This document presents a mathematical model that simulates the depression levels of Bangladeshi women who feel pressure to get married. It defines differential equations to classify women into highly susceptible and low susceptible groups based on factors like media portrayal of beauty standards. The model finds that media emphasis on women's beauty has a negligible impact on their depression regarding marriage. It aims to visualize trends in marriage-related depression over time among young Bangladeshi women aged 15-25.
A comparative analysis of the health status of men aged 60 74 years and those...paulbourne12
In a comprehensive literature search studies on self-rated
well-being, quality of life and health have mostly singled
out particular cohorts such as young adults or youth [1-4],
population [5-11], elderly [12-26], children [27], and
nations [28]; but none emerges that has compared factors that determine self-rated well-being for young adults and elderly in the English-speaking Caribbean, especially Jamaica.
Recession depression refers to a new form of depression linked to economic uncertainty and stress from recessions. Stress, anxiety, and feelings of hopelessness have increased as job security has decreased. Studies show that about 9% of Americans were clinically depressed in 2011 compared to 6.6% before the recession. Long-term unemployment is associated with increased rates of stress, substance abuse, family problems, and depression. Those unemployed for over a year report increased feelings of shame, isolation, and having sought help for depression. Suicide rates have also been shown to rise during recessions, particularly among prime working age men.
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasIOSR Journals
The widely used reliable transport protocol TCP, is an end to end protocol designed for the wireline
networks characterized by negligible random packet losses. This paper represents exploratory study of TCP
congestion control principles and mechanisms. Modern implementations of TCP contain four intertwined
algorithms: slow start, congestion avoidance, fast retransmit, and fast recovery. In addition to the standard
algorithms used in common implementations of TCP, this paper also describes some of the more common
proposals developed by researchers over the years. We also study, through extensive simulations, the
performance characteristics of four representative TCP schemes, namely TCP Tahoe, New Reno and Vegas
under the network conditions of bottleneck link capacities for wired network
This document summarizes a paper that points out a major error in Albert Einstein's 1905 paper on special relativity. Specifically, it shows that Einstein's assumption that the time coordinate of a moving clock (τ2) can be expressed as a function of the time (t) and spatial (x) coordinates of a stationary system is incorrect. An alternative derivation is presented that expresses τ2 in terms of t, x, the velocity (v) of the moving system, and other variables. This challenges one of the foundational assumptions of Einstein's original formulation of special relativity.
This document analyzes the performance of a regenerative steam system in a thermal power plant and proposes modifications to improve turbine efficiency. Currently, cascading only occurs between high pressure and low pressure heaters separately, wasting heat to the deaerator. The proposal involves cascading all heaters together to utilize waste heat in low pressure heaters. Taking extraction steam at the high pressure turbine outlet instead of the boiler outlet could also increase turbine work and efficiency. Analysis estimates increasing heater coils could lower drip temperatures enough for cascading, recovering over 29,000 kW of heat annually and raising plant efficiency by 3%.
This document compares five traditional methods for short-term load forecasting: simple moving average, weighted moving average, exponential smoothing, auto regressive, and multiple linear regression. It applies these methods to hourly load data from Paschim Gujarat Vij Co. Ltd to generate 1-hour ahead forecasts. For each method, it shows figures comparing the actual and forecasted loads for a selected day. The document concludes that time series models can provide reasonably accurate hourly load forecasts for short-term operational planning.
Thermal spray coatings can enhance the wear resistance of materials. High-velocity oxy-fuel (HVOF) spraying is particularly effective due to producing very dense coatings with low porosity and high hardness. HVOF spraying involves melting or softening powder using a high-velocity oxy-fuel flame and projecting it onto a substrate. HVOF coatings have exceptional wear resistance, high bond strength, and are more cost-effective than other coating methods. Studies have shown that HVOF sprayed ceramic oxide and carbide coatings can significantly reduce wear in applications, performing better than uncoated materials. HVOF sprayed chromium carbide and tungsten carbide coatings are commonly used for their high wear resistance and ability to
This document describes a simulation of a space vector PWM controller for a five-level voltage-fed inverter motor drive. It begins by introducing multilevel inverters and some of the challenges in controlling them, specifically the increased complexity with more levels. It then presents a new approach to implementing space vector PWM for a five-level inverter by treating it as a conventional two-level system, making the calculations simpler. The methodology and implementation are described, including estimating switching times. Simulation results are presented showing the current, voltage and THD waveforms both with and without an LC filter. It is concluded that the proposed 2D system approach allows for simple implementation of SVPWM for a five-level inverter using common D
A comparative analysis of the health status of men aged 60 74 years and those...paulbourne12
In a comprehensive literature search studies on self-rated
well-being, quality of life and health have mostly singled
out particular cohorts such as young adults or youth [1-4],
population [5-11], elderly [12-26], children [27], and
nations [28]; but none emerges that has compared factors that determine self-rated well-being for young adults and elderly in the English-speaking Caribbean, especially Jamaica.
Recession depression refers to a new form of depression linked to economic uncertainty and stress from recessions. Stress, anxiety, and feelings of hopelessness have increased as job security has decreased. Studies show that about 9% of Americans were clinically depressed in 2011 compared to 6.6% before the recession. Long-term unemployment is associated with increased rates of stress, substance abuse, family problems, and depression. Those unemployed for over a year report increased feelings of shame, isolation, and having sought help for depression. Suicide rates have also been shown to rise during recessions, particularly among prime working age men.
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasIOSR Journals
The widely used reliable transport protocol TCP, is an end to end protocol designed for the wireline
networks characterized by negligible random packet losses. This paper represents exploratory study of TCP
congestion control principles and mechanisms. Modern implementations of TCP contain four intertwined
algorithms: slow start, congestion avoidance, fast retransmit, and fast recovery. In addition to the standard
algorithms used in common implementations of TCP, this paper also describes some of the more common
proposals developed by researchers over the years. We also study, through extensive simulations, the
performance characteristics of four representative TCP schemes, namely TCP Tahoe, New Reno and Vegas
under the network conditions of bottleneck link capacities for wired network
This document summarizes a paper that points out a major error in Albert Einstein's 1905 paper on special relativity. Specifically, it shows that Einstein's assumption that the time coordinate of a moving clock (τ2) can be expressed as a function of the time (t) and spatial (x) coordinates of a stationary system is incorrect. An alternative derivation is presented that expresses τ2 in terms of t, x, the velocity (v) of the moving system, and other variables. This challenges one of the foundational assumptions of Einstein's original formulation of special relativity.
This document analyzes the performance of a regenerative steam system in a thermal power plant and proposes modifications to improve turbine efficiency. Currently, cascading only occurs between high pressure and low pressure heaters separately, wasting heat to the deaerator. The proposal involves cascading all heaters together to utilize waste heat in low pressure heaters. Taking extraction steam at the high pressure turbine outlet instead of the boiler outlet could also increase turbine work and efficiency. Analysis estimates increasing heater coils could lower drip temperatures enough for cascading, recovering over 29,000 kW of heat annually and raising plant efficiency by 3%.
This document compares five traditional methods for short-term load forecasting: simple moving average, weighted moving average, exponential smoothing, auto regressive, and multiple linear regression. It applies these methods to hourly load data from Paschim Gujarat Vij Co. Ltd to generate 1-hour ahead forecasts. For each method, it shows figures comparing the actual and forecasted loads for a selected day. The document concludes that time series models can provide reasonably accurate hourly load forecasts for short-term operational planning.
Thermal spray coatings can enhance the wear resistance of materials. High-velocity oxy-fuel (HVOF) spraying is particularly effective due to producing very dense coatings with low porosity and high hardness. HVOF spraying involves melting or softening powder using a high-velocity oxy-fuel flame and projecting it onto a substrate. HVOF coatings have exceptional wear resistance, high bond strength, and are more cost-effective than other coating methods. Studies have shown that HVOF sprayed ceramic oxide and carbide coatings can significantly reduce wear in applications, performing better than uncoated materials. HVOF sprayed chromium carbide and tungsten carbide coatings are commonly used for their high wear resistance and ability to
This document describes a simulation of a space vector PWM controller for a five-level voltage-fed inverter motor drive. It begins by introducing multilevel inverters and some of the challenges in controlling them, specifically the increased complexity with more levels. It then presents a new approach to implementing space vector PWM for a five-level inverter by treating it as a conventional two-level system, making the calculations simpler. The methodology and implementation are described, including estimating switching times. Simulation results are presented showing the current, voltage and THD waveforms both with and without an LC filter. It is concluded that the proposed 2D system approach allows for simple implementation of SVPWM for a five-level inverter using common D
This document presents research on edge detection filters for gray images and analyzing the performance of different edge detection operators. It introduces edge detection as an important image processing technique for object detection. Several traditional edge detection operators are described, including Sobel, Prewitt, Laplacian, Robert, and Canny. The document then outlines an approach to apply these operators to a gray test image in MATLAB and analyze the results. Statistical measurements like PSNR and MSE are calculated and compared for each operator, with the results showing that Canny edge detection performed best. The conclusion is that edge detection filters can help with image segmentation and Canny provides relatively better performance than other operators.
Micellar Effect On Dephosphorylation Of Bis-4-Chloro-3,5-Dimethylphenylphosph...IOSR Journals
The rate enhancement depends on the hydrophobicity of the nucleophile. The micellar catalyzed reaction between bis-4-chloro-3,5-dimethylphenylphosphate ester and hydroxide or hydroperoxide anions has been examined in buffered medium (pH 8-10). First order rate constant (Kψ) for the reaction of hydroxide ion with bis-4-CDMPP go through maxima with the increasing concentration of cetyltrimethylammoniumbromide (CTABr). Micelles of CTABr very effective catalyst to the reactions of phosphate diesters. Rate constants measured with OH2- ions are approximately twice and thrice than that of OH- ions in presence of CTABr.
This document discusses methods for detecting and preventing power theft. It begins by outlining the problem of electricity theft in India, costing $17 billion annually. It then describes some common methods of theft, such as attaching magnets to meters or bypassing meters. The document presents a proposed circuit to detect two types of theft: phase bypassing and overloading. It includes block diagrams of the circuit and simulations of overload and phase bypass conditions. It concludes that the circuit can detect and instantly stop the supply in these theft situations, helping to reduce losses for electricity boards.
Design And Analysis Of Chain Outer Link By Using Composite MaterialIOSR Journals
This document summarizes the design and analysis of using a composite material for the outer link of a roller conveyor chain. It begins with an introduction to roller conveyor chains and their applications. It then describes the design process for the original outer link made of carbon steel, including hand calculations to determine the link dimensions. Finite element analysis was conducted on both the original design and a modified design using glass fiber-epoxy composite material. The results showed that the composite material link weighed less and experienced lower stresses than the original design, indicating that using a composite material can improve the design of the chain outer link.
Refining Measure of Central Tendency and DispersionIOSR Journals
A unified approach is attempted to bring the descriptive statistics in to a more refined frame work. Different measure of central tendencies such as arithmetic mean, median, mode, geometric mean and harmonic mean are derived from a generalized notion of a measure of central tendency developed through an optimality criteria. This generalized notion is extended to introduce the concept of an interval of central tendency. Retaining the spirit of this notion, measure of central tendency may be called point of central tendency. The same notion is further extended to obtain confidence interval for population mean in a finite population model and confidence interval for probability of success in Bernoulli population.
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...IOSR Journals
Technical solutions, introduced by policies and implantations are essential requirements of an
information security program. Advanced technologies such as intrusion detection and prevention system (IDPS)
and analysis tools have become prominent in the network environment while they involve with organizations to
enhance the security of their information assets. Scanning and analyzing tools to pinpoint vulnerabilities, holes
in security components, unsecured aspects of the network and deploying of IDPS technology are highlighted.
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...IOSR Journals
Online Social Networks (OSNs) are today one of the most popular interactive medium to share,
communicate, and distribute a significant amount of human life information. In OSNs, information filtering can
also be used for a different, more responsive, function. This is owing to the fact that in OSNs there is the
possibility of posting or commenting other posts on particular public/private regions, called in general walls.
Information filtering can therefore be used to give users the ability to automatically control the messages
written on their own walls, by filtering out unwanted messages. OSNs provide very little support to prevent
unwanted messages on user walls. For instance, Facebook permits users to state who is allowed to insert
messages in their walls (i.e., friends, defined groups of friends or friends of friends). Though, no content-based
partialities are preserved and therefore it is not possible to prevent undesired communications, for instance
political or offensive ones, no matter of the user who posts them. To propose and experimentally evaluate an
automated system, called Filtered Wall (FW), able to filter unwanted messages from OSN user walls
Novel Way to Isolate Adipose Derive Mesenchymal Stem Cells & Its Future Clini...IOSR Journals
Abstract: Adipose-derived stem cells (ADSCs), were isolated from discarded human fat tissue, obtained from csection with our recently modified methods, in Stem Cell & Regenerative Medicine Lab, VSBT. Here we develop
two methods to isolate Adipose derived mesenchymal stem cells with enzyme digestion and use of
phosphatidylcholine and deoxycholate. Surface protein expression was analyzed by flow cytometry to
characterize the cell phenotype. The multi-lineage potential of ADSCs was testified by differentiating cells with
adipogenic inducer. ADSCs can be cultured in vitro for up to one month without passage. Also, the flow
cytometry analysis showed that ADSCs expressed high levels of stem cell related surface marker CD105.
ADSCs have strong proliferation ability, maintain their phenotypes, and have stronger multi-differentiation
potential. The molecular basis of ADSC differentiation was studied using bioinformatics tools with an aim to
identify the key proteins involved in differentiation, such that they could be used as potential targets for drug
development for the treatment of obesity. The key proteins involved were found to be PPARG and C/EBPα. The
structures of the proteins were retrieved from MMDB (Molecular Modelling Database) and PDB (Protein Data
Bank) respectively. Key Words: Adipose-derived stem cells, Mesenchymal stem cells, Enzyme digestion, Phosphatidylcholine, Deoxycholate, PPARG, C/EBPα, etc.
Chemical Examination of Sandbox (Hura Crepitans) Seed: Amino Acid and Seed Pr...IOSR Journals
Abstract: Amino acid composition as well as the seed protein solubility of (Hura crepitans) seeds was studied. The chemical scores for the determined amino acids of the seed in % showed tryptophan, leucine, methionine and isoleucine with 175.71, 175.00, 161.82 and 134.52 as the most abundant amino acids in that order while lysine and phenylalanine with 44.29 and 45.71 respectively were the most limiting amino acids. The ratio of percentage essential and non-essential amino acids in the seed was found to be 79: 21. All the values determined for amino acids were higher than the FAO/WHO standard except for lysine, cysteine and phenylalanine where lower values were obtained. Four solvents (0.1M each of NaOH, Na2CO3, NaHCO3 and NaCl) were used to test for solubility of the seed protein and out of these, 0.1M NaOH was found to be the most effective solvent compared to the deionized distilled water. The protein was found to be more soluble in the alkaline than the acidic medium with PH4 having the lowest protein solubility of 20% while PH8 have the highest solubility of 65% after which increasing pH do not increase solubility and a relative stability established. The outcome of this work is a useful indication of how well protein isolate would perform when they are applied to food and to the extent of protein denaturation due to chemical treatment,
Binary Discourse in U.S. Presidential Speeches from FDR to Bush IIIOSR Journals
The contemporary study of American Presidential rhetoric is of great significance. Politics is very largely the use of language. Presidential speech and action increasingly reflect the opinion that speaking is governing. In fact, the power of the presidency depends on its ability to persuade. The application of power is often legitimized through rhetorical persuasion; and, in the case of American Presidents, such power, and its associated rhetoric, becomes the fulcrum upon which many global issues turn
This document describes a proposed approach called Resource Allocation with Connection Admission Control (RA-CAC) and Adaptive Rate Scheduling (ARS) to improve quality of service for real-time traffic in WCDMA networks. The RA-CAC algorithm determines the optimal number of users to admit while minimizing call rejection rates. The ARS then adjusts transmission rates of admitted sessions based on feedback to better utilize network resources. Simulation results showed this approach increased delivery ratio, throughput and reduced delays compared to other resource allocation methods.
1. The document examines a local Nigerian game called "tsorry checkerboard" and applies group theory concepts.
2. The game is played on a 2x2 board with each player having up to 3 pieces, and the goal is to line up all three of one's pieces horizontally, vertically, or diagonally.
3. The possible moves of each piece (vertical, horizontal, diagonal, or staying in place) form a Klein four-group, satisfying the group properties of closure, associativity, identity, and inverses. Therefore, group theory can be applied to model the game.
Self Immunity To Reinforce The Vulnerability Factors on Soft Errors In 64 Bit...IOSR Journals
Abstract: VLSI technology reduces the size of the digital components, reduce the power consumption and
increase the speed of operation. In these criteria digital devices are more sensitively manufacturing. These type
of devices mostly effected by soft errors, then it reduces the life of the devices(microprocessor,
microcontrollers), it is nothing but vulnerability of microprocessors or microcontroller applications. The
register file is one of the essential architectural components where soft errors can be very mischievous because
errors may rapidly spread from there throughout the whole system. Thus, register files are recognized as one of
the major concerns when it comes to reliability. This paper introduces Self-Immunity, a technique that improves
the integrity of the register file with respect to soft errors. We show that our technique can reduce the
vulnerability of the register file considerably while exhibiting smaller overhead in terms of area and power
consumption compared to state-of-the-art in register file protection.
This document summarizes and compares two image registration techniques: Scale Invariant Feature Transform (SIFT) and Curvature Scale-Space (CSS) Corner Detection with robust corner matching.
SIFT detects and describes local features in images that are invariant to changes in scale, rotation, and illumination. It finds key points at multiple scales and assigns orientations based on local image gradients. CSS corner detection uses the Canny edge detector to find edges, then detects corners as curvature maxima along edges. It parameterizes edges using affine-length for stability to affine transformations. Robust corner matching finds candidate matches based on curvature and affine-length, then estimates transformation matrices from triangle areas to find the best matches.
The document shows
A Novel Approach of Area-Efficient FIR Filter Design Using Distributed Arithm...IOSR Journals
Abstract: In this paper, a highly area-efficient multiplier-less FIR filter is presented. Distributed Arithmetic (DA) has been used to implement a bit-serial scheme of a general asymmetric version of an FIR filter, taking optimal advantage of the 3-input LUT-based structure of FPGAs. The implementation of FIR filters on FPGA based on traditional arithmetic method costs considerable hardware resources, which goes against the decrease of circuit scale and the increase of system speed. This paper presents the realization of area efficient architectures using Distributed Arithmetic (DA) for implementation of Finite Impulse Response (FIR) filter. The performance of the bit-serial and bit parallel DA along with pipelining architecture with different quantized versions are analyzed for FIR filter Design. Distributed Arithmetic structure is used to increase the resource usage while pipeline structure is also used to increase the system speed. In addition, the divided LUT method is also used to decrease the required memory units. However, according to Distributed Arithmetic, we can make a Look-Up-Table (LUT) to conserve the MAC values and callout the values according to the input data if necessary. Therefore, LUT can be created to take the place of MAC units so as to save the hardware resources. The simulation results indicate that FIR filters using Distributed Arithmetic can work stable with high speed and can save almost 50 percent hardware resources to decrease the circuit scale, and can be applied to a variety of areas for its great flexibility and high reliability. This method not only reduces the LUT size, but also modifies the structure of the filter to achieve high speed performance. Keywords: DSP, Digital Filters, FIR , FPGA, MAC, Distributed Arithmetic(DA),Divided LUT, pipeline
The document summarizes a study that evaluated the impact of operating variables on particulate matter (PM) and lead (Pb) emissions from a single cylinder spark ignition engine fueled with variable ethanol-gasoline blends (E0, E20, E50, E80). The key findings were:
1) PM emissions decreased as the concentration of ethanol in the blend increased, with E80 providing the largest reductions compared to E0. Pb emissions also generally decreased with higher ethanol blends but were not affected by operating variables.
2) Both PM and Pb emissions were lowest near stoichiometric conditions and increased at very lean and rich equivalence ratios, though the reductions did not directly correlate with the ethanol percentage
Experimental investigation on effect of different shaped steel fibers on comp...IOSR Journals
This document presents the results of an experimental investigation into the effect of different shaped steel fibers on the compressive strength of high-strength concrete. Steel fibers with hooked, flat, and waving shapes were added to M70 grade concrete at volumes of 0.5-4% to test compressive strength at 7 and 28 days. Compressive strength was found to increase with higher fiber volumes for all fiber shapes. The maximum increases in strength were 14.54% for waving fibers, 15.72% for flat fibers, and 10.74% for hooked fibers, all at a 4% fiber volume. In conclusion, compressive strength improved with fiber addition and was highest for flat fibers followed by waving then hooked fibers.
Calcium Chloride Applications to Improve Fruit Quality on Bruised and Disease...IOSR Journals
The problems faced by producer canned of pineapple are the high of bruised which caused by the mechanical damage such as pressure, vibration during harvest, transport to the fruit processing and pathological damage caused by fruit diseases. The objective of research was to obtain the treatment time of CaCl2 applications and dosage of CaCl2 to improve the fruit quality of pineapple. This research used Split Plot Design and each treatment replicated 3 times. The main plot is time of CaCl2 applications that consists of three levels, thats are : 90 day after forcing (daf) (W90), 120 daf (W120) and twice time of CaCl2 applications on 90 and 120 daf (W90+120). The sub plot is dosage of CaCl2 that consists of three levels, thats are : 50 kg ha-1 (C50), 75 kg ha-1 (C75) and 100 kg ha-1 (C100). The results of research showed that the combined treatment twice time of CaCl2 applications on 90 and 120 day after forcing and dosage of CaCl2 100 kg ha-1 produces the calcium content on fruit is higher than the other combined treatments and produce the fruit texture, percentage of fruit diseases and percentage of bruised are lower than the other combined treatments
Congestion Control in Manets Using Hybrid Routing ProtocolIOSR Journals
1. The document proposes a hybrid routing protocol that combines DSDV and IAODV to reduce packet loss due to congestion in MANETs.
2. Under the proposed scheme, DSDV is used initially for path selection. If congestion occurs, nodes switch to using IAODV to find an alternate path to avoid congested areas.
3. Simulation results show that the hybrid protocol improves end-to-end delay, packet delivery fraction, and throughput compared to using only DSDV or IAODV. The hybrid approach balances the advantages of proactive and reactive routing to better handle congestion in mobile ad hoc networks.
Effective Waste Management and Environmental ControlIOSR Journals
There is wide spread interest in the world today in the methods that enable the re-use of waste.
According to Webster’s Mew Practical Dictionary, ‘Waste’ means “Thrown away as worthless after being used.
i.e. of no further use to a person, animal or plant; contrary to this opinion, it has been discovered that what is
regarded as waste or worthless, when worked upon can be manipulated to generated or produce materials that
are beneficial for the use of man.
This paper throw light into how waste resources can be control by analysis the theories of waste
management, recycling, re-use disposal and compositing from organic wastes and ways by which farm and
municipal waste can be worked upon to produce materials that are beneficial for the use of man
The document summarizes research on the status of women in Lakhnour village in India. It analyzes women's status based on health, literacy, and employment indicators across social castes. Key findings include:
- Women had lower literacy and higher disease rates than men, though disability rates varied by caste.
- Anganwari centers were fully used by upper and artisan caste women but less so by lower caste women.
- Birth rates were higher for males and death rates varied by caste and social status.
- Literacy rates for women were only higher than men in the upper caste. Employment rates for women were very low across all castes.
- Based on these
Eva Rahman wrote a letter to the editor-in-chief of Glamor magazine proposing a series of advertisements that celebrate women's actions rather than their appearances in order to combat the rise in psychological illnesses among young women caused by objectification in the media. The letter notes that advertisements often sexually objectify women and promote unrealistic body ideals that can lead to body dissatisfaction and mental health issues like depression and eating disorders. Rahman has developed advertisements inspired by campaigns that empowered women and clinical treatments for eating disorders to provide a healthier representation of women in the media.
This document presents research on edge detection filters for gray images and analyzing the performance of different edge detection operators. It introduces edge detection as an important image processing technique for object detection. Several traditional edge detection operators are described, including Sobel, Prewitt, Laplacian, Robert, and Canny. The document then outlines an approach to apply these operators to a gray test image in MATLAB and analyze the results. Statistical measurements like PSNR and MSE are calculated and compared for each operator, with the results showing that Canny edge detection performed best. The conclusion is that edge detection filters can help with image segmentation and Canny provides relatively better performance than other operators.
Micellar Effect On Dephosphorylation Of Bis-4-Chloro-3,5-Dimethylphenylphosph...IOSR Journals
The rate enhancement depends on the hydrophobicity of the nucleophile. The micellar catalyzed reaction between bis-4-chloro-3,5-dimethylphenylphosphate ester and hydroxide or hydroperoxide anions has been examined in buffered medium (pH 8-10). First order rate constant (Kψ) for the reaction of hydroxide ion with bis-4-CDMPP go through maxima with the increasing concentration of cetyltrimethylammoniumbromide (CTABr). Micelles of CTABr very effective catalyst to the reactions of phosphate diesters. Rate constants measured with OH2- ions are approximately twice and thrice than that of OH- ions in presence of CTABr.
This document discusses methods for detecting and preventing power theft. It begins by outlining the problem of electricity theft in India, costing $17 billion annually. It then describes some common methods of theft, such as attaching magnets to meters or bypassing meters. The document presents a proposed circuit to detect two types of theft: phase bypassing and overloading. It includes block diagrams of the circuit and simulations of overload and phase bypass conditions. It concludes that the circuit can detect and instantly stop the supply in these theft situations, helping to reduce losses for electricity boards.
Design And Analysis Of Chain Outer Link By Using Composite MaterialIOSR Journals
This document summarizes the design and analysis of using a composite material for the outer link of a roller conveyor chain. It begins with an introduction to roller conveyor chains and their applications. It then describes the design process for the original outer link made of carbon steel, including hand calculations to determine the link dimensions. Finite element analysis was conducted on both the original design and a modified design using glass fiber-epoxy composite material. The results showed that the composite material link weighed less and experienced lower stresses than the original design, indicating that using a composite material can improve the design of the chain outer link.
Refining Measure of Central Tendency and DispersionIOSR Journals
A unified approach is attempted to bring the descriptive statistics in to a more refined frame work. Different measure of central tendencies such as arithmetic mean, median, mode, geometric mean and harmonic mean are derived from a generalized notion of a measure of central tendency developed through an optimality criteria. This generalized notion is extended to introduce the concept of an interval of central tendency. Retaining the spirit of this notion, measure of central tendency may be called point of central tendency. The same notion is further extended to obtain confidence interval for population mean in a finite population model and confidence interval for probability of success in Bernoulli population.
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...IOSR Journals
Technical solutions, introduced by policies and implantations are essential requirements of an
information security program. Advanced technologies such as intrusion detection and prevention system (IDPS)
and analysis tools have become prominent in the network environment while they involve with organizations to
enhance the security of their information assets. Scanning and analyzing tools to pinpoint vulnerabilities, holes
in security components, unsecured aspects of the network and deploying of IDPS technology are highlighted.
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...IOSR Journals
Online Social Networks (OSNs) are today one of the most popular interactive medium to share,
communicate, and distribute a significant amount of human life information. In OSNs, information filtering can
also be used for a different, more responsive, function. This is owing to the fact that in OSNs there is the
possibility of posting or commenting other posts on particular public/private regions, called in general walls.
Information filtering can therefore be used to give users the ability to automatically control the messages
written on their own walls, by filtering out unwanted messages. OSNs provide very little support to prevent
unwanted messages on user walls. For instance, Facebook permits users to state who is allowed to insert
messages in their walls (i.e., friends, defined groups of friends or friends of friends). Though, no content-based
partialities are preserved and therefore it is not possible to prevent undesired communications, for instance
political or offensive ones, no matter of the user who posts them. To propose and experimentally evaluate an
automated system, called Filtered Wall (FW), able to filter unwanted messages from OSN user walls
Novel Way to Isolate Adipose Derive Mesenchymal Stem Cells & Its Future Clini...IOSR Journals
Abstract: Adipose-derived stem cells (ADSCs), were isolated from discarded human fat tissue, obtained from csection with our recently modified methods, in Stem Cell & Regenerative Medicine Lab, VSBT. Here we develop
two methods to isolate Adipose derived mesenchymal stem cells with enzyme digestion and use of
phosphatidylcholine and deoxycholate. Surface protein expression was analyzed by flow cytometry to
characterize the cell phenotype. The multi-lineage potential of ADSCs was testified by differentiating cells with
adipogenic inducer. ADSCs can be cultured in vitro for up to one month without passage. Also, the flow
cytometry analysis showed that ADSCs expressed high levels of stem cell related surface marker CD105.
ADSCs have strong proliferation ability, maintain their phenotypes, and have stronger multi-differentiation
potential. The molecular basis of ADSC differentiation was studied using bioinformatics tools with an aim to
identify the key proteins involved in differentiation, such that they could be used as potential targets for drug
development for the treatment of obesity. The key proteins involved were found to be PPARG and C/EBPα. The
structures of the proteins were retrieved from MMDB (Molecular Modelling Database) and PDB (Protein Data
Bank) respectively. Key Words: Adipose-derived stem cells, Mesenchymal stem cells, Enzyme digestion, Phosphatidylcholine, Deoxycholate, PPARG, C/EBPα, etc.
Chemical Examination of Sandbox (Hura Crepitans) Seed: Amino Acid and Seed Pr...IOSR Journals
Abstract: Amino acid composition as well as the seed protein solubility of (Hura crepitans) seeds was studied. The chemical scores for the determined amino acids of the seed in % showed tryptophan, leucine, methionine and isoleucine with 175.71, 175.00, 161.82 and 134.52 as the most abundant amino acids in that order while lysine and phenylalanine with 44.29 and 45.71 respectively were the most limiting amino acids. The ratio of percentage essential and non-essential amino acids in the seed was found to be 79: 21. All the values determined for amino acids were higher than the FAO/WHO standard except for lysine, cysteine and phenylalanine where lower values were obtained. Four solvents (0.1M each of NaOH, Na2CO3, NaHCO3 and NaCl) were used to test for solubility of the seed protein and out of these, 0.1M NaOH was found to be the most effective solvent compared to the deionized distilled water. The protein was found to be more soluble in the alkaline than the acidic medium with PH4 having the lowest protein solubility of 20% while PH8 have the highest solubility of 65% after which increasing pH do not increase solubility and a relative stability established. The outcome of this work is a useful indication of how well protein isolate would perform when they are applied to food and to the extent of protein denaturation due to chemical treatment,
Binary Discourse in U.S. Presidential Speeches from FDR to Bush IIIOSR Journals
The contemporary study of American Presidential rhetoric is of great significance. Politics is very largely the use of language. Presidential speech and action increasingly reflect the opinion that speaking is governing. In fact, the power of the presidency depends on its ability to persuade. The application of power is often legitimized through rhetorical persuasion; and, in the case of American Presidents, such power, and its associated rhetoric, becomes the fulcrum upon which many global issues turn
This document describes a proposed approach called Resource Allocation with Connection Admission Control (RA-CAC) and Adaptive Rate Scheduling (ARS) to improve quality of service for real-time traffic in WCDMA networks. The RA-CAC algorithm determines the optimal number of users to admit while minimizing call rejection rates. The ARS then adjusts transmission rates of admitted sessions based on feedback to better utilize network resources. Simulation results showed this approach increased delivery ratio, throughput and reduced delays compared to other resource allocation methods.
1. The document examines a local Nigerian game called "tsorry checkerboard" and applies group theory concepts.
2. The game is played on a 2x2 board with each player having up to 3 pieces, and the goal is to line up all three of one's pieces horizontally, vertically, or diagonally.
3. The possible moves of each piece (vertical, horizontal, diagonal, or staying in place) form a Klein four-group, satisfying the group properties of closure, associativity, identity, and inverses. Therefore, group theory can be applied to model the game.
Self Immunity To Reinforce The Vulnerability Factors on Soft Errors In 64 Bit...IOSR Journals
Abstract: VLSI technology reduces the size of the digital components, reduce the power consumption and
increase the speed of operation. In these criteria digital devices are more sensitively manufacturing. These type
of devices mostly effected by soft errors, then it reduces the life of the devices(microprocessor,
microcontrollers), it is nothing but vulnerability of microprocessors or microcontroller applications. The
register file is one of the essential architectural components where soft errors can be very mischievous because
errors may rapidly spread from there throughout the whole system. Thus, register files are recognized as one of
the major concerns when it comes to reliability. This paper introduces Self-Immunity, a technique that improves
the integrity of the register file with respect to soft errors. We show that our technique can reduce the
vulnerability of the register file considerably while exhibiting smaller overhead in terms of area and power
consumption compared to state-of-the-art in register file protection.
This document summarizes and compares two image registration techniques: Scale Invariant Feature Transform (SIFT) and Curvature Scale-Space (CSS) Corner Detection with robust corner matching.
SIFT detects and describes local features in images that are invariant to changes in scale, rotation, and illumination. It finds key points at multiple scales and assigns orientations based on local image gradients. CSS corner detection uses the Canny edge detector to find edges, then detects corners as curvature maxima along edges. It parameterizes edges using affine-length for stability to affine transformations. Robust corner matching finds candidate matches based on curvature and affine-length, then estimates transformation matrices from triangle areas to find the best matches.
The document shows
A Novel Approach of Area-Efficient FIR Filter Design Using Distributed Arithm...IOSR Journals
Abstract: In this paper, a highly area-efficient multiplier-less FIR filter is presented. Distributed Arithmetic (DA) has been used to implement a bit-serial scheme of a general asymmetric version of an FIR filter, taking optimal advantage of the 3-input LUT-based structure of FPGAs. The implementation of FIR filters on FPGA based on traditional arithmetic method costs considerable hardware resources, which goes against the decrease of circuit scale and the increase of system speed. This paper presents the realization of area efficient architectures using Distributed Arithmetic (DA) for implementation of Finite Impulse Response (FIR) filter. The performance of the bit-serial and bit parallel DA along with pipelining architecture with different quantized versions are analyzed for FIR filter Design. Distributed Arithmetic structure is used to increase the resource usage while pipeline structure is also used to increase the system speed. In addition, the divided LUT method is also used to decrease the required memory units. However, according to Distributed Arithmetic, we can make a Look-Up-Table (LUT) to conserve the MAC values and callout the values according to the input data if necessary. Therefore, LUT can be created to take the place of MAC units so as to save the hardware resources. The simulation results indicate that FIR filters using Distributed Arithmetic can work stable with high speed and can save almost 50 percent hardware resources to decrease the circuit scale, and can be applied to a variety of areas for its great flexibility and high reliability. This method not only reduces the LUT size, but also modifies the structure of the filter to achieve high speed performance. Keywords: DSP, Digital Filters, FIR , FPGA, MAC, Distributed Arithmetic(DA),Divided LUT, pipeline
The document summarizes a study that evaluated the impact of operating variables on particulate matter (PM) and lead (Pb) emissions from a single cylinder spark ignition engine fueled with variable ethanol-gasoline blends (E0, E20, E50, E80). The key findings were:
1) PM emissions decreased as the concentration of ethanol in the blend increased, with E80 providing the largest reductions compared to E0. Pb emissions also generally decreased with higher ethanol blends but were not affected by operating variables.
2) Both PM and Pb emissions were lowest near stoichiometric conditions and increased at very lean and rich equivalence ratios, though the reductions did not directly correlate with the ethanol percentage
Experimental investigation on effect of different shaped steel fibers on comp...IOSR Journals
This document presents the results of an experimental investigation into the effect of different shaped steel fibers on the compressive strength of high-strength concrete. Steel fibers with hooked, flat, and waving shapes were added to M70 grade concrete at volumes of 0.5-4% to test compressive strength at 7 and 28 days. Compressive strength was found to increase with higher fiber volumes for all fiber shapes. The maximum increases in strength were 14.54% for waving fibers, 15.72% for flat fibers, and 10.74% for hooked fibers, all at a 4% fiber volume. In conclusion, compressive strength improved with fiber addition and was highest for flat fibers followed by waving then hooked fibers.
Calcium Chloride Applications to Improve Fruit Quality on Bruised and Disease...IOSR Journals
The problems faced by producer canned of pineapple are the high of bruised which caused by the mechanical damage such as pressure, vibration during harvest, transport to the fruit processing and pathological damage caused by fruit diseases. The objective of research was to obtain the treatment time of CaCl2 applications and dosage of CaCl2 to improve the fruit quality of pineapple. This research used Split Plot Design and each treatment replicated 3 times. The main plot is time of CaCl2 applications that consists of three levels, thats are : 90 day after forcing (daf) (W90), 120 daf (W120) and twice time of CaCl2 applications on 90 and 120 daf (W90+120). The sub plot is dosage of CaCl2 that consists of three levels, thats are : 50 kg ha-1 (C50), 75 kg ha-1 (C75) and 100 kg ha-1 (C100). The results of research showed that the combined treatment twice time of CaCl2 applications on 90 and 120 day after forcing and dosage of CaCl2 100 kg ha-1 produces the calcium content on fruit is higher than the other combined treatments and produce the fruit texture, percentage of fruit diseases and percentage of bruised are lower than the other combined treatments
Congestion Control in Manets Using Hybrid Routing ProtocolIOSR Journals
1. The document proposes a hybrid routing protocol that combines DSDV and IAODV to reduce packet loss due to congestion in MANETs.
2. Under the proposed scheme, DSDV is used initially for path selection. If congestion occurs, nodes switch to using IAODV to find an alternate path to avoid congested areas.
3. Simulation results show that the hybrid protocol improves end-to-end delay, packet delivery fraction, and throughput compared to using only DSDV or IAODV. The hybrid approach balances the advantages of proactive and reactive routing to better handle congestion in mobile ad hoc networks.
Effective Waste Management and Environmental ControlIOSR Journals
There is wide spread interest in the world today in the methods that enable the re-use of waste.
According to Webster’s Mew Practical Dictionary, ‘Waste’ means “Thrown away as worthless after being used.
i.e. of no further use to a person, animal or plant; contrary to this opinion, it has been discovered that what is
regarded as waste or worthless, when worked upon can be manipulated to generated or produce materials that
are beneficial for the use of man.
This paper throw light into how waste resources can be control by analysis the theories of waste
management, recycling, re-use disposal and compositing from organic wastes and ways by which farm and
municipal waste can be worked upon to produce materials that are beneficial for the use of man
The document summarizes research on the status of women in Lakhnour village in India. It analyzes women's status based on health, literacy, and employment indicators across social castes. Key findings include:
- Women had lower literacy and higher disease rates than men, though disability rates varied by caste.
- Anganwari centers were fully used by upper and artisan caste women but less so by lower caste women.
- Birth rates were higher for males and death rates varied by caste and social status.
- Literacy rates for women were only higher than men in the upper caste. Employment rates for women were very low across all castes.
- Based on these
Eva Rahman wrote a letter to the editor-in-chief of Glamor magazine proposing a series of advertisements that celebrate women's actions rather than their appearances in order to combat the rise in psychological illnesses among young women caused by objectification in the media. The letter notes that advertisements often sexually objectify women and promote unrealistic body ideals that can lead to body dissatisfaction and mental health issues like depression and eating disorders. Rahman has developed advertisements inspired by campaigns that empowered women and clinical treatments for eating disorders to provide a healthier representation of women in the media.
Life style factors in late onset depressionramkumar g s
this study explores lifestyle factors like diet, exercise, socialization, leisure activities and alcohol, tobacco use in geriatric depression. it is a cross-sectional comparative study of elderly with depression and age, sex and education matched healthy controls.
Education and FLMP in the Middle East - Pattersonawap
This document analyzes the relationship between education and female labor market participation (FLMP) in the Middle East, focusing on Turkey and Saudi Arabia. It finds that while female education has increased tremendously over the last 40 years in the region, FLMP rates remain the lowest in the world despite expectations of growth. Education alone is not sufficient to increase FLMP, as other factors like labor market segmentation, traditional gender norms, and limited economic opportunities for women act as barriers. Increased FLMP could boost economic growth, but these structural barriers have kept the economic returns to female education low in the Middle East.
This document discusses adolescent depression in Bangladesh. It provides definitions of depression and its types. It notes that depression is a leading cause of disability worldwide. In Bangladesh, adolescents comprise 22.5% of the population and face early marriage, pregnancy, malnutrition and drug addiction—all contributing to depression. Key findings include lack of sexual health knowledge and risky behaviors among youth. The document outlines existing Bangladesh government programs and NGO activities to address adolescent health issues. It recommends strengthening protective factors like education and reducing risk factors. WHO technical support for policies, strategic planning, and integrating mental health into general healthcare is also suggested.
The paper examines how economic vulnerability and insecurity impact physical and mental health using data from the Household, Income and Labour Dynamics in Australia Survey. It finds that while the effect of insecurity on health is the same across income classes, the total effect is larger for the poor since they experience more insecurity. The key results are that mental health is more strongly impacted by insecurity than physical health, and reducing the incidence of insecurity could particularly benefit those with low incomes.
The document discusses how the media (internet, television, magazines, billboards, etc.) influences body image and behaviors. It notes that women's bodies and parts are used to sell many products in media. Popular actresses are becoming younger, taller and thinner, with some even fainting from lack of food. Women's magazines promote the idea that women will have a perfect life if they lose 20 pounds. The media pressure is affecting both girls and boys as young as 5-6 who are engaging in dieting and unhealthy weight control behaviors. Nearly half of preadolescent girls wish to be thinner due to media and peer influences.
This document discusses gender inequality and the challenges women face globally. It provides statistics showing women experience high rates of violence, child marriage, female genital mutilation, and job losses. While some progress has been made in women's representation in government and management, full equality remains elusive. The document argues achieving gender equality requires enabling policies, institutional support for women's empowerment, and women making empowered choices to take charge of their lives.
Accelerate the surge of Women Empowerment - Alice BrantonAlice Branton
The document discusses women's empowerment and how it can be accelerated through The Trivedi Effect. It defines women's empowerment as creating an environment where women can develop independently and succeed in their careers. While factors like gender discrimination, violence, and lack of opportunities have historically hindered women's empowerment, programs focused on health, safety, and equality can help empower women. The Trivedi Effect involves energy transmissions that can strengthen women's connection to their inner guidance and increase confidence, well-being, and success in managing their various roles and stressors. Experiencing The Trivedi Effect may significantly change women's confidence and perspective, thereby furthering women's empowerment.
Yusuf M.XX XXX RoadEast Brunswick, New Jersey 08816[email pr.docxransayo
Yusuf M.
XX XXX Road
East Brunswick, New Jersey 08816
[email protected]
16 June 2018
Tomara Baker
Grants Management Specialist
5600 Fishers Lane
Rockville, MD 20857
240-276-1407
[email protected]
Dear Ms. Baker,
My name is Yusuf M. and I am a visiting student at Rutgers University. After having conducted years of research on mental wellness with renowned health psychologist Dr. David Creswell, I’ve gained an increased awareness for the growing mental health crisis that plagues this country and a greater appreciation for the amazing work that organizations like SAMHSA are doing. As you know, mental health concerns are more serious and prevalent in today's society than ever before, yet not enough is being done about them. At Rutgers University, I’ve thoroughly investigated this issue from both the student’s and administration’s perspectives to put together a comprehensive plan, detailed in the attached proposal, that utilizes both a strong online presence and mental health education to reach as many students as possible.
Currently, there are about 43 million Americans with mental illness and almost half of them aren’t seeking the treatment they need due to a lack of access to care or sufficient funds, fear of being labeled as mentally ill and/or not knowing where or how to seek help. For college student specifically, a whopping 80% of them aren’t seeking treatment. This is because, in addition to the reasons mentioned earlier, many universities like Rutgers can’t meet the growing demand for mental health services, and instead of reaching out to students, they have taken a reactive approach and have become triage services that quickly “treat” students as they come in.
In order to make it easier for Rutgers students to learn about and use available mental health services and to diminish the negative stigma that deters many from getting help, I have devised a research-based plan that pulls effective strategies from the latest research and successful models. The first and second phases of my plan ensure that all students understand what mental illness is as well as how and why they should seek treatment. The third phase not only adds on another layer of support, but also breaks down many of the barriers to seeking treatment. Please take your time to read through my attached proposal. If you have any questions or concerns, feel free to contact me at 732-664-4498. I look forward to hearing from you soon!
Sincerely,
Yusuf M.
Three-Pronged Approach to Addressing the College Mental Health Crisis:
------------------------------------------------------------------------------------------------
The Rutgers Edition
Submitted By: Yusuf M.
Submitted To:
Tomara Baker
Grants Management Specialist
5600 Fishers Lane
Rockville, MD 20857
240-276-1407
[email protected]
Prepared for:
Completed: 30th of July, 2018
Abstract
This proposal is focused on finding an effective solution for dealing with the current rise of mental health issues. It starts off by.
Compare And Contrast Essay Effective. Online assignment writing service.Bridget Dodson
The document discusses the growth of early Los Angeles. It begins by stating that understanding Los Angeles' growth requires visiting Union Station in downtown, as the railroad allowed for American expansion. It then discusses how the railroad connected Los Angeles to the rest of the country in the late 1800s, fueling rapid population growth. Agricultural and oil booms in the early 1900s further accelerated Los Angeles' development into a major city.
Similar to Modeling and Numerical Simulation of Bangladeshi Women’s Depression Is a Function of Pressure to Get Married (13)
This document provides a technical review of secure banking using RSA and AES encryption methodologies. It discusses how RSA and AES are commonly used encryption standards for secure data transmission between ATMs and bank servers. The document first provides background on ATM security measures and risks of attacks. It then reviews related work analyzing encryption techniques. The document proposes using a one-time password in addition to a PIN for ATM authentication. It concludes that implementing encryption standards like RSA and AES can make transactions more secure and build trust in online banking.
This document analyzes the performance of various modulation schemes for achieving energy efficient communication over fading channels in wireless sensor networks. It finds that for long transmission distances, low-order modulations like BPSK are optimal due to their lower SNR requirements. However, as transmission distance decreases, higher-order modulations like 16-QAM and 64-QAM become more optimal since they can transmit more bits per symbol, outweighing their higher SNR needs. Simulations show lifetime extensions up to 550% are possible in short-range networks by using higher-order modulations instead of just BPSK. The optimal modulation depends on transmission distance and balancing the energy used by electronic components versus power amplifiers.
This document provides a review of mobility management techniques in vehicular ad hoc networks (VANETs). It discusses three modes of communication in VANETs: vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), and hybrid vehicle (HV) communication. For each communication mode, different mobility management schemes are required due to their unique characteristics. The document also discusses mobility management challenges in VANETs and outlines some open research issues in improving mobility management for seamless communication in these dynamic networks.
This document provides a review of different techniques for segmenting brain MRI images to detect tumors. It compares the K-means and Fuzzy C-means clustering algorithms. K-means is an exclusive clustering algorithm that groups data points into distinct clusters, while Fuzzy C-means is an overlapping clustering algorithm that allows data points to belong to multiple clusters. The document finds that Fuzzy C-means requires more time for brain tumor detection compared to other methods like hierarchical clustering or K-means. It also reviews related work applying these clustering algorithms to segment brain MRI images.
1) The document simulates and compares the performance of AODV and DSDV routing protocols in a mobile ad hoc network under three conditions: when users are fixed, when users move towards the base station, and when users move away from the base station.
2) The results show that both protocols have higher packet delivery and lower packet loss when users are either fixed or moving towards the base station, since signal strength is better in those scenarios. Performance degrades when users move away from the base station due to weaker signals.
3) AODV generally has better performance than DSDV, with higher throughput and packet delivery rates observed across the different user mobility conditions.
This document describes the design and implementation of 4-bit QPSK and 256-bit QAM modulation techniques using MATLAB. It compares the two techniques based on SNR, BER, and efficiency. The key steps of implementing each technique in MATLAB are outlined, including generating random bits, modulation, adding noise, and measuring BER. Simulation results show scatter plots and eye diagrams of the modulated signals. A table compares the results, showing that 256-bit QAM provides better performance than 4-bit QPSK. The document concludes that QAM modulation is more effective for digital transmission systems.
The document proposes a hybrid technique using Anisotropic Scale Invariant Feature Transform (A-SIFT) and Robust Ensemble Support Vector Machine (RESVM) to accurately identify faces in images. A-SIFT improves upon traditional SIFT by applying anisotropic scaling to extract richer directional keypoints. Keypoints are processed with RESVM and hypothesis testing to increase accuracy above 95% by repeatedly reprocessing images until the threshold is met. The technique was tested on similar and different facial images and achieved better results than SIFT in retrieval time and reduced keypoints.
This document studies the effects of dielectric superstrate thickness on microstrip patch antenna parameters. Three types of probes-fed patch antennas (rectangular, circular, and square) were designed to operate at 2.4 GHz using Arlondiclad 880 substrate. The antennas were tested with and without an Arlondiclad 880 superstrate of varying thicknesses. It was found that adding a superstrate slightly degraded performance by lowering the resonant frequency and increasing return loss and VSWR, while decreasing bandwidth and gain. Specifically, increasing the superstrate thickness or dielectric constant resulted in greater changes to the antenna parameters.
This document describes a wireless environment monitoring system that utilizes soil energy as a sustainable power source for wireless sensors. The system uses a microbial fuel cell to generate electricity from the microbial activity in soil. Two microbial fuel cells were created using different soil types and various additives to produce different current and voltage outputs. An electronic circuit was designed on a printed circuit board with components like a microcontroller and ZigBee transceiver. Sensors for temperature and humidity were connected to the circuit to monitor the environment wirelessly. The system provides a low-cost way to power remote sensors without needing battery replacement and avoids the high costs of wiring a power source.
1) The document proposes a model for a frequency tunable inverted-F antenna that uses ferrite material.
2) The resonant frequency of the antenna can be significantly shifted from 2.41GHz to 3.15GHz, a 31% shift, by increasing the static magnetic field placed on the ferrite material.
3) Altering the permeability of the ferrite allows tuning of the antenna's resonant frequency without changing the physical dimensions, providing flexibility to operate over a wide frequency range.
This document summarizes a research paper that presents a speech enhancement method using stationary wavelet transform. The method first classifies speech into voiced, unvoiced, and silence regions based on short-time energy. It then applies different thresholding techniques to the wavelet coefficients of each region - modified hard thresholding for voiced speech, semi-soft thresholding for unvoiced speech, and setting coefficients to zero for silence. Experimental results using speech from the TIMIT database corrupted with white Gaussian noise at various SNR levels show improved performance over other popular denoising methods.
This document reviews the design of an energy-optimized wireless sensor node that encrypts data for transmission. It discusses how sensing schemes that group nodes into clusters and transmit aggregated data can reduce energy consumption compared to individual node transmissions. The proposed node design calculates the minimum transmission power needed based on received signal strength and uses a periodic sleep/wake cycle to optimize energy when not sensing or transmitting. It aims to encrypt data at both the node and network level to further optimize energy usage for wireless communication.
This document discusses group consumption modes. It analyzes factors that impact group consumption, including external environmental factors like technological developments enabling new forms of online and offline interactions, as well as internal motivational factors at both the group and individual level. The document then proposes that group consumption modes can be divided into four types based on two dimensions: vertical (group relationship intensity) and horizontal (consumption action period). These four types are instrument-oriented, information-oriented, enjoyment-oriented, and relationship-oriented consumption modes. Finally, the document notes that consumption modes are dynamic and can evolve over time.
The document summarizes a study of different microstrip patch antenna configurations with slotted ground planes. Three antenna designs were proposed and their performance evaluated through simulation: a conventional square patch, an elliptical patch, and a star-shaped patch. All antennas were mounted on an FR4 substrate. The effects of adding different slot patterns to the ground plane on resonance frequency, bandwidth, gain and efficiency were analyzed parametrically. Key findings were that reshaping the patch and adding slots increased bandwidth and shifted resonance frequency. The elliptical and star patches in particular performed better than the conventional design. Three antenna configurations were selected for fabrication and measurement based on the simulations: a conventional patch with a slot under the patch, an elliptical patch with slots
1) The document describes a study conducted to improve call drop rates in a GSM network through RF optimization.
2) Drive testing was performed before and after optimization using TEMS software to record network parameters like RxLevel, RxQuality, and events.
3) Analysis found call drops were occurring due to issues like handover failures between sectors, interference from adjacent channels, and overshooting due to antenna tilt.
4) Corrective actions taken included defining neighbors between sectors, adjusting frequencies to reduce interference, and lowering the mechanical tilt of an antenna.
5) Post-optimization drive testing showed improvements in RxLevel, RxQuality, and a reduction in dropped calls.
This document describes the design of an intelligent autonomous wheeled robot that uses RF transmission for communication. The robot has two modes - automatic mode where it can make its own decisions, and user control mode where a user can control it remotely. It is designed using a microcontroller and can perform tasks like object recognition using computer vision and color detection in MATLAB, as well as wall painting using pneumatic systems. The robot's movement is controlled by DC motors and it uses sensors like ultrasonic sensors and gas sensors to navigate autonomously. RF transmission allows communication between the robot and a remote control unit. The overall aim is to develop a low-cost robotic system for industrial applications like material handling.
This document reviews cryptography techniques to secure the Ad-hoc On-Demand Distance Vector (AODV) routing protocol in mobile ad-hoc networks. It discusses various types of attacks on AODV like impersonation, denial of service, eavesdropping, black hole attacks, wormhole attacks, and Sybil attacks. It then proposes using the RC6 cryptography algorithm to secure AODV by encrypting data packets and detecting and removing malicious nodes launching black hole attacks. Simulation results show that after applying RC6, the packet delivery ratio and throughput of AODV increase while delay decreases, improving the security and performance of the network under attack.
The document describes a proposed modification to the conventional Booth multiplier that aims to increase its speed by applying concepts from Vedic mathematics. Specifically, it utilizes the Urdhva Tiryakbhyam formula to generate all partial products concurrently rather than sequentially. The proposed 8x8 bit multiplier was coded in VHDL, simulated, and found to have a path delay 44.35% lower than a conventional Booth multiplier, demonstrating its potential for higher speed.
This document discusses image deblurring techniques. It begins by introducing image restoration and focusing on image deblurring. It then discusses challenges with image deblurring being an ill-posed problem. It reviews existing approaches to screen image deconvolution including estimating point spread functions and iteratively estimating blur kernels and sharp images. The document also discusses handling spatially variant blur and summarizes the relationship between the proposed method and previous work for different blur types. It proposes using color filters in the aperture to exploit parallax cues for segmentation and blur estimation. Finally, it proposes moving the image sensor circularly during exposure to prevent high frequency attenuation from motion blur.
This document describes modeling an adaptive controller for an aircraft roll control system using PID, fuzzy-PID, and genetic algorithm. It begins by introducing the aircraft roll control system and motivation for developing an adaptive controller to minimize errors from noisy analog sensor signals. It then provides the mathematical model of aircraft roll dynamics and describes modeling the real-time flight control system in MATLAB/Simulink. The document evaluates PID, fuzzy-PID, and PID-GA (genetic algorithm) controllers for aircraft roll control and finds that the PID-GA controller delivers the best performance.
Mechanics:- Simple and Compound PendulumPravinHudge1
a compound pendulum is a physical system with a more complex structure than a simple pendulum, incorporating its mass distribution and dimensions into its oscillatory motion around a fixed axis. Understanding its dynamics involves principles of rotational mechanics and the interplay between gravitational potential energy and kinetic energy. Compound pendulums are used in various scientific and engineering applications, such as seismology for measuring earthquakes, in clocks to maintain accurate timekeeping, and in mechanical systems to study oscillatory motion dynamics.
Compositions of iron-meteorite parent bodies constrainthe structure of the pr...Sérgio Sacani
Magmatic iron-meteorite parent bodies are the earliest planetesimals in the Solar System,and they preserve information about conditions and planet-forming processes in thesolar nebula. In this study, we include comprehensive elemental compositions andfractional-crystallization modeling for iron meteorites from the cores of five differenti-ated asteroids from the inner Solar System. Together with previous results of metalliccores from the outer Solar System, we conclude that asteroidal cores from the outerSolar System have smaller sizes, elevated siderophile-element abundances, and simplercrystallization processes than those from the inner Solar System. These differences arerelated to the formation locations of the parent asteroids because the solar protoplane-tary disk varied in redox conditions, elemental distributions, and dynamics at differentheliocentric distances. Using highly siderophile-element data from iron meteorites, wereconstruct the distribution of calcium-aluminum-rich inclusions (CAIs) across theprotoplanetary disk within the first million years of Solar-System history. CAIs, the firstsolids to condense in the Solar System, formed close to the Sun. They were, however,concentrated within the outer disk and depleted within the inner disk. Future modelsof the structure and evolution of the protoplanetary disk should account for this dis-tribution pattern of CAIs.
TOPIC OF DISCUSSION: CENTRIFUGATION SLIDESHARE.pptxshubhijain836
Centrifugation is a powerful technique used in laboratories to separate components of a heterogeneous mixture based on their density. This process utilizes centrifugal force to rapidly spin samples, causing denser particles to migrate outward more quickly than lighter ones. As a result, distinct layers form within the sample tube, allowing for easy isolation and purification of target substances.
Hariyalikart Case Study of helping farmers in Biharrajsaurav589
Helping farmers all across India through our latest technologies of modern farming like drones for irrigation and best pest control For more visit : https://www.hariyalikart.com/case-study
The Limited Role of the Streaming Instability during Moon and Exomoon FormationSérgio Sacani
It is generally accepted that the Moon accreted from the disk formed by an impact between the proto-Earth and
impactor, but its details are highly debated. Some models suggest that a Mars-sized impactor formed a silicate
melt-rich (vapor-poor) disk around Earth, whereas other models suggest that a highly energetic impact produced a
silicate vapor-rich disk. Such a vapor-rich disk, however, may not be suitable for the Moon formation, because
moonlets, building blocks of the Moon, of 100 m–100 km in radius may experience strong gas drag and fall onto
Earth on a short timescale, failing to grow further. This problem may be avoided if large moonlets (?100 km)
form very quickly by streaming instability, which is a process to concentrate particles enough to cause gravitational
collapse and rapid formation of planetesimals or moonlets. Here, we investigate the effect of the streaming
instability in the Moon-forming disk for the first time and find that this instability can quickly form ∼100 km-sized
moonlets. However, these moonlets are not large enough to avoid strong drag, and they still fall onto Earth quickly.
This suggests that the vapor-rich disks may not form the large Moon, and therefore the models that produce vaporpoor disks are supported. This result is applicable to general impact-induced moon-forming disks, supporting the
previous suggestion that small planets (<1.6 R⊕) are good candidates to host large moons because their impactinduced disks would likely be vapor-poor. We find a limited role of streaming instability in satellite formation in an
impact-induced disk, whereas it plays a key role during planet formation.
Unified Astronomy Thesaurus concepts: Earth-moon system (436)
Embracing Deep Variability For Reproducibility and Replicability
Abstract: Reproducibility (aka determinism in some cases) constitutes a fundamental aspect in various fields of computer science, such as floating-point computations in numerical analysis and simulation, concurrency models in parallelism, reproducible builds for third parties integration and packaging, and containerization for execution environments. These concepts, while pervasive across diverse concerns, often exhibit intricate inter-dependencies, making it challenging to achieve a comprehensive understanding. In this short and vision paper we delve into the application of software engineering techniques, specifically variability management, to systematically identify and explicit points of variability that may give rise to reproducibility issues (eg language, libraries, compiler, virtual machine, OS, environment variables, etc). The primary objectives are: i) gaining insights into the variability layers and their possible interactions, ii) capturing and documenting configurations for the sake of reproducibility, and iii) exploring diverse configurations to replicate, and hence validate and ensure the robustness of results. By adopting these methodologies, we aim to address the complexities associated with reproducibility and replicability in modern software systems and environments, facilitating a more comprehensive and nuanced perspective on these critical aspects.
https://hal.science/hal-04582287
BIRDS DIVERSITY OF SOOTEA BISWANATH ASSAM.ppt.pptxgoluk9330
Ahota Beel, nestled in Sootea Biswanath Assam , is celebrated for its extraordinary diversity of bird species. This wetland sanctuary supports a myriad of avian residents and migrants alike. Visitors can admire the elegant flights of migratory species such as the Northern Pintail and Eurasian Wigeon, alongside resident birds including the Asian Openbill and Pheasant-tailed Jacana. With its tranquil scenery and varied habitats, Ahota Beel offers a perfect haven for birdwatchers to appreciate and study the vibrant birdlife that thrives in this natural refuge.
JAMES WEBB STUDY THE MASSIVE BLACK HOLE SEEDSSérgio Sacani
The pathway(s) to seeding the massive black holes (MBHs) that exist at the heart of galaxies in the present and distant Universe remains an unsolved problem. Here we categorise, describe and quantitatively discuss the formation pathways of both light and heavy seeds. We emphasise that the most recent computational models suggest that rather than a bimodal-like mass spectrum between light and heavy seeds with light at one end and heavy at the other that instead a continuum exists. Light seeds being more ubiquitous and the heavier seeds becoming less and less abundant due the rarer environmental conditions required for their formation. We therefore examine the different mechanisms that give rise to different seed mass spectrums. We show how and why the mechanisms that produce the heaviest seeds are also among the rarest events in the Universe and are hence extremely unlikely to be the seeds for the vast majority of the MBH population. We quantify, within the limits of the current large uncertainties in the seeding processes, the expected number densities of the seed mass spectrum. We argue that light seeds must be at least 103 to 105 times more numerous than heavy seeds to explain the MBH population as a whole. Based on our current understanding of the seed population this makes heavy seeds (Mseed > 103 M⊙) a significantly more likely pathway given that heavy seeds have an abundance pattern than is close to and likely in excess of 10−4 compared to light seeds. Finally, we examine the current state-of-the-art in numerical calculations and recent observations and plot a path forward for near-future advances in both domains.
Evaluation and Identification of J'BaFofi the Giant Spider of Congo and Moke...MrSproy
ABSTRACT
The J'BaFofi, or "Giant Spider," is a mainly legendary arachnid by reportedly inhabiting the dense rain forests of
the Congo. As despite numerous anecdotal accounts and cultural references, the scientific validation remains more elusive.
My study aims to proper evaluate the existence of the J'BaFofi through the analysis of historical reports,indigenous
testimonies and modern exploration efforts.
Signatures of wave erosion in Titan’s coastsSérgio Sacani
The shorelines of Titan’s hydrocarbon seas trace flooded erosional landforms such as river valleys; however, it isunclear whether coastal erosion has subsequently altered these shorelines. Spacecraft observations and theo-retical models suggest that wind may cause waves to form on Titan’s seas, potentially driving coastal erosion,but the observational evidence of waves is indirect, and the processes affecting shoreline evolution on Titanremain unknown. No widely accepted framework exists for using shoreline morphology to quantitatively dis-cern coastal erosion mechanisms, even on Earth, where the dominant mechanisms are known. We combinelandscape evolution models with measurements of shoreline shape on Earth to characterize how differentcoastal erosion mechanisms affect shoreline morphology. Applying this framework to Titan, we find that theshorelines of Titan’s seas are most consistent with flooded landscapes that subsequently have been eroded bywaves, rather than a uniform erosional process or no coastal erosion, particularly if wave growth saturates atfetch lengths of tens of kilometers.
Quality assurance B.pharm 6th semester BP606T UNIT 5
Modeling and Numerical Simulation of Bangladeshi Women’s Depression Is a Function of Pressure to Get Married
1. IOSR Journal of Mathematics (IOSR-JM)
e-ISSN: 2278-5728, p-ISSN: 2319-765X. Volume 11, Issue 1 Ver. III (Jan - Feb. 2015), PP 61-68
www.iosrjournals.org
DOI: 10.9790/5728-11136168 www.iosrjournals.org 61 |Page
Modeling and Numerical Simulation of Bangladeshi Women’s
Depression Is a Function of Pressure to Get Married
Sayed Allamah Iqbal1
, Mohammad Mahmud Hasan2,
Md.Jashim Uddin3
1, 2, 3,
(Electrical & Electronic Engineering, International Islamic University Chittagong, Bangladesh)
Abstract : Bangladesh is conventionally a radiant cultural country. Wedding ceremony is playing a vital role
to its cultural norm and heritage. But the marriage issue creates depression among the young men and women.
This article depicts a mathematical model with simulated result to visualize the trend and nature of the
depression of Bangladeshi young women, who are in peer pressure to get married. There are some significant
causes for creating depression, such as economic solvency, education, dynasty, beauty, media role (Print,
electronic) etc. The model has been developed on the basis of media role (Print, electronic) to the beauty of the
women, which affect the depression level of a woman who is about to be married. To recognize which women
are more affected by these issues, the women are classified into two groups as extremely susceptible group and
low susceptible group. These groups are defined by four non-linear differential equations on the basis of the
impact of their corresponding treatment and depression. And the result shows that the role of media (Print,
electronic) on beautification of the women has very negligible impact to their depression to get married.
Keywords: Depression, pressure, Equilibrium, Bifurcation
I. Introduction
Clinical depression is usually diagnosed, when feeling of worthlessness, self-blame, unhappiness,
purposelessness last for several weeks and interferes with an individual’s work and social life. There are
different types of depression such that, Bipolar disorder, formerly referred to as manic depression, is a typical
clinical depression that results in extreme mood fluctuations and another kind of depressions is classified as
SAD (Seasonal Affective Disorder) [1].
Depression has played an imperative role in sexual category issue. The depression rate of the boys and
girls are approximately alike prior to the age 13.After the age 13 men’s and women’s depression rate move
away noticeably from the men more than two times. Bangladeshi Women turn into depressed for number of
reasons including negative body image. Particularly sexual category dissimilarity in depression comes into view
at the age of puberty. Women who suffer from depression are more likely to be unmarried and have a younger
age at on set.
The clinical depression of Bangladeshi women is dissimilar from some context to the well developed
country, in view of the fact that the social security of well developed country is very compared to Bangladeshi
women. Every women of Bangladesh have a vision, that they will have an excellent family life by wedding
ceremony, so wedding and wedding ceremony play an imperative role to their psychological nature. Because
they believe that, pleasing marriage give them more security rather than living unaccompanied. Since Beautiful
women get first-rate privilege to get a satisfactory matrimonial life. This paper is emphasized the beauty of
young women is a factor to get a pleasing marriage or getting marriage within the range of young women 15-
24.The depression of the girl start at the time of her puberty [2], since she can feel her gender difference to
complete her role as a cultural pressure to be attractive physically to everyone, that means should be thin figure,
complexion etc. There are trustworthy field work research by Bangladeshi Non Government Organization
(NGO), BANAFUL, BRAC, Unnayan Porikolponay Manush (UPOMA), Rural Development Sangstha (RDS),
Women Development Program (WDP) and Association for Social Advancement (ASA) find out that women
are just about more than twice as likely as men to suffer from depress-ion both medical and subclinical. There
are significant number of medical and subclinical depression is directly related to beautification. This exerts
pressure receiving until her a pleasing wedding. According to the law of Bangladesh, wedding age of a women
start from the age 18, hence the model indicates that this initial age 15 is highly vulnerable. Our media
(electronic, print etc.) imposed a negative impact to the beauty of women to their mental health and self-esteem
to get marriage. For an example to expose the manipulated beauty of women celebrity and their life style for the
related business purpose [3].
As example some subliminal messages for gender differentiations have exposed the following
electronics or print media in Bangladesh are described below.
Some motivating Bangladeshi Television Advertisements that intended to change and misguided the
perceptions of the identity of a woman.
2. Modeling And Numerical Simulation Of Bangladeshi Women’s Depression Is A Function Of Pressure To Get Married
DOI: 10.9790/5728-11136168 www.iosrjournals.org 62 |Page
Meril Splash: Fresh Manei Shundor TVC 2014:
This is the most well-known advertising campaigns this year so far. The advert explores and age old
issue about Bangladeshi’s having a rather distorted perception about complexion and a woman’s beauty. The
advertisement subtly portrays how media has been feeding the faulty superstition and tapping into it. The ad
urges viewers to look at the concept of beauty with a “fresher” perspective.
Bangladesh Army TVC 2014:
This is one of the very few TV Commercials made in Bangladesh which does not directly emphasis the
beauty of the women but this well-known advertising gives a subliminal message only beautiful women might
have a chance to get in Bangladesh Army, it is notable that Bangladeshi women’s are mixed-up different
complexion, however this ad campaigns positively weighted that Bangladeshi women in a very different light
from how we are used to bearing in mind them. Here, young women walk shoulder to shoulder, excelling at
doing what is considered a man’s job. She’s no less talented of in front of the same dangers and challenges to
excel and help shield the nation.
For the line of research according to the above complexity of distorted perception about complexion,
women body shape and women’s beauty forced by media (Print, electronic).And consequently this model is
developed a deterministic endemic [4] epidemiological model. By using four non linear differential equations
[5] where the variables are S1 (Highly susceptible), S2 (Low susceptible), D (Depression) and R (Recovery from
depression) to find out the trend of depression stability of the system.
II. Model Flowchart
In this model the Fig.1 is depicted the entire system gradually. The system has resemblance with
population dynamics. According to government law the matrimonial age of Bangladeshi young women start
from age 18.For this reason in this model; the women are classified by highly susceptible and low susceptible
women between the ages 15−25. According to socio-cultural pressure, such that media (electronic, print etc.)
role for the beautification of the women. So It is taken the age 15 will be the probability q of highly susceptible
women since they have just finished their puberty age and newly enter the age 15.And rest of the women will
be probability of (1−q) less susceptible group, these two groups are denoted in this model by S1 and S2
respectively. When a girl has finished her puberty age and turn into age 15, then she will enter in this model at
per-capita rate η and also 𝜂 is rate of leaving from the system. In the model highly susceptible women will going
to depression (D) rapidly beside this 𝜉 is the rate of women going from low susceptible to high susceptible
women, since low susceptible group are at risk when they are keep in to touch to the highly susceptible group.
The women who are depressed(D) are going to treatment for recovery(R) at the rate of 𝛾 and they recovery
women also leave the system due to the death or get in to marriage at the rate η.And the probability of leaving
form the recovery (R) treatment to less infected women(S2) is p at the rate of τ .In this Model N is depicted as
the total number of Bangladeshi-Women from age 15 - 25, where p is the Probability of successful rate of
recovery from depression. The exit rate of probability from the system is denoted by q. Where σ is designate the
rate of different type of media (example of Electronics, print etc.) influenced the women enter hooked on
depression. Beside this τ is the probability rate of women leave from recovery treatment without successful
recovery after taking medication. In addition depicted as the rate of women leaving or enter in to the model.
However is denoted the rate of infected women get into recovery. Moreover is defined as rate of pressure
on highly infected women due to low infected women.
Fig. 1: model flowchart
III. Mathematical Equations Of The Model
3. Modeling And Numerical Simulation Of Bangladeshi Women’s Depression Is A Function Of Pressure To Get Married
DOI: 10.9790/5728-11136168 www.iosrjournals.org 63 |Page
From the model flowchart four set of ordinary nonlinear differential Equations is formed. These are the
following.
dS1
dt
= qηN + ξ
S1+D
N
S2 − δ
V2
N
S1 − σS1 − ηS1 (1)
dS2
dt
= 1 − q ηN + δ
S2
N
S1 + τpD − ξ
S1+D
N
S2 − ηS2 2
dD
dt
= σS1 + τ 1 − P R − γD − ηD 3
dR
dt
= γD − τ 1 − P R − τpR − ηR (4)
Where,
S1 + S2 + D + R = N (5)
IV. Analytic Solutions Of The Model
Now rescaling the above four equations and putting into them to the equations (1) to (5).
S1
N
= u,
S2
N
= v,
D
N
= w and
R
N
= r
And then we have the following equations.
du
dt
= ηq + ξv u + w − δvu − σ + η u (6)
dv
dt
= 1 − q η + δvu + τpr − ξv u + w − μv (7)
dw
dt
= σu + τ 1 − p r − γ + μ w (8)
dr
dt
= γw − τr − μr (9)
v = 1 − u − w − r (10)
du
dt
= ηq + ξ 1 − u − w − r u + w − δ 1 − u − w − r u − σ + η u (11)
dw
dt
= σu + τ 1 − p r − γ + η w (12)
dr
dt
= γw − τr − ηr (13)
For stability solution, we have from equation (11), (12) and (13)
du
dt
= 0,
dw
dt
= 0 and
dr
dt
= 0
These implies that,
ηq + ε 1 − u − w − r u + w − δ 1 − u − w − r u − σ + η u = 0 (14)
σu + τ 1 − p r − γ + η w = 0 (15)
γw − 𝜏𝑟 − 𝜂𝑟 = 0 (16)
From equation (15) and (16), we have the following solutions,
w =
τ+η
γ
r (17)
u =
γ+η τ+η −γτ(1−p)
σγ
r (18)
Now by using the equations (17) and (18), we have from the equation (14)
4. Modeling And Numerical Simulation Of Bangladeshi Women’s Depression Is A Function Of Pressure To Get Married
DOI: 10.9790/5728-11136168 www.iosrjournals.org 64 |Page
𝜂𝑞 + 𝜉 1 −
𝛾 + 𝜂 𝜏 + 𝜂 − 𝛾𝜏 1 − 𝑝
𝜎𝛾
+
𝜏 + 𝜂
𝛾
+ 1 𝑟 ×
𝛾 + 𝜂 𝜏 + 𝜂 − 𝛾𝜏 1 − 𝑝
𝜎𝛾
+
𝜏 + 𝜂
𝛾
𝑟
− 𝛿 1 −
𝛾 + 𝜂 𝜏 + 𝜂 − 𝛾𝜏 1 − 𝑝
𝜎𝛾
+
𝜏 + 𝜂
𝛾
+ 1 𝑟 ×
𝛾 + 𝜂 𝜏 + 𝜂 − 𝛾𝜏 1 − 𝑝
𝜎𝛾
𝑟
− 𝜎 + 𝜂
𝛾 + 𝜂 𝜏 + 𝜂 − 𝛾𝜏 1 − 𝑝
𝜎𝛾
𝑟 = 0 (19)
If we let,
l = 𝜉
𝛾 + 𝜂 𝜏 + 𝜂 − 𝛾𝜏 1 − 𝑝
𝜎𝛾
+
𝜏 + 𝜂
𝛾
−
𝛾 + 𝜂 𝜏 + 𝜂 − 𝛾𝜏 1 − 𝑝
𝜎𝛾
−
𝜏 + 𝜂
𝛾
− 1
− 𝛿
𝛾 + 𝜂 𝜏 + 𝜂 − 𝛾𝜏 1 − 𝑝
𝜎𝛾
−
𝛾 + 𝜂 𝜏 + 𝜂 − 𝛾𝜏 1 − 𝑝
𝜎𝛾
−
𝜏 + 𝜂
𝛾
− 1 (20)
m
= 𝜉
𝛾 + 𝜂 τ + η − γτ 1 − p
σγ
+
τ + η
γ
− δ
γ + η τ + η − γτ 1 − p
σγ
− σ + η
γ + η τ + η − γτ 1 − p
σγ
(21)
n = ηq (22)
Now the equation (19) can be written as
f r = lr2
+ mr + n (23)
∆= ξ
γ + η τ + η − γτ 1 − p
σγ
+
τ + η
γ
− δ
γ + η τ + η − γτ 1 − p
σγ
− σ + η
γ + η τ + η − γτ 1 − p
σγ
2
+ 4 ξ
γη + τη + η2
+ γτp
σγ
+
τ + η
γ
γη + τη + η2
+ γτp
σγ
+
τ + η
γ
+ 1
+ δ
γη + τη + γτp
σγ
γη + τη + η2
+ γτp
σγ
+
τ + η
γ
+ 1 (24)
V. Simulation Of The Model
By numerical method Solving the system of differential equation (11), (12), and (13) with estimated
parameter, we have the following Fig. 2−4.Where q is the probability of highly infected women at the age of 15
and it is estimated
2
3
, that means 2 young women are highly susceptible out of 3 women, beside this
𝟏
𝜼
mean
life time of the model and η is anticipated
1
10×365
, since the life span between the age 15 − 25 is 10 years, i.e.
(10 × 365) days, δ is the product of two terms S1 and S2 that is rate of pressure on low infected women due to
the highly susceptible women, which is anticipated by 6 women are contacted per days out of 36 women then
𝜹 =
6
36
,beside this a is the media influenced women going to depression so
𝟏
𝝈
is the mean time of an women
before going to depression, we estimated the time is 5 months so the value of σ =
1
5×30
is predicted for 150 days
i.e. 5 month is going to be depression for a women, alongside
𝟏
𝝉
is the mean time of treatment, we guess an
individual susceptible women taking 11 months to completely cure from depression, so τ =
1
330
Moreover ξ is
the rate of pressure of highly infected women due to low infected women. We guess a highly infected women
get in to contact an less infected women and then they have a conversation of beauty of women or related topics,
if the conversations takes 6 minutes per individual then we anticipated 6 women get a conversation each day and
let 16 of them is infected, hence 𝝃 will be
6
16
. However p is the probability of successful recovery from the
depression, which is p= 0.7.
The model has the data from the Government Bureau of Statistic website of Bangladesh, Ministry of
Health and Family Welfare Website of Bangladesh Government and Non Government Organization: (NGO)
5. Modeling And Numerical Simulation Of Bangladeshi Women’s Depression Is A Function Of Pressure To Get Married
DOI: 10.9790/5728-11136168 www.iosrjournals.org 65 |Page
BANAFUL, BRAC, Unnayan Porikolponay Manush (UPOMA), Rural Development Sangstha (RDS), Women
Development Program (WDP) and Association for Social Advancement (ASA). And also took a comparison of
Bangladeshi data with National Institute of Mental Health, USA [6].
According to the World Health Organization (WHO) the number of mentally ill people in Bangladesh
is about to 7% [7] of the total population. And according to the Government of Bangladesh and NGO[8] census
July 2013, the total population of Bangladesh is 163,654,860 and age wise female are 15− 25 years:16, 377,
785,which is our model value N=16,377,785.Hence the total number of disordered
people=163,654,860%7=11455840. Another survey[9] find out 11% women are in major depression and two
third young women are suffering mental disordered in Bangladesh, then the model determine the following
values are D = 11455840×11%×
2
3
= 840095, R = D×
1
3
= 280032.Since S1 + S2 = N-(D+R) =15257658, then S1 =
(S1 + S2) ×
2
3
=10171772 and S2 = (S1 + S2) ×
1
3
= 5085886 respectively. Now the scaling values are u = S1/N =
0.622, v = S2/N = 0.31, w = D/N = 0.051 and r = R/N = 0.017.
By using these estimated parameters value in the model and after simulation for different life span the
model, have the following simulation figures.
Fig. 2: Numerical Simulation of the model
6. Modeling And Numerical Simulation Of Bangladeshi Women’s Depression Is A Function Of Pressure To Get Married
DOI: 10.9790/5728-11136168 www.iosrjournals.org 66 |Page
Fig. 3: Separate Numerical Simulation of the model
Fig. 4: Numerical Simulation of the model
7. Modeling And Numerical Simulation Of Bangladeshi Women’s Depression Is A Function Of Pressure To Get Married
DOI: 10.9790/5728-11136168 www.iosrjournals.org 67 |Page
Fig. 5: Separate Numerical Simulation of the model
VI. Conclusion
It has been seen from the simulation Fig-2 and Fig-3, which are begin with sharply increased, the
highly susceptible women (S1) and corresponding depressed women. Although it is seen after that the system is
going to stability and S1 decreases, though the population D and R boost up. In addition an analytical solution of
the equation (14), (15), and (16) for equilibrium points and then after a long calculation, a Quadratic system of
equation (23) is formed of recovery(R), which is rescaled by variable r. And then from the discriminant(Δ), it is
apparent that the system has at least one positive real stable equilibrium point[10]. Consequently it is depicted
from the simulation and analytic solution, that the depression has a very negligible effect by the media (print,
electronic). However it is seen from the figure-2 and 3 that, if the recovery increase then the S1 (highly infected
women) is dramatically decreased, so practically it is important to manage the depression of young women by
proper treatment and counseling. And it is as well as important, if the media (print, electronic) campaigns
positively that Bangladeshi women in a very different light from how we are used to bearing in mind them and
beauty is not a criteria to justify the potentiality of a women. Beside this it has seen from figure-4 and 5 to the
long time act of the depression and recovery give a steady state rate of alteration, so it is understandable that the
model is stable for short time of life span.
Acknowledgements
The author is thankful to the Government Bureau of Statistic Bangladesh, Ministry of Health and Family Welfare of
Bangladesh and Non Government Organization (NGO): BANAFUL, BRAC, Unnayan Porikolponay Manush (UPOMA),
Rural Development Sangstha (RDS), Women Development Program (WDP) and Association for Social Advancement
(ASA) to make available essential information and data. Beside this the author is thankful to the authority of programming
languages: www.numpy.org(Python), www.mathworks.com (MATLAB) and LaTeX Graphics Companion for simulation
and drawing model flowchart.
8. Modeling And Numerical Simulation Of Bangladeshi Women’s Depression Is A Function Of Pressure To Get Married
DOI: 10.9790/5728-11136168 www.iosrjournals.org 68 |Page
References
Journal Papers:
[1]. Ariela Frieder, MD; Anne L. Dunlop, MD, MPH; Larry Culpepper, MD, MPH; Peter S. Bernstein, MD, MPH. The clinical content
of preconception care: women with psychiatric conditions: American Journal of Obstetrics & Gynecology Supplement to
DECEMBER 2008, doi: 10.1016/j.ajog.2008.09.001.
Books:
[2]. S. Nolen-Hoeksema, Abnormal Psychology, Second Edition. (New York, USA: McGraw-Hill, 2001.)
Journal Papers:
[3]. S. E. Agras, W.S. and D. Spangler, “Exposure to media-portrayed images adversely affects vulnerable girls: a longitudinal
experiment,”
Journal of Social and Clinical Psychology, vol. 20, no. 3,pp. 324–340, 2001.
[4]. W. J. Van den Driessche, P., “Reproduction numbers and sub threshold endemic equilibria for compartmental models of disease
transmission,” Mathematical BioSciences, vol. 180, pp. 29–48,2002.
Books:
[5]. L. Edelstein-Keshet, Mathematical Models in Biology.( Random House, New York, NY: SIAM Publications, 1988.)
Website:
[6]. (2015) The national institute of mental health website. [Online]. Available: http://www.nimh.nih.gov/
[7]. (2015) The Banglapedia website (National Encyclopedia of Bangladesh). [Online]. Available:
http://www.banglapedia.org/HT/M_0268.htm/
[8]. (2014) The bangladesh people cia world factbook website. [Online].Available: http://www.theodora.com/wfbcurrent/bangladesh/
Journal Papers:
[9]. M.A Mohit, M M Maruf,H Ahmed, M T Alam, “Depression and Physical Illnesses: an Update,” Bangladesh Medical Journal, vol.
40, no.1, January, 2011.
Books:
[10]. S. H. Strogatz, Nonlinear Dynamics and ChaosWith applications to Phsycs, Biology,Chemistry and Engineering.( 10 East 53rd
Street, New York: Perseus Books, 1985)