12 resultados para computer programmes
em Cochin University of Science
Resumo:
Department of Computer Applications, Cochin University of Science and Technology
Resumo:
Farm communication and extension programs are vital part of the farm development attempts. Electronic media plays a major role in farm extension activities. Kerala, the consumer state, which was a complete agricultural state in pre-independence period, is the sprouting land of agricultural extension and publication activities in print media. Later AIR (All India Radio) farm programs and farm broadcasting of Doordarshan enriched the role of electronic media in farm extension activities. The media saturated southern state of India received this new electronic media farm communication revolution whole heartedly. However, after 1990, Kerala witnessed a flood of private T V channels and currently there are 24 channels in this regional language, named Malayalam. All major news and entertainment channels are broadcasting farm programs. Farm programs of AIR and Doordarshan, broadcasted in Malayalam language, have been well accepted to the farmers‘ in Kerala. However, post-independence period, witnessed the formation of Kerala state in Indian Union and the first ballot-elected communist Government started its administration. After the land reform bills, the state witnessed a gradual decrease in agricultural production. Even if it is not reflected much in the attitude and practices of farm community and farm broadcast of traditional electronic broadcasting, a change is observable after the post-liberalization era of India. Private Television channels, which were focused on entertainment value of programs, started broadcasting farm programs and the parameters of program production went through certain changes. In this situation, there is ample relevance for a study about the farm programs of electronic media in terms of a comparative study of audience perception. The study is limited in the state of Kerala as it is the most media saturated state in India. The study analyzes the rate, nature and scope of adoption of farming methods transmitted through electronic media (T.V. and Radio) in Malayalam language.All kinds of Farm programs including comprehensive program serials, success stories, seasonal cropping methods, experts opinion, been analyzed on the basis of the following objectives. To find whether propagating new farm methods through farm programs in electronic media or the availability of adequate infrastructure and economic factors make a farmer to adopt a new farming method. To find which electronic media has more influence on farmers to adopt agricultural programs. To find which form of electronic media gets better feedback from farmers To find out whether the programs of T.V. or Radio is more acceptable to farmers than the print media. To find whether farmers gets the message through their preferred medium for the message. The researcher recorded opinions from a panel of agricultural officers, farm Information officers, agro extension researchers and experts. According to their opinions and guidelines, a pilot study is designed and conducted in Kanjikuzhy Panchayath, in Alappuzha district, Kerala. The Panchayath is selected by considering its ideal nature of being the sample for a social Science research. Besides, the nature of farming in the Panchayath, which devoid of the cultivation of cash crops also supported its sample value. As per the observations from the pilot study, researcher confirmed the Triangulation method as the methodology of research. The questionnaire survey, being the primary part contained 42 Questions with 6 independent and 32 dependent variables. The survey is conducted among 400 respondents in Idukki, Alappuzha and Pathanamthitta districts considering geographical differences and distribution of different types of crops. The response from a total of 360 respondents, 120 from each district, finally selected for tabulation and data analysis.The data analysis, based on percentage analysis, along with the results from focus group discussion among a selected group of 20 farmers, together produced the results as follows. Farmers, who are the audience of farm programs, have a very serious approach towards the medium. They are maintaining a critical point of view towards the content of the programs. Farmers are reasonably aware about the financial side of the programs and the monitory aspirations of both private and Government owned Television channels. Even though, the farmers are not aware on the technical terminology and jargons, they have ideas about success stories, program serials and they are even informed about channels are not maintaining an audience research section like AIR. Though the farmers accept Doordarshan as the credential source of farm information and methods, they are inclined to the entertainment value of programs too. They prefer to have more entertainment value for the programs of Doordarshan. Surprisingly, they have very solid suggestions on even about the shots which add entertainment value to the farm broadcasting methods of Doordarshan. Farmers are very much aware about the fact that media is just an instrument for inspiration and persuasion. They strongly believe that the source of information and new methods is agricultural research and an effective change happens only when there are adequate infrastructure and marketing facilities, along with the proper support from Government agricultural guideline and support systems like Krishi Bhavans. They strongly believe that media alone cannot create any magic in increasing agricultural production. Farmers are pointing out the lack of response to the feedback and queries of farmers on farming methods, as an evidence for the difference in levels of commitment of Government and private owned Television channels.Farmers are still perceiving AIR farm programs are far more committed to farmers and farming than any other electronic medium. However, they are seriously lacking Radio receivers with medium wave reception facility. Farmers perceive that the farming methods on new crops are more adoptable than the farming methods of traditional crops in both private and Government owned Television channels. There are multiple factors behind this observation from farmers. Farmers changed in terms of viewing habits and they prefer success stories, which are totally irrelevant and they even think that such stories encourage people to go for farming and they opined that such stories are good sources of inspiration. However, they are all very much sure about the importance and particular about the presence of entertainment factor even in farm programs. Farmers expect direct interaction of any expert of the new farming method to implement the method in their agriculture practices. Though introduction of a new idea in the T.V. is acceptable, farmers need the direct instruction of expert on field to start implementing the new farming practices Farmers still have an affinity towards print media reports and agricultural pages and they have complaints to print media on the removal of agricultural information pages from news papers. They prefer the reports in print media as it facilitates them to collect and refer articles when they need it. Farmers are having an eye of doubt about the credibility of farm programs by private T.V. channels. Even if they prefer private Television channels for listening and adopting new farming methods and other farm information, they scrutinize programs to know whether they are sponsored programs by agrochemical or agro-fertilizer manufacturer.
Resumo:
This thesis deals with the use of simulation as a problem-solving tool to solve a few logistic system related problems. More specifically it relates to studies on transport terminals. Transport terminals are key elements in the supply chains of industrial systems. One of the problems related to use of simulation is that of the multiplicity of models needed to study different problems. There is a need for development of methodologies related to conceptual modelling which will help reduce the number of models needed. Three different logistic terminal systems Viz. a railway yard, container terminal of apart and airport terminal were selected as cases for this study. The standard methodology for simulation development consisting of system study and data collection, conceptual model design, detailed model design and development, model verification and validation, experimentation, and analysis of results, reporting of finding were carried out. We found that models could be classified into tightly pre-scheduled, moderately pre-scheduled and unscheduled systems. Three types simulation models( called TYPE 1, TYPE 2 and TYPE 3) of various terminal operations were developed in the simulation package Extend. All models were of the type discrete-event simulation. Simulation models were successfully used to help solve strategic, tactical and operational problems related to three important logistic terminals as set in our objectives. From the point of contribution to conceptual modelling we have demonstrated that clubbing problems into operational, tactical and strategic and matching them with tightly pre-scheduled, moderately pre-scheduled and unscheduled systems is a good workable approach which reduces the number of models needed to study different terminal related problems.
Resumo:
Modern computer systems are plagued with stability and security problems: applications lose data, web servers are hacked, and systems crash under heavy load. Many of these problems or anomalies arise from rare program behavior caused by attacks or errors. A substantial percentage of the web-based attacks are due to buffer overflows. Many methods have been devised to detect and prevent anomalous situations that arise from buffer overflows. The current state-of-art of anomaly detection systems is relatively primitive and mainly depend on static code checking to take care of buffer overflow attacks. For protection, Stack Guards and I-leap Guards are also used in wide varieties.This dissertation proposes an anomaly detection system, based on frequencies of system calls in the system call trace. System call traces represented as frequency sequences are profiled using sequence sets. A sequence set is identified by the starting sequence and frequencies of specific system calls. The deviations of the current input sequence from the corresponding normal profile in the frequency pattern of system calls is computed and expressed as an anomaly score. A simple Bayesian model is used for an accurate detection.Experimental results are reported which show that frequency of system calls represented using sequence sets, captures the normal behavior of programs under normal conditions of usage. This captured behavior allows the system to detect anomalies with a low rate of false positives. Data are presented which show that Bayesian Network on frequency variations responds effectively to induced buffer overflows. It can also help administrators to detect deviations in program flow introduced due to errors.
Resumo:
The application of computer vision based quality control has been slowly but steadily gaining importance mainly due to its speed in achieving results and also greatly due to its non- destnictive nature of testing. Besides, in food applications it also does not contribute to contamination. However, computer vision applications in quality control needs the application of an appropriate software for image analysis. Eventhough computer vision based quality control has several advantages, its application has limitations as to the type of work to be done, particularly so in the food industries. Selective applications, however, can be highly advantageous and very accurate.Computer vision based image analysis could be used in morphometric measurements of fish with the same accuracy as the existing conventional method. The method is non-destructive and non-contaminating thus providing anadvantage in seafood processing.The images could be stored in archives and retrieved at anytime to carry out morphometric studies for biologists.Computer vision and subsequent image analysis could be used in measurements of various food products to assess uniformity of size. One product namely cutlet and product ingredients namely coating materials such as bread crumbs and rava were selected for the study. Computer vision based image analysis was used in the measurements of length, width and area of cutlets. Also the width of coating materials like bread crumbs was measured.Computer imaging and subsequent image analysis can be very effectively used in quality evaluations of product ingredients in food processing. Measurement of width of coating materials could establish uniformity of particles or the lack of it. The application of image analysis in bacteriological work was also done
Resumo:
This thesis throws light on the influence of community in the social life of mankind. The study revolves round the fact that health care is by the people rather than health care is for the people. The thesis tries to analyze the role of community organizational social agencies in the control of Filariasis.The study examines the factors which influence community participation. and the effectiveness of health education in the control of Filariasis.the thesis emphasizes the effective tools and means of health education That helps to To evolve an appropriate method for the management of community Participation. The study shows that. A well informed community can participate successfully and meaningfully in disease control programmes.
Resumo:
This makes a thorough study of Role of Academic Bodies with Special Reference to the Academic Programmes in the Universities in Kerala. The present study has dealt with the constitution, powers and functions of the authorities of the universities in Kerala, especially the academic bodies which have well-defined powers and function. This thesis gives in detail the role and functions of the academic bodies in the four universities in Kerala, under study: and examines the role-effectiveness of these bodies. To sum up, it can be concluded that the academic bodies in the universities in Kerala do not function as effectively as envisaged in the laws of the universities. They have a maintenance-oriented approach rather than a dynamic one, without thinking in terms of introducing innovations. They need improvement in the various aspects of their constitution, selection of members and their mode of functioning
Resumo:
Traffic Management system (TMS) comprises four major sub systems: The Network Database Management system for information to the passengers, Transit Facility Management System for service, planning, and scheduling vehicle and crews, Congestion Management System for traffic forecasting and planning, Safety Management System concerned with safety aspects of passengers and Environment. This work has opened a rather wide frame work of model structures for application on traffic. The facets of these theories are so wide that it seems impossible to present all necessary models in this work. However it could be deduced from the study that the best Traffic Management System is that whichis realistic in all aspects is easy to understand is easy to apply As it is practically difficult to device an ideal fool—proof model, the attempt here has been to make some progress-in that direction.
Resumo:
The development of computer and network technology is changing the education scenario and transforming the teaching and learning process from the traditional physical environment to the digital environment. It is now possible to access vast amount of information online and enable one to one communication without the confines of place or time. While E-learning and teaching is unlikely to replace face-to-face training and education it is becoming an additional delivery method, providing new learning opportunities to many users. It is also causing an impact on library services as the increased use of ICT and web based learning technologies have paved the way for providing new ICT based services and resources to the users. Online learning has a crucial role in user education, information literacy programmes and in training the library professionals. It can help students become active learners, and libraries will have to play a greater role in this process of transformation. The significance of libraries within an institution has improved due to the fact that academic libraries and information services are now responsible for e-learning within their organization.
Resumo:
In this computerized, globalised and internet world our computer collects various types of information’s about every human being and stores them in files secreted deep on its hard drive. Files like cache, browser history and other temporary Internet files can be used to store sensitive information like logins and passwords, names addresses, and even credit card numbers. Now, a hacker can get at this information by wrong means and share with someone else or can install some nasty software on your computer that will extract your sensitive and secret information. Identity Theft posses a very serious problem to everyone today. If you have a driver’s license, a bank account, a computer, ration card number, PAN card number, ATM card or simply a social security number you are more than at risk, you are a target. Whether you are new to the idea of ID Theft, or you have some unanswered questions, we’ve compiled a quick refresher list below that should bring you up to speed. Identity theft is a term used to refer to fraud that involves pretending to be someone else in order to steal money or get other benefits. Identity theft is a serious crime, which is increasing at tremendous rate all over the world after the Internet evolution. There is widespread agreement that identity theft causes financial damage to consumers, lending institutions, retail establishments, and the economy as a whole. Surprisingly, there is little good public information available about the scope of the crime and the actual damages it inflicts. Accounts of identity theft in recent mass media and in film or literature have centered on the exploits of 'hackers' - variously lauded or reviled - who are depicted as cleverly subverting corporate firewalls or other data protection defenses to gain unauthorized access to credit card details, personnel records and other information. Reality is more complicated, with electronic identity fraud taking a range of forms. The impact of those forms is not necessarily quantifiable as a financial loss; it can involve intangible damage to reputation, time spent dealing with disinformation and exclusion from particular services because a stolen name has been used improperly. Overall we can consider electronic networks as an enabler for identity theft, with the thief for example gaining information online for action offline and the basis for theft or other injury online. As Fisher pointed out "These new forms of hightech identity and securities fraud pose serious risks to investors and brokerage firms across the globe," I am a victim of identity theft. Being a victim of identity theft I felt the need for creating an awareness among the computer and internet users particularly youngsters in India. Nearly 70 per cent of Indian‘s population are living in villages. Government of India already started providing computer and internet facilities even to the remote villages through various rural development and rural upliftment programmes. Highly educated people, established companies, world famous financial institutions are becoming victim of identity theft. The question here is how vulnerable the illiterate and innocent rural people are if they suddenly exposed to a new device through which some one can extract and exploit their personal data without their knowledge? In this research work an attempt has been made to bring out the real problems associated with Identity theft in developed countries from an economist point of view.
Resumo:
Pedicle screw insertion technique has made revolution in the surgical treatment of spinal fractures and spinal disorders. Although X- ray fluoroscopy based navigation is popular, there is risk of prolonged exposure to X- ray radiation. Systems that have lower radiation risk are generally quite expensive. The position and orientation of the drill is clinically very important in pedicle screw fixation. In this paper, the position and orientation of the marker on the drill is determined using pattern recognition based methods, using geometric features, obtained from the input video sequence taken from CCD camera. A search is then performed on the video frames after preprocessing, to obtain the exact position and orientation of the drill. An animated graphics, showing the instantaneous position and orientation of the drill is then overlaid on the processed video for real time drill control and navigation
Resumo:
In this paper the effectiveness of a novel method of computer assisted pedicle screw insertion was studied using testing of hypothesis procedure with a sample size of 48. Pattern recognition based on geometric features of markers on the drill has been performed on real time optical video obtained from orthogonally placed CCD cameras. The study reveals the exactness of the calculated position of the drill using navigation based on CT image of the vertebra and real time optical video of the drill. The significance value is 0.424 at 95% confidence level which indicates good precision with a standard mean error of only 0.00724. The virtual vision method is less hazardous to both patient and the surgeon