The necessity of differential penal support of women in the family
Women have certain physiological, mental, sexual and social conditions which expose them against more vulnerability due to criminality. In addition to cultural, social and fundamental initiatives to decrease situations prone to victimization, it is necessary to give importance to a differential penal policy foe combating women victimization inside the family. Present paper only addresses the crimes that are related to family against women. Deceitful in marriage, not registering marriage or divorce event, home violence against women, refusing alimony, marriage with immature girls and so on need a certain penal policy since they relate to family. After mentioning the status quo and the way of criminalization as well as reaction against criminals, the legal and judicial deficiencies and challenges are studied and discussed below. Overall, Iranian Penal Policy has remarkable progressed in supporting women albeit we have not yet seen a total and comprehensive penal support in Iranian laws concerning current legal and judicial system and the procedures related to this field. There are gaps in criminalization and determining the punishments and, despite of the necessity of penal supports for women in families, one should not neglect its negative impacts on family stability and challenges confronting with improper penal supports.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Security Maintaince System in Data Mining Using Distance Measure Technique
Now a day’s Security is the main thing. In this paper we focus on distance measures applied to ensure the security of the separate sensitive information. Protecting data security is an key issue in data distribution. Security maintains system in data mining using distance measure techniques typically aim to protect separate security, with minimal impact on the quality of the released data. Now a days, a few of models are proposed to ensure the security protecting and/or to reduce the information loss as much as possible. i.e., they further improve the flexibility of the anonymous strategy to make it more closeness to reality, and then to meet the diverse needs of the people. Different proposals and algorithms have been designed for them at the same time. In this scenario we provide a survey of distance measure techniques for security preserving. We discuss the distance measure methods, the major achievement ways and the strategies of distance measure algorithms, and summarize their advantage and disadvantage. Then we give a demonstration of the work finished. Finally conclude further research directions of distance measure techniques by analyzing the existing work.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Introduction to Query Processing and Optimization
Query Processing is the scientific art of obtaining the desired information from a database system in a predictable and reliable fashion. Database systems must be able to respond to requests for information from the user i.e. process queries. In large database systems, which may be running on un-predictable and volatile environments, it is difficult to produce efficient database query plans based on information available solely at compile time. Getting the database results in a timely manner deals with the technique of Query Optimization. Efficient processing of queries is an important requirement in many interactive environments that involve massive amounts of data. Efficient query processing in domains such as the Web, multimedia search, and distributed systems has shown a great impact on performance. This paper will introduce the basic concepts of query processing and query optimization in the relational database. We also describe and difference query processing techniques in relational databases.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A survey of Wireless sensor Network Routing Protocol and lifetime of sensor network
Wireless sensor networks basically consist of low cost sensor nodes which collect data from environment and relay them to a sink, where they will be subsequently processed. Since wireless nodes are severely power-constrained, the major concern is how to conserve the nodes' energy so that network lifetime can be extended significantly. Employing one static sink can rapidly exhaust the energy of sink neighbors. Furthermore, using a non-optimal single path together with a maximum transmission power level may quickly deplete the energy of individual nodes on the route. This all results in unbalanced energy consumption through the sensor field, and hence a negative effect on the network lifetime. In this paper, we present a comprehensive taxonomy of the various mechanisms applied for increasing the network lifetime. These techniques, whether in the routing or cross-layer area, fall within the following types: multi-sink, mobile sink, multi-path, power control and bio-inspired algorithms, depending on the protocol operation. In this taxonomy, special attention has been devoted to the multi-sink, power control and bio-inspired algorithms, which have not yet received much consideration in the literature. Moreover, each class covers a variety of the state-of-the-art protocols, which should provide ideas for potential future works. Finally, we compare these mechanisms and discuss open research issues.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Academic law libraries and management of resources for national development in Nigeria
The vision of the administration under Goodluck Jonathan is packaged in Transformation Agenda which is aimed at holistic overhaul of every segment of national life. Members of the legal profession have a critical role to play towards the success of the transformation agenda. However, a lawyer can only be as good as the system of legal education that produced him; hence the need to revive and reposition the legal education framework. The paper discussed the responsibility of academic law libraries in the shaping of legal practitioners and towards the academic community. It x-rayed the challenges facing these libraries and made recommendations for improved law library services in Nigeria.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Gated-Demultiplexer tree buffer for low power using clock tree based gated driver
With the progress of VLSI technology, delay buffer plays an important role affecting the circuit design and performance. This paper presents the design of low power buffer using clock gating and gated driver tree. Since delay buffers are accessed sequentially, it adopts a gated clock ring counter addressing scheme. The ring counter employs double edge triggered (DET) flip flops instead of traditional flip flop to half the operating frequency. Also for generating clock gating signals, combinational elements (C-element) are implemented in the control logic to avoid the increasing loading of the global clock signal. For the clock distribution network, a gated driver tree technique is used and it further reduces the power consumption. In addition, this technique is used in the input and output ports of the memory to decrease their loading. The proposed delay buffer consumes less power comparing to the conventional delay buffers
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Fluorescence based non invasive approach of blood glucose measurement system
This paper gives a non-invasive approach for the measurement of blood glucose concentration in the blood, with the use of fluorescence radiation. By directing the fluorescence radiation at the target trytophan, the reflected radiation from tryptophan is detected at the detector and converted into a measurable signal. This value will correlate with the blood glucose concentration.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Facile synthesis of 8-Hydroxymethyl-8,9-Dihydro-2h-Furo[2,3-H] Chromene-3-Carbaldehyde
7-Hydroxy-8-allyl-2H-3-chromene carbaldehyde and m-CPBA in chloroform on heating to gave 8-hydroxymethyl-8,9-dihydro-2H-furo[2,3-h] chromene-3-carbaldehydes(3a-d) and 2H-3-chromenecarbaldehyde reaction with malononitrile to gave 9-amino-6H-benzochromene-8,10-dicarbonitriles (6a-d) in good yields.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Do Mutual Funds Have Impact on Capital Market? (A case of Pakistan)
The aim of conducting this research is to find out the impact of mutual funds, role of mutual funds on capital markets of Pakistan, Conventional Vs Islamic. In this paper we add several new perspectives to the growing body of empirical evidence on the investment performance of mutual funds. Risk-adjusted and unadjusted investment returns are not related to whether a fund is load or no-load, and asset size, expense ratios, and turnover rates are not related to investment performance. We find no reward for paying a load fee when investing in mutual funds. The majority of these research studies evaluate the performance of the funds according to classic measures, whereby different financial markets, in different countries for different periods of time serve as reference for evaluation. The ultimate conclusion of all of these studies is that there are no significant differences between the performance results of one type of funds and the other, on the other hand this study finds out the factors effecting the investment in mutual funds and measures the performance of mutual funds in capital markets through the models which are used worldwide to evaluate the performance, investment tendency in the area of mutual funds through portfolio (Risk-Return) Sharpe Measure and Treynor Measure. This research shows the relationship of Risk-Return characteristics either individual or institutional investor. The fact that more money is invested in active than passive funds despite the superior historical performance of the latter is “prima facie” evidence that most investors believe that some mutual fund managers have the ability to consistently beat the market. Explore the method of best point for investment through precise the risk and enhance the investment using some techniques which shows the favorable results for investments. Conduct this research we make the best point, which is much easier to take better decision for investment in capital market either sell or buy.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Socio-economic determinants of supply and demand for convenience foods (Okpa, Moimoi and meat pie) in lafia urban of Nasarawa state
The study specifically described the socio-economic status of the people involved in the production, distribution and consumption of convenience foods in Lafia urban of Nasarawa state. It identified the factors that influence the entry into convenience food enterprise, factors necessitating the demand and supply of the products and examined the costs and returns of three convenience foods. The data collected were analyzed using descriptive statistics, inferential statistics (multiple regression analysis), the four points likert scale and the enterprise gross margin. The major findings indicated that female producers of convenience foods were more than male producers, the multiple regression result on the effects of socio-economic characteristics of consumers on the amount of money spent on consumer foods revealed that R2 value is 0.697. This implied that 67.7% of the total variation in output (Y) is explained by the combined influences of the independent variables in the model. The gross margin enterprise revealed that the sale of convenience foods in Lafia metropolis is profitable. The study concluded by advocating for provision of credit facilities amongst others to producers and distributors of convenience foods with limited income.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]