Recently Published
Most Viewed
Role of Jinnah in Partition of India\u002D Pakistan Image
Journal article

Role of Jinnah in Partition of India- Pakistan

India was under control of British for about 200 years. It finally got freedom on 15th August, 1947. Many people, nationalist have sacrificed their lives for the freedom of the country. One such prominent nationalist who fought for the freedom of India was Mohammad Ali Jinnah. It is said that Pakistan is created because of dispute between Jinnah and Nehru. It is often said that Jinnah played prominent role in the partition of India- Pakistan. In the research the researcher has tried to trace out that whether Jinnah was the sole reason of partition or not. India faced lots of problem but this was drastic decision taken by our leaders. It is difficult to say that we should be happy that we got Independence or we should be sad that we got divided with our brothers on this vary day with creation of Pakistan.nbsp Jinnah was a leader of Muslim League. From very starting he did not wished that Pakistan should be created. It was only due to some circumstances that led him take this decision. We will be dealing with such causes that made Jinnah changed his ideology and made him demand for separate state i.e. Pakistan. It is always said that person never claps with one hand. So it will be interesting to see that whether demand of partition by Jinnah was for his sole profit motive i.e. for acquiring political power or something else was there behind his demand. Therefore, researcher will be carefully dealing with events which involves Jinnah and which played important role in partition of India- Pakistan.
Voice Controlled Robotic System using Arduino Microcontroller Image
Journal article

Voice Controlled Robotic System using Arduino Microcontroller

Voice controlled robotic system is very beneficial in areas where there is high risk for humans to enter. Voice controlled robotic system is controlled through voice commands received via android device. The integration of control unit with Bluetooth device is achieved using a Bluetooth module to capture and read the voice commands. The robotic vehicle operates as per the command received via android device, for this Arduino is integrated in the system. The controlling device may be any smart phone having an Android OS. The transmitter uses an android application required for transmitting the data. The receiver end reads these commands and interprets them into controlling the robotic vehicle. The android device sends commands to move the vehicle in forward, backward, right and left directions. After receiving the commands, Arduino operates the motors in order to move the vehicle in four directions. The communication between android device and receiver is sent as serial communication data. Arduino program is designed to move the motor through a motor driver circuit as per the commands sent by android device. The wireless camera is interfaced with Arduino to record forward movement of the robotic system which also includes wireless night vision camera which will not only allow viewing whatever will be recorded in day time but also during night. A robotic arm is mounted at the front of the system to make changes in the environment along with a lcd screen to view the received commands. An obstacle detector is added to protect the system from obstacles on the way by using an ultrasonic sensor.
Piezoelectric Energy Harvesting via Shoe Sole Image
Journal article

Piezoelectric Energy Harvesting via Shoe Sole

Review of Hyperloop : The Fifth Mode of Transport Image
Journal article

Review of Hyperloop : The Fifth Mode of Transport

Importance of Work\u002DLife Balance Image
Journal article

Importance of Work-Life Balance

Piezoelectric Energy Harvesting via Shoe Sole Image
Piezoelectric Energy Harvesting via Shoe Sole Image
Journal article

Piezoelectric Energy Harvesting via Shoe Sole

Review of Hyperloop : The Fifth Mode of Transport Image
Review of Hyperloop : The Fifth Mode of Transport Image
Journal article

Review of Hyperloop : The Fifth Mode of Transport

Importance of Work\u002DLife Balance Image
Importance of Work\u002DLife Balance Image
Journal article

Importance of Work-Life Balance

Investigation on Hybrid Concrete Using Steel and Polypropylene Fiber Image
Investigation on Hybrid Concrete Using Steel and Polypropylene Fiber Image
Journal article

Investigation on Hybrid Concrete Using Steel and Polypropylene Fiber

An Intelligent Behaviour Shown by Chatbot System Image
An Intelligent Behaviour Shown by Chatbot System Image
Journal article

An Intelligent Behaviour Shown by Chatbot System

Effect of Firm Size, Leverage and Institutional Ownership on Disclosure Enterprise Risk Management (ERM) Image
Effect of Firm Size, Leverage and Institutional Ownership on Disclosure Enterprise Risk Management (ERM) Image
Journal article

Effect of Firm Size, Leverage and Institutional Ownership on Disclosure Enterprise Risk Management (ERM)

Suggested For You
The Insider Threats Image
Journal article

The Insider Threats

This paper is aimed at discussing on how the so called privileged users place the important data at a risk. Also, this paper will handle issues to do with how data in some organizations are violated by intrinsic users via Malicious actions. In this respect, this paper will shed light on three dimensions in which sensitive information can be protected. To start with, how can one restrict the degree of access to the sensitive info even if the user is logged in with strong accounts for instance administratorrsquos access? How can organizations set rules to safeguard sensitive data plus implement new technologies on the same? And lastly, what is the process and order needed for mitigation in case of leakage in data? Letrsquos start by limiting the access of the users even when logged in with the administrator accounts which are the most powerful in order to have a high level of data security, creating an account with least privileges will be a good move in respect to data security. More so, it is good to examine the actions of the privileged userrsquos action and the risk that they might cause. nbspAlso, it is good to implement the best technology that will ensure that the data of a certain organization is not pruned to any form of internal risk. This guarantees the organization of safety of information from the intrinsic side. To start with, the most effective way to reduce the risk of sensitive data is by applying data-centric security i.e. the manner in which data-centric security is employed plus the presented authorization procedure. This should be followed by the establishment of the firewall as the second procedure in the process of authorization and authentication. The firewall building and the huge of implementation are aimed at time-wastage reduction.
Implementation of Enhanced Honey Encryption for IoT Security Image
Journal article

Implementation of Enhanced Honey Encryption for IoT Security

Correlation Study for Assessment of Water Quality and its Parameters of Kushiyara River,  Sylhet, Bangladesh Image
Journal article

Correlation Study for Assessment of Water Quality and its Parameters of Kushiyara River, Sylhet, Bangladesh

Implementation of Enhanced Honey Encryption for IoT Security Image
Implementation of Enhanced Honey Encryption for IoT Security Image
Journal article

Implementation of Enhanced Honey Encryption for IoT Security

Correlation Study for Assessment of Water Quality and its Parameters of Kushiyara River,  Sylhet, Bangladesh Image
Correlation Study for Assessment of Water Quality and its Parameters of Kushiyara River,  Sylhet, Bangladesh Image
Journal article

Correlation Study for Assessment of Water Quality and its Parameters of Kushiyara River, Sylhet, Bangladesh

Journal article

Preparation of Thyme Oil Loaded Microcapsules for Textile Applications

Preparation of Thyme Oil Loaded Microcapsules for Textile Applications Image
Journal article

In-house Production Method for DNA Ladders to Determine Nucleotide Fragment Sizes up to 1500 Base Pairs

In\u002Dhouse Production Method for DNA Ladders to Determine Nucleotide Fragment Sizes up to 1500 Base Pairs Image
Journal article

Effect of Food Quality on Customer Perceived Satisfaction Level and Mediating Effect of Food Safety on Them

Effect of Food Quality on Customer Perceived Satisfaction Level and Mediating Effect of Food Safety on Them Image
Journal article

Analysis of Future Fiber-Wireless (FiWi) Networks- EPON and WiMAX

Analysis of Future Fiber\u002DWireless (FiWi) Networks\u002D EPON and  WiMAX Image
Read more articles