35 research outputs found

    Strength of the word of the qualification that does not feature in Silambu

    Get PDF
    We still read poets who greeted kings during the Sangam period. In this way, we learn that the single word "live" is an everlasting hope in our lives. In the same way, even today, during the wedding ceremony, the faint sound is played during the wedding ceremony so that the words do not join the bride and groom. It is possible to see the use of words without the knowledge of many of the words that create such an effect today. Scholars say that if the mind is high, it will be high in language. We would have heard our ancestors say, Karunaku, do not open your mouth. It is an undeniable fact that all this is not just an empty belief but a statement of the strength of the words. However, this article has been written with the intention of exploring how the word is enduring in the idiom of the first Tamil epic, citizens' epic and feminist epic

    A stochastic frontier and corrected Ordinary Least Square models of determining technical efficiency of canal irrigated paddy farms in Tamil Nadu

    Get PDF
    A comparative study between Stochastic frontier production function and corrected Ordinary Least Square (OLS) were estimated to determine technical efficiency in paddy production. Further, the study has assessed the effect of farm specific socio economic factors affecting the technical efficiency. This study was conducted in Cauvery delta zone of seven taluks about canal irrigation. The number of farmers in canal irrigated region about 109 from seven taluks is considered. The data were obtained from the cost of cultivation scheme of Tamil Nadu centre. The results of Cobb Douglas stochastic production function indicated that fertilizer, seed, pesticide and machine hours significantly influenced yield of paddy. The results also indicated that it will be highly profitable to increase the use of seed, and need to rationalize the labour use and pesticide usage. The effect of qualitative variable namely age and education of the farmer would indicate that the older farmers technical efficiency become less compared to the younger farmer, and also implying that investments on human capital take away their participation from agriculture. As a comparative study in general, COLS produced the lowest mean technical efficiency with 85 percent while the Stochastic frontier analysis produced the highest mean technical efficiency with 90 per cent

    Pindi and Bidalaka - A Review

    Get PDF
    Ocular Therapeutics can be broadly divided into two i.e., either in the form of Kriyakalpa (local therapeutics) or systemic therapeutics. Kriya Kalpas are the Topical ocular Therapeutics indicated in various Netra Rogas which has several advantages over oral administration of medicines as it provides more time for bio availability. Contemporary sciences also make use of transdermal absorption of medicines and are considered as an efficient method of drug delivery. As Pindi and Bidalaka are the modified forms of Lepa Kalpana, same route is followed by these two also. In this article probable mode of action and importance of Pindi and Bidalaka will be discussed

    Agricultural uses of plant biostimulants

    Get PDF

    Photobleaching of face mask dyes BB and CR using novel BPPNTs-V2O5 nanotube composites: DFT studies of self-assembly and nanoclusters

    No full text
    Self-assembly method demonstrated the viable production of 3,5-bistrifluoromethyl benzylamine derivative of phenylalanine nanotubes (BPPNTs). Nano-V2O5 composite of these BPPNTs has been synthesized and characterized. The reported nanocomposite shows a highly flexible nanotube structure that provides easy access to electrons when used as an electrocatalyst or photocatalyst. This promising platform is successfully applied in the electrochemical reaction by cyclic voltammetry. Maximum photodegradation of Congo red and Brilliant blue dyes (mask layer dyes) has been observed above 50% at given time intervals). This phenomena can be used in remediation applications like the degradation of used masks. Theoretical descriptions of the self-assembled BPPNT monomer and BPPNTs-V3O6 nanocluster composite by DFT calculations produced the validation of the predicted structural applications. The results concluded the proposed nanocomposite-coated mask layers for use in photodegradable masks are a valuable outcome of this study. HIGHLIGHTS Photodegradation is studied in the context of mask pollution abatement.; Novel catalyst coating on the mask is suggested for the effective disposal mechanism.; Current impact is due to the mask wastage.; Efficient water cleanup.; Nanomethods for the future.

    Water Level Monitoring and Distribution Management System Using Raspberry PI

    Full text link
    Volume 8 Issue 2 (February 201

    Secure Multiple Domain Routing for Wireless Sensor Networks

    No full text
    Secure Transmission of data packets in Wireless Sensor Networks is an important area of Research. There is a possibility of an attacker creating security holes in the network. Hence, network security and reliability can be achieved by discovering random multiple paths using multiple domains, and forwarding data packets from the source node to the destination node. We have designed, Multiple Domain Routing with Overlap of Nodes (MDRON) and Multiple Domain Routing Without Overlap of Nodes (MDRWON) algorithms, in which packets follow multiple optimized paths simultaneously. The Special node algorithm searches the node which has maximum power and these nodes are used for transferring the packet from one domain to another domain. Simulation results using MATLAB shows that performance is better than Purely Random Propagation (PRP) and Non Repetitive Random Propagation(NRRP) Algorithms

    SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks

    No full text
    <p>One of the critical issues in WSNs is providing security for the secret data in military applications. It is necessary to ensure data integrity and authentication for the source data and secure end-to-end path for data transmission. Mobile sinks are suitable for data collection and localization. Mobile sinks and sensor nodes communicate with each other using their public identity, which is prone to security attacks like sink replication and node replication attack. In this work, we have proposed Source Encrypted Authentic Data algorithm (SEAD) that hides the location of mobile sink from malicious nodes. The sensed data is encrypted utilizing symmetric encryption ---Advanced Encryption Standards (AES) and tracks the location of the mobile sink. When data encounters a malicious node in a path, then data transmission path is diverted through a secure path. SEAD uses public encryption ---Elliptic Curve Cryptography (ECC) to verify the authenticity of the data. Simulation results show that the proposed algorithm ensures data integrity and node authenticity against malicious nodes. Double encryption in the proposed algorithm produces better results in comparison with the existing algorithms.</p
    corecore