226 research outputs found
Comparing the personal oral hygiene practices among Government and Private school children of Mahabubnagar, Telangana state - A cross sectional study
Introduction: Oral health is fundamental to general health and well-being. A healthy mouth enables an individual to talk, eat, and socialize without experiencing active disease, discomfort, or embarrassment. Objectives: To assess the knowledge and oral hygiene practices of school children from both Government and Private schools in Mahabubnagar district. Materials and Methods: A total of 150 children aged 11–15 years were randomly selected from six Private and six Government schools. A questionnaire related to their personal and oral hygiene practices was distributed to the school children. Results: The results of this study showed thatmost respondents had a good knowledge of basic hygiene measures and positive attitude towards oral hygiene. The students of both schools exhibited poor oral hygiene practices but were significantly reported more in the Government school than in the Private schools (p<0.005). Majority of the respondents (91.3%) used a commercial toothbrush and toothpaste and half of them (50%) reported brushing twice a day. Two-third of the respondents (75%), had never visited a dental clinic. Conclusion: The results of the present study showed that the knowledge and oral hygiene practices of Government school children were less satisfactory in someaspects when compared to private school children. 
Elastic behavior of neodymium based manganites
a b s t r a c t With a view to investigate the elastic behavior of Nd 0.67 A 0.33 MnO 3 (where A = Ca, Sr, Ba, Pb) manganite system, the samples were prepared by the sol gel method. After characterizing the samples structurally, a systematic investigation of ultrasonic longitudinal and transverse sound velocities of all the samples was undertaken by pulse transmission technique in the temperature range, 100-300 K. It has been found that all the elasticity parameters, including Debye temperature, are found to increase continuously with increasing ionic radii of the dopant ion. All the samples are also found to exhibit anomalies in both the longitudinal and transverse velocities near their ferro to para magnetic transition (T C ) temperatures. Apart from this, Nd 0.67 Ca 0.33 MnO 3 sample is also found to exhibit, a transition at its charge ordering temperature (T co ). An explanation for the observed elastic anomalies based on a mean field theory has been given
Secure data sharing in cloud computing: a comprehensive review
Cloud Computing is an emerging technology, which relies on sharing computing resources. Sharing of data in the group is not secure as the cloud provider cannot be trusted. The fundamental difficulties in distributed computing of cloud suppliers is Data Security, Sharing, Resource scheduling and Energy consumption. Key-Aggregate cryptosystem used to secure private/public data in the cloud. This key is consistent size aggregate for adaptable decisions of ciphertext in cloud storage. Virtual Machines (VMs) provisioning is effectively empowered the cloud suppliers to effectively use their accessible resources and get higher benefits. The most effective method to share information resources among the individuals from the group in distributed storage is secure, flexible and efficient. Any data stored in different cloud data centers are corrupted, recovery using regenerative coding. Security is provided many techniques like Forward security, backward security, Key-Aggregate cryptosystem, Encryption and Re-encryption etc. The energy is reduced using Energy-Efficient Virtual Machines Scheduling in Multi-Tenant Data Centers
Quantitative profile Analysis of Mulberry Silkworm Bombyx mori. L (CSR 2 XCSR 4 )
ABSTRACT Bombyx mori. L. (CSR 2 XCSR 4 ) is a bivolitne crossbreed that produces high quantity of silk. The weights of worms and glands are directly related to the yield of silk, higher larval weights leads to higher silk production. In the present study, quantitative parameters of 5 th instar and pupal stages of silkworm larvae were observed. The analysis of quantitative estimation showed that the maximum weights and lengths of silk gland and silk worm were recorded on 7 th day of 5 th instar larval stage. The day dependent variation in protein concentration was observed in total silk gland 5 th instar larval and pupal stages
Development of a RP-HPLC method for evaluation of in vitro permeability of voriconazole in the presence of enhancers through rat skin
AbstractAn isocratic RP-HPLC–UV method for the analysis of voriconazole in skin diffusate samples has been developed and validated. Experimental design was employed to optimize the method. The method was validated as per ICH guidelines. Linearity was observed over the concentration range of 2–100μgmL−1 (r2=0.999). Limits of detection and quantification were 0.6 and 2μgmL−1, respectively. Intra-day and inter-day precision (% RSD) was within the ICH limits (⩽2%). The method was successfully used to analyze skin diffusate samples, and the effectiveness of different permeation enhancers was compared with respect to flux and permeability coefficient
Secure Data Sharing in Cloud Computing: A Comprehensive Review
Cloud Computing is an emerging technology, which relies on sharing computing resources. Sharing of data in the group is not secure as the cloud provider cannot be trusted. The fundamental difficulties in distributed computing of cloud suppliers is Data Security, Sharing, Resource scheduling and Energy consumption. Key-Aggregate cryptosystem used to secure private/public data in the cloud. This key is consistent size aggregate for adaptable decisions of ciphertext in cloud storage. Virtual Machines (VMs) provisioning is effectively empowered the cloud suppliers to effectively use their accessible resources and get higher benefits. The most effective method to share information resources among the individuals from the group in distributed storage is secure, flexible and efficient. Any data stored in different cloud data centers are corrupted, recovery using regenerative coding. Security is provided many techniques like Forward security, backward security, Key-Aggregate cryptosystem, Encryption and Re-encryption etc. The energy is reduced using Energy-Efficient Virtual Machines Scheduling in Multi-Tenant Data Centers
Resource allocation in the cloud for video-on-demand applications using multiple cloud service providers
Abstract
Video-on-demand (VoD) applications have become extensively used nowadays. YouTube is one of the most extensively
used VoD application. These applications are used for various purposes like entertainment, education, media, etc., of all
age groups. Earlier, these applications were supported by private data centers and application servers. Sufficient infrastructure had to be bought and maintained, to support the demand even during unexpected peak times. This approach caused
huge loss of resources when the demand is normal as a large portion of the resources remained idle. To overcome this, VoD
application providers moved to the cloud, to host their video content’s. This approach reduced the wastage of resources and
the maintenance cost of the VoD application provider. The problem is to determine the number of resources to handle the
demand while maintaining QoS for every instance. We have designed two algorithms in this paper, namely the multiple
cloud resource allocation (MCRA) algorithm and the hybrid MCRA algorithm. Most of the cloud service providers (CSPs)
basically provide two types of resource allocation schemes: (i) the reservation scheme and (ii) the on-demand scheme. The
reservation scheme provides time-based tariff prices, where the discount is provided for the resources depending on their
quantity and reservation time. This scheme is used in the MCRA algorithm to reduce the cost of the VoD application
provider. In Hybrid MCRA algorithm both the reservation scheme and on-demand scheme are implemented, to overcome
the drawbacks of the MCRA algorithm which are under-subscription and over-subscription. We have analyzed both the
algorithms in terms of cost and allocation of resources. These algorithms can help allocate resources in of cloud for VoD
applications in a cost-effective way and at the same time not compromise on the QoS of the video content
- …