"Underrepresented" is not just a buzzword: A closer look at the lack of ethni...Robyn Dahl
Talk given at GSA Annual Meeting.
For abstract and details: https://gsa.confex.com/gsa/2016AM/webprogram/Paper284916.html
For more on these topics: www.robynmdahl.com/blog
This document summarizes a research paper on designing an energy routing protocol called EPAR to optimize power consumption in mobile ad hoc networks (MANETs). EPAR aims to minimize total transmission energy and maximize network lifetime. It calculates the battery power for each path and selects the path with the maximum lowest hop energy. Simulation results show that EPAR outperforms the original DSR protocol by 65% and achieves higher throughput than DSR and another protocol called MTPR in different network scenarios. EPAR and MTPR also produce longer network lifetimes than DSR when considering factors like packet delivery ratio.
The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed for use in wireless ad-hoc networks without existing infrastructure. DSR allows networks to self-organize and self-configure. It uses two main mechanisms: route discovery determines the optimal transmission path between nodes, while route maintenance ensures the path stays optimal and loop-free as network conditions change.
Dynamic Source Routing uses route discovery to find routes between nodes. When a node receives a route request (RREQ) message, if it is the destination it returns a route reply (RREP) with the accumulated route record to the sender. If it is an intermediate node, it discards the RREQ if it has the same ID or finds its own address in the route, otherwise it appends its address to the route record and propagates the RREQ to neighbors to continue finding a path to the destination.
DSR is a source routing protocol for wireless ad hoc networks. It uses source routing whereby the source specifies the complete path to the destination in the packet header. Route discovery is done through route request broadcasts, and routes are cached for future use. Route maintenance is done through acknowledgements; if a link breaks, a route error is sent back to the source. Simulation results showed high packet delivery ratios even with high node mobility. DSR performs well for dynamic wireless networks.
Database security involves protecting a database from unauthorized access, modification, or deletion. It aims to ensure the confidentiality, integrity, and availability of data through various mechanisms like access controls, encryption, firewalls, and authorization levels. These controls regulate how data flows between systems and users, prevent indirect data inferences, and restrict access to only authorized users and operations. The goal is to safeguard sensitive information in databases from both intentional and accidental security threats.
The document discusses vulnerabilities in the Android operating system. It begins by noting the dominance of Android and iOS in the smartphone market and the need for privacy awareness as malicious codes are increasingly reported. It then defines vulnerability as a weakness or soft spot, and lists some common types of vulnerabilities like invalidated inputs, broken access control, and SQL injection. The document also covers Android security features like encryption, sandboxing, and permissions, as well as current issues around mobile security including malicious apps, unsafe websites, and data security problems. It concludes that while Android utilizes sandboxing and permissions, optional permission assignments can still leave security loopholes.
"Underrepresented" is not just a buzzword: A closer look at the lack of ethni...Robyn Dahl
Talk given at GSA Annual Meeting.
For abstract and details: https://gsa.confex.com/gsa/2016AM/webprogram/Paper284916.html
For more on these topics: www.robynmdahl.com/blog
This document summarizes a research paper on designing an energy routing protocol called EPAR to optimize power consumption in mobile ad hoc networks (MANETs). EPAR aims to minimize total transmission energy and maximize network lifetime. It calculates the battery power for each path and selects the path with the maximum lowest hop energy. Simulation results show that EPAR outperforms the original DSR protocol by 65% and achieves higher throughput than DSR and another protocol called MTPR in different network scenarios. EPAR and MTPR also produce longer network lifetimes than DSR when considering factors like packet delivery ratio.
The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed for use in wireless ad-hoc networks without existing infrastructure. DSR allows networks to self-organize and self-configure. It uses two main mechanisms: route discovery determines the optimal transmission path between nodes, while route maintenance ensures the path stays optimal and loop-free as network conditions change.
Dynamic Source Routing uses route discovery to find routes between nodes. When a node receives a route request (RREQ) message, if it is the destination it returns a route reply (RREP) with the accumulated route record to the sender. If it is an intermediate node, it discards the RREQ if it has the same ID or finds its own address in the route, otherwise it appends its address to the route record and propagates the RREQ to neighbors to continue finding a path to the destination.
DSR is a source routing protocol for wireless ad hoc networks. It uses source routing whereby the source specifies the complete path to the destination in the packet header. Route discovery is done through route request broadcasts, and routes are cached for future use. Route maintenance is done through acknowledgements; if a link breaks, a route error is sent back to the source. Simulation results showed high packet delivery ratios even with high node mobility. DSR performs well for dynamic wireless networks.
Database security involves protecting a database from unauthorized access, modification, or deletion. It aims to ensure the confidentiality, integrity, and availability of data through various mechanisms like access controls, encryption, firewalls, and authorization levels. These controls regulate how data flows between systems and users, prevent indirect data inferences, and restrict access to only authorized users and operations. The goal is to safeguard sensitive information in databases from both intentional and accidental security threats.
The document discusses vulnerabilities in the Android operating system. It begins by noting the dominance of Android and iOS in the smartphone market and the need for privacy awareness as malicious codes are increasingly reported. It then defines vulnerability as a weakness or soft spot, and lists some common types of vulnerabilities like invalidated inputs, broken access control, and SQL injection. The document also covers Android security features like encryption, sandboxing, and permissions, as well as current issues around mobile security including malicious apps, unsafe websites, and data security problems. It concludes that while Android utilizes sandboxing and permissions, optional permission assignments can still leave security loopholes.
This document provides an overview of 5G technology presented by students at GTU PG School, BISAG, GANDHINAGAR. 5G is described as the next major phase of mobile telecommunication that will offer transmission speeds up to 1 Gbps, making it 10 times faster than current technologies. The objectives of 5G include providing superior quality of service and user experience, reliable connectivity, and the ability to handle exponential growth in network capacity. The document traces the evolution of mobile technologies from 1G to 5G and concludes that 5G will revolutionize the world by 2020 and beyond through new concepts, innovations, and spectrums.
Basics about software prototyping. You may clearly understand how software prototyping is useful their pros and cons. Different types of software prototyping also there in presentation.
This document outlines plans for setting up a secure cybersecurity lab with three main goals: 1) Support both Windows and Linux systems to emulate a real-world environment, 2) Be able to isolate the lab network from the campus network for exercises, and 3) Provide a mixed-use space for both security exercises and general usage. Key aspects of the lab setup include using virtual machines on physical systems to lower costs, purchasing a managed switch to isolate student workstations, and configuring older or vulnerable operating systems on student systems to simulate real-world targets.
The document provides an introduction to the concept of data mining, defining it as the extraction of useful patterns from large data sources through automatic or semi-automatic means. It discusses common data mining tasks like classification, clustering, prediction, and association rule mining. Examples of data mining applications are also given such as marketing, fraud detection, and scientific data analysis.
Android is a software platform and operating system for mobile devices based on the Linux kernel. It was developed by Andy Rubin, Rich Miner, Nick Sears and Chris White and was later acquired by Google in 2005. Key features of Android include support for various wireless networks, an interface better than previous touchscreen mobiles, and the ability to access millions of applications. Android uses the Java programming language and allows developers to write once and deploy across many different devices.
Virtualization allows multiple operating systems to run simultaneously on the same hardware. It provides benefits such as reduced costs, increased hardware utilization, and isolation of virtual machines. Popular virtualization providers include VMware, Red Hat, and Citrix, with VMware's Workstation, GSX Server, and ESX Server being useful virtualization products. Virtualization offers advantages like testing flexibility and disaster recovery benefits.
The document summarizes the IEEE 802.20 standard for mobile broadband wireless access. Key points include:
- IEEE 802.20 defines the PHY and MAC layers for mobile broadband networks to provide data rates over 1 Mbps with support for vehicular mobility.
- It aims to fill the gap between cellular and wireless local area networks by providing greater coverage and mobility than WiFi but with higher data rates than 2G and 3G cellular networks.
- The standard supports applications requiring high-speed data access like video and VoIP through efficient packet-based transmission optimized for IP services. It also defines enhancements for conformance testing, system performance, management information, and bridging of 802.20 networks.
The document discusses process management in operating systems. It defines a process as a program during execution, which requires resources like memory and CPU registers. The document outlines the life cycle of a process, including the different states a process can be in like ready, running, waiting, blocked. It describes process creation and termination. The process control block (PCB) contains information needed to control and monitor each process. Context switching allows the CPU to switch between processes. Scheduling determines which process enters the running state. The document lists some common process control system calls and discusses advantages and disadvantages of process management.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
This document provides an overview of 5G technology presented by students at GTU PG School, BISAG, GANDHINAGAR. 5G is described as the next major phase of mobile telecommunication that will offer transmission speeds up to 1 Gbps, making it 10 times faster than current technologies. The objectives of 5G include providing superior quality of service and user experience, reliable connectivity, and the ability to handle exponential growth in network capacity. The document traces the evolution of mobile technologies from 1G to 5G and concludes that 5G will revolutionize the world by 2020 and beyond through new concepts, innovations, and spectrums.
Basics about software prototyping. You may clearly understand how software prototyping is useful their pros and cons. Different types of software prototyping also there in presentation.
This document outlines plans for setting up a secure cybersecurity lab with three main goals: 1) Support both Windows and Linux systems to emulate a real-world environment, 2) Be able to isolate the lab network from the campus network for exercises, and 3) Provide a mixed-use space for both security exercises and general usage. Key aspects of the lab setup include using virtual machines on physical systems to lower costs, purchasing a managed switch to isolate student workstations, and configuring older or vulnerable operating systems on student systems to simulate real-world targets.
The document provides an introduction to the concept of data mining, defining it as the extraction of useful patterns from large data sources through automatic or semi-automatic means. It discusses common data mining tasks like classification, clustering, prediction, and association rule mining. Examples of data mining applications are also given such as marketing, fraud detection, and scientific data analysis.
Android is a software platform and operating system for mobile devices based on the Linux kernel. It was developed by Andy Rubin, Rich Miner, Nick Sears and Chris White and was later acquired by Google in 2005. Key features of Android include support for various wireless networks, an interface better than previous touchscreen mobiles, and the ability to access millions of applications. Android uses the Java programming language and allows developers to write once and deploy across many different devices.
Virtualization allows multiple operating systems to run simultaneously on the same hardware. It provides benefits such as reduced costs, increased hardware utilization, and isolation of virtual machines. Popular virtualization providers include VMware, Red Hat, and Citrix, with VMware's Workstation, GSX Server, and ESX Server being useful virtualization products. Virtualization offers advantages like testing flexibility and disaster recovery benefits.
The document summarizes the IEEE 802.20 standard for mobile broadband wireless access. Key points include:
- IEEE 802.20 defines the PHY and MAC layers for mobile broadband networks to provide data rates over 1 Mbps with support for vehicular mobility.
- It aims to fill the gap between cellular and wireless local area networks by providing greater coverage and mobility than WiFi but with higher data rates than 2G and 3G cellular networks.
- The standard supports applications requiring high-speed data access like video and VoIP through efficient packet-based transmission optimized for IP services. It also defines enhancements for conformance testing, system performance, management information, and bridging of 802.20 networks.
The document discusses process management in operating systems. It defines a process as a program during execution, which requires resources like memory and CPU registers. The document outlines the life cycle of a process, including the different states a process can be in like ready, running, waiting, blocked. It describes process creation and termination. The process control block (PCB) contains information needed to control and monitor each process. Context switching allows the CPU to switch between processes. Scheduling determines which process enters the running state. The document lists some common process control system calls and discusses advantages and disadvantages of process management.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Secure routing in DSR
1. Secure Routing in DSR
BY GROUP 4: Riya Chauhan(141060753016)
Birju Tank((141060753017)
Naman Vaishnav((141060753018)
Dhara Patel((141060753019)
Okasha Mahi((141060753020)
DATE:17/04/2015
GTU PG SCHOOL – IEEE PRESENTATION
17. References
• “An Efficient Secure Route Discovery Protocol for DSR”Kulasekaran A.
Sivakumar and Mahalingam Ramkumar Department of Computer
Science and Engineering Mississippi State University, MS., 2007 IEEE,
• “ASSOCIATION BETWEEN NODES TO COMBAT BLACKHOLE ATTACK IN
DSR BASED MANET” N.Bhalaji, Dr.A.Shanmugam,Anna University
Coimbatore,Tamilnadu, India