Sr/No/ |
Title |
Pdf |
1 |
Antibacterial Potential of Luprops tristis - the
Nuisance Rubber Plantation Pest from Western
Ghats of India
Bindiya E. S., Roselin Alex, Cikesh P. C, Karthikeyan P, Sarita G Bhat and Chandrasekaran M
Abstract- Insects hold potential for deriving novel bioactive substances against
multiple drug resistant bacteria that pose serious challenges for the clinical
management of several microbial mediated diseases. In this context, Luprops
tristis, a rubber plantation litter pest with a high population in the moist
South Western Ghats of India was explored for possible bioactive substances.
In-vitro studies showed that all the Gram positive (Staphylococcus aureus NCIM
No. 2079; Bacillus cereus NCIM No. 2217; and Lysinibacillus BTTS10) and Gram
negative species (E.coli NCIM No. 2574; Salmonella typhi BTC12; Klebsiella
pneumonia NCIM No.2957) tested were sensitive to this compound. The minimum
inhibitory concentration was 0.067mg mL-1 for S. aureus, L. fusiformis and 6.7mg
mL-1 for E.coli, S. typhi, K. pneumoniae. The extract was partially purified by
column chromatography. FT-IR showed the presence of alkenyl (C=C) & carbonyl
(=CO) groups. GC MS indicated the presence of [(hexadecyloxy) methyl]-, oleic
acid, butylated hydroxytoluene and hexadecanoic acid.
|
Download
|
2 |
Appraisal of Extraction Protocols for
Metagenomic DNA from Fish Gut Microbiota
Tina K. J, Bindiya E. S, Raghul Subin S, Sarita G. Bhat
Abstract-The gut microbiota composition in fishes is highly diverse and complex.
Complete cataloguing of this microbial community demands the use of metagenomic
approaches. Obtaining DNA in sufficient quantity and purity is crucial in
metagenomic analysis. The present study compares the existing DNA extraction
protocols to ascertain the appropriate method for fish gut metagenomic analyses.
Gut contents removed aseptically from intact Sardinella longiceps were used for
DNA isolation. DNA isolation methods for fish flesh, saline soil, mouse gut and
fish bacteria, coded as A, B, C and D were compared to the protocols for Gram
positive and Gram negative bacteria of Qiagen DNeasy Blood & Tissue Kit and the
protocol of QIAamp DNA Stool Minikit, coded as E, F and G, respectively. The
concentration and purity of the DNA obtained was analyzed in terms of OD 260/280
and 260/230 ratios and the processing times were also compared. The 16S rDNA was
amplified, to consider its suitability for further analysis. All the seven
protocols yielded DNA, with different yields. Method A and B gave the maximum
yield. In terms of purity, commercial kit based methods and method C were ideal.
All the methods, except methods C and F gave PCR amplicons. Processing time was
found to be the least for method G. The different methods varied widely in
performance with respect to yield and purity, the final choice of method depends
on the requirement of the researcher, which may be a high yield or purity or
short processing time of the sample
|
Download
|
3 |
Enhanced Data Security using Visual Data Hiding
process
Shailesh Kumar, Er. Archana Singh
Abstract—Image cryptography is an art of hiding information in images or
transforming images to obtain to hide any visual information. The image
cryptography is a traditional domain of information hiding and may be very old
between various cryptographic techniques. In this modern age image cryptography
is a mathematical model by which the information is manipulated in other human
un-recognizable format. Basically that can be categorized in two basic classes
first partial image encryption, and secondly the complete image encryption
technique. In this paper the image cryptographic approach is explored and
investigated for their authenticity. In addition of that a new cryptographic
model is proposed and implemented. The basic idea is taken from a partial image
encryption technique namely visual cryptography, and the idea is extended to
find a complete image cryptographic scheme. Therefore, additional mathematical
operators are utilized for achieving new cryptographic data model. Moreover it,
the previous image cryptographic models are only suitable to encrypt image data.
That is also extended to find a solution for text and image both kinds of
data.The proposed cryptographic model is implemented using java technology.
After implementation the performance of the proposed system is evaluated over
different performance parameters i.e. computational complexity, space complexity
and data validity. The calculated results demonstrate the acceptability of the
proposed cryptographic model due to their less resource (memory and time)
consumption, high data validity for image and text data both.
|
Download
|
4 |
Optimum Design Of Rocket Nozzle For Enhancement Of Thrust Using Cfd
Allama prabhu S , Dr. K S Shashishekar & H V Harish
ABSTRACT: Analysis of flow through C-D nozzle has been carried out , ideal gas
equation used for designing the nozzle, based on that design flow analysis
carried out. The inlet boundary conditions were specified according to the
available experimental information from journal. Numerical study has been
conducted using two-dimensional axis-symmetric model at different divergence
angle .Governing equations were solved using the finite-volume method in ANSYS
CFX-13 software. The nozzle geometry has been calculated theoretically by using
boundary conditions parameters. The present study is aimed at investigating
supersonic flow at different divergence angle, and different area ratio keeping
throat dia intact, since the variations in the parameters like the Mach number,
pressure, are being analyzed and nozzle design will be optimized. Further for
different altitude analysis has been carried out (5000, 10000, 20000, 25000 &
50000 feet). A Computational Fluid Dynamics (CFD) software package, ANSYSCFX-13,
was used to simulate the compressible, viscous gas flow-field in seven nozzle
shapes, including the heat transfer analysis. The results of turbulence models,
k-ε were computed for different divergent angle, different area ratio and
compared. Further based on Mach number and thrust, nozzle design has been
optimized .Model and meshing done by ICEM-CFD, analysis done by CFX-13 and
results obtained by CFD-POST. Geometry has been redesigned theoretically, by
analyzing the flow parameters and hence optimizing the geometry of nozzle.
|
Download
|
5 |
Study of Chelation Behavior of Mixed-ligand Ternary and Mixed Metal-Mixed ligand Quaternary Complexes of Toxic Metal Hg (II) and Cd (II) Ions Involving 2-Aminosuccinic acid and 5-methyluracil
K.Kumar and D.K. Dwivedi
The ternary and quaternary chelates formed by metal – ligand interaction of Hg
(II) and Cd (II) ions with 2-Aminosuccinic acid and 5-methyluracil have been
studied at silver-silver chloride electrode by the potentiometric technique. The
stability constants of Hg (II)- 2-Aminosuccinic acid- 5-methyluracil, Cd (II)-
2-Aminosuccinic acid - 5-methyluracil and Hg (II) – Cd (II)– 2-Aminosuccinic
acid - 5-methyluracil were determined using SCOGS computer programme and the
complex formation were elucidated with the aid of species distribution curves.
The molar ratios of ternary and quaternary chelates were kept as 1:1:1 and
1:1:1:1 respectively.
|
Download
|
6 |
A Study on AA 6063 Coated With Yttria Stabilized Zirconium
K.R.Ramyesh , A.Prabhu , S.Suresh Kumar
Abstract— In this study aluminium alloys 6063 were selected, and yttria
stabilized zirconium coating is given. The plasma-sprayed ceramic coatings
technology was used to reduce heat losses to a minimum during coating. The
aluminium alloys were subject to many test before and after coating. Initially
microstructure analysis and Optical Emission Spectroscopy test were taken to
ensure that the sample chosen has similar chemical composition or not. After
passing the initial test, the YSZ coating is given to test sample and supportive
test was carried out. Surface topography of yttria stabilized zirconium coated
substrate was investigated by SEM analysis. The evaluation of adhesion of
coating over the substrate is made by using scratch tester and the result
obtained was 5B (ISO comparison report). The hardness of the coated substrate
was measured by micro vicker’s hardness tester and the value increased from 97
to 208VHN. Furthermore abrasion test was carried out to ensure there is a
reduction in abrasion loss and the result obtained was 0.07gm loss for uncoated
sample and 0.05gm loss for coated sample which results in increasing the life of
the component.
|
Download
|
7 |
Enhanced TTP Architecture in Securing Web Service
Srinath K S, Prabhakar M
Abstract-Web Services use various security standards and protocols. The
conventional frameworks applying XML Encryption use DOM-based XML processing.
The DOM API is tree-based and therefore the whole document must be parsed before
data can be encrypted or decrypted. XML encryption specifies how XML elements
should be encrypted to provide message confidentiality. In this paper, a SAX
based streaming for XML processing that reduces the memory consumption and
execution time for parsing is used. DES is used for generating cipher and Base
64 encoding is used to encode the cipher in character format. A Trusted Third
Party authority is also proposed to provide authentication using X.509
certificates. The system has been tested for different attack scenarios and the
results found to be satisfactory.
|
Download
|
8 |
Study of heat exchanger by using Fluid
Structure Interaction Method
Shashank Wankhede, Dr. K. S. Zakiuddin
Abstract — In this study, the research is planned in finding how to calculate
the fluid induced stresses over shell and also to calculate heat transfer and
pressure drop in shell side using fluid structure interaction (FSI) method.
Comparison will be carried out for performance parameters like computational
time and accuracy of results between hex and tetrahedral element types using
Ex-Sight software for FSI method.
|
Download
|
9 |
CloudStash: An Efficient Technique to Provide Security to Multi-Clouds
Suman V Chinivar, Sirisha G N, Sushma K V
Abstract - Cloud computing is rapidly growing in many organizations. Cloud
computing has many features of storing and sharing their data over the cloud
network. The various ways of storing and sharing the data has made cloud
computing very popular among various organizations. According to IDC survey;
security is the major issue that the cloud is facing. Protecting the cloud using
normal key management technique opens the risk of attackers hacking the key and
confidential data. To address these issues, we propose the CloudStash scheme.
Here, we apply the secret sharing scheme directly on the file to store
multi-shares of the file. Then we apply hash and sign techniques to provide
highly secure cloud by addressing the issues like confidentiality, data
integrity, availability and key management.
|
Download
|
10 |
Survey on Information Retrieval Algorithm
Sandeep Kaur, Nidhi Bhatla
Abstract— Document retrieval systems find information to given criteria by
matching text record (documents) against user queries. A document retrieval
system consists of a database of documents, an optimal matching algorithm to
build a full text index, and a user interface to access the database. A document
retrieval system has two main tasks: Find relevant documents to user’s queries,
evaluate the matching results and sort them according to relevance, using
algorithms such as the Kuhn munkres Algorithm. The retrieval method consists of
text extraction and segmentation from different text document formats and source
code documents into logical and semantic segments. These segmented documents are
used to calculate the similarity against the user queries.
|
Download
|
11 |
Denial Of Service Attacks (DDOS) Detection And Prevention Based On Packets Flow Of The Website
R.Rajalakshmi , A.Mani , B.Raja
Abstract -Nowadays, In a fast moving growth of Distributed Service over internet
by a Distributed Denial of service (DDoS) is more challenge due to a critical
threat over the internet and botnets are gradually arise. More latest and
improved environment on Bot Masters aided to disable detectors by frequently
watching and updated to recover flash crowds. Botnets are usually the engines
behind Denial of Service Attacks (DDoS). Sophisticated botmasters attempt to
disable detectors by mimicking the traffic patterns of flash crowds. This poses
a critical challenge to those who defend against DDoS attacks.Ultimate and
foremost planning to defend against DDoS attacks by flash crowds. To propose a
most relevant and correcting the problems through Discrimination method and
corresponding algorithm results to found optimized results.
|
Download
|
12 |
Comparative Study on Semantic Web Service With and Without OWL-S
Yamuna B R
Abstract— The composition of complex services at design time is a
well-understood principle which is nowadays supported by many broadly available
tools. It’s already beyond the human ability to analysis them and generate the
composition plan manually. This paper proposes a framework for dynamic and
personalized composition of web services using an approach that integrates not
only functional attributes of web services, but also nonfunctional attributes
such as service requirements, quality of service (QoS), and some implementation
details are also presented. In this work we present initial focuses on the issue
of automated service composition in conjunction with the semantic web. In this
report we propose a composition that automatically handle the integration of web
services through the use of an Ontology Web Language (Owl-S). The adhoc queries
of user are split into meaningful query terms and each term is evaluated against
service available (through WSDL and OWL-S description). The comparison results
have been revels that the false positive rate and false negative rate for
different numbers of services with and without OWL-S as shown. Analysis rate is
high in case of without using OWL-S as compared with OWL-S.
|
Download
|
13 |
Performance Evaluation Of A Single Phase Brazed Plate Heat Exchanger
Bharath Kumar K, R.S Vijayakumar
Abstract— Brazed plate heat exchanger (BPHE) is one of the most efficient and
compact type amongst all of the heat exchangers. The geometry and the
geometrical parameters play a very important role on the design and on the
performance of the BPHE. Therefore, a slight change in the geometry of the BPHE
can vary the performance adversely. Hence, a good and efficient mathematical
method is necessary to capture the true performance which would be unique for
that particular geometry of the BPHE. The BPHE performance parameters include
thermal performance and hydraulic performances. The thermal performance measures
the rate of heat transfer or the heat transfer efficiency and the hydraulic
performance measures the pressure drop over the BPHE. The present report is on
modeling the heat transfer efficiency of the heat exchanger by optimizing the
Calculated Overall heat transfer coefficient in accordance with the Required
Overall heat transfer coefficient. The RequiedOHTC is calculated from the actual
temperature program, heat transfer area available and the heat load on the heat
exchanger. The developed method relates the parameters or non-dimensional
numbers influencing the heat transfer and pressure drop against Reynolds number.
The constants developed from this relation are unique for the specific tested
BPHE model and Reynolds number region. However, the prediction can be extended
for different heat transfer areas, temperature programs and varying heat loads
but for the specified Reynolds number region and the BPHE. The pressure drop
modeling involves only the pressure drop in the channels of the BPHE but not the
entire pressure drop that occurs between the inlet and outlet of the BPHE which
might include the pressure drop in the pipes, pipe bends, connections etc. The
pressure drop in the fluid channels influences the heat transfer area
requirement in case of applications where there is strong dependence of fluid
properties on local pressure.
|
Download
|
14 |
Comparison of Point Operations over Edwards Curve and its Variants
Dr. S. Joseph Robin
Abstract – In this paper the point operation of Edwards Curves, Twisted Edwards
Curve and Binary Edwards Curves are discussed. The computational efficiency are
also calculated in terms of point addition, doubling and scalar multiplication.
|
Download
|
15 |
Fuzzy Clustering of Web Documents Using Equivalence Relations and Fuzzy Hierarchical Clustering
Neha Arora, Devendra Kumar
Abstract—WWW is a fertile area for data mining research,[1] as huge amount of
information is available in the form of unstructured and semi structured text
databases[2] .It becomes typical to mine the relevant content or information
from the web. So method of document clustering has been introduced as a
methodology for improving document retrieval process. Clustering is a useful
method for the textual data mining. Traditional clustering technique uses hard
clustering algorithm in which each document use to belong to only one and
exactly one cluster which creates problem to detect multiple themes of the
documents. Clustering can be considered the most important unsupervised learning
process which deals with finding the clusters according to logical relationship
or consumer preferences. A cluster can be a structure in a collection of
unlabeled data. The analysis of clusters deals with organizing the data objects
into various clusters which has least inter cluster similarity and more intra
cluster similarity [4]. Many clustering algorithms have been proposed by
researchers. Partitioning clustering and hierarchical clustering are two main
approaches to clustering. This paper summarizes the agglomerative hierarchical
clustering method and presenting the clusters in the form of a dendrogram. Then
Birch multiphase hierarchical clustering is applied in which clustering features
are measured using clustering feature tree.
|
Download
|
16 |
Implementation Of A FPGA Based General Parameterizable Modulator
Avni Shah, S.B.Somani
Abstract— This paper deals with design anddevelopment of a generalized
parametrizable modulator (GPM) that can perform Gaussian minimum shift
keying(GMSK) modulation and Quadrature Phase Shift Keying(QPSK) modulation in a
reconfigurable baseband modulatorfor software defined radio (SDR) architecture.
GMSK is the underlying modulation scheme for the Global System for mobile(GSM)
standard, while QPSK technique is the basic modulationscheme for Code Division
Multiple Access (CDMA) standard. Although GMSK is an inherently non-linear
modulation technique, the present work uses a linearly approximated GMSK
technique to take the advantage of the simplicity of the filter structure. The
normalised error in amplitude as a function of modulation index and bandwidth
time product has been simulated thus capable of working at a data rate that
satisfies the requirements of almost all 2G and 3G air interface standards.The
proposed GPM architecture is implemented on a Spartan 3E starter kit.
|
Download
|
17 |
A Review On Analysis Of Different Cloud Servers On The Basis Of A Sophisticated Job Scheduling Approach
Karan Sood, Jasmeet Singh Gurm
Abstract-- The term cloud computing has come into this world as an evolution of
the century. An idea to keep the entire data of a user over one server so that
the user can access it from anywhere has taken a tremendous step towards the
safety and security of the user’s data. A cloud data centre is termed as
sophisticated architecture where user’s can relies over the preservations of the
data from external theft. The cloud computing server has its disadvantages also.
For a server to contain the entire data of millions of users in a safe manner is
a hectic job. In the same manner , if a process is given to the cloud server ,
the way it responds is a major concern in rating up the servers for the
performance evaluation. This paper focuses on the analysis of the different
cloud computing platforms over different aspects and this paper also deals with
the scheduling algorithms which are common for the last couple of years.
|
Download
|
18 |
A Review On Energy Efficient Scheduling In Green Cloud Computing
Manveer Singh, Jasmeet Singh Gurm
Abstract-- Green Cloud system is now in focus due to its energy consumption
minimization system as the entire world is suffering from the global warming
process. In the cloud server networks it becomes essential for a system to save
energy in terms of processing of a request from one end to another. Disabling
dead processes may be another optimistic approach in such a case .This paper
focuses on different types of approaches which can be used in the minimization
of the energy consumption of the cloud networks.
|
Download
|
19 |
Comparative Analysis of Koch Curve Fractal Antenna
With CPW Feeding Techniques for Wireless Application
Babita, Simranjit Kaur
Abstract--
In this paper a high gain Koch Curve fractal shape antenna for wireless
applications is proposed. With the increasing needs of multiband, high gain,
very directive antennas and good capability of integration of various wireless
technologies, the antenna’s research can be oriented following different ways.
The antenna is microstrip line fed and its structure is based on fractal
geometry where the resonance frequency of antenna is lowered by applying
iteration techniques. The antenna size inclusive of the ground plane is compact
and has a wide operating bandwidth. The antenna exhibits omnidirectional
direction radiation coverage with a gain better than 2.0 dBi in the entire
operating band.
|
Download
|
20 |
Design and Synthesis of Crop Cutting Machine
R.S.Warghane, Prof.D.M.Mate, Dr.C.N.Sakhale
Abstract-- This
Nowadays, agriculture especially in Maharashtra soybean crops has some problem
such as how to increase the productivity and profit, how to reduce the cost and
how to solve the problem come from foreign workers. Harvesting of soybean crops
is also done by huge harvester machine but, it also has some limitations like
high cost, applicable for large farm-fields. On the basis of these constraints
for crop cutting a new engine driven crop cutter is designed. It works on
shearing cutting principle. It composed of fixed blade disposed on the lower
portion of a frame; movable blade guided through bushes reciprocates over it. A
crank and slotted lever assembly driven by engine through gearbox which imparts
cutting force. The reciprocating blades consist of double edge sharpened knives
to cut crops during both forward and return stroke. The belt conveyor mechanism
is provided to guide and transfer the crops accumulated on the reciprocating
blade assembly to the collecting tank. As the engine driven crop cutting machine
is designed for soybean which is strongest crop in all crops and the blades are
designed with the side clearance for variety of crops diameter the machine can
be conveniently used for multiple crop cutting. As in given crop cutter the
machine is designed for crop cutting only with some further modification in
design thresher mechanism can also be incorporated for direct seeds extraction.
|
Download
|
21 |
Prevention of Intrusion using Cloud Services for the Smartphones
I.B.Rajeswari, Prof.Dipti Patil
Abstract-- In recent
years, smart phones are getting more complex and more powerful. Since smart
phones use the same software architecture as in PCs, they are vulnerable to
similar classes of security risks such as intrusion and hacking. This project
proposes an intrusion detection and prevention for smart phone using cloud
services which continuously performs an in-depth forensics analysis on the smart
phone to detect any misbehaviour such as wrong passwords and intrusion. In case
misbehaviour is detected, the proposed engine decides upon and takes optimal
response actions to prevent the occurrence of ongoing attacks. Despite the
computational and storage resource limitations in smart phone devices, the
engine can perform a complete and in-depth analysis on the smart phone and data
storage, since all the investigations are carried out on an emulated device in a
cloud environment. To address the critical challenge of keeping smart phone
secure, cloud services has been proposed to prevent the intrusion and block the
attack immediately.
|
Download
|
22 |
Design, analysis and optimization of connecting rod of ginning machine
Ms.Riddhi A. Chopde, Prof.S.T.Warghat
Abstract-- The
connecting rod is the intermediate member between power transmitting and power
receiving element. Also in some special cases like ginning machine connecting
rod is used to convert the rotary motion into reciprocating motion. Sometimes
the cross-section of the component gives the good or bad performance of the
machine. The design is carried out by changing the cross-section of the
connecting rod and by changing the material of connecting rod. For this purpose,
after study of the various materials, SGI and EN31 are chosen for connecting
rod. The proper finite element model is developed by CAD software CATIA V5. The
analysis has been performed by FEA software ANSYS 14.0., so as to ensure its
strength and weakness during the operation under given condition. By optimizing
the connecting rod for weight and cost reduction it is found that for new I
–section connecting rod of SGI the weight reduction is 17% and cost reduction
is16%. For new EN31 connecting rod the weight reduction is 13 % and there will
be cost increment is 26 %. Therefore SGI is more preferable than EN31 for
connecting rod.
|
Download
|
23 |
Effect Of Varied Modes Of Yogic Practices On Selected Physiological Variables Among Obese School Girls
V. Raj Kumar, S. Nagarajan
Abstract-- The
purpose of the study was to find out the effect of varied modes of yogic
practices on selected physiological variables among obese school girls. To
achieve the purpose of the present study, 570 girls in the age group of 14 to
17, studying in schools were selected as subjects, by using purposive sampling
method. Initially the height and weight of girls were measured and the body mass
index was calculated. Based on the BMI of selected subjects (N= 570) the
subjects on or above 25 were further screened and totally 79 students were found
as obese girls. Among the selected subjects (N = 79, BMI<25) 60 subjects were
randomly assigned into three groups 20 subjects each. The experimental group I
underwent the training of asanas group (AG), the experimental group II underwent
the training of suryanamaskar group (SNG). The group III used as control group
(CG) and keep off from any form of physical training all the two experimental
groups were treated with their respective training for about 3 days a week for
12 weeks of training period. In the present study, pre-post randomized
experiment design was adopted. The three groups were statistically analysed by
using analysis of covariance (ANCOVA). In case of significance of mean
difference was observed on the criterion measure, as a post – hoc test, the
Scheffe’s test was applied to find out which pair of group is high among the
others. The asana group has showed better performance on resting heart rate,
systolic blood pressure and diastolic blood pressure than the other two groups.
The suryanamaskar group also showed better performance on breath holding time
than the control group.
|
Download
|
24 |
Effect Of Explosive Plyometric Training On Selected Physiological Variables Among Polytechnic Students
P.Pradeep Kumar, Dr.K.Chandrasekaran
Abstract-- The
purpose of the present study was to find out the effect of explosive plyometric
training on physiological variables among polytechnic students. To achieve the
purpose of the present study, thirty men students from KLN Polytechnic College,
Madurai, Tamilnadu, India were selected as subjects at random and their ages
ranged from 16 to 19 years. The selected subjects are divided in to two groups.
The experimental group participated explosive plyometric training for eight
weeks. The control group was not undergone any training other than their daily
routine. The criterion measures such as anaerobic power, vital capacity and
resting pulse rate were tested before and after eight weeks and statistically
analysed by using analysis of covariance (ANCOVA) at 0.05 level. The explosive
plyometric training group showed better performance on anaerobic power, vital
capacity and resting pulse rate than the control group
|
Download
|