Global

This paper presents a comparative study of Frequency Hopping Spread Spectrum and Direct Sequence Spread Spectrum techniques. The Transmitter and Receiver have been implemented using MATLAB. Maximum-length sequences, Gold Sequences and Walsh Codes have been used as the pseudorandom codes for transmission. Finally received signal have been evaluated on the basis of Bit Error Rate for all the used codes.
Education is considered a key variable not only for widening intellectual horizon of the individual but it also helps a person to make use of coherent and scientific approaches to different problems. But eventually there are marked differences in the literacy rate among the sexes in our country. The differential literacy rate among men and women indicates the existence of discriminatory practices against women. In terms of literacy rate viz. age, sex and rural/urban background, it is evident that a female child is neglected and denied the basic civic amenities. Regarding educational status, empirical researches point out that the level of literacy among women in general and Scheduled Caste women in particular are significantly low. The reasons are varied. The socio- economic factors like lack of awareness on the relevance of education, gender disparity, lack of incentive and low paid laborious occupations etc., causes poverty and illiteracy which in effect also results in gender gap in literacy.
Unlike in some other African countries, Botswana’s political opposition was never outlawed after independence in 1966. However, the opposition has suffered internal instability that we argue prevented it from dislodging the incumbent Botswana Democratic Party (BDP) from power. This article argues that internal instability within the opposition Botswana National Front (BNF) was primarily tied to the absence of clear party rules, to incumbent leaders who personalised party power and sought to choose their own successors and refused to compromise with internal rivals. The article also argues that internal stability in the ruling Botswana Democratic Party was tied to a culture of adhering to party rules, enabling smooth change of leaders, mutuality between rival factions and mutual compromises between internal rivals.
This report does a Comparative Analysis of different Financial Products of the Reliance Money company with its nearest competitor and develops a Hypothesis for the same to check if there is any advantage of Investment Avenue in Reliance Money. 1. Equity : In Equity Trading, the nearest competitor of Reliance Money is ICICI. The methodology employed for comparison is Factorial Design (Two-way ANOVA) under Statistical Hypothesis. Here, the Null Hypothesis (H01) is accepted which states that Profits generated using Tips & Techniques of Reliance Money in equity market are equal to the profits generated using Tips & Techniques of ICICI Securities. It signifies an excellent performance of the company in this competitive market. 2.Mutual Funds : In Mutual Funds, the nearest competitor of Reliance is ICICI Prudential. The methodology employed for comparison is Factorial Design (Two-way ANOVA) under Statistical Hypothesis. Here the Null Hypothesis (H02) is accepted which states that Returns from investment in Mutual Funds of Reliance Securities is greater than the returns from investment in Mutual Funds of ICICI Prudential in fluctuating market scenario. Also using Multiple Regression, we find out that Sharpe ratio is the most important parameter for observing Expected Returns. Higher the Sharpe Ratio, Better would be the expected returns. Thus, for sure Reliance Money enjoys a competitive advantage over its rivals as it provides cheap & superior services to its investors in addition to customer satisfaction and better returns. 3. Insurance : In Insurance schemes, the nearest competitors of Reliance are TATA and LIC. The methodology employed for comparison is Chi-Square Test of Independence under Statistical Hypothesis. Here, the Null Hypothesis (H01) is accepted which states that Investment tendency of customers in Insurance is independent of company. A Low value of Contingency Coefficient (C=0.0000575) which measures the strength of Association further verifies the Indepen
The present study aimed to analyze the pervasiveness of defensive communication climate in higher education institutions in Pakistan. In this regard an attempt was made to investigate the six elements of defensive communication climate in the higher education institutions in Pakistan. The study also taken into account the differences between public and private sector institutions, with regard to extent up to which defensive communication climate prevails in these institutions. For the present study 5 public and 3 private sector universities located in Rawalpindi and Islamabad were selected as the sample clusters. From the selected universities 20% of the faculty members of each department were taken as respondents / sample. For collection of data adapted form of Communication Climate Inventory and informal Interviews were used. Data analysis revealed that on the whole there was a considerable extent of defensive communication climate in public sector universities. But very interestingly some of the elements of defensive communication climate for example neutrality, strategy and evaluation were present to a significant extent in private sector universities as well. Majority of the respondents pointed out that elimination of defensive communication climate was crucial for assuring quality in the higher education institution. Therefore no- defensive communication climate be established, strengthened and maintained to gear efforts towards quality assurance and enhancement. It was suggested that seminars and forums be organized to discuss the issue and action oriented research be conducted to find out the factors creating defensive communication climate.
In this fast developing world, the interchange of information is playing a key role. Everything needs information and processes them. This interchange of information needs an authentication, confidentiality and integrity. The security of information is provided many algorithms. There are vast numbers of algorithms for symmetry key cipher. All these algorithms have used either complicated keys to encrypt the plain text to cipher text or a complicated algorithms used for it. The level of security of algorithms is dependent on either number of iterations or length of keys. A comparative study have been made with RSA, DES, IDEA, BAM and other algorithms with frequency distribution, bit ratio to check the security level of proposed algorithm. Finally, a comparison has been made for time complexity for encryption of plain text and decryption from cipher text with above existing algorithms.
Despite extensive efforts in promoting condom use, men still engage in risky sexual behaviors due to certain myths and misconceptions. Considering the threat posed by HIV to the development of Africa, this study investigates condom myths and misconceptions among 600 adult men in a West African University population. The mean age was 24 years, about 70% of the respondents were between 19-24 years. About 60% of men had ever had sex, a little over half knew about condoms and four out of five men had ever used a condom. More than half (60.8%) of men were of the view that the proper use of a condom protects against HIV and about one-fifth (majority of who had ever had sex) perceived the use of a condom as inferior sex. The study revealed that condom use was associated with condom myths and misconceptions (condom sex is inferior; condom reduces pleasure, condom reduces erection). However, most men would use a condom in order to prevent a partner from refusing sex. Various governments and civil society organizations are to contribute towards the expansion of protective behaviour among men and women through condom promotion.
Today’s world is digital world. Nowadays, in every field there is enormous use of digital contents. Information handled on INTERNET and MULTIMEDIA NETWORK SYSTEM is in digital form. The copying of digital content without quality loss is not so difficult .Due to this , there are more chances of copying of such digital information. So , there is great need of prohibiting such illegal copyright of digital media. Digital watermarking (DWM) is the powerful solution to this problem. Digital watermarking is nothing but the technology in which there is embedding of various information in digital content which we have to protect from illegal copying. This embedded information to protect the data is embedded as watermark. Beyond the copyright protection, Digital watermarking is having some other applications as fingerprinting, owner identification etc. Digital watermarks are of different types as robust, fragile, visible and invisible. Application is depending upon these watermarks classifications. There are some requirements of digital watermarks as integrity, robustness and complexity.
Democracy, governance process and the accompanying politics in real sense largely consist of the examination and maintenance of the ways in which constitutional, political and administrative institutions, social forces and movementss in a particular society interact with each other; of limits upon the extent to which stable constitutional modes of behavior can be developed and; of the effects they can have on molding behavior for a productive and mutually beneficial holistic existence of the state. This has been largely so and, still expected of the state. This has been Largely so and, still expected to be so, in that under the (federal) governmental system, each citizen is represented by at least three: federal; state and;local governments as well as a myriad of other interests.
The temperature of a hotplate used for prebaking, post baking, dehydration baking etc. changes with time. But, in baking purpose the temperature should remain constant. This work concerned with the designing a new and cost-effective microcontroller based PWM temperature controller to control the temperature of a hot plate. PWM controller has been selected because it has faster and accurate response than the conventional on-off controller. Here, the microcontroller senses the zero crossing of the line voltage and generates a pulse for every half-cycle. The width of the pulse is adjusted to change the firing angle of a TRIAC. The TRIAC is interfaced with the microcontroller circuit using an opto-coupler. The temperature of the hot plate can be increased or decreased using two push-button switches. The preset temperature will be saved in EPROM of microcontroller and displayed on an LCD display. The temperature of the hot plate is sensed by a thermocouple and fedback to the microcontroller. The microcontroller keeps the temperature constant by changing the firing angle of the TRIAC. The system has been constructed and tested successfully.