169 research outputs found

    Management of Hidradenitis Suppurativa by Guggulu based Apamarga Ksharasutra - A Case Study

    Get PDF
    Hydradenitis Suppurativa (HS) is a chronic infective and fibrous disease of the skin bearing apocrine sweat glands characterised by recurrent painful deep seated rounded nodules and abscesses. Axilla, groin, perianal and perineal regions are the common sites. Onset is usually after puberty between 20 and 40 years of age. This recurrent inflammatory skin condition with an estimated prevalence of 1-4 % is more frequent in women. The disease tend to become chronic with subcutaneous extension leading to indurations, sinus and fistula having a profound impact on the quality of life. The clinical features of HS can be compared with Naadivrana mentioned in classics. The treatment modalities of Naadivrana [4,5] includes mainly Shodhana and Ksara Sutra application are adopted in the present case. In modern system of medicine there are no curative (medical) therapies for HS, only symptomatic treatment can be done. This includes adjuvant therapy (e.g., pain management, smoking cessation, weight loss, treatment of super infections, hygiene practises, topical wound dressings) to topical and systemic agents (e.g., antibiotics, anti-inflammatory agents, anti-androgen drugs) and surgical interventions such as excisional surgery and laser surgery. Shodhana Chikitsa is not only effective in eliminating toxins. It has a wide range of therapeutic uses such as improving circulation immunity and eradicating diseases etc, Guggulu based Apamarga Kshara Sutra has the combined effect of Apamarga Kshara, Guggulu and Turmeric and said to be unique drug formulation for cutting and healing of sinus tract

    Synthesis, characterization, and phase relations of Zinc-Rich phases in the binary systems Platinum-Zinc and Nickel-Zinc

    Get PDF
    Synthesis, characterization, and phase relations of Zinc-Rich phases in the binary systems Platinum-Zinc and Nickel-Zinc

    A DDoS Attack Detection using PCA Dimensionality Reduction and Support Vector Machine

    Get PDF
    Distributed denial-of-service attack (DDoS) is one of the most frequently occurring network attacks. Because of rapid growth in the communication and computer technology, the DDoS attacks became severe. So, it is essential to research the detection of a DDoS attack. There are different modes of DDoS attacks because of which a single method cannot provide good security. To overcome this, a DDoS attack detection technique is presented in this paper using machine learning algorithm. The proposed method has two phases, dimensionality reduction and model training for attack detection. The first phase identifies important components from the large proportion of the internet data. These extracted components are used as machine learning’s input features in the phase of model detection. Support Vector Machine (SVM) algorithm is used to train the features and learn the model. The experimental results shows that the proposed method detects DDoS attacks with good accuracy

    Design and Development of Compact Conformal Microstrip Antenna at S-Band

    Get PDF
    A compact microstrip antenna at S-Band is described in this work. This paper presents the theoretical and experimental investigations on conformal 90° Sectoral circular microstrip antenna using shorting wall. The performance of antenna characteristics is obtained using FEM based HFSS software and the computed results are verified by measurement. Here, microstrip antenna is loaded with shorting wall to achieve frequency reduction of about 75 per cent. The antenna characteristics were studied with radome surrounded by metallic ring. The radiation characteristics of antenna mounted on vehicle body is carried out. The antenna has moderate gain and wider coverage in roll plane as well as azimuth plane and may be used as small, compact antenna for onboard telemetry applications

    A Study of Cross Layer Design compare with Layer Design for MANET

    Get PDF
    Mobile Ad – hoc networks (MANET) are becoming increasingly popular in wireless technology, especially for providing services in disaster area. Mobile users are looking forward to new technologies that allow them to communicate anytime, anywhere, and using any communication device. Mobile ad – hoc networks suffer from several performance limitations, especially related to excessive burden deriving from the layering approach for the TCP / IP protocol stack design. In fact, TCP / IP protocol stack originally designed for wired networks and it is not suitable for wireless and mobile ad hoc networks. In this paper, it focuses on cross layer network design which is especially for wireless and mobile ad hoc networks. The main objective is to how cross layer differ from layered design, cross layer design approaches, challenges of cross layer design and implementation of cross layer design based MANET. And also this article brief the readers an overview of cross layer concept while discussing different cross layer proposals given by researchers

    A Novel Approach to Enhance the Performance of RIP and RIPng Protocols For Ad Hoc Networks

    Get PDF
    In mobile ad hoc networks, there is a tradeoff between QOS and energy consumption because in order to achieve maximum quality of service , maximum energy has to be consumed. In this paper a novel approach is implemented ie integrating logical link control with MACto minimize the energy consumption and enhancing the performance of routing information protocol is studied in the context of best effort and QOS model in mobile ad hoc networks using EXATA Emulator.From emulation results we found that energy consumption ,jitter, end-to-end-dely decreases and throughput increases in QOSRIPngLLC

    A Multi-Objective Fuzzy Evolutionary Algorithm for Job Scheduling on Computational Grids

    Get PDF
    Scheduling jobs in grid computing is a challenging task. The job scheduling is a process of optimization of resource allocation for job completion in a optimum amount of time. There are various solutions like using dynamic programming, evolutionary algorithms etc., in literature. However, till date, no algorithm is found to be the best. This paper attempts a new job shop scheduling problem using a recent JAYA optimization algorithm. This work proposes a fuzzy based JAYA algorithm to minimize the makespan of the selected job scheduling problem. The main feature proposed is its simplicity due to the simple JAYA algorithm compared to other existing evolutionary algorithms. Experiments are conducted on four different data sets and the results are compared with other evolutionary and fuzzy based evolutionary algorithms. The proposed fuzzy based JAYA produced compatible results in terms of average makespan, flowtime and fitness

    FUTURE CONTRAPTION NETWORKS

    Get PDF
    Abstrac

    An Energy-efficient Multi-channel MAC Protocol for Cluster Based Wireless Sensor Networks

    Get PDF
    Abstract The research on wireless multimedia sensor networks (WMSNs) becomes more popular recently because multimedia sensor nodes largely improve the capability of wireless sensor networks for event description. WMSNs need large bandwidth to deliver multimedia contents effectively using energy-constrained sensor nodes because transmitting multimedia contents, such as video or audio clips, involves a large amount of data. In this paper, we propose an energy efficient, scalable and collision free multichannel medium access control protocol for cluster-based WMSNs to achieve high throughput, low medium access delay and high energy efficiency. The proposed MAC integrates the merits of frequency and time division principles to effectively utilize channels and timeslots assigned to sensor nodes. The proposed MAC also uses energy efficient techniques to reduce the number of nodes needed to send data to the cluster head. The proposed MAC is based on clustered network topology, and the protocol employs a simple algorithm for assigning channels among clusters to enable simultaneous non-interfering data collection. Intra-cluster transmissions are scheduled by cluster head (CH) based on time slot. CHs aggregate the gathered data and forward it over inter-CH paths to the base-station based on minimum spanning tree routing. Distinct channels are adopted by the independent branches of the inter-CH routing tree. The proposed MAC minimizes energy consumption by allowing nodes to stay in sleeping mode for the longest duration. Simulation demonstrated superiority of proposed MAC in terms of convergent rate, throughput and delay performance when compared with well-known protocol MMSN. With the low MAC delay feature, our protocol is suitable for applications of real time multimedia traffic sensing and transmitting, such as remote monitoring of hospital patients and fire spots

    OBJECT-BASED IMAGE ENHANCEMENT TECHNIQUE FOR GRAY SCALE IMAGES

    Get PDF
    ABSTRACT Image enhancement technique plays vital role in improving the quality of the image. Enhancement technique basically enhances the foreground information and retains the background and improve the overall contrast of an image. In some case the background of an image hides the structural information of an image. This paper proposes an algorithm which enhances the foreground image and the background part separately and stretch the contrast of an image at inter-object level and intra-object level and then combines it to an enhanced image. The results are compared with various classical methods using image quality measures. KEYWORDS Image Enhancement, Morphological watershed segmentation, Object-based contrast enhancement, Interobject stretching, Intra-object stretching
    corecore