A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Rejani, R.
- A Study to Assess the Knowledge and Attitude Regarding Herbal Remedies Among Mothers of Underfive Children in Selected Rural Areas
Authors
1 Department of Community Health Nursing, Christian College of Nursing ,Neyyoor, K.K Dist., Tamil Nadu, IN
2 Christian College of Nursing , Neyyoor, K.K Dist., Tamil Nadu, IN
Source
International Journal of Nursing Education and Research, Vol 3, No 2 (2015), Pagination: 105-108Abstract
Background : Herbal remedies are the traditional medicine of India. They are helpful to treat major and minor ailments of the body. For thousands of years, medicinal plants have played an important role throughout the world in treating and preventing a variety of diseases .Objectives: This study was carried out to assess the knowledge and attitude regarding herbal remedies among mothers of underfive children to treat minor ailments. Material and method :Research approach used for the study was quantitative approach. The research design selected for this study was non experimental design. The study was conducted in selected rural areas of Verkilambi Panchayat in Kanyakumari District. The sample comprised of 50 mothers of underfive children. sampling technique used was convenience sampling technique. The tool used for data collection were structured knowledge questionnaire to assess the level of knowledge and five point Likert scale to assess the level of attitude. The data collection period was for 6 weeks. Result: Study findings revealed that 23(46%) mothers had average knowledge, 17(34%) had good knowledge and10 (20%) had poor knowledge level.24 (48%) mothers had positive attitude 11(22%) mothers had neutral attitude,7(14%) mothers had negative attitude, 5(10%) mothers had highly negative attitude and 3(6%) mothers had highly positive attitude level. Conclusion: The study findings revealed that mothers of underfive children have good knowledge and favourable attitude regarding herbal remedies. So herbal remedies are used for treating minor ailments.
Keywords
Knowledge, Attitude, Herbal Remedies, Mothers of Under Five Children.- Pixel Pattern Based Steganography on Images
Authors
1 Department of Computer Science and Engineering, Manonmaniam Sundaranar University, IN
2 Infosys Limited, IN
Source
ICTACT Journal on Image and Video Processing, Vol 5, No 3 (2015), Pagination: 991-997Abstract
One of the drawback of most of the existing steganography methods is that it alters the bits used for storing color information. Some of the examples include LSB or MSB based steganography. There are also various existing methods like Dynamic RGB Intensity Based Steganography Scheme, Secure RGB Image Steganography from Pixel Indicator to Triple Algorithm etc that can be used to find out the steganography method used and break it. Another drawback of the existing methods is that it adds noise to the image which makes the image look dull or grainy making it suspicious for a person about existence of a hidden message within the image. To overcome these shortcomings we have come up with a pixel pattern based steganography which involved hiding the message within in image by using the existing RGB values whenever possible at pixel level or with minimum changes. Along with the image a key will also be used to decrypt the message stored at pixel levels. For further protection, both the message stored as well as the key file will be in encrypted format which can have same or different keys or decryption. Hence we call it as a RGB pixel pattern based steganography.Keywords
Data Protection, Steganography, Stegoimage, Cover Image, LSB, MSB, RGB.- Steganodb - A Secure Database Using Steganography
Authors
1 Department of Computer Science and Engineering, Manonmanium Sundarnar University, IN
2 Infosys Limited, Technopark Campus, IN
Source
ICTACT Journal on Communication Technology, Vol 4, No 3 (2013), Pagination: 785-789Abstract
The safety of data and communications for both organizations and personal purposes which at the same time is easy to maintain and having less overhead on system resources is a very important issue. This paper presents a new/alternate secure Database system based on steganography for data hiding. The system provides integrity more confidentiality, and authentication during access or editing of confidential data. The proposed DB system uses steganography technique to store a database of records. The system allows a user to create basic tables and records which are hidden from others inside an image. In this paper propose an architecture which can be used by application developers to retrieve data from the created database in an easy manner. The proposed method is highly useful for use as an embedded DB also in mobile computing as it can store small amount of data easily.Keywords
Data Protection, Secure Database, Steganography, StegoDB.- Farm Ponds for Climate-Resilient Rainfed Agriculture
Authors
1 ICAR-Central Research Institute for Dryland Agriculture, Hyderabad-500 059, IN
Source
Current Science, Vol 112, No 03 (2017), Pagination: 471-477Abstract
This article summarizes the utility of farm pond technology as an adaptation strategy to overcome water shortage due to several reasons, including climate change. This technology has the potential to increase availability of water for supplemental irrigation, increase in cropped area and productivity leading to increase in net returns from crops. Farm pond offers a solution to overcome the increased frequencies of drought, particularly mid-season and terminal drought under climate change scenario. The article advocates for policy intervention to promote one pond for each farm holding having an area of 2.0 ha at individual farm level or on community-sharing basis. Constraints for large-scale implementation of farm pond technology are also discussed.Keywords
Climate Change, Drought Management, Farm Ponds, Rainfed Agriculture, Supplemental Irrigation.- Comparative Study of Spatial Domain Image Steganography Techniques
Authors
1 Department of Computer Science and Engineering, Manonmanium Sundarnar University, Tirunelveli, IN
2 Infosys Limited, Technopark, Karyavattom Campus, IN
Source
International Journal of Advanced Networking and Applications, Vol 7, No 2 (2015), Pagination: 2650-2657Abstract
Steganography is an important area of research in information security. It is the technique of disclosing information into the cover image via. text, video, and image without causing statistically significant modification to the cover image. Secure communication of data through internet has become a main issue due to several passive and active attacks. The purpose of stegnography is to hide the existence of the message so that it becomes difficult for attacker to detect it. Different steganography techniques are implemented to hide the information effectively also researchers contributed various algorithms in each technique to improve the technique's efficiency. In this paper we do a brief analysis of different spatial domain image stegnography techniques and their comparison. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected.Keywords
Cover Image, Embedding, LSB, MSB, RGB, Steganography, Stego-Image.- Data Protection on Mobile Applications
Authors
1 Department of Computer Science and Engineering, Manonmaniam Sundaranar University, IN
Source
ICTACT Journal on Communication Technology, Vol 10, No 2 (2019), Pagination: 1979-1987Abstract
Piracy has been a huge problem to the entire IT industry. In the recent years there has been an increase in the usage of mobile based applications and many a times these applications have been illegally copied and used a lot. Apart from applications, piracy also affects video, audio producers, digital book etc. This results in huge revenue loss to the application developers and also in many cases causes the spread of viruses and backdoor programs causing hijacking of personal data. The most commonly pirated mobile apps are games and utility apps. In this paper we are proposing a new method of protecting mobile apps using steganography which will help in protecting the mobile apps against piracy.Keywords
Data Protection, Steganography, Stego Image, Cover Image, LSB, MSB, RGB.References
- Mohammad A. Haque, Ramin Irani, Kamal Nasrollahi and Thomas B. Moeslund, “Heart Beat Rate Measurement from Facial Video”, IEEE Intelligent Systems, Vol. 31, No. 3, pp. 40-48, 2016.
- H. Rahman and M.U. Ahmed, S. Begum and P. Funk, “Real Time Heart Rate Monitoring from Facial RGB Color Video using Webcam”, Proceedings of 29th Annual Workshop of the Swedish Artificial Intelligence Society, pp. 1-8, 2016.
- Simmi Dutta, Hiteshwar, Abhimanyu Dev Jamwal and Azhar Ud Din Guroo, “Heart Rate Detection using Independent Component Analysis and Multivariate Adaptive Regression Splines”, Imperial Journal of Interdisciplinary Research, Vol. 2, No. 10, pp. 174-178, 2016.
- M. Kumar, A. Veeraraghavan and A. Sabharwal, “Distance PPG: Robust Non-Contact Vital Signs Monitoring using A Camera”, Biomedical Optics Express, Vol. 6, No. 5, pp. 1565-1588, 2015.
- Hussain A. Jaber, A.L. Ziarjawey and Ilyas Cankaya, “Heart Rate Monitoring and PQRST Detection Based on Graphical User Interface with Matlab”, International Journal of Information and Electronics Engineering, Vol. 5, No. 4, pp. 311-317, 2015.
- J. Moreno, J. Ramos-Castro, J. Movellan, E. Parrado, G. Rodas and L. Capdevila, “Facial Video-based Photoplethysmography to Detect HRV at Rest”, International Journal of Sports Medicine, Vol. 36, No. 6, pp. 474-480, 2015.
- Larissa Carvalho, H.G.Virani and S. Kutty, “Analysis of Heart Rate Monitoring Using a Webcam”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, No. 5, pp. 1-7, 2014.
- X. Li, J. Chen, G. Zhao and M. Pietikainen, “Remote Heart Rate Measurement from Face Videos under Realistic Situations”, Proceedings of IEEE International Conference on Computer Vision and Pattern Recognition, pp. 4264-4271, 2014.
- R. Irani, K. Nasrollahi and T.B. Moeslund, “Improved Pulse Dectection from Head Motions using DCT”, Proceedings of 9th International Conference on Computer Vision Theory and Applications, pp. 124-129, 2014.
- S. Thulasi Prasad and S. Varadarajan, “Heart Rate Detection using Hilbert Transform”, International Journal of Research in Engineering and Technology, Vol. 2, No. 8, pp. 12-18, 2013.
- Gerard De Haan and Vincent Jeanne, “Robust Pulse Rate from Chrominance-Based rPPG”, IEEE Transactions on Biomedical Engineering, Vol. 60, No. 10, pp. 94-128, 2013.
- G. Balakrishnan, F. Durand and J. Guttag, “Detecting Pulse from Head Motions in Video”, Proceedings of IEEE International Conference on Computer Vision and Pattern Recognition, pp. 3430-3437, 2013.
- X. Yu, J. Huang, S. Zhang, W. Yan and D. Metaxas, “Posefree Facial Landmark Fitting Via Optimized Part Mixtures and Cascaded Deformable Shape Model”, Proceedings of IEEE International Conference on Computer Vision and Pattern Recognition, pp. 1944-1951, 2013.
- Isayiyas Nigatu Tiba and Li Li, “Image-Based Automatic Pulse Rate Monitoring System Using PC Webcam”, International Journal of Engineering Research and Technology, Vol. 2, No. 12, pp. 841-847, 2013.
- M. Soleymani, J. Lichtenauer, T. Pun and M. Pantic, “A Multimodal Database for Affect Recognition and Implicit Tagging”, IEEE Transactions on Affective Computing, Vol. 3, No. 1, pp. 42-55, 2012.