Presenting Appropriate Analytical Model Based on the Status of Tourism
Today, due to the effects of tourism activities in the economy of the tourist receptive areas on leaves, Great attention to this field of activity is focused. West of Islamabad city with great tourist potential and the potential remains for tourists unfamiliar, Therefore, tourist attractions in this city And planning with special geographical conditions appear to be necessary. For this purpose the paper uses a descriptive method and analytical and strategic models of SWOT, and field studies to determine the strengths, weaknesses, to provide a strategy to develop tourism opportunities and threats are discussed. After reviewing data collected barriers such as lack of facilities along with other attractions, Weak advertising, the neglect of infrastructure to attract tourists in this city and to provide guidelines for tourism development Use of modern methods of advertising west has been building facilities in the city of Islamabad. According to obtained results, strategies city near Islamabad, the West is aggressive strategies the authorities should try to take advantage of the strengths and opportunities and to take steps towards these strategies.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Production of Marine Microalgal Biomass for Biodiesel and Study the Efficiency of its Blends in Diesel Engines
Microalgae are considered as raw materials for biodiesel production as a part-substitute for diesel. Eight microalgal strains such as, Tetraselmis sp., Dunaliella sp., Chlorella sp., Synechocystis sp., Nannochloropsis sp., Gloeocapsa sp., Synechococcus sp. and Oscillatoria sp. having lipid accumulation potential were used in the present study. Estimation of Chlorophyll a and carotenoid contents in algal strains grown under red fluorescent light revealed that there was an increase in biomass and oil yield respectively. Dunaliella sp. and Tetraselmis sp. cultured in tubular photobioreactor showed a maximum biomass of 1.38 g/l and higher percentage (72.6 %) of lipid accumulation respectively. Fatty Acid Methyl Ester (FAME) analysis of algal biodiesel showed the presence of saturated fattyacids peaks. AO10D was found as best algal biodiesel blend among algal biodiesel blends tested for their fuel properties, performance in engine and emission characteristics.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Rainfall characteristic under meteorological drought condition using CDS analysis in Vindhyan zone (Mirzapur District), U.P
The occurrence of drought leads to reduction in reservoir and tank levels and depletion of soil moisture and groundwater. There is a need to develop suitable criteria for planning supplemental irrigation to crops for increasing and stabilizing crop yields during non-drought conditions, and minimizing crop damages during drought. The present study is aimed to study metrological drought and agriculture aspects of drought in Mirzapur districts the recurrence of drought in these parts of the country in recent years have caused unprecedented economic losses and great suffering to the affected areas. The study is based on the analysis of rainfall and critical dry spell (CDS). In this study, crop water requirement and irrigation requirement for the crop during the drought situation is also analyzed and introducing the supplemental irrigation under drought condition. In Mirzapur district the deficiency of annual rainfall is observed up to 16%. In the district approximately one out of every four to five year is drought year. The year 2007 and 2009 was most severely affected as most of the area of the district was under drought and major area of the district is found as drought prone. In the district on an average three critical dry spells (CDS) have been observed during the monsoon season.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Review of the meaning and concept of reality for Nietzsche
The issue of truth and reality is one of the main conscientious issues in philosophy. The propagators and interpreters are different in reality over the historical period. For example, in the ancient times, philosophers such as Plato were interpreted as truth by Elisa that is what reveals itself. But most philosophers have assumed the truth to be true but Nietzsche has a different interpretation of the truth, in his opinion, the truth is myth.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Rough fuzzy ideals in near-rings
The purpose of this paper is to introduce the idea of rough fuzzy sets in nearrings. We introduce the notion of rough fuzzy sets with respect to an ideal of a nearring which is an extended notion of an ideal of a ring and we derive some properties of the lower and upper approximations in a nearring.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Secure and Robust Cloud Storage with Cryptography and Access Control
Cloud computing is a new evolving paradigm to a wide range of users like individuals, businesses and governments to provide resources in an on-demand environment. Enterprises store their incredible abundance of data on cloud to reduce data management cost. In addition, an emerging class of entrepreneurs is taking advantage of clouds as they might not have enough finance to purchase resources or ensure the necessary security. As the data is stored on cloud service providers' servers, confidentiality, authentication and access control are the most challenging factors in data security. Cloud providers should provide adequate security measures on their data and applications. Cryptography access control architecture overcomes the issue of data security in cloud environment. In this paper, we illustrate a secure and robust cloud storage architecture by combining cryptography and access control with two layered encryption.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Security of Data in the Utilization of E-Government
Both the computer and the software and data essential elements of a system of information in the digital environment associated with e-government. Computer may be associated with devices and services in the communication network terminal ends or other accounts or specific network facilities. Computing network may be a LAN or private network extended the scope of the government department or ministry concerned as a network intranet, or wide area WAN network as extranet or international information network such as the Internet, may also be linked to external contact is open to any individual provider technological means that enable access to her. The aim of this research is the security of information systems, protection and availability of resources and its components and work their confidentiality and integrity. Where in the absence of adequate security systems and information and communication technologies, do not use all their capacities and energies. The absence or lack of security in a loss of confidence in the system to stop and not to make the most of it, making it a burden on the organization. On this basis it must protect the system and information from damage that can lead to system failures and loss dating back to their organizations and their staff. You can identify three main dimensions of the target of various information in security systems, (I) definition: who is allowed to enter the system? Must check it out through three main entrances (II) dependence: once you learn the rules of the real user, the natural next question is what allowed for this person? Thus, an accreditation process based access to resources for this user (iii) Management: representing management saving the user attributes, in addition to the security of a given resource definition. It includes on activities such as the exclusion of the advantages of the arrival of the user or employee leaving the service. The search results are in four axes task, first (Security Policy: The purpose of information security policy relates to provide appropriate guidance and administrative support to the security of the information and recommendation (II) Security organization: This dimension aims information security management focus in the organization (iii) the security of individuals: the purpose of the after the security of individuals to reduce the risk of human error, theft, embezzlement or misuse of facilities (iv) control of access to information). Concludes research is the establishment of political, regulatory and legal frameworks to address the matters relating to the dangers of security such as piracy and management of domain names and the protection of citizens, the development of information security policy and encourage the application and adaptation programs and records of e-government, strengthen the expertise and Practice better for the security of information systems through the development of guidance and technical standards on a large scale and use including is a global developer, organize public campaigns to raise awareness aims to improve public knowledge and understanding of the importance of information and intellectual property rights and the protection of security software.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Self awareness curiculum activities and effectiveness to youth
This article discusses the self-consciousness of youth in co-curricular activities forming their personality. In addition, this article also discussed the core curriculum which has been outlined by the Ministry of Education (MOE) to adolescents who are still studying in higher education institutions as well as the effectiveness of the curriculum in shaping the personality of adolescents including studies that have been done in connection with extra-curricular activities. This article also touched on the education system nowadays.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Sequence Stratigraphic Analysis of the Xp Field, Onshore Niger Delta, Nigeria
Sequence stratigraphic analysis carried out on the XP field, Greater Ughelli Depobelt, Niger Delta, revealed three sedimentary sequences within the intervals penetrated by three wells studied in the field. Well logs and biostratigraphic data integrated helped in the identification of three major Maximum Flooding Surfaces (MFS1, MFS2, MFS3) recognized between the intervals of 3840- 3080m (aged 31.3- 26.2Ma) and three sequence boundaries designated SB1, SB2 and SB3, between 4232m and 3140m (aged 32.4 – 27.3Ma). The Maximum Flooding Surfaces were recognized using intervals containing high abundance and diversities of three index fossils (Uvigerinella 8, Bolivina 27 and Alabamina 1) which represent the three regional marker shales identified in the field. The erosional surface coincides with intervals that are barren in faunal activity and also corresponds with the coastal deltaic paleobathymetric depth interpreted as Sequence Boundaries. The sequences depict sediments that were deposited between Early to Late Oligocene period in water depth ranging from coastal deltaic to neritic environments. Three depositional patterns resulting from regression and transgression recognized include progradation, retrogradation and aggradational packages with associated systems tracts. The systems tracts form good reservoirs with prospects in the field.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Spatial information for determination of irrigable lands in Eastern Rwanda
The present study aimed to map irrigable lands in Bugesera Agro Ecological Zone (AEZ) in the Eastern Province of Rwanda, using spatial information’s. The related Concerns were to determine the suitable area for irrigation that can include all different parameters which influence irrigation. The methodological approach consisted of processing Aster Landsat and DEM; gathered by Radar Satellite acquired at CGIS/NUR, using appropriate packages-software ILWIS 3.3, Erdas8.7 and ArcGIS 9.2. Satellite image was used to determine land use and land cover classification of the study area and the DEM to determine slope classification. The results showed maps that are describing different type of layers classified according to purpose of irrigation, slope, water proximity, percentage of clay and sand and type of land use. Those maps helped to produce a model design that conducts us to determine the most suitable area for irrigation. The model designed would be used as a planning tool to optimize agriculture in the Eastern Region of Rwanda.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]