Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2019 ( 86 )

2018 ( 135 )

2017 ( 112 )

2016 ( 249 )

Custom range...

Search Results: 1 - 10 of 22081 matches for " Ankit Kumar Manoj "
All listed articles are free for downloading (OA Articles)
Page 1 /22081
Display every page Item
Politics as a Profession  [PDF]
Ankit Kumar Manoj, Dinesh Sridharan, Manoj Kulandaivel
Open Journal of Political Science (OJPS) , 2016, DOI: 10.4236/ojps.2016.62018
Abstract: The proposed research is about the people’s perception about “Politics as profession”. This paper examines multiple case studies of people’s opinion about making career in politics and further explains why most of the people are not interested in politics. By and large, people in India consider Politics as “dirt”. The word “Uneducated” is directly linked with politicians in India. We have our own Indian Political history as background information for us to understand people’s mentality towards politics and why most of us never want to join it. The purpose of this paper is to study the mentality of Indian parents about letting their children pursue politics as their profession. The main objective of this research is to make people understand that we can never clean the dirt by just staying away from it. Results of various surveys have been included to support the fact that people are afraid to take politics as a career. Post-Independence Era has seen kith and kin of late famous political figures that have entered politics in spite of being uneducated. Education doesn’t just mean acquiring degrees from some university, but to have a sense of honor towards leading people. This paper also stresses on the fact that most people agree on having an educated politician but most of the educated people are not interested in joining politics. As we know, many Indian politicians shroud in fake degree scandal, which shows the education status of politicians in India. Our proposal signifies that people need to change their mentality about politics and join it in true professional spirit so that we can be a developed nation and present an example to the rest of the world.
An O(log(n)) Fully Dynamic Algorithm for Maximum matching in a tree
Manoj Gupta,Ankit Sharma
Computer Science , 2009,
Abstract: In this paper, we have developed a fully-dynamic algorithm for maintaining cardinality of maximum-matching in a tree using the construction of top-trees. The time complexities are as follows: 1. Initialization Time: $O(n(log(n)))$ to build the Top-tree. 2. Update Time: $O(log(n))$ 3. Query Time: O(1) to query the cardinality of maximum-matching and $O(log(n))$ to find if a particular edge is matched.
Effects of Nonlinear Coupling on Spatiotemporal Regularity
Ankit Kumar
Physics , 2013,
Abstract: In this work we investigate the spatiotemporal behaviour of lattices of coupled chaotic logistic maps, where the coupling between sites has a nonlinear form. We show that the stable range of the spatiotemporal fixed point state is significantly enhanced for increasingly nonlinear coupling. We demonstrate this through numerical simulations and linear stability analysis of the synchronized fixed point. Lastly, we show that these results also hold in coupled map lattices where the nodal dynamics is given by the Gauss Map, Sine Circle Map and the Tent Map.
Studies on Chromate Removal by Chromium-Resistant Bacillus sp. Isolated from Tannery Effluent  [PDF]
Manoj Kumar Chaturvedi
Journal of Environmental Protection (JEP) , 2011, DOI: 10.4236/jep.2011.21008
Abstract: A chromate-removing strain was isolated from spent chrome effluent and identified as Bacillus circulans strain MN1. The isolated strain was studied for resistance to Cr (VI) and its ability to remove Cr (VI). The strain was found to tolerate Cr (VI) concentration as high as 4500 mg/L, but the cells growth was heavily influenced when initial Cr (VI) concentration was increased between 1110 mg/L and 4500 mg/L while Cr(VI) at 500 mg/L to 1110 mg/L did not suppressed the cells growth. The experiments also demonstrated that the cells removed toxic Cr (VI) more efficiently at 30?C compared with that at 25?C and 35?C. The optimum initial pH for Cr (VI) removal was 5.6 and final pH values of 5.1-5.6 were observed for initial pH 5.2-5.7.
An Introduction to Numerical Methods for the Solutions of Partial Differential Equations  [PDF]
Manoj Kumar, Garima Mishra
Applied Mathematics (AM) , 2011, DOI: 10.4236/am.2011.211186
Abstract: Partial differential equations arise in formulations of problems involving functions of several variables such as the propagation of sound or heat, electrostatics, electrodynamics, fluid flow, and elasticity, etc. The present paper deals with a general introduction and classification of partial differential equations and the numerical methods available in the literature for the solution of partial differential equations.
Exact Solution of Second Grade Fluid in a Rotating Frame through Porous Media Using Hodograph Transformation Method  [PDF]
Sayantan Sil, Manoj Kumar
Journal of Applied Mathematics and Physics (JAMP) , 2015, DOI: 10.4236/jamp.2015.311172
Abstract: In this paper exact solution for a homogenous incompressible, second grade fluid in a rotating frame through porous media has been provided using hodograph-Legendre transformation method. Results are summarised in the form of theorems. Two examples have been taken and streamline patterns are shown for the solutions.
Cryptographic Schemes Based on Elliptic Curves over the Ring Zp[i]  [PDF]
Manoj Kumar, Pratik Gupta
Applied Mathematics (AM) , 2016, DOI: 10.4236/am.2016.73027
Abstract: Elliptic Curve Cryptography recently gained a lot of attention in industry. The principal attraction of ECC compared to RSA is that it offers equal security for a smaller key size. The present paper includes the study of two elliptic curve \"\" and \"\" defined over the ring \"\" where \"\". After showing isomorphism between \"\" and \"\" , we define a composition operation (in the form of a mapping) on their union set. Then we have discussed our proposed cryptographic schemes based on the elliptic curve \"\". We also illustrate the coding of points over E, secret key exchange and encryption/decryption methods based on above said elliptic curve. Since our proposed schemes are based on elliptic curve of the particular type, therefore the proposed schemes provides a highest strength-per-bit of any cryptosystem known today with smaller key size resulting in faster computations, lower power assumption and memory. Another advantage is that authentication protocols based on ECC are secure enough even if a small key size is used.
Numerical Treatment of Nonlinear Third Order Boundary Value Problem  [PDF]
Pankaj Kumar Srivastava, Manoj Kumar
Applied Mathematics (AM) , 2011, DOI: 10.4236/am.2011.28132
Abstract: In this paper, the boundary value problems for nonlinear third order differential equations are treated. A generic approach based on nonpolynomial quintic spline is developed to solve such boundary value problem. We show that the approximate solutions of such problems obtained by the numerical algorithm developed using nonpolynomial quintic spline functions are better than those produced by other numerical methods. The algorithm is tested on a problem to demonstrate the practical usefulness of the approach.
Distribution, Enrichment and Ecological Risk Assessment of Six Elements in Bed Sediments of a Tropical River, Chottanagpur Plateau: A Spatial and Temporal Appraisal  [PDF]
Kumar Manoj, Pratap Kumar Padhy
Journal of Environmental Protection (JEP) , 2014, DOI: 10.4236/jep.2014.514136
Abstract: Distribution and enrichment of six elements (iron, zinc, copper, lead, cadmium and manganese) in surface bed sediments, collected from seventeen selected locations during pre-monsoon and postmonsoon periods, of the tropical Chottanagpur plateau river Subarnarekha along with the ecological risks involved were investigated. Owing to the rich occurrence of mineral resources, the Subarnarekha river basin has a large scale presence of industrial and mining units especially in the Indian State of Jharkhand. An assessment, which involved examining distribution pattern of elements, comparative studies with sediment quality guidelines (SQGs) and geochemical background values and a sequential and integrated index analyses approach (containing contamination factor (CF), pollution load index (PLI), contamination degree (CD), enrichment factor (EF), geo-accumulation index (Igeo) and potential ecological risk index (PERI)), was followed to estimate enrichment and risks of elements in the bed sediments. Sediments collected from areas having abundance of population, industrial conglomerates and mining units recorded elevated element concentrations, which exceeded SQGs, and significantly higher values of CF, CD, PLI, EF, Igeo and PERI. Cadmium demonstrated surprising regularity in its enrichment; contributed most to the ecological risks; and high toxicity risks due to cadmium exceeded 64% of the sites. Moreover, chronic exposures of other elements would also lead to similar ecological risks. In addition to revealing potential ecological risks due to cadmium and other elements our investigation markedly highlighted anthropogenic control over sediment quality deterioration and some immediate sediment quality management strategies are needed to remediate and control river bed contamination.
Two Pass Port Scan Detection Technique Based on Connection Pattern and Status on Sampled Data  [PDF]
Sunil Kumar, Kamlesh Dutta, Ankit Asati
Journal of Computer and Communications (JCC) , 2015, DOI: 10.4236/jcc.2015.39001
Abstract: Anomaly detection is now very important in the network because the increasing use of the internet and security of a network or user is a main concern of any network administrator. As the use of the internet increases, so the chances of having a threat or attack in the network are also increasing day by day and traffic in the network is also increasing. It is very difficult to analyse all the traffic data in network for finding the anomaly in the network and sampling provides a way to analyse the anomalies in network with less traffic data. In this paper, we propose a port scan detection approach called CPST uses connection status and pattern of the connections to detect a particular source is scanner or benign host. We also show that this approach works efficiently under different sampling methods.
Page 1 /22081
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.