PARTICULAR
|
Page No.
|
Community Participation In Water Supply Schemes In Oke-Ogun Zone, Oyo State, NIGERIA. Toyobo Adigun Emmanuel, Tanimowo N. Bolanle and Muili A.B
Abstract:
The study evaluates community participation in rural water supply scheme in Oke-Ogun area of Oyo State, Nigeria. The specific objectives for the study include examination of socio-economic characteristics, identification of rural water supply schemes, appraisal of the level of community participation in planning and implementation of water supply scheme, examination of problems and offering practicable and appropriate measures of improving the level of community participation in rural water supply scheme.
The data were collected through questionnaires prepared for community members. A total of 1,193 respondents were interviewed using random sampling techniques. Data were further analyzed using both descriptive and analysis of variance (ANOVA).
Donload full Lenght Paper......
|
1-14
|
The current situation, future prospect of Poverty and inequality in Sudan.
Dr. Ali Musa Abaker and Dr. Ali Abd Elaziz Salih
Abstract:
This research paper aims to address income poverty and inequality in Sudan. Poverty and inequality indicators were computed using both primary and secondary data sources. P-alpha equation, Povstat and Simsip models were used for poverty assessment and simulation. Results showed that more than 65 percent of the population in Sudan living with poverty. Inequality Gini index was 75 percent. The future prospect of poverty in Sudan showed declining trend, growth would slightly reduce poverty and inequality. The combined effect of growth and food prices increase would also reduce poverty and inequality. However, the decomposition of this effect into income and distribution effects, income effect would reduce poverty while the distributional effect would increase extreme poverty indicators.
Donload full Lenght Paper......
|
15-31
|
Performance Evaluation of On-demand AODV and DSR Routing Protocols in Mobile Ad-hoc Network. Muhammad Ashraf, Ahsan Raza Sattar, Tasleem Mustafa, Muhammad Inam Shahzad and Ahmad Adnan
Abstract:
Wireless networks history began in the period of 1970s and the awareness has been increasing ever since. Mobile Ad hoc Network (MANET) is a collection of wireless mobile nodes, which build network dynamically, and does not require any infrastructure support for transferring data packet between two mobile nodes. These are often known as infrastructure-less networking because the mobile nodes in such network establish routes between themselves dynamically. Communication and administrative tasks can be carried out between the computers without using any wire. MANETs are recognized by infrastructure less environment, multihop wireless connectivity, and frequently changing topology. Donload full Lenght Paper......
|
32-57
|
Enhancement of Security for Initial Network Entry of SS In IEEE 802.16e. Ahmad Adnan, Fahad Jan, Ahsan Raza Sattar, Muhammad Ashraf and Inaam Shehzad
Abstract:
Security is the main concern in these days and everyone want to secure his communication. IEEE 802.16e is a new broadband technology that is used to provide secure wireless access to thousands of users in a city at high data rate. This research paper examines the security for initial network entry of mobile stations and subscriber stations for IEEE 802.16e network. Some threats like denial of service (DoS) attacks were most common in the IEEE 802.16e network, the reason is; it is a new standard and need some security measurements. DoS attacks occur when the SS wants to communicate with base station (BS) and range request message (RNG_REQ) has been sent to BS. BS responds with range response (RNG_RSP) message to SS. Here occurs the DoS attack and this attack denied all communications between BS and SS. Donload full Lenght Paper......
|
58-72
|
The Role Social Capital Components on Entrepreneurship of Parsabad SMEs. Gholamreza Rahimi (Phd) and Ghader Vazifeh Damirch (MA)
Abstract:
Social capital is about the value of social networks, bonding similar people and bridging between diverse people, with norms of reciprocity. It is the aggregate of the actual or potential resources which are linked to possession of a durable network of more or less institutionalized relationships of mutual acquaintance or recognition. The main focus of this article is surveying the Role Social Capital Components on Entrepreneurship in Parsabad small and medium enterprise (EMEs). Theoretical framework of this study is Carland et al's (1984) entrepreneurship model and Sandra Franke (2005) Social Capital model. Data has collected from 120 workers of SMEs in Iran's Parsabad Moghan city by two standard questionnaires of study variables. Both the reliability and validity of measures has examined. The Hypotheses were tested through Freedman and Regression tests.
Donload full Lenght Paper......
|
73-97
|
Factors of default in Small and Medium Enterprise: an Application of Cluster Analysis. Subroto Chowdhury
Abstract:
Lending activity is an integral part of the banking business. Howsoever good a bank may be in its credit management it cannot escape the natural laws operating within the dynamics of advance and recovery. To put in more manageable sense the strategic homogeneity of the factors of default are also affected by the category of default and the type of facility. Grouping and regrouping of the factors of default is a natural phenomenon based on certain rules. Thus this kind of an understanding calls for deliberation to find out the factors of default and also look for natural tendency of the factors for formation of clusters. Marketing as a process always looks for clusters based on certain homogeneity of variables so as to design techniques and means thus maximizing reach and minimizing cost. The formation of clusters and the affinity of certain units to cling to the same clusters can always provide with the much needed vital tip. Donload full Lenght Paper......
|
98-125
|
Implementing Construction Projects on Schedule - A Real Challenge. Prof (Dr.) Debabrata Kar
Abstract:
Engineers all over the world have been trying to find workable solutions to keep Engineering Construction project time over-run under good control. The activity networking technique initiated in the USA in the late fifties gained large popularity. This was followed by the introduction of the computer and a large number of management software aiming at effective project control. The techniques are in use globally including in the developing world. Needless to say these techniques have proved very useful, but the real problem of effectively controlling the slippage on construction projects, particularly in the developing countries like India, still remains largely unsolved. The author has done substantial work in India and other developing countries trying to find workable solutions to this burning issue and have achieved considerable success.
Donload full Lenght Paper......
|
126-142
|
A Study On Employee Stress Management In Selected Private Banks In Salem. Ms. A. Sharmila and Ms. J. Poornima
Abstract:
The biggest killer is not AIDS or cancer but psychological problems, and we see that very high level of stress found in bank employees. The banking sector is becoming increasingly competitive around the country and the level of product and service quality being offered to customer is almost same. Hence, the bank management adds more responsibilities on the shoulders of employees, resulting into a pressure on them, with increasing psychological problems i.e. stress, strain, anxiety, depression, sleep disorders, etc. This situation, in which the employees have little or no sense of identification with their job, can cause an individual looking for another job or don't perform efficiently their own. Therefore, it is very difficult for management that how to maintains bank employees ability to develop successful performance with their organization under present conditions. In this juncture, the present study is undertaken to address specific problems of private bank employees related to occupational stress. Donload full Lenght Paper......
|
143-161
|
Elliptic Curve Cryptography With Secure Text Based Cryptosystem. Anju Gera, Dr. Ashutosh Dixit and Sonia Saini
Abstract:
The paper discusses public key cryptography such as ECC, RSA and also gives mathematical explanations on the working of these algorithms. The paper also proposed an ECC algorithm for secure text based cryptosystem. Donload full Lenght Paper......
|
162-176
|
Handling Of Synchronized Data Using JAVA/J2EE. Ankur Saxena
Abstract:
This paper proposes use of a Vector Data Structure mechanism for Human Resource Management System over the Web Application. Array is the static memory allocation. It allocates the memory for the same data type in sequence. The limitation with Arrays is that they have defined size and hence user cannot modify the array at run time according to their ease. In this study a new container has been used which will store its elements in an array, but the array will be resized when necessary to accommodate the new elements. An array that may be resized at run time is called a dynamic array, and any data structure that exhibits such dynamic behavior is said to be a dynamic data structure. We will deploy data structures that are dynamic but do not store their elements in dynamic arrays. In other words, the term dynamic data structure does not imply the use of a dynamic array but instead refers to run-time resizing. This application runs on any Web Server or Application Server. Donload full Lenght Paper......
|
177-194
|
Forensic Tools Matrix: The Process of Computer Forensic for Digital Evidence Collection. Dr. Jigar Patel
Abstract:
Cyber crime is in limelight due to increasing use of computer and its networks in day to day activity. As computer networks is heavily use not only for information exchange but financial and private data are also transferred via Internet, the Cyber crime increasing by high rate. Since, the evidence of such crimes are in digital forms it is challenging task for Cyber crime Investigator or police personals to collect the evidence against the Cyber criminals to prove the particular type of Cyber crime. This paper mainly focuses on how the Cyber crime takes place and how to collect the evidence against the Cyber criminals which is enough to prove the crime in the court. Donload full Lenght Paper......
|
195-209
|
Corporate Merger & Acquisition: A Strategic approach in Indian Banking Sector. Madhuri Gupta and Kavita Aggarwal
Abstract:
It is an inherent desire and need of every business to grow vertically and horizontally. Organic growth, that is development from within, is often slow and sometimes difficult. Competition is fierce, and companies must team up to survive in an industry where specialized knowledge is king. That is why there is an increasing trend towards Mergers and Acquisitions. A complete combination of two separate corporations involving in a business is referred as business merger. A merger in the official sense is said to be worth when both businesses dissolve and double their assets and convert into a newly created third unit. Acquisitions on the other hand are take-over. In this case one company actually buys another company. In take-over or acquisition generally a larger company buys a smaller one. Mergers and Acquisitions encourage banks to gain global reach and better synergy and allow banks to acquire the stressed assets of weaker banks. Donload full Lenght Paper......
|
210-235
|
Loss Reduction in Radial Distribution Systems Using Plant Growth Simulation Algorithm. V. Raj kumar, B. Venkata Ramana and T.Ramesh Babu
Abstract:
This paper aims to investigate the optimal switching sequence to maintain radial nature of distribution network for minimal active power losses and an improved voltage loads. The network configuration has been declared as a method for power and energy saving at nearly no cost. A network configuration optimization approach based on the plant growth simulation algorithm (PGSA), is specially suited to large-scale distribution systems. The change in Network configuration is achieved by closing or opening of switches in such a way that the radiality of the Network is maintained. An elegant design method of the decision variables, which describes the radial feature of the distribution network and considerably reduces the dimension of the variables in the solved model, is developed. Moreover, a detailed description on switch states further improves the efficiency of calculation. Donload full Lenght Paper......
|
236-254
|
Off Page Optimization Factors For Page Rank and Link Popularity. Dr. Yogesh Yadav
Abstract:
Off page optimization includes those techniques that can be done off the pages to increase traffic to your website. Off-page optimization are strategies for search engine optimization that are done off the pages of a website to maximize its performance in the search engines for target keywords related to the page content example of this are linking and placing keywords within links anchor texts (anchor texts are the labels of the links). Obtaining links are also considered off-page optimization, which include articles distribution, social networking, directory listings, blogging, link exchange, forum posting, etc. It is very important to note, though, that submitting your website to be linked to other websites randomly could hurt your website's ranking. You should only submit your website to directories or listings that are connected or are relevant to what you are offering to be able to properly achieve off-page optimization. Donload full Lenght Paper......
|
255-268
|
A Node Disjoint Multipath Routing Protocol in Mobile Ad Hoc Network. R.K. Kapoor, M.A. Rizvi, Sanjay Sharma and M.M. Malik
Abstract:
The applications of Mobile Ad hoc Network (MANET) are based on all-IP architecture. In MANET, the applications place stringent requirements on networks for delivering data packets reliably and quickly. Mobile ad hoc networks are characterized by a dynamic topology, limited channel bandwidth and limited power at the nodes. Because of these characteristics, paths connecting source nodes with destinations may be very unstable and go down at any time, making communication over ad hoc networks difficult. Typical applications may require higher reliability connections than that provided by a single link. Also, to fulfill certain quality parameters; presence of multiple node-disjoint paths becomes beneficial. Such paths aid in the optimal traffic distribution and reliability in case of path breakages. Donload full Lenght Paper......
|
269-285
|
VLSI Implementation Of Systolic Array For Discrete Waveelet Transform. Prof. Sonali R.Tavlare and Prof. P. R. Deshmukh
Abstract:
This paper presents a VLSI implementation of Systolic architecture for discrete wavelet transform (DWT).This architecture consist of Input delay unit, filter, register bank and control unit. This performs the calculation of high pass and low pass coefficients by using only one multiplier. This architecture have been simulated and implemented in VLSI. The hardware utilization efficiency has been more than 85%. The systolic nature of this architecture corresponding to a clock speed of N MHz. Optimized area, time and power obtained from this architecture for various devices. Donload full Lenght Paper......
|
286-309
|
A STUDY OF FEAR AND EMOTIONAL APPEAL IN ADVERTISEMENT. DR SANTOSH KUMAR TRIPATHI
|
328-336
|
NARRATIVE TECHNIQUES OF MULK RAJ ANAND
Chander Shekhar
|
337-338
|
CHALLENGES IN E-BANKING
Dr Ajai Kumar
|
339-343
|