Advanced quantum concepts through soft computing using matlab
The behavior of electron and the nucleons are simulated through soft computing using MatLab language meant for Science and Engineering. Since the electrons and nucleons movement confined around nucleus and within the nucleus, to visualize the behavior the coordinates were taken with incremental value of 0.001 and less to visualize the behaviour. The graphical output shows the path and tendency of electron movement around the nucleus of Hydrogen atom. These curves show that the energy of electron is not constant but increases with the principal quantum number(n) and azimuthal quantum number(l).Some quantum mechanical problems have been solved and reported.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Efficient Biometric for Human Identification and Verification through Iris Recognition
A biometric system provides automatic identification of an individual based on a unique feature or characteristic possessed by the individual. Iris recognition is regarded as the most reliable and accurate biometric identification system available. Most commercial iris recognition systems use patented algorithms developed by Daugman, and these algorithms are able to produce perfect recognition rates. However, published results have usually been produced under favorable conditions. The work presented in this paper involved developing an iris recognition system in order to verify both the uniqueness of the human iris and also its performance as a biometric. For determining the recognition performance of the system one databases of digitized grayscale eye images were used. The iris recognition system consists of an automatic segmentation system that is based on the Hough transform, and is able to localize the circular iris and pupil region, occluding eyelids and eyelashes, and reflections. The extracted iris region was then normalized into a rectangular block with constant dimensions to account for imaging inconsistencies. The Hamming distance was employed for classification of iris templates, and two templates were found to match if a test of statistical independence was failed. The system performed with perfect recognition on a set of 450 eye images; however, tests on another set of 340 images resulted in false accept and false reject rates of 0.005% and 0.238% respectively. Therefore, iris recognition is shown to be a reliable and accurate biometric technology.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Searchability a domain quality factor for web software applications
As organizations become aware of the strategic importance of e-commerce they will also become aware of the need of quality Web sites. In early years the World Wide Web was originally designed to present information to Web surfers using simple sites that consists of hyper linked text. But, Modern Web applications run large-scale software applications for e-commerce, information distribution, entertainment, and numerous other activities. The factors that constitute software quality in traditional data processing are well defined. However, it is necessary to have a full understanding about the quality in the context of World Wide Web. This paper identifies a new quality factor, searchability for the World Wide Web with the checklist of enablers. This factor enables the Web site developers and evaluators to create quality Web sites.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Sharon - agent based service middleware for e-governance: a systematic web examination based approach using Christina ontology
Over the past few years, semantic web service and multi agent approach has been used successfully in the development of E-Governance. Such a hybrid approach can be considered as an effective approach for the development of predictive modeling in complex e-governance systems. This paper descript a novel approach for the Advanced Semantic Web Service and Multi-Agent based middleware to solve the problems in like MIS Advanced Integrated system interoperability, Sharon advanced system operation research complex Integration, available resource sharing integration of heterogeneous data. This approach is useful for the construction of regional based E-government.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
To study the difference in academic achievement of higher secondary school students on the basis of emotional intelligence
Present study is an attempt to study the difference in academic achievement of higher secondary school students on the basis of Emotional Intelligence and its four components namely Interpersonal Skill, Intrapersonal Skill, Interpersonal Management, Intrapersonal Management. Study was conducted on one hundred sixty higher secondary school students, selected by adopting random sampling technique. Data was collected by using Mangal Emotional Intelligence Inventory constructed and standardized by Mangal and Mangal (1971). Statistical analysis was done by computing t-test, Findings indicates no significant difference in the academic achievement of higher secondary school students on the basis of Emotional Intelligence, intrapersonal skill, interpersonal management and intrapersonal management but significant difference exist in academic achievement on the basis of interpersonal skill which is found to be significant at 0.05 level of significance.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Mobile agent based data retrieval from distributed database
This paper describes the process involved in data retrieval from heterogeneity distributed database environment which employ multiple agent system. When a user request in any environment the request is converted to a query using Natural language Processing and passed for search through specific domains which helps to reduce the computation time and further complexity. But the transfer of record to and fro between system and base station increases the network traffic, communication cost, and response time. In order to minimize the overall complexity mobile agents are used to fetch the data required from various domains. This will help to improve the performance by exploiting the sites in parallel process.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Punjabi Speech Recognition of Isolated words using compound EEMD & neural network
Automatic Speech recognition and conversion of speech to text is a work which has proved its importance for decades. A lot of work has already been done in this contrast. This paper focuses on the category of the emotion of Punjabi speech and the conversion of speech to text using advanced system voice recognition pattern. This paper also focuses on the optimization of the EEMD process by combining EEMD process with the Neural Network. Neural Network has been found to be friendly in the contrast of compounding different algorithms to it and it produces significant results. This paper also focuses on the future works to be considered in the same field.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Accident detection system: survey and analysis
Now-a-days, the vehicles are becoming more sophisticated with features like GPS navigation and airbags for safety. In spite of this the victims of the accidents which occur at remote locations do not get prompt medical service. There are several cases where the accident victims lose their lives due to lack of medical assistance. In such situations the advancements in technology does not seem to be useful. This paper specifies the system that would automatically detects an accident and notifies the nearest rescue service which will enable the accident victim to receive instant medical help and assistance.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Data mining with artificial neural network in a scenerio of a bank
Companies have been collecting data for decades, building massive data warehouses in which to store it. Even though this data is available, very few companies have been able to realize the actual value stored in it. The question these companies are asking is how to extract this value. The answer is Data mining. Data mining, the extraction of hidden predictive information from large databases, is a powerful new technology with great potential to help companies focus on the most important information in their data warehouses. There are many technologies available to data mining practitioners, including Artificial Neural Networks, Regression, and Decision Trees. Many practitioners are wary of Neural Networks due to their black box nature, even though they have proven themselves in many situations. In our current research we are attempting to compare the aforementioned technologies and determine if Neural Networks outperform more traditional statistical techniques. This paper is an overview of neural networks and questions their position as a preferred tool by data mining practitioners.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Secure online password administration system using biometric authentication
There are numerous limitations with the existing traditional authentication methods used to protect private data such as PIN/password which is easy to duplicate and forgotten. This paper proposes a novel methodology to protect private information by means of secured password administration system using biometric authentication. The system architecture and main modules are presented.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]