112 research outputs found

    An Intelligent Hybrid Protocol for Effective Load Balancing and Energy Efficient Routing for MANETs

    Get PDF
    MANET (Mobile ad hoc network) is an autonomous decentralised network. And it is a collection of wireless mobile nodes that dynamically form a temporary network without the reliance of any infrastructure or central administration. Routing is a challenging task in manet. When the size and complexity increases the important challenge in manet is to avoid congestion with effective load balancing and improve energy, QoS parameters inside the network. In this work we propose a new hybrid protocol by combining ACO and Predator prey (LV) model which known as ACRRCC (Ant colony based rate regulating congestion control) method, which works efficiently in two phases. The efficient and optimal routing strategy is done by phase I using ant colony optimization. In phase II the congestion is majorly controlled by employing a mathematical model named predator-prey model which regulates the rate of the traffic flow in the network path. Performance of our proposed hybrid model ACRRCC yields good results under simulation study when compared with simple ACO

    Optimising reaction variables for the preparation of superabsorbent iron fertiliser hydrogel using sugarcane bagasse: A sustainable approach to improve crop nutrient releaseĀ 

    Get PDF
    Iron (Fe) is a vital micronutrient essential for crop growth and development. Utilisation of bio-based, environmentally friendly functional polymers is inevitable for society. As an alternative to the conventional Fe fertiliser, the present study aimed to synthesise a higher Fe percentage containing hydrogel with organic substances that can facilitate the slow release of nutrients, reduce fertiliser nutrient fixation, and minimise environmental pollution. The reaction variables were optimised for the preparation of superabsorbent using sugarcane bagasse and nano-zeolite-based slow-release Fe fertiliser (SR Fe) hydrogel. This was formulated by graft, co-polymerising acrylic acid, acrylamide, sugarcane bagasse, and nano-zeolite with N,N'-methylene bis-acrylamide as a crosslinker and ammonium persulfate as an initiator. Based on the swelling percentage, the reaction variables of the SR Fe fertiliser were standardised. The crosslinker (MBA - 10 wt%), the initiator (APS - 10 wt%), the filler (Nano-zeolite - 10 wt%), the monomer acrylamide composition (AAm - 2g), the acrylic acid content (AA - 7 ml), the reaction temperature (60oC), and the drying temperature (40oC) were chosen based on desirable swelling percentage and loaded with Fe fertiliser. The Fe fertiliser was loaded to sugarcane bagasse in different ratios (1:0.5, 1:1, 1:1.5, 1:2). The present study showed that the SR Fe fertiliser with the highest percentage of Fe (6.4%) in the ratio of sugarcane bagasse to Fe fertiliser of 1:2 could be used as an effective SR Fe fertiliser to supply nutrients slowly to crops to meet their nutrient needs and improve nutrient use efficiency

    INVESTIGATION ON ENERGY UTILIZATION IN CLOUD DATA CENTERS

    Get PDF
    Abstract-Cloud computing has revolutioned the ICT industry by enabling on-demand provisioning of computing resources. An organization can either outsource its computational needs to the cloud avoiding high up-front investments in a private computing infrastructure and consequent maintenance costs, or implement a private cloud data center to improve the resource management and provisioning processes. The global energy consumption of IT equipment is steadily rising and produces an increasing portion of global energy production. Currently, data centers consume about 1.5% of global electricity production, whereby their total energy usage has almost tripled between 2000 and 2010.The increasing demand of computational power, especially in current cloud computing environments, is an important reason for the rising number of running computers as well as increasing energy consumption

    A PROSPECTIVE STUDY OF THE PATTERN OF USE OF ANTIMICROBIAL AGENTS IN SURGICAL PROPHYLAXIS IN A TERTIARY CARE CENTRE

    Get PDF
    Objective: To evaluate the most common class of antimicrobial agents used in surgical prophylaxis. To evaluate the timing, dosage, route and duration of use of antimicrobial agents in surgical prophylaxis.Methods: The study subjects were 214 patients who underwent general surgical procedures at Vinayaka Missions Kirupananda Variyar Medical College from July 2013 to June 2014. The use of antimicrobial agents was noted from the first dose of antibiotic given before the induction of anaesthesia. After surgery was completed the duration of antibiotic in the post-operative ward was noted. Results: Majority of the patients were males of age group 50-60 y and the most common surgical procedure was hernioplasty. Combination therapy with two antimicrobial agents was more preferred regimen 126 (58.9%). Among the antimicrobial agent's cefotaxime 114 (24.8%) was the most commonly prescribed drug and it was followed by metronidazole 121 (21.9%). ceftriaxone 60 (13.1%) was the third most commonly prescribed antimicrobial agent. The mean duration of prescription of antimicrobial agents in the present study was 4.78 d and the mean cost of drug treatment was 787.54 rupees. The cost-effective regimen was that of aminoglycosides and imidazole.Conclusion: The choice of antimicrobial agent was based on the local prevalence pattern of microorganisms. The intravenous administration of antibiotic prophylaxis immediately before or after the induction of anaesthesia is the most reliable method for ensuring effective serum concentration at the time of surgery. The antimicrobial agent chosen must cover all the most likely contaminating organisms

    Cytotoxic effect of crude venom isolated from Sea anemone Calliactis tricolor on human cancer cell lines

    Get PDF
    601-609The present study was made to analyze the antiproliferative effect of crude venom isolated from sea anemone Calliactis tricolor against human cancer cell lines such as Human Neuroblastoma cell (SHSY5Y), Human Lung Cancer cells (A549) and Human Colon Cancer cells (HT-29). The protein profile of venom was performed by Native PAGE and subunit profile was analyzed by SDS-PAGE. The in vitro cytotoxic effect of crude venom against SHSY5Y, A549, HT-29 and Vero cell lines was evaluated by MTT assay method. All the cells exposed to crude venom showed dose-dependent cytotoxic effect with IC50Ā of 60 Āµg/ml for both SHSY5Y and A549 cells and 75 Āµg/ml for HT-29 cells compared to with IC50Ā of 100 Āµg/ml for the Vero cell control. The significant decrease in cell viability was observed in SHSY5Y Human Neuroblastoma cells among other cancer cells. The cellular and nuclear morphological observations revealed the loss of cell morphological integrity along with the prominent damage of nucleus in the cell. This was further confirmed by DNA fragmentation assay. Based on the preliminary results, it could be clearly stated that the crude venom of C. tricolor may have a potential anti-cancerous molecules which can be further explored and used as a tool for Neuroblastoma chemotherapy.Ā 

    Thermal comfort properties of weft knitted interlock layered fabricsĀ 

    Get PDF
    The main objective of this study is to produce interlock fabrics with two different types of material at the face and back and to evaluate the effectiveness of its air permeability and thermal properties, which, in turn, decide the comfort of the wearer. It is observed that the tightness factor of the fabric has a linear relationship with air permeability, thermal conductivity and Qmax. The polyester modal interlock fabric shows a higher Qmax value which provides a good warm-cool effect, that is important for sportswear applications.

    Bio-nanotechnology application in wastewater treatment

    Get PDF
    The nanoparticles have received high interest in the ļ¬eld of medicine and water puriļ¬cation, however, the nanomaterials produced by chemical and physical methods are considered hazardous, expensive, and leave behind harmful substances to the environment. This chapter aimed to focus on green-synthesized nanoparticles and their medical applications. Moreover, the chapter highlighted the applicability of the metallic nanoparticles (MNPs) in the inactivation of microbial cells due to their high surface and small particle size. Modifying nanomaterials produced by green-methods is safe, inexpensive, and easy. Therefore, the control and modiļ¬cation of nanoparticles and their properties were also discussed

    Anthropological Traits in Meera's Poems

    Get PDF
    Behaviors, cultures, and norms found in human societies vary according to their individuality and time. for example the lifestyles of the ancient people and the lifestyles of the present era are completely different. This results in changes in people's behavior and characteristics. Such changes in people's characteristics made changes in people's political life, love life, their contribution to society, poverty level, for the well-being of capitalism. When king ruled the country the welfare of the people has been overlooked. since the day when the monarchy changed to democracy everything changed. The people in high position fails to give importance to citizen's. During Sangam era ove and valor were highly appreciated and considered to be two eyes. Modern age love is based on caste, religion and relationship. Society that creates unemployment in the name of civilization, marginalized people, high class people who exploits the poor people, although their characteristic interests are different, all are regarded as human characteristics. The purpose of this article is to investigate about all these things in Meera's poems

    SDA-seech: Secure data aggregation using seech algorithm in wireless sensor networks

    No full text
    Wireless sensor networks (WSNs) have grown in popularity as a network method. However, owing to the broadcast communication method and unsupervised deployment nature of WSNs, the Sensor Nodes (SN) often becomes targets of attackers. Due to the few processing and energy resources, basic data aggregation methods such as averaging are required. While it may prevent sensitive data from being hacked, it requires regular message exchanges across a network, imposing a significant burden on SNs with limited resources. This article presents the SDA-SEECH technique for securely transmitting data without collusion attacks to address these concerns. The recommended system has improved collusion resistance, accuracy, and convergence speed. The SEECH algorithm is used to perform energy-efficient clustering. The optimal path was determined using the SEECH Route and HOP-TIME algorithms. Theoretical study and simulation measurement demonstrates that the proposed aggregation methods outperform existing protocols regarding privacy protection and communication efficiency

    SDA-SEECH: Secure data aggregation using SEECH algorithm in wireless sensor networks

    No full text
    Wireless sensor networks (WSNs) have grown in popularity as a network method. However, owing to the broadcast communication method and unsupervised deployment nature of WSNs, the Sensor Nodes (SN) often becomes targets of attackers. Due to the few processing and energy resources, basic data aggregation methods such as averaging are required. While it may prevent sensitive data from being hacked, it requires regular message exchanges across a network, imposing a significant burden on SNs with limited resources. This article presents the SDA-SEECH technique for securely transmitting data without collusion attacks to address these concerns. The recommended system has improved collusion resistance, accuracy, and convergence speed. The SEECH algorithm is used to perform energy-efficient clustering. The optimal path was determined using the SEECH Route and HOP-TIME algorithms. Theoretical study and simulation measurement demonstrates that the proposed aggregation methods outperform existing protocols regarding privacy protection and communication efficiency
    • ā€¦
    corecore