228 research outputs found

    Double Vision in Aravind Adiga's The White Tiger

    Get PDF
    Indian novels have increasingly turned to representing rural life. In addition to work produced by regional artists, the work of writers such as Munshi Premchand, in Hindi, and Sarat Chandra Chatterjee, in Bengali, reflects the everyday problems of rural communities. Premchand’s Godaan expresses profound indignation and protest against the obscurantist beliefs, archaic and harmful customs, and social distinctions that fetter rural Indian society. In K.S. Venkataramani’s novel Murugan, the Tiller, “The scene shifts from village to town and back from town (or city) to village, till [sic] at last one has the feeling that all roads lead to Murugan and his rural experiment” (Iyengar 279)

    Double Vision in Aravind Adiga's The White Tiger

    Get PDF

    M.leprae binds to a 28-30 kDa phosphorylated glycoprotein of rat peripheral nerve

    Get PDF
    This article does not have an abstract

    Comparative Studies on Antimicrobial and Antifungal Efficacy from Bixa Orellana L., Lantana Camara L., Stachytarpheta Jamaicensis (l.)vahl., Hyptis Suaveolens (l.) Poit.with Triclosan

    Get PDF
    The aim of the present study was to assess the Antimicrobial and Antifungal activities of the Phenolic leaf extracts of Bixa orellana L., Lantana camara L and Stachytarpheta jamaicensis (L.) Vahl. Hyptis suaveolens (L.) Piot. and the Triclosan, a chlorinated aromatic compound with antibacterial and antifungal properties used in common house hold and personal care products and to compare household and personal care products and to compare their effectiveness against 4 bacterial strains - 2 Gram Positive strains – Staphylococcus aurens and Bacillus substitis and 2 Gram negative strains – Escherischia coli and Pseudomonas fluorescens and 3 Fungi- Aspergillus niger, Aspergillus flavus and Mucor Sp., by Agar well diffusion Assay. The phenolic extracts of all the 4 plants showed Maximum (80-100%), Relative inhibition against Pseudomonas fluorescence, Moderate inhibition (30-70%) against Staphylococcus aurens and Bacillus substilis and least inhibition (30-47%) against Escherischia coli, while, the Antifungal efficacy of all the 4 Phenolic plant extracts were observed to be effective at the concentration ranging from 70-300 µg. The plant phenolic extracts for Antimicrobial and Antifungal properties were compared with Standard Triclosan, a chlorinated compound. Our studies showed that the phenolic components of plant origin for antibacterial activity were equivalent to Triclosan with the same concentration, while for antifungal activity slightly higher concentrations could be a better alternative and hence there could be a substitution for Triclosan by Plant Phenolic Extracts used in house hold and personal care products, in future days to come

    A Newfangled Authentication Protocol Based On Audio Produced Principles

    Get PDF
    Graphical authentication is more proficient and more securable. An imperative convenience objective for information based authentication frameworks is to bolster client in selecting passwords for higher security in the feeling of being from an extended viable security space. Here we are utilizing x and y directions to pick a photo secret word. Also the photos in x and y directions are changing haphazardly and subsequently it is hard to locate the first picture. In our base paper the methodologies utilized are "Convincing signaled snap focuses"," Cued snap focuses" and "Pass focuses". Primary apparatuses utilized here are pccp, viewport and that is utilized for secret word creation. Viewport methodologies are utilized to significant client picked secret word and secure framework created arbitrary watchword that are hard to recollect. The pccp making a less guessable secret key is the least demanding game-plan. With a specific end goal to dodge "Shoulder surfing" calculation we are going for AES (Advanced encryption standard). In a contemporary mastery, the customary Authentication methodologies like "alphanumeric - usernames and passwords" can't be a versatile secured technique as it make out a critical downsides. It can't be protected and sound from programmers. Graphical passwords are a different option for existing alphanumeric passwords. In Graphical passwords clients click on pictures than sort a long, complex secret key. Exhaustive examination is finished by different analysts proposes that the photo's majority based authentication plans are essentially delicate as client tends to tap on hotspots in the pictures. A hotspot is the picture's territory which is effectively perceived against every single other picture, accordingly making such strategies defenseless. To make greater from the available confirmation, another convention "in light of the sound time stamps" making it hard for the shams to perform mystery. Here is a novel one of a kind answer for graphical validation defining so as To take into account sound time stamps another method for model called "A NEWFANGLED AUTHENTICATION PROTOCOL BASED ON AUDIO PRODUCED PRINCIPLES ". This model calls a sound time stamps and in addition the number of sound timestamps and scramble the secret word with message digest adaptation 5 and making it hard for the gatecrasher to break the watchword there by forcing the more elevated amounts of security to the framework. The gatecrasher can't get the time stamps and additionally check of time stamps and making this strategy more secure, dependable and difficult to figure

    A Study on Inventory Management in Manufacturing Industry with specific reference to Bangalore

    Get PDF
    The study evaluates inventory control aspects, including turnover, stock outs, carrying costs, and order fulfilment rates.Commendable aspects of industryof current practices include maintaining adequate stock levels and minimizing excess inventory. However, opportunities for improvement lie in enhancing demand forecasting accuracy and real-time stock monitoring. The study suggests integrating advanced technologies and data analytics to address these gaps. Using the secondary data of the balance sheet we have analysed the inventory turnover, growth of total inventory, current assets on raw materials. Also, we have analysed the ABC analysis of the materials. The result shows that the business has maintained a relatively high percentage of inventories on current assets, indicating its reliance on inventory as a key asset

    A STUDY ON FINANCIAL RISK AT FOOD AND HOSPITALITY INDUSTRY FOOD AND HOSPITALITY SERVICES

    Get PDF
    This article explores the critical issue of financial risk management within the context of Food and hospitality industry Food and Hospitality Services, a dynamic player in the food and hospitality industry. In today’s fast-paced and competitive business environment, financial risk is an ever-present concern that can significantly impact the stability and growth of an organization. Food and hospitality industry's success relies on its ability to adapt and proactively address financial risks to ensure long-term sustainability

    TRUTHFUL ACCESS CONTROL OF GRANULAR AGENTS FOR CLOUD-BASED SERVICES

    Get PDF
    A as of late offered get right of entry to keep an eye on original referred to as attribute-based get admission to keep an eye on is an efficient bidder to take on the 1st teaser. It-not most effective provides you know who corroboration but also in addition defines get admission to keep watch over policies per face inside the requester, air, or perchance the data tangle. In an attribute-based get entry to keep watch over arrangement. There are a variety of applying cloud-computing, let's say testimony discussing, knowledge arsenal, big memorandums care, healing break procedure etc. The usual account/password-based proof is not separateness preserving. However, it's properly sanctioned such solitude is a crucial item subsequent regarded as in cloud-computing practices. The umbrella notion of key-insulated cover finished up allow hide lengthy-term keys within a physically-secure but computationally-limited machine. Short-term hush-hush keys are depot by enjoyers at the potent but rocky project locus cryptographic computations transpire. Within previously mentioned news, we suggest a superb-grained two-factor get right of entry to keep an eye on agreement for web-based cloud-computing services and products, utilizing a trivial redemption apparatus. Our compact supports slender attribute-based get right of entry to which provides an exceptional ambidexterity for this process to organize the several get entry to policies in response to the various scenarios. Simultaneously, the separation with the buyer can be preserved
    • …
    corecore