- K. S. Narayanan
- N. Elamathi
- B. V. Ramaraju
- S. Palaniammal
- Sebha Kumar Palaniappan
- S. Suresh Kumar
- P. Anandan
- R. Bharathidasan
- G. Senthilkumar
- P. Madhanraj
- A. Panneerselvam
- P. Padmavathi
- I. Jemila
- J. Devi
- M. Maragatham
- Vijaya Prakash
- V. Sambavi
- M. M. Aruldhas
- P. Rajesh
- E. Suthagar
- A. K. Navin
- N. Shobana
- B. Ravi Sankar
- R. Ilangovan
- K. Deepa
- N. Sharmila Banu
- D. Geetha
- ICTACT Journal on Soft Computing
- Networking and Communication Engineering
- Software Engineering
- Data Mining and Knowledge Engineering
- Biometrics and Bioinformatics
- Automation and Autonomous Systems
- Research Journal of Science and Technology
- International Journal of Advances in Nursing Management
- Journal of Endocrinology and Reproduction
- ICTACT Journal on Image and Video Processing
- HuSS: International Journal of Research in Humanities and Social Sciences
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Suganya, S.
- Class Wise Linear Discriminant and Regression Based Binarized Nearest Learning in Digital Marketing
Authors
1 Department of MCA, Rathnavel Subramaniam College of Arts and Science, IN
2 Department of Computer Science, Rathnavel Subramaniam College of Arts and Science, IN
Source
ICTACT Journal on Soft Computing, Vol 12, No 1 (2021), Pagination: 2485-2493Abstract
The employment of internet and social media has remodeled behavioral aspects of consumer or student communities and methods in which organizations or educational institutions perform their business pattern. Both social and digital marketing put forwards efficient scopes to educational institutions by way of reduced costs, enhanced brand perception and elevated sales. Nevertheless, notable disputes prevail from obstructive electronic word-of-mouth and invasive and annoying online brand existence. Nowadays, students use online promotions to know about best universities for education globally. This university choice and students’ feedback observed by student-experience shared across social media platforms. Several methods have been employed for selecting the university but not providing accurate information. This paper is motivated towards applying Machine Learning for learning, analyzing and classifying the student information based on the student experience by means of tweets in twitter. The twitter data with student tweets is collected from benchmark twitter dataset and applied to the proposed method, Class-wise Linear Discriminant and Regression-based Binarized Nearest Learning (CLD-RBNL). The CLD-RBNL method is split into two sections. First, preprocessing and relevant feature selection (i.e. tweets) are acquired by employing Class-wise Linear Discriminant-based Feature Selection (CLDFS) model to obtain dimensionality reduced tweets. To this result, Regression-based Binarized Nearest Neighbor model is applied for maximum lead generation. The CLD-RBNL method is compared with other state-of-the-art methods and found to outperform in terms of sensitivity, specificity, processing time, lead generation accuracy and error rate.Keywords
Class-Wise, Linear Discriminant, Feature Selection, Digital Marking, Educational Services, Regression, Binarized Nearest Neighbor.References
- Jamal Abdul Nasir Ansari, Nawab Ali Khan, “Exploring the Role of Social Media in Collaborative Learning the New Domain of Learning”, Smart Learning Environments, Vol. 7, No. 9, pp. 1-6, 2020.
- B. Senthil Arasu, B.Jonath Backia Seelan and N. Thamaraiselvan, “A Machine Learning-Based Approach to Enhancing Social Media Marketing”, Computers and Electrical Engineering, Vol. 86, pp. 1-9, 2020.
- Abdul Jabbara, Pervaiz Akhtarb and Samir Dania, “Real-Time Big Data Processing for Instantaneous Marketing Decisions: A Problematization Approach”, Industrial Marketing Management, Vol. 90, pp. 558-569, 2019.
- Yogesh K. Dwivedi, Elvira Ismagilova, D. Laurie Hughes, Jamie Carlson and Raffaele Filieri, “Setting the Future of Digital and Social Media Marketing Research: Perspectives and Research Propositions”, International Journal of Information Management, Vol. 59, pp. 1-37, 2020.
- Jin A. Choi and Kiho Lim, “Identifying Machine Learning Techniques for Classification of Target Advertising”, The Korean Institute of Communications and Information Sciences, Vol. 6, No. 3, pp. 1-37, 2020.
- Arvind Rangaswamy, Nicole Moch, Claudio Felten, Gerrit van Bruggen, Jaap E. Wieringa and Jochen Wirtz, “The Role of Marketing in Digital Business Platforms”, Journal of Interactive Marketing, Vol. 51, pp. 72-90, 2020.
- Ido Roll and Ruth Wylie, “Evolution and Revolution in Artificial Intelligence in Education”, International Journal of Artificial Intelligence in Education, Vol. 26, pp. 582-599, 2016.
- Andrej Miklosik, Martin Kuchta, Nina Evans and Stefan Zak, “Towards the Adoption of Machine Learning-Based Analytical Tools in Digital Marketing”, IEEE Access, Vol. 7, pp. 85705-85718, 2019.
- Ming Hui Huang and Roland T. Rust, “A Strategic Framework for Artificial Intelligence in Marketing”, Journal of the Academy of Marketing Sciences, Vol. 49, pp. 30-50, 2021.
- Ying Qian, Weiwei Liu, Jiangping Huang, “A Self-Attentive Convolutional Neural Networks for Emotion Classification on User-Generated Contents”, IEEE Access, Vol. 8, pp. 154198 - 154208, 2019.
- Hongli Wang and Jiangtao Ren, “A Self-Attentive Hierarchical Model for Jointly Improving Text Summarization and Sentiment Classification”, Proceedings of Asian Conference on Machine Learning, pp. 630-645, 2018.
- Santiago Carbo-Valverde, Pedro Cuadros Solas, Francisco Rodrıguez Fernandez, “A Machine Learning Approach to the Digitalization of Bank Customers: Evidence from Random and Causal Forests”, PLOS ONE, Vol. 15, No. 10, pp. 1-39, 2020.
- Marta Marco Gardoqui, Almudena Eizaguirre and Maria Garcian Feijoo, “The Impact of Service-Learning Methodology on Business Schools’ Students Worldwide: A Systematic Literature Review”, PLOS ONE, Vol. 15, No. 12, pp. 1-21, 2020.
- Iuliana Mihaela Lazar, Georgeta Panisoara Ion Ovidiu Panisoara, “Digital Technology Adoption Scale in the Blended Learning Context in Higher Education: Development, Validation and Testing of a Specific Tool”, PLOS ONE, Vol. 15, No. 7, pp. 1-27, 2020.
- Cheng Ju Liu, Tien Shou Huang, Ping Tsan Ho, Jui Chan Huang and Ching-Tang Hsieh, “Machine Learning-Based E-Commerce Platform Repurchase Customer Prediction Model”, PLOS ONE, Vol. 15, No. 12, pp. 1-15, 2020.
- Peng Wang and Zhengliang Xu, “A Novel Consumer Purchase Behavior Recognition Method using Ensemble Learning Algorithm”, Mathematical Problems in Engineering, Vol. 2020, pp. 1-11, 2020.
- Rung Ching Chen, Christine Dewi, Su Wen Huang, and Rezzy Eko Caraka, “Selecting Critical Features for Data Classification based on Machine Learning Methods”, Journal of Big Data, Vol. 7, No. 52, pp. 1-26,2020.
- Amber L. Stephenson, Alex Heckert and David B. Yerger, “College Choice and the University Brand: Exploring the Consumer Decision Framework”, Higher Education, Vol. 71, pp. 489-503, 2016.
- Vikrant Kaushal and Nurmahmud Ali, “University Reputation, Brand Attachment and Brand Personality as Antecedents of Student Loyalty: A Study in Higher Education Context”, Corporate Reputation Review, Vol. 23, pp. 254-266, 2019.
- Github, “Distance Learning”, Available at: https://github.com/Bhasfe/distance_learning.
- Analysis of Quantum Key Distribution in LTE-A Network
Authors
1 Department of Information Technology, Adhiparasakthi Engineering College, Melmaruvathur, IN
2 Adhiparasakthi Engineering College, Melmaruvathur, IN
Source
Networking and Communication Engineering, Vol 8, No 4 (2016), Pagination: 120-126Abstract
LTE-A is a standard for wireless communication developed by 3GPP LTE release 10, which enhances the existing LTE network for supporting higher data usage, low latencies and better spectral efficiency. Security is the one of the challenge in LTE-A network. Some security risks are modification, injection and eavesdropping attacks. Another challenge in LTE-A network is resource utilization. Due to the multiple key management mechanisms, the complexity of LTE-A network is increase. An existing system utilized Elliptic Curve-Diffie Hellman Key Exchange algorithm which establish a shared secret key over communication channel. The drawbacks of ECDH are computational cost and communication cost is relatively high. In this paper, we propose an efficient key distribution technique called Quantum Key Distribution. This technique improves the security as well as utilizes the resources effectively. The proposed scheme includes BB84 protocol, which uses the properties of quantum mechanism for detecting attackers and unconditional security. Using this system we achieve maximum security level compared with existing technique.
Keywords
LTE-Advanced Network, Elliptic Curve-Diffie Hellman, Quantum Key Distribution, BB84, Heisenberg Uncertainty Principle, No-Cloning Theorem.- A Unique Solution for Clickjacking Attack Using Regex Based Code Crawler
Authors
1 IFET College of Engineering, IN
Source
Software Engineering, Vol 7, No 3 (2015), Pagination: 66-69Abstract
Clickjacking - user clicks in order to carry out events which are favorable for the attacker. In the most excessive cases, this susceptibility can cause an unsuspecting user to have their report comprised with a solitary click. It legitimately requires a single click from the users. Numerous click jacking scams have been implemented on Social Networking. For example, Facebook Like and Share buttons have been veiled under other buttons so that, when clicked, go halves something with their friends inadvertently in order to engender viral marketing for a product or to propagate malware. Clickjacking attack can be prevented by checking the HTML Tag and IFRAME Tag. Iframe URL is compared with website URL. If both URL belongs to alike domain then no crisis else malicious. Future confirmation using Black Lister Database to check the URL whether it is infected in any attack, then collects all the information regarding that particular website, if it is wicked website then administrator will block the website.Keywords
Clickjacking, IFRAME, IP CHECK, Prevention.- Lingering Bandwidth Estimation to Optimize the Resource Utilization for Mobile Ad Hoc Networks
Authors
1 Dept of Computer Science & Engineering, Karpagam College of Engineering, Coimbatore, IN
2 Dept of Science & Humanities, VLB Janakiammal College of Engineering & Technology, Coimbatore, IN
Source
Networking and Communication Engineering, Vol 1, No 6 (2009), Pagination: 268-272Abstract
In wireless networks, to provide quality of service by means of resource allocation the protocols need to be evaluate a lingering bandwidth estimation for further allocationHowever, there is no standardized mechanism or method has been proposed to accurately evaluate the amount of available resources on a given channel. Such an evaluation would, lead to optimize bandwidth utilization for applications of mobile adhoc networks like multimedia dataflow. We proposes a new techniques to estimate a bandwidth of a node in IEEE 802. 11 based mobile adhoc networks. We show by simulations that our technique provides we show by simulations that our technique provides an accurate estimation of the lingering bandwidth on wireless links in many ad hoc configurations and an efficient delivery ratio & reduce delay time in the environment.
Keywords
Ad hoc Networks, Available Bandwidth Estimation, IEEE 802. 11, Quality of Service.- Analyzing Lifecycle of it Components and Reducing E-Waste
Authors
1 Park College of Engineering and Technology, IN
2 Nehru Institute of Engineering and Technology, Coimbatore, Tamilnadu, IN
Source
Data Mining and Knowledge Engineering, Vol 5, No 3 (2013), Pagination: 96-102Abstract
Tremendous growth has been made in the field of Telecommunication and Information Technology (IT). Environmental problems occur due to the significant growth in the field of IT which accelerates mass production, mass consumption, and mass disposal. Life Cycle Assessment (LCA) shows another way to analyze, to deduce and essentially to alter the environmental performance of electronic telecommunication products. LCA approach formulates a way to determine in which phase of life (whether it will be in the production of raw materials or to disposal) causes the greatest destruction to the environment. Therefore specific organization activities should be recognized and altered to maximize environmental performance. The main aim of this research is to investigate the life cycle environmental impact of IT equipments and to determine the possible recycle rate. Green computing is an issue that forces each one. E-waste threatens the planet as both a source of toxins and through sheer tonnage. Companies within the computer, consumer electronics and electrical appliance industries have always accounted success by their bottom line profits. Actions must be measured in terms of their impact on planet, people, and profits rather than just the bottom line. Recycling is necessary for the environment which depends on the product recovery infrastructure. The products should be collected, transported and finally it is recycled. Accessing existing infrastructure and recycling technologies leads to obtain the greatest results from recycling. Recycling methods for Electronic wastes (E-waste) and IT equipments are proposed in this paper. The proposed method helps us to prevent from health hazards due to the usage of Information and telecommunication equipments. The usage of these equipments creates a significant potential due to the consumption of electricity produced by burning fossil fuel. The disposal of wastes mainly contributes to ozone layer depletion potential. Design for the environment (DfE) in the product design stage and green procurement are recommended for improving the entire environmental performance of electronic equipment .Recovery of a product is another solution for economical recycling. Efficient reverse logistics to collect and transport entire lifecycle of electronic equipments should be taken into account to enhance recycling in order to improve the performance of environment.Keywords
Information Technology, Environment, Electronic Waste, LCA, Recycling.- Biometrics-based Authentication and Network Security–A Survey Approach
Authors
1 Dr. SNS Rajalakshmi College of Arts and Science, Coimbatore, Tamilnadu, IN
2 Dr. SNS Rajalakshmi College of Arts and Science, Coimbatore. Tamilnadu, IN
Source
Biometrics and Bioinformatics, Vol 2, No 3 (2010), Pagination: 56-60Abstract
All most all the real world application makes use of network communication. The security of multimedia information in general and the security of visual information in fastidious have increasingly become an issue of great concern in our networked society. Therefore it is necessary to improve the network security for secured communication among users of the network. Numerous techniques and methods are available to assure the network security. Most popular among the available techniques is the use of cryptography. The cryptographic key generation alone has some limitations. That there is a fear that the network user may forget their password and they may loss their key or it may be stolen. This usually led to the fact that the network of the user can be easily accessed by an illegitimate user. A solution to this problem can be derived using biometrics along with cryptographic key generation technique. There are several ways to combine biometrics with a cryptosystem, namely biometrics key release, biometrics key generation and biometrics key binding. These biocryptosystems make use of the advantages of both biometrics and cryptography. This paper presents a survey on various techniques for biometric based authentication and network security. This paper discusses some of limitations of the earlier proposed techniques on biometric authentication and network security. Additionally, this paper also discusses some of the ideas to enhance the accuracy of the biometric authentication system and therefore the network security.
Keywords
Authentication, Biometrics, Cryptography, Key Generation, Key Binding, Key Release, Network Security, and Passwords.- Simulation and Characterisation of HfO2/ALGaN/GaN MOS-HEMT with Source Field Plate for Improved Breakdown Voltage
Authors
1 Department of Information and Communication Engineering, S.K.P Engineering College, Tiruvannamalai, IN
2 Information and Communication Engineering, SKP Engineering College, Tiruvannamalai, Tamil Nadu, IN
Source
Automation and Autonomous Systems, Vol 7, No 3 (2015), Pagination: 77-80Abstract
The AlGaN/GaN based HEMTs are the most promising devices for high power and high frequency applications, due to wide band- gap material (3.4 eV of GaN), high density of two-dimensional electron gas (2DEG) in the buried channel, low intrinsic carrier density, and high saturation velocity. From this novel device structure by introducing a source field-plated in the metal oxide Semiconductor high electron mobility transistors (MOS-HEMT) structure having a relatively short gate length and short gate-to-drain distances. The 2D break down analysis is performed using Sentaurus TCAD simulator. The effects of gate to drain distance (Lgd), source field plate length (Lfp) and passivation layer thickness(tp) on break down voltage (BV) is analyzed. The simulations are done using the hydro dynamic (HD) model, which is calibrated/validated with the previously published experimental results. The breakdown voltage is observed to increase with increase in Lf p and tp. Very high breakdown voltage is obtained by optimizing the Lf p to 3 mm and tp to 200 nm at a fixed gate to drain distance of 3.4 mm. The results show a great potential application of the ultra-thin HfO2 source field plated AlGaN/GaN MOS HEMT to deliver high currents and power densities in high power microwave Technologies.- Antibacterial Activity of Essential Oil Extracted from Coriandrum sativam (L.) and GC-MS Analysis
Authors
1 PG and Research Department of Botany and Microbiology, A.V.V.M Sri Pushpam College (Autonomous), Poondi, Thanjavur, Tamil Nadu, IN
2 Dept of Microbiology, Thanthai Hans Roever College of Arts and Science, Perambalur - 621 212, Tamil Nadu, IN
Source
Research Journal of Science and Technology, Vol 4, No 5 (2012), Pagination: 203-207Abstract
Extraction of essential oils from locally available plant Coriandrum sativam (L.) was carried out using steam distillation followed by ether extraction. Dried and purified extracted oils were screened for their antibacterial activity of both gram positive (Staphylococcus aureus) and gram negative (Enterobacter aerogenes, Klebsiella pneumoniae, Vibrio cholerae and Salmonella typhi) bacterial strains by Agar well diffusion method. Coriandrum sativam shows antibacterial activity against the above given five bacterial strains. GC-MS was done on Coriandrum sativam oil. These results support that this plant oil can be used to cure bacterial infections and may also have role as pharmaceuticals and preservatives.Keywords
Coriandrum sativam, GC-MS, Essential Oil, Antibacterial Activity and Extraction.- Co-Dependency and Depressive Symptoms among Wives of Alcoholics Selected in Hospital, Erode
Authors
1 Dhanvantri College of Nursing, Ganapathypuram, NO–1 Ranganoor Road, Muniyappan Kovil, Pallakkapalyam (PO), Tiruchengodu (TK), Namakkal District-637 303, IN
Source
International Journal of Advances in Nursing Management, Vol 2, No 3 (2014), Pagination: 143-146Abstract
In India is one of the largest producers of alcohol in the world and there has been a steady increase in its production over the last 15 years, according to new statistics. The problem of excessive alcohol consumption is a major cause of public health concern in most countries of the world today .Heavy consumption, which involves for more than dependence, can cause undoubted misery to individual, who is usually affected by other physical, psychological, and social disabilities as well.
Objectives: co-relate co -dependency and depressive symptoms among wives of alcoholics
Design: descriptive research design.
Setting: VK hospital and Nallandha de addiction centre, Erode
Participants: 30 wives of alcoholics with fulfilling the inclusion criteria were selected by purposive sampling.
Methods: Codependency scale and Center for Epidemiologic Studies Depression scale (CES - D) are used to collect the data from wives of alcoholics.
Results: From the findings of the study it can be concluded that the most of them were in the age group of 41 -50 years, Hindus, joint family, belongs to Conjugal marriage, living with husband for above 10 years, had 3 children's, had secondary education, house wife, family income belongs to 10,000 - 15,000, consuming alcohol for above 6 years and had history of parents. Most (90%) of them were high co dependency and Most (94%) of them were mild depression. The Co - dependency mean score was (56.8 ± 7.31), which is 81% and Depressive symptoms mean score was (37.8 ± 8.01), which is 47%. Co-relation between co - dependency and depressive symptoms scores was (0.9) highly positive relationship between these variables. No significant association between the co - dependency and depressive symptoms scores of wives of alcoholics when compared to demographic variables. Conclusion: The aim of the study was to assess the co - dependency and depressive symptoms among wives of alcoholics. It was found that there is a positive co - relation between co - dependency and depression.
Keywords
Co-Dependency, Depression, Wives of Alcoholics.- Gestational Exposure to Di(2-Ethylhexyl)Phthalate Modifies the Expression Pattern of Genes Controlling Thyroid Hormone Biosynthesis in Puberal Rat Progeny
Authors
1 Department of Endocrinology, Dr ALM PG Institute of Basic Medical Sciences, University of Madras, Taramani Campus, Chennai - 600113, Tamil Nadu, IN
Source
Journal of Endocrinology and Reproduction, Vol 20, No 2 (2016), Pagination: 92-101Abstract
Di(2-ethylhexyl) phthalate (DEHP), a plasticiser, is known to disrupt thyroid functions but the underlying molecular mechanism remains obscure. The present study was conducted testing the hypothesis that gestational exposure to DEHP may modify the expression of specific genes controlling biosynthesis and action of thyroid hormones in the male progeny at puberal age. Pregnant rats were administered with DEHP [1, 10 and 100 mg (in olive oil)/Kgb.wt./day] from embryonic day 9 to 21 through oral route. The pups were sacrificed on post-natal day 60. Enzyme Immuno Assay (EIA) revealed a dose-dependent decrease in serum 3,5,3’ triiodothyronine (T3) and L-thyroxine (T4) titres in DEHP-treated rats. Real-time RT-PCR and western blot analyses of thyroidal genes revealed decreased expression level of sodium/iodide symporter (Nis) and thyroid hormone receptor α (Trα), whereas the expression of thyroid stimulating hormone receptor (Tshr), thyroid hormone receptor β (Trβ) and pendrin (Pds) increased. While western blot detection showed decreased expression level of thyroperoxidase (Tpo), RTPCR data pointed out augmented expression. Western blot detection of transcriptional factors showed decreased expression levels of fork-headbox e1 (Foxe1) and haematopoietically expressed homeobox (Hhex), whereas thyroid transcription factor-1 (Ttf-1) and paired-box domain 8 (Pax8) increased. Our study demonstrates, for the first time, that gestational exposure to DEHPaffects the expression of genes controlling thyroid hormone synthesis in puberal rat progeny, and the hypothyroid state in these rats may be linked to decreased expression of Nis, Tpo, Foxe1 and Hhex.Keywords
Pendrin, Sodium/Iodide Symporter, Thyroperoxidase, Thyrotrophin Receptor, Haematopoietically Expressed Homeobox.References
- Chou K, Wright RO. Phthalates in food and medical devices. Journal Medical Toxicology. 2006; 2:126–35.https://doi.org/10.1007/BF03161027 PMCid:PMC3550149
- Cho SC, Bhang SY, Hong YC, Shin MS, Kim BN, Kim JW.Relationship between environmental phthalate exposure and the intelligence of school-age children. Environ Health Perspect. 2010; 118:1027–32. https://doi.org/10.1289/ ehp.0901376 PMid:20194078 PMCid:PMC2920903
- Shea KM. Pediatric exposure and potential toxicity of phthalate plasticizers. Pediatrics. 2003; 111(6 Pt 1):1467–74.https://doi.org/10.1542/peds.111.6.1467 PMid:12777573
- Latini G. Monitoring phthalate exposure in humans. Clin Chim Acta. 2005; 361:20–9. https://doi.org/10.1016/j.cccn.2005.05.003 PMid:16004980
- Silva MJ, Reidy JA, Herbert AR, Preau Jr JL, Needham LL, Calafat AM. Detection of phthalate metabolites in human amniotic fluid. Bull Environ Contam Toxicol. 2004; 72:1226–31. https://doi.org/10.1007/s00128-004-0374-4 PMid:15362453
- Silva MJ, Samandar E, Preau Jr JL, Reidy JA, Needham LL, Calafat A. Automated solid-phase extraction and quantitative analysis of 14 phthalate metabolites in human serum using isotope dilution-high-performance liquid chromatographytandem mass spectrometry. J Anal Toxicol.2005; 29:819–24. https://doi.org/10.1093/jat/29.8.819 PMid:16374941
- Zoeller RT. Environmental chemicals as thyroid hormone analogues: new studies indicate that thyroid hormone receptors are targets of industrial chemicals? Mol Cell Endocrinol. 2005; 242:10–5. https://doi.org/10.1016/j.mce.2005.07.006 PMid:16150534
- Boas M, Feldt-Rasmussen U, Main KM. Thyroid effects of endocrine disrupting chemicals. Mol Cell Endocrinol.2012; 355:240–8. https://doi.org/10.1016/j.mce.2011.09.005 PMid:21939731
- Sekaran S, Jagadeesan A. In utero exposure to phthalate down regulates critical genes in Leydig cells of F1 male progeny. J Cell Biochem. 2015; 116:1466–77. https://doi.org/10.1002/jcb.25108 PMid:25649163
- Rajesh P, Balasubramanian K. Gestational exposure to di(2-ethylhexyl) phthalate (DEHP) impairs pancreatic beta-cell function in F1 rat offspring. Toxicol Lett. 2015; 232:46–57. https://doi.org/10.1016/j.toxlet.2014.09.025 PMid:25280772
- Poon R, Lecavalier P, Mueller R, Valli VE, Procter BG, Chu I. Subchronicoral toxicity of di-n-octyl phthalate and di(2-ethylhexyl) phthalate in the rat. Food ChemToxicol.1997; 35:225–39. https://doi.org/10.1016/S02786915(96)00064-6
- Hinton RH, Mitchell FE, Mann A. Effects of phthalic acid esters on the liver and thyroid. Environ Health Perspect.1986; 70:195–210. https://doi.org/10.1289/ehp.8670195 PMid:3830106 PMCid:PMC1474287
- Price SC, Chescoe D, Grasso P, Wright M, Hinton RH. Alterations in the thyroids of rats treated for long periods with di-(2-ethylhexyl) phthalate or with hypolipidaemic agents. Toxicol Lett. 1988; 40:37–46. https://doi.org/10.1016/0378-4274(88)90181-6
- ATSDR. Toxicological profile for di(2-Ethylhexyl) Phthalate. Agency for Toxic Substances and Disease; 2002.
- Howarth JA, Price SC, Dobrota M, Kentish PA, Hinton RH.Effects on male rats of di-(2-ethylhexyl) phthalate and dinhexylphthalate administered alone or in combination.Toxicol Lett. 2001; 121:35–43. https://doi.org/10.1016/ S0378-4274(01)00313-7
- Wenzel A, Franz C, BreousE, Loos U. Modulation of iodide uptake by dialkylphthalate plasticizers in FRTL-5 rat thyroid follicular cells. Mol Cell Endocrinol. 2005; 244: 63–71.https://doi.org/10.1016/j.mce.2005.02.008 PMid:16289305
- Breous E, Wenzel A, Loos U. The promoter of the human sodium/iodide symporter responds to certain phthalate plasticisers. Mol Cell Endocrinol. 2005; 244:75–8. https:// doi.org/10.1016/j.mce.2005.06.009 PMid:16257484
- Meeker JD, Calafat AM, Hauser R. Di-(2-ethylhexyl) phthalate metabolites may alter thyroid hormone levels in men. Environ Health Perspect. 2007; 115:1029–34.https://doi.org/10.1289/ehp.9852 PMid:17637918 PMCid:PMC1913587
- Meeker JD, Ferguson KK. Relationship between urinary phthalate and bisphenol A concentrations and serum thyroid measures in US adults and adolescents from the National Health and Nutrition Examination Survey (NHANES) 2007–2008. Environ Health Perspect. 2011; 119:1396–402. https://doi.org/10.1289/ehp.1103582 PMid:21749963 PMCid:PMC3230451
- Van dartel DA, Pennings JL, Hendriksen PJ, Van schooten FJ, Piersma AH. Early gene expression changes during embryonic stem cell differentiation into cardiomyocytes and their modulation by monobutyl phthalate. Reprod Toxicol. 2009; 27:93–102. https://doi.org/10.1016/j.reprotox.2008.12.009 PMid:19162170
- Damante G, Tell G, DiLauro R. A unique combination of transcription factors controls differentiation of thyroid cells. Prog Nucleic Acid Res Mol Biol. 2001; 66:307–56.https://doi.org/10.1016/S0079-6603(00)66033-6
- Francis-Lang H, Zannini M, De Felice M, Berlingieri MT, Fusco A, DiLauro R. Multiple mechanisms of interference between transformation and differentiation in thyroid cells.Mol Cell Biol. 1992; 12:5793–800. https://doi.org/10.1128/ MCB.12.12.5793 PMid:1448106 PMCid:PMC360519
- Koch HM, Drexler H, Angerer J. An estimation of the daily intake of Di(2-Ethylhexyl)Phthalate (DEHP) and other phthalates in the general population. Int J Hyg Environ Health. 2003; 206:77–83. https://doi.org/10.1078/14384639-00205 PMid:12708228
- Frederiksen H, Aksglaede L, Sorensen K, Skakkebaek NE, Juul A, Andersson AM. Urinary excretion of phthalate metabolites in 129 healthy Danish children and adolescents: Estimation of daily phthalate intake. Environ Res. 2011; 111:656–63. https://doi.org/10.1016/j.envres.2011.03.005 PMid:21429484
- Aruldhas MM, Ramalingam N, Jaganathan A, Sashi AMJ, Stanley JA, Nagappan AS, Vasavan J, Kannan A, Seshadri VN. Gestational and neonatal-onset hypothyroidism alters androgen receptor status in rat prostate glands at adulthood.Prostate. 2010; 70:689–700. PMid:20033886
- Liu C, Zhao L, Wei L, Li L. DEHP reduces thyroid hormones via interacting with hormone synthesis-related proteins, deiodinases, transthyretin, receptors, and hepatic enzymes in rats. Environ Sci Pollut Res Int. 2015; 22:12711–9. https:// doi.org/10.1007/s11356-015-4567-7 PMid:25913319
- Stuart A, Oates E, Hall C, Grumbles R, Fernandez L, Taylor N, Puett D, Jin S. Identification of a point mutation in the thyrotropin receptor of the hyt/hyt hypothyroid mouse.Mol Endocrinol. 1994; 8:129–38. https://doi.org/10.1210/ mend.8.2.8170469 https://doi.org/10.1210/me.8.2.129
- Shupnik MA, Ridgway EC, Chin WW. Molecular biology of thyrotropin. Endocr Rev. 1989; 10:459–75. https://doi.org/10.1210/edrv-10-4-459 PMid:2693083
- Roelfsema F, Veldhuis JD. Thyrotropin secretion patterns in health and disease. Endocr Revs. 2013; 34:619–57. https:// doi.org/10.1210/er.2012-1076 PMid:23575764
- Ishihara A, Sawatsubashi S, Yamauchi K. Endocrine disrupting chemicals: Interference of thyroid hormone binding to transthyretins and to thyroid hormone receptors.Mol Cell Endocrinol. 2003; 199:105–17. https://doi.org/10.1016/S0303-7207(02)00302-7
- Sugiyama S, Shimada N, Miyoshi H, Yamauchi K. Detection of thyroid system-disrupting chemicals using in vitro and in vivo screening assays in Xenopus laevis. Toxicol Sci.2005; 88:367–74. https://doi.org/10.1093/toxsci/kfi330 PMid:16179385
- Bizhanova A, Kopp P. Minireview: The sodium-iodide symporter NIS and pendrin in iodide homeostasis of the thyroid.Endocrinology. 2009; 150:1084-90. https://doi.org/10.1210/ en.2008-1437 PMid:19196800 PMCid:PMC2654752
- Kohn LD, Suzuki K, Nakazato M, Royaux I, Green ED.Effects of thyroglobulin and pendrin on iodide flux through the thyrocyte. Trends Endocrinol Metab. 2001; 12:10-16.https://doi.org/10.1016/S1043-2760(00)00337-4
- Lin JD. Thyroglobulin and human thyroid cancer. Clin Chim Acta. 2008; 388:15–21. https://doi.org/10.1016/j.cca.2007.11.002 PMid:18060877
- Kohn LD, Shimura H, Shimura Y, Hidaka A, Giuliani C, Napolitano G, Ohmori M, Laglia G, Saji M. The Thyrotropin Receptor. Vitamins and Hormones. 1995; 50:287–384.https://doi.org/10.1016/S0083-6729(08)60658-5
- Kambe F and Seo H. Thyroid-specific transcription factors.Journal of Endocrinolgy. 1997; 44:775–84. https://doi.org/10.1507/endocrj.44.775
- Dohan O, De la Vieja A and Paroder V. Molecular analysis of the sodium/iodide symporter: Characterization, regulation, and medical significance. Endocrine Reviews.2003; 24:48–77. https://doi.org/10.1210/er.2001-0029 PMid:12588808
- Taki K, Kogai T, Kanamoto Y, Hershman JM, Brent GA.A thyroid-specific far-upstream enhancer in the human sodium/ iodide symporter gene requires Pax-8 binding and cyclic adenosine 3’,5’-monophosphate response elementlike sequence binding proteins for full activity and is differentially regulated in normal and thyroid cancer cells.Molecular Endocrinology. 2002; 16:2266–82. https://doi.org/10.1210/me.2002-0109 PMid:12351692
- Multiple Attribute Feature Extraction and High Support Vector Classifier for Identification of Cytomegalovirus Images
Authors
1 Department of Computer Science, Rathnavel Subramaniam College of Arts and Science, IN
Source
ICTACT Journal on Image and Video Processing, Vol 11, No 2 (2020), Pagination: 2283-2288Abstract
Digital image processing is a broad area consists of different concepts to emphasize the quality of the images. The digital image processing has been engaged in various areas such as remote sensing, video processing, image sharpening, colour, pattern recognition, image compression etc. The digital image processing plays an immeasurable role in the field of biomedical. The clarity of the images are important for any types of medical diagnosis leads with human body. In this paper the image of cytomegalovirus is taken and processed to show the improvement of the affected images. Though there are many facilities to identify any type of diagnosis, detection of viruses in terms of images also plays a vital role. The cytomegalovirus affects almost all ages of people, but it shows more impact on pregnant women, if the women gets infected the foetus also gets affected so this leads to congenital infections of the baby such as impair vision, autism, hearing loss, birthmarks etc. Once the person gets affected it retains for lifetime. In this proposed work the input of the image is taken and processed with ROI and MAFE Algorithm with PCA reduction and HSVM is used for classification and Identification of the image is done.Keywords
Cytomegalo Virus, Image Processing, Feature Extraction.- Ensemble Feature Selection (EFS) and Ensemble Hybrid Classifiers (EHCS) for Diagnosis of Seizure using EEG Signals
Authors
1 Department of Computer Science, Rathnavel Subramaniam College of Arts and Science, IN
Source
ICTACT Journal on Soft Computing, Vol 11, No 2 (2021), Pagination: 2283-2287Abstract
Epilepsy is the neural disorder that occurs in the individual mind which affects nearly 50 million people around the world. It is also said to be the universal disorder which affects all ages. The disturbance that occurs in the nervous system causes seizure. The classification of epileptiform activity in the EEG plays an essential role in the identification of epilepsy. To extract the relevant information and to improve the accuracy level from the given EEG signals, Fuzzy Based Cuckoo Search (FCS) and ant colony optimization (ACO) methods are planned to select the related and best information’s. Finally utilizes the Ensemble Hybrid Classifiers (EHCs) which combine the procedure of Modified Convolutional Neural Network (MCNN), Improved Relevance Vector Machine (IRVM) and Logistic Regression (LR) classifiers for analysis of EEG signals. The planned effort is implemented to notice the irregularity in three different levels of EEG signals (normal, affected and unaffected).Keywords
Epilepsy, Seizure, Ant Colony Optimization, Convolution Neural Network.References
- A. Herbadji, “Combining Multiple Biometric Traits using Asymmetric Aggregation Operators for Improved Person Recognition”, Symmetry, Vol. 12, No. 3, pp. 444-453, 2020.
- S. Li and A. Jain, “Encyclopedia of Biometrics”, Springer, 2015.
- N. E. Chalabi, A. Attia and A. Bouziane, “Multimodal Finger Dorsal Knuckle Major and Minor Print Recognition System based on PCANET Deep Learning”, ICTACT Journal on Image and Video Processing, Vol. 10, No. 3, pp. 2153-2158, 2020.
- R. Hammouche, A. Attia and S. Akrouf, “A Novel System based on Phase Congruency and Gabor-Filter Bank for Finger Knuckle Pattern Authentication”, ICTACT Journal on Image and Video Processing, Vol. 10, No. 3, pp. 2125-2131, 2020.
- X. Liang, G. Wu, Y. He and N. Luo, “Optimal Parameter Selection for 3D Palmprint Acquisition System”, Proceedings of Chinese Conference on Biometric Recognition, pp. 66-76, 2018.
- D. Zhang, G. Lu, W. Li, L. Zhang and N. Luo, “Three Dimensional Palmprint Recognition using Structured Light Imaging”, Proceedings of IEEE International Conference on Biometrics: Theory, Applications and Systems, pp. 1-6, 2008.
- D. Zhang, V. Kanhangad and N. Luo, “Robust Palmprint Verification using 2D and 3D Features”, Pattern Recognition, Vol. 43, No. 1, pp. 358-368, 2010.
- J. Cui, “2D and 3D Palmprint Fusion and Recognition using PCA Plus TPTSR Method”, Neural Computing and Applications, Vol. 24, No. 3-4. pp. 497-502, 2014.
- L. Zhang, Y. Shen, H. Li and J. Lu, “3D Palmprint Identification using Block-Wise Features and Collaborative Representation”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 37, No. 8, pp. 1730-1736, 2014.
- A. Yang, L. Zhang, L. Li and H. Li, “Multi-Dictionary based Collaborative Representation for 3D Biometrics”, Lecture Notes in Computer Science, Vol. 9771, pp. 39-48, 2016.
- A. Meraoumia and S. Chitroub, “2D and 3D Palmprint Information, PCA and HMM for an Improved Person Recognition Performance”, Integrated Computer Aided Engineering, Vol. 20, No. 3, pp. 1-16, 2013.
- M. Chaa and A. Attia, “Score-Level Fusion of Two-Dimensional and Three-Dimensional Palmprint for Personal Recognition Systems”, Journal of Electronic Imaging, Vol. 26, No. 1, pp.1-16, 2017.
- X. Bai, S. Huang, N. Gao, and Z. Zhang, “Person Identification by using 3D Palmprint Data”, Advanced Sensor Systems and Applications, Vol. 25, pp. 1-15, 2014.
- B. Yang, X. Xiang, D. Xu, X. Wang and X. Yang, “3D Palmprint Recognition using Shape Index Representation and Fragile Bits”, Multimedia Tools and Applications, Vol. 76, No. 14, pp. 15357–15375, 2017.
- M. Chaa, Z. Akhtar, and A. Attia, “3D Palmprint Recognition using Unsupervised Convolutional Deep Learning Network and SVM Classifier”, IET Image Processing, Vol. 13, No. 5, pp. 736-745, 2019.
- L. Fei, B. Zhang, Y. Xu, W. Jia, J. Wen and J. Wu, “Precision Direction and Compact Surface Type Representation for 3D Palmprint Identification”, Pattern Recognitions, Vol. 87, pp. 237-247, 2019.
- X. Bai, Z. Meng, N. Gao, Z. Zhang and D. Zhang, “3D Palmprint Identification using Blocked Histogram and Improved Sparse Representation-Based Classifier”, Neural Computing and Applications, Vol. 32, pp. 1-14, 2020.
- X. Tan and W. Triggs, “Enhanced Local Texture Feature Sets for Face Recognition under Difficult Lighting Conditions”, IEEE Transactions on Image Processing, Vol. 19, No. 6, pp. 1635-1650, 2010.
- A. Attia, M. Chaa, Z. Akhtar and Y. Chahir, “Finger Kunckcle Patterns based Person Recognition Via Bank of Multi-Scale Binarized Statistical Texture Features”, Evolving Systems, Vol. 11, pp. 1-11, 2018.
- A. Attia, Z. Akhtar, N. E. Chalabi, S. Maza and Y. Chahir, “Deep Rule-Based Classifier for Finger Knuckle Pattern Recognition System”, Evolving Systems, Vol. 13, pp. 1-15, 2020.
- J. Kannala, “Bsif: Binarized Statistical Image Features”, Proceedings of International Conference on Pattern Recognitions, pp. 1-14, 2012.
- M. Turk and A. Pentland, “Eigenfaces for Recognition”, Journal of Cognitive Neuroscience, Vol. 3, No. 1, pp. 71-86, 1991.
- P.N. Belhumeur, J.P. Hespanha and D.J. Kriegman, “Eigenfaces vs. Fisherfaces: Recognition using Class Specific Linear Projection”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 19, No. 7, pp. 711-720, 1997.
- V. Kanhangad and A. Kumar, “A Unified Framework for Contactless Hand Verification”, IEEE Transactions on Information Forensics and Security, Vol. 6, No. 3, pp. 1014-1027, 2011.
- Complexities of Progenitorship in Toni Morrison’s God Help the Child
Authors
1 Bharathiar University Post Graduate Extension and Research Centre, Erode, Tamil Nadu, IN
Source
HuSS: International Journal of Research in Humanities and Social Sciences, Vol 9, No 1 (2022), Pagination: 7-9Abstract
This study focuses on the struggle and importance of mother in the life of an individual. Mothering is very difficult than fathering. Father plays a minimalistic role and it is the mother, whose part is vital in the upbringing of a child. It attests the pathetic and single mother Sweetness’ struggle to raise her daughter Lula Ann Bridewell without physical and emotional oppression. Her strict brought up thus makes her daughter to attain the sense of selfhood and confidence.Keywords
Confidence, Individual, Mothering, Oppression, Struggle.References
- Morrison, Toni. God Help the Child. Vintage Books, 2015.
- Rich, Adrienne. Of Woman Born: Motherhood as Experience and Institution. W. W. Norton and Company, 1976.