133 research outputs found

    Architecture for Automated Irrigation System

    Get PDF
    Agriculture sector provides food as well as large employment. Impact of agriculture development as traditional framing is unable to increase the crop yield. In our country , the growth of population is around 2% per year. Thus food production should increase about 2.6% per year to provide an effcient food intake. The use of water resources to be optimally connected and beneficially utilized with appropriate priorities of use. Therefore the real values of soil moisture, air humidity, temperature and water level in the soil are wirelessly transmitted using wireless technology and same is monitored for optimum production of crop production

    Authentication System using Secret Sharing

    Get PDF
    Security using Authentication system is an important concern in the field of information technology. It is an important thing as per as concern to the ruling of internet over people today. The growth in the usage of internet has increased the demand for fast and accurate user identification and authentication. This New threats, risks and vulnerabilities emphasize the need of a strong authentication system. The cryptography is a secret sharing scheme where a secret data gets divided into number of pieces called shares and not a single share discloses any information about secret data. There are some automated methods to identify and verify the user based on the physiological characteristics. To deal with such methods, there is a technology called biometrics which measures and statistically analyses the biological data. The biometric samples which are stored in the database as a secret are unique for each user so that no one can predict those samples. A biometric authentication system provides automatic authentication of an individual on the basis of unique features or characteristics possessed by an individual. A cover image is fused with secret image; fused image is divided into n shares. k possible shares able to construct secret image. PSNR parameter are used for image quality The authentication system can be stronger using multiple factors for authentication process. The application like Aadhar Card uses more than one factor for authentication. There is some difficulty with authentication systems such as user privacy considerations in case of multiple biometric features, huge size databases and centralized database which may create security threats. To address such tribulations, the Authentication System using Secret Sharing is proposed, Secret sharing splits the centralized database across the different locations. This helps in reducing the database size and removal of threats in centralized database. Also user privacy is maintained due to the decentralized database

    A Review on an Authentication System using Secret Sharing

    Get PDF
    Security using Authentication system is an important concern in the field of information technology. It is an important thing as per as concern to the ruling of internet over people today. The growth in the usage of internet has increased the demand for fast and accurate user identification and authentication. This New threats, risks and vulnerabilities emphasize the need of a strong authentication system. The cryptography is a secret sharing scheme where a secret data gets divided into number of pieces called shares and not a single share discloses any information about secret data. There are some automated methods to identify and verify the user based on the physiological characteristics. To deal with such methods, there is a technology called biometrics which measures and statistically analyses the biological data. The biometric samples which are stored in the database as a secret are unique for each user so that no one can predict those samples. A biometric authentication system provides automatic authentication of an individual on the basis of unique features or characteristics possessed by an individual. The authentication system can be stronger using multiple factors for authentication process. The application like Aadhar Card uses more than one factor for authentication. There is some difficulty with authentication systems such as user privacy considerations in case of multiple biometric features, huge size databases and centralized database which may create security threats. To address such tribulations, the Authentication System using Secret Sharing is proposed, Secret sharing splits the centralized database across the different locations. This helps in reducing the database size and removal of threats in centralized database. Also user privacy is maintained due to the decentralized database

    ROLE OF SELF-BELIEF IN SUKRAGATAVATA (PREMATURE EJACULATION) AND ITS MANAGEMENT WITH RATIONAL EMOTIVE BEHAVIORAL THERAPY-A CASE SERIES.

    Get PDF
    Introduction: Premature ejaculation (PE) is the most common sexual dysfunction in young adults, generally correlated with Śukragatavāta (Premature ejaculation) in Ayurveda. It is a psychosexual disease resulting in low self-belief, anxiety, embarrassment and depression. Conversely, these common symptoms can also be the causes of premature ejaculation. Pharmacological drugs are effective but may cause many adverse effects. Psychotherapy in form of Rational Emotive Behavioral Therapy is an effective and safe option to treat both the biological and psychological aspects of premature ejaculation. Material and method: Case series of three patients complaining of premature ejaculation as per definition of DSM-V were selected from the OPD of Roga Evam Vikṛti Vij?āna, National Institute of Ayurveda, Jaipur and counselled 3 times for approximately 30 minutes in the interval of 7 days each time by Rational-Emotive Behavioral Therapy (REBT). Result: The mean Intra-vaginal ejaculatory latency time in patients was increased with 1 min 30 seconds, number of penile thrust increased by 6-7 thrust, Voluntary control over ejaculation improved considerably, self and partner satisfaction has considerable improvement and performance anxiety was considerably reduced. Conclusion: Psychological counselling enhances confidence and self-esteem in the patients and helps them to think positively and to partake sexual act enthusiastically by reducing performance anxiety. In premature ejaculation without any physiological cause, REBT plays very important role in its management

    Low Cost Efficient Treatment for Contaminated Water

    Get PDF
    8 p.International audienceHeavy metals pose a risk of contaminating groundwater and surface water sources due to geogenic activities, industries and agricultural sources. The removal of heavy metals e.g., cadmium, lead, and zinc from drinking, industrial and irrigation water at low concentrations is a recurring challenge, especially in developing countries. Biosorption is a relatively new process that has proved to be very promising for removal of heavy metals from aqueous solutions. The removal of contaminants viz., Cd(II), Pb(II) and Zn(II) by rice husk (lignin containing material) was studied in the laboratory. Batch studies were performed to evaluate the influences of various experimental parameters like pH, initial concentration of metal ions, biosorbent dosage and contact time. The selectivity of the process is also studied. The findings show the efficiency of material for the removal these contaminants with a low concentration in the range 1-5 mg/L. The removal efficiency is up to 95%

    Topology control in Heterogeneous Wireless Sensor Network

    Get PDF
    Topology of a Wireless Sensor Network determines the connectivity of the wireless network and topology Control is the important technique of extending network lifetime while preserving network connectivity. In this paper, we consider a heterogeneous multi-hop wireless sensor network consisting of sensor nodes and relay nodes. Relay nodes strategically deployed for fault tolerance and virtual backbone creation. We propose topology control algorithm based on hybrid approaches to maximize the topological network lifetime of the WSN. The experimental performance evaluation demonstrates the topology control with efficient use of relay nodes maximizes the network lifetime of WSNs

    CSSTs: A Dynamic Data Structure for Partial Orders in Concurrent Execution Analysis

    Full text link
    Dynamic analyses are a standard approach to analyzing and testing concurrent programs. Such techniques observe program traces and analyze them to infer the presence or absence of bugs. At its core, each analysis maintains a partial order PP that represents order dependencies between events of the analyzed trace σ\sigma. Naturally, the scalability of the analysis largely depends on how efficiently it maintains PP. The standard data structure for this task has thus far been vector clocks. These, however, are slow for analyses that follow a non-streaming style, costing O(n)O(n) for inserting (and propagating) each new ordering in PP, where nn is the size of σ\sigma, while they cannot handle the deletion of existing orderings. In this paper we develop collective sparse segment trees (CSSTs), a simple but elegant data structure for generically maintaining a partial order PP. CSSTs thrive when the width kk of PP is much smaller than the size nn of its domain, allowing inserting, deleting, and querying for orderings in PP to run in O(logn)O(logn) time. For a concurrent trace, kk is bounded by the number of its threads, and is normally orders of magnitude smaller than its size nn, making CSSTs fitting for this setting. Our experimental results confirm that CSSTs are the best data structure currently to handle a range of dynamic analyses from existing literature

    The irrational fixed dose combinations in the Indian drug market: an evaluation of prescribing pattern using WHO guidelines

    Get PDF
    Background: Evaluation of the pattern of fixed dose combinations (FDCs) prescribing amongst the practitioners in a tertiary care hospital in Central India. Methods: Nine hundred and ninety four prescriptions, containing 639 FDCs were scrutinized in the tertiary care hospital. After excluding the total and the interdepartmental repetitions, the numbers of FDCs were 278, which were considered for final analysis. Inclusion criteria were FDCs from the major out-patient department (OPD) of the tertiary care hospital from January 2011 to December 2011. FDCs from the wards, casualty, infectious disease unit, intensive cardiac care unit (ICCU), tuberculosis and chest and HIV unit were excluded from the study. FDCs were analysed for the different pattern of prescribing and rationalism. Results were expressed as percentages. Results: Out of 639 FDCs, the most commonly prescribed FDCs were B complex (12.20%), pantoprazole plus domperidone (9.55%) and amoxicillin plus clavulanic acid (7.35%). Seventy percent of the FDCs were prescribed to the age group of 21-60 years. The FDCs were maximum from the department of medicine (25.59%), followed by surgery (15.47%) and ENT 13.69%. Out of 278 FDCs, only 5.4% were rational, and rest of the FDCs were irrational. Ninety five percent of all FDCs were brand names. The physicians were unaware of the active pharmacological ingredients (APIs) of 20.86% FDCs. Ninety two percent FDCs were available as over the counter (OTCs). Forty eight percent FDCs were costing from Rs. 0-50. There were 2.87% FDCs whose price was above Rs. 500.Conclusions: Irrational FDCs are prescribed by all the departments. Physicians were ignorant about the essential drugs and FDCs. Patients didn’t have access to rational medicines. Therefore, physicians and regulators should be alerted in time. Regulatory actions or government laws should be made mandatory. Availability and access to 348 essential medicines for basic health care should be the priority of the government. Implementation of central drug standard control organisations (CDSCO) guidelines on industries for manufacture of FDCs must be made compulsory

    Comparative effectiveness of S-adenosylmethionine and etoricoxib in newly diagnosed patients of knee osteoarthritis

    Get PDF
    Background: Knee osteoarthritis is an important cause for morbidity in elderly people. Therapy is largely symptomatic with nonsteroidal anti-inflammatory drugs which pose risk in the elderly. Methionine is natural body constituent with novel property of blunting S-adenosylmethionine (SAMe) inflammatory process and cartilage degradation. The aim of this study was to compare effectiveness of SAMe, with standard etoricoxib therapy in newly diagnosed knee osteoarthritis cases.Methods: 127 newly diagnosed knee osteoarthritis patients were randomized into two groups. 55 participants received treatment  of etoricoxib 600 mg extended release once daily for 90 days (group 1) and 72 received  etoricoxib 600 mg extended release once daily and SAMe 400 mg twice daily  for initial 15 days followed by SAMe once daily 400 mg as maintenance dose for next 75 days  (group 2). The outcomes were measured by knee injury and osteoarthritis outcome score (KOOS). Pre and post treatment KOOS scores of all cases were separately pooled to define the median for whole as well as components of KOOS parameters. Relative frequencies of cases with values around respective medians were compared by MOODS median test. Patient characteristics, disease characteristics were also examined for bearing on outcomes besides the treatment.Results: SAMe treatment was associated with significantly greater improvement in symptoms, activities of daily life, spontaneous recreational activities and the quality of life compared to etoricoxib therapy. The therapy was well-tolerated.Conclusions: The study confirms SAMe as superior therapeutic option in osteoarthritis. SAMe indeed has been reported to have specific anti-arthritic effects and promotive to general well-being
    corecore