Time filter

Source Type

Meerut, India

Chaudhary Charan Singh University , formerly Meerut University, is a public and state university located in Meerut, Uttar Pradesh, India. The university was established in 1965. It was later renamed to its current name after Chaudhary Charan Singh, former Prime minister of India. The university celebrated its silver jubilee in 1991. Wikipedia.

Dem H.,Banasthali University | Singh S.R.,Chaudhary Charan Singh University
Procedia Engineering

The paper emphasizes on two warehouse manufacturing model for deteriorating items following time dependent demand pattern. Every manufacturing organization intends to produce perfect quality items. Due to long course of action, various types of difficulties concerning machinery capabilities, labor potential or facility from other resources may appear. Consequently, the systems shift from in-control state to out-of-control state which leads to the production of imperfect quality items. The produced lot can be screened at a cost and then separated defective items can be sold at reduced selling price. Using LIFO (last in first out) dispatching policy for model formulation, our objective is to determine the maximum total profit and the corresponding optimum decision variables. This problem is a constrained non-linear programming and hence a parameter-tuned Genetic Algorithm (OA) is implemented to solve it efficiently. The application of the model is illustrated by providing a numerical example and result is analyzed regarding the impact of various parameters on the proposed policy. © 2012 Published by Elsevier Ltd. Source

Khan M.K.,King Saud University | Kumari S.,Dr. M.G.R. Educational and Research Institute | Gupta M.K.,Chaudhary Charan Singh University

Today, the world is taking large leaps of progress in technology. The technology is turning the vision of achieving transparency, speed, accuracy, authenticity, friendliness and security in various services and access control mechanisms, into reality. Consequently, new and newer ideas are coming forth by researchers throughout the world. Khan et al. (Chaos Solitons Fractals 35(3):519-524, 2008) proposed remote user authentication scheme with mobile device, using hash-function and fingerprint biometric. In 2012, Chen et al. pointed out forged login attack through loss of mobile device on Khan et al.'s scheme and subsequently proposed a scheme to improve on this drawback. Truong et al. (Proceedings of 26th IEEE International Conference on Advanced Information Networking and Applications, pp 678-685, 2012) demonstrated that in Chen et al.'s scheme, an adversary can successfully replay an intercepted login request. They also showed that how an adversary can make fool of both the participants of Chen et al.'s protocol by taking advantage of the fact that the user is not anonymous in scheme. Further, they proposed an improvement to Chen et al.'s scheme to cut off its problems. Through this paper, we show that Chen et al.'s scheme has some other drawbacks too and the improvement proposed by Truong et al. is still insecure and vulnerable. We also propose an improved scheme which overcomes the flaws and inherits the goodness of both the schemes, Chen et al.'s scheme and Truong et al.'s scheme. © 2013 Springer-Verlag Wien. Source

Dem H.,Banasthali University | Singh S.R.,Chaudhary Charan Singh University
Advances in Intelligent and Soft Computing

In this paper, a production inventory model is designed with the assumption made about the cost function that will influence the empirical results obtained regarding measurement of volume flexibility. We consider a particular kind of products which are usually stored in stacks and damaged during the storage due to accumulated stress of heaped stock. These are known as damageable items. Here the model is developed for such items with stock-time-price sensitive demand and shortages. The unit production cost is taken to be a convex function of the production rate. The mathematical expression for the total relevant cost is derived and it is minimized subject to different constraints of the system. Because of the nonlinearity and complexity of the problem, the model is solved numerically and the final evaluations are made using genetic algorithm (GA). A numerical example is given and sensitivity analyses are performed to analyze the influence of various parameters on the overall cost. The results can help those manufacturing firms which deal in damageable products. © 2012 Springer India Pvt. Ltd. Source

Tiwari N.,Indian Agricultural Research Institute | Sharma P.K.,Chaudhary Charan Singh University | Malathi V.G.,Indian Agricultural Research Institute
Virus Genes

Whitefly-transmitted Begomoviruses having circular single stranded DNA genome cause severe leaf curl diseases in the tropical and subtropical region. The majority of Old World monopartite begomoviruses with DNA A component is associated with a satellite DNA of 1.3 kb length referred to as betasatellites. The presence of betasatellite is required to express typical symptoms in the primary hosts. Increased symptom expression in betasatellite's presence is attributed to a 13-15 kDa βC1 protein encoded by the βC1 gene on complementary sense strand. The exact mechanism by which the βC1 protein contributes to the symptoms' severity and helper viral DNA's accumulation is not yet understood. Here, we studied the βC1 protein of Cotton leaf curl Multan betasatellite, associated with mono and bipartite begomoviruses. The βC1 protein was expressed in prokaryotic system as 6XHis-βC1 fusion protein and recombinant protein showed size- and sequence-specific DNA binding activity. The host proteins which may interact with βC1 were identified by binding βC1 recombinant protein with heptapeptide in phage display library. The βC1-interacting host proteins predicted belong to metabolic and defense pathways, indicating that βC1 protein has a pivotal role in viral pathogenicity. © 2012 Springer Science+Business Media New York. Source

Singla D.,Chaudhary Charan Singh University | Veqar Z.,Jamia Millia Islamia University
Journal of Clinical and Diagnostic Research

Occurrence of postural defects has become very common now-a-days not only in general population but also in sports persons. There are various methods which can be used to assess these postural defects. These methods have evolved over a period of many years. This paper is first of its kind to summarize the methods of postural assessment which have been used and which can be used for evaluation of postural abnormalities in sports persons such as the visual observation, plumbline, goniometry, photographic, radiographic, photogrammetric, flexiruler, electromagnetic tracking device etc. We recommend more and more postural evaluation studies to be done in future based on the photogrammetric method. Source

Discover hidden collaborations