- A. K. Bhardwaj
- Pramod G. Krishnan
- A. Veeramani
- R. Manavalan
- D. Venkappaya
- D. Shanti Saravanan
- L. Arockiam
- A. Aloysius
- N. Sivanandan
- N. Prabakaran
- K. Janani
- R. Vadivel
- N. Aravinthan
- P. Menaka
- P. Sasanka
- V. S. Kiranmayi
- Sivakumar Vishnubhotla
- K. Abirami
- S. Hema Priya
- C. Dharmaraj
- P. Vijayalakshmi
- S. Mounika
- N. Anjana Devi
- S. Sharmila
- S. M. Dhivya
- Indian Forester
- Research Journal of Pharmacology and Pharmacodynamics
- Wireless Communication
- Software Engineering
- Digital Image Processing
- Digital Signal Processing
- Data Mining and Knowledge Engineering
- Oriental Journal of Computer Science and Technology
- ICTACT Journal on Communication Technology
- The Indian Journal of Nutrition and Dietetics
- ScieXplore: International Journal of Research in Science
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Geetha, K.
- Conservation of Tiger (Panthera tigris) and its Habitats - Experiences of Co-existence of People and Protected Area from Periyar Tiger Reserve, Kerala, India
Authors
Source
Indian Forester, Vol 132, No 10 (2006), Pagination: 1233-1242Abstract
Understanding the significance of Tiger in the ecosystem, Government of India launched 'Project Tiger' in 1973 for the conservation of tiger and its habitat. By the end of year 2000, 27 Tiger Reserves were established in the country. One of the major constraints or issues confronting conservation in the Tiger Reserves can be attributed to the existence of human population in and around the reserves. These Reserves with the status of Sanctuary or National Park are traditionally following the conventional model of exclusionist Protected Area (PA) management which stresses on coercion and policing as the dominant tool for biodiversity conservation. However, consistent with the National Forest Policy, 1988, the PAs have gradually started addressing the livelihood needs of the local communities and soliciting their support for conservation. Periyar Tiger Reserve (PTR), Kerala, is an example of the successful co-existence of park and people. The tiger reserve along with its adjoining forest areas form an exceptionally rich rainforest landscape. However, mega developmental threats and subsistence dependency of local people had threatened the long-term conservation of PTR. The implementation of India Ecodevelopment Project (IEP) between 1996 and 2004 opened a new vista of PA management, which goes hand in hand with the protection of the PA and livelihood security of the local people. One of the most important contributions of the project has been the evolution of various Community Based Ecotourism Programmes (CBEP) with strong focus on park protection and visitor experience providing sustained livelihoods to about 2000 including indigenous families and rehabilitated forest offenders. Involvement of the local people in pilgrimage management has resulted in safeguarding the ecological sanctity of Sabarimala apart from generating valuable income for forest dependent communities. The project has resulted in the improved planning and protection of the PA Area, reduction in resource use by local people, improvement in habitat health, building social capital among local communities and creation of institutional mechanisms for sustaining the achievements. In order to ensure the post project sustainability, the Government of Kerala has established a semi autonomous Trust named Periyar Foundation with the objective of supporting biodiversity conservation and community welfare initiatives of PTR and adjoining landscape. An eco development surcharge levied on visitors to the PA is being pooled into the operational fund of the Foundation. In nut shell, a new system of decentralized and self-reliant PA management system is evolving in PTR wherein the interest of the biodiversity of the PA is integrated and mainstreamed with the livelihood security of the local people in the landscape.- Effects and Causes of Lithiasis
Authors
1 Ultra College of Pharmacy, Madurai, Tamilnadu, IN
2 Department of Pharmacy, Annamalai University, Chithambaram, Tamilnadu, IN
3 Sastra University, Tanjore, Tamilnadu, IN
Source
Research Journal of Pharmacology and Pharmacodynamics, Vol 2, No 4 (2010), Pagination: 261-267Abstract
Kidney stones, one of the most painful of the urologic disorders, are not a product of modern life. Scientists have found evidence of kidney stones in a 7000 year old Egyptian mummy. Unfortunately, kidney stones are one of the most common disorders of the urinary tract. In 2000, patients made 2.7 million visits to health care providers and more than 600,000 patients went to emergency rooms for kidney stone problems. So, we have explained the theories of kidney stone formation, Diagnostic procedures and treatments for the kidney stones.Keywords
Kidney Stone, Types, ESWL, Herbal Options.References
- Straffon, R.A and C.C. Higgins, Urinary lithiasis and foreign bodies, urology, vol. edited by Campbell N.F. and J.F. Harrison, W.B - Saunders Co., Philadelphia, (1970) : pp 687-765.
- Robertson, W.G, physical and chemical aspects of calcium stone formation in urinary tract, Urol. Res. Eds. Flecish et al., pub. By plenum press, 277 west 17th st., New York. Ny 10011, U.S.A (1976): p.25.
- Third, S.K., Biochemical mechanisms involved in oxalate urolithiasis. Ph.D. Thesis submitted at P.G.I., Chandigarh (1974).
- Eucot, J.S.A comparison of the chemical composition of urine in normal subjects and in patients with oxalate calculi urinary calculic, Int. symp. Renal. Stone res. Madrid, pp-24.
- www.Google.com/Kidney stones.
- Robertson, W.G, palcook, M and Nordin, B.E.c. Measurement of activity products in urine from stone forming and normal subjects. Urolithiasis - physical aspects, pub. Natal. Acad. Scil, Washington (1972) : p.79.
- Colby, F.H, Diseases of the kidney, essential urology 4th ed p. 173, William and wilkins co., 1961.
- Third. S.K. Verma, G. Bapna, B.C. and Nath R., Human Kidney enzymes in urolithiasis, S.B.C. (India) Abstract (1977): 36, 33 (144).
- Duke JA. (2002) The Green Pharmavy. Scientific Publishers: Jodhpur (India); 205-209.
- Mitra SK Gopumodhavan S, Venkataranganna MV, Sundaran R (1998): Effect of cystone, a herbal formulation on glycolic acid induced urolithiasis in rats. Phytother Res. 12: 372-374.
- An Energy Efficient Clustered Cooperative Caching Dynamic Source Routing Protocol
Authors
1 Computer Science and Engineering, PSNA College of Engineering and Technology, Dindigul, IN
Source
Wireless Communication, Vol 4, No 12 (2012), Pagination: 668-673Abstract
Mobile Ad Hoc Networks (MANETs) provide an attractive solution for networking in the situations where network infrastructure or service subscription is not available. Its usage can further be extended by enabling communications with external networks such as Internet or cellular networks through gateways. However, data access applications in MANETs suffer from dynamic network connections and restricted energy supplies. Since Mobile Ad-hoc Networks (MANET) is large with sparse nodes, the routing information becomes more complex and it consumes more power, cluster-based routing techniques are used to tackle such situations. The data access efficiency can be improved using cooperative caching technique, which allows the sharing and coordination of cached data among multiple nodes inside the clusters. . In this paper, it is decided to propose modified Energy Efficient Clustered Cooperative Caching DSR protocol (EECCCDSR) to achieve the performance parameter like packet delivery ratio, routing overhead, energy consumption and delay. Though CCCDSR protocol has achieved performance parameters like packet delivery ratio, delay and bandwidth delay product, energy consumption is more. So efficient clustering has been done to reduce the power consumption.Keywords
Adhoc Networks, DSR Protocol, Clustering, Cooperative Caching, Energy Consumption.- On Validating Class Level Cognitive Metrics
Authors
1 Department of Computer Science, St. Joseph’s College, Tiruchirappalli – 620002, IN
2 Department of Computer Science and Engineering, Bharathidasan University, Tiruchirappalli – 620023, IN
Source
Software Engineering, Vol 2, No 3 (2010), Pagination: 55-58Abstract
The interest in the application of cognitive science in computing has grown recently to a greater extend in the software industry. The programmers and project managers are focusing on better techniques for reduction of software complexity in software development. Object oriented technology becomes an increasingly popular software development environment. The traditional software complexity measures focus only on addressing the complexity of the procedure oriented software development. They cannot fulfill the requirements of object-oriented software. Hence, newer techniques and methods are to be developed by researchers. Earlier, Arockiam et. al have proposed a new complexity measure namely Extended Weighted Class Complexity (EWCC) which is an extension of Weighted Class Complexity (WCC). EWCC is the sum of cognitive weights of attributes and methods of the class and that of the classes derived. The aim of this paper is to validate EWCC and other complexity metrics with respect to program comprehension. From the experiments conducted, it is proved that EWCC is a better indicator of complexity of classes with inheritance.Keywords
CK Metrics, Extended Weighted Class Complexity (EWCC).- Image Registration in Digital Ophthalmic Images for Variation of the Pattern Shift VEP with the Effect of Rate of Stimulation
Authors
1 Department of Electronics, Karpagam University, Coimbatore, IN
2 Department of Electrical and Electronics Engineering, Karpagam Institute of Technology, Anna University, Coimbatore, IN
Source
Digital Image Processing, Vol 3, No 13 (2011), Pagination: 820-823Abstract
It is important to check the variability of a number of parameter for reliable interpretation of transient PSVEP. The pattern reversal frequency if increased from 1 Hz to 4 Hz, the P-100 latency increase by 4.8 m sec. At a faster rate, the waveforms become less distinct and stimulation above 8-10 Hz result in a steady state VEP. This work presents a technique for a reliable extraction P-100 latency and amplitude using a SVD algorithm. The challenge of image registration (the process of correctly aligning two or more images accounting for all possible source of distortion) is of general interest in image processing. This research focused on investigating potential registration algorithms for transforming partially overlapping images which have only a partially over lapping images of the retina into a single overlapping composite image to aid physicians in assessment of retinal health, and on registering vectors from known common points in the images to be registered. All potential transforms between images are generated, with the correct registration producing a tight cluster of data points in the space of transform coefficients. This registration can be carried out for images of the same subject taken at different times, images taken under different modalities, and images which have only a partial overlap area.Keywords
Electro Diagnostic Instrument, VEP Stimulator, Image Registration, SVD Algorithm and P-100 Latency Waveform Module.- Digital Signal Processing in Ophthalmic Images for Overall Structure in Clinical VEP Signals
Authors
1 Department of Electronics, Karpagam University, Coimbatore, IN
2 Department of Electrical and Electronics Engineering, Karpagam Institute of Technology, Anna University, Coimbatore, IN
Source
Digital Signal Processing, Vol 3, No 8 (2011), Pagination: 406-410Abstract
VEPs can provide important diagnostic information regarding the functional integrity of the visual systems. Several types of VEPs are routinely used in a clinical setting. These primarily differ in a mode of stimulus presentation. Four standard stimulus protocols are defined. The standard VEP protocols are defined for a single recording channel with a midline occipital active electrode. By limiting this standard to four protocols, the intention is that standard VEPs will be incorporated universally into clinical VEP testing along with additional tests and extended protocols that a laboratory may chose to use. This work presents a technique for reliable extraction P-100 latency and amplitude using a wavelet based technique. The standard does not require that all four protocols should be used for every investigation on every patient. In many circumstances, a single stimulus protocol will be appropriate. Four standard stimulus protocols are defined. These are Pattern reversal VEPs elicited by checker board stimuli, Pattern Onset/Offset Flash VEPs elicited by similar checkerboard stimuli, Pattern reversal VEPs elicited by LED Goggles stimuli and Pattern Onset/Offset Flash VEPs elicited by similar LED Goggles stimuli. The analysis of P-100 latency and amplitude measurement variability based on visual pathway conduction in VEP has been shown to have clinical utility. The reliable measurement of VEP techniques to do is less well developed. This work presents a technique for reliable extraction P-100 latency and amplitude using a wavelet based technique. The VEP is still one of the most main tools to access to one of the most unknown and complex systems is nature. There are no doubts that due to its complexity and ability to reflect underlying processes in the visual of the VEP signal are theoretically the best physiological signal for extraction and comprehension of human behavior. The basic algorithms for VEP signal are presented. The overall structure of clinical VEP signal is treated here. The gathered examples are based on the laboratory experiments realized during the subject cognitive processes.Keywords
VEP Signals, EEG Waveforms, Wavelets Transforms and Signal Processing.- Data Propelling Scheme for Node Level Congestion Control in WSNs
Authors
1 Pervasive Computing Technologies, Anna University, Tiruchirappalli, IN
2 TRP Engineering College (SRM Group), Tiruchirappalli, IN
3 Trichirappalli, IN
Source
Data Mining and Knowledge Engineering, Vol 2, No 1 (2010), Pagination:Abstract
The rising data centric Wireless sensor network (WSN) is recently emerging technology, which offers the key to isotonic situation in an un-interruptible environment application. It has the ability of keen observation and ties the information with outside world. WSN tenuously collects the dense amount of data, further communicates with the sink through various intermediate nodes. It delivers reckonable response, when unpredictable variation occurs in the environment. Rushing of the enormous data directs to overcrowd in the routing path, which affects vibrant strength of the network. Many of the existing schemes focused on link level congestion. We propose data propelling scheme, which discusses the congestion free environment in node level congestion. Once congestion notification bit is set, new data buffer node awakened, which is near-by to congested node. After its activation, all the data are re-directed to the data buffer and retrieved back in need even at unusual changes occurred further CN bit is cleared. Aspire is, make processing rate which is to be equal to transmitting rate to avoid funneling effect. Our scheme is not consuming too much of energy of new data buffers and resources. It annotates that nodes are intended for working for long time without human intervention. Further our scheme is concentrating on congestion free critical environmental applications, otherwise which drastically decrease the performance of the network.Keywords
Data Propelling, Congestion Control, Node Level Congestion, Sink.- Phoneme Segmentation of Tamil Speech Signals Using Spectral Transition Measure
Authors
1 Department of Computer Science, D.J. Academy for Managerial Excellence, Coimbatore, 641 032, IN
2 Department of Information Technology, Bharathiar University, IN
Source
Oriental Journal of Computer Science and Technology, Vol 10, No 1 (2017), Pagination: 114-119Abstract
Process of identifying the end points of the acoustic units of the speech signal is called speech segmentation. Speech recognition systems can be designed using sub-word unit like phoneme. A Phoneme is the smallest unit of the language. It is context dependent and tedious to find the boundary. Automated phoneme segmentation is carried in researches using Short term Energy, Convex hull, Formant, Spectral Transition Measure(STM), Group Delay Functions, Bayesian Information Criterion, etc. In this research work, STM is used to find the phoneme boundary of Tamil speech utterances. Tamil spoken word dataset was prepared with 30 words uttered by 4 native speakers with a high quality microphone. The performance of the segmentation is analysed and results are presented.Keywords
Speech Recognition, Speech Segmentation, Spectral Transition Measure (STM), Phoneme Segmentation.References
- Gomez, Jon Ander, and María José Castro, Automatic segmentation of speech at the phonetic level. Joint IAPR International Workshops on Statistical Techniques in Pattern Recognition (SPR) and Structural and Syntactic Pattern Recognition (SSPR). Springer, Berlin Heidelberg, 2002.
- R. Rabiner, and B. H. Juang, Fundamentals of Speech Recognition, (Prentice-Hall International, 1993).
- Thangarajan, R.,Natarajan, A.M. and Selvam, M., Word and Triphone Based Approach in Continuous Speech Recognition for Tamil Language, WSEAS Transaction on Signal Procesing,ISSN:1790-5022,4(3) , pp 76-85, 2008.
- Qiao, Yu, and Nobuaki Minematsu, Metric learning for unsupervised phoneme segmentation, INTERSPEECH, 2008.
- Dusan, Sorin, and Lawrence R. Rabiner,On integrating insights from human speech perception into automatic speech recognition, INTERSPEEC, 2005.
- Sharma, Manish, and Richard Mammone. “Blind” speech segmentation: automatic segmentation of speech without linguistic knowledge.” Spoken Language, 1996. ICSLP 96. Proceedings., Fourth International Conference on. 2. IEEE, 1996.
- Scharenborg, Odette, Vincent Wan, and Mirjam Ernestus, Unsupervised speech segmentation: An analysis of the hypothesized phone boundaries, The Journal of the Acoustical Society of America, 127(2): 1084-1095, (2010).
- B. Zio³ko, S. Manandhar, and R. C. Wilson, Phoneme segmentation of speech, In ´ Proceedings of the 18th International Conference on Pattern Recognition (ICPR’06), 4, pages 282–285, 2006.
- Zió³ko, Bartosz, et al, Phoneme segmentation based on wavelet spectra analysis, Archives of Acoustics, 36(1): 29-47, (2011).
- Kuo, Jen-Wei, Hung-Yi Lo, and Hsin-Min Wang, Improved HMM/SVM methods for automatic phoneme segmentation, INTERSPEECH, 2007.
- Sarma, Mousmita, and Kandarpa Kumar Sarma. “Segmentation and classification of vowel phonemes of assamese speech using a hybrid neural framework.” Applied Computational Intelligence and Soft Computing 2012: 28, (2012).
- Almpanidis, George, and Constantine Kotropoulos, Phonemic segmentation using the generalised Gamma distribution and small sample Bayesian information criterion, Speech Communication 50(1), 38-55, (2008).
- Qiao, Yu, Dean Luo, and Nobuaki Minematsu, A study on unsupervised phoneme segmentation and its application to automatic evaluation of shadowed utterances, Technical report, 2012.
- Dusan, Sorin, and Lawrence R. Rabiner, On the relation between maximum spectral transition positions and phone boundaries, INTERSPEECH. 2006.
- Certificate Revocation Scheme Based on Weighted Voting Game and Rational Secure Multiparty Computing
Authors
1 Department of Computer Science, Bharathiar University, IN
Source
ICTACT Journal on Communication Technology, Vol 8, No 1 (2017), Pagination: 1453-1460Abstract
The Mobile Adhoc Network consists of deployed mobile nodes which lead to the frequent changes in network topology. Due to topology changes, required infrastructure is unavailable for communication. Moreover, malicious nodes present in MANET make use of this modification and can easily launch highly vulnerable attacks on the routing path of the network. Hence, Security issue such as removing misbehaving nodes is the primary issue in MANET. Effective certificate revocation scheme was introduced to identify and eliminate the node with malicious activities in the network based on the weighted voting game (ECR-WVG) approach. In this approach, weights and quota were two factors, determined for an effective revocation of malicious nodes certificates. However, security during multiparty transmission was not taken into account in ECR-WVG. In Effective Certificate Revocation Scheme based on Weighted Voting Game and Rational Secure Multi-Party Computing (ECR-WVG-RSMPC) method, rational secret sharing scheme is introduced along with ECR-WVG approach for securing multiparty transmission. Performance evaluation can be done between ECR-WVG and ECR-WVG-RSMPC in terms of false revocation, malicious node revocation, normalized time for revocation and revocation accuracy ratio.Keywords
Mobile Adhoc Network, Network Topology, Certificate Revocation Scheme, Weighted Voting Game, Multiparty Transmission.References
- Sungwook Kim, “Effective Certificate Revocation Scheme based on Weighted Voting Game Approach”, IET Information Security, Vol. 10, No. 4, pp. 180-187, 2016.
- Yilei Wang, Tao Li, Hairong Qin, Jin Li, Wei Gao, Zhe Liu and Qiuliang Xu, “A Brief Survey on Secure Multi-Party Computing in the Presence of Rational Parties”, Journal of Ambient Intelligence and Humanized Computing, Vol. 6, No. 6, pp. 807-824, 2015.
- Genevieve Arboit, Claude Crepeau, Carlton R. Davis and Muthucumaru Maheswaran, “A Localized Certificate Revocation Scheme for Mobile Ad Hoc Networks”, Ad Hoc Networks, Vol. 6, No. 1, pp. 17-31, 2008.
- R. Ayyasamy and P. Subramani, “An Enhanced Distributed Certificate Authority Scheme for Authentication in Mobile Ad-Hoc Networks”, The International Arab Journal of Information Technology, Vol. 9, No. 3, pp. 291-298, 2012.
- W. Liu, H. Nishiyama, N. Ansari, J. Yang and N. Kato, “Cluster-based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks”, IEEE Transactions on Parallel and Distributed Systems, Vol. 24, No. 2, pp. 239-249, 2013.
- N. Steven Raj and Sneha Kathare, “Clustering of Certificate Revocation to Reinforce an Idea for Mobile Ad Hoc Networks”, International Journal of Engineering Research and Technology, Vol. 3, No. 7, pp. 682-685, 2014.
- Huaqiang Xu, Rui Wang and Zhiping Jia, “A Lightweight Certificate Revocation Scheme for Hybrid Mobile ad Hoc Networks”, International Journal of Security and Its Applications, Vol. 10, No. 1, pp. 287-302, 2016.
- Maxim Raya, Daniel Jungels, Panos Papadimitratos, Imad Aad and Jean-Pierre Hubaux, “Certificate Revocation in Vehicular Networks”, Available at: https://infoscience.epfl.ch/record/83626/files/CertRevVANET.pdf.
- T. Pank, “Review of Certificate Revocation in Mobile Ad Hoc Networks”, International Journal of Advances in Management Technology and Engineering Sciences, Vol. 2, No. 6, pp. 2249-7455, 2013.
- Jolyon Clulow and Tyler Moore, “Suicide for the Common Good: a New Strategy for Credential Revocation in Self-Organizing Systems”, ACM SIGOPS Operating Systems Review, Vol. 40, No. 3, pp. 18-21, 2006.
- M. Srividya, K. RadhikA and D. Jamuna, “Review on Certificate Revocation of Mobile Ad Hoc Networks”, International Journal of Engineering Research and Technology, Vol. 1, No. 7, pp. 1-4, 2012
- H. Luo, J. Kong, P. Zerfos, S. Lu and L. Zhang, “URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks”, IEEE/ACM Transactions on Networking, Vol. 12, No. 6, pp. 1049-1063, 2004.
- Review on Web Usage Mining and Data Preprocessing Techniques
Authors
1 Department of Information Technology, Dr. N.G.P. Arts and Science College, IN
Source
Data Mining and Knowledge Engineering, Vol 10, No 1 (2018), Pagination: 12-14Abstract
The popularity of World Wide Web is increasing day by day by allowing peoples to share/ transfer their information to multiple sites. WWW becomes the most popular source for containing most information from the various peoples from different locations. Search engines are most useful tool which enables users to retrieve their required contents from the websites. However retrieval of more related contents for the users would be more difficult task which is resolved by using the web mining concepts. Web mining is nothing but integration of data mining techniques with the WWW to retrieve the most useful information required by the users. There are various methodologies are proposed by different authors to perform web mining in the effective way. In this analysis work, different methodologies proposed by various authors are discussed in terms of their working procedure along with their merits and demerits.Keywords
Web Mining, Useful Information, Data Mining, World Wide Web, Search Engine.References
- Sunena; Kamaljit Kaur, “Web usage mining-current trends and future challenges”, 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), Pages: 1409 - 1414, 2016
- Dhandi, M., & Chakrawarti, R. K. (2016, March). A comprehensive study of web usage mining. In Colossal Data Analysis and Networking (CDAN), Symposium on (pp. 1-5). IEEE
- Zdravko Markov, Daniel T. Larose "Data Mining the Web: Uncovering Patterns in Web Content, Structure, and Usage", Wiley, 2007
- Yan LI, Boqin FENG and Qinjiao MAO, “Research on Path Completion Technique in Web Usage Mining”, IEEE International Symposium on Computer Science and Computational Technology, pp. 554-559, 2008.
- Tasawar Hussain, Dr. Sohail Asghar and Nayyer Masood, “Hierarchical Sessionization at Preprocessing Level of WUM Based on Swarm Intelligence”, 6th International Conference on Emerging Technologies (ICET) IEEE, pp. 21-26, 2010
- Doru Tanasa and Brigitte Trousse, ”Advanced Data Preprocessing for Inter sites Web Usage Mining“, Published by the IEEE Computer Society, pp. 59-65, March/April 2004
- Ling Zheng, Hui Gui and Feng Li, “Optimized Data Preprocessing Technology For Web Log Mining”, IEEE International Conference On Computer Design and Applications( ICCDA ), pp. VI-19-VI-21,2010
- JING Chang-bin and Chen Li, “Web Log Data Preprocessing Based on Collaborative Filtering”, IEEE 2nd International Workshop on Education Technology and Computer Science, pp.118-121, 2010.
- Dietary Recall and Nutritional Index in Continuous Ambulatory Peritoneal Dialysis Patients
Authors
1 Department of Nephrology, Sri Venkateswara Institute of Medical Sciences, Tirupati - 517 507, IN
2 Department of Biochemistry, Sri Venkateswara Institute of Medical Sciences, Tirupati - 517 507, IN
Source
The Indian Journal of Nutrition and Dietetics, Vol 55, No 3 (2018), Pagination: 345-355Abstract
Maintenance of good nutrition forms an important component of management of Continuous Ambulatory Peritoneal Dialysis (CAPD) patients and can be achieved through regular assessment of dietary nutrient intake, appropriate dietary advice and monitoring of patient compliance with respect to adherence to dietary advice. Thirty one patients (18 males and 13 females) undergoing CAPD were studied. Information on their dietary intake was collected by dietary recall method. Data was analysed using nutrition software, “dietsoft” and dietary intake of various food components was compared with the prescribed and recommended allowance. Nutritional Risk Index (NRI) score was calculated to assess severity of malnourishment. Mean calorie intake was as per recommendation; carbohydrate and protein intake was lesser and fat intake was more than recommended intake in males and females. All essential amino acids measured in the diet of females was more than recommended levels; in males, intake of lysine, threonine, tryptophan and histidine was more and that of methionine was less than the recommendation. Among minerals measured, both groups of patients consumed lower amounts of sodium, potassium, iron, zinc and magnesium, and higher amounts of phosphorus than recommended. The intake of riboflavin, pyridoxine, niacin and vitamin A was lower in both groups, whereas in males, there was a deficient intake of thiamine, vitamin B12 and vitamin C also. 27% of the patients were at risk of severe malnourishment. Findings showed deficient intake of a majority of nutrients by CAPD patients which might result in adverse clinical outcomes. Thus, there is a need for periodical evaluation and appropriate modification of the diet plan of patients undergoing CAPD. The dietary assessment helps in monitoring adherence of patients to dietary advice, timely identification of deficient intake, and initiation of supplementation, if required.Keywords
Continuous Ambulatory Peritoneal Dialysis (CAPD), Dietary Recall, Malnutrition, Nutrients, Nutritional Assessment, Nutrition Risk Index.References
- Mehrotra, R. and Kopple, J.D. Protein and energy nutrition among adult patients treated with chronic peritoneal dialysis. Adv. Ren. Replace. Ther., 2003, 10, 194-212.
- Avesani, C.M., Heimburger, O., Stenvinkel, P. and Lindholm, B. Nutritional aspects of adult patients treated with chronic peritoneal dialysis. J. Bras. Nefrol., 2006, 28, 232-238.
- Johansson, L. Nutrition in older adults on peritoneal dialysis. Perit. Dial. Int., 2015, 35, 655-665.
- Sezer, S., Ozdemir, F.N., Arat, Z., Turan, M. and Haberal, M. Triad of malnutrition, inflammation and atherosclerosis in hemodialysis patients. Nephron., 2002, 91, 456-462.
- Reneede Mutsert., Diana, C., Gischolar_mainendorst, Jonas Axelsson., Boeschoten, E.W., Krediet, R.T., Dekker, F.W. the NECOSAD Study Group. Excess mortality due to interaction between protein-energy wasting, inflammation and cardiovascular disease in chronic dialysis patients. Nephrol. Dial. Transplant., 2008, 23(9), 2957-2964.
- Jadeja, Y.P. and Kher, V. Protein energy wasting in chronic kidney disease: An update with focus on nutritional interventions to improve outcomes. Ind. J. Endocrinol. Metab., 2012, 16, 246–251.
- Noori, N., Kovesdy, C.P., Murali, S., Benner, D., Bross, R., Block, G., Kopple, J.D. and Kalantar-Zadeh., K. Dietary assessment of individuals with chronic kidney disease. Semin. Dial., 2010, 23, 359-364.
- Gemma Salvador Castell, G.S., Serra-Majem, L.and Ribas-Barba, L. What and how much do we eat? 24-hour dietary recall method. Nutr. Hosp., 2015, 31(3), 46-48.
- Nutrient requirements and recommended dietary allowances for Indians. icmr.nic.in/final/RDA-2010 (http://icmr.nic.in/final/RDA-2010.pdf).
- WHO Technical Report Series 935. Protein and amino acid requirements in human nutrition Report of a joint FAO/WHO/UNU expert consultation.
- Veterans Affairs Total Parenteral Nutrition Cooperative Study Group. Perioperative total parenteral nutrition in surgical patients. New Eng. J. Med., 1991, 325, 525-532.
- Kim, H., Lim, H. and Choue, R. Compromised Diet Quality is Associated with Decreased Renal Function in Children with Chronic Kidney Disease. Clin. Nutr. Res., 2014, 3, 142–149.
- Patel, Z., Bhattacharjee, L. and Shah, B.V. The role of dietary protein restriction in Indian patients with chronic renal failure. J. Assoc. Phys. Ind., 2000, 48, 1078-1081.
- Beheray, S.S. and Shah, B.V. Dietary protein intake in Indian patients with chronic renal failure. Ind. J. Nephrol., 1996, 6, 19-21.
- Naini, A. E., Karbalaie, A., Abedini, M., Askari, G. and Moeinzadeh, F. Comparison of malnutrition in hemodialysis and peritoneal dialysis patients and its relationship with echocardiographic findings. J. Res. Med. Sci., 2016, 21, 78.
- Clinical practice guidelines for nutrition in chronic renal failure. K/DOQI, National Kidney Foundation. Am. J. Kidney. Dis., 2000, 35(l), S1-140.
- Akbulut, G., Sanlýer, N., Inal, S., Tek, N.A., Onec, K. and Erten, Y. Daily dietary energy and macronutrient intake and anthropometric measurements of the peritoneal dialysis patients. Ren. Fail., 2013, 35, 56-61.
- Kumar, V.S., Kumar, B.S., Kishore Babu, S., Kumar, T.S., Sathya Sai, R.N., Solomon, A. and Kumar, K.A. Serum amino acid profile in chronic renal failure. Ind. J. Nephrol., 1998, 8, 52-54.
- Wang, A.Y., Sea, M.M., Ip, R., Law, M.C., Chow, K.M., Lui, S.F., Li, P.K. and Woo, J. Independent effects of residual renal function and dialysis adequacy on dietary micronutrient intakes in patients receiving continuous ambulatory peritoneal dialysis. Am.J. Clin. Nutr., 2002, 76, 569-576.
- Makoff, R. Vitamin replacement therapy in renal failure patients. Miner. Electrolyte. Metab., 1999, 25, 349-351.
- Novel Techniques to Save Energy and Memory of Surveillance during Wildlife Footage
Authors
Source
Wireless Communication, Vol 10, No 7 (2018), Pagination: 124-126Abstract
With the advent of technology, embedded systems play a major role in various fields. In early stages for shooting wildlife videos and photos, the photographers used to spend more time for a single shot. The major disadvantage is that the shot taken may not be the required shot, so the work and energy used may be wasted. To overcome the above mentioned problem the surveillance system method was introduced. This proposed system will rectify the above mentioned problems with high efficiency. The NOOBS software is used for interfacing the hardware components and python is used as coding language. The working of surveillance system is as follows, when the camera is said to be turned ON, it will keep recording the whole footage without any human touch. When the obstacles are detected by PIR sensor, the PI camera is turned ON and it is identified by LED. The obstacles are captured by the camera and the captured footage is taken from the fixed location. If the obstacle goes out of range, the camera goes to sleep mode, which results in saving the power.
- Ethno-Botanical Examination of Medicinal Plants Diversity in Molamalai, Karur District, Tamilnadu
Authors
1 PG and Research Department of Botany, Vellalar College for Women, Thindal, Erode - 638012, Tamil Nadu, IN
Source
ScieXplore: International Journal of Research in Science, Vol 7, No 1-2 (2020), Pagination: 1-8Abstract
Objective: The ethno-botanical assessment aims to explore and gather the medicinally aromatic foliages used by local traditional healers at Molamalai Hill, Karur district of Tamil Nadu, India. Materials and Methods: With the assist of medicine-men, elderly people and local traditional healers, the field investigation was conceded out through semi-structured interviews. The knowledge on potent plants and their local names, parts of the plant used in the preparation of medicine and mode of administration on a variety of diseases were recognized. Results: The survey has explored a total of 81 vital angiospermic medicinally aromatic plants belonging to 37 families. Analysis of surveyed plants showed that a greater number of dicotyledons (79 species) belong to a variety of families and 2 monocotyledons belong to Liliaceae and Commelinaceae. Within the dicotyledons, polypetalous shows 37 species, gamopetalous shows 30 species and 12 are monochlamydeae. The majority of the families were represented by Fabaceae and Convolvulaceae (8 species). The 81 diverse ethnic medicinal plants are used to treat skin illness, rheumatism, diabetes, diarrhoea, indigestion, and gonorrhoea. Conclusion: The cram suggested that the present information on the aromatic medicinal use of plants may be helpful for botanical and pharmacological research in future for the discovery of novel sources of drugs.Keywords
Ethno-Botany, Karur Medicinal Plants, Molamalai Hill.References
- Cragg GM, Pezzuto JM 2016. Cancer Chemotherapeutic and Chemopreventive Agents. Med Princ Pract. 2016; 25(2):41-59.
- World Health Organization. Quality control methods for medicinal plants materials. Geneva. 1998.
- https://www.nhp.gov.in/introduction-and-importance-of-medicinal-plants-and-herbs_mtl
- Gamble JS, Fischer CEC. Flora of the Presidency of Madras, Vol, I, II and III, Adlard and Son Ltd., London. 1915-35.
- Matthew KM. The Exotic flora of Kodaikanal. Rec. Bot. Surv. India. 1969; 20:1-241.
- Bentham G. and Hooker JD. 1862–1883. Genera Plantarum, Vols. I, II & III, Weldon and Wesley Ltd., Germany.
- Vaidyanathan D, Sisubalan N, Basha MG. Survey of ethnomedical plants and folklore studies on Malayali tribes of Vellakadai village a part of Shervaroy range in Eastern ghats, Tamil Nadu. Int. J Res Sci Res. 2014; 5(7):1386-1380.
- Dey AK, Rashid MOMd, Millat SMd, Rashid MMd. Ethno botanical survey of medicinal plants used by traditional health practitioners and indigenous people in different districts of Chittagong division. Bangladesh. Int J Pharm Sci Inv. 2014; 3(7):01-07.
- Sharmila S, Kalaichelvi K, Premamalini P. Ecological status of therapeutically important plants in Thiashola, Manjoor, Western Ghats, Tamil Nadu, India. European J Pharmaceu and Med Res. 2016; 3(12):411-416.
- Jadid N, Kurniawan E, Himayani CES, Andriyani, Prasetyowati I, Purwani KI, Muslihatin W, Hidayati D, Tjahjaningrum ITD. An ethnobotanical study of medicinal plants used by the Tengger tribe in Ngadisari village, Indonesia. PLoS ONE. 2020; 15(7):e0235886.