Simulation of Brain Nervous System Based on Complex Networks
The aim of the paper is to simulate the brain nervous system based on complex networks. Complex networks provides a new view for brain network, and the brain nervous system can be abstracted to a network. In this paper we delineate the simulation process to brain nervous system by complex network and computer algorithm. By the logical definition, we can abstract the node and edge to set up the brain nervous system networks with the different algorithms. The simulation results imply that it is feasible to simulate brain nervous system network based on complex networks with brain anatomical and functional architectures.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Social Demand Approach: A Vital Tool in the Achievement of Cost Effectiveness in Nigeria’s Basic Education
This paper examines some issues in the use of the social demand approach (SDA) in educational planning and development with a view of facilitating cost effectiveness in the provision of universal basic education. The paper adopts a descriptive approach that involves the review of statutory documents, research reports and other related literature. These various secondary sources of information show that basic education programme in Nigeria is negatively skewed in terms of addressing issues of unemployment and poverty as well as the resource wastage that results from youth restiveness. The paper concludes that achieving self-sufficiency in the production of middle and high level manpower that is relevant to the economy will be difficult if practical training in relevant vocational skills is not started at the basic school level, from primary one, in the course of developing literacy and numeracy skills. It calls for a de-emphasis of book learning with greater focus on the development of practical skills in the provision of education as a social service directed at addressing the issues of illiteracy, unemployment and poverty as well as youth restiveness. It recommends the use of educational toys, regular field trips and more funds to make the UBE programme more functional in arresting youth unemployment, poverty and restiveness. Key words: cost effectiveness, skill training, and economic relevance.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Study of Vibration in Milling Process
Milling operates on the principle of rotary motion. A milling cutter is spun about an axis while a workpiece is advanced through it in such a way that the blades of the cutter are able to shave chips of material with each pass. Milling processes are designed such that the cutter makes many individual cuts on the material in a single run; this may be accomplished by using a cutter with many teeth, spinning the cutter at high speed, or advancing the material through the cutter slowly. Most often it is some combination of the three.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Studying the Influencing Factors on Online Brand Trust
This study empirically investigated the factors that influence web brand trust specifically regarding online service of Adineh Book Store in Iran. To conduct an empirical investigation a survey of 449 customers was conducted using a questionnaire that its reliability by using Cronbach's Formula was examined. The Pearson’s Correlation was used to test the hypotheses. The results show that security, privacy, brand name, word-of-mouth, good online experience and quality of information directly affect the online brand trust.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Synthesis, Characterization and Antimicrobial Activity of Some Novel Veratric Derivatives
Novel bioactive molecules are designed by using molecular hybridization techniques which is based on the recognition of pharmacophoric sub-unities in the molecular structure of two or more known bioactive derivatives. Adequate fusion of these sub-unities, lead to the design of new hybrid architectures that maintain pre-selected characteristics of the original templates. All the designed molecules were than synthesized and evaluated for their antimicrobial activity.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Synthesis, Characterization and Antimicrobial studies of metal complexes of 1-[2’-Chloro-5’-Sulphophenyl]-3-Methyl -4-Azo – [2”-Carboxy-5”-Sulphonic acid]-5-Pyrazolone and Their Transition Metal Chelates
1-[2’-Chloro-5’-Sulphophenyl]-3-Methyl-4-Azo–[2”-Carboxy-5”-Sulphonic acid]-5-Pyrazolone was prepared by diazotization of 4-sulphoanthranilic acid and then coupling with 1-[2’-Chloro-5’-Sulphophenyl]-3-Methyl-5-Pyrazolone in alkaline medium. It was characterized by elemental analysis and spectral studies. The transition metal chelates of the same were prepared with Cu2+, Ni2+ , Co2+ , Mn2+ and Fe3+ and characterized by IR spectral studies and physico chemical studies. The antimicrobial activity of ligand and its metal chelates were screened against various gram-positive (+) and gram-negative (?) organism. The results show that all these samples are more or less active agents against various organisms.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Systematic Review of research studies analysing Rashtriya Swasthya Bima Yojana in India
Rashtriya Swasthiya Bima Yojana is a health insurance scheme for the poor in India. The scheme rolled out on the 1st of April 2008, it covers the hospitalization expenditure of the poor people. According to the United Nations and International Labour Organization the scheme is one of the best 18 insurance schemes of the world. This article reviews the progress of the scheme, gender analysis, outpatient initiative by the scheme, new initiatives by the scheme, various issues in the implementation and suitable recommendations in the light of the study findings.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Teaching Phonetic Symbols Explicitly and Implicitly
If we have a look at the history of the English Language we can understand that the sounds of English are not uniform since English is an unphonetic language. There is no relation between the letter and the sound. This paper aims at investigating the effect of pronunciation teaching of English to high school students. More specifically, it examines to realize whether learners can learn phonetic symbols better explicitly or implicitly. In order to do this, two different teaching methods were implemented, which resulted in having two different experimental groups; an explicit vs. an implicit one. The former received explicit teaching of English pronunciation through a variety of activities while the latter was taught implicitly via the use of recasts. The results showed that the explicit form of teaching is better than implicit one.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Voluminous Intraorbital Wood Foreign Body: about a Case
A 6-years-old girl was admitted in the ophthalmology emergency room for right penetrating intraorbital trauma by a voluminous piece of wood. The intraorbital trajectory was analyzed by CT scan and 3D images reconstruction. The wood foreign body has crossed upper and lower eyelids and then has emerged from the right nasal cavity through the medial canthus. The eyeball was intact. Extraction of the fragment associated with an adapted antibiotic treatment led to clinical improvement with complete recovery. This trauma, despite its serious aspect, fortunately did not have functional consequences.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A Critical Survey of Personal Cloud
From time to time, there is the need for a survey of different forms of computer services delivery. Personal Cloud computing is a technology which satisfies customers dynamic resource demands and makes the job easier to work on all platforms for the user. Cloud computing is the delivery of computing services over the Internet. Security is the main criteria when working on cloud, as the third party involvement will always be there. It is therefore recommended in this paper that secure architecture should be used to provide services through the cloud. The extensive use of virtualization in implementing cloud infrastructure brings unique security concerns for customers or tenants of a personal cloud service. It is observed that virtualization alters the relationship between the OS and underlying hardware -be it computing, storage or even networking. Hence, identified methods show how to overcome the security issues of the cloud.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]