291 research outputs found

    Virtue in Maruthakali

    Get PDF
    Kalithogai, is one among the Ettuthogai book. This book deals with home life, love, culture, customs and traditions. It is divided into five parts. One should judge a person based on his/her moral values. The best virtue is to protect moral values one has attained and return it to the rightful person at the right time. There are many virtue in Maruthakali. The people of Marutham land are rich for six months due to the yield of paddy, sugarcane. Marutham is filled with plenty of land and water resources.  It is said in Maruthakali that the man who lives without looking for the afterlife is the possessor and that the best gift is helping the needy without denying. This article is intended to highlight the human life through such Maruthakali songs

    DIGITAL SIGNATURE IN CYBER SECURITY

    Get PDF
    For secure exchanges over open organizations, the Digital Signature method is basic. It is having assortments of uses to guarantee the uprightness of information traded or put away and to demonstrate the character of the originator to the beneficiary. Computerized Signature plans are regularly utilized in cryptographic conventions to offer types of assistance like element verification, confirmed key vehicle and validated key arrangement. Multi-biometric frameworks are as a rule perpetually sent in some huge scope biometric applications (e.g., FBI-IAFIS, UIDAI plot in India) since they have many points of interest, for example, second rate mistake rates and more prominent people inclusion contrasted with uni-biometric frameworks. In this paper, we propose a component level combination system to all the while ensure various layouts of a client as a sole secure sketch. Our main commitments include: 1) useful execution of the proposed highlight level combination development utilizing two notable biometric cryptosystems, in particular, fluffy vault and fluffy responsibility, and 2) nitty gritty investigation of the compromise between coordinating exactness and security in the proposed multibiometric cryptosystems dependent on two divergent information bases (one genuine and one virtual multimodal information base), each containing the three most famous biometric modalities, to be specific, unique mark, iris, and face. Test results give subtleties that together the multibiometric cryptosystems proposed here have progressed safe-haven and equal execution contrasted with their uni-biometric partners

    A STUDY OF SURVEY IN DATA SCIENCE

    Get PDF
    Information Science has been set up as a significant rising logical field and worldview driving examination development in such teaches as measurements, processing science and insight science, and functional change in such spaces as science, designing, the public area, business, social science, and way of life. The field includes the bigger areas of man-made brainpower, information examination, AI, design acknowledgment, characteristic language understanding, and huge information control. It likewise handles related new scientific challenges, going from information catch, creation, stockpiling, recovery, sharing, examination, enhancement, and visualization, to integrative investigation across heterogeneous and reliant complex assets for better dynamic, joint effort, and, at last, esteems creation. Information science is the investigation of the generalizable extraction of information from information. It incorporates an assortment of parts and creates on strategies and ideas from numerous areas, containing arithmetic, likelihood models, AI, measurable learning, PC programming, information designing, design acknowledgment and learning, perception and information warehousing intending to separate an incentive from information. The motivation behind this paper is to give a diagram of open source (OS) information science devices, proposing a grouping plan that can be utilized to consider OS information science programming

    TOWARD MORE ACCURATE IRIS RECOGNITION USING DILATED RESIDUAL FEATURES

    Get PDF
    Since of the expanding prominence of iris biometrics, new sensors are being produced for procuring iris pictures and existing ones are in effect ceaselessly overhauled. Re-selecting clients each time another sensor is conveyed is costly and tedious, particularly in applications with countless enlisted clients. In any case, ongoing examinations show that cross-sensor coordinating, where the test tests are checked utilizing information enlisted with an alternate sensor, regularly lead to diminished execution. In this dissertation, we propose an AI procedure to moderate the cross-sensor execution debasement by adjusting the iris tests starting with one sensor then onto the next. We first present a novel advancement structure for learning changes on iris biometrics. We at that point use this structure for sensor transformation, by diminishing the distance between tests of a similar class, and expanding it between tests of various classes, independent of the sensors obtaining them. Broad assessments on iris information from different sensors show that the proposed technique prompts improvement in cross-sensor acknowledgment precision. Moreover, since the proposed strategy requires negligible changes to the iris acknowledgment pipeline, it can undoubtedly be fused into existing iris acknowledgment frameworks

    EFFECT OF DROTAVERINE, A PHOSPHODIESTERASE 4 INHIBITOR IN SCOPOLAMINE-INDUCED COGNITIVE IMPAIRMENT IN RATS

    Get PDF
    Objective: Cognitive impairment (CI) is a progressive neurodegenerative disorder and causes significant dementia in the elderly. Intracellular cyclic AMP (cAMP) signaling has been well established in the mediation of memory. Phosphodiesterases (PDEs) are enzymes that catalyze the hydrolysis of cAMP and/or cyclic GMP. Drotaverine is a novel non-anticholinergic smooth muscle antispasmodic which acts by inhibiting PDE-4. It is now clinically used in smooth muscle spasms (intestinal, biliary and renal colic, irritable bowel syndrome, uterine spasms, etc.) without anticholinergic side effects. Since Drotaverine has PDE4 inhibition property, its role in learning and memory was evaluated in this study and found that it has memory enhancing effect comparable with donepezil in scopolamine-induced CI in rats. Methods: Learning and memory were assessed with two behavioral models, namely, elevated plus maze (EPM) and Y maze. CI was produced by scopolamine. Rats were divided into five groups, Group I treated with normal saline, Group II treated with scopolamine, and Groups III, IV, and V were treated with donepezil, Drotaverine, and both, respectively. Results: The result analysis revealed significant differences in transfer latency in EPM performance between Groups III, IV, V and Group II (***p<0.001). The results of spontaneous alternation in Y maze show that there was a significant difference among all the treatments groups (p<0.001). Conclusion: Drotaverine has promising memory enhancing effect in CI induced by scopolamine in rats. Further clinical trials are needed to prove this finding which has been elicited in animal models

    THREATS IN CYBER SECURITY

    Get PDF
    The dramatic development of the Internet interconnections has prompted a huge development of digital assault occurrences frequently with lamentable and egregious groupings. Malware is the essential decision of weapon to do vindictive expectations in the internet, either by abuse into existing weaknesses or usage of exceptional attributes of arising innovations. The improvement of more inventive and powerful malware safeguard systems has been viewed as a pressing necessity in the network protection network. To help with accomplishing this objective, we first present an outline of the most misused weaknesses in existing equipment, programming, and organization layers. The expansive goal of this examination is an assault, danger and weaknesses of digital foundation, which incorporate equipment and programming frameworks, organizations, venture organizations, intranets, and its utilization of the digital interruptions. To accomplish this target, the paper endeavours to clarify the significance g in organization interruptions and digital burglary. It likewise talks about in distinctive detail, the explanations behind the fast widening of cybercrime. We at that point talk about new assault designs in arising advancements, for example, web-based media, cloudcomputing, PDA innovation, and basic framework. At long last, we depict our theoretical perceptions on future exploration bearings

    NETWORK SECURITY IN CRYPTOGRAPHY

    Get PDF
    Association Security and Cryptography is a plan to guarantee association and data transmission over far off association. Data Security is the central piece of secure data transmission over sensitive association. Association security remembers the endorsement of permission to data for an association, which is obliged by the association executive. Customers pick or are consigned an ID and mystery state or other affirming information that grants them induction to information and ventures inside their capacity. Association security covers an arrangement of PC associations, both public and private, that are used in customary positions driving trades and exchanges among associations, government workplaces and individuals. Associations can be private, for instance, inside an association, and others which might be accessible to network. Association security is locked in with affiliations, adventures, and various kinds of establishments. Aggravation receptive association (DTN) progressions are getting victorious plans that award center points to talk with each other in these absurd frameworks organization conditions. Consistently, when there is no restriction to-end relationship between a source and a goal pair, the messages from the source center point may require keeping things under control in the center points for a lot of time impending the affiliation would be in the end set up. The possibility of value based encryption (ABE) is a capable technique that fulfills the requirements for secure data recuperation in DTNs. Especially, Cipher text-Policy ABE (CP-ABE) gives a versatile technique for encoding data with the ultimate objective that the scramble or portrays the property set that the unscramble or needs to need to translate the code text. Thusly, divergent customers are allowable to unscramble different pieces of data per the security system

    DATA SCIENCE TECHNIQUES AND MAINTANENCE

    Get PDF
    Upkeep expects to lessen and dispose of the quantity of disappointments happened during creation as any breakdown of machine or hardware may prompt interruption for the production network. Upkeep strategy is set to give the direction to choosing the most practical support approach and framework to accomplish operational wellbeing. Digitalisation is contended to expand the effectiveness of upkeep exercises in a creation framework. One result of digitalisation is information storm; this permits information examination strategies and innovations to be utilized. Be that as it may, the real information insightful techniques and advancements utilized may contrast, hence prompting numerous logical papers on this theme. The motivation behind our commitment is to discover and group logical papers with respect to the executed methodologies significant for use underway support. To portray expected advantages of utilizing information investigation techniques to improve support measures. After a short prologue to a mechanized, multi-step support measure and a study of the condition of information in industry, we clarify, how chosen information examination techniques can be utilized to improve upkeep request discovery. The consequences of this investigation extensively sum up the examination exercises underway upkeep, while showing that the effect of information investigation will become further. Explicit methodological methodologies are obviously preferred
    corecore