A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Dhanalakshmi, S.
- Cryptographic Key Generation Based On the Ambient Audio
Authors
1 Sri Muthukumaran Institute of Technology, Chennai, TN, IN
2 Anna University, IN
Source
Digital Signal Processing, Vol 6, No 2 (2014), Pagination:Abstract
The mainstay of this project is to establish a secure communication channel among devices based on recording of similar audio patterns, that make use of the audio fingerprint entropy. Features from the recorded ambient audio are used to generate a public cryptographic key between devices without exchanging any kind of information about the ambient audio itself or the features utilized for the key generation process. Exploring a common audio fingerprinting approach and encountering for the noise in the derived fingerprints are corrected employing Error Correcting Codes. This is a mechanism to unobtrusively establish an ad hoc secure communication channel between unacquainted devices which is conditioned on the surrounding context. Considering the audio as a source of spatially centered context, the similarity of features from ambient audio by devices in proximity to create a secure communication channel exclusively based on these feature. The method used is noninteractive, unobtrusive, and does not require specific or identical hardware at communication partners. The adaptation of a specific value for the tolerated noise among fingerprints based on environmental conditions using fuzzy-cryptography scheme.Keywords
Data Encryption, Location-Dependent and Sensitive, Pervasive Computing, Random Number Generation, Signal Analysis, Synthesis and Processing, Signal Processing.- Computer Assisted System For Classification Of Wall Thickness In Ultrasound Carotid Artery Images Using Neural Networks
Authors
Source
International Journal of Innovative Research and Development, Vol 2, No 6 (2013), Pagination:Abstract
The aim is to classify the carotid artery ultrasound images. This is done by developing a system i.e. a decision making system for automated diagnosis of the ultrasound images. The system proposed classifies the images into normal ,cardiovascular and cerebovascular diseases. The ultrasound images are preprocessed and then for each image two contours are extracted. Inorder to classify the images the multilayer back propogation network system has been developed. The system along with the contour extraction algorithms works efficiently and results shows that this system provides an higher level of classification of the ultrasound images with reduced time.
- Pathobiological Characteristics of Intestinal and Diffuse-Type of Gastric Carcinoma-Retrospective Study of Gastric Cancers
Authors
1 Institute of Pathology, Madras Medical College, Tamil Nadu, IN
Source
International Journal of Medical and Dental Sciences, Vol 6, No 2 (2017), Pagination: 1462-1467Abstract
Background: Gastric carcinomas have various pathological features. Based on patterns of growth and invasiveness, however, they fall into two types: diffuse type and intestinal type. These two types of carcinoma appear to be different in their histogenetic origins.
Objectives: To analyse various types of gastric cancer reported in last five years. To compare the features of intestinal and diffuse type gastric carcinoma including gross appearance, staging, grading of tumor.
Materials and Methods: This was a retrospective study of 324 gastric cancer which were surgically resected and received over 5 years. The tumors were divided into groups according to their gross and microscopic patterns. Gross appearance was classified based on Borrmann classification. Microscopic features evaluated include tumor cell type, extent of invasion, degree of maturation, formation of glandular structures, nodal metastasis.
Results: Totally 320 cases of gastric cancer were received of which 218(68%) were male, 102(32%) were female. Gastric cancers are rare below the age of 30 years. Comparing the type of gastric cancer intestinal type were 269(84%), diffuse type were 24(7.5%) and other type of gastric cancer including GIST, lymphoma, mucinous adenocarcinoma were 27(8.5%). Younger patients have higher stage of lymph node metastasis in diffuse type, but not for the intestinal type.
Conclusion: Gastric cancer more common in male (M:F= 2:1) and most frequently seen in 5th decade. Intestinal type constitutes the most common type of gastric tumor. Gross appearance of diffuse type was predominantly infiltrative (79%).
Keywords
Gastric Cancer, Diffuse Type, Intestinal Type, Gross Appearance, Grading, Nodal Metastasis.References
- Hamilton SR, Aaltonen LA, editors. Pathology and genetics of tumours of the digestive system. Lyon: IARC press; 2000 Sep 20.p.38-52.
- Lacobuzio-Donahue CA, Montgomery EA. Gastrointestinal and Liver Pathology: A Volume in the Series: Foundations in Diagnostic Pathology. 2nd edition. US: Elsevier Health Sciences; 2011.
- Neugut AI, Hayek M, Howe G. Epidemiology of gastric cancer. In Seminars in oncology 1996 Jun;23:281-91.
- Sugano H, Nakamura K, Kato Y. Pathological studies of human gastric cancer. Acta pathologica japonica 1981 Dec;32:329-47.
- Lauren P. The two histological main types of intestinal metaplasia in the gastric mucosa: diffuse and so-called intestinal type carcinoma. An attempt at a histo-clinical classification. Acta Pathol Microbiol Scand 1965;64:31-49.
- Zheng H, Takahashi H, Murai Y, Cui Z, Nomoto K, Miwa S, et al. Pathobiological characteristics of intestinal and diffuse-type gastric carcinoma in Japan: an immunostaining study on the tissue microarray. Journal of clinical pathology 2007;60(3):273-7.
- Esaki Y, Hirayama R, Hirokawa K. A comparison of patterns of metastasis in gastric cancer by histologic type and age. Cancer. 1990 May 1;65(9):2086-90.
- Washington K. of the AJCC cancer staging manual: stomach. Annals of surgical oncology 2010;17(12):3077-9.
- Rohatgi PR, Mansfield PF, Crane CH, Wu TT, Sunder PK, Ross WA, et al. Surgical pathology stage by American Joint Commission on Cancer criteria predicts patient survival after preoperative chemoradiation for localized gastric carcinoma. Cancer 2006;107(7):1475-82.
- Ming SC. Gastric carcinoma: a pathobiological classification. Cancer 1977;39(6):2475-85.
- Graziosi L, Marino E, Cavazzoni E, Donini A. Prognostic value of the seventh AJCC/UICC TNM classification of non-cardia gastric cancer. World journal of surgical oncology 2013;11(1):103.
- In Vitro Anti-Oxidant Study of Herbal Extract Mixture by Nitric oxide and DPPH Method
Authors
1 Department of Pharmacognosy, School of Pharmaceutical Sciences, VISTAS, Vels University, Pallavaram, Chennai-117, Tamilnadu, IN
Source
Research Journal of Pharmacy and Technology, Vol 10, No 1 (2017), Pagination: 277-280Abstract
Herbalism is a traditional medicine or folk medicine practice based on the use of plants or it's extracts. Herbal extract mixture produce synergetic activity compared to individuals, it was confirmed by its in- vitro antioxidant activity. Herb-herb combinations have been used in practice for thousands of years, yet scientific evidence of their therapeutic benefits is lacking.An increase demand for this , the present work examine thepotential of Herbal extract mixture. Mixtures were prepared in different combination (aqueous extract of Terminalia belerica : aqueous extract of Solanum xanthocarpum) ratio of 10:90, 20:80, 30 :70,40:60,50:50,60:40,70:30,80:20,90:10. All ratios were subjected to nitric oxide scavenging assay to find out the effective combinational mixture. The ratio 70:30 (Terminalia belerica : Solanum xanthocarpum ) showed maximum free radical scavenging property. The present results suggest that traditional crude drugs might be potent and novel therapeutic agents for scavenging of NO and the regulation of pathological conditions caused by excessive NO and its oxidation product. These findings may also help to explain, at least in part, certain pharmacological activities of crude drugs, especially anti-infection and anti-inflammatory activities.Keywords
Solanum Xanthocarpum (entire plant ), Terminalia Belerica (fruit) , Herbal Extract Mixture Preparation. Tannin and Nitric Oxide Free Radical Scavenging Assay, DPPH Method.- Prime Labeling of Rough Approximations for Some Special Graphs
Authors
1 Department of Mathematics, SRM University, Chennai – 603203, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 10, No 25 (2017), Pagination:Abstract
Background/Objectives: Rough set theory proposed a new mathematical approach to vagueness or imperfect knowledge. It is the learning of approximations of concepts represented by lower and upper approximations which is being attracted by many researchers. The current study is a combination of rough sets approximation and graph labeling. Methods/Analysis: Many researchers have studied prime graph. Here we combine rough approximations with prime labeling under the name of H-prime labeling on graph G. Findings: The current work is to prove that the induced sub graph obtained by the upper approximation of any sub graph H of a friendship graph Fn, bistar graph Bn,n and splitting graph of a star graph 'S' ' graph admits prime labeling. The various applications between rough sets and graph labeling are chemical classification, decision analysis, knowledge acquisition, machine learning, job assignment etc.Keywords
Bistar Graph, Friendship Graph, Lower and Upper Approximation, Prime Labeling, Rough Set, Splitting Graph.- Development and Optimization of Natural Colourant from Microbial Pigment
Authors
1 Dr. M. G. R Educational and Research Institute, Velappanchavadi, Chennai – 600077, Tamil Nadu, IN
Source
Research Journal of Pharmacy and Technology, Vol 12, No 7 (2019), Pagination: 3475-3478Abstract
Background: Natural pigments and synthetic dyes have been extensively used in various field such as food production, textile industries etc. Prodigiosin is red pigment produced by Serratia species. Prodigiosin is a promising drug owing to its reported characteristics of having anti-microbial, immunosuppressive, anti-proliferative and anti-cancer activity. Objective: The objective of the study is to development and optimization of natural colourant from microbial pigment. Methods: The aim of the work is to formulate suitable growth conditions and interaction of carbon and nitrogen sources in medium for growth production of prodigiosin from Serratia species. Result: The maximum production A2 (units/cell) was achieved at 280C, at pH7 with the addition of 1% of carbon source (Glucose) and 0.25% of nitrogen sources (peptone)after 72 days of incubation. Conclusion: Our results indicate that we have designed an economic medium supporting enhanced Serratia marcescens A2 prodigiosin production giving an added value for crude glycerol obtained from biodiesel industry.Keywords
Serratia, Bio Pigment, Factorial Design, Prodigiosin.References
- Yang F., Hanna M.A., Sun R. Value-added uses for crude glycerol-a byproduct of biodiesel. Biotechnol. Biofuels. 2012, 5:13.
- Paulo da Silva G., Mack M., Contiero J. Glycerol: a promising and abundant carbon source for industrial microbiology. Biotechnol. Adv. 2009, 27(1): 30–39.
- Carbonell G.V., Della Colleta H.H.M., Yano T., Darini A.L.C., Levy C.E., Fonseca B.A.L. Clinical relevance and virulence factors of pigmented Serratia marcescens. FEMS Immunol. Med. Microbiol. 2000, 28: 143–149.]
- Iftikhar T., Niaz M., Hussain Y., Abbas S.Q., Ashraf I., Zia M.A. Improvement of selected strains through gamma irradiation for enhanced lipolytic potential. Pak. J. Bot. 2010, 42(4): 2257–2267.
- Adrio J.L., Demain L.A. Genetic improvement of processes yielding microbial products. FEMS Microbiol. Rev. 2006, 30(2):187–214.
- Huma T., Rashid M.H., Javed M.R., Ashraf A. Gamma ray mediated mutagenesis of Phialocephala humicola: Effect on kinetics and thermodynamics of α-amylase production. Afr. J. Microb. Res. 2012, 6(22): 4639–4646.
- Samrot V., Chadana K., Senthil kumar P., Narendra kumar G. Optimization of prodigiosin production by Serratia marcescens SU-10 and evalution of its bioactivity. IRJOB. 2011, 2(5):128–133.
- Krithika K., Geetha Ramani D. Screening of Serratia marcescens isolated from soil for secondary metabolites of therapeutic importance. Int. J. Bioassays. 2013, 02(08): 1162–1165.
- Mehdikhani P., Bari M.R., Hovsepyan H. Screening of Saccharomyces cerevisiae for high tolerance of ethanol concentration and temperature. Afr. J. Microbiol. Res. 2011, 5(18):2654–2660.
- Rascoe J, Berg M, Melcher U, et al. Identification, phylogenetic analysis, and biological characterization of Serratia marcescens strains causing cucurbit yellow vine disease. Phytopathology. 2003, 93:1233–1239.
- Siva R, Subha K, Bhakta D, et al. Characterization and enhanced production of prodigiosin from the spoiled coconut. Appl Biochem Biotechnol. 2012, 166:187–196.
- Mathivanan N (1995) Studies on extracellular chitinase and secondary metabolites produced by Fusarium chlamdosporum, an antagonist to Puccinia arachidis, the rust pathogen of groundnut.
- Pichyangkura R, Kudan S, Kuttiyawong K, Sukwattanasinitt M, Aiba S (2002) Quantitative production of 2-acetamido-2-deoxy-D-glucose from crystalline chitin by bacterial chitinase. Carbohydr Res 337: 557-559.
- An Empirical Study on Preserving Sensitive Knowledge in Data Mining
Authors
1 Department of Software Systems, Sri Krishna Arts and Science College, Coimbatore – 641008, Tamil Nadu, IN
Source
ScieXplore: International Journal of Research in Science, Vol 5, No 1 (2018), Pagination: 31-34Abstract
Protection of data in data mining involves preserving sensitive data and sensitive knowledge. Preserving sensitive data focus on protecting the data when it is shared for mining with third parties. In some situations even the result of data mining techniques might reveal sensitive information. This area of research which focuses on output preservation of data mining techniques is termed as Preserving Sensitive Knowledge. The sensitive results of data mining are preserved by reducing the efficiency of the result. In this paper, an empirical study on existing sensitive knowledge preservation approaches is discussed. The approaches include rule hiding in association rule mining and classification technique. The output data protection also includes the restriction in query processing. The article highlights the merits and demerits on each approach.
Keywords
Association Rules, Privacy Preservation, Rule Hiding, Sensitive Knowledge.References
- Aggarwal CC, Yu PS. A general survey of privacy-preserving data mining models and algorithms. Privacy-preserving Data Mining; 2008. p. 11–52. https://doi.org/10.1007/978-0-38770992-5_2
- Agrawal D, Aggarwal CC. On the design and quantification of privacy preserving data mining algorithms. Proceedings of the Twentieth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems; 2001. p. 247–55. https://doi.org/10.1145/375551.375602
- Chen K, Liu L. A survey of multiplicative perturbation for privacy-preserving data mining. Privacy-Preserving Data Mining. 2008. p. 157–81. https://doi.org/10.1007/978-0-38770992-5_7
- Warner SL. Randomized response: A survey technique for eliminating evasive answer bias. Journal of the American Statistical Association. 1965; 60(309):63–9. https://doi.org/10.1080/01621459.1965.10480775
- Refaat M, Aboelseoud H, Shafee K, Badr M. Privacy preserving association rule hiding techniques: Current research challenges. International Journal of Computer Applications. 2016; 136(6):11–7. https://doi.org/10.5120/ijca2016908446
- Telikani A, Shahbahrami A. Data sanitization in association rule mining: An analytical review. Expert Systems with Applications. 2018; 96:406–26. https://doi.org/10.1016/j.eswa.2017.10.048
- Garg V, Singh A, Singh D. A survey of association rule hiding algorithms. 2014 Fourth Intenational Conference on Communication Systems and Network Technologies, IEEE; 2014. p. 404–7. PMid: 25657953 PMCid: PMC4311352. https://doi.org/10.1109/CSNT.2014.86
- Natwichai J, Li X, Orlowska M. Hiding classification rules for data sharing with privacy preservation. International Conference on Data Warehousing and Knowledge Discovery; Springer; Berlin, Heidelberg. 2005 Aug. p. 468–77). https://doi.org/10.1007/11546849_46
- Dwork C, Kenthapadi K, Mcsherry F, Mironov I, Naor M. Our data, ourselves: Privacy via distributed noise generation. Advances in Cryptology-EUROCRYPT; 2006. p. 486–503. https://doi.org/10.1007/11761679_29
- Thong T, Buttyan L. Query auditing for protecting max/min values of sensitive attributes in statistical databases. Trust, Privacy and Security in Digital Business. 2012. p. 192–206. https://doi.org/10.1007/978-3-642-32287-7_17