Abstract: | Marketing of information services is now an important goal of librarians all over the ~orld t? attract mor~ users to the libr~ry. thereby promoting user satisfaction. Marketing IS considered ~s ~n Integr~1 part of libraries and information centres mainly due to the developments In information t.echnology, information explosion, and declining library budgets. Kotler defines marketing as the "analysis, planning, implementation and control o~ carefully formulated programs designed to bring about voluntary exchanges of values WIth target markets fo~ the ~~rpos~ of~chievingorganizational objectives". Organizations suc.h as museums, unrversittes, libraries, and charities need to market their causes and their products to gain. political and social support as well as economic support (Kotler, 1995). In the marketing world people are now migrating from the traditional Four P ~lodelto th~ S~VE mode! (Alt~ns~n, 2013). According to the SAVE model, marketing III an orgarusanon must grve pnonty to 'Solutions' instead of the features or functions of~he.'Product" Similarily it is to focus on 'Access', instead of ,Place'; 'Value' instead of Price" so that the benefits are more stressed, rather than production costs. Instead of :Proliloti.on', marketi~g has. to conc~ntrate on 'Educating' the customers, providing lJlfo~mahol~ about t~eJr specific req~lrements, instead of relying on advertising, public rel~tlons, direct selling etc. From a library point ofview, to ensure maximum utilization of library ~ervices there is an increasing need for definite marketing plans to exploit the techn.ologlcal dcvelop",len~s so ~s to entice the users. By anticipating their changing needs and ~y co.mmulllcatl~g WIth them it should be possible to devise strategies to present various library services and products in a perceptive style. |
Description: | E-Infrastructure In Libraries,2013 |
URI: | http://dyuthi.cusat.ac.in/purl/3983 |
Files | Size |
---|---|
Marketing of Li ... anAcademic Environment.pdf | (1.292Mb) |
Abstract: | Two distinct nitrifying bacterial consortia, namely an ammonia oxidizing non-penaeid culture (AMO NPCU-1) and an ammonia oxidizing penaeid culture (AMOPCU-1), have been mass produced in a nitrifying bacterial consortia production unit (NBCPU). The consortia, maintained at 4 C were activated and cultured in a 2 l fermentor initially. At this stage the net biomass (0.105 and 0.112 g/l), maximum specific growth rate (0.112 and 0.105/h) and yield coefficients (1.315 and 2.08) were calculated respectively, for AMONPCU-1 and AMOPCU-1 on attaining stationary growth phase. Subsequently on mass production in a 200 l NBCPU under optimized culture conditions, the total amounts of NH4 ?–N removed by AMONPCU-1 and AMOPCU-1 were 1.948 and 1.242 g/l within 160 and 270 days, respectively. Total alkalinity reduction of 11.7–14.4 and 7.5–9.1 g/l were observed which led to the consumption of 78 and 62 g Na2CO3. The yield coefficient and biomass of AMONPCU-1 were 0.67 and 125.3 g/l and those of AMOPCU-1 were 1.23 and 165 g/l. The higher yield coefficient and growth rate of AMOPCU-1 suggest better energy conversion efficiency and higher CO2 fixation potential. Both of the consortia were dominated by Nitrosomonas-like organisms. The consortia may find application in the establishment of nitrification within marine and brackish water culture systems. |
Description: | World J Microbiol Biotechnol (2009) 25:407–414 DOI 10.1007/s11274-008-9905-1 |
URI: | http://dyuthi.cusat.ac.in/purl/4046 |
Files | Size |
---|---|
Mass production ... ng aquaculture systems.pdf | (377.2Kb) |
Abstract: | The focus of this paper is to develop computationally efficient mathematical morphology operators on hypergraphs. To this aim we consider lattice structures on hypergraphs on which we build morphological operators. We develop a pair of dual adjunctions between the vertex set and the hyperedge set of a hypergraph 𝐻, by defining a vertex-hyperedge correspondence. This allows us to recover the classical notion of a dilation/erosion of a subset of vertices and to extend it to subhypergraphs of 𝐻. This paper also studies the concept of morphological adjunction on hypergraphs for which both the input and the output are hypergraphs |
Description: | ISRN Discrete Mathematics Volume 2014, Article ID 436419, 6 pages |
URI: | http://dyuthi.cusat.ac.in/purl/4222 |
Files | Size |
---|---|
Mathematical Mo ... peredge Correspondence.pdf | (2.544Mb) |
Abstract: | In this paper we propose a cryptographic transformation based on matrix manipulations for image encryption. Substitution and diffusion operations, based on the matrix, facilitate fast conversion of plaintext and images into ciphertext and cipher images. The paper describes the encryption algorithm, discusses the simulation results and compares with results obtained from Advanced Encryption Standard (AES). It is shown that the proposed algorithm is capable of encrypting images eight times faster than AES. |
Description: | Recent Advances in Intelligent Computational Systems (RAICS), 2011 IEEE |
URI: | http://dyuthi.cusat.ac.in/purl/4518 |
Files | Size |
---|---|
Matrix based Cr ... cient image encryption.pdf | (1.210Mb) |
Abstract: | In symmetric block ciphers, substitution and diffusion operations are performed in multiple rounds using sub-keys generated from a key generation procedure called key schedule. The key schedule plays a very important role in deciding the security of block ciphers. In this paper we propose a complex key generation procedure, based on matrix manipulations, which could be introduced in symmetric ciphers. The proposed key generation procedure offers two advantages. First, the procedure is simple to implement and has complexity in determining the sub-keys through crypt analysis. Secondly, the procedure produces a strong avalanche effect making many bits in the output block of a cipher to undergo changes with one bit change in the secret key. As a case study, matrix based key generation procedure has been introduced in Advanced Encryption Standard (AES) by replacing the existing key schedule of AES. The key avalanche and differential key propagation produced in AES have been observed. The paper describes the matrix based key generation procedure and the enhanced key avalanche and differential key propagation produced in AES. It has been shown that, the key avalanche effect and differential key propagation characteristics of AES have improved by replacing the AES key schedule with the Matrix based key generation procedure |
Description: | International Conference on VLSI, Communication & Instrumentation (ICVCI) 2011 |
URI: | http://dyuthi.cusat.ac.in/purl/4519 |
Files | Size |
---|---|
Matrix based Ke ... ed Encryption Standard.pdf | (236.1Kb) |
Abstract: | Laser‐induced damage and ablation thresholds of bulk superconducting samples of Bi2(SrCa)xCu3Oy(x=2, 2.2, 2.6, 2.8, 3) and Bi1.6 (Pb)xSr2Ca2Cu3 Oy (x=0, 0.1, 0.2, 0.3, 0.4) for irradiation with a 1.06 μm beam from a Nd‐YAG laser have been determined as a function of x by the pulsed photothermal deflection technique. The threshold values of power density for ablation as well as damage are found to increase with increasing values of x in both systems while in the Pb‐doped system the threshold values decrease above a specific value of x, coinciding with the point at which the Tc also begins to fall. |
URI: | http://dyuthi.cusat.ac.in/purl/2577 |
Files | Size |
---|---|
Dyuthi-P0137.pdf | (947.3Kb) |
Abstract: | The dual-beam thermal lens technique has been found to be very effective for the measurement of fluorescence quantum yields of dye solutions. The concentration-dependence of the quantum yield of rhodamine B in methanol is studied here using this technique. The observed results are in line with the conclusion that the reduction in the quantum yield in the quenching region is essentially due to the non-radiative relaxation of the absorbed energy. The thermal lens has been found to become abberated above 40 mW of pump laser power. This low value for the upper limit of pump power is due to the fact that the medium is a resonantly absorbing one. |
URI: | http://dyuthi.cusat.ac.in/purl/2453 |
Files | Size |
---|---|
Dyuthi-P0314.pdf | (115.8Kb) |
URI: | http://dyuthi.cusat.ac.in/purl/2658 |
Files | Size |
---|---|
Dyuthi-P0339.pdf | (198.7Kb) |
Abstract: | A simple experimental set-up is described to measure the electromagnetic shielding property of high Tc superconducting samples. Measurements were performed using HTSC materials in the form of laser ablated thin films, powders and sintered pellets. Samples used were Gd-123 in pure and doped form as well as a few Bi-based superconducting ceramics. For comparison, similar measurements were carried out on metals like aluminium, copper and μ metal. Very effective shielding was observed for HTSC materials compared to the conventional materials mentioned above. However it also depended on the sample types and poor shielding was observed for powdered HTSC material in comparison to thin films prepared by laser ablation. |
URI: | http://dyuthi.cusat.ac.in/purl/2657 |
Files | Size |
---|---|
Dyuthi-P0338.pdf | (195.2Kb) |
Abstract: | High strength and high performance concrete are being widely used all over the world. Most of the applications of high strength concrete have been found in high rise buildings, long span bridges etc. The potential of rice husk ash as a cement replacement material is well established .Earlier researches showed an improvement in mechanical properties of high strength concrete with finely ground RHA as a partial cement replacement material. A review of literature urges the need for optimizing the replacement level of cement with RHA for improved mechanical properties at optimum water binder ratio. This paper discusses the mechanical properties of RHA- High strength concrete at optimized conditions |
Description: | American Journal of Engineering Research (AJER),Volume-3 pp-14-19 |
URI: | http://dyuthi.cusat.ac.in/purl/4643 |
Files | Size |
---|---|
Mechanical Prop ... High strength Concrete.pdf | (444.0Kb) |
Abstract: | A series of short-isora-fiber-reinforced natural rubber composites were prepared by the incorporation of fibers of different lengths (6, 10, and 14 mm) at 15 phr loading and at different concentrations (10, 20, 30, and 40 phr) with a 10 mm fiber length. Mixes were also prepared with 10 mm long fibers treated with a 5% NaOH solution. The vulcanization parameters, processability, and stress-strain properties of these composites were analyzed. Properties such as tensile strength, tear strength, and tensile modulus were found to be at maximum for composites containing longitudinally oriented fibers 10 mm in length. Mixes containing fiber loadings of 30 phr with bonding agent (resorcinol-formaldehyde [RF] resin) showed mechanical properties superior to all other composites. Scanning electron microscopy (SEM) studies were carried out to investigate the fiber surface morphology, fiber pullout, and fiber-rubber interface. SEM studies showed that the bonding between the fiber and rubber was improved with treated fibers and with the use of bonding agent. |
URI: | http://dyuthi.cusat.ac.in/purl/808 |
Files | Size |
---|---|
Lovely Mathew a ... roperties...,April2006.PDF | (8.573Mb) |
Abstract: | This paper presents the results from an experimental program and an analytical assessment of the influence of addition of fibers on mechanical properties of concrete. Models derived based on the regression analysis of 60 test data for various mechanical properties of steel fiber-reinforced concrete have been presented. The various strength properties studied are cube and cylinder compressive strength, split tensile strength, modulus of rupture and postcracking performance, modulus of elasticity, Poisson’s ratio, and strain corresponding to peak compressive stress. The variables considered are grade of concrete, namely, normal strength 35 MPa , moderately high strength 65 MPa , and high-strength concrete 85 MPa , and the volume fraction of the fiber Vf =0.0, 0.5, 1.0, and 1.5% . The strength of steel fiber-reinforced concrete predicted using the proposed models have been compared with the test data from the present study and with various other test data reported in the literature. The proposed model predicted the test data quite accurately. The study indicates that the fiber matrix interaction contributes significantly to enhancement of mechanical properties caused by the introduction of fibers, which is at variance with both existing models and formulations based on the law of mixtures |
Description: | Journal of Materials in Civil Engineering, Vol. 19, No. 5, May 1, 2007. |
URI: | http://dyuthi.cusat.ac.in/purl/4537 |
Files | Size |
---|---|
Mechanical Prop ... er-Reinforced Concrete.pdf | (143.9Kb) |
Abstract: | Mn1−xZnxFe2O4 nanoparticles (x = 0 to 1) were synthesized by the wet chemical co-precipitation technique. X-ray diffraction and transmission electron microscopy and high resolution transmission electron microscopy were effectively utilized to investigate the different structural parameters. The ac conductivity of nanosized Mn1−xZnxFe2O4 were investigated as a function of frequency, temperature and composition. The frequency dependence of ac conductivity is analysed by the power law σ(ω)ac = Bωn which is typical for charge transport by hopping or tunnelling processes. The temperature dependence of frequency exponent n was investigated to understand the conduction mechanism in different compositions. The conduction mechanisms are mainly based on polaron hopping conduction |
Description: | J. Phys. D: Appl. Phys. 42 (2009) 165005 (8pp) |
URI: | http://dyuthi.cusat.ac.in/purl/4397 |
Files | Size |
---|---|
Mechanism of ac ... se zinc mixed ferrites.pdf | (2.619Mb) |
Abstract: | Polyfurfural thin films lying in the thickness range of 1300–2000 A˚ were prepared by ac plasma polymerization technique. The current–voltage characteristics in symmetric and asymmetric electrode configuration were studied with a view to determining the dominant conduction mechanism.It was found that the Schottky conduction mechanism is dominant in plasma polymerized furfural thin films.The predominance of Schottky mechanism was further confirmed based on the thermally stimulated current measurements. |
URI: | http://dyuthi.cusat.ac.in/purl/2832 |
Files | Size |
---|---|
Dyuthi-P00388.pdf | (231.2Kb) |
Abstract: | Following the Majority Strategy in graphs, other consensus strategies, namely Plurality Strategy, Hill Climbing and Steepest Ascent Hill Climbing strategies on graphs are discussed as methods for the computation of median sets of pro¯les. A review of algorithms for median computation on median graphs is discussed and their time complexities are compared. Implementation of the consensus strategies on median computation in arbitrary graphs is discussed |
Description: | Report/Econometric Institute, Erasmus University Rotterdam,EI 2007-34 |
URI: | http://dyuthi.cusat.ac.in/purl/4218 |
Files | Size |
---|---|
Median computat ... g consensus strategies.pdf | (195.4Kb) |
Abstract: | The median of a profile = (u1, . . . , uk ) of vertices of a graph G is the set of vertices x that minimize the sum of distances from x to the vertices of . It is shown that for profiles with diameter the median set can be computed within an isometric subgraph of G that contains a vertex x of and the r -ball around x, where r > 2 − 1 − 2 /| |. The median index of a graph and r -joins of graphs are introduced and it is shown that r -joins preserve the property of having a large median index. Consensus strategies are also briefly discussed on a graph with bounded profiles. |
Description: | Discrete Applied Mathematics 156 (2008) 2882–2889 |
URI: | http://dyuthi.cusat.ac.in/purl/4216 |
Files | Size |
---|---|
The median func ... with bounded profiles.pdf | (410.2Kb) |
Abstract: | A periphery transversal of a median graph G is introduced as a set of vertices that meets all the peripheral subgraphs of G. Using this concept, median graphs with geodetic number 2 are characterized in two ways. They are precisely the median graphs that contain a periphery transversal of order 2 as well as the median graphs for which there exists a profile such that the remoteness function is constant on G. Moreover, an algorithm is presented that decides in O(mlog n) time whether a given graph G with n vertices and m edges is a median graph with geodetic number 2. Several additional structural properties of the remoteness function on hypercubes and median graphs are obtained and some problems listed |
Description: | University of Ljubljana Institute of Mathematics, Physics and Mechanics Department of Mathematics Preprint series, Vol. 46 (2008), 1046 |
URI: | http://dyuthi.cusat.ac.in/purl/4237 |
Files | Size |
---|---|
Median Graphs, ... nd Geodetic Number Two.pdf | (256.4Kb) |
Abstract: | A profile is a finite sequence of vertices of a graph. The set of all vertices of the graph which minimises the sum of the distances to the vertices of the profile is the median of the profile. Any subset of the vertex set such that it is the median of some profile is called a median set. The number of median sets of a graph is defined to be the median number of the graph. In this paper, we identify the median sets of various classes of graphs such as Kp − e, Kp,q forP > 2, and wheel graph and so forth. The median numbers of these graphs and hypercubes are found out, and an upper bound for the median number of even cycles is established.We also express the median number of a product graph in terms of the median number of their factors. |
Description: | International Scholarly Research Network ISRN Discrete Mathematics Volume 2012, Article ID 583671, 8 pages doi:10.5402/2012/583671 |
URI: | http://dyuthi.cusat.ac.in/purl/4212 |
Files | Size |
---|---|
Median Sets and Median Number of a Graph.pdf | (1.907Mb) |
Abstract: | Kinetics of mercuric chloride catalysed solvolysis of benzyl chloride have been studied in water. 10% aq. ethanol, 10,20 and 30% aq. acetone and 20% aq. DMSO. The results confirm the operation of a mass law effect. |
URI: | http://dyuthi.cusat.ac.in/purl/2224 |
Files | Size |
---|---|
Dyuthi-SS28.pdf | (212.1Kb) |
Abstract: | The focus of this work is to provide authentication and confidentiality of messages in a swift and cost effective manner to suit the fast growing Internet applications. A nested hash function with lower computational and storage demands is designed with a view to providing authentication as also to encrypt the message as well as the hash code using a fast stream cipher MAJE4 with a variable key size of 128-bit or 256-bit for achieving confidentiality. Both nested Hash function and MAJE4 stream cipher algorithm use primitive computational operators commonly found in microprocessors; this makes the method simple and fast to implement both in hardware and software. Since the memory requirement is less, it can be used for handheld devices for security purposes. |
Description: | Advanced Computing and Communications, 2006. ADCOM 2006. International Conference on |
URI: | http://dyuthi.cusat.ac.in/purl/3881 |
Files | Size |
---|---|
Message Integri ... d a Fast Stream Cipher.pdf | (1.288Mb) |
Dyuthi Digital Repository Copyright © 2007-2011 Cochin University of Science and Technology. Items in Dyuthi are protected by copyright, with all rights reserved, unless otherwise indicated.