Articles


Glaucoma Screening Using Superpixel Classification

Chintha Nagendra, Fahimuddin Shaik, B Abdul Rahim

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 06 (2014), 1 August 2014

Glaucoma is a chronic eye disease that leads to vision loss. As it cannot be cured, detecting the disease in time is important. At present to detect Glaucoma intraocular pressure (IOP) method is used. It is a fluid pressure inside the eye. The intraocular pressure (IOP) measurement uses tonometry, which sometimes may increases the pressure due to which optic nerve is damaged. Optic nerve head assessment in retinal fundus images is both more promising and superior. This method uses 3D fundus images. 3D images are not easily available and of high cost. So to avoid these problems glaucoma screening using superpixel classification is used. This project proposes glaucoma screening using superpixel classification. It uses the 2D fundus images. In optic disc segmentation, histograms and centre surround statistics are used to classify each superpixel as disc or non-disc. For optic cup segmentation, in addition to the histograms and centre surround statistics and the location information is also included in the cup segmentation. The proposed segmentation methods have been evaluated with optic disc and optic cup boundaries manually marked by trained professionals. The segmented optic disc and optic cup are then used to compute the cup to disc ratio for glaucoma screening. The Cup to Disc Ratio (CDR) of the color retinal fundus camera image is the primary identifier to confirm Glaucoma for a given patient.

Keywords: Optic disc segmentation, K-Means clustering, Gabor filter, Optic cup segmentation, Glaucoma screening. 

Secure Transmission of Information by LSB Encoding Technique using Audio Steganography and Cryptography

Preeti Singh, Praveen Yadav

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 06 (2014), 1 August 2014

In this paper, we deal with Steganography where Steganography is the art and science of communicating in a way which hides the existence of the communication. [1]The goal of steganography is to hide messages inside other harmless message in a way that doesn’t allow enemy to even detect that there is second message present. In an audio Steganographic method [2], we can adjust the bits in such a way so that the stego audio signal resulting from embedding data in higher LSB layer is perceptually indistinguishable from the host audio signal. In addition with Steganography, Cryptography has been added to provide more security for the message.

Keywords: Auditory System (HAS), LSB encoding, Cover Audio, Stego Audio

Energy-Aware Service And Route Discovery Scheme for AODV using Piggybacking in MANETs (AODV-EASARD)

SMITHA S P, Benakappa S M, Dr.Yuvaraju B N

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 06 (2014), 1 August 2014

Mobile ad-hoc network (MANET) is an infrastructure-less multihop network where each node communicates with other nodes directly or indirectly through intermediate nodes. Thus, all nodes in a MANET basically function as hosts as well as routers participating in some routing protocol required for deciding and maintaining the routes. Since MANETs are infrastructure-less, self-organizing, rapidly deployable wireless network, they are highly suitable for applications involving special outdoor events, communications in regions with no wireless infrastructure, emergencies and natural disasters, and military operations.

Key Words: MANETs, Routing, Energy-Aware.

Network Simulation with TCL Script Generator for NS-2

Sheikh Gouse, Rhitul Kumbhar

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 06 (2014), 1 August 2014

Simulation domain use or create Tcl scripts to set up a wired or wireless communication network, and then run these scripts via the NS-2 for getting the simulation results. Tcl scripts are widely used in NS-2 simulation tool. We have developed a new Tcl script generator tool, named “TCL Script Generatorâ€, to permit users to create Tcl scripts file in a direct and easy manner and it has GUI. This tool has friendly interface to set wired or wireless communication network parameters. After the parameters are entered, the tool automatically generates Tcl scripts file, which can be run in NS-2 network environment for getting the simulation results for the network being studied. The focus of this paper is on the Tcl script generator, its development and we introduce the specific characteristics of “Network simulation with TCL Script Generator†and discuss its features compared with NSG-2 (NS-2 Scenarios Generator2).

Keywords: Tcl Script Generator, Ns-2 Simulator, Nsg2.1.

Study to Evaluate the Effectiveness of Bibliotherapy in Terms of Improving Self – Esteem among the Adolescents

Ramar G

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 06 (2014), 1 August 2014

Low self – esteems is a major problem for many adolescents and can be expressed in moderate and severe levels of anxiety. It involves negative self – evaluations and is associated with the feelings of being weak, helpless, hopeless, frightened, vulnerable, fragile, incomplete, worthless and inadequate. There are variety of treatment available for the low self – esteem in adolescent age groups. They are cognitive behaviour therapy, supportive psychotherapy, psychodynamic psychotherapy, bibliotherapy and problem solving therapy. This study was undertaken with an objective to evaluate the effectiveness of bibliotherapy on improving self – esteem among the adolescents. A pre experimental design and total enumerative sampling and simple random sampling was used to select the study samples.  The instrument used for data collection was Brief Self-Esteem Inventory. In the pre-test 46.67% of the samples had low self – esteem, 36.67% of the samples had few problem with self – esteem and 16.67% of the samples were somewhat depressed, where as in the post test 36.67% of  samples had excellent self – esteem, 63.33% had few problems with self – esteem. None of the sample had low self – esteem and somewhat depressed. The mean post test level of self – esteem score (74.20) was more than mean pre-test level of self-esteem score (63.03). The obtained t value 13.42 was statistically highly significant at 0.05 levels. There was a statistically significant association between post-test self-esteem score and demographic variables like father’s occupation (c2 = 15.06, P > 0.001), mother’s occupation (c2 = 15.89, P > 0.001), and family type (c2 = 7.67, P > 0.01). Most of the adolescents studying in the school had problems with self-esteem. Bibliotherpay was effective in improving level of self-esteem among the adolescents.

Key words: Self – esteem, Adolescent, Bibliotherapy, Effectiveness

Simulation and Speed Control of Induction Motor Using Fuzzy Logic PID Controller

Rajnee Bala Minz, Rajesh Thinga, C.S. Sharma

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 06 (2014), 1 August 2014

Three phase induction motor drives have various industrial applications. In this thesis work indirect vector control technique is used which is based upon the Fuzzy PID speed controller. This method of speed control using fuzzy logic in induction motor altogether forms a closed loop control system. Result evaluated and obtained for speed control in Simulink provides reasonable accurate output at the end.

This thesis provides a technique for implementing a rule-based fuzzy logic PID controller applied to a closed loop indirect vector control the speed control of an induction motor. In this the d-q axis theory is used for the modeling of induction motor. For the speed control of IM using indirect vector control technique, a reference speed has been used and the control architecture includes the rule base. The controller has been tuned by hit and trial error method. The errors in the system are evaluated according to the rules which have defined membership functions.

Keywords: Induction motor, Fuzzy logic controller, Indirect vector control, PID Controller, closed loop parameters.

High Step-up Modified SEPIC Converter for Renewable Applications

Ms. Athira S. Babu, Ms. Jeepa K.J

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 06 (2014), 1 August 2014

Abstract

A high step-up Dc- Dc converter based on  the Modified SEPIC converter is present in this paper. This topology is the combination of a classical boost converter and a conventional SEPIC converter. The Modified SEPIC converter used for low input voltage and high output voltage applications. The theorectical analysis shows that it is suitable for the applications such as a renewable power sources with low DC output voltage The operational analysis and the design is done for the 100W power output of the modified converter. The solution is proved by MATLAB/SIMULINK.

Nanotechnology in Construction and Civil Engineering

Yatindra Porwal

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 06 (2014), 1 August 2014

This paper introduces relevant nanotechnology developments to convey the new and inspire creativity in civil engineering. The recent researches on nano materials and nanotechnologies have highlighted the potential use of these materials in various fields such as medicine, construction, automobile industry, energy, telecommunications and informatics. It has been observed that the inclusion of nano particles would improve the toughness, shear, tensile and flexural strength of cement based materials. Further, it is observed that the better understanding and engineering of complex structure of cement-based material at nano level will definitely result in a new generation of construction materials with enhanced properties, viz., strength and durability.
In today’s life, though utilization of cement based materials plays a vital role in the infrastructure development, it is polluting the environment by emitting CO2. Based on this view, researchers have been pursuing to evolve new or alternate material towards a green and sustainable solution. This paper presents the possible role of nanotechnology for the construction applications.

Keywords— Civil Engineering, Construction, Nanomaterials, Sustainability.

Analysis of Structural Problem of Chinese Economy to Realize the Future Scope

Sampreet Singh Goraya

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 06 (2014), 1 August 2014

This report is a reflection on structural problem of Chinese economy and reforms needed for future growth. The main focus is on the value addition to the exports and the industrial restructuring. Reports shows how china can diversify its manufacturing base to become less susceptible to external shocks and at the same time caters its huge population. China is investment driven economy and share of consumption to GDP has to increase, for that industry diversification in non-durable consumer goods, etc is necessary. Report also discusses the value addition by Chinese worker to the each sector mainly agriculture, manufacturing and service and their trends. It is found that manufacturing is already stressed and further increase in the availability of labor force will suppress the income more hence service sector needs to be enhanced. 

Porous Asphat Design for Cold Climate Use

Shankare Gowda

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 06 (2014), 1 August 2014

Porous asphalt pavements offer an alternative technology for stormwater management. A porous asphalt pavement differs from traditional asphalt pavement designs in that the structure permits fluids to pass freely through it, reducing or controlling the amount of run-off from the surrounding area. By allowing precipitation and run-off to flow through the structure, this pavement type functions as an additional stormwater management technique. The overall benefits of porous asphalt pavements may include both environmental and safety benefits including improved stormwater management, improved skid resistance, reduction of spray to drivers and pedestrians, as well as a potential for noise reduction. With increasing environmental awareness and an evolving paradigm shift in stormwater management techniques, this research aims to provide guidance for Indian engineers, contractors, and government agencies on the design of porous asphalt pavement structures. One of the keys to the success of this pavement type is in the design of the asphalt mix. The air void percentage, which is ultimately related to the effectiveness of the pavement to adequately control the runoff, is a critical component of the mix. However, special consideration is required in order to obtain higher air void percentages while maintaining strength and durability within a cold climate.

The objectives of this study were to evaluate several laboratory porous asphalt mix designs for durability and strength in cold climate conditions. The porous asphalt mixes consisted of a porous asphalt Superpave mix design method whereby the asphalt binder type was varied. Performance testing of the porous asphalt including draindown susceptibility, moisture-induced damage susceptibility, dynamic modulus, and permeability testing were completed. Based on the preliminary laboratory results, an optimal porous asphalt mix was recommended for use in a Indian climate. Initial design guidelines for porous asphalt were provided based on preliminary findings and hydrological analysis.

Microcredit and Women Empowerment: Evidence from Microcredit Clients of the Upper ManyaKrobo Rural Bank in the Eastern Region of Ghana

Emmanuel Kodjo Tetteh, Dr. Kwabena Barimah Antwi, Nelson Obirih Opareh

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 06 (2014), 1 August 2014

Women, more than men, are faced with difficulties in accessing financial services. Women in developing countries in particular, face cultural barriers that prevent them from access to credit for productive ventures and are often restricted to the home. As a result, most women in developing countries are poor compared to men. Women’s empowerment brings about women, individually and collectively, becoming aware of how power relations operate in their lives and gaining self-confidence and strength to challenge gender inequalities. When women become empowered, they can become the surest conduit to poverty reduction. This paper assessed the extent to which the Upper Manya Krobo Rural Bank’s microcredit programmed has empowered women clients. The paper is based on a doctoral research output that used structured questionnaire, in-depth interview guide and focus group discussion guide to gather both quantitative and qualitative data from a sample of 420 exits, repeated and permanent microcredit clients. The data was processed and analyzed using SPSS version 16 to generate descriptive results. One of the main findings of the paper is that about 92 percent of the microcredit clients were women and that 93 percent of the clients used microcredit as their main source of business finance. It was also revealed that participating in the microcredit programmed has enables the clients improve on their financial, human, physical and social asset base. The paper noted that non-financial services such as family planning services, business management training, etc. were however withdrawn from the microcredit programmed when the bank achieved self-sufficiency in 2004. The paper recommends that the management of the Upper Manya Krobo Rural Bank re-instate the non-financial service component of the microcredit scheme since it is beneficial to the clients.

Key words: Microcredit, women’s empowerment, self-esteem, decision making, Upper Manya Krobo,

Understanding and Addressing Violence Against Women - Human Trafficking

Ramar G

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 06 (2014), 1 August 2014

Human trafficking has received increasing global attention over the past decade. Initially, trafficking of women and girls for forced sex work and, to a lesser extent, domestic servitude, were the sole focus of advocacy and assistance. Today, there is recognition that women, children and men are trafficked into many different forms of labour, and for sexual exploitation. Labour-related trafficking occurs in a wide range of sectors, such as agriculture, fishing, manufacturing, mining, forestry, construction, domestic servitude, cleaning and hospitality services. Trafficked people may also be forced to work as beggars or soldiers, and women and children can be made to serve as ‘wives’. This hidden population involves this commercial sex industry, agriculture, factories, hotel and restaurants, domestic workers, marriage brokers, and some adoption firms. Because 80% of trafficked individuals are women and girls, women’s health care provider may better serve their diverse patient population by increasing their awareness of this problem. The exploitation of people of any race, gender, sexual orientation, or ethnicity is unacceptable at any time, in any place.

Keywords: Trafficking, Exploitation, Health, Policy, Labour.

Energy: Sustainable Option for Economic Development

Dr H S Gill*, Poorva Gill**, Dr Pawan Kumar Sharma***

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 06 (2014), 1 August 2014

At the time of liberalisation and opening up of the economy, India was classified in the category of low income countries. After two decades of major policy reforms, Indian economy entered into the category of middle income countries and is further likely to enter into club of developed nations in the next two decades. Among major sectors of economy, energy is termed as key sector around which the economy revolves. As a matter of fact, energy sector is one of the major sources for draining out resources that lead to serious problem of balance of trade. If energy sector is managed the way it requires priority, the economy can have much focused and faster turnaround and entry into the club of developed nations could be achieved at least five years prior to the perceived time frame. Advantages of this phenomenon could be multi-fold and difficult to quantify but the fate of one-third of the lower strata of population can be changed wherein the perceived impact could be most thrilling and beneficial. That is what the country is in need at this stage. This paper attempts to examine various dimensions of energy sector, identifies lop sided areas, usable options available at current stage of technological advancement and requirements of over-coming anomalies and cement loose ends and finally take call to translate priorities into reality

PAL TRACKER: Track and Meet Friends and Family Nearby

Dr. B R Prasad Babu*, Prof K K Mathew**, Naveen S Hiremath***

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 06 (2014), 1 August 2014

In this paper, Do we really care about who is around us and the security of our family members? Many social media companies have envisioned the internet as a facilitator for real world interaction — a way to make it easier to see the people we care about. So far, though, it’s been tough to get a critical mass of users interested in features like mobile based service is developed such that registering user’s when he/she arrives with in a location near by registered user and deliver notification for the registered user. Then we use a novel method called location-based delivery (LBD), which combines the short message service (SMS) and global position system (GPS), is proposed, and further to assist with the exact information, at right place in real time with personalized setup and location is tracked to meet.

Keywords: Nearby Friends, Tracking

Screening of Biopesticides Against Insect Pests of Brinjal

T. J.Ursani1, S. Malik1, J.I.Chandio2, Z.A.Palh3, N.M. Soomro1, K.H.Lashari3 M.A.Baloch4, B.K.Solangi4, M.N. Solangi4 G.M. Mastoi5

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 06 (2014), 1 August 2014

A field study was carried out during 2013 at the experimental area of Entomology Section, Agriculture Research Institute, (ARI) Tandojam to examined the efficacy of different biopesticides against insect pests of brinjal . Seven treatments with three replictions were applied. The treatments were: T1=chemical control (confidor/Nissuran), T2=Neem (Azadirachta indica), T3=Akk (Calotropis procera Alton. F.), T4=Tooh (Citrullus colocynthus Schrad. L.), T5=Datura (Datura stramonium) T6=Tabacco (Nicotiana tabacum) and T7=Control (untreated). Three insect pests were found infesting brinjal including white fly ,mites and jassid. Pre treatment- and post-treatment observations were recorded. 

The results revealed that against white fly the first spray of chemical control(confidor) showed highest efficacy (98.51%), followed by Neem extract (95.96%), Tobacco extract (94.70%), Tooh extract (92.78%), Akk extract (89.17%) and lowest for Dhatura extract (87.68%); while in the second spray also, chemical control(confidor)  showed highest efficacy against white fly (82.50%); followed by Neem extract (81.38%), Tobacco extract (79.93%), Tooh extract (77.11%) akk extract(77.42%) and least by Dhatura extract (71.78%). Against mites, chemical control (Nissuran) showed highest efficacy (83.53%) as observed during 1st spray, followed neem extract,(77.74%) Tobacco extract,(71.81%),tooh extract (67.95%),akk extract(62.01%) and Dhatura extract (56.52%), while after second spray also, chemical control (Nissuran) showed highest efficacy (80.57%), followed by Neem extract (72.80%), Tobacco extract (67.48%), Tooh extract (65.84%), Akk extract (52.96%) and the lowest efficacy was resulted by Dhatura extract (48.26%). Against jassid population on brinjal the first spray results showed that chemical control(confidor) showed highest efficacy (97.95%), followed by Neem extract (96.08%), Tobacco extract (95.63%), Tooh extract (86.17%),akk extract(81.19%) and Dhatura (70.94%) and least efficacy resulted by After second spray, chemical control(confidor) showed highest efficacy (99.64%), followed by Neem extract (98.36%), Tobacco extract (93.75%), Tooh extract (88.73%), Akk extract (83.62%) and the lowest efficacy was resulted by Dhatura extract (69.03%) respectively. Chemical control (confidor/Nissuran),showed its superiority in efficacy to combat all the insect pests studied in brinjal, followed by Neem extract Tobacco extract. Tooh extract, Akk extract and Dhatura remained the least.

Keywords: Entomology, biopesticides, Tobacco, brinjal, Tooh extract, Akk extract and Dhatura remained the least. 

A Framework for Data Storage Cloud to Provide Security

Imran Ijaz, Aisha Shahzadi, Komal Riaz, Sehrish Sabir

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 06 (2014), 1 August 2014

This research focuses on making the cloud more secure for sharing data. The need of more storage space to hold all your digital property is solved by the cloud storage. But the question arises that all your personal data is safe over the internet? Passwords can be hacked; data can be decrypted by Cloud Server. So for building users’ trust in the cloud storage we present a model that provides multi-layer encryption.  The cloud has its own certificate store but in our model we present an idea that enables user’s data not to be viewed by Cloud servers but only users and the ones whom they allow access. The users’ can buy the certificates from a company, any third party that is not involved with the Cloud Storage service. Users encrypt the data through their certificates and then share the data on the cloud. The cloud is considered safe and it is the need of the time to have large storage space for your digital property but we present a way to eliminate the threat in cloud computing.

Keywords – Certificate, Encryption, Public Key Infrastructure (PKI), Certification Authority (CA), Domain Controller.  

To Enhance Homomorphic Encryption scheme for Key Management and Key Sharing in Cloud Computing

Preeti Ahuja

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 06 (2014), 1 August 2014

The cloud can offer services to the users at lower cost and services are available at anytime, anywhere, user data security is the main challenge in cloud computing. The data encryption is the best way for providing data security in cloud computing. Fully homomorphic encryption scheme is reliable and secure encryption technique. The main problem with fully disk encryption scheme is key management, key storage and data aggregation. To solve the problem of key management and key sharing various schemes are proposed in last few years. The third party auditor is the scheme for key management and key sharing. The third party auditor scheme will be failed if the third party’s security is compromised or third party will be malicious. Cloud computing is very latest technology which is widely used in these days. There are some security threats in this network. The proposed scheme is used to provide security to the cloud so that attacker will unable to hack the information using Diffie- Hellman key exchange protocol. . In Diffie -Hellman algorithm, there is no provision for the storage or exchange of the PIN key. So it protects network devices from attacks.

Keywords: Cloud computing, IaaS, PaaS, SaaS, Diffie Hellman key exchange algorithm.

Speech Parameters Characterization Using Data Mining Techniques

Kavita, Ranjeeta Kaushik

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 06 (2014), 1 August 2014

Speech has many parameters such as pitch, energy, Noise, Change in speaking rate, Change in articulation. Speech is also of two type i.e. voiced speech and unvoiced speech. Voiced speech has high frequency as compared to the unvoiced speech. Many algorithms can be used to extract features of the speech. Here we use LPC ( Linear predictive coding ) method to extract the features of speech. The aim of this report is to show the difference between the feature of the child speech and adult speech. We also synthesize the speech by removing the unvoiced speech from the original speech by removing the low frequency speech from high frequency speech.  This research is focused on implementing and studying Linear Predictive Coding (LPC) algorithm. 

Hoarding Disorder

Ramar G

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 06 (2014), 1 August 2014

ABSTRACT: This article reviews the literature on compulsive hoarding, including the definition and manifestations of the problem and a conceptual model for understanding hoarding behavior. This model addresses information processing deficits (e.g., attention, organization, and memory, decision-making), beliefs about and emotional attachments to possessions, and distress and avoidance. Research regarding the diagnostic categorization of hoarding, its course and phenomenology, and evidence to support the model is presented. The limited research on treatment provides evidence that current serotonergic medications for OCD are largely ineffective for treating hoarding, but cognitive and behavioral treatments, especially those focused on deficits identified in the model, have some utility. Recommendations for further research on the psychopathology and treatment of hoarding are provided.

Keywords: Collecting, Acquisition, Buying, Saving, Clutter.

Research of Improved Association Rule Algorithms (Apriori and FP-Growth)

Nitika, Anju Gandhi

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 06 (2014), 1 August 2014

Abstract: - Association rule mining explores interesting relationships among items in a given data set. An objective of association rule mining is to develop a systematic method using the given database and finds relationships between the different items. Goal of association rules finding associations among items from a set of transactions, which contain a set of items. In this paper we focused on explaining the fundamentals of association mining and analyze implementations of the well-known association rule algorithms. Study focuses on algorithms Apriori, FP-Growth, and Dynamic Itemset Counting. Moreover, the algorithm generates frequent item sets in order so that the result can be used expediently.

Key Terms – Association Rule Mining, FP-Growth Algorithm, Apriori algorithm, Frequent Itemsets.

High Capacity DWDM System Using PDCF & PSMF and Simulation of Design for Different Channel Spacing

Mohit Thakur, Harminder Kaur

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 06 (2014), 1 August 2014

The multichannel DWDM system is designed for different dispersion compensation techniques to achieve high capacity. The obligation for the network bandwidth is large in present scenario due to the expansion in multimedia traffic. DWDM improvement is a challenging technique in present time to meet this demand. By comparing different modulation formats it is observed that MDRZ (Modified Duo-binary Return to Zero) is best than CSRZ and DRZ. As a result, it is used for high data rate DWDM system. The PDCF (Pumped Dispersion Compensating Fiber) and PSMF (Pumped Single Mode Fiber) are used in dispersion compensating techniques for 64 × 20 Gbps DWDM system. The results of three compensation methods have been compared for 200GHz, 100GHz and 50 GHz channel spacing in term of bit error rate and Quality factor. It is observed that 100 GHz channel spacing is used to achieve maximum coverage distance and symmetrical compensation show best results as compared to Pre- and Post - compensation.

Keywords: DWDM, Pumped dispersion compensating fiber, Pumped single mode fiber, MDRZ, Channel spacing, BER, Q-value.

The Holocaust in the Making: A theoretical Treatise of the Nazi Pogrom and its Relation with Rationality, Modernity and Bureaucracy

Rajeev Kumaramkandath

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 06 (2014), 1 August 2014

ABSTRACT

The paper is basically a review of the relation between the Nazi pogrom during the Second World War and the foundational elements of modernity, namely rationality and bureaucracy through three scholars. The materialisation of the anxieties that Weber had reserved in his Iron cage formulation could be observed in the unfolding of events that led to the genocide. In Bauman what we see is a kind of objectification of one’s own actions which is made possible through the invention of modern technology and bureaucracy. Hilberg, on the other hand, stresses on exploring the historical precedents of modernity simultaneously contributing to the making of the holocaust in the mid 20th century. The paper argues that a consolidated approach becomes necessary while evolving measurements to prevent such mistakes from repeating.

Keywords: Nazi Holocaust, Modern rationality, Bureaucracy, Max Weber, Hilberg, Zigmunt Bauman

COMMUNITY CLOUD COMPUTING USING RESTFUL API

Dhivya. M, Divya. K, Ramesh Shahabadkar

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 06 (2014), 1 August 2014

ABSTRACT:

Cloud Computing is rising fast, with its data centres growing at an unprecedented rate. However, this has come with concerns over privacy, efficiency at the expense of resilience, and environmental sustainability, because of the dependence on Cloud vendors such as Google, Amazon and Microsoft. Our response is an alternative model for the Cloud conceptualisation, providing a paradigm for Clouds in the community, utilising networked personal computers for liberation from the centralised vendor model. Community Cloud Computing (C3) offers an alternative architecture, created by combing the Cloud with paradigms from Grid Computing, principles from Digital Ecosystems, and sustainability from Green Computing, while remaining true to the original vision of the Internet. Here, we have introduced a suitable mechanism for community currency and restful clouds using API in c3 to increase the availability in vendors cloud. It is more technically challenging than Cloud Computing, having to deal with distributed computing issues, including heterogeneous nodes, varying quality of service, and additional security constraints.

Index Terms: Cloud Computing, Community Cloud, Community Cloud Computing, Green Computing, Sustainability and Restful cloud using API