In this paper, we have studied on the topic of „Corruption‟. Also, I will try to find or study the effect of corruption on the Development of the country or any country of the world. Therefore, how find the solution of the problem of corruption will be destroyed completely from the society. We have observed that the Development of the country depends upon Corruption. That is, when the Corruption increases, Development decreases automatically of any country of the world. Therefore, I will try to find the formula on the problem of „Relation between the Corruption and Development of any field or any country of the world‟. Also, I have to highlight the concept of „Application of Mathematical modeling in the interesting problem “corruption” in every field of our country or world .Also, Applied Mathematics focuses on the formulation and study of Mathematical Models .Thus the activity of Applied Mathematics is vitally connected with Research in Pure Mathematics. So I will try to study on it and find, what is corruption and quantity of corruption and also find the growth of corruption and how it will decay? Now we convert this areal world problem to mathematics problem and find some formulae on it such as Mathematical Corruption Growth formula, Mathematical Constant corruption level formula and Mathematical decay of corruption formula.
This document provides a review of information technology implementation for the educational development of rural India. It discusses several key points:
1) It provides an overview of the Indian education system, including the roles of public and private sectors as well as various supporting institutions.
2) It identifies several problems faced by students in rural areas, such as lack of adequate teachers and infrastructure like classrooms and toilets.
3) It discusses how information and communication technologies (ICT) like computers, internet, mobile phones can help improve quality of education through distance learning programs and training teachers.
4) It outlines several approaches that have been used to promote education in rural India using ICT, including village knowledge centers, e
This document summarizes a research paper analyzing the sustainability opportunities and challenges of the biofuels industry in India. The paper aims to answer three questions: 1) What are some significant sustainability opportunities and challenges of the biofuels industry? 2) What is the current state of biofuel operations in India? 3) What initial steps can be taken toward sustainable biofuel development? The response analyzes strategic sustainable development approaches and tools like the Natural Step Framework. Key points discussed include economic, environmental and social sustainability assessments of biomass and biofuels, including issues of profitability, efficiency, equity, energy balance, greenhouse gas emissions and life cycle assessments. Challenges in implementing ethanol blending programs in India like taxation and availability of
This document summarizes a study that analyzed the deformation behavior of different planar solid shear wall-frame arrangements in a 15-story reinforced concrete office building subjected to wind loads. Four different arrangements of equivalent shear wall stiffnesses were considered. A 3D finite element analysis was performed using STAAD Pro software. The results showed that the arrangement with shear walls positioned parallel to and away from the wind direction centroidal axis of the frame had the minimum storey displacement, indicating it was the best arrangement for minimizing deformation. Internal forces like axial forces, moments and shears were also compared between the arrangements. There was a strong positive correlation between beam moment and maximum displacement.
This document presents a new approach for determining a propagation model adapted to the environment of Yaounde, Cameroon using genetic algorithms. Radio measurements were taken in Yaounde's CDMA2000 1X-EVDO network across different environments. A genetic algorithm is used to develop a propagation model by minimizing the error between measured and predicted signal strengths. The new model is found to better represent the local environment compared to standard models like Okumura-Hata, based on a lower root mean squared error. The developed propagation model can be used for radio network planning in Yaounde.
The document reports on an investigation into using Guinea Corn Husk Ash (GCHA) as a partial replacement for cement in concrete. GCHA was analyzed and found to meet requirements for a pozzolanic material with over 70% combined silicon, aluminum, and iron. Concrete mixes were made with 0-25% GCHA replacement by weight. Compressive strength generally decreased as replacement increased but was highest at 5% replacement, exceeding the control mix. Density also slightly decreased with increasing replacement except at 5%. Workability test results fell within acceptable ranges. In conclusion, 5-10% GCHA replacement produced strong concrete and GCHA can be effectively used as a pozzolanic cement replacement.
This document presents a case study on improving productivity at Chartered Rubber Products through the application of quality control tools and systematic layout planning (SLP). Currently, Chartered Rubber Products follows outdated practices and has an inefficient layout that results in long travel distances between machines. The study collects data on Chartered's processes, equipment sizes, and current layout. It then performs analysis using relationship charts and flow process charts. Finally, a new layout is proposed using SLP that reduces travel distances between operations by 185 feet, thereby improving productivity through reduced time and effort.
This document discusses using a D-STATCOM (Distribution Static Compensator) to improve power quality and voltage stability in a power system. It presents a MATLAB simulation of a 4-bus power system with generators, loads, and a fault, both with and without a D-STATCOM. The simulation shows that without the D-STATCOM, voltage fluctuates during the fault. With the D-STATCOM, it regulates the voltage at each bus to 1 per unit. The D-STATCOM also regulates active and reactive power transfer to stabilize voltage. Therefore, the paper concludes that D-STATCOM improves power quality and maintains voltage stability in the system.
Meditation for stress reduction in Indian Army- An Experimental StudyIOSR Journals
1.1 Stress is defined as “the non-specific response of the body to any demand made upon it.” Hans Sely (1956). Lazarous (1966) maintains that stress occurs when demands on the person which tax or exceed his judgment resources. McGrath JE (1990) explains that there is a potential for stress when an environmental situation is perceived as presenting a demand which threatens to exceed the person‟s capabilities and resources for meeting it under conditions where he has expected a substantial differential in the rewards and cost for meeting the demands verses not meeting it.Stress can be the result of external situations such as an abusive relationship or poor working conditions. Stress can also be the result of internal situations or stressors such as worrying or having pessimistic thoughts about future. Work being the central theme to the life and a social reality provides a status to the individual and his bond to the society by way of quality of work or position he attains. This ultimately leads to raise the standard of living or we can call it desire to grow, so that we can get recognition and social status in the society. In the ambition to grow we begin to work more than our capabilities and thus strain ourselves and thus lead to stress. (Prestonjee DM &Muncherji (1991)). Duration in stress is another variable which acts as a factor causing stronger stress response. This is in consistence with uncertainty theory of occupational stress by Beer TA and Bhagat RS (1985).Each individual needs a moderate amount of stress to be alert and capable of functioning effectively in an organization. Hence stress is inherent in the concept of creativity. [Pestonjee(1991) Pareek(1993)].
This document provides a review of information technology implementation for the educational development of rural India. It discusses several key points:
1) It provides an overview of the Indian education system, including the roles of public and private sectors as well as various supporting institutions.
2) It identifies several problems faced by students in rural areas, such as lack of adequate teachers and infrastructure like classrooms and toilets.
3) It discusses how information and communication technologies (ICT) like computers, internet, mobile phones can help improve quality of education through distance learning programs and training teachers.
4) It outlines several approaches that have been used to promote education in rural India using ICT, including village knowledge centers, e
This document summarizes a research paper analyzing the sustainability opportunities and challenges of the biofuels industry in India. The paper aims to answer three questions: 1) What are some significant sustainability opportunities and challenges of the biofuels industry? 2) What is the current state of biofuel operations in India? 3) What initial steps can be taken toward sustainable biofuel development? The response analyzes strategic sustainable development approaches and tools like the Natural Step Framework. Key points discussed include economic, environmental and social sustainability assessments of biomass and biofuels, including issues of profitability, efficiency, equity, energy balance, greenhouse gas emissions and life cycle assessments. Challenges in implementing ethanol blending programs in India like taxation and availability of
This document summarizes a study that analyzed the deformation behavior of different planar solid shear wall-frame arrangements in a 15-story reinforced concrete office building subjected to wind loads. Four different arrangements of equivalent shear wall stiffnesses were considered. A 3D finite element analysis was performed using STAAD Pro software. The results showed that the arrangement with shear walls positioned parallel to and away from the wind direction centroidal axis of the frame had the minimum storey displacement, indicating it was the best arrangement for minimizing deformation. Internal forces like axial forces, moments and shears were also compared between the arrangements. There was a strong positive correlation between beam moment and maximum displacement.
This document presents a new approach for determining a propagation model adapted to the environment of Yaounde, Cameroon using genetic algorithms. Radio measurements were taken in Yaounde's CDMA2000 1X-EVDO network across different environments. A genetic algorithm is used to develop a propagation model by minimizing the error between measured and predicted signal strengths. The new model is found to better represent the local environment compared to standard models like Okumura-Hata, based on a lower root mean squared error. The developed propagation model can be used for radio network planning in Yaounde.
The document reports on an investigation into using Guinea Corn Husk Ash (GCHA) as a partial replacement for cement in concrete. GCHA was analyzed and found to meet requirements for a pozzolanic material with over 70% combined silicon, aluminum, and iron. Concrete mixes were made with 0-25% GCHA replacement by weight. Compressive strength generally decreased as replacement increased but was highest at 5% replacement, exceeding the control mix. Density also slightly decreased with increasing replacement except at 5%. Workability test results fell within acceptable ranges. In conclusion, 5-10% GCHA replacement produced strong concrete and GCHA can be effectively used as a pozzolanic cement replacement.
This document presents a case study on improving productivity at Chartered Rubber Products through the application of quality control tools and systematic layout planning (SLP). Currently, Chartered Rubber Products follows outdated practices and has an inefficient layout that results in long travel distances between machines. The study collects data on Chartered's processes, equipment sizes, and current layout. It then performs analysis using relationship charts and flow process charts. Finally, a new layout is proposed using SLP that reduces travel distances between operations by 185 feet, thereby improving productivity through reduced time and effort.
This document discusses using a D-STATCOM (Distribution Static Compensator) to improve power quality and voltage stability in a power system. It presents a MATLAB simulation of a 4-bus power system with generators, loads, and a fault, both with and without a D-STATCOM. The simulation shows that without the D-STATCOM, voltage fluctuates during the fault. With the D-STATCOM, it regulates the voltage at each bus to 1 per unit. The D-STATCOM also regulates active and reactive power transfer to stabilize voltage. Therefore, the paper concludes that D-STATCOM improves power quality and maintains voltage stability in the system.
Meditation for stress reduction in Indian Army- An Experimental StudyIOSR Journals
1.1 Stress is defined as “the non-specific response of the body to any demand made upon it.” Hans Sely (1956). Lazarous (1966) maintains that stress occurs when demands on the person which tax or exceed his judgment resources. McGrath JE (1990) explains that there is a potential for stress when an environmental situation is perceived as presenting a demand which threatens to exceed the person‟s capabilities and resources for meeting it under conditions where he has expected a substantial differential in the rewards and cost for meeting the demands verses not meeting it.Stress can be the result of external situations such as an abusive relationship or poor working conditions. Stress can also be the result of internal situations or stressors such as worrying or having pessimistic thoughts about future. Work being the central theme to the life and a social reality provides a status to the individual and his bond to the society by way of quality of work or position he attains. This ultimately leads to raise the standard of living or we can call it desire to grow, so that we can get recognition and social status in the society. In the ambition to grow we begin to work more than our capabilities and thus strain ourselves and thus lead to stress. (Prestonjee DM &Muncherji (1991)). Duration in stress is another variable which acts as a factor causing stronger stress response. This is in consistence with uncertainty theory of occupational stress by Beer TA and Bhagat RS (1985).Each individual needs a moderate amount of stress to be alert and capable of functioning effectively in an organization. Hence stress is inherent in the concept of creativity. [Pestonjee(1991) Pareek(1993)].
Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...IOSR Journals
Abstract: The computer networks have evolved themselves into an altogether new generation with Mobile Ad-Hoc networks. The Mobile Ad-Hoc Networks are increasingly becoming more sophisticated and complex in terms of topology, routing and security[1][2][3]The new age MANETs incorporate routing of heavier traffic classes like audio, video and multimedia. It has become important to study the performance characteristics of the multimedia traffic class in MANETS [10] that includes packet loss rate and throughput. In this paper we will discuss these performance parameter throughput under different scenarios like varying Bandwidth, channel error rate, delay and fragment size. Keywords: MANET, Packet loss rate, Throughput, Bandwidth, Fragment size
This document summarizes a technique for modified contrast enhancement of images using Laplacian and Gaussian fusion. It begins by discussing contrast enhancement and image fusion techniques. It then proposes a method that takes two input images, decomposes them using Laplacian pyramid decomposition, and computes their Gaussian pyramids. Weights are assigned to levels in each pyramid before fusing the images to produce a contrast-enhanced output image with improved brightness and visibility of details. The technique aims to enhance local contrast while preserving global features.
The document discusses securing biometric templates when transmitted over non-secure channels by selecting partial fingerprint and iris data, encrypting it using AES with an iris hash as the key, and transmitting the encrypted data. It outlines the need to protect biometric data due to risks of identity theft if templates are compromised. Various attacks on biometric systems and methods of template protection including cryptography and cancelable biometrics are also reviewed.
‘Indian Agriculture: A Fresh Approach Towards Green Revolution 2.0’IOSR Journals
The agriculture sector which employs more than 55% of the country workforce whereas share of agriculture and allied sector to total GDP is 14.1% (2011-12). The farm sector achieved 3.6% growth during the 11th Five Year Plan (2007-12), falling short of the 4% growth target, although it was much higher than growth of 2.5 and 2.4% during 9th and 10th plan respectively. Thus, the sector needs urgent reforms to boost crop yields and private investment in infrastructure so as to motivate farmers and feed the growing population. At the latest Economic Survey (2012-13) points out that “India is at a juncture where further reforms are urgently required to achieve greater efficiency and productivity in agriculture for sustaining growth. There is a need to have stable and consistent policies where markets play a deserving role and private investment in infrastructure is stepped up. An efficient supply chaim that firmly establishes the linkage between retail demand and the farmer will be important”
This document proposes an online planning system using fuzzy logic to control the motion of a serial manipulator robot with multiple links. The system consists of separate fuzzy logic controllers for each link. Each fuzzy controller uses inputs like position error and current joint position to determine the change in joint position needed to move the end effector towards the desired goal position. Simulation results showed the robot could successfully reach the goal point with minimum error in path planning. Membership functions and rules were designed for each fuzzy controller based on the robot kinematics model. The center of gravity defuzzification method was used to determine the crisp output from each fuzzy controller.
This document describes the design and fabrication of a prototype for testing the durability of seat belt retractors. The current testing machine has limitations like not being able to test retractors at different mounting angles and extract/retract lengths. The new prototype aims to address these using a stepper motor, spring system instead of bungee, and sensors to detect the snatch produced every 4 cycles. It involves calculations to select components like the pneumatic cylinder, FRL unit, spring, and shaft based on the required forces, strokes and flows. A 3D model was developed and simulations conducted to validate the design. The physical prototype was then fabricated to cater to increasing demand for seat belt testing.
This document discusses finding an optimum transmission range in a wireless sensor network to balance delay and energy consumption. It analyzes how transmission range, node deployment, number of hops, and forwarding techniques affect energy usage. The researchers deployed sensor nodes in a grid and evaluated greedy forwarding and residual energy forwarding under varying transmission ranges. They found that an optimal range exists that uses less energy per transmission while minimizing the number of hops needed to reach destinations.
Prediction of Consumer Purchase Decision using Demographic Variables: A Study...IOSR Journals
The demographic environment is of major interest to marketers because it involves people and people make up market. Fragmentation of the mass market into numerous micro markets differentiated by age, sex, education, life style, geography and so on. Because each group has strong preferences and consumer characteristics that can be easily reached through increasingly targeted communication and distribution channels. Most of marketers’ strategic decision making heavily depend on the demographic variables of people in the region where they focus on marketing their products. This study makes known the vital demographic structure of premium car owners in Chennai city and provides models for predicting the consumer’s decision to buy a car when his exact demographic profile is known. The relationship established between the demographic variables and the different stages of consumer’s purchase decision process further helps identifying the significant demographic variables. This will be definitely helpful to the marketers of cars to know their target group and to evolve marketing strategies to make them becoming a car owner.
Safety Features Evaluation of the Vehicle Interior Using Finite Element Analy...IOSR Journals
This document summarizes a study that used finite element analysis to evaluate vehicle interior safety features. The study analyzed head injury criteria (HIC) from impacts of a free motion headform at various points inside a vehicle model, both with and without interior trim components. The results showed that HIC exceeded the safety standard limit of 1000 during impacts on the bare vehicle structure but were below 1000 when trim components were included, indicating that trim design can help reduce head accelerations and injuries in crashes.
This document proposes a bandwidth degradation technique to reduce call dropping probability in mobile
networks. It aims to dynamically adjust bandwidth allocation to multiple users according to network conditions
to increase utilization. The technique allows for degrading the quality of existing calls to admit new calls
while maintaining quality of service. Key performance metrics analyzed include degradation ratio, degraded
bandwidth, throughput, and propagation delay. The approach is intended to be implemented using MATLAB
to simulate various mobility patterns for verification.
The document proposes a modified H-shaped microstrip patch antenna with a periodic ground structure to achieve broadband capabilities. Simulation results show the proposed antenna design offers a bandwidth of 52.43% ranging from 3.165-5.565 GHz. The antenna also exhibits stable radiation patterns and a gain of over 2 dB across the entire operating bandwidth, making it suitable for applications such as WLAN, WiMAX, and Bluetooth. Parameter sweeps were performed to optimize the antenna geometry and achieve the desired impedance bandwidth and performance.
This document presents a study on detecting heart disease using clustering and classification techniques. The researchers used the EKSTRAP clustering algorithm to cluster a heart disease dataset into two clusters - one for patients with heart disease and one without. They then used two classifiers - Naive Bayes (statistical) and Modified Simple Distance (distance-based) - to classify new patient data based on the clusters. EKSTRAP clustering achieved higher accuracy than K-means clustering. Both classifiers also had higher accuracy when trained on the EKSTRAP clusters compared to the K-means clusters, demonstrating that improving the clustering stage can enhance the performance of subsequent classification.
Batch Thermodynamics and Kinetic Study for Removal of Cationic Dye from Aqueo...IOSR Journals
Abstract: Model using Iraqi limestone as an adsorbent has been investigated. The influences of equilibrium time, limestone dosage, limestone particle size, pH of solution, adsorption isotherms and temperature on adsorption performance have been experimentally verified by a batch method. The adsorbent used in this study exhibited a good adsorption potential at initial pH 10, temperatures 28ºC, particle size 75 μm, limestone dosage 0.1g for equilibrium time 140 min. The removal efficiency and distribution coefficient have also been determined for the adsorption system as a function of dosage of the adsorbent. The experimental results are described by Langmuir and Freundlich isotherm models. Experimental results show that the kinetic model of pseudo-second order provided a good description of the whole experimental data more than the kinetic of the Lagergren-first order.
The document describes an improved PIN entry method to prevent shoulder surfing attacks. The basic BW method divides numbers between two colored halves in each round. An observer can group entries over rounds to determine a PIN digit. The improved method displays four random colors across ten digit keys in each round. Users enter based on their PIN digit's color. This prevents grouping as colors randomly change, securing PINs even from skilled observers. The method uses sets and permutations to partition colors after each entry.
This document summarizes a study on the effects of occupational stress on the work performance of police officers in Nakuru police division, Kenya. The study found that police officers experience high levels of occupational stress due to factors like role overload and ambiguity. It also found that their work performance was rated as only fair. The study established that high occupational stress negatively impacts the work performance of police officers. Additionally, it was found that police officers lack adequate welfare support despite the stressful nature of their work. The study recommends that the National Police Service Commission implement policies and mechanisms to reduce work-related stress and improve police officers' work performance.
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...IOSR Journals
In RF link, without security the messages exchange between the two devices are monitoring by an
eavesdropper. So the exclusive-OR (XOR) based pad generation protocol is used to safely transfer the data to
the other point with necessary security and it maintaining confidentiality. This protocol produce the cover
coding pad to mask the access password before the datas are transmitted. A specially designed pad generation
will be implemented in digital domain to solve the insecurity problem in data communication RF link. This
protocol developed under regulation of ISO 18000 – 6 type C protocol also known as EPC C1G2 RFID
protocol. The linear feed back shift register (LFSR) generate the pseudo random binary sequence (PRBS) and it
is used as data source to the pad generation function. The Xilinx 13.x software is used for synthesize and
modelsim SE6.0 is used for simulating the result. The pad generation algorithm has been implemented in FPGA
Spartan 3 PQ208-4 board to verify the result
This document discusses performance issues related to the interoperability between IEEE 802.3 (Ethernet or wired LAN) and IEEE 802.11 (wireless LAN) standards in a heterogeneous network environment. It provides an overview of the two standards, including their development and key features. The document then examines interoperability issues that can occur when combining these different network types. It describes how data is exchanged between wired and wireless networks at the data link layer. The document also presents results from a simulation that showed LAN data transfer to be faster than WLAN information exchange.
This document describes an intelligent meta search engine that was developed to efficiently retrieve relevant web documents. The meta search engine submits user queries to multiple traditional search engines including Google, Yahoo, Bing and Ask. It then uses a crawler and modified page ranking algorithm to analyze and rank the results from the different search engines. The top results are then generated and displayed to the user, aimed to be more relevant than results from individual search engines. The meta search engine was implemented using technologies like PHP, MySQL and utilizes components like a graphical user interface, query formulator, metacrawler and redundant URL eliminator.
Recent Developments and Analysis of Electromagnetic Metamaterial with all of ...IOSR Journals
Recent advances in metamaterials (MMs) research have highlighted the possibility to create novel
devices with electromagnetic functionality. The metamaterial have the power which can easily construct
materials with a user-designed EM response with a particular target frequency. This is the important
phenomena of THz frequency region that can make a considerable progress in design fabrication, and define the
characteristics of MMs at THz frequencies. This article illustrates the latest advancements of THz MMs
research.
This document describes a genetic algorithm approach for automatically generating fuzzy rules for classification problems. The genetic algorithm uses rule importance as the fitness criteria, calculated as the rule's support for each class. The algorithm encodes rules using fuzzy membership set numbers for antecedents and consequents. It iterates for a set number of generations or until a minimum number of rules are fired, selecting high-fitness rules to generate offspring via crossover. The offspring replace lower-fitness rules, and the new rule population is evaluated in the next generation. The approach aims to consistently generate optimal fuzzy rules for classification using genetic search.
Mathematical Modelling: A Study of Corruption in the Society of IndiaIOSRJM
A study of mathematical model for corruption and its control, that is Mathematical Corruption Model, it is statistically fit as well as valid for measuring corruption in the society. This is the mathematically method for measuring corruption in the society. When quantity of corruption is known, then there is no difficulty to remove the corruption from the society. Sometimes in corruption problems, there is no a priori information available, therefore the Mathematical Corruption Model (or MC model) is known as black box model
2000 Word Essay How Long Introduction. Online assignment writing service.Tammy Adams
This document provides instructions for requesting an assignment writing service from HelpWriting.net in 5 steps:
1. Create an account with a password and email.
2. Complete a 10-minute order form with instructions, sources, and deadline.
3. Choose a writer based on their bid, qualifications, history, and feedback.
4. Review the completed paper and authorize payment if satisfied.
5. Request revisions to ensure satisfaction, and the company guarantees original, high-quality content or a full refund.
Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...IOSR Journals
Abstract: The computer networks have evolved themselves into an altogether new generation with Mobile Ad-Hoc networks. The Mobile Ad-Hoc Networks are increasingly becoming more sophisticated and complex in terms of topology, routing and security[1][2][3]The new age MANETs incorporate routing of heavier traffic classes like audio, video and multimedia. It has become important to study the performance characteristics of the multimedia traffic class in MANETS [10] that includes packet loss rate and throughput. In this paper we will discuss these performance parameter throughput under different scenarios like varying Bandwidth, channel error rate, delay and fragment size. Keywords: MANET, Packet loss rate, Throughput, Bandwidth, Fragment size
This document summarizes a technique for modified contrast enhancement of images using Laplacian and Gaussian fusion. It begins by discussing contrast enhancement and image fusion techniques. It then proposes a method that takes two input images, decomposes them using Laplacian pyramid decomposition, and computes their Gaussian pyramids. Weights are assigned to levels in each pyramid before fusing the images to produce a contrast-enhanced output image with improved brightness and visibility of details. The technique aims to enhance local contrast while preserving global features.
The document discusses securing biometric templates when transmitted over non-secure channels by selecting partial fingerprint and iris data, encrypting it using AES with an iris hash as the key, and transmitting the encrypted data. It outlines the need to protect biometric data due to risks of identity theft if templates are compromised. Various attacks on biometric systems and methods of template protection including cryptography and cancelable biometrics are also reviewed.
‘Indian Agriculture: A Fresh Approach Towards Green Revolution 2.0’IOSR Journals
The agriculture sector which employs more than 55% of the country workforce whereas share of agriculture and allied sector to total GDP is 14.1% (2011-12). The farm sector achieved 3.6% growth during the 11th Five Year Plan (2007-12), falling short of the 4% growth target, although it was much higher than growth of 2.5 and 2.4% during 9th and 10th plan respectively. Thus, the sector needs urgent reforms to boost crop yields and private investment in infrastructure so as to motivate farmers and feed the growing population. At the latest Economic Survey (2012-13) points out that “India is at a juncture where further reforms are urgently required to achieve greater efficiency and productivity in agriculture for sustaining growth. There is a need to have stable and consistent policies where markets play a deserving role and private investment in infrastructure is stepped up. An efficient supply chaim that firmly establishes the linkage between retail demand and the farmer will be important”
This document proposes an online planning system using fuzzy logic to control the motion of a serial manipulator robot with multiple links. The system consists of separate fuzzy logic controllers for each link. Each fuzzy controller uses inputs like position error and current joint position to determine the change in joint position needed to move the end effector towards the desired goal position. Simulation results showed the robot could successfully reach the goal point with minimum error in path planning. Membership functions and rules were designed for each fuzzy controller based on the robot kinematics model. The center of gravity defuzzification method was used to determine the crisp output from each fuzzy controller.
This document describes the design and fabrication of a prototype for testing the durability of seat belt retractors. The current testing machine has limitations like not being able to test retractors at different mounting angles and extract/retract lengths. The new prototype aims to address these using a stepper motor, spring system instead of bungee, and sensors to detect the snatch produced every 4 cycles. It involves calculations to select components like the pneumatic cylinder, FRL unit, spring, and shaft based on the required forces, strokes and flows. A 3D model was developed and simulations conducted to validate the design. The physical prototype was then fabricated to cater to increasing demand for seat belt testing.
This document discusses finding an optimum transmission range in a wireless sensor network to balance delay and energy consumption. It analyzes how transmission range, node deployment, number of hops, and forwarding techniques affect energy usage. The researchers deployed sensor nodes in a grid and evaluated greedy forwarding and residual energy forwarding under varying transmission ranges. They found that an optimal range exists that uses less energy per transmission while minimizing the number of hops needed to reach destinations.
Prediction of Consumer Purchase Decision using Demographic Variables: A Study...IOSR Journals
The demographic environment is of major interest to marketers because it involves people and people make up market. Fragmentation of the mass market into numerous micro markets differentiated by age, sex, education, life style, geography and so on. Because each group has strong preferences and consumer characteristics that can be easily reached through increasingly targeted communication and distribution channels. Most of marketers’ strategic decision making heavily depend on the demographic variables of people in the region where they focus on marketing their products. This study makes known the vital demographic structure of premium car owners in Chennai city and provides models for predicting the consumer’s decision to buy a car when his exact demographic profile is known. The relationship established between the demographic variables and the different stages of consumer’s purchase decision process further helps identifying the significant demographic variables. This will be definitely helpful to the marketers of cars to know their target group and to evolve marketing strategies to make them becoming a car owner.
Safety Features Evaluation of the Vehicle Interior Using Finite Element Analy...IOSR Journals
This document summarizes a study that used finite element analysis to evaluate vehicle interior safety features. The study analyzed head injury criteria (HIC) from impacts of a free motion headform at various points inside a vehicle model, both with and without interior trim components. The results showed that HIC exceeded the safety standard limit of 1000 during impacts on the bare vehicle structure but were below 1000 when trim components were included, indicating that trim design can help reduce head accelerations and injuries in crashes.
This document proposes a bandwidth degradation technique to reduce call dropping probability in mobile
networks. It aims to dynamically adjust bandwidth allocation to multiple users according to network conditions
to increase utilization. The technique allows for degrading the quality of existing calls to admit new calls
while maintaining quality of service. Key performance metrics analyzed include degradation ratio, degraded
bandwidth, throughput, and propagation delay. The approach is intended to be implemented using MATLAB
to simulate various mobility patterns for verification.
The document proposes a modified H-shaped microstrip patch antenna with a periodic ground structure to achieve broadband capabilities. Simulation results show the proposed antenna design offers a bandwidth of 52.43% ranging from 3.165-5.565 GHz. The antenna also exhibits stable radiation patterns and a gain of over 2 dB across the entire operating bandwidth, making it suitable for applications such as WLAN, WiMAX, and Bluetooth. Parameter sweeps were performed to optimize the antenna geometry and achieve the desired impedance bandwidth and performance.
This document presents a study on detecting heart disease using clustering and classification techniques. The researchers used the EKSTRAP clustering algorithm to cluster a heart disease dataset into two clusters - one for patients with heart disease and one without. They then used two classifiers - Naive Bayes (statistical) and Modified Simple Distance (distance-based) - to classify new patient data based on the clusters. EKSTRAP clustering achieved higher accuracy than K-means clustering. Both classifiers also had higher accuracy when trained on the EKSTRAP clusters compared to the K-means clusters, demonstrating that improving the clustering stage can enhance the performance of subsequent classification.
Batch Thermodynamics and Kinetic Study for Removal of Cationic Dye from Aqueo...IOSR Journals
Abstract: Model using Iraqi limestone as an adsorbent has been investigated. The influences of equilibrium time, limestone dosage, limestone particle size, pH of solution, adsorption isotherms and temperature on adsorption performance have been experimentally verified by a batch method. The adsorbent used in this study exhibited a good adsorption potential at initial pH 10, temperatures 28ºC, particle size 75 μm, limestone dosage 0.1g for equilibrium time 140 min. The removal efficiency and distribution coefficient have also been determined for the adsorption system as a function of dosage of the adsorbent. The experimental results are described by Langmuir and Freundlich isotherm models. Experimental results show that the kinetic model of pseudo-second order provided a good description of the whole experimental data more than the kinetic of the Lagergren-first order.
The document describes an improved PIN entry method to prevent shoulder surfing attacks. The basic BW method divides numbers between two colored halves in each round. An observer can group entries over rounds to determine a PIN digit. The improved method displays four random colors across ten digit keys in each round. Users enter based on their PIN digit's color. This prevents grouping as colors randomly change, securing PINs even from skilled observers. The method uses sets and permutations to partition colors after each entry.
This document summarizes a study on the effects of occupational stress on the work performance of police officers in Nakuru police division, Kenya. The study found that police officers experience high levels of occupational stress due to factors like role overload and ambiguity. It also found that their work performance was rated as only fair. The study established that high occupational stress negatively impacts the work performance of police officers. Additionally, it was found that police officers lack adequate welfare support despite the stressful nature of their work. The study recommends that the National Police Service Commission implement policies and mechanisms to reduce work-related stress and improve police officers' work performance.
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...IOSR Journals
In RF link, without security the messages exchange between the two devices are monitoring by an
eavesdropper. So the exclusive-OR (XOR) based pad generation protocol is used to safely transfer the data to
the other point with necessary security and it maintaining confidentiality. This protocol produce the cover
coding pad to mask the access password before the datas are transmitted. A specially designed pad generation
will be implemented in digital domain to solve the insecurity problem in data communication RF link. This
protocol developed under regulation of ISO 18000 – 6 type C protocol also known as EPC C1G2 RFID
protocol. The linear feed back shift register (LFSR) generate the pseudo random binary sequence (PRBS) and it
is used as data source to the pad generation function. The Xilinx 13.x software is used for synthesize and
modelsim SE6.0 is used for simulating the result. The pad generation algorithm has been implemented in FPGA
Spartan 3 PQ208-4 board to verify the result
This document discusses performance issues related to the interoperability between IEEE 802.3 (Ethernet or wired LAN) and IEEE 802.11 (wireless LAN) standards in a heterogeneous network environment. It provides an overview of the two standards, including their development and key features. The document then examines interoperability issues that can occur when combining these different network types. It describes how data is exchanged between wired and wireless networks at the data link layer. The document also presents results from a simulation that showed LAN data transfer to be faster than WLAN information exchange.
This document describes an intelligent meta search engine that was developed to efficiently retrieve relevant web documents. The meta search engine submits user queries to multiple traditional search engines including Google, Yahoo, Bing and Ask. It then uses a crawler and modified page ranking algorithm to analyze and rank the results from the different search engines. The top results are then generated and displayed to the user, aimed to be more relevant than results from individual search engines. The meta search engine was implemented using technologies like PHP, MySQL and utilizes components like a graphical user interface, query formulator, metacrawler and redundant URL eliminator.
Recent Developments and Analysis of Electromagnetic Metamaterial with all of ...IOSR Journals
Recent advances in metamaterials (MMs) research have highlighted the possibility to create novel
devices with electromagnetic functionality. The metamaterial have the power which can easily construct
materials with a user-designed EM response with a particular target frequency. This is the important
phenomena of THz frequency region that can make a considerable progress in design fabrication, and define the
characteristics of MMs at THz frequencies. This article illustrates the latest advancements of THz MMs
research.
This document describes a genetic algorithm approach for automatically generating fuzzy rules for classification problems. The genetic algorithm uses rule importance as the fitness criteria, calculated as the rule's support for each class. The algorithm encodes rules using fuzzy membership set numbers for antecedents and consequents. It iterates for a set number of generations or until a minimum number of rules are fired, selecting high-fitness rules to generate offspring via crossover. The offspring replace lower-fitness rules, and the new rule population is evaluated in the next generation. The approach aims to consistently generate optimal fuzzy rules for classification using genetic search.
Mathematical Modelling: A Study of Corruption in the Society of IndiaIOSRJM
A study of mathematical model for corruption and its control, that is Mathematical Corruption Model, it is statistically fit as well as valid for measuring corruption in the society. This is the mathematically method for measuring corruption in the society. When quantity of corruption is known, then there is no difficulty to remove the corruption from the society. Sometimes in corruption problems, there is no a priori information available, therefore the Mathematical Corruption Model (or MC model) is known as black box model
2000 Word Essay How Long Introduction. Online assignment writing service.Tammy Adams
This document provides instructions for requesting an assignment writing service from HelpWriting.net in 5 steps:
1. Create an account with a password and email.
2. Complete a 10-minute order form with instructions, sources, and deadline.
3. Choose a writer based on their bid, qualifications, history, and feedback.
4. Review the completed paper and authorize payment if satisfied.
5. Request revisions to ensure satisfaction, and the company guarantees original, high-quality content or a full refund.
This document summarizes a study that uses an artificial complex network model to analyze how social welfare systems impact cooperative behavior. The model represents individuals as nodes in a network and studies how tax rates, minimum income guarantees, and betrayal impact cooperation over time. Simulation results found that dynamically adjusting these welfare policies allowed the network to more quickly reach equilibrium and reduced fluctuations in betrayal rates, suggesting welfare systems can stabilize social cooperation.
The Effect of Social Welfare System Based on the Complex Networkcsandit
With the passage of time, the development of communication technology and transportation
broke the isolation among people. Relationship tends to be complicated, pluralism, dynamism.
In the network where interpersonal relationship and evolved complex net based on game theory
work serve respectively as foundation architecture and theoretical model, with the combination
of game theory and regard public welfare as influencing factor, we artificially initialize that
closed network system. Through continual loop operation of the program ,we summarize the
changing rule of the cooperative behavior in the interpersonal relationship, so that we can
analyze the policies about welfare system about whole network and the relationship of
frequency of betrayal in cooperative behavior. Most analytical data come from some simple
investigations and some estimates based on internet and environment and the study put
emphasis on simulating social network and analyze influence of social welfare system on
Cooperative Behavior .
This document discusses corruption in Indian governance. It defines corruption as the misuse of public office for private gain. Corruption exists at all levels of government and society. Both public officials and citizens share responsibility as they both participate in corrupt acts. The document examines the causes of corruption and suggests measures to prevent it, including improving governance, enforcing rule of law, and increasing public awareness of rights. Overall, the document analyzes the problem of corruption in India and how different stakeholders must work together to reduce corrupt practices.
This document outlines a half-day training on corruption for a university ethics club. It defines corruption and explains different theories and types of corruption. It also discusses methods for identifying corruption risks, fighting corruption through various approaches, and cases of corruption in the construction sector globally. Specifically, it provides examples of corruption and building collapses in Bangladesh and Tanzania's construction industries that resulted in loss of life due to violations of building codes and instability.
This document summarizes a seminar paper on the nexus between corruption and economic growth in Sub-Saharan Africa. The paper aims to examine the effect of corruption on economic growth in SSA and analyze the interactive effect of corruption and unemployment on growth. Using a dynamic panel data model and System GMM estimation on data from 40 SSA countries from 2008-2022, the paper finds: 1) Higher corruption is negatively associated with lower economic growth in SSA; 2) Unemployment does not significantly impact growth; 3) There is no significant interaction between corruption and unemployment on growth. The results provide evidence that reducing corruption could promote increased economic growth in the region.
Free Printable Dr Seuss Border - Printable Word SeRobyn Martin
Terry Eagleton discusses several literary theory approaches that could be applied to analyzing Virginia Woolf's A Room of One's Own, including reader response theory, feminism, psychoanalytic theory, historicism, and formalism. However, a full analysis using copyrighted text would require the author's permission.
Social forecasting can supplement economic and technological forecasting by incorporating important social factors not addressed in other types of forecasting. Social forecasting examines trends in areas like demographics, lifestyle changes, and societal shifts. While not as precise as other forecasting methods, social forecasting provides managers with a better understanding of environmental forces shaping their business. It considers people as individual actors and as members of groups to develop a more holistic view of future opportunities and challenges. Organizations need to incorporate social forecasting insights along with economic and technological forecasts for effective strategic planning.
This document discusses risk management, risk regulation, and blame culture in social work. It provides examples of approaches to risk management for released offenders such as improved communication, standardized risk assessment procedures, and local resistance to housing ex-offenders. The document suggests that blame culture has increased due to declining trust in institutions combined with a societal tendency towards negativity and making claims against those in positions of power. Risk regulation aims to control risks through information gathering, standard setting, and influencing behavior.
This document discusses the relationship between corruption and development in less developed countries. It argues that widespread corruption prevents public funds from being used effectively for development goals. Countries that have successfully curtailed corruption through the rule of law have seen more rapid economic progress. While all countries face some level of corruption, developed nations have minimized it more successfully. The document analyzes corruption and competitiveness indices for various countries and finds that those with high corruption tend to be less developed. It concludes corruption must be addressed for goals like the SDGs to be achieved in the developing world.
Chapter 6 ProblemsYOUR ANSWERS MUST APPEAR WITHIN THE PROBLEM .docxketurahhazelhurst
Chapter 6 Problems
YOUR ANSWERS MUST APPEAR WITHIN THE PROBLEM DOCUMENT.
Use the following table to answer question #1.
1a. Using an Excel spreadsheet, create a binarized version of the data set with the following categories:
Note: the following are also the itemset names in the spreadsheet)
Sky Fair, Sky Stormy, Status Impaired, Status Sober, Violation None, Violation Speeding, Violation Stop, Violation Signal, Restraint = No, Restraint=Yes, Crash Major, Crash Minor
Paste the Excel spreadsheet into this document here.
1b. What is the maximum width of each transaction in the binarized data?
1c. How did you determine the answer for item 1b?
1d. Assuming that support threshold is 30%, how many candidate and frequent itemsets will be generated?
1e. Again using Excel, create a data set that contains only the following asymmetric binary attributes:
(Weather = Bad, Impaired, Traffic violation = Yes, Restraint = No, Crash Severity = Major).
The itemset headings are: Bad, Impaired, Violdation, NoRestraint, and Major
For Traffic violation, only None has a value of 0. The rest of the attribute values are assigned to 1.
Copy and paste the Excel spreadsheet here:
Assuming that support threshold is 30%, how many candidate and frequent itemsets will be generated?
1f. Compare the number of candidate and frequent itemsets generated in 1(d) and 1(e). What is your analysis?
2. Find all the frequent subsequences with support >= 50% given the sequence shown below. Assume there are no timing constraints imposed on the sequence.
Answer:
3. For each of the sequences w =< e1e2 . . . ei . . . ei+1 . . . elast > given below, determine whether they are subsequences of the sequence
< {1, 2, 3} {2, 4} {2, 4, 5} {3, 5} {6} >
subjected to the following timing constraints:
mingap = 0 (interval between last event in ei and first event in ei+1 is > 0)
maxgap = 3 (interval between first event in ei and last event in ei+1 is ≤ 3)
maxspan = 5 (interval between first event in e1 and last event in elast is ≤ 5)
ws = 1 (time between first and last events in ei is ≤ 1)
• w =< {1} {2} {3} >
Answer:
• w =< {1, 2, 3, 4} {5, 6} >
Answer:
Answer:
• w =< {1} {2, 4} {6} >
Answer:
• w =< {1, 2} {3, 4} {5, 6} >
Answer:
Public Administration and Information
Technology
Volume 10
Series Editor
Christopher G. Reddick
San Antonio, Texas, USA
[email protected]
More information about this series at http://www.springer.com/series/10796
[email protected]
Marijn Janssen • Maria A. Wimmer
Ameneh Deljoo
Editors
Policy Practice and Digital
Science
Integrating Complex Systems, Social
Simulation and Public Administration
in Policy Research
2123
[email protected]
Editors
Marijn Janssen Ameneh Deljoo
Faculty of Technology, Policy, and Faculty of Technology, Policy, and
Management Management
Delft University of Technology Delft University of Technology
Delft Delft
The Netherlands The Netherlands
Maria A. Wimmer
Institute for ...
The document discusses the importance of social forecasting in strategic planning for corporations. It argues that while economic and technological forecasting are used, they often have large residual errors because social factors are not considered. It provides examples where social trends better explained outcomes than economic predictions. Specifically, it discusses how legalized abortion in the US in 1973 likely contributed to a subsequent decline in crime rates 20 years later. The document advocates supplementing economic/technological forecasts with consideration of social trends to improve accuracy and aid corporate strategic planning.
This document presents a mathematical model for achieving equal humanity using philanthropy and information technology constraints. The model defines sets for the universal world, information technology, humans, and poor people. It proposes that the equal humanity factor is dependent on how evenly philanthropy is distributed among humans through access to information technology. The model exposes stable and unstable conditions for equal humanity based on whether poor populations have access to philanthropic information technology resources or not. The presented model provides a way to systematically analyze and address issues of social equality.
How Writing Essay.Pdf Essays Paragraph. Online assignment writing service.Ashley Hernandez
The document discusses how the world's overpopulation problem will exacerbate issues like disease outbreaks, resource depletion, and poverty as the global population is projected to reach over 10 billion by 2050. It notes how overcrowding will increase the transmission of viruses and diseases, and how demand will outpace renewable resources if population growth is not addressed. Solutions proposed include improving access to family planning and education to slow unsustainable population growth rates.
The facilities of computer technology have not come out without drawbacks. Though it makes the life so speedy and fast, but hurled under the eclipse of threat from the deadliest type of criminality termed as Cybercrime without computers, entire businesses and government operations would almost cease to function. This proliferation of cheap, powerful, user friendly computers has enabled more and more people to use them and, more importantly, rely on them as part of their normal way of life. As businesses, government agencies, and individuals continue to rely on them more and more, so do the criminals Restriction of cybercrimes is dependent on proper analysis of their behavior and understanding of their impacts over various levels of society. Therefore, in the current manuscript a systematic understanding of cybercrimes and their impacts over various areas like Soci eco political, consumer trust, teenager etc. With the future trends of cybercrimes are explained. Dr. Renu | Pawan ""Impact of Cyber Crime: Issues and Challenges"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23456.pdf
Paper URL: https://www.ijtsrd.com/engineering/other/23456/impact-of-cyber-crime-issues-and-challenges/dr-renu
The document discusses the challenges facing Mexico's new National Anti-Corruption System established by a 2015 constitutional reform. It notes that corruption costs Mexico up to 9% of GDP annually and has severely damaged trust in public institutions. The main challenges for the system are coordinating different agencies effectively, overcoming entrenched corrupt practices, simplifying processes to reduce opportunities for graft, promoting accountability, and generating reliable metrics to measure anti-corruption progress over time. Success requires substantive citizen participation and punishment of corruption at all levels without exceptions.
Statistics is a mathematical science including methods of collecting, organizing, and analyzing data in such a way that meaningful conclusions can be drawn from them. In general, its investigations and analyses fall into two broad categories called descriptive and inferential statistics.
Modeling Spread of Disease from Social InteractionsPrashanth Selvam
This document summarizes a research paper that models the spread of disease through social interactions on Twitter. It used machine learning techniques to analyze over 2.5 million geo-tagged Twitter messages to detect illness-related messages and identify social ties to infected people. A support vector machine classifier was able to accurately detect illness tweets. The model also found that social ties and co-location with infected individuals increases the likelihood of contracting an illness. This work provides valuable insights into predicting disease spread through social media data without active user participation.
This document discusses the concept of "risk society" and how it has impacted social work. Some key points:
- Modern society is increasingly preoccupied with managing and avoiding risk. Governments and institutions try to develop sophisticated risk management systems to control social risks.
- Social work has embraced risk management frameworks like risk assessment, risk governance strategies, and performance targets to avoid blame. This has shifted social work's focus from social need to handling "high risk" clients and cases.
- The predominance of risk reconfigures social work according to an economic, instrumental rationality focused on managing and averting risk. This alters relationships within social work and reframes it as an executant role accountable in legal
Similar to Mathematical Modelling: A Comparatively Mathematical Study Model Base between Corruption and Development (20)
This document provides a technical review of secure banking using RSA and AES encryption methodologies. It discusses how RSA and AES are commonly used encryption standards for secure data transmission between ATMs and bank servers. The document first provides background on ATM security measures and risks of attacks. It then reviews related work analyzing encryption techniques. The document proposes using a one-time password in addition to a PIN for ATM authentication. It concludes that implementing encryption standards like RSA and AES can make transactions more secure and build trust in online banking.
This document analyzes the performance of various modulation schemes for achieving energy efficient communication over fading channels in wireless sensor networks. It finds that for long transmission distances, low-order modulations like BPSK are optimal due to their lower SNR requirements. However, as transmission distance decreases, higher-order modulations like 16-QAM and 64-QAM become more optimal since they can transmit more bits per symbol, outweighing their higher SNR needs. Simulations show lifetime extensions up to 550% are possible in short-range networks by using higher-order modulations instead of just BPSK. The optimal modulation depends on transmission distance and balancing the energy used by electronic components versus power amplifiers.
This document provides a review of mobility management techniques in vehicular ad hoc networks (VANETs). It discusses three modes of communication in VANETs: vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), and hybrid vehicle (HV) communication. For each communication mode, different mobility management schemes are required due to their unique characteristics. The document also discusses mobility management challenges in VANETs and outlines some open research issues in improving mobility management for seamless communication in these dynamic networks.
This document provides a review of different techniques for segmenting brain MRI images to detect tumors. It compares the K-means and Fuzzy C-means clustering algorithms. K-means is an exclusive clustering algorithm that groups data points into distinct clusters, while Fuzzy C-means is an overlapping clustering algorithm that allows data points to belong to multiple clusters. The document finds that Fuzzy C-means requires more time for brain tumor detection compared to other methods like hierarchical clustering or K-means. It also reviews related work applying these clustering algorithms to segment brain MRI images.
1) The document simulates and compares the performance of AODV and DSDV routing protocols in a mobile ad hoc network under three conditions: when users are fixed, when users move towards the base station, and when users move away from the base station.
2) The results show that both protocols have higher packet delivery and lower packet loss when users are either fixed or moving towards the base station, since signal strength is better in those scenarios. Performance degrades when users move away from the base station due to weaker signals.
3) AODV generally has better performance than DSDV, with higher throughput and packet delivery rates observed across the different user mobility conditions.
This document describes the design and implementation of 4-bit QPSK and 256-bit QAM modulation techniques using MATLAB. It compares the two techniques based on SNR, BER, and efficiency. The key steps of implementing each technique in MATLAB are outlined, including generating random bits, modulation, adding noise, and measuring BER. Simulation results show scatter plots and eye diagrams of the modulated signals. A table compares the results, showing that 256-bit QAM provides better performance than 4-bit QPSK. The document concludes that QAM modulation is more effective for digital transmission systems.
The document proposes a hybrid technique using Anisotropic Scale Invariant Feature Transform (A-SIFT) and Robust Ensemble Support Vector Machine (RESVM) to accurately identify faces in images. A-SIFT improves upon traditional SIFT by applying anisotropic scaling to extract richer directional keypoints. Keypoints are processed with RESVM and hypothesis testing to increase accuracy above 95% by repeatedly reprocessing images until the threshold is met. The technique was tested on similar and different facial images and achieved better results than SIFT in retrieval time and reduced keypoints.
This document studies the effects of dielectric superstrate thickness on microstrip patch antenna parameters. Three types of probes-fed patch antennas (rectangular, circular, and square) were designed to operate at 2.4 GHz using Arlondiclad 880 substrate. The antennas were tested with and without an Arlondiclad 880 superstrate of varying thicknesses. It was found that adding a superstrate slightly degraded performance by lowering the resonant frequency and increasing return loss and VSWR, while decreasing bandwidth and gain. Specifically, increasing the superstrate thickness or dielectric constant resulted in greater changes to the antenna parameters.
This document describes a wireless environment monitoring system that utilizes soil energy as a sustainable power source for wireless sensors. The system uses a microbial fuel cell to generate electricity from the microbial activity in soil. Two microbial fuel cells were created using different soil types and various additives to produce different current and voltage outputs. An electronic circuit was designed on a printed circuit board with components like a microcontroller and ZigBee transceiver. Sensors for temperature and humidity were connected to the circuit to monitor the environment wirelessly. The system provides a low-cost way to power remote sensors without needing battery replacement and avoids the high costs of wiring a power source.
1) The document proposes a model for a frequency tunable inverted-F antenna that uses ferrite material.
2) The resonant frequency of the antenna can be significantly shifted from 2.41GHz to 3.15GHz, a 31% shift, by increasing the static magnetic field placed on the ferrite material.
3) Altering the permeability of the ferrite allows tuning of the antenna's resonant frequency without changing the physical dimensions, providing flexibility to operate over a wide frequency range.
This document summarizes a research paper that presents a speech enhancement method using stationary wavelet transform. The method first classifies speech into voiced, unvoiced, and silence regions based on short-time energy. It then applies different thresholding techniques to the wavelet coefficients of each region - modified hard thresholding for voiced speech, semi-soft thresholding for unvoiced speech, and setting coefficients to zero for silence. Experimental results using speech from the TIMIT database corrupted with white Gaussian noise at various SNR levels show improved performance over other popular denoising methods.
This document reviews the design of an energy-optimized wireless sensor node that encrypts data for transmission. It discusses how sensing schemes that group nodes into clusters and transmit aggregated data can reduce energy consumption compared to individual node transmissions. The proposed node design calculates the minimum transmission power needed based on received signal strength and uses a periodic sleep/wake cycle to optimize energy when not sensing or transmitting. It aims to encrypt data at both the node and network level to further optimize energy usage for wireless communication.
This document discusses group consumption modes. It analyzes factors that impact group consumption, including external environmental factors like technological developments enabling new forms of online and offline interactions, as well as internal motivational factors at both the group and individual level. The document then proposes that group consumption modes can be divided into four types based on two dimensions: vertical (group relationship intensity) and horizontal (consumption action period). These four types are instrument-oriented, information-oriented, enjoyment-oriented, and relationship-oriented consumption modes. Finally, the document notes that consumption modes are dynamic and can evolve over time.
The document summarizes a study of different microstrip patch antenna configurations with slotted ground planes. Three antenna designs were proposed and their performance evaluated through simulation: a conventional square patch, an elliptical patch, and a star-shaped patch. All antennas were mounted on an FR4 substrate. The effects of adding different slot patterns to the ground plane on resonance frequency, bandwidth, gain and efficiency were analyzed parametrically. Key findings were that reshaping the patch and adding slots increased bandwidth and shifted resonance frequency. The elliptical and star patches in particular performed better than the conventional design. Three antenna configurations were selected for fabrication and measurement based on the simulations: a conventional patch with a slot under the patch, an elliptical patch with slots
1) The document describes a study conducted to improve call drop rates in a GSM network through RF optimization.
2) Drive testing was performed before and after optimization using TEMS software to record network parameters like RxLevel, RxQuality, and events.
3) Analysis found call drops were occurring due to issues like handover failures between sectors, interference from adjacent channels, and overshooting due to antenna tilt.
4) Corrective actions taken included defining neighbors between sectors, adjusting frequencies to reduce interference, and lowering the mechanical tilt of an antenna.
5) Post-optimization drive testing showed improvements in RxLevel, RxQuality, and a reduction in dropped calls.
This document describes the design of an intelligent autonomous wheeled robot that uses RF transmission for communication. The robot has two modes - automatic mode where it can make its own decisions, and user control mode where a user can control it remotely. It is designed using a microcontroller and can perform tasks like object recognition using computer vision and color detection in MATLAB, as well as wall painting using pneumatic systems. The robot's movement is controlled by DC motors and it uses sensors like ultrasonic sensors and gas sensors to navigate autonomously. RF transmission allows communication between the robot and a remote control unit. The overall aim is to develop a low-cost robotic system for industrial applications like material handling.
This document reviews cryptography techniques to secure the Ad-hoc On-Demand Distance Vector (AODV) routing protocol in mobile ad-hoc networks. It discusses various types of attacks on AODV like impersonation, denial of service, eavesdropping, black hole attacks, wormhole attacks, and Sybil attacks. It then proposes using the RC6 cryptography algorithm to secure AODV by encrypting data packets and detecting and removing malicious nodes launching black hole attacks. Simulation results show that after applying RC6, the packet delivery ratio and throughput of AODV increase while delay decreases, improving the security and performance of the network under attack.
The document describes a proposed modification to the conventional Booth multiplier that aims to increase its speed by applying concepts from Vedic mathematics. Specifically, it utilizes the Urdhva Tiryakbhyam formula to generate all partial products concurrently rather than sequentially. The proposed 8x8 bit multiplier was coded in VHDL, simulated, and found to have a path delay 44.35% lower than a conventional Booth multiplier, demonstrating its potential for higher speed.
This document discusses image deblurring techniques. It begins by introducing image restoration and focusing on image deblurring. It then discusses challenges with image deblurring being an ill-posed problem. It reviews existing approaches to screen image deconvolution including estimating point spread functions and iteratively estimating blur kernels and sharp images. The document also discusses handling spatially variant blur and summarizes the relationship between the proposed method and previous work for different blur types. It proposes using color filters in the aperture to exploit parallax cues for segmentation and blur estimation. Finally, it proposes moving the image sensor circularly during exposure to prevent high frequency attenuation from motion blur.
This document describes modeling an adaptive controller for an aircraft roll control system using PID, fuzzy-PID, and genetic algorithm. It begins by introducing the aircraft roll control system and motivation for developing an adaptive controller to minimize errors from noisy analog sensor signals. It then provides the mathematical model of aircraft roll dynamics and describes modeling the real-time flight control system in MATLAB/Simulink. The document evaluates PID, fuzzy-PID, and PID-GA (genetic algorithm) controllers for aircraft roll control and finds that the PID-GA controller delivers the best performance.
PPT on Direct Seeded Rice presented at the three-day 'Training and Validation Workshop on Modules of Climate Smart Agriculture (CSA) Technologies in South Asia' workshop on April 22, 2024.
hematic appreciation test is a psychological assessment tool used to measure an individual's appreciation and understanding of specific themes or topics. This test helps to evaluate an individual's ability to connect different ideas and concepts within a given theme, as well as their overall comprehension and interpretation skills. The results of the test can provide valuable insights into an individual's cognitive abilities, creativity, and critical thinking skills
(June 12, 2024) Webinar: Development of PET theranostics targeting the molecu...Scintica Instrumentation
Targeting Hsp90 and its pathogen Orthologs with Tethered Inhibitors as a Diagnostic and Therapeutic Strategy for cancer and infectious diseases with Dr. Timothy Haystead.
Mending Clothing to Support Sustainable Fashion_CIMaR 2024.pdfSelcen Ozturkcan
Ozturkcan, S., Berndt, A., & Angelakis, A. (2024). Mending clothing to support sustainable fashion. Presented at the 31st Annual Conference by the Consortium for International Marketing Research (CIMaR), 10-13 Jun 2024, University of Gävle, Sweden.
ESR spectroscopy in liquid food and beverages.pptxPRIYANKA PATEL
With increasing population, people need to rely on packaged food stuffs. Packaging of food materials requires the preservation of food. There are various methods for the treatment of food to preserve them and irradiation treatment of food is one of them. It is the most common and the most harmless method for the food preservation as it does not alter the necessary micronutrients of food materials. Although irradiated food doesn’t cause any harm to the human health but still the quality assessment of food is required to provide consumers with necessary information about the food. ESR spectroscopy is the most sophisticated way to investigate the quality of the food and the free radicals induced during the processing of the food. ESR spin trapping technique is useful for the detection of highly unstable radicals in the food. The antioxidant capability of liquid food and beverages in mainly performed by spin trapping technique.
The cost of acquiring information by natural selectionCarl Bergstrom
This is a short talk that I gave at the Banff International Research Station workshop on Modeling and Theory in Population Biology. The idea is to try to understand how the burden of natural selection relates to the amount of information that selection puts into the genome.
It's based on the first part of this research paper:
The cost of information acquisition by natural selection
Ryan Seamus McGee, Olivia Kosterlitz, Artem Kaznatcheev, Benjamin Kerr, Carl T. Bergstrom
bioRxiv 2022.07.02.498577; doi: https://doi.org/10.1101/2022.07.02.498577
The binding of cosmological structures by massless topological defectsSérgio Sacani
Assuming spherical symmetry and weak field, it is shown that if one solves the Poisson equation or the Einstein field
equations sourced by a topological defect, i.e. a singularity of a very specific form, the result is a localized gravitational
field capable of driving flat rotation (i.e. Keplerian circular orbits at a constant speed for all radii) of test masses on a thin
spherical shell without any underlying mass. Moreover, a large-scale structure which exploits this solution by assembling
concentrically a number of such topological defects can establish a flat stellar or galactic rotation curve, and can also deflect
light in the same manner as an equipotential (isothermal) sphere. Thus, the need for dark matter or modified gravity theory is
mitigated, at least in part.
ESA/ACT Science Coffee: Diego Blas - Gravitational wave detection with orbita...Advanced-Concepts-Team
Presentation in the Science Coffee of the Advanced Concepts Team of the European Space Agency on the 07.06.2024.
Speaker: Diego Blas (IFAE/ICREA)
Title: Gravitational wave detection with orbital motion of Moon and artificial
Abstract:
In this talk I will describe some recent ideas to find gravitational waves from supermassive black holes or of primordial origin by studying their secular effect on the orbital motion of the Moon or satellites that are laser ranged.
Immersive Learning That Works: Research Grounding and Paths ForwardLeonel Morgado
We will metaverse into the essence of immersive learning, into its three dimensions and conceptual models. This approach encompasses elements from teaching methodologies to social involvement, through organizational concerns and technologies. Challenging the perception of learning as knowledge transfer, we introduce a 'Uses, Practices & Strategies' model operationalized by the 'Immersive Learning Brain' and ‘Immersion Cube’ frameworks. This approach offers a comprehensive guide through the intricacies of immersive educational experiences and spotlighting research frontiers, along the immersion dimensions of system, narrative, and agency. Our discourse extends to stakeholders beyond the academic sphere, addressing the interests of technologists, instructional designers, and policymakers. We span various contexts, from formal education to organizational transformation to the new horizon of an AI-pervasive society. This keynote aims to unite the iLRN community in a collaborative journey towards a future where immersive learning research and practice coalesce, paving the way for innovative educational research and practice landscapes.
Immersive Learning That Works: Research Grounding and Paths Forward
Mathematical Modelling: A Comparatively Mathematical Study Model Base between Corruption and Development
1. IOSR Journal of Mathematics (IOSR-JM)
e-ISSN: 2278-5728,p-ISSN: 2319-765X, Volume 6, Issue 2 (Mar. - Apr. 2013), PP 54-62
www.iosrjournals.org
www.iosrjournals.org 54 | Page
Mathematical Modelling: A Comparatively Mathematical Study
Model Base between Corruption and Development
Sayaji Rastum Waykar
(Research Scholar, JJT, University, Rajasthan)
Assistant Professor, Department of Mathematics
Yashwantrao Chavan Mahavidyalaya, Halkarni
Tal: Chandgad, Dist: Kolhapur, Maharashtra (India).
Abstract: In this paper, we have studied on the topic of „Corruption‟. Also, I will try to find or study the effect
of corruption on the Development of the country or any country of the world. Therefore, how find the solution of
the problem of corruption will be destroyed completely from the society. We have observed that the
Development of the country depends upon Corruption. That is, when the Corruption increases, Development
decreases automatically of any country of the world. Therefore, I will try to find the formula on the problem of
„Relation between the Corruption and Development of any field or any country of the world‟.
Also, I have to highlight the concept of „Application of Mathematical modeling in the interesting
problem “corruption” in every field of our country or world .Also, Applied Mathematics focuses on the
formulation and study of Mathematical Models .Thus the activity of Applied Mathematics is vitally connected
with Research in Pure Mathematics. So I will try to study on it and find, what is corruption and quantity of
corruption and also find the growth of corruption and how it will decay?
Now we convert this areal world problem to mathematics problem and find some formulae on it such
as Mathematical Corruption Growth formula, Mathematical Constant corruption level formula and
Mathematical decay of corruption formula.
Keyword: applied, modelling, fuzy, mathematical thinking, corruption mentality.
I. Introduction:
Mathematics is the most important subject as compared to the other because it has a lot of branches and
techniques for finding the formulae on the problem of various fields in the world. It is applied techniques like
„Advances in computational Mathematics‟, In this branch Mathematical framework is used for solving various
problems of science and Technology and Application of differential equation is a truism that nothing is
permanent except change and the primary purpose of differential equations is to serve as a tool for the study of
change in the physical world and also. So we have to use the mathematical framework and applied technique for
studying the relation between Corruption and Development in each and every field of the country India or
world.
Also, I have to highlight the problem of „corruption‟ in front of our country or the world. Because,
present days, every person in society is suffering from corruption in every field such as Government offices,
Educational offices, politicians and Judiciary and its related officers of various courts of our country and others
etc. So that corruptions have removed completely from the society. Therefore, I will try to find the quantity of
corruption in our country at any time. Also I will try to find the solution for reducing the growth of corruption
from the society as well as in all other field of our country.
II. Methodology:
We have to use the seven steps of mathematical modelling cycle for solving the problem of corruption in the
society of any country of the world. Mathematical modelling means, a translation from rest of world to
mathematics world. Also, Mathematical model building involves imagination and skills. We can solve any
problem of rest of world by using mathematical modelling.
The mathematical modelling process is as follows:
2. Mathematical Modelling: A Comparatively Mathematical Study Model Base between Corruption and
www.iosrjournals.org 55 | Page
“Mathematical Modelling Process”
This is known as seven stage of mathematical modelling process.
III. Mathematical Corruption Model:
3.1: What is Corruption or MC-Model?
Mathematical Corruption or MC-Model is defined as it is a psychological diseases such that
* Primary stage: Do the work but get benefit or more,
* Medium stage: Not do the work without benefit,
* Last stage: Without work but get benefit or more.
Note that benefit belongs to money or gift or other facility.
3.2: What is Ҝ or Mathematical E-virus constant? :
The Mathematical E-virus constant Ҝ is defined as sum of the negative characters of person lead to increase the
corruption or MC-Model. It is,
Ҝ = , -1< Ҝ < 1.
Where,
=Not sincere,
Principle less,
Unfaithful,
Not devotion to work or duty,
Not punctuality,
Misbehaviors,
Irregular to duty or work,
Not attachment to work or duty.
The constant Ҝ belongs to all the above characters are known as constant of proportionality.
It is also known as „Mathematical Effected Virus constant‟ or Mathematical E-virus constant.
Note that the E-virus constant Ҝ has main role for strongly increasing the corruption or C-disease. Mathematical
E-virus constant is very effective because when it reacts the persons then its poison increases slowly and slowly
up to the ten years after that the person will become completely C-disease or Corruption disease.
33 Types of Corruptions:
There are three types of Corruptions such as
I) Negative Corruption:
It is the quantity in which the Mathematical E-virus constant Ҝ is less than zero. It has done in particular
situations of a person. It is very useful for the health of the society.
II) Constant Corruption:
It is the quantity in which Mathematical E-virus constant Ҝ is equal to zero. If it has done always when
Mathematical E-virus constant Ҝ is equal to zero then the health of the society in the country or world will
become strong.
3. Mathematical Modelling: A Comparatively Mathematical Study Model Base between Corruption and
www.iosrjournals.org 56 | Page
III) Positive Corruption:
It is the quantity in which Mathematical E-virus constant Ҝ is greater than zero. If it has done then the health of
the society in the country or world will become very weak or sick.
IV. Mathematical Constant corruption level :
It is defined as, „When Ҝ= 0 , that is , „The Authority or chairperson or person had helped in humanity
to the some people in their particular circumstances or situations without follows the rules and regulations of
that Institutions or state or country.‟ It is known as Mathematical Constant Corruption level. It is always in
every country in every year. Therefore, the quantity is
C = , when Ҝ = 0. ----------------------- (i)
It is also known as „Initial Corruption level.‟ It is the quantity that is, the negative corruption increases up to
the Constant corruption when Ҝ ≤ 0. Further the quantity C = will not change when the Mathematical E-virus
Constant is equal to zero that is Ҝ = 0 and it is used for the development of the peoples who are living in the
society. So we say the negative corruption is very useful or very good for the health of the society in the country
or world. But if Mathematical E-virus Constant is greater than zero then the positive corruption increases. This
is very dangerous for the health of the society in the country or world and the development of the society
decreases. The graph of Mathematical Constant Corruption level is as follows:
Fig1: Graph of „Mathematical Constant Corruption level‟.
V. Mathematical Corruption Model or Mathematical Corruption growth formula:
Suppose the rate of growth of corruption at any time t is proportional to the number C present at that time.
If C is number of corruption at time t, is rate of growth of the corruption.
Then growth law, in short is C
= Ҝ C, where Ҝ is constant of proportionality and it denotes the characters of person
which leads to increase the corruption.
= Ҝ dt
Therefore variables are separable, then integrating to the both side, we get
C = Ҝt +c
C =
C =
C = , where = -------- --------- (ii)
Initially, when t=0, C =
From (ii), = =
Putting in (i), we have
C = , when Ҝ > 0 --------------- (iii)
4. Mathematical Modelling: A Comparatively Mathematical Study Model Base between Corruption and
www.iosrjournals.org 57 | Page
This is known as Mathematical Corruption growth formula or MC-Model.
VI. Mathematical Decay law of Corruption formula:
When Ҝ >0, the Corruption will increase and increase to the maximum level.
At this level we say, it is very high quantity of Corruption to each and every field in our country or world. That
is, every person in society is suffering from Corruption in every field such as Government offices, Educational
offices, politicians and Judiciary of our country and others etc. which leads to all over development decreases,
so that corruptions have removed completely from society, then the country will be developed in each field.
So, if we will try to control to grow of Corruption by reducing the value of E-virus Ҝ. If E-virus constant Ҝ
reduces to zero(0), that is removing all the (-ve) characters of persons belonging in Ҝ then the Corruption (C)
will reach to Mathematical Constant corruption level ( ). So we find formula,
C = , when Ҝ 0 --------------- (iv)
It is known as Mathematical Decay law of Corruption formula and the graph of these laws is as follows:
Fig-2: Graph of „Decay and Growth laws of Corruption‟.
VII. The study of Mathematical Model base on the Corruption and Development:
The rate of change of Development per unit (-ve) Corruption is directly proportional to the Development.
If D is the number of development per unit corruption C, is the rate of growth of development then
Therefore, the present problem is governed by the differential equation
We have,
= ҜD -------------- (i)
Subject to the condition, D(0) =
Separating the variables in equation (i) and integrating to the both side, we have
= + where is constant of integration.
=ҜC+
D =
D(C) = , where =c ----------- (ii)
Initially, corruption C=0, D= D(0) =
From (ii), =c putting in (ii), we have
From (ii),
D(C) = D(0) -------------- (iii)
This is the formula of „Relation between Corruption and Development.‟
Also, from equation (iii),
=
= ----------------- (iv)
5. Mathematical Modelling: A Comparatively Mathematical Study Model Base between Corruption and
www.iosrjournals.org 58 | Page
By taking logarithm on both sides,
We have,
Ҝ= ------------------- (v)
Where Ҝ denotes the Mathematical E-virus constant that is (-ve) characters of person which leads to increase the
Corruption.
VIII. Illustrations:
8.1 Mathematical Corruption Growth in the Country (general) India:
Suppose, we assume that there was no corruption in the country, India at 15 August, 1947 (That was
time our nation India became freedom from British) and our nation population was 35 crore at that time.
Therefore, corruption C=0, when t=0.
After 10 years, 15 August, 1957, corruption was one percentage of old population, that is C=0.35 crore.
We know that,
C = , Ҝ > 0. --------------------------- (i)
0.35 =
But we take Ҝ =0, we have
0.35 =
0.35 = , where =1.
=0.35 crore
Putting in (vi), we get
C =0.35 ------------------ ----- (ii)
Then at 15 August, 1967, the corruption would be double of old.
That is C = 0.70 crore in time t=10 years.
From (i), 0.70 =0.35
=
= 2
=
Putting in (i), we have
C = 0.35 ------------------- (iii)
This is known as Mathematical Model Base Corruption with related time formula.
When t = 30 years, what is C =? , at 15 August, 1977.
From (iii), C= 0.35
C =0.35 8
C = 2.80 crore.
When t =40 years, C=? , at 15 August, 1987.
From (iii), C= 0.35
C = 0.35 16
C= 5.60 crore.
When t = 50 years, C=? , at 15 August, 1997.
From (iii), C = 0.35
C = 0.35 32
C= 11.20 crore.
6. Mathematical Modelling: A Comparatively Mathematical Study Model Base between Corruption and
www.iosrjournals.org 59 | Page
When t = 60 years, C =? , at 15 August, 2007.
From (iii), C =0.35
C =0.35 64
C = 22.40 crore
Today, when t=65 years, C=? , at 15 August, 2012.
From (iii), C =0.35
C =0.35 64 1.414
C = 22.40 1.414
C = 31.6736 crore
When t = 70 years, C =? , at 15 August, 2017.
From (iii), C = 0.35
C =0.35 128
C = 44.80 crore
When t= 80 years, C=? , at 15 August, 2027.
From (iii), C=0.35
C=0.35
C=0.35 256
C=89.60 crore
When t=90 years, C=? , at 15 August, 2037.
From (iii), C=0.35
C=0.35
C=0.35 512
C=179.20 crore
When t=100 years, C=? , at 15 August, 2047.
From (iii), C=0.35
C=0.35 =0.35 1024
C=358.40 crore
The data of time in years and corruption in crore of country (India) is in tabular form:
Time
t (years)
0-10 10-20 20-30 30-40 40-50 50-60 60-70 70-80 80-90
Corruption
C (crore)
0.35 0.70 2.80 5.60 11.20 22.40 44.80 89.60 179.20
8.2 Mathematical Growth of Development Model except Corruption:
We assume that there was no corruption on 15 August, 1947 (Freedom date).
Therefore C=0 and Development was one percentage of old population.
That is when C=0, D = D(0) = =0.35 crore
After 10 years from freedom that is 15 August, 1957, C = 0.35 crore and
The Development would be double of old that is D(c) =0.70 crore.
Now from (iii), D(c) = D(0)
0.70 =D(0)
But we take Ҝ =0, where Ҝ be the E-virus lead to increase the corruption
7. Mathematical Modelling: A Comparatively Mathematical Study Model Base between Corruption and
www.iosrjournals.org 60 | Page
0.70 = D(0)
0.70 = D(0) 1
D(0) = 0.70
Putting this value in equation (iii), we have
D(c) = 0.70 -------------------- (i)
After 20 years from freedom, C = 0.70 crore and Development would be double
of old that is D = 1.40 crore, putting in (ix), we have
1.40 = 0.70
=
= 2
= [
Putting in (i), we have
D(c) = 0.70 [ --------------------- (ii)
This is known as Mathematical Model Base Development with related Corruption formula.
After 30 years (15 August 1977) from freedom when corruption C= 2.80 crore, D(C) =?
From (ii), D(c) = 0.70 [
=0.70 [
= 0.70 16
D(c) = 11.20 crore
After 40 years (15 August 1987) from freedom when corruption C= 5.60 crore, D(c) =?
From (ii), D(c) = 0.70 [
= 0.70 [
= 0.70 256
D(C) = 179.20 crore
After 50 years (15 August 1997) from freedom when corruption C= 11.20 crore, D(c) =?
From (ii), D(c) = 0.70 [
= 0.70 [
= 0.70 65536
D(C) = 45875.20 4.5875e+004 crore
After 60 years (15 August 2007) from freedom when corruption C=22.40 crore, D(C) =?
From (ii), D(c) = 0.70 [
= 0.70 [
= 0.70 65536 65536
D(C) = 3006477107.2 3.0065e+009 crore
Today, after 65 years (15 August, 2012) from freedom when corruption C=31.6736 crore,
D(C) =?
From (ii), D(c) = 0.70 [
= 0.70 [
Ҝ=
8. Mathematical Modelling: A Comparatively Mathematical Study Model Base between Corruption and
www.iosrjournals.org 61 | Page
=0.70 4.1784e+013
D(C) =2.9249e+013 crore
After 70 years (15 August 2017) from freedom when corruption C=44.80 crore, D(c) =?
From (ii), D(c) = 0.70 [
= 0.70 [
=0.70 [ [
D(C) = 1.2913e+019 crore
Here, I have to use Applied Mathematical method. In this method I use initial values and Mathematical Growth
formula for finding Mathematical Growth of Development Model. A slightly more realistic and largely used
mathematical growth model is the logistic function and its extensions.
In the above data, I have observed that the development of such persons which have corrupted. This result on
present situations because a lot of corruption ghotales are opens.
8.3 Mathematical Result:
I. The Relation between Development and Corruption:
D(C) = D(0)
II. Mathematical E-virus constant Ҝ by using the relation as,
Ҝ=
III. Mathematical Corruption Growth formula: C = , when Ҝ > 0
IV. Mathematical Constant Corruption level formula: C = , when Ҝ = 0
V. Mathematical Decay of Corruption formula: C = , when Ҝ ≤ 0
I have found the values of Development (general) related to the Corruption are in the tabular form:
Time (years) Corruption (crore) Development (crore)
15 August,1947 0 0.35
15 August,1957 0.35 0.70
15 August,1967 0.70 1.40
15 August,1977 2.80 11.20
15 August,1987 5.60 179.20
15 August,1997 11.20 45875.20
15 August,2007 22.40 3006477107.2
15 August,2012 31.6736 2.9249e+013
15 August,2017 44.80 1.2913e+019
The above table shows the Corruption and related Development in crores. Also I have observed that the
Corruption increases and the Development decreases of the country India. The Graph of Corruption and
Development shows the reality of the present situation in the country India.
8.4 Mathematical Graph:
From the above table, I draw the graph of Corruption and Development is as follows.
From the graph, It shows the development of the country India when Corruptions have removed completely
from the society. That is when Corruption C tends to then the Development D will be increased to the high
level.
Therefore, we can say that when the E-virus constant Ҝ tends to zero then C tends to .
=
Then the Development D will be really development of the society of any Country in the world.
9. Mathematical Modelling: A Comparatively Mathematical Study Model Base between Corruption and
www.iosrjournals.org 62 | Page
This is the „Comparatively Mathematical Study Model Base between Corruption and Development‟.
IX. Conclusion:
In this paper, we will try to study on the problem of „corruption‟ in the society by using Mathematical
modeling techniques. From the above two illustrations we have observed and it concluded that if the population
growth will increase exponentially then the quantity of corruption will increase exponentially also and the
growth of corruption depends on the Mathematical E-virus constant Ҝ. When Ҝ > 0, the growth of (+ve)
corruption will increase to the high level and at that time development of the society of any fields will decrease.
When we will control the Mathematical E-virus constant Ҝ that is Ҝ ≤ 0, the (+ve) corruption will decrease to
the Mathematical constant corruption level, at that time development of the society will increase of any fields or
any country of the world.
Also we know that “Mathematical modeling and its applications” is a process of solving a particular type of
problem generated by corresponding situations of the real world. The transformation from the real world to
mathematics is achieved through the use of a mathematical model, which, briefly speaking, is an idealized
(simplified) representation of the basic characteristics of the real situation through the use of a suitable set of
mathematical symbols, relations and functions and mathematical model building involves imagination and
skills. So we say this is the „Comparatively Mathematical Study Model Base between Corruption and
Development.‟
References:
[1] George F. Simmons, Differential equations with applications and historical notes, McGraw Hill, New York (1991).
[2] Daniel A. Murray, Introductory course in Differential equations, Orient Longman ltd. Harlow and London (1993).
[3] P. N. Wartikar, J. N. Wartikar, Text Book of applied mathematics , Gajanan sant, vidyarthi griha prakashan, Pune (2002).
[4] Bhaskar Dasgupta, Applied Mathematical Methods published by Darling Kindersley (India) Pvt. Ltd. Delhi.
[5] Zafar Ashan, Differential equations and their applications, prentice hall of India, New Delhi (1999).
[6] Treilibs, V; Burkhardt, H; and Low,l (1980). Formulation processes in Mathematical Modelling; Nottingham: shell centre for
Mathematical Education.
[7] Moscardini, S. (1989), In W. Blum, M. Niss and I. Huntley (Eds.); The Identification and Teaching of Mathematical Modelling
skills.
[8] S. J. Lamon, W. A. Parker & K. Houston (Eds.); Mathematical Modelling: A way of life Chichester: Harwood Publishing.
Chicheste: Ellis Harwood; Modelling, Applications and applied problem solving.
[9] Christopher Haines, Peter Galbraith, Werner Blum and Sanowar Khan; Mathematical Modelling ICTMA (12), Horwood Publishing,
Chichester, UK.
[10] Frank R. Giordano, William P. Fox, Steven B. Horton and Maurice D. Weir; Mathematical Modelling Principles and Applications,
Cengage Learning India Private Limited New Delhi.
[11] Roger J. Hosking, Ezio Venturino; Aspects of Mathematical Modelling Applications in Science, Medicine, Economics and
Management, Birkhauser Veriag AG, Basel-Boston- Berlin.