A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kumar, Sanjeev
- Prey Selection and Food Habit of Tiger (Panthera tigris) in Corbett Tiger Reserve, Ramnagar, Uttrakhand, India
Authors
Source
International Journal of Innovative Research and Development, Vol 4, No 8 (2015), Pagination:Abstract
Tiger is the largest, cutest and very able felids for wild to wild in wild. But it is very difficult to see food and feeding behaviour of tiger in open access or by direct observation. But through scat analysis we can reconstruct the direct or food of tiger. The undigested remain like hairs and bones of prey species provide the food and feeding behaviour of big cat. Total 132 scat were analyzed for food & feeding behaviour of tiger. Final result leads toward critical position regarding prey species for tiger survival.
Tiger is the largest, cutest and very able felids for wild to wild in wild. But it is very difficult to see food and feeding behaviour of tiger in open access or by direct observation. But through scat analysis we can reconstruct the direct or food of tiger. The undigested remain like hairs and bones of prey species provide the food and feeding behaviour of big cat. Total 132 scat were analyzed for food & feeding behaviour of tiger. Final result leads toward critical position regarding prey species for tiger survival.
Keywords
Undigested remain, scat analysis, prey species, predator-prey relationship- Gender Sensitization with Special Reference to Indian Law
Authors
Source
International Journal of Innovative Research and Development, Vol 4, No 4 (2015), Pagination:Abstract
The position of women in India is changing fast. The Law has come to the aid of women with changes in laws, relating to marriage and divorce soon after independence. There have also been many woman-oriented legislations such as the Dowry Prohibition Act, 1961, the Indecent Representation of Women (Prohibition) Act, 1986and the Protection of Women from Domestic Violence Act, 2005. Apart from these enactments, the Constitution of India also provides for certain fundamental rights which, though not specific to women, are interpreted as and when required to protect the interests of women.
Against this scenario, it appears that women are guaranteed equality, equal protection of laws, equality of status and opportunity. It appears that justice: social, economic and political is guaranteed to women. While it is true that the position of women has improved considerably, the mainstream Indian society continues to fall short in the realization of full equality for women. A number of studies show that the laws have not been entirely successful and women are still in need of attention. At the same time, there is a need to be careful while conferring special status on women for ensuring a ‘level playing field’ for them because these laws can create more inequality than equality. Instances of cruelty by married women in recent years are a testament to this fact. The need of the hour is to focus on enforcement of laws already made, and to also guard the interest of males against abuse. It is also necessary to make efforts towards gender sensitization of public servants, especially the police.
- Performance Analysis of AODV Routing Protocol under the Different Attacks Through The Use Of OPNET Simulator
Authors
Source
International Journal of Innovative Research and Development, Vol 2, No 12 (2013), Pagination:Abstract
Security is always an important issue especially for the case of Mobile Ad Hoc Network (MANET) because the structure of the network makes it easier target for attackers. It can also be observed that the each type of attack affects the network characteristics differently hence a careful observation & analysis of network characteristics could describe the state of the network such as network is under specific attack or operating normally. Our work is performed in two parts in first part we simulated the network model under different attack using network simulator and during simulation we collected the network characteristics data such as packet drop rate, average number of hops per route, maximum end to end delay etc.. In the second part of our work the collected data is used for training of PNN which finally used for attack classification or detection. The simulation results shows that by selecting effective characteristics and proper training the detection rate up to 90% is achievable.