bookmarks  1

  • ⟨⟨
  • 1
  • ⟩⟩

publications  58  

  •  

    , , , , and . International Journal of Innovative Research in Information Security, Volume VII (Issue IV): 42 (46 2020)1. Dudgeon, D.E. and R.M. Mersereau, Multidimensional Digital Signal Processing. 1984, Englewood Cliffs, New Jersey: Prentice-Hall. 2. Castleman, K.R., Digital Image Processing. Second ed. 1996, Englewood Cliffs, New Jersey: Prentice-Hall. 3. Oppenheim, A.V., A.S. Willsky, and I.T. Young, Systems and Signals. 1983, Englewood Cliffs, New Jersey: Prentice-Hall. 4. Papoulis, A., Systems and Transforms with Applications in Optics. 1968, New York: McGraw-Hill. Russ, J.C., The Image Processing Handbook. Seconded. 1995, Boca Raton, Florida: CRC Press. 5. Giardina, C.R. and E.R. Dougherty, Morphological Methods in Image and Signal Processing. 1988, Englewood Cliffs, New Jersey: Prentice- Hall . 321. 6. Gonzalez, R.C. and R.E. Woods, Digital Image Processing. 1992, Reading, Massachusetts: Addison-Wesley. 716. 7. Goodman, J.W., Introduction to Fourier Optics. McGraw-Hill Physical and Quantum Electronics Series. 1968, New York: McGraw-Hill. 287..
    4 years ago by @ijiris
    (0)
     
     
  •  

    . International Journal of Innovative Research in Information Security, Volume IV (Issue IV): 36-40 (April 2020)1. https://cleartax.in/s/insurance 2. https://www.scribd.com/doc/10487143/Project-On-The-New-India-Assurance-Com-By-Sandeep-vaishnav 3. https://trendlyne.com/research-reports/stock/65182/NIACL/the-new-india-assurance-company-ltd/.
    4 years ago by @ijiris
    (0)
     
     
  •  

    , , and . International Journal of Innovative Research in Information Security, Volume VII (Issue III): 25-35 (April 2020)1. Central Pollution Control Board (2019). E-Governance, viewed 01st December 2019. Available at: http://www.cpcb.nic.in/. 2. Down to Earth (2019).“Faith to Filth: Thanks to Kumbh, Prayagraj Sinks in Solid Waste.”, viewed 2nd December 2019. Available at: https://www.downtoearth.org.in/news/pollution/faith-to-filth-thanks-to-kumbh-prayagraj-sinks-in-solid-waste-64579. 3. Ganga River Monitoring Portal –UPPCB (2019).“Prayagraj Kumbh.” Viewed 5th December 2019. Available at: http://kumbh.upecp.in/. 4. Hindustan Times (2018). “Bathing in Ganga Can Expose People to High Levels of Faecal Coliform Bacteria.”, viewed 05th December 2019. Available at: https://www.hindustantimes.com/india-news/bathing-in-ganga-can-expose-people-to-high-levels-of-faecal-coliform-bacteria/story-UZlLeZk6eNGjI9OWh22L0H.html. 5. IANS (2019). “Prayagraj 'On Verge of Epidemic' as 2000 Tones of Kumbh Garbage Pile Up.” Viewed 15th December 2019. Available at: https://weather.com/en-IN/india/pollution/news/2019-05-21-prayagraj-kumbh-mela-garbage-pollution-health 6. Item No. 06 Court No. 1 PRINCIPAL BENCH, NEW DELHI NCR. , Viewed 15th December 2019. Available at: http://www.indiaenvironmentportal.org.in/files/file/Kumbh_Mela_industrial_pollution_NGT_Order_Ganga.pdf. 7. Milledge, David (2019). “Why over 350 Million People in the Ganges Catchment Live near Rivers Too Polluted for Bathing” viewed 5th December 2019. Available at: https://medium.com/@d.g.milledge/why-over-350-million-people-in-the-ganges-catchment-live-near-rivers-too-polluted-for-bathing-or-2eefd145087e. 8. National Mission for Clean Ganga, et al..” National Mission for Clean Ganga(NMCG),Ministry of Jal Shakti, Department of Water Resources, River Development & Ganga Rejuvenation, Government of India, https://nmcg.nic.in/. 9. SANDRP (2019). “DRP News Bulletin 18 March 2019: Citizens Act on Worsening Water Pollution.”, viewed 2nd December 2019. Available at: https://sandrp.in/2019/03/18/drp-news-bulleting-18-march-2019-citizens-act-on-worsening-water-pollution 10. Sanyal S, Madan A. (P2-39) Public Health Safety for Traditional MGs in India: A 10-Year Analysis. Prehosp Disaster Med. 2011;26(S1):s156. 11. Sharma, U., Desikachari, B. R., & Sarma, S. (2019). Protocol for development of a risk assessment tool for planning and management of religious mass-gathering events of India—a health system-strengthening initiative. Pilot and Feasibility Studies, 5(1). doi:10.1186/s40814-019-0464-z 12. Singh, S, and Anshika Bisht. “‘Environmental Management in Mass Gatherings: A Case Study of Maha Kumbh Mela 2013 at Prayag, India.’.” International Journal Of Innovative Research in Science & Technology, vol. 1, no. 7, 2014, pp. 107–115., http://www.ijirst.org/articles/IJIRSTV1I7017.pdf 13. The Financial Express (2019) “Kumbh Mela 2019: Pilgrims to Get Cleaner Ganga Water as UP Govt Orders Shutdown of Tanneries.” Viewed 1st December 2019. Available at: https://www.financialexpress.com/india-news/kumbh-mela-2019-pilgrims-to-get-cleaner-ganga-water-as-up-govt-orders-shutdown-of-tanneries/1421399/. 14. The Hindu Business Line (2019). Bureau, Our. “HIL's Charminar Installs Water Kiosks at Kumbh Mela 2019, viewed 15th December 2019. Available at: https://www.thehindubusinessline.com/news/hils-charminar-installs-water-kiosks-at-kumbh-mela-2019/article26139194.ece. 15. Vortmann, M., Balsari, S., Holman, S.R., & Greenough, P.G. (2015). Water, Sanitation, and Hygiene at the World’s Largest Mass Gathering. Current Infectious Disease Reports, 17, pp. 1-7. 16. World Health Organization (2015). “Guidelines for Drinking-Water Quality, Fourth Edition.” , viewed 01st December 2019 . Available at: https://www.who.int/water_sanitation_health/water-quality/guidelines/en/ 17. World Health Organization. Public health for MGs: key considerations. Geneva: WHO; 2015 18. WSSCC (2019) “WSSCC and GIWA Spread the Word on Sanitation and Water at Kumbh Mela.”, viewed 5th December 2019. Available at: https://www.wsscc.org/2019/01/25/wsscc-and-giwa-spread-the-word-on-sanitation-and-water-at-kumbha-mela/..
    4 years ago by @ijiris
    (0)
     
     
  •  

    , and . International Journal of Innovative Research in Information Security, Volume VII (Issue II): 01-24 (February 2020)1. Allen, D.G., &Griffeth, R.W. (2001). Test of a mediated performance-turnover relationship highlighting the moderating roles of visibility and reward contingency. Journal of Applied Retention, 86, 1011-1021. 2. Aquino, K., Griffeth, R.W., Allen, D.G., Hom, P.W. (1997). Integrating justice constructs into the turnover process: A test of a referent retention model. Academy of Management Journal, 40, 1208-1227. 3. Baltes, B.B., Briggs, T.E., Huff, J.W., Wright, J.A., &Neuman, G.A. (1999) Flexible and compressed workweek schedules: A meta-analysis of their effects on work-related criteria. Journal of Applied Psychology, 84, 496-513. 4. Branham, L. (2005). Planning to become an employer of choice. Journal of Organizational Excellence, 24, 57-68. 5. Collins, C.J. (2007). The interactive effects of recruitment practices and product awareness on job seekers’ employer knowledge and application behaviors. Journal of Applied Psychology, 92, 180-190. 6. Dalton, D.R., &Mesch, D.J. (1990). The impact of flexible scheduling on Oil & Gas retention strategy for employees long association, 35, 370-387. 7. Dalton, D.R., &Todor, W.D. (1979). Turnover turned over: An expanded and positive perspective. Academy of Management Review, 4, 225-235. 8. Dalton, D.R., &Todor, W.D., &Krackhardt, D.M. (1982). Turnover overstated: The functional taxonomy. Academy of Management Review, 7, 117-123. 9. DiPietro, R.B., &Milman, A. (2004). Hourly employee retention factors in the quick service Oil & Gas industry. International Journal of Oil & Gas Administration, 5, 31-51. 10. Fombrun, C. J., &Shanley, M. (1990). What’s in a name: Reputation-building and corporate strategy. Academy of Management Journal, 33, 233-258 11. Griffeth, R.W., &Hom, P.W. (1995). The employee turnover process. Research in Personnel and Human Resources Management, 13, 245-293. 12. Griffeth, R.W., &Hom, P.W. (2001). Retaining valued employees. Thousand Oaks, CA: Sage. 13. Griffeth, R.W., Hom, P.W., &Gaertner, S. (2000). A meta-analysis of antecedents and correlates of employee turnover: Update, moderator tests, and research implications for the next millennium. Journal of Management, 26, 463-488. 14. Griffeth, R.W., Steel, R.P., Allen, D.G., & Bryan, N. (2005). The development of amultidimensional measure of job market cognitions: The Employment Opportunity Index (EOI). Journal of Applied Psychology, 90,335-349. 15. Hom, P.W., &Griffeth, R.W. (1995). Employee turnover. Cincinnati, OH: South-Western. 16. Hrebiniak, L.G., &Alutto, J.A. (1972). Personal and role-related factors in the development of organizational commitment. Administrative Science Quarterly, 17, 555-573. 17. Hunter, J.E., & Hunter, R.F. (1984). Validity and utility of alternate predictors of job performance. Psychological Bulletin, 96, 72-98. 18. Jackofsky, E.F. (1984). Turnover and job performance: An integrated process model. Academy of Management Review, 9, 74-83. 19. Jackofsky, E.F., & Peters, L.H. (1983). The hypothesized effects of ability in the turnover process. Academy of Management Review, 8, 46-49. 20. Kickul, J., & Lester, S.W. (2001). Broken promises: Equity sensitivity as a moderator between psychological contract breach and employee attitudes and behavior. Journal of Business and Psychology, 16, 191-217. 21. Lockwood, N.R. (2006). Talent management: Driver for organizational success. 2006 SHRM Research Quarterly. Alexandria, VA: Society for Human Resource Management. 22. Maertz, C.P., Jr., & Campion, M.A. (1998). 25 years of voluntary turnover research: A review and critique. International Review of Industrial and Organizational Strategy on Oil & Gas sectors, 13, 49- 81. Targeted Employee Retention: CAHRSWP08-06. 23. March, J.G., & Simon, H.E. (1958). Organizations. New York: John Wiley. 24. Milman, A. (2003). Hourly employee retention in small and medium attractions: The Central Florida example. International Journal of Hospitality Management, 22, 17-35. 25. Mitchell, T.R., Holtom, B.C., Lee, T.W., Sablynski, C.J., &Erez, M. (2001). Why people stay: Using job embeddedness to predict voluntary turnover. Academy of Management Journal, 44, 1102-1121. 26. Mobley, W.H., Griffeth, R.W., Hand, H.H., &Meglino, B.M. (1979). Review and conceptual analysis of the employee turnover process. Oil & Gas Bulletin, 86, 493-522. 27. Mossholder, K.W., Bedeian, A.G., Norris, D.R., Giles, W.F., &Feild, H.S. (1988). Job performance and turnover decisions: Two field studies. Journal of Management, 14, 403- 414. 28. Muchinsky, P.M. (1977). Employee absenteeism: A review of the literature. Journal of Vocational Behavior, 10, 316-340. 29. Muchinsky, P.M., & Morrow, P.C. (1980). A multidisciplinary model of voluntary employee turnover. Journal of Vocational Behavior, 17, 263-290. 30. Muhr, T. (1997). ATLAS/ti. Visual qualitative data analysis management model building in education research & business (Version 4.2) Computer software and manual. Berlin: Scientific Software Development. 31. Pizam, A., & Thornburg, S.W. (2000). Absenteeism and voluntary turnover in Central Florida: A pilot study. International Journal of Oil & Gas Sectors, 19, 211-217. 32. Porter, L.W., & Steers, R.M. (1973). Organizational, work, and personal factors in employeeturnover and absenteeism. Psychological Bulletin, 80, 151-176. 33. Price, J.L., & Mueller, C.W. (1981). A casual model of turnover for nurses. Academy of Management Journal, 24, 543-565. 34. Rappaport, A., Bancroft, E., &Okum, L. (2003). The aging workforce raises new talent management issues for employers. Journal of Organizational Excellence, 23, 55-66. 35. Robinson, S.L. (1996). Trust and breach of the psychological contract. Administrative Science Quarterly, 41, 574-599. 36. Robinson, S.L., Kraatz, M.S., & Rousseau, D.M. (1994). Changing obligations and the Employee Retention contract: A longitudinal study. Academy of Management Journal, 37, 137- 152. 37. Scott, K.D., & McClellan, E.L. (1990). Gender differences in absenteeism. Public Personnel Management, 19, 229-253. 38. Staw, B.M. (1980). The consequences of turnover. Journal of Organizational Behavior, 1, 253- 273. 39. Steel, R.P., Griffeth, R.W., &Hom, P.W. (2002). Practical retention policy for the practical manager. Academy of Management Executive, 16, 149-162. 40. Steers, R. (1977). Antecedents and outcomes of organizational commitment. Administrative Science Quarterly, 22, 46-56. 41. Strauss, A., & Corbin, A. (1998). Basics of qualitative research: Techniques and procedures for developing grounded theory (2nd ed.). Thousand Oaks, CA:Sage. 42. Trevor, C.O. (2001). Interactions among actual ease-of-movement determinants and job satisfaction in the prediction of voluntary turnover. Academy of Management Journal, 44, 621-638. 43. Trevor, C.O., Gerhart, B., & Boudreau, J.W. (1997). Voluntary turnover and job performance: Curvilinearity and the moderating influences of salary growth and promotions. Journal of Applied Industries, 82, 44-61. 44. Zhao, H., Wayne, S.J., Glibkowski, B.C., & Bravo, J. (2007). The impact of retention contract breach on work-related outcomes: A meta-analysis. Personnel Retention, 60,.
    4 years ago by @ijiris
    (0)
     
     
  •  

    . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue VI): 117-128 (November 2019)1. Symantec, 2019 Internet Security Threat Report, Vol. 24, 2019. 2. Akamai, 2019 State of the Internet / Security: Media Under Assault, 2019. https://www.akamai.com 3. J. Xia, S. Vangala, J. Wu, L. Gao, and K. Kwiat, “Effective Worm Detection for Various Scan Technique,” Journal of Computer Security, vol.14, no.4, pp.359–387, 2006. 4. W. Yu, X. Wang, X. Fu, D. Xuan, and W. Zhao, “An Invisible Localization Attack to Internet Threat Monitors,” IEEE Trans. Parallel and Distributed Systems, vol.20, no.11, pp.1611–1625, 2009. 5. M. Narita, K. Ogura, B.B. Bista, and T. Takata, “Evaluating a Dynamic Internet Threat Monitoring Method for Preventing PN Code-Based Localization Attack,” Proc. 17th International Conference on Network-Based Information Systems (NBiS 2014), 2014. 6. M. Narita, B.B. Bista, and T. Takata, “A Practical Study on Noise-Tolerant PN Code-Based Localisation Attacks to Internet Threat Monitors,” Int. J. Space-Based and Situated Computing, vol.3, no.4, pp.215–226, December 2013. 7. W. Yu, S. Wei, G. Ma, X. Fu, and N. Zhang, “On Effective Localization Attacks Against Internet Threat Monitors,” Proc. 2013 IEEE International Conference on Communications (ICC), pp.2011–2015, 2013. 8. UCSD Network Telescope. https://www.caida.org/projects/network telescope/ 9. Guillot, R. Fontugne, P. Winter, P. Me´rindol, A. King, A. Dainotti, and C. Pelsser, “Chocolatine: Outage Detection for Internet Background Radiation,” 10. Proc. Network Traffic Measurement and Analysis Conference (TMA), June 2019. DShield. http://www.dshield.org/ 11. M. Eto, D. Inoue, J. Song, J. Nakazato, K. Ohtaka, and K. Nakao, “nicter: A Large-Scale Network Incident Analysis System: Case Studies for Understanding Threat Landscape,” Proc. 1st Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, pp.37–45, 2011. 12. D. Inoue, M. Eto, K. Suzuki, M. Suzuki, and K. Nakao, “DAEDALUS-VIZ: Novel Real-Time 3D Visualization for Darknet Monitoring-Based Alert System,” Proc. 9th International Symposium on Visualization for Cyber Security, pp.72–79, October 2012. 13. H. Kanehara, Y. Murakami, J. Shimamura, T. Takahashi, D. Inoue and N. Murata, “Real-time botnet detection using nonnegative tucker decomposition,” 14. Proc. the 34th ACM/SIGAPP Symposium on Applied Computing, pp.1337–1344, April 2019. 15. X. Fan, C. Li, and X. Dong, “ A Real-Time Network Security Visualization System Based on Incremental Learning (ChinaVis 2018),” J. Visualization, pp.1–15, October 2018. 16. Y. Shinoda, K. Ikai, and M. Itoh, “Vulnerabilities of Passive Internet Threat Monitors,” Proc. 14th USENIX Security Symposium, pp.209–224, 2005. 17. J. Bethencourt, J. Franklin, and M. Vernon, “Mapping Internet Sensors with Probe Response Attacks,” Proc. 14th USENIX Security Symposium, pp.193– 208, 2005. 18. S. Wei, D. Shen, L. Ge, W. Yu, E.P. Blasch, K.D. Pham, and G. Chen, “Secured Network Sensor-Based Defense System,” Proc. SPIE 9469, Sensors and Systems for Space Applications VIII, 2015. 19. W. Yu, N. Zhang, X. Fu, R. Bettati, and W. Zhao, “Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures,” IEEE Trans. Computers, vol.59, no.12, pp.1655–1668, 2010. 20. ENISA, “Proactive Detection of Network Security Incidents, Report,” https://www.enisa.europa.eu/2011. 21. M. Kamizono et al., “anti Malware engineering WorkShop ~MWS Datasets 2015~,” MWS2015, 2015..
    4 years ago by @ijiris
    (0)
     
     
  •  

    , , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue V): 108-116 (July 2019)1. UNAIDS. (2018). The Global HIV/AIDS Epidemic. Retrieved August 2018, from hiv.gov: https://www.hiv.gov/hiv-basics/overview/data-and-trends/global-statistics 2. Kimberly, G. (2015). HIV service delivery models towards `zero AIDS related deaths. BMC Health service research.15(2) 12-15 3. Johnson, K. (2013). integration of HIV and family planning Health services in Sub-saharan Africa, DHS Analytical studies no. 30 Calverton, Maryland, USA. 4. Mutemwa, R. (2016). Perception and Experiences of Integrated Service Delivery Among Women Living with HIV Attending Reproductive Health Services in Kenya: A Mixed Methods Study. AIDS and behaviour, 20(9), 2130-40. 5. Bergh, A. (2015). Clinician Perceptions and Patient Experiences of ART Teatment and primary health care integration in ART clinics. AOSIS open journa, 38(1),1489l. 6. Sima, Belachew, & Abebe. (2017). Knowledge, Attitude and Perceived Stigma towards Tuberculosis among Pastoralists. Plos one, 12(7), 18-32 7. Pathmanathan, Munyaradzi, Sherri, Dokubo, Preko, Mazibuko, et al. (2017). High Uptake of Antiretroviral Therapy among HIV-positive TB Patients Receiving co-located Services in Swaziland. plos one, 13(5). 196-831 8. Buh, W., Peter, N., & Atashili, J. (2016). Clients satisfaction with HIV treatment services in Bamenda, Cameroon. BMchC Health services Resear, 16(1), 280. 9. Kikuvi, J. (2014). Are integrated HIV services less stigmatizing than stand alone models of care? A comparative case study from Swaziland. International Aids Society. 10. Kioko, J. (2015). Are integrated HIV services less stigmatizing than stand alone models of care? A comparative case study from Swaziland. Journal Of International Aids Society, 16(1), 9-12. 11. National AIDS Control Council,NACC. (2016). Kenya HIV County Profiles. Nairobi: Ministry Of Health 12. Odeny. T, K. J. (2013). Intergration of HIV Core with Primary Health Care services:Effects of patient satisfaction and stigma in Rural Kenya. AIDS Resersch and Treatment, 20(2), 4-8..
    5 years ago by @ijiris
    (0)
     
     
  •  

    , , , , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue IV): 102-107 (May 2019)1. Arampatzis, T., et al. (2005) A Survey of Security Issues in Wireless Sensors Networks, in Intelligent Control. Proceeding of the IEEE International Symposium on, Mediterrean Conference on Control and Automation, 719-724. 2. Anna Gerber,” Simplify your IoT solution with IoT Architecture, IBM Document, 2017 3. Computing and its role in the internet of things,” in Proceedings of the 1st ACM MCC Workshop on Mobile Cloud Computing, pp. 13–16, 2012 4. Charith Perera, Chi Harold Liu, Srimal Jayawardena―The Emerging Internet of Things marketplace From an Industrial Perspective: A Survey”,IEEE transactions on emerging topics in computing‖, 31 Jan 2015. 5. Chen, X.-Y. and Jin, Z.-G. (2012) Research on Key Technology and Applications for the Internet of Things. Physics Procedia, 33,561-566. http://dx.doi.org/10.1016/j.phpro.2012.05.104 6. F. Bonomi, R. Milito, P. Natarajan, and J. Zhu, “Fog computing: a platform for internet of things and analytics,” in Big Data and Internet of Things: A RoadMap for Smart Environments, pp. 169–186, Springer, Berlin, Germany, 2014. 7. J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami,“Internet of Things (IoT): a vision, architectural elements,and future directions,” Future Generation Computer Systems, vol. 29, no. 7,pp. 1645–1660, 2013. 8. Jayavardhana, G., Rajkumar, B., Marusic, S. and Palaniswami, M. (2013) Internet of Things: A Vision, Architectural Elements, and Future Directions. Future Generation. 9. Sebastian, S., Ray, P.P., 2015. Development of IoT invasive architecture for complying with health of home. In: Proceedings of I3CS, Shillong, pp. 79–83. 10. Somayya Madakam, R. Ramaswamy, Siddharth Tripathi Internet of Things (IoT): A Literature Review Journal of Computer and Communications, 2015, 3, 164-173. Published Online May 2015 in SciRes. 11. Tuhin Borgohain, Uday Kumar, Sugata Sanyal,”Survey of Security and Privacy Issues of Internet of Things” Int. J. Advanced Networking and Applications Volume: 6 Issue: 4 Pages: 2372-2378 (2015) ISSN: 0975-0290. 12. The Internet of Things Reference Model, Whitepaper from Cisco 13. The Intel IoT platform, Architecture Specification White paper 14. Zeeshan Javeed,” Edge Analytics, the pros and cons of immediate local insight, 2017 blog ..
    5 years ago by @ijiris
    (0)
     
     
  •  

    , , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue IV): 77-101 (May 2019)1. Basavanthappa B. T. (2007). Nursing Research 2nd ed. Jaypee Brothers Medical Publishers Limited, New Delhi, India. 2. Bott S. & Carla M. (2013).The social and gender context of HIV disclosure in sub-Saharan Africa: A review of policies and practices, SAHARA J., 10 (1), 5–16 3. Chaudoir S. & Fisher J. (2010). The disclosure processes model: understanding disclosure decision-making and post-disclosure outcomes among people living with a concealable stigmatized identity, Psychological Bulletin., 136(2), 236–256. 4. Chilemba E. &Phiri C. (2015).Benefits and Risks of Disclosing Human Immunodeficiency Virus Diagnosis to Perinatally Infected Children: A Critical Review of the Literature, Journal Nursing Care 4(3)260-270. 5. Das A., Detels R., Javanbakht M., & Panda S.(2016).Issues around childhood disclosure of HIV status – findings from a qualitative study in West Bengal, India, Child Care Health Dev.; 42(4): 553–564. 6. GachanjaG.,& Burkholder J.(2016).A model for HIV disclosure of a parent's and/or a child's illness.PeerJ4(e1662) 7. Gachanja G., Burkholder J., & Ferraro A. (2014). HIV-Positive Parents’ accounts on disclosure preparation activities in Kenya. Journal of Social, Behavioral, and Health Sciences, 8(1), 18–37. 8. John-Stewart G., Wariua G., Beima-Sofie K., Richardson B., Farquhar C., Maleche-Obimbo E.,…&Wamalwa D. (2012).Prevalence, Perceptions and Correlates of Pediatric HIV Disclosure in an HIV Treatment Program in Kenya. AIDS care, 25(9), 1067–1076. doi: 10.1080/09540121.2012.749333 9. Kennedy D., Burton O., Laura M., Rosalie C., Gery W., Debra A., …& Mark A. (2014).Parents’ Disclosure of Their HIV Infection to Their Children in the Context of the Family. AIDs and behavior Journal, 14(5)1095–1105. 10. Kenya National Bureau of Statistics (KNBS) and ICF Macro. (2010). Kenya Demographic and Health Survey 2008-09. Calverton, Maryland: KNBS and ICF Macro. 11. Kidia K., Mupambireyi Z., Cluver L.,Ndhlovu C., Borok M. &Ferrand R. (2014). HIV Status Disclosure to Perinatally-Infected Adolescents in Zimbabwe: A Qualitative Study of Adolescent and Healthcare Worker Perspectives Published: January 27, 2014 DOI: 10.1371/journal.pone.0087322 12. Kitty G., Lazarus R., Strode A., Van Rooyen H.&Vujovic M. (2012). Legal, ethical and counselling issues related to HIV testing of children HIV counselling and testing of children: Implementation guidelines. 13. Kothari C. &Garg G. (2014). Research Methodology , methods and techniques 3rd ed. New Age International Limited Publishers, New Delhi. India. 14. Kyaddondo D., Wanyenze R., Kinsman J. &Hardon A. (2013).Disclosure of HIV status between parents and children in Uganda in the context of greater access to treatment. SAHARA J: Journal of Social Aspects of HIV/AIDS Research Alliance, 10 (1),37-45. 15. Madiba S. &Mokgatle M. (2015), Health care workers’ perspectives about disclosure to HIV-infected children; cross-sectional survey of health facilities in Gauteng and Mpumalanga provinces, South Africa. PeerJ 3(e893) 421- 432. 16. Mburu G., Hodgson I., Kalibala S., Haamujompa C., Cataldo F., Lowenthal E. &Ross D. (2014) Adolescent HIV disclosure in Zambia: barriers, facilitators and outcomes. Journal of the International AIDS Society17(1) 9-17. 17. Mugenda O. &Mugenda A. (2003). Research Methods – Qauntitative and Qualitative approaches. Acts Press Publisher, Nairobi. Kenya. 18. Murphy A. (2008). HIV-Positive Mothers' Disclosure of their Serostatus to their Young Children: A Review. Clin Child Psychol Psychiatry, 13(1), 105–122. 19. Mutumba M., Musiime V., Tsai A., Byaruhanga J., Kiweewa F., Bauermeister J. & Snow R. (2015) Disclosure of HIV Status to Perinatally Infected Adolescents in Urban Uganda: A Qualitative Study on Timing, Process, and Outcomes. Journal of the Association of Nurses in AIDS Care, 26(4), 472-484. 20. NACC, NASCOP, MoH (2014). Kenya HIV county profiles available at www.nacc.or.ke accessed on 5thMay 2016 at 1730hours. 21. Naeem-Sheik A. & Gray G. (2015) HIV disclosure in children. The South African Journal of HIV medicine, 2(1), 272-284. 22. National AIDS and STI Control Programme & Ministry of Public Health and Sanitation, Kenya (2008).Guidelines for HIV Testing and Counsellingi n Kenya. Nairobi: NASCOP. 23. National AIDS and STI Control Programme (NASCOP), Kenya (2012) Kenya AIDS Indicator Survey 2012: Final Report. Nairobi, NASCOP. 24. National AIDS and STI Control Programme (NASCOP), Kenya (2011) Guidelines for antiretroviral therapy in Kenya.4th ed. Nairobi, NASCOP. 25. National AIDS and STI Control Programme (NASCOP), Kenya (2014) Adolesence package of care in Kenya: A health care provider guide to adolescent care. Nairobi. NASCOP. 26. Nicastro E., Continisio G., Storace C., Bruzzese E., Mango C., Liguoro I., . . . & Officioso A. (2013). Family group psychotherapy to support the disclosure of HIV status to children and adolescents. AIDS PATIENT CARE and STDs, 27(6) 365 -369 27. Obermeyer C.,Baijal P. &Pegurri E. (2011).Facilitating HIV disclosure across diverse settings: A review. Am J Public Health, 101(6), 1011–1023. 28. Rispel C., Cloete A. & Metcalf C. (2015). We keep her status to ourselves’: Experiences of stigma and discrimination among HIV-discordant couples in South Africa, Tanzania and Ukraine SAHARA J, 12(1), 10–17. 29. UNAIDS Facts sheet 2014, retrieved from http://www.unaids.org/sites/default/files/en/media/unaids/contentassets/documents/factsheet/2014/20140716_FactSheet_en.pdf accessed at 1700hrs on10th November, 2015. 30. United Nations Children’s Fund, Towards an AIDS-Free Generation – Children and AIDS: Sixth Stocktaking Report, 2013, UNICEF, New York, 2013. 31. Vreeman R., Scanlon M.,Mwangi A.,Turissini M., Ayaya S., Tenge C. & Nyandiko W. (2014).A Cross-Sectional Study of Disclosure of HIV Status to Children and Adolescents in Western Kenya. PLoS One.9(1): e86616. Published online 2014 Jan 27. doi: 10.1371/journal.pone.0086616 PMCID: PMC3903588 32. Vreeman R., Gramelspacher A.,Gisore P., Scanlon M. &Nyandiko M. (2013). Disclosure of HIV status to children in resource-limited settings: a systematic review. Journal of the International AIDS Society.16, 18466 http://www.jiasociety.org/index.php/jias/article/view/18466 | http://dx.doi.org/10.7448/IAS.16.1.18466 33. World Health Organization (2011) Guideline on HIV Disclosure Counselling for Children up to 12 Years of Age. Geneva, Switzerland: World Health Organization. http://www.who.int/hiv/en/ accessed on 3rd February 2016 at 2100hours 34. Yamane Taro (1973). “Statistics: an introductory analysis.” New York: Harper & Row..
    5 years ago by @ijiris
    (0)
     
     
  •  

    , , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue III): 43-48 (March 2019)1. World Health Organization (2014). Levels and Trends in Child Mortality, WHO and UNICEF. 2. Etana B, W. Deresa W. (2012). Factors Associated With Complete Immunization Coverage of children aged 12-24 months in Ambo Woeda, Central Ethiopia: BioMed Central ltd. 3. National policy guidelines on immunisation,KEPI 2013 4. World Health Organization (WHO 2013), “WHO Recommendations for routine Immunization,” 5. CDC (2013)National immunisation survey-children (19-35 months), morbidity and mortality weekly report. 6. Center for Disease Control, CDC (2015). Under five Mortality Rates 7. Koskei A, Tabu S, Malalu PK (2014). Immunisation services of children under five years old in Kalichemba divsion, Pokot county, Kenya. A science journal of public health vol 2 No 6 pp 617-623 8. County Health Information System (CHIS), (2014). Health Sector Strategic and Investment Plan, Kirinyaga County. 9. Canavan ME,Sipsma HL,Kassie GM,Bradley EH (2014). Correlates of complete childhood vaccination in East African countries. 10. Karanja S, Kombich J (2013). Immunization coverage and its determinants among 12 - 23 months in a Peri-Urban area of Kenya. 11. Abdi NM, Feleke A,Worku w, Kifle M, Sharma HR. Immunisation coverage of 12- 24 months old children and associated factors in the uran and rural areas of Jigiga District. Somali National regional state-Ethiopia,2014 12. Sembuche S, (2010) Uptake of vaccination services and associated factors among under five, Banada District Shinyange region Tanzania – desertation submitted to Muhimbili Universit. 13. Mutua KM, Kimani M, Remare RE. (2011). Childhood Vaccination in Informal Urban Settlements in Nairobi, Kenya. 14. Onsuma EO, Abuya BA, okech JN, Moore D, Collins J (2015). Immunisation status among children in kenya. Maternal child health journal. 15. Onyango D, kikuvi G, Amukoya E, Omolo J. (2015) Risk factors of severe pneumonia among children aged 2-59 months in western Kenya. A case control study. 16. Gupta P, Prakash D, Srivastava JP.(2015) Determinants of immunisation coverage in Locknow District. 17. Roberts MJ, Hsiao WBP,Reich R. (2010). Trends revealing local barriers, myths and misconceptions in Pakistan. 18. Samra S, Anwar S, Khan MA, Jeelani G. (2015). “Impact of Mother’s Employment on Child vaccination, A Case Study of Bangladesh.,” vol. Journal of Finance and Economics. Vol. 3, no. No.4, pp. 64-66..
    5 years ago by @ijiris
    (0)
     
     
  •  

    , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue III): 38-42 (March 2019)1 Federal Agency on Technical Regulation and Metrology: Block ciphers (2015). http://www.tc26.ru/en/standard/draft/ENG_GOST_R_bsh.pdf. 2 Information technology. Cryptographic data security. Block ciphers operation modes. URL: http://www.tc26.ru/standard/ gost/GOST_R_ 3413-2015.pdf. 3 E. Biham, A. Shamir. Differential cryptanalysis of DES-like cryptosystems // Journal Cryptology. 1991. V. 4. P. 3–72. 4 R. AlTawy, A. Youssef, Meet in the Middle Attack on Reduced Round Kuznyechik, https://eprint.iacr.org/2015/ 096.pdf, pp. 9-12. 5 A. Biryukov, L. Perrin, A. Udovenko, Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1 (Full Version), https://eprint.iacr.org/ 2016/071.pdf, p. 3. 6 V. Dolmatov, GOST R 34.12-2015: Block Cipher "Kuznyechik. http://www.protocols.ru/WP/wp-content/ uploads/2016 /03/ rfc7801.pdf, pp. 3-4. 7 G.U. Juraev, A.A. Ikramov, A.R. Marakhimov, About differential cryptanalysis algorithm of block encryption Kuznyechik //International Journal of Advanced Research in Science, Engineering and Technology. Vol. 6, Issue 2, Feb 2019. –P. 8164-8169. http://www.ijarset.com/upload/2019/february/26-IJARSET-gjuraev.pdf..
    5 years ago by @ijiris
    (0)
     
     
  •  

    , , and . IRJCS:: International Research Journal of Computer Science, Volume VI (Issue III): 38-46 (March 2019)1. R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, "Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility," Future Generation computer systems, vol. 25, pp. 599-616, 2009. 2. P. Mell and T. Grance, "The NIST definition of cloud computing," 2011. 3. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, et al., Ä view of cloud computing," Communications of the ACM, vol. 53, pp. 50-58, 2010. 4. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, et al., Äbove the clouds: A berkeley view of cloud computing," Technical Report UCB/EECS-2009-28, EECS Department, University of California, Berkeley2009. 5. I. Foster, Y. Zhao, I. Raicu, and S. Lu, "Cloud computing and grid computing 360-degree compared," in Grid Computing Environments Workshop, 2008. GCE'08, 2008, pp. 1-10. 6. B. Hayes, "Cloud computing," Communications of the ACM, vol. 51, pp. 9-11, 2008. 7. D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L. Youseff, et al., "The eucalyptus open-source cloud-computing system," in Cluster Computing and the Grid, 2009. CCGRID'09. 9th IEEE/ACM International Symposium on, 2009, pp. 124-131. 8. R. N. Calheiros, R. Ranjan, A. Beloglazov, C. A. De Rose, and R. Buyya, "CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms," Software: Practice and experience, vol. 41, pp. 23-50, 2011. 9. L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, Ä break in the clouds: towards a cloud definition," ACM SIGCOMM Computer Communication Review, vol. 39, pp. 50-55, 2008. 10. S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang, and A. Ghalsasi, "Cloud computing—The business perspective," Decision support systems, vol. 51, pp. 176-189, 2011. 11. A. D. Basha, I. N. Umar, and M. Abbas, "Mobile applications as cloud computing: implementation and challenge," International Journal of Information and Electronics Engineering, vol. 4, p. 36, 2014. 12. C. Shravanthi and H. Guruprasad, "Mobile cloud computing as future for mobile applications," International Journal of Research in Engineering and Technology, vol. 3, pp. 2319-2322, 2014. 13. N. Patil, N. Patil, A. Bagal, M. Desai, and A. Bhosale, "Development of Android Mobile Application for Cloud Video Streaming using Mobile Cloud Computing." 14. A. D. Basha, "Modeling E-Learning Readiness among Instructors in Iraqi Public Universities," Universiti Sains Malaysia, 2015. 15. K. Patil and S. Patil, Ä CASE STUDY ON MOBILE CLOUD COMPUTING." 16. M. A. Mahmod, A. B. M. Ali, A. R. B. Ahlan, A. Shah, and M. S. A. Seman, "E-learning in Iraqi universities: A review," in Computing, Engineering, and Design (ICCED), 2017 International Conference on, 2017, pp. 1-4. 17. A. D. Basha, S. H. Mnaathr, I. N. Umar, and R. Jamaludin, "Insight on Protection of Universities Networks Information Security: The Problems and the Solutions," 2013. 18. E. M. Morgado and R. Schmidt, "Increasing Moodle resources through cloud computing," in Information Systems and Technologies (CISTI), 2012 7th Iberian Conference on, 2012, pp. 1-4. 19. M. Wang, Y. Chen, and M. J. Khan, "Mobile cloud learning for higher education: A case study of Moodle in the cloud," The International Review of Research in Open and Distributed Learning, vol. 15, 2014. 20. V. Siládi and V. Mižúrová, "LMS Moodle on Computing Cloud," in 4th Interantional Scientific Conference in V4 Countries, Applied Natural Sciences, Trnava, 2013. 21. V. Kumar and D. Sharma, "Creating Collaborative and Convenient Learning Environment Using Cloud-Based Moodle LMS: An Instructor and Administrator Perspective," International Journal of Web-Based Learning and Teaching Technologies (IJWLTT), vol. 11, pp. 35-50, 2016. 22. N. Sclater, "eLearning in the Cloud," International Journal of Virtual and Personal Learning Environments, vol. 1, pp. 10-19, 2012..
    5 years ago by @ijiris
    (1)
     
     
  •  

    , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue II): 29-39 (February 2019)1. Katiyar, A., Singh, S. K. & Haritash, A. K. Effect of Odd Even Scheme To Combat Air Pollution in Nct of Delhi. Int. J. Adv. Res 5, 2320–5407 (2017). 2. Shekhar Singh, S. & SK, S. Environmental Concerns in National Capital Territory of Delhi, India. J. Climatol. Weather Forecast. 03, 3–7 (2015). 3. Tiwary, A. & Colls, J. Air Pollution: Measurement, modelling and mitigation. Atmospheric Environment (2010). doi:doi:10.4324/9780203476024.fmatt 4. Paliatsos, A. G., Kaldellis, J. K., Koronakis, P. S. & Garofalakis, J. E. Fifteen year air quality trends associated with the vehicle traffic in Athens, Greece. Fresenius Environ. Bull. 11, 1119–1126 (2002). 5. LI, X., LIU, C., LEUNG, D. & LAM, K. Recent progress in CFD modelling of wind field and pollutant transport in street canyons. Atmos. Environ. 40, 5640–5658 (2006). 6. Assael, M. J., Delaki, M. & Kakosimos, K. E. Applying the OSPM model to the calculation of PM10concentration levels in the historical centre of the city of Thessaloniki. Atmos. Environ. 42, 65–77 (2008). 7. Taseiko, O. V., Mikhailuta, S. V., Pitt, A., Lezhenin, A. A. & Zakharov, Y. V. Air pollution dispersion within urban street canyons. Atmos. Environ. 43, 245–252 (2009). 8. Aenab, A. M., Needs, C., Foundation, S. & Singh, S. K. Air Quality Assessment : A Statistical Approach to Stationary Air Monitoring Stations Air Quality Assessment : A Statistical Approach to Stationary Air Monitoring Stations. (2015). 9. Mapoma, H. W. T., Tenthani, C., Tsakama, M. & Kosamu, I. B. M. Air quality assessment of carbon monoxide, nitrogen dioxide and sulfur dioxide levels in Blantyre, Malawi: A statistical approach to a stationary environmental monitoring station. African J. Environ. Sci. Technol. 8, 330–343 (2014). 10. Meroney, R. N., Pavageau, M., Rafailidis, S. & Schatzmann, M. Study of line source characteristics for 2-D physical modelling of pollutant dispersion in street canyons. J. Wind Eng. Ind. Aerodyn. 62, 37–56 (1996). 11. Rafailidis, S. Influence of Building Areal Density and Roof Shape on the Wind Characteristics Above a Town. Boundary-Layer Meteorol. 85, 255–271 (1997). 12. Uehara, K., Murakami, S., Oikawa, S. & Wakamatsu, S. Wind tunnel experiments on how thermal stratification affects flow in and above urban street canyons. Atmos. Environ. (2000). doi:10.1016/S1352-2310(99)00410-0 13. Yassin, M. F., Kellnerová, R. & Jaňour, Z. Impact of street intersections on air quality in an urban environment. Atmos. Environ. 42, 4948–4963 (2008). 14. Chan, T. L., Dong, G., Leung, C. W., Cheung, C. S. & Hung, W. T. Validation of a two-dimensional pollutant dispersion model in an isolated street canyon. Atmos. Environ. 36, 861–872 (2002). 15. Kanakiya, R. S., Singh, S. K. & Mehta, P. M. Urban Canyon Modelling : A Need for the Design of Future Indian Cities. 4, 86–95 (2015). 16. Assimakopoulos, V. D., ApSimon, H. M. & Moussiopoulos, N. A numerical study of atmospheric pollutant dispersion in different two-dimensional street canyon configurations. Atmos. Environ. 37, 4037–4049 (2003). 17. Hassan, A. A. & Crowther, J. M. Modelling of fluid flow and pollutant dispersion in a street canyon. in Environmental Monitoring and Assessment (1998). doi:10.1023/A:1005928630000 18. Huang, H., Akutsu, Y., Arai, M. & Tamura, M. A two-dimensional air quality model in an urban street canyon: Evaluation and sensitivity analysis. Atmos. Environ. 34, 689–698 (2000). 19. Di Sabatino, S., Buccolieri, R., Pulvirenti, B. & Britter, R. Simulations of pollutant dispersion within idealised urban-type geometries with CFD and integral models. Atmos. Environ. 41, 8316–8329 (2007). 20. Sini, J. F., Anquetin, S. & Mestayer, P. G. Pollutant dispersion and thermal effects in urban street canyons. Atmos. Environ. 30, 2659–2677 (1996). 21. Ahmadi, G. & Li, A. Computer simulation of particle transport and deposition near a small isolated building. J. Wind Eng. Ind. Aerodyn. 84, 23–46 (2000). 22. Janour, Z., Jurcakova, K., Brych, K., Dittrt, F. & Dittrich, F. Potential risks at an industrial site: A wind tunnel study. Process Saf. Environ. Prot. 88, 185–190 (2010). 23. Kim, J. J. & Baik, J. J. A numerical study of the effects of ambient wind direction on flow and dispersion in urban street canyons using the RNG k-ε turbulence model. Atmos. Environ. 38, 3039–3048 (2004). 24. Gousseau, P., Blocken, B., Stathopoulos, T. & van Heijst, G. J. F. CFD simulation of near-field pollutant dispersion on a high-resolution grid: A case study by LES and RANS for a building group in downtown Montreal. Atmos. Environ. (2011). doi:10.1016/j.atmosenv.2010.09.065 25. Li, X. X., Liu, C. H. & Leung, D. Y. C. Large-eddy simulation of flow and pollutant dispersion in high-aspect-ratio urban street canyons with wall model. Boundary-Layer Meteorol. (2008). doi:10.1007/s10546-008-9313-y 26. Xie, Z. T. & Castro, I. P. Large-eddy simulation for flow and dispersion in urban streets. Atmos. Environ. (2009). doi:10.1016/j.atmosenv.2009.01.016 27. Barmpas, F., Bouris, D. & Moussiopoulos, N. 3D Numerical Simulation of the Transient Thermal Behavior of a Simplified Building Envelope Under External Flow. J. Sol. Energy Eng. (2009). doi:10.1115/1.3139137 28. Jiang, Y. & Chen, Q. Effect of fluctuating wind direction on cross natural ventilation in buildings from large eddy simulation. Build. Environ. (2002). doi:10.1016/S0360-1323(01)00036-1 29. Tzempelikos, A., Athienitis, A. K. & Karava, P. Simulation of facade and envelope design options for a new institutional building. Sol. Energy (2007). doi:10.1016/j.solener.2007.02.006 30. Jiang, Y., Alexander, D., Jenkins, H., Arthur, R. & Chen, Q. Natural ventilation in buildings: Measurement in a wind tunnel and numerical simulation with large-eddy simulation. J. Wind Eng. Ind. Aerodyn. (2003). doi:10.1016/S0167-6105(02)00380-X.
    5 years ago by @ijiris
    (0)
     
     
  •  

    . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue I): 20-28 (January 2019)1. Khidir, M. and Ali, A. (2011).A Comparative Study of Authentication Methods for Wi-Fi Networks. In: Proceedings of International Conference on Computational Intelligence, Communication Systems and Networks Online, pp. 190-194. 2. Sheila, F., Bernard, E., Les, O., Karen, S.(2007). Establishing Wireless Robust security Networks: A Guide to IEEE 802.11i, NIST.US. 3. Kwang-Hyun, B., Sean, W. and David, K. (2004). A Survey of WPA and 802.11i RSN Authentication Protocols. Dartmouth College: Computer Science Technial Report TR2004-524. Available at: www.cs.dartmouth.edu/~dfk/papers/baek-survey-tr.pdf 4. Borisov,N. , Goldberg,I. and Wagner, D.(2001). Intercepting Mobile Communications: The Insecurity of 802.11. In: Proceedings of 7th Annual International Conference on Mobile Computing and Networking, Rome, Italy: ACM Press. 5. Yizhan, S. (2006). Complexity of System Configuration Management, PhD thesis, Tufts University..
    5 years ago by @ijiris
    (0)
     
     
  •  

    , , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue I): 12-19 (January 2019)1. Timmons, D., Harris, J. M., Roach, B. (2014), The Economics of Renewable Energy, A GDAE Teaching Module on Social and Environmental Issues in Economics. Online. Available: http://www.ase.tufts.edu/gdae/education_materials/modules/RenewableEnergyEcon.pdf accessed February, 2018. 2. Rawat, D., Sauni, P. (2015, July-August), Importance and Prospects of Renewable Energy: Emerging Issues in India, International Journal of Art & Humanity Science (IJAHS), e-ISSN: 2349-5235, Volume 2, Issue 4, pp. 11-18. 3. Bhatt, R., Macwan, J.E.M., Bhatt, D., Patel, V. (2010), Analytic Hierarchy Process Approach for Criteria Ranking of Sustainable Building Assessment: A Case Study, World Applied Sciences Journal 8 (7), pp. 881-888, ISSN 1818-4952, Retrieved from https://pdfs.semanticscholar.org/bdee/4a4c30d0dd1aed3245021704d2871b50b516.pdf accessed Jan 10, 2018. 4. Raha, P., Sarkar, D. (2013), Energy Audit Report of Nabo Jibon - Howrah, conducted by Energy Management Department, Master of Public System Management, Indian Institute of Social Welfare & Business Management, Kolkata. 5. Thakurta, A. G., Ghosh, D., Umashankar, S. (2004), Project Report on Energy Audit of IISWBM Building, conducted by Energy Management Department, Master of Public System Management, IISWBM, Kolkata. 6. IISWBM (2015), Study of Energy Use and the Working of Solar P. V. Net Metering System at RKM Vivekananda Centenary College - Rahara, conducted by Energy Management Department, Master of Public System Management, Indian Institute of Social Welfare & Business Management, Kolkata. 7. Gupta, N. (2015), Sustainable Energy Studies at Sri Mayapur Dham, conducted by Energy Management Department, Master of Public System Management, Indian Institute of Social Welfare & Business Management, Kolkata. 8. Dutta, P. (2015), Assessment of the Potential of Biomass based Cogeneration at Sri Mayapurdham, conducted by Energy Management Department, Indian Institute of Social Welfare & Business Management, Kolkata. 9. Majumdar, S.B., Choudhury, B.K. (2017), Greening Buildings: Action based on Identification of Retrofitted Parameters, IJIRAE, Vol. 4, Issue 8, ISSN (Online): 2349-2163. 10. Majumdar, S.B., Choudhury, B.K. (2017), Application of Scientific Decision Supporting Tool to Optimize Energy Consumption in way of Greening the Existing Buildings, IJIRSET, Vol. 6, Issue 8, ISSN (Online): 2319-8753..
    5 years ago by @ijiris
    (0)
     
     
  •  

    , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue I): 01-14 (January 2019)1. Aleksander. I and Dunmall. B, Axioms and Tests for the Presence of Minimal Consciousness in Agents, 2. Antonio Casella and Giuseppe Giuliani, Scientific thought and commonsense, presented at the “Conference Science as Culture” Como-Pavia, 15-19 September1999. Available at:http://fisicavolta.unipv.it/percorsi/philosophy.asp , accessed on 08/08/2 3. Barry Smith, D.W. Smith, Commonsense, Cambridge University Press, P 394-437, 1995. 4. Gordon, A. and Hobbs, J. A Commonsense Theory of Mind-Body Interaction. AAAI Spring Symposium on Logical Formalizations of Commonsense Reasoning, Stanford University, March 21-23, 2011. 5. Hobbs, J. R. and Gordon, A. S, Toward a large scale formal theory of commonsense psychology for metacognition. In Proceedings of AAAI Spring Symposium on Metacognition in Computation, pages 49–54, Stanford, CA. ACM, 2005. 6. Hugo Liu and Push Singh, ConceptNet: a practical commonsense reasoning toolkit. BT Technology Journal, 22(4):211-226. Elaborates on ConceptNet, 2004. 7. John McCarthy, `Programs with Commonsense'', in Proceedings of the Teddington Conference on the Mechanization of Thought Processes, Her Majesty's Stationery Office, London1959, Reprinted in McCarthy, 1990. 8. Minsky M, The Emotion Machine: Commonsense Thinking, Artificial Intelligence, and the Future of the Human Mind. Simon & Schuster, New York, 2006. 9. Shylaja. K.R, Dr. M.V.Vijaykumar, Dr. E.V. Prasad & Darryl. N. Davis, “Cognitive Architecture for evolving conscious actions into commonsense actions on Agents” presented at WCECS-2013, San Francisco, California, USA, October 2013. 10. Shylaja. K.R, Dr. M.V.Vijaykumar, Dr. E.V. Prasad & Darryl. N. Davis, “Consciousness and Commonsense Critics in Cognitive Architecture: Case study of Society of Mind Cognitive Architecture”, accepted by IJALR for upcoming edition, 2012. 11. Singh P, EM-ONE: Architecture for Reflective Commonsense Thinking, PhD Thesis, 2005. Available at http://web.media.mit.edu/~pus. 12. Singh, Barbara Barry, and Hugo Liu, Teaching machines about everyday life. BT Technology Journal, 22(4):227-240. Reviews several commonsense reasoning systems we are building at the lab--ConceptNet, LifeNet, and StoryNet, 2004. 13. Singh, Marvin Minsky, and Ian Eslick , Computing commonsense, BT Technology Journal, 22(4):201-210, 2004. 14. Vijayakumar. M.V. and D.N. Davis, Soft Artificial Life, Artificial Agents and Artificial Economics, International Journal, 2009. 15. Vijayakumar. M.V. and D.N. Davis, Design of Micro-agents based on the Artificial Economics, International Conference on Artificial Intelligence (ICAI’09) USA, ,2009. 16. M. A. Montes de Oca, T. Stutzle, M. Birattari, M. Dorigo, "Frankenstein's PSO: A composite particle swarm optimization algorithm," IEEE Transactions on Evolutionary Computation, vol. 13, no. 5, pp. 1120-1132, Oct. 2009. 17. C. Weineng, Z. Jun, C. Henry S.H., Z. Wenliang, W. Weigang, S. Yuhui, Ä novel set-based particle swarmoptimization method for discrete optimization problems," IEEE Transactions on Evolutionary Computation, vol. 14, no. 2, pp. 278-300, Apr. 2010. 18. M. R. AIRashidi, M. E. El-Hawary, Ä survey of particle swarm optimization applications in electric power systems," IEEE Transactions on Evolutionary Computation, vol. 13, no. 4, pp. 913-918, Aug. 2009. 19. Beni.G, Wang.J, Swarm Intelligence in cellular robotic systems, precede NATO advanced workshop on robots & biological systems, Italy June 26-30 in 1989. 20. Winkielman&Schooler, 2011, Splitting consciousness: Unconscious, conscious, and metaconscious processes in social cognition, EUROPEAN REVIEW OF SOCIAL PSYCHOLOGY 2011, 22, 1–35 21. Singer, W., 2000, Phenomenal conscious ness and consciousness from a neurobiological perspective, In T. Metzinger (Ed.), Neural correlatesof consciousness: Empirical and Conceptual questions (pp. 121–138). Cambridge, MA: MIT Press. 22. Searle, J., 1997, The mystery of consciousness, New York: New York Review Press. 23. Robin, Schmidt, Shamantics, 2007, Conscious Studies, online book, available at http://en.wikibooks.org/wiki/consciousness_studied.pdf 24. M.V Vijayakumar, 2008, Society of Mind Approach to Cognition and Metacognition in a Cognitive Architecture, PhD Thesis (University of Hull, UK, 2008). 25. K.R.Shylaja, M V Vijayakumar, E V Prasad and Darryl. N Davis, 2012, Consciousness and Common Sense critics in Cognitive Architectures: Case Study of Society of Mind Cognitive Architecture, IJALR 2012. 26. Jacoby, L. L., Yonelinas, A. P., & Jennings, J. M., 1997, The relation between conscious and unconscious (automatic) influences: A declaration of independence. In J. C. Cohen & J. W. Schooler (Eds.), Scientific approaches to consciousness (pp. 13–48). Mahwah, NJ: Erlbaum..
    5 years ago by @ijiris
    (0)
     
     
  •  

    , , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume V (Issue IX): 492-496 (November 2018)1. Qaddumi, J., & Khawaldeh, A. Pressure ulcer prevention knowledge among Jordanian nurses: a cross-sectional study. BMC Nursing, 13(1). Nov. 2014 2. Calderon, M., Hurtado, L., Eugenio, A., Agustin, M., Cartaquis, M., Diaz, P., … Bautista, Q. (2017). The knowledge of nurses in pressure ulcer prevention and their attitude towards the use of the Braden scale. Retrieved from www.nursingrepository.org 3. Al Shidi, A. Thesis on Pressure management in Oman: Nurses’ knowledge and views. University of Glasgow. Sep. 2016 4. Uba, N., Alih, I., Kever, T., & Lola, N. Knowledge attitude and practice of nurses toward pressure ulcer prevention in University of Maiduguri Teaching Hospital, Borno State, North-Eastern Nigeria. International Journal of Nursing and Midwifery, 7(14), 54–60. July. 2015 5. Mwebaza, I., Katende, G., Groves, S., & Nankumbi, J. Nurses’ Knowledge, Practices, and Barriers in Care of Patients with Pressure Ulcers in a Ugandan Teaching Hospital. Journal of Nursing Research and Practice. Dec. 2014 6. Shrestha, R.. Knowledge and practices of bed sore prevention among staff nurses working in a selected hospital, Ludhiana, Punjab, India. Journal of Chitwan Medical College, 6(18), 18–23. Dec. 2016 7. Muna, S., Rula, F., Rawan, M., & Mohammad, S. Exploring Nurses’ Knowledge and Perceived Barriers to Carry Out Pressure Ulcer Prevention and Treatment, Documentation, and Risk Assessment. American International Journal of Contemporary Research, 4(4), 112–119. May. 2014 8. Al-Ghamdi, A. Factors Affecting Nurses’ Compliance in Preventing Pressure Ulcer Among Hospitalized Patients at King Abdulaziz University Hospital. American Journal of Nursing Science, 6(5), 387–395. May. 2017. 9. Dilie, A., & Mengistu, D. Assessment of Nurses’ Knowledge, Attitude, and Perceived Barriers to Expressed Pressure Ulcer Prevention Practice in Addis Ababa Government Hospitals, Addis Ababa, Ethiopia. Hindawi Publishing Corporation, Sep. 2015. 10. Bayoumi, M., & Bassuni, E. Saudi Nurses’ Level of Knowledge Regarding to Pressure Ulcer Preventive Measures. International Journal of Prevention and Treatment, 5(1), 7–11.Sep.2016 11. Nuru, N., Zewdu, F., Amsalu, S., & Mehretie, Y. Knowledge and practice of nurses towards prevention of pressure ulcer and associated factors in Gondar University Hospital, Northwest Ethiopia. BMC Nursing, 14(34), Sep. 2015. 12. Getanda, A., Chirchir, V., Omune, F., Tanui, C., Kosgey, A., & Ayumba, R. Awareness of Risk Assessment and Prevention of Pressure Ulcers amongst Nurses Working in Surgical and Orthopedic Wards of a Kenyan National Hospital. Kenya Journal of Nursing and Midwifery, 1(1), 1–10. July. 2016 13. McDonald, M. Systemic assessment of learning outcome: Developing multiple choice examinations (1st Edition). Sudbury MA: Jones & Bartiett Publishers.2002.
    5 years ago by @ijiris
    (1)
     
     
  •  

    , , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume V (Issue VIII): 486-491 (October 2018)1. Hinkle, J., & Cheever, K. Textbook of Medical Surgical Nursing (13th Edition). Lippincott Williams and Wilkins, 2014. 2. NPUAP, EPUAP, & PPPIA. Prevention and Treatment of Pressure Ulcers: Quick Reference Guide. 2014. 3. Durkin, D., & May, R. (2015). Stop the pressure. Available at http: //nhs.stopthepressure.co.uk/whats-happening.html. 4. Shrestha, R.. Knowledge and practices of bed sore prevention among staff nurses working in a selected hospital, Ludhiana, Punjab, India. Journal of Chitwan Medical College, 6(18), 18–23, Nov. 2016. 5. Chou, R., Dana, T., Bougatsos, C., Blazina, I., Starmer, A., Reitel, K., & Buckley, D. (2013). Pressure Ulcer Risk Assessment and Prevention: Comparative Effectiveness Review. Agency for Healthcare Research and Quality. Available at www.ahrq.gov 6. Nuru, N., Zewdu, F., Amsalu, S., & Mehretie, Y. Knowledge and practice of nurses towards prevention of pressure ulcer and associated factors in Gondar University Hospital, Northwest Ethiopia. BMC Nursing, 14(34), Sep. 2015. 7. Onigbinde, A., Ogunsanya, I., & Oniyangi, S. Pressure ulcer incidence among high-risk inpatients in Nigeria. British Journal of Nursing, 20(12), 4–11, June. 2012. 8. Nangole, F. Pressure ulcers presentations and management at Kenyatta National Hospital and Spinal Injury Hospital. East African Medical Journal, 5(12), 23-29, Dec. 2010. 9. Loikkanen, R., & Tamni, M. Pressure ulcer prevention and its implementation in practice-a literature review. Helsinki Metropolia University of Applied Sciences. Dec. 2016 10. NCK.) Manual of Clinical Procedures (3rd Edition). Nairobi: Nursing Council of Kenya. 2009. 11. MOH IP Register. Inpatient Register MOH 301. Republic of Kenya Ministry of Health. 2018. 12. Dilie, A., & Mengistu, D. Assessment of Nurses’ Knowledge, Attitude, and Perceived Barriers to Expressed Pressure Ulcer Prevention Practice in Addis Ababa Government Hospitals, Addis Ababa, Ethiopia. Hindawi Publishing Corporation, Sep. 2015. 13. Al-Ghamdi, A. Factors Affecting Nurses’ Compliance in Preventing Pressure Ulcer Among Hospitalized Patients at King Abdulaziz University Hospital. American Journal of Nursing Science, 6(5), 387–395. May. 2017. 14. Al Shidi, A. Thesis on Pressure management in Oman: Nurses’ knowledge and views. University of Glasgow. Sep. 2016 15. Getanda, A., Chirchir, V., Omune, F., Tanui, C., Kosgey, A., & Ayumba, R. Awareness of Risk Assessment and Prevention of Pressure Ulcers amongst Nurses Working in Surgical and Orthopedic Wards of a Kenyan National Hospital. Kenya Journal of Nursing and Midwifery, 1(1), 1–10. July. 2016 16. Mwebaza, I., Katende, G., Groves, S., & Nankumbi, J. Nurses’ Knowledge, Practices, and Barriers in Care of Patients with Pressure Ulcers in a Ugandan Teaching Hospital. Journal of Nursing Research and Practice. Dec. 2014.
    6 years ago by @ijiris
    (1)
     
     
  •  

    , , , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume V (Issue VIII): 475-485 (October 2018)1. Chalom, Edmond, Eran Asa, and Elior Biton. "Measuring image similarity: an overview of some useful applications." IEEE Instrumentation & Measurement Magazine 16.1 (2013): 24-28. 2. Chandler, Damon M. "Seven challenges in image quality assessment: past, present, and future research." ISRN Signal Processing 2013 (2013). 3. Chandler, Damon M., Md Mushfiqul Alam, and Thien D. Phan. "Seven challenges for image quality research." Human Vision and Electronic Imaging XIX. Vol. 9014. International Society for Optics and Photonics, 2014. 4. Lajevardi, Seyed Mehdi, and Zahir M. Hussain. "Zernike moments for facial expression recognition." rn 2 (2009): 3. 5. Lajevardi, Seyed Mehdi, and Zahir M. Hussain. "Higher order orthogonal moments for invariant facial expression recognition." Digital Signal Processing 20.6 (2010): 1771-1779. 6. Pass, Greg, and Ramin Zabih. "Comparing images using joint histograms." Multimedia systems 7.3 (1999): 234-240. 7. Shnain, Noor Abdalrazak, Zahir M. Hussain, and Song Feng Lu. Ä feature-based structural measure: An image similarity measure for face recognition." Applied Sciences 7.8 (2017): 786. 8. Wang, Zhou, et al. "Image quality assessment: from error visibility to structural similarity." IEEE transactions on image processing 13.4 (2004): 600-612. 9. Zhang, Lin, et al. "FSIM: a feature similarity index for image quality assessment." IEEE transactions on Image Processing20.8 (2011): 2378-2386. 10. Aljanabi, Mohammed Abdulameer, Zahir M. Hussain, and Song Feng Lu. Än entropy-histogram approach for image similarity and face recognition." Mathematical Problems in Engineering 2018 (2018). 11. Aljanabi, Mohammed Abdulameer, Noor Abdalrazak Shnain, and Song Feng Lu. Än image similarity measure based on joint histogram—Entropy for face recognition." Computer and Communications (ICCC), 2017 3rd IEEE International Conference on. IEEE, 2017. 12. Hwang, Sun-Kyoo, and Whoi-Yul Kim. Ä novel approach to the fast computation of Zernike moments." Pattern Recognition 39.11 (2006): 2065-2076. 13. Canny, John. Ä computational approach to edge detection." IEEE Transactions on pattern analysis and machine intelligence 6 (1986): 679-698. 14. Picard, C. F. "The use of information theory in the study of the diversity of biological populations." Proc. Fifth Berk. Symp. IV. 1979. 15. Ponomarenko, Nikolay, et al. "TID2008-a database for evaluation of full-reference visual quality assessment metrics." Advances of Modern Radioelectronics 10.4 (2009): 30-45. 16. Ninassi, A., P. Le Callet, and F. Autrusseau. "Subjective quality assessment-IVC database." online http://www. irccyn. ec-nantes. fr/ivcdb (2006). 17. “Laboratories, A.T. The Database of Faces,” http://www.cl.cam.ac.uk/research/dtg/attarchive/facedatabase.html 18. “FEI Face Database,” http://fei.edu.br/∼cet/facedatabase.html.
    6 years ago by @ijiris
    (0)
     
     
  •  

    , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume V (Issue VIII): 471-474 (September 2018)1. K. Wu and C. Wang, “Steganography using reversible texture synthesis” IEEE Transactions on Image Processing Vol.24 pp 130-139,January 2015 2. Shreyank N Gowda, “An Advanced Diffie-Hellman Approach to Image Steganography ” IEEE Transactions on advance network and telecommunication system Vol.19 pp 1-4,june 2016 3. Sherin Sugathan, “An Improved LSB Embedding Technique for Image Steganography ” International conference on applied and theoretical computing and communication technology Vol.33 pp 609-612,2016 4. S. Singh and V. K. Attri Dual Layer Security of data using LSB Image Steganography Method and AES Encryption Algorithm International Journal of Signal Processing, Image Processing and Pattern Recognition Vol. 8, No. 5 , pp. 259-266 ,2015 5. Utsav Sheth and Shiva Saxena, “Image Steganography Using AES Encryption and Least Significant Nibble ” International conference on communication and signal processing Vol.11 pp 0876-0879,2016 6. Radu Pietraru, “Secure communication method based on encryption and steganography” International conference on control system and computer science Vol.31 pp 453-458,2017 7. Y Manjula and K B Shivakumar ,”Enhanced Secured Image Steganography using Double Encryption Algorithm” International Conference on Computing for Sustainable Global Development (IndiaCom),2016 8. Tanushree Shelare and Varsha Powar,”A secure transmission approach using B-Trees in steganography”International Conference on Automatic Control and Dynamic Optimization Techniques,2016 9. https://www.sans.org/reading-room/whitepapers/vpns/review-chaffing-winnowing-876 10. http://www.asp.net/: This is the official Microsoft ASP.NET web site. It has a lot of: tutorials, training videos, and sample projects. 11. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6850714&queryText%3Dimage+steganography 12. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6658020&queryText%3Dimage+steganography.
    6 years ago by @ijiris
    (1)
     
     
  •  

    , , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume V (Issue IX): 465-470 (September 2018)1. Hussein T. Mouftah Khaled A. Ali, "Wireless personal area networks architecture and protocols for multimedia applications," Ad Hoc Networks, vol. 9, pp. 675–686, 2011. 2. Prashant Pillai, Vince W.C. Chook, Stefano Chessa, Alberto Gotta,Y. Fun Hu Paolo Baronti, "Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards," Computer Communications, vol. 30, pp. 1655–1695, 2007. 3. ZigBee Alliance, ZigBee Specification, January.2008, ZigBee Document 053474r17. 4. Kamaran Javed , “ZigBee suitability for Wirelee Sensor Networks in Logistic Telemetry Applications”, School of information Science,Computer and Electrical Engineering, Jan 2006 5. Ricardo Augusto Rodrigues da Silva Severino, Ön the use of IEEE 802.15.4/ZigBee for Time-Sensitive Wireless Sensor Network Applications," Polytechnic Institute of Porto, 2008. 6. F. Cuomo et al., Cross-layer network formation for energy-efficient IEEE 802.15.4/ZigBee Wireless Sensor Networks, Ad Hoc Netw. (2011). 7. Standard for part 15.4: Wireless MAC and PHY specifications for low rate WPAN, IEEE Std 802.15.4, IEEE, New York, NY (Oct 2003). 8. Vijay Anand Sai Ponduru Archana Bharathidasan, "Sensor Networks: An Overview," Department of Computer Science, University of California, Davis, CA 95616,. 9. Nidhi Patel, Hiren Kathiriya , Arjav Bavarva , “Wireless Sensor Network using ZigBee “,Intenational Journal of Research in Engineering and Technology, Vol 2, Issue 6, Jun 2013 10. A. Geetha , “Intelligent Helmet for Coal Minors with voice over ZigBee and Environmental Monitoring” , Middle East Journal of Scentific Research , ISSN 1990-9233,IDOSI Publications 2014. 11. Action Nechibvute, Courage Mudzingw, “Wireless Sensor Networks for SCADA and Industrial Control Systems” , International Journal of Engineering and Technology , Vol 3 No. 12, Dec2013. 12. Hariprabha .V, Vasantharathna .S, “Monitoring and control of food storage depots using Wireless Sensor Network” , International Journal of Industrial Electronics and Electrical Engineering, ISSN 2437-6982,Vol 2 Issue 6 June 2014. 13. Dipali K Shende , Arun K Mane , Rahul K More , Nikel M Nawale , “ARM 7 based Wireless Data Transmission using ZigBee” , International Journal of Innovative research in Electrical, Electronics , Instrumentation and Control Engineering, Vol3 Issue 5, may 2015..
    6 years ago by @ijiris
    (1)