Physical Sciences and Engineering

The Adoption Of The Strategy Function In Indian Companies

Why do some companies succeed? What distinguishes these companies from their competitors? What do they do differently to ensure they develop and maintain their competitive advantage? This paper puts forward the hypothesis that companies, which adopt a formal strategic management function, within their organisation structure manage to maintain their competitive advantage. The field of strategic management has matured in the last few decades from a corporate planning function, to a wider and to some extent, a less quantitative oriented field.

Design and implementation of forward error correction in fpga and verfication

Quadrature modulation systems are used in satellite communication. I and Q are two channels which are represented in modulated signals. One of the schemes of Quadrature modulation is offset Quadrature Phase Shift Keying. Quadrature Phase Shift Keying produces the phase ambiguity in carrier recovery process which can be eliminated with OQPSK.Also OQPSK ensures high speed transmission in optical Networks. Due to more requirements of the radio channels, spectral effective modulations are intended to diminish spectral overload of communication systems.

Risk analysis in the production of wine

The wine industry is one of the most important in Cuyo. Considering the entire wine sector, it can be mentioned that there are associated risks with growing vine, secondly, the associated risks with the process of winemaking. This agro-industrial activity are marked by high transience of workers. At harvest time, the largest number of workers is concentrated, since the contracting meets the needs of growing grapes and special specified conditions for wine making.

Survey on elliptical curve cryptography

The main objective of our survey is based on elliptical curve cryptography. It provides security for encryption and decryption of data. We have gone through several papers, each paper describes about some protocols. some of the papers are related to Text based, Wireless Communication and java as implementation tool .The above methods has its own protocols. One is based on customizable cryptography. It produces hardware designs for ECC. Encryption is a process of encoding messages or information in such a way that only authorized parties can read it.

Implementing efficient search techniques for retrieving facial images

This paper investigates a framework of search-based face annotation by mining weakly labeled facial pictures that are freely offered on world Wide internet (WWW). One difficult drawback for search-based face annotation theme is a way to effectively perform annotation by exploiting the list of most similar facial pictures and their weak labels that are usually clamorous and incomplete. To tackle this drawback, we have a tendency to propose an efficient unsupervised label refinement (ULR) approach for processing the labels of internet facial pictures exploitation machine learning techniques.

Study software reliability using defect density in software engineering

To fulfill software requirements and to satisfy the customer, software must be tested by all angles of users and developer .But the question is that when to stop testing or whether it is enough to test software, if it not tested properly by software engineer then it is handover to customer, if we want to give quality s/w product then we must calculate software reliability as it one of quality measure. s/w reliability is probability of failure free operation of software.

Data mining using hace theorem

Big Data consists of huge modules, difficult, growing data sets with numerous and, independent sources. With the fast development of networking, storage of data, and the capacity of data gathering, Big Data is now rapidly increasing in all science and engineering domains, as well as animal, genetic and biomedical sciences. This paper detailed a HACE theorem that characterizes the features of the Big Data revolution, and proposes a Big Data processing model, from the data mining view.

Context aware dynamic web design using hadoop

Context aware web design is not a new technology and its been in the use from many years. However the algorithms designed for that purpose are written in jsp or similar other server programming languages which includes bringing the huge amounts of the transactional data into a single computing unit (which is usually of very high computing capacity) and run analytics that are necessary. In this paper we have tried to implement the similar website which changes dynamically according to the users latest interests.

Working in a prison environment: how safe are the prison workers

Growing inmate population in the United States may give rise to fear among correctional officers about their personal workplace safety in the federal prison system. This potential threat of injury for correction officers is further heightened by the fact that they are required to deal with violent people and conditions on a daily basis. The nature of the threat facing corrections officers is also complex and varied.

Head trauma and post traumatic epilepsy – a radiological study

Introduction: India went through a phase of massive urbanization, industrialization and motorization. In relation to motorization one of the problems is head injury. Imaging tests help in determining the diagnosis and prognosis of a traumatic brain injury patient. One of the common sequelae of head trauma is seizures. About 25% of patients with brain contusions or hematomas and about 50% of patients with penetrating head injuries will develop seizures. These seizures occur within first 24 hours of head injury.