- Jemima B. Mohankumar
- G. Ramya
- V. T. Noora
- C. Manusankar
- T. Rajendran
- M. Kavitha
- M. Sadishsendil
- V. P. Arunachalam
- T. Ravichandran
- V. Jean shilpa
- C. Aravind
- M. Sadish Sendil
- U. Kaleelurrahaman
- N. Nagarajan
- V. Subbaroyan
- H. R. Mamatha
- K. Srikanta Murthy
- K. Vasanth
- J. Sahaya Jeniba
- P. Tharani
- M. Sukanya
- S. Biruntha
- T. Kalaikumaran
- H. N Suma
- S. Adline Princy
- R. Malini
- Subba Rao
- H. Summia Parveen
- M.S. Kavitha
- R. Sabitha
- P. Dheeban Shankar
- S. Basker
- S. Sengottuvelu
- N. S. Prabakaran
- The Indian Journal of Nutrition and Dietetics
- Wireless Communication
- Software Engineering
- Programmable Device Circuits and Systems
- Networking and Communication Engineering
- Digital Image Processing
- Digital Signal Processing
- Data Mining and Knowledge Engineering
- Biometrics and Bioinformatics
- Artificial Intelligent Systems and Machine Learning
- ICTACT Journal on Image and Video Processing
- Asian Journal of Research in Chemistry
- ICTACT Journal on Soft Computing
- FoodSci: Indian Journal of Research in Food Science and Nutrition
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Karthik, S.
- Prevalence and Risk Factors of Osteoporosis in Power Loom Women Workers of Sulur Taluk in Coimbatore District
Authors
1 Department of Nutrition and Dietetics, PSG College of Arts and Science, Coimbatore, IN
2 Orthopaedic Consultant and Surgeon, Global Ortho and Trauma Centre, Coimbatore, IN
Source
The Indian Journal of Nutrition and Dietetics, Vol 50, No 10 (2013), Pagination: 408-412Abstract
The skeleton provides physical support and protection for internal organs and through the actions of muscles it enables movements. It also acts as a reservoir for minerals particularly calcium. The adult skeleton contains 1 to1.5 kg calcium (20-25mg/kg fat free tissue) and represents 99 per cent of the total body calcium. Less than one per cent of calcium circulates in a soluble form, and it is this fraction that plays a vital role in neuromuscular and cardiovascular function, blood coagulation and as an intracellular second messenger for cell surface hormone action. In addition calcium plays a role in gene transcription and cellular growth and metabolism. Calcium is required by adults for replacing calcium lost from the body through urine, stools, bile and sweat. It is estimated that in adult this loss may be 700mg/day. However the body can reduce this loss on a low calcium intake through a process of adaptation involving reduced excretion.References
- Hardman, E.A. and Stensel, J.D. Physical Activity and Health- the Evidence Explained. Second Edition, Routledge Publications, Taylor and Francis group, London and New York, 2009, 184.
- Rodda, C. Nutritional Aspects of Disease Affecting the Skeleton in Clinical Nutrition. Ed by Gibney, J.M., Elia, M. Published by Blackwell Sciences, 2005, 295.
- Gopalan, C., Rama Sastri, B.V. and Balasubramaniam, M. Nutritive Value of Indian Foods, NIN (ICMR), Hydrabad, India. 2007.
- Harney, N. and Cooper, C. Disease Prevention:Osteoporosis and Hip Fracture in Public Health Nutrition. Ed by Gibney, M.J., Margetts, M.B. et al., Blackwell publishing, 2005, 357.
- WHO Study Group on Assessment of Fracture Risk and its Application to Screening for Postmenopausal Osteoporosis. Geneva: World Health Organisation,1994.
- Pettifor, J.M., Prentice, A. and Creation Jones. The Skeletal System in Nutrition Metabolism. Ed by Michael J. Gibney, Lan, A. Macdonald and Helen M. Roche Published by Blackwell Science, 2004, 253.
- Shatrugna, V., Kulkarni, B., Kumar, P.A., Rani, K.U. and Balakrishna, N. Bone status of Indian women from a low-income group and its relationship to the nutritional status. Osteopor. Int., 2005, 16, 1827-1835.
- Sharma, S. and Khandelwel, S. Effective Risk Assessment Tools for Osteoporosis in the Indian Menopausal Female. 2010.
- Cury, A.F. and Zacchello, K.P. Osteopoirosis: prevalence and risk factors among >49 year old women in private practice environment. Acta. Ortop. Bras., 2007,15, 146-150.
- Unni, J., Garg, R. and Pawar, R. Bone mineral density in women above 40 years, J. Midlife Health, 2010,1, 19-22.
- Patni, R. Normal BMD values for Indian females aged 20-80 years. J. Midlife Health, 2010, 1, 70-73.
- Cummings, S. and Nevitt, M. Risk factors for hip fracture in white women. New Eng. Met., 1995, 323, 767–773.
- Cannata, J.B. and Andia, Aluminium toxicity in relationship with bone and iron metabolism. Nephrol. Dial. Transplant, 1996, 11 (suppl 3), 69-73.
- Matkovic, V., Fontana, D., Tominac, C., Goel and Charles, Factors that influence peak bone mass formation: a study of calcium balance and the inheritance of bone mass in adolescent females. Am. J. Clin. Nutr., 1990, 52, 878-888.
- An Improved Method for XML and Encryption
Authors
1 Department of Computer Science & Engineering, SNS College of Technology, Coimbatore, Tamilnadu, IN
2 Department of Computer Science and Engineering at Kongu Engineering College, affiliated to Anna University, Coimbatore, Tamilnadu, IN
3 Anna University, Coimbatore, Tamilnadu, IN
Source
Wireless Communication, Vol 3, No 1 (2011), Pagination: 51-58Abstract
In the early days cards have entered our global community. Although initially they were only used as simple phone cards they now support a large number of applications. This paper will mainly explain the Smart card architecture .This paper explains the algorithm used for this and also it explains the SOAP protocol used for the transmission of it. This paper mainly aimed at security and also used for the security purpose. Finally conclude that this technique is better for the transmission of the data.Keywords
Cards, Attacks, Security, Encryption, SOAP Protocol.- Enhancing Search Performance in SocioNet for Unstructured P2P Networks
Authors
1 Department of Computer Science and Engineering, SNS College of Technology, Coimbatore, Tamilnadu, IN
Source
Software Engineering, Vol 3, No 3 (2011), Pagination: 106-109Abstract
Peer-to-Peer (P2P) networks establish loosely coupled application-level overlays on top of the Internet to facilitate efficient sharing of resources. They can be roughly classified as either structured or unstructured networks. Without stringent constraints over the network topology, unstructured P2P networks can be constructed very efficiently and are therefore considered suitable to the Internet environment. In recent year‟s peer to peer system have been evolved in all kind of areas. Unstructured peer to peer has been preferred for most of the application to share file among them. But searching, or locating a peer or file in unstructured peer-to-peer system is a tedious process. That is the existing flooding mechanism reduces the efficiency of unstructured p2p networks. To avoid this we have to implement an efficient routing technique. SocioNet, a social-based overlay that clusters peers based on their preference relationships as a small-world network. In SocioNet, peers mimic how people form a social network and how they query, by preference, their friends or acquaintances. This SocioNet combines with the advantage of cluster based intelligent searching (CIS) algorithm provides that an efficient routing in unstructured P2P. The system clusters peers according to the preference relationship. In the SocioNet the cluster-based searching scheme is used that intelligently forward queries on the maximum independent sets (MIS) of networks. In each cluster the cluster head is being selected, these cluster heads form a MIS and are connected through gateway nodes. Between clusters, CHs intelligently forward queries via gateways to the best neighbor CHs that are most likely to return query results.Keywords
CIS, Peer-to-Peer, SocioNet, Unstructured P2P.- 3 Dimensional Geographical IP Traceback Using Direction Ratio Sampling Algorithm (DRSA)
Authors
1 Department of Computer Science Engineering, SNS College of Technology, Sathy Main Road, Coimbatore-641035, Tamil Nadu, IN
2 SNS College of Technology, Sathy Main Road, Coimbatore-641035, IN
3 Hindustan Institute of Technology, Pollachi Main Road, Coimbatore-641032, IN
Source
Software Engineering, Vol 1, No 3 (2009), Pagination: 97-100Abstract
An important and challenging problem is that of tracing DOS/DDOS attack source. Among many IP Traceback schemes, a recent development is DGT (Directed Geographical Traceback). Though multidirectional two dimensional DGT schemes are available, ξξξ in the real scenario, three dimensional, Multidirectional DGT has potential applications. The direction ratio algorithm [DRA] has the limitation of the impossibility of ensuring sufficient unused space in the packet header for the complete DRL (Direction Ratio List) especially when the length of the path is not known apriori. In this paper that limitation is overcome using DRSA (Direction Ratio Sampling Algorithm) which works well for Three dimensional, Multi-Directional, Geographical IP traceback. This approach enables the attack path reconstruction easily possible. In conclusion, DRSA is a robust scheme of attack path reconstruction in geographical traceback.Keywords
DOS (Distributed Denial of Service), DGT (Directional Geographical Traceback), 3DMDGT (Three Dimensional, Multi-Directional Geographical Traceback), DRA (Direction Ratio Algorithm), DRSA (Direction Ratio Sampling Algorithm).- Reconfigurable Carry Save Adders
Authors
1 Vellore Institute of Technology, IN
Source
Programmable Device Circuits and Systems, Vol 3, No 2 (2011), Pagination: 91-95Abstract
Reconfigurable computing is becoming increasingly popular for many applications. In our project, we assimilate and integrate Reconfigurable adder(RA). In this project we present a novel Reconfigurable Adder for summands of different bit width (8, 16, 32 and 64 bits). The whole structure is based on carry save architecture to support multiple summands for increased performance. Our design can be implemented in ASIC as a run time reconfigurable unit. Targeting our architecture for an ASIC platform, the simulation was carried out in Cadence Incisive Unified Simulator. The synthesis done in 180 nm technology using TSMC 18d library in RTL complier. Experimental results show that RA occupies 9% area less compared to the other traditional adder.Keywords
RA: Reconfigurable Adder, ASIC – Application Specific Integrated Circuit, CSa – Carry Save Adders.- Identification of P2P Traffic across the Networks:A Survey
Authors
1 SNS College of Technology in Department of Computer Science and Engineering, Coimbatore, IN
2 SNS College of Technology in Department of Information Technology, Coimbatore, IN
3 Coimbatore Institute of Engineering and Technology, Coimbatore, IN
Source
Networking and Communication Engineering, Vol 3, No 1 (2011), Pagination: 48-52Abstract
Problem statement: In the last years, we have seen that the use of P2P applications has increased significantly and currently they represent a significant portion of the Internet traffic. In consequence of this growth, P2P traffic characterization and identification are becoming increasingly important for network administrators and designers. Also increasing amount of P2P services not only consuming a lot of bandwidth but also influencing the performance of other business. Another difficulty in identification of traffic in P2P is that P2P applications have the ability to disguise their existence through the use of arbitrary ports and explicitly try to camouflage the original traffic in an attempt to go undetected. In this paper we have analyzed different type of identification methods and compared the efficiency in each method. Approaches: 1. P2P traffic identification using Cluster analysis which seek five traffic discriminators and applies cluster analysis to identify P2P traffic. 2. P2P traffic identification based on double layer characteristics which identify traffic based on flow characteristics and payload characteristics. 3. Transport layer heuristic identification in which P2P traffic flows are identified by analyzing the statistical properties of the flows and their behavior characteristics. 4. Payload-based IP traffic identification packet payloads are analyzed to determine whether they contain specific signatures of known applications. Results: After analyzing each model we find out that there are both advantages and limitation in it. We have simulated those models and compared with each other. Conclusion and Future work: With the widely adoption of the P2P, the method for the control and the management to the P2P applications has become a research hotspot. In this paper we analyse different methods to identify the traffic in P2P application. In future we try to build a new algorithm which combines the best capabilities of the analyzed approaches.Keywords
Cluster Analysis, Flow Characteristics, Payload Characteristics, Traffic Identification.- An Investigation of 2 n Direction Geographical Traceback Using Simulation of IP Traceback Strategies
Authors
1 Department of Computer Science Engineering SNS College of Technology, Sathy Main Road, Coimbatore-641035, Tamil Nadu, IN
2 SNS College of Technology, Sathy Main Road, Coimbatore-641035, IN
3 Hindustan Institute of Technology, Pollachi Main Road, Coimbatore-641032, IN
Source
Networking and Communication Engineering, Vol 1, No 3 (2009), Pagination: 110-114Abstract
DoS / DDoS(Distributed Denial of Service) attacks deny regular, internet services accessed by legitimate users, either by blocking the services completely, or by disturbing it completely, so as to cause customer baulking. Several traceback schemes are available to mitigate these attacks. The simulation approach also can be used to test the performing effects of different marking schemes in large-scale DDoS attacks. Based on the simulation and evaluation results, more efficient and effective algorithms, techniques and procedures to combat these attacks may be developed. DGT8, directional geographical trackback scheme, with 8 directions is one of them. Having a limited set of 8 directions, DGT8 may not work for routers with more than 8 interfaces. In this paper, we propose M-DGT i.e DGT 16, a 16 directional geographical traceback scheme having all the advantages of DGT. The 16 directions, though not having exactly equal interface, have nearly equal measures, and are identified using a novel scheme of Segment Direction Ratios (SDR). The SDR concept and the associated marking scheme allow the victim to defend against DDoS attacks independent of its ISP and also the generalization to DGT2n, having 2n directions (n>4).
Keywords
DoS, DDoS, DGT (Directed Geographical Traceback), IP Traceback, SDR (Segment Direction Ratio).- An Empirical Comparison of Three Object Recognition Methods
Authors
1 Sathyabama University, IN
2 Cognizant Technology Solutions, Chennai, IN
Source
Digital Image Processing, Vol 3, No 16 (2011), Pagination: 1030-1034Abstract
In this paper an attempt has been made to compare three different approaches of Object Recognition namely, Gradient based, Histogram based and Texture based methods. For a realistic approach common household articles with uniform colour properties have been taken up for this study, instead of standard images. An evaluation of the comparative study has been made and the results have been tabulated. We believe that this study will be useful in choosing the appropriate approach in object recognition for service robots. In this paper, we evaluate an object recognition system building on three types of method, Gradient based method, Histogram based method and Texture based method. These methods are suitable for objects of uniform color properties such as cups, cutlery, fruits etc. The system has a significant potential both in terms of service robot and programming by demonstration tasks. This paper outlines the three object recognition system with comparison, and shows the results of experimental object recognition using the three methods.Keywords
Correlation, Gradient, Histogram, Texture.- Kannada Characters Recognition-A Novel Approach Using Image Zoning and Run Length Count
Authors
1 Department of IS&E, PES School of Engineering, Bangalore, IN
2 Department of IS&E, PES Institute of Technology, Bangalore, IN
3 Department of CS&E, PES School of Engineering, Bangalore, IN
Source
Digital Image Processing, Vol 3, No 16 (2011), Pagination: 1059-1062Abstract
Optical Character Recognition (OCR) is one of the important field in image processing and pattern recognition domain. Many practical applications uses OCR with high accuracy. The accuracy of the Optical Character Recognition system depends on the quality of the features extracted and the effectiveness of the classifier. Here we are proposing a novel method to recognize the printed kannada vowels. Kannada script has large number of characters having similar shapes and also the complexity is font dependent, which means the same characters in a class, may vary in structure for different fonts. Hence a method, which makes use of image zoning and the Run Length Count techniques to extract the features have been proposed. The methodology uses Naive Bayes classifier, K-Nearest Neighbor classifier for classification. The method experimented on a dataset, which consists of samples from 69 different fonts, and a maximum of 97.44% recognition accuracy is achieved.Keywords
Optical Character Recognition, Naive Bayes Classifier, K-Nearest Neighbor Classifier, Zoning, Run Length Count.- A Non Adaptive Scheme for Removal of Image Noises and its Artifact
Authors
1 Department of E.E.E, Sathyabama University, Jeppiaar Nagar, Rajiv Gandhi Salai, Chennai-119, IN
2 Cognizant Technologies Solutions, Chennai, Tamilnadu, IN
Source
Digital Image Processing, Vol 3, No 10 (2011), Pagination: 620-629Abstract
In this paper, a fixed 3×3 window size switched algorithm for removal of the image noises such as fixed impulse, random impulse noise, zero mean Gaussian noise, mixed noise and artifacts such as blotches, stripes, streaks for gray scale images for increasing noise densities is presented. The proposed method uses a tree based method to classify the noisy pixels and noisy free pixels. Being a switched algorithm the median is calculated only after identifying the pixel is noisy. At higher noisy environments the corrupted pixel is replaced either by the median or by mean of non noisy pixel in the current window or the preprocessed neighborhood pixel based on the classification. The quantitative and qualitative performance of the proposed algorithm outclasses many of the standard filters in terms of different artifact removal with edge preservation. The proposed algorithm found to give better results in the removal of fixed impulse noise up to 80%, and preserves edges up to 70%, zero mean 0.9% variance Gaussian noise. The proposed algorithm even found to suppress mixed noise of 10% impulse noise plus zero mean 0.3% variance Gaussian noise composition.Keywords
Switched Median Filter, Modified Decomposition Filter, Threshold Decomposition Filter.- Zigbee Based Wireless Home Security and Automation System
Authors
1 SNS College of Technology, Coimbatore, Tamilnadu, IN
2 Department of CSE in SNS College of Technology, Coimbatore, Tamilnadu, IN
Source
Digital Signal Processing, Vol 3, No 1 (2011), Pagination: 24-30Abstract
Nowadays, people's demands on wireless network are getting higher and higher. Security problem is becoming the focus that wireless networks pay attention to. This paper discusses the security structures of ZigBee in home automation system, analyzes the security of Medium Access Control (MAC) layer, Network (NWK) layer and Application (APL) layer. Moreover it analyzes the authentication and encryption in ZigBee technology completely, and proposes opinions for network security protection, solves the confidentiality, integrity and access control problem in network communication. This paper introduces the conceptual understanding and strategy of ZigBee IEEE 802.15.4 standard to be deployed in smart home environment. ZigBee technology offers a multi-hop communication capability for data transfer. For the last few years, we've witnessed a great expansion of remote control devices in our day-to-day life. Five years ago, infrared (IR) remotes for the television were the only such devices in our homes. One of the most promising HAN protocols is ZigBee, a software layer based on the IEEE 802.15.4 standard. Multi-hop communication will provide unlimited range of communication for the system as long as there are intermediate nodes that will pass the data from one node to another until it reaches the destination. And finally the zigbee communication protocol presents its potential deployment in smart home environment.Keywords
ZigBee, Security Structure, Secret Key, CCM Mode, Wireless Communication.- Improving the Performance in Education Sector Using Data Mining Techniques
Authors
1 Department of Computer Science & Engineering (PG), SNS College of Technology, Sathy Main Road, Coimbatore-641035, IN
2 Department of Computer Science Engineering, SNS College of Technology, Sathy Main Road, Coimbatore-641035, IN
Source
Data Mining and Knowledge Engineering, Vol 4, No 8 (2012), Pagination: 401-405Abstract
The education performance is a turning point for all the students in academics. This is used to identify the difference between the fast learners and slow learners. Students' retention has become an indication of academic performance and enrolment management. The ability to predict a student's performance is very important in educational environments. Students' academic performance is based upon diverse factors like personal, social, Psychological and other environmental variables. A very promising tool to attain this objective is the use of Data Mining. Data mining techniques are used to discover hidden information patterns and relationships of large amount of data, which is very much helpful in decision making. A single data contains a lot of information. The type of information is produced by the data and it decides the processing method of data. A lot of data that can produce valuable information, in education sector contains this valuable information. Which helps the education sector to capture and compile low cost information for this information and communication technology is used. Now-a-days educational database is increased rapidly because of the large amount of data stored in it. The loyal students motivate the higher education systems, to know them well; the best way is by using valid management and processing of the students' database. Data mining approach provides valid information from existing student to manage relationships with upcoming students. One of the main problems faced by students is to take the right decision in relation to their academic itinerary based on available information.- Volumetric Measurements of Activity Pattern of the Brain with fMRI Data
Authors
1 Department of Medical Electronics, BMSCE, Bangalore, IN
2 MIT, Manipal, IN
Source
Biometrics and Bioinformatics, Vol 3, No 2 (2011), Pagination: 74-77Abstract
Functional Magnetic Resonance Imaging (fMRI) is a technique for measuring brain activity. It works by detecting the changes in blood oxygenation and the blood flow pattern that occur in response to neural activity The analysis of fMRI data involves the measurement of several features of the activity regions. These features include volume, depth, area, time, etc. Each of these features gives the researcher some idea about how the brain has reacted to the given stimulus. However, it is not easy to measure these characteristic features when there is only 2D data in the form of slices to work on. This is one of the main reasons why a 3D representation is desired.The 3D model allows interactive depth viewing. It gives a clear indication of the depth of inception of the activity and also depth of seizure of the activity. It gives the location of the activity in all the three orientations thus providing the data for surgical preparations. The visibility of the activity to the full is sometimes available in only certain orientation. The selection of the relevant orientation is easy with 3D rendering. The tool even allows for measurements in the 3D view in all the three directions. These factors make the 3D rendering a useful technique in volumetric measurements of the fMRI data.
Keywords
fMRI, Feature Extraction, 3D Rendering, Volumetric Measurements.- Recognition of Occluded Objects Using Wavelet Transform
Authors
1 Sathyabama University, IN
2 Cognizant Technology Solutions, Chennai, IN
Source
Artificial Intelligent Systems and Machine Learning, Vol 3, No 12 (2011), Pagination: 748-750Abstract
This paper presents an approach for the recognition of multiple view objects based on wavelet transform, even when come portion of the object is occluded. Object recognition is achieved by extracting the energy computed from all the sub-bands of Discrete Wavelet Transform (DWT) fused with the colour moments. Therefore the proposed method considers not only the frequency relationship but also the spatial relationship of pixels in the objects. The extracted features are used as an input to the K Nearest Neighbor (K-NN) for classification. The evaluation of the system is carried on using COIL database and the performance of the proposed system is studied by varying the training set sizes. The experiment was extended further to cover objects that were partly occluded. Experimental results show that the proposed method produces more accurate classification rate, even with partial occlusion.Keywords
Wavelet Transform, Colour Moments, KNN Classifier, Object Recognition, Occlusion.- Performance Analysis of a Modified Decomposition Filter for Non Identical Noises
Authors
1 Sathyabama University, Tamil Nadu, IN
2 Cognizant Technology solutions, Tamil Nadu, IN
Source
ICTACT Journal on Image and Video Processing, Vol 1, No 2 (2010), Pagination: 105-115Abstract
The proposed work aims in the restoration of images corrupted by Gaussian noise, impulse noise. The new algorithm significantly removes different noises and produce better image quality than standard median filter (SMF), Centre weighted median filter (CWF) and threshold decomposition filter (TDF).The proposed algorithm (PA) is tested on different images corrupted by all two noises and is found to produce better results in terms of the qualitative and quantitative measures of the image for noise densities up to 30% noise level for impulse noise, mean zero and 0.9% variance of Gaussian noise. The filter works well for speckle noise up to 0.8% variance.Keywords
Impulse Noise, Median Filter, Threshold Decomposition, Non-Linear Filter.- A Switching Algorithm Using Modified Selection Sort for the Reduction of Impulse Noise
Authors
1 Sathyabama University, Chennai, Tamilnadu, IN
2 Cognizant Technology solutions, Chennai, Tamilnadu, IN
Source
ICTACT Journal on Image and Video Processing, Vol 1, No 1 (2010), Pagination: 57-64Abstract
A novel algorithm is proposed for the restoration of images corrupted by impulse noise; this work aims at a novel filter whose window size is fixed (3X3) for all noise densities. The new algorithm significantly produces better image quality than standard median filter (SMF), adaptive median filters (AMF), and center weighted median filter (CWMF) and threshold decomposition filter (TDF). Unlike the other filters, the proposed algorithm computes median if and only if there is a corrupted pixel and replaces it by the median value, if the median is corrupted then average of uncorrupted pixels in the current processing window is replaced else preprocessed pixel value is replaced. The proposed method removes the noise effectively even at noise level as high as 85% and preserves the edges without any loss up to 80% of noise level. The proposed algorithm (PA) is tested on different images and is found to produce better results in terms of the qualitative and quantitative measures.Keywords
Impulse Noise, Median Filter, Adaptive Median Filter, Decision Based Filter, Weighted Filter.- Biosynthesis of Silver Nanoparticles by Aspergillus niger
Authors
1 School of Chemical and Biotechnology, SASTRA University, Tanjore-613402, Tamilnadu, IN
Source
Asian Journal of Research in Chemistry, Vol 4, No 1 (2011), Pagination: 31-34Abstract
The role of nanomaterials in building future technology is immense and its application in a plethora of fields makes it interesting to explore more in this area. An important aspect of nanotechnology concerns the development of experimentally reliable protocols for the synthesis of nanoparticles. An attractive perspective would be the use of microorganisms to synthesize nanoparticles. Extracellular synthesis of silver nanoparticles by Aspergillus niger was carried out under varying concentrations of glucose in the medium. It was found that the A. niger reduced silver nitrate to silver nanoparticles in solution by a shuttle quinone extracellular process. The HPTLC (High performance thin layer chromatography) analysis of the filtrate obtained by filtering the biomass in milli-Q water on silica gel 60 plates using Ethyl acetate- Methanol- Water (100:13.5:10) showed a spot with Rf value of 0.65 corresponding to 2-acetyl-3,8- dihydroxy-6-methoxy anthraquinone or its isomers. Also, the maximum yield of silver nanoparticles was obtained at glucose concentration of 2.75g/l. This is the first time that the biosynthesis of silver nanoparticles by A. niger is reported and the potentialities of this nanotechnological design are vast including anti-cancer and anti-bacterial activities.
Keywords
Silver Nanoparticles, Aspergillus niger, High Performance Thin Layer Chromatography.- Prediction of Transmitted Wave Height of Tandem Breakwater Using PSO-SVM
Authors
1 Department of Applied Mechanics and Hydraulics, National Institute of Technology, Karnataka, IN
Source
ICTACT Journal on Soft Computing, Vol 8, No 1 (2017), Pagination: 1544-1548Abstract
Economic development of a country is directly dependent on the functioning of the ports and transportation facilities available. It is of vital importance to protect the ports and harbors and thereby providing safe and effective loading and unloading facilities. Proper protective measures like breakwaters have to be constructed to protect and maintain tranquility conditions inside the harbor. Apart from conventional rubble mound breakwater, newly developed hybrid type breakwaters are also used as protective structures. Final layout of the structure is determined only after prior physical model studies. Soft computing techniques, widely used in the field of prediction, are recently used in the field of breakwater studies for the prediction of transmitted wave height, damage analysis etc. Present work deals with the transmitted wave height prediction of a tandem breakwater using hybrid PSO-SVM model. Effectiveness of the models developed were measured using various statistical parameters such as RMSE, MAE, CC and SI. Results showed that, from among various kernels used, model developed with polynomial kernel showed better correlation.Keywords
Tandem Breakwater, PSO-SVM, Polynomial Kernel, Soft Computing.References
- V. Vapnik, S. Golowich and Alex Smola, “Support Vector method for Function Approximation Regression Estimation and Signal Processing”, Advance in Neural Information Processing Systems, pp. 281-287, 1996.
- S. Gunn, “Support Vector Machines for Classification and Regression”, Technical Report, School of Electronics and Computer Science, University of Southampton, 1997.
- Yong-Sik Cho, Jong-In Lee and Young-Taek Kim, “Experimental Study of Strong Reflection of Regular Water Waves over Submerged Breakwaters in Tandem”, Ocean Engineering, Vol. 31, No. 10, pp. 1325-1335, 2004.
- Sukomal Mandal, Subba Rao, N. Harish and Lokesha “Damage Level Prediction of Non-Reshaped Berm Breakwater using ANN, SVM and ANFIS Models”, International Journal Naval Architecture Ocean Engineering, Vol. 4, No. 2, pp. 112-122,2012.
- Subba Rao and Kiran G Shirlal, “Studies on tandem breakwater” R&D project, Technical Report, Ministry of Water Resources through ISH Journal of Hydraulic Engineering, pp. 36-45, 2003.
- K.G. Shirlal and Subba Rao “Laboratory Studies on the Stability of Tandem Breakwater”, ISH Journal of Hydraulic Engineering, Vol. 9, No. 1, pp. 36-45, 2003.
- K. G. Shirlal, Subba Rao, Venkata Ganesh and Manu, “Stability of Breakwater Defenced by a Submerged Reef”, Ocean Engineering, Vol. 33, No. 5-6, pp. 829-846, 2006.
- Eldr Thesnaar, “Efficiency of Tandem Breakwater in Reducing Wave Heights and Damage Level: A Mossel Bay Case Study”, Master of Engineering Thesis, Stellenbosch University, 2015.
- J. S. Jithin, “Prediction of Transmitted Wave Height and Damage Level of Tandem Breakwater using SVM”, Master of Engineering Thesis, National Institute of Technology, 2016.
- S.G. Patil, S. Mandal and A.V. Hegde, “Genetic Algorithm based Support Vector Machine Regression in Predicting Wave Transmission of Horizontally Interlaced Multi-Layer Moored Floating Pipe Breakwater”, Advances in Engineering Software, Vol. 45, No. 1, pp. 203-212, 2012.
- Chandrabhushan Roy, Shervin Motamedi, Roslan Hashim, Shahaboddin Shamshirb and Dalibor Petkovic, “A Comparative Study for Estimation of Wave Height using Traditional and Hybrid Soft-Computing Methods”, Environmental Earth Science, Vol. 75, pp. 590-595, 2016.
- Iman Malekmohamadi, Mohammad Reza Bazargan-Lari, Reza Kerachian, Mohammad Reza Nikoo and Mahsa Fallahnia, “Evaluating the Efficacy of SVMs, BNs, ANNs and ANFIS in Wave Height Prediction”, Ocean Engineering, Vol. 38, No. 2-3, pp. 487-497, 2011.
- O. Yagci, D.E. Mercan, H.K. Cigizoglu and M.S. Kabdasli, “Artificial Intelligence Methods in Breakwater Damage Ratio Estimation”, Ocean Engineering, Vol. 32, No. 17-18, pp. 2088-2106, 2005.
- Pasquale Contestabile, Claudio Iuppa, Enrico Di Lauro, Luca Cavallaro, Thomas Lykke Andersen and Diego Vicinanz, “Wave Loadings Acting on Innovative Rubble Mound Breakwater for Overtopping Wave Energy Conversion”, Coastal Engineering, Vol. 122, pp. 60-74, 2017.
- Aji Ali Akbar, Junun Sartohadi, Tjut Sugandawaty Djohan and Su Ritohardoyo, “The Role of Breakwaters on the Rehabilitation of Coastal and Mangrove Forests in West Kalimantan, Indonesia”, Ocean and Coastal Management, Vol. 138, pp. 50-59, 2017.
- Dookie Kim, Dong Hyawn Kim and Seongkyu Chang, “Application of Probabilistic Neural Network to Design Breakwater Armor Blocks”, Ocean Engineering, Vol. 35, pp. 294-300, 2008.
- Can Elmar Balas, M. Levent Koc and Rifat Tur, “Artificial Neural Networks based on Principal Component Analysis, Fuzzy Systems and Fuzzy Neural Networks for Preliminary Design of Rubble Mound Breakwaters”, Applied Ocean Research, Vol. 32, No. 4, pp. 425-433, 2010.
- Enhancing Medical Imaging for Diagnosis and Treatment using Neuro Fuzzy Systems
Authors
1 Department of Computer Science and Engineering, Sri Eshwar College of Engineering, IN
2 Department of Computer Science and Engineering, SNS College of Technology, IN
Source
ICTACT Journal on Soft Computing, Vol 15, No 1 (2024), Pagination: 3465-3472Abstract
Cardiovascular diseases (CVDs) are a leading cause of mortality worldwide. Accurate and early diagnosis is critical for effective treatment. Traditional methods of medical imaging analysis often lack precision and efficiency. The challenge lies in enhancing the accuracy and efficiency of medical imaging analysis for CVD diagnosis using advanced computational methods. This study proposes a novel approach that integrates extreme learning machines (ELM) for feature extraction with neuro-fuzzy systems for classification. The ELMs efficiently extract relevant features from medical images, while the neuro-fuzzy systems classify these features with high accuracy. Experimental results demonstrate a significant improvement in diagnosis accuracy. The proposed method achieved a classification accuracy of 95.7%, sensitivity of 94.3%, and specificity of 96.2%. These results outperform several existing methods in terms of both accuracy and computational efficiency.Keywords
Cardiovascular Disease, Medical Imaging, Extreme Learning Machines, Neuro-Fuzzy Systems, Feature Extraction- Screening for Secondary Metabolites and Anxiolytic Effect of Passiflora foetida
Authors
1 Research and Development Centre, Bharathiar University, Coimbatore – 641046, Tamil Nadu, IN
2 Department of Botany, Government Arts College (Autonomous), Salem – 636007, Tamil Nadu, IN
3 Department of Biotechnology, Nandha Arts and Science College, Erode – 638052, Tamil Nadu, IN
4 Department of Pharmacology, Nandha College of Pharmacy, Erode – 638052, Tamil Nadu, IN
Source
FoodSci: Indian Journal of Research in Food Science and Nutrition, Vol 7, No 1 (2020), Pagination: 28-34Abstract
From the ancient time, plant medicine is considered an important part of healthcare system because of its relative accessibility, low cost, easy availability and acceptance by local communities. A variety of plants are employed in traditional medicine to treat nervous disorder, one among the genera is Passiflora. The objective of the present investigation was to screen the availability of secondary metabolites in methanolic extract of Passiflora foetida and to check its potential for the anti-anxiety activity using Elevated plus Maze (EPM) animal model. The crude extractshowed the presence of Alkaloids, Coumarins, Flavonoids, Glycosides, Oils and fats, Phenols, Resin, Sterols, Steroids and Saponins, Tannins and Quinones which then subjected to anxiolytic activity at the doses of 200 and 400 mg/kg, per oralin mice and its efficacy was statistically compared with the standard anxiolytic drug, diazepam (3 mg/kg, Intraperitoneal). As a result, the extract increased the number of entries as well as the time spent in open arm as a dose dependent manner and proved to be statistically significant. These results provide support for the use of Passiflora foetida as traditional medicine for its Anxiolytic property.Keywords
Anti-anxiety, Diazepam and Elevated Plus Maze.References
- Eloff JN. Which extractant should be used for the screening and isolation of antimicrobial components from plants? Journal of Ethnopharmacology. 1998; 60: 1–8. https://doi.org/10.1016/S0378-8741(97)00123-2.
- Baldessarini RJ, Hardman JG, Limbird LE and Gilman AG. Goodman & Gilman. The Pharmacological Basis of Therapeutics. 10th ed. McGraw-Hill; 2001. p. 472–3.
- Thakur P and Rana AC. Anxiolytic potential of medicinal plants. International Journal of Nutrition, Pharmacology, Neurological Diseases. 2013; 3(4): 325–31. https://doi.org/10.4103/2231-0738.119838.
- Speroni E and Minghetti A. Neuropharmacological activity of extracts from Passifloraincarnata. Planta Medica. 1988; 54:488–91. https://doi.org/10.1055/s-2006-962525. PMid:3212072 .
- Wolfman C, Viola H, Paladini A, Dajas F and Medina JH. Possible anxiolytic effects of chrysin, a central benzodiazepine receptor ligand isolated from Passifloracoerulea. Pharmacology Biochemistry & Behavior. 1994; 47:1–4. https://doi.org/10.1016/00913057(94)90103-1.
- Akhondzadeh S, Naghavi HR, Shayeganpour A, Rashidi A and Khani M. Passion flower in the treatment of generalized anxiety: a pilot double-blind randomized controlled trial with oxazepam. Journal of Clinical Pharmacy and Therapeutics. 2001; 26:363–7. https://doi.org/10.1046/j.1365-2710.2001.00367.x. PMid:11679026.
- Dhawan K, Kumar S and Sharma A. Anti-anxiety studies on extracts of Passifloraincarnata Linneaus. Journal of Ethnopharmacology. 2001a; 78:165–70. https://doi.org/10.1016/S0378-8741(01)00339-7.
- Dhawan K, Kumar S and Sharma A. Anxiolytic activity of aerial and underground parts of Passifloraincarnata. Fitoterapia. 2001b; 72:922–6. https://doi.org/10.1016/S0367-326X(01)00322-7.
- Krenn L. Passion Flower (Passifloraincarnata L.) - a reliable herbal sedative. [Article in German] Wiener Medizinische. Wochenschrift.2002; 152:404–6. https://doi.org/10.1046/j.1563-258X.2002.02062.x. PMid:12244887.
- Phengklai E and Khamsai S. Some non-timber species of Thailand. Thai Forest Bulletin (Botany). 1985; 15:108–48.
- Mohanasundari C, Natarajan D, Srinivasan K, Umamaheswari S and Ramachandran A. Antibacterial properties of Passiflora foetida L. - A common exotic medicinal plant. African Journal of Biotechnology. 2007; 6 (23):2650–3. https://doi.org/10.5897/AJB2007.000-2426.
- Patil AS, Lade BD and Paikrao HM. A Scientific Update on Passiflora foetida. European Journal of Medicinal Plants. 2015; 5(2):145–55. https://doi.org/10.9734/EJMP/2015/12015.
- Ingale AG and Hivrale AU. Pharmacological studies of Passiflora sp. and their bioactive compounds. African Journal of Plant Science. 2010; 4(10):417–26.
- Pancho JV, Vega MR and Plucknett DL. Some common weeds of the Philippines. Laguna, Philippines: Weed Science Society of the Philippines, University of the Philippines at Los Vagas; 1969.
- Gardner DE. Pathogenicity of Fusarium oxysporum f. sp. passiflorae to banana poka and other Passiflora sp. in Hawaii. Plant Disease. 1989; 73(6):476–8. https://doi.org/10.1094/PD-73-0476.
- Dassanayake EM and Hicks RGT. Aphid resistant properties in Passiflora species with special reference to the glandular hairs. Sri Lankan Journal of Agricultural Sciences. 1994; 31(11):59–63.
- Ulubelen, A, Topcu G, Mabry TJ, Dellamonica G and Chopin JC. Flavonoids from Passiflora foetida var. hispida and P. foetida var. hibiscifolia. Journal of Natural Products. 1982; 45:103. https://doi.org/10.1021/np50019a012.
- Andersen L, Adsersen, A and Jaroszewski JW. Natural cyclopentanoid cyanohydrin glycosides. Phytochemistry. 1998; 47:1049–50. https://doi.org/10.1016/S00319422(98)80070-8.
- Hasan SQ, Ahmad I, Sherwani MRK, Ansari AA and Osman S. Studies on herbaceous seed oils. Fette Seifen Anstrichm. 1980; 82:204–5. https://doi.org/10.1002/lipi.19800820508.
- Echeverri F, Arango V, Quinones W, Torres F, Escobar G, Rosero Y and Archbold, R. Passifloricins, polyketides alphapyrones from Passiflora foetida resin. Phytochemistry. 2001; 56:881–5. https://doi.org/10.1016/S0031-9422(00) 00478-7.
- DhawanK, Dhawan S and Sharma A. Passiflora: A review update. Journal of Ethnopharmacology. (2004) 94: 1–23. https://doi.org/10.1016/j.jep.2004.02.023. PMid: 15261959.
- Woisky RG and Salatino A. Analysis of propolis: Some parameters and procedures for chemical quality control. Journal of Apicultural Research. 1998; 37:99–105. https://doi.org/10.1080/00218839.1998.11100961.
- Cunha IBS, Sawaya, ACHF, Caetano FM, Shimizu MT, Marcucci MC, Drezza FT, Povia, GS and Carvalho PO. Factors that influence the yield and composition of Brazilian propolis extracts. Journal of the Brazilian Chemical Society. 2004; 15:964–970. https://doi.org/10.1590/S010350532004000600026.
- Phrompittayarat W, Putalun W, Tanaka H, Jetiyanon K, Wittaya-areekul S and Ingkanina K. Comparison of various extraction methods of Bacopamonnier. Naresuan University Journal. 2007; 15(1):29-34.
- Sasidharan S, Darah I and Jain K. In Vivo and in Vitro toxicity study of Gracilariachangii. Pharmaceutical Biology. 2008; 46:413–17. https://doi.org/10.1080/13880200802055867.
- Sofowara A. Medicinal plants and traditional medicine in Africa. Ibadan, Nigeria: Spectrum Books Ltd.; 1993.p. 289.
- Trease GE and Evans WC. Pharmacognosy (11 ed.). London: Bailliere Tindall.; 1989.p. 45-50.
- Harborne JB. Phytochemcial methods. London: Chapman and Hall, Ltd.; 1973.p. 49-188.
- Farooq R, Darakhshan J and Haleem MA. Dose related anxiolytic effects of diazepam: Relation with serum electrolytes, plasma osmolality and systolic blood pressure (sbp) in rats. Pakistan Journal of Pharmacology. 2008; 37–42.
- Suneetha D, Divya Teja S, Banda and Firasat Ali. Antiobesity Values of Methanolic Extract of Sapindusemariganatus on Monosodium Glutamate Induced Model in Rats. International Journal of Pharmacognosy and Phytochemical Research. 2013; 145(4):267–70.
- Sasikala V, Saravanan S and Parimelazhagan T. Analgesic and anti-inflammatory activities of Passiflora foetida L. Asian Pacific Journal of Tropical Medicine. 2011:600–3. https://doi.org/10.1016/S1995-7645(11)60155-7.
- Kulkarni SK. Handbook of experimental pharmacology. 3rd Ed. New Delhi: Vallabh Prakashan, Pitampura; 2003.
- Patil AS, Paikrao HM and Patil SR. Passiflora foetida Linn: A complete morphological and phytopharmacological review. International Journal of Pharma and Bio Sciences. 2013; 4(1):285–96.
- Gerhard Vogel H, Wolfgang H Vogel and Bernward A. Schölkens, Jürgen Sandow and Günter Müller. Drug Discovery and Evaluation Pharmacological Assays.2nd edition, Springer-Verlag, Berlin Heidelberg New York; 2002.p. 434–5.
- Khan IN, Sarker MMI and Ajrin M. Sedative and anxiolytic effects of ethanolic extract of Calotropisgigantea (Asclepiadaceae) leaves. Asian Pacific Journal of Tropical Biomedicine. 2014; 4(1):S400–4. https://doi.org/10.12980/APJTB.4.2014C1147. PMid:25183117 PMCid:PMC4025325.
- Shafeen S, Reddy TS, Arafath S, Nagarjuna S and Reddy YP. Evaluation of antianxiety and antidepressant activity of Cassia occidentalis leaves. Asian Journal of Pharmaceutical and Clinical Research. 2012; 5(3):47–50.
- Kumar S and Sharma A. Apigenin: The anxiolytic constituent of Turneraaphrodisiaca. Pharmaceutical Biology. 2006; 44(2):84–90. https://doi.org/10.1080/13880200600591758.
- Bynum WF, Hardy A, Jacyna S, Lawrence C, Tansey EM andDamasio AR. Diagnostic and statistical manual of mental disorders: DSM IV. Vol. 327, 4th Ed. Washington, DC: Psychiatric Epidemiology, American Psychiatric Association. 1994; 4:432–6.
- Grundmann O, Nakajima J, Kamata K, Seo S and Butterweck V. Kaempferol from the leaves Apocynumvenetum possesses anxiolytic activities in the elevated plus maze test in mice. Phytomedicine. 2009; 16(4):295–302. https://doi.org/10.1016/j.phymed.2008.12.020. PMid:19303276.
- Morris MS, Fava M, Jacques PF, Selhub J and Rosenberg IH. Depression and folate status in the US Population. PsychotherPsychosom. 2003; 72:80–7. https://doi.org/10.1159/000068692. PMid:12601225.
- Navarro E, Alonso SJ, Trujillo J, Jorge E and Pérez C. Central nervous activity of elenoside. Phytomedicine. 2004; 11:498–503. https://doi.org/10.1016/j.phymed.2003.06.003. PMid:15500260.
- Meda Ramesh and Jaya Sankar Reddy V. A review on anxiolytic activity of some herbal plants. International Journal of Innovative Pharmaceutical Research. 2014; 5(2):389–94.
- Gilhotra N and Dhingra D. A review on anxiety plants. Natural Product Radiance. 2008; 7(5):476–83.
- An Integrated Deep Learning Approach for Sentiment Analysis on Twitter Data
Authors
1 TATA Consultancy Services, Bengaluru, IN
2 Department of Computer Science and Engineering, SNS College of Technology, IN
Source
ICTACT Journal on Soft Computing, Vol 14, No 2 (2023), Pagination: 3188-3194Abstract
Analysis of Sentiment (SA) is a computational technique that seeks to extract subjective evaluations, attitudes, and emotional states from online platforms, specifically social media sites like Twitter. The subject has gained significant traction within the research community. The predominant emphasis of traditional sentiment analysis lies in the analysis of textual data. Twitter is widely recognized as a prominent online social networking platform that facilitates microblogging, wherein users share updates pertaining to various subjects through concise messages known as tweets. Twitter is a widely utilized platform that enables individuals to articulate their perspectives and emotions through the medium of tweets. Sentiment analysis refers to the computational methods of classification of given data in text format, categorizing it as either positive, negative, or neutral. The main goal of this study is to use deep learning methods for SA. The purpose is to guess sentiment and then evaluate the results based on accuracy, recall, and f-score. In this paper, a hybrid approach combining Particle Swarm Optimization (PSO) and Genetic Algorithm (GA) techniques, specifically referred to as PSOGA, is proposed to optimize features for a modified neural network (MNN). The final step is to use the K-fold cross-validation method to assess the results. The dataset was obtained through the utilization of the Ruby Twitter API. The ultimate outcome is juxtaposed with the preceding Cuckoo Search (CS) algorithm that had been terminated.Keywords
Tweeter, Deep Learning, K-Fold Cross Validation, HDFS, Modified Neural Network.References
- Saurabh Singh, “Twitter Sentiments Analysis using Machine Learning”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology, Vol. 6, No. 4, pp. 1-9, 2020.
- Senthil Murugan Nagarajan and Usha Devi Gandhi, “Classifying Streaming of Twitter Data based on Sentiment Analysis using Hybridization”, Neural Computing and Applications, Vol. 31, pp. 1425-1433, 2018.
- R.B. Shamantha and P. Rai, “Sentiment Analysis using Machine Learning Classifiers: Evaluation of Performance”, Proceedings of International Conference on Computer and Communication Systems, pp. 21-25, 2019.
- P. Tyagi and R.C. Tripathi, “A Review Towards the Sentiment Analysis Techniques for the Analysis of Twitter Data”, Proceedings of International Conference on Advanced Computing and Software Engineering, pp. 1-6, 2019.
- Łukasz Augustyniak, Piotr Szymanski, Tomasz Kajdanowicz and Włodzimierz Tuliglowicz, “Comprehensive Study on Lexicon-based Ensemble Classification Sentiment Analysis”, Entropy, Vol. 18, No. 1, pp. 1-7, 2015.
- B.M. Bandgar and Binod Kumar, “Real Time Extraction and Processing of Social Tweets”, International Journal of Computer Sciences and Engineering, Vol. 3, No. 3, pp. 1-13, 2015.
- Vedurumudi Priyanka, “Twitter Sentiment Analysis using Deep Learning”, SSRN, Vol. 89, pp. 1-17, 2021.
- Vishal A. Kharde and S.S. Sonawane, “Sentiment Analysis of Twitter Data: A Survey of Techniques”, International Journal of Computer Applications, Vol. 139, No. 11, pp. 1-14, 2016.
- Bandaru Mounika and M.S.V.S. Bhadri Raju, “Sentiment Analysis of Twitter Data using Machine Learning Approaches”, International Journal of Research, Vol. 5, No. 4, pp. 1-13, 2018.
- Vishu Tyagi, Ashwini Kumar and Sanjoy Das, “Sentiment Analysis on Twitter Data using Deep Learning approach”, Proceedings of International Conference on Advances in Computing, Communication Control and Networking, pp. 1-5, 2020.
- S. Zhai and Z.M. Zhang, “Semi Supervised Auto Encoder for Sentiment Analysis”, Proceedings of International Conference on Artificial Intelligence, pp. 14-18, 2016.
- Nikhil Yadav and Ajitkumar Shitole, “Twitter Sentiment Analysis using Supervised Machine Learning”, Springer, 2020.