Search results for: Rama Devi Kyatham
132 Elastic and Thermal Behaviour of LaX (X= Cd, Hg) Intermetallics: A DFT Study
Authors: Gitanjali Pagare, Hansa Devi, S. P. Sanyal
Abstract:
Full-potential linearized augmented plane wave (FLAPW) method has been employed within the generalized gradient approximation (GGA) and local spin density approximation (LSDA) as the exchange correlation potential to investigate elastic properties of LaX (X = Cd and Hg) in their B2-type (CsCl) crystal structure. The calculated ground state properties such as lattice constant (a0), bulk modulus (B) and pressure derivative of bulk modulus (B') agree well with the available experimental results. The second order elastic constants (C11, C12 and C44) have been calculated. The ductility or brittleness of these intermetallic compounds is predicted by using Pugh’s rule B/GH and Cauchy’s pressure (C12-C44). The calculated results indicate that LaHg is the ductile whereas LaCd is brittle in nature.Keywords: ductility/brittleness, elastic constants, equation of states, FP-LAPW method, intermetallics
Procedia PDF Downloads 446131 The Subtle Influence of Hindu Doctrines on Film Industry: A Case Study of Movie Avatar
Authors: Cemil Kutlutürk
Abstract:
Hindu culture and religious doctrines such as caste, reincarnation, yoga, nirvana have always proved a popular theme for the film industry. The analyzing of these motifs in the movies with a scientific approach enables to individuals either to comprehend the messages and deep meanings of films or to understand others’ religious beliefs systems and daily lives in a properly way. The primary aim of this study is to handle the subtle influence of Hindu doctrines on cinema industry by focusing on James Cameron’s film, Avatar and its relationship with Hindu concept of avatara by referring to original Hindu sacred texts where this doctrine is basically clarified. The Sanskrit word avatara means to come down or to descend. Although an avatara is commonly considered as an appearance of any deity on earth, the term refers the Vishnu’s descending on earth. When the movie avatar and avatara doctrine are compared, various similarities have noteworthy revealed. Firstly in the movie, Jake is chosen by Eywa to protect Pandora from evils. Similarly in the movie, avatar is born when there is a rise of jealousy and unrighteousness. The same concept is found in avatara doctrine. According to this belief whenever righteousness (dharma) wanes and unrighteousness (adharma) increases God incarnates himself as an avatara. In Hindu tradition, the ten avataras of Vishnu are the most popular. This standard list of ten avataras includes the Fish, the Tortoise, the Boar, the Man-Lion (Narasimha), the Dwarf, Parasurama, Rama, Krishna, the Buddha and Kalki. In the movie the avatar has tail, eyes, nose, ear which is similar to Narasimha (half man-half lion) avatara. On the other hand use of bow and arrow by Navis in the film, evokes us Rama avatara whose basic gun is same. Navis fly on a dragon like bird called Ikra and ride a horse-like quadruped animal. The vehicle for transformation of the avatar in the movie is also resemblance with the idea of Garuda, the great mythical bird, which is used by Vishnu in Hindu mythology. In addition, the last avatara, Kalki, will be seen on a white horse according to Puranas. The basic difference is that for Hinduism avatara means descent of a God, yet in the movie, a human being named Jake Sully, is manifested as humanoid of another planet, this is called as avatar. While in the movie the avatar manifests himself in another planet, Pandora, in Hinduism avataras descent on this world. On the other hand, in Hindu scriptures, there are many avataras and they are categorized according to their functions and attributes. These sides of avatara doctrine cannot be also seen clearly in the film. Even though there are some differences between each other, the main hypothesis of this study is that the general character of the movie is similar to avatara doctrine. In the movie instead of emphasizing on a specific avatara, qualities of different Vishnu avataras have been properly used.Keywords: film industry, Hinduism, incarnation, James Cameron, movie avatar
Procedia PDF Downloads 403130 Evaluation of the Nutritional Potential of a Developed Spice Formulation for nah poh (An Emulsion-Based Gravy): Physicochemical and Techno-Functional Characterisations
Authors: Djiazet Stève, Mezajoug Kenfack Laurette Blandine, Ravi Pullakhandam, Bethala L. A. Prabhavathi Devi, Tchiegang Clergé, Prathapkumar Halady Shetty
Abstract:
The nutritional potential of a developed spice formulation for nah poh was evaluated. It was found that when spices were used for the formulation for nah poh, the concentration of some nutrients is diluted while that of some of them increases. The proportion of unsaturated fats was estimated to be 76.2% of the total fat content while the chemical score varied between 31 to 39%. The contents of some essential minerals of nutritional interest in mg are as follows for 100g of spice: 2372.474 ± 0.007 for potassium, 16.447 ± 0.010 for iron, 4.772 ± 0.005 for zinc, 0.537 ± 0.001 for cupper, 0.138 ± 0.005 for selenium, and 112.954 ± 0.003 for manganese. This study shows that the consumption of these spices in the form of formulation significantly contributes to meet the mineral requirements of the populations whose food habits regularly require these spices.Keywords: spice formulation, characterisation, nutritional potential, nah poh, techno functional properties
Procedia PDF Downloads 228129 Secure E-Pay System Using Steganography and Visual Cryptography
Authors: K. Suganya Devi, P. Srinivasan, M. P. Vaishnave, G. Arutperumjothi
Abstract:
Today’s internet world is highly prone to various online attacks, of which the most harmful attack is phishing. The attackers host the fake websites which are very similar and look alike. We propose an image based authentication using steganography and visual cryptography to prevent phishing. This paper presents a secure steganographic technique for true color (RGB) images and uses Discrete Cosine Transform to compress the images. The proposed method hides the secret data inside the cover image. The use of visual cryptography is to preserve the privacy of an image by decomposing the original image into two shares. Original image can be identified only when both qualified shares are simultaneously available. Individual share does not reveal the identity of the original image. Thus, the existence of the secret message is hard to be detected by the RS steganalysis.Keywords: image security, random LSB, steganography, visual cryptography
Procedia PDF Downloads 330128 Electrospun Zinc Oxide Nanowires as Highly Sensitive Piezoelectric Transduction Elements for Nano-Scale Devices
Authors: K. Brince Paul, Nagendra Pratap Singh, Shiv Govind Singh, Siva Rama Krishna Vanjari
Abstract:
In this paper, we report optimized procedure for synthesizing highly oriented, horizontally aligned, Zinc oxide (ZnO) nanowires targeted towards developing highly sensitive piezoelectric transduction elements. The synthesis was carried out using Electrospinning technique, a facile, robust, low cost technique for producing nanowires. The as-synthesized ZnO nanowires were characterized by X-ray powder diffraction (XRD), Field Emission scanning electron microscopy (FESEM) and Energy-dispersive X-ray spectroscopy (EDX).The Piezoelectric behavior of these nanowires was characterized using Peizoelectric Force microscopy (PFM). A very high d33 coefficient of 23.1 pm/V obtained through the PFM measurements is an indicative of its potential application towards developing miniaturized piezoelectric transduction elements for nanoscale devices.Keywords: electrospinning, piezoelectric, technique, zinc oxide
Procedia PDF Downloads 406127 Numerical Simulation of Phase Transfer during Cryosurgery for an Irregular Tumor Using Hybrid Approach
Authors: Rama Bhargava
Abstract:
In the current paper, numerical simulation has been performed for the two-dimensional time dependent Pennes’ heat transfer model which is solved for irregular diseased tumor cells. An elliptic cryoprobe of varying sizes is taken at the center of the computational domain in such a manner that the location of the probe is fixed throughout the computation. The phase transition occurs due to the effect of probe with infusion of different nanoparticles Au, Al₂O₃, Fe₃O₄. The cooling performance of these nanoparticles injected at very low temperature, has been studied by implementing a hybrid FEM/EFGM method in which the whole domain is decomposed into two subdomains. The results are shown in terms of temperature profile inside the computational domain. Rate of cooling is obtained for various nanoparticles and it is observed that infusion of Au nanoparticles is very much efficient in increasing the heating rate than other nanoparticles. Such numerical scheme has direct applications where the domain is irregular.Keywords: cryosurgery, hybrid EFGM/FEM, nanoparticles, simulation
Procedia PDF Downloads 244126 Digital Watermarking Based on Visual Cryptography and Histogram
Authors: R. Rama Kishore, Sunesh
Abstract:
Nowadays, robust and secure watermarking algorithm and its optimization have been need of the hour. A watermarking algorithm is presented to achieve the copy right protection of the owner based on visual cryptography, histogram shape property and entropy. In this, both host image and watermark are preprocessed. Host image is preprocessed by using Butterworth filter, and watermark is with visual cryptography. Applying visual cryptography on water mark generates two shares. One share is used for embedding the watermark, and the other one is used for solving any dispute with the aid of trusted authority. Usage of histogram shape makes the process more robust against geometric and signal processing attacks. The combination of visual cryptography, Butterworth filter, histogram, and entropy can make the algorithm more robust, imperceptible, and copy right protection of the owner.Keywords: digital watermarking, visual cryptography, histogram, butter worth filter
Procedia PDF Downloads 359125 Optimized and Secured Digital Watermarking Using Fuzzy Entropy, Bezier Curve and Visual Cryptography
Authors: R. Rama Kishore, Sunesh
Abstract:
Recent development in the usage of internet for different purposes creates a great threat for the copyright protection of the digital images. Digital watermarking can be used to address the problem. This paper presents detailed review of the different watermarking techniques, latest trends in the field of secured, robust and imperceptible watermarking. It also discusses the different optimization techniques used in the field of watermarking in order to improve the robustness and imperceptibility of the method. Different measures are discussed to evaluate the performance of the watermarking algorithm. At the end, this paper proposes a watermarking algorithm using (2, 2) share visual cryptography and Bezier curve based algorithm to improve the security of the watermark. The proposed method uses fractional transformation to improve the robustness of the copyright protection of the method. The algorithm is optimized using fuzzy entropy for better results.Keywords: digital watermarking, fractional transform, visual cryptography, Bezier curve, fuzzy entropy
Procedia PDF Downloads 368124 Extreme Rainfall Frequency Analysis For Meteorological Sub-Division 4 Of India Using L-Moments.
Authors: Arti Devi, Parthasarthi Choudhury
Abstract:
Extreme rainfall frequency analysis for Meteorological Sub-Division 4 of India was analysed using L-moments approach. Serial Correlation and Mann Kendall tests were conducted for checking serially independent and stationarity of the observations. The discordancy measure for the sites was conducted to detect the discordant sites. The regional homogeneity was tested by comparing with 500 generated homogeneous regions using a 4 parameter Kappa distribution. The best fit distribution was selected based on ZDIST statistics and L-moments ratio diagram from the five extreme value distributions GPD, GLO, GEV, P3 and LP3. The LN3 distribution was selected and regional rainfall frequency relationship was established using index-rainfall procedure. A regional mean rainfall relationship was developed using multiple linear regression with latitude and longitude of the sites as variables.Keywords: L-moments, ZDIST statistics, serial correlation, Mann Kendall test
Procedia PDF Downloads 441123 Asymmetric Synthesis and Biological Study of Suberosanes
Authors: Mohammad Kousara, Françoise Dumas, Rama Ibrahim, Joëlle Dubois, Joël Raingeaud
Abstract:
Suberosanes are a small group of marine natural sesquiterpenes discovered since 1996 by Boyd, Sheu and Qi from three gorgonians. Their skeleton was previously found in quadranes produced by the terrestrial fungus Aspergillus terreus. Up to date, eleven suberosanes are described from which (-)-suberosanone and (-)-suberosenol A are reaching the picomolar cytotoxicity level on human solid tumors cell lines. Due to their impressive cytotoxic properties and their limited availability, we undertook an asymmetric synthesis of the most active members of this family in order to get insight into their absolute configurations and their biological properties. The challenge of their synthesis is the regio- and stereoselective elaboration of the compact bridged tricyclic skeleton with up to five all adjacent asymmetric centers, including a central quaternary carbon one. Our strategy is based on an aza-ene-synthesis key step which is regio-and stereo-controlled by the choice of a chiral amine enantiomer. it approach is concise and flexible, the enantiopur ABC tricyclic intermediate that have been synthesized being the common precursor of suberosanes.Keywords: suberosanes, asymmetric synthesis, sesquiterpenes, quadranes
Procedia PDF Downloads 93122 Unveiling the Domino Effect: Barriers and Strategies in the Adoption of Telecommuting as a Post-Pandemic Workspace
Authors: Divnesh Lingam, Devi Rengamani Seenivasagam, Prashant Chand, Caleb Yee, John Chief, Rajeshkannan Ananthanarayanan
Abstract:
Telecommuting Post-Pandemic: Barriers, Solutions, and Strategies. Amidst the COVID-19 outbreak in 2020, remote work emerged as a vital business continuity measure. This study investigates telecommuting’s modern work model, exploring its benefits and obstacles. Utilizing Interpretive Structural Modelling uncovers barriers hindering telecommuting adoption. A validated set of thirteen barriers is examined through departmental surveys, revealing interrelationships. The resulting model highlights interactions and dependencies, forming a foundational framework. By addressing dominant barriers, a domino effect on subservient barriers is demonstrated. This research fosters further exploration, proposing management strategies for successful telecommuting adoption and reshaping the traditional workspace.Keywords: barriers, interpretive structural modelling, post-pandemic, telecommuting
Procedia PDF Downloads 95121 Energy Efficient Routing Protocol with Ad Hoc On-Demand Distance Vector for MANET
Authors: K. Thamizhmaran, Akshaya Devi Arivazhagan, M. Anitha
Abstract:
On the case of most important systematic issue that must need to be solved in means of implementing a data transmission algorithm on the source of Mobile adhoc networks (MANETs). That is, how to save mobile nodes energy on meeting the requirements of applications or users as the mobile nodes are with battery limited. On while satisfying the energy saving requirement, hence it is also necessary of need to achieve the quality of service. In case of emergency work, it is necessary to deliver the data on mean time. Achieving quality of service in MANETs is also important on while. In order to achieve this requirement, Hence, we further implement the Energy-Aware routing protocol for system of Mobile adhoc networks were it being proposed, that on which saves the energy as on every node by means of efficiently selecting the mode of energy efficient path in the routing process by means of Enhanced AODV routing protocol.Keywords: Ad-Hoc networks, MANET, routing, AODV, EAODV
Procedia PDF Downloads 372120 Privacy Preserving Data Publishing Based on Sensitivity in Context of Big Data Using Hive
Authors: P. Srinivasa Rao, K. Venkatesh Sharma, G. Sadhya Devi, V. Nagesh
Abstract:
Privacy Preserving Data Publication is the main concern in present days because the data being published through the internet has been increasing day by day. This huge amount of data was named as Big Data by its size. This project deals the privacy preservation in the context of Big Data using a data warehousing solution called hive. We implemented Nearest Similarity Based Clustering (NSB) with Bottom-up generalization to achieve (v,l)-anonymity. (v,l)-Anonymity deals with the sensitivity vulnerabilities and ensures the individual privacy. We also calculate the sensitivity levels by simple comparison method using the index values, by classifying the different levels of sensitivity. The experiments were carried out on the hive environment to verify the efficiency of algorithms with Big Data. This framework also supports the execution of existing algorithms without any changes. The model in the paper outperforms than existing models.Keywords: sensitivity, sensitive level, clustering, Privacy Preserving Data Publication (PPDP), bottom-up generalization, Big Data
Procedia PDF Downloads 297119 Analysis of Stress Concentration of a Hybrid Composite Material with Centre Circular Hole Subjected to Tensile Loading
Authors: C. Shalini Devi
Abstract:
This work describes the stress concentration in a rectangular specimen with a circular hole made up of hybrid composite material with the combination of glass/carbon with epoxy. The arrangements of cross ply lamina in the sequence of alternative carbon and glass, using carbon fiber in panel, gives more strength to the structure as the carbon properties are higher when compared to glass. Typical aircraft and automobile components are with cut-outs, and such cut-outs reduce the weight of the aircraft according to the weight reduction law and also they reduce the bulking load carrying capacity. Experimental investigations were carried out using three specimens as per ASTM D5766 and three specimens as per ASTM D3039 in the Universal Testing Machine. Stress concentration in the rectangular specimen with a hole is also analysed using FEA and comparing the results.Keywords: composite, stress concentration, finite element analysis, tensile strength
Procedia PDF Downloads 450118 Paradigms of Assessment, Valuation and Quantification to Trade Ecosystem Services: A Review Focusing on Mangroves and Wetlands
Authors: Rama Seth, Luise Noring, Pratim Majumdar
Abstract:
Based on an extensive literature review, this paper presents distinct approaches to value, quantify and trade ecosystem services, with particular emphasis on services provided by mangroves and wetlands. Building on diverse monetary and market-based systems for the improved allocation of natural resources, such trading and exchange-based methods can help tackle the degradation of ecosystem services in a more targeted and structured manner than achievable with stand-alone policy and administrative regulations. Using various threads of literature, the paper proposes a platform that serves as the skeletal foundation for developing an efficient global market for ecosystem services trading. The paper bridges a significant research and practice gap by recommending how to establish an equilibrium in the biosphere via trading mechanisms while also discovering other research gaps and future research potential in the domain of ecosystem valuation.Keywords: environment, economics, mangroves, wetlands, markets, ESG, global capital, climate investments, valuation, ecosystem services
Procedia PDF Downloads 254117 Digital Watermarking Using Fractional Transform and (k,n) Halftone Visual Cryptography (HVC)
Authors: R. Rama Kishore, Sunesh Malik
Abstract:
Development in the usage of internet for different purposes in recent times creates great threat for the copy right protection of the digital images. Digital watermarking is the best way to rescue from the said problem. This paper presents detailed review of the different watermarking techniques, latest trends in the field and categorized like spatial and transform domain, blind and non-blind methods, visible and non visible techniques etc. It also discusses the different optimization techniques used in the field of watermarking in order to improve the robustness and imperceptibility of the method. Different measures are discussed to evaluate the performance of the watermarking algorithm. At the end, this paper proposes a watermarking algorithm using (k.n) shares of halftone visual cryptography (HVC) instead of (2, 2) share cryptography. (k,n) shares visual cryptography improves the security of the watermark. As halftone is a method of reprographic, it helps in improving the visual quality of watermark image. The proposed method uses fractional transformation to improve the robustness of the copyright protection of the method.Keywords: digital watermarking, fractional transform, halftone, visual cryptography
Procedia PDF Downloads 357116 Immobilization of Lipase Enzyme by Low Cost Material: A Statistical Approach
Authors: Md. Z. Alam, Devi R. Asih, Md. N. Salleh
Abstract:
Immobilization of lipase enzyme produced from palm oil mill effluent (POME) by the activated carbon (AC) among the low cost support materials was optimized. The results indicated that immobilization of 94% was achieved by AC as the most suitable support material. A sequential optimization strategy based on a statistical experimental design, including one-factor-at-a-time (OFAT) method was used to determine the equilibrium time. Three components influencing lipase immobilization were optimized by the response surface methodology (RSM) based on the face-centered central composite design (FCCCD). On the statistical analysis of the results, the optimum enzyme concentration loading, agitation rate and carbon active dosage were found to be 30 U/ml, 300 rpm and 8 g/L respectively, with a maximum immobilization activity of 3732.9 U/g-AC after 2 hrs of immobilization. Analysis of variance (ANOVA) showed a high regression coefficient (R2) of 0.999, which indicated a satisfactory fit of the model with the experimental data. The parameters were statistically significant at p<0.05.Keywords: activated carbon, POME based lipase, immobilization, adsorption
Procedia PDF Downloads 245115 A Study on Selection Issues of an Integrated Service Provider Using Analytical Hierarchy Process
Authors: M. Pramila Devi, J. Praveena
Abstract:
In today’s industrial scenario, the expectations and demand of customers are reaching great heights. In order to satisfy the customer requirements the users are increasingly turning towards fourth party logistics (4PL) service providers to manage their total supply chain operations. In this present research, initially, the criteria for the selection of integrated service providers have been identified and an integrated modal based on their inter-relationship has been developed with help of shippers, with this idea of what factors to be considered and their inter-relationships while selecting integrated service provider. Later, various methods deriving the priority weights viz. Analytical Hierarchy Process (AHP) have been employed for 4PL service provider selection. The derived priorities of 4PL alternatives using methods have been critically analyzed and compared for effective selection. The use of the modal indicates that the computed quantitative evaluation can be applied to improve the precision of the selection.Keywords: analytical hierarchy process, fourth party logistics, priority weight, criteria selection
Procedia PDF Downloads 432114 Analyzing a Human Rights Approach to Poverty and Development Goals in the ASEAN Region
Authors: Nithya Devi
Abstract:
Poverty, hunger and water scarcity are threats to human rights and are assaults on human dignity. The very existence of man is questioned when his basic rights are violated. Addressing this social phenomenon should be a key objective of any human rights discourse. The origins of these problems have various root causes. For Asia, colonisation was an essential factor that caused great inequalities in the distribution of wealth. In the post-colonial era, the colonised states were developing nations grappling with these issues. Today, some of the developing states have progressed to developed nations. However, others remain as economically vulnerable countries. Within states, the widening income gap poses further threat to human rights. Hence ASEAN states have prioritised socio-economic rights, particularly basic needs, in the human rights discourse in this region. To date, poverty and development goals are given primary importance. This paper seeks to show how a human rights approach has dealt with poverty and development goals in this region and evaluates its effectiveness in addressing these concerns.Keywords: ASEAN, development, human rights, poverty
Procedia PDF Downloads 350113 Subband Coding and Glottal Closure Instant (GCI) Using SEDREAMS Algorithm
Authors: Harisudha Kuresan, Dhanalakshmi Samiappan, T. Rama Rao
Abstract:
In modern telecommunication applications, Glottal Closure Instants location finding is important and is directly evaluated from the speech waveform. Here, we study the GCI using Speech Event Detection using Residual Excitation and the Mean Based Signal (SEDREAMS) algorithm. Speech coding uses parameter estimation using audio signal processing techniques to model the speech signal combined with generic data compression algorithms to represent the resulting modeled in a compact bit stream. This paper proposes a sub-band coder SBC, which is a type of transform coding and its performance for GCI detection using SEDREAMS are evaluated. In SBCs code in the speech signal is divided into two or more frequency bands and each of these sub-band signal is coded individually. The sub-bands after being processed are recombined to form the output signal, whose bandwidth covers the whole frequency spectrum. Then the signal is decomposed into low and high-frequency components and decimation and interpolation in frequency domain are performed. The proposed structure significantly reduces error, and precise locations of Glottal Closure Instants (GCIs) are found using SEDREAMS algorithm.Keywords: SEDREAMS, GCI, SBC, GOI
Procedia PDF Downloads 358112 Raman and FTIR Studies of Azobenzene: Experimental and Theoretical Approach
Authors: Gomti Devi
Abstract:
Photoisomerization has been attracting to researchers due to its wide range of applications in optical switches, polymeric chains, liquid-crystalline systems and bilayer membranes etc. Azobenzene is a photochromic molecule which exhibits a reversible isomerisation process between its trans and cis isomers of different stability. An investigation has been conducted of the effects of temperature on intensity and position of Raman band of N=N, C-N stretching modes of Azobenzene (AZBN). It was found that the N=N stretching mode of Raman band shape shifts to lower frequency region with the increase in temperature. The Raman intensity was also decreased with the increase of temperature. The change in bandwidth with the increase in temperature has been studied. The FTIR spectrum of the molecule is recorded so as to complement the Raman spectra. In order to investigate the possibility of undergoing dimerization and trimerization as well as the stability of this molecule, ab initio calculation for geometry optimization and vibrational wavenumber calculation have been performed. Theoretically calculated values are found in good agreement with the experimental results.Keywords: azobenzene, temperature, ab-initio, frequency
Procedia PDF Downloads 336111 Preparation and Evaluation of Zidovudine Nanoparticles
Authors: D. R. Rama Brahma Reddy, A. Vijaya Sarada Reddy
Abstract:
Nanoparticles represent a promising drug delivery system of controlled and targeted drug release. They are specially designed to release the drug in the vicinity of target tissue. The aim of this study was to prepare and evaluate polymethacrylic acid nanoparticles containing Zidovudine in different drug to polymer ratio by nanoprecipitation method. SEM indicated that nanoparticles have a discrete spherical structure without aggregation. The average particle size was found to be 120 ± 0.02 - 420 ± 0.05 nm. The particle size of the nanoparticles was gradually increased with increase in the proportion of polymethacrylic acid polymer. The drug content of the nanoparticles was increasing on increasing polymer concentration up to a particular concentration. No appreciable difference was observed in the extent of degradation of product during 60 days in which, nanoparticles were stored at various temperatures. FT-IR studies indicated that there was no chemical interaction between drug and polymer and stability of drug. The in-vitro release behavior from all the drug loaded batches was found to be zero order and provided sustained release over a period of 24 h. The developed formulation overcome and alleviates the drawbacks and limitations of Zidovudine sustained release formulations and could possibility be advantageous in terms of increased bio availability of Zidovudine.Keywords: nanoparticles, zidovudine, biodegradable, polymethacrylic acid
Procedia PDF Downloads 627110 In vivo Protective Effects of Ginger Extract on Cyclophosphamide Induced Chromosomal Aberrations in Bone Marrow Cells of Swiss Mice
Authors: K. Yadamma, K. Rudrama Devi
Abstract:
The protective effect of Ginger Extract against cyclophosphamide induced cytotoxicity was evaluated in in vivo animal model using analysis of chromosomal aberrations in somatic cells of mice. Three doses of Ginger Extract (150mg/kg, 200mg/kg, and 250mg/kg body weight) were selected for modulation and given to animals after priming. The animals were sacrificed 24, 48, 72 hrs after the treatment and slides were prepared for the incidence of chromosomal aberrations in bone marrow cells of mice. When animals were treated with cyclophosphamide 50mg/kg, showed cytogenetic damage in somatic cells. However, a significant decrease was observed in the percentage of chromosomal aberrations when animals were primed with various doses of Ginger Extract. The present results clearly indicate the protective nature of Ginger Extract against cyclophosphamide induced genetic damage in mouse bone marrow cells.Keywords: ginger extract, protection, bone marrow cells, swiss albino mice
Procedia PDF Downloads 438109 MHD Non-Newtonian Nanofluid Flow over a Permeable Stretching Sheet with Heat Generation and Velocity Slip
Authors: Rama Bhargava, Mania Goyal
Abstract:
The problem of magnetohydrodynamics boundary layer flow and heat transfer on a permeable stretching surface in a second grade nanofluid under the effect of heat generation and partial slip is studied theoretically. The Brownian motion and thermophoresis effects are also considered. The boundary layer equations governed by the PDE’s are transformed into a set of ODE’s with the help of local similarity transformations. The differential equations are solved by variational finite element method. The effects of different controlling parameters on the flow field and heat transfer characteristics are examined. The numerical results for the dimensionless velocity, temperature and nanoparticle volume fraction as well as the reduced Nusselt and Sherwood number have been presented graphically. The comparison confirmed excellent agreement. The present study is of great interest in coating and suspensions, cooling of metallic plate, oils and grease, paper production, coal water or coal-oil slurries, heat exchangers technology, materials processing exploiting.Keywords: viscoelastic nanofluid, partial slip, stretching sheet, heat generation/absorption, MHD flow, FEM
Procedia PDF Downloads 314108 Assessment of Ground Water Potential Zone: A Case Study of Paramakudi Taluk, Ramanathapuram, Tamilnadu, India
Authors: Shri Devi
Abstract:
This paper was conducted to see the ground water potential zones in Paramakudi taluk, Ramanathapuram,Tamilnadu India with a total areal extent of 745 sq. km. The various thematic map have been prepared for the study such as soil, geology, geomorphology, drainage, land use of the particular study area using the Toposheet of 1: 50000. The digital elevation model (DEM) has been generated from contour interval of 10m and also the slope was prepared. The ground water potential zone of the region was obtained using the weighted overlay analysis for which all the thematic maps were overlayed in arc gis 10.2. For the particular output the ranking has been given for all the parameters of each thematic layer with different weightage such as 25% was given to soil, 25% to geomorphology and land use land cover also 25%, slope 15%, lineament with 5% and drainage streams with 5 percentage. Using these entire potential zone maps was prepared which was overlayed with the village map to check the region which has good, moderate and low groundwater potential zone.Keywords: GIS, ground water, Paramakudi, weighted overlay analysis
Procedia PDF Downloads 342107 Performance Comparison of AODV and Soft AODV Routing Protocol
Authors: Abhishek, Seema Devi, Jyoti Ohri
Abstract:
A mobile ad hoc network (MANET) represents a system of wireless mobile nodes that can self-organize freely and dynamically into arbitrary and temporary network topology. Unlike a wired network, wireless network interface has limited transmission range. Routing is the task of forwarding data packets from source to a given destination. Ad-hoc On Demand Distance Vector (AODV) routing protocol creates a path for a destination only when it required. This paper describes the implementation of AODV routing protocol using MATLAB-based Truetime simulator. In MANET's node movements are not fixed while they are random in nature. Hence intelligent techniques i.e. fuzzy and ANFIS are used to optimize the transmission range. In this paper, we compared the transmission range of AODV, fuzzy AODV and ANFIS AODV. For soft computing AODV, we have taken transmitted power and received threshold as input and transmission range as output. ANFIS gives better results as compared to fuzzy AODV.Keywords: ANFIS, AODV, fuzzy, MANET, reactive routing protocol, routing protocol, truetime
Procedia PDF Downloads 499106 Seismic Response Mitigation of Structures Using Base Isolation System Considering Uncertain Parameters
Authors: Rama Debbarma
Abstract:
The present study deals with the performance of Linear base isolation system to mitigate seismic response of structures characterized by random system parameters. This involves optimization of the tuning ratio and damping properties of the base isolation system considering uncertain system parameters. However, the efficiency of base isolator may reduce if it is not tuned to the vibrating mode it is designed to suppress due to unavoidable presence of system parameters uncertainty. With the aid of matrix perturbation theory and first order Taylor series expansion, the total probability concept is used to evaluate the unconditional response of the primary structures considering random system parameters. For this, the conditional second order information of the response quantities are obtained in random vibration framework using state space formulation. Subsequently, the maximum unconditional root mean square displacement of the primary structures is used as the objective function to obtain optimum damping parameters Numerical study is performed to elucidate the effect of parameters uncertainties on the optimization of parameters of linear base isolator and system performance.Keywords: linear base isolator, earthquake, optimization, uncertain parameters
Procedia PDF Downloads 435105 Risk Prediction Based on Heavy Metal Distribution in Groundwater
Authors: Rama Bhattacharyya, S. N. Ojha, Umesh K. Singh
Abstract:
Anthropogenic control on groundwater chemistry has emerged as a critical concern now-a-days, especially in the industrial areas. In view of this, a comprehensive study on the distribution of the heavy metal in the groundwater was conducted to investigate the impact of urbanization in the aquatic media. Water samples either from well or borehole from Fourty different sites in and around, Durgapur, West Bengal were collected for this purpose. The samples were analyzed using Inductively Coupled Plasma Mass Spectrometry (ICP-MS) for Calcium (Ca), Cobalt (Co), Chromium (Cr), Copper (Cu), Iron (Fe), Potassium (K), Magnesium (Mg), Manganese (Mn), Sodium (Na), Nickel (Ni), Lead (Pb), Zinc (Zn) content and the levels were compared with WHO specified maximum contaminant level as well as permissible limits given by the Bureau of Indian Standards (BIS). The result obtained from the present study indicates a significant risk to the population of this important emerging ‘smart city’ of eastern India. Because of the toxicity of these metals and the fact that for many tube-wells, dug-wells and bore-wells are the only sources of the water supply for a major fraction of the population in this environment. In this study, an attempt has been made to develop metal contamination risk map.Keywords: heavy metals, ground water, maximum contamination level, ICP-MS
Procedia PDF Downloads 216104 Computational Fluid Dynamics Simulation of Gas-Liquid Phase Stirred Tank
Authors: Thiyam Tamphasana Devi, Bimlesh Kumar
Abstract:
A Computational Fluid Dynamics (CFD) technique has been applied to simulate the gas-liquid phase in double stirred tank of Rushton impeller. Eulerian-Eulerian model was adopted to simulate the multiphase with standard correlation of Schiller and Naumann for drag co-efficient. The turbulence was modeled by using standard k-ε turbulence model. The present CFD model predicts flow pattern, local gas hold-up, and local specific area. It also predicts local kLa (mass transfer rate) for single impeller. The predicted results were compared with experimental and CFD results of published literature. The predicted results are slightly over predicted with the experimental results; however, it is in reasonable agreement with other simulated results of published literature.Keywords: Eulerian-Eulerian, gas-hold up, gas-liquid phase, local mass transfer rate, local specific area, Rushton Impeller
Procedia PDF Downloads 236103 The Twelfth Rib as a Landmark for Surgery
Authors: Jake Tempo, Georgina Williams, Iain Robertson, Claire Pascoe, Darren Rama, Richard Cetti
Abstract:
Introduction: The twelfth rib is commonly used as a landmark for surgery; however, its variability in length has not been formally studied. The highly variable rib length provides a challenge for urologists seeking a consistent landmark for percutaneous nephrolithotomy and retroperitoneoscopic surgery. Methods and materials: We analysed CT scans of 100 adults who had imaging between 23rd March and twelfth April 2020 at an Australian Hospital. We measured the distance from the mid-sagittal line to the twelfth rib tip in the axial plane as a surrogate for true rib length. We also measured the distance from the twelfth rib tip to the kidney, spleen, and liver. Results: Length from the mid-sagittal line to the right twelfth rib tip varied from 46 (percentile 95%CI 40 to 57) to 136mm (percentile 95%CI 133 to 138). On the left, the distances varied from 55 (percentile 95%CI 50 to 64) to 134mm (percentile 95%CI 131 to 135). Twenty-three percent of people had an organ lying between the tip of the twelfth rib and the kidney on the right, and 11% of people had the same finding on the left. Conclusion: The twelfth rib is highly variable in its length. Similar variability was recorded in the distance from the tip to intra-abdominal organs. Due to the frequency of organs lying between the tip of the rib and the kidney, it should not be used as a landmark for accessing the kidney without prior knowledge of an individual patient’s anatomy, as seen on imaging.Keywords: PCNL, rib, anatomy, nephrolithotomy
Procedia PDF Downloads 119