Global

Qena-Quseir shear zone area is located at the central part of the Eastern Desert covering area of about 9460 Km2. This area is mainly covered by basement rocks however there are parts covered by sedimentary rocks ranging in age from Upper Cretaceous to Quaternary. In this research, airborne gammaray spectrometric data is used to refinement of the mapped surface geology depending on the radioelements content between lithological assemblages. The gamma-ray data is also used for studying the distribution of the radioactive elements and determination of anomalous zones of uranium. The data were collected by Aeroservice department, Western geophysical company of America along flight lines oriented in a NE-SW direction with 1.5 Km line spacing and along tie lines oriented in NW-SE direction with 10 Km line spacing. Radioelements maps shows three levels of concentrations. The high level is related to younger granite, Duwi formation and some parts of Dokhan volcanics whereas the lowest level is related to metavolcanics. Radioelements ratio map shows that the high level is compatible with Duwi formation, Younger granite and some parts of Dokhan volcanics. The radioelement composite image map display that the light zones is correlated with younger granite, Duwi formation and parts of Dokhan volcanics. Normality and Chi-Square (χ2) tests were applied to construct the interpreted radiometric lithologic unit (IRLU) map depending on the total count radiometric survey data. After applying normality and Chi- Square (χ2) tests, it is found that twenty-five rock units have normal distribution and eight rock units don’t have. The rock units which is found to obey non-normal distribution are divided into two subunits. In this study, significant locations of eU anomalies are defined on the basis of calculation of probabilities, where their data differ significantly from the mean background, as defined by the data themselves, and at certain levels of probabilities these differences w
WBASN is an effective solution that has been proposed in terms of improving the solutions and there are varied benefits that have been achieved from the usage of WBASN solutions in communication, healthcare domain. From the review of stats on rising number of wireless devices and solutions that are coming up which is embraced by the people as wearable devices, implants for medical diagnostic solutions, etc. reflect upon the growing demand for effective models. However, the challenge is about effective performance of such solutions with optimal efficiency. Due to certain intrinsic factors like numerous standards that are available, and also due to the necessity for identifying the best solutions that are based on application requirements. Some of the key issues that have to be considered in the process of WBASN are about the impacts that are taking place from the wireless medium, the lifetime of batteries in the WBASN devices and the other significant condition like the coexistence of the systems among varied other wireless networks that are constituted in the proximity. In this study, scores of models that has been proposed pertaining to MAC protocols for WBASN solutions has been reviewed to understand the efficacy of the existing systems, and a scope for process improvement has been explored for conducting in detail research and developing a solution.
Opinion mining and sentiment analysis methods has become a prerogative models in terms of gaining insights from the huge volume of data that is being generated from vivid sources. There are vivid range of data that is being generated from varied sources. If such veracity and variety of data can be explored in terms of evaluating the opinion mining process, it could help the target groups in getting the public pulse which could support them in taking informed decisions. Though the process of opinion mining and sentiment analysis has been one of the hot topics focused upon by the researchers, the process has not been completely revolutionary. In this study the focus has been upon reviewing varied range of models and solutions that are proposed for sentiment analysis and opinion mining. From the vivid range of inputs that are gathered and the detailed study that is carried out, it is evident that the current models are still in complex terms of evaluation and result fetching, due to constraints like comprehensive knowledge and natural language limitation factors. As a futuristic model in the domain, the process of adapting scope of evolutionary computational methods and adapting hybridization of such methods for feature extraction as an idea is tossed in this paper.
Spreadsheets are presented which can help students to understand the the vector representation of velocity, acceleration and force, and the understanding of the radius of curvature. The examples include: sinusoidal curve, cardioid, Neile’s parabola, motion of a charged body on which act a combination of magnetic and electric field, a body sliding on a rotating disk.
Cloud computing has become a revolutionary development that has changed the dynamics of business for the organizations and in IT infrastructure management. While in one dimension, it has improved the scope of access, reliability, performance and operational efficiency, in the other dimension, it has created a paradigm shift in the way IT systems are managed in an organizational environment. However, with the increasing demand for cloud based solutions, there is significant need for improving the operational efficiency of the systems and cloud based services that are offered to the customers. As cloud based solutions offer finite pool of virtualized on-demand resources, there is imperative need for the service providers to focus on effective and optimal resource scheduling systems that could support them in offering reliable and timely service, workload balancing, optimal power efficiency and performance excellence. There are numerous models of resource scheduling algorithms that has been proposed in the earlier studies, and in this study the focus is upon reviewing varied range of resource scheduling algorithms that could support in improving the process efficiency. In this manuscript, the focus is upon evaluating various methods that could be adapted in terms of improving the resource scheduling solutions.
Wireless Sensor network routing protocols are prone to various attacks as these protocols mainly provide the function of routing data towards the sink. LEACH is a one of the routing protocol used for clustered implementation of wireless sensor network with Received Signal Strength based dynamic selection of Cluster Heads. But, as with other routing protocols, LEACH is also prone to HELLO flood attack when the malicious sensor node becomes the Cluster Head. Cryptographic and non-cryptographic approaches to detect the presence of HELLO flood attack also exist but they lack efficiency in some way. In this paper, an efficient protocol is proposed for the detection and prevention of HELLO Flood attack in wireless sensor network. Cluster heads are vulnerable to various malicious attacks and this greatly affects the performance of the wireless sensor network. Cryptographic approaches to prevent this attack are not so helpful though some non-cryptographic methods to detect the HELLO Flood attack also exist but they are not too efficient as they result in large test packet overhead. In this paper, we propose HRSRP (Hello flood attack Resistant Secure Routing Protocol) extension to LEACH protocol so as to protect the cluster head against Hello flood attack. HRSRP is base on encryption using Armstrong number and decryption using AES algorithm to verify the identity of cluster head. The proposed technique is implemented in NS2, the experimental results clearly indicate the proposed technique has significant capability for the detection of hello flood attack launched for making the malicious node as the cluster head.
Police say alcohol, drugs and speed are the three major factors that cause collisions, we thought that it would be insightful to analyze the collision data to ensure the correctness of this conclusion; and also to get further information like what age groups were involved, in what areas have accidents occurred, what were the reasons behind collisions, etc. These experiences can possibly make overall population mindful of the reasons for crashes created by impacts. To analyze more than hundred thousand records we adopted Spark for faster processing of this massive data set. In this paper, we are presenting facts based on data and analytics which lead to conclusions like the number of collisions decreased between 2009 and 2013, Females involved in collisions were much less than males, etc. Moving ahead in our research, we addressed complex analytics like areas near CalStateLA more prone to collisions, brands of cars more involved in collisions and which specific type of collision was most observed.
Armed forces are kept by the states for purposes of defense. Despite various claims, armies never become redundant. The need for protection of the boundaries, even though, a seemingly “old-fashioned” idea, is always there as a sheer reality to reckon with; for any given country. Being exposed to aggression is a sad probability, which may occur suddenly and hit the fate of any nation. A lot of philosophical sentences about the lacking of human reasoning in soldierly ways have also been uttered. Now, a soldier differs from a civilian and the transformation of the latter being into the former one is a radical social metamorphosis, including moral and physical factors. From an anthropological viewpoint, it is a full initiation ritual or passage rite. This fact alone renders all martial activities entirely rational and compatible with logic.
One of the very effective, functional and inexpensive methods in education involves the simulations of all sorts. Virtual learning is not necessarily complicated or definitely associated with computer technology; rather, it is also possible through employment of simple materials. Even a didactic fairy tale may in that respect be considered a s a commencement and a useful example, far from deserving underestimation.
The demand of renewable energy (alternative energy sources) is increasing day by day as our non renewable sources have started depleting. The other reason for increased demand is that it has a cleaner, easy setup and has a very low cost of maintenance during its operation. Due to which, solar powered equipments and appliances are making its way into various sectors of our day to day life. This research paper deals with the scenario that a storage or battery is needed in order to harness the solar energy when the sunlight is available and supply it in vice versa conditions. For this, a cost effective system is built which charges a battery with the help of solar panel and protection is given to the battery in case of overcharge, deep discharge and under voltage condition. The block diagram, circuit diagram, hardware design are discussed in the paper.