- The Indian Practitioner
- Wireless Communication
- Current Science
- International Journal of Nursing Education and Research
- Asian Journal of Nursing Education and Research
- International Journal of Innovative Research and Development
- AIRCC's International Journal of Computer Science and Information Technology
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Lalitha, K.
- A Study on the Dependability and Usefulness of Primary Antibiotic Sensitivity Tests with Clinical Specimens
Authors
1 Government Kilpauk Medical College, Madras-600010, IN
Source
The Indian Practitioner, Vol 30, No 11&12 (1977), Pagination: 450-456Abstract
PRIMARY sensitivity tests were done with 300 specimens from different clinical sources, of which 185 (61.7%) gave successful reproducible results. 158 specimens (52.6%) gave pure growth of single organism, 74 (24.6%) gave mixed growths and 68 (22.6%); gave no growth. Identical results were obtained when some of the primary sensitivity tests were compared with those of the pure culture using the same method. Quick results, identification of resistant mutants, selective growth of mixed culture, and the possibility of an early efficient start of treatment for acute infections are the advantages claimed. Economy of effort and materials was achieved by a preliminaty microscopic screening, avoiding specimens with possible heavy contamination, including specimens for those who needed quick early treatment avoiding repetition of the tests by including special antibiotics and drugs for those expecting bacterial growths of marked drug resistance.Keywords
No Keywords- ATM Security Using Wireless Sensor Networks
Authors
Source
Wireless Communication, Vol 8, No 7 (2016), Pagination: 295-297Abstract
The Idea of Designing and Implementation of Security Based ATM theft project is born with the observation in our real life incidents happening around us. This project deals with prevention of ATM theft from robberies and to overcome the drawback found in existing technology in our society. This system uses controller based embedded system to process real time data collected using the vibration sensor. Whenever the thief attempts to break ATM, vibration sensor used here senses the vibration produced from ATM machine and a beep sound will occur from the buzzer also when the thief threatens the person in ATM, the person should enter the pin in reverse order so that DC Motor is used for closing the door of ATM. Servo motor is used to leak the gas inside the ATM to bring the thief into unconscious stage. The status of the ATM will be sent to the bank management and the nearby police station through GSM. This will prevent the robbery and the person involving in robbery can be easily caught. Here, CCS compiler is used to compile the coding and ISP tools are used to implement the idea and results are obtained.
Keywords
Vibration Sensor, DC Motor, Servo Motor, GSM Technique, CCS Compiler.- Severe Heat Wave during May 2015 in Andhra Pradesh
Authors
1 Department of Geography, Andhra University, Visakhapatnam 530 003, IN
2 Department of Geo-Engineering, Andhra University, Visakhapatnam 530 003, IN
Source
Current Science, Vol 110, No 10 (2016), Pagination: 1893-1894Abstract
Summer heat waves are increasing in intensity during recent years, leading to excess human mortality. In India, 14,129 heat-wave deaths occurred during 1979- 2013. The heat waves largely occur in central India, but have intensified in the east coast region, especially in Andhra Pradesh (AP) and Odisha during the last two decades.- A Study to Assess the Effectiveness
Authors
1 Lalitha College of Nursing, Door. No. 16-19-119, Old Guntur Main Road, Guntur-1 (A.P), IN
Source
International Journal of Nursing Education and Research, Vol 2, No 1 (2014), Pagination: 50-57Abstract
Statement:
A study to assess the effectiveness of the structured teaching programme on the knowledge of cervical cancer vaccination among adolescents in a selected junior college, Guntur.
- A Study to Assess the Knowledge and Attitude Regarding Organ Donation among Undergraduate Students Studying in a Selected Arts and Science College, at Guntur
Authors
1 Lalitha College of Nursing, Guntur (A.P), IN
Source
Asian Journal of Nursing Education and Research, Vol 4, No 2 (2014), Pagination: 195-202Abstract
Objectives of the Study:
- To assess the knowledge of students regarding the organ donation
- To assess the attitude towards organ donation in adolescents
- To assess the existing level of knowledge and attitude of organ donation among adolescents
- To determine the effectiveness of structured teaching programme on the knowledge and attitude of organ donation among adolescents
- To find the association between post test knowledge scores with their selected demographic variables
Operational Definitions:
Assess:
It refers to estimate the quality of attitude and knowledge of adolescents in selected Arts and Science Colleges.
Knowledge:It refers to the ideas expressed by the adolescents related to organ donation among undergraduate students.
Attitude: It refers to feelings expressed by the adolescents related to organ donation among undergraduate students.
Adolescents: In this study the term adolescence refers to the college students who are in the first year degree class.
Effectiveness: It refers to desired changes brought about the structured teaching programme on the knowledge and attitude of adolescents regarding organ donation in selected colleges.
Structured Teaching Program: It refers system of planned instruction desired to impart information in order to gain knowledge regarding organ donation of adolescents in selected Arts and Science Colleges.
Organ Donation: It refers to removal of specific tissues of the human body from a person who has recently died or from a living donor, for the purpose of transplanting them into other persons.
HYPOTHESIS:
Hypothesis-I: There will be significant difference between pretest and post test score regarding organ donation among undergraduate students.
Hypothesis-II: There will be a significant association between knowledge and attitude of adolescents regarding organ donation in selected Arts and Science College.
RESEARCH METHODOLOGY
Research Design: The research design selected for the study is a descriptive design, because the present study intends to identify the knowledge of and attitude of undergraduate students regarding organ donation. Setting of the
Study: The setting selected for the present study was Abhyudaya Degree College in Guntur, A.P. In this study college students of all the three years of the course are present. We selected 1st year Degree students. The college function in all days except Sundays, the rationale for selection of this college was familiarity with setting, easy transport facility, administrative approach, cooperation and availability of the subjects.
Target Population: The target population is the aggregate of the case about which the investigator would like to make generalizations. The undergraduate students who were studying 1st year Degree course at Abhyudaya Degree College, Guntur are the target population.
Accessible Population: The accessible population is the aggregate of the undergraduate students conform to the designated criteria. The undergraduate students who are studying 1st year degree course at Guntur, are the accessible population. In the present study, population and study project of the sample were selected by using purposive sampling technique. For this a sample frame of the organ donation among undergraduate students in Abhyudaya Degree College was taken. In Abhyudaya Degree college, we proposed students to understand about the organ donation. Totally 50 sample for the final study were taken.
Inclusion Criteria: The criteria that specify the characteristics of the sample population are referred to inclusion or legibility criteria. The inclusion criteria of the present study are:
- Undergraduate students in Abhyudaya Degree College
- Only female students Undergraduate students who are studying in 1st year degree course
- Students who can able to communicate in local language.
- Students not willing to participate in the study
- Students studying II, III year degree course.
- Active Power Conditioner for Compensation of Reactive Power, Active Power and Harmonics under Different Loading Condition
Authors
Source
International Journal of Innovative Research and Development, Vol 1, No 8 (2012), Pagination: 520-532Abstract
The voltage at the point of common coupling (PCC) in a weak network is very sensitive to load changes. A sudden change in active load will cause both a phase jump and a magnitude fluctuation in the bus voltage, whereas reactive load changes mainly affect the voltage magnitude. With the addition of energy storage to aActive Power Conditioner (APC), it is possible to compensate for the active power change as well as providing reactive power support. In this paper some effective active power compensation schemes are proposed. Simulation results are also presented showing the benefits of active power compensation to certain applications with phase sensitive load. This paper presents a novel control strategy for achieving maximum benefits from these grid-interfacing inverters when installed in 3-phase 4-wire distribution systems. The inverter is controlled to perform as a multi-function device by incorporating active power filter functionality. The inverter can thus be utilized as: 1) power converter to inject power generated from RES to the grid, and 2) shunt APF to compensate current unbalance, load current harmonics, load reactive power demand and load neutral current. All of these functions may be accomplished either individually or simultaneously. This new control concept is demonstrated with extensive MATLAB/Simulink. Finally the proposed shceme is applied for both unbalanced linear and non linear loads.Keywords
International Electro-Technical Commission (IEC), Power Quality, wind Generating System (WGS)- Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Authors
1 Department of CSSE, SVEC (Autonomous), IN
2 SCOPE, VIT University, Vellore, IN
Source
AIRCC's International Journal of Computer Science and Information Technology, Vol 9, No 6 (2017), Pagination: 59-66Abstract
Cloud Computing is the revolution in current generation IT enterprise. Cloud computing displaces database and application software to the large data centres, where the management of services and data may not be predictable, where as the conventional solutions, for IT services are under proper logical, physical and personal controls. This aspect attribute, however comprises different security challenges which have not been well understood. It concentrates on cloud data storage security which has always been an important aspect of quality of service (QOS). In this paper, we designed and simulated an adaptable and efficient scheme to guarantee the correctness of user data stored in the cloud and also with some prominent features. Homomorphic token is used for distributed verification of erasure – coded data. By using this scheme, we can identify misbehaving servers. In spite of past works, our scheme supports effective and secure dynamic operations on data blocks such as data insertion, deletion and modification. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the data management and services may not be absolutely truthful. This effective security and performance analysis describes that the proposed scheme is extremely flexible against malicious data modification, convoluted failures and server clouding attacks.Keywords
Cloud Computing, Cloud Storage Security, Homomorphic Token, EC2, S3.References
- Cong Wang, Qian Wang, and Kui Ren, ”Ensuring Data Storage Security in Cloud Computing ” in Proc. of IWQoS’09, July 2009, pp. 1–9
- G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and Efficient Provable Data Possession,” Proc. of SecureComm ’08, pp. 1–10, 2008.
- Amazon.com, “Amazon Web Services (AWS),” Online at http://aws.amazon.com, 2008.
- A. Juels and J. Burton S. Kaliski, “PORs: Proofs of Retrievability for Large Files,” Proc. of CCS ’07, pp. 584–597, 2007.
- H. Shacham and B. Waters, “Compact Proofs of Retrievability,” Proc. of Asiacrypt ’08, Dec. 2008.
- K. D. Bowers, A. Juels, and A. Oprea, “Proofs of Retrievability: Theory and Implementation,” Cryptology ePrint Archive, Report 2008/175, 2008, http://eprint.iacr.org/.
- K. D. Bowers, A. Juels, and A. Oprea, “HAIL: A High-Availability and Integrity Layer for Cloud Storage,” Cryptology ePrint Archive, Report 2008/489, 2008, http://eprint.iacr.org/.
- G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” Proc. Of CCS ’07, pp. 598–609, 2007.
- R. Curtmola, O. Khan, R. Burns, and G. Ateniese, “MR-PDP: Multiple- Replica Provable Data Possession,” Proc. of ICDCS ’08, pp. 411–420, 2008.
- M. Lillibridge, S. Elnikety, A. Birrell, M. Burrows, and M. Isard, “A Cooperative Internet Backup Scheme,” Proc. of the 2003 USENIX Annual Technical Conference (General Track), pp. 29–41, 2003.
- D. L. G. Filho and P. S. L. M. Barreto, “Demonstrating Data Possession and Uncheatable Data Transfer,” Cryptology ePrint Archive, Report 2006/150, 2006, http://eprint.iacr.org/.
- M. A. Shah, M. Baker, J. C. Mogul, and R. Swaminathan, “Auditing to Keep Online Storage Services Honest,” Proc. 11th USENIX Workshop on Hot Topics in Operating Systems (HOTOS ’07), pp. 1–6, 2007.
- T. S. J. Schwarz and E. L. Miller, “Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage,” Proc. of ICDCS ’06, pp. 12–12, 2006.
- N. Gohring, “Amazon’s S3 down for several hours,” Online at http://www.pcworld.com/businesscenter/article/142549/amazons s3 down for several hours.html, 2008.
- K. D. Bowers, A. Juels, and A. Oprea, “HAIL: A High-Availability and Integrity Layer for Cloud Storage,” Cryptology ePrint Archive, Report 2008/489, 2008, http://eprint.iacr.org/.
- L. Carter and M. Wegman, “Universal Hash Functions,” Journal of Computer and System Sciences, vol. 18, no. 2, pp. 143–154, 1979.
- J. Hendricks, G. Ganger, and M. Reiter, “Verifying Distributed Erasurecoded Data,” Proc. 26th ACM Symposium on Principles of Distributed Computing, pp. 139–146, 2007.
- J. S. Plank and Y. Ding, “Note: Correction to the 1997 Tutorial on Reed-Solomon Coding,” University of Tennessee, Tech. Rep. CS-03- 504, 2003.
- Q. Wang, K. Ren, W. Lou, and Y. Zhang, “Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance,” Proc. of IEEE INFOCOM, 2009.
- R. Curtmola, O. Khan, R. Burns, and G. Ateniese, “MR-PDP: Multiple- Replica Provable Data Possession,” Proc. of ICDCS ’08, pp. 411–420,2008.
- D. L. G. Filho and P. S. L. M. Barreto, “Demonstrating Data Possession and Uncheatable Data Transfer,” Cryptology ePrint Archive, Report 2006/150, 2006, http://eprint.iacr.org/.