248 research outputs found

    SYNTHESIS AND MICROBIOLOGICAL EVALUATION OF 1-(4-METHYL-6-NITRO-2H-BENZO[B] [1,4]THIAZINE-3(4H)-YLIDENE)HYDRAZINE-1,1-DIOXIDE DERIVATIVES

    Get PDF
      Objective: The objective of this work was to synthesize and evaluate antimicrobial properties of 1-(4-methyl-6-nitro-2H-benzo[b][1,4]thiazine- 3(4H)-ylidene)hydrazine-1,1-dioxide derivatives.Methods: These new compounds were synthesized by methylation in 4-N and reacted with hydrazine derivatives and oxidized at the sulfur atom by 30% hydrogen peroxide to obtain sulfones. All the synthesized compounds were evaluated for antimicrobial activity using the disc diffusion method.Results: The Fourier transform infrared, 1H nuclear magnetic resonance (NMR), 13CNMR, and mass studies confirm the synthesis of some new 1-(4-methyl- 6-nitro-2H-benzo[b][1,4]thiazine-3(4H)-ylidene)hydrazine-1,1-dioxide derivatives. Compound 6f showed the potent antimicrobial activity.Conclusion: Result obtained in this research work clearly indicated that the compound 6f having methyl at 2 position and nitro groups at 2′ and 4′ position showed the most potent antimicrobial activity

    To introduce and measure the effectiveness of case based learning in physiology

    Get PDF
    Background: Student/learner centered strategies are needed to promote active learning in the students. Medical Council of India (MCI) also encourages learner centric approaches. Objectives of the study were to develop case scenarios for teaching in Physiology and use them to teach 1st professional MBBS students and to evaluate the impact of this intervention on students’ learning.Methods: After the approval from Institutional Ethics Committee (IEC) the study was conducted on MBBS 1st professional students. The students were taught two topics using CBL strategy. Pre-post test score were taken for evaluation of students’ learning. Students’ feedback was taken to elicit their perceptions about the effectiveness of the strategy. Faculty feedback was also taken for feasibility and implementation of CBL.Results: Majority of the students were satisfied with the session. Majority felt it to be a good learning experience and many wanted to attend more such sessions. Difference in the pre-post test scores was statistically highly significant.Conclusions: CBL proved to be an interesting and effective active learning strategy. More of such sessions should be conducted to engage the students as felt by students and faculty both

    SYNTHESIS AND ANTI-MICROBIAL ACTIVITY OF 1-(6-NITRO-2H-BENZO[b][1,4]THIAZINE-3(4H)-YLIDENE)HYDRAZINE-1,1-DIOXIDE DERIVATIVES

    Get PDF
    Objective: The objective of this research was to synthesize and evaluate anti-microbial properties of 1-(6-nitro-2H-benzo[b][1,4]thiazine-3(4H)-ylidene)hydrazine-1,1-dioxide derivatives.Methods: These new compounds were synthesized by reaction of 2H-benzo[b][1,4]thiazin-3(4H)-one with hydrazine derivatives and oxidized at the sulfur atom by 30% hydrogen peroxide to obtain sulfones. All the synthesized compounds were evaluated for antimicrobial activity using the disc diffusion method.Results: The FTIR, 1HNMR, 13CNMR and Mass studies confirms the synthesis of some new 1-(6-nitro-2H-benzo[b][1,4]thiazine-3(4H)-ylidene) hydrazine-1,1-dioxide derivatives. Compound 5f showed potent antimicrobial activity whereas compounds 5c and 5e showed moderate antimicrobial activity.Conclusion: Result obtained in this research work clearly indicated that the compound 5f having methyl at 2 position and nitro groups at 2′ and 4′ position showed the most potent antimicrobial activity.Â

    VANET: Analysis of Black hole Attack using CBR/UDP Traffic Pattern with Hash Function and GPSR Routing Protocol

    Get PDF
    With momentum of time huge development occurred in the field of MANET and VANET. As we know when new technology emerges it came with many advanages but definitely some limitation must be there. In WSN security is one of biggest challenges which we need to tackle to implement adhoc network. Main reason behind this is dynamic topology of sensing node because nodes are dynamic in nature rather than static. As technology came into existence side by side unethical activity also take place which try to access the data illegally to gain personnel profit. There are so many types of attack possibilities are there in adhoc network. Attack can be classified into active and passive. In our research article oue main concern is on black hole attack. According to this attack a malicious node with high priority number is deployed in between other nodes. Now this malicious node access the data and sends acknowledgement to source that data received. Source node will think that acknowledgement is sent by destination node but actually it is sent by malicious node.  In this research article performance analysis of the black hole attack in Vehicular Ad Hoc Network is executed

    EFFICIENT SCALE INVARIENT FEATURE BASED METHOD FOR CROWD LOCALIZATION

    Get PDF
    Visual surveillance has been a very active research topic in the last few decade due to growing importance for security in the public areas. With the increasing number of CCTV networks in public areas, the enhancement in the computing power of modern computers and increase the possibility to entrust an automatic system with the security and the monitoring of events involving large crowds is within reach. Crowd detection and localization in the surveillance video is the first step in automatic crowd monitoring system. The performance of the whole system depends on this step. Detecting the crowd is a challenging task because the crowds come in different shape, size and color, against cluttered background and varying illumination conditions. As the size of the crowd increases managing the crowd becomes more complex

    Survey on Image intensification using Canny Edge Technique

    Get PDF
    Image Processing is generally done in form of Signal Processing. In this images, pictures, video frame etc are given in Input form and the Output appears with certain set of features or parameters in relation to the input given. Edge Detection using Canny Technique is an set of Mathematical Functions whose main goal is to detect points in the Digital input i.e. image and detect how brightness changes variably , and where are discontinuities. Edge detection is an essential stage in processing the image. Mostly image-processing techniques consider the image as a two-dimensional signal then put standard signal-processing techniques to it. Generally it means Digital Image being processed but analog and digital signals can also be processed

    Survey of Vertical Handoff Decision Criteria in LTE Cellular Networks

    Get PDF
    Vertical handover advantage brilliant importance because of the upgrades in mobility fashions by way of the Fourth era (4G) technology. A handover desire scheme in LTE networks both based totally on unmarried or multiple criteria. The wide variety of standards is right away depending on the overall handover time. In addition, the time required for deciding on a target network at some point of handover is also extended with the growth in a number of parameters. Conventional handover choice Strategies are specifically based at the unmarried parameter. But, with the advent of heterogeneous Wi-Fi networks, the overall performance of those unmarried parameter choice schemes is highly decreased. Consequently, researchers introduce multirequirements handover selection schemes. those enhancements are restricted to specific situations and for this reason do now not offer help for mounted mobility. Further, numerous schemes are proposed

    Survey of Energy Efficient Clustering Mechanisms in Wireless Sensor Networks

    Get PDF
    Advancements in wireless communications and Micro-Electro-Mechanical structures have enabled the improvement of wireless sensor networks (WSN), which in flip have fostered the emergence of a plethora of programs in diverse fields together with agriculture, healthcare supervision, and transportation systems. However, because of the strength dilemma of battery-powered sensors, these packages nonetheless face a major energy issue that save you their giant adoption. In this thesis, we contributed to conquer this challenge via several contributions. In this paper we've got surveyed the various techniques to power efficient strategies in wi-fi sensor networks

    Vertical Handoff Decision Criteria with LTE Network

    Get PDF
    A handover decision scheme in LTE networks either based on single or multiple criteria. The number of criteria is directly depending on the totalhandovertime.A vertical handover decision algorithm based on the fuzzy control theory. The algorithm takes into consider the factors of Power Level, Cost and Bandwidth. After establishing the membership functions, membership degrees of corresponding factors can be determined, which are processed by the Weight Vector. Finally, the Fuzzy Vertical Handoff Decision Vector is derived and vertical handover decision can be made. It is shown through simulation that the algorithm realizes the optimized vertical handover by evaluating and analyzing various input parameters

    U-Shaped Microstrip Patch Antenna for WLAN/WIMAX Applications

    Get PDF
    A full-duplex radio design communication systems design based on the WiMax/WLAN antenna. The design an antenna in this report presented a triple-band operation with significant impedance bandwidth for WLAN/WiMAX system. The designed antenna having the compact size of 10 x 26 mm2 and shaped of antenna is U-shaped. The overall performance of the antenna three different bands 1) band-1:- 2.40 to 2.53 GHz, 2) band-2:-3.40 o 3.60 GHz and 3) band-3:- 5.00 to 6.00 GHz, these bands cover the WiMAX (2.5, 3.5, 5.5) and WLAN (2.4, 5.2, 5.8) bands. Here HFSS simulator used to simulate and validate the results. By combining the performance of complete WLAN/WiMAX antenna with MIMO antenna, the proposed MIMO antenna with wide operating frequencies 2.4 GHz. Thus the simulation results along with the given parameter values show that the antenna can simultaneously operate over WLAN, WiMAX and MIMO frequency bands
    • …
    corecore