oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2020 ( 3 )

2019 ( 203 )

2018 ( 274 )

2017 ( 292 )

Custom range...

Search Results: 1 - 10 of 224131 matches for " Smita R. Kabbur "
All listed articles are free for downloading (OA Articles)
Page 1 /224131
Display every page Item
Value Distribution and Uniqueness Theorems for Difference of Entire and Meromorphic Functions
Subhas S. Bhoosnurmath,Smita R Kabbur
International Journal of Analysis and Applications , 2013,
Abstract: We investigate the value distribution and uniqueness problems of difference polynomials of entire and meromorphic functions.
On Entire and Meromorphic Functions That Share One Small Function with Their Differential Polynomial
Subhas S. Bhoosnurmath,Smita R. Kabbur
International Journal of Analysis , 2013, DOI: 10.1155/2013/926340
Abstract: We study the uniqueness of meromorphic functions that share one small function with more general differential polynomial . As corollaries, we obtain results which answer open questions posed by Yu (2003). 1. Introduction and Main Results In this paper, a meromorphic functions mean meromorphic in the whole complex plane. We use the standard notations of Nevanlinna theory (see [1]). A meromorphic function is called a small function with respect to if , that is, as possibly outside a set of finite linear measure. If and have the same zeros with same multiplicities (ignoring multiplicities), then we say that and share ?CM (IM). For any constant , we denote by the counting function for zeros of with multiplicity no more than and the corresponding for which multiplicity is not counted. Let be the counting function for zeros of with multiplicity at least and the corresponding for which the multiplicity is not counted. Let and be two nonconstant meromorphic functions sharing value 1?IM. Let be common one point of and with multiplicity and , respectively. We denote by ?? the counting (reduced) function of those 1 points of where ; by the counting function of those 1-points of where ; by the counting function of those 1-points of where . In the same way, we can define , and (see [2]). In 1996, Brück [3] posed the following conjecture. Conjecture 1. Let be a nonconstant entire function such that the hyper-order of is not a positive integer and . If and share a finite value ?CM, then , where is a nonzero constant. In [3], under an additional hypothesis, Brück proved that the conjecture holds when . Theorem A. Let be a nonconstant entire function. If and share the value 1?CM and if , then , for some constant . Many people extended this theorem and obtained many results. In 2003, Yu [4] proved the following theorem. Theorem B. Let . Let be a nonconstant meromorphic function and a meromorphic function such that , and do not have any common pole and as . If and share the value 0?CM and then . Theorem C. Let . Let be a nonconstant entire function and be a meromorphic function such that and as . If and share the value 0?CM and then . In the same paper, the author posed the following questions. Question 1. Can ?CM shared value be replaced by an IM shared value in Theorem C? Question 2. Is the condition sharp in Theorem C? Question 3. Is the condition sharp in Theorem B? In 2004, Liu and Gu [5] applied different method and obtained the following theorem which answers some questions posed in [4]. Theorem D. Let . Let be a nonconstant meromorphic function and a meromorphic
Management strategies and cost effectiveness in the prevention of cervical cancer
Smita R Prasad
ClinicoEconomics and Outcomes Research , 2009, DOI: http://dx.doi.org/10.2147/CEOR.S4226
Abstract: nagement strategies and cost effectiveness in the prevention of cervical cancer Review (4413) Total Article Views Authors: Smita R Prasad Published Date June 2009 Volume 2009:1 Pages 17 - 23 DOI: http://dx.doi.org/10.2147/CEOR.S4226 Smita R Prasad University of Kentucky, College of Public Health, Lexington, KY, USA Abstract: This paper introduces the burden of cervical cancer and the primary and secondary preventative interventions currently available, and provides an overview of the bivalent and quadrivalent human papillomavirus (HPV) vaccines. A brief account of the virology and the clinical efficacy of both is given. Examinations of the two main types of cost analyses, cost-effective and cost-benefit, as well as examples, are presented in addition to the possible impact these analyses and further economic models will have on budget and policy making decisions. In general, most cost analyses provide support for the implementation of primary prevention strategies, HPV immunization, in conjunction with cervical cancer screening programs. Vaccination against HPV, therefore, is a cost-effective cervical cancer prevention mechanism.
Emotionally Strangulated Relationships in Dattani's Thirty Days in September
Nagori, Smita R
Journal of Literature, Culture and Media Studies , 2011,
Abstract: In the present paper Dattani brings home the horrors of a very identifiable mother-daughter relationship. It is the first Indian English Drama on ‘incest’ or ‘child sexual abuse’. Mala, the daughter, is molested by her maternal uncle, Vinay. Whenever she endeavored to tell her mother, Shanta,she would stuff her with her favorite alu-parathas or rushed to her Lord Krishna to take support from Him. This estranged their relationship more and more. She always preferred escapism to fulfilling her daughter’s emotional expectation of giving her strength. Mala blames her mother for the painful life she is living. She feels that only her mother could help her to prevent her agony. At last, the horrid truth comes out by the mother in front of Mala’s molester. She reveals that she too had been molested by the same person, Vinay, her real brother, for ten long years. Her tongue was cut off and had fallen down. When she could not save herself how could she save Mala? The sky falls on Mala. She apprehends the meaning of silence now. The mother-daughter relation is entirely metamorphosed now sharing their emotional, psychological, physical and social effect of child sex abuse. Thus, Dattani applies the healing mechanism.
Management strategies and cost effectiveness in the prevention of cervical cancer
Smita R Prasad
ClinicoEconomics and Outcomes Research , 2009,
Abstract: Smita R PrasadUniversity of Kentucky, College of Public Health, Lexington, KY, USAAbstract: This paper introduces the burden of cervical cancer and the primary and secondary preventative interventions currently available, and provides an overview of the bivalent and quadrivalent human papillomavirus (HPV) vaccines. A brief account of the virology and the clinical efficacy of both is given. Examinations of the two main types of cost analyses, cost-effective and cost-benefit, as well as examples, are presented in addition to the possible impact these analyses and further economic models will have on budget and policy making decisions. In general, most cost analyses provide support for the implementation of primary prevention strategies, HPV immunization, in conjunction with cervical cancer screening programs. Vaccination against HPV, therefore, is a cost-effective cervical cancer prevention mechanism.Keywords: cervical cancer, human papillomavirus, HPV
Automatic detection of pulse morphology patterns & cardiac risks  [PDF]
Rajani R. Joshi, Ganesh B. Nawsupe, Smita P. Wangikar
Journal of Biomedical Science and Engineering (JBiSE) , 2012, DOI: 10.4236/jbise.2012.56041
Abstract: Analysis of arterial pulse waveforms is important for non-invasive diagnosis of cardiovascular functions. Large samples of IPG signal records of radial arterial pulse show presence of eight different types of shapes (morphological patterns) in the pulse waveforms. In this paper we present an efficient computational method for automatic identification of these morphological patterns. Our algorithm uses likelihood ratio of cumulative periodogram of pulse signals and some geometrical criteria. The algorithm is presented with necessary details on signal processing aspects. Results for a large sample of pulse records of adult Indian subjects show high accuracy of our algorithm in detecting pulse-morphology patterns. Variation of pulse-morphology with respect to time is also analyzed using this algorithm. We have identified some characteristic features of pulse-morphology variation in patients of certain cardiac problems, hypertension, and diabetes. These are found relevant and significant in terms of physiological interpretation of the associated shapes of pulse waveforms. Importance of these findings is highlighted along with discussion on overall scope of our study in automatic analysis of heart rate variability and in other applications for non-invasive prognosis/diagnosis.
Comparative study of Authorship Identification Techniques for Cyber Forensics Analysis
Smita Nirkhi,R. V. Dharaskar
Computer Science , 2013,
Abstract: Authorship Identification techniques are used to identify the most appropriate author from group of potential suspects of online messages and find evidences to support the conclusion. Cybercriminals make misuse of online communication for sending blackmail or a spam email and then attempt to hide their true identities to void detection.Authorship Identification of online messages is the contemporary research issue for identity tracing in cyber forensics. This is highly interdisciplinary area as it takes advantage of machine learning, information retrieval, and natural language processing. In this paper, a study of recent techniques and automated approaches to attributing authorship of online messages is presented. The focus of this review study is to summarize all existing authorship identification techniques used in literature to identify authors of online messages. Also it discusses evaluation criteria and parameters for authorship attribution studies and list open questions that will attract future work in this area.
Microbiological flora of mobile phones of resident doctors  [PDF]
Sandeep B. Kokate, Sanjaykumar R. More, Vivek Gujar, Smita Mundhe, Quazi Syed Zahiruddin
Journal of Biomedical Science and Engineering (JBiSE) , 2012, DOI: 10.4236/jbise.2012.511086
Abstract: Background: Many studies revealed that devices like stethoscope, mobile phones can act as an important source of microbes capable of causing nosocomial infections. Hence there is need of defining their role in spreading infection, so that we can take some preventive measures against it. Aims: To screen the mobile phones of resident doctors and perform microbeological study of the organisms isolated. Setting: Resident doctors working at Tertiary Care Hospital. Methods: Swabs of 50 mobile phones of resident doctors were taken by sterile cotton swab and inoculated on Blood agar, MacConkey agar, Sabaraud’s dextrose agar. Isolated organisms were processed according to standard protocol. Results: Swabs of mobile phones of 50 resident doctors were analyzed for presence of micro-organisms. Out of the 50 samples, 30 (60%) were contaminated with micro-organisms. 32 micro-organisms were isolated from 50 mobile phones as shown in table 3. Among 32 isolates, Coagulase negative Staphylococci 23 (71.87%) was the dominant organism followed by Diphtheroids 7 (21.87%), Aspergillus niger 2 (6.25%). Also proportion of contamination of mobile phones of male resident doctors was more than female resident doctors. Conclusion: Mobile phones may act as a potential source of micro-organisms and spread nosocomial infections. Hence proper infection control practices like proper hand washing, decontamination of mobiles should be routinely practiced.
AN APPROACH FOR OBJECT FINDING USING MOBILE ROBOTS BASED ON ACO
Amita.PMeshram,Smita .R. Kapse
International Journal of Distributed and Parallel Systems , 2011,
Abstract: In this paper, we propose Ant Colony Optimization (ACO) for mobile robot. This paper describes theanalysis and design of a new class of mobile robots. These small robots are intended to be simple andinexpensive, and will all be physically identical, thus constituting a homogeneous team of robots. Theyderive their usefulness from their group actions, performing physical tasks and making cooperativedecisions as a Coordinated Team. This method based on heuristic concept is used to obtain globalsearch. Since the proposed method is very efficient, thus it can perform object finding very quickly. In theprocess of doing so, we first use ACO to obtain the shortest obstructed distance, which is an effectivemethod for arbitrary shape obstacles.
Comparative Study of Different Routing Protocols in MANET Based on Simulation Using Ns-2
Smita Singh,S.R.Biradar
International Journal of Electronics and Computer Science Engineering , 2012,
Abstract: A mobile ad hoc network is a collection of autonomous mobile nodes that communicate with each other over wireless links. Such networks are expected to play increasingly important role in future civilian and military settings, being useful for providing communication support where no fixed infrastructure exists or the deployment of a fixed infrastructure is not economically profitable and movement of communicating parties is possible. However, since there is no stationary infrastructure such as base stations, mobile hosts need to operate as routers in order to maintain the information about the network connectivity. Therefore, in recent years, a variety of routing protocols have been proposed and several of these have been already extensively simulated or implemented as well. This paper evaluates performance of two routing protocols, Ad hoc On-demand Multi-path Distance Vector (AOMDV) and Optimized Link State Routing (OLSR) routing protocols. We perform the analysis on two different performance metrics Average delay and Packet Delivery Ratio using Load Model and Flow Model. Simulation is carried out using Ns-2.34.
Page 1 /224131
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.