default logo

IJASE - Volume 2 - Issue 2

[<<< GO BACK ][ VOLUME 2 - ISSUE 2 ]

Title: Phytochemical Analysis and Antimicrobial Activity of Chlorophytum borivilianum against Bacterial Pathogen causing disease in Humans
Abstract :

The present communication deals with in vitro analysis of Antibacterial activity of extract of leaves and stem of Chlorophytum borivilianum Santapau and Fernandez (Liliaceae). The result of the preliminary investigation revealed the presence of alkaloids, glycosides nucleus, Saponins and tannins in leaves as well as in stem. The antimicrobial activity of leaves and stem extract of Chlorophytum borivilianum was studied against four bacteria among them two are Gram –ve bacteria (Escherichia coli and Klebsiella pneumonia) and two are Gram +ve positive bacteria (Staphylococcus aureus and Bacillus subtilis.) by agar disc cup diffusion method. Zone of inhibition produced by different extracts was tabulated. Only the aerial parts of plant inhibited the growth of bacteria at the concentration of 1000mg/ml and 500 mg/ml respectively. Extract Showed maximum antibacterial activity against all organisms tested in order of sensitivity as Staphylococcus > Bacillus subtilis > Klebsiella > Escherichia coli .

Title: NARMA-L2 controller for five-area load frequency control
Abstract :

This paper investigates the load-frequency control (LFC) based on neural network for improving power system dynamic performance. In this paper an Artificial Neural Network (ANN) basedcontroller is presented for the Load Frequency Control (LFC) of a five area interconnected power system. The controller is adaptive and is based on a nonlinear auto regressive moving average (NARMA-L2) algorithm. The working of the conventional controller and ANN based NARMA L2 controllers is simulated using MATLAB/SIMULINK package.. The Simulink link results of both the controllers are compared.

Title: A competitive intelligence measures in business forecast with renewable intensity sources
Abstract :

Extracting the data automates the process of finding predictive information in a large database. The ability to gather and analyze effectively business and corporate intelligence is a major advantage for all practitioners in high-tech industries. Competitor analysis in marketing and strategic management is an assessment of the strengths and weaknesses of current and potential competitors. This analysis provides both an offensive and defensive strategic context to identify opportunities and threats. Marketing is the process of communicating the value of a product or service to customers, for the purpose of selling that product or service. Competitive Intelligence (CI) may not be inappropriate and compares and contrasts competitive intelligence with business intelligence, competitor intelligence, knowledge management, market intelligence, marketing research, and strategic intelligence. Competitor analysis is an essential component of corporate strategy. Predictive analysis is using business intelligence data for forecasting and modeling. It is a way to use predictive analysis data to predict future patterns. In this paper we propose the competitive measures between the two renewable energy sources (RES) namely solar and wind energy. The factors used for determining the competitions between the two sources are price, quality, selection, service, location, reliability, stability etc.

Title: A dynamic replica recognization using lsi algorithm
Abstract :

Many data mining techniques have been proposed for mining useful patterns in text documents. However, how to effectively use and update discovered patterns is still an open research issue, especially in the domain of text mining. Since most existing text mining methods adopted term-based approaches, they all suffer from the problems of polysemy and synonymy. Over the years, people have often held the hypothesis that pattern (or phrase)-based approaches should perform better than the term-based ones, but many experiments do not support this hypothesis. This project presents an innovative and effective pattern discovery technique which includes the processes of pattern deploying and pattern evolving, to improve the effectiveness of using and updating discovered patterns for finding relevant and interesting information. For efficient pattern mining, Latent Semantic Indexing (LSI) is used, a new approach to automatic indexing and retrieval. It is designed to overcome a fundamental problem that plagues existing retrieval techniques that try to match words of queries with words of documents. The particular “latent semantic indexing” (LSI) analysis that we have tried uses singular-value decomposition. We take a large matrix of term-document association data and construct a “semantic” space wherein terms and documents that are closely associated are placed near one another. Singular-value decomposition allows the arrangement of the space to reflect the major associative patterns in the data, and ignore the smaller, less important influences. As a result, terms that did not actually appear in a document may still end up close to the document, if that is consistent with the major patterns of association in the data. Position in the space then serves as the new kind of semantic indexing, and retrieval proceeds by using the terms in a query to identify a point in the space, and documents in its neighborhood are returned to the user.

Title: Advances in intrusion detection systems with applications to data mining
Abstract :

With the introduction of smart phones with advanced computing and storage capabilities users experience novel kind of security threats. Conventional preventive mechanisms like encryption, authentication alone don’t seem to be enough to produce adequate security for a system. So, we tend to need sensible Intrusion detection systems which will improve security and substantially reduce the cellular phones computing resources. In this work we tend to plan an intrusion detection procedure that with efficiency detects intrusions in mobile phones with an application to Data Mining. To remove overhead of processing from the mobile phones we used network based approach. We build a neural network classifier that may be trained for every user using its call logs. Application will run on phone of the user and collects concerned data of the user and sends them over to the remote server. Results indicate the effectiveness of our methodology to observe intrusions and outperformed existing Intrusion detection strategies with about ninety five percent detection rate.

Title: Various problems of dryland agriculture and suggested agro-techniques suitable for dryland vegetable production
Abstract :

Due to low opportunities and higher population of landless and agricultural laborers as well as low land and labor productivity,poverty is concentrated in drier regions. The traditional subsistence farming systems have changed and at present time farmers have minute options and are are preferring to grow high value crops particularly vegetables which require intensive use of inputs, most importantly life saving irrigations, and therefore they face real problems in day to day life and is a serious concern which should be given huge importance as far as living conditions in such regions.

Title: Usability Engineering and HCI Based Information Systems in inside and outside of Home: A Contemporary Conceptual Study
Abstract :

Human Computer Interaction is one of the important domain and aspect of Information Science. HCI is treated as most vital and valuable gradients in Usability Engineering. HCI and Usability Engineering both are uses for interface designing of portal and other electronic gadgets. Human Computer Interaction is rapidly uses in general computers, laptop, mobile, I-Pad, ATM, Information Kiosk and other portal which are uses by large number of users from several field and segments. Usability Engineering and HCI are close and related field but out of them, Usability Engineering is broad field and HCI is treated as just activity and principles for interface designing and development. This paper is talks about HCI and Usability Engineering which includes their application and contemporary features. Papers also talks about future potentials of using such technologies for common people and community, industries.

Title: Engineering Education in West Bengal - Its Challenges and Prospects
Abstract :

Engineering education system in West Bengal is a time-tested paradigm catering for decades to the industries and academia. Yet there are many loopholes in the system due to induction of private enterprises for running colleges as has been pointed out by Professor C N R Rao and many other committees. This paper tries to unfold the un-cared lacunae of present engineering education and suggest remedial measures.