133 research outputs found
Architecture for Automated Irrigation System
Agriculture sector provides food as well as large employment. Impact of agriculture development as traditional framing is unable to increase the crop yield. In our country , the growth of population is around 2% per year. Thus food production should increase about 2.6% per year to provide an effcient food intake. The use of water resources to be optimally connected and beneficially utilized with appropriate priorities of use. Therefore the real values of soil moisture, air humidity, temperature and water level in the soil are wirelessly transmitted using wireless technology and same is monitored for optimum production of crop production
Authentication System using Secret Sharing
Security using Authentication system is an important concern in the field of information technology. It is an important thing as per as concern to the ruling of internet over people today. The growth in the usage of internet has increased the demand for fast and accurate user identification and authentication. This New threats, risks and vulnerabilities emphasize the need of a strong authentication system. The cryptography is a secret sharing scheme where a secret data gets divided into number of pieces called shares and not a single share discloses any information about secret data. There are some automated methods to identify and verify the user based on the physiological characteristics. To deal with such methods, there is a technology called biometrics which measures and statistically analyses the biological data. The biometric samples which are stored in the database as a secret are unique for each user so that no one can predict those samples. A biometric authentication system provides automatic authentication of an individual on the basis of unique features or characteristics possessed by an individual. A cover image is fused with secret image; fused image is divided into n shares. k possible shares able to construct secret image. PSNR parameter are used for image quality The authentication system can be stronger using multiple factors for authentication process. The application like Aadhar Card uses more than one factor for authentication. There is some difficulty with authentication systems such as user privacy considerations in case of multiple biometric features, huge size databases and centralized database which may create security threats. To address such tribulations, the Authentication System using Secret Sharing is proposed, Secret sharing splits the centralized database across the different locations. This helps in reducing the database size and removal of threats in centralized database. Also user privacy is maintained due to the decentralized database
A Review on an Authentication System using Secret Sharing
Security using Authentication system is an important concern in the field of information technology. It is an important thing as per as concern to the ruling of internet over people today. The growth in the usage of internet has increased the demand for fast and accurate user identification and authentication. This New threats, risks and vulnerabilities emphasize the need of a strong authentication system. The cryptography is a secret sharing scheme where a secret data gets divided into number of pieces called shares and not a single share discloses any information about secret data. There are some automated methods to identify and verify the user based on the physiological characteristics. To deal with such methods, there is a technology called biometrics which measures and statistically analyses the biological data. The biometric samples which are stored in the database as a secret are unique for each user so that no one can predict those samples. A biometric authentication system provides automatic authentication of an individual on the basis of unique features or characteristics possessed by an individual. The authentication system can be stronger using multiple factors for authentication process. The application like Aadhar Card uses more than one factor for authentication. There is some difficulty with authentication systems such as user privacy considerations in case of multiple biometric features, huge size databases and centralized database which may create security threats. To address such tribulations, the Authentication System using Secret Sharing is proposed, Secret sharing splits the centralized database across the different locations. This helps in reducing the database size and removal of threats in centralized database. Also user privacy is maintained due to the decentralized database
ROLE OF SELF-BELIEF IN SUKRAGATAVATA (PREMATURE EJACULATION) AND ITS MANAGEMENT WITH RATIONAL EMOTIVE BEHAVIORAL THERAPY-A CASE SERIES.
Introduction: Premature ejaculation (PE) is the most common sexual dysfunction in young adults, generally correlated with Śukragatavāta (Premature ejaculation) in Ayurveda. It is a psychosexual disease resulting in low self-belief, anxiety, embarrassment and depression. Conversely, these common symptoms can also be the causes of premature ejaculation. Pharmacological drugs are effective but may cause many adverse effects. Psychotherapy in form of Rational Emotive Behavioral Therapy is an effective and safe option to treat both the biological and psychological aspects of premature ejaculation. Material and method: Case series of three patients complaining of premature ejaculation as per definition of DSM-V were selected from the OPD of Roga Evam Vikṛti Vij?āna, National Institute of Ayurveda, Jaipur and counselled 3 times for approximately 30 minutes in the interval of 7 days each time by Rational-Emotive Behavioral Therapy (REBT). Result: The mean Intra-vaginal ejaculatory latency time in patients was increased with 1 min 30 seconds, number of penile thrust increased by 6-7 thrust, Voluntary control over ejaculation improved considerably, self and partner satisfaction has considerable improvement and performance anxiety was considerably reduced. Conclusion: Psychological counselling enhances confidence and self-esteem in the patients and helps them to think positively and to partake sexual act enthusiastically by reducing performance anxiety. In premature ejaculation without any physiological cause, REBT plays very important role in its management
Low Cost Efficient Treatment for Contaminated Water
8 p.International audienceHeavy metals pose a risk of contaminating groundwater and surface water sources due to geogenic activities, industries and agricultural sources. The removal of heavy metals e.g., cadmium, lead, and zinc from drinking, industrial and irrigation water at low concentrations is a recurring challenge, especially in developing countries. Biosorption is a relatively new process that has proved to be very promising for removal of heavy metals from aqueous solutions. The removal of contaminants viz., Cd(II), Pb(II) and Zn(II) by rice husk (lignin containing material) was studied in the laboratory. Batch studies were performed to evaluate the influences of various experimental parameters like pH, initial concentration of metal ions, biosorbent dosage and contact time. The selectivity of the process is also studied. The findings show the efficiency of material for the removal these contaminants with a low concentration in the range 1-5 mg/L. The removal efficiency is up to 95%
Topology control in Heterogeneous Wireless Sensor Network
Topology of a Wireless Sensor Network determines the connectivity of the wireless network and topology Control is the important technique of extending network lifetime while preserving network connectivity. In this paper, we consider a heterogeneous multi-hop wireless sensor network consisting of sensor nodes and relay nodes. Relay nodes strategically deployed for fault tolerance and virtual backbone creation. We propose topology control algorithm based on hybrid approaches to maximize the topological network lifetime of the WSN. The experimental performance evaluation demonstrates the topology control with efficient use of relay nodes maximizes the network lifetime of WSNs
CSSTs: A Dynamic Data Structure for Partial Orders in Concurrent Execution Analysis
Dynamic analyses are a standard approach to analyzing and testing concurrent
programs. Such techniques observe program traces and analyze them to infer the
presence or absence of bugs. At its core, each analysis maintains a partial
order that represents order dependencies between events of the analyzed
trace . Naturally, the scalability of the analysis largely depends on
how efficiently it maintains . The standard data structure for this task has
thus far been vector clocks. These, however, are slow for analyses that follow
a non-streaming style, costing for inserting (and propagating) each new
ordering in , where is the size of , while they cannot handle
the deletion of existing orderings.
In this paper we develop collective sparse segment trees (CSSTs), a simple
but elegant data structure for generically maintaining a partial order .
CSSTs thrive when the width of is much smaller than the size of its
domain, allowing inserting, deleting, and querying for orderings in to run
in time. For a concurrent trace, is bounded by the number of its
threads, and is normally orders of magnitude smaller than its size , making
CSSTs fitting for this setting. Our experimental results confirm that CSSTs are
the best data structure currently to handle a range of dynamic analyses from
existing literature
The irrational fixed dose combinations in the Indian drug market: an evaluation of prescribing pattern using WHO guidelines
Background: Evaluation of the pattern of fixed dose combinations (FDCs) prescribing amongst the practitioners in a tertiary care hospital in Central India. Methods: Nine hundred and ninety four prescriptions, containing 639 FDCs were scrutinized in the tertiary care hospital. After excluding the total and the interdepartmental repetitions, the numbers of FDCs were 278, which were considered for final analysis. Inclusion criteria were FDCs from the major out-patient department (OPD) of the tertiary care hospital from January 2011 to December 2011. FDCs from the wards, casualty, infectious disease unit, intensive cardiac care unit (ICCU), tuberculosis and chest and HIV unit were excluded from the study. FDCs were analysed for the different pattern of prescribing and rationalism. Results were expressed as percentages. Results: Out of 639 FDCs, the most commonly prescribed FDCs were B complex (12.20%), pantoprazole plus domperidone (9.55%) and amoxicillin plus clavulanic acid (7.35%). Seventy percent of the FDCs were prescribed to the age group of 21-60 years. The FDCs were maximum from the department of medicine (25.59%), followed by surgery (15.47%) and ENT 13.69%. Out of 278 FDCs, only 5.4% were rational, and rest of the FDCs were irrational. Ninety five percent of all FDCs were brand names. The physicians were unaware of the active pharmacological ingredients (APIs) of 20.86% FDCs. Ninety two percent FDCs were available as over the counter (OTCs). Forty eight percent FDCs were costing from Rs. 0-50. There were 2.87% FDCs whose price was above Rs. 500.Conclusions: Irrational FDCs are prescribed by all the departments. Physicians were ignorant about the essential drugs and FDCs. Patients didn’t have access to rational medicines. Therefore, physicians and regulators should be alerted in time. Regulatory actions or government laws should be made mandatory. Availability and access to 348 essential medicines for basic health care should be the priority of the government. Implementation of central drug standard control organisations (CDSCO) guidelines on industries for manufacture of FDCs must be made compulsory
Comparative effectiveness of S-adenosylmethionine and etoricoxib in newly diagnosed patients of knee osteoarthritis
Background: Knee osteoarthritis is an important cause for morbidity in elderly people. Therapy is largely symptomatic with nonsteroidal anti-inflammatory drugs which pose risk in the elderly. Methionine is natural body constituent with novel property of blunting S-adenosylmethionine (SAMe) inflammatory process and cartilage degradation. The aim of this study was to compare effectiveness of SAMe, with standard etoricoxib therapy in newly diagnosed knee osteoarthritis cases.Methods: 127 newly diagnosed knee osteoarthritis patients were randomized into two groups. 55 participants received treatment of etoricoxib 600 mg extended release once daily for 90 days (group 1) and 72 received etoricoxib 600 mg extended release once daily and SAMe 400 mg twice daily for initial 15 days followed by SAMe once daily 400 mg as maintenance dose for next 75 days (group 2). The outcomes were measured by knee injury and osteoarthritis outcome score (KOOS). Pre and post treatment KOOS scores of all cases were separately pooled to define the median for whole as well as components of KOOS parameters. Relative frequencies of cases with values around respective medians were compared by MOODS median test. Patient characteristics, disease characteristics were also examined for bearing on outcomes besides the treatment.Results: SAMe treatment was associated with significantly greater improvement in symptoms, activities of daily life, spontaneous recreational activities and the quality of life compared to etoricoxib therapy. The therapy was well-tolerated.Conclusions: The study confirms SAMe as superior therapeutic option in osteoarthritis. SAMe indeed has been reported to have specific anti-arthritic effects and promotive to general well-being
- …