subsp. indica) in southern India, Biocontrol Sci Technol. 23(6): 646-664
- Lockett CJ, Palmer WA. 2003. Rearing and release of Homichloda barkeri (Jacoby) (Coleoptera: Chrysomelidae: Alticinae) for the biological control of prickly acacia, Acacia nilotica ssp. indica (Mimosaceae) in Australia. Aust J Entomol. 42: 287-293.
- Lockett CJ, Palmer WA. 2005. Biological control of prickly acacia (Acacia nilotica ssp. indica (Benth.) Brenan): early signs of establishment of an introduced agent. pp 379. In: Sindel, B.M. and Johnson, S.B. (Eds). Proc Fourteenth Australian Weeds Conference. Weed Society of New South Wales, Sydney, Australia.
- Mackey AP. 1997. The biology of Australian weeds. 29. Acacia nilotica ssp. indica (Benth.) Brenan. Pl Prot Qtrly 12: 7-17.
- Marohasy J. 1992. Biocontrol of Acacia nilotica using insects from Kenya. Final report to Australian Wool Corporation. Alan Fletcher Research Station, Queensland Department of Lands, Brisbane, Queensland, Australia.
- Marohasy J. 1995. Prospects for the biological control of prickly acacia, Acacia nilotica (L.) Willd. ex Del. (Mimosaceae) in Australia. Pl Prot Qtrly 10: 24-31.
- Mohyuddin AI. 1981. Phytophages associated with Acacia nilotica in Pakistan and possibilities of their introduction into Australia. pp. 161-166. In: E.S. Del Fosse (Eds.). Fifth International Symposium on Biological Control of Weeds, CSIRO.
- Mohyuddin AI. 1986. Investigations on the natural enemies of Acacia nilotica in Pakistan. Final Report. Rawalpindi, Pakistan: Commonwealth Institute of Biological Control, 116 pp.
- Palmer WA. 1996. Biological control of prickly acacia in Australia. pp. 239-242. In: R.C.H. Shepherd (Ed) Proceedings of the eleventh Australian weeds conference. Weed Society of Victoria, Melbourne, Australia.
- Palmer WA. 2003. Risk analyses of recent cases of non-target attack by potential biocontrol agents in Queensland. pp. 305-309 In: Proceedings of the XI International symposium on biological control of weeds.
- Parsons WT, Cuthbertson EG. 2001. Noxious Weeds of Australia, 2nd edn. CSIRO Publishing, Melbourne, Australia.
- Senaratne KADW, Palmer WA, Sutherst RW. 2006. Use of CLIMEX modeling to identify prospective areas for exploration to find new biological control agents for prickly acacia. Aust J Entomol. 45: 298-302.
- Spies P, March N. 2004. Prickly Acacia: National Case Studies Manual. Natural Heritage Trust and Department of Natural Resources and Mines, Queensland, Australia.
- Stals R. 1997. A survey of phytophagous organisms associated with Acacia nilotica in South Africa. Final report to the Queensland Department of Natural Resources. ARC-Plant Protection Research Institute, Pretoria, South Africa.
- Thorp JR, Lynch R. 2000. The determination of weeds of national significance. National Weeds Strategy Executive Committee, Launceston, Australia.
- Wardill TJ, Graham GC, Playford J, Zalucki M, Palmer WA, Scott KD. 2005. The importance of species identity in the biocontrol process: identifying the subspecies of Acacia nilotica (Leguminosae: Mimosoideae) by genetic distance and the implications for biological control. J Biogeography 32: 2145-2159.
- Willson BW. 1985. The biological control of Acacia nilotica indica in Australia. pp 849-883. In. Delfosse (Ed). Proc VI Int Symp Biological Control of Weeds, Vancouver, Canada, August, 19-25, 1984. Canada Agriculture, Vancouver, Canada.
- Maximizing the Lifetime of a Barrier of Wireless Sensors
Abstract Views :144 |
PDF Views:3
Authors
Source
Digital Signal Processing, Vol 5, No 8 (2013), Pagination: 288-298Abstract
To make a network last beyond the lifetime of an individual sensor, redundant sensors must be deployed. What sleep-wakeup schedule can then be used for individual sensors so that the redundancy is appropriately exploited to maximize the network lifetime? We develop optimal solutions to both problems for the case when wireless sensors are deployed to form an impenetrable barrier for detecting movements. In addition to being provably optimal, our algorithms work for non-disk sensing regions and heterogeneous sensing regions. Further, we provide an optimal solution for the more difficult case when the lifetimes of individual sensors are not equal. Developing optimal algorithms for both homogeneous and heterogeneous lifetimes allows us to obtain by simulation several interesting results. We show that even when an optimal number of sensors have been deployed randomly, statistical redundancy can be exploited to extend the network lifetime by up to seven times. We also use simulation to show that the assumption of homogeneous lifetime can result in severe loss (two-thirds) of the network lifetime. Although these results are specifically for barrier coverage, they provide an indication of behavior for other coverage models.Keywords
Wireless Sensor Networks, Sleep-Wakeup, Sensor Deployment, Barrier Coverage, Multi-Route Network Flows.- Implementation of Grid Connected PV array using Quadratic DC-DC Converter and Single Phase Multi Level Inverter
Abstract Views :145 |
PDF Views:0
Authors
Affiliations
1 Department of Electrical and Electronics Engineering, Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Bengaluru - 76, Karnataka, IN
2 Department of Electrical and Electronics Engineering, Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Ettimadai, Coimbatore – 641112, Tamil Nadu, IN
1 Department of Electrical and Electronics Engineering, Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Bengaluru - 76, Karnataka, IN
2 Department of Electrical and Electronics Engineering, Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Ettimadai, Coimbatore – 641112, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 35 (2015), Pagination:Abstract
Electrical energy generation from solar and wind is increasing day by day and the extraction of good quality electrical energy effectively as well as efficiently is really challenging. This paper focuses on the extraction of electrical energy from solar cells and interconnecting it to the single phase grid through a Quadratic Buck-Boost Converter (QBBC) and Multi Level Inverter (MLI). MLI uses three DC sources, one of which is derived from the solar array through QBBC with Maximum Power Point Tracking (MPPT) controller. In this paper, a new converter topology which accepts wide variations in input voltage has been designed to produce minimum distortion in MLI output with reduced number of switches. The proposed system is designed and implemented in the laboratory and the output is analyzed in different operating conditionsKeywords
Grid Connected PV Array, DC-DC Converter, Multi Level Inverter, MPPT Controller, Quadratic Buck Boost Converter- Comparison of Software Requirements Tools
Abstract Views :248 |
PDF Views:7
Authors
R. Mahalakshmi
1,
R. Saranya
1
Affiliations
1 VIT University, Vellore, IN
1 VIT University, Vellore, IN
Source
Research Journal of Science and Technology, Vol 9, No 2 (2017), Pagination: 272-276Abstract
Requirements management is a critical and essential phase for the delivery of the product to be successful. The requirements can be called as user needs or desired feature for a product. So, only with well defined requirements, the products can achieve success. To collect well defined requirements and to manage the specified requirements we make use of requirements management tools. The objective of this paper is to present the comparative study on different requirements tools that are available and to determine the most essential tool.References
- Muhammad Shahid, Suhaimi Ibrahim, and Mohd Naz’ri Mahrin ,“ An Evaluation of Requirements Management and Traceability Tools”, World Academy of Science, Engineering and Technology International Journal of Computer, Electrical, Automation, Control and Information Engineering Vol:5, No:6, 2011
- Karl E. Wiegers, “Automating Requirements Management” , Process Impact.
- Rajat R. Sud and James D. Arthur in “Requirements Management Tools A Qualitative Assessment”, Department of Computer Science, Virginia Tech Blacksburg, VA 24060 USA
- Daniyal M Alghazzawi, Sham Tabrez Siddiqui, Mohammad Ubaidullah Bokhari, Hatem S Abu Hamatta, “Selecting Appropriate Requirements Management Tool for Developing Secure Enterprises Software”, I.J. Information Technology and Computer Science, 2014, 04, 49-55 Published Online March 2014 in MECS (http://www.mecspress.org/)DOI:10.5815/ijitcs.2014.04. 6
- Juan M. Carrillo de Gea , Joaquín Nicolás , José L. Fernández Alemán , Ambrosio Toval, Christof Ebert, Aurora Vizcaíno, “Requirements engineering tools: Capabilities, survey and assessment”, in press.
- Anthony Finkelstein & Wolfgang Emmerich, “The Future of Requirements Management Tools”, Information Systems in PublicAdministration and Law, Oesterreichische Computer Gesellschaft, 2000.
- Tony Cant, Jim McCarthy and Robyn Stanley,” Tools for Requirements Management: a Comparison of Telelogic DOORS and the HIVE”, Information Networks Division. Defence Science and Technology Organisation.
- Matthias Heindl, Franz Reinisch, Stefan Biffl, Alex Egyed,”Value-BasedSelectionofRequirementsengineeringtoolSupport”.
- Juan M. Carrillo de Gea, Joaquín Nicolás, José L. Fernández Alemán, Ambrosio Toval, Christof Ebert, Aurora Vizcaíno.
- Mohammad Ubaidullah Bokhari, Shams Tabrez Siddiqui,” TSSR: A Proposed Tool for Secure Software Requirement Management”.
- Matthias Hoffmann, Nikolaus Kühn, Margot Bittner” Requirements for Requirements Management Tools”.
- Browning, J. and Adams, R. (2014) Doorstop: Text-Based Requirements Management Using Version Control. Journal of Software Engineering and Applications.
- Prediction of Diabetes Using Data Mining Techniques
Abstract Views :162 |
PDF Views:3
Authors
Affiliations
1 Department of Software Engineering, School of Information Technology and Engineering, VIT University, Vellore, IN
1 Department of Software Engineering, School of Information Technology and Engineering, VIT University, Vellore, IN
Source
Research Journal of Pharmacy and Technology, Vol 10, No 4 (2017), Pagination: 1098-1104Abstract
Diabetes mellitus is one of the world's major diseases. Millions of people are affected by the disease. The risk of diabetes is increasing day by day and is found mostly in women than men. The diagnosis of diabetes is a tedious process. So with improvement in science and technology it is made easy to predict the disease. The purpose is to diagnose whether the person is affected by diabetes or not using K Nearest Neighbor classification technique. The diabetes dataset is a taken as the training data and the details of the patient are taken as testing data. The training data are classified by using the KNN classifier and secondly the target data is predicted. KNN algorithm used here would be more efficient for both classification and prediction. The results are analyzed with different values for the parameter k.Keywords
Data Mining Techniques, K Nearest Neighbor, Prediction of Diabetes, Classification, UCI Repository.- Sentimental Analysis for Social Media–A Review
Abstract Views :175 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Engineering, NPA Polytechnic College, Kotagiri- 643217, IN
2 Department of Computer Science, Government Arts College, Udumalpet-642126, IN
1 Department of Computer Engineering, NPA Polytechnic College, Kotagiri- 643217, IN
2 Department of Computer Science, Government Arts College, Udumalpet-642126, IN
Source
International Journal of Advanced Networking and Applications, Vol 10, No 3 (2018), Pagination: 3860-3863Abstract
In recent times, Social media has emerged as a personal communication media, as well as, a media to convey reviews about items and benefits or even political and general occasions among its clients. By using web and the web 2.0 the information in Twitter, Facebook and Instagram are easily retrieved. Because of its use across the board and prevalence, there is a monstrous measure of client surveys or feelings delivered and shared day by day. Mining client sentiments from Social Media is definitely not a straight forward assignment; it can be proficient in various ways. Gathering client sentiments can be costly and tedious assignment utilizing traditional strategies. This paper examines the challenges in doing sentimental analysis for Social Media.Keywords
Data Mining, Internet, Social Media, Sentimental Analysis, Opinion Mining.References
- Pang, Bo, and Lillian Lee. "Opinion mining and sentiment analysis”. Foundations and Trends® in Information Retrieval, 2(1–2), 2008, 1-135.
- Das, Sanjiv, and Mike Chen. "Yahoo! for Amazon: Extracting market sentiment from stock message boards." Proc. of the Asia Pacific Finance Association Annual Conf. (APFA). 35, 2001,43.
- Tong, Richard M. "An operational system for detecting and tracking opinions in on-line discussion." In Working Notes of the ACM SIGIR 2001 Workshop on Operational Text Classification, 1(6), 2001.
- Kaplan, A.M. and Haenlein, M., “Users of the world, unite! The challenges and opportunities of Social Media”. Business Horizons, 53(1), 2010, 59-68.
- Kaschesky, M., Sobkowicz, P. and Bouchard, G.,. “Opinion mining in social media: modeling, simulating, and visualizing political opinion formation in the web”, Proc. 12st Annual Int. Digital Government Research Conf.: Digital Government Innovation in Challenging Times, 2011, 317-326.
- Chaovalit, P. and Zhou, L. “Movie review mining: A comparison between supervised and unsupervised classification approaches”, Proc. 38st Annual Hawaii International Conference on System Sciences (HICSS'05), 2005, 112c-112c.
- Kearns, Michael, Siddharth Suri, and Nick Montfort. "An experimental study of the coloring problem on human subject networks." Science, 313(5788), 2006, 824-827.
- Kleinberg, Jon. "Complex networks and decentralized search algorithms." Proc. Int. Congress of Mathematicians (ICM), 3, 2006, 1019-1044.
- Liben‐Nowell, David, and Jon Kleinberg. "The link‐prediction problem for social networks." Journal of the American society for information science and technology, 58(7),2007, 1019-1031.
- Koppel, M., and Schler, J. “The importance of neutral examples for learning sentiment”. Computational Intelligence, 22(2), 2006,100-109.
- Qu, Yan. "Exploring attitude and affect in text: Theories and applications." AAAI Spring Symposium, 2004.
- Pang, Bo, and Lillian Lee. "Using very simple statistics for review search: An exploration." Coling 2008: Companion volume: Posters ,2008, 75-78.
- Pang, B. and Lee, L. “Seeing stars: Exploiting class relationships for sentiment categorization with respect to rating scales”. Proc. 43rd Annual meeting on association for computational linguistics, 2005,115-124.
- Godbole, Namrata, Manja Srinivasaiah, and Steven Skiena. "Large-Scale Sentiment Analysis for News and Blogs.", Icwsm, 7(21), 2007, 219-222.
- Cortizo J, Carrero F, Gomez J, Monsalve B, Puertas E. “Introduction to Mining SM”. Proc. 1st Int. Workshop on Mining SM, 2009, 1-3.