IJSRP Logo International Journal of Scientific and Research Publications

Home
About Us
Editorial Board

Online Publication

Log In
New User?
       Register Now!
Forgot Password?
       Email Password!


Call For Papers

Call for Research Paper

Authors

Online Submission
Paper Submission Guidelines
Online Publication Charge
Print Publication Charge
How to publish research paper
Publication Certificate
Research Catalogue
Resources
FAQs

Reviewer

Join Reviewer Panel
Reviewer Guidelines

Downloads

IJSRP Paper Format
Instructions

Contact Us

Feedback Form
Contact Us
Site Map

IJSRP, Volume 2, Issue 1, January 2012 Edition [ISSN 2250-3153]


* All listed papers are published after full consent of respective author or co-author(s).
** For any discussion on research subject or research matter, the reader should directly contact to undersigned authors.

      Mehrdad Salehi, Mojtaba Saeidinia, Mohammadreza Aghaei

Abstract: Business ethics being part of the larger social ethics, always been affected by the ethics of the era. At dissimilar times of the world, people, particularly leaders of the world, were blind to ethics and morality which were clearly unethical to the succeeding period. History of business is tainted by and throughout the history of Slavery history of colonialism and later by the history of cold war. The current discussion of business ethics is the ethical discussion of the post-colonialism and post-world wars. The need for business ethics in the current era had begun gaining notice since 1970s. In the past, firms started highlighting their ethical stature since the late 1980s and early 1990s, as the world witness grave economic and natural disasters because of unethical business practices.



      Prof. Chandrakant D. Patel, Prof. Sanket Trivedi, Prof. Sanjay Patel

Abstract: In olden days people were identified by physical characteristics such as birthmarks and scans, which was biometrics then. Today we have devices that do similar jobs and more accurately. Modern era is full of advantages and culprits who tamper with these advantages .In this we try to present a way to deal with these people at large. Biometric systems fall into two categories: 1) Authentication 2) Identification. To be authenticated by a system, a subject presents a password or a token such as an ID card along with a live biometric sample such as fingerprint or iris. Airports, prisons, and companies that need secure access use these biometric systems.



      Mukund Dhore, Manik Dhore, Dinesh Dabhadkar

Abstract: Study of environmental impact of macrophytes on fresh water bodies in Washim district were undertaken during the year 2009 to March 2011. Ten species were observed belonging to different classes, out of which Hydrilla verticillata (L.F.) Royle, Chara spp, Potamogteon pectinatus L, Najas minor L. and Ceratophyllum demersum L. were found to be dominating. During most of the year, surface of the water, especially in the shallow areas were found to be covered with these macrophytes. However Hydrilla verticillata (L.F.) Royle, a rooted submerged weed was observed to be dominant on other weeds. Other less dominant macrophytes found in the fresh water bodies were Ottelia alismoides (L.) Pers., Typha angustata Bory and Choub., Vallisneria spiralis L. and Limnophylla sessiflora L.. These macrophytes were found to be responsible for reducing water storage capacity in the fresh water bodies and also cause tremendous loss of surface water of the dam through evapotranspiration. Macrophytes also reduce pond productivity by causing accumulation of silts. Due to excessive growth after death, the plants produce excess amount of nutrients which pollute the water and impart faul smell to the water. Therefore the rapid spread of aquatic weeds in the fresh water bodies in Washim district by vegetative and other means is creating serious socio-economic problems, causing enormous economic loss of water resources.



      Swati Kundra, Priyanka Soni, Rohaila Naaz

Abstract: Low power has emerged as a principal theme in today’s electronics industry. The need for low power has caused a major paradigm shift where power dissipation has become as important a consideration as performance and area. Many low voltage design techniques have been developed to meet the needs of present era of low power portable electronic equipment, which drove the analog designers to look for innovative design techniques like self cascode MOSFETs [1-5]. In this paper, we have investigated the merits and demerits of self cascode approach. For this aim in mind we designed a Folded Cascode using self cascode technique and analyzed its various properties through the Spice simulations for 0.13 micron CMOS technology from TSMC and the supply voltage 1.8V.



      Karunamoy Chatterjee, Subhashis Das

Abstract: The analysis of effects induced by interconnects become increasingly important as the scale of process technologies steadily shrinks. While most analyses focus on the timing aspects of interconnects, power consumption is also important. We study the trends of interconnect power consumption based on current and figure technology node parameters. We know that 20%–30% of power is consumed by interconnect resistance in optimally buffered global interconnect system. We also study the analysis method based on a reduced-order model and discrete domain Z transform. The theoretical results can be used for any kind of linear circuits including RLC circuits.



      Lilibeth Lago, Sirinthorn Seepho Ph.D.

Abstract: The purpose of this study was to investigate the effects of brain-compatible activities (BCA) on the vocabulary learning and retention of the 31 third-year undergraduate students taking English for Tourism after taking the course using the BCA. Data, gathered from pre-test, immediate post-test, 2 delayed post-tests, and semi-structured interview, were quantitatively and qualitatively analyzed. The results of the study indicated that the students significantly learned the target words while taking the tourism course using the BCA. Moreover, the vocabulary they learned was retained at least 6 weeks after the instruction.



      Mr.Ashish V.Saywan, Mrs. Sonali Damle, Prof.A.P.Deshpande

Abstract: Understanding of cotton quality is important in order to properly identify the moisture content .Measurement of moisture is difficult particularly at harvest and through the gin, because of the influence these processes have different fibre quality. Dry cotton can be harvested cleanly and efficiently but may suffer undue damage in the gin. On the other hand harvesting and ginning wet cotton leads to significant issues in processing and quality. A number of methods are used to measure moisture in seed cotton, lint and fuzzy seed, each has its varying advantages. As moisture variation of the bales that is not monitored from the outside of the bale. This research examines a new microwave imaging technique to view the internal moisture variations of cotton bale. Tests on the developed imaging sensor showed the ability to resolve small structures of parameters, against a low standard background, that were less than 1 cm in width. The accuracy of the sensing structure was also shown to provide the ability to accurately determine parameter standards. A preliminary test of the imaging capabilities on a wet commercial bale showed the technique was able to accurately image and determines the location of the wet layer within the bale.



      Dr. Kalpana Kharade, Ms. Rupal Thakkar

Abstract: The accelerated growth of information communication technology (ICT) and its wide application in our personal as well as professional life has made the teacher educators think seriously about creating ICT enhanced learning context for pre-service teachers to develop their understanding about role of ICT in providing constructivist learning experiences to their students. The reflections of the researchers on the need for developing new understanding about growing involvement of ICT in teaching and learning process and relation between technology and pedagogy while integrating ICT in instructional practices among the pre-service teachers motivated researchers to take a proactive action in this direction. This resulted in the development and implementation of a ICT mediated language education project for Std 7th school students in which twelve pre-service teachers were involved as co -researchers. This paper describes the project experiences of Pre-service teachers in terms of their perceptions about utility of ICT in creating constructivist learning environment in the classroom.



      Yogendra Kumar Jain and Upendra

Abstract: Large computational value has always been a restraint in processing huge network intrusion data. This problem can be extenuated through feature selection to abbreviate the size of the network data involved. In this paper, we first deal existing feature selection methods that are computationally executable for processing vast network intrusion datasets. In this paper, we study and analysis of four machine learning algorithms (J48, BayesNet, OneR, NB) of data mining for the task of detecting intrusions and compare their relative performances. Based on this study, it can be concluded that J48 decision tree is the most suitable associated algorithm than the other three algorithms with high true positive rate (TPR) and low false positive rate (FTR) and low computation time with high accuracy.



      Akhter Ali, Dr D.K Batra, Dr N Ravichandran, Zuhaib Mustafa and Shoiab Ur Rehman

Abstract: Children constitute a significant marketing zone. Today they not only make purchases for themselves but also influence family purchase decisions. The purchase behaviour is ruled by the way they have been socialized to act as consumers. This research looks at available literature with respect to children influence in family purchase decision. Media, family and peers are the key socializing agents that build in children the knowledge, skills and attitudes required to function in market place. This paper highlights the research done in last two decades on consumer socialization of children and identifies areas for future research with India as focus.



      Ms.Vaijayanti Lule, Prof (Ms).Vrushali G Nasre

Abstract: This paper describes a performance and comparison of different methodologies for the design of low power CMOS phase frequency detector for high speed applications like PLL. The phase frequency detector (PFD), which helps PLLs achieve simultaneous phase and frequency error detection, is an indispensable functional block and plays an important role in improving the performance of the whole PLL system. This paper also discusses two major problems in PFD, namely, the dead zone problem and the missing edge problem. The proposed design will be the CMOS phase frequency detector for high speed applications with low power dissipation. The PFD will be implemented using 0.18 µm technology. The designed phase frequency detector can be used in PLL with frequency up to 1 GHz.



      Nilesh V Fursule, Dr. Satish V Bansod, Swati N. Fursule

Abstract: Six Sigma is both a philosophy and a methodology that improves quality by analyzing data with statistics to find the root cause of quality problems and to implement controls. Statistically, Six Sigma refers to a process in which the range between the mean of a process quality measurement and the nearest specification limit is at least six times the standard deviation of the process. Despite the pervasiveness of Six Sigma program implementations, there is increasing concern about implementation failures. One reason many Six Sigma programs fail is because an implementation model on how to effectively guide the implementation of these programs is lacking. While Six Sigma is increasingly implemented in industry, little academic research has been done on Six Sigma and its influence on quality management theory and application. There is a criticism that Six Sigma simply puts traditional quality management practices in a new package. To investigate this issue and the role of Six Sigma in quality management, this study reviewed both the traditional quality management and Six Sigma literatures. Quality professionals are aware that the six-sigma methodology employs existing, well-known tools developed in quality sciences and are based on the works of Deming, Juran, Ishikawa, Taguchi, and others. Nevertheless six sigma, a Motorola innovation, has been a positive force. A good presentation – black belts and green belts honoring six-sigma experts – can make statistical process improvement, and the systematic six-sigma methodology taste good, and do good work.



      K. Bala Showry, Dr. A.V.S. Raju, Dr. P. Ravinder Reddy

Abstract: Computations have shown that with high pressure multiple injections two or more injection pulses per power cycle, the Soot - NOX trade off curves of a diesel engine can be shifted closer to origin than those with the conventional single pulse injections, reducing both the particulate matter and NOX emissions significantly. In order to understand the mechanism of emissions reduction, multidimensional computations were carried out using CFD for a SCOTE Single cylinder diesel engine with multiple injections. Computations were carried at 9° and 10° with included angle 140° without significant wall impingement using double injections, and the predicted cylinder pressure, heat release rate, particle fate theory, soot and emissions were compared with the measured data. Excellent agreements between predictions and measurements were achieved after improvements in the models were made...



      Dr Sulochana Wadhwani, Dr A.K. Wadhwani, Tripty Singh, Dr. Sarita Singh Bhadauoria

Abstract: Cluster analysis or clustering is the task of assigning a set of objects into groups (called clusters) so that the objects in the same cluster are more similar (in some sense or another) to each other than to those in other clusters. Cluster analysis can be used to differentiate between different types of calcification cluste