oalib

OALib Journal期刊

ISSN: 2333-9721

费用:99美元

投稿

匹配条件: “ Sahil Billawria” ,找到相关结果约70条。
列表显示的所有文章,均可免费获取
第1页/共70条
每页显示
On Almost Pretopological Vector Spaces  [PDF]
Shallu Sharma, Madhu Ram, Sahil Billawria
Open Access Library Journal (OALib Journal) , 2018, DOI: 10.4236/oalib.1104937
Abstract:
In this paper, we introduce the notion of almost pretopological vector spaces and present some examples of almost pretopological vector spaces. Almost pretopological vector spaces are defined by using regular open sets and pre-open sets. The relationships of almost pretopological vector spaces with certain other types of spaces are provided. Along with some useful results, it is proved that in almost pretopological vector spaces, translation and scalar multiple of a regular open (resp. regular closed) set are pre-open (resp. pre-closed).
RENEWED APPROACH FOR IMAGE RECTIFICATION
Sahil Bansal
Journal of Global Research in Computer Science , 2011,
Abstract: This paper proposed a new method for image rectification ,it is the process by which the pairs of stereo images of same solid scene taken from different viewpoints in order to produce a pair of “matched epipolar projections” and become parallel to the x-axis of image. A stereo rectified images are helpful for matching algorithms.It restricts that each line parallel to x-axis.The stereo rectification is not unique and actually lead to undesirable distortions. To overcome the drawback of the relative distortion between left image and right image an epipolar line rectification technique is used for point detection and reduce the distortion by minimized the camera rotation angle at each step.By comparative experiments show that the algorithm has an accuracy where other methods fail, namely when the epipolar lines are far from horizontal. Keywords--- Rectification, stereovision, epipolar, distortion, camera rotation.
Improving Quality using Testing Strategies
sahil batra
Journal of Global Research in Computer Science , 2011,
Abstract: Software testing is a technique aimed at evaluating an attribute or capability/usability of a program or product/system and determining that it meets its quality. Although crucial to software quality and widely deployed by programmer & testers, software testing still remains an art, due to limited understanding of the principles of software. Software testing is an important technique for assessing the quality of a software product. In this paper, various types of software testing technique and various attributes of software quality are explained. Identifying the types of testing that can be applied for checking a particular quality attribute is the aim of this thesis report. All types of testing can not be applied in all phases of software development life cycle. Which testing types are applicable in which phases of life cycle of software development is also summarized
Improving Quality using Testing Strategies
Sahil Batra
Journal of Global Research in Computer Science , 2011,
Abstract: Software testing is a technique aimed at evaluating an attribute or capability/usability of a program or product/system and determining that it meets its quality. Although crucial to software quality and widely deployed by programmer & testers, software testing still remains an art, due to limited understanding of the principles of software. Software testing is an important technique for assessing the quality of a software product. In this paper, various types of software testing technique and various attributes of software quality are explained. Identifying the types of testing that can be applied for checking a particular quality attribute is the aim of this thesis report. All types of testing can not be applied in all phases of software development life cycle. Which testing types are applicable in which phases of life cycle of software development is also summarized
Model to improve Correctness and Quality and Reducing Testing Time (MCQRTT)
sahil batra
Journal of Global Research in Computer Science , 2011,
Abstract: Software testing is complex and time consuming. One way to reduce the effort associated with testing is to generate test data automatically. Testing is very important part of software development. Quality is not an absolute term; it is value to some person. With that in mind, testing can never completely establish the correctness of arbitrary computer software; testing furnishes a criticism or comparison that compares the state and behavior of the product against a specification. Software testing process can produce several artifacts. So, we proposed a model to improve Quality and correctness and also we reduce the software testing time.
Model to improve Correctness and Quality and Reducing Testing Time (MCQRTT)
Sahil Batra
Journal of Global Research in Computer Science , 2011,
Abstract: Software testing is complex and time consuming. One way to reduce the effort associated with testing is to generate test data automatically. Testing is very important part of software development. Quality is not an absolute term; it is value to some person. With that in mind, testing can never completely establish the correctness of arbitrary computer software; testing furnishes a criticism or comparison that compares the state and behavior of the product against a specification. Software testing process can produce several artifacts. So, we proposed a model to improve Quality and correctness and also we reduce the software testing time.
A Review on Protocatechuic Acid and Its Pharmacological Potential
Sahil Kakkar,Souravh Bais
ISRN Pharmacology , 2014, DOI: 10.1155/2014/952943
Abstract: Flavonoids and polyphenols are heterocyclic molecules that have been associated with beneficial effects on human health, such as reducing the risk of various diseases like cancer, diabetes, and cardiovascular and brain diseases. Protocatechuic acid (PCA) is a type of widely distributed naturally occurring phenolic acid. PCA has structural similarity with gallic acid, caffeic acid, vanillic acid, and syringic acid which are well-known antioxidant compounds. More than 500 plants contain PCA as active constituents imparting various pharmacological activity and these effects are due to their antioxidant activities, along with other possible mechanisms, such as anti-inflammatory properties and interaction with several enzymes. Over the past two decades, there have been an increasing number of publications on polyphenols and flavonoids, which demonstrate the importance of understanding the chemistry behind the antioxidant activities of both natural and synthesized compounds, considering the benefits from their dietary ingestion as well as pharmacological use. This work aims to review the pharmacological effects of PCA molecules in humans and the structural aspects that contribute to these effects. 1. Introduction Polyphenols are the most voluminous antioxidants in human diets. These polyphenols are to be categorized in different classes as phenolic acids, flavonoids, lignans, and stilbenes. Phenolic acids are naturally occurring compounds found in plant kingdom with unique structural similarities, presence of carboxylic group as in caffeic acid, gallic acid, p-coumaric acid, vanillic acid, ferulic acid, and protocatechuic acid (PCA) [1] (Figure 1). Protocatechuic acid (PCA) is widely distributed and present in most edible plants used in folk medicine [2]. It is also a very common compound present in human diet, present in bran and grain brown rice (Oryza sativa L.) [3] and onion (Allium cepa L.) [4], especially in the scales. Protocatechuic acid is detected in many fruits, such as plums (Prunus domestica L.) [5]; gooseberries (Ribes uva-crispa L.) [6]; grapes (Vitis vinifera) [6]; and nuts, such as almonds ordinary (Prunus amygdalus) [7]. It is present in products of plant origin, such as olive oil or white wine [8, 9]. Protocatechuic acid is also found in many plants and spices, such as star anise (Illicium verum), melissa (Melissa officinalis L.), a medical rosemary (Rosmarinus officinalis L.), and cynamonowa (Cinnamomum aromaticum) [4]. This compound is one of the biologically active components of some medicinal plants, including those used in natural
Network Methods for Pathway Analysis of Genomic Data
Rosemary Braun,Sahil Shah
Quantitative Biology , 2014,
Abstract: Rapid advances in high-throughput technologies have led to considerable interest in analyzing genome-scale data in the context of biological pathways, with the goal of identifying functional systems that are involved in a given phenotype. In the most common approaches, biological pathways are modeled as simple sets of genes, neglecting the network of interactions comprising the pathway and treating all genes as equally important to the pathway's function. Recently, a number of new methods have been proposed to integrate pathway topology in the analyses, harnessing existing knowledge and enabling more nuanced models of complex biological systems. However, there is little guidance available to researches choosing between these methods. In this review, we discuss eight topology-based methods, comparing their methodological approaches and appropriate use cases. In addition, we present the results of the application of these methods to a curated set of ten gene expression profiling studies using a common set of pathway annotations. We report the computational efficiency of the methods and the consistency of the results across methods and studies to help guide users in choosing a method. We also discuss the challenges and future outlook for improved network analysis methodologies.
A Direct Trust dependent Link State Routing Protocol Using Route Trusts for WSNs (DTLSRP)  [PDF]
Shaik Sahil Babu, Arnab Raha, Mrinal Kanti Naskar
Wireless Sensor Network (WSN) , 2011, DOI: 10.4236/wsn.2011.34015
Abstract: The traditional cryptographic security techniques are not sufficient for secure routing of message from source to destination in Wireless Sensor Networks (WSNs), because it requires sophisticated software, hardware, large memory, high processing speed and communication bandwidth. It is not economic and feasible because, depending on the application, WSN nodes are high-volume in number (hence, limited resources at each node), deployment area may be hazardous, unattended and/or hostile and sometimes dangerous. As WSNs are characterized by severely constrained resources and requirement to operate in an ad-hoc manner, security functionality implementation to protect nodes from adversary forces and secure routing of message from source node to base station has become a challenging task. In this paper, we present a direct trust dependent link state routing using route trusts which protects WSNs against routing attacks by eliminating the un-trusted nodes before making routes and finding best trustworthy route among them. We compare our work with the most prevalent routing protocols and show its benefits over them.
Trust Evaluation Based on Node’s Characteristics and Neighbouring Nodes’ Recommendations for WSN  [PDF]
Shaik Sahil Babu, Arnab Raha, Mrinal Kanti Naskar
Wireless Sensor Network (WSN) , 2014, DOI: 10.4236/wsn.2014.68016
Abstract:
In Wireless Sensor Networks (WSNs), the traditional cryptographic mechanisms for security require higher consumption of resources such as large memory, high processing speed and communication bandwidth. Also, they cannot detect faulty, malicious and selfish nodes which lead to the breakdown of network during packet routing. Hence, cryptographic security mechanisms are not sufficient to select appropriate nodes among many neighbouring nodes for secure packet routing from source to sink. Alternatively, trust management schemes are tools to evaluate the trust of a node and thereby choosing a node for routing, and also detecting their unexpected node behaviour (either faulty or malicious). In this paper, we propose TENCR: a new Trust Evaluation method based on the Node’s QoS Characteristics (trust metrics) and neighbouring nodes' Recommendations. The proposed new technique detects the malicious and selfish nodes very efficiently than the arithmetic mean based methods, and allows trustworthy nodes in routing, thereby eliminating malicious/selfish nodes. Our proposed trust evaluation method is adaptive and energy efficient that separates the trustworthy nodes and qualify them to take the participation in routing, and disqualify the other nodes as malicious/selfish. Hence, trustworthy nodes only be allowed in routing, and malicious/selfish nodes will be eliminated automatically.
第1页/共70条
每页显示


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.