389 research outputs found

    рдЕрдВрддрд░реНрд╕реНрдерд▓реАрдп рдорд╛рддреНрд╕реНрдпрд┐рдХреА рдореЗрдВ рдкрд░реНрдпрд╛рдмрд░рдгреАрдп рд╡реНрдпрддрд┐рдпрд╛рди

    Get PDF
    рдХреГрдкрдпрд╛ рдкреВрд░рд╛ рд▓реЗрдЦрд╛ рдкрдв

    INVESTIGATION ON RECYCLED GLASS AS A REPLACEMENT FOR FINE AGGREGATE IN CONCRETE

    Get PDF
    Waste management is becoming a major issue for communities worldwide. Glass, being non-biodegradable, is not suitable for addition to landfill and such recycling opportunities need to investigate. Continuous use of natural resources since ages has been depleting them at an alarming rate. Natural sand is the best form of the fine aggregate used in concrete till now. But continuous sand mining results in impure water in river which leads to an environment disaster. In the search for the replacement of sand, construction material waste and environmental waste materials got the focus of research people. Among these materials like waste glass can be an effective replacement for fine aggregate. This project studies the suitability of crushed glass as a possible substitute for conventional fine aggregate. Experimental investigation was carried out to evaluate the properties of concrete mixture in which the fine aggregate was replaced with the crushed glass in 20%, 40%, 60%, 80% & 100% by weight. Mechanical properties like compressive strength and tensile strength were determined at an age of 28 days. The test results indicate when crushed glass used as fine aggregate enhances the strength properties of concrete. It is found that 60% fine glass and 40% natural is the optimum proportion

    Eco-Biological studies of mangrove, Rhizophora species.

    Get PDF
    The occurence of mangrove forests is a characterestic feature of tropical intertidal zone. Dominated by many species of trees or shrubs, which have the ability to grow in saline or brackishwater, these plants exhibit a number of features that allow them to withstand the wide fluctuations of various factors in these ecosystems

    Iris Recognition Approach for Preserving Privacy in Cloud Computing

    Get PDF
    Biometric identification systems involve securing biometric traits by encrypting them using an encryption algorithm and storing them in the cloud. In recent decades, iris recognition schemes have been considered one of the most effective biometric models for identifying humans based on iris texture, due to their relevance and distinctiveness. The proposed system focuses on encrypting biometric traits. The userтАЩs iris feature vector is encrypted and stored in the cloud. During the matching process, the userтАЩs iris feature vector is compared with the one stored in the cloud. If it meets the threshold conditions, the user is authenticated. Iris identification in cloud computing involves several steps. First, the iris image is pre-processed to remove noise using the Hough transform. Then, the pixel values are normalized, Gabor filters are applied to extract iris features. The features are then encrypted using the AES 128-bit algorithm. Finally, the features of the test image are matched with the stored features on the cloud to verify authenticity. The process ensures the privacy and security of the iris data in cloud storage by utilizing encryption and efficient image processing techniques. The matching is performed by setting an appropriate threshold for comparison. Overall, the approach offers a significant level of safety, effectiveness, and accuracy

    A Survey on Entry Restriction System for the Fake Server Scheme

    Get PDF
    Phishing is an endeavor by an individual or a gathering to steal individual secret data, for example, passwords, MasterCard data and so forth from clueless casualties for wholesale fraud, monetary profit and other deceitful exercises. Visual cryptography is an exceptional kind of mystery sharing. In this paper we have proposed another approach for phishing sites characterization to tackle the issue of phishing. Phishing sites include an assortment of signals inside its substance parts and also the program based security pointers gave along the site. The utilization of pictures is investigated to save the security of picture captcha by deteriorating the first picture captcha into two shares that are put away in particular database servers with the end goal that the first picture captcha can be uncovered just when both are at the same time accessible; the individual sheet pictures don't uncover the personality of the first picture captcha. Once the first picture captcha is uncovered to the client it can be utilized as the secret word. A few arrangements have been proposed to handle phishing. By the by, there is no single enchantment shot that can illuminate this risk fundamentally. In this review, the creators shed light on the essential components that recognize phishing sites from genuine ones and survey how great govern based information mining grouping procedures are in anticipating phishing sites and which characterization system is ended up being more dependable

    EFFICACY OF CHUNDAI VATRAL CHOORNAM A SIDDHA POLY HERBAL FORMULATION IN TREATING TENSION TYPE OF HEADACHE (TTH) -A CASE REPORT

    Get PDF
    Siddha system is an ancient system of medicine which is popularly practised around south India particularly in Tamilnadu. Siddhars were considered as the pioneer of Siddha system, this system of medicine mainly encompasses for a healthy life for human beings. Among the broad spectrum of treatment aspects in Siddha system Siddhars classify the forms of internal medicines into 32 types which are all unique by its preparations. Choornam is one of the forms of internal medicine which can be used as single as well as poly herbal formulations. In this case report a poly-herbal formulation in Siddha system was used to treat tension type of headache (TTH). A 30 years old male patient visited out-patient department of Ayothidoss Pandither Hospital in National Institute of Siddha, Chennai. Patient reported with the complaints of episodic and chronic headache which is band like around the head, the intensity becomes mild to moderate, pain increased during working hours for past 2 years. Patient advised to follow the internal medicine Chundai vatral choornam it relives the TTH immediately when he got those symptoms.       &nbsp

    Evaluating the role of liver enzymes as predictors of severity of liver injury in patients with blunt abdominal trauma

    Get PDF
    Background: Liver is the 2nd most common organ affected in patients with blunt abdominal trauma (BAT). Computed tomography (CT) is the gold standard in the initial evaluation of the hemodynamically stable patient with suspected liver trauma. However, a challenge exists in centers devoid of CT scan, where an elevation in hepatic transaminases may provide guidance for the emergency physician in seeking further imaging and/or surgical consultation.Methods: In patients with suspected BAT blood samples were taken for estimation of liver enzymes (AST and ALT). All patients underwent contrast enhanced CT of the abdomen. Hemodynamically unstable patients were taken up for laparotomy and the findings were recorded. Based on imaging / surgery patients were subdivided into 2 groups (with and without liver injury). Liver injuries were graded according to organ injury scale by American Association of Surgery for Trauma.Results: ALT>100 units had 100% sensitivity and specificity improved to 83.78%. The mean level of ALT in patients without liver injury was around 64. This increased to 142 in grade 1 and upto 780 units in grade 4 injury. The same rising trend was seen when AST was evaluated against grade of Liver injury. This was statistically significant (p<0.01).Conclusions: ALT is the better of the transaminases in predicting liver injury. The rise in transaminases is directly proportional to grade of liver injury
    • тАж
    corecore