The prop and costume list includes props of a note that gangsters will write to John and an unspecified item to be used on a girlfriend by gangsters, as well as costumes for Lisa, Chloe, and Troy.
A survey was conducted to understand movie preferences and behaviors. Action and comedy were the most popular movie genres at 25% and 37% respectively. The majority of respondents (47%) enjoy watching movies a lot and watch movies moderately often (65%), typically watching 1-2 movies per week (65%). Cornfields were viewed as the scariest location for a zombie movie (33%). Respondents would most sympathize with a 25 year old character. Rock music was viewed as the genre most suiting a zombie movie. Red text was viewed as the most expected color for text in a horror movie trailer. A gun was viewed as the best weapon for fighting zombies.
Making a Living in Manga in Japan - San Diego Comic-Con 2014Deb Aoki
At San Diego Comic-Con 2014, three artists and an professional editor who have lived and worked in Japan share what it's like to be a professional comics creator in the motherland of manga.
The document discusses The Vampire Diaries book series. It was written by Lisa Jane Smith, a bestselling New York Times author. The series tells the story of two vampire brothers, Stefan and Damon, who fall for the same girl, Elena, in a small town in Virginia. The reflections section ponders the eternal love triangle between the brothers and their past love Katherine.
This summary provides an overview of key events in Act 3, Scene 5 of Romeo and Juliet:
Juliet tries to convince Romeo that it is still night and he has time before he must leave, as their secret marriage could mean death if discovered. Lady Capulet tells Juliet she must marry Paris, but Juliet refuses and says she will only marry Romeo. When Lord Capulet hears this, he is angry at her defiance and threatens to disown her. He tells Juliet she has no choice and must marry Paris. Seeing no other option, Juliet decides to go to Friar Lawrence for help escaping the marriage to Paris, or she will kill herself.
A Video Watermarking Scheme to Hinder Camcorder PiracyIOSR Journals
This document describes a video watermarking scheme to prevent camcorder piracy in movie theaters. The scheme embeds watermarks in video frames so that any compliant video player cannot play the video if recorded in a theater. The watermarking technique is robust to geometric distortions like rotation and scaling. It also prevents loss of quality from lossy compression formats. The scheme uses an integer wavelet transform for the watermark embedding and extraction processes, making it computationally efficient and lossless. Experimental results show the scheme can withstand various attacks like filtering, noise addition, resizing and rotation while accurately extracting the embedded watermarks.
A Critical Review of the Nigerian Energy ScenarioIOSR Journals
This document provides an overview of Nigeria's energy scenario, identifying its energy mix and constraints. Nigeria has significant fossil fuel reserves like oil and natural gas, but faces issues of inadequate supply, energy poverty, and gas flaring. The key energy sources are oil (37 billion barrels of reserves), natural gas (187 trillion cubic feet of reserves), and biomass. However, poor energy policy implementation, slow private sector participation, and lack of infrastructure have limited energy access and economic development. The document recommends strategies to improve the energy sector through better policy and utilization of alternative resources like solar and hydropower.
Zinc Sulfate As a Growth Disruptor for Spodoptera littoralis With Reference t...IOSR Journals
Zinc sulfate was evaluated as a growth disruptor against Spodoptera littoralis larvae. It significantly increased larval and pupal duration while decreasing pupal weight and pupation rate compared to the control. Fecundity and fertility of treated females was remarkably lower. Ultrastructure examination found changes in endocrine glands, including fewer secretory granules, enlarged mitochondria, and autophagic vacuoles. Zinc sulfate shows potential as a growth disruptor for S. littoralis management by interfering with endocrine function.
User Identity Verification Using Mouse SignatureIOSR Journals
This document proposes a novel method for user identity verification using mouse signature. It captures mouse events such as mouse movements, clicks, and silences during a user's interaction with a canvas application. Features are extracted from these events to create a unique mouse signature for the user, which is stored in a database. When a user logs in, their current mouse signature is generated and compared to the stored signature to verify their identity. If the signatures match above a threshold like 80%, the user is authenticated. This adds an additional layer of security beyond just usernames and passwords. The system was designed to be more accurate than existing histogram-based approaches by verifying each individual mouse action.
A survey was conducted to understand movie preferences and behaviors. Action and comedy were the most popular movie genres at 25% and 37% respectively. The majority of respondents (47%) enjoy watching movies a lot and watch movies moderately often (65%), typically watching 1-2 movies per week (65%). Cornfields were viewed as the scariest location for a zombie movie (33%). Respondents would most sympathize with a 25 year old character. Rock music was viewed as the genre most suiting a zombie movie. Red text was viewed as the most expected color for text in a horror movie trailer. A gun was viewed as the best weapon for fighting zombies.
Making a Living in Manga in Japan - San Diego Comic-Con 2014Deb Aoki
At San Diego Comic-Con 2014, three artists and an professional editor who have lived and worked in Japan share what it's like to be a professional comics creator in the motherland of manga.
The document discusses The Vampire Diaries book series. It was written by Lisa Jane Smith, a bestselling New York Times author. The series tells the story of two vampire brothers, Stefan and Damon, who fall for the same girl, Elena, in a small town in Virginia. The reflections section ponders the eternal love triangle between the brothers and their past love Katherine.
This summary provides an overview of key events in Act 3, Scene 5 of Romeo and Juliet:
Juliet tries to convince Romeo that it is still night and he has time before he must leave, as their secret marriage could mean death if discovered. Lady Capulet tells Juliet she must marry Paris, but Juliet refuses and says she will only marry Romeo. When Lord Capulet hears this, he is angry at her defiance and threatens to disown her. He tells Juliet she has no choice and must marry Paris. Seeing no other option, Juliet decides to go to Friar Lawrence for help escaping the marriage to Paris, or she will kill herself.
A Video Watermarking Scheme to Hinder Camcorder PiracyIOSR Journals
This document describes a video watermarking scheme to prevent camcorder piracy in movie theaters. The scheme embeds watermarks in video frames so that any compliant video player cannot play the video if recorded in a theater. The watermarking technique is robust to geometric distortions like rotation and scaling. It also prevents loss of quality from lossy compression formats. The scheme uses an integer wavelet transform for the watermark embedding and extraction processes, making it computationally efficient and lossless. Experimental results show the scheme can withstand various attacks like filtering, noise addition, resizing and rotation while accurately extracting the embedded watermarks.
A Critical Review of the Nigerian Energy ScenarioIOSR Journals
This document provides an overview of Nigeria's energy scenario, identifying its energy mix and constraints. Nigeria has significant fossil fuel reserves like oil and natural gas, but faces issues of inadequate supply, energy poverty, and gas flaring. The key energy sources are oil (37 billion barrels of reserves), natural gas (187 trillion cubic feet of reserves), and biomass. However, poor energy policy implementation, slow private sector participation, and lack of infrastructure have limited energy access and economic development. The document recommends strategies to improve the energy sector through better policy and utilization of alternative resources like solar and hydropower.
Zinc Sulfate As a Growth Disruptor for Spodoptera littoralis With Reference t...IOSR Journals
Zinc sulfate was evaluated as a growth disruptor against Spodoptera littoralis larvae. It significantly increased larval and pupal duration while decreasing pupal weight and pupation rate compared to the control. Fecundity and fertility of treated females was remarkably lower. Ultrastructure examination found changes in endocrine glands, including fewer secretory granules, enlarged mitochondria, and autophagic vacuoles. Zinc sulfate shows potential as a growth disruptor for S. littoralis management by interfering with endocrine function.
User Identity Verification Using Mouse SignatureIOSR Journals
This document proposes a novel method for user identity verification using mouse signature. It captures mouse events such as mouse movements, clicks, and silences during a user's interaction with a canvas application. Features are extracted from these events to create a unique mouse signature for the user, which is stored in a database. When a user logs in, their current mouse signature is generated and compared to the stored signature to verify their identity. If the signatures match above a threshold like 80%, the user is authenticated. This adds an additional layer of security beyond just usernames and passwords. The system was designed to be more accurate than existing histogram-based approaches by verifying each individual mouse action.
Electronic and Vibrational Properties of Pbsns3IOSR Journals
This study used density functional theory and density perturbation functional theory to investigate the electronic and vibrational properties of PbSnS3. The results showed that PbSnS3 is an indirect bandgap semiconductor with a fundamental bandgap of 0.71eV and optical bandgap of 0.83eV. Analysis of the phonon band structure revealed that the highest frequency mode was 317.9 cm-1 at the Γ-point, indicating that the material is polar. In general, the phonon dispersion curves showed flat optical branches with some band crossings and degeneracies at high symmetry points in the Brillouin zone.
The document lists common jobs like teachers, chefs, mechanics, waiters, dentists, doctors, nurses, secretaries, receptionists, and shop assistants. It describes where these jobs are commonly found, such as schools, restaurants, hospitals, hotels, garages, offices, supermarkets, and shops. It also provides brief descriptions of the roles and responsibilities of each job.
De-virtualizing virtual Function Calls using various Type Analysis Technique...IOSR Journals
This document discusses techniques for optimizing virtual function calls in object-oriented programming languages. Virtual function calls are indirect calls that involve lookup through a virtual function table (VFT) at runtime, which has performance overhead compared to direct calls. Various static analysis techniques like Class Hierarchy Analysis (CHA) and Rapid Type Analysis (RTA) aim to resolve some virtual calls by determining the possible target types and replacing indirect calls with direct calls if a single target is possible. CHA uses the class hierarchy and declared types to determine possible target types, while RTA also considers instantiated types in the program to further reduce possible targets. The document analyzes examples to demonstrate how CHA and RTA can optimize some virtual calls.
Achieving data integrity by forming the digital signature using RSA and SHA-1...IOSR Journals
This document discusses achieving data integrity through digital signatures using the RSA and SHA-1 algorithms. It first provides background on data integrity and cryptography. It then explains the RSA algorithm for public key encryption and digital signatures. The document describes an implementation of RSA and SHA-1 to encrypt messages and generate message digests at the sender and receiver ends to verify data integrity by ensuring the digests match. Graphical interfaces are provided to enhance understanding and the system is designed with client and server architecture to demonstrate the process across different computers.
The document discusses trends in online and mobile commerce. It notes that e-commerce has grown faster than non-e-commerce retail in recent years. Mobile commerce is also growing rapidly, with mobile devices accounting for over half of retail website traffic and nearly a quarter of online sales over Thanksgiving weekend. Retailers are increasingly investing in mobile optimization, omnichannel integration, personalization, and testing. B2B e-commerce is also growing significantly. The document advocates for creating reusable content that can be published across multiple channels to provide a consistent customer experience.
A Novel Approach for Tracking with Implicit Video Shot DetectionIOSR Journals
1) The document presents a novel approach that combines video shot detection and object tracking using a particle filter to create an efficient tracking algorithm with implicit shot detection.
2) It uses a robust pixel difference method for shot detection that is resistant to sudden illumination changes. It then applies a particle filter for tracking that uses color histograms and Bhattacharyya distance to track objects across frames.
3) The key innovation is that the tracking algorithm is only initiated after a shot change is detected, reducing computational costs by discarding unneeded frames and triggering tracking only when needed. This provides a more efficient solution for tracking large video datasets with minimal preprocessing.
Two Factor Authentication Using Smartphone Generated One Time PasswordIOSR Journals
This document proposes a two-factor authentication system that uses smartphones to generate one-time passwords (OTPs). It aims to improve security over traditional password-based systems while reducing costs compared to hardware token-based OTP systems. The proposed system would have client software on PCs and Android apps to generate OTPs using cryptographic algorithms and unique device identifiers. OTPs would be validated by the server to authenticate transactions. Future work could explore using images instead of OTPs for two-factor authentication via mobile apps.
Survey of different Web Application Attacks & Its Preventive MeasuresIOSR Journals
This document summarizes different types of web application attacks and proposed preventative measures. It discusses denial of service (DOS) attacks, cross-site scripting (XSS) attacks, SQL injection attacks, and request encoding attacks that have occurred from 2012-2014. Statistics on the financial impact of these attacks on various industries are provided. The document then proposes solutions to prevent DOS attacks, XSS attacks, SQL injection attacks, and request encoding attacks. These include implementing input validation, output encoding, access control, and encryption. Overall, the document aims to survey common web application attacks and identify best practices for building secure applications.
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
This document proposes a modification to the Dynamic Source Routing (DSR) protocol called Modified DSR (MDSR) to reduce routing overhead caused by frequent link breakages in mobile ad hoc networks. MDSR adds a link breakage prediction algorithm that uses signal strength measurements to predict when a link may break. Intermediate nodes monitor signal strength and warn the source node if a link may soon break. This allows the source to proactively rebuild the route or switch to a backup route to avoid disconnection. Simulation results showed MDSR can reduce the number of dropped packets by at least 25% compared to standard DSR. The document also discusses how DSR works and the proposed proactive route maintenance concept in M
An effective citation metadata extraction process based on BibPro parserIOSR Journals
The document describes a citation metadata extraction process called BibPro that uses a sequence alignment approach. BibPro first captures structural properties from citation strings and transforms them into sequenced templates. It then applies encoding tables and reserved words to represent fields as unique symbols. Blocking patterns are used to capture local field structures. BibPro constructs a template database and then aligns query citations to templates to extract metadata fields like author, title, publication details. The approach achieves more accurate extraction than existing systems through its use of citation string sequencing and alignment techniques.
An Overview of TRIZ Problem-Solving Methodology and its ApplicationsIOSR Journals
This document provides an overview of the TRIZ problem-solving methodology. It begins with an introduction to problem solving and lists common problem-solving steps. It then introduces TRIZ as a methodology developed in Russia to systematically solve problems by applying universal invention principles. The document describes the key components of TRIZ, including its laws of evolution, standard problem-solving approaches, and inventive principles. It compares the TRIZ methodology to the conventional structured problem-solving approach. The document then discusses various applications of TRIZ, including in computer-aided design and other engineering fields. It provides examples of how TRIZ tools like the contradiction matrix are used to generate solution principles for resolving contradictions in technical systems.
This document summarizes a study that investigated the histological effects of pre-exposure prophylactic consumption of sulfonamide drugs on the livers and kidneys of albino rats. Rats were divided into groups that received graded doses of Laridox(SP) for 21 days. Higher doses caused dullness, restlessness and weight loss in rats. Upon examination, livers and kidneys of rats that received higher doses showed inflammatory cell infiltration, congestion, and signs of necrosis compared to controls. The study suggests that long term pre-exposure to higher doses of sulfonamide drugs can cause cellular defects and adverse effects on the liver and kidneys.
Secure Authentication System Using Video SurveillanceIOSR Journals
The document proposes a secure authentication system using video surveillance that extracts key features from video to identify and authenticate users. It begins with an introduction to existing biometric authentication methods and their limitations. It then describes the proposed video surveillance system which involves extracting foreground objects from video using background subtraction and shadow detection algorithms. Key features like skeleton and centroid features are extracted from the foreground objects using triangulation and depth first search. These features are stored in a database and used to identify and authenticate users by comparing with live video feed features. The system aims to provide secure authentication using video's ability to characterize biometrics based on dynamics like gait, while overcoming limitations of existing methods.
IOSR Journal of Pharmacy and Biological Sciences(IOSR-JPBS) is an open access international journal that provides rapid publication (within a month) of articles in all areas of Pharmacy and Biological Science. The journal welcomes publications of high quality papers on theoretical developments and practical applications in Pharmacy and Biological Science. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Automatic generation control of two area interconnected power system using pa...IOSR Journals
This document presents a particle swarm optimization technique to optimize the integral controller gains for automatic generation control of a two-area interconnected power system. Each control area includes thermal generation systems with reheat turbines. The objective is to minimize frequency deviations and tie-line power flow deviations following load disturbances using two performance indices: integral of squared error and integral of time-multiplied absolute error. Simulation results demonstrate the effectiveness of the particle swarm optimizer in tuning the AGC parameters to improve the dynamic response compared to a conventional integral controller.
Modeling Of Carbon Deposit From Methane Gas On Zeolite Y Catalyst Activity In...IOSR Journals
This document summarizes a study that models carbon deposit from methane gas on Zeolite Y catalyst activity in a packed bed reactor. The study developed two computational fluid dynamic (CFD) models: 1) The first model considered the influence of carbon deposition on catalyst activity over time. Results showed carbon deposition increased over time while methane decreased and hydrogen increased, indicating methane decomposition. 2) The second model investigated the effect of carbon deposits on fluid flow over both time and space. The study aims to provide insight into how carbon deposition affects catalyst activity and gas flow through the packed bed reactor.
This document provides guidance on how to create an informational product (info product) to sell online. It discusses that info products include ebooks, reports, software, videos, websites, newsletters and more. It then offers several strategies for creating an info product, including co-authoring with an expert if you have writing skills or hiring a ghost writer if you have expertise. It also suggests compiling a directory or becoming an affiliate to sell other companies' info products. The document concludes by emphasizing that the info product must solve a problem and provide significantly more value than its price.
Investigation on Using Fractal Geometry for Classification of Partial Dischar...IOSR Journals
1) The document investigates using fractal geometry to classify partial discharge (PD) patterns from different insulation defects.
2) Fractal features like fractal dimension and lacunarity are extracted from 3D PD patterns using box counting. Each PD pattern has a unique fractal dimension and multiple lacunarity values depending on box size.
3) Neural networks are used to classify PD patterns based on their fractal features. The goal is to minimize input features to improve classification performance. Different lacunarity values from varying box sizes are analyzed to find those most useful for classification.
This document provides a cost estimation for a cashew extract evaporator plant in Nigeria. It estimates the costs of equipment using scaling factors and cost indexes from 1990 to 2013, accounting for inflation. The total fixed capital investment is estimated to be $416,272.96. An analysis is done to compare using a single effect or double effects evaporator. It is determined that a double effects evaporator would provide the highest return on investment at 37.78% compared to 29.45% for a single effect. The break-even point is calculated to be 13,369,609.7 units per year based on the annual direct production and fixed costs. The gross annual earnings are $286,714.588 and the net annual
Hiding Text within Image Using LSB ReplacementIOSR Journals
The document proposes a new algorithm for hiding text within a gray image using least significant bit (LSB) replacement with increased security. The algorithm generates a random key between 1-256 to encrypt the text before embedding it in the image. It uses XOR and AND logic operations to modify the LSB of pixel values and embed the encrypted text. Experimental results show the embedded text can be concealed within the image while maintaining high image quality with PSNR values over 75dB. The algorithm aims to improve upon basic LSB techniques by adding an encryption step using a random key to enhance security of the hidden text.
Looking back at your preliminary task, whatlisadors
The document discusses the learning from a preliminary task to a full product. For the preliminary task, good planning and time management led to success. While the technology was initially challenging, more experience with equipment and software helped improve the main task. Overall, lessons from mistakes in the preliminary task and greater familiarity with tools supported significant improvement over the months of work.
The document discusses censorship and the British Board of Film Classification (BBFC). It defines censorship as the suppression of speech or communication deemed objectionable by a governing body. It describes the BBFC as the non-governmental organization responsible for film classification and censorship in the UK. The BBFC classifies videos, DVDs, and some video games according to the Video Recordings Act, and can restrict releases to certain age groups or licensed shops. Films are normally classified by two examiners using published guidelines considering issues like content, context, and intended audience.
Electronic and Vibrational Properties of Pbsns3IOSR Journals
This study used density functional theory and density perturbation functional theory to investigate the electronic and vibrational properties of PbSnS3. The results showed that PbSnS3 is an indirect bandgap semiconductor with a fundamental bandgap of 0.71eV and optical bandgap of 0.83eV. Analysis of the phonon band structure revealed that the highest frequency mode was 317.9 cm-1 at the Γ-point, indicating that the material is polar. In general, the phonon dispersion curves showed flat optical branches with some band crossings and degeneracies at high symmetry points in the Brillouin zone.
The document lists common jobs like teachers, chefs, mechanics, waiters, dentists, doctors, nurses, secretaries, receptionists, and shop assistants. It describes where these jobs are commonly found, such as schools, restaurants, hospitals, hotels, garages, offices, supermarkets, and shops. It also provides brief descriptions of the roles and responsibilities of each job.
De-virtualizing virtual Function Calls using various Type Analysis Technique...IOSR Journals
This document discusses techniques for optimizing virtual function calls in object-oriented programming languages. Virtual function calls are indirect calls that involve lookup through a virtual function table (VFT) at runtime, which has performance overhead compared to direct calls. Various static analysis techniques like Class Hierarchy Analysis (CHA) and Rapid Type Analysis (RTA) aim to resolve some virtual calls by determining the possible target types and replacing indirect calls with direct calls if a single target is possible. CHA uses the class hierarchy and declared types to determine possible target types, while RTA also considers instantiated types in the program to further reduce possible targets. The document analyzes examples to demonstrate how CHA and RTA can optimize some virtual calls.
Achieving data integrity by forming the digital signature using RSA and SHA-1...IOSR Journals
This document discusses achieving data integrity through digital signatures using the RSA and SHA-1 algorithms. It first provides background on data integrity and cryptography. It then explains the RSA algorithm for public key encryption and digital signatures. The document describes an implementation of RSA and SHA-1 to encrypt messages and generate message digests at the sender and receiver ends to verify data integrity by ensuring the digests match. Graphical interfaces are provided to enhance understanding and the system is designed with client and server architecture to demonstrate the process across different computers.
The document discusses trends in online and mobile commerce. It notes that e-commerce has grown faster than non-e-commerce retail in recent years. Mobile commerce is also growing rapidly, with mobile devices accounting for over half of retail website traffic and nearly a quarter of online sales over Thanksgiving weekend. Retailers are increasingly investing in mobile optimization, omnichannel integration, personalization, and testing. B2B e-commerce is also growing significantly. The document advocates for creating reusable content that can be published across multiple channels to provide a consistent customer experience.
A Novel Approach for Tracking with Implicit Video Shot DetectionIOSR Journals
1) The document presents a novel approach that combines video shot detection and object tracking using a particle filter to create an efficient tracking algorithm with implicit shot detection.
2) It uses a robust pixel difference method for shot detection that is resistant to sudden illumination changes. It then applies a particle filter for tracking that uses color histograms and Bhattacharyya distance to track objects across frames.
3) The key innovation is that the tracking algorithm is only initiated after a shot change is detected, reducing computational costs by discarding unneeded frames and triggering tracking only when needed. This provides a more efficient solution for tracking large video datasets with minimal preprocessing.
Two Factor Authentication Using Smartphone Generated One Time PasswordIOSR Journals
This document proposes a two-factor authentication system that uses smartphones to generate one-time passwords (OTPs). It aims to improve security over traditional password-based systems while reducing costs compared to hardware token-based OTP systems. The proposed system would have client software on PCs and Android apps to generate OTPs using cryptographic algorithms and unique device identifiers. OTPs would be validated by the server to authenticate transactions. Future work could explore using images instead of OTPs for two-factor authentication via mobile apps.
Survey of different Web Application Attacks & Its Preventive MeasuresIOSR Journals
This document summarizes different types of web application attacks and proposed preventative measures. It discusses denial of service (DOS) attacks, cross-site scripting (XSS) attacks, SQL injection attacks, and request encoding attacks that have occurred from 2012-2014. Statistics on the financial impact of these attacks on various industries are provided. The document then proposes solutions to prevent DOS attacks, XSS attacks, SQL injection attacks, and request encoding attacks. These include implementing input validation, output encoding, access control, and encryption. Overall, the document aims to survey common web application attacks and identify best practices for building secure applications.
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
This document proposes a modification to the Dynamic Source Routing (DSR) protocol called Modified DSR (MDSR) to reduce routing overhead caused by frequent link breakages in mobile ad hoc networks. MDSR adds a link breakage prediction algorithm that uses signal strength measurements to predict when a link may break. Intermediate nodes monitor signal strength and warn the source node if a link may soon break. This allows the source to proactively rebuild the route or switch to a backup route to avoid disconnection. Simulation results showed MDSR can reduce the number of dropped packets by at least 25% compared to standard DSR. The document also discusses how DSR works and the proposed proactive route maintenance concept in M
An effective citation metadata extraction process based on BibPro parserIOSR Journals
The document describes a citation metadata extraction process called BibPro that uses a sequence alignment approach. BibPro first captures structural properties from citation strings and transforms them into sequenced templates. It then applies encoding tables and reserved words to represent fields as unique symbols. Blocking patterns are used to capture local field structures. BibPro constructs a template database and then aligns query citations to templates to extract metadata fields like author, title, publication details. The approach achieves more accurate extraction than existing systems through its use of citation string sequencing and alignment techniques.
An Overview of TRIZ Problem-Solving Methodology and its ApplicationsIOSR Journals
This document provides an overview of the TRIZ problem-solving methodology. It begins with an introduction to problem solving and lists common problem-solving steps. It then introduces TRIZ as a methodology developed in Russia to systematically solve problems by applying universal invention principles. The document describes the key components of TRIZ, including its laws of evolution, standard problem-solving approaches, and inventive principles. It compares the TRIZ methodology to the conventional structured problem-solving approach. The document then discusses various applications of TRIZ, including in computer-aided design and other engineering fields. It provides examples of how TRIZ tools like the contradiction matrix are used to generate solution principles for resolving contradictions in technical systems.
This document summarizes a study that investigated the histological effects of pre-exposure prophylactic consumption of sulfonamide drugs on the livers and kidneys of albino rats. Rats were divided into groups that received graded doses of Laridox(SP) for 21 days. Higher doses caused dullness, restlessness and weight loss in rats. Upon examination, livers and kidneys of rats that received higher doses showed inflammatory cell infiltration, congestion, and signs of necrosis compared to controls. The study suggests that long term pre-exposure to higher doses of sulfonamide drugs can cause cellular defects and adverse effects on the liver and kidneys.
Secure Authentication System Using Video SurveillanceIOSR Journals
The document proposes a secure authentication system using video surveillance that extracts key features from video to identify and authenticate users. It begins with an introduction to existing biometric authentication methods and their limitations. It then describes the proposed video surveillance system which involves extracting foreground objects from video using background subtraction and shadow detection algorithms. Key features like skeleton and centroid features are extracted from the foreground objects using triangulation and depth first search. These features are stored in a database and used to identify and authenticate users by comparing with live video feed features. The system aims to provide secure authentication using video's ability to characterize biometrics based on dynamics like gait, while overcoming limitations of existing methods.
IOSR Journal of Pharmacy and Biological Sciences(IOSR-JPBS) is an open access international journal that provides rapid publication (within a month) of articles in all areas of Pharmacy and Biological Science. The journal welcomes publications of high quality papers on theoretical developments and practical applications in Pharmacy and Biological Science. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Automatic generation control of two area interconnected power system using pa...IOSR Journals
This document presents a particle swarm optimization technique to optimize the integral controller gains for automatic generation control of a two-area interconnected power system. Each control area includes thermal generation systems with reheat turbines. The objective is to minimize frequency deviations and tie-line power flow deviations following load disturbances using two performance indices: integral of squared error and integral of time-multiplied absolute error. Simulation results demonstrate the effectiveness of the particle swarm optimizer in tuning the AGC parameters to improve the dynamic response compared to a conventional integral controller.
Modeling Of Carbon Deposit From Methane Gas On Zeolite Y Catalyst Activity In...IOSR Journals
This document summarizes a study that models carbon deposit from methane gas on Zeolite Y catalyst activity in a packed bed reactor. The study developed two computational fluid dynamic (CFD) models: 1) The first model considered the influence of carbon deposition on catalyst activity over time. Results showed carbon deposition increased over time while methane decreased and hydrogen increased, indicating methane decomposition. 2) The second model investigated the effect of carbon deposits on fluid flow over both time and space. The study aims to provide insight into how carbon deposition affects catalyst activity and gas flow through the packed bed reactor.
This document provides guidance on how to create an informational product (info product) to sell online. It discusses that info products include ebooks, reports, software, videos, websites, newsletters and more. It then offers several strategies for creating an info product, including co-authoring with an expert if you have writing skills or hiring a ghost writer if you have expertise. It also suggests compiling a directory or becoming an affiliate to sell other companies' info products. The document concludes by emphasizing that the info product must solve a problem and provide significantly more value than its price.
Investigation on Using Fractal Geometry for Classification of Partial Dischar...IOSR Journals
1) The document investigates using fractal geometry to classify partial discharge (PD) patterns from different insulation defects.
2) Fractal features like fractal dimension and lacunarity are extracted from 3D PD patterns using box counting. Each PD pattern has a unique fractal dimension and multiple lacunarity values depending on box size.
3) Neural networks are used to classify PD patterns based on their fractal features. The goal is to minimize input features to improve classification performance. Different lacunarity values from varying box sizes are analyzed to find those most useful for classification.
This document provides a cost estimation for a cashew extract evaporator plant in Nigeria. It estimates the costs of equipment using scaling factors and cost indexes from 1990 to 2013, accounting for inflation. The total fixed capital investment is estimated to be $416,272.96. An analysis is done to compare using a single effect or double effects evaporator. It is determined that a double effects evaporator would provide the highest return on investment at 37.78% compared to 29.45% for a single effect. The break-even point is calculated to be 13,369,609.7 units per year based on the annual direct production and fixed costs. The gross annual earnings are $286,714.588 and the net annual
Hiding Text within Image Using LSB ReplacementIOSR Journals
The document proposes a new algorithm for hiding text within a gray image using least significant bit (LSB) replacement with increased security. The algorithm generates a random key between 1-256 to encrypt the text before embedding it in the image. It uses XOR and AND logic operations to modify the LSB of pixel values and embed the encrypted text. Experimental results show the embedded text can be concealed within the image while maintaining high image quality with PSNR values over 75dB. The algorithm aims to improve upon basic LSB techniques by adding an encryption step using a random key to enhance security of the hidden text.
Looking back at your preliminary task, whatlisadors
The document discusses the learning from a preliminary task to a full product. For the preliminary task, good planning and time management led to success. While the technology was initially challenging, more experience with equipment and software helped improve the main task. Overall, lessons from mistakes in the preliminary task and greater familiarity with tools supported significant improvement over the months of work.
The document discusses censorship and the British Board of Film Classification (BBFC). It defines censorship as the suppression of speech or communication deemed objectionable by a governing body. It describes the BBFC as the non-governmental organization responsible for film classification and censorship in the UK. The BBFC classifies videos, DVDs, and some video games according to the Video Recordings Act, and can restrict releases to certain age groups or licensed shops. Films are normally classified by two examiners using published guidelines considering issues like content, context, and intended audience.
The document is a production schedule and location visit sheet for the program "The Debt" being produced by Lisa and directed by Chloe on November 20, 2012. The filming location can be accessed via bus 468 to Thorthon Heath. Potential issues noted include safety from robbery, slipping on location, and checking the weather forecast as filming will be outdoors. The production team is reminded to bring all necessary equipment, props, and costumes.
This production schedule location visit sheet provides details for the filming of "The Debt" including the program title, writer, producer, and director. It notes that the location can be accessed via bus 468 to Thorthon Heath and lists the location contact as Troy and his phone number. Health and safety issues include avoiding robbery, being aware of electricity cables, and not slipping. Potential filming problems note checking the weather forecast as filming will be outside. Notes remind the crew to bring all necessary equipment, props, and costumes.
This character profile describes a 15-18 year old British male student. He is outgoing, friendly, and popular with his peers and girls. While he thinks school is a waste of time, he enjoys socializing and his drama, art, and maths classes. In his free time, he likes skateboarding, movies, piercings, tattoos, spending time with his family, animals, and the computer. His goals are to work as a graphic designer and open his own skate park.