oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Search Results: 1 - 10 of 804 matches for " Suneela Arif "
All listed articles are free for downloading (OA Articles)
Page 1 /804
Display every page Item
Theoretical investigation of half-metallicity in Co/Ni substituted AlN
Suneela Arif,Iftikhar Ahmad,B. Amin
Physics , 2011,
Abstract: Results of Co and Ni substituted AlN in the zinc blende phase are presented. For spin up states the hybridized N-2p and Co/Ni-3d states form the valance bands with a bandgap around the Fermi level for both materials, while in the case of the spin down states the hybridized states cross the Fermi level and hence show metallic nature. It is found that, Al0.75Co0.25N and Al0.75Ni0.25N are ferromagnetic materials with magnetic moments of 4 {\mu}B and 3 {\mu}B respectively. The integer magnetic moments and the full spin polarization at the Fermi level make these compounds half-metallic semiconductors. Furthermore it is also found that the interaction with the N-2p state splits the 5-fold degenerate Co/Ni-3d states into t2g and eg states. The t2g states are located at higher energies than the eg states caused by the tetrahedral symmetry of these compounds.
Addressing domestic violence against women: An unfinished agenda
Kaur Ravneet,Garg Suneela
Indian Journal of Community Medicine , 2008,
Abstract:
Adherence to antiretroviral therapy: Challenges and possible solutions in Indian context
Garg Suneela,Kaur Ravneet
Indian Journal of Community Medicine , 2007,
Abstract:
Current status of national rural health mission
Garg Suneela,Nath Anita
Indian Journal of Community Medicine , 2007,
Abstract:
Community-based monitoring: Key to success of national health programs
Garg Suneela,Laskar Ananya
Indian Journal of Community Medicine , 2010,
Abstract:
Adolescent friendly health services in India: A need of the hour
Nath Anita,Garg Suneela
Indian Journal of Medical Sciences , 2008,
Abstract: Adolescents account for almost one third of India′s population. They are prone to suffer from reproductive and sexual health, nutritional, mental and behavioral problems. Health services which cater exclusively to the needs of adolescents are scanty and concentrated in urban areas. Adolescent Friendly Health Services (AFHS) which provide a broad range of preventive, promotive and curative services under one roof can help to ensure improved availability, accessibility and utilization of health services. AFHS is being initiated by governmental, private and non-governmental organizations. Lessons to improve the quality of AFHS could be further learnt from evaluation of pilot projects and success stories of similar initiatives in other countries.
Security Approaches in IEEE 802.11 MANET—Performance Evaluation of USM and RAS  [PDF]
Arif Sari
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2014, DOI: 10.4236/ijcns.2014.79038
Abstract: Evaluation of IEEE 802.11 Mobile Ad Hoc Networks (MANET) security issues becomes significant concern for researchers since Denial of Service (DoS) attacks are recognized as one of the most harmful threats. A variety of security mechanisms are proposed to solve security dilemma in MANETs against different layers of DoS attacks. Physical Layer jamming attacks exhaust the victim’s network resources such as bandwidth, computing power, battery, etc. Unified Security Mechanism (USM) and Rate Adaptation Scheme (RAS) are two of the proposed methods by researchers against DoS attacks. USM and RAS mechanisms are simulated through OPNET simulator and Jamming Attack is generated on the network for each security mechanisms to compare specific performance metrics on the network.
Lightweight Robust Forwarding Scheme for Multi-Hop Wireless Networks  [PDF]
Arif Sari
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2015, DOI: 10.4236/ijcns.2015.83003
Abstract: The Gossip-Based Relay Protocol (GRP) is developed based on Ad Hoc on Demand Distance Vector Protocol (AODV) and proposed to increase the efficiency of package routing functionality in ad hoc networks through specific flooding scheme. This lightweight protocol reduced the collisions on the network through specific mechanisms. Request to Send/Clear to Send (RTS/CTS) mechanism is widely used in ad hoc environment with Temporarily Ordered Routing Algorithm (TORA) in order to eliminate collisions and allow access to the shared medium through proposed authentication methods. Since GRP contains specific mechanism of directed acyclic Graph (DAG) mechanism to mitigate overhead problem, RTS/CTS modified TORA might result in similar performance metrics. In this paper, TORA protocol has a modification of new RTS/CTS mechanism and has been simulated in order to be compared with proposed lightweight robust forwarding GRP scheme in terms of specific performance metrics such as network throughput, end-to-end delay and message flooding rate over the network through OPNET simulation package in order to expose the optimal solution to increase overall network throughput in ad hoc environment.
A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications  [PDF]
Arif Sari
Journal of Information Security (JIS) , 2015, DOI: 10.4236/jis.2015.62015
Abstract: Cloud computing has become one of the most projecting words in the IT world due to its design for providing computing service as a utility. The typical use of cloud computing as a resource has changed the scenery of computing. Due to the increased flexibility, better reliability, great scalability, and decreased costs have captivated businesses and individuals alike because of the pay-per-use form of the cloud environment. Cloud computing is a completely internet dependent technology where client data are stored and maintained in the data center of a cloud provider like Google, Amazon, Apple Inc., Microsoft etc. The Anomaly Detection System is one of the Intrusion Detection techniques. It’s an area in the cloud environment that is been developed in the detection of unusual activities in the cloud networks. Although, there are a variety of Intrusion Detection techniques available in the cloud environment, this review paper exposes and focuses on different IDS in cloud networks through different categorizations and conducts comparative study on the security measures of Dropbox, Google Drive and iCloud, to illuminate their strength and weakness in terms of security.
International Law of the Sea: An Overlook and Case Study  [PDF]
Arif Ahmed
Beijing Law Review (BLR) , 2017, DOI: 10.4236/blr.2017.81003
Abstract: Sea is a large body of water that is surrounded by the land. It is a crucial part of human trade and commerce, voyage, mineral extraction, power generation and is also considered as an essential source of blue economy nowadays. International law of the sea is a law of maritime space that peacefully settles the global disputes on maritime boundary between or among the States and defines various jurisdictions of the maritime zones as well as the rights and obligations of the coastal States in these zones, especially with regard to the conservation of marine environment and biodiversity. The key objective of this piece of academic research is to demonstrate a brief overview of the international law of the sea with a special emphasize on the sources and legal framework of this law. This study also strives to focus the civil and criminal liability, jurisdictions, rights and obligations of the coastal states with regard to the different maritime zones. Furthermore this study delineates the rules and extent of using these maritime zones in the light of various treaty provisions on the international law of the sea where different adjudicated cases are also presented along with a profound scrutiny upon their fact, issues, judgment and reasoning.
Page 1 /804
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.