A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Thenmozhi, S.
- Perception of Menopause among Indian Women:A Qualitative Study
Authors
1 Department of Psychology, IDE, University of Madras, Chennai - 600 005, Tamil Nadu, IN
2 Department of Psychology, IDE, University of Madras, Chennai, Tamil Nadu, IN
Source
Indian Journal of Health and Wellbeing, Vol 6, No 1 (2015), Pagination: 114-116Abstract
The aim of this study was to examine the knowledge and perception of menopause among middle age women aged 45-55 years. A focus group discussion (qualitative study), where information about individual experiences, subjective description of the severity of the symptoms and other relevant socio economic data was gathered. The participants were asked questions regarding the basic knowledge about menopause and the problems associated with it. After the analysis the result shows that women are unaware of symptoms during middle age and this effect can be due to lack of knowledge about the menopausal symptoms and hence they were struggling to cope with the bio-psychosocial changes and problems.Keywords
Menopause, Women, Perception, Knowledge, Qualitative.- A Study on Psychological Impact of Menopause in Indian Working Women
Authors
1 Department of Psychology, IDE, University of Madras, Chennai, IN
Source
Indian Journal of Health and Wellbeing, Vol 5, No 12 (2014), Pagination: 1499-1501Abstract
Menopause as a permanent cessation of menstruation resulting from loss of ovarian, follicular activity which leads to many physical and psychological issues in middle aged women. The aim of the present study was to assess the psychological impact of menopause on 35 middle aged (45-54 years) working women under low socio economic status compared group of 35 high socio economic status working women were also studied. Beck's Depression scale and Menopause Rating scale (MRS) were used to collect data. Results indicate that women in low socio economic status show mild level of depressive symptoms than the high socio economic status women.Keywords
Menopause, Indian Working Women, Depression, Psychological Effects.- Classification of Common Carotid Artery Images Using Segmentation and Rule Mining
Authors
1 Department of Computer Science and Engineering, K.S. Rangasamy College of Technology, Tamilnadu, IN
Source
Digital Image Processing, Vol 4, No 3 (2012), Pagination: 149-155Abstract
Increase in Intima-media Thickness (IMT) of common carotid artery leads to atherosclerosis and stroke. Manual method for finding the interfaces between the intima and media layer is not accurate and it depends on the experience of the external observer. An improved dynamic programming (DP) segmentation technique for detecting the intima-media layer of the far wall of the common carotid artery (CCA) images using optimal search technique is proposed. The algorithm is developed considering the normalization and smoothing for estimating the intima media thickness (IMT) of the normal and abnormal subjects. The magnitudes of the IMT values have been used to explore the rate of prediction of blockage existing in the cerebrovascular and cardiovascular pathologies, and also hypertension and atherosclerosis. Retrieving images from large databases becomes a difficult task. Here after finding out the IMT by segmentation, the results are entered into transaction database. Association rule mining is done in order to retrieve the images related to the query image i.e. to find out images related to the given patients image.Keywords
B-Mode Ultrasound (US) Image, Common Carotid Artery, Intima Media Thickness, Association Rules, Dynamic Programming.- RBAM with Constraint Satisfaction Problem in Role Mining
Authors
Source
International Journal of Innovative Research and Development, Vol 4, No 2 (2015), Pagination:Abstract
The main areas of research related to access control concern the identification of methodologies and models. With the ever-increasing number of users and IT systems, organizations have to manage large numbers users permissions in an efficient manner. Role-based access control is the most wide-spread access control model. Yet, companies still find it difficult to adopt RBAC because of the complexity of identifying a suitable set of roles. Roles must accurately reflect functions and responsibilities of users in the organization. When hundreds or thousands of users have individual access permissions, adopting the best approach to engineer roles saves time and money, and protects data and systems. Among all role engineering approaches, searching legacy access control systems to find de facto roles embedded in existing permissions is attracting an increasing interest. Data mining techniques can be used to automatically propose candidate roles, leading to a class of tools and methodologies referred to as role mining. The user role assignment is framed using RBAM algorithm with CSP Technique.
Keywords
RBAM, CSP, Role mining- Effect of Composts and Time of Incubation on Soil Properties
Authors
1 Department of Soil Science and Agricultural Chemistry, Tamil Nadu Agricultural University, Coimbatore (T.N.), IN
Source
An Asian Journal of Soil Science, Vol 4, No 1 (2009), Pagination: 8-10Abstract
An incubation experiment was conducted to study the effect of raw and composted bananapseudostem and sugarcane trash waste on soil properties. Two hundred and fifty gram of soil was taken in polythene containers, to which calculated quantity of raw and composted waste materials along with 100 per cent RDF and 75 per cent RDF (as recommended for amaranthus), respectively were added as per the treatment schedule and mixed thoroughly. The moisture content was maintained at field capacity throughout the experimental period (60 days). The soil samples were drawn at 15, 30, 45 and 60 days of incubation and analyzed for their organic carbon content and cation exchange capacity. With the advancement of incubation period, there was an increase in organic carbon content and cation exchange capacity of soil upto the end of incubation period.Keywords
Composts, Incubation Period, Organic Carbon, CEC.- Effect of Different Types of Enriched Composts on Soil Fertility
Authors
1 Department of Soil Science and Agricultural Chemistry, Tamil Nadu Agricultural University, Coimbatore (T.N.), IN
Source
An Asian Journal of Soil Science, Vol 4, No 1 (2009), Pagination: 27-31Abstract
A green house experiment, using amaranthus (Var CO 2) as test crop, was conducted to assess the effect of raw and composted waste materials viz., bananapseudostem/sugarcane trash applied in conjuction with 100 per cent and 75 per cent of the RDF, respectively, on soil fertility status, and to compare their influence with the application of 100 per cent RDF alone and the absolute control. The availability of macro, secondary and micronutrients, organic carbon content and CEC were enhanced markedly with either poultry manure enriched microbial inoculum/Trichoderma viride/bananapseudostem compost/sugarcane trash compost each applied @ 750 kg ha-1 conjointly with 75 per cent of the RDF, affirming the effect of enriched compost over that of unenriched compost/inorganic fertilizers with and without raw base materials.Keywords
Raw Waste, Bananapseudostem Composts, Sugarcane Trash Composts, Nutrient Availability, Organic Carbon Content, CEC.- Secure Transmission of Bio-Medical Data Using Steganography
Authors
1 Department of Electronics and Communication Engineering, Dayananda Sagar College of Engineering, IN
Source
ICTACT Journal on Communication Technology, Vol 9, No 3 (2018), Pagination: 1858-1864Abstract
To transmit secret data over the internet, the information should be sent in a way attacker finds it difficult to read the secret data. In this paper patient’s secret information is hidden in the bio-medical signal like ECG/EEG/PPG. The transmitted information generally contains (1) biomedical-signals (2) patient data. Main concerns include privacy and authenticity of the data being transmitted. A secret key is used which is known to sender and receiver. This paper introduces a novel steganography technique that guarantees (1) protection of private data utilizing a key and (2) originality of the bio-medical-signals. To maximize embedding, Fast-Walsh-Hadamard Transform is used to convert the signals into a set of coefficients. The proposed technique can be applied on three bio-medical signals like ECG/EEG/PPG unlike any other technique which uses only one bio-medical signal. To achieve least distortion, coefficients of least significant bit is considered. The algorithm has less impact on the bio-medical signal and the signal at the transmitting side can be recovered with less distortion.Keywords
Steganography, Bio-Medical Signal, Arduino Uno Board, Pulse Sensor, Temperature Sensor, BP Sensor.References
- S. Edward Jero, Palaniappan Ramu and Ramakrishnan, “ECG Steganography using Curvelet Transform”, Biomedical Signal Processing and Control, Vol. 22, pp.161-169, 2015.
- Hui Wang, Weiming Zhang and Nenghai Yu, “Protecting Patient Confidential Information based on ECG Reversible Data Hiding”, Multimedia Tools and Applications, Vol. 75, No. 21, pp. 13733-13747, 2015.
- K.V. Padmaja, O.P. Ankitha, Anshu Singhania, M.R. Preethi and Rashmi R Nayak, “DCT based ECG Steganography for Protecting Patient’s Confidential Data in Point-of-Care Systems”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 5, No. 7, pp. 6474-6479, 2016.
- Oscar J. Rubio, Alvaro Alesanco and Jose Garcia, “Secure Information Embedding into 1D Biomedical Signals based on SPIHT”, Journal of Biomedical Informatics, Vol. 46, No.4, pp. 653-664, 2013.
- C.A. Liji, K.P. Indiradevi and Anish Babu, “Integer to Integer Wavelet Transform based ECG Steganography for Securing Patient Confidential Information”, Procedia Technology, Vol. 24, pp. 1039-1047, 2016
- L. Keerthana and B.Venkataramanaiah, “ECG Steganography based Privacy Protection of Medical Data for Telemedicine Application”, IOSR Journal of Dental and Medical Sciences, Vol. 4, No. 2, pp. 46-51, 2014.
- Kai-Mei Zheng and Xu Qian, “Reversible Data Hiding for Electrocardiogram Signal Based on Wavelet Transforms”, Proceedings of International Conference on Computational Intelligence and Security, pp. 13-17, 2008.
- Ankita G Shirodkar, “Secure Steganography, Compression and Transmission of ECG in Point of Care System”, International Journal of Advances in Science Engineering and Technology, Vol. 4, No. 7, pp. 94-99, 2015.
- Hemin Golpira and Habibollah Danyali, “Reversible Blind Watermarking for Medical Images Based on Wavelet Histogram Shifting”, Proceedings of IEEE International Symposium on Signal Processing and Information Technology, pp. 31-36, 2009.
- Alsharif Abuadbba, Khalil, “Walsh-Hadamard based 3D Steganography for Protecting Sensitive Information in Point-of-Care”, IEEE Transactions on Biomedical Engineering, Vol. 64, No. 9, pp. 2186-2195, 2016.
- Deepali Awasthi and Swathi Madhe, “Evaluation of Wavelet based ECG Steganography System by using Percentage Residual Difference (PRD) Measurements”, Proceedings of International Conference on Communications and Signal Processing, pp. 1-4, 2015.