- S. Jhancy Mary
- R. Jaya Santhi
- S. Ananthalakshmi
- S. Sivachandrian
- T. Divya
- I. Sandhiya
- G. Kirthika
- R. Aktharunisa Begum
- S. Sivachandiran
- S. Saranya
- S. Viswanathan
- R. Subashini
- S. Suriya
- D. JayaKumar
- V. Lavanya
- Sangunthar Karthik Kandaswamy
- B. Maniyarasi
- D. Jansirani
- R. Vengatesan
- M. Rajadurai
- A. Suganthi
- E. Logashanmugam
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Jayakumar, D.
- Evaluation of Antioxidant Potential and Antibacterial Activity of Calotropis gigantea and Vinca rosea Using In Vitro Model
Authors
1 PG & Research Dept. of Chemistry, Auxilium College, Vellore-632 006, TN, IN
Source
Indian Journal of Science and Technology, Vol 3, No 7 (2010), Pagination: 720-723Abstract
The different parts of Calotropis gigantea and Vinca rosea belonging to the families of Asclepiadaceae and Apocynaceae were studied for their antioxidant and antimicrobial activities against selected bacterial strains. From the results it was evident that the flower of Vinca rosea showed the highest antioxidant activity of 97.44% at 800 µg which was higher than the standard L-ascorbic acid (94%) and Calotropis gigantea showed the least. Calotropis gigantea exhibited highest inhibition zone of 14, 14 and 11 mm against Escherichia coli, Salmonella typhi and Shigella sonnei when compared to Vinca rosea. Hence, the present study supports the view, that these medicinal plants might be useful as antioxidant and antimicrobial agents.Keywords
DPPH Assay, Antioxidant, Antimicrobial, Vinca rosea, Bacterial StrainsReferences
- Cai YZ, Sun M, Xing J, Luo Q and Corke H (2006) Structure–radical scavenging activity relationships of phenolic compounds from traditional Chinese medicinal plants. Life Sci. 78, 2872–2888.
- Cakir A, Maci A, Yyldyrym A, Durub ME, Harmandar M and Kazaz V (2003) Isolation and characterization of antioxidant phenolic compounds from the aerial parts of Hypericum hyssopifolium L. J. Ethnopharmacol. 87, 73-83.
- Carew DP and Patterson BD (1970) The effect of antibiotics on the growth of catharanthus roseus tissue culture. Lloydia. 33, 275–277.
- Estevinho L, Pereira AP, Moreira L and Luis G (2008) Antioxidant and antimicrobial effects of phenolic compounds extracts of northeast Portugal honey. Food Chemical Toxicol. 49, 3774-3779.
- Eyob S, Martinsen BK, Tsegaye A, Appelgren M and Skrede G (2008) Antioxidant and antimicrobial activities of extract and essential oil of korarimo. Afri. J. Biotechnol. 7(15), 2585- 2592.
- Fransworth NR, Svoboda GH and Blomster RN (1968) Antiviral activity of selected catharanthus alkaloids. J. Pharmacol. Sci. 57, 2174–2175.
- Halliwell B (1994) Free radicals, antioxidants and human disease: curiosity, cause or consequence. Lancer. 344, 721-724.
- Jaleel CA, Monivannan P and Sankar P (2007) Introduction of drought stress tolerance by ketoconazole in catharanthus roseus is mediated by enhanced antioxidant potential and secondary metabolite accumulation. Colloids Surfaces. B. Biointerfaces. 60, 201-206.
- Liu YW, Han CH, Lee MH, Hsu FL and Hou WC (2003) Patatin, the tuber storage protein of potato (Solanum tuberosum L.), exhibits antioxidant activity invitro. J. Agric. Food. Chem. 51, 4389-4393.
- Pathak AK and Argal A (2007) Analgesic activity of Calothropis gigantea flower. Fitoterapia. 78, 40-42.
- Ram VJ and Kumarin S (2001) Natural products of plant origin as anticancer agents. Drug News Perspect, 8, 465- 482.
- Sabir SM and Rocha JBT (2008) Antioxidant and hepatoprotective activity of aqueous extract of Solanum fastigiatum (false” Jurubebe”) against paracetamolinduced liver demage in mice. J. Ethnopharmacol. 120, 226-232.
- Taechowisan T, Chanaphat N, Wanbenjob A and Shen Y (2009) Cytoprotective activity of chemical constituents isolated from Streptomyces sp., Int. J. Biol. Chem. 3(1), 11-17.
- Uma Devi P, Murugan S, Suja S, Selvi S, Chinnasamy P and Vijayaanad E (2007) Antibacterial, invitro lipid per-oxidation and phytochemical observation on Achyranthes bidentata blume. Pak. J. Nutrition. 6(5), 447-451.
- Villano D, Pachon MSF, Moya ML, Troncoso AM and Garcia Parrilla MC (2007) Radical scavenging ability of polyphenolic compounds towards DPPH free radical. Talanta. 71, 230-235.
- Willcox JK, Ash SL and Catignani GL (2004) Antioxidant and prevention of chronic disease. Crit. Rev. Food Sci. Nutrition. 44, 275-295.
- Young IS and Woodside JV (2001) Antioxidants in health and disease. J. Clinical Pathol. 54, 176-186.
- Security Related Issues in Mobile Ad Hoc Networks
Authors
1 IFET College of Engineering, Villupuram, IN
2 IFET College of Engineering, IN
Source
Wireless Communication, Vol 8, No 4 (2016), Pagination: 114-118Abstract
Mobile ad hoc networks (MANETs) are one of the fastest growing areas of research. They are an attractive technology for several applications, such as rescue and planned operations, due to the flexibility provided by dynamic infrastructure. Furthermore, many conservative security solutions used for wired networks are ineffective and inefficient for the highly dynamic and resource- constrained environments. We introduce the security issues specific to MANETs and present a detailed classification of the attackers against these complex distributed systems. Then we discuss various proactive and reactive solutions proposed for MANETs. It then addresses the possible solution to protect the security mechanism, which involves availability, integrity, authentication and nonrepudiation. In this paper, we discuss about security issues and their solutions in the mobile ad hoc network. Owe to the vulnerable nature of the mobile ad hoc network, there are several security threats that disturb the development of it. We first analyse the main vulnerabilities in the mobile ad hoc networks, which have made it much easily to suffer from attacks than traditional wired network. Finally we survey the current security solutions for the mobile ad hoc network.
Keywords
Mobile Ad Hoc Network, Security, Intrusion Detection, Secure Routing, Infrastructure.- 3A towards Green Computing
Authors
1 IFET College of Engineering, Villupuram, IN
2 Department of Computer Applications in IFET College of Engineering, IN
Source
Software Engineering, Vol 8, No 4 (2016), Pagination: 97-101Abstract
Green Computing is the emerging computing technology. It is mainly used to save and protect environment as well as to optimize energy consumption and try to keep green environment. It is also referred to environment sustainable computing. Saving energy or reduction of carbon footprints is main aspect of Green Computing. This paper is mainly focuses on to explore the 3A towards green computing, (i.e) Awareness, Approaches and Adaptation. The research finding established that more awareness is required in order to make IT users to take greener approaches of using technology its peripherals devices.
Keywords
Green Computing, Awareness, Approaches and Adaptation, Saving Energy.- A Proposed Mechanism for Energy Efficient Load Balancing Technique in Green Computing
Authors
1 IFET College of Engineering, Villupuram, IN
2 Computer Applications Department, IFET College of Engineering, IN
Source
Programmable Device Circuits and Systems, Vol 8, No 4 (2016), Pagination: 88-92Abstract
Cloud computing is rising as a new pattern of large-scale distributed computing. It is a framework for enabling convenient, rush on network access to a shared pool of computing resources. Load balancing is one of the main challenges in cloud computing the goal of the load balancing is to minimize the resource consumption which will further low energy consumption and carbon emission rate that is the terrible need of cloud computing. Green computing or green IT, practice of implementing policies.
Keywords
Cloud Computing, Load Balancing, Energy Efficiency, Green Computing, Round Robin, Equally Spread Current Execution, Throttled Virtual Machine, Power Consumption.- Enacting Portal for Poultry Association
Authors
1 IFET College of Engineering, IN
Source
Software Engineering, Vol 8, No 3 (2016), Pagination: 70-73Abstract
The main aim of this paper is to provide some kind of benefit to the poultry farmers and for the people who going to start poultry business. This portal provide complete guidance about how to construct a farm house, depending upon the type of farm house needed it provide the construction guidelines in term of how the environment should be, how much breath and height is needed for construction to accommodate the certain amount of hens, methods of handling chickens away from disease disinfected and how to take of egg which means how long to preserve the egg in a incubator which are going to hatch ,providing information about common disease which could occur, their precautions, how to treat the disease. It can also sell the feeding products and equipments that are used in poultry by online. So the person newly started poultry business may feel easy to buy those material according to their favorable brand. To make the poultry farmers more interactive with this website it provides discussion forum for poultry association member in both personal and group chat. Hence any queries occur for the poultry farmers can be easily resolved It also lists out the schemes which are useful to get insurance and bank loan .If the Government subsidiary came means according to the no of experience they have in poultry farming the subsidiary can given .the year of experience is calculated based on the license no, and date of license entering in the registration form their experience can be calculated.
Keywords
Poultry, Equipments, Maintenance, Diseases and Insurance Scheme.- The Role of Wireless Sensor Network in Tracking Wild Animals Crossing Forest Boundaries
Authors
1 IFET college of engineering, IN
Source
Programmable Device Circuits and Systems, Vol 8, No 5 (2016), Pagination: 105-107Abstract
Every living creature on this earth has equal importance in the ecosystem. But nowadays life of wild animals is in danger. Wild animals used to move freely in the forest or in the jungle. If any accident happens to them in the forest, physical injury or any disease may cause even death of animals in the forest deforestation of forest in this factor any animals is going on out of boundary in our forest. In such situations we cannot find out exact location of animal in such a large area. To avoid such problems in the finding exact geographical location of animal in the jungle, national park or in wildlife reserves, wildlife animal tracking system is used. This system utilizes technologies such as Global Positioning System and Global System for Mobile Communication.
Keywords
GPS Modem, GSM Modems, Microcontroller, Temperature Sensors, Wireless Transmitter, Latitude, Longitude, Smartphone, Kilometer, Wild Animals.- Highly Advanced 3D Object Password Authentication System to Secure Data
Authors
Source
Fuzzy Systems, Vol 8, No 4 (2016), Pagination: 101-106Abstract
Providing Authentication to any system leads to provide more security to that system. There are many authentication techniques are available, Such as textual password, Graphical password, etc. but each of this individually having some limitations & drawbacks. To overcome the Drawbacks of previously existing authentication technique. A new improved authentication technique is used, This authentication Scheme is called as 3D password. The 3D password is multi-password & multi-factor authentication system as it uses a various authentication techniques such As textual password, Graphical password etc. Most important part of 3d password scheme is inclusion of 3d virtual environment. 3d virtual environment is virtual environment which is consisting of real time object scenarios. It is not actual real time environment, it is just user interface provided to scheme which looks like same as real environment. 3d password is more secure authentication scheme than any other authentication techniques. Because this authentication scheme is more advanced than any other schemes. Also this scheme is hard to break & easy to use. In this paper we have introduced our contribution towards 3D Password to become more secure & more user friendly to users of all categories. This paper also explaining about what is 3D password?, working of 3D password scheme, some mathematical concept related to 3D password, applications of scheme etc. all these concepts are briefly introduced & explained in this paper as per section wise.
Keywords
Authentication, Multi-password, Quick Hull Algorithm, Textual Passwords, 3-D Password, 3-DVirtual Environment.- A Robust Elliptical Based Security using Cryptography Technique
Authors
Source
Biometrics and Bioinformatics, Vol 8, No 3 (2016), Pagination: 53-57Abstract
With the increase of networked electronic communication came overwhelming capabilities to collect, process, combine and store data, resulting in previously unseen transformational pressure on the concepts of trust, security and privacy as we know them. In the Future all the work will be made digitalized. Technology development for data linking and mining, will lead to unwarranted access to personal data, and hence, privacy intrusion. Trust and identity lie at the basis of many human interactions and transactions, and societies have developed legitimate concern for privacy being essential for freedom and creativity. The up-and-coming development of the Information Society shows the readiness to respond to the transformational change evoked by ICT. We have reached the eleventh hour for the safeguarding of trust and privacy as elements that can be transposed into our digital future. The Cryptography plays major role in securing data while transmission. There are several cryptographic techniques introduced to secure data in the current world. In future the technology may improve in such a way that the current cryptographic technique may enhance the security of the data. Hence the cryptographic requirements must also be improved.
Keywords
Cryptography, Unauthorized, Elliptical Curve, UNICODE.- Emergency Alert System Using Location Based Identification for Android Text Message Services
Authors
Source
Biometrics and Bioinformatics, Vol 8, No 4 (2016), Pagination: 97-99Abstract
Emergency alert system (EMS) people sending text messages android app services for Short Message Service (SMS) is a text based messaging service. Bulk messages cannot be sent during emergencies due to network traffic. Thus a wide range of organizations including colleges and universities now partner with third-party providers that promise to improve physical security by rapidly delivering such messages. Android app design for all services provides only emergency number button click for 1.police 2.hospital 3.fire 4.medeia 5.Military…and etc. 1. Police click button conformation yes/no type yes means send to message GPS location tracing information for system. The stored for client side the police station system and used to user send the message Police response to the notification for 10 minute delivery to user send message. Nearest police coming any accident solving problem. Emergency Alert System (EAS) using text messages as a security incident response mechanism. These techniques are useful in finding the minimum time for the delivery of all messages. We show emergency alert systems built on text messaging not only can meet the 10 minute delivery requirement mandated. The identification all area hospital list and used ambulance service to check the services.
Keywords
Emergency Alert System, GPS Services, Short Message Services, GSM, Emergency Response.- E-Collector the Android Application to Collect E-Waste
Authors
1 IFET College of Engineering, Affiliated to Anna University, Villupuram, Tamil Nadu, IN
2 Department of Computer Applications, IFET College of Engineering, IN
3 Computer Applications Department, IFET College of Engineering, IN
Source
Automation and Autonomous Systems, Vol 8, No 4 (2016), Pagination: 79-82Abstract
Central issue of the current study is electronic-waste (e-waste) which is emerging as a new environmental challenge for 21st century. The rapid growth of the electronic and IT industry, present consumer culture, increasing rates of consumption of electronic products have led to disastrous environmental consequences. E-waste, while recycling, may be hazardous because of toxicity of some of the substances it consists of. Some of the waste has been proven to contain many cancer-causing agents. Developed countries export this waste in the form of donation to developing countries. China and India, where environmental standards are low, are the biggest recipients of e-waste which, in most cases, is processed illegally. The environmental burden of e-waste is born by people who live in developing countries, especially China and India, which processes the maximum amount of e-waste. The present study focuses on the collecting the wastages throw mobile application and recycling of the electronic waste on the natural environment.Keywords
E-Waste, Globalization, Recycle, Transaction, Disposal, Electronic, Generating, Manufacturers, Pollution.- A Comparative Study on Applockers Used in Smart Phones
Authors
1 IFET College of Engineering, Villupuram, IN
2 Computer Applications Department, IFET College of Engineering, IN
3 IFET College of Engineering, IN
Source
Automation and Autonomous Systems, Vol 8, No 4 (2016), Pagination: 90-92Abstract
There are various kind of mobile applockers are used to provides security for applications in smart phones. In this study provides various similarity between various kind of applockers, And also defines which kind of applockers are familiarly used in smart phones. AppLocker is a free Android app that locks apps you select. The key to unlocking the apps and getting hold of access to them is what sets it apart. Where normally, users would fiddle with swipes or taps on the screen, codes, or patterns. In this comparative study defines which kind of applockers are high proficient and well suitable for different kind of applications in smart phones.Keywords
Applockers, Smartphone, Security, Application, Mobile.- An Effective Cloud-Based Effect Safe Keeping Classification by Arithmetical Document
Authors
1 IFET College of Engineering, Villupuram, IN
2 Computer Science Department, IFET College of Engineering, IN
Source
Artificial Intelligent Systems and Machine Learning, Vol 8, No 5 (2016), Pagination: 165-169Abstract
Developments in Cloud Computing and its robust nature has made academic institutions to build their institution applications which include results around the Cloud. The challenges of security of data in when it is managed as a service (DBaaS) in the Cloud and the believe that the data is really secured remain a problem for Cloud application service users. In order to ensure trust and security of students results and who access it an efficient security method is required. This paper investigates some of the privacy and security issues encountered in cloud computing, and a cloud result security system is developed using a two form authentication. This is achieved by the use of digital certificate in combination with normal Cloud security system for authentication of users and encryption for storage of data. We apply the MVC architecture in developing the user interface in order to control unauthorized access to different parts of the application, using role based authorization. Though this study is carried out using students results of higher academic institutions, but other organizations can also adopt the security techniques applied here to secure their Cloud application systems.Keywords
Cloud, Security, Digital Certificate, Students Result, Dbaas, Unauthorized Access.- Bluetooth Remote House Mechanization System with Android Application
Authors
1 IFET College of Engineering, Villupuram, IN
2 Department of computer Applications, IFET College of Engineering, IN
Source
Artificial Intelligent Systems and Machine Learning, Vol 8, No 5 (2016), Pagination: 170-173Abstract
This paper presents the overall design of Home Automation System (HAS) with low cost and wireless remote control. This system is designed to assist and provide support in order to fulfill the needs of elderly and disabled in home. Also, the smart home concept in the system improves the standard living at home. The main control system implements wireless Bluetooth technology to provide remote access from PC/laptop or smart phone. The design remains the existing electrical switches and provides more safety control on the switches with low voltage activating method. The switches status is synchronized in all the control system whereby every user interface indicates the real time existing switches status. The system intended to control electrical appliances and devices in house with relatively low cost design, user-friendly interface and ease of installation.
Keywords
Home Automation, Smart Home, Home Appliances, Bluetooth, Android.- Impact of Self-Help Group on Women Development
Authors
1 IFET College of Engineering, Villupuram, IN
2 Computer Applications Department, IFET College of Engineering, IN
Source
Artificial Intelligent Systems and Machine Learning, Vol 8, No 5 (2016), Pagination: 179-181Abstract
"Women's Self-Empowerment" the perceived success of self- help group Programmes has encouraged their widespread application across India. The primary mechanism to empower women to aid the women's Job Opportunities, Group saving, Complaints, Training and Participation. The main objectives to make a helping women's safe and secure. The purpose of saving their common problems through mutual help. The main aim of this to examine the impact of Self-help Group in Socio-economic development of India. The group to support members through maintain consistent contact among group members.It is also helping the participants to improve their empowerment. Self-help group is a method of organising the poor people and the marginalized to come together to solve their individual problem. The implementation of SHG has generated Self-employment opportunities for the rural poor. After joining the self help group the women are economically and socially empowered. This empowerment cannot be transformed or delivered it must be self generated such that it enables those who are empowered to take control over their lives.Keywords
Empowerment, Improve, Opportunities, Social Empowered, Self-Employment.- Green Revolution for Forest
Authors
Source
Fuzzy Systems, Vol 8, No 5 (2016), Pagination: 117-120Abstract
Although the Green Revolution has been able to improve agricultural output in some regions in the world, there was and is still room for improvement. As a result, many organizations continue to invent new ways to improve the techniques already used in the Green Revolution. Frequently quoted inventions are the System of Rice Intensification, marker-assisted selection, agroecology and applying existing technologies to agricultural problems of the developing world. Today the first place anyone looks for any information is online and here comes the need for catering to the needs of people. This has led to the concept of web designing, to cater to the needs of people. It kids toy or adults electronic good’s everything gets its own scope of popularity when it is in the Internet world. It is very much essential to have a website even for a small business ventures to internationally developed enterprises. If this is the case, then it is really very necessary for a centralized E-collector to have its own website. Our website not only just act as a source of information, but also act as a tool for recycling international appeal, global presence as well as a cost-effective marketing tool since the major target are the producers and the consumers of the e-waste.Keywords
Green Revolution, Enterprises, Agriculture, E-Collector, Adults.- SMS Based Vehicle Tracking System using GPS and Android OS
Authors
Source
Automation and Autonomous Systems, Vol 8, No 5 (2016), Pagination: 105-107Abstract
A mobile phone application has been developed and deployed on an Android Phone whose responsibility is to track the GPS location and send it to a remote location. The safe of vehicles is extremely essential for public vehicles. Vehicle tracking and locking system installed in the vehicle, to track the place. In this system client just send one message to the vehicle and the vehicle mobile will send you the current location of your vehicle in the form of web link and user has to click on a link and that link goes to Google map and will show the current location of your vehicle. At the same time Mobile Providers are also providing the variety of services to users. In attempt to expand on this, we propose a GPS based vehicle tracking system for an organization to help to find addresses of their vehicles and locate their positions on mobile devices. The proposed technology allows organizations to track real-time information about their organizational vehicle during travel. Today for local transport most people use Bus as a medium. Android application which provides the exact location of all organizational vehicles. During vehicle motion its location update can be continuously reported to a server using GPRS service.
Keywords
Vehicle Track, GPS, Tracking Unit, android Mobile Application, Global System for Mobile Communication (GSM).- Organized Portal for Scheduling and Steering Workshops
Authors
Source
Automation and Autonomous Systems, Vol 8, No 5 (2016), Pagination: 108-111Abstract
This portal enables organizer to announce workshop details online and make students to get awareness about the same by sending emails to all the eminent colleges. Once the announcement is done online registration panel will be enabled, so students can directly book their seats and make payments by secured way. Students can pick any number of seats at a single transaction. Once the payment is done students will get acknowledgement via SMS In admin end they have options to send customized SMS in critical situations like change of venue, cancellation of event and any circumstance. By this online interactive portal students shall notice availability of. Seats, and they can place feedbacks about the event, feedback module will be open once the event is done.
Keywords
Implementation Research, Professional Guidelines, Workshop, Science Teaching.- E-Sports Online Scheduling System with Live Chat Support
Authors
Source
Automation and Autonomous Systems, Vol 8, No 5 (2016), Pagination: 112-114Abstract
A sports club management system project that provides and manages various club activities, such as member registration, registration for various regular and vacation batches and more. The entire club activities and provides respective functionality for various types of visitors. This system is built with respect to managing all kinds of sports. It allows normal users to avail for club membership, book the ground at for desired days and even enroll for various activities in the sports club. The sports activities include table tennis, carom, cricket, basketball, squash, football, and hockey. The sports club management system is mind various daily activities of all sports. The purpose of the guidelines is to encourage sports clubs to invest more on health-related activities. Sports clubs should be able to provide health-related physical activity programmer. The sports club implementing various activities plans and used to the three package click for as Sliver, Gold, and Bronze. The sports club is member register form full in the all details and click for submit button. Next page online payment typing 12 digit number of visa card number to the click for pay button, payment sending to Conformation message sending your mobile phone. All these sports club functionality for easy operation of the club.
Keywords
E-Sports, Member Registration, Facilities, Chat Support, Sending Message.- Design of Combined Radix-2, Radix- 4 and Radix-8 based Single Path Delay Feedback (SDF) FFT
Authors
1 Department of ECE, St. Peter’s University Chennai - 600054 , Tamil Nadu, IN
2 Department of ECE, Sathyabama University, Chennai - 600119, Tamil Nadu, IN