Refine your search
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kumar, Shishir
- Resource Cost Optimization for Dynamic Load Balancing on Web Server System
Abstract Views :374 |
PDF Views:5
Authors
Affiliations
1 Department of Computer Science and Engineering, Jaypee University of Engineering and Technology, Guna, Madhya Pradesh, IN
2 Jaypee University of Engineering and Technology, Guna, Madhya Pradesh, IN
1 Department of Computer Science and Engineering, Jaypee University of Engineering and Technology, Guna, Madhya Pradesh, IN
2 Jaypee University of Engineering and Technology, Guna, Madhya Pradesh, IN
Source
International Journal of Distributed and Cloud Computing, Vol 2, No 1 (2014), Pagination: 7-18Abstract
The growth of technology increases user expectations at a fast pace in terms of performance and efficiency of web servers. Such user's expectations are required the number of efficient and dynamic computational resources and mechanism. Several scheduling policies have been already working on multiple web servers, but still web servers get overloaded while the access of resources has been increased. Now-adays, to increase the number of resources gets costly for the organizations so there is a need for an efficient scheduling policy which can optimize the cost of the resources as per the user’s expectation. In this paper, an efficient dynamic load balancing policy based on the activity of the processes has been proposed for reducing the cost of Grid resources and simulated on the Grid-Sim simulator to compare with existing scheduling policies. Therefore, costs of resources have been optimized through the proposed dynamic load balancing policies on web servers.Keywords
Dynamic Load Balancing, Web Server, Grid, Grid-Sim, Scheduling Policy, Resource Costs, Condor Scheduler.References
- Buyya, R. & Venugopal, S. (2005). A gentle introduction to grid computing and technologies. CSI Communications, 29(1), 1-19.
- Buyya, R. & Murshed, M. (2002). GridSim: A toolkit for the modeling and simulation of distributed resource management and scheduling for Grid computing. Concurrency and Computation: Practice and Experience, 14(3-15), 1175-1220.
- Buyya, R., Murshed, M. & Abramson, D. (2001). A Deadline and Budget Constrained Cost-Time Optimization Algorithm for Scheduling Task Farming Applications on Global Grids. Proceeding of International Conference on Parallel and Distributed Processing Techniques and Applications (pp. 1-12).
- Cakanyildirim, M. (2014). Waiting Times. Retrieved from the University of Dallas. Retrieved from http://www.utdallas.edu/∼metin/Or6302/Folios/omqueue.pdf
- Caol, J., Spooner, D. P., Jarvis, S. A. & Nudd, G. R. (2005). Grid load balancing using intelligent agents. Future Generation Computer Systems, 21(1), 135-149.
- Chervenak, A., Foster, I., Kesselman, C., Salisbury, C. & Tuecke, S. (2000). The data grid: Towards an architecture for the distributed management and analysis of large scientific datasets. Journal of Network and Computer Applications: Special Issue on Network-Based Storage Services, 23(3), 187-200.
- Chung, C. A. (2004). Simulation Modeling Handbook: A Practical Approach. CRC Press LLC, University of Houston: Washington, D.C.
- Czajkowski, K., Foster, I. & Kesselman, C. (1999). Resource Co-Allocation in Computational Grids. Proceeding of 8th IEEE International Symposium on High Performance Distributed Computing (pp. 219-228).
- Ferreira, L., Berstis, V., Armstrong, J., Kendzierski, M., Neukoetter, A., Takagi, M., Bing-Wo, R., Amir, A., Murakawa, R., Hernandez, O., Magowan, J. & Bieberstein, N. (2003). Introduction to Grid Computing with Globus. Redbook, IBM Corporation.
- Foster, I., Kesselman, C. & Tuecke, S. (2001). The anatomy of the grid enabling scalable virtual organizations. International Journal of High Performance Computing Applications, 15(3), 200-222.
- Foster, I. (2002). What is the Grid? A Three Point Checklist. Argonne National Laboratory & University of Chicago. Retrieved from http://dlib.cs.odu.edu/WhatIsTheGrid.pdf.
- Genaud, S., Giersch, A. & Vivien, F. (2003). Loadbalancing scatter operations for grid computing. Parallel Computing, 30(8), 179-186.
- Gu, D., Yang, L. & Welch, L. R. (2005). A Predictive, Decentralized Load Balancing Approach. Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium.
- Heiss, H. U. & Schmitz, M. (1995). Decentralized dynamic load balancing: The particles approach. Journal of Information Sciences-Informatics and Computer Science, 84(1-2), 115-128.
- Kamarunisha, M., Ranichandra, S. & Rajagopal, T. K. P. (2011). Recitation of load balancing algorithms in grid computing environment using policies and strategies-An Approach. International Journal of Scientific & Engineering Research, 2(3), 1-7.
- Kenthapadi, K. & Manku, G. S. (2005). Decentralized Algorithms using both Local and Random Probes for P2P Load Balancing. Proceeding of the 17th Annual ACM Symposium on Parallelism in Algorithms and Architectures, Las Vegas, Nevada, USA, (pp. 135-144)
- Krauter, K., Buyya, R. & Maheswaran, M. (2002). A taxonomy and survey of grid resource management systems for distributed computing. Software: Practice and Experience, 32(2), 135-164.
- Laszewaski, G. V., Foster, I., Gwaor, J., Lane, P., Rehn, N. & Russell, M. (2001). Designing Grid Based Problem Solving Environments and Portals. Proceeding in 34th Annual Hawaiian International Conference on System Science (pp. 3-6)
- Luther, A., Buyya, R., Ranjan, R. & Venugopal, S. (2006). Peer-to-Peer Grid Computing and A .NET-Based Alchemi Framework. Proceeding in High-Performance Computing: Paradigm and Infrastructure (eds. L. T. Yang & M. Guo), John Wiley & Sons, Inc., Hoboken, NJ, USA. (pp. 1-21).
- Nieuwpoort, R. V. van, Kielmann, T., & Bal, H., E. (2001). Efficient Load Balancing for Wide Area Divide and Conquer Applications. Proceeding of the 8th ACM SIGPLAN Symposium on Principles and Practices of Parallel Programming, 36(7), 34-43, 18th-20th June, Snowbird, Utah, USA.
- Schopf, J. M. & Nitzberg, B. (2002). Grids: The top ten questions. Journal of Scientific Programming, 10(2), 103-111.
- Shoshani, A., Sim, A. & Gu, J. (2002). Storage Resource Managers: Middleware Components for Grid Storage. Proceeding in the 19th IEEE Symposium on Mass Storage Systems, Maryland. (pp. 209-224). Retrieved from http://storageconference.org/2002/presentations/d02-arie.pdf.
- Yagoubi, B. & Slimani, Y. (2006). Dynamic Load Balancing Strategy for Grid Computing. Proceeding of World Academy of Science, Engineering & Technology, (13, pp. 90-95).
- Yagoubi, B. & Slimani, Y. (2007). Task load balancing strategy for grid computing. Journal of Computer Science, 3(3), 186-194.
- Artificial Neural Network Based Approach for Identification of Operating System Processes
Abstract Views :376 |
PDF Views:0
Authors
Amit Kumar
1,
Shishir Kumar
1
Affiliations
1 Department of Computer Science and Engineering, Jaypee University of Engineering and Technology, Guna, Madhya Pradesh, IN
1 Department of Computer Science and Engineering, Jaypee University of Engineering and Technology, Guna, Madhya Pradesh, IN
Source
Journal of Applied Information Science, Vol 2, No 1 (2014), Pagination: 1-11Abstract
A computer system can be secured by using various methods like firewalls, anti-virus tools, network security tools, malware removal tools, monitoring tools etc. These tools and applications are being by most of the computer users. These computer security tools need to be updated and monitored regularly by the user. If any computer users fail to update the security tools, then the computer system may be infected by virus or may be attacked. Through this paper a learning system is being proposed to provide security by identify the operating system process as Self and Non-Self. Concepts of Artificial Neural Network (ANN) Learning have been used for the identification of processes. Initially, an Artificial Neural Network is created by using processes parameters with random weights. These weights are updated by using Gradient Descent Algorithm for various training examples, and then this Artificial Neural Network is tested with test data examples. It has been observed that the Artificial Neural Network Learning provides a better approach for identifying Self and Non-Self process and provides a better security.Keywords
Self and Non Self Process, Machine Learning, Artificial Neural Network, Gradient Descent, Perceptron.References
- Percus, J. K., Percus, O. E., & Perelson, A. S. (1992). Probability of self-non self discrimination. Theoretical and Experimental Insights into Immunology, 66, 63-70.
- Forrest, S., Hofmeyr, S. A., Somayaji, A. B., & Longstaff, T. A. (1996). A Sense of Self for UNIX Processes. Proceedings of IEEE Symposium on Computer Security and Privacy. Retrieved from http://www.cs.unm.edu/∼immsec/publications/ieeesp96-unix.pdf
- Forrest, S., & Perelson, A. S. (1994). Self Non-Self Discrimination in a Computer. In Proceedings of the IEEE Symposium on Research in Security and Privacy. Retrieved from http://www.cs.unm.edu/∼immsec/publications/virus.pdf
- Solms, R. V., & Niekerk, J. V. (2013). From information security to cyber security. Elsevier's Computer & Security, October, 38, 97-102.
- Yang, C. Q. (2003). Operating System Security and Secure Operating Systems. Global Information Assurance Certification Paper. Retrieved from http://www.giac.org/paper/gsec/2776/operating-systemsecuritysecure-operating-systems/104723
- http://www.cyberwarzone.com/massive-cyber-security-tools-list-2013
- Mitchell, T. M. (1997). Machine Learning. McGrawHill International Editions, Computer Science Series.
- http://www.nirsoft.net/utils/cprocess.html
- Haoyong, L., & Tang, H. (2011). Machine Learning Methods and their Application Research. IEEE International Symposium on Intelligence Information Processing and Trusted Computing, (pp. 108-110).
- Hua, W., Cuiqin, M. A., & Lijuan, Z. (2009). A Brief Review of Machine Learning and its Application. IEEE Information Engineering and Computer Science (pp. 1-4).
- Nguyen, D. H., & Widrow, B. (1990). Neural Networks for Self-Learning Control System. IEEE Control System Magazine (pp. 18-23).
- Zhang, G. P. (2000). Neural Networks for Classification: A Survey. IEEE Transaction on System, Man and Cybernetics-Part C: Applications and Reviews, 30(4), 451-462.
- Baesens, B., & Bouboulis, P. (2012). Neural Networks and Learning Systems Come Together. IEEE Transactions on Neural Networks, 23(1), 1-6.
- Mandic, D. P. (2004). A Generalized Normalized Gradient Descent Algorithm. IEEE Signal Processing Letters, 11(2), 155-118.
- Ahmad, F., & Isa, N. A. M. (2010). Performance Comparison of Gradient Descent and Genetic Algorithm Based Artificial Neural Networks Training. 10th International Conference on Intelligent Systems Design and Applications (pp. 604-609).
- Xu, D., Li, Z., Wu, W., Ding, X., & Qu, D. (2007). Convergence of Gradient Descent Algorithm for Diagonal Recurrent Neural Networks, Bio-Inspired Computing: Theories and Applications, (pp. 29-31).
- Watterson, J. W. (1990). An Optimum Multilayer Perceptron Neural Receiver for Signal Detection. IEEE Transactions on Neural Network, 1(4), 280-300.
- Pal, S. K., & Mitra, S. (1992). Multilayer Perceptron, Fuzzy Sets and Classification. IEEE Transaction on Neural Networks, 3(5), 683-697.
- Perceptions on Risk Management Strategies in Software Development
Abstract Views :236 |
PDF Views:2
Authors
Affiliations
1 Bhagwant University, Ajmer, Rajasthan, IN
2 Jaypee University of Engineering & Technology, Guna, Madhya Pradesh, IN
1 Bhagwant University, Ajmer, Rajasthan, IN
2 Jaypee University of Engineering & Technology, Guna, Madhya Pradesh, IN
Source
International Journal of System & Software Engineering, Vol 2, No 1 (2014), Pagination: 20-27Abstract
According to CHAOS 2004, maximum projects were finished with overtime and overbudget, which cause project failure. Therefore this risk should be analyzed to understand software risk. Many authors have identified different risk factors like team risk, organisational and environmental risk, requirements risks, plan and control risk, etc. Solutions are not many, but simulation and case studies are some of the solutions to reduce risk. In this paper, open source architecture is discussed and also a solution is proposed, which makes the development more easy and secure towards risk.References
- Alter, S. & Ginzberg, M. (1978). Managing uncertainty in MIS implementation. Sloan Management Review, 20(1), 23-31.
- Bruno, V., Tam, A. & Thom, J. (2005). Characteristics of Web Applications that Affect Usability: A Review. In Proceedings of the 17th Australia conference on Computer-Human Interaction: Citizens Online: Considerations for Today and the Future (OZCHI 05), (vol. 122, pp. 1-4).Canberra, Australia.
- CA/Wily. (2008). White Paper: Application Performance Management, Effectively Managing High- Performing Business- Critical Web Application. Business-Critical Web Applications.
- Callegari, D. & Bastos, R. (2007). Project Management and Software Development Processes: Integrating RUP and PMBOK. In Proceedings of the 2007 International Conference on Systems Engineering and Modeling. (pp. 1-8).
- Chowdhury, A. A. M. & Arefeen, S. (2011). Software Risk Management: Importance and Practices. 2(1),49-54.
- Curphey, M. (2004). Software Security Testing: Let's Get Back to Basics. Retrieved from SoftwareMAG.com
- Ebert, C., Murthy, B. K. & Jha, N. N. (2008). Managing Risks in Global Software Engineering: Principles and Practices. 2008 IEEE International Conference on Global Software Engineering. (pp.131-140)
- ENISA (2009).Ebios Product Identity Card. ENISA Retrieved from http://www.enisa.europa.eu/rmra/methods_tools/m_ebios.html (accessed on June 17, 2009).
- Erdogmus H. (2002). Aligning Software Development Investment Decisions with the Markets. National Research Council of Canada.
- Futcher, L. & von Solms, R. (2008). Guidelines for Secure Software Development.
- Ge, X., Paige, R., Polack, F., Chivers, H. & Brooke, P. (2006). Agile Development of Secure Web Applications. In Proceedings of the 6th International Conference on Web Engineering (ICWE'06) (pp. 305-312).
- Glisson, W. & Welland, R. (2005). Web Development Evolution: The Assimilation of Web Engineering Security. In Proceedings of the Third Latin American Web Congress (LA-WEB'05), IEEE Computer Scociety. (pp. 5).
- Hartmann, D. (2006). Interview: Jim Johnson of the Standish Group. Retrieved from http://www.infoq.com/articles/Interview-Johnson-Standish-CHAOS (accessed on March 8, 2009).
- Heemstra, F. J. & Kusters, R. J. (1996). Dealing with risk: A practical approach. Journal of Information Technology, 11(4), 333-346.
- Hillegersberg, J. V. & Herrera, M. (2007). Tool Support for Distributed Software Development: The past - present - and future of gaps between user requirements and tool functionalities. In Tools for Managing Globally Distributed Software Development, Munich, Germany, 2007.
- Huang, Y., Tsai, C., Lee, D. & Kuo, S. (2004). Non- Detrimental Web Application Security Scanning. In Proceedings of the 15th International Symposium on Software Reliability Engineering (ISSRE'04): IEEE Computer Society. (pp. 219-239).
- Hussey, J. M. & Hall, S. E. (2008). Managing Global Development Risk. USA, Florida: Auerbach Publications.
- ISO. (2005). ISO/IEC 27002: Information Technology - Code of Practice for Information Security Management.
- ISO. (2004). ISO/IEC 13335-1: Information Technology- Security Techniques- Management of Information and Communications Technology Security. Part 1: Concepts and models for information and communications technology security management.
- ISO. (1998). ISO/IEC TR 13335-3: Information Technology - Guidelines for the Management of IT Security. Part 3 : Techniques for the management of IT security.
- ISO. (2000). ISO/IEC TR 13335-4: Information Technology - Guidelines for the Management of IT Security. Part 4: Selection of safeguards.
- Johnson, D. L. (2009). Risk Management and the Small Software Project. Retrieved from http://www.sei.cmu.edu/iprc/sepg2006/johnson.pdf(accessed on May 4, 2009)
- Jurjens, J. (2002). Using UMLSec and Goal Trees for Secure Systems Development. Communications of the ACM, 48(5), 1026-1030.
- Kappel, G., Proll, B., Reich, S. & Retschitzegger, W. (2006). Web Engineering the Discipline of Systematic Development of Web Application. John Wiley & Sons, Ltd.
- Keshlaf, A. A. & Riddle, S. (2010). Risk Management for Web and Distributed Software Development Projects. The 5th International Conference on Internet Monitoring and Protection.
- Kontio,J. (1997). The Riskit Method for Software Risk Management. Maryland:University of Maryland.
- Kumar,R. (2002). Managing risks in IT projects: An options perspective. Information and Management, 40(1), 63-74.
- Lanowitz,T. (2005). Now is the Time for Security at the Application Level.
- Lima,A. M. (2010). Risk Assessment on Distributed Software Projects. Cape Town, South Africa.
- MacCrimmon, K. R. & Wehrung, D. A. (1984). The risk in-basket. Journal of Business, 57(3), 67-387.
- March, J. G. & Shapira, Z. (1987). Managerial perspectives on risk and risk taking. Management Science, 33 (11), 1404-1418.
- Mendes, E. & Mosley, N. (2006). Web Engineering. Berlin Heidelberg: Springer-Verlag.
- Microsoft Security Intelligence Report (2008). Based on data from the DHS NVD & CERT
- Miler, J. & Gorski, J. (2002a). Towards an Integrated Environment for Risk Management in Distributed Software Projects. 7th European Conference on Software Quality, Finland.
- Miler J. & Gorski J. (2002b). Supporting Team Risk Management in Software Procurement and Development Projects. Proceedings of 4th National Conference on Software Engineering, Poland, 2002
- Moynihan, T. (1997).How Experienced Project Managers Assess Risk. IEEE Software, 14(3), 35-41.
- Osmundson, J. S., Michael, J. B., Machniak, M. J. & Gross, M. A. (2003). Quality management metrics for software development. Information and Management, 40(8), 799-812.
- Presson, J., Mathiassen, L., Jesper, B., Madsen, T. &Steinson, F. (2009). Managing Risks in Distributed Software Projects: An Integrative Framework.IEEE Transaction on Software Engineering. (vol. 56, pp. 1-25).
- Prikladnicki, R. & Yamaguti, M. H. (2004). Risk Management in Global Software Development: A Position Paper. In Third International Workshop on Global Software Development (GSD 2004), Edinburgh, Scotland, UK.
- Roger,V. S. L. (1992). Software Development Risk: Opportunity, Not Problem. SEI, CMU/SEI-92-TR-30, ADA258743.
- Romero, B., Villegas, M. & Meza, M. (2008). Simon's Intelligence Phase for Security Risk Assessment in Web Applications. In Proceedings of the Fifth International Conference on Information Technology, IEEE Computer Society. (pp. 622-627).
- Schmidt, R., Lyytinen, K., Keil, M. & Cule, P. (2001). Identifying software project risks: An international Delphi study. Journal of Management Information Systems, 17(4),5-36.
- Wallacea, L., Keilb, M. & Raic, A. (2004). Understanding software project risk: A cluster analysis. Information & Management, 42(1), 115-125.
- Williams, R. (2006). The CMMI RSKM Process Area as a Risk Management Standard. In Proceedings of Sixteenth Annual International Symposium of the International Council On Systems Engineering (INCOSE).
- www.codeigniter.com, MVC framework
- www.cakephp.org, MVC framework
- Evaluation of Adverse Drug Reactions and their Management in Psychiatric in-Patients
Abstract Views :312 |
PDF Views:0
Authors
Affiliations
1 Department of Pharmacy Practice, NGSM Institute of Pharmaceutical Sciences, Nitte (Deemed to be University), Mangalore, Karnataka- 575018, IN
2 Department of Psychiatry, Justice K.S. Hegde Charitable Hospital, Mangalore, Karnataka- 575018, IN
1 Department of Pharmacy Practice, NGSM Institute of Pharmaceutical Sciences, Nitte (Deemed to be University), Mangalore, Karnataka- 575018, IN
2 Department of Psychiatry, Justice K.S. Hegde Charitable Hospital, Mangalore, Karnataka- 575018, IN
Source
Research Journal of Pharmacy and Technology, Vol 12, No 7 (2019), Pagination: 3455-3461Abstract
Objective: To identify the adverse drug reactions caused by psychotropic drugs and to evaluate the causality, severity, preventability and management of those Adverse Drug Reactions (ADRs). Methods: A prospective observational study was carried out in hospitalised patients with psychiatric disorders. All the in-patients prescribed with psychotropic drugs were enrolled in the study and followed regularly for the identification of ADRs. Identified ADRs were assessed for causality, severity and preventability using various scales. Approaches towards the management of the ADRs and the patient outcomes were analysed. Results: A total of 200 patients were monitored, of which 79 ADRs were identified from 56 patients. The most commonly reported ADRs were tremor (18.98%) followed by drowsiness (17.72%). Olanzapine was found to be associated with more number of ADRs (29.11%) followed by Clozapine (12.65%). Causality assessment using World Health Organisation- Uppsala Monitoring Centre (WHO-UMC) scale showed that most of the ADRs were probable (62.02%) and possible (37.97%). Severity assessment revealed that 54.42% of ADRs were found to be moderately severe. 48.10% of ADRs were definitely preventable and 44.30% were probably preventable. Assessment on the management of ADRs says that most of them were resolved by specific treatment approach to the reaction. Conclusion: The end results of the study created the evidence on the incidence of ADRs in patients prescribed with psychotropic drugs. The study emphasises on monitoring of those drugs that are considered to have high risk in developing ADRs. Thus, it can influence to a chance of preventing or reducing an unwanted reaction.Keywords
Adverse Drug Reaction, Psychiatry, Psychotropic Drugs.References
- Sadock BJ, Sadock VA, Ruiz P. Synopsis of Psychiatry. 11th edition. Philadelphia: Wolters Kluwer; 2015:910-1
- Dipiro JT, Talbert RL, Yee GC, Matzke GR, Wells BG, Posey LM. Pharmacotherapy a pathophysiologic approach. 9th edition. New York: Mc GrawHills Education; 2014:799
- Gummadi T, Harave VS, Aiyar LN, Rajalekshmi SG, Kunnavil R. Adverse drug reaction monitoring in a tertiary care psychiatry setting: a comparative study between inpatients and outpatients. Indian J Psychol Med 2017; 39:306-9
- Antai-Otong D. Adverse drug reactions associated with antipsychotics, antidepressants and mood stabilizers. Nurs Clin N Am 2003; 38:161-76
- Lucca JM, Madhan R, Parthasarathi G, Ram D. Identification and management of adverse effects of antipychotics in tertiary care teaching hospital. J Res Pharm Pract 2014; 3:46-50
- Singh H, Yacob M, Sabu L, Mamatha k. Adverse drug reactions monitoring of psychotropic drugs: a tertiary care centre study. Open J Psychiatry Allied Sci 2017;8:134-8
- Rohilla A, Yadav S. Adverse drug reactions: An overview. IJPR 2013;3:53-56
- Parthasarathy G, Nyfort K, Hansen, Nahata MC. A textbook of Clinical Pharmacy Practice. 2nd edition. Hyderabad: Universities Press (India) private limited; 2012. Pg. no:105-18
- Sridhar SB, Thamer SSF, Jabbar R. Monitoring of adverse drug reactions in psychiatry outpatient department of the secondary care hospital of Ras Al Khaimah, UAE. J basic Clin Pharma 2016; 7:80-6
- Naranjo CA, Busto U, sellers EM, Sandor P, Ruiz I, Roberts EA, et al. A method for estimating the probability of adverse drug reactions. Clin Pharmacol Ther 1981; 30:243-7
- The use of the WHO-UMC system for standardized case causality assessment. Available from: http://www.who.int/medicines/areas/qualitysafety/safetyefficacy/WHOcausalityassessment.pdf. [Last accessed on 2018 April 10].
- Hartwig SC, Siegel J, Schneider PJ. Preventability and severity assessment in reporting adverse reactions. Am J Hosp Pharm 1992;49: 2229-39
- Schumock GT, Thornton JP. Focusing on the preventability of adverse drug reactions. Hosp Pharm 1992; 27:538
- Sengupta G, Bhowmick S, Hazra A, Dutta A, Rahman M. Adverse drug reaction monitoring in psychiatry out-patient department of an Indian teaching hospital. Indian J Pharmacol 2011; 43:36-9
- Murthy MK, Singh H, Thakur SR. A study of adverse drug reactions associated with antidepressant drugs among female patients attending the department of psychiatry. Minerva Med 2017; 58:90-6
- Nalini R. Pharmacovigilance study in psychiatry out-patient department of a tertiary care teaching hospital. Int J Basic Clin Pharmacol 2017;6: 2375-9
- Hotha PP, Jadav SP, Trivedi HR. Adverse drug reactions: a retrospective review of hospitalized psychiatric patients at tertiary care hospital. Int J Basic Clin Pharmacol 2016;5: 2051-60
- Laxmi P, Venkatesh K, Divya G, Prasad T SD, Kishore SRV, Ranganayakulu D. A study on adverse reactions of antipsychotic in psychiatric patients of south India hospital. J Pharm Res 2014;3: 153-5
- Harichandran DT, Viswanathan MT, Gangadhar R. Adverse drug reactions among hospitalized patients in psychiatry department in a tertiary care hospital. J Health Res Rev 2016; 3:77-80
- Gawali UP, Kesari HV, Gawand KS. Adverse drug reaction profile at psychiatry out-patient department of tertiary care hospital. Int J Basic Clin Pharmacol 2017:6:2428-33
- Chakravarty P, Neog P, Dewan B. Study of adverse drug reactions of typical antipsychotic drugs in the department of psychiatry in a tertiary care hospital of Assam. Open J Psychiatry Allied Sci 2017; 8:24-8
- Munoli S, Patil SB. Adverse drug reaction monitoring of antipsychotic drugs and mood stabilizers in a teaching hospital. Int J Pharmacol. Clin Sci. 2016; 5:118-21
- Shah A, Preeti P, Chaudrari M, Vataliya A. A prospective study of adverse drug reactions in patients with bipolar disorder in psychiatry outpatient department of a tertiary care hospital. J Clin Diagn Res 2017; 11:24-8