Articles


Failed Police Operations in India and Technical Drawbacks

S.Vignesh

International Journal of Emerging Trends in Science and Technology, Vol. 3 No. 08 (2016), 1 August 2016 , Page 4423-4425

This paper deals with some failed police operations in India and its technical drawbacks Thus in this paper.
I have given technologies if this technologies has used in past such scenarios had been avoided. Since there
are many technologies at the particular time but only the police officials failed to use. Thus there are good
trained combatants. But only the lack of the technologies at the particular situation causes major impacts to
our nations. So I have done a research I gathered all the information about the harassing situations and I
explored its technical drawbacks.

Mobile Prevention from Theft (MPT): A Review

SK.Piramu Preethika, MCA, B.Ed, (MPhil)1 , Dr A.Sasi Kumar, MCA, MPhil2

International Journal of Emerging Trends in Science and Technology, Vol. 3 No. 08 (2016), 1 August 2016 , Page 4426-4428

This paper is a literature review on the topic of Mobile Security. The topic has been chosen due to the rise in
mobile theft and the insufficient rise in the topic of the security.

Effectiveness of Parent-Adolescent Communication (PAC) Programme: Helping Parents to Respond to Adolescent Drugs Use

James NGAMIJE1 , Dr Callixte YADUFASHIJE2

International Journal of Emerging Trends in Science and Technology, Vol. 3 No. 08 (2016), 1 August 2016 , Page 4429-4444|

It is acknowledged that parent-adolescent communication training programmes around alcohol and other
drugs appear to be effective in assisting parents to respond to the demands place on them by the increased
number of adolescents using and abusing drugs and related harms. In response to the need identified by
Rubavu Youth Friendly Center (RYFC), for research into the role of parent in addressing drugs among the
adolescents, this study investigated parent and adolescent perceptions of effectiveness of parent-adolescent
communication training programme offered by Imbuto Foundation in collaboration with RYFC in Rubavu
district, Rwanda to equip them to deal with issues arising from having children at risk of drugs abuse in their
families. A qualitative research design was followed to purposively select one site of PAC evaluation who had
attended the PAC training to participate in focus groups to explore the phenomenon of parenting practices
including communicating about drugs. The findings that emerged from the thematic data analysis provided
supportive evidence that current parenting approaches in this regard are not perceived to be effective. The
results are used to suggest guidelines for alternative approach to the forms of parent-adolescent
communication (PAC) training that is more likely to be sustainable, culturally appropriate and suited to the
context.

Two New Compounds from Perisrtophe Bicalyculata

H.S. Pandey, R.P. Pandey* , R. G. Singh

International Journal of Emerging Trends in Science and Technology, Vol. 3 No. 08 (2016), 1 August 2016 , Page 4445-4446

Peristrophe bicalyculata (Acanthaceae) is 60–180 cm in height and found throughout India, Afghanistan
and Africa. It is commonly known as kali aghedi in Hindi and kakajangha in Sanskrit. The herb is used for
its anti-bacterial property (tuberculostatic), snake poison, in bone fracture, sprain, fever, cold, cough and
for ear and eye treatments. In this paper Isolation and characterization of two new compounds
Nonatriacontan-5,6,7,8-tetrol (1) and 31-hydroxytetratriacontan-10-one
(2) have been reported along with βsitosterol.

Literature Survey on Attribute Based Encryption (ABE)

S.Ilakiya1 , Dr P.Mayilvahanan

International Journal of Emerging Trends in Science and Technology, Vol. 3 No. 08 (2016), 1 August 2016 , Page 4447-4449

During this Paper, we tend to show however Anony Control-F extends the User Revocation rule with a
data structure to enhance quantify ability and adaptability whereas at a similar time inherits the feature of
fine-grained access management. Second, we tend to demonstrate the way to implement a full-fledged
access management theme for cloud computing. The theme provides full support for stratified user grant,
file creation, file deletion, and user revocation in cloud computing. Third, we tend to formally prove the
protection of the projected theme supported the protection Cloud computing is associate rising computing
paradigm during which resources of the computing infrastructure ar provided as services over the net. As
promising as a result of it's, this paradigm together brings forth many new challenges for info security and
access management once users source sensitive information for sharing on cloud servers, that aren't
among a similar trustworthy domain as information homeowners. to stay sensitive user information
confidential against un-trusted servers, existing solutions generally apply field of study methods by
revealing info secret writing keys entirely to approved users. However, in doing therefore, these solutions
inevitably introduce a major computation overhead on the info owner for key distribution and knowledge}
management once fine grained data access management is desired, and so do not scale well. the matter of
at constant time achieving fine-grainedness, measurability, and data confidentiality of access management
very still remains unresolved. In This paper addresses this rewarding open issue by, on one hand, shaping
and implementing access policies supported knowledge attributes, and, on the opposite hand, permitting
the knowledge|the info|the information owner to represent most of the computation tasks concerned in fine
grained knowledge access management to un-trusted cloud servers while not revealing the underlying data
contents.

Fast Edge Detection Using Structured Forests

Bindu Nair1 , Ujwal Harode2

International Journal of Emerging Trends in Science and Technology, Vol. 3 No. 08 (2016), 1 August 2016 , Page 4450-4462

An important and very crucial component of many systems involving images is the edge detection which includes
object detectors and image segmentation algorithms. Edge patches always shows shapes of its inherent structure,
like T junctions or lines. Taking advantage of the shapes available in the images we get to know of an edge
detector which is accurate and efficient. In this approach the structured labels is robustly mapped to a space that is
discrete by which evaluation of the measure of the standard information gain is possible. The outcome is a way
that shows a real time performance which is many times faster than any of the traditional and modern approaches
available today, which also achieves the best results for edge detection both the Berkeley Segmentation Dataset
and Benchmark (BSDS 500) and the NYU depth dataset. This approach also shows its strength as a an edge
detector that can be used for any regular purpose by displaying how this method generalize across all datasets

A Novel Approach for Appraising the Performance of Multimedia Traffic for OLSR Routing Protocol in Manet

Syeda Tasmiya Tarannum1 , Mr Bhagavant Deshpande

International Journal of Emerging Trends in Science and Technology, Vol. 3 No. 08 (2016), 1 August 2016 , Page 4463-4467

Mobile Ad-hoc Network is a set of portable electronic receivers which detects and demodulates and amplifies
transmitted signals. MANETs do not have any polarized armature. Immense excerpt of influx on the
cyberspace transfer Transmission Control Protocol influx because of real time and non-real time multimedia
influx. Constant Bit Rate influx has peculiar properties compare to cyberspace influx. In this, using Network
Simulator 2, we analyze and appraise, conduct of various MANET routing protocols beneath CBR and TCP
influx ways. By doing this, we constitute that here is a compelling work variation among diversified steering
protocols because of diversities in its interior working. In this, the performance is figured out based on the
measurements like Transmission rate, Latency, and work done. Lastly we conclude that Ad-Hoc On Demand
Distance Vector Routing protocol which is a reactive protocol performs well for Constant Bit Rate influx.
While OLSR which is a proactive protocol performs well for TCP influx. The TCP influx /multimedia in
MANETs which is the dominant part of the total influx on internet, OLSR is appraised as the best steering
protocol in all cases, in addition to, it is best for transferring the TCP influx

Content Based Image Retrieval Using Dot-Diffused Block Truncation Coding Features

Gauthami A C1 , Prof. Sandeep Kumar

International Journal of Emerging Trends in Science and Technology, Vol. 3 No. 08 (2016), 1 August 2016 , Page 4468-4473

The expected work depicts the spot diffused mass truncation form known as DDBTC derives image quality
descriptor. There are two representatives of DDBTC. The shading histogram trademark called as CHF
started from two shading quantizers means the shading transmission although picture similarity, however
the bit mold characteristic called BPF made as of the bitmap picture speak to the photograph edges despite
textural all together.

Tracking the Accidental Victim Using Andriod Application

Chandru Kotagi

International Journal of Emerging Trends in Science and Technology, Vol. 3 No. 08 (2016), 1 August 2016 , Page 4474-4477

During disasters people face problems in communicating and informing about their location to their dear
ones and will be in need of urgent help Track the victim is an application that will solve the above problem
The application shall allow the user to select contacts to whom the location details must be sent, in case of
disasters. The application shall track the location of the user. The application shall automatically send text
and voice messages to preset contacts. The emergency call facility that is currently available will not allow
the user to send voice and text messages containing users location.
This social issue is solved by our application. Even though emergency cal

Contour Based Real Time Multiple Object Tracking

Mrs Malleshwari M S1 , Mr Sekar R

International Journal of Emerging Trends in Science and Technology, Vol. 3 No. 08 (2016), 1 August 2016 , Page 4478-4482

Contour based real time multiple object tracking is an important task in computer vision. contour based
object tracking is useful in many areas such as motion based recognition, automated surveillance, human
computer interaction, traffic monitoring, vehicle navigation, and medical. Detection and tracking of moving
objects in video scenes is the first relevant step in the information extraction in many computer vision
application.

Screening, Purification and Characterization of Pullulanase from Soil Bacteria and Enhancement of Its Stability by Immobilization and Nanoforms

Sarina.P.Khabade1 , Lavanya. B. G2 , Mahima, M3 , Sandhya, J4

International Journal of Emerging Trends in Science and Technology, Vol. 3 No. 08 (2016), 1 August 2016 , Page 4483-4492

Pullulanase is an extracellular carbohydrase responsible for the hydrolysis of pullulan and amylopectin to
produce maltotriose. The product maltotriose is used in detergent industry, bakery industry and in the
production of biotechnological products. In the present investigation pullulanase was purified from bacillus
species isolated from soil sample. The pullulanase was purified by salt precipitation (70%) followed by anion exchange chromatography (DEAE- Cellulose) and gel filtration (Sephadex G75) with final yield of 75%
and purification fold 16.14. The molecular mass of pullulanase enzyme was 110 kDa as estimated by SDSPAGE. The enzyme activity of purified sample was found to be 1294 IU and specific activity 8271.8. This
study also aimed to determine the stability of immobilized pullulanase and showed high stability using Cu
Nanoparticle.

Effect of Bisphenol A on certain Hematological Parameters of Heteropneustes fossilis, Bloch

Aiswarya KS1 , Remya James

International Journal of Emerging Trends in Science and Technology, Vol. 3 No. 08 (2016), 1 August 2016 , Page 4493-4497

Effect of Bisphenol A on the hematological parameters total RBC count, total WBC count and hemoglobin
content was assessed in Heteropneustes fossilis caught from wild. Behavioural changes were also monitored.
It was found that 72 hour exposure of BPA at a concentration of 0.1g/L has lowered total RBC count and
increased WBC count. Hemoglobin concentration in the blood also decreased exposure to BPA concentration
of 0.1g/L. Severe mortalities in the experimental tanks were noticed at 0.5g/L and 0.1g/L concentrations of
BPA. Another significant finding was that the specimens of experimental animal, Heteropneustes fossilis is
extremely scarce to be obtained from wild in the regions of Alappuzha, Kerala.

On S-  -Connected Space in a Topological Space

M. Priyadarshini1 , R. Selvi2

International Journal of Emerging Trends in Science and Technology, Vol. 3 No. 08 (2016), 1 August 2016 , Page 4498-4507

The authors introduced S-L-open sets, S-M-closed sets, S-R-open sets and S-S-closed sets and established their
relationships with some generalized setsin a topological spaces. Connected spaces constitute the most
important classes of topological spaces. In this paper we introduce the concept “S-  -connected” in a
topological space

Determination of Optimal Parameter in Deep Drawing Process by Using Fuzzy Logic Method

Pawan Ashok Ghormode1 , Prof N K Kamble2 , Prof S S Sarnobat3

International Journal of Emerging Trends in Science and Technology, Vol. 3 No. 08 (2016), 1 August 2016 , Page 4508-4513

Fuzzy logic is conceptually easy to understand. The mathematical concepts behind fuzzy reasoning are
very simple fuzzy logic is a more intuitive approach without the far-reaching complexity. This paper
discusses flexible approaches for fuzzy optimization problems. Specifically, it presents a new solving
method in deep drawing process. It is helpful for determine optimal combination of process parameters.

Cytotoxic Effects of Raphanus Sativus Root Extract on Root Meristem of Allium Cepa

Amit Vaish, Roopam Saxena, Somesh Yadav

International Journal of Emerging Trends in Science and Technology, Vol. 3 No. 08 (2016), 1 August 2016 , Page 4514-451

The cytotoxic effects of radish root were investigated on meristematic cells of A. cepa roots. Actively
growing root tips of A. cepa were treated with five concentrations (100%, 75%, 50%, 25% and 10%) of the
root extract for 2,4 and 6 hours respectively. The results showed that the root extract induced various types
of nuclear and chromosomal abnormalities such as binucleate cells, nuclear disintegration, scattered
metaphases, chromatid separation, stickiness of chromosomes, bridge formation, chromosomal
condensation and polarity abolition. It was recorded that radish root extract not only disturbed mitotic
activity but also showed considerable impact on chromosomal behavior

Migrant Labourers and their Health & Hygiene

Prof. (Dr.) Subhasish Chatterj

International Journal of Emerging Trends in Science and Technology, Vol. 3 No. 08 (2016), 1 August 2016 , Page 4518-4523

In this research article, the writer has attempted to talk about the issues identifying with health and hygiene of
migrant labourers. Since ages, the migratory working procedure is extremely widespread in India that offers
individuals to chance to trade their specialized aptitude and technical expertise. As we realize that India is the
nation of ‘unity in diversity’ and enhanced with multitalented exercises in various zones, by realizing that
reality, we should permit the population to move by which it will make the people exchange their aptitude
starting with one place then onto the next. Regardless of realizing that reality, we are yet to make the ideal
framework which will help the migrant workers to keep their health protected and make them breathe with
hygienic conditions.

Effects of Some Heavy Metals on the Life-Table Parameters of Anopheles stephensi (Liston) (Diptera: Culicidae)

R. K. Sharma1 & N. B. Singh

International Journal of Emerging Trends in Science and Technology, Vol. 3 No. 08 (2016), 1 August 2016 , Page 4524-4530

The exposure sub lethal doses of three heavy metals, Cd, Fe and Mn as solutions of CdCl2, FeCl3 and
MnCl2 resulted a variable increase in mortalities of various life stages (L1-L4, pupa), adult emergence and
generation morality (k-factor). On the other hand, the developmental duration of various larval stages was
declined significantly in early or late instars. Beside toxic and adverse effects of Cd, Fe and Mn salts on
survival and longevity, stress of these heavy metals was found as accelerating factor for the larval
development