Refine your search
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Saravanan, N.
- Steroidogenic Gene Expression in the Brain of an Indian Major Carp, Labeo rohita (HAM.)
Abstract Views :222 |
PDF Views:86
Authors
Affiliations
1 Endocrinology Unit, Department of Zoology, Madras Christian College, Tambaram, Chennai-600059, IN
1 Endocrinology Unit, Department of Zoology, Madras Christian College, Tambaram, Chennai-600059, IN
Source
Indian Journal of Science and Technology, Vol 4, No S8 (2011), Pagination: 47-48Abstract
No AbstractReferences
- Costa, E., Paul, S. (eds). 1991. Neurosteroids and brain function. Fidia Research Foundation symposium series. Thieme New York, Vol 8.
- Ebner, M.J., Corol, D.I., Havlikova, H., Honour, J.W., Fry, J.P. 2000. Identification of Neuroactive steroids and Their precursors and metabolites in adult male rat brain. Endocrinology, 147: 179-190.
- Kazuyoshi Tsutsui, 2006. Biosynthesis, mode of action and functional significance of neurosteroids in the developing Purkinje cell. J. Steroid Biochem. Mol. Biol. 102: 187–194.
- Expression of MIS Receptors in the Oocyte of Indian Major Carp, Cirrhinus mrigala
Abstract Views :235 |
PDF Views:83
Authors
Affiliations
1 Endocrinology Unit, Department of Zoology, Madras Christian College, Tambaram, Chennai-600 059, IN
1 Endocrinology Unit, Department of Zoology, Madras Christian College, Tambaram, Chennai-600 059, IN
Source
Indian Journal of Science and Technology, Vol 4, No S8 (2011), Pagination: 178-179Abstract
No AbstractReferences
- Kazeto.Y, Goto-Kazeto.R, Thomas P, Trant J, 2005. Molecular characterization of three forms of putative membrane –bound progestin receptors and their tissue distribution in channel catfish (Ictalurus punctatus). J. Mol. Endo., 34: 781-791
- Zhu, Y., Rice, C.D., Pang, Y., Pace, M., Thomas, P. 2003. Cloning, Expression and characterization of a membrane progestin receptor and evidence it is an intermediary in meiotic maturation of fish oocytes. Proc. Natl. Acad. Sci. USA, 100: 2231-2236
- A Survey on Secure Storage in Cloud Computing
Abstract Views :912 |
PDF Views:243
Authors
A. Rajathi
1,
N. Saravanan
1
Affiliations
1 School of Computing , SASTRA University, 613401, Thanjavur, Tamilnadu, IN
1 School of Computing , SASTRA University, 613401, Thanjavur, Tamilnadu, IN
Source
Indian Journal of Science and Technology, Vol 6, No 4 (2013), Pagination: 4396-4401Abstract
Cloud Computing is an environment for providing information and resources that are delivered as a service to end-users over the Internet on demand. Thus cloud enables users to access their data from any geographical locations at any time and also has brought benefits in the form of online storage services. Cloud storage service avoids the cost expensive on software, personnel maintenance and provides better performance, less storage cost and scalability. But the maintenance of stored data in a secure manner is not an easy task in cloud environment and especially that stored data may not be completely trustworthy. Cloud delivers services through internet which increases their exposure to storage security vulnerabilities. However security is one of the major drawbacks that preventing several large organizations to enter into cloud computing environment. This work surveyed on several existing cloud storage frameworks, techniques and their advantages, drawbacks and also discusses the challenges that are required to implement secure cloud data storage. This survey results help to identify the future research areas and methods for improving the existing drawbacks.Keywords
Cloud Computing, Data, Security, Storage Techniques and SurveyReferences
- Parakh A, and Kak S (2009). Online data storage using implicit security, Information Sciences, vol 179(19), 3323-3331.
- Li H, Dai Y et al. (2009), Identity-Based Authentication for Cloud Computing, M. G. Jaatun, G. Zhao, and C. Rong (Eds.): Cloud Computing, Lecture Notes in Computer Science, vol 5931, 157-166.
- Wang Q, Wang C et al. (2011). Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing, IEEE Transactions on Parallel and Distributed Systems, vol 22(5), 847-859.
- Balakrishnan S, Saranya G, et al. (2011). Introducing Effective Third Party Auditing (TPA) for Data Storage Security in Cloud, International Journal of Computer Science and Technology, vol 2(2), 397-400.
- Dinesh C (2011). Data Integrity and Dynamic Storage Way in Cloud Computing, Distributed, Parallel, and Cluster Computing.
- Kumar S P, Subramanian R (2011). An efficient and secure protocol for ensuring data storage security in Cloud Computing, International Journal of Computer Science Issues, vol 8(6), No 1, 261-274.
- Sajithabanu S, Raj E G P (2011). Data Storage Security in Cloud, International Journal of Computer Science and Technology, vol 2(4), 436-440
- Wang C, Wang Q et al. (2012), Toward Secure and Dependable Storage Services in Cloud Computing, IEEE Transactions on Services Computing, vol 5(2), 220-232.
- Spillner J, Müller J et al. (2012), Creating optimal cloud storage systems, Future Generation Computer Systems, vol 29(4), 1062-1072.
- Dong B, Zheng Q et al. (2012). An optimized approach for storing and accessing small files on cloud storage, Journal of Network and Computer Applications, 35 (6), 1847-1862.
- Deshmukh P M, Gughane A S et al. (2012). Maintaining File Storage Security in Cloud Computing, International Journal of Emerging Technology and Advanced Engineering, vol 2(10), 2250-2459.
- Tang Y, Lee P P C et al (2010). FADE: a secure overlay cloud storage system with File Assured Deletion, 6th International ICST Conference, Secure Comm.
- Wang W, Li Z et al. (2009). Secure and Efficient Access to Outsourced Data, CCSW ‘09 Proceedings of the 2009 ACM workshop on Cloud computing security, 55-66.
- Privacy Preserving Approaches in Cloud: a Survey
Abstract Views :645 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thanjavur, 613401, Tamilnadu, IN
1 School of Computing, SASTRA University, Thanjavur, 613401, Tamilnadu, IN
Source
Indian Journal of Science and Technology, Vol 6, No 5 (2013), Pagination: 4531-4535Abstract
Cloud Computing is continuously evolving and showing consistent growth in the field of computing. But, the security issues and threats associated with it still stay as a cumbersome. The focal point of this paper is Privacy preserving in cloud computing. This paper analyses and discusses various methods like adopting cryptographic methods, writing access rights and policies, anonymising data, segregating or fragmenting and then reconstructing the data, etc. All these approaches would preserve the privacy of user and data and while performing public auditing on the cloud data. The surveyed approaches are showcased and compared with one another, stating their pros and cons. Finally, the results are centralized and the issues to be concentrated in the future are drawn out. Enabling complete user control over his data, anonymising or encrypting the sensitive data before outsourcing, notifying the data owner upon data access, altogether with the tied up security mechanisms would nullify the privacy issue. This would serve as a helping note in the progress of strengthening the privacy preserving approaches in Cloud Computing.Keywords
Cloud Computing, Privacy Preserving, Access Control, Public AuditingReferences
- Wang J, Zhao Y et al. (2009). Providing Privacy Preserving in cloud computing, International Conference on Test and Measurement, vol 2, 213-216.
- Greveler U, Justus b et al. (2011). A Privacy Preserving System for Cloud Computing, 11th IEEE International Conference on Computer and Information Technology, 648-653.
- Zhou M, Mu Y et al. (2011). Privacy-Preserved Access Control for Cloud Computing, International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11, 83-90.
- Chadwick D W, and Fatema K (2012). A privacy preserving authorisation system for the cloud, Journal of Computer and System Sciences, vol 78(5), 1359-1373.
- Sayi T J V R K M K, Krishna R K N S et al. (2012). Data Outsourcing in Cloud Environments: A Privacy Preserving Approach, 9th International Conference on Information Technology- New Generations, 361-366.
- Rahaman S M, and Farhatullah M (2012). PccP: A Model for Preserving Cloud Computing Privacy, International Conference on Data Science & Engineering (ICDSE), 166-170.
- Waqar A, Raza A et al. (2013). A framework for preservation of cloud users’ data privacy using dynamic reconstruction of metadata, Journal of Network and Computer Applications, vol 36(1), 235-248.
- Wang C, Wang Q et al. (2010). Privacy-Preserving Public Auditing for Storage Security in Cloud Computing, Proceedings IEEE INFOCOM’10.
- Wang C, Chow S S M et al. (2013). Privacy-Preserving Public Auditing for Secure Cloud Storage, IEEE Transactions on Computers, vol 62(2), 362-375.
- Wang B, Li B et al. (2012). Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud, IEEE Fifth International Conference on Cloud Computing, 295-302.
- Gellman R (2009). WPF REPORT: Privacy in the clouds: Risks to privacy and confidentiality from cloud computing.
- Rong C, Nguyen S T et al. (2013). Beyond lightning: A survey on security challenges in cloud computing , Computers & Electrical Engineering, vol 39(1), 47-54.
- Takabi H (2010). Security and Privacy Challenges in Cloud Computing Environments, IEEE Security & Privacy, vol 8(6), 24-31.
- Xiao Z, and Xiao Y. Security and Privacy in Cloud Computing, IEEE Communications Surveys & Tutorials, vol PP(99), 1-17.
- Synthesis of Neurosteroids and its Sexual Dimorphism in the Brain of Tilapia Oreochromis Mossambicus
Abstract Views :136 |
PDF Views:0
Authors
Affiliations
1 Endocrinology Unit, Department of Zoology, Madras Christian College, Tambaram, Chennai 600059, Tamil Nadu, IN
2 Endocrinology Unit, Department of Zoology, Madras Christian College, Tambaram, Chennai 600059, Tamil Nadu
1 Endocrinology Unit, Department of Zoology, Madras Christian College, Tambaram, Chennai 600059, Tamil Nadu, IN
2 Endocrinology Unit, Department of Zoology, Madras Christian College, Tambaram, Chennai 600059, Tamil Nadu
Source
Indian Journal of Science and Technology, Vol 7, No 9 (2014), Pagination: 1267-1270Abstract
Neurosteroids play a vital role in governing the physiology of reproduction next to neuropeptides and neurotransmitters. Gonadal development influences the steroid synthesis in Central Nervous System (CNS) and also the CNS regulates the gonadal steroid production. It is well known that the receptors of estrogen modulate the production of GnRH, and serotonin, dopamine and GABAergic neurons modulate the steroidogenic enzyme. However, the influence of neurosteroids, Estrogen (E2) and Testosterone (T), and its presence and synthetic pathway variations are not studied in detail in Tilapia. Hence, the present study of identifying various steroids present in the total and regions of Tilapia brain resulted in the quantitative difference in E2, T, 11-Ketotestosterone (11-KT), Androstenedione (A), DHEA, and 21-Hydroxyprogesterone (21-P). The reproductively active fishes of female brain shows the high quantity of testosterone when compare with the male brain. It has been derived that the Cyp19 and Cyp17 gene expressions are higher than the Cyp21 by which the pathway of progesteronal derivatives are not documented. The steroidal production in the incubated regions of Tilapia brain highlights the augmented presence of 5á-or 3á-reductase evidence the elimination pathway. The quantitative expression of mRNA analysis of 3á-HSD, 3â-HSD, Cyp17, Cyp19 and Cyp21 substantiate the variation in sex and maturation of gonadal stages. Aromatase indicate the shift in the sex dependent pathway. The sulphated steroids of pregnenalone and DHEA indicate the presence of Hydroxysteroid Sulfotransferase (HST) for purging action. The study suggests that the sexual modulation can be done at CNS through manipulating the steroidal receptors more particularly at thalamus region of brain.Keywords
Neurosteroid Synthesis, Sexual Dimorphism- Lean Production - An Innovation Management
Abstract Views :100 |
PDF Views:0
Authors
S. Ilangovan
1,
N. Saravanan
1
Affiliations
1 Department of Mechanical Engineering, Amrita Vishwa Vidyapeetham (Deemed University), Amrita Institute of Technology, Coimbatore-641 105, IN
1 Department of Mechanical Engineering, Amrita Vishwa Vidyapeetham (Deemed University), Amrita Institute of Technology, Coimbatore-641 105, IN
Source
Manufacturing Technology Today, Vol 3, No 7 (2004), Pagination: 12-13Abstract
In the past, man in his quest for better standard and quality of life has allowed all other consideration to take a back seat and this accelerated the process of environmental degradation and began to threaten the earth's delicate ecological balance through which life on this planet survives. All manufacturing activities necessarily generate some form of waste. The manufacturing process does not consist o f 100 percent of conversion o f material and energy inputs into usable final products; some portion of the material and energy inputs inevitably ends up as wastes. When the waste generated exceeds the maximum assimilative capacity of the environment it becomes pollution. This paper focuses on LEAN productions, which aims at elimination of wastes there by reducing the environmental degradation.- Biodegradation of Some Aromatic Hydrocarbons (Toluene and Xylene) by a Bacterial Strain Isolated from Petroleum Contaminated Site in Chennai
Abstract Views :120 |
PDF Views:0
Authors
Affiliations
1 Post Graduate and Research Department of Biochemistry, Mohamed Sathak College of Arts and Science, Chennai (T.N.), IN
1 Post Graduate and Research Department of Biochemistry, Mohamed Sathak College of Arts and Science, Chennai (T.N.), IN