- J. N. Sharma
- Amit Kamra
- Vijay Dhir
- Manjit Singh
- Butta Singh
- Reecha Sharma
- Sumit Mittal
- Kiranpreet Kaur
- Manpreet Kaur
- Neetin Raja
- Nisha
- Richika Massey
- Teena Jacob
- Anupam Mittal
- Ruchi Aggarwal
- Meena Kumari Bimal
- Ravneet Kaur
- Rupali
- Sonia Sharma
- Anita
- Abhilasha
- Monika Bansal
- Balbir Kaur
- Navroz Kaur
- Madan Lal
- Gaurav Gupta
- I. J. Gulati
- Dinesh Kumar
- Pramendra Singh
- S. R. Yadav
- Anirudh Choudhary
- Brij Singh Meena
- Charanjeet Kaur
- Nitin Arora
- Sumanpreet Kaur
- Himanshu Aggarwal
- Hiteshwari Sabrol
- Vikram Gupta
- Sandeep Kumar
- Bikash Kumar Ram
- Ruchika S. Tanton
- Research Journal of Science and Technology
- Biometrics and Bioinformatics
- Digital Image Processing
- Research Cell: An International Journal of Engineering Sciences
- International Journal of Computer Networks and Applications
- International Journal of Nursing Education and Research
- Indian Journal of Science and Technology
- International Journal of Advances in Nursing Management
- Asian Journal of Research in Chemistry
- An Asian Journal of Soil Science
- International Journal of Agricultural Sciences
- Indian Journal of Industrial Relations: Economics & Social Dev.
- Current Science
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kaur, Ramandeep
- Deflection in Micro-Scale Thermoelastic Simply-Supported Beams Due to Patch Loading
Authors
1 Department of Mathematics, National Institute of Technology, Hamirpur (HP) 177005, IN
Source
Research Journal of Science and Technology, Vol 5, No 1 (2013), Pagination: 153-159Abstract
In this paper, an analytical model is developed and investigated for the transverse deflection in a transversely isotropic, thermoelastic simply-supported beam resonator subjected to time harmonic patch loading. Closed form expressions based on Euler–Bernoulli beam theory are derived for the flexural vibrations in a transversely isotropic, thermoelastic micro-beam. A time harmonic patch load is assumed to act within the region of the beam. The Laplace transform technique has been used to find the transverse deflection in the transform domain due to patch loading on the beam. The deflection so obtained in a physical domain has been computed numerically with the help of MATLAB software and presented graphically for silicon material beams.Keywords
Anisotropy, MEMS, Beam Resonators, Euler-Bernoulli Equation, Laplace Transforms.References
- G. Stemme, Resonant Silicon Sensors, J. Micromech. Microeng. Vol.1, p.113-125, (1991).
- H.A.C. Tilmans, M.Elwebspoek, J.H.J. Fluitman, Micro resonant force gauges, Sensors and Actuators: A, Vol.30, p.35-53, 1992.
- S.P.Beeby, M.J.Tudor, Modelling and optimization of micromachined silicon resonators, J. Micromech. Microeng., Vol.5, p.103-105, 1995.
- C. Zener, Internal friction in Solids. I. Theory of internal friction in reeds, Phys. Rev.,Vol.52, p. 230-235, 1937.
- R. Lifshitz, M.L. Roukes, Thermoelastic damping in micro- and nanomechanical systems, Phys. Rev. B, Vol.61, p. 5600-5609, 2000.
- Y. Sun, D. Fang, A.K. Soh, Thermoelastic damping in micro-beam resonators, Int. J. Solids Struct., Vol.43, p. 3213-3229, 2006.
- J. N. Sharma, Thermoelastic damping and frequency shift in micro/ nanoscale anisotropic beams, J. Thermal Stresses, Vol. 34, p.1-17, 2011.
- Marius Pustan, Stephane Paquay, Veronique Rochus, Jean- Claude Golinval, Modelling and finite element analysis of mechanical behavior of flexible MEMS components, Proc.of DTIP2010, Seville,Spain, 5-7 May,2010.
- J N Sharma and Ramandeep Kaur, Flexural vibrations in microscale thermoelastic cantilever beams due to concentrated loads, Pro. of 3rd Asian Conference on Mechanics of Functional Materials and Structures (ACMFMS- 2012), New Delhi, p. 648- 651, 5-8 Dec.2012.
- H.W. Lord, Y. Shulman, A generalised dynamical theory of Thermoelasticity, J. Mech.Phys. Solids, Vol. 15, p. 299-309, 1967.
- R.S. Dhaliwal and A. Singh, Dynamic Coupled Thermoelasticity, Hindustan Publishing Corporation, New Delhi, India, 1980.
- S.S. Rao, Vibrations of Continuous Systems, John Wiley and Sons, 2007.
- M.H. Bao, Analysis and Design Principles of MEMS Devices, Elsevier, New York, 2005.
- A Novel Method for Fingerprint Feature Extraction
Authors
1 RBIEBT, Sahuran, Punjab, IN
2 GNE, Ludhiana, IN
3 Sant Baba Bhag Singh, Hoshiarpur, IN
Source
Biometrics and Bioinformatics, Vol 2, No 5 (2010), Pagination: 94-98Abstract
Fingerprint recognition is a method of biometric authentication that uses pattern recognition techniques[1] based on high-resolution fingerprints images of the individual. Fingerprints have been used in forensic as well as commercial applications for identification as well as verification. The fingerprint surface is made up of a system of ridges and valleys. The steps for Fingerprint recognition include image acquisition, preprocessing, feature extraction and matching[2]. In the present work, a new fingerprint feature detection algorithm has been proposed. It has been found that presence of noise in fingerprint images leads to spurious minutiae. To overcome this problem, feature extraction has been done which efficiently determine the minutiae points in fingerprint [1]. The proposed method can be used in matching the template for finding bifurcation and termination. The new smoothing algorithm is proposed for the detection of the features of fingerprints. A method has been introduced for finding ridges in the fingerprint image with the help of eight different masks. It is a process of making a binary image of ridges from the grayscale fingerprint image. The experimental results showed the accuracy of the algorithm in terms of genuine acceptance rate, false rejection rate, false acceptance rate.Keywords
Bifurcation, Orientation Field, Ridges Segmentation and Smoothing, Termination.- Maintenance of High FOM by Varying Threshold in Color Edge Detection
Authors
Source
Digital Image Processing, Vol 8, No 6 (2016), Pagination: 187-192Abstract
The process of edge detection plays a significant role in image processing and vision processing. True edge detection is very difficult to achieve because intensity varies sharply and has discontinuities. Many methods have been developed by researchers in last few years. After studying the literature on color edge detection, we figured out that advanced algorithm using fuzzy logics have attained high figure of merit (FOM) value of 1with small threshold values but as the value grows higher the FOM value reduces. In this paper an algorithm has been proposed in order to achieve high figure of merit by varying threshold in color edge detection. In this algorithm, there is an improvement over previously proposed edge detection using fusion of hue-difference and PCA image. The results are promising.
Keywords
Edge Detection, Fusion of PCA, Image Processing, Computer Vision.- Comparative Analysis of Color Edge Detection Techniques Based on Fuzzy Logic
Authors
1 Electronics and Communication Engineering Department, Guru Nanak Dev. University Regional Campus, Jalandhar, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 17, No 1 (2016), Pagination: 119-126Abstract
Edge is the important feature of image. The image edges contain rich knowledge which is very important for finding characteristic of image by object recognition. It is the commonly used technique in image processing.This paper shows a fuzzy rule based algorithm that is capable of finding edges effectively from grey scale images. This paper presents that kind of operators in computer vision applications. The gradient and standard deviation is used as input for fuzzy system. The algorithm in which fusion of hue component and principal component are implemented and then the results are compared with modified fuzzy based algorithm.Keywords
Edge Detection, Image Processing, Defuzzification, Fuzzy Logic.- An Analysis of RTS/CTS Mechanism for Data Transfer In Wireless Network: A Review
Authors
1 Deptt. of Electronics and Communication Engineering, Punjabi University, Patiala, Punjab, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 17, No 1 (2016), Pagination: 569-572Abstract
In a wireless network, there is a large number of mobile nodes that share the communication medium. The wireless network employs carrier sense based MAC algorithms such as Carrier Sensing Multiple Access (CSMA) and CSMA with Collision Avoidance (CSMA/CA) for efficient sharing of communication channel. But this method does not solve the problem of hidden nodes. Hidden nodes are those nodes that are out of range of other nodes or a group of nodes. The network throughput reduces because of packet collisions caused by these hidden nodes. To solve hidden node problem, the Request-To-Send (RTS) and Clear-To-Send (CTS) mechanism is widely used in wireless networks for reserving the channel to transmit data from source to destination. This paper is aimed to provide a survey on methodology and various algorithms and methods of implementing RTS/CTS mechanism in wireless networks.Keywords
RTS/CTS, Collision, Wireless Network, Hidden Nodes, Delay.- A Secure and Reliable Handoff Authentication Protocol with Batch Verification for Internet of Things Environment
Authors
1 M.M. Institute of Computer Technology and Business Management, Maharishi Markandeshwar (Deemed to be University) Mullana, Ambala, Haryana, IN
Source
International Journal of Computer Networks and Applications, Vol 8, No 5 (2021), Pagination: 477-489Abstract
Internet is no longer a mere source of information as the concept of interconnectivity has expanded to connect real things or objects like every kind of machines, cars, homes, hospitals, even our bodies through wearable devices. The concept of interconnectivity of billions of objects (mobile or stationary) providing and exchanging real time data is called Internet of Things (IoT). Myriad IoT applications are touching every aspect of our lives and have the latent to develop the basic quality of life for masses. However, prerequisite for successful implementation of any IoT application is uninterrupted and high-quality network connectivity and handling of huge amounts of personal and sensitive user data which gives rise to the questions of security. A handoff authentication protocol with high security and efficiency is required for enabling secure and seamless handoff of mobile nodes between different access points (AP). However, there are number of challenges in designing a secure handoff protocol for IoT systems like limited power of mobile nodes, computational capability, security and vulnerability of open IoT networks. In this paper, we propose a secure and reliable handoff authentication protocol for such IoT devices. Compared with other well-known similar handoff protocols, the protocol proposed here satisfies all relevant security requirements of handoff such as batch verification, mobile node un-traceability, and anonymity and is unaffected by other attacks like replay attacks and also provides mutual authentication. To demonstrate the security strength (against replay attacks) of our protocol, simulation has been done using AVISPA. Thus, protocol proposed by us is more appropriate for IoT environment compared to the alike protocols.Keywords
Batch Verification, Authentication, Security, Reliability, Handoff, IoT, AVISPA.References
- Kevin Asthon, “That ’ Internet of Things ’ Thing,” RFID Journal, p. 4986, 2010.
- Y. Ibrar and Ahmed Ejaz et al, “Internet of Things Architecture : Recent Advances , Taxonomy , Requirements , and Open Challenges,” IEEE Wireless Communication, no. June, pp. 10–16, 2017.
- R. Kaur and S. Mittal, “Enhanced Handoff Decision Making for Application-Aware Environment by Using Blended Approach,” International Journal of Intelligent Engneering Systems, vol. 14, no. 1, pp. 433–443, 2020.
- A. Tewari and B. B. Gupta, “Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework,” Future Generation Computer Systems, vol. 108, pp. 909–920, 2020.
- S. M. R. Islam, D. Kwak, M. H. Kabir, M. Hossain, and K. S. Kwak, “The internet of things for health care: A comprehensive survey,” IEEE Access, vol. 3, pp. 678–708, 2015.
- S. R. Moosavi et al., “SEA: A secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways,” Procedia Computer Science, vol. 52, no. 1, pp. 452–459, 2015.
- J. L. Hou and K. H. Yeh, “Novel Authentication Schemes for IoT Based Healthcare Systems,” Int. J. Distrib. Sens. Networks, vol. 2015, no. ii, 2015.
- P. K. Dhillon and S. Kalra, “A secure multi-factor ECC based authentication scheme for Cloud-IoT based healthcare services,” Journal of Ambient Intelligent Smart Environment, vol. 11, pp. 149–164, 2019.
- S. A. Medaglia, Carlo Maria, “An Overview of Privacy and Security Issues in the Internet of Things,” Giusto D., Iera A., Morabito G., Atzori L. Internet Things. Springer, New York, NY, pp. 367–373, 2010.
- G. M. Køien, “Reflections on trust in devices: An informal survey of human trust in an Internet-of-Things context,” Wireless Personal Communications, vol. 61, no. 3, pp. 495–510, 2011.
- J. Liu, Y. Xiao, and C. L. P. Chen, “Authentication and access control in the Internet of things,” Proc. - 32nd IEEE International Conference on Distributed Computing Systems Workshops ICDCSW 2012, pp. 588–592, 2012.
- R. Roman, J. Zhou, and J. Lopez, “On the features and challenges of security and privacy in distributed internet of things,” Computer Networks, vol. 57, no. 10, pp. 2266–2279, 2013.
- Z. K. Zhang, M. C. Y. Cho, C. W. Wang, C. W. Hsu, C. K. Chen, and S. Shieh, “IoT security: Ongoing challenges and research opportunities,” Proc. - IEEE 7th International Conference on service-oriented computing and applications SOCA 2014, pp. 230–234, 2014.
- F. L. Ţiplea, “A lightweight authentication protocol for RFID,” International Conference on Cryptography and Security Systems, pp. 110-121. Springer, Berlin, Heidelberg, 2014.
- P. Porambage, C. Schmitt, P. Kumar, A. Gurtov, and M. Ylianttila, “PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications,” International Journal of Distributed Sensor Networks, vol. 2014, 2014.
- S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, “Security, privacy and trust in Internet of things: The road ahead,” Computer Networks, vol. 76, pp. 146–164, 2015.
- S. A. Kumar, T. Vealey, and H. Srivastava, “Security in internet of things: Challenges, solutions and future directions,” Proceedings Annual Hawaii International Conference on System Sciences, vol. 2016-March, pp. 5772–5781, 2016.
- P. K. Dhillon and S. Kalra, “Secure multi-factor remote user authentication scheme for Internet of Things environments,” International Journal of Communication Systems, vol. 30, no. 16, pp. 1–20, 2017.
- M. Ammar, G. Russello, and B. Crispo, “Internet of Things: A survey on the security of IoT frameworks,” Journal of Information Security and Applications, vol. 38, pp. 8–27, 2018.
- A. Luntovskyy and L. Globa, “Performance, Reliability and Scalability for IoT,” Proceedings International Conference on Information and Digital Technologies 2019, IDT 2019, pp. 316–321, 2019.
- S. Behrad, E. Bertin, S. Tuffin, and N. Crespi, “A new scalable authentication and access control mechanism for 5G-based IoT,” Future Generation Computer Systems, vol. 108, pp. 46–61, 2020.
- D. He, C. Chen, S. Chan, and J. Bu, “Secure and efficient handover authentication based on bilinear pairing functions,” IEEE Transactions on Wireless Communications, vol. 11, no. 1, pp. 48–53, 2012.
- D. He, C. Chen, S. Chan, and J. Bu, “Analysis and improvement of a secure and efficient handover authentication for wireless networks,” IEEE Communications Letters, vol. 16, no. 8, pp. 1270–1273, 2012.
- J. L. Tsai, N. W. Lo, and T. C. Wu, “Secure handover authentication protocol based on bilinear pairings,” Wireless Personal Communications, vol. 73, no. 3, pp. 1037–1047, 2013.
- D. He, J. Bu, S. Chan, and C. Chen, “Handauth: Efficient handover authentication with conditional privacy for wireless networks,” IEEE Transactions on Computers, vol. 62, no. 3, pp. 616–622, 2013.
- G. Li, Q. Jiang, F. Wei, and C. Ma, “A New Privacy-Aware Handover Authentication Scheme for Wireless Networks,” Wireless Personal Communications, vol. 80, no. 2, pp. 581–589, 2014.
- W. Wang and L. Hu, “A secure and effcient handover authentication protocol for wireless networks,” Sensors (Switzerland), vol. 14, no. 7, pp. 11379–11394, 2014.
- S. A. Chaudhry, M. S. Farash, H. Naqvi, S. H. Islam, and T. Shon, “A Robust and Efficient Privacy Aware Handover Authentication Scheme for Wireless Networks,” Wireless Personal Communications, vol. 93, no. 2, pp. 311–335, 2017.
- X. Duan and X. Wang, “Authentication handover and privacy protection in 5G hetnets using software-defined networking,” IEEE Communication Magazine, vol. 53, no. 4, pp. 28–35, 2015.
- D. He, S. Chan, and M. Guizani, “Handover authentication for mobile networks: Security and efficiency aspects,” IEEE Networks, vol. 29, no. 3, pp. 96–103, 2015.
- D. He, S. Zeadally, L. Wu, and H. Wang, “Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography,” Computer Networks, vol. 128, pp. 154–163, 2017.
- J. L. Tsai and N. W. Lo, “Provably secure anonymous authentication with batch verification for mobile roaming services,” Ad Hoc Networks, vol. 44, pp. 19–31, 2016.
- D. He, D. Wang, Q. Xie, and K. Chen, “Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation,” Science China Information Sciences, vol. 60, no. 5, pp. 1–17, 2017.
- Y. Xie, L. Wu, N. Kumar, and J. Shen, “Analysis and Improvement of a Privacy-Aware Handover Authentication Scheme for Wireless Network,” Wireless Personal Commununications, vol. 93, no. 2, pp. 523–541, 2017.
- D. Wang, L. Xu, F. Wang, and Q. Xu, “An anonymous batch handover authentication protocol for big flow wireless mesh networks,” Eurasip Journal Wireless Communication Networks, vol. 2018, no. 1, 2018.
- R. Khan, S. U. Khan, R. Zaheer, and S. Khan, “Future internet: The internet of things architecture, possible applications and key challenges,” Proceedings - 10th International Conference on frontiers of Information Technology FIT 2012, pp. 257–260, 2012.
- P. K. Dhillon and S. Kalra, “A lightweight biometrics based remote user authentication scheme for IoT services,” Journal of Information Security and Applications, vol. 34, pp. 255–270, 2017.
- A. Armando, D. Basin, Y. Boichut, Y. Chevalier, and L. Compagna, “The AVISPA Tool for the Automated Validation,” Computer Aided Verification, vol. 3576, pp. 281–285, 2005.
- Assessment of Psychosocial Problems and Coping Strategies among Postmenopausal Women in a Selected Rural and Urban Area at Ludhiana
Authors
1 Guru Nanak College of Nursing, Gopalpur, Ludhiana, Punjab, IN
Source
International Journal of Nursing Education and Research, Vol 4, No 3 (2016), Pagination: 313-326Abstract
Background of the study:
Cessation of menstruation termed as menopause is the most striking feature during the period of transition from the reproductive to the non-reproductive stage of life. Due to hormonal changes women may experience a wide range of physical, psychological and social problems. Issues associated with their fertility and decreased reproductive functioning makes them feel less desirable in the society. Psychological symptoms cause more damage to daily life and are also most often neglected. Stress due to transition includes adjusting to the changing self, adapting to alterations in sexuality caused by hormonal shifts. Coping strategies help the women to overcome these problems and lead a normal life.
Aim: The aim of this study was to assess the psychosocial problems and coping strategies of postmenopausal women in selected communities of Ludhiana.
Objectives of the study:
The objectives of the study are;
1. To determine the level of psychosocial problems among postmenopausal women
2 To find out the coping strategies among postmenopausal women.
3. To find the association of psychosocial problems and coping strategies with the demographic variables.
Method: A descriptive survey approach was used for the study. The sample consisted of 50 postmenopausal women, selected by purposive random sampling method. Data was collected by structured interview schedule on psychosocial problems and coping strategies among postmenopausal women prepared by the investigator. The collected data was analyzed using descriptive and inferential statistics.
Results: The findings showed that 37(74%) of postmenopausal women were having moderate psychosocial problems, 13(26%) of them were having mild psychosocial problems and none of them were having severe psychosocial problems. Majority (74%) of the postmenopausal women adopted adequate coping strategies and the least (26%) of them adopted inadequate coping strategies.
The study showed that there is a significant association of the level of psychosocial problems with the selected demographic variables like educational status, monthly income, religion, most supportive person in the family and the duration of menopause. The calculated χ2 value of educational status (χ2 = 7.68), monthly income (χ2 =24.88), religion (χ2 = 8.14), the most supportive person in the family (χ2 = 13.93) and duration of menopause in years (χ2 = 12.75) were more than the table values at 0.05 level of significance. Hence null hypothesis is rejected and research hypothesis is accepted. The findings also shows that there is no significant association of the level of psychosocial problems with the selected demographic variables like age, marital status, occupation, type of family, member of any social groups, parity and age of achievement of menopause. The calculated Chi-square value for age (χ2 =3.06), marital status (χ2 =2.71), occupation (χ2 =1.33), type of family (χ2 =0.24), member of any social groups (χ2 = 0), parity (χ2 = 4.04) and age of achievement of menopause (χ2 = 1.05) were less than the table value, hence the null hypothesis is accepted.
The study showed that there was a significant association of the level of coping strategies with the selected demographic variables like age, marital status, educational status, occupation, monthly income, age of achievement of menopause and duration of menopause (in years). The calculated χ2 value of age (χ2 =11.52), marital status (χ2 = 10.52), educational status (χ2 = 8.86), occupation (χ2 = 4.63), monthly income (χ2 = 15.92), age of achievement of menopause (χ2 = 7.98) and duration of menopause in years (χ2 = 10.45) were more than the tables value at 0.05 level of significance. Hence null hypothesis is rejected and research hypothesis is accepted. The findings also shows that there is no significant association of the level of coping strategies with the selected demographic variables like religion, type of family, member of any social groups and parity. The calculated Chi-square value for religion (χ2 =3.85), type of family (χ2 = 1.27), member of any social groups (χ2 = 0) and parity (χ2 = 0.78) were less than the table value, hence the null hypothesis is accepted.
Interpretation and conclusion: The finding of the study have certain important implications for the nursing profession such as in nursing practice, nursing education, nursing research and nursing administration. This study was conducted with the objective to assess the psychosocial problems and coping strategies among postmenopausal women at Ludhiana.
Keywords
Assess, Psychosocial Problems, Coping Strategies, Postmenopausal Women.- Fire Fly Optimization Algorithm based Clustering by Preventing Residual Nodes in Mobile Wireless Sensor Networks
Authors
1 Department of Computer Science and Engineering, Chandigarh University, Gharuan - 140413, Punjab, IN
Source
Indian Journal of Science and Technology, Vol 9, No 33 (2016), Pagination:Abstract
This paper regarding the use of the natural phenomenon’s based optimization techniques to resolve the problem of nonclustered nodes. Objectives: This research minimizes energy consumption. Its objective is to provide efficient clustering for avoidance of residual nodes and prevents occurrence of dead nodes with usage of mobile nodes. Methods: In this research paper firstly deploy number of mobile nodes in specified region with usage of MATLAB environment. For grouping of these nodes LEACH protocol uses for clustering. During clustering with LEACH some nodes residual and not become part of any cluster. Firefly Optimization used for prevention of residual nodes and efficient clustering. It uses distance and light intensity parameters for clustering. GSA algorithm used for finding best path for data transmission with less energy consumption. Findings: In this research paper shows efficient clustering of nodes with prevention of residual nodes. In existing LEACH protocol some static nodes are residual and not become part of any cluster. These nodes send data directly to base station and consume large amount of energy. These individual nodes die early due to maximum energy consumption. But in this research mobile nodes are used and occurrence of dead nodes prevented on basis of distance and light intensity parameters. Nodes which are at minimum distance are brighter than farthest nodes. Minimum distance nodes join nearest cluster and prevent formation of remaining nodes. Improvements: In this paper results shown that it performs better in terms of network lifetime, energy consumption, end to end delay and throughput and number of dead nodes.Keywords
Cluster Formation, Firefly Optimization, Routing, Wireless Sensor Networks.- Factors Intend to Brain Drain among Staff Nurses
Authors
1 Community Health Nursing Department, Shaheed Kartar Singh Sarabha College of Nursing, Ludhiana (Punjab), IN
Source
International Journal of Advances in Nursing Management, Vol 4, No 4 (2016), Pagination: 327-330Abstract
A descriptive study was conducted on staff nurses of selected hospitals of Ludhiana, Punjab, to assess factors intend to brain drain among nurses. Material and Methods: Tool consisted of two parts; demographic data and rating scale to assess factors intend to brain drain among nurses which included the four factors i.e. professional factors, economical factors, personal factors and psychological factors. Pilot study was conducted to ensure the reliability and feasibility of the study. The study was conducted on 100 staff nurses of selected private hospitals of district Ludhiana, Punjab. Convenient sampling technique was used to collect data. Results: 98% of staff nurses had more contributing factors intend to brain drain whereas only 2% of staff nurses had less contributing factors intend to brain drain. The relationship of brain drain with contributing factors showed that professional factor, economical factor and personal factors were more contributing among 95% of staff nurses and less contributing among very few i.e. 5% of staff nurses while the psychological factor was more contributing to brain drain among 68% of nurses and less contributing in 32% of staff nurses. Statistically significant relationship was found in factor score with staff nurses who had previously visited abroad at p< 0.05 level of significance. Statistically significant association was found in contributing factors with having children, type of family and reason for migration. Conclusion: The study concluded that professional factors, economical factors, personal factors and psychological factors were contributing factors intend to brain drain among staff nurses. Therefore, it is recommended that government need to demonstrate a commitment to the needs of the nurses and a firm recognition of the value of nursing care and nursing profession.Keywords
Brain Drain, Factors, Staff Nurses.- A Quasi Experimental Study to Assess the Effectiveness of Exhibition on Knowledge regarding Pregnancy Induced Hypertension among Antenatal Mothers attending Antenatal Outpatient Department of Selected Hospitals, Jalandhar, Punjab
Authors
1 Department of Obstetrics and Gynecological Nursing, S.G.L. Nursing College, Semi, Jalandhar, Punjab, IN
2 Department of Obstetrics and Gynecological Nursing, S.G.L. Nursing College, Semi, Jalandhar, Punjab, IN
Source
International Journal of Advances in Nursing Management, Vol 3, No 4 (2015), Pagination: 367-371Abstract
Pregnancy is a time of great anticipation. Hypertension is one of the common complications and contributes significantly to perinatal mortality and morbidity. Hypertension is a sign of underlying pathology which may be pre-existing or appear for the first time during pregnancy. The identification of clinical entity and effective management plays a significant role in the outcome of pregnancy, both for the mother and the baby. The main aim of the study was to enhance the knowledge regarding pregnancy induced hypertension among antenatal mothers through exhibition in order to improve maternal and fetal outcome. For this study Quasi-experimental research design was used. The study was conducted on conveniently selected 60 samples of antenatal mothers attending antenatal outpatient department of selected hospitals, Jalandhar, Punjab. Data was collected by Socio-demographic variables and Self Structured Knowledge Questionnaire. Collected data was analyzed by descriptive and inferential statistics. Tables and Bar diagrams were used to depict the findings. The pretest mean knowledge score in control group and experimental group was 16.33, 16.20 respectively and where as the post test mean knowledge score in control group and experimental group was 16.46, 26.03 respectively. The difference of pretest posttest mean knowledge score of antenatal mothers in control group was statistically not significant whereas it was statistically significant in experimental group. The tcal 0.1442 < ttab 1.96 in control group whereas in experimental group tcal 15.2915 > ttab 1.96. So the difference of post-test mean knowledge score of experimental group was statistically significant at p<0.05 level. Thus, it indicated that Exhibition had significant impact on knowledge regarding pregnancy induced hypertension among antenatal mothers in experimental group. In this study posttest knowledge score was not associated with any socio-demographic variables.Keywords
Knowledge, Exhibition, Antenatal Mothers and Pregnancy Induced Hypertension.- Cutting back the Wormhole Attack in Mobile Network: A Survey
Authors
1 Department of CSE, GZS PTU Campus, Bathinda, Punjab, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 11 (2014), Pagination: 11-17Abstract
As concerned with wireless networks, the communication is done through the radio links where chances of unauthorized user are more which consequently degrades the performance of network and result is more delay. Wireless networks are broadly classified into two broad categories: infrastructure mode and infrastructure less mode. Various protocols are defined under this which uses their different mechanism for detection and isolation of the wormhole attacks. In this paper some of the studies are defined on the basis of methods used for the detection and avoidance of attacks adhere to its use in it. As the numerous attacks may arise over network on MANET, their comparison has been discussed on the basis of techniques and their effects.
This paper intends to find out all the possible ways to detect and avoid the wormhole attack in the network. It may not lead to complete isolation of the attack but plays an important role to reduce the wormhole attack.
Keywords
Wireless Network, Wormhole Attack.- Theoretical Study of Geometry of Quinazoline Derivatives and Their Antibacterial Activities
Authors
1 Department of Chemistry, Punjabi University, Patiala 147002, Punjab, IN
Source
Asian Journal of Research in Chemistry, Vol 4, No 4 (2011), Pagination: 560-566Abstract
Quinazolines are a pharmacologically very attractive class of compounds. In the preliminary communication, 4- substituted phenyl-3,4,5,6-tetrahydrobenzo[h]quinazoline-2(1H)-thiones and their S-alkyl/aralkyl derivatives were synthesized. Through the Gaussian 03 studies, the expected stereochemistry of the synthesized compounds was checked. Also, the compounds were tested for antibacterial activities against Staphylococcus aureus, Pseudomonas fluorescence.
Keywords
Quinazolines, Gaussian Studies, Stereochemistry, Antibacterial Activities.- Synthesis and Antimicrobial Activities of Thiazolo [3, 2-a] Pyrimidine Derivatives
Authors
1 Department of Chemistry, Punjabi University, Patiala-147002 (Punjab), IN
Source
Asian Journal of Research in Chemistry, Vol 4, No 1 (2011), Pagination: 116-119Abstract
In the present study a novel thiazolo [3,2-a] pyrimidines were synthesized by one pot multicomponent cyclocondensation of 2-amino-4-phenyl thiazole, benzoyl acetone and various substituted aromatic aldehydes on solid support under microwave irradiations. The 2-amino-4-phenyl thiazole was synthesized from acetophenone. Some of the compounds were screened for anti-bacterial (Staphylococcus aureus, Staphylococcus aureus (MRSA), Staphylococcus pyogenes) and antifungal (Aspergillus niger, Neurospora crassa) activities by Agar Diffusion method.
Keywords
Thiazolopyrimidines, Microwave, Silica as Solid Support, Antimicrobial Studies.- A Mechanism to Enhance Lifetime of NEW LEACH Protocol in WSN
Authors
1 Department of Computer Engineering, Punjabi University, Patiala-147002, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 22 (2016), Pagination: 67-76Abstract
Due to the extensive range of applications the use of wireless sensor networks (WSNs) in past few years have increased a lot and it has become a hot research area now a days. One of the important issues in wireless sensor network is the intrinsic limited battery power in network sensor nodes. Since most of the energy is consumed by the transmission and reception, energy efficient routing protocol is required to enhance the lifetime of WSN. In this paper we presents the review of existing hierarchical routing protocol NEW LEACH and proposed a new approach that is better and more energy efficient than the existed approaches. In the proposed work, two enhancements are made. These enhancements are efficient cluster head replacement technique by using dynamic threshold value and the concept of upper threshold for sending data. Both NEW LEACH and Proposed protocol are simulated in MATLAB. The result shows that our proposed algorithm performs better than the NEW LEACH in terms of network lifetime.Keywords
WSN, Hierarchical Routing, NEW LEACH Protocol, Proposed Method, Dynamic Threshold.- Speckle Filtering of Ultrasound Images Using Improved Wavelet Shrinkage Guided Filter
Authors
1 Department of Computer Engineering, Punjabi University, Patiala, Punjab, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 22 (2016), Pagination: 258-266Abstract
Speckle noise is an intrinsic yet undesirable residual part of the medical ultrasound images, which considerably degrades the visual quality and limits the accuracy of automatic diagnostic techniques. Hence speckle suppression is an essential task before the examination and processing of the medical ultrasound images. Aiming at the problem of multiplicative speckle noise, an improved despeckled method is proposed in this paper, which is based on WaveletShrinkage_Guided filter. The proposed method used the Daubechies20 (d20) wavelet transformation to decompose the ultrasound images and an improved wavelet shrinkage algorithm to filter the high-frequency component. The wavelet coefficients of low-frequency sub-bands are filtered by an improved guided filter with varying regularization parameter and the inverse DWT is used to obtain the noise free image. Synthetic image and an ultrasound image experiments with the comparison of the Guided filter and WaveletShrinkage_Guided filter are carried out. The quantitative results of the proposed strategy show, that it outperforms the other despeckling methods in terms of favorable speckle suppression and edge preserving factors.Keywords
Speckle Suppression, Real Time Ultrasound Images, Wavelet Transform, Guided Filter, Edge Preservation Factor (EPF).- A Review on Conceptual Data Mining
Authors
1 Department of Computer Engineering, Punjabi University, Patiala, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 22 (2016), Pagination: 630-635Abstract
In the field of research area, industry and media both methodologies that are data mining from knowledge discovery from database get more attention and attracted significantly. This paper provides an overview that how these two methodologies that data mining and knowledge discovery from database related to each other in the field of machine learning, statistics and databases.Keywords
Data Mining, Applications of Data Mining, Knowledge Discovery of Data, Components of Data Mining, Tasks of Data Mining and Association Rule Mining.- Alleviation of Saline Water Stress on Tomato (Lycopersicon esculentum Mill.) Plants by Irrigation Scheduling and Foliar Application of Salicylic Acid and Potassium Sulphate
Authors
1 Department of Soil Science and Agricultural Chemistry, College of Agriculture, S.K. Rajasthan Agricultural University, Bikaner (Rajasthan), IN
Source
An Asian Journal of Soil Science, Vol 12, No 1 (2017), Pagination: 41-48Abstract
One of the main hurdles in boosting the agricultural production in arid and semi arid areas of world is the scarcity of good quality water for irrigation. The quality of irrigation water plays a key role in judging its suitability for crop production. Soil and water salinity is an abiotic stress and limiting factor which affects almost every aspect of physiology and biochemistry of a plant, resulting in reduction in its yield. The research entitled alleviation of saline water stress on tomato (Lycopersicon esculentum Mill.) plants by irrigation scheduling and foliar application of salicylic acid and potassium sulphate. was conducted at Niche area of excellence, S.K. Rajasthan Agricultural University, Bikaner during Rabi season of 2015-16. The result shown that biochemical parameters APX, SOD, POX and CAT activity significantly increased with the increase in irrigation interval from daily irrigation to third day irrigation. The effect of irrigation levels on APX, SOD, POX and CAT activity significantly increased from 1.0 vol. (full volume of water required by crop) to 0.8 vol. (80% of full volume of water required by crop) and at par to 0.6 vol. (60% of full volume of water required by crop). The application of salicylic acid and potassium sulphate resulted in significant increase in APX, SOD, POX and CAT activity over control at application of 500 ppm and 15 m mol, respectively. The physiological parameters viz., electrolyte leakage and relative leaf water content (RLWC) decreased with the decreasing irrigation levels from 1.0 vol. to 0.8 vol. and at par to 0.6 vol. The electrolyte leakage and RLWC decreased with the increase in irrigation interval from daily to third day irrigation. With the application of salicylic acid and potassium sulphate the physiological parameters increased significantly. The quality parameters also fluctuate with the treatments. The TSS and ascorbic acid content of tomato decreased with the increase in irrigation levels as well as irrigation intervals and increased with the application of salicylic acid and potassium sulphate. The similar results were found with the yield and yield attributes, the number of fruits per plant, avg. diameter of fruit, avg. weight of fruit and yield of fruits decreased with the increase in the irrigation interval and irrigation levels and increased with the application of salicylic acid and potassium sulphate. The soil was non-significantly affected with all the treatments of research.Keywords
Saline Water Stress, Irrigation Scheduling, Salicylic Acid, Potassium Sulphate.References
- A.O.A.C. (1970). Official methods of analysis. 11th Ed. Association of Official Analytical Chemists, Washington, D.C. U.S.A.
- Bajji, M., Kinet, J.M. and Lutts, S. (2001). The use of electrolyte leakage method for assessing cell membrane stability as a water stress tolerance test in durum wheat. Plant Growth Regulations, 1: 1-10.
- Bradford, M.M. (1976). A rapid and sensitive method for the quantification of microgram quantities of protein utilizing the principle of protein dye binding. Analyt. Biochem., 72(1): 248-254.
- Chance, M. and Maehly, A.C. (1995). Assay of catalases and peroxidases, Methods Enzymology, 2: 764-817.
- Dhindsa, R.S. and Motowe, W. (1981). Drought tolerance in two mosses: correlation with enzymatic defense against lipid peroxidation. J. Exp. Bot., 32: 79-91.
- El-Basiouny, Hala, M.S. and Bekheta, M.A. (2005). Effect of salt stress on relative water content, lipid peroxidation, polyamines, amino acid and ethylene of two wheat cultivars. Internat. J. Agric. & Biol., 10(30): 5713-5718.
- Fisher, R.A. (1950). Statistical methods for research workers. Biological monographs and manuals. No. V. 1950 No. 11th Ed. pp.xv+354 pp.
- Gunes, A., Inal, A., Alpaslan, M., Eraslan, F., Bagei, E.G. and Cicek, N. (2007). Salicylic acid induced changes on some physiological parameters symptomatic for oxidative stress and mineral nutrition in maize (Zea mays L.) grown under salinity. J. Plant Physiol., 164: 728-736.
- Kazemi, M. (2014). Vegetative and reproductive growth of tomato plants affected by calcium and salicylic acid. Bull. Environ., Pharmacol. & Life Sci., 2(11): 24-29.
- Khan, N.A., Syeed, S., Masood, A., Nazar, R. and Iqbal, N. (2010). Application of salicylic acid increases contents of nutrients and antioxidative metabolism in mungbean and alleviates adverse effect of salinity stress. Internat. J. Plant Biol.,1: 1-8.
- Marchand, M., Bourrie, B., Anac, D. and Martin-Prevel, P., (1999). Use of potash fertilizers through different application methods for high yield and quality of crops. Imp. Crop Qual. Nutri. Mang, 5: 13-17.
- Mohammadreja, S., Amin, B., Forogh, A., Hossin, M. and Sorayya, S. (2012). Response of Brassica napus L. grains to the effect of salinity and salicylic acid. J. Stress Physiol. & Biochem., 8(2): 61-68.
- Nakano, Y. and Asada, K. (1987). Purification of ascorbate peroxidase from spinach chloroplasts: its activation in ascorbate-depleted medium and reactivation by monodehydro-ascorbate radical. Plant Cell Physiol., 28: 131-140.
- Pooja and Sharma, K.D. (2010). Salicylic acid induced amelioration in growth, biochemical metabolites and yield of mung bean (Vigna radiata L.) under salinity stress. Indian J. Plant Physiol., 15(3): 219-225.
- Sevengor, S., Fikret, Y., Kusvuran, S. and Ellialtioglu, S. (2011). The effect of salt stress on growth, chlorophyll content, lipid peroxidation and antioxidative enzyme of pumpkin seedling. African J. Agric. Res., 6(21): 4920-4924.
- Simaei, I.M., Nejad, R.A.K., Saadatmand, S., Bernard, F. and Fahami, H. (2011). Effects of salicylic acid and nitric oxide on antioxidant capacity and proline accumulation in glysine max L. treated with NaCl salinity. African J. Agric. Res., 6(16): 3775-3782.
- Slavik, B. (1974). Methods for studying plant water relations. Ecological Studies, Vol. 9, Springer-Verlag, Berlin and New York, U.S.A.
- Soil Fertility Status and Nutrient Recommendations Based on Soil Analysis of Jaisalmer District of Western Rajasthan
Authors
1 Department of Soil Science, College of Agriculture, S.K. Rajasthan Agricultural University, Bikaner (Rajasthan), IN
Source
An Asian Journal of Soil Science, Vol 12, No 1 (2017), Pagination: 103-107Abstract
The present investigation was carried out for assessment of soil fertility status of Jaisalmer district of western Rajasthan. For this purpose 125 representative soil samples were collected from two Panchayat Samiti i.e. Sankda village Ujala and Jaisalmer village Basanpeer and Amersagar of Jaisalmer district. These soil samples were analyzed for soil properties, macro and micronutrient fertility status. The soils were moderately alkaline to very strongly alkaline in reaction with an average pH of 9.75. The EC value varied from 0.05 to 0.71 dS/m with average value of EC is 0.25 dS/m. The organic carbon content ranged from 0.01 to 0.70 per cent with an average value of 0.09 per cent. Available nitrogen, phosphorus (P2O5), potassium (K2O) and sulphur (ppm) content of the soils ranged from 13.53 to 230.07, 5.43 to 56.72, 170.13 to 379.95 kg ha-1 and 0.88 to 21.76 ppm with an average value of 131.95, 25.96, 258.13 kg ha-1 and 11.34 ppm, respectively. However, available micronutrient DTPA Zn, Fe, Cu and Mn ranges varied from 0.04-1.63, 1.05-3.94, 0.01-0.21 and 0.14-2.88 ppm with an average value of 0.51, 0.21, 0.09 and 1.55 ppm per hectare, respectively. Among major nutrients, about 100 per cent of the soil samples were low in available nitrogen, 57.60, 36.00 and 6.40 per cent soil samples were observed to be low, medium and high in available P2O5, 87.20 and 12.80 per cent samples were in medium and high in available K. whereas, 44.80, 54.40 and 0.80 per cent soil samples were observed to be low, medium and high in available sulphur. Nutrient indexing of the areas was low for N (1.00), Cu (1.016) and Mn (1.112), whereas, it was medium in case of phosphorus, potassium, sulphur, DTPA-Zn and Fe. With respect to micro-nutrients 66.40, 46.40, 99.2, 94.40 per cent samples were found to be deficient in DTPA-Zn, Fe, Cu and Mn, respectively. The correlation studies among the chemical characteristics showed that organic carbon contributed most towards nutrient availability and found to be positively correlated with all parameters except pH and Zn.Keywords
Soil Fertility, Soil Nutrient Index, Zn, Fe, Mn, Cu.References
- Chesnin, L. and Yien, C.H. (1951). Turbidimetric determination of available sulphates. Soil Sci. Soc. America Proc., 15: 149-151.
- Dhale, S.A. and Prasad, J. (2009). Characterization and classification of sweet orange growing soils of Jalna district, Maharashtra. J. Indian Soc. Soil Sci., 57(1): 11-17.
- Jackson, M.L. (1971). Soil chemical analysis.Prentice Hall of India Pvt. Ltd., NEW DELHI, INDIA.
- Jackson, M.L. (1973). Soil chemical analysis, Prentice Hall of India Private Ltd. NEW DELHI, INDIA.
- Lindsay, W.L. and Norwell, W.A. (1978). Development of DTPA soil test for Zn, Fe, Mn and Cu. Soil Sci. Soc. Am. Proc., 33: 62-68.
- Marathe, R.A. and Bharambe, P.R. (2007). Correlation of integrated nutrient management induced change in soil properties with yield and quality of sweet orange on Udic Haplustert. J. Indian Soc. Soil Sci., 55(3): 270-275.
- Parkar, F.W. (1951). The broad interpretation and application of soil test information. Agron. J.,43: 151-152.
- Prasad, J. (2010). Forms of potassium in shallow soils of different origin and land uses in Nagpur district of Maharashtra. J. Indian Soc. Soil Sci., 58(3): 327-330.
- Ramamoorthy, B. and Bajaj, J.C. (1969). Available N, P and K status of Indian soils. Fert. News, 14: 24-26.
- Singh, B. (2009). Studies on nutrient status of orchards in Sikar district of Rajasthan. Ph.D. Thesis, Rajasthan Agricultural University, Bikaner, RAJASTHAN (INDIA).
- Singh, J.P., Singh, S. and Singh, V. (2010). Soil potassium fractions and response of cauliflower and onion to potassium. J. Indian Soc. Soil Sci., 58(4): 384-387.
- Subbiah, B.V. and Asija, G.L. (1956). A rapid procedure for the determination of available nitrogen in soils. Curr. Sci., 25: 259-260.
- Effect of Straw Mulching and Herbicides on the Weed Density, Dry Matter Accumulation of Weeds and Chlorophyll Content in Maize (Zea mays L.)
Authors
1 Department of Agronomy, Punjab Agricultural University, Ludhiana (Punjab), IN
2 Regional Research Station, Gurdaspur (Punjab), IN
Source
International Journal of Agricultural Sciences, Vol 15, No 1 (2019), Pagination: 107-114Abstract
Field experiment was carried out during Kharif 2017 at Ludhiana and Gurdaspur to assess the weed density, DMA of weeds and chlorophyll content as influenced by straw mulching and herbicides in maize.Application of paddy strawmulch at 9.0 t ha-1 effectively controlled the density and DMA of grasses, broadleaf and sedges and resulted in significantly more leaf chlorophyll content in maize as compared to paddy straw mulch at 6.25 t ha-1 and no mulching. Pre-emergence application of atrazine at 1.0 kg ha-1 helped to manage density and DMA of grasses, broadleaf and sedges in comparison to atrazine at 0.8 kg ha-1 and unweeded check at 20 DAS. At 40 DAS of maize where maximum losses due to weeds occurred, the weeds were managed by post emergence application of tembotrione at 0.088 in combination with PSM 9.0 t ha-1which reduced the density and DMA of grasses, broadleaf and sedges in comparison to atrazine at 0.8 and 1.0 kg ha-1 and unweeded check, but were equally effective as compared to tembotrione at 0.110 kg ha-1 and weed free treatment. The data showed that application of 9.0 t ha-1mulch helped to reduce 20 per cent dose of atrazine and tembotrione for controlling weeds in maize.Keywords
Atrazine, Maize, Straw Mulching, Tembotrione, Weed Density, Weed Dry Matter Accumulation.References
- Barla, S., Upasani, R. R., Puran, A. N. and Thakur, R. (2016). Weed management in maize. Indian J. Weed Sci., 48 : 67-69.
- Bhatt, R. and Khera, K. L. (2006). Effect of tillage and mode of straw mulch application on soil erosion in sub montaneous tract of Punjab, India. Soil & Tillage Res., 88: 107-15.
- Bijanzadeh, E. and Hossein, G. (2006). Effect of separate and combined treatments of herbicides on weed control and maize (Zea mays L.) yield.Weed Tech., 20: 640-645.
- Chopra, P. and Angiras, N. N. (2008). Influence of tillage and weed control methods on weeds, yield and yield attributes of maize (Zea mays L.). Indian J. Weed Sci., 40: 47-50.
- Dutta, D., Thentu, T. L. and Duttamudi, D. (2016). Effect of weed-management practices on weed flora, soil micro-flora and yield of baby corn (Zea mays). Indian J. Agron., 61: 210216.
- Glab, T. and Kulig, B. (2008). Effect of mulch and tillage system on soil porosity under wheat (Triticum aestivum). Soil & Tillage Res., 99: 169-178.
- Oerke, E. C. (2005). Crop losses to pests. J. Agric. Sci., 143: 1-13.
- Oerke, E. C. and Dehne, H. W. (2004). Safeguarding production losses in major crops and role of crop production.Crop Prot., 23 : 275-285.
- Pandey, A.K., Parkash, V., Singh, R. D. and Mani, V. P. (2001). Integrated weed management in maize (Zea mays). Indian J. Agron., 46 : 260-265.
- Pandey, A. K., Parkash,V., Singh, R. D. and Mani, V. P. (2002). Studies on crop weed competition and weed dynamics in maize under mid hill conditions of N-W Himalayas. Indian J. Weed Sci.,34 : 63-67.
- Rout, D. and Satapathy, M. R. (1996).Chemical weed control in rainfed maize (Zea mays). Indian J. Agron., 41 : 51-53.
- Salarzai, A. (2001). Effect of different herbicides on weed population and yield of maize (Zea mays L.) Pakistan J. Agric. Sci., 38 : 75-77.
- Sarkar, S. and Singh, S. R. (2007). Interactive effect of tillage depth and mulch on soil temperature, productivity and water use pattern of rainfed barley (Hordium vulgare L.). Soil & Tillage Res., 92 : 79-86.
- SAS User’s Guide. SAS Institute, Cary, NC (USA).
- Shah, F. U., Sajid, G. M. and Siddiqui, S. U. (2014). Evaluation of mulch materials as integrated weed management component in maize crop. Pakistan J. Agric. Res., 27: 118-128.
- Singh, D., Tyagi, R. C. and Aggarwal, S. K. (1998). Weed control methods in spring maize. J. Res. Haryana Agric. Univ., 28: 21-25.
- Singh, G. and Prasad, R. (1994). Studies on the control of Trianthema portulacastrum in fodder maize (Zea mays). Indian J. Weed Sci., 26: 64-67.
- Walia, U. S., Brar, L. S. and Singh, B. (2005). Recommendations for weed control in field crops. Research Bulletin, Department of Agronomy, Agrometerology and Forestry, PAU Ludhiana. pp. 5.
- Wilson, G. H. and Westra, P. (1991). Wild porso millet interference in corn (Zea mays).Weed Sci., 39 : 217-220.
- Woldetsadik, G. and Chinawong, S. (2005). Growth, yield attributes, yields and weed characteristics as influenced by integrated nitrogen fertilization and weed-control measures of maize (Zea maysL.) in central rift valley of Ethiopia.Kasetsart J. Nat. Sci., 39: 338-349.
- Zimdahl, R. L. (2004).Weed crop competition: A review. pp. 109-30 Oxford, UK, Blackwell Publishers.
- Soil Temperature, PAR Interception and Crop Phenology of Maize (Zea mays L.) as Influenced by Straw Mulching and Herbicides
Authors
1 Department of Agronomy, Punjab Agricultural University, Ludhiana (Punjab), IN
2 Regional Research Station, Gurdaspur (Punjab), IN
Source
International Journal of Agricultural Sciences, Vol 15, No 1 (2019), Pagination: 129-136Abstract
A multi location experiment was conducted at Punjab Agricultural University, Ludhiana and Regional Research Station Gurdaspur (PAU) during Kharif 2017 to evaluate the effect of straw mulching and herbicides on soil temperature, PAR interception and crop phenology of maize. Application of mulch at 9.0 t ha-1 helped to reduce the soil temperature at 5 cm soil depth by 3.8 to 4.6°C at 20 DAS, 1.0 to 1.4°C at 40 DAS, 1.0 to 1.3°C at 60 DAS and 0.7 to 1.2°C at harvest as compared to no mulch treatment, but at 10 cm soil depth the temperature was reduced by 2.2 to 3.7°C at 20 DAS, 1.3°C at 40 DAS, 0.5°C at 60 DAS and 0.4°C at harvest at both the locations. High values of PAR interception and less number of days taken to tasselling, silking and physiological maturity were recorded with application of PSM 9.0 t ha-1 as compared to PSM 6.25 t ha-1 and no mulching treatments. Mulch application at 6.25 t ha-1 also significantly lowered the soil temperature and resulted in significantly higher PAR interception and less number of days to tasselling, silking and physiological maturity as compared to no mulch treatment. Different weed control treatments did not significantly influence the emergence of maize and soil temperature at 5 cm and 10 cm depth at both the locations. Application of tembotrione at 0.088 kg ha-1, tembotrione at 0.110 kg ha-1and weed free treatments recorded statistically similar but significantly higher values of PAR interception and less number of days for tasselling, silking and physiological maturity as compared to atrazine at 0.8 and 1.0 kg ha-1 and unweeded check.Keywords
Atrazine, Crop Phenology, Maize, PAR Interception, Soil Temperature, Straw Mulching, Tembotrione.References
- Anikwe, M. A. N., Mbah, C. N., Ezeaku, P. I. and Onyia, V. N. (2007). Tillage and plastic mulch effects on soil properties and growth and yield of cocoyam (Colocasia esculenta) on an ultisol in south eastern Nigeria. Soil & Tillage Res., 93: 264-273.
- Anonymous (2018). Package of practices for Kharif crops of Punjab.pp. 24-29. Punjab Agricultural University, Ludhiana, Punjab (India).
- Aulakh, M.S., Khera, T.S., Doran, J. W., Singh, K. and Singh, B. (2000). Yields and nitrogen dynamics in a rice-wheat system using green manure and inorganic fertilizer. Soil Sci. Soc. Am. J., 64 : 1867-1876.
- Barla, S., Upasani, R. R., Puran, A. N. and Thakur, R. (2016). Weed management in maize. Indian J. Weed Sci., 48 : 67-69.
- Bhatt, R. and Khera, K. L. (2006). Effect of tillage and mode of straw mulch application on soil erosion in sub montaneous tract of Punjab, India. Soil & Tillage Res., 88: 107-115.
- Chauhan, B.S. and Abugho, S.B. (2013). Integrated use of herbicide and crop mulch in suppressing weed growth in a dry-seeded rice system. American J. Plant Sci., 4 : 1611-1616.
- Choudhary, V.K. and Kumar, P. S. (2014). Influence of mulch on productivity, ischolar_main growth and weed dynamics of maize (Zea mays) - based cropping systems. Indian J. Agron., 59 : 364-730.
- Dass, S., Jat, M.L., Singh, K.P. and Rai, H. K. (2008). Agroeconomic analysis of maize based cropping system in India. Indian J. Ferti., 4 : 49-62.
- Glab, T. and Kulig, B. (2008).Effect of mulch and tillage system on soil porosity under wheat (Triticum aestivum). Soil & Tillage Res., 99: 169-178.
- Gul, S., Khanday, B. A. and Khan, M. H. (2016). Effect of fertility levels and herbicide mixtures on yield and yield attributes of rainfed maize under temperate conditions of Kashmir. Appl. Biol. Res., 18:185-191.
- Kaur, T., Kaur, S. and Bhullar, M. S. (2016).Management of complex weed flora in maize with post-emergence herbicides. Indian J. Weed Sci., 48: 390-393.
- Kumar, B. R. M. and Angadi, S. S. (2014). Effect of tillage,mulch and weed management on performance of maize (Zea mays) in Karnataka. Indian J. Dryland Agric. Res. Dev., 29 : 57-62.
- Owla, M. L., Nepalia, V., Chouhan, G. S. and Singh, D. (2015). Effect of fertility levels, nutrient sources and weed control on weed dynamics and yield of quality protein maize (Zea mays) and relative nitrogen and phosphorus uptake. Indian J. Agron., 60 : 267-272.
- Rana, S. S., Badiyala, D., Sharma, N., Kumar, R. and Pathania, P. (2017). Impact of tembotrione on weed growth, yield and economics of maize (Zea mays L.) under Mid Hill conditions of Himachal Pradesh. Pesticide Res. J., 29: 27-34.
- Sahoo, T. R., Lal, M. K., Hulihalli, U. K. and Paikaray, R. K. (2016). Effect of sequential application of herbicides on microbial activities and yield of maize. Res. on Crops, 17 : 685690.
- Sarkar, S. and Singh, S. R. (2007). Interactive effect of tillage depth and mulch on soil temperature, productivity and water use pattern of rainfed barley (Hordium vulgare L.). Soil & Tillage Res., 92 : 79-86.
- SAS User’s Guide. SAS Institute, Cary, NC (USA).
- Teasdale, J. R., Beste, C. E. and Potts, W. E. (1991). Response of weeds to tillage and cover crop residue. Weed Sci., 39 : 195199.
- Zaremohazabieh, S. and Hossein, G. (2011). Effects of rimsulfuron, roramsulfuron and conventional herbicides on weed control and maize yield at three planting dates. J. Biol. Environ. Sci., 5 : 47-56.
- Anonymous (2017). Area, production and average yield of maize in India. http://www.indiastat.com.
- Modeling International Trinity & Policy Choices for India
Authors
1 Department of Economics, Panjab University, Sector-14, Chandigarh-160014, IN
Source
Indian Journal of Industrial Relations: Economics & Social Dev., Vol 54, No 4 (2019), Pagination: 631-643Abstract
This study is an attempt to test the validity of trinity hypothesis and to measure the cost of capital account convertibility which Indian economy has paid in the form of one of the cornerns of trinity triangle. The monthly data obtained from various publications of RBI and IMF over the period 1980:M1 to 2016:M12 have been utilized to construct three trinity indices of Monetary Independence (MI), Exchange Rate Stability (ERS), and Capital Account Openness (CO).Using the graphical and cointegration tools, the existence of trinity hypothesis has been confirmed in Indian context. It has been noticed that India has clearly chosen capital openness (CO) over exchange rate stability (ERS).References
- Aizenman, J. & Ito, H. (2011), “The ‘Impossible Trinity,’ the International Monetary Framework, and the Pacific Rim”, Forthcoming in Kaur and N. Singh (ed.,) Handbook of the Economics of the Pacific Rim.
- Aizenman, J. & Lee, J. (2007), “International Reserves: Precautionary versus Mercantilist Views, Theory and Evidence”, Open Economies Review”, 18(2):191-214.
- Aizenman, J. & Lee, J. (2008), “Financial versus Monetary Mercantilism: Long run View of Large International Reserves Hoarding”, The World Economy, 31 (5): 593-611.
- Aizenman, J, (2010), “The Impossible Trinity (aka The Policy Trilemma)”, forthcoming in the Encyclopedia of Financial Globalization.
- Aizenman, J. (2013), “The Impossible Trinity— from the Policy Trilemma to the Policy Quadrilemma”, Global Journal of Economics, 2(01): 1350001
- Aizenman, J. Chinn, M.D. & Ito, H. (2013), “The ‘Impossible Trinity’ Hypothesis in an Era of Global Imbalances: Measurement and Testing”, Review of International Economics, 21 (3):447-58.
- Amadou, N. R. S. (2007), “ The Capital Account Liberalization and Risk Management in India”, No. WP/07/251, International Monetary Fund
- Asteriou, D. & Hall, G.S. (2007), “Applied Econometrics: a Modern Approach”, Palgrave Macmillan. New York.
- Charemza, W.W.& Deadman, D.F. (1997), “New Directions in Econometric Practice”, Second Edn, Edward Elgar Publishing, Chelthenham, UK
- Fleming, J.M. (1962), “Domestic Financial Policies under Fixed and under Floating Exchange Rates”, Staff Papers, 9(3): 369-80.
- Gupta, A.S. & Manjhi, G. (2011), ”Capital Flows and the Impossible Trinity: The Indian Experience (No. 11-02)”, Centre for International Trade and Development, Jawaharlal Nehru University, New Delhi, India.
- Hagen, J.V. & Zhou, J. (2005), “The Choice of Exchange Rate Regime: an Empirical Analysis for Transition Economies”, Economics of Transition”, 13 (4): 679-703.
- Hosny, A.S., Kishor, N.K. & Bahmani-Oskooee, M. (2015), “Understanding the Dynamics of the Macroeconomic Trilemma”, International Review of Applied Economics, 29 (1): 32-64.
- Hutchison, M., Sengupta, R., & Singh, N. (2012), “India’s Trilemma: Financial Liberalization, Exchange Rates and Monetary Policy 1", The World Economy, 35(1): 3-18.
- Joshi, V. (2001), “Capital Controls and the National Advantage: India in the 1990s and Beyond”, Oxford Development Studies, 29(3): 305-20.
- Joshi, V. (2003), “India and the Impossible Trinity”, The World Economy, 26(4): 555-83
- Lütkepohl, H. (2005), “New Introduction to Multiple Time Series Analysis”, Springer Science & Business Media, Berlin, Germany
- Moreno, R. & Spiegel, M.M. (1997), “Are Asian Economies Exempt from the ‘Impossible Trinity?: Evidence from Singapore”, (No. 97-01), Federal Reserve Bank of San Francisco.
- Mundell, R.A. (1963), “Capital Mobility and Stabilization Policy under Fixed and Flexible Exchange Rates”, Canadian Journal of Economics and Political Science/Revue canadienne de economiques et science politique, 29(4):475-85.
- Obstfeld, M., Shambaugh, J.C. & Taylor, A.M.(2004), “Monetary Sovereignty, Exchange Rates, and Capital Controls: the Trilemma in the Interwar Period”, IMF Staff Papers, 51 (1): 75-108.
- Obstfeld, M. Shambaugh, J.C. & Taylor, A.M. (2005), “The Trilemma in History: Tradeoffs among Exchange Rates, Monetary Policies, and Capital Mobility”, Review of Economics and Statistics, 87(3):423-38.
- Padmanabhan, G. (2015), “Is India Ready for Full Capital Account Convertibility?” Speech at the MSNM Besant Institute of PG Management Studies, 16 May 2015, Mangalore
- Patil, R.H. (1999), “Risks of Capital Account Convertibility”, Economics and Political Weekly. 34 (1-2): 16-23.
- Philippon, M.T., Zettelmeyer, M.J. & Borensztein, M.E. (2001), “Monetary Independence in Emerging Markets: Does the Exchange Rate Regime Make a Difference?” (No. 1). International Monetary Fund
- Quadrini, V. (2005), “Policy Commitment and the Welfare Gains from Capital Market Liberalization”, European Economic Review, 49 (8):1927-51.
- Ramakrishna, G. (2012), “The Capital Account Convertibility in India: The Impact of Capital Inflows on Economic Growth, Exports and Imports”, The International Journal of Economics and Business Research, 3 (2): 80-95.
- Seth, A.K. & Varma, S. (2009), “Capital Account Convertibility and Growth: A Developing Country Perspective”, Decision (03040941), (36):.1.
- Shambaugh, J.C. (2004), “The Effect of Fixed Exchange Rates on Monetary Policy”, The Quarterly Journal of Economics, 119.(1):301-52.
- Demonetization Impeded Indian Economic Growth? Test of Hawtrey’s Theory of Business Cycles
Authors
1 Department of Economics, Panjab University, Sector-14, Chandigarh 160014, IN
Source
Indian Journal of Industrial Relations: Economics & Social Dev., Vol 55, No 1 (2019), Pagination: 1-14Abstract
Many national and international agencies blame demonetization as a major factor behind the deceleration in the growth rate of Indian economy in recent quarters. Such linkages of economic growth with monetary shocks have been well explained by Hawtrey’s monetary theory of business cycles. The present paper attempts to test Hawtrey’s theory in the context of demonetization in India. The results indicate that the Indian economy did experience fourteen growth-rate cycles over the period 1970 to 2017. Given that M3 takes an average 7 months lead in explaining the low growth (i.e., downswing) phase, the demonetization (i.e., fall in money supply) can be admitted as a lead because of falling growth rate of Indian economy.References
- Banerji, A.&Dua, P. (2011), “Predicting Recessions and Slowdowns: a Robust Approach”, Working paper No 202, Centre for Development Economics, Department of Economics, Delhi School of Economics, New Delhi.
- Bordoloi, S. (2007), “Forecasting the Turning Points of the Business Cycles with Leading Indicators in India: A Comparison between the Probit and Artificial Neural Network Model”, presented in Singapore Economic Review conference,Electronically retrieved from <
> on 14th September, 2017. - Bry, G.&Boschan, C. (1971): “Programmed Selection of Cyclical Turning Points”, in Gerhard Bry and Charlotte Boschan, Cyclical Analysis of Time Series: Selected Procedures and Computer Programs,New York, NBER.
- Burns, A. F.& Mitchell, W. C. (1946), Measuring Business Cycles, New York, NBER.
- Chitre, V. (2001),”Indicators of Business Recessions and Revivals in India: 1951-1982", Indian Economic Review, New series,36 (1):79-105.
- Cooley, T. F.& Hansen, G. D. (1998), “The Role of Monetary Shocks in Equilibrium Business Cycle Theory: Three Examples”, European Economic Review, 42(3-5):605-17.
- Davis, R. G. (1968), “The Role of the Money Supply in Business Cycles”,Economic Policy Review, Federal Reserve Bank of New York, 50(4):63-73.
- Dua, P.& Banerji, A. (2001), “An Indicator Approach to Business and GrowthRate Cycles: The Case of India”, Indian Economic Review, New Series, 36(1): 55-78.
- Dua, P.& Banerji, A. (2007), “Predicting Indian Business Cycles Leading Indices for External and Domestic Sector”, Margin: The Journal of Applied Economic Research, 1(3): 249-65.
- Dua, P. &Banerji, A. (2012), “Business and Growth Rate Cycles In India”,Working paper No. 210, Centre for Development Economics, Delhi School of Economics, New Delhi.
- Friedman, M.& Schwartz, A. J. (1975): “Money and Business Cycles”,in the editorial book, The State of Monetary Economics,New York, NBER.
- Gabisch, G.& Lorenz, H. W. (1989),Business Bycle Theory: A Survey of Methods and Concepts, Springer Science and Business Media, New York.
- Ghate, C., Pandey, R.& Patnaik, I. (2013), “Has India Emerged? Business Cycle Stylized Facts from a Transitioning Economy”, Structural Change and Economic Dynamics, 24(1):157-72.
- Hawtrey, R. G. (1927), “The Monetary Theory of the TradeCycle and Its Statistical Test”,The Quarterly Journal of Economics, 41(3): 471-86.
- Hayek, F. A. (1929),Monetary Theory and the Trade Cycle;Translated from the German by N. Kaldor and HM Croome in 1933. New York: Harcourt, Brace & Co., Inc.
- Hodrick R.J. & E.C. Prescott (1997)”Post-war U.S. Business Cycles: An Empirical Investigation”,Journal of Money, Credit and Banking, 28(4):1-16.
- Ireland, P. N. (2001), “Money’s Role in the Monetary Business Cycle”, Working Paper No. 8115, National Bureau of Economic Research, New York.
- Jayaram, S., Patnaik, I.& Shah, A. (2009), “Examining the Decoupling Hypothesis for India”, Economic and Political Weekly, 44(44): 109-16.
- Juglar, C. (1862), Des crises commerciales et de leur retour périodiqueen France enAngleterre et aux États-Unis, English Name: Trade Crises and Their Periodic Return to France in England and the United States,Paris: Guillaumin.
- Kaldor, N. (1940), “A Model of the Trade Cycle”,The Economic Journal, 50 (1):78-92.
- Keynes, J. M. (1936), General Theory of Employment, Interest, and Money, Basingstoke: Palgrave Macmillan.
- Klein, P. A. (1998), “Swedish Business Cycles: Assessing the Recent Record”, Working Paper No 21, Federation of Swedish Industries, Department of Economic and Fiscal Policy, Stockholm.
- Koopmans, T. C. (1947),”Measurement without Theory”, The Review of Economic Statistics, 29(3):161-72.
- Metzler, L. A. (1941), “The Nature and Stability of Inventory Cycles”,The Review of Economics and Statistics, 23(3):113-29.
- Mohanty, J., Singh, B.& Jain, R. (2003), “Business Cycles and Leading Indicators of Industrial Activity in India”,Reserve Bank of India, Occasional Papers, 22(2-3).
- Papademos, L. (2003),”Economic Cycles and Monetary Policy”, Speech at International Symposium-Monetary Policy, Economic Cycle and Financial Dynamics,7thMarch, 2003, Paris.
- Patnaik, I&Sharma, R. (2002), “Business Cycles in the Indian Economy”,Margin, 35(1):71-80.
- Reserve bank of India (2007),Report on Composite Index of Leading Indicators for Indian Economy, Mumbai.
- Samuelson, P. A. (1939), “Interactions between the Multiplier Analysis and the Principle of Acceleration”,The Review of Economics and Statistics, 21(2): 75-78.
- Schumpeter, J. A. (1939),Business Cycles: aTheoretical, Historical, and Statistical Analysis of the Capitalist Process,New York: McGraw-Hill.
- Shah, A. (2008), “New Issues in Macroeconomic Policy”, Working Paper No 51, National Institute of Public Finance and Policy, New Delhi.
- Shah, A.& Patnaik, I. (2010), “Stabilising the Indian Business Cycle,” in S. Kochhar (ed) India on the Growth Turnpike: Essays in Honour of Vijay L. Kelkar, Academic Foundation.
- Zarnowitz, V. (1991), “What Is a Business Cycle?”, NBER Working Paper Series No. 3863, New York: NBER.
- Channels of Monetary Policy Transmission in India: A Post-Reforms Macro-Econometric Analysis
Authors
1 Research Scholar, Department of Economics, Panjab University, Chandigarh 160014, IN
Source
Indian Journal of Industrial Relations: Economics & Social Dev., Vol 55, No 3 (2020), Pagination: 529-542Abstract
This paper examines the effectiveness and relative strength of various channels of monetary policy transmission in India during the post reform period using the monthly data spanning over 1991:M4 to 2017:M12. The analysis has been via regular and seasonal unit ischolar_main methods and graphical method has been applied for identification of structural breaks. Alternative methods namely, HEGY, Augmented Dickey Fuller (ADF), Phillips-Perron (PP), KPSS and DF-GLS have been applied for testing the presence of seasonal and regular unit ischolar_mains. The long-run and short-run behaviors of different channels have been analyzed through Structural Vector Error Correction Model (VECM). In India, first and second important channels of monetary policy transmission mechanism are Credit and Interest rate.Keywords
No Keywords.- Blockchain Technology : A Survey on Applications beyond Cryptocurrency
Authors
1 Student (MCA), IN
2 Student (MCA), Department of Computer Science & Application, DAV University, Jalandhar, IN
3 Associate Professor, Department of Computer Science & Application, DAV University, Jalandhar, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 35, No SP (2023), Pagination: 55-61Abstract
In the hyper-connected world, data has been playing a significant role in earthing the system of every domain that one can think of. But, it is undeniable fact that today data has prone to serious threats as it was never before, which has questioned the reliability, integrity as well as security of data. So, the technology has emerged that can mitigate all these issues, and that technology is none other than the technology residing at the heart of Bitcoin, The Blockchain.
Blockchain is one of the powerful technologies that has brought a revolution in conventional trading techniques. Conceptually, it is an open and distributed ledger that maintains an irrefutable database of records of all transactions or values that have been executed and shared peer-to-peer directly obsoleting the need for trust-worthy intermediatory in a secure, verifiable, moreover, in a permanent way alleviating the risk of fraud.
The main objective of this paper is not only to make blockchain a common business trading language but also to present its compelling applications in contrasting domains that are beyond currency rides, specifically in healthcare, politics, and its strategic implications in bridging strong economy using smart contracts that can revolutionize our digital global village.
Keywords
Bitcoin, Blockchain, Open-Ledger, Miners, Healthcare, Supply Chain, Smart Contracts.References
- S. Khezr, MD Moniruzzaman, A Yassine, R Benlamri; Blockchain technology in healthcare: A Comprehensive Review and Directions For Future Research – April-2019.
- Sarah Underwood, "Blockchain Beyond Bitcoin," Communications of the ACM, vol. 59, no. 11, pp. 15-17, November 2016.
- Sam Daley; Blockchain voting: the future of elections, Last updated September-2022.
- Ye Guo and Chen Liang. Blockchain application and outlook in the banking industry. Financial Innovation, 2(1):24, 2016.
- Ning Shi; A new proof-of-work mechanism for Bitcoin. Financial Innovation, 2(1):31, 2016.
- Dmitry Effanov, Pavel Roschin; The All-Pervasiveness of the Blockchain Technology, Published by Elsevier Ltd, 2018.
- Mahdi H. Miraz, Maaruf Ali; Applications of Blockchain technology beyond Cryptocurrency, December 2017.
- Uzma Jafar, Mohd. Juzaiddin Ab Aziz, Zarina Shukur; Blockchain for electronic voting system – review and open research challenges, published by MDPI.
- Syadav Tasmia Alvi, Mohammed Nasir Uddin, Linta Islam, Sajid Ahamed; DVTchain : A blockchain-based decentralized mechanism to ensure the security of digital voting system, October 2022.
- A. Azaria, A. Ekblaw, T. Vieira, and A. Lippman. MedRec: Using Blockchain for Medical Data Access and Permission Management. In 2016, 2nd International Conference on Open and Big Data (OBD), pages 25–30, Aug 2016.
- Benefits of Blockchain – published by IBM. Available at https://www.ibm.com/in-en/topics/benefits-of-blockchain 12. Macro Lansiti, Karim R. Lakhani; Harward Business Review: the truth about Blockchain, February-2017.
- Michael Crosby, Nachiappan, Pradan Pattanayak, Sanjeev Verma, Vignesh Kalyanaraman; Applied Innovation Review; Blockchain Technology: beyond bitcoin, published by Berkeley, 2016.
- Abid Haleem, Mohd. Javaid, Ravi Pratap Singh, Rajiv Suman; Blockchain Technology applications in healthcare: An overview,2021.
- Ghassan Karame. On the security and scalability of bitcoin’s blockchain. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS ’16, pages 1861–1862, New York, NY, USA, 2016. ACM.
- What is blockchain – published by money.com , Available at https://money.com/what-is-blockchain.
- Regional-scale landslide susceptibility assessment for the hilly state of Himachal Pradesh, NW Himalaya, India
Authors
1 Wadia Institute of Himalayan Geology, Dehradun 248 001, India; Present address: Department of Geology, Sikkim University, Gangtok 737 102, IN
2 Wadia Institute of Himalayan Geology, Dehradun 248 001, India; Department of Geophysics, Kurukshetra University, Kurukshetra 136 119, IN
3 Wadia Institute of Himalayan Geology, Dehradun 248 001, IN
4 Uttarakhand Landslide Mitigation and Management Centre, Dehradun 248 001, IN