Search results for: J. V. Meshram
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7

Search results for: J. V. Meshram

7 Therapeutic Management of Toxocara canis Induced Hepatitis in Dogs

Authors: Milind D. Meshram

Abstract:

Ascarids are the most frequent worm parasite of dogs and cats. There are two species that commonly infect dogs: Toxocara canis and Toxascaris leonina. Adult roundworms live in the stomach and intestines and can grow to 7 inches (18 cm) long. A female may lay 200,000 eggs in a day. The eggs are protected by a hard shell. They are extremely hardy and can live for months or years in the soil. A dog aged about 6 years, from Satara was referred to Teaching Veterinary Clinical Complex (TVCC) with a complaint of abdominal pain, anorexia, loss of condition and dull body coat with mucous pale membrane. The clinical examination revealed Anaemia, palpation of abdomen revealed enlargement of liver, slimy feel of the intestine loop, diarrhea.

Keywords: therapeutic management, Toxocara canis, induced hepatitis, dogs

Procedia PDF Downloads 592
6 Kosodum Tribal Dance Series, Series 1 Dhemsa and Rela: An Example of an Exceptional Inter-Organizational Cooperation for the Preservation of Tribal Dance Form

Authors: Vidya Meshram, Shrinivas Surpam, Akshay Kokode, Laxman Shedmake, Ramesh Parchake

Abstract:

Tribal dance form is an integral part of the tribal culture as they represent the traditional culture of the tribal community. This article provide the reasons for the need to preserve the tribal dance form of Indian tribal people as a part of the cultural heritage. This article describe our experience of co-ordination of three organization to conduct a dance performance of Gond Tribe artists in the Mumbai City. This is the part of the promotion of tribal artist at big platform, although the preservation and awareness of tribal dance form in the metro cities. This is an example of an exceptional Inter-Organizational Cooperation between Kosodum Welfare Private Limited, GondwanaJangomDhemsaRelaNrutya Dal &GondwanaMitraMandal, Mumbai, for the preservation of tribal dance form.

Keywords: tribal, art, culture, preservation

Procedia PDF Downloads 173
5 Optimization of Vertical Axis Wind Turbine Based on Artificial Neural Network

Authors: Mohammed Affanuddin H. Siddique, Jayesh S. Shukla, Chetan B. Meshram

Abstract:

The neural networks are one of the power tools of machine learning. After the invention of perceptron in early 1980's, the neural networks and its application have grown rapidly. Neural networks are a technique originally developed for pattern investigation. The structure of a neural network consists of neurons connected through synapse. Here, we have investigated the different algorithms and cost function reduction techniques for optimization of vertical axis wind turbine (VAWT) rotor blades. The aerodynamic force coefficients corresponding to the airfoils are stored in a database along with the airfoil coordinates. A forward propagation neural network is created with the input as aerodynamic coefficients and output as the airfoil co-ordinates. In the proposed algorithm, the hidden layer is incorporated into cost function having linear and non-linear error terms. In this article, it is observed that the ANNs (Artificial Neural Network) can be used for the VAWT’s optimization.

Keywords: VAWT, ANN, optimization, inverse design

Procedia PDF Downloads 325
4 Deep learning with Noisy Labels : Learning True Labels as Discrete Latent Variable

Authors: Azeddine El-Hassouny, Chandrashekhar Meshram, Geraldin Nanfack

Abstract:

In recent years, learning from data with noisy labels (Label Noise) has been a major concern in supervised learning. This problem has become even more worrying in Deep Learning, where the generalization capabilities have been questioned lately. Indeed, deep learning requires a large amount of data that is generally collected by search engines, which frequently return data with unreliable labels. In this paper, we investigate the Label Noise in Deep Learning using variational inference. Our contributions are : (1) exploiting Label Noise concept where the true labels are learnt using reparameterization variational inference, while observed labels are learnt discriminatively. (2) the noise transition matrix is learnt during the training without any particular process, neither heuristic nor preliminary phases. The theoretical results shows how true label distribution can be learned by variational inference in any discriminate neural network, and the effectiveness of our approach is proved in several target datasets, such as MNIST and CIFAR32.

Keywords: label noise, deep learning, discrete latent variable, variational inference, MNIST, CIFAR32

Procedia PDF Downloads 128
3 Core-Shell Structured Magnetic Nanoparticles for Efficient Hyperthermia Cancer Treatment

Authors: M. R. Phadatare, J. V. Meshram, S. H. Pawar

Abstract:

Conversion of electromagnetic energy into heat by nanoparticles (NPs) has the potential to be a powerful, non-invasive technique for biomedical applications such as magnetic fluid hyperthermia, drug release, disease treatment and remote control of single cell functions, but poor conversion efficiencies have hindered practical applications so far. In this paper, an attempt has been made to increase the efficiency of magnetic, thermal induction by NPs. To increase the efficiency of magnetic, thermal induction by NPs, one can take advantage of the exchange coupling between a magnetically hard core and magnetically soft shell to tune the magnetic properties of the NP and maximize the specific absorption rate, which is the gauge of conversion efficiency. In order to examine the tunability of magnetocrystalline anisotropy and its magnetic heating power, a representative magnetically hard material (CoFe₂O₄) has been coupled to a soft material (Ni₀.₅Zn₀.₅Fe₂O₄). The synthesized NPs show specific absorption rates that are of an order of magnitude larger than the conventional one.

Keywords: magnetic nanoparticles, surface functionalization of magnetic nanoparticles, magnetic fluid hyperthermia, specific absorption rate

Procedia PDF Downloads 322
2 Numerical Study of Wettability on the Triangular Micro-pillared Surfaces Using Lattice Boltzmann Method

Authors: Ganesh Meshram, Gloria Biswal

Abstract:

In this study, we present the numerical investigation of surface wettability on triangular micropillar surfaces by using a two-dimensional (2D) pseudo-potential multiphase lattice Boltzmann method with a D2Q9 model for various interaction parameters of the range varies from -1.40 to -2.50. Initially, simulation of the equilibrium state of a water droplet on a flat surface is considered for various interaction parameters to examine the accuracy of the present numerical model. We then imposed the microscale pillars on the bottom wall of the surface with different heights of the pillars to form the hydrophobic and superhydrophobic surfaces which enable the higher contact angle. The wettability of surfaces is simulated with water droplets of radius 100 lattice units in the domain of 800x800 lattice units. The present study shows that increasing the interaction parameter of the pillared hydrophobic surfaces dramatically reduces the contact area between water droplets and solid walls due to the momentum redirection phenomenon. Contact angles for different values of interaction strength have been validated qualitatively with the analytical results.

Keywords: contact angle, lattice boltzmann method, d2q9 model, pseudo-potential multiphase method, hydrophobic surfaces, wenzel state, cassie-baxter state, wettability

Procedia PDF Downloads 70
1 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System

Authors: Nareshkumar Harale, B. B. Meshram

Abstract:

The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.

Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design

Procedia PDF Downloads 228