Key words:Cloud Computing, Web service, Networking
[2]” PortableLab: Implementation of Mobile remote laboratory for Android platform”, an IEEE paper by Macro Andre Guerra, Claudia Mariline Francisco, RuiNeves Madeira, Portugal.
[3]” Ear based Attendance Monitoring System”- an IEEE paper by Mr.Jitendra B. Jawale and Dr. Smt. Anjali S.Bhalchandra at the Army Institute of Technology, Pune and Government college of Engineering, Aurangabad respectively.
[4]” Remote Access of Building Management System on Windows Mobile Devices”- an IEEE paper by OndrejKrejcar, Department of measurement and control, VSB Technical Institute of Ostrava, Czech Republic.
Keywords –Mellon shell, Oreochromis niloticus, energy.
[2]. APHA (1980) Standard Methods for the Examination of water and waste water, 18th edn. American Public Health Association, Washington DC, 1288 pp.
[3]. Ardon, O., Z. Kerena and Y. Hadar, (1998). Enhancement of Lignin degradation and Laccase activity in Pleurotus ostreatus by cotton stalk extract. Can. J. Micro., 44: 670-680.
[4]. Amanat, A., Nasser A. A. ( 2001). Effect of feeding different carbohydrate to lipid ratios on the growth performance and body composition of Nile Tilapia (Oreochromis niloticus) fingerlings
[5]. Association of Official Analytical Chemists (AOAC) (2000). Official Methods of Analysis. (17th edn., AOAC), Gaithersburg, MD
[6]. Cockrel, I., Halliday D., Morgan, D.J. (1987). Studies on the nutrition of marine florfishe utilization of various dietary proteins by plaice. (Pleuronectes platessa). British Journal of Nutrition 31, 297-306.
[7]. Duncan, D.B and Binder, A.E (1995): Multiple range and multiple F-test Biometries 11:1-42
[8]. Eruvbetine, D., M.A. Dipeolu and E.B. Oguntona, 2002: Comparison of enzyme and antibiotic inclusion in diets for laying hens. Proc. 27th Ann. NSAP. Conference, 17-21 March, 2002. Akure. Nigeria, P: 101-104.
[9]. Fagbenro, O.A, M.A.K Smith and A.I. Amoo. 2000. Acha (Digitaria exilis Stapf) meal compared with maize and sorghum meals as a dietary carbohydrate source for Nile tilapia (Oreochromis niloticus L.) Israeli Journal of Aquaculture, 52:3-10
[10]. Falaye, A.E. (1992) Utilization of Agro-industrial wastes as fish feedstuffs in Nigeria. Proceeding of the 10th Annual Conference of FISON pp 47 – 57.
Keywords –Porous medium, convective flow, inclined channel
[1] Malashetty, M.S., Umavathi, J.C. and Prathap Kumar, J., Two fluid flow and heat transfer in an inclined channel containingporous and fluid layer, Heat and Mass Transfer, 40, 871-876. 2004.
[2] Umavathi, J.C., Malashetty, M.S. and Abdul Mateen, ”Fully Developed Flow and Heat Transfer in a Horizontal Channel Containing Electrically Conducting Fluid Sandwiched between Two Fluid Layers”, Int. J. Appl. MechanicalEngineering, 9, 781-794, 2004.
[3] Umavathi, J.C., Chamkha, A.J., Abdul Mateen and Al-Mudhaf, A., ”Unsteady Two Fluid Flow and Heat Transfer in a Horizontal Channel”, Heat Mass Transfer, 42, 81-90, 2005.
[4] Umavathi, J.C., Chamkha, A.J., Manjula, M.H. and Al-Mudhaf, A., ”Flow and Heat Transfer of a Couple-Stress Fluid Sandwiched between Viscous Fluid Layers”, Canadian J. of Physics, 83, 705-720, 2005.
[5] Umavathi, J.C., Prathap Kumar, J. and Chamkha, A.J., ”Flow and Heat Transfer of a Micropolar Fluid Sandwiched between Viscous Fluid Layers”, Canadian J. of Physics, 86, 961-973, 2008.
[6] Prasad, V., ”Convection Flow Interaction and Heat Transfer between Fluid and Porous Layers”, Proc. NATO Advanced Study Institute on Convective Heat and Mass Transfer in Porous Media, Turkey, 1990.
[7] Srinivasan, V. and Vafai, K., ”Analysis of Linear Encroachment in Two-Immiscible Fluid Systems”, ASME J. of Fluid Engineering, 116, 135-139, 1994.
[8] Chamkha, A.J.,”Flow of Two-Immiscible Fluids in Porous and Non-Porous Channels”, ASME J. of Fluid Engineering,122, 117-124, 2000.
[9] Masuoka, T.,. Convective currents in a horizontal layer divided by a permeable wall, Bull. Japan, Soc. Mech. Eng., Vol. 17, pp. 225-237. 1974
[10] Chikh, S., Boumedian, A., Bouhadef, K. and Lauriat, G., Analytical solution of non-Darcian forced convection in an annular duct partially filled with porous medium, Int. J. Heat Mass Transfer, Vol. 38, pp. 1543-1551. 1995.
[11] Kim, S.J. and Choi, C.Y.,. Convection heat transfer in porous and overlying layers heated from below, Int. J. Heat MassTransfer, Vol. 39, pp. 319-329. 1996
[12] Kuznetsov, A.V.,. Fluid mechanics and heat transfer in
Keywords –Mistake-proofing, Total quality management, Total productive management.
[1] M. Dudek-Burlikowska*, D. Szewieczek , “The Poka-Yoke method as an improving quality tool of operations in the process”; Journal of Achievements in Materials and Manufacturing Engineering VOLUME 36 ISSUE 1 September 2009
[2] Stewart Anderson,“Poka-Yoke: Mistake-Proofing as a Preventive Action”; THE INFORMED Outlook Reprint: March 2002Volume 7, Number 3
[3] PAUL DVORAK Senior Editor; “Poka-yoke designs make assemblies mistake proof”; http://www.penton.com/md MARCH 10, 1998 MACHINE DESIGN
[4] John R. Grout, and Brian T. Downs; “A Brief Tutorial on Mistake-proofing, Poka-Yoke, and ZQC”; Lean Business Solutions United States
[5] “Lean Six Sigma Operational - Delegate Workbook”; Mistake Proofing techniques; The British Standards Institution; SSG06101ENUK - MP/Issue 1.1/ September 2008
[6] Anil S. Badiger, R. Gandhinathan, V. N. Gaitonde, Rajesh S. Jangaler “Implementation of Kaizen and Poka-yoke to Enhance Overall Equipment Performance - A case study”
Keywords –fuzzy super closure fuzzy super interior, fuzzy super open set , fuzzy super closed set , fuzzy w-super closed set , fuzzy g-super closed set, fuzzy g- super open set, fuzzy sg- super closed set, fuzzy sg- super open set, fuzzy gs- super closed set.
[1] Azad K.K on fuzzy semi continuity, fuzzy Almost continuity and fuzzy weakly continuity , J. Math. Anal. Appl. 82(1981),14-32.
[2] Balchandran K, Sundram P and Maki H., on Generalized Super continuous Map in Topological Spaces , Mem. Fac. sci. Kochi Univ.(Math)12(1991),5-13.
[3] Chang C.L. fuzzy Topological Spaces J. Math Anal. Appl.24(1968),182-190.
[4] El-Shafei M. E. and Zakari A. semi-generalized super continuous mappings in fuzzy topological spaces J. Egypt. Math. Soc.15(1)(2007) , 57{67.
[5] Mishra M.K. ,et all on “ Fuzzy super closed set” Accepted.
[6] Mishra M..K. ,et all on “ Fuzzy super continuity” (Accepted)
[7] Mishra M.K., Shukla M. “Fuzzy Regular Generalized Super Closed Set” (Accepted).
[8] Pu P. M. and Liu Y. M. Fuzzy Topology I: Neighborhood structure of a fuzzy point and More Smith Convergence, J. Math. Anal Appl.76(1980)571-599.
[9] Pushpaltha A. studies on Generalization of Mappings in Topological Spaces Ph.D. Thesis Bharathiyar University Coimbotore (2000).
[10] Sundram P. and M. Shekh John, On w-super closed sets in topology, Acta Cinica Indica 4(2000) 389-392.
[11] Tapi U. D ,Thakur S S and Rathore G.P.S. Fuzzy sg –super continuous mappings Applied sciences periodical (2001) ,133-137.
[12] Tapi U. D., Thakur S. S. and Rathore G.P.S. Fuzzy semi generalized super closed sets, Acta Cien. Indica 27 (M) (3) (2001), 313-316.
Keywords Steganography, Integer wavelet transform, Optimum pixel adjustment algorithm.
[1] N. Wu and M. Hwang. "Data Hiding: Current Status and Key Issues," International Journal of Network Security, Vol.4, No.1, pp. 1-9, Jan.2007..
[2] C. Chan and L. M. Cheng, "Hiding data in images by simple LSB substitution," Pattern Recognition, pp. 469-474, Mar. 2004.
[3] Changa, C. Changa, P. S. Huangb, and T. Tua, "A Novel bnage Steganographic Method Using Tri-way Pixel-Value Differencing,” Journal of Multimedia, Vol. 3, No.2, June 2008.
[4] H. H. Zayed, "A High-Hiding Capacity Technique for Hiding Data in images Based on K-Bit LSB Substitution," The 30th International Conference on Artificial Intelligence Applications (ICAIA - 2005) Cairo, Feb. 2005.
[5] A. Westfeld, "F5a steganographic algorithm: High capacity despite better steganalysis," 4th International Workshop on Information Hiding, pp.289-302, April 25-27, 2001.
[6] H. W. Tseng and C. C. Chnag, "High capacity data hiding in jpegcompressed images," Informatica, vol. 15, no. I, pp. 127-142,2004.
[7] P. Chen, and H. Lin, "A DWT Approach for bnage Steganography,"International Journal of Applied Science and Engineering 2006. 4, 3:275:290.
[8] Lai and L. Chang, "Adaptive Data Hiding for bnages Based on Harr Discrete Wavelet transform," Lecture Notes in Computer Science,Volume 4319/2006.
[9] S. Lee, C.D. Yoo and T. Kalker, "Reversible image watermarking based on integer-to-integer wavelet transform," IEEE Transactions on Information Forensics and Security, Vol. 2, No.3, Sep. 2007, pp. 321-330.
[10] M. Ramani, Dr. E. V. Prasad and Dr. S. Varadarajan,"Steganography Using BPCS the Integer Wavelet Transformed bnage", UCSNS International Journal of Computer Science and Network Security, VOL. 7 No.7, July 2007.
Keywords equations, differential, interval, criteria, damping, second order etc.
[1] X. Wang , G. Song, Oscillation criteria for second order nonlinear damped differential equations, Int. Jour. of inform. and sys.
sc., vol.1 Nr. 1 2011,pg. 73- 82.
[2] Yuri V. Rogovchenko;Interval oscillation of a second order nonlinear differential equation with a damping term, Discrete and
continuous dynamical systems supplement , pp. 883 – 891, 2007
[3] M.M.A. El Sheikh, R.A.Sallam, D.I. Elimy; oscillation criteria for nonlinear second order damped differential equations,
International journal of nonlinear science , vol.10, nr. 3, 297 – 307, 2010.
[4] E. Tunc, H.Avci, Oscillation criteria for a class of second order nonlinear differential equations with damped, Bull. of Math.
analysis and applic., vol.4 iss. 2 (2012)
pg. 40 – 50.
[5] Xh. Beqiri, E. Koci, oscillation criteria for second order nonlinear differential equations , British Journal of Science, pg. 73 –
80,2012, Vol. 6 (2)
[6] R. Kim, Oscillation and nonoscillation criteria for differential equations of second order, Korean J. Math. 20011, N0.4, pp. 391 –
402
[7] A. Lomotatidze, J. Sremr, On ascillation of second order linear ordinary differential equations, Mem. on differ. equat. and math.
physics, vol. 54, 2011, pg. 69 – 81.
[8] M.J.Saad, N. Kumaresan, K. Ratnavelu, Oscillation theorems for second order nonlinear differential equations with damping,
Inst. of math. sciences, Univer. of Malaya, 2011, pg. 1 - 12
[9] A. Tiryaki, A. Zafer, Oscillation criteria for second order nonlinear differential equations with deviating, Turk J. Math. 24,
2000, pg. 185 – 196.
Keywords Local Instance Repository, Ontology, Personalization, Semantic Relations, User Profiles, Web Information Gathering
[1] S. Gauch, J. Chaffee, and A. Pretschner, “Ontology-Based Personalized Search and Browsing” Web Intelligence and Agent
Systems, vol. 1, nos. 3/4, pp. 219- 234, 2003.
[2] Y. Li and N. Zhong, “Web Mining Model and Its Applications for information Gathering” Knowledge-Based Systems, vol. 17,
pp. 207-217, 2004.
[3] Y. Li and N. Zhong, “Mining Ontology for Automatically Acquiring Web User Information Needs,” IEEE Trans. Knowledge
and Data Eng., vol. 18, no. 4, pp.554-568, Apr. 2006.
[4] X. Tao, Y. Li, N. Zhong, and R. Nayak, “Ontology Mining for Personalized Web Information Gathering,” Proc.
IEEE/WIC/ACM Int‟l Conf. Web Intelligence, pp. 351-358, 2007
[5] A. Sieg, B. Mobasher, and R. Burke, “Web Search Personalization with Ontological User Profiles,” Proc. 16th ACM Conf.
Information and knowledge Management(CIKM‟07),pp.525-534,2007
[6] J.D. King, Y. Li, X. Tao, and R. Nayak, “Mining World Knowledge for Analysis of Search Engine Content,” Web Intelligence
and Agent Systems, vol. 5, no. 3, pp. 233-253, 2007
[7] D. Downey, S. Dumais, D. Liebling, and E. Horvitz, “Understanding the Relationship between Searchers‟ Queries and
Information Goals,” Proc. 17th ACM Conf. Information and Knowledge Management (CIKM ‟08), pp. 449-458, 2008
Study Of Personalized Ontology Model…
47
[8] R. Navigli, P. Velardi, and A. Gangemi, “Ontology Learning and Intelligent Systems, vol. 18, no. 1, pp. 22-31, Jan./Feb. 2003.Its Application to Automated Terminology Translation,” IEEE Intelligent Systems, vol. 18, no. 1, pp. 22-31, Jan./Feb. 2003.
[9] X. Jiang and A.-H. Tan, “Mining Ontological Knowledge from Domain-Specific Text Documents,” Proc. Fifth IEEE Int‟l Conf. DataMining (ICDM ‟05), pp. 665-668, 2005.
[10] R.Y.K. Lau, D. Song, Y. Li, C.H. Cheung, and J.X. Hao, “Towards a Fuzzy Domain Ontology Extraction Method for Adaptive e- Learning,” IEEE Trans. Knowledge and Data Eng.,vol.21,no.6,pp.800-813, june 2009