A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Selvakumar, S.
- Antidiabetic Activity of Swietenia mahagoni Seed Powder in Alloxan Induced Diabetic Mice
Authors
1 Department of Pharmacology, Ultra College of Pharmacy, Madurai, IN
2 Department of Pharmaceutical Biotechnology, Ultra College of Pharmacy, Madurai, IN
3 Department of Pharmacology, Madurai Medical College, Madurai, IN
Source
Research Journal of Pharmacology and Pharmacodynamics, Vol 2, No 4 (2010), Pagination: 296-299Abstract
Swietenia mahagoni (Meliaceae) is an evergreen hard wood timber species widely distributed in India and has ethno medicinal uses in malaria, diabetes, anemia, diarrhoea, fever, and dysentery. In this present study antidiabetic effect of Swietenia mahagoni seeds were evaluated in alloxan induced diabetic mice. Blood and urine Glucose levels, food and water consumptions and histopathological studies were determined. In diabetic mice, Swietenia mahagoni seeds significantly reduced the elevated blood glucose level by 43.92% at 500mg/kg and 42.47% at 250mg/kg compared to vehicle treated diabetic mice, without increase in urine glucose, food and water intake. The experimental data indicated that Swietenia mahagoni demonstrated significant antidiabetic action in alloxan induced diabetic mice and could be a potential orally active drug for diabetes mellitus.Keywords
Antidiabetic, Indian Mahogany, Alloxan, Diabetic Mice, Swietenia.References
- Amit R, Shailendra S. Limonoids. Overview of significant bioactive triterpenes distributed in plants kingdom. Bio Pharm Bull 2006; 29: 191-201.
- Abdelgaleil SAM et al. D-seco limonoids from the leaves of Swietenia mahogany. Phytochemistry. 2006; 67: 452-458.
- Tripathy.K.D, Essential of medicinal pharmacology. Jaypee brother's Medical Publishers (P) Ltd, New Delhi, 2003; 5th ed , pp. 235-253.
- Badole S et al. Antihyperglycemic activity of aqueous extract of leaves of Cocculus hirsutus (L.) Diels in Alloxan - induced diabetic mice. Ind J pharmacol. 2006; 38: 49-53.
- Srinivasan K, Ramarao P. Animal models in type 2 diabetes research, an overview. Ind. J Med Res 2007; 125: 451-472.
- Bacsal K et al. The effect of Swietenia mahogani (mahogany) seed extract on indomethacin-induced gastric ulcers in female Sprague-Dawley rats. Acta Medica Philippina. 1997; 33: 127-139.
- Elliott JJ, Dewchand H and Altmann DM. Streptozotocin-induced diabetes in mice lacking α,β,T cells. Clin Exp immunology. 1997; 109: 116-120.
- Antia BS, Okokon JE and Okon PA. Hypoglycemic activity of aqueous leaf extract of Persea americana Mill. Ind J pharmacol. 2005; 37(5): 325-326.
- Gorray KC et al. Baskin, D, Brodsky J, Fujimoto WY. Responses of pancreatic β cells to alloxan and streptozotocin in the guinea pig. Pancreas. 1986; 1: 130-138.
- Ghosh S, Suryawanshi SA. Effect of Vinca rosea extracts in treatment of alloxan diabetes in male albino rats. Ind. J. Exp. Biol. 2001; 39: 748-759.
- Role of Industry to Improve Outcome Based Education in Engineering
Authors
1 Dept. of CSE, BMSCE, Karnataka, IN
2 Dept. of CSE, BMSCE, Bangalore, Karnataka, IN
3 Dept. of ISE, BMSCE, Bangalore, Karnataka, IN
Source
Journal of Engineering Education Transformations, Vol 28, No Spl Iss (2015), Pagination: 358-361Abstract
Industry Institute Interaction has different perspective and different reasons to interact with each other. Both are mutually benefited from this interaction. Academia is the main source of knowledge for industry. In general, role of Industry is an important factor for research and outcome based education in engineering institutions. Outcome Based Education is incomplete without successful interaction between Industry and Engineering Institution. This paper present the activities under MOU'S signed between BMS college of Engineering and other IT Industries. These activities aim to achieve the different Programme Outcomes.Keywords
Outcome Based Education, Programme Outcomes, Course Outcomes, Industry Institute Interaction, Memorandum of Understanding.- Lossless Visible Watermarking with Security
Authors
1 Kalasalingam University, Srivilliputhur, IN
2 Department of IT, Kalasalingam University, Srivilliputhur, IN
Source
Digital Image Processing, Vol 2, No 6 (2010), Pagination:Abstract
Watermarking is an effective and popular technique for discouraging illegal copyright and distribution of copyrighted digital image information. One of the important features of the watermarking technique is the lossless visible watermarking, which will preserve the quality of the watermark and watermarked image. In this paper, a novel method for visible watermarking with a capability of lossless image recovery is proposed. The method is based on one to one compound mapping of image pixel values for overlaying a variety of visible watermarks of arbitrary sizes on cover images. Compound mappings are proven to be reversible, which allows for lossless recovery of original images from watermarked images. Different types of visible watermarks, including opaque monochrome and translucent full color ones are embedded as application of the proposed generic approach. A two fold monotonically increasing compound mapping is created and proved to yield more distinctive visible watermarks in the watermarked images and to be proposed deals with the combination of text, image and key watermarking. To overcome the defects in quality of image and security the new approach, a lossless visible watermarking and watermark removal for lossless image recovery is proposed.
Keywords
Lossless Visible Watermarking, One to One Compound Mapping, Translucent Watermark, Wavelet Transform, Two Fold Monotonically Increasing, Key Watermarking.- Development and Validation of Analytical Method for Simultaneous Estimation of Ornidazole and Cefixime Trihydrate Tablet Osage Forms by UV Spectroscopy
Authors
1 Swami Vivekananda Institute of Pharmaceutical Sciences, Vangapally (V), Yadagirigutta (M), Nalgonda (Dt), Telangana–508 286, IN
2 P.S.V. College of Pharmaceutical Science and Research, Orappam Village, Bargur (Tk), Krishnagri (Dt), Tamilnadu–635108, IN
Source
Asian Journal of Pharmaceutical Analysis, Vol 6, No 4 (2016), Pagination: 246-252Abstract
A simple, specific, accurate, precise and economic Simultaneous spectrophotometric method in UV region have been developed for the determination of Ornidazole and Cefixime in bulk and pharmaceutical tablet formulations. The optimum conditions for the analysis of the drug were established. Linearity was found over the concentration range of 5-30 μg/ml for Ornidazole and 2-20 μg/ml for Cefixime. The Simultaneous UV method has been successfully applied for the analysis of drugs in tablet formulation. The results of the tablet analysis were in the range of 99.57 to 100.2 % for Ornidazole and 99.25 to 100.8 % for Cefixime, which indicated repeatability of the method. The percentage recoveries were found be 100.3 % for both the drugs indicated that the Simultaneous UV method is precise and reproducible. The Ruggdness Interday variation were found be in mean of 100.25 for Ornidazole and 99.85 for Cefixime. The Ruggedness Intraday Variation were found be in mean of 100.2 for Ornidazole and 100.18 for Cefixime.Keywords
Ornidazole, Cefixime, UV-Visible Spectroscopy, Simultaneous Method.- Computation of Image Similarity with Time Series
Authors
1 Department of Computer Science and Engineering, Sri Vidya College of Engineering and Technology, Tamil Nadu, IN
2 Department of Statistics, Manonmaniam Sundaranar University, Tamil Nadu, IN
Source
ICTACT Journal on Image and Video Processing, Vol 2, No 2 (2011), Pagination: 334-339Abstract
Searching for similar sequence in large database is an important task in temporal data mining. Similarity search is concerned with efficiently locating subsequences or whole sequences in large archives of sequences. It is useful in typical data mining applications and it can be easily extended to image retrieval. In this work, time series similarity analysis that involves dimensionality reduction and clustering is adapted on digital images to find similarity between them. The dimensionality reduced time series is represented as clusters by the use of K-Means clustering and the similarity distance between two images is found by finding the distance between the signatures of their clusters. To quantify the extent of similarity between two sequences, Earth Mover’s Distance (EMD) is used. From the experiments on different sets of images, it is found that this technique is well suited for measuring the subjective similarity between two images.Keywords
Similarity Search, Vector Quantization, Similarity Measures, Clustering, EMD.- Spectrophotometric Determination of Meloxicam in Bulk Drug and Pharmaceutical Formulations
Authors
1 Department of Pharmaceutical Analysis, K.M. College of Pharmacy, Uthangudi, Madurai-625107, IN
2 Department of Pharmaceutical Chemistry, K.M. College of Pharmacy, Uthangudi, Madurai-625107, IN
Source
Asian Journal of Research in Chemistry, Vol 2, No 4 (2009), Pagination: 467-468Abstract
A simple, rapid, economical and sensitive visible spectrophotometric method for the estimation of Meloxicam has been developed based on the formation of ion-pair of Meloxicam with dye bromocresol green in acidic medium, which was extracted into chloroform. It has absorption maxima at 415 nm. Beer’s law limit was found to be 10-50 mcg/ml. The molar absorptivity was found to be 2.17×103 (mole-1cm-1) and sandell’s sensitivity was 0.1612 (μg/cm2/0.001 absorbance unit). The correlation coefficient (r) was found to be 0.9999. The limit of detection (LOD) and limit of quantification (LOQ) was found to be 0.88 and 2.69 mcg/ml respectively of Meloxicam. The result of estimation in marketed formulations was found to be 99.86±0.32 and 97.93±0.32. The proposed method was applied successfully for the determination of Meloxicam in tablets with average recovery of 99.62±0.88 and 100.4±0.768. The method was then validated statistically as per ICH guidelines, which yielded good results concerning range, linearity, precision and accuracy.Keywords
Meloxicam, Bromo Cresol Green, Spectrophotometry.- The Effect of “Smart” Information on Cryptography
Authors
1 Department of ECE, SCSVMV, IN
Source
Software Engineering, Vol 10, No 2 (2018), Pagination: 23-26Abstract
Cryptography gives the maximum security for information sharing in modern communication world. The neural networks improve the performance of smart information sharing. In the e-voting technology demonstration, prove the best smart information that is cryptography. Three hypnotically approaches are (1) that Lamport clocks no longer adjust performance (2) Bandwidth stayed constant across successive generations of UNIVACs (3) mean popularity of kernels is not as important as a methodology’s reliable user- kernel boundary when optimizing average latency. The Quality of service based on the security, loss, exact and reliable information sharing. The algorithm used for securing the smart information Security improvement based the several types of cryptography. The algorithm for the deployment of SCSI disks for execution. Smart information is message, voice and video. This paper focusing to find the optimal real time algorithm, that construction will give the best quality of services. The novel experiments shows the output of smart information sharing.
Keywords
Neural Networks, Cryptography, Ethernet, Wireless, Architectures.References
- Clark, D., Morrison, R. T., and Garcia- Molina, H. Analyzing Lamport clocks using real-time models. Journal of Atomic, “Fuzzy” Archetypes 43 (Dec. 2005), 20–24.
- Clarke, E. Knowledge-based, efficient models for information retrieval systems. In Proceedings of SIGCOMM (Sept. 1991).
- Codd, E., Hennessy, J., Sasaki, N., and Kubiatowicz, J. Towards the technical uni- fication of information retrieval systems and RAID. In Proceedings of the Symposium on Signed Archetypes (Nov. 1995).
- Cook, S. An understanding of local-area net- works. Tech. Rep. 2189, UCSD, Apr. 1993.
- Daubechies, I. The impact of stochastic algo- rithms on cryptography. In Proceedings of the WWW Conference (Dec. 1999).
- Feigenbaum, E., Thompson, G., and Ka- han, W. Deconstructing RAID. Journal of Real-Time, Psychoacoustic Epistemologies 702 (Apr. 2001), 46–57.
- Floyd, S., Ritchie, D., and Gupta, a. To wards the appropriate unification of Scheme and public private key pairs. In Proceedings of the Conference on Permutable, Collaborative Mod- els (Dec. 1996).
- Hopcroft, J., and Lee, Y. Deconstructing replication. In Proceedings of the WWW Con- ference (Sept. 2001).
- Jones, C. Erasure coding no longer considered harmful. In Proceedings of SIGCOMM (Mar.1999).
- Kubiatowicz, J., Gopalakrishnan, Z., and Ramakrishnan, E. Decoupling sensor networks from fiberoptic cables in systems. Jour- nal of Collaborative Technology 75 (June 1997), 79–87.
- Leary, T. Deconstructing agents. In Proceed- ings of MOBICOM (Apr. 1992).
- Li, D. Evolutionary programming considered harmful. In Proceedings of NSDI (Aug. 2002).
- Li, T. Semantic communication. Journal of Constant-Time, Game-Theoretic, Symbiotic Theory (Apr. 2003), 70–98.
- Perlis, A., and Williams, C. The relation- ship between the Internet and checksums. In Proceedings of NDSS (May 2003).
- Raman, B., and Wilkinson, J. Comparing information retrieval systems and local-area networks. In Proceedings of SIGGRAPH (Dec.2003).
- Selvakumar, .S.Ravi, Adaptive Modulation IN Reconfigurable Platform, Journal of Theoretical and Applied Information Technology. Vol 68, PP 108-114, Oct 2014.
- S. Selvakumar, .S.Ravi, DPSK and QAM Modulation Detection analyzed with BER Estimation, IEEE International Conference on Current Trends in Engineering and Technology, July 2014
- S.Selvakumar,.J.Vaideeswaran, Adaptive Modulation with customized core processor, Indian Journal of Science and Technology Vol9(35), PP1-5, Sep 2016.
- FPGA Enactment of Adapted Progressive Encryption Technique
Authors
1 Department of ECE, SCSVMV, IN
Source
Digital Image Processing, Vol 11, No 4 (2019), Pagination: 61-65Abstract
There is a requirement for profoundly verified system and subsequently this task utilizes the verified correspondence between various hubs with the assistance of cryptographic innovation between FPGAs. This venture is huge to upgrade the security of information and code language connected for composing messages in a secret way. This proposed system focuses on the Modified Advanced Encryption Standard (MAES) to increase the speed and to reduce the hardware complexity. Advanced Encryption Standard (AES) is the most efficient public key encryption system that can be used to create faster and efficient cryptographic keys. Hypothetical examination and exploratory outcomes demonstrate that this system gives rapid just as less trades over unbound system. Standard symmetric encryption calculations give better security to the interactive media information. Be that as it may, applying symmetric key encryption calculation on progressively complex media information, may confront the issue of computational overhead. To defeat that issue, examine the AES and change it to decrease the figuring of calculation and for improving the encryption execution as far as throughput, inactivity. This change is finished by Permutation step. Altered AES calculation is a quick lightweight encryption calculation for security of information and exceedingly reasonable for the pictures and plaintext exchange than the AES calculation. With the guide of reenactment results security level and speed of the framework is expanded with equipment intricacy being decreased.
Keywords
Modified-AES, Cryptography, FPGA and Advanced Encryption Algorithm.References
- Alok Choudhary, David Nguyen and Joseph Zambreno “Exploring Area/Delay Tradeoffs in an AES FPGA Implementation” Department of Electrical and Computer Engineering Northwestern.
- Ahmed Kareem Shibee and Salim Ali Abaas “A New Approach for Video Encryption Based on Modified AES Algorithm” in International Journal of Contemporary Research in Engg. and Tech. vol 17, Issue 3, Ver. VI-2015.
- Ahmed. W, H. Mahmood, and U. Siddique “The Efficient Implementation of S8 AES Algorithm” WCE 2011, July 6 - 8, 2011
- David Zier, Khoa Vu “FPGA Implementation AES for CCM Mode Encryption Using Xilinx Spartan-II” Advanced Cryptography, May 2003
- Dr.B. R. Gladman “Input and Output Block Conventions”, The NIST Advanced Encryption Standard (AES). version 2.2, 6th June 1999
- Kishore. V, Naresh Kumar. B and Vasudeva Reddy. T “Image Security Using Modified Advanced Encryption Standard Algorithm (MAES)” Inter Journal of Engineering Research and Development, Volume .4, 2012.
- Kaijie Wu, Piyush Mishra, Ramesh Karri and Yongkook Kim “Concurrent Error Detection Schemes for Fault-Based Side-Channel Cryptanalysis of Symmetric Block Ciphers” IEEE CAD of integrated circuits and systems, VOL. 21, NO. 12, 2002.
- Paul D. Yacoumis Supervisor: Dr. Robert Clarke “On The Security of the Advanced Encryption Standard” November 2005.
- Shize Guo, Xinjie Zhao and Zhijie Jerry Shi “Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack against the AES and Its Application to Microcontroller Implementations” in IEEE, 2014.
- Yi Wang and Yajun Ha “FPGA-Based 40.9-Gbits/s Masked AES with Area Optimization for Storage Area Network” IEEE. Circuits and systems.VOL.60, NO.1, 2013.
- J. P. Choi and V. W. S. Chan, “Optimum power and beam allocation based on traffic demands and channel conditions over satellite down- links,” IEEE Trans. Wireless Commun., vol. 4, no. 6, pp. 2983–2993, Nov. 2005.
- M. Schubert and H. Boche, “Solution of the multi user downlink beam-forming problem with individual sinr constraints,” IEEE Trans. Veh. Technol., vol. 53, no. 1, pp. 18–28, Jan. 2004.
- M. Schubert and H. Boche, “Qos-based resource allocation and transceiver optimization,” Found. Trends Commun. Inf. Theory, vol. 2, no. 6, pp. 383–529, Aug. 2005.
- D. Gerlach and A. Paulraj, “Adaptive transmitting antenna array with feedback,” IEEE Signal Process. Lett., vol.1, no.10, pp.150–152,Oct. 1994.
- H. Liu and G. Xu, “Multiuser blind channel estimation and spatial channel pre-equalization,” in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process., Detroit, MI, May 1995, pp. 1756–1759.
- T. Yoo and A. Goldsmith, “On the optimality of multi-antenna broad- cast scheduling using zero forcing beam forming,” IEEE J. Sel. Areas Commun., vol. 24, no. 3, pp. 528–541, Mar. 2006.
- L. Dong, Z. Han, A. Petropulu, and H. V. Poor, “Improving wireless physical layer security via cooperating relays,” IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875–1888, Mar. 2010.
- Selvakumar, .S.Ravi, Adaptive Modulation IN Reconfigurable Platform, Journal of Theoretical and Applied Information Technology. Vol 68, PP 108-114, Oct 2014.
- S. Selvakumar, .S.Ravi, DPSK and QAM Modulation Detection analyzed with BER Estimation, IEEE International Conference on Current Trends in Engineering and Technology, July 2014
- S. Selvakumar,.J. Vaideeswaran, Adaptive Modulation with customized core processor, Indian Journal of Science and Technology Vol9(35), PP1-5, Sep 2016
- A Strategic Approach in Handling Information Retrieval Course for Attaining Course Outcomes – A Case Study
Authors
1 Department of Information Technology, Thiagarajar College of Engineering, Madurai, IN
2 Department of CSE, GKM College of Engineering and Technology, Chennai, IN
Source
Journal of Engineering Education Transformations, Vol 34, No SP ICTIEE (2021), Pagination: 148-153Abstract
Background: The major challenge in engineering education is to educate and train the student’s community with pedagogical practices in order to determine the notable skills to solve more complex and fragile structured problems. Innovative pedagogical practices make the students to adhere to the complex formulations of the corresponding domain and its applications. The realm of good understanding of knowledge and its deliverables can be ascertained through pedagogical practices with a focus on learner-centric activities in the classroom teaching.
The actual target in teaching learning process is to make all the students to have a good exploration on the domain knowledge with success ratio. The learner success is considered to be the core metric with which we can judge the success of learner-centric activities with creativity and quality processes. Confirming the process in which the learners are engaged with the key ideas of the course to be taught makes the students to have practical implementations in Teaching-Learning process.
Objective: This research work focus on the assessment and evaluation of learner-centric techniques for outcome based education upon statistical evaluation. Students of third year (VI Semester) of two consecutive batches have been analyzed for the course on Information Retrieval (14ITPS0). Two set of batches 2015-19 and 2016-20 have been considered for the assessment and analysis of Active Learning Strategies (ALS). The incorporation has been processed using the strategic approach based on daily, weekly and monthly assessments focusing on student learning criteria and their responding behaviors for 2016-20 batch. Each paradigm has been measured corresponding to the course outcomes at each level. Significant statistical analysis has been made for validating the process behind the teaching learning process.
Real time case study: Considering the batch 2015-19 summary assignments, presentations has been used for the evaluation and assessment of interim assignments. The observed response from the students went well among the student’s community. All the students have been registered for the course and they too have completed the same. But, the time and success ratio in learning mechanism varied from student to student upon completion of the course. Considering the batch 2016-20 active learning strategies such as Quiz by Kahoot!, Flipped classroom activity and MOOCs course has been incorporated. Also, for MOOC’S online courses a set of two courses has been identified relevant to the subject of study such as Text Retrieval and Search engines & Text mining and Analytics. For the Research problem identification the students are allowed to choose the domain specific topics for the course on information retrieval. In this process the time and success ratio has also been observed it also varied from one student to another.