Global

Some optimal incomplete block designs for complete diallel cross method 4 are known in literature. These designs require several replications for each cross and thus consume more resources such as experimental units, experimental material, time etc. So, there is a need to evolve designs which require minimum possible replications of parental lines. In this paper a method of construction of these designs is proposed by using mutually orthogonal Latin squares. These designs are connected for cross effects and perform well whencompared to connected and not connected optimal designs reported by Dey and Midha (1996), Chai and Mukerjee (1999) and Gupta and Kageyama (1994), respectively.
This paper is an exploration of the cultural values of the younger, elite segment of Afghani culture using the Hofstede-Bond typology. Afghanistan was not included in Hofstede’s original or subsequent studies, and there is a dearth of empirically-based literature on the cultural classification of this country. The results of this study indicate that this segment of the Afghanistan population is low in power distance, highly masculine, slightly individualistic, somewhat accepting of uncertainty, and possesses a short term orientation towards time. The paper also compares these values with other cultures in the region and beyond, and explains how these cultural differences could hold some promise for this war-torn country. Implications for economic and political development are discussed.
This paper reviews existing SAT algorithms and proposes a new algorithm that solves the SAT problem.The proposed algorithm differs from existing algorithms in several aspects. First, the proposed algorithm does not do any backtracking during the searching process that usually consumes significant time as it is the case with other algorithms.Secondly, the searching process in the proposed algorithm is simple, easy to implement, and each step is determined instantly unlike other algorithms where decisions are made based on some heuristics or random decisions. For clauses with three literals, the upper bound for the proposed algorithm is O(1.8171n). While some researchers reported better upper bounds than this, those upper bounds depend on the nature of the clauses while our upper bound is independent of the nature of the propositional formula.
The Nobel Prizes were established by Alfred Bernhard Nobel for those who confer the "greatest benefit on mankind", and specifically in physics, chemistry, peace, physiology or medicine, and literature. In 1968 the Nobel Memorial Prize in Economic Sciences was established. However, the proceedings, nominations, awards, and exclusions have generated criticism and controversy. The controversies and influences related to the Nobel Physics Prize are discussed. The 1993 Nobel Prize in Physics was awarded to Hulse and Taylor, but the related theory was still incorrect as Gullstrand conjectured. The fact that Christodoulou received honors for related errors testified, “Unthinking respect for authority is the greatest enemy of truth” as Einstein asserted. The strategy based on the recognition time lag failed because of mathematical and logical errors. These errors were also the obstacles for later crucial progress. Also, it may be necessary to do follow up work after the awards years later since an awarded work may still be inadequately understood. Thus, it is suggested: 1) To implement the demands of Nobel’s will, the Nobel Committee should rectify their past errors in sciences. 2) To timely update the status of achievements of awarded Nobel Prizes in Physics, Chemistry, and Physiology or Medicine. 3) To strengthen the implementation of Nobel’s will, a Nobel Prize for Mathematics should be established.
Groundnut is a self pollinated crop grown worldwide for its edible oil and vegetable protein. Production of quality seed not only involves technical skill, labour and finance but the produced seed needs to be properly saved until next planting time. Hence the experiment was carried out to study the influence of fumigants and number of fumigation on seed quality parameters during storage. The results revealed that, groundnut ssed fumigated with ethylene dibromide at 30 and 90 days after harvest retained satisfactory germination (70%) and higher values for all seed quality parameters up to six months, whereas the seeds fumigated with aluminium phosphide for four times recorded lowest groundnut beetle population at the end of ten months of storage.
This paper presents a design of secure and economical (low cost) way of GPRS based fully automated energy metering system that measures and transmits the total electrical energy consumption to main server using general packet radio service (GPRS) technology provided by GSM networks and also present how the meter reading, disconnection and reconnection can be controlled from server end. The proposed EGFAEM system consist of four main parts: Energy Meters, Communication part over GPRS, Server and Management part and consumer end for billing and payment. A single phase energy meter prototype has been implemented to provide measurement up to 40A load current and 230V line to neutral voltage. Communication part is implemented by GPRS module and microcontroller, sever and consumer end are implemented in web server.
Internet Protocol (IP) trace back is the enabling technology to control Internet crime. In this paper, we present novel and practical IP traceback systems which provide a defense system with the ability to find out the real sources of attacking packets that traverse through the network. IP traceback is to find the origin of an IP packet on the Internet without relying on the source IP address field. Due to the trusting nature of the IP protocol, the source IP address of a packet is not authenticated. As a result, the source address in an IP packet can be falsified (IP address spoofing). Spoof IP packets can be used for different attacks. The problem of finding the source of a packet is called the IP traceback problem. IP Traceback is a critical ability for identifying sources of attacks and instituting protection measures for the Internet. Most existing approaches to this problem have been tailored toward DDoS attack detection.
Now a day’s a number of manufacturing firms in developing countries do not practice affordable, efficient and user friendly inventory management tools which has been identified as a major cause of high inventory cost for adequate planning. This study focuses on the development of Material Requirements Planning (MRP) software with programming language C that can be used by the local industries for inventory management in a job shop manufacturing environment. An algorithm has been developed to understand the MRP processing logic. A manual method of calculation to solve MRP problem has also been shown. Evaluation tests of the software were carried out using various products ranging from those with simple structure of single product to complex structure. The software was shown to be user friendly and allow for easy data input and output to be saved and retrieved for future planning. The input process of the software has been shown step by step. The output of the program shows the time-phased requirements for assemblies, parts and raw materials as well as the missing deliveries and time required to meet the missing deliveries.
In this paper we present a technique to extract features from a document image which can be used in machine learning algorithms in order to recognize characters from document image. The proposed method takes the scanned image of the handwritten character from paper document as input and processes that input through several stages to extract effective features. The object in the converted binary image is segmented from the background and resized in a global resolution. Morphological thinning operation is applied on the resized object and then the technique scanned the object in order to search for features there. In this approach the feature values are estimated by calculating the frequency of existence of some predefined shapes in a character object. All of these frequencies are considered as estimated feature values which are then stored in a vector. Every element in that vector is considered as a single feature value or an attribute for the corresponding image. Now these feature vectors for individual character objects can be used to train a suitable machine learning algorithms in order to classify a test object. The k-nearest neighbor classifier is used for simulation in this paper to classify the handwritten character into the recognized classes of characters. The proposed technique takes less time to compute, has less complexity and increases the performance of classifiers in matching the handwritten characters with the machine readable form.
The main research objective of this paper is to detecting object boundaries in outdoor scenes of images solely based on some general properties of the real world objects. Here, segmentation and recognition should not be separated and treated as an interleaving procedure. In this project, an adaptive global clustering technique is developed that can capture the non-accidental structural relationships among the constituent parts of the structured objects which usually consist of multiple constituent parts. The background objects such as sky, tree, ground etc. are also recognized based on the color and texture information. This process groups them together accordingly without depending on a priori knowledge of the specific objects. The proposed method outperformed two state-of-the-art image segmentation approaches on two challenging outdoor databases and on various outdoor natural scene environments, this improves the segmentation quality. By using this clustering technique is to overcome strong reflection and over segmentation. This proposed work shows better performance and improve background identification capability.