Laptop tracking mechanism using GSM/GPS technology
In this paper we explain, the need of Organizations facing the real problem on physical, mechanism to protect their IT systems such as Laptops or notebooks and palmtaps. All IT systems ,have become difficult to protect because they can easily be stolen. Not only in companies but also in universities and colleges, social places it became a major problem for students, staff and people. Even though the laptops are password protected, that type of security is not providing any kind of use in finding the laptops once they are stolen. This is a method which gives better way in finding the laptops and also catching the thieves. In this paper, we are designing an anti-theft security system to track the location of the laptop. By using the GSM/GPS module connected to laptop the current location of the laptop is read and it is sent through message to the owner. By which it is possible to get back our laptops. As result we can reduce the laptop thefts.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Leydig cell tumors of the testis: A case report
Leydig cell tumors (LCTs) represent less than 3% of all testis tumors; they concern the interstitial tissue of the testis and occur at any age. They are part of the group of tumors called "sex cords and stroma" with Sertoli cell tumors. Only 7 to 10% of these tumors are malignant and are almost always seen in adults. We report a case found in a 40-year-old adult with a left testis tumor treated with orchiectomy.The diagnosis of malignancy may be difficult to establish and may be beyond histopathological examination, hence the importance of regular long-term follow-up.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Love and Chivalry in Persian Old Stories
Characterization and Type creation of male protagonists in Persian old stories is based upon traditions which are derived from ancient Iranian kingdom and religions. A survey based on six cases proves that there are three types ?of male characters in the ancient Iranian stories. The First type, is the mythical hero of the Sam dynasty in Sh?hn?meh which is an Indo-Iranian myth by origin. The second type is related to the characters who possess the Divine virtue or “Farr”,that belongs to ancient Iranian kings and the third type is the amorous wine loving “troubadour”.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Magic Square of Squares Proof
The proof will demonstrate the non-existence of a 3x3 magic square of squares. I remember reading a Scientific America article and at the bottom of the article was the link to an article which described this problem. To me it seemed bizarre that a problem that had such a clear start point and was based on a concept so simple to understand could have no proof. I decided then that I would prove that such a square could never exist. I was inspired that the problem had been unresolved such it was first asked in 1984 and that it could be dated back to great mathematicians such as Leonhard Euler. Like many people interested in maths I am in awe of much of the the work that Leonhard Euler did so to be able to solve a problem whose roots can be traced back to him was exciting. People have been working with magic squares for centuries and yet nobody has presented a proof showing why a 3x3 magic square comprised entirely of square numbers cannot exist. I decided that night that I would provide such a proof. I was unaware how complex the problem was and how complex the tools I would need to solve the problem were but it was the start of the most wonderful journey that I wish I could relive. For hundreds of years people have been constructing magic squares. The definition of a magic square which I will refer to extensively throughout this proof states the following. The sum of all the elements in the rows, columns and diagonals must be equal. Each element must be unique in any square and must be a natural number. Therefore when I say something has been proven false through the defintion of a magic square this is the definition I am referrring to. Well reading an article in Scientific America I came across something that rather astounded me. The article claimed that no one had found an example of a 3x3 magic square that contains only magic square numbers. Furthermore no onw has proven that such a square cannot exist. This type of problem can be traced back all the way to Leonhard Euler who is the first person known to construct a 4x4 magic square of squares. I have always been fascinated in mathematical mysteries as the world is written in the mathematics to understand mathematics is to understand the world. Therefore by proving something in maths I am making the world a little more interesting. In the proof that follows I will show why a 3x3 magic square of squares can never exist. I will do this in 10 parts. The first part will be a general proof as to why the lowest element must be the middle or the corner for any magic square of squares to exist. I will then show that the lowest element can never occupy the middle or the corner of any square without violating the definition of what a magic square is.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Metal and Antibiotic Tolerance Potentiality of Acidithiobacillus Spp and Pseudomonas spp from waste Dumps of bauxite and Magnesite mines
The investigation was focused on the isolation of metal tolerant and antibiotic sensitive bacteria (A. ferrooxidans from bauxite and P. aeruginosa from magnesite mine) from the waste dump of mine by using selective medium. These two organisms showed maximum metal resistant potentiality for the selected heavy metals (Mn, Zn, Fe, Cr, Cu and Hg) in the range of 20 to 100 mg/ml-1. The tolerance among the isolated bacteria on heavy metals were observed in order of Mn > Zn > Fe > Cr >Cu>. These organisms did not show effective tolerant to Hg. The minimal inhibitory concentration (MIC) of heavy metals (Mn, Zn, Fe, Cr, Cu and Hg) for the test bacteria were in the ranges of 50 to 200mg/ml-1. The antibiotic susceptibility of these two metal tolerant bacteria were analyzed by standard antibiotics, the results showed that most (8 antibiotics) of the antibiotics are sensitive except amphicillin and co-trimoxahole. The overall results indicate that the isolated metal tolerant bacteria would be very useful for the reclamation of mine soil without any hazardous effects.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Molecular clustering of microbial flora and bacterial degradation of textile dyes by isolates from contaminated soils
Environmental contamination by textile dye effluents is of greater concern nowadays. The use of biological process for its elimination is a convenient way to get rid of it. This study sought to explore the potential use of bacterial isolates from textile dye contaminated soil in the degradation of the dyes. Different optimizing parameters such as pH, temperature and concentration have been worked out to find out the effective degradation. The work involved isolation of isolates (S1,S2 and S3) for the degradation of three different dyes (Black B1, BlueNE2RL, and Red BS11) at different parameters such as pH (pH6, pH7 and pH8), Temperature ( Room temperature and Incubation temperature) and Concentration (5mg/l and 10mg/l). The results show varying degree of degradation under various optimizing conditions. The optimal conditions for the effective degradation for all three dyes were found to be at neutral pH and slightly acidic pH, at incubation temperature and at concentration of 5mg/l. Thus this study demonstrates means of developing a management strategy based on the biodegradation process for the effective removal of persistent textile dye.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Monitoring of nitrogenous compounds in Munzur and Pülümür River, tunceli, Turkey
In this study the concentration of Nitrogenous compounds were investigated in 6 stations on Munzur (three stations) and Pülümür River (three station) which placed at the Eastern Anatolia of Turkey between 2006-2010. Water pollution was discussed according to the amount of nitrate, nitrite and ammonium values. The results showed that the concentration of nitrate depends on increasing of anthropogenic activities and discharges of waste waters from sewerage systems during the summer term in Munzur River. Regarding of Nitrogen compounds, the concentration of nitrate showed the highest values while the ammonium and nitirite ions measured at the low values in all stations for both river. Mostly the concentration of nitrate showed the highest values in all seasonal terms during the study time intervals in all sampling stations. One-way ANOVA and Duncan's tests were used to determine the differences between stations during the seasonal variations. According to the tests there were no significant differences for nitrate levels between stations during the study term. In this study we pointed out that the water pollution that occurred because of Nitrogenous compounds could be result of agricultural activities in Munzur and Pülümür River 2006-2010.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Monitoring the Power Requirement of Wireless Sensor Networks in Non-Homogeneous Forest Environment
This paper describes the sensor nodes and its hardware constraints. This paper throws light over the energy issues of the sensor nodes while transmitting and receiving data over the distances and effects of attenuation due to several environmental parameters. This paper also gives the comparative analysis of received power at different heights of transmitter antenna.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Monte Carlo design for a new collimator of the prompt gammas Installation at Moroccan TRIGA reactor
The collimator is the most important part in the installation of the Prompt Gamma Activation Analysis (PGAA). This collimator will be installed around the lateral Channel of the Moroccan TRIGA MARK II research reactor. The main purpose of this work is using the Monte Carlo simulation via the MCNP5 code to design the new collimator of the prompt gammas installation, to determine the optimal thickness of the bismuth (Bi) filter for gamma radiation. The obtained results of the collimator design and its filter are analyzed and discussed.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Multiple biometric systems: design approach and application Scenario
Biometric technology has become a basis of an extensive array of highly secure identification and personal verification solutions in our world today. More importantly in the wake of heightened concern about security and rapid advancements in communication and mobility. Significant application areas of biometric systems include security monitoring, access control and authentication, border control and immigration, forensic investigation, telemedicine and so on. When a single trait is used in an application it is referred to as unimodal biometric, while combination of two or more sources or traits in an application is referred to as multiple biometrics. But biometric system that uses a single biometric trait for recognition has this propensity to contend with problems related to non-universality of the trait, spoof attacks, large intra-class variability, and noisy data. Besides, no single biometric trait can meet all the requirements of every possible application, hence the need for multiple biometric system to overcome the limitation of unimodal biometric. The new paradigm is robust against individual sensor or subsystem failures and spoof attack, as it is very difficult to spoof multiple traits simultaneously. In addition, the technological environment is very appropriate because of the widespread deployment of multimodal devices (PDAs, 3G mobile phones, Tablet PCs, laptops etc). The aim of this paper is to present an overview of multiple biometric systems, design approach and application scenario.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]