- Senthilkumar Mathi
- R. Priyanka
- S. Chellaganesghavalli
- R. Vijay Sai
- A. Festina
- J. Eshwari
- T. Manopriya
- V. Vaithiyanathan
- K. Naveen
- S. Saravanan
- V. Vaithayanathan
- Aarthi Ravi
- Ajay Aditya
- Rukmani Samyuktha
- G. Aishwarya
- S. Keerthana
- T. N. Janani
- S. Sushmita
- M. Sunandha
- T. Prasannakumar
- K. Thangaprakash
- Asish Bhaumik
- A. Gopi Reddy
- Manasa
- B. Kalyani
- S. Sushmitha
- M. Sreedhar Babu
- G. Venkata Ramanaiah
- K. Gangadhar
- D. Dhayalan
- V. Jhansipriya Marabathuni
- M. Bhavani
- K. Padmaja
- N. Madhavi
- P. Babu
- Ch. M. M. Prasada Rao
- Indian Journal of Science and Technology
- Biometrics and Bioinformatics
- Research Journal of Pharmacology and Pharmacodynamics
- International Journal of Innovative Research and Development
- Research Journal of Pharmacy and Technology
- International Journal of Scientific Engineering and Technology
- Asian Journal of Pharmacy and Technology
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Lavanya, M.
- Integrating Dynamic Architecture with Distributed Mobility Management to Optimize Route in Next Generation Internet Protocol Mobility
Authors
1 Amrita School of Engineering, Amrita Vishwa Vidyapeetham (University), Coimbatore, Tamilnadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 10 (2015), Pagination: 963-974Abstract
Increasing population of mobile users has lead to the demand of higher mobility support. Many protocols have been standardized for mobility management such as Mobile Internet Protocol version 6, hierarchical mobile IPv6 and proxy mobile IPv6 and so on. The predominantly used approach in the existing mobile networks is the centralized mobility management. In this, the messages transferred between mobile node and correspondent node must pass through each level due to the hierarchical architecture. When a mobile network is implemented with the centralized architecture, the messages are routed to the MN irrespective of its location using mobile IP for continuing services during the handover. But this approach is susceptible to issues such as single point of failure, non-optimized routes, latency issues, wastage of resources and security threats which affect the performance and scalability, demanding a flatter architecture with an efficient mechanism to face the traffic overload from the mobile users. Hence, the paper proposes a new scheme to form a flatter architecture by distributing the mobility management functionalities as distributed access point at the access level. The resistance against security threat such as man-in-the-middle attack, replay attack and false binding update attack has been achieved. Finally, numerical results show that the proposed scheme provides significant reduction in signaling cost and improves efficiency in route optimization.Keywords
Binding Acknowledgement, Binding Cache, Binding Update, Distributed Access Point, Distributed Mobility Management- Safety Monitoring System for Coal Mine Workers using Different Sensors
Authors
1 Karpagam University, IN
2 Department of ECE, Karpagam University, IN
Source
Biometrics and Bioinformatics, Vol 7, No 3 (2015), Pagination: 61-65Abstract
In this paper design and developed Safety measures for mine workers which are most essential in underground mining areas/sections. Here we are presenting MEMS based sensors network used to monitor the environment parameters of underground mine area and sends all sensed parameters/data to ARM processor. ARM processor is used to build a fully automated measuring system with reliability, high accuracy and smooth control. Upon detecting critical conditions/issues alert system starts and the same information is transmitted/passed to remote location by initiating modules based on RF communication Methods. The observed changes in the parameters will also be displayed in pc which makes easier for the underground control center to monitor and to take necessary immediate action to avoid damages and alerts through a mobile message. An electrochemical gas sensor array system is proposed for health and safety monitoring. The system incorporates a custom mine temperature ionic-liquid gas sensor array, a custom multi-mode electrochemical sensor readout board, and a commercial low power microcontroller board. Electrochemical sensor array was utilized to significantly decrease power, cost and size. In underground coalmine major of accidents occurred are based on fire and natural gas and overheating of surroundings. We are also considering the health condition of a person using Fall-Detector, made of MEMS-Accelerometer.
Keywords
Sensors Network, MEMS, GSM, RF-PRO, PC.- An Encryption Algorithm Functioning on ASCII Values and Random Number Generation
Authors
1 School of Computing, SASTRA University, Thanjavur – 613401, Tamil Nadu, IN
2 Information and Communication Technology, SASTRA University, Thanjavur – 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 35 (2015), Pagination:Abstract
This article aims to focus on encryption based algorithm on ASCII value and Random number generator. Proposed algorithm has been developed with the view to achieve data security and prevent unauthorized persons from meddling with such secret data. An ASCII based conversion has been implemented to encrypt shorter length messages through a symmetric key. The algorithm specifically accommodates the concept of random number generation that makes it tough for the hackers to decrypt despite accidentally discovering the key. This concept also involves floating point numbers for encryption to enhance the difficulty level of cryptanalysis. Hence this algorithm will provide an efficient way to make it almost impossible for the intruders to track the message.Keywords
ASCII, Encryption, Hackers, Random Number, Symmetric Key- Improved CAPTCHA based Authentication for E-mail ID
Authors
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
2 SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 35 (2015), Pagination:Abstract
This article aims to present the importance of authentication for E-mail ID through improved CAPTCHA based method.The structure of the CAPTCHA has to be reorganized to suit the user requirements to facilitate the authentication for E-mail ID. CAPTCHA is achieved by rearrangement of alphabets randomly on the buttons and it is very easy to frustrate by simple keyloggers. The motive of improving E-mail authentication is done by incorporating two factor visual authentication mechanisms. It is targeted to CAPTCHA based human interaction with sophisticated user friendly protocol. All the intermediate interaction is visualized by the user with better CAPTCHA code. It provides only one time (or) one session valid authentication through color grid rating method. This two layer authentication promises more secure in accessing any secure information based portal.Keywords
Authentication, CAPTCHA, E-mail, Hacker Attack, Keyloggers- An Enhanced Load Balancing Scheduling Approach on Private Clouds
Authors
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
2 SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 35 (2015), Pagination:Abstract
This paper aims to bring enhanced load balancing scheduling on private cloud computing. As cloud computing has become a developing and emerging area, the need for a cloud becomes mandatory in working areas. The advantage of technology in their own data centers to evolve a private cloud. Due to the presence of private cloud and to fulfill its unique characteristics and special requirements, it becomes a challenging task to optimally schedule virtual machine instances requests onto nodes to compute when there are multiple tasks to satisfy. In this paper, we discuss about load balancing, which is to schedule task among various end users. The scheduling algorithm used is Round Robin algorithm. This algorithm reduces the response time and improves the processing speed. According to this algorithm the nodes are allocated to the virtual machines along with their corresponding task to a particular node in a cyclic fashion. Each node in the cloud is scheduled equally with the task until all the tasks in the global queue all allocated.Keywords
Cloud Computing, Load Balancing, Private Cloud, Round Robin Algorithm, Scheduling- Secure Aware Communication using Novel End To End (ETE) Cipher Algorithm
Authors
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
2 Information and Communication Technology, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 35 (2015), Pagination:Abstract
This article aims to bring a novel method in cipher algorithm for secure aware communication. This paper proposes a unique scheme and ensures higher security during encryption and decryption process. The Key (ki) is generated for every Plain text pi. Plain text and key are converted to their equivalent ASCII values, by which the scrambled Cipher text (ci) is generated by implementing some of the concepts of the substitution techniques. During Decryption, the corresponding (ki) are used to recover the Plain text pi. It makes sure the need to send the full length key along with the cipher text for decryption process. The suggested method assures the greater security during transmission. There is a practical hindrance in guessing the Number of rounds (N) and the number of bits n shifted, by Cryptanalyst. This method will be more suitable for analyzing the discover key (ki) values from attempting Brute Force technique.Keywords
Ciper Algorithms, Cryptanalyst, Decryption, Encryption, Secure Communication- A Constraint-based Decentralized Task Routing Approach to Large-Scale Scheduling in Cloud Environment
Authors
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
2 Information and Communication Technology, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 35 (2015), Pagination:Abstract
This article mainly focused on cloud scheduling with constraint based decentralized task routing. The job of scheduling tasks across various nodes in a hierarchical network scenario is an exigent problem. The concept of decentralized distribution scheme proposed in base paper is time-consuming since it has to compute the availability function for each and every node. In this paper we proposed a CBDA (Constraint Based Decentralized Algorithm) which offers the expediency of being quick and “Make-span minimization policy” is implemented to reduce the completion time of the currently executing nodes. In our presumption, the submission nodes are semi centralized and it can store the availability information of the nodes or routers within its area. This paper considers the allotment of the tasks to the execution nodes which are unoccupied by other tasks. The dynamic allotment of the tasks to the nodes in the tree based approach is the major criteria for selecting the desired node. This paper proposes a trade-off between fully centralized model and the decentralized model by implementing a new constraint based decentralization scheme which saves time consumption and enhances efficiency of task scheduling.Keywords
Cloud Computing, Constraint based Method Scheduling, Decentralized Router, Dynamic Task- Load Prediction Algorithm for Dynamic Resource Allocation
Authors
1 School of Computing, SASTRA University, Thanjavur – 613401, Tamil Nadu
2 School of Computing, SASTRA University, Thanjavur – 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 35 (2015), Pagination:Abstract
This paper presents dynamic resource allocation in cloud computing using load prediction algorithm. Cloud computing is a technology that is of increasing demand these days. Cloud computing provides various kinds of services to the users. In cloud computing the provider dynamically allocate the resources. Doing so, the service provider should have some knowledge about the future resource needs. They can be calculated using the load prediction algorithms. In this paper an algorithm named Enhanced Exponentially Weighted Moving Average (EEWMA) is used to predict the load, which is efficient in terms of both overload avoidance and green computing. EEWMA algorithm predicts the future need of resources effectively and it is suitable for both increasing and decreasing need of resources. This proposed load prediction will be well suitable for overload avoidance applications.Keywords
Cloud Computing, Dynamic Resource Allocation, Green Computing, Load Prediction, Resources- Modified Privacy Protection in Personalized Web Search
Authors
1 B. Tech Information Technology, School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
2 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
3 Research, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 36 (2015), Pagination:Abstract
This proposed work aims to show the importance of personalized web search with improved privacy protection. To protect user profile based on Personalized Web Search (PWS), we need to consider few major issues during web site search processing. It is possible to improve efficient search based method with the personalized usage method of the accessing new user profile and prevent the privacy contents, which exists in the user profile method to adopt the risk privacy under control. User privacy can be safe without compromising the web search if personalized search quality. User Profile Search Engine (UPSE) is typically offline with all queries received from a same user. This article provides an inexpensive method for the user clientto conform whether to personalize a web search query in UPSE. This can avoid the unnecessary experience of the profile. Expected results can be evident that UPSE can achieve better quality based search results. So this proposed method is more applicable for personalized web portal.Keywords
Greedy Algorithms, Personalized Web Search, Privacy Preserving Personalized, User Profile Search Engine- Evaluation of Anticancer Activity of Ethanolic and Ethylacetoacetate Extracts of Sweet Cherry against Human Breast Cancer Cell Line MCF-7
Authors
1 Department of Pharmaceutical Chemistry, Teja College of Pharmacy, Kodad, Nalgonda-508206, Telangana State, IN
2 Department of Pharmaceutical Chemistry, SANA College of Pharmacy, Kodad, Nalgonda-508206, Telangana State, IN
Source
Research Journal of Pharmacology and Pharmacodynamics, Vol 8, No 2 (2016), Pagination: 65-70Abstract
MCF-7 is a breast cancer cell line isolated in 1970 from a 69-year-old Caucasian woman. MCF-7 is the acronym of Michigan Cancer Foundation-7, referring to the institute in Detroit where the cell line was established in 1973 by Herbert Soule and co-workers. The MCF7 line retains several characteristics of differentiated mammary epithelium including ability to process estradiol via cytoplasmic estrogen receptors and the capability of forming domes. The cells express the WNT7B oncogene. Growth of MCF7 cells is inhibited by tumor necrosis factor alpha (TNF alpha). Secretion of IGFBP's can be modulated by treatment with anti-estrogens. PIK3CA helical mutations were identified in MCF-7, but with low AKT activation. The main objective of the present research work is to isolate the bioactive molecules and evaluate the in vitro anticancer activity of ethanolic and ethyl acetoacetate extracts of sweet cherry (EEC and EAAEC) of Prunus avium. The in vitro anticancer activity was carried out against human breast cancer cell line MCF-7 by MTT assay. The results obtained from the in-vitro studies performed by MTT assay by using human breast cancer cell line MCF-7 displayed that the various extracts of sweet cherry (EEC and EAAEC) possessed a very good anticancer activity. From the present studied it had been concluded that EEC and EAAEC, all were exhibiting the potential capability to inhibit the cancer cell when compared with standard drug doxorubicin and the cell growth inhibition of EEC and EAAEC was found to be the highest 92.90% growth inhibition at 10 μg (IC50 = 2.4 μg/ml) and EAAEC with the 92.49% growth inhibition at 10 μg (IC50 = 2.9 μg/ml).Keywords
MCF-7, WNT7B Oncogene, TNF Alpha, anticancer, MTT Assay, IC50 etc.- Heat Transfer of Nanofluid Past an Exponentially Permeable Stretching Sheet with Heat Generation and Newtonian Heating in a Porous Medium
Authors
1 Department of Applied Mathematics, Y. V. University, Kadapa, Andhra Pradesh, IN
Source
International Journal of Innovative Research and Development, Vol 5, No 1 (2016), Pagination: 318-329Abstract
In present study, we have investigated the phenomenon of Newtonian heating under the application of uniform porous medium when heat generation and chemical reaction appears in the energy and volumetric species equations in the flow of a nànofluid. The flow is induced by an exponentially permeable stretching sheet. The solutions of the nonlinear equations governing the velocɨty, temperature and nànoparticle volume fraction profiles are solved numerically using Runge-Kutta Gill procedure together with shooting method and graphical results for the resulting parameters are displayed and discussed. The influence of the physical parameters on skin-friction coefficient, local Nusselt number and nànoparticle Sherwood number are shown in a tabulated form.
Keywords
Porous Medium, Nanoparticle, Newtonian Heating, Heat Generation and Chemical Reaction.- MHD Boundary Layer Flow of Casson Nanofluid over a Vertical Exponentially Stretching Cylinder under Newtonian Heating
Authors
1 Department of Applied Mathematics, Y.V. University, Kadapa, A.P., IN
2 Department of Mathematics, Acharya Nagarjuna University, Ongole, AP-523001, IN
Source
Research Journal of Pharmacy and Technology, Vol 10, No 4 (2017), Pagination: 998-1010Abstract
In this paper, similarity solution of the steady boundary layer flow and heat transfer of a Casson nanofluid flowing over a vertical cylinder which is stretching exponentially along its radial direction in the presence of MHD and Newtonian heating is investigated. The governing partial differential equations are converted into nonlinear, ordinary, and coupled differential equations and are solved using bvp4c Matlab solver. The effects of important parameters such as Magnetic parameter, Reynolds number, Prandtl number, Lewis number. Natural convection parameter and the conjugate parameter for Newtonian heating are described through graphs. The numerical results are compared with the published data and are found to be in good agreement.".Keywords
MHD, Casson Nanofluid, Heat and Mass Transfer, Newtonian Heating.- TPA for Privacy-Preserving Using Safe Cloud Storage
Authors
1 Department of Computer Application, Veltech Multitech Dr. Rangarajan Dr. Sakunthala Engineering College, IN
Source
International Journal of Scientific Engineering and Technology, Vol 3, No 5 (2014), Pagination: 601-603Abstract
Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared pool of configurable computing resources. Enabling public auditability for cloudstorage is important so that users can resort to a third-party auditor (TPA) to check the integrity of outsourced data and be worry free. Here we propose a secure cloud storage system supporting privacy-preserving public auditing.Keywords
Third Party Auditor, Integrity, Cloud Computing, Security.- Formulation and Evaluation of Mouth Dissolving Tablets of Carbamazepine
Authors
1 Department of Pharmaceutics, Bellamkonda Institute of Technology and Sciences, Podili, IN
2 Department of Pharm. Chemistry, QIS College of Pharmacy, Ongole, IN
Source
Asian Journal of Pharmacy and Technology, Vol 7, No 3 (2017), Pagination: 137-143Abstract
Carbamazepine is an anticonvulsant. It works by decreasing nerve impulses that cause seizures and pain. Carbamazepine is used to treat seizures and nerve pain such as trigeminal neuralgia and diabetic neuropathy. Carbamazepine is also used to treat bipolar disorder. Due to sudden onset of attack, it is necessary to formulate antiepileptics into such a delivery system, which provide immediate relief. Hence, the present investigation was undertaken with a view to develop mouth-dissolving tablets of Carbamazepine, which offers a new range of product having desired characteristics and intended benefits. In this study, the mouth dissolving tablets were prepared using two different technologies, direct compression method and solid dispersion technology. Tablets produced by direct compression method contain crospovidone as a super disintegrant and sorbitol as a sweetener. Solid dispersions of Carbamazepine with polyvinylpyrrolidone K-30 and polyethylene glycol 6000 in different weight ratios were prepared with a view to increase its water solubility. Carbamazepine solid dispersions with polyvinylpyrrolidone K-30 in 1:2 ratios of drug: carrier showed maximum drug release and hence, compressed along with other excipients into mouth dissolving tablet. The results compared for both the technologies showed that the Carbamazepine tablets prepared using solid dispersion technology was found to have good technological properties and satisfying and reproducible drug dissolution profiles. Moreover, the drug release was found to be comparable to the marketed dispersible tablet.Keywords
Carbamazepine, Mouth Dissolving Tablets, PVP K30, PEG 6000, Solid Dispersions, FT-IR, Dissolution Rate.References
- Seager H. Drug-delivery Products and the Zydis Fast-dissolving Dosage Form. J Pharm Pharmacol 1998; 50:375-382.
- Bradoo R, Shahani S, Poojary S, Deewan B, Sudarshan S. Fast Dissolving Drug Delivery Systems. JAMA India 2001; 4(10): 27-31.
- Bang L, Goa K. Carbamazepine: a review of its use in children with epilepsy. Paediatr Drugs 2003; 5(8): 557-73.
- Wellington K, Goa KL. Carbamazepine: an update of its efficacy in the management of epilepsy. CNS Drugs 2001; 15(2): 137-63.
- Toshifusa S, Hideshi S, Kenji H, Kunio I. Studies of rapidly disintegrating tablets in oral cavity using co ground mixtures of mannitol with crospovidone. Chem Pharm Bull 2002; 50(2): 193198.
- Franco M, Trapani G, Latrofa A et al. Dissolution properties and anticonvulsant activity of phenytoin-PEG 6000 and PVP K30 solid dispersion. Int J Pharm 2001; 225:63-73.
- Ahmad M Abdul-Fattah, Bhargva HN. Preparation and in vitro evaluation of solid dispersion of halofantrine. Int J Pharm 2002; 235:17-33.
- Van den Mooter G, Augustijns P, Blaton N, Kinget R. Physicochemical characterization of solid dispersions of temazepam with polyethylene glycol 6000 and PVP K30. Int J Pharm 1998; 164:67-80.
- Ryh-Nan P, Jing-Huey C, Rhei-Long C. Enhancement of dissolution and bioavailability of piroxicam in solid dispersion system. Drug Dev Ind Pharm 2000; 26(9): 989-994.
- Dobetti L. Fast melting tablets: Development and technology. Pharm Tech Drug Delivery 2001; 44-50.
- Bi Y, Sunada H, Yonezawa Y, Danjo K, Iida K. Preparation and evaluation of compressed tablets rapidly disintegrating in the oral cavity. Chem Pharm Bull (Tokyo) 1996; 44: 2121-2127.
- Andries F. Marais, Mingna Song, Melgardt M. de Villiers. Effect of compression force, humidity and disintegrant concentration on the disintegration and dissolution of directly compressed furosemide tablets using croscarmellose sodium as disintegrant. Tropl J Pharm Res 2003; 2:125-135.
- Shenoy V, Agrawal S, Pandey S. Optimizing fast dissolving Dosage form of Diclofenac Sodium by rapidly disintegrating agents. Indian J Pharm Sci 2003; 65(2): 197-201.
- Debord B, Lefebvre C, Guyot Hermann AM, Bouche R, Guyot JC. Study of different crystalline forms of mannitol comparative behavior under compression. Drug Dev Ind Pharm 1987; 13:1533-1546.
- Pharmapedia.http://www.pharmpedia.com/Tablet:Formulation_of_tablets/Diluents.
- Patel DM, Patel NM, Shah RR, Jogani PD, Balapatel AI. Studies in formulation of orodispersible tablets of rofecoxib. Ind J Pharm Sci 2004; 66(5): 621-625.
- Najib NM, Suleiman M, Malakh A. Characteristics of the in vitro release of ibuprofen from polyvinylpyrrolidone solid dispersions. Int J Pharm 1986; 32:229-236.
- Corrigan OI, Murphy CA, Timoney RF. Dissolution properties of polyethylene glycols and polyethylene glycol-drug systems. Int J Pharm 1979; 4:67-74.
- Dubois JL, Ford JL. Similarities in the release rates of different drugs from polyethylene glycol 6000 dispersions. J Pharm Pharmacol 1985; 37:494-495.
- Craig DQM, Newton JM. The dissolution of nortriptyline hydrochloride from polyethylene glycol solid dispersions. Int J Pharm 1992; 78:175-182.
- Saers Sjokvist E, Craig DQM. An investigation into the mechanisms of dissolution of alkyl p-aminobenzoates from polyethylene glycol solid dispersions. Int J Pharm 1992; 83:211219