- R. Anuradha
- S. Viswanathan
- D. Jayakumar
- S. Suja Priyadharsini
- S. Edward Rajan
- A. Dayana
- B. Geethamani
- R. Kashturi
- A. Ravi Sankar
- N. Kavitha
- R. Manavalan
- S. Sasikala
- P. S. Soundarya
- A. G. Aghilan
- Nandhu Pradeep
- K. Ram Karthi Kumar
- S. P. S. Aishhwariya
- V. Javani
- R. Selvalakshmi
- J. I. Sheeba
- S. Pradeep Devaneyan
- S. V. Drishya
- K. A. Thanuja
- S. Poonguzhali
- Ram Prakash Sharma
- N. Indumathi
- B. Ganga
- A. K. Abdul Hakeem
- S. I. Patel
- Research Journal of Pharmacology and Pharmacodynamics
- Wireless Communication
- Programmable Device Circuits and Systems
- Networking and Communication Engineering
- Manufacturing Technology Today
- Digital Signal Processing
- ICTACT Journal on Soft Computing
- Software Engineering
- Fuzzy Systems
- HuSS: International Journal of Research in Humanities and Social Sciences
- Indian Journal of Public Health Research & Development
- The Journal of the Indian Mathematical Society
- Current Science
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Saranya, S.
- Potential of Carica papaya Against Gentamicin Induced Nephrotoxic Rats
Authors
1 PG and Research Department of Biochemistry, Sengamala Thayaar Educational Trust Women's College, Mannargudi-614001, Tamil Nadu, IN
Source
Research Journal of Pharmacology and Pharmacodynamics, Vol 4, No 1 (2012), Pagination: 17-20Abstract
The present study was desined to evaluate the nephroprotective effect of ethanolic extracts of seeds of Carica papaya against gentamicin induced nephrotoxicity in albino rats. Oral administration of gentamicin (5mg/100g body weight/day) shows the significantly reduction in serum urea, uric acid, creatinine and protein, level were significantly decreased when compared to the control rats. Ethanolic extracts of seeds of Carica papaya administration (40 mg/kg b. wt/day) brought about the significant changes in biochemical parameters. The present work indicates that the Carica papaya extracts has showed their protective role against gentamicin induced nephrotoxicity and its more effective in preventing kidney damage that treating it.Keywords
Nephrotoxicity, Renal Markers, Gentamicin, Carica papaya.References
- Ali BH. Gentamicin nephrotoxicity in human and animals some recent research. General Pharamacology. 26; 2003: 1477-1487.
- Anibijuwon II, and Vdeze AO. Antimicrobial activity of Carica papaya (Paw Paw leaf on some pathogenic organism of clinical origin from south-western Nigeria. Ethanobotanicial Leaflets.13; 2009: 850-864.
- Anthony seaton, Anthony seaton, and Oouglas seaton, A. Gordeleitch Crofton and Douglas Respiratory disease. 1(1); 2000: 214.
- Bennet WW. Mechanisms of aminoglycoside nephrotoxicity. Clin. Exp. Pharmacy., 16; 1989:1-6.
- Bord J and Sirota JH. Journal of Clinical Investigation. 27; 1948:645.
- Caraway WT. Standard methods of clinical chemistry. American Journal of Clinical Pathology. 25; 1963:480.
- Dawkins G, Hewitt H, Wint Y, Obiefuna PC, and Wint B. Antibacterial effect of Carcia papaya fruit on common would organisms. J. West Indian med, 52(4); 2003: 290-292.
- Eisenberg, J.M., Koffer, H., Glick, H.A., Connell, M.L., Lossle, Talbot, G.O.H., Nephtotoxicity associated with aminoglycoside Ann. Inter. Med. 1987, 107:900-909.
- Giordani R, Siepaio M, Moulin-Traffort, J, and Regli, P. Antifungal action of Carica papaya latex:isolation of fungal ell wall hydrolyzing enzymes. Mycoses. 34 (11); 1991:469-477.
- Harborne JB (1973). Phytochemical methods, London. Chapman and Hall, Ltd. 49-188.
- John Bernard Henry. Clinical diagnosis and management by laboratory methods. Therapeutic drug monitoring . 1996: 394.
- Kapoor M, Garg SK, Mathur VS. Anthiovulatory activity of five indigenous plants in rabbits. Indian J. Med., Res., 62(8); 1974: 1225-1227.
- Krishna KL, Paridhavi M, and Patel A. A review nutritional, medicinal and pharmacological properties of papaya (Carica papaya Linn-Natural protect Radiance). 7(4); 2008:364-373.
- Lohiya NKM, Kothari LK, Manivannan B, Mishrap K, Pathak N. Human sperm immobilization effect of Carica papaya seed extracts:an in vitro study. Asian J. Androl., 2(2); 2000: 103-109.
- Natelson S, Scott ML, and Beffa C. Microtechniques of clinical chemistry for the Soutine laboratory. J. Chem. Path., 21; 1995:480.
- Oloyede OL. Chemical profile of unripe of Carica papaya. Pakistan Journal of Nutrition. 4(6); 2005: 379-381.
- Pedraza-Claverri, J, Maldonado PD, Mdina-Campos ON. Garlic amerliorates gentamicin nephrotoxicity:relation to antioxidant enzymes. Free radic Biol. Med., 29; 2000:602-611.
- Rajkapoor B, Jayakar B, Kavimani S, Murugesh N. Effect of dried fruits of Carica papaya linn on hepatotoxicity. Biol Pharm Bull., 25(12); 2002:1645-1646.
- Safirstein R, Wiston J, Goldstein M, Moel D, Dikman S, and Guttenplan JAM. Kidney Disease. 8; 1986:356-367.
- Satrija F, Nansen P, Murtini S, He S. Anthelminitic activity of papaya latex against patent Heligmosomoides polygyrus infection in mices. J. Ethanopharmacol., 48(3); 1995: 161-164.
- Shemesh O, Golbe TZ, Kriss JP, Myers BD. Limitation of creatinine as a filtration marker in glomerilpoathic patient, Kidney International., 28;1985:830-838.
- Shivanada nayak B. Lexely pinto Pereira and Dale Maharaj. Wound healing activity of Carica papaya L. in experimentally induced diabetic rats. Indian Journal of Experimental Biology., 45; 2007: 739-743.
- Sofowara A. Medicinal plants and Traditional medicine in Africa. Spectrum Books Ltd., Ibadan, Nigeria. 1993: 289.
- Subal Debnath, Nilesh Babre, Majaunath, Nephroprotective evaluation of Ethanolic extract of the seed of papaya and pumpkin fruit in cisplatin. Induced nephrotoxicity. Journal of Pharmaceutical Science and Technology. 2(6); 2010: 241-246.
- Sundin DP, Sandoval R, Molitoris BA. Gentamicin Inhibits Renal Protein and phospholipid metabolisms in rats. Implications involving in molecular Trafficking J. Am. Soc., Nephrol., 12; 2001: 114-123.
- Zar JH. Englewood Cliffes NJ. In Biostatistical Analysis. Prentice hall, Inc 1984.
- Security and Trust Based Model for Peer To Peer System
Authors
1 Department of CSE, Avinashilingam University, Coimbatore-641 108, Tamil Nadu
Source
Wireless Communication, Vol 6, No 2 (2014), Pagination:Abstract
Peer to peer is an advanced computer networking where all computers contribute to equivalent task for processing data. A Peer to peer network can be an ad hoc connection in which a pair of computers attached by means of a universal serial bus to transmit files. Security is not much effective in this type of systems it is because if the connections are not fixed to the computers appropriately then there will be difficulty in accessing certain files and the relationship is untrusted. Hence security in peer to peer systems is complex since disputes are created by lack of integrated authority. A new hybrid trust algorithm is used in this paper to facilitate a peer to reason about reliability of other peers based on earlier period interactions and recommendations. Both local trust value and global trust value is calculated while downloading from peer to peer system. Interactions and recommendations are assessed based on recentness, importance and peer satisfaction factors. Diffie–Hellman key exchange establishes a shared secret that can be used for secret communications while exchanging data over a public network. RSA algorithm (Rivest, Shamir, Adleman) based on Asymmetric key cryptography which ensures timely accessibility of reputation information to other peers along with security. The approach is to summarize the earlier period performance of the peer in its digital reputation and then predicting its deeds pertaining to future. The information shared among the peers is encrypted and decrypted using RSA Signatures. Thus malicious activities are prevented in peer’s reputation. The experiment is carried out using Java programming and the simulation results revealed that the RSA algorithm implemented using public key cryptography is protected and well-organized in a decentralized peer to peer network. Better peers were capable to figure confidence connections in their immediacy and detach malicious peers.
Keywords
Asymmetric Key Cryptography, Diffie–Hellman Key Exchange, Peer to Peer Systems, RSA Algorithm, RSA Signatures.- The Role of Wireless Sensor Network in Tracking Wild Animals Crossing Forest Boundaries
Authors
1 IFET college of engineering, IN
Source
Programmable Device Circuits and Systems, Vol 8, No 5 (2016), Pagination: 105-107Abstract
Every living creature on this earth has equal importance in the ecosystem. But nowadays life of wild animals is in danger. Wild animals used to move freely in the forest or in the jungle. If any accident happens to them in the forest, physical injury or any disease may cause even death of animals in the forest deforestation of forest in this factor any animals is going on out of boundary in our forest. In such situations we cannot find out exact location of animal in such a large area. To avoid such problems in the finding exact geographical location of animal in the jungle, national park or in wildlife reserves, wildlife animal tracking system is used. This system utilizes technologies such as Global Positioning System and Global System for Mobile Communication.
Keywords
GPS Modem, GSM Modems, Microcontroller, Temperature Sensors, Wireless Transmitter, Latitude, Longitude, Smartphone, Kilometer, Wild Animals.- An Efficient Soft-Computing Technique for Extracting Fetal ECG from Maternal ECG Signal
Authors
1 Department of Electronics and Communication Engineering, Anna University of Technology, Tirunelveli, Tamil Nadu, IN
2 Department of Electrical and Electronics Engineering, Mepco Schlenk Engineering College, Sivakasi, Tamil Nadu, IN
3 Department of Electronics and Communication Engineering, Anna University Tirunelveli, Tirunelveli, Tamil Nadu, IN
Source
Programmable Device Circuits and Systems, Vol 3, No 1 (2011), Pagination: 1-7Abstract
The Fetal Electrocardiogram (FECG) signal reflects the electrical activity of the fetal heart. It contains information about the health status of the fetus and as a result, an early diagnosis of any cardiac defects before delivery increases the effectiveness of the appropriate treatment. The proposed approach extracts the FECG from two ECG signals recorded at the thoracic and abdominal areas of the mother, with the help of a hybrid soft computing technique. The thoracic ECG is assumed to be almost completely maternal (MECG) while the abdominal ECG is considered to be composite because it contains both the maternal and the fetal ECG signals. The principle used for the elimination of artifacts is ANC. An Adaptive Neuro-Fuzzy Inference System (ANFIS) is used to remove the artifacts and to extract the FECG component from abdominal signals of very low maternal to fetal signal-to-noise ratio. After removing the artifacts using ANFIS, better results are obtained by optimizing the ANFIS parameters using Swarm Intelligent Technique, namely Particle Swarm Optimization (PSO). The experimental results show that the proposed approach can effectively remove artifacts and extract the desired FECG signals from the abdominal signals.
Keywords
Electrocardiogram (ECG), Adaptive Neuro-Fuzzy Inference System (ANFIS), Fetal ECG (FECG), Maternal ECG (MECG), Particle Swarm Optimization (PSO).- HONEYPOT:Network Security
Authors
1 Park College of Technology, Coimbatore, IN
Source
Networking and Communication Engineering, Vol 7, No 6 (2015), Pagination: 280-282Abstract
Network forensics is basically used to detect attacker activity and to analyze their behavior. Data collection is the major task of network forensics and honeypots are used in network forensics to collect useful data. Honeypot is an exciting new technology with enormous potential for security communities. This review paper is based upon the introduction to honeypots, their importance in network security, types of honeypots, their advantages disadvantages and legal issues related with them. Research Paper also discuss about the shortcomings of intrusion detection system in a network security and how honeypots improve the security architecture of the organizational network. Furthermore, paper reveals about the different kind of honeypots their level of interaction and risks associated with them.- Experimental Analysis of the Critical Voltage of an Electrochemical Discharge Machining Process
Authors
1 School of Electronics Engineering, VIT University, Chennai Campus, IN
Source
Manufacturing Technology Today, Vol 13, No 11 (2014), Pagination: 16-21Abstract
Electrochemical discharge machining is a recent technique in the field of non-traditional machining. This process is capable of machining insulators like glass and ceramics. Recently many researches are being carried out on this technique to obtain an optimal machining condition. However, many aspects of this technology demand an extensive research and development in this field. However, now many aspects of this machining technology still demand further extensive in-depth research and development. In this paper, the process of electrochemical discharge machining is carried out by varying the various process parameters such as tool diameter, electrolyte type and electrolytic concentration. The spark generation voltage in each of these cases is compared. The effect of insulated tool material on the spark generation voltage is also discussed.Keywords
Electrochemical Discharge Machining, Spark Generation, Critical Voltage, Insulated Tool.- A Review of Big Data Challenges and Techniques
Authors
1 Department of Computer Science, Nehru Arts and Science College, Coimbatore-641105, IN
Source
Digital Signal Processing, Vol 10, No 1 (2018), Pagination: 7-9Abstract
Big data is the most important trend that is defining the new emerging analytical tools. Big data has various applications in different areas like traffic control, weather forecasting, fraud detection, security, education and health care. Extraction of knowledge from massive amount of data sets has become a challenging task. Big data usually includes data sets with sizes beyond the ability of commonly used software tools to capture, store and analyze it within a tolerable elapsed time. Due to widespread usage of many computing devices such as smart phones, laptops, wearable computing devices; the data processing over the internet has exceeded more than the modern computers can handle. Due to this high growth rate, the term Big Data is envisaged. However, the fast growth rate of such large data generates numerous challenges, such as data inconsistency and incompleteness, scalability, timeliness, and security. The question that arises now is how to develop a high performance platform to efficiently analyze big data and how to design an appropriate mining algorithm to find the useful things from big data. This paper begins with a brief introduction to the big data technology and its importance and also focuses on various challenges and issues that need to be emphasized. The tools used in big data technology are also discussed in detail.Keywords
Big Data, Hadoop, Map Reduce, Pig, Hive, Hbase.References
- https://www.idc.com/prodserv/4Pillars/bigdata
- A, Katal, Wazid M, and Goudar R.H. "Big data: Issues, challenges, tools and Good practices." Noida: 2013, pp. 404 – 409, 8-10 Aug. 2013.]
- Almeida, F., and Calistru, C, "The Main Challenges and Issues of Big Data Management", International Journal of Research Studies in Computing, 2(1), 2013, pp. 11-20.
- Apache Hadoop (2013). HDFS Architecture Guide [Online]. Available: https://hadoop. apache.org/docs/r1.2.1/hdfs_design.ht
- Amrit pal, Pinki Aggrawal, Kunal Jain, Sanjay Aggrawal “A Performance Analysis of MapReduce Task with Large Number of Files Dataset in Big Data using Hadoop” Forth International Conference on Communication Systems and Network Technologies, 2014.
- Rahm, E., & Hai Do, H. (2000). Data cleaning: problems and current approaches. Bulletin of the Technical Committee on Data Engineering, 23(4), 3-13.),
- Apache Hadoop (2013). HDFS Architecture Guide [Online]. Available: https://hadoop.apache.org/docs/r1.2.1/hdfs_design.ht
- Intel, “Big Data Analaytics,”2012, http://www.intel.com/content/dam/www/public/us/en/documents/reports/data-insightspeer-research-report.pdf
- Computational Approaches for Heart Disease Prediction-A Review
Authors
1 Department of Computer Science, Arignar Anna Government Arts College, IN
Source
ICTACT Journal on Soft Computing, Vol 8, No 3 (2018), Pagination: 1680-1686Abstract
The data mining techniques can be primarily used to extract the potentially useful hidden knowledge from the large volume of health care industry databases for predicting the diseases. It is also assist to locate the relationships and patterns among the extracted data. In this paper, detailed survey of various computational techniques used in health care industry for predicting the heart diseases is presented. The issues facing by the computational models are identified while predicting the heart diseases and the same is also presented with future possible research directions.Keywords
Data Mining, Heart Disease, Classification, Prediction, Parameters.References
- Chaitrali S. Dangare and Sulabha S. Apte, “A Data Mining Approach for Prediction of Heart Disease using Neural Networks”, International Journal of Computer Engineering and Technology, Vol. 3, No. 3, pp. 23-29, 2012.
- Resul Das, Ibrahim Turkoglu and Abdulkadir Sengur, “Diagnosis of Valvular Heart Disease through Neural Networks Ensembles”, Elsevier, 2009.
- M. Anbarasi, E. Anupriya and N. Iyengar, “Enhanced Prediction of Heart Disease with Feature Subset Selection using Genetic Algorithm”, International Journal of Engineering Science and Technology, Vol. 2, No. 10, pp. 5370-5376, 2010.
- A. Rajkumar and G.S. Reena, “Diagnosis of Heart Disease using Data Mining Algorithm”, Global Journal of Computer Science and Technology, Vol. 10, No. 10, pp. 788-797, 2010.
- Milan Kumari and S. Godara, “Comparative Study of Data Mining Classification Methods in Cardiovascular Disease Prediction”, International Journal of Computer Science and Technology, Vol. 2, No. 2, pp. 304-308, 2011.
- N. Aditya Sundar, P. Pushpa Latha, M. Rama Chandra, “Performance Analysis of Classification Data Mining Techniques over Heart Disease Data Base”, International Journal of Engineering Science and Advanced Technology, Vol. 2, No. 3, pp. 470-478, 2013.
- T. John Peter and K. Somasundaram, “Study and Development of Novel Feature Selection Framework for Heart Disease Prediction”, International Journal of Scientific and Research Publications, Vol. 2, No. 10, pp. 1-7, 2012.
- Mai Shouman, Tim Turner and Rob Stocker “Applying K-Nearest Neighbour in Diagnosing Heart Disease Patients”, Proceedings of International Conference on Knowledge Discovery, pp. 23-29, 2012.
- Nidhi Bhatla and Kiran Jyoti, “An Analysis of Heart Disease Prediction using Different Data Mining Techniques”, International Journal of Engineering Research and Technology, Vol. 1, No. 8, pp. 1-4, 2012.
- A. Pethalakshmi and A. Anushya, “Effective Features Selection via Futuristic Genetic on Heart Data”, International Journal of Computational Intelligence and Informatics, Vol. 2, No. 1, pp. 23-27, 2012.
- Abhishek Taneja, “Heart Disease Prediction System using Data Mining Techniques”, Oriental Scientific Publishing, 2013.
- R. Chitra and V. Seenivasagam, “Heart Disease Prediction System using Supervised Learning Classifier”, Bonfring International Journal of Software Engineering and Soft Computing, Vol. 3, No. 1, pp. 1-7, 2013.
- S. Indira and Fal Dessai, “Intelligent Heart Disease Prediction System using Probabilistic Neural Network”, International Journal on Advanced Computer Theory and Engineering, Vol. 4, No. 2, pp. 33-43, 2013.
- Shamsher Bahadur Patel, Pramod Kumar Yadav and D.P. Shukla, “Predict the Diagnosis of Heart Disease Patients using Classification Mining Techniques”, IOSR Journal of Agriculture and Veterinary Science, Vol. 4, No. 2, pp. 61-64, 2014.
- Vikas Chaurasia and Saurabh Pal, “Early Prediction of Heart Diseases using Data Mining Techniques”, Caribbean Journal of Science and Technology, Vol. 1, pp. 208-217, 2013.
- Aditya Methaila, Prince Kansal, Himanshu Arya and Pankaj Kumar, “Early Heart Disease Prediction using Data Mining Techniques”, Proceedings of International Conference on Bioscience and Bioinformatics, pp. 53-59, 2014.
- Kittipal Wisaeng, “Predict the Diagnosis of Heart Disease using Feature Selection and K-Nearest Neighbor Algorithm”, Applied Mathematical Sciences, Vol. 8, No. 83, pp. 4103-4113, 2014.
- Nilakshi P. Waghulde and Nilima P. Patil, “Genetic Neural Approach for Heart Disease Prediction”, International Journal of Advanced Computer Research, Vol. 4, No. 3, pp. 331-338, 2014.
- R. Chitra and V. Seenivasagam, “Review of Heart Disease Prediction System using Data Mining and Hybrid Intelligent Techniques”, ICTACT Journal on Soft Computing, Vol. 3, No. 4, pp. 605-609, 2013.
- Rupali R. Patil, “Heart Disease Prediction System using Naive Bayes and Jelinek-Mercer Smoothing”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, No. 5, pp. 515-523, 2014.
- B. Venkatalakshmi and M.V. Shivsankar, “Heart Disease Diagnosis using Predictive Data mining”, International Journal of Innovative Research in Science, Engineering and Technology, Vol. 3, No. 3, pp. 223-229, 2014.
- A. Jarad, R. Katkar, A. Rehaman Shaikh and A. Salve, “Intelligent Heart Disease Prediction System with MONGODB”, International Journal of Emerging Trends and Technology in Computer Science, Vol. 4, No. 1, pp. 410-417, 2015.
- Andrea D. Souza, “Heart Disease Prediction using Data Mining Techniques”, International Journal of Research in Engineering and Science, Vol. 3, No. 3, pp. 74-77, 2015.
- B.V. Baiju and R.J. Remy Janet, “A Survey on Heart Disease Diagnosis and Prediction using Naive Bayes in Data Mining”, International Journal of Computer Engineering and Technology, Vol. 5, No. 2, pp. 1034-1038, 2015.
- Moloud Adbar et al., “Comparing Performance of Data Mining algorithms in Prediction Heart Diseases”, International Journal of Electrical and Computer Engineering, Vol. 5, No. 6, pp. 1569-1576, 2015.
- Rajwant Kaur and Sukhpreet Kaur, “Prediction of Heart disease Based on Risk Factors Using Genetic SVM Classifier”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 5, No. 12, pp. 205-208, 2015.
- B. Shinde Swati, “Decision Support System on Prediction of Heart Disease using Data Mining Techniques”, International Journal of Engineering Research and General Science, Vol. 3, No. 2, pp. 1453-1461, 2015.
- Jaymin Patel, Teja Upadhyay and Samir Patel, “Heart Disease Prediction using Machine Learning and Data Mining Techniques”, International Journal of Computer Science and Communication, Vol. 7, No. 1, pp. 129-137, 2016.
- K. Rajalakshmi and K. Nirmala, “Heart Disease Prediction with Map Reduce by using Weighted Association Classifier
- and K-Means”, Indian Journal of Science and Technology, Vol. 9, No. 19, pp. 231-237, 2016.
- S. Suganya and P. Tamil Selvi, “A Proficient Heart Disease Prediction Method using Fuzzy-Cart Algorithm”, International Journal of Scientific Engineering and Applied Science, Vol. 2, No. 1, pp. 1-6, 2016.
- T. Karthikeyan and V.A. Kanimozhi, “Deep Learning Approach for Prediction of Heart Disease using Data mining Classification Algorithm Deep Belief Network”, International Journal of Advanced Research in Science, Engineering and Technology, Vol. 4, No. 1, pp. 3194-3201, 2017.
- Rishabh Wadhawan, “Prediction of Coronary Heart Disease using Apriori algorithm with Data Mining Classification”, International Journal of Research in Science and Technology, Vol. 3, No. 1, pp. 1-15, 2018.
- K. Srinivas, B.K. Rani and A. Govrdhan, “Applications of Data Mining Techniques in Healthcare and Prediction of Heart Attacks”, International Journal on Computer Science and Engineering, Vol. 2, No. 2, pp. 250-255, 2010.
- Rashedur M. Rahman and Farhana Afroz, “Comparison of Various Classification Techniques Using Different Data Mining Tools for Diabetes Diagnosis”, Journal of Software Engineering and Applications, Vol. 6, No. 3, pp. 85-97, 2013.
- Comprehensive Assessment of Results Offered by State of Art Search Engines
Authors
1 Department of Computer Applications, Hindusthan College of Arts and Science, IN
2 Department of BCA, Hindusthan College of Arts and Science, IN
Source
Software Engineering, Vol 10, No 3 (2018), Pagination: 45-50Abstract
In many ways, search engines have become the most important tool for information seeking. Due to their tremendous economic value, search engine companies constantly put major efforts to improve their search results. Employing the link architecture of World Wide Web network, search engines like Google and Bing help people to locate resources efficiently. There has been an issue between Google vs. Bing since Jan’2016 regarding the search results offered for queries that, Bing is stealing the data of Google. This paper reveals, Sting Google vs. Bing experiment, and found that about half of all search results on the first pages of Bing and Google featured identical links. Analysis has been carried out to understand the technical perception of the search engines with utilities and results have been discussed over here.
Keywords
Search Engine, Google, Bing, Spam, Ranking.- Campaigning Ingeniously in Social Networks with Corporate Social Responsibility (CSR)
Authors
1 Department of Computer Applications, Hindusthan College of Arts and Science, IN
2 Department of BCA, Hindusthan College of Arts and Science, IN
Source
Software Engineering, Vol 10, No 3 (2018), Pagination: 51-53Abstract
Social media thrives upon open, transparent conversations based on trust. And coupled with its viral nature, it is often elected above other mediums to drive a message home. Brands are increasingly adopting the social media route, especially when it comes to executing corporate social responsibility. This year, some innovative CSR campaigns that show promise as well as are an indicator of the evolution of social media has been released. The social value of ‘like/share’ and the power of the social network have been put to clever use. Here, in this paper a collection of 5 impressive CSR campaigns that have leveraged the power of social media is discussed.
Keywords
Search Engine, Google, Bing, Spam, Ranking.- Smart System to Guide Ambulance
Authors
Source
Wireless Communication, Vol 11, No 3 (2019), Pagination: 40-43Abstract
The number of casualties in road accident has significantly increased despite the advancement in medicinal fields and hospital facilities. In the present day environment, the traffic limitations are the major concern to reach the hospital on time. The traffic limitations can be overcome by alerting the ambulance to respective traffic signals en route, thereby clearing the path for the ambulance to move without any obstacles. With the help of GPS and GSM it is possible to track the ambulance and the location of the patient. And also we have to develop the algorithm to find the shortest path to reach the nearest hospital.
Keywords
Congestion Control, Traffic Control, Emergency Vehicle, Ambulance, Smart Alert, Shortest Path.References
- Levi L. Rose, “Emergency Traffic control system with security transmission coding.”
- Michael R. Smith, paul J. Davidson ane Henry L.Pfister, “Emergency Vehicle warning and traffic control system”
- A smart phone-based pocket fall accident detection, positioning, and rescue system IEEE Journal of biomedical and health informatics 2014.
- Hi-Fi traffic clearance Technique for life saving vehicles using differential GPS. System world academy of science engineering and technology 2011.
- Cryptography and data security by Dorothy E. enning, peter J. Denning.
- Vehicle accident automatic detection and remote alarm device international Journal of Reconfigurable and Embedded system.
- Cyberbully Image and Text Detection using Convolutional Neural Networks
Authors
1 Pondicherry Engineering College., IN
2 Department of Computer Science and Engineering, Pondicherry Engineering College, IN
3 Christ College of Engineering and Technology, Puducherry, IN
Source
Fuzzy Systems, Vol 11, No 2 (2019), Pagination: 25-30Abstract
Social media is getting more and more popular in our day to day life. The popularity of social media affects the people involved in it. This makes the technology to do the work or to feel smarter and but only makes us lazy. Therefore, in this robust, discriminative and numerical representation, learning of text messages is a critical issue. Hence, the existing system helps to detect the cyberbully words using Naive Bayes Classifier. The output is classified into cyberbully and not cyberbully words from the Instagram dataset and accuracy is calculated. The proposed framework deployed for detecting negative online interactions in terms of abusive contents carried out through both text and images. This proposed technique is going to detect the cyberbully image and text on the Instagram dataset using Convolutional Neural Network and Bag of words techniques along with the existing technique. Thus, the detected cyberbully words are further classified using Naive Bayes classifier such as Harassing, Insulting, Trolling and Threatening. The combination of text & image analysis techniques is considered an appropriate platform for the detection of potential cyberbully threats.
Keywords
Bag of Words, Convolutional Neural Networks, Cyberbully Image, Cyberbully Words, Instagram Dataset, Naive Bayes Classifier.References
- . Rui Zhao, Kezhi Mao, “CyberBullying based on Semantic Enhanced Marginalized Denoising Auto Encoder”, IEEE Transactions on Affective Computing, ISSN 1949-3045, pp.1-12, (2016).
- . M.Devi M. Chitra Devi “Fuzzy-Based Genetic Operators for CyberBullying Detection Using Social Network Data”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology, Issue 4, ISSN 2456-3307, vol 3,pp.437-444, (2013).
- . B.Sri Nandhini, J.I.Sheeba, “Cyberbullying Detection and Classification Using Information Retrieval Algorithm”, In ICARCSET '15, ACM, pp.1-5, (2015).
- . B.Sri Nandhini, J.I.Sheeba, “Online Social Network Bullying Detection Using Intelligence Techniques”, In Procedia Computer Science 45, 485 – 492, Elsevier, pp.1-8, (2015).
- . J.I.Sheeba, K.Vivekanandan, “Detection of Online Social Cruelty Attack from Forums”, International Journal of Data Mining and Emerging Technologies,DOI: 10.5958/2249- 3220.2014.00003.2, IndianJournals.com, pp.1-11, (2015).
- . A.Saravanaraj, J.ISheeba and S.Pradeep Devaneyan, Automatic Detection of Cyberbullying from Twitter”, International Journal of Computer Science and Information Technology & Security (IJCSITS) Vol.6 No.6, ISSN: 2249-9555, pp.1-6, (2016).
- . Nafsika Antoniadou, Constantinos M. Kokkinos, and Angelos Markos, “Possible common correlates between bullying and cyber-bullying among adolescents”, In Psicologia Educativa, Elsevier, 22:27-38, pp.1-12, (2016).
- . Hariani, Imam Riadi, “Detection of Cyberbullying on Social Media Using Data Mining Techniques”, International Journal of Computer Science and Information Security (IJCSIS), ISSN 1947-5500 vol 15, No. 3, pp: 244-250, (2017).
- . Krishna B.Kansara and Narendra M.Shekokar, “A Framework for Cyberbullying Detection in Social network”, International Journal of Current Engineering and Technology, P-ISSN 2347 – 5161, vol 5, No.1 F, pp. 494-498, (2015).
- . [10] Paridhi Shingal and Ashish Bansal, “Improved Textual cyberbullying detection using Data Mining”, International Journal of Computer Science and Computation Technology, ISSN 0974-2239, vol 3, no.6, pp. 569-576, (2013).
- . Michele Di Capua, Emanuel Di Nardo, and Alfredo Petrosino, “Unsupervised Cyber Bullying Detection in Social Networks”, In 2016 23rd International Conference on Pattern Recognition (ICPR), IEEE, pp. 1-6, (2016).
- . Zhao, R., Zhou, A.and Mao, K., “ Automatic detection of cyberbullying on social networks based on bullying features”, In 17th International Conference on Distributed Computing and Networking, ACM, pp.43, (2016).
- . Abdelhaq, H., Gertz, M. and Armiti, A., “Efficient online extraction of keywords for localized events in Twitter”, In GeoInformatica, pp.1-24, (2016).
- . Dornaika, F., El Traboulsi, Y., and Assoum, A. “Inductive and flexible feature extraction for semi-supervised pattern categorization”. Pattern Recognition, 60, pp. 275-285, (2016).
- . T.Guo, J. Dong, H. Li and Y. Gao, "Simple convolutional neural network on image classification," 2017 IEEE 2nd International Conference on Big Data Analysis (ICBDA), pp. 721-724, (2017).
- A Study on Preferential Factors Influencing Women Students for Higher Education Abroad with Special Reference to Bengaluru, Karnataka
Authors
1 Department of Commerce, Kristu Jayanti College, Bengaluru, Karnataka, IN
Source
HuSS: International Journal of Research in Humanities and Social Sciences, Vol 6, No 1 (2019), Pagination: 30-35Abstract
Women empowerment can be possible only through educating women. A country like India needs such an empowerment leading to the economic development of the society. Many people in India especially from rural areas still believe that marriage is important than educating women. Currently, the trend is changing. The rate of women students in schools and colleges has tremendously increased. Even the parents of rural areas are ready to send their girl children to schools. It shows the change in the mindset of the people and the society. Pinnacle to this change is that many women students are going abroad to pursue their higher studies. Countries like Canada, UK, USA, New Zealand, etc. are offering attractive scholarships for students. This has increased the ratio of women students obtaining their Master’s degree from foreign countries.This study mainly aims to identify the increasing trend of pursuing higher education abroad by women students.Keywords
Economic Development, Education, Higher Studies and Scholarships.References
- Sundaram MS, Sekar M, Subburaj A. Women Empowerment: Role of Education. International Journal in Management and Social Science. 2014; 2(12):76–85.
- Bhat RA. Role of education in the empowerment of women in India. Journal of Education and Practice. 2015; 6(10):188–91.
- Shettar RM. A study on issues and challenges of women empowerment in India. IOSR Journal of Business and Management. 2015; 17(4):13–19.
- Pckianathan N, Anushree SM, Manjunatha B. The role of higher education in empowering Indian Women. International Journal of Health and Allied Science. 2016; 5(3):135–7. https://doi.org/10.4103/2278-344X.187791
- Ghara T. Status of Indian women in higher education. Journal of Education and Practice. 2016; 7(34):58–64.
- Shindu J. Women’s Empowerment through Education. Abhinav Journal. 2012; 1(11):3.
- Mahalinga. Women’s Empowerment through Panchayat Raj Institutions. Indian Journal of Research. 2014; 3(3).
- Suguna M. Education and women empowerment in India. International Journal of Multidisciplinary Research. 2011; 1(8).
- Chibber B. Women and the Indian political process. Mainstream Weekly Journal. 2010; 48(18).
- Bhat T. Women education in India need of the ever. Human Rights International Research Journal. 2014; 1:3.
- Available from: http://www.usaid.gov/what-we-do/gender-equality-and-womens-empowerment
- Available from: http://www.abhinavjournal.com/images/Arts_&_Education/Nov12/1.pdf
- Available from: http://shodhganga.inflibnet.ac.in:8080/jspui/bitstream/10603/8562/9/09_chapter%204.pdf
- Potential Role of Electromyography in Kinesiology:A Review
Authors
1 Centre for Medical Electronics, Department of ECE, Anna University, Chennai, IN
Source
Indian Journal of Public Health Research & Development, Vol 11, No 1 (2020), Pagination: 587-592Abstract
Human beings follow a unique bipedal walking pattern referred to as gait and kinesiology is the scientific study pertaining to movement. Gait analysis has been an evolving area of study and in recent years its application in the development of orthosis, exoskeletons and rehabilitative devices is inevitable. Electromyogram (EMG) being a natural occurring physiological signal providing valuable information on neuro-muscular and musculoskeletal morphologies, its role is indispensable in analysing the underlying cause of movement pathologies. This paper reviews the contributions of EMG in movement analysis so far and its significance to the development of patient specific control of orthotic and rehabilitative applications.Keywords
Gait, Kinesiology, Movement Analysis, Electromyography, Orthosis, Exoskeleton.- Radiative Unsteady Rarefied Gaseous Flow Over a Stretching Sheet with Velocity Slip and Temperature Jump Effects
Authors
1 Department of Mechanical Engg., National Institute of Technology, Yupia, Arunachal Pradesh, IN
2 Department of Mathematics, Sri Ramakrishna Mission Vidyalaya, College of Arts and Science, Coimbatore - 641 020, IN
3 Department of Mathematics, Providence College for Women, Coonoor - 643 104, IN
Source
The Journal of the Indian Mathematical Society, Vol 87, No 3-4 (2020), Pagination: 261–275Abstract
In this study a mathematical analysis has been carried out to scrutinize the unsteady boundary layer flow of an incompressible, rarefied gaseous flow over a vertical stretching sheet with velocity slip and thermal jump boundary conditions in the presence of thermal radiation. Using boundary layer approach and suitable similarity transformations, the governing partial differential equations with the boundary conditions are reduced to a system of non-linear ordinary differential equations. The resulting non-linear ordinary differential equations are solved with the help of fourth order Runge-Kutta method with shooting technique. The results obtained for the velocity profile, temperature profile, skin friction coefficient and the reduced Nusselt number are described through graphs. It is predicted that the velocity and temperature profiles are lower for unsteady flow and has an opposite effect for steady flow.Keywords
Microfluidics, Boundary Layer, Velocity Slip and Thermal Jump, Shooting Technique, Rarefied Gas Flow.References
- A. K. Abdul Hakeem, R. Kalaivanan, N. Vishnu Ganesh B. Ganga, Effect of partial slip on hydrodynamic flow over a porous stretching sheet with non-uniform heat source/sink, thermal radiation and wall mass transfer, Ain Shams Eng. J., 5. (2014), 913–922.
- Cai Chunpei, Near continuum boundary layer flows at a flat plate, Theor. and Appl.Mech. Lett., 5. (2015), 134–139.
- T. Fang and F. Lee Chia-fon, A moving wall boundary layer flow of a slightly rarefied gas free stream over a moving flat plate, Appl. Math. Lett., 18. (2005), 487–495.
- C. M. Ho and Y. C. Tai, Micro-electro-mechanical systems(mems) and fluid flows, Annu. Rev. Fluid Mech., 30. (1998), 579-612.
- M. Kayalvizhi, R. Kalaivanan, N. Vishnu Ganesh, A. K. Abdul Hakeem, and B. Ganga, Velocity slip effects on heat and mass fluxes of MHD viscous-Ohmic dissipative flow over a stretching sheet with thermal radiation, Ain Shams Eng. J., 7. (2015), 791–797.
- R. V. M. S. S. Kiran Kumar, S. Vijaya Kumar Varma, C. S. K. Raju, S. M. Ibrahim, G. Lorenzini, and E. Lorenzini, Magnetohydrodynamic 3D slip flow in a suspension of carbon nanotubes over a slendering sheet with heat source/sink, Continuum Mech. Thermodyn., 29(3). (2017), 835-851, DOI 10.1007/s00161-017-0563-0.
- D. A. Lockerby, J. M. Reese, D. R. Emerson, and R. W. Barber, The velocity boundary condition at solid walls in rarefied gas calculations, Phys. Rev. E. Stat. Nonlin. Soft Matter Phys., 70. (2004), 017303.
- N. T. P. Le, C. White, J. M. Reese and R. S. Myong, Langmuir- Maxwell and LangmuirSmoluchowski Boundary conditions for thermal gas flow simulations in hypersonic aerodynamics, Int. J. Heat and Mass Transfer., 55. (2012), 5032–5043.
- M. T. Matthews and J. M. Hill, Micro/Nano sliding plate problem with Navier boundary condition, ZAMP J., 57. (2006), 875–903.
- M. T. Matthews and J. M. Hill, A note on the boundary layer equations with linear slip boundary condition, Appl. Math. Lett., 21. (2008), 810–813.
- X. Si, H. Li, Y. Shen and L. Zheg, Effects of nonlinear velocity slip and temperature jump on pseudo-plastic power-law fluid over moving permeable surface in presence of magnetic field, Appl. Math. Mech. -Engl. Ed., 38. (3)(2017) 333-342, DOI 10.1007/s10483017-2178-8.
- F. Sharipov, Benchmark problems in rarefied gas dynamics, J. Vacuum., 86. (2012), 1697–1700.
- J. J. Shu, J. B. Melvin Teo and W. K. Chan, Fluid velocity slip and temperature jump at a solid surface, Appl. Mech. Rev., 69(2). (2017), 020801, DOI: 10.1115/1.4036191.
- N. Vishnu Ganesh, B. Ganga, A. K. Abdul Hakeem, S. Saranya and R. Kalaivanan, Hydromagnetic axisymmetric slip flow along a vertical stretching cylinder with convective boundary condition, St. Petersburg Polytech. Univ. J.: Phys. and Math., 2. (2016), 273–280.
- L. Wu, A slip model for rarefied gas flows at a arbitrary Knudsen number, Appl. Phy. Lett., 93. (2008), 253103.
- Evaluation of plant defence related biomolecules produced by nematophagous fungi in tomato against root-knot nematode
Authors
1 Department of Plant Pathology, Chimanbhai Patel College of Agriculture, Sardarkrushinagar Dantiwada Agricultural University, Sardarkrushinagar 385 506, IN
2 46/2, Trupti Cooperative Housing Society, Sector 29, Gandhinagar 382 030, IN