MAT Journals
Not a member yet
    2490 research outputs found

    In vitro Susceptibility of Selectively used Antibiotics Against Vibrio spp. Isolated from Tiger Shrimp (Penaeus monodon)

    No full text
    The sensitivity of 50isolates of Vibrio spp. isolated from edible portion of muscleof Tiger shrimp (Penaeus monodon) was collate using selectively used antibiotics. The in vitro susceptibility of the isolates was studied by disc diffusion method applying discs contained Doxycycline, Chloramphenicol, Ofloxacin, Erythromycin, Enrofloxacin and Ciprofloxacin. It is further studied Erythromycin and Chloramphenicol exhibits high degree of bacterial resistance in Tiger shrimps

    A Descriptive Study to Assess the Knowledge Regarding Toilet Training among Mothers of Toddlers

    No full text
    Introduction: Bowel and bladder control is a necessary social skill. Teaching child to use the toilet takes time, understanding and patience. Toilet training is the process of teaching young children to control timing of bladder and bowel movements and to use the toilet. It is one of the first steps that children take to become self-sufficient. All children manage to acquire the necessary control eventually, but difficulty involved is a major concern for parents and causes conflicts within the family. The objectives of the study were to assess the level of knowledge regarding toilet training among mothers of toddlers and to associate the level of knowledge of toddler mothers with their selected demographic variables. Materials and Methods: Research approach was quantitative and research design was descriptive research design. 30 samples who fulfilled the inclusion criteria were selected by non-probability convenient sampling technique. The tool used for the data collection comprises of 2 sections: Section A – demographic variables; Section B – A structured questionnaire to assess the knowledge on toilet training among mothers of toddlers. Data collected were analyzed by using descriptive and inferential statistics. Results: the analysis reveals that 70% (21) mothers of toddlers have inadequate knowledge; 30% (9) have moderate knowledge; 0 % (0) have adequate knowledge. There is a significant association found between the “Age, educational status and occupation of the mother” with knowledge. Conclusion: The study findings concludes that majority mothers of toddlers 70% (21) have inadequate knowledge. The nurse administrator should plan to conduct regular camps on toilet training practices in community to initiate healthy toilet training practices

    Character Recognition of Handwritten Text Using Machine Learning and Image Processing

    No full text
    In today’s world there have been various advancements in computing fields and as a result there is a greater need for smart devices. As soon as we come across the word ‘smart’, we immediately think of intelligence. It is intelligence and intelligent devices that have shaped modern life in the last two decades. One such example of an intelligent device is a character recognition device. Current character recognition methods work well to a good extent (98%) for typed text but this accuracy drops once the input starts becoming dynamic. This occurs when the text is handwritten or if there is a variation in its style, font, etc. We require accurate results irrespective of the dataset. Hence, we apply supervised machine learning which works by learning attributes and classifying labels. The advantage of this specific method is that it works even in the case of large datasets. In this project, we use image processing, supervised machine learning and deep learning algorithms to obtain accurate results for dynamic inputs without the loss of accuracy over a wide range of datasets

    IOT Based Power Theft Detection

    Get PDF
    The main objectives of this system are described clearly as follows: theft of electricity increases the costs paid by farmer and can have serious safety consequences. Many farmers are taking benefits of electricity. . But not all farmers are having legal electricity connection. Only those who have taken legal connection are paying the electricity charges. The farmers who are having legal electricity connection are paying charges of illegal connections and they don’t have any idea about this theft of electricity. This system is basically developed for the welfare of farmers. We can use this system for the society, but installation charge more as compare to the electricity theft. Meter readings and rate every month send to the electricity providers through the IOT. Adding with these setup an efficient Internet of Things (IOT) is defined, which portraits the global connection environment to the users and allow them to view the status of meter reading and theft associations globally from anywhere at any time. Theft of electricity has a material impact on customers in terms of cost and safety. We consider that the existing regulatory framework does not adequately encourage suppliers to be proactive in detecting theft. In this document we are requesting views on proposed new supply license obligations to strengthen the arrangements for tackling theft and on the proposed role of Distribution Network Operators (DNOs) in tackling theft when it is not responsibility of suppliers. We are also consulting on additional policy measures and proposals to support suppliers in investigating, detecting and preventing theft. For all the entire system is useful for prevention of thefts and globally connected medium to portrait the meter reading through the IOT to its customers effectively

    Android Operating System and its Security Issues

    Get PDF
    Android is a Mobile and Tablet Operating System premised on the Linux kernel owned by Google. The ultimate innovative feature of Android Operating System is open source due to this anyone can publish their applications freely on the Android market. This openness introduces the broad number of developers which utilize this platform, but it comes with the hazard that user may download malicious software which is written by network hackers and harm to its privacy. This requires the study of the Security Mechanisms for Android and to make it easy and user-friendly to make the user aware of areas where he has to be cautious. This paper gives an idea about the architecture of the Android operating system, security features of an android, security issues faced by the Android and solutions for security issues of the Android operating system

    Adaptive Modulation Scheme with Cooperative Diversity in Wireless Systems

    Get PDF
    A common technique that is conjointly wide utilized in communication systems are that the adjustive Modulation (AM). During this technique the foremost applicable sort of modulation is chosen additionally to size of the constellation betting on the Signal to Noise magnitude relation (SNR) measured at the receiver aspect. AM technique is utilized at intervals the systems of cooperative diversity so as to get outturn sweetening from SNR gain. The variety is additionally thought-about another common technique that is utilized in mitigating the attenuation impact. Time diversity strategies are not able to use for channels of frequency non-selective and slow attenuation varieties. The AM and cooperative diversity techniques, that area unit thought-about two common and deployed algorithms in up the wireless communication performance. This project investigated many studies that were introduced within the literature involving these two topics. The planned ways, concepts, outcomes and regarded conditions throughout the implementation or derivation were conjointly mentioned and compared. Every of the studies achieved a transparent improvement inside the wireless communication system upon considering many criteria, such as: outturn, SNR, SE and BER

    Review on Various Applications of Visible Light Communication

    Get PDF
    In the current scenario, there is an increased usage of Radio Frequency (RF) for wireless communication, that there is a major problem of bandwidth allocation. In order to overcome this problem a new technology called Visible Light Communication (VLC) is introduced which uses visible light whose data rates are higher than radio waves. Visible Light requires fewer components than radio technology, hence cost effective. Data transmission requires LED light sources which consumes less power. The data transmitted is more secure and can be used in electromagnetic sensitive areas. This transmission technique can also be used in aircraft cabins, hospitals and nuclear power plants without causing electromagnetic interference

    Comparative Study of Independent Component Analysis and Adaptive Filter for Removal Ocular Artifact from EEG Data

    Get PDF
    EEG is brain signal process technique that enables gaining the understanding of the complicated inner mechanisms of the brain and abnormal brain waves have shown to be related to specific brain disorders. The analysis of brain waves plays a vital role in identification of various brain disorders. MATLAB provides an interactive graphic computer programme (GUI) permitting users to flexibly and interactively method their high-density encephalogram knowledge set and different brain signal data totally different techniques similar to freelance element analysis (ICA) and reconciling filter. We are going to be showing totally different brain signals by scrutiny, analysing and simulating datasets that is already loaded within the MATLAB package to method the encephalogram signals. Unfortunately, graph knowledge is usually contaminated by ocular artifacts that create the analysis of neural knowledge terribly troublesome. The main focus of this analysis is that the development of a unique technique which will mechanically notice and take away eyeblink artifacts so as to facilitate analysis of graph recordings. During this project, we have a tendency to compare the adaptive filter and freelance part Analysis techniques. For this project we have a tendency to used EEGLAB MATLAB tool chest. By victimisation this tool chest we have done the simulation of our project

    Understanding the Mechanism of Nutrient Transport through Surface Runoff

    No full text
    Eutrophication and associated ecological changes in water bodies have become a major environmental challenge. Therefore, understanding of the transport mechanism of nutrients into the water bodies is of importance, as it will help in managing the problem of eutrophication. In this study, surface runoff samples were analysed for the nutrients during the rainfall events in the watershed of Sukhna Lake, Chandigarh (India). The monitoring point was selected in the drain in which all the sub-drains merged into. The Chemographs plotted suggested that the mechanism of transport of total phosphorous (TP) was majorly adsorbed onto suspended solids whereas the total nitrogen (TN) was transported in solution

    Durability Characteristics of Concrete with Partial Replacement of Cement by Hypo sludge

    No full text
    This research paper describes the low cost concrete by blending various ratios of cement by hypo sludge. The main objective of this paper is to reduce the CO2 emission due to cement industry and to reduce the industrial wastes disposal. The main aim of this research is the presentation of concrete however adding of paper waste with various proportions of hypo sludge.  Standard cubes and cylinders are used for this durability tests. These tests were carried out to evaluate the durability characteristics such as Acid attack, sulphate attack, alkaline attack, water absorption and sorptivity

    977

    full texts

    2,490

    metadata records
    Updated in last 30 days.
    MAT Journals is based in India
    Access Repository Dashboard
    Do you manage Open Research Online? Become a CORE Member to access insider analytics, issue reports and manage access to outputs from your repository in the CORE Repository Dashboard! 👇